• Volume 14,Issue 3,2003 Table of Contents
    Select All
    Display Type: |
    • Study on the Algebraic Semantics of Verilog

      2003, 14(3):317-327. CSTR:

      Abstract (4045) HTML (0) PDF 863.16 K (5481) Comment (0) Favorites

      Abstract:In this paper, the algebraic semantics of Verilog is explored, which is a collection of laws associated with Verilog constructs. These laws provide a precise framework for describing and defining the semantics of Verilog. The special features of the semantics of Verilog are shown. All the laws presented above are sound with respect to the operational semantics, i.e., if the two processes are the two sides of a law, then they are bisimilar. At last, the completeness of the algebraic laws with respect to a subset of Verilog and the operational semantics, i.e., are explored, if such programs are bisimilar, then they are algebraically equivalent. For the proof of completeness, this method will be the discovery of a normal form program for any such programs. Each such program will have an equivalent normal form program (through transformation by the algebraic laws), but two normal form programs will be bisimilar in the operational semantics if and only if they are syntactically equivalent in a simple way. These results are of theoretical significance, for the theories of process algebra are concentrated on the channel- communication concurrent languages. But there is little work on the shared-variable concurrent languages, and a general and effective treatment to the research of such kind of complex concurrent languages is proposed in this paper.

    • A Role Inverse Algorithm

      2003, 14(3):328-333. CSTR:

      Abstract (3664) HTML (0) PDF 690.78 K (5060) Comment (0) Favorites

      Abstract:A computational mechanism for context-free language parsing is proposed in this paper, which is called role inverse algorithm. The mechanism is based on the assignment of appropriate roles to categories according to their contexts. A kind of effectual 搇ook ahead?function is introduced into chart parsing by this mechanism at acceptable cost. As a result, lots of useless arcs in a chart can be avoided, so that a parsing process is accelerated. This mechanism can be used in many applications, such as natural language processing.

    • A Quantum Search Algorithm

      2003, 14(3):334-344. CSTR:

      Abstract (4278) HTML (0) PDF 888.19 K (6640) Comment (0) Favorites

      Abstract:In this paper, an important idea of devising a quantum algorithm is introduced, based on the description and analysis of two classes of quantum search algorithms, i.e. the unstructured search algorithms and structured search algorithms. Some qualities of Grover’s search algorithm, which is the representation of the unstructured search algorithms are introduced and summarized, by analyzing its peculiar complexity, completeness, sensitivity to the errors in the mappings, and its advantages and disadvantages. On introducing structure-based search algorithm, the Tad Hogg’s series of search algorithms are referred to. They can be summarized into one universal algorithm framework, which can be separated into two parts, i.e., the problem-independent mapping and phase rotation matrix. This paper places emphasis on analyzing one of the phase adaptation strategies, and interprets how it works and what can make it more efficient. Some other factors affect the algorithm are also discussed more generally. Finally, based on the comparison and analysis of classical search algorithm and the quantum one, the thoughts behind various quantum search algorithms are illustrated.

    • λ-Resolution of the Medium Predicate Logic System

      2003, 14(3):345-349. CSTR:

      Abstract (3846) HTML (0) PDF 517.83 K (5201) Comment (0) Favorites

      Abstract:For medium predicate logic system MF, a new infinite value semantic interpretation that is λ-interpretation is introduced, the λ-resolution method is led into the MF. The λ-resolution principle of MF is discussed and its completeness is proved.

    • Constructing Virtual Domain Ontologies Based on Domain Knowledge Reuse

      2003, 14(3):350-355. CSTR:

      Abstract (5049) HTML (0) PDF 560.94 K (6701) Comment (0) Favorites

      Abstract:A methodology is presented to construct virtual domain ontologies reusing other domain knowledge already available. This methodology uses the semantic relevance of existing domain models and domain ontologies, and proposes the possibility of building ontologies following the view of semantic match. Firstly, a structural definition of domain ontology is given. Secondly, the semantic relevance between domain model and ontologies is discussed and a definition of relevance degree is given. Based on the evolution of population, the domain ontologies constructing technologies in the terminology from genetics such as selection, clone, mutation, crossover, synthesis and transgenic are discussed. Finally, a VDO (virtual domain ontologies) constructing system is introduced, and a case study in the field of some hotels and travel agencies is demonstrated.

    • An Overview Towards the Semantics of XYZ/E Object-Oriented Programs

      2003, 14(3):356-361. CSTR:

      Abstract (4203) HTML (0) PDF 565.87 K (5744) Comment (0) Favorites

      Abstract:The element acted as object in XYZ/E object-oriented program is agent, a module consists of a data package and a process. In this paper, the semantics of XYZ/E object-oriented programs are defined, including their language elements, under the framework of temporal logic. And several theories for proving the semantics consistency between these elements are also provided.

    • A Computation Partition Based on Uniform Partitioning Schemes for Parallel Loops

      2003, 14(3):362-368. CSTR:

      Abstract (3959) HTML (0) PDF 649.68 K (5378) Comment (0) Favorites

      Abstract:Computation partition is one of the most important problems in parallel compilation and optimization. For dealing with parallel loops with determinated data distribution, a computation partition algorithm based on the subset of uniform schemes is proposed. The method of getting the subset of uniform schemes is given, as well as the algorithm of selecting the most optimized scheme under the consideration of communication and load balance. The experimental results prove that this algorithm is simpler and more effective than several previous algorithms in dealing with parallel loops, and the p_HPF compiler adopted by this algorithm can obtain good speedups and efficiencies. The compiler has been applied in the field of petroleum.

