Loading...
Toggle navigation
Home
About
About Journal
Historical Evolution
Indexed In
Awards
Reference Index
Editorial Board
Journal Online
Archive
Project Articles
Most Download Articles
Most Read Articles
Instruction
Contribution Column
Author Guidelines
Template
FAQ
Copyright Agreement
Expenses
Academic Integrity
Contact
Contact Us
Location Map
Subscription
Advertisement
中文
Table of Content
01 May 2005, Volume 25 Issue 05
Previous Issue
Next Issue
Data mining
Improvement of AprioriTid algorithm for mining association rules
PENG Yi-pu,XIONG Yong-jun
2005, 25(05): 979-981. DOI:
10.3724/SP.J.1087.2005.0979
Asbtract
(
)
PDF
(135KB) (
)
Related Articles
|
Metrics
An enhanced algorithm associating AprioriTid with transaction reduction and item reduction technique was put forward. In the algorithm candidate set generation and the support calculation of each itemset were created after each transaction was compressed and connected, and the key word identifying was adopted in the candidate set, thus the process of pruning and string pattern matching was removed from AprioriTid algorithm. Testing results showed that the algorithm clearly outperformed AprioriTid algorithm.
Research on decision-tree classification in component retrieval auxiliary decision support
XU Jian-min, SHAO Yan-hua, WANG Jing-hong, LIU Jin-po
2005, 25(05): 982-984. DOI:
10.3724/SP.J.1087.2005.0982
Asbtract
(
)
PDF
(165KB) (
)
Related Articles
|
Metrics
The retrieval efficiency of the component library includes not only the retrieval efficiency of the component itself, but also the efficiency of the understanding of component. General component retrieval system provides descriptive information on understanding the component simply, but seldom provides information from the aspect of reusing actually. Data Mining technologies provide a feasible approach for effective decision support. In this paper, the application of decision-tree-based classification method was discussed. It could excavate the cryptic knowledge in component user feedback information, and enable the relevant personnel in the component library to understand the component from the aspect of using the component actually. DM solutions improved possibility and quality of reusing. In the end, the feasibility and validity of this method were verified through experiments.
New algorithm of mining fuzzy similar association rules
GENG Xin-qing, WANG Zheng-ou
2005, 25(05): 985-988. DOI:
10.3724/SP.J.1087.2005.0985
Asbtract
(
)
PDF
(166KB) (
)
Related Articles
|
Metrics
Firstly, a method of determining the membership function of sample data based on the self-organizing feature maps network(SOFM) was presented. Based on this method, according to the concept of similarity, with the calculating formula of similarity degree and the Apriori algorithm, a new algorithm of mining fuzzy similar association rules was proposed. Compared with existing similar algorithms, the new algorithm overcomes the defect of determining membership functions subjectively, especially when the data structure is more complex it is very difficult. Meanwhile, this algorithm reduces the redundant rules mined.
New method of processing noise data in decision tree algorithm based on variable precision rough set model
QIAO Mei, HAN Wen-xiu
2005, 25(05): 989-991. DOI:
10.3724/SP.J.1087.2005.0989
Asbtract
(
)
PDF
(148KB) (
)
Related Articles
|
Metrics
Noise data is the main factor affecting the training efficiency and quality of decision tree. Present pruning methods can’t eliminate the effect of noise data on choosing test attribute of tree node. In order to solve the problem, a new method of processing noise data — predictive pruning method was presented based on Variable Precision Rough Set (VPRS)model, which eliminated the influence of noise data using variable precision positive area before the calculation of choosing the test attribute of tree node. By using the method to improve the ID3 algorithm, experiments show that the algorithm generates smaller decision tree and uses less training time than the algorithm using pre-pruning method.
Improved minimum distance classifier — weighted minimum distance classifier
REN Jing, LI Chun-ping
2005, 25(05): 992-994. DOI:
10.3724/SP.J.1087.2005.0992
Asbtract
(
)
PDF
(138KB) (
)
Related Articles
|
Metrics
Minimum distance classifier is a simple and effective classification method. To improve its classification performance, the main methods were selecting the more effective distance measure. On the basis of analyzing the classification principle of decision tree classifier and parallelpiped classifier, a new classification method based on normalized Euclidian distance, called WMDC(weighted minimum distance classifier), was proposed. By adding weight define with nominal and string attributes and adding range restriction of attribute’s value, WMDC extended applicability of MDC(minimum distance classifier) using normalized Euclidian distance and improved its classification accuracy. Experiment results show this model has good classification accuracy in most data sets.
New search engine ranking algorithm based on categorization — CategoryRank
CHEN Wei-zhu, CHEN Ying, WU Yang
2005, 25(05): 995-997. DOI:
10.3724/SP.J.1087.2005.0995
Asbtract
(
)
PDF
(185KB) (
)
Related Articles
|
Metrics
A new search angine ranking algorithm named CategoryRank based on categorization was proposed, in order to yield more accurate search results. With this new algorithm, the notion of importance can be captured more accurately with respect to a particular category. For this, the link graph was first analyzed and computed based on the category difference between two web pages of this link to better reflect user behavior in surfing. Secondly, the category information was applied into each web page to distinguish the importance of this page for different kind of users. Finally, the offline model and online model of this algorithm were combined to detail the application in ranking of search engine.
Algorithm for mining maximum frequent itemsets based on FP-tree
LIU Nai-li, LI Yu-chen, MA Lei
2005, 25(05): 998-1000. DOI:
10.3724/SP.J.1087.2005.0998
Asbtract
(
)
PDF
(141KB) (
)
Related Articles
|
Metrics
Mining association rule is an important matter in data mining, in which mining maximum frequent itemsets is a key problem in mining association rule. Many of the previous algorithms mine maximum frequent itemsets by producing candidate itemsets firstly, then pruning. But the cost of producing candidate itemsets is very high, especially when there exist long patterns. In this paper, the structure of a FP-tree was improved, a fast algorithm DMFIA-1 based on FP-tree for mining maximum frequent itemsets was proposed, which did not produce maximum frequent candidate itemsets and was more effective than DMFIA. The new FP-tree is a one-way tree and there is no pointer pointing its children in each node, so at least one third of memory is saved.
Fast clustering algorithm based on Quad-tree
LUAN Li-hua, JI Gen-lin
2005, 25(05): 1001-1003. DOI:
10.3724/SP.J.1087.2005.1001
Asbtract
(
)
PDF
(142KB) (
)
Related Articles
|
Metrics
On the DBSCAN algorithm, a fast clustering algorithm based on quad-tree was proposed. It chose the points in the cirque-shaped neighborhood of a core point as seeds to expand the cluster, which decreased the execution frequency of region query and reduced the I/O cost. It used a fast-created quad-tree to execute region query, which not only improved the query efficiency, but also shortened the time of constructing a spatial index. Experiment results show that the new algorithm is effective.
Describing method of the distribution of data-sample based on Gain
SUN Wei-wei, LIU Cai-xing, TIAN Xu-hong
2005, 25(05): 1004-1005. DOI:
10.3724/SP.J.1087.2005.1004
Asbtract
(
)
PDF
(147KB) (
)
Related Articles
|
Metrics
For describing the distribution of samples with high-dimensions and discrete classification data, the method of scoring-ratio based on Gain was presented. It computed scoring-ratio for every sample according to the importance of attributes and attribute-value, and the distribution of samples in a class was described from the point of view of membership degree of sample to each class. The probability density curve and histogram showed the distribution of typical and noise samples in each class distinctly.
