• Volume 10,Issue 3,1999 Table of Contents
    Select All
    Display Type: |
    • Brief Commentary on the 15 AES Candidate Algorithms Issued by NIST of USA

      1999, 10(3):225-230. CSTR:

      Abstract (4402) HTML (0) PDF 443.06 K (4755) Comment (0) Favorites

      Abstract:In this paper, the authors introduce the basic ideas of the 15 AES(advanced encryption standard) candidate algorithms issued by National Institute of Standards and Technology (NIST) of USA. The current analysis results of these algorithms are also presented.

    • A Visual Model for Distributed Programming

      1999, 10(3):231-234. CSTR:

      Abstract (3558) HTML (0) PDF 309.72 K (4353) Comment (0) Favorites

      Abstract:VMDP is a visual model for distributed programming based on icons, which is used to illuminate the objects and the controls in a distributed system. With VMDP, a process is represented by a vehicle, a resource by a crossroad, and the coordination among processes by the traffic light. The coordination relations among processes and controls such as synchronization and mutual exclusion are understandable and readable in VMDP. VMDP devotes itself to building distributed system model, network programming, and parallel/distributed programming as well.

    • Region Feature-based Interactive Segmentation Method and Its Application in Medical Image Analyzing

      1999, 10(3):235-240. CSTR:

      Abstract (3682) HTML (0) PDF 1.99 M (5260) Comment (0) Favorites

      Abstract:The interactive segmentation techniques attract more and more attention in that these techniques can handle complicated images. In this paper, an interactive image segmentation method is proposed based on proxy model. The proxy is a task-specific module which carries out certain function. Communications between an operator and computer is realized by means of the control interface and the report interface of proxy. The proposed proxy is constructed on the basis of region features of a to-be-segmented region in an image. This method is applied to solve the segmentation problem in medical images and the result shows that this method is effective in such complicated image as medical image.

    • Segmentation and Recognition Methods of Adhesion and Intersection Character String with the Line

      1999, 10(3):241-247. CSTR:

      Abstract (4861) HTML (0) PDF 469.58 K (5120) Comment (0) Favorites

      Abstract:The segmentation and recognition methods of the omnirange character string which is adhered or intersected with the lines in the engineering drawing vectorization are described in this paper. The directional calculation methods of the string are also supplied on different drawing distribution cases, the segmentation of the adhered string between characters is also realized by calculating the feature vectors of the adhered local string block image and using the iteration approachment algorithm. The authors use the projection method to solve the segmenting problem of the characters in the case of character adhered or intersected with the lines, which made the recognition accuracy of the omnirange string increased. The algorithm has the antijamming property for the local degradation character recognition in the engineering drawings.

    • Network Protocol Performance Testing Based on Stochastic Petri Nets

      1999, 10(3):248-252. CSTR:

      Abstract (4333) HTML (0) PDF 352.18 K (4616) Comment (0) Favorites

      Abstract:The main points of protocol performance testing is analyzed in this paper. The QoS(quality of service) of network protocol is described with a formal tool, stochastic Petri nets. Furthermore, the rules from the SPN(stochastic Petri nets) models to test suite of TTCN(tree and tabular combined notation) are proposed, and a performance test case is generated from the SPN models.

    • Assignments for Pure Functional Languages

      1999, 10(3):253-256. CSTR:

      Abstract (4194) HTML (0) PDF 242.79 K (4174) Comment (0) Favorites

      Abstract:In this paper, the authors show that assignments can be incorporated into pure functional languages without loss of referential transparency. And the denotational semantics of these assignment operations are given. Using these assignment operations, the authors define an interpreter of a simple imperative language.

    • An Improved Maximum Entropy Language Model and Its Application

      1999, 10(3):257-263. CSTR:

      Abstract (3835) HTML (0) PDF 434.60 K (4473) Comment (0) Favorites

      Abstract:The maximum entropy approach is proved to be expressive and effective for the statistics language modeling, but it suffers from the computational expensiveness of the model building. An improved maximum entropy approach which makes use of mutual information of information theory to select features based on Z-test is proposed. The approach is applied to Chinese word sense disambiguation. The experiments show that it has higher efficiency and precision.

    • Sort-Merge-Join Algorithm Revisited

      1999, 10(3):264-269. CSTR:

      Abstract (3980) HTML (0) PDF 453.96 K (4611) Comment (0) Favorites

      Abstract:The Sort-Merge-Join algorithm is an effective and widely used algorithm for implementing the important Join operation in database systems. The algorithm is revisited in this paper. It is discovered that sorting both operand relations externally is not necessary in the algorithm. The cost of the algorithm would be reduced greatly if only one operand relation is sorted externally. In order to overcome the shortcomings of the Sort-Merge-Join algorithm, a new Join algorithm called SDC-Join algorithm, is proposed in this paper. The SDC-Join algorithm is a single-relation-sorting based divide-and-conquer algorithm. A parallel version of the SDC-Join algorithm is also presented in the paper. Theoretical analysis and experiment results show that the performance of the SDC-Join algorithm is much higher than that of the Sort-Merge-Join algorithm in both uniprocessor computer systems and parallel computer systems.