    • A Scheduling Protocol for Transactional Workflows Based on Mix-Grained Conflict Detection

      2003, 14(3):369-375. CSTR:

      Abstract (3938) HTML (0) PDF 813.00 K (5084) Comment (0) Favorites

      Abstract:A transactional workflow is composed of traditional flat transactions, and its execution has relaxed transactional atomicity. Due to different termination characteristics of transactions, only one workflow is allowed to execute non-compensatable transactions with current scheduling protocols. In this paper, two granularities of conflict based on transaction classes and transaction instances are defined, and a scheduling protocol by using both granularities of conflict detection is proposed. Besides generating serializable and recoverable schedules, this method provides a higher degree of concurrency in following two ways. On the one hand, the fine-grained locking mechanism based on transaction instances is used to reduce conflict possibility among concurrent workflows. On the other hand, the coarse-grained conflict mechanism based on transaction classes is used to predict future conflict among workflows, multiple workflows are therefore allowed to execute non-compensatable transactions if they will not conflict in predicated future execution.

    • An Integrated Design Method of Task Priority

      2003, 14(3):376-382. CSTR:

      Abstract (4772) HTML (0) PDF 643.32 K (6039) Comment (0) Favorites

      Abstract:A scheduling algorithm based on priority table design is presented in this paper. Any two characteristic parameters (e.g., relative deadline and slack) of a task are combined to design its priority table so that the deadline is nearer or the slack is shorter, the priority is higher. The priority of a task is uniquely determined by its relative deadline and slack. For any task, its unique priority can be obtained by using Lagrange interposing algorithm on the designed priority table. Compared with the classical EDF and LSF policies, simulated results show that the proposed algorithm improves the efficiency of task scheduling, i.e., to designate the priority of a task, increases the succeed ratio of task scheduling, and decreases the missed deadline percentage. The proposed algorithm can be applied to dynamically schedule real-time tasks in real-time systems.

    • An Agent-Oriented Programming Language with Intention Driver

      2003, 14(3):383-391. CSTR:

      Abstract (4594) HTML (0) PDF 715.71 K (5287) Comment (0) Favorites

      Abstract:An agent-oriented programming language with intention driver is proposed, which is called AOPLID. Based on open situation calculus, AOPLID can be regarded as an improvement of GOLOG that is based on situation calculus. AOPLID can formalize some elements of the agent’s mental state, namely belief, intention, capability and strategy. A belief revision operator is introduced in AOPLID to deal with the communication and exogenous events. AOPLID solves the problems GOLOG faces, such as inconvenience of describing the agent’s mental state, lack of communication. The syntax of the AOPLID and its semantic under the OSC are presented. An example program of AOPLID that describes the coffee machine is given too.

    • Research on Development Tools for Pen-Based User Interfaces

      2003, 14(3):392-400. CSTR:

      Abstract (4174) HTML (0) PDF 664.60 K (5389) Comment (0) Favorites

      Abstract:Pen-Based user interfaces provide more natural interactions for users. However, it is difficult to be constructed because a usable pen-based user interface generally involves multiple areas and interdisciplinary knowledge. In this paper, the design and implementation of a toolkit, named Penbuilder, is described systematically, supporting the development of pen-based user interfaces. It is designed based on the attributes of pen interaction and ubiquitous computing. It offers high-level supports to developers. Based on Penbuilder, several typical prototypes of pen interaction have been constructed, which demonstrates the capability of Penbuilder for easy construction and fast-prototyping of pen-based user interfaces.

    • A Matching Model for Software Component Classified in Faceted Scheme

      2003, 14(3):401-408. CSTR:

      Abstract (4089) HTML (0) PDF 785.15 K (5716) Comment (0) Favorites

      Abstract:As the component repositories scaling up and the reuse practice deepening, representing and retrieving software components gains more attention from software engineering researchers. A matching model is proposed in this paper to retrieve reusable components classified in faceted scheme includes three levels and five schemes. A generic matching algorithm is provided and analysis and test are done on its specialized implement and relevant time complexity. The results show that this solution is feasible and effective for the component retrieval.

    • An Event-Triggered Concurrent Dataflow Model

      2003, 14(3):409-414. CSTR:

      Abstract (3901) HTML (0) PDF 575.88 K (5446) Comment (0) Favorites

      Abstract:DHDF (dynamic homogeneous dataflow) is the kernel of most graphic programming platform. For the natural data-driven property, the dynamic homogeneous dataflow can not work properly with the event-driven operating system, which leads to two demerits: one is inefficiency in CPU using, the other is low respond speed and poor in real time performance. An ECDF (event triggered concurrent dataflow) model and its formal description are presented in this paper. Based on multi-thread and event-triggered mechanism, the real time performance and execution efficiency of dataflow-based system are improved. The experimental results of a test system prove that the event-driven concurrent dataflow can ameliorate the performance of dataflow-based system to a certain degree in most conditions comparing with the dynamic homogeneous dataflow model. ECDF model is also suited for the Reactive systems design, and high-speed burst-data flow processing especially.

    • A Technology of Binding Time Analysis for Object-Oriented Programming Languages

      2003, 14(3):415-421. CSTR:

      Abstract (3957) HTML (0) PDF 633.36 K (5139) Comment (0) Favorites

      Abstract:A technology of binding time analysis for implementing partial evaluation of object-oriented programming languages is proposed in this paper. By tracing context-sensitivity of reference variables and pointer variables, the new approach can deal with elements of partly static data structure, such as attributes of each object and elements of each array. The new approach uses a two-level BTA environment to hold BTA states for static variables and local variables. The objects created at different program points are represented by a kind of specific handle. The BTA state of a reference variable is represented by a set of such handles. The algorithm of a forward analysis and backward analysis are presented. They are used to annotate source program, with BTA environment to trace binding time of various kind of variables including identifier of array, object and reference. The binding time analysis has been implemented for Java. It is able to analyse most single thread Java programs and support partial evaluation for Java with higher performance.