Personal recommendation algorithm based on concept hierarchy
XIONG Xin, WANG Wei-ping, YE Yue-xiang
2005, 25(05): 1006-1008. DOI:
10.3724/SP.J.1087.2005.1006
Asbtract
(
)
PDF
(201KB) (
)
Related Articles
|
Metrics
Collaborative filtering is the most successful technology for building recommendation systems. But with a large number of users and items, this method faces serious problems such as sparsity which makes the recommendation efficiency decline linearly. In this paper a concept hierarchy methodology ameliorating user-item matrix was suggested. By using buy-data and click-through-data and integrating items of similar users and those of multi-level association, this method showed good performance on sparsity set.
Association rule mining based on simulated annealing genetic algorithm
WU Zhao-hui, ZHANG Gui-juan, LIU Xi-yu
2005, 25(05): 1009-1011. DOI:
10.3724/SP.J.1087.2005.1009
Asbtract
(
)
PDF
(155KB) (
)
Related Articles
|
Metrics
Simulated annealing genetic algorithm was improved and used in association rule mining. A new association rule mining algorithm based on improved simulated annealing genetic algorithm was presented. This algorithm used adaptive crossover probability and mutation probability, and restrained premature convergence effectively. Experiment results demonstrate that this method can solve association rule mining effectively.
Personal recommendation algorithm based on Web mining and its application in Web based education
GAO Peng, GAO Ling, WANG Zheng, HU Qing-shan
2005, 25(05): 1011-1015. DOI:
10.3724/SP.J.1087.2005.1011
Asbtract
(
)
Related Articles
|
Metrics
Based on Web data mining, a Web access transaction model WTM and personal recommendation algorithm were presented. The object of this algorithm was to recommend Web resources to user according to user’s access pattern. It matched user’s active access sequence with frequent item sets made by association rules in real time and offered different resources to different users. During this process algorithm did not need to generate all association rules and thus improves the efficiency of recommendation. Finally, a system structure of Web education environment based on the WTM and algorithm was brought forward.
Design and implementation of Data Analysis Assistant system based on EJB
CHEN Rong-xin, CHEN Wei-bin
2005, 25(05): 1016-1018. DOI:
10.3724/SP.J.1087.2005.1016
Asbtract
(
)
PDF
(242KB) (
)
Related Articles
|
Metrics
A solution to data mining service design based on EJB technology was introduced to meet the requirement and environment status for enterprises. The DAA application system was developed according to the solution. Several key technologies in system implementation including coarse grained accessing method, intermediate data management, asynchronous communication in mining and data browsing were discussed. A mining example based on C4.5 algorithm in DAA system was presented.
Artificial intelligence and simulation
Ant colony algorithm for floorplan
LU Qiang, CHEN Ming
2005, 25(05): 1019-1021. DOI:
10.3724/SP.J.1087.2005.1019
Asbtract
(
)
PDF
(143KB) (
)
Related Articles
|
Metrics
To increase the optimization result and efficiency in floorplan, ant colony algorithm was used as optimization algorithm of floorplan. In this algorithm, the B*-tree structure was defined to describe the structure of layout, the utilization efficiency of modules was defined to be pheromone which strenthened the dependency relationship of partial modules that occupy less area, and mutation scheme was employed to improve the efficiency of convergence. Through experiments, ant colony algorithm can get better result and efficiency than simulate annealing algorithm in the flooplan of hard modules.
Analysis of weight in case-based reasoning system
2005, 25(05): 1022-1025. DOI:
10.3724/SP.J.1087.2005.1022
Asbtract
(
)
PDF
(182KB) (
)
Related Articles
|
Metrics
Index weight is important in retrieval model of Case-Based Reasoning(CBR) system. Index weight was worked out by the method of two-level fuzzy synthesis evaluation based on several experts. Deviation degree and consistency of each expert were analyzed by relation degree. It is proved to be effective and feasible by experiments.
Rough set text classification rule extraction based on CHI value
WANG Ming-chun, WANG Zheng-ou,ZHANG Kai,HAO Xi-long
2005, 25(05): 1026-1028. DOI:
10.3724/SP.J.2005.1026
Asbtract
(
)
PDF
(186KB) (
)
Related Articles
|
Metrics
The definition of proximate rule was proposed based on the characteristic of text classification rule extraction. Based on the CHI values, the features of text set were selected firstly and feature significance information was provided to the further feature selection. Then rough set was used to select further the attributes on the discrete decision table. Finally precise rules or proximate rules were extracted using rough set theory. The method combined CHI value feature selection and rough set theory fully so as to avoid both feature reduction on a large scale decision table and the discretization of the decision table. The method improved the effectiveness and the practicability of extracting text rule greatly. Experiment results demonstrate the effectiveness of the method.
Architecture of a simulator designed for multi-robot systems
LU Bo-bo, HUANG Hong
2005, 25(05): 1029-1030. DOI:
10.3724/SP.J.1087.2005.1029
Asbtract
(
)
PDF
(98KB) (
)
Related Articles
|
Metrics
The experimental platform of multi-robot systems costs much and developers are often confronted with problems like hardware aging, malfunction and damage etc. Software architecture of a flexible simulation platform was proposed to solve these problems. This simulator was based on client/server architecture and used a kernel module to organize other functional modules. A concept of plug-in was introduced to build sensor plug-ins and they effectively achieved the simulating of varied sensors. Experiments show the simulator is usable and practicable.
Application of wavelet neural network in the system identification for flight control systems
HUANG Yi-jun, ZHANG Wei-guo, LIU Xiao-xiong
2005, 25(05): 1031-1033. DOI:
10.3724/SP.J.1087.2005.1031
Asbtract
(
)
PDF
(145KB) (
)
Related Articles
|
Metrics
A method using neural network with the hidden layer that consists of wavelets for flight control system identification was presented. A mother wavelet based on the sigmoid function was formed. A wavelet neural network (WNN) was designed using this function as nerve cell. WNN can identify the flight control system on-line. Simulation results about the application of this network were also given.
Design and implementation of the coordinated manipulation and motion control of double-arms space robots in simulation system
WANG Zhou-yi, LIU Chang-an, LIU Ji-xing
2005, 25(05): 1034-1035. DOI:
10.3724/SP.J.1087.2005.1034
Asbtract
(
)
PDF
(170KB) (
)
Related Articles
|
Metrics
A method of setting up a experimental platform of loop coordinated manipulation and motion control for double-arms free flying space robots was presented. The FFSR(Free-Flying Space Robots) experimental platform frame in robotic simulation was created by the combination of the (VC++) 6.0,OpenGL,Matlab and Matcom. With the implementation of a resolved motion rate control algorithm, the dynamic process of the robots manipulating the target object coordinately was depicted, and the curves of the position and the angle of the spacecraft were shown, too. The results above verify the effectiveness of the algorithm and the methodology.
Application in automatic abstracting for text clustering
GUO Qing-lin, FAN Xiao-zhong, LIU Chang-an
2005, 25(05): 1036-1038. DOI:
10.3724/SP.J.1087.2005.1036
Asbtract
(
)
PDF
(161KB) (
)
Related Articles
|
Metrics
The method of automatic abstracting based on text clustering was brought forward to overcome the shortages of the current methods of automatic abstracting. This method used text clustering, which realized automatic abstracting of multi-document. For a specific plastic domain an automatic abstracting system named TCAAS based on text clustering was implemented, whose precision and recall was above 80%. And the precision and recall of automatic abstracting of multi-document was above 75%. Experiments proved that it is feasible to use the method to develop an automatic abstracting system, which is valuable for further study in more depth.
