Loading...

Table of Content

    01 April 2005, Volume 25 Issue 04
    Artificial intelligence & simu
    Best path analysis of emergency decision system based on improved genetic algorithm
    XIE Hong-wei,ZHANG Xiao-bo,YUAN Zhan-hua,YU Xue-li
    2005, 25(04):  737-738.  DOI: 10.3724/SP.J.1087.2005.0737
    Asbtract ( )   PDF (175KB) ( )  
    Related Articles | Metrics

    An improved genetic algorithm,evolving algorithm GASA was proposed,in which genetic algorithm was combined with simulated annealing algorithm. It avoided the premature convergence problem existed in Genetic Algorithm by useing Boltamann,and enhanced the global convergence. Genetic operators was redesigned, such as selection operator, cross operator and variation operator,on genetic algorithm. New cross operator and variation operator was proposed, which could dynamically regulate genetic operator according to evolving situation of groups. The algorithm was used in the best path problem of emergency decision support system,and it is proved to be reasonable and efficient.

    Network and distributed techno
    Solving weights’ vector algorithm of GP-decision tree and its application
    WANG Si-chun,Zhang Tai-shan,YIN Zhi-yun,LI Ri-bao,ZHANG Chu-wen
    2005, 25(04):  739-741.  DOI: 10.3724/SP.J.1087.2005.0739
    Asbtract ( )   PDF (143KB) ( )  
    Related Articles | Metrics
    A approach to solving the weights’ vector algorithm of GP-decision tree based on genetic programming algorithm was introduced,according to decrement of tree node error ratio and divided error ratio. Not only do solving the weights’ vector of tree node, but also ascertaining the construct of two-member decision tree by using this approach. Experimental results show that the choice for trend forecasting models can be correctly finished by using GP-decision tree algorithm.
    Artificial intelligence & simu
    Method of shortest paths problem on dynamic network based on genetic algorithm
    ZOU Liang,XU Jian-min
    2005, 25(04):  742-744.  DOI: 10.3724/SP.J.1087.2005.0742
    Asbtract ( )   PDF (159KB) ( )  
    Related Articles | Metrics

    An algorithm based on random Dijkstra algorithm and applying genetic algorithm to solve SPDRGS(Shortest Path problem on Dynamic Route Guidance System) was proposed. By applying random Dijkstra algorithm, the algorithm cleared out the biggest obstruction between the genetic algorithm and SPDRGS, which is how to get the initial generation of GA(Genetic algorithm). According to DRGS’s (Dynamic Route Guidance System) demand for time complexity and network constraint condition of route guidance algorithms, this algorithm can quickly find the excellent path and does not need any network constraint condition, which also can solve the problems on continuously and discrete dynamic networks. So the algorithm proposed can satisfy the demand of DRGS.

    Methods based on the Bayesian networks for situation assessment
    SUN Zhao-lin,YANG Hong-wen,HU Wei-dong
    2005, 25(04):  745-747.  DOI: 10.3724/SP.J.1087.2005.0745
    Asbtract ( )   PDF (164KB) ( )  
    Related Articles | Metrics

    The main functions of situation assessment were analysed.That the kernel and start point of the situation assessment system is the event detection was brought forward.The situation assessment knowledge representation using the Bayesian networks and the time/spatial knowledge representation in the situation assessment were discussed.The steps to construct a Bayesian networks for situation assessment were presented,and the layers of events in the situation assessment system were analysed. Finally,the process of how to use the Bayesian networks for situation assessment was showed by an example.

    Application in ERP system for artificial neural network
    ZHAO Yun-feng,LIU Wan-jun
    2005, 25(04):  748-750.  DOI: 10.3724/SP.J.1087.2005.0748
    Asbtract ( )   PDF (155KB) ( )  
    Related Articles | Metrics

    An expert system module which is a prediction analysis module based on the artificial neural network was added into traditional ERP system for the complex nonlinear prediction, so that the intelligent and automatic level of ERP system was higher.The module carried out the nonlinear prediction by using the BP neural network.The BP neural network got the inherent relation between the inputs and outputs and the solution of the involved problem by adjusting the weight of the neural network on line and training.A car market of the car manufacturing company was predicted.The result shows that the method possesses the excellent performance and practicability, which can be used as a effective method for ERP system.

    Adaptive fuzzy classifier based on table-looking learning algorithm
    UANG Zhan,JIANG Yu-ying,ZHANG Lei
    2005, 25(04):  750-753.  DOI: 10.3724/SP.J.1087.2005.0750
    Asbtract ( )   PDF (203KB) ( )  
    Related Articles | Metrics

    An improved adaptive fuzzy system based on table-looking learning algorithm,adaptive fuzzy classifier was developed.For the pattern recognition problems,simulation studies were made by applying the adaptive fuzzy classifier and the BP 3-layer feed-forward neural network classifier to the handwritten digit recognition problems. As compared to the BP neural network,the adaptive fuzzy classifier has better performance in recognition ability,incorporationg the linguistic information and comptational simplicity.All these show the superiority and potential of adaptive fuzzy techniques in solving pattern recognition problems.

    Novel chinese text subject extraction method based on word clustering
    CHEN Jiong,ZHANG Yong-kui
    2005, 25(04):  754-756.  DOI: 10.3724/SP.J.1087.2005.0754
    Asbtract ( )   PDF (150KB) ( )  
    Related Articles | Metrics

    A novel chinese text subject extraction method based on word clustering was presented. This method analysed the co-occurrence of words by using relativity calculation to create semantic relativity and generated a word cluster which represents a subject conception and is presented by seed words. To a given text, its features were extracted firstly. Then its subject genes was producted by means of word cluster. At last,the top subject genes were sorted in descending order of weights and selected as the subject. The experimental results indicate that the method has higher precision.

    Graphics and image processing
    Multi-kernel nonlinear diffusion model for denoising based on image decomposition
    XIE Mei-hua,WANG Zheng-ming
    2005, 25(04):  757-759.  DOI: 10.3724/SP.J.1087.2005.0757
    Asbtract ( )   PDF (182KB) ( )  
    Related Articles | Metrics

    A multi-kernel nonlinear diffusion model for image denoising based on image decomposition was studied, which got the major signal and the minutiae through different models. First,a edge-directed nonlinear diffusion model was put forward, which was used to get the major signal of image. Then P-M diffusion equation was used to get the high frequency signal of image from the remnant image. At last, the major signal and the minutiae were added to get the denoised image. The method can exert the merits of different models to get good results on the whole image. Simulation results show that, compared with the known methods, the model can remove noise more efficiently, keep edges more clearly, and it also has higher peak signal to noise ratio.

    Algorithm of image classification based on two-dimensional hidden Markov model
    HU Ying-song,ZHU A-ke,CHEN Gang,CHEN Zhong-xin
    2005, 25(04):  760-762.  DOI: 10.3724/SP.J.1087.2005.0760
    Asbtract ( )   PDF (151KB) ( )  
    Related Articles | Metrics

    Aimed at the inter-block dependency, an image classification algorithm based on a two hidden Markov model(2DHMM) extension from the one dimensional HMM was developed. The 2DHMM has transition probabilities conditioned on the states of neighboring blocks from both directions. Thus, the dependency in two dimensions can be reflected simultaneously. The HMM parameters were estimated by the EM algorithm. A two dimensional version of the Viterbi algorithm was also developed to classify optimally an image based on the trained HMM. Application of the HMM algorithm to document image shows that the algorithm performs better than CART.