    • A Concurrent BDI-Agent Model

      2003, 14(3):422-428. CSTR:

      Abstract (3841) HTML (0) PDF 682.80 K (4987) Comment (0) Favorites

      Abstract:Based on macro-time and micro-time, a BDI-Agent model with branch time tree is defined. In this model, parallel actions in macro-time are interleaving in micro-time. The mental state of Agent is constructed on macro-time, and the semantics of concurrent actions are given in micro-time level. Thus, it can be a proper logic basis for describing multi-Agent cooperation and competition that involve concurrent, and it can advance the work in Agent models developed by Rao & Georgeff, Singh and Werner et al.

    • A Fuzzy Classifier Based on the Constructive Covering Approach in Neural Networks

      2003, 14(3):429-434. CSTR:

      Abstract (4199) HTML (0) PDF 570.61 K (4981) Comment (0) Favorites

      Abstract:A geometrical representation of M-P model is firstly introduced, by which the training problem of neural networks may be transformed into the covering problem of a point set. According to this, the geometrical algorithm of neural network training is analyzed. The algorithm may be used for constructing very complicated classifying boundary, but it has higher time complexity. So a fuzzy classifier based on the combination of the covering approach and fuzzy set theory is proposed. The classifier can improve the speed of training and decrease the number of covering sphere-neighborhoods, i.e., decrease the number of hidden nodes of neural networks. The fuzzy set based approach may also provide multi-choices for pattern recognition problems of large scale. Recognition of 700 handwritten Chinese characters is used to test the performance of the approach and the results are promising.

    • A Text Filtering System Based on Vector Space Model

      2003, 14(3):435-442. CSTR:

      Abstract (4213) HTML (0) PDF 709.21 K (6776) Comment (0) Favorites

      Abstract:Text filtering is the procedure of retrieving documents relevant to the requirements of specific users from a large-scale text data stream. First, the TREC (text retrieval conference) as well as its text filtering track are introduced, which is the most authoritative international evaluation conference on text retrieval, from the aspects of tasks, topics, corpus and evaluation metrics. Then a text filtering system based on vector space model is presented. This system is composed of two phases of training and adaptive filtering. During the training phase, feature selection and pseudo feedback are used to select the initial filtering profiles and thresholds. During the filtering phase, user feedback is utilized to modify the profiles and thresholds adaptively. This system took participate in the 9th Text Retrieval Conference in 2000, and ranked high among all the 15 systems from many countries. Good performance has been achieved, where the average precisions of adaptive and batch filtering are 26.5% and 31.7% respectively.

    • Experimental Study on the Parallel Evolutionary Modeling of System of Ordinary Differential Equations

      2003, 14(3):443-450. CSTR:

      Abstract (3648) HTML (0) PDF 715.60 K (5179) Comment (0) Favorites

      Abstract:A distributed asynchronous parallel evolutionary modeling algorithm for solving the evolutionary modeling problem of system of ordinary differential equations is proposed in this paper. Performed on a simulated parallel environment consisting of 128 Pentium III 500 PCs connected by a 10Mbps Ethernet, large-scale experiments have been done to systematically test the effect of some important parallel control parameters, which include the degree of connectivity between processors, the migration rate and the migration interval of individuals, on the performance of the algorithm. Many new experimental results are achieved as well as some analysis and explanations are given. Especially the best modeling results for the sequential algorithm and the parallel one are compared at the end.

    • A Progressive Transductive Inference Algorithm Based on Support Vector Machine

      2003, 14(3):451-460. CSTR:

      Abstract (5183) HTML (0) PDF 825.70 K (6348) Comment (0) Favorites

      Abstract:Support vector machine is a new learning method developed in recent years based on the foundations of statistical learning theory. It is gaining popularity due to many attractive features and promising empirical performance in the fields of nonlinear and high dimensional pattern recognition. TSVM (transductive support vector machine) takes into account a particular test set and tries to minimize misclassifications of just those particular examples. Compared with traditional inductive support vector machines, TSVM is often more practical and can give results with better performance. In this paper, a progressive transductive support vector machine is devised and the experimental results show that the algorithm is very promising on a mixed training set of a small number of unlabeled examples and a large number of labeled examples.

    • A Dynamic Viseme Model and Parameter Estimation

      2003, 14(3):461-466. CSTR:

      Abstract (3651) HTML (0) PDF 585.29 K (5107) Comment (0) Favorites

      Abstract:Visual information can improve speech perception. But how to synthesis the realistic mouth shape is a complex problem. After studying the rule of lip movement in speaking, a dominance blending dynamic viseme model for visual speech synthesis is proposed in this paper. Furthermore, considering the characteristic of Chinese speech, a systemic learning method is given to learn the model parameters from training data, which is more reliable than desire parameters according to subjective experience. Experimental results show that the dynamic viseme model and learning method are effective.

    • A Sinusoidal Modeling Method Based on Matching-Pursuits with Perceptual Gradient

      2003, 14(3):467-472. CSTR:

      Abstract (3711) HTML (0) PDF 585.52 K (4971) Comment (0) Favorites

      Abstract:As an adaptive algorithm of signal decomposition, matching pursuits provides a new framework for sinusoidal modeling of speech and audio signal. In this paper, the procedure of sinusoidal modeling using matching pursuits is analyzed as well as the sinusoidal modeling algorithm using perceptually weighted matching pursuits. And a method of sinusoidal modeling with perceptual gradient is proposed. The proposed method, which adopts the adaptive feature of matching pursuits, computes dynamically a masking threshold from the currently synthesized signal using the psychoacoustic model. With the threshold, it extracts the most perceptually significant component from the residual signal. Therefore, the perceptual information contained in the synthesized signal increases as quickly as possible. The quality of the synthesized speech by this approach is rather high even if the model precision is low. Experiments prove that the method in this paper uses the features of hearing system in a better way, and the modeling is reasonable and efficient. Both the objective compare of SNR and the subjective listening test show the rationality and superiority of the new method.