Central convergence and stability of BCF vector for Chinese text
ZHU Xu-ju,YANG Jian-gang
2005, 25(05): 1039-1041. DOI:
10.3724/SP.J.1087.2005.1039
Asbtract
(
)
PDF
(140KB) (
)
Related Articles
|
Metrics
BCF(Blank Count Feature), a new feature of the construction of projection profile, was presented for Chinese text analysis. BVSA(BCF Vector Smoothing Algorithm), as the preprocessing of projection profile, was presented to be applied before the analysis. After applying BVSA, the projection profile of Chinese text showed an important phenomenon - the convergence of BCF vector. The statistic experiment proved that it was a common and stable phenomenon, and the convergence phenomenon would still be available even if the font style, or font size, or even the text writing/printing style changed. Based on it, the algorithm designed for text line extraction achieved good effect.
Software technology
Expansion of B-shell function
XIA Chuan-liang
2005, 25(05): 1042-1044. DOI:
10.3724/SP.J.1087.2005.1042
Asbtract
(
)
PDF
(129KB) (
)
Related Articles
|
Metrics
In UNIX, B-shell is the most important shell, but it has some shortcomings compared with general programming language. For example, it has no integrated data type similar to arrays and weak ability to calculate and no formatted input-output ways, which is not easy to dispose numerical or char data type. It is also weak in dealing with character string. In this paper the B-shell functions of array data type, dealing with character string, calculating ability, and formatted input-output ways were expanded by using B-shell’s own functions and relative technology. The expansion will make B-shell have the functions similar to those of other high-level programming languages.
Multi-agent cooperation based on organizational structure
FAN Wei,CHI Hong,JI Lei
2005, 25(05): 1045-1048. DOI:
10.3724/SP.J.1087.2005.1045
Asbtract
(
)
PDF
(189KB) (
)
Related Articles
|
Metrics
Agent organization can be used for multi-agent problem solving so as to potentially decrease the difficulty of problem solving and complexity of interaction, and the organization structure, organization formation rule and object planning are the key problems among multi-agent cooperation. In this paper, a multi-agent organization model and a set of rules based on the model were presented and the method about multi-agent object planning and the coherence and perfection of the planning were described. Based on the above study, the formation procedure and the release procedure of multi-agent organization were presented, and all the procedures were formally described by extended temporal logic and pi-calculus. All these improved the study of multi-agent theory and programming practice which was not closely combined.
Transplant and research of Direct3D based on component on embedded operating system推
HU Dan-gui, ZHAO Yue-song, CHEN Rong
2005, 25(05): 1049-1051. DOI:
10.3724/SP.J.1087.1049
Asbtract
(
)
PDF
(150KB) (
)
Related Articles
|
Metrics
Embedded operating systems become increasingly significant, which run on the resource-limited home appliances and industry instruments. Meanwhile people pay more and more attention to 3D technique. Therefore it is necessary to transplant Direct3D to embedded operating systems. The transplant and research of Direct3D based on CAR component technique on ElastOS were analyzed. The realization of ElaD3D interfaces on ElastOS and Windows synchronously and the exertion of CAR component programming ideas in the transplant of Direct3D were expatiated. So client programs can register some or other event handling function solely so as to predigest programming greatly.
Implementation of automated function test for kernel network protocol stack
LIU Yuan, WANG Kai-yun, FAN Xiao-lan, JIANG Jian-guo
2005, 25(05): 1052-1054. DOI:
10.3724/SP.J.1087.2005.1052
Asbtract
(
)
PDF
(148KB) (
)
Related Articles
|
Metrics
Based on the research of manual testing process, combined with the technology of UML and Expect program, an automated testing model applied to the function test of network protocol stack software in the kernel of the operating system was proposed. In Linux operating system, an automated test case using only one computer was exemplified to verify the feasibility of the model and its corresponding technology. This model settles the test problem of automated network configuration and data-driven, and at the same time reduces the requirements on hardware resources.
Research on transplant of uClinux in S698 microprocessor
ZHAN Wen-jing, ZHANG Kai
2005, 25(05): 1055-1057. DOI:
10.3724/SP.J.1087.2005.1055
Asbtract
(
)
PDF
(169KB) (
)
Related Articles
|
Metrics
The method of transplanting open source uClinux to S698 microprocessor, which was made in China and had its own intellectual property, was studied. After the introduction of S698 architecture, the development environment was built, bootstrap, romfs, OS kernel transplant and construction were analyzed, and the solution to these problems was brought forward. The transplant was implemented on S698 Application Development Board.
Optimized design of the middle layer of the distributed multi-layer architecture
ZHANG Song, LI Xi
2005, 25(05): 1058-1060. DOI:
10.3724/SP.J.1087.2005.1058
Asbtract
(
)
PDF
(160KB) (
)
Related Articles
|
Metrics
The distributive multi-layer architecture is now considered an optimum choice by companies structuring large-scale systems and its development focuses on the middle layer. In this paper the routine processing system of a stock exchange was used as an example, and the current situation of its middle layer service was analyzed. The existing problems were pointed out, and an improvement plan was put forward.
Implementation of Role object pattern with AOP
LI Wei-zhaiLI Wei-zhai1,2,YING Shi1,2,YE Yu1,2,YING Shi1YE Yu
2005, 25(05): 1061-1063. DOI:
10.3724/SP.J.1087.2005.1061
Asbtract
(
)
PDF
(158KB) (
)
Related Articles
|
Metrics
Role Object Pattern is the most common design pattern used to implement Role Model. However, there are some inherent flaws in the implementation of Role Object pattern with OOP, such as tangle and scatter, complex object identity and interface bloat or downcasting. A hybrid method to implement Role Object pattern based on AOP technology was presented. Compared with the object-oriented method, the advantages of AOP were addressed.
Graphics, image and multimedia
Fractal dimension fusion method based on image pyramid
SUN Yu-qiu,TIAN Jin-wen, LIU Jian
2005, 25(05): 1064-1065. DOI:
10.3724/SP.J.1087.2005.1064
Asbtract
(
)
PDF
(168KB) (
)
Related Articles
|
Metrics
Data fusion is an important technique to detect and recognize target from images. However, loss of information is unavoidable in fusion process. It is crucial to select fusion algorithm and avoid the loss of useful information. Because images in different levels of image pyramid were self-similar, which was the foundation of fractal, a new image fusion algorithm was presented based on image pyramid and fractal dimension. Different source images were decomposed into image pyramid sequence with different scales. Corresponding level images were merged, with fractal dimension as weight. An experiment was given using a mid-wave and a long-wave infrared image as two source images. Experiment results show the algorithm is feasible.
Multiple description coding based on splitting coefficient
CAI Can-hui, CHEN Jing, DING Run-tao
2005, 25(05): 1066-1068. DOI:
10.3724/SP.J.1087.2005.1066
Asbtract
(
)
PDF
(155KB) (
)
Related Articles
|
Metrics
A new multiple description coding scheme, multiple description coding based on splitting coefficient was proposed. First, each significant wavelet coefficient was split into odd position and even position coefficients by bitwise down sample, where the odd position coefficient was made from the bits in the odd positions, whereas the even position one was made from the bits in the even positions. The coded odd position coefficients and the protecting data for the even position coefficients formed one description, and the coded even position coefficients and the protecting data for the odd position coefficients formed the other description. Two descriptions were dispatched from different channels. Since each description included part or all information of the odd and even position coefficients, the reconstructed image from any single channel would have acceptable fidelity. The reconstructed image was of much better quality if both channels were available. Simulation results verified the performance of the proposed algorithm better than that of the polyphase transform and selective quantization.