    Algorithm for quick stereo edge matching
    LI De-guang,LI Ke-jie
    2005, 25(04):  763-765.  DOI: 10.3724/SP.J.1087.2005.0763
    Asbtract ( )   PDF (146KB) ( )  
    Related Articles | Metrics

    An algorithm of the quick stereo edge matching method was proposed. Using wavelet transform, edges and their direction angle which is used as a matching constraint in the image were gained. On the basis of the probability density function of the disparity gradient,the mutual coordinate constraint of the corresponding points of the two adjoing points in the continous edge of the left image was educed,then the search area of the matching point in the right image was limited. At last, quick edge matching method based on the two constraint was given.

    Image structure representation and classification based on recursive neural network
    QU Shen,WANG Qing,CHI Zhe-ru
    2005, 25(04):  766-768.  DOI: 10.3724/SP.J.1087.2005.0766
    Asbtract ( )   PDF (172KB) ( )  
    Related Articles | Metrics

    由于缺少结构化的表示,基于内容的图像分类存在一定的问题,据此提出了一种基于迭 代神经网络的自然图像表示和分类的方法。利用Berkeley分割算法将图像分割成不同的区域,采用 基于人工的多叉树或基于邻接区域的二叉树的方法进行区域合并,同时提取区域统计特征,得到图像 的树型结构表示。根据BPTS算法对网络进行训练,训练好的网络就具备了图像分类的功能。实验 结果表明,基于迭代神经网络的结构表示和分类方法具有很强的结构学习能力,同时人工生成的多叉 树涵盖更多的语义信息且能得到较好的分类结果。

    Image denosing based on complex wavelet transform and H-Curve criterion
    YANG Meng-zhao,LI Chao-feng,XU Lei
    2005, 25(04):  769-771.  DOI: 10.3724/SP.J.1087.2005.0769
    Asbtract ( )   PDF (189KB) ( )  
    Related Articles | Metrics

    According to more merits in some aspects over real wavelet transform such as shift invariability, more directions and precise information in phase space,complex wavelet transform can improve the ability to image denosing.In this paper combined with H-Curve criterion Dual-Tree complex wavelet transform was applied to image denosing. The H-Curve criterion does not need know the noise standard deviation firstly,and it can dispose many kinds of noise practically and produce a better effect in vision over smooth image brought up by many methods presently. The typical denosing test shows that the method produces a better effect over multitudinous methods presently in many aspects such as the ability to denosing, the effect in vision and universality in choosing a threshold.

    2-D DCT algorithm for embedded system推
    WEI Ben-jie,LIU Ming-ye,ZHANG Xiao-li
    2005, 25(04):  772-774.  DOI: 10.3724/SP.J.1087.2005.0772
    Asbtract ( )   PDF (150KB) ( )  
    Related Articles | Metrics

    A simple and fast 2-D DCT algorithm was presented.Firstly the transform coefficient of 2-D DCT was multiplied by the value of pixels,which formed a lookup table.When realizing the direct 2-D DCT,it put the table into memory,and got the product value by addressing without multipliers.This algorithm can work with high speed, so it is specially suitable for the design of embedding system.The structure was optimized and the memory space was reduced.Experiment results show that the algorithm is effective.

    Image relevance feedback retrieval based on texture and shape
    QIU Fang-peng,FENG Yu-cai,LIANG Jun-jie
    2005, 25(04):  775-777.  DOI: 10.3724/SP.J.1087.2005.0775
    Asbtract ( )   PDF (141KB) ( )  
    Related Articles | Metrics

    Gray concurrence matrix and invariant moments were developed to extract texture and shape features in image retrieval. With the relevance feedback mechanism, users could not only control the retrieval procedure, but also obtained satisfying retrieval results by adjusting relevance weights. The experiment shows that the proposed algorithm is effective and can achieve better results.

    Motion segmentation based on multi-model robust estimation
    REN Jian-feng,GUO Lei,SHEN Yu-li
    2005, 25(04):  778-780.  DOI: 10.3724/SP.J.1087.2005.0778
    Asbtract ( )   PDF (149KB) ( )  
    Related Articles | Metrics

    A novel motion segmentation algorithm based on multi-model robust estimation was proprosed. Fisrtly, the split and merge technique based on quad-tree was proposed to obtain the initial motion numbers of robust estimation and corresponding initial parameters of motion model. Then the parameters were updated by using estimating parameters, and the motion models were merged based on the motion consistency. Lastly small motion objects could be detected by using small-object detection techniques. Experimental results show that the method can obtain promising results.

    Technology and application of 3D modeling based on discrete algorithm
    WU Hui-xin,XUE Hui-feng,LU Cai-wu
    2005, 25(04):  781-782.  DOI: 10.3724/SP.J.1087.2005.0781
    Asbtract ( )   PDF (171KB) ( )  
    Related Articles | Metrics

    In accordance with the present situation and some problems in the area of 3D modeling, the technology of 3D modeling based on discrete algorithm was proposed. From the view of engineering application, this paper mainly discussed the data pre-processing of the 3D model face, the discretization of the 3D model face, topological relation based on the discretization meshwork model and mutual division algorithm of 3D model. Finally combining OpenGL,the Object ARX and Oriented Object Programming(OOP) technology, a simulation system of mineral deposit 3D model has been developed. The result shows that the 3D modeling method is much simple and practical, and has a wide area of application.

    Study on fast surface reconstruction algorithm for 3D unorganized points
    GU Yao-lin,NI Tong-guang
    2005, 25(04):  783-785.  DOI: 10.3724/SP.J.1087.2005.0783
    Asbtract ( )   PDF (173KB) ( )  
    Related Articles | Metrics

    A fast method of surface reconstruction was proposed. Based on the Power crust algorithm, a non-uniformly sampling method was used to resample the input data set according to the local feature size before reconstruction, the samples required were decreased and the mesh was topologically valid and convergent to the original surface. Experiment results show that the efficiency of the algorithm has been improved.

    Efficient video object segmentation algorithm based on color information and sampling detection
    LIU Hong-wei,LIU Ke
    2005, 25(04):  786-789.  DOI: 10.3724/SP.J.1087.2005.0786
    Asbtract ( )   PDF (208KB) ( )  
    Related Articles | Metrics

    Based on the characters of static scenes and block processing techniques, a video segmentation algorithm based on color information and sampling detection was proposed. In the algorithm, every frame was divided into many small regular blocks(Information Detecting Window,IDW) and showed by matrix. According to the detecting results with sampling IDWs, the algorithm quickly rebuild background model and segment moving object with the RGB color and grey scale information. It is shown that the algorithm combines the advantages of less runtime,stronger adaptability and accuracy with comparison to other background subtraction algorithms.

    Software and database
    Research and application of software design using patterns based on MDA
    LIU Fa-gui,HU Yao-min
    2005, 25(04):  790-791.  DOI: 10.3724/SP.J.1087.2005.0790
    Asbtract ( )   PDF (147KB) ( )  
    Related Articles | Metrics

    In the case of foundation of environment protection information system,method of software design using patterns based on MDA(Model Driven Architecture) was formed, which combined MDA with software design using patterns. The method supports model reusing between projects and business areas, it reduces granularity of reusing model and greatly increases the efficiency of software development.