    • Agent Organization Commitment and Group Commitment

      2003, 14(3):473-478. CSTR:

      Abstract (3985) HTML (0) PDF 622.96 K (5056) Comment (0) Favorites

      Abstract:As a novel system description and problem solving method, Agent organization can potentially decrease the difficulty of problem solving and reduce the complexity of Agent interactions. Current researches about Agent organization are mostly being undertaken in Agent organization model, organization rules, organization structure, organization formation and evolution, so it is necessary to extend the research to analyze mental states and their relations. In this paper, the mental states of commitments in Agent organization are defined and analyzed including internal commitment, social commitment, group commitment and organization commitment. The semantics and properties of different commitments are given so that the works associated with Agent organization can be advanced.

    • Decision Varied from Entropy to Parametric Distribution

      2003, 14(3):479-483. CSTR:

      Abstract (4255) HTML (0) PDF 557.83 K (5450) Comment (0) Favorites

      Abstract:In order to improve the predictive accuracy of inductive learning, a heavy analysis about the demerit of C4.5 is given, and the reason why there are many debates and compromise between standard method and meta algorithms is pointed out. By the method of estimating the probability distribution of training examples, a new and simple method of decision tree is turned out. Experimental results on UCI data sets show that the proposed method has good performance on accuracy issue and faster computing speed than C4.5 algorithm.

    • An Algorithm Based on Gabor Function for Fingerprint Enhancement and Its Application

      2003, 14(3):484-489. CSTR:

      Abstract (3878) HTML (0) PDF 1012.51 K (5016) Comment (0) Favorites

      Abstract:Fingerprint enhancement is important for improving the accuracy of minutiae extraction, even for the total automated fingerprint identification system (AFIS). A fingerprint enhancement algorithm based on Gabor function and its application is developed in this paper. A method for ridge orientation acquirement is improved and a new method for ridge frequency acquirement is brought out. The formula that Gabor function is used in fingerprint enhancement is presented, and the fingerprint enhancement is implemented using ridge orientation and ridge frequency as parameters. The performance of this method is evaluated with some typical low quality images of Nanjing University fingerprint database. Experimental results indicate that the method has dramatic effect to low quality fingerprint images and false reject rate (FRR) of fingerprint matching can be effectively decreased after enhancement. Speed of the method can fill the demand of on-line AFIS.

    • Handwritten Character Recognition Based on Parallel Feature Combination and Generalized K-L Expansion

      2003, 14(3):490-495. CSTR:

      Abstract (3604) HTML (0) PDF 604.17 K (5684) Comment (0) Favorites

      Abstract:Considering the weaknesses of traditional serial feature fusion technique, a novel parallel features fusion method is proposed in this paper. The main idea of this method can be described as follows. First of all, two sets of feature vectors corresponding to a same sample space are combined together via complex vectors, which are used to construct a complex feature vector space. Then, the classical K-L transform and K-L expansion methods are developed theoretically to suit for feature extraction in the complex feature space. Moreover, the symmetric property of parallel feature fusion is revealed, and, how to combine features effectively is discussed in detail. Finally, the proposed method is used to solve the handwritten character feature extraction and recognition problems. Experiments are performed on NUST603 handwritten Chinese character database built in Nanjing University of Science and Technology as well as the well-known CENPARMI handwritten digit database of Concordia University. The experimental results indicate that the recognition rates are improved significantly after parallel feature fusion, and the proposed parallel features fusion method is superior to the traditional serial feature fusion one.

    • Multicast Protocol over Switch Ethernet

      2003, 14(3):496-502. CSTR:

      Abstract (4328) HTML (0) PDF 634.38 K (6000) Comment (0) Favorites

      Abstract:Many services, including video conference, whiteboard and video broadcasting, have been running over LANs. However, most of LANs, such as Ethernet, treat multicast just as broadcast, and they all have few supports for multicast. In this paper, a multicast protocol in an LAN switch, named IGMP snooping, is implemented based on VLAN and IGMP. IGMP snooping will be applied to the IP multicast stream control on the switch Ethernet. The basic idea, syntax and semantics of this protocol are given in this paper, and the verification and test procedure is also provided.

    • Congestion Control Algorithm in Large-Delay Networks

      2003, 14(3):503-511. CSTR:

      Abstract (4559) HTML (0) PDF 837.10 K (6742) Comment (0) Favorites

      Abstract:AQM (active queue management) can maintain the smaller queuing delay and higher throughput by the purposefully dropping the packets at the intermediate nodes. It is a hotspot in the current researches about TCP end-to-end congestion control. Almost all the existed algorithms neglect the impact on performance caused by large delay. In this study, firstly a fact through simulation experiments is verified, which is the queues controlled by several typical AQM algorithms, including RED, PI controller and REM, the dramatic oscillations in large delay networks are appeared, which decreases the utilization of the bottleneck link and introduces the avoidable delay jitter. After some appropriate model approximation, a robust AQM algorithm applying the principle of internal mode compensation in control theory is designed. The new algorithm restricts the negative impact on the queue stability caused by the large delay. The simulation experimental results show that the integrated performance of the proposed algorithm is obviously superior to that of the existed schemes when the network configuration parameters are large delay and small queue length, and the link utilization increases 3~4 times.