Study on one scanning and high-efficient encoding algorithm based on JPEG 2000
ZHANG Hong-wei, LIU Zheng-guang, CHEN Hong-xin
2005, 25(05): 1069-1071. DOI:
10.3724/SP.J.1087.2005.01069
Asbtract
(
)
Related Articles
|
Metrics
Due to the high complexity of computation, JPEG2000 cannot be used in many conditions. As an important part of JPEG2000, EBCOT algorithm performs the scanning 3 times in each bit plane and codes all coefficients in 3 coding passes, wasting lots of operation time. A scanning algorithm was introduced and all the coefficients of one bit plane could be coded in one scanning. Firstly, to deal with the problems caused by this algorithm, two significance state variables rather than a single variable were introduced, Secondly, the "stripe-causal" mode was used to form the context. Finally the states of MQ coder and context were stored separately according to 3 coding passes. Thus one scanning method could improve the coding efficiency greatly while keeping the excellent performance of JPEG2000.
Design and implementation of embedded MPEG-4 video server
LENG Jian-qing, WU Jin-yong, XU Jian-jian
2005, 25(05): 1072-1075. DOI:
10.3724/SP.J.1087.2005.1072
Asbtract
(
)
PDF
(220KB) (
)
Related Articles
|
Metrics
The design approach of a Linux-based embedded MPEG-4 Video Server (EMP4VS) with MPEG-4 Hardware Encoder was studied. The implementation of an EMP4VS was presented from the aspects of hardware architecture, software design, control/video data flow, the QoS mechanism, and client software. The extension of EMP4VS B/S architecture with middleware server was also discussed.
IP core design of JPEG image compression algorithm
WANG Zhen-dao, CHEN Di-ping, WEN Kang-yi
2005, 25(05): 1076-1077. DOI:
10.3724/SP.J.1087.2005.1076
Asbtract
(
)
PDF
(154KB) (
)
Related Articles
|
Metrics
The IP Core of JPEG Image compression algorithm was designed based on the 2-D DCT algorithm adopting the matrix decomposition. The IP Core and all of the modules were described and simulated by Verilog-HDL language at RTL level. Experiment results show that the design of the proposed method is validated.
Selection of optimal stopping time for diffusion filtering based on minimum correlation coefficient推
XIE Mei-hua, WANG Zheng-ming
2005, 25(05): 1078-1080. DOI:
10.3724/SP.J.1087.2005.1077
Asbtract
(
)
Related Articles
|
Metrics
The selection of optimal stopping time for diffusion filtering was studied. It defined a correlation coefficient of de-noised image and noise by multiplying the image with a decreased function of gradient. Then, the selection of optimal stopping time equaled minimizing that correlation coefficient. This criterion can suppress the affection of minutiae to correlation coefficient and get a more accurate stopping time without knowing the noise variance. Simulation results show that, the stopping time determined by this criterion is near-optimal according to best PSNR, and the new criterion adapts to a wide range of noise levels.
Progressive compression scheme based on normal meshes
LI Chang-he, DUAN De-quan,LI Fang
2005, 25(05): 1081-1083. DOI:
10.3724/SP.J.1087.2005.1081
Asbtract
(
)
PDF
(143KB) (
)
Related Articles
|
Metrics
Multi-resolution analysis and normal mesh are new methods in meshes compression and other operation of 3D graphics recently. In this paper, a scheme of multi-resolution analysis and progressive geometry compression based on normal meshes was proposed, and the concerned problems of boundary in the multi-resolution analysis based on subdivision were attempted. The results showed that a satisfied effect and high compression rate could be achieved, by combining the multi-resolution analysis of normal meshes and normal polygons made schemes to manage the boundaries.
Modeling perspective image and its optimized segmentation
LIU Ping, CHEN Bin, FU Zhong-liang
2005, 25(05): 1084-1086. DOI:
10.3724/SP.J.1087.2005.1084
Asbtract
(
)
PDF
(165KB) (
)
Related Articles
|
Metrics
When light penetrates through sheet, the perspective images such as images of watermark on the banknotes form. Its histogram has only a single peak. It’s very hard to get good segmentation with old methods. A probability model of distribution for perspective image’s background and objects was put forward, and a formula was deduced to compute the optimized segmentation threshold based on the probability model. The experiment results of show that this new approach can get wonderful segmentation for perspective image, and its computing speed is faster than that of other methods.
Lung region segmentation algorithm based on active shape model
XU Yu-feng, ZHOU Xue-hai, XIE Xuan-yang
2005, 25(05): 1087-1089. DOI:
10.3724/SP.J.1087.2005.1087
Asbtract
(
)
PDF
(184KB) (
)
Related Articles
|
Metrics
A semiautomatic method for medical image segmentation based on active shape model was introduced. In order to improve the segmentation speed and precision, a semiautomatic method was used to model the training set, and a Gaussian Pyramid of images with different resolutions was generated so that multi-resolution image search could be performed. Experiments and analysis show that this method can be used to segment the lung region of medical images and the results are quite better.
Improved fractal image coding based on quadtree partition
WU Hong-mei, CHEN Ji-rong
2005, 25(05): 1090-1091. DOI:
10.3724/SP.J.1087.2005.1090
Asbtract
(
)
PDF
(144KB) (
)
Related Articles
|
Metrics
In fractal image compression, it takes quite long time to look for the best matching block.A method of fractal image coding was put forward based on quadtree image partition and class fuction as well as Y function. The method divides image blocks into 24 species, and then determines one transformation efficiently without carrying out various transformations on every definition domain block. Experiments prove that this method accelerates the speed of coding and the image quality of decoding dosen’t decline obviously.
Recognition approach of fingerprint based on structural classification and graphical matching
YANG Feng-rui, CHENG Yu
2005, 25(05): 1092-1095. DOI:
10.3724/SP.J.1087.2005.1092
Asbtract
(
)
PDF
(211KB) (
)
Related Articles
|
Metrics
A new approach to finding the core point of fingerprint was given. Based on the location of core point, fingerprint images were classified by using structural classification and were matched by using graphical matching. The core point method was combined with neighborhood matching approach and a new compound matching approach based on fuzzy discrimination was presented. In this approach, core point seeking once more based on the characteristics of fingerprint images was presented. Experiments were done on 1000 fingerprint images (20 percent of the images of low quality). 100 percent of the images were classified rightly and 98.7 percent of the images were matched rightly.
Wavelet threshold denoising via non-Gaussian distribution and context model
YANG Li, ZHUANG Cheng-san
2005, 25(05): 1096-1098. DOI:
10.3724/SP.J.1087.2005.1096
Asbtract
(
)
PDF
(198KB) (
)
Related Articles
|
Metrics
A new spatial adaptive wavelet threshold denoising method was presented, which was based on a non-Gaussian bivariate distribution and context model for image denoising inspired by image coding. The dependency between coefficients and their parents was carefully studied and a new distribution model composed of two variables and a free parameter was proposed. Context model is the core method in image coding and is applied in this project to choose the spatial adaptive threshold derived in a Bayesian framework. Experiment results show that this new method outperforms the best of the recently published methods, such as SureShrink, Wiener2, and BayesShrink.
Soft component of image processing based on strategy model
LI Li-juan, HE Ke-qing
2005, 25(05): 1099-1101. DOI:
10.3724/SP.J.1087.2005.1099
Asbtract
(
)
PDF
(143KB) (
)
Related Articles
|
Metrics
Based on the point of software reuse, a form of soft component construction was introduced to image process system, and an application of software components in the research of digital watermarking was given. A test platform for embedding watermarking and picking up watermarking was implemented. The software component can also be used as an independent software element in other correlative software constructions.It was argued that the component-based method could be of great help for building software of image recognizing, with increased efficiency and degree of maturation in software design.