    Agent architecture suitable for the open environment
    SHU Yao,LI Jian-xing,PENG Dai-wen,LIU Gan-lin
    2005, 25(04):  792-795.  DOI: 10.3724/SP.J.1087.2005.0792
    Asbtract ( )   PDF (203KB) ( )  
    Related Articles | Metrics

    An Agent architecture which is efficient,extensible and easy implementation was given by the improvement in famous BDI Agent model and the introduction of the meta-level reasoning technology.The architecture can also solve some difficult problems which will face to in the construction of an Agent.

    Object-oriented programming by contract
    LIN Jia-yi,LIU Jin,HE Ke-qing
    2005, 25(04):  796-798.  DOI: 10.3724/SP.J.1087.2005.0796
    Asbtract ( )   PDF (138KB) ( )  
    Related Articles | Metrics

    A notion of behavior subtyping and its extension was introduced.By analysing an example of Java,how to design in object-oriented programming by contract was discussed in order to keep the features of single and multiple inheritance.The effectivity of the method was demonstrated.Finally,how to assign blame when contracts were violated in dynamic enviroment was discussed. The perspective of contract used in software development was outlooked.

    Study on multi-agent scheduling system based on message report mechanism
    XIONG Cheng,LUO Xiao-bin,WANG Xiao-min,ZHANG Jia-shu
    2005, 25(04):  799-801.  DOI: 10.3724/SP.J.1087.2005.0799
    Asbtract ( )   PDF (149KB) ( )  
    Related Articles | Metrics

    Aimed at management difficulty caused by enormous resource of scheduling system, a kind of hierarchical architecture of MASS (Multi-Agent Scheduling System) based on message report mechanism was designed. According to the difference of role and function in the MASS, Agent was divided into manage Agent, task Agent and resource Agent. In addition, the system operation was managed and monitored by a management Agent with message report mechanism. Results of instance analysis show that the message report mechanism can not only assure the effective operation of system, but also improve the efficiency of system.

    Dynamic composition of Web services based on multi-agent
    REN Lei,LI Yu-chen,LI Jing
    2005, 25(04):  802-804.  DOI: 10.3724/SP.J.1087.2005.0802
    Asbtract ( )   PDF (213KB) ( )  
    Related Articles | Metrics

    It doesn’t adapt very well to the dynamic and distributed nature of Web services composition that researches based on traditional workflow technique. A Web services composition model MAS-WS based on multi-agent was proposed,the focus was on monitoring and exception handling in Web services composition execution. The key techniques including dynamic formation of agent-team, proactive collaboration, hierarchical management of Web services composition progress, interleaved planning with plan execution and so on were described. And then advantages of MAS-WS were discussed.

    Algorithm of mining association rules with weighted items based on probability
    YIN Qun,WANG Li-zhen,TIAN Qi-ming
    2005, 25(04):  805-807.  DOI: 10.3724/SP.J.1087.2005.0805
    Asbtract ( )   PDF (151KB) ( )  
    Related Articles | Metrics

    A algorithm of mining association rules with weighted items base on probability was designed,it solved the problem of the classical Apriori algorithm which can’t mine association rules in the little probability items.At the same time the problem of invalidation of the "downward closure property" in the weighted setting was solved by using an improved model of weighted support measurements. The algorithm is both scalable and efficient in discovering relationships in practical using.

    Defect analysis model of Bayesian and its application in software testing
    HU Yu-peng,CHEN Zhi-ping,LIN Ya-ping,LI Jun-yi
    2005, 25(04):  808-810.  DOI: 10.3724/SP.J.1087.2005.0808
    Asbtract ( )   PDF (163KB) ( )  
    Related Articles | Metrics

    How to obtain a reasonable process of testing is a very important subject in software testing. In this paper, aiming at the Object-Oriented software, a defect analysis model based on Bayesian networks theory was proposed. By means of analyzing the relationship between defect-objects,the Bayesian networks model was constructed. The defect probability distributions of nodes in the model was assessed by using the experience which already have. Furthermore, the Bayesian networks model is applied to practice, and gets good results.

    Study and implementation of unified resource database
    2005, 25(04):  811-813.  DOI: 10.3724/SP.J.1087.2005.0811
    Asbtract ( )   PDF (145KB) ( )  
    Related Articles | Metrics

    After analysing the current construction status of resource and resource database,the notion of unified resource database was proposed to simplify the resource exchange,sharing, and access.A prototype system,uniform resource management system (URMS),was designed and implemented to illustrate the feasibility and efficiency of such a unified resource database,and demonstrated how to implement its modules based on current technologies.

    Algorithm for merging materialized views
    CHEN Chang-qing,CHENG Ken
    2005, 25(04):  814-816.  DOI: 10.3724/SP.J.1087.2005.0814
    Asbtract ( )   PDF (148KB) ( )  
    Related Articles | Metrics

    For a real database application system with large numbers of materialized views, view merging was introduced to decrease the number of total views so as to reduce the search space. A merging tree was described and an efficient merging algorithm was presented based on such tree. Experiment results show that view merging is an efficient approach to fast search those materialized views that may be used to answer a query, and can improve the performance of query processing observably.

    Locally regular embedding
    TAN Lu,WU Yi
    2005, 25(04):  817-819.  DOI: 10.3724/SP.J.1087.2005.0817
    Asbtract ( )   PDF (133KB) ( )  
    Related Articles | Metrics

    The regular topological structure was introduced. For solving the low dimensional data with regular structure, the measure of the regularity was constructed and then the dimensionality reduction was brought forward. Compared with the kernel eigenmaps, for example Locally Linear Embedding(LLE) and Laplacian Eigenmap, the method makes the results approximately regular. The last results prove the theory results and show that this technique can greatly discover the topological structure of data, compared to the LLE and Laplacian Eigenmap.

    XML metadata retrieval based an approximately matching model
    OUYANG Liu-bo,LI Xue-yong,YANG Guang-zhong,LI Guo-hui
    2005, 25(04):  820-823.  DOI: 10.3724/SP.J.1087.2005.0820
    Asbtract ( )   PDF (221KB) ( )  
    Related Articles | Metrics
    This thesis took apart the unordered label tree matching into tree structure matching and tree label semantic matching. By combined with the tree structure matching and semantic matching, the thesis changed the traditional tree matching algorithms into approximately matching, and a metadata retrieval method based on three-level tree approximately matching model was put forward. According to this new retrieval method, the accuracy and recall rates would be adjusted by different requirement of users. In the end, this thesis brought forward the retrieval process of XML-oriented metadata, and gave out the applied design of metadata approximately match. The results of experiments prove that the approximately matching model is feasible and efficient in the application of retrieval XML metadata.
    Extension of rough set model based on weighted connection degree in incomplete information systems
    ZHAO Xiang,LIU Tong-ming,XIANG Yi-dan
    2005, 25(04):  824-826.  DOI: 10.3724/SP.J.1087.2005.0824
    Asbtract ( )   PDF (127KB) ( )  
    Related Articles | Metrics

    Several known extended rough set models were analyzed, a model based on weighted connection degree was proposed. In this model,the importance of each attribute was estimated before farther extension of rough set model in the incomplete information system. Finally, the experiment result shows that the model has good coincidence with user’s subjective request and objective reality.

    Method of data mining based on concept lattice
    WANG Xu-yang,LI Ming
    2005, 25(04):  827-829.  DOI: 10.3724/SP.J.1087.2005.0827
    Asbtract ( )   PDF (140KB) ( )  
    Related Articles | Metrics

    The relation between concept lattice and association rule was analysed,a method to store the frequent item set on concept lattice was expounded, and the rules were abstracted from it. At last,an algorithm of maintenance was proposed when database has been changed.

