Volume 18,Issue 11,2007 Table of Contents

  • Display Type:
  • Text List
  • Abstract List
  • 1  Research on Traffic Matrix Estimation
    ZHOU Jing-Jing YANG Jia-Hai YANG Yang ZHANG Hui
    2007, 18(11):2669-2682.
    [Abstract](8450) [HTML](0) [PDF 951.00 K](9004)
    Abstract:
    The traffic matrix is one of the crucial inputs in many network planning and traffic engineering tasks,it is agreed that accurate traffic matrices are crucial,but it is usually impossible to directly measure traffic matrices. So,it is an important research topic to infer traffic matrix by reasonably modeling,and incorporating the measurement data of limited links,as well as other prior information.This paper presents the basic concept of traffic matrix and its estimation mechanism,categorizes and analyzes more than twenty different approaches to traffic matrix estimation problem proposed recently,and summarizes current research achievements on traffic matrix estimation problem.This paper also discusses the performance and estimation errors of current approaches. Finally,future research directions and potential applications of these researches are identified.
    2  Parallel Algorithms for Reversal Distance of Permutations on PRAM and LARPBS
    SHEN Yi-Fei CHEN Guo-Liang ZHANG Qiang-Feng
    2007, 18(11):2683-2690.
    [Abstract](3869) [HTML](0) [PDF 575.67 K](5008)
    Abstract:
    This paper presents two parallel algorithms to compute reversal distance of two signed permutations on different models. These two algorithms are based on Hannenhalli and Pevzner's theory and composed of three key steps: Construct break point graph, compute the number of cycles in break point graph and compute the number of hurdles in break point graph. The first algorithm runs in O(log2n) time using O(n2) processors in SIMD-CREW model. The second one can solve the problem in O(logn) bus cycles by using O(n3) processors on the linear array with a reconfigurable pipelined bus system (LARPBS).
    3  Probabilistic Model for Covering Algorithm
    ZHANG Ling WU Tao ZHOU Ying ZHANG Yan-Ping
    2007, 18(11):2691-2699.
    [Abstract](4820) [HTML](0) [PDF 695.51 K](6323)
    Abstract:
    It is necessary to bring global optimization in covering algorithm to improve its precision of classification.So a probabilistic model of covering algorithm is put forward in this paper.Firstly,the covering algorithm is ameliorated to kernel covering model(Gaussian function is the kernel function),then a kind of finite mixture probabilistic model for kernel covering model is introduced according to the probabilistic meaning of Gaussian function.Finally,the global optimization calculation is inducted based on maximum likelihood theory and Expectation Maximization Algorithm.Therefore,the algorithm optimizes the covering network broadens the application domain of covering algorithm and improves its robustness.The experimental results show that the optimized probabilistic model of covering algorithm can improve the accuracy of classification.
    4  An Immune Clonal Algorithm for Dynamic Multi-Objective Optimization
    SHANG Rong-Hua JIAO Li-Cheng GONG Mao-Guo MA Wen-Ping
    2007, 18(11):2700-2711.
    [Abstract](4994) [HTML](0) [PDF 1.06 M](6027)
    Abstract:
    The difficulty of Dynamic Multi-Objective Optimization(DMO)problem lies in either the objective function and constraint or the associated problem parameters variation with time.In this paper,based on the immune clonal theory,a new DMO algorithm termed as Immune Clonal Algorithm for DMO(ICADMO)is proposed.In the algorithm,the entire cloning is adopted and the clonal selection based on the Pareto-dominance is adopted.The individuals in the antibody population are divided into two parts:Dominated ones and non-dominated ones,and the non-dominated ones are selected.Three operators are introduced into ICADMO,which guarantees the diversity,the uniformity and the convergence of the obtained solutions.ICADMO is tested on four DMO test problems and compared with the Direction-Based Method(DBM),and much better performance in both the convergence and diversity of the obtained solutions is observed.
    5  Optimal Solutions Based on Sustentation Degree for Problems of Generalized Modus Ponens
    LI Jun WANG Guo-Jun
    2007, 18(11):2712-2718.