S-LISSOM based approach for face recognition
YANG Zhi, WANG Tao
2005, 25(05): 1102-1104. DOI:
10.3724/SP.J.1087.2005.1102
Asbtract
(
)
PDF
(171KB) (
)
Related Articles
|
Metrics
A new approach to face recognition was proposed,based on Simplified Laterally Interconnected Synergetically Self-Organizing Map(S-LISSOM) Model and a EHMM. The approach extracted face character mapped from the gray image by using the S-LISSOM Model to form the Observing Vectors. Then the faces were classified by Hidden Markov Models. The experiment results were compared with other two HMM based methods. The results show that the method proposed has a lower face recognition error rate.
Image segmentation system for stone and mud mixture
WU Zhong-fu,PENG Yun-peng,YANG Qiang
2005, 25(05): 1105-1107.
Asbtract
(
)
PDF
(141KB) (
)
Related Articles
|
Metrics
During the procedure of the stone image segmentation, there are some practical problems such as the great difference of stones and different regions of a piece of stone having distinctly different brightness characteristics. A growing method based on degree fussy number was introduced. During the region growing, different growing functions were selected. The conception of relative statistical character was put forward. Using this conception, not only can the seeds used for region growing be selected, but also can the size of stone and the main relative statistical character of the whole stone be known. All these above were the base of the region growing method based on different-size degree fussy number. Using this method, stone image segmentation can get a great result.
Applications of apollonius fill in CAD
SONG Ju-long, LIN Zhen-xian, SONG Guo-xiang
2005, 25(05): 1108-1109. DOI:
10.3724/SP.J.1087.2005.1108
Asbtract
(
)
PDF
(148KB) (
)
Related Articles
|
Metrics
By the means of fractal Apollonius fill was applied in CAD. The Apollonius fill in a triangle, a rectangle and a circle was explored. Moreover, Apollonius fill was extended into 3D space. The concrete method implementing Apollonius fill in different region with sphericity or column was presented. So the application area of CAD was extended. The method presented had better maneuverability, could be easily used in practice and had certain applied value in the field concerning engineering cartography.
Dynamic self-adapting incorporative method for streaming media
ZHI Xi-hu, ZHANG Peng-xiang
2005, 25(05): 1110-1111. DOI:
10.3724/SP.J.1087.2005.1110
Asbtract
(
)
PDF
(107KB) (
)
Related Articles
|
Metrics
The key of applying streaming media is the management of resources. Among many dynamic management methods for streaming media, Selective PeriodPatching method has distinct advantages and certain shortcomings at the same time. Based on Selective PeriodPatching method, the dynamic self-adapting incorporative method for streaming media was brought forward, which would improve the efficiency of the resource utility and the serving capacity of the system.
Dynamic replication algorithm for CBR streaming media cache
MA Jie, FAN Jian-ping
2005, 25(05): 1112-1115. DOI:
10.3724/SP.J.1087.2005.1112
Asbtract
(
)
PDF
(198KB) (
)
Related Articles
|
Metrics
Proxy cache is a way to improve the Qos of internet accessing. It has been proved that the proxy cache have some effect on streaming media. Cache algorithm is the core of proxy cache which includes storage mode, replication policy and so on. In this paper, based on the storage mode which divided streaming media file into grades by the bite-rate, a dynamic replication algorithm (DRA) was brought forward to improve request-hit-number of proxy cache.
Music style classification using mutual information
MA Guang-zhi, QIN Dan
2005, 25(05): 1116-1118. DOI:
10.3724/SP.J.1087.2005.1116
Asbtract
(
)
PDF
(155KB) (
)
Related Articles
|
Metrics
A music representation model based on relative pitch and relative time length was proposed. This model well represented the same melody under different performance conditions. Based on the model, a music style classification algorithm was proposed to measure music style through melody Mutual Information. The algorithm’s time scale was close to that of syncopation algorithm under Unigram and Bigram models. The algorithm well supported music style classification among multi-styles.
Three dimensional wavelet transform based on dynamic group of frame
SHANG Ling,CHEN Feng,XU Wen-li
2005, 25(05): 1119-1121. DOI:
10.3724/SP.J.1087.2005.1119
Asbtract
(
)
PDF
(162KB) (
)
Related Articles
|
Metrics
To achieve high-quality video compression, three dimensional wavelet transform algorithm(3D-V-Forward)based on dynamic group of frame(DGOF-based)was presented. Compared with past three dimensional wavelet transform algorithm, the 3D-V-Forward algorithm can remarkably reduce the delay time in the video compression and decompression. The algorithm can also avoid the bad effect on video quality produced by three dimensional wavelet transform algorithm based on group of frame(3D-GOF). Experiment results show the algorithm is very efficient.
3D set partitioned embedded block (3D-SPECK) based video coder
ZHANG Yong-hua, ZHAO Zeng-hua, ZHAO Zheng
2005, 25(05): 1122-1123. DOI:
10.3724/SP.J.1087.2005.1122
Asbtract
(
)
PDF
(157KB) (
)
Related Articles
|
Metrics
A video coder without motion compensation based on 3D-SPECK was proposed. In order to carry out the three dimensional wavelet transform, the video sequences were partitioned into groups of frames (GOP), and the wavelet coefficients were organized as many wavelet cubes (WCs). The WCs were coded by the 3D-SPECK efficiently. The wavelet transform was carried out in the temporal axis instead of the traditional motion estimation/compensation, thus much computation was saved compared with the traditional hybrid coding model. Experiment results show that the proposed coding model achieves both measurable and subjective performances comparable with 3D-SPIHT.
Load-balancing algorithm for large-scale video-on-demand system
YIN Ping, LI Jun, LIU Zhen-an
2005, 25(05): 1124-1127. DOI:
10.3724/SP.J.1087.2005.1124
Asbtract
(
)
Related Articles
|
Metrics
Load-balancing algorithm for large-scale video-on-demand systems was discussed. A new load-balancing algorithm was proposed, which not only employed the optimized strategy to distribute the consumer’s demands, but also included the pop movie auto-recognition strategy, storage management and emergency disposing strategy. The efficiency of this load-balancing algorithm has been proved by facts.
Research of binary compression based on VRML file
ZHU Pan-rong,GUO Yang-ming, WANG Zhi-xu, ZHAI Zheng-jun
2005, 25(05): 1128-1129. DOI:
10.3724/SP.J.1087.2005.1128
Asbtract
(
)
PDF
(159KB) (
)
Related Articles
|
Metrics
VRML is the main file format transmitting the 3D model on the Internet,but the complicated scene model contains a large amount of information. Though traditional VRML file has already adopted the compression of a certain form to deal with, the file is still relatively huge. A binary compression algorithm based on VRML file was proposed in this paper. The files were compressed with binary compression, which was suitable for transmitting in the network without causing the congestion of network. At the same time, the data information did not influence visual display quality after compressing.
Information security
Design and implementation of network security management platform based on XMLRPC
XUE Jing-feng, CAO Yuan-da
2005, 25(05): 1130-1132. DOI:
10.3724/SP.J.1087.2005.1130
Asbtract
(
)
PDF
(161KB) (
)
Related Articles
|
Metrics
Allowing for the shortcomings of existing network security management, a network security management platform based on XMLRPC was designed. The problems of the standardization and combination of log and data in network security management platform were analyzed, a solution method was put forward and the process of implementation was discussed in details. This platform can manage all kinds of network security products running on different operating systems. Moreover, all kinds of log data can be analyzed identically by this platform.