    High efficient incremental updating algorithm for mining association rules
    SHANG Zhi-hui,TAO Shu-ping
    2005, 25(04):  830-832.  DOI: 10.3724/SP.J.1087.2005.0830
    Asbtract ( )   PDF (144KB) ( )  
    Related Articles | Metrics

    An improved incremental updating algorithm SFUP was proposed based on study of the principle and efficiency of FUP algorithm. The algorithm made full use of the old data mining results and reduces the times of scanning the database greatly, thus the data mining efficiency increases. Some experiments show that SFUP is better than FUP at many aspects.

    Object persistence framework based on .NET metadata
    JIANG Bian
    2005, 25(04):  833-836.  DOI: 10.3724/SP.J.1087.2005.0833
    Asbtract ( )   PDF (191KB) ( )  
    Related Articles | Metrics

    Object persistence is a mechanism of storing internal status of object for further use. An object persistence framework based on .NET metadata was proposed. Compared with other object persistence framework, this framework stored definition information of object persistence into metadata and ran without configuration file, which makes developing and deploying more convenient. This framework provided object query manner based on SQL and object-oriented condition.

    Information security
    Random mumber generation method of information security system
    SU Gui-ping,YAO Xu-chu,LU Shu-wang
    2005, 25(04):  837-838.  DOI: 10.3724/SP.J.1087.2005.0837
    Asbtract ( )   PDF (150KB) ( )  
    Related Articles | Metrics

    The design and principle of a random number generator made by circuit noise signal was introduced,analyzing the randomness and security of its output sequence in cryptography.It may be integrated into chip, a board based on micro-computer bus may also was made by using this chip.So it is may applied to all kinds of information security system to assure their security.

    Study on information hiding technique based on chaos digital stream
    GAO Tie-gang,CHEN Zeng-qiang,YUAN Zhu-zhi,GU Qiao-lun
    2005, 25(04):  839-841.  DOI: 10.3724/SP.J.1087.2005.0839
    Asbtract ( )   PDF (158KB) ( )  
    Related Articles | Metrics

    A novel scheme for information hiding based on chaos digital stream was proposed, a kind of chaos digital stream which can be used to hide various information between receiver and transmitter was constructed by means of encryption and randomness of chaotic dynamic systems, as the format of stream is open only to receiver and transmitter and chaotic systems have definite equations, the scheme is safer, having large capacity of hiding. At last, an example was given to account for the scheme.

    Digital signature based on factoring polynomials over a large infinite field
    CUI Guo-hua,GE Ping
    2005, 25(04):  842-843.  DOI: 10.3724/SP.J.1087.2005.0842
    Asbtract ( )   PDF (86KB) ( )  
    Related Articles | Metrics

    Some of representative digital signature scheme, such as RSA, make the use of large number and therefore the efficiency is not favorable, especially in the situation that the digital signatures are necessary to be commuted constantly. Rabin system is comparative simple, but it has to pick some special large prime to utilization. The paper provided a new digital signature scheme according to the characteristics of factoring polynomials over a large infinite field and quadratic residue. The scheme is not only as secure and effective as Rabin scheme,but also has not particular demand of the basic prime.

    Method of anomaly detection based on feedback neural network
    YANG Tian-qi
    2005, 25(04):  844-845.  DOI: 10.3724/SP.J.1087.2005.0844
    Asbtract ( )   PDF (143KB) ( )  
    Related Articles | Metrics

    Current intrusion detection systems lack the ability to generalize from previously observed attacks and to detect even slight variations of known attacks. An approach employing LS and neural networks was described to provide the ability to generalize from previously observed behavior and to recognize future unseen behavior. The method was represented to use feedback neural networks in anomaly detection to structure the characteristic pattern of the short sequences of system calls. Meanwhile, the algorithm and design of the neural network were given. Experiment shows that the neural network is especially better to deal with events and variance of intrusions and improves the detection rate without increasing the false positives.

    Digital rights expression model based on first-order dynamic logic
    SUN Wei,ZHAI YU-qing
    2005, 25(04):  846-849.  DOI: 10.3724/SP.J.1087.2005.0846
    Asbtract ( )   PDF (191KB) ( )  
    Related Articles | Metrics

    In order to deal with the problem that current digital rights expression models have less ability to describe dynamic semantics, a new model, DDRM(Dynamic Digical Rights Model), which can describe action state was presented. Based on first-order dynamic logic, a new symbol system of first-order dynamic logic, DrFDL(Digital rights Fist-order Dynamic Logic), was defined to describe digital rights conception DrFDL semantic structure which can reflect dynamic property of action was presented based on DDRM. In addition, a license syntax based on DDRM was provided for rights expression. Then DrFDL logic was used to express the formal semantics of the licenses produced from this syntax and the determinacy with validity of these licenses was explored at last.

    Survey of video watermarking
    ZHANG Jiang,ZHAO Li,YANG Shi-qiang
    2005, 25(04):  850-852.  DOI: 10.3724/SP.J.1087.2005.0850
    Asbtract ( )   PDF (162KB) ( )  
    Related Articles | Metrics

    The basic theories and main application fields of video watermarking were described,then the fundamental principles and specific challenges of video watermarking were analyzed,and its models and classification of algorithms were expatiated on. Finally the possible directions for further research were pointed out.

    Blind watermarking algorithm for digital color images withstands cutting attacks
    YIN De-hui,LI Bing-fa
    2005, 25(04):  853-855.  DOI: 10.3724/SP.J.1087.2005.0853
    Asbtract ( )   PDF (197KB) ( )  
    Related Articles | Metrics

     Meaningful binary gray scale images was used as watermarking. Through Arnold transform, the watermarking image was hashed to eliminate the spatial correlation among pixels. Consequently, the algorithm’s ability to withstand attacks (for example cutting) was enhanced. The security of watermarking was enhanced by improving Arnold transform. With a quantification method, the original image is not required for extracting the watermarking. Numerical experiments show that the proposed algorithm is strong in withstanding cutting attacks. Even if more than one half of the image is cut off, the extracted watermarking still has good visual effects. After JPEG compression, adding noises, filtering, sharpening, blurring, contamination, distortion and other image processing or attacks, we can still extract relatively clear watermarking images.

    Construction and validation of optimal diffusion layers in SPN block cciphers
    CUI Ling-guo,CAO Yuan-da
    2005, 25(04):  856-858.  DOI: 10.3724/SP.J.1087.2005.0856
    Asbtract ( )   PDF (126KB) ( )  
    Related Articles | Metrics

    Most of diffusion layers are linear transformations on the vector space GF(2 m) n for SPN structures, which correspond to n-rank matrices under certain bases. The diffusion layers in which branch numbers B equals n+1 are optimal, iff their corresponding matrices have no singular square submatrices. An algorithm was proposed to construct optimal linear layers. In order to validate the optimization of diffusion layers, an algorithm was provided. As an example, a optimal linear mapping over GF(2 8) 8 and its optimization-validation were presented.