    • Researches on Object-oriented Frameworks Supporting Multiple Parallel Computing Models

      1999, 10(3):270-276. CSTR:

      Abstract (3524) HTML (0) PDF 515.13 K (4625) Comment (0) Favorites

      Abstract:In order to support parallel programming, almost all of the programming languages incorporate a high-level parallel computing model into the language by providing parallelism and synchronization mechanisms, such as Ada's task with rendezvous and Java's thread with synchronized method. Obviously, such a programming language can only support one high-level parallel computing model. Although the approach of one model is simple and fairly effective to some applications, unfortunately the problems in the real world are always too diverse to be solved by using a single parallel computing model. In this paper, a new object-oriented approach to this problem is proposed. After analyzing the high-level parallel models of the various languages, some novel object-oriented language mechanisms are presented. Based on them, the concept of object-oriented parallel framework is proposed and the method for expressing and using the high-level parallel computing models by parallel frameworks is discussed. As a result, the high-level computing models are separated from languages in some sense and more than one framework could be given within a single language. Therefore, using a single language to support the various parallel models turns to be feasible.

    • Evidence Theory and Rough Set Theory

      1999, 10(3):277-282. CSTR:

      Abstract (4376) HTML (0) PDF 291.24 K (4275) Comment (0) Favorites

      Abstract:The rough set theory is introduced to deal with vagueness and uncertainty. In some aspects, the rough set theory overlaps with the Dempster-Shafer theory of evidence, but the rough set theory uses partitions to specify rough sets, lower and upper approximations, and then to capture uncertainty in knowledge representation. In this paper, directing against the discrepancy in the specification between the two theories, the authors explore their relationship in order for ones to understand them and open the way of applying them. In addition, in evidence theory, the basic aperation to combine evidences is the orthogonal sum, while in the rough set theory, the basic operation is the intersection of partition. Therefore, “Does the evidence combination correspond to the partition?” is the question which may be naturally raised. An example is presented to show that the answer is “no”.

    • Supporting Project-centered Object-oriented Reuse

      1999, 10(3):283-287. CSTR:

      Abstract (3618) HTML (0) PDF 400.76 K (4279) Comment (0) Favorites

      Abstract:Current software reuse techniques usually utilize a repository to organize standard and generic reusable assets, such as class libraries and generic component repository in object-oriented programming environments. However, this repository-centered reuse ignores the project related information to some extent, which describes application context of reusable assets. Application context is useful to the understanding and utilization of the assets. In this paper, an alternative object-oriented reuse approach is presented, which utilizes the documentation of a project to organize reusable assets. This so-called project-centered documentation reuse is very useful to the development of a family of software in the same domain. In the paper, some limitations of current object-oriented methods for supporting documentation reuse are discussed and a new method for enhancing documentation for reuse is provided and analyzed. Then, aiming at browsing and maintaining reusable assets in documentation, the needs for navigation in documents are discussed and enumerated.

    • An Algorithm Computing the Maximum Clique in a Graph

      1999, 10(3):288-292. CSTR:

      Abstract (4271) HTML (0) PDF 345.29 K (4896) Comment (0) Favorites

      Abstract:The maximum clique problem is a wellknown NPcomplete problem. Previous algorithms are either applicable only to some particular graphs or in need of exponential time cost. In this paper, an algorithm is presented, which computes the maximum clique(s) based on the notion of interval representation of a graph. It can be applied to any simple graph and only needs polynomial time under the certain conditions.

    • Application of Image Coding Using Complex-valued Wavelets

      1999, 10(3):293-298. CSTR:

      Abstract (3099) HTML (0) PDF 390.47 K (4476) Comment (0) Favorites

      Abstract:The solution on complex-valued wavelet basis and the corresponding construction of complex-valued filter bank are discussed in this paper, the real part of the complex-valued filter bank has linear phase, and its length is even which can be obtained from the complex-valued filter bank. Furthermore, the complex-valued filter bank is compared with other real filter using the same quantizer on coding of image, the complex-valued filter bank achieves well compressing performance.