Key agreement protocol based on Chebyshev maps
ZHANG Li-hua,LIAO Xiao-feng,WANG Xue-bing
2005, 25(05): 1133-1134. DOI:
10.3724/SP.J.1087.2005.1133
Asbtract
(
)
PDF
(143KB) (
)
Related Articles
|
Metrics
Based on high effective locations algorithm and error estimate, improvement of the public-key scheme based on Chebyshev maps proposed recently was presented and a key agreement protocol was given. Experiment results and analytic results show that it is very secure and practical.
New image watermark embedding algorithm based on fractal transformation contrast factor
CAO Hua, ZHOU Jing-li, HU Yu-ping
2005, 25(05): 1135-1137. DOI:
10.3724/SP.J.1087.2005.1135
Asbtract
(
)
PDF
(152KB) (
)
Related Articles
|
Metrics
It is necessary to study those watermark algorithms appropriate to the special feature of fractal transform. By analyzing related parameters in the process of image fractal transform and taking some trials, a new watermark algorithm embedding and extracting the watermark information was proposed by modulating the parameter of contrast factor which mapped the domain blocks to their best matched blocks in fractal transformation. Higher watermark capacity could be embedded into image at low algorithm complexity without having perceptible influence on the quality of the image. The extraction algorithm avoided the loss of watermark information because of the missed synchronization between original image and watermarked image, which improved the accuracy in extraction. Experiment results show the effectiveness of the algorithm.
Novel adaptive information hiding algorithm for image
LI Chang-he,ZHANG Yong-qiang,WANG Jun
2005, 25(05): 1138-1140. DOI:
10.3724/SP.J.1087.2005.1138
Asbtract
(
)
PDF
(213KB) (
)
Related Articles
|
Metrics
Based on the detailed study of image pixel-value differencing, a novel and efficient adaptive information hiding algorithm was proposed. Incorporating the local feature of digital image and taking full advantage of all kinds of masking characteristics of the human visual system, the algorithm embedded secret information self-adaptively. As a result, the changes in the cover image were much imperceptible. Experiment results show that the method is easy to implement, and that a large capacity of hiding information and a goodish robustness are achieved, and accordingly the conflict between the technical requirements for an information hiding system is alleviated.
Improving the performance of NIDS using symmetric multi-processor
LAI Hai-guang1, HUANG Hao, XIE Jun-yuan
2005, 25(05): 1141-1144. DOI:
10.3724/SP.J.1087.2005.1141
Asbtract
(
)
PDF
(215KB) (
)
Related Articles
|
Metrics
Network-based intrusion detection system (NIDS) detects attacks by capturing and analyzing network packets. As network band increases, NIDS can hardly keep up with the speed of networks. A method of improving NIDS’ process ability using symmetric multi-processor (SMP) was proposed in the paper. Several CPUs of the system were used to process network packets in parallel to improve the performance. After analyzing NIDS’ process procedure, an effective parallel processing structure was devised, which guaranteed threads on different CPUs running in parallel. Moreover, the synchronization method of threads proposed avoided the mutually exclusive access to the shared resource, which further increased the parallelity of threads, and guaranteed the correctness of the functionality of the program. Experiments show that the NIDS implemented on a SMP system with dual CPUs is almost 80% faster than the one based on a system with unique CPU.
Enhanced strong authorization grid security architecture
HOU Meng-bo, XU Qiu-liang
2005, 25(05): 1145-1147. DOI:
10.3724/SP.J.1087.2005.1145
Asbtract
(
)
PDF
(163KB) (
)
Related Articles
|
Metrics
Authentication and Authorization are the main concerns in the research of grid security technology. GSI of the Globus Project proposes a grid security infrastructure based on X.509 to provide authentication, data confidentiality, integrity and non-reputation. It focuses primarily on authentication and message protection, while lacking strong support for delegation and authorization. Several popular security solving schemes were analyzed, and a scheme based on the combination of PKI/PMI of X.509 standard was given, trying to enhance the authorization mechanism between the grid users and subjects of virtual organizations, hence to construct more secure grid security infrastructure.
Research on interoperability of DRM systems
XUE Mei, GU Hai, GU Jun-zhong
2005, 25(05): 1148-1150. DOI:
10.3724/SP.J.1087.2005.1148
Asbtract
(
)
PDF
(224KB) (
)
Related Articles
|
Metrics
The origin, research status and basic architecture of Digital Rights Management (DRM) were presented. Aiming at current DRM systems interoperability, Full Format Interoperability, Connected Interoperability and Configuration-driven Interoperability approaches were put forward. Their Pros and Cons were analyzed and application principles were outlined. In the end, an architecture supporting Connected Interoperability was suggested, and a multimedia-distribution-application example resulting from experiments was given to illustrate the interoperability of DRM systems based on the architecture.
Design of encryption software based on file system filter driver
SHAO Yu, XIAO Yun-shi
2005, 25(05): 1151-1152. DOI:
10.3724/SP.J.1087.2005.1151
Asbtract
(
)
PDF
(101KB) (
)
Related Articles
|
Metrics
Based on the comparison of several file encryption methods, a new encryption method using file filter driver was presented, and the key techniques for software design were introduced. The method had the advantages both in access control and security, further more, it supported various storage media.
Immunity-based model for distributed intrusion detection
CHU Yun,DAI Ying-xia,WAN Guo-long
2005, 25(05): 1153-1157. DOI:
10.3724/SP.J.1087.2005.1153
Asbtract
(
)
PDF
(265KB) (
)
Related Articles
|
Metrics
The traditional intrusion detection systems mostly adopt the analysis engine of the concentrating type, so it is already difficult to meet extensive security demand of the distributed network environment. While dealing with the exotic pathogeny, the biological immune system demonstrates many characteristics, such as distribution, variety, adaptability and efficiency etc, which offers a new thought of the study of the intrusion detection systems. An immunity-based model combining immune theory and data mining technique for distributed intrusion detection was proposed in this paper. Moreover a detail description was given to the architecture and work mechanism of the model, and the character of the model was analyzed. Finally the future research was presented.
Analysis of SETBOC and improved scheme
CAI Yong-quan,WANG Jun
2005, 25(05): 1158-1159. DOI:
10.3724/SP.J.1087.2005.1158
Asbtract
(
)
PDF
(165KB) (
)
Related Articles
|
Metrics
The advantages and disadvantages of SETBOC (SET based on one-way Certification) were analyzed. According to the characteristics of SET (Secure Electronic Transaction), such as security, atomicity, anonymity and non-repudiation, an improved scheme was proposed to fully possess the properties above. And it has been proved effective.
File system security model based on lineage mechanism
ZHOU Jian-bo, DONG Hong-bin, LIANG Yi-wen
2005, 25(05): 1160-1162. DOI:
10.3724/SP.J.1087.2005.1160
Asbtract
(
)
PDF
(169KB) (
)
Related Articles
|
Metrics
The authorization mechanism of operating systems usually puts importance on access control on the bias of taking a file as an isolated object, but ignores the security relationship between files, which implies many flaws. On the inspiration of describing the relationship between objects by means of lineage, a file lineage security model was presented, and its performance and security characteristics were analyzed.