    • Security Evaluation for a Class of Block Ciphers Based on Chaotic Maps

      2003, 14(3):512-517. CSTR:

      Abstract (3934) HTML (0) PDF 535.40 K (4715) Comment (0) Favorites

      Abstract:The security evaluation of a class of block ciphers based on chaotic maps against differential and linear attacks is studied. If the round function is bijective and its maximum differential and linear characteristic probabilities are p and q respectively, the upper bounds of maximum differential and linear characteristic probabilities for r rounds are pr-1and qr-1 respectively.

    • Security Analysis and Improvement of TLS

      2003, 14(3):518-523. CSTR:

      Abstract (3970) HTML (0) PDF 576.80 K (5485) Comment (0) Favorites

      Abstract:The analysis of security about TLS (transport layer security) protocol is proposed in this paper, based on once encipherment, access control and dual certificate. Upon the analysis, extensions are given for message process and content of TLS, the improved protocol is more secure and practical.

    • Research and Implementation of Internet Routing Emulation System

      2003, 14(3):524-530. CSTR:

      Abstract (3742) HTML (0) PDF 628.63 K (5554) Comment (0) Favorites

      Abstract:With the growth of Internet, it becomes a challenging problem to test the running characteristics of routing protocol implementations in realistic large-scale networks. An Internet routing emulation system (IRES) is developed as a test bed to test and analyze the above characteristics. A novel approach by combining Internet topology generation and routing protocol implementation is proposed, and the architecture of IRES is presented. Then the Internet hierarchical topology is analyzed and a method is proposed to transform GT-ITM model to BGP-OSPF oriented Internet topology. In the given examples, by measuring the routing interaction with CISCO2600 router, its computation complexity of the OSPF protocol implementation in the CISCO2600 router is O((lgN)4), and the upper bound it supports is given. The experimental results show that as a test bed, IRES has an important role that cannot be replaced by others.

    • A Multi-Level FIFS Queue Packet Scheduling Algorithm to Provide Delay Guarantee

      2003, 14(3):531-537. CSTR:

      Abstract (3991) HTML (0) PDF 676.97 K (4901) Comment (0) Favorites

      Abstract:Packet scheduling algorithm is an important element to provide quality of service (QoS) guarantee. Traditional per-flow packet scheduling methods are often not able to support good scalability. While, the non-per-flow-differentiated methods usually can not provide service guarantee for very individual flow. DPS (dynamic packet state) provides a method to support guaranteed service without per-flow control. It can provide both the service performance and scalability. But its per-packet scheduling results in high computational complex are related with the number of packets. A packet scheduling algorithm with multi-level FIFS queues, which is based on DPS, is provided in this paper to get guaranteed service. And the constrained conditions to delay guarantee under this algorithm is also provided. The theoretical analysis and simulations show that the algorithm can schedule packets with constant time complexity and the same delay performance as DPS.

    • A Customizable Boot Protocol for Network Computing

      2003, 14(3):538-546. CSTR:

      Abstract (3768) HTML (0) PDF 801.15 K (5293) Comment (0) Favorites

      Abstract:With the development of computer and network technologies and emerging of diverse types of terminal, the ability of network computing to tailor applications to the capabilities of heterogeneous client devices will realize its full potential at last. Most of the existing terminals first start OS locally and then load network-computing software. However, this booting way can’t satisfy the diversity of terminals and the increasing of complexity of network-computing software. A reliable, secure, effective and customizable remote boot protocol named as NCBP (network-based client boot protocol) is presented in this paper, which is hoped to increase the flexibility of existing network computing terminals’ booting process and thus increase the flexibility and availability of network computing. NCBP uses extended DHCP (dynamic host configuration protocol) to acquire local identifier, then loads a batch script language environment of MBatch (MenuBatch) by using secure APTP (active program transfer protocol). When executing the loaded MBatch script, NCBP allows users to select which OS to be loaded and then load the corresponding OS image in a customizable way. NCBP can be used for remote boot of network computers, PCs, and digital appliances.

    • Design and Implementation of a Security Label Common Framework

      2003, 14(3):547-552. CSTR:

      Abstract (4353) HTML (0) PDF 615.69 K (5222) Comment (0) Favorites

      Abstract:Labels are the foundation for implementing multilevel systems and the prerequisite of enforcing mandatory access control in secure systems. How to define and enforce label functions which support multiple security policies is the focus here. A security label common framework (SLCF) based on static object label and dynamic subject label is put forward. SLCF introduces the notation of access history and provides a complete label funtions set. Based on SLCF, both multilevel confidential policy and multilevel integrity policy can be expressed and enforced. SLCF is implemented in a secure operating system based on Linux, the experimental results show that the system based on SLCF is flexible and practicable.

    • On-Demand Branching Multicast

      2003, 14(3):553-561. CSTR:

      Abstract (4240) HTML (0) PDF 719.88 K (4979) Comment (0) Favorites

      Abstract:After analyzing and summarizing the main current research outcomes of IP multicast routing, a multicast routing algorithm called on-demand branching multicast is proposed. On-Demand branching multicast uses a new multicast tree maintenance method, in which the tree is maintained only by partial nodes or key nodes. That is different from the traditional methods in which the tree is maintained by all the nodes on the tree, and so as to save the Internet resources.