    • A Reduced User-level Communication Protocol for Myrinet

      1999, 10(3):299-303. CSTR:

      Abstract (3742) HTML (0) PDF 375.62 K (4254) Comment (0) Favorites

      Abstract:Communication subsystem is a major factor that affects the overall performance of a workstation cluster system. In this paper, the authors analyzed and compared the performance of three popular networks, and pointed out that the high level protocol processing is the bottleneck of communication in workstation cluster system. A user level high performance protocol, called RCP(reduced communication protocol), had been built on a cluster of 8 Sun SPARC workstations connected with 640Mbps Myrinet. Low overhead and high efficiency of the protocol are achieved by simplifying the protocol's redundant functions, reducing the times of data copying, and operating directly on hardware buffer. The round trip latency of RCP is much lower than TCP/IP(200μs vs 1 540μs), the application available bandwidth is much improved(178Mbps vs 34 Mbps) and the bandwidth usage of Myrinet on RCP reaches to 80.5%. A very simple interface to application or PVM is provided as well.

    • Precedent Interpretation Based Incomplete Information Reasoning and Its Application

      1999, 10(3):304-309. CSTR:

      Abstract (3510) HTML (0) PDF 441.71 K (4653) Comment (0) Favorites

      Abstract:Approximate reasoning with the incomplete information is one of the difficulties that the knowledge engineering has faced. A precedent logic program theory with the property of nonmonotonicity is proposed in this paper. The synthesis evaluation for the interpretation of knowledge can be taken with the theory, such that the optimal selection of interpretation is made possible which becomes the best approach to the current knowledge. The theory completion in the significance of optimal selection is achieved and the requirement of completion and consistency of knowledge are avoided. To acquire the precedent logic programs in the applications, based on an inductive logic programming, learning algorithm is presented which incorporates the multiple inductive methods and has greater ability of induction. The presented theory and the algorithm have been applied in an expert system and gained satisfactory results.

    • A Distributed Object Based Framework for Parallel Programming

      1999, 10(3):310-316. CSTR:

      Abstract (3175) HTML (0) PDF 481.03 K (4598) Comment (0) Favorites

      Abstract:The computational and compositional features are very important in the construction of software for the workstation clusters. However, due to the lack of suitable supporting environment of software development, most existing distributed parallel software systems are weak in these two aspects, especially in the compositional feature. In this paper, a distributed object based framework for parallel programming is proposed. The goals of the framework are: first, getting high parallel computing efficiency; second, constructing a mechanism to encapsulate and reuse parallel program. The framework is tested by some parallel algorithms, the results indicate that the framework is helpful.

    • Application of B Wavelet and Step Spectrum Analysis in Truncated Data Imaging

      1999, 10(3):317-323. CSTR:

      Abstract (3520) HTML (0) PDF 1.44 M (4550) Comment (0) Favorites

      Abstract:In this paper, the authors propose a fast B wavelet transform method in spectrum domain and step spectrum analysis theory for extracting completed magnetic resonance(MR) spectrum data from the MR truncated data, and the reconstruction image. In this method, the feature information is abstracted from the available low-frequency MR data using B wavelet method, and then high-frequency components are exerted from the feature information and whole spectrum data is recovered by using step spectrum analysis theory(SSAT), at last MR image is reconstructed from the recovered completed spectrum data by FFT(fast Fourier transform). Experiment and simulation results show that this method gives much better reconstructed image than the available method.

    • A Polynomial Time Algorithm for Computing Reliability of Two Classes of Networks

      1999, 10(3):324-326. CSTR:

      Abstract (3519) HTML (0) PDF 231.92 K (4430) Comment (0) Favorites

      Abstract:In this paper, two classes of directed networks——ORC-networks and IRC-networks are defined, and a polynomial time algorithm is presented for computing their rooted communication reliability, i.e. the probability that a specified vertex, root vertex, can communicate with all other vertices. The complexity of the algorithm for ORC-networks and IRC-networks is O(|E|) and O(|V|·|E|) respectively, where |V| and |E| are the number of vertices and of edges of networks respectively.

    • Three Kinds of Node-reduce Operator on 3rd Order Bzier Curve

      1999, 10(3):327-331. CSTR:

      Abstract (3111) HTML (0) PDF 306.89 K (3923) Comment (0) Favorites

      Abstract:The simplification of Bézier curves in fitting and editing is discussed, three kinds of node-reduce operators are defined, and the algorithms based on them are given in this paper. The simplest Bézier expression can be gotten through the algorithms, and a strict proof is given. These algorithms have been already used in the developing software.

    • An Extension Theorem on Finitely Axiomatizable Algebraic Equation Systems

      1999, 10(3):332-335. CSTR:

      Abstract (3485) HTML (0) PDF 299.47 K (4335) Comment (0) Favorites

      Abstract:First, the two notions: weakly definable principal congruence and definable subdirectly irreducible class are introduced in this paper. The authors prove that if a variety generated by a finite algebra has both weakly definable principal congruence and definable subdirectly irreducible class, its equational system is finitely axiomatizable. Further discussion shows that the results are new, and are significant generalization of the known results.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063