    [Abstract](4106) [HTML](0) [PDF 534.21 K](4983)
    Abstract:
    In order to put fuzzy reasoning into the framework of logic and lays a solid logical foundation for fuzzy reasoning both syntactically and semantically,this paper transforms FMP(fuzzy modus ponens)into GMP (generalized modus ponens)by formalizing fuzzy reasoning and transplanting it into the classical propositional logic.Base on the concept of truth degrees of formulas,the sustentation degrees between formulas are put forward and a new kind of optimal solving mechanism is established for GMP and CGMP(collective generalized modus ponens).Existence theorems of optimal solutions are proved both for GMP and CGMP,and it is pointed out that there exists a completely similar reasoning mechanism between the classical propositional logic and the fuzzy logic. The graded method presented in this paper makes the algorithmic realization of solution procedure possible and serves as a guideline for the graded reasoning about knowledge.
    6  Simplified Support Vector Machine Based on Reduced Vector Set Method
    ZENG Zhi-Qiang GAO Ji
    2007, 18(11):2719-2727.
    [Abstract](4464) [HTML](0) [PDF 615.63 K](5491)
    Abstract:
    Existing works of reduced support vector set method find the reduced set vectors based on solving an unconstrained optimization problem with multivariables,which may suffer from numerical instability or get trapped in a local minimum.In this paper,a reduced set method relying on kernel-based clustering is presented to simplify SVM(support vector machine)solution.The method firstly organizes support vectors in clusters in feature space, and then,it finds the pre-images of the cluster centroids in feature space to construct a reduced vector set.This approach is conceptually simpler,involves only linear algebra and overcomes the difficulties existing in the former reduced set methods.Experimental results on real data sets indicate that the proposed method is effective in simplifying SVM solution while preserving machine's generalization performance.
    7  A Preference Logic Based on Various Kinds of Preferences
    ZHANG Zhi-Zheng XING Han-Cheng WANG Zhen-Zhen NI Qing-Jian
    2007, 18(11):2728-2739.
    [Abstract](5211) [HTML](0) [PDF 786.66 K](5227)
    Abstract:
    Presently,a whole logic system is still absent to represent and reason various kinds of preferences.In this paper,a preference logic MPL(logic of many kinds of preference)is introduced to supply the gap.In addition, recurring to the minimal/maximal specificity principle,a non-monotonic semantics of MPL's language LMPL is defined,and the application and capability of MPL are initially investigated by rewriting preferences expressed by ranked knowledge based into LMPL.Moreover,the conclusion and the prospective are presented in the end.
    8  Particle Swarm Optimization Based on Adaptive Diffusion and Hybrid Mutation
    Lü Yan-Ping LI Shao-Zi CHEN Shui-Li GUO Wen-Zhong ZHOU Chang-Le
    2007, 18(11):2740-2751.
    [Abstract](5026) [HTML](0) [PDF 898.77 K](6015)
    Abstract:
    Conventional algorithms of particle swarm optimization(PSO)are often trapped in local optima in global optimization.In this paper,following an analysis of the main causes of the premature convergence,it proposes a novel PSO algorithm,which is called InformPSO,based on the principles of adaptive diffusion and hybrid mutation.Inspired by the physics of information diffusion,a function is designed to achieve a better particle diversity,by both taking into account their distribution and the number of evolutionary generations and adjusting their"social cognitive"abilities.Based on genetic self-organization and chaos evolution,clonal selection is built into InformPSO to implement the local evolution of the best particle candidate,gBest,and make use of a Logistic sequence to control the random drift of gBest.These techniques greatly contribute to breaking away from local optima.The global convergence of the algorithm is proved using the theorem of Markov chain.Experiments on optimization of unimodal and multimodal benchmark functions show that,comparing with some other PSO variants, InformPSO converges faster,results in better optima,is more robust,and prevents more effectively the premature convergence.
    9  Mining of Multi-Relational Association Rules
    HE Jun LIU Hong-Yan DU Xiao-Yong
    2007, 18(11):2752-2765.
    [Abstract](8403) [HTML](0) [PDF 879.97 K](11297)
    Abstract:
    Association rule mining is one of the most important and basic technique in data mining,which has been studied extensively and has a wide range of applications.However,as traditional data mining algorithms usually only focus on analyzing data organized in single table,applying these algorithms in multi-relational data environment will result in many problems.This paper summarizes these problems,proposes a framework for the mining of multi-relational association rule,and gives a definition of the mining task.After classifying the existing work into two categories,it describes the main techniques used in several typical algorithms,and it also makes comparison and analysis among them.Finally,it points out some issues unsolved and some future further research work in this area.