Research and design of a new mobile agent protection scheme
YANG Xin, SHEN Jian-jing, WANG Shi-jun
2005, 25(05): 1163-1165. DOI:
10.3724/SP.J.1087.2005.1163
Asbtract
(
)
PDF
(151KB) (
)
Related Articles
|
Metrics
With the application of mobile agent technology in distributed computing, mobile agent systems encounter numerous security and software engineering challenges. To prevent malicious or unauthorized attacks from the third party entities, the method of protection of agent’s data and code was investigated, and a new mobile agent’s architecture was designed, which was composed of data wrapping all executable code intended for a given platform and explicit agent code in charge of transporting and handling the above data. The data-code split could co-exist with other architectures already proposed to improve platform interoperability. Finally, to protect data from agent’s code modification, public key decryption mechanism and agent authentication mechanism was analyzed. To protect code from injection of malicious data, data protection mechanism was proposed by improving the structure of data.
Design and implementation of user permission management component system based on software reuse
SUI Hong-wei, WANG Hua-yu, LIU Hong, WANG Rui-xia
2005, 25(05): 1166-1169. DOI:
10.3724/SP.J.1087.2005.1166
Asbtract
(
)
PDF
(204KB) (
)
Related Articles
|
Metrics
For the trivial desgning and the complexity of the user permission management system, the user permission management component model was put forward. One user permission management component generating system was also developed. This system implemented the management and reuse of user permission component, and is applied to the development of concreate information system.
Network technology and grid coputing
Survey of time synchronization algorithms in wireless sensor network
YANG Zong-kai, ZHAO Da-sheng, WANG Yu-ming, CHENG Wen-qing, HE Jian-hua
2005, 25(05): 1170-1172. DOI:
10.3724/SP.J.1087.2005.1170
Asbtract
(
)
PDF
(192KB) (
)
Related Articles
|
Metrics
The application and special requirements of time synchronization algorithm in wireless sensor network were introduced firstly. Then the un-synchronized reason, the relationship of local clock and logical clock, and the facts that impact the clock synchronizing precision were analyzed. Some promising methods deserving further study were proposed based on the classification of the existing clock synchronization algorithms.
Performance evaluation of Bluetooth Ad hoc network formation algorithms
HE Rong, FANG Xu-ming
2005, 25(05): 1173-1176. DOI:
10.3724/SP.J.1087.2005.1173
Asbtract
(
)
PDF
(193KB) (
)
Related Articles
|
Metrics
There are different methods and criteria to evaluate the performance of a protocol for Bluetooth Ad hoc network formation. In this paper, topology structure of Bluetooth Ad hoc network was presented firstly. Then, main approaches in system performance evaluation and key performance criteria of the network formation algorithms were discussed, and the performance of dominating its formation protocols was summarized. Furthermore, simulation of Tree Scatternet Formation (TSF) protocol was done and the corresponding simulation results were given. At last, some issues in existing protocols were pointed out, while the key aspects of Bluetooth Ad hoc network formation algorithms which people cared most and some possible research directions were presented.
Implementation of DiffServ classifier based on IXP2800 network processor推
LU Dong-xin,LIU Li-na,XIONG Tao
2005, 25(05): 1177-1178.
Asbtract
(
)
PDF
(122KB) (
)
Related Articles
|
Metrics
With the advent of multimedia service, the traditional fair traffic service mode can no longer satisfy the need of their quality of service (QoS). DiffServ scheme can differentiate different applications by setting priority for each flow and policing traffic at the edge of network. Classifier is one of the parts in implementation of DiffServ. This complement of DiffServ four-tuple classifier is based on a general-purpose network processor IXP2800 and has been tested under workbench - Intel simulation environment.
Cross-layer method to improve TCP performance in Ad Hoc networks
XIAO Yong-kang, LI Meng, SHAN Xiu-ming, REN Yong
2005, 25(05): 1179-1181. DOI:
10.3724/SP.J.1087.2005.1179
Asbtract
(
)
PDF
(198KB) (
)
Related Articles
|
Metrics
Many researches have shown that TCP performance in ad hoc networks is extremely poor, because the congestion control mechanism of TCP cannot effectively deal with the problem of packet drops caused by the shared channel contention. In this paper, a cross-layer method was presented,which adaptively adjusted the TCP maximum window size according to the number of RTS (Request To Send) retries of the MAC layer at the TCP sender, to control the number of TCP packets in the network and thus decrease the channel contention. The simulation results show that this method can remarkably improve the throughput and stability of TCP.
Study of IP supporting network traffic of iPAS system
SU Guang-wen, GAO De-yuan, FAN Xiao-ya, YAN Han
2005, 25(05): 1182-1184. DOI:
10.3724/SP.J.1087.2005.1182
Asbtract
(
)
PDF
(173KB) (
)
Related Articles
|
Metrics
IP supporting network traffic of a large-scale commercial iPAS System was analyzed with variance-time graph. The result was that the traffic fits to light level self-similarity process, meaings that the traffic had the characteristic of burst, but not very strong. Analysis indicated that IP supporting network traffic distribution was very complicated and could’t be expressed as typical distribution usually used. Peak value of the traffic showed the burst. Study in this paper showed that for the same traffic process, varying sampling time scale results from different Peak value. So, in order to gain the necessary detail of the traffic, sampling time scale must be selected correctly.
Development and implementation of network sniffer based on data link layer
ZHANG Nan, LI Zhi-shu, ZHANG Jian-hua, LI Qi
2005, 25(05): 1185-1186. DOI:
10.3724/SP.J.1087.2005.1185
Asbtract
(
)
PDF
(85KB) (
)
Related Articles
|
Metrics
A method to develop network sniffer based on data link layer was put forward. The sniffer implemented by this method can capture data frame on network by driver of network card. It can be used to capture all kinds of data packets. Compared with those sniffers which capture data packet based on network layer, it is more powerful.
Model to allocate network resources based on equilibrium
CHEN Zhi-qi, SU De-fu, HUO Lin
2005, 25(05): 1187-1189. DOI:
10.3724/SP.J.1087.2005.1187
Asbtract
(
)
PDF
(156KB) (
)
Related Articles
|
Metrics
A distributed microeconomic flow control technique based on equilibrium was presented, which modeled the network as competitive markets. In these markets resource owners (switches) priced their resources (link bandwidth) based on supply and demand and users purchased resources so as to maximize their individual Quality of Service(QoS). In this paper, the ideas from Game Theory were used to study the interaction of peers, and a flow control technique incentive scheme was proposed to improve the performance of the system and manage network resources fairly and efficiently. Simulation results were given as well.
Scheduling algorithm based on modified Min-Min in grid
WEI Tian-yu,ZENG Wen-hua,HUANG Bao-bian
2005, 25(05): 1190-1192. DOI:
10.3724/SP.J.1087.2005.1190
Asbtract
(
)
PDF
(213KB) (
)
Related Articles
|
Metrics
Based on the research of existing scheduling algorithms, a particular analysis of the most classical Min-Min was made and it pointed out that this algorithm can lead to a bad quality of load balancing. A modified module which could balance the load effectively and develop a corresponding scheduling algorithm Balance-Min-Min was drawn out. At last this algorithm was simulated with the aid of SimGrid toolkit and was proved reasonable and efficient.
Implementation of access control for MIPv6 AAA on Linux
FENG Hong-mei, GUO Qiao, LIU Ya-jing, LIAO Bin
2005, 25(05): 1193-1195. DOI:
10.3724/SP.J.1087.2005.1193
Asbtract
(
)
PDF
(172KB) (
)
Related Articles
|
Metrics
With the development of MIPv6 and wireless technology, the AAA Architecture of WLAN based on MIPv6 has attracted more and more attention. Because the foreign Agent does not exist in IPv6, the access router can be attendant of the AAA architecture based on Diameter. It can not only control the mobile node access the WLAN, but can be client of the Diameter AAA architecture. The netfilter frame in the Linux Kernel 2.4 has the powerful function of processing packet, and it can be used in the access router implementation.