    • Variable Structure Controller for ABR Flow Control

      2003, 14(3):562-568. CSTR:

      Abstract (4063) HTML (0) PDF 649.20 K (5154) Comment (0) Favorites

      Abstract:Available bit rate (ABR) flow control is an effective measure in ATM network congestion control and traffic management. In high-speed ATM networks, the switch performance lies on the algorithm simplicity in some degree. Although the simplicity of binary flow control is very attractive, the queue length and allowed cell rate (ACR) controlled by the standard EFCI algorithm oscillate with great amplitude, which must have negative impact on the performance, so its applicability is doubted, and then the explicit rate feedback mechanism, which is relatively complex but effective, is introduced and explored. In this study, based on the ABR flow control model, a novel binary ABR flow control algorithm is put forward using the approach for designing the sliding mode variable structure controller in robust control theory, jointly applying the congestion detection mechanism based on the probability. The new algorithm avoids the self-oscillation induced by the nonlinear component in the standard EFCI algorithm, which is very favorable for utilizing the simplicity of binary flow control mechanism to optimize the switch performance. The simulation results show that the sliding mode variable structure controller greatly constrains the oscillations of ACR and queue, smoothes the delay jitter, which provides the reliable implementation mechanism for QoS guarantee in ATM network.

    • Differential and Linear Cryptanalysis of AC Block Cipher

      2003, 14(3):569-574. CSTR:

      Abstract (4479) HTML (0) PDF 672.60 K (5011) Comment (0) Favorites

      Abstract:The security of AC against differential and linear cryptanalysis is discussed in this paper. It is shown that 12-round AC has no differential characteristic with probability higher than 2-128 and no linear approximations with approximation bias larger than 2-67 by estimating the lower bound of the number of active-boxes in 3-round differential characteristic and 12-round linear approximation. Hence, AC is secure to differential and linear cryptanalysis.

    • A Wavelength Assignment Algorithm of Hypercube Communication on Optical RP(k) Networks

      2003, 14(3):575-581. CSTR:

      Abstract (4113) HTML (0) PDF 684.87 K (5229) Comment (0) Favorites

      Abstract:Routing and channel assignment is a key topic in optical interconnection networks, and it is a primary way to get insight into the capacity of interconnection networks. Based on the optical RP(k) network, the wavelength assignment of realizing the Hypercube communication with N=2n nodes on the optical RP(k) network is discussed. By defining the reverse order of the Hypercube, an algorithm to embed the n-D Hypercube into the RP(k) network is designed, which needs at most max{2,「5.2n-5/3」} wavelengths. An algorithm to embed the n-D hypercube into the ring network is also proposed, with its congestion equal to 「N/3+N/12」. This is a better improvement than the known results, which is equal to 「N/3+N/4」. The two algorithms proposed in this paper are of great value in designing optical networks.

    • A Probability-Based QoS Unicast Routing Algorithm

      2003, 14(3):582-587. CSTR:

      Abstract (3457) HTML (0) PDF 602.04 K (4910) Comment (0) Favorites

      Abstract:The imprecision of network state has to be considered in the QoS routing because of non-negligible propagation delay of state messages, periodic updates due to overhead concern, and hierarchical state aggregation. A probability-based QoS routing algorithm is presented in the paper. The premise-controlled sub-optimal algorithm can find delay-bandwidth constrained least cost route when only imprecise information available. Experimental results demonstrate that the algorithm can shield the imprecision of network state and tolerate the insensitivity of the triggering methods with good routing performance.

    • A Confirmer Signature Scheme Based on DSA and RSA

      2003, 14(3):588-593. CSTR:

      Abstract (4532) HTML (0) PDF 536.09 K (6212) Comment (0) Favorites

      Abstract:A confirmer signature scheme is proposed. This scheme is designed according to Camennisch-Michels?confirmer signature model. It is the first time that the widely used digital signature algorithm DSA and famous public key cryptosystem RSA are being used in confirmer signature scheme, and a new method of zero-knowledge proof for denying protocol is used. This scheme can be used in fair electronic contract signing schemes.

    • A Real-Time Anomaly Detection Model Based on Sampling Measurement in a High-Speed Network

      2003, 14(3):594-599. CSTR:

      Abstract (5040) HTML (0) PDF 547.75 K (5593) Comment (0) Favorites

      Abstract:Real-Time anomaly detection is a highlighted topic of network security research in recent years. Based on statistics character of traffic in a large-scale network, the steady metrics that can estimated network behavior are found and a sampling measurement model is presented in this paper. According to the center limited theory and hypothesis test, a real-time detection model on anomaly behavior of network traffic is built. Finally, the network behavior metrics on the ratio between ICMP request packets and reply packets is defined and the ICMP scan attack in the CERNET network is monitored real timely. Method and idea of this model provide some directed sense for other network security detection research.

    • An Internet Key Exchange Protocol and Its Security Analysis

      2003, 14(3):600-605. CSTR:

      Abstract (4426) HTML (0) PDF 544.68 K (5654) Comment (0) Favorites

      Abstract:The complexity of Internet key exchange protocol causes some potential secure flaws. The possible attacks suffered by IKE protocol based on the in-depth analysis of its operational principle are discussed.

    • Design and Implementation of Test Executor for Concurrent TTCN

      2003, 14(3):606-611. CSTR:

      Abstract (4100) HTML (0) PDF 554.75 K (5161) Comment (0) Favorites

      Abstract:The method of designing a common-used concurrent TTCN test executor is proposed in this paper. When testing an implementation of concurrent protocol, the problem of executing concurrent test cases by FIFO scheduling algorithm is solved and the PTI (packet transmitting interface) part based on the abstract I/O queue theory is proposed. The PTI part offers the test executor the independency on implementations of a given protocol. What’s more, the test executor provides a visual interface to trace the executing of test cases, which makes the locating of faults easier. Banding with corresponding PTI part, the test executor can start a testing. Now it is already in use.