    10  DNA Sequence Data Mining Technique
    ZHU Yang-Yong XIONG Yun
    2007, 18(11):2766-2781.
    [Abstract](9259) [HTML](0) [PDF 849.06 K](14747)
    Abstract:
    DNA sequence is one of the basic and important data among biological data.Researching DNA sequence data and then comprehending life essential is a necessary task in post-genomie era.At present,data mining technique is one of the most efficient data analysis means,which finds out information hidden in data.It has also become main data analysis technique adopted in Bioinformatics.It has been applied in DNA sequence analysis, which has got wide attention and rapid development.And considerable research achievements have emerged. Provides an overview of research progress in DNA sequence data mining field.In more detail,it proposes three research phases including statistics-based data mining methods application,general data mining methods application,and specialized DNA sequence-oriented data mining methods design,and then elaborates that sequence similarity is foundation of DNA sequence data mining technique.It also analyzes and comments some key techniques in this field by combining with biological background,such as DNA sequential pattern,association, clustering,classification and outlier mining.Finally,future work and open issues are given,including the research of a novel storage model and index methods,the design of data mining algorithm based on biological domain knowledge.
    11  Knowledge Hiding in Database
    GUO Yu-Hong TONG Yun-Hai TANG Shi-Wei YANG Dong-Qing
    2007, 18(11):2782-2799.
    [Abstract](8578) [HTML](0) [PDF 1.09 M](8632)
    Abstract:
    Motivated by the multiple requirements of data sharing,privacy preserving and knowledge discovery, privacy preserving data mining(PPDM)has become the research hotspot in data mining and information security fields.Two main problem are addressed in PPDM:One is the protection of sensitive raw data;the other is the protection of sensitive knowledge contained in the data,which is also called knowledge hiding in database(KHD). This paper gives a survey on the current KHD techniques.It first introduces the background in which KHD appears. Then it mainly presents the techniques on sensitive association rule hiding and classification rule hiding.Evaluation of KHD methods is discussed after that.Finally,it points out three future research directions of KHD:Design of measure function based on target distance in data modification techniques,inverse frequent set mining in data reconstruction techniques and design of general KHD method based on data sampling.
    12  Performance Analysis of a Buffered Crossbar Switch
    SUN Shu-Tao HE Si-Min ZHENG Yan-Feng GAO Wen
    2007, 18(11):2800-2809.
    [Abstract](3758) [HTML](0) [PDF 631.24 K](4889)
    Abstract:
    This paper analyzes the performance of a buffered crossbar switch under bursty traffic.It derives the saturated throughput for a buffered crossbar switch with multiple queues at each input port by the proposed analytic model.The saturation throughput sharply decreases from 1 and converges to 0.5 with the increasing of average burst length,and it approaches 1 as the number of queues per input increases.The accuracy of the theoretic analysis is also investigated by extensive simulation.Results from this paper can be used as a guidance to design optimal buffered crossbar switches.
    13  Distributed Quantitative QoS Control Based on Control Theory in Web Cluster
    WANG Xiao-Chuan JIN Shi-Yao XIA Ming-Bo
    2007, 18(11):2810-2818.
    [Abstract](4428) [HTML](0) [PDF 627.63 K](5260)
    Abstract:
    This paper proposes a quantitative QoS control mechanism for Web cluster based on control theory.It's featured with distributed control,effective and flexible systematical design,good extensibility,high availability and deployment convenience.Implementation and experiments validate the feasibility and effectiveness of the proposal.
    14  Optimization of Overlay Topology for Unstructured Peer-to-Peer
    FENG Guo-Fu ZHANG Jin-Cheng JIANG Yu-Quan GU Qing LU Sang-Lu CHEN Dao-Xu
    2007, 18(11):2819-2829.
    [Abstract](4048) [HTML](0) [PDF 694.73 K](5575)
    Abstract:
    This paper addresses the issue that what is the optimal topology for the purely distributed peer-to-peer (P2P).It is usually assumed that unstructured network will form a Power-Law topology.However,a Power-Law structure is not always the best for all the applications.In this paper,the influence of the overlay topology on P2P search is firstly investigated and the precise relation among the distribution of the degree,the query rate and the success rate is attained.Then an optimal distribution model of degrees in terms of the popularity of data items is proposed to guide the overlay construction.Finally,the experimental results show that the proposed topology is effective to improve the success rate for the Random Walks.The fundamental result is significant for the optimal overlay structure and offers a new understanding of the replica deployment in unstructured P2P.