    Employing ECMQV key exchange scheme to enhance WTLS security
    YE Run-guo,FENG Yang-jun,YU Shu-yao,WU-Yu
    2005, 25(04):  859-861.  DOI: 10.3724/SP.J.1087.2005.0859
    Asbtract ( )   PDF (153KB) ( )  
    Related Articles | Metrics

    ECMQV is an authenticated key exchange scheme based on conventional ECDH protocol,it possesses advantages on higher security and lower computation overhead. This paper implemented a WTLS protocol variant through the integration of ECMQV scheme into WTLS framework; the security of current WTLS protocol was greatly enhanced while only a little more computation overhead was incurred. The WTLS protocol variant can be deployed on lightweight wireless terminals and meet their high-security requirements under future enterprise remote access environments.

    Study and implement of FBIDS model
    LIU Yi-nan,LENG Jian,FU Ming
    2005, 25(04):  862-863.  DOI: 10.3724/SP.J.1087.2005.0862
    Asbtract ( )   PDF (105KB) ( )  
    Related Articles | Metrics

    Due to the function of preventing outside network illegal intrusions of firewall and intrusion detection system,a FBIDS model which enabled firewall and intrusion detection system to work together was presented,by using the extension function offered by Netfilter/iptables construction, making an example of snort intrusion detection software, and making use of the existed intrusion detection software. Also, the system structure of the model, IDS implementation methods based on iptables, and some key technologies such as interface construction between snort and Netfilter framework, were introduced.

    Role and rule-based access contro
    RUI Guo-rong,XING Gui-fen
    2005, 25(04):  864-866.  DOI: 10.3724/SP.J.1087.2005.0864
    Asbtract ( )   PDF (207KB) ( )  
    Related Articles | Metrics

    Based on the analysis concerning the drawbacks of applying RBAC, the concepts of context and rule were introduced, and the permissions were divided into enabled ones, active ones and limited ones, then a new access control model, the role and rule-based access control(RRBAC) model, was proposed. Through defining the security policy in design and capturing the corresponding contextual information in running, this model can provide finer access control, and reduce the workload of PA in the model of RBAC significantly.

    Method for verifying log integrity
    CHEN Li-ming,YU Yan,HUANG Hao
    2005, 25(04):  867-869.  DOI: 10.3724/SP.J.1087.2005.0867
    Asbtract ( )   PDF (139KB) ( )  
    Related Articles | Metrics

    All kinds of system events are stored in logs. After a successful intrusion, the intruder will try to modify the logs to conceal the intrusion. A method for verifying and protecting log integrity was described to make all log entries generated prior to the logging system’s compromise impossible for the attacker to undetectably modify. A set of trusted log entries was provided to other programs when damages are made to log integrity.

    Theory and implementation of IPID covert network scanning
    ZHAO Qiu,HU Hua-ping,YU Hai-yan
    2005, 25(04):  870-873.  DOI: 10.3724/SP.J.1087.2005.0870
    Asbtract ( )   PDF (186KB) ( )  
    Related Articles | Metrics
    The theory of IPID(IP Identification) covert network scanning was introduced,then the design and implementation of IPID covert network scanning under the operation Windows was proposed.In order to improve the efficiency of scanning, the chunk binary algorithm was introduced, then its performance was analyzed and was compared with other algorithm. The results show that the chunk binary algorithm is a good algorithm of IPID covert scanning,and the correctness and speed of IPID covert scanning is decided by setting delay time between getting two IPID.
    Network technology
    Development trend on large-scale distributed videoconference collaborative environment based on next generation Internet
    BAO Cong-xiao,LI Xing
    2005, 25(04):  874-877.  DOI: 10.3724/SP.J.1087.2005.0874
    Asbtract ( )   PDF (206KB) ( )  
    Related Articles | Metrics

     Internet2 Commons is a next generation application framework that encourages deployment of tools for large scale distributed collaborative environment for the research and education community in U.S. The general architecture of design and managing large-scale, distributed videoconference collaborative environment was proposed. Key techniques of H 323-based videoconference system in Internet2 Commons were studied. Ordinary videoconference applications and special videoconference-based applications developed on Internet2 were also introduced. Migration policies of videoconference application from IPv4 network to IPv6 testbed were analyzed and Conclusions were given.

    Application of threshold-crossing in wireless network traffic
    LIU Chun-feng,SHU Yan-tai,LIU Jia-kun
    2005, 25(04):  878-880.  DOI: 10.3724/SP.J.1087.2005.0878
    Asbtract ( )   PDF (131KB) ( )  
    Related Articles | Metrics
    Comparing with the wired networks, the guaranteed QoS is difficult to get in wireless networks, because of its limited bandwidth and variable channel. Network traffic prediction is important for network control and allocation. This paper presented a method. The deviation function of threshold value v was made by the method of variance analysis for wireless network traffic, which presented bases for selection threshold value. At last, according to the threshold crossing theory, the efficiency of the solution was validated through calculating the crossing intensity. The threshold value can implement better in predicting the traffic.
    Way to analyze system with shared resources based on stachastic Petri nets
    HOU Rong-hui,SHI Hao-shan
    2005, 25(04):  881-882.  DOI: 10.3724/SP.J.1087.2005.0881
    Asbtract ( )   PDF (86KB) ( )  
    Related Articles | Metrics
    Several kind of resources sharing scheme were analyzed. By using stachastic petri nets theory, the resources sharing scheme was modeled and mathematically analyzed. Finally,an example demonstrates that absolute resources sharing is superior to partial resources sharing provided pairly competing resources.
    Analysis of packet Jitter of CBR stream under self-similar background traffic
    WANG Yan,AN Jian-ping
    2005, 25(04):  883-885.  DOI: 10.3724/SP.J.1087.2005.0883
    Asbtract ( )   PDF (153KB) ( )  
    Related Articles | Metrics
    Real-time application is an increasing application, but there are many application traffic should be transferred by Internet. The performance of real time applications such as video and voice streams relies on packet delay jitter. Large delay jitter causes buffer overflow and the user encounters interrupts. The delay jitter is mainly due to the perturbation of background traffic in the router. The jitter analysis has been made are all based on poisson process and recent study has proved its inaccurate. In this focus, a theoretical analysis of packet jitter of CBR stream was provided and different influence on CBR stream by self-similar and poisson back-ground traffic was validated by simulation result.
    An adaptive queue scheduling mechanism for supporting Diffserv
    LIU Hui,XIA Han-zhu,LIU Xiang
    2005, 25(04):  886-888.  DOI: 10.3724/SP.J.1087.2005.0886
    Asbtract ( )   PDF (133KB) ( )  
    Related Articles | Metrics

    WRR and DWRR in the architecture of DiffSever was discussed. And based on WRR, an adaptive weighted round-robin (AWRR) and how to carry out this algorithm was presented. By this algorithm, different packets have different weight, and schedule packets according to this. So that AWRR not only can obtain the requirement of QoS, but also can according to the node’s condition dynamically assigning the bandwidth and the bandwidth resource sharing.

    Application of monotonic rate scheduling algorithm
    YE Ming,LUO Ke-lu,CHEN Hui
    2005, 25(04):  889-891.  DOI: 10.3724/SP.J.1087.2005.0889
    Asbtract ( )   PDF (138KB) ( )  
    Related Articles | Metrics

    Scheduling condition and algorithm analysis of task sets which task deadline is not less than its period was introduced. This restrict conditions is slackening, and it is good for scheduling of mixed model of period and no-period task. At the same time, scheduling restrict conditions of original RM algorithm was analyzed and the shortcoming of computing time complexity was pointed out. Then a real-time scheduling approach and implementing flow-chart based on RM algorithm was presented, and a strict contrast test of the real-time scheduling approach was given.