    • Performance Analysis of the Binary Flow Control Algorithm

      2003, 14(3):612-618. CSTR:

      Abstract (4428) HTML (0) PDF 651.34 K (5624) Comment (0) Favorites

      Abstract:ABR (available bit rate) flow control is an effective measure in ATM network congestion control and traffic management. In large scale and high-speed network, the simplicity of the algorithm is crucial to optimize the switch performance. Though the simplicity of binary flow control is very attractive, the queue length and allowed cell rate (ACR) controlled by the standard EFCI algorithm oscillate with great amplitude, which has negative impact on the performance, so its applicability is doubted, and then relatively complex but effective explicit rate feedback algorithms are introduced and explored. In this study, based on the existed flow control model, the performance of standard EFCI algorithm is evaluated and analyzed with the describing function approach in nonlinear control theory, concluding that queue and cell rate self-oscillations are caused by the inappropriate nonlinear control law originated from intuition, but not intrinsic attribute of the binary flow control mechanism. The simulation experimental results are done to validate this analysis and conclusion. Finally, a parameter settings scheme is put forward to optimize the existed EFCI switch.

    • Simulation of 3D Garment Based on Improved Spring-Mass Model

      2003, 14(3):619-627. CSTR:

      Abstract (4495) HTML (0) PDF 1.08 M (7037) Comment (0) Favorites

      Abstract:Some problems still exist in 3D garment modeling and simulation, including that the model is complex, the efficiency is low, and the structural characteristics of garment are ignored. An improved spring-mass model is proposed, by which 2D→3D transformation and simulation of garment are formulated unifiedly. The dynamic system of modeling and simulation is derived and solved using time differentiate method, with given composition and expression of internal and external cloth forces in the formulation. And then the simulation algorithm is described. Overcoming the serious weakness representing cloth properties simply of previous model, the improved mass-spring model considers mechanical properties of cloth such as stretching, shearing and bending. Structural characteristics of garment such as dart and pleat are took into account too, thus complex garment pattern can be modeled and simulated. Compared the efficiency and the effect of simulation with other simulation systems, the resulting simulation system is faster and more realistic. The technique has been used in some garment enterprises and gets well responses.

    • Automatic Simulation Vector Generation Using Interacting FSM Model

      2003, 14(3):628-634. CSTR:

      Abstract (3705) HTML (0) PDF 781.93 K (5560) Comment (0) Favorites

      Abstract:Automatic simulation vectors generation is an efficient method to accelerate digital system’s design verification process. An algorithm that generates coverage metrics and simulation vectors for state-pair of interacting FSM is presented in this paper. Compared with FSM (finite state machines) product method and the method which treats the interacting FSM as a single FSM, this algorithm can generate accurate coverage metrics and the shortest simulation vectors. Experimental results show that this algorithm is efficient in memory usage and perfectly solves the states space exploration problem.

    • Multiple Characters Motion Fusion with Virtual Scene

      2003, 14(3):635-642. CSTR:

      Abstract (3877) HTML (0) PDF 874.96 K (5539) Comment (0) Favorites

      Abstract:In the computer animation based on motion capture, most of the available approaches to edit motion only deal with single character motion, which are mostly planned beforehand. Thus, characters lack the capability of responding to the environments. To improve the characters’ ability to sense and respond to the environment, collaborate with each other, a new concept of motion fusion, which fuses multiple single-character motions captured in the structured environment into one unstructured virtual one, is presented in this paper. Based on the architecture of multi-character motion fusion with virtual scene which covers motion decision, motion collaboration, motion solving and motion execution, the key issues such as motion capture, planning, collaboration and generation of continuous movement and discrete movement are discussed in detail in this paper. The experimental results demonstrate that the presented method can efficiently fuse the motion of characters with virtual scenes. The independent collaboration of animated characters and high reuse enable the application of the presented idea into computer animation and game.

    • Realistic 3D Human Facial Animation

      2003, 14(3):643-650. CSTR:

      Abstract (4469) HTML (0) PDF 1.17 M (6200) Comment (0) Favorites

      Abstract:Construction and animation of realistic human facial models is an important research field in computer graphics. How to simulate the motions of human faces on 3D facial models in real-time to generate realistic facial expressions is still a challenge. In this paper, a technique to simulate the human facial animation realistically in real-time is presented. First of all, the 3D facial model is divided into independent parts named functional regions according to facial motion characteristic. Then the motion of each functional region is simulated by a hybrid method based on weighted Dirichlete free-form deformation (DFFD) and rigid body motion simulation. Intercrossed control points are designed to simulate motion affection between different functional regions. The animation of facial models is driven through control points. In order to drive the animation of facial models more efficiently, two high-level methods are proposed, one is based on FAP (facial animation parameters) stream of MPEG-4 standard, and the other is based on muscle model. With these methods, highly realistic facial animation can be achieved in an efficient way.

    • A Controllable Fractal Generation Method Based on FBM Constraint Model

      2003, 14(3):651-659. CSTR:

      Abstract (3827) HTML (0) PDF 1.37 M (5107) Comment (0) Favorites

      Abstract:A controllable fractal generation method is put forward based on FBM constraint model. According to the probability distribution of local deformation energy, the FBM constraint model is set up to keep the statistic self-similarity in detail and the controllability in macrostructure at the same time. And the constraint coefficient of the model can be calculated with the threshold estimation. The regional buffering control and regional harmonic control further enrich the control ways during the fractal generation. The controllable fractal generation examples prove the feasibility, validity and the practicality in nature simulation and engineering visualization.

    • A Complex Surface Adaptive Segment and Development Algorithm Based on Its Quasi-Rulings

      2003, 14(3):660-665. CSTR:

      Abstract (3774) HTML (0) PDF 651.27 K (5092) Comment (0) Favorites

      Abstract:Using an adaptive segment technique, a topological complex 3D surface can be developed into its corresponding 2D pattern. Firstly, triangular facet model is used to present a complex surface, and its quasi-rulings are computed. Secondly, the 3D surface is adaptively segmented based on its quasi-ruling. Finally, each segment is flatted into 2D pattern. This development algorithm can be directly used to computer aided design or texture mapping. It can be also applied to post-process in practical industrial modeling.