    15  An IP Traceback Technique Based on Router's Vector-Edge-Sampling
    WEI Jun LIAN Yi-Feng DAI Ying-Xia LI Wen BAO Xu-Hua
    2007, 18(11):2830-2840.
    [Abstract](4039) [HTML](0) [PDF 856.92 K](6131)
    Abstract:
    A new edge sampling approach called the'Router's Vector-Edge-Sampling(RVES)'is presented,which is simple for PPM(probability packet marking)to be implemented and deployed.In the graph model,vertexes are denoted by network interfaces instead of routers,while edges by vector edges instead of traditional ones.With better simplicity of implementation and flexibility of policy deployment,RVES features effectiveness for Distributed Denial-of-Service(DDoS)attack reconstruction.PPM technologies based on traditional edge sampling are still applicable.Prototypes have been deployed in the Internet and experiments prove the effectiveness and feasibility of RVES.
    16  A Control Flow Based Program Behavior Extended Model
    LU Wei ZENG Qing-Kai
    2007, 18(11):2841-2850.
    [Abstract](4046) [HTML](0) [PDF 635.08 K](5201)
    Abstract:
    This paper presents a control-flow-based program behavior extended model EMPDA(extended model based on push down automaton)by adding invariance constraints to control flow model,which can describe some invariance properties while a program is running safely,and enhance the ability of intrusion detection.By distinguishing the importance of system calls according to practical applications,this paper divides the program behavior model into core model and secondary model to reduce the workload of the model and improve the learning efficiency.Experimental results show that the extended model has better performances in many aspects,such as coverage speed,false positive rate and the capability of intrusion detection.
    17  An Efficient P2P Routing Algorithm Supporting Multi-Dimensional Resource Description
    SONG Wei LI Rui-Xuan LU Zheng-Ding YU Guang-Can
    2007, 18(11):2851-2862.
    [Abstract](4099) [HTML](0) [PDF 757.07 K](5624)
    Abstract:
    Analyzing the existing P2P(peer to peer)routing algorithms,Flabellate Addressable Network(FAN) routing algorithm,an efficient second-moment-based resource routing algorithm supporting multi-dimensional resource description is proposed.Peers are mapped into a multi-dimensional Cartesian space with FAN routing algorithm that manages the subspaces and searches resources based on the peers'second-moment.The routing efficiency of FAN algorithm is up to O(log(N/k)).When a peer joins and leaves the FAN network,the cost for updating routing messages is O(klog(N/k)).The experimental results show that FAN routing algorithm has advantages of high efficiency of routing and low cost of network maintenance,and is an efficient structured P2P resource routing algorithm supporting multi-dimensional resource description.Some improved routing algorithms based on CAN(content-addressable network)can also be implemented in FAN network,and they can obtain better routing efficiency and lower maintenance cost.
    18  An Adaptive Video Watermarking Scheme Based on the Middle-Frequency Energy Relationship Between Adjacent Frames
    YANG Lie-Sen GUO Zong-Ming
    2007, 18(11):2863-2870.
    [Abstract](4126) [HTML](0) [PDF 591.39 K](4923)
    Abstract:
    The approximate invariance of the middle frequencies energy relationship between video adjacent frames under photometric distortion and spatial desynchronization is discovered by analysis.Based on this approximate invariance,a new robust video watermarking scheme is proposed.It can adjust embedding strength adaptively according to human visual system features.Experimental results show that the proposed scheme is resilient to photometric distortion,spatial desynchronization and combined distortion effectively.
    19  Universally Composable Security Concurrent Deniable Authentication Based on Witness Indistinguishable
    FENG Tao MA Jian-Feng
    2007, 18(11):2871-2881.