    Ameliorate algorithm for network topology discovery
    QIU Jian-lin,HE Peng
    2005, 25(04):  891-893.  DOI: 10.3724/SP.J.1087.2005.0891
    Asbtract ( )   PDF (139KB) ( )  
    Related Articles | Metrics

    Three kinds of centralized automatic discovery algorithms for network topology were introduced, which include building network toplogy base on ICMP or ARP protocol and utilizing SNMP protocol to visit in MIB(management information base)to construct network toplogy.Then, a kind of better network toplogy algorithm was proposed based on the three algorithms which can discover network topology accurately,unabridged and efficiently. And the data structure and steps of this algorithm was described detailedly.

    Design of conformance testing system for OSPF protocol of IPv6
    LI Zheng-liang,ZHOU Hao,ZHAO Bao-hua
    2005, 25(04):  894-897.  DOI: 10.3724/SP.J.1087.2005.0894
    Asbtract ( )   PDF (195KB) ( )  
    Related Articles | Metrics
    According to the traits and requirements of protocol conformance testing, especially the characteristic of OSPF protocol, the design of a conformance testing system for OSPFv3 protocol was introduced. In our design, the environment of multiple virtual testers with controlling channel was used and Tcl language was choosed as test case describing language. This conformance testing system gets both good testing ability and flexibility. Testing of several different implementations of OSPFv3 protocol was accomplished. An example was shown, and the future work was also discussed.
    Research and implementation of IP router that supports ForCEs
    GAO Ming,WANG Wei-ming
    2005, 25(04):  897-899.  DOI: 10.3724/SP.J.1087.2005.0897
    Asbtract ( )   PDF (138KB) ( )  
    Related Articles | Metrics

    By separating CE from FE, ForCEs IP routers can easily configure out flexible and intelligent network. A mechanism for which FE Module can be implemented in Linux was brought forward. Based on the mechanism, A ForCEs IP router was constructed and corresponding result was given after testing. ForCEs IP routers implemented by the mechanism can meet all the requirements of ForCEs achitecture well.

    Multi-constrained optimal path selection of QoS
    CHEN Li-jia,ZHOU Jian-guo,JIANG Hao,YAN Pu-liu
    2005, 25(04):  900-902.  DOI: 10.3724/SP.J.1087.2005.0900
    Asbtract ( )   PDF (123KB) ( )  
    Related Articles | Metrics

    Aiming at the shortcomings of HMCOP algorithm that produces cumulate error and searches network only partly in multi-constrained optimal path selection of QoS, a improved heuristic algorithm LMS was put forward, which searches network from two directions using BFS algorithm and supervises the optimal path at each node.The simulation experiment of success rate of finding optimal path indicates that LMS has lower time complexity and upper performance than HMCOP.

    Efficient real-time traffic scheduling algorithm based on WRR in wireless networks
    ZHAO Zeng-hua,SHU Yan-tai
    2005, 25(04):  903-905.  DOI: 10.3724/SP.J.1087.2005.0903
    Asbtract ( )   PDF (204KB) ( )  
    Related Articles | Metrics

    An efficient real-time traffic scheduling algorithm for WLAN(Wireless Local Area Networks) was proposed based on the classic WRR (Weighted Round Robin) discipline. The algorithm was operated at link layer level, and was coupled closely with DCF(Distributed Coordinate Function). Through that, the HOL(Head Of Line) blocking problem was alleviated. With compensation for mobile users experiencing burst channel error, the long-term fairness approximately was achieved. Extensive simulations were performed using NS(Network Simulator). The results show that the algorithm is simple,and improves the channel utilization and data throughput effectively. The average packet delay is also decreased.

    Research on the generic function conformance testing of network management interfaces
    WANG Zhi-li,MENG Luo-ming
    2005, 25(04):  906-909.  DOI: 10.3724/SP.J.1087.2005.0906
    Asbtract ( )   PDF (206KB) ( )  
    Related Articles | Metrics
    Based on the analysis of the current definition method of network management interfaces, and the current status of function conformance testing of TMN interfaces, the concept of the abstract function conformance test flow was introduced. The translation from the technology-neutral abstract test flow to the technology-specific executable function testing scripts and the working procedures of the whole method were described, and the functions of some of the involved main components were also depicted and analyzed in detail. In addition, the repository of the function conformance test flow was described and an example of the related application was provided, and some of the testing policies and their application scenarios were also listed.
    ISCP-TCAM:a high speed power-efficient routing table search engine architecture
    YANG Kui-wu,WEI Bo,ZHANG Xiao-yi,LI Ou
    2005, 25(04):  910-912.  DOI: 10.3724/SP.J.1087.2005.0910
    Asbtract ( )   PDF (131KB) ( )  
    Related Articles | Metrics

    ropose the ISCP-TCAM (Improved Stage-Control Pipeline Ternary Content Addressable Memory),a high speed power-efficient routing table search architecture.This architecture not only has the merits of easy managing and updating of conventional Ternary Content Addressable Memory(TCAM),but also power-efficient compare with the TCAM with the same size.In order to evaluate it’s performance,we implement it with FPGA of ALTERA company.It is a good selection in the design of high speed power-efficient routing table search engine.

    Research of software design methods in data dissemination
    MA Wei-dong,LI You-ping
    2005, 25(04):  913-914.  DOI: 10.3724/SP.J.1087.2005.0913
    Asbtract ( )   PDF (141KB) ( )  
    Related Articles | Metrics

    Data dissemination is a novel active service architecture based on the IP multicasting or IP broadcasting technology. It can be widely applied in LAN,WAN and digital broadcasting network,and transmits the hot-information to massive consumers. The services and transmission characteristic of data dissemination was concluded,re-transmission ratio and computing methods which can improve the errors of communication channels was submited.The sending and receiving algorithms and implementation codes for data dissemination were discussed.