    • General Mandelbrot Sets from the Complex Mapping (z)-a+c(a≥2) and Its Symmetrical Period-Checking Algorithm

      2003, 14(3):666-674. CSTR:

      Abstract (4288) HTML (0) PDF 787.46 K (5020) Comment (0) Favorites

      Abstract:The general Mandelbrot sets from the non-analytical complex mapping ()czz+← for 2≥α are studied in this paper. The M-sets’ properties of different parameter α are theoretically analyzed and proved. The parameter equation of the fixed point region’s boundary when α is a positive integer are strictly given. A symmetrical period-checking algorithm, which colors M-sets according to the period of each point in the complex C-plane, is put forward for the first time. The new algorithm takes full advantage of the M-sets’ property during the rendering process and can greatly reduce the number of iterations in calculating the period of all pixel points in the drawing region. The experimental results show that both high quality and high drawing speed of the M-sets’ fractal image can be acquired with the new algorithm. Furthermore, the new algorithm can be generalized to the drawing of other Mandelbrot sets and Julia sets.

    • A Hierarchical Retrieval Method for MPEG Video

      2003, 14(3):675-681. CSTR:

      Abstract (3908) HTML (0) PDF 1009.22 K (5114) Comment (0) Favorites

      Abstract:Video retrieval is a current hot research area. Most of the past algorithms are done in pixel domain, which need many decode calculations. What is more, the same matching algorithm is used to all the video clips in the same way, which wasts many unnecessary calculations. A new hierarchical retrieval method based on example video for MPEG video is proposed: firstly the dct_dc_size field in I frames is used to locate the suspected videos quickly, then the retrieval result scope can be further reduced by analyzing the spatiotemporal distribution of motion vector in B frames using tomography method, at last DC images precise matching analysis is used to validate the retrieval result. The experimental results show that this method needs a few calculations and has higher precision ratio.

    • A Linear Method for the PnP Problem

      2003, 14(3):682-688. CSTR:

      Abstract (4600) HTML (0) PDF 602.72 K (7313) Comment (0) Favorites

      Abstract:The classical PnP problem (3≤n≤5) is inherently non-linear and generally of multiple solutions and sensitive to errors associated with image points. In the classical PnP problem, only a single image is involved. Inspired by the problems in robot navigation, the PnP problem is extended to the two-image case where the camera undergoes a pure translation between the two images. The obtained main results are: given two images of n known control points captured by a translating camera, (1) When n=3, the camera’s pose and two scaling parameters of the two image axes can be linearly determined; (2) When n≥4, the camera’s pose and all its 5 intrinsic parameters can be linearly determined. In other words, the PnP problem with an uncalibrated camera can be linearly solved in this case. The results presented in this paper appears instructive from both theoretical and practical points of view.

    • A Close-to-Optimal Image Restoration Technique Based on Regularization Method

      2003, 14(3):689-696. CSTR:

      Abstract (4310) HTML (0) PDF 949.53 K (5973) Comment (0) Favorites

      Abstract:A technique based on regularization method and restores image to close-to-optimal is proposed in this paper. The less the energy of the regularized residue, the better the image restoration. Based on this idea, wavelet transform is employed to choose regularization operator qualitatively, and stochastic theory is used to calculate the expectation of the energy, by minimizing the expectation to determine regularization parameter. Qualitative analysis concludes that the regularization operator should be low-stop and high-pass, and the experimental results show that the performances of this method are better than the traditional methods and yields steadily close-to-optimal restoration.

    • An Extended Multi-Valued Exponential Bi-Directional Associative Memory Model and Its Application

      2003, 14(3):697-702. CSTR:

      Abstract (4176) HTML (0) PDF 1.18 M (5525) Comment (0) Favorites

      Abstract:An extended multi-valued exponential bi-directional associative memory (EMV-eBAM) model is presented in this paper based on Wang’s MV-eBAM model, which is a special case of EMV-eBAM (extended MV-eBAM). EMV-eBAM has higher storage capacity and stronger error-correcting capability. Using these performances in image compression, a novel image compression algorithm based on EMV-eBAM is proposed. In noise-free situations, this algorithm can acquire similar performances compared with vector quantization algorithm (VQ). However, in noisy context, this algorithm possesses strong noise-restraining capability. The experimental results show that while VQ amplified 5% random noises appended in the image, this algorithm can hold back nearly all noises and acquire similar performances as in noise-free context. Furthermore, in transmitting there may be some errors in the channel, in this situation, this algorithm has much better error-correcting capability than the result by using the cyclic encoding method, so this algorithm is a robust image compression algorithm.

    • A Linear Approach for Determining Intrinsic Parameters and Pose of Cameras from Rectangles

      2003, 14(3):703-712. CSTR:

      Abstract (4331) HTML (0) PDF 684.06 K (5262) Comment (0) Favorites

      Abstract:In this paper, a linear approach is proposed to determine the camera’s intrinsic parameters as well as its pose. At first, the images of the two circular points are derived from the images of two unparallel coplanar rectangles in space, then some linear constraints on the intrinsic parameters are established via the obtained images of the circular points. In addition, the necessary and sufficient condition of the constraint system for a unique solution is also provided. Having obtained intrinsic parameters, the camera’s pose can be computed from the homography between the image plane and the space plane. Besides, a linear approach is also presented to retrieve the metric information (i.e., the Euclidean one up to a scale) of the rectangles by means of the Laguerre theorem. The main advantage of these approaches lie in that neither the metric information of the rectangles nor the correspondences between images are required, and the involved algorithms are all linear. Extensive simulations and experimental results with real images show that these proposed approaches are both accurate and robust.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063