PLCH binary tree model of the auto-adaptation of Web information issuance
PAN Rong
2005, 25(05): 1196-1197. DOI:
10.3724/SP.J.1087.2005.1196
Asbtract
(
)
PDF
(139KB) (
)
Related Articles
|
Metrics
o establish the Parent-Light-Children-Heavy Binary Tree Model of the structure of the (hardware) auto-adaptation of Web information issuance, the auto-adaptation issue problem of Web information was studied. The solution was achieved according to the superior scheme of the simple model and the superior algorism of the auto-adaptation issue of Web information issuance was acquired.
Typical applications
Application of workflow technology in civil airport ELV system
OUYANG Yuan-xin, XIONG Zhang, FANG Yi
2005, 25(05): 1198-1201. DOI:
10.3724/SP.J.1087.2005.1198
Asbtract
(
)
PDF
(241KB) (
)
Related Articles
|
Metrics
As the civil aviation develops, organization rebuilding and task reassigning will be repeating in a long period. Workflow technology provides separation of the business procedure logic and its IT operational support, enabling subsequent changes to be incorporated into the procedural rules defining the business process. Therefore, workflow technology is applied in civil airport ELV (Electronic Low Voltage) information system based on middleware service layer, to avoid unnecessary overlapping development of computer management and control system. Firstly, the construction of ELV system is was analyzed and content of workflow modeling is was introduced. Secondly, three kinds of ELV system architecture based on workflow technology are were discussed. Finally, the realization of distributed prototype system taking on main control workflow engine is was described.
Cross-organizational workflow monitoring based on active workflow view
WANG Wei, CUI Li-zhen, WANG Hai-yang
2005, 25(05): 1202-1204. DOI:
10.3724/SP.J.1087.2005.1202
Asbtract
(
)
PDF
(162KB) (
)
Related Articles
|
Metrics
Cross-organizational workflow is widely used because it can use resources of different enterprises efficiently and therefore brings higher throughput. However, how to protect enterprises’ private business processes without affecting their ability to interact with other partners is an important issue in cross-organizational workflow. Workflow views are considered a promising approach to selectively hide details of private workflows, while providing a process-oriented interface. The concept of active workflow view was introduced, a framework for cross-organizational workflow monitoring based on active workflow view was proposed, and the active monitoring in cross-organizational workflows was discussed.
RFID technology and its application in indoor positioning
SUN Yu, FAN Ping-zhi
2005, 25(05): 1205-1208. DOI:
10.3724/SP.J.1087.2005.1205
Asbtract
(
)
PDF
(194KB) (
)
Related Articles
|
Metrics
Based on the analysis of the basic principle and characteristics of RFID, the existing RFID indoor location-sensing system LANDMARC was discussed in detail. Then, an enhanced nearest neighbor positioning algorithm was proposed based on multi-level error processing. Simulation results show that the enhanced nearest neighbor algorithm can achieve better positioning accuracy than the existing nearest neighbor algorithms.
Recognition for pipe image of ground penetrating radar
YANG Shen, CHEN Shu-zhen, TANG Zhong-zhu
2005, 25(05): 1209-1211. DOI:
10.3724/SP.J.1087.2005.1209
Asbtract
(
)
PDF
(223KB) (
)
Related Articles
|
Metrics
A processing chain, from coarseness to refinement, for the spatial analysis of the data recorded by ground penetrating radar (GPR) was presented according to the property of a buried cylinder giving rise to a hyperbolic signature in GPR images. Firstly fractal theory was applied to pick up the fuzzy object area from complex background of GPR images, and then the appropriate directional operators were adopted to locate edges accurately. Finally an improved Hough transform was used to fit curves and extract target hyperbolas. Result shows that hyperbolas in GPR images can be discovered and reconstructed successfully.
Development of remote sensing image database based on COM and ArcSDE
LI Hang, YUE Li-hua
2005, 25(05): 1212-1214. DOI:
10.3724/SP.J.1087.2005.1212
Asbtract
(
)
PDF
(182KB) (
)
Related Articles
|
Metrics
How to store, retrieve and manage the remote sensing image data is a hotspot today. The two techniques of the second development of GIS and ArcSDE were analyzed, a solvable scheme using the GIS components based on COM to develop the client application, and using ArcSDE to develop the remote sensing image database was brought forward, and one development instance based on (VC++)6.0 and Oracle9i was presented.
Vision-based method for traffic flow surveillance on highway
TAN Xiao-jun, SHEN Wei, GUO Zhi-hao
2005, 25(05): 1215-1218. DOI:
10.3724/SP.J.1087.2005.1215
Asbtract
(
)
PDF
(235KB) (
)
Related Articles
|
Metrics
A vision-based method of vehicle counting was proposed. Firstly the relatively static proportion of the video was extracted and the moving objects were segmented using differencing image algorithm. Then vehicles were tracked in divided road lanes. Compared with the existing schemes, motion segmentation in the proposed method was done by dynamic local thresholds. Moreover, a process of lane separator recognition was executed, which saved the time of vehicle statistics. Experiment results show that the new method performs better in recognition rates and average processing periods.
Detection method of program buffer overflow based on Petri Net
HUANG Jin-zhi, HU Jian-sheng, LIAO Yun, CHAI Ren-wen
2005, 25(05): 1219-1221. DOI:
10.3724/SP.J.1087.2005.1219
Asbtract
(
)
PDF
(183KB) (
)
Related Articles
|
Metrics
Most security problems of software result from the buffer overflow, therefore, in order to decrease security bug of software, a detection method of primary code buffer overflow based on color Petri Net was put forward. Its correctness and simpleness were proved by simulation using the CPNTools.This added a new method for the buffer overflow detection of software.
Dynamic programming problem and its’ solution for test-room planning
LI Jiong, WANG Wen-yong, MIAO Jing
2005, 25(05): 1222-1224. DOI:
10.3724/SP.J.1087.2005.1222
Asbtract
(
)
PDF
(123KB) (
)
Related Articles
|
Metrics
Test-room planning is to allocate students to test-rooms under some kind of planning rules. The factors, including the number of test-rooms, the number of courses a test-room should have, the number of test paper folders etc. should be taken into account to get a optimal planning. A dynamic planning model for test-room planning and its evaluation criteria system were presented. An example application of the model was also given.
Design and construction of data synchronization under redundant SCADA system
WANG Da-zong, MA Zeng-liang
2005, 25(05): 1225-1226. DOI:
10.3724/SP.J.1087.2005.1225
Asbtract
(
)
PDF
(105KB) (
)
Related Articles
|
Metrics
According to the requirement of real-time characteristic and high availability of SCADA, and with regard to the difference of data synchronization method, a redundant SCADA model was designed and constructed, laying emphasis on the run-time data and historical data synchronization. Practical tests prove that the model possesses the comparable real-time characteristic and high availability.
2024 Vol.44 No.12
Current Issue
Archive
Superintended by:
Sichuan Associations for Science and Technology
Sponsored by:
Sichuan Computer Federation
Chengdu Branch, Chinese Academy of Sciences
Honorary Editor-in-Chief:
ZHANG Jingzhong
Editor-in-Chief:
XU Zongben
Associate Editor:
SHEN Hengtao XIA Zhaohui
Domestic Post Distribution Code:
62-110
Foreign Distribution Code:
M4616
Address:
No. 9, 4th Section of South Renmin Road, Chengdu 610041, China
Tel:
028-85224283-803
028-85222239-803
Website:
www.joca.cn
E-mail:
bjb@joca.cn
WeChat
Join CCF