    Typical applications
    Workflow performance analysis based on process mining
    LIU Xin-yu,ZHU Wei-dong
    2005, 25(04):  915-918.  DOI: 10.3724/SP.J.1087.2005.0915
    Asbtract ( )   PDF (174KB) ( )  
    Related Articles | Metrics
    At first some concepts and the foundation concerning the workflow perforname were introduced. In order to evaluate the performance of workflows that contain dynamic and uncertain controls, the process minging algorithm based on workflow log was proposed.Then the Workflow Performance Analysis Net(WPAN) was built. Modifying treatments of reference were utilized to accommodate the analytical problems accordingly.
    New method of fingerprint minutiae extraction
    MENG Xiang-ping,REN Ji-chuan,WANG Xian-yong,JU Chuan-xiang,WANG Hua-jin
    2005, 25(04):  919-920.  DOI: 10.3724/SP.J.1087.2005.0919
    Asbtract ( )   PDF (109KB) ( )  
    Related Articles | Metrics
    A method to extract fingerprint minutiaes was proposed. Acquired binary image, we thinned the ridges and valleys respectively,then extracted ridge bifurcations and valley bifurcations as the key minutiaes from the ridge thinned image and valley thinned image. These minutiaes are more exact and the spurious bifurcations can be removed easily. Experimental results show that the amount of the key minutiaes is less,and it is helpful to fingerprint matching phase.
    Design and application of a generic distributed simulation I/O architecture
    ZHANG Xiu-shan,WANG Shao-ming,BEN Ke-rong,XU Bing-liang
    2005, 25(04):  921-922.  DOI: 10.3724/SP.J.1087.2005.0921
    Asbtract ( )   PDF (156KB) ( )  
    Related Articles | Metrics
    Based on the analysis of several typical simulation I/O architectures, a scalable distributed simulation two-tier I/O architecture was presented. It directly supported large number of simple digital displays(e.g 7-segment display) sharing a single data bus to decrease the hardwire complexity from O(n) to O( log n) for each of I/O controllers. This two-tier simulation I/O architecture has been proved to be able to meet the need of hardware-in-the-loop simulation with many good features such as real-time, scalability, fault-tolerance, maintainability and versatility.
    Computer audit based multi-agent system architecture
    WEN Ju-feng,JIANG Yu-quan,XING Han-cheng
    2005, 25(04):  923-926.  DOI: 10.3724/SP.J.1087.2005.0923
    Asbtract ( )   PDF (205KB) ( )  
    Related Articles | Metrics
    A novel computer audit based multi-agent system architecture was proposed. The functions of three subsystems and relevant Agents, components of auditing mobile Agent and mobile Agent server in the model were further discussed in details. The prototype can perform real-time distributed on-line computer audit that shows that the architecture is feasible in practice.
    Robust optimal controller design for networked control systems
    LI Zhang,FANG Hua-jing
    2005, 25(04):  927-928.  DOI: 10.3724/SP.J.1087.2005.0927
    Asbtract ( )   PDF (126KB) ( )  
    Related Articles | Metrics
    A delayed state-variable model for networked control systems was presented. Considering the model uncertainty and external disturbance, a sufficient condition on the existing of robust controller was proved. A method of designing and optimizing the controller was also given. Simulation results prove that the novel controller can robustly preserve the performance in terms of network delays and model uncertainty.
    Background denoising methods in vectorization of curves
    LUO Feng,YU Yan-mei,WU Xiao-hong,TENG Qi-zhi
    2005, 25(04):  929-931.  DOI: 10.3724/SP.J.1087.2005.0929
    Asbtract ( )   PDF (161KB) ( )  
    Related Articles | Metrics
    The well log is vectorized by scanning the well log into a digital image and converting the curves in the image into digital data using the theories and technologies of image processing and recognition. One of the most important problems in the vectorization is how to remove the background and noises in the image. For this reason, the methods of frequency domain filtering, cross templet matching, linear Hough transform, intensity projection, and line segment matching for background denoising were proposed. The merits of each method was compared to the others.
    Discussion on particularity of the real-time DVD video format
    LIN An,WAN Yong
    2005, 25(04):  932-933.  DOI: 10.3724/SP.J.1087.2005.0932
    Asbtract ( )   PDF (115KB) ( )  
    Related Articles | Metrics
    Differences between real-time DVD Video recording system and traditional authoring DVD system were analyzed from the view of file format. Some methods were advanced to improve system real-time performance. The result show that the realized embedded real-time DVD Vide recording system works well.
    Power spectrum reprocessing approach for pitch detection of speech
    ZHANG Tian-qi,ZHANG Zhan,QUAN Jin-guo,LIN Xiao-kang
    2005, 25(04):  934-936.  DOI: 10.3724/SP.J.1087.2005.0934
    Asbtract ( )   PDF (142KB) ( )  
    Related Articles | Metrics
    The cepstrum method of speech pitch detection was analyzed carefully, and several shortcomings were pointed out when the method was realized digitally. In order to overcome these shortcomings, a pitch detection algorithm based on digital spectral analysis was presented. It used the power spectrum reprocessing results of speech to extract the pitch contour. The presented method not only overcame the shortcomings of cepstrum method, but also improved the computational speed and the accuracy of the estimated pitch contour.
    Traffic flow time series separation methods
    REN Jiang-tao,XIE Qiong-qiong,YIN Jian
    2005, 25(04):  937-939.  DOI: 10.3724/SP.J.1087.2005.0937
    Asbtract ( )   PDF (142KB) ( )  
    Related Articles | Metrics
    By clustering of traffic flow time series, the typical traffic fluctuation patterns can be found. Generally, the euclidean distance and K-means algorithm can be used to clustering the time series, but it is hard to separate the time series with great different variability well. To solve this problem, fluctuation similarity measure, such as dynamic time warping and gray relation grade, and the hierarchical clustering algorithm were used to further separate the traffic flow time series. The experiments show that the proposed method can work and the gray relation grade measure is better suited for the problem than the dynamic time warping measure.
    Credit Architecture of Computational Economy for Grid Computing
    MA Man-fu,WU Jian,HU Zheng-guo,CHEN Ding-jian,JIANG Yun
    2005, 25(04):  940-943.  DOI: 10.3724/SP.J.1087.2005.0940
    Asbtract ( )   PDF (195KB) ( )  
    Related Articles | Metrics
    Based on the computational economy model of resource management in grid computing, a credit model was presented in which the resource credit, GSP credit, GSC credit were being defined. A Grid Credit Architecture(GCA) was being designed to meet the model and then discussed the policy in credit evaluating. As to implementation problems, the deploy of credit module and Extended Resource Usage Record (ERUR) was discussed in detail. Emulation experiments show that the new architecture is efficient and valuable within grid computing economy environments.
    Method for multi-agent cooperation used in the system of automatic decision-making of joint campaign
    WANG Yu-zhu,FU Ning,Niu Rong-jian
    2005, 25(04):  944-945.  DOI: 10.3724/SP.J.1087.2005.0944
    Asbtract ( )   PDF (150KB) ( )  
    Related Articles | Metrics
    With the development of joint campaign, the system of automatic decision-making of it is required. In order to meet the needs, a system was developed making use of MAS. In the system, the problem of cooperation among Agents is important and must be resolved. Through the analysis of the opportunities and characteristics of the cooperation among the Agents, based on the calculating of the systematic operational capability and the effectiveness, a method for multi-agent cooperation based on comprehensive operational capability and task difficulty was presented. The model used in cooperation was given. This model performs well in the automatic decision-making of joint campaign.
    Facial expression recognition based on adaboost algorithm
    YANG Guo-liang,WANG Zhi-liang,REN Jing-xia
    2005, 25(04):  946-948.  DOI: 10.3724/SP.J.1087.2005.0946
    Asbtract ( )   PDF (159KB) ( )  
    Related Articles | Metrics
    Adaboost is an effective classifier combination method,which can improve classification performance of weak learner. Adaboost algorithm was used to resolve facial expression recognition, several combination ways of Adaboost and Principal Component Analysis(PCA) were discussed. Experiment results show that the method has higher classification accuracy than standard PCA.
    Information processing of target redundancy based on adaptive Fuzzy C-Means clustering analysis
    LI Wei-min,ZHU Yong-feng,FU Qiang
    2005, 25(04):  949-951.  DOI: 10.3724/SP.J.1087.2005.0949
    Asbtract ( )   PDF (136KB) ( )  
    Related Articles | Metrics
    For the plots data outputted by radar receiver, the states of plots spread and the forming reasons of target redundancy phenomenon was discussed. And the Adaptive Fuzzy C-Means Clustering(AFCMC) algorithm which was used in agglomerate processing for the detected plots was proposed. This algorithm has provided a way for target redundancy processing. The simulation result has verified the validity of it.
    Application of association rules in stock analysis
    CHAI Ming-liang,SONG Su
    2005, 25(04):  952-954.  DOI: 10.3724/SP.J.1087.2005.0952
    Asbtract ( )   PDF (146KB) ( )  
    Related Articles | Metrics
    The Apriori arithmetic adopted the changing support and confidence was applied to mine one-dimension and multi-dimension stock information. It was familiar to take the stocks’ codes as the results of data processing, but the stocks’ transaction time was selected as the results of data processing aiming at the convenience and celerity during the concrete mining. It took the tier of transaction time as the direct object of arithmetic of data mining and took the transaction time as the indirect object of arithmetic of data mining. After such data processing, it was effective not only to mine the interesting rules, but also to avoid the trouble that the results of the data processing need to be reprocessed during the mining of multi-dimension information. The mining results have been proved to be right by the validation of the representational rules.
    Key technology pesearch of collaborative assembly based on B/S framework
    WAN Neng,MO Rong,CHANG Zhi-yong,LIU Hong-jun
    2005, 25(04):  955-956.  DOI: 10.3724/SP.J.1087.2005.0955
    Asbtract ( )   PDF (180KB) ( )  
    Related Articles | Metrics
    The application mode of collaborative assembly which belonged to collaborative design was analyzed. Under the condition of collaborative apperception was provided with, a collaborative assembly system framework was designed for synchronous collaborative assembly and asynchronous collaborative assembly. A particular method how to implement collaborative assembly was proposed and a tool of collaborative assembly based on Browse/Server framework was completed.
    Coordination middleware system for distributed information service platform
    2005, 25(04):  957-959.  DOI: 10.3724/SP.J.1087.2005.0957
    Asbtract ( )   PDF (163KB) ( )  
    Related Articles | Metrics
    In order to meet users’ QoS requisitions for distributed information service platform,a cluster of heterogeneous database was investigated, and a logical model of the coordination middleware based on the cluster was proposed. Then the design and implementation of the middleware was discussed in detail.The model introduced freshness of data as Quality of Service parameter for transaction processing to improve quality of service.
    Imprecise-based fault-tolerant optimal scheduling algorithm in multi-error model
    LUO Qiong,ZHANG Li-chen
    2005, 25(04):  960-961.  DOI: 10.3724/SP.J.1087.2005.0960
    Asbtract ( )   PDF (141KB) ( )  
    Related Articles | Metrics
     In a real-time system, each task must complete and produce correct output by the specified deadline. But, it is not possible to meet each deadline because of system overloaded. So,it is very important to decrease precision of real-time task and provide a maximize-utility fault-tolerant optimal scheduling to assure timeliness and reliability in the presence of multi-error. The optional parts of task in imprecise computation was used to provide potential time redundant for error-recovery of mandatory parts, and a formal k-fault tolerant optimal scheduling algorithm was proposed, which can guarantee maximize-reward and provide recovery operation for mandatory simultaneous. The analysis process was given by an example.
    Heuristic algorithm of the tactics inventory/transportation integrated optimization problem
    YAN Yu,YUAN Qing-da,GUO Wen-yi
    2005, 25(04):  962-965.  DOI: 10.3724/SP.J.1087.2005.0962
    Asbtract ( )   PDF (198KB) ( )  
    Related Articles | Metrics
    A way for solving the important and complicated problem of the inventory/transportation integrated optimization in the modern logistics tactics plan was discussed,and a heuristic algorithm based on the method for soling the capacitated concentrator location problem and the tabu search algorithm was discussed. And then the main points of programming were emphasized. Finally, the algorithm was tested by some simulated cases and the result was perfect.
    Method for texture color image segmentation
    YIN Hai-ming,ZHANG Ming-min,PAN Zhi-geng
    2005, 25(04):  966-967.  DOI: 10.3724/SP.J.1087.2005.0966
    Asbtract ( )   PDF (156KB) ( )  
    Related Articles | Metrics
    In this paper a new segmentation algorithm for textile color images is presented. First color quantization is performed on the image and a label matrix with the same size of the orignal image is generated. Second a crude segmentation is performed acording to the matrix and generates seed regions,then the pixels left through the crude segmentation are directly assigned to the seed regions. At last the initial regions are merged based on the color information and the edges of regions are smoothed.
    Method and the application of musical tone recognition
    XU Guo-qing, YANG Dan, WANG Bin-jie, WEN Jun-hao
    2005, 25(04):  968-970.  DOI: 10.3724/SP.J.1087.2005.0968
    Asbtract ( )   PDF (133KB) ( )  
    Related Articles | Metrics
    This thesis investigate the musical and physical characters of the musical sound, and advances a new method to recognize the musical tone firstly. This method realizes the precise frequency resolution. It is more advantageous than the pitch detection method and the single wavelet method. It is also more effective than Dynamic Time Warping method. This method is ideal for the pitch recognition of the musical sound. It is first advanced in the technology domain and it has a high application value.
    Edge detection for textile defects based on PCNN
    XU Yi-feng,ZHANG Rui-lin
    2005, 25(04):  971-973.  DOI: 10.3724/SP.J.1087.2005.0971
    Asbtract ( )   PDF (223KB) ( )  
    Related Articles | Metrics
     Textile texture has much anomaly,because of yarn helix structure,different size of yarn and supple transform for textile itself. The methods for detecting the textile defects with feature and model to segment were low efficiency and not good enough in precision. A method of feature extraction of the textile defects by using Pulsed Coupled Neural Network(PCNN) was put forward to overcome these problems. The model and properties of PCNN was analyzed. According to different gray intensity between the field of textile defects and the field of normal textile, feature of textile defects were extracted for PCNN firing or not. After dilated, the textile defects’ edge were extracted with CANNY operator. Experiment shows that the method can much better get the feature of the textile defects and has a much better edge detection result of the textile defects.
    Research and design of HTML parser based on page segmentation推
    YU Man-quan,CHEN Tie-rei,XU Hong-bo
    2005, 25(04):  974-976.  DOI: 10.3724/SP.J.1087.2005.0974
    Asbtract ( )   PDF (179KB) ( )  
    Related Articles | Metrics
    The technologies of Web page parser were introduced. And after making a best estimation of the merits and weakness of the existing methods, a more effective method for segmenting the HTML page in the news Web site was proposed. And then,a HTML Parser named TVPS was designed and realized based on the requirement of the projects. The experimental results show that the system has achieved great performance and meets the needs.
    Content-based information processing method of Web page
    WANG Shao-yu,DU Juan,QIN Qian-qing
    2005, 25(04):  977-978.  DOI: 10.3724/SP.J.1087.2005.0977
    Asbtract ( )   PDF (125KB) ( )  
    Related Articles | Metrics
    A content-based method that performs information filtering and extracting on the Internet was put forward. The method directly filtered the content of Web pages using generalized order statistics filter, then converted the filtered Web pages into black and white ones according to the setting threshold, finally image information of Web pages was extracted. The results of several Web pages processed by this method indicate that it can effectively extract image information from Web pages. An attempted system combining the characteristics of the image and text extraction methods was constructed.
2025 Vol.45 No.4

Current Issue
Archive
Honorary Editor-in-Chief: ZHANG Jingzhong
Editor-in-Chief: XU Zongben
Associate Editor: SHEN Hengtao XIA Zhaohui
Domestic Post Distribution Code: 62-110
Foreign Distribution Code: M4616
Address:
No. 9, 4th Section of South Renmin Road, Chengdu 610041, China
Tel: 028-85224283-803
  028-85222239-803
Website: www.joca.cn
E-mail: bjb@joca.cn
WeChat
Join CCF