    [Abstract](4391) [HTML](0) [PDF 813.58 K](5932)
    Abstract:
    A new approach and an idea for exploration are presented to the concurrent deniable authentication based on witness-indistinguishable(WI)within the framework of universally composable(UC)security.A definition of an ideal functionality for deniable authentication is formulated.A new deniable authentication protocol is proposed based on two primitives of the verifiably smooth projective Hashing(VSPH)and non-committing encryptions(NCE).This new approach is practically relevant to VSPH based on the Decisional Diffie-Hellman (DDH)assumption and NCE based on the decisional composite residuosity(DCR)assumption.Compared with a timing constraint and public directory model,simulation of the concurrent protocols is not needed to restrict an adversary capability in a common reference string(CRS)model.The protocols are forward deniable and UC security against adaptive adversaries.Unlike previous proposals with the CCA2 public-key cryptosystem or multi-trapdoor commitments paradigm,the new paradigm leads to more efficient protocols.
    20  Reliable Visual Transmission Method Combining Source Statistics and Network Congestion Control
    XIAO Song WU Cheng-Ke ZHOU You-Xi DU Jian-Chao
    2007, 18(11):2882-2892.
    [Abstract](3743) [HTML](0) [PDF 914.33 K](5248)
    Abstract:
    An algorithm combining source statistics and network congestion control for robust video transmission over wireless network is proposed in this paper. Based on scene modeling and characteristic analyzing, all layers generated by scalable coding are classified into several types and two queuing are made respectively according to their contribution to network congestion and to the quality of reconstructed video. Then the source rate, unequal error protection level and congestion control strategy are dynamically adjusted according to different network status in which the packet loss is caused by network congestion or by unreliable transmission in wireless channel. The simulation results show that the proposed method can achieve better results than MPEG-4 video source coding with fixed rate Turbo coding and than the one which dynamically adjusting source coding and channel coding rates and using network congestion control method of selectively dropping I, B or P packets.
    21  Related-Key Impossible Differential Attacks on Reduced-Round AES-256
    ZHANG Wen-Tao WU Wen-Ling ZHANG Lei
    2007, 18(11):2893-2901.
    [Abstract](4118) [HTML](0) [PDF 547.38 K](5039)
    Abstract:
    In this paper,the strength of AES-256 against the related-key impossible differential attack is examined. Firstly,a carefully chosen relation between the related keys is presented,which can be extended to 8-round(even more rounds)subkey differences.Then,a 5.5-round related-key impossible differential is constructed.Finally,an attack on 7-round AES-256 and four attacks on 8-round AES-256 are presented.
    22  A Method of 3D Model Retrieval by the Spatial Distributions of Components
    WAN Li-Li ZHAO Qin-Ping HAO Ai-Min
    2007, 18(11):2902-2913.
    [Abstract](4362) [HTML](0) [PDF 905.90 K](5742)
    Abstract:
    3D shape analysis is a key problem for 3D model retrieval.In this paper,a shape signature describing the spatial distributions of 3D model's components is proposed.The primary motivation of the approach is to emphasize the object's structural attributes due to human vision theories.Firstly,a model is decomposed into several meaningful components,each of which is represented by a sub-mesh,then the component's mass center and percentage of the surface area are combined to form a component feature,and finally a set of component features satisfing the specified conditions are used as the shape signature ofa 3D model.Based the signature,an approach of 3D model retrieval is presented.It performs well despite the presence of different resolutions and connectivity,and is fast when measuring shape similarity.Experimental results demonstrate the ability of the proposed signature to retrieval 3D modes.
    23  Bézier Approximation of PDE Surface
    XU Gang WANG Guo-Zhao
    2007, 18(11):2914-2920.
    [Abstract](4316) [HTML](0) [PDF 803.33 K](4797)
    Abstract:
    In order to exchange data between PDE(partial differential equation)modeling technique and the conventional CAD(computer aided design)systems,this paper presents a novel algorithm for approximating PDE surface by tensor product Bézier surface based on constrained optimization.The algorithm is also improved by the subdivision property of tensor product Bézier surface.The computational examples and the results of error analysis demonstrate the validity of the algorithm.
    24  Real-Time Garment Simulation Based on Geometrically Approximating Character with Colliding Objects
    SUN Shou-Qian XU Ai-Guo HUANG Qi WANG Xin
    2007, 18(11):2921-2931.
    [Abstract](4892) [HTML](0) [PDF 847.66 K](5493)
    Abstract:
    This paper proposes a method for quickly handling collision between character and garment in 3D garment simulation that aims to use in interactive real-time simulation environment.During the pre-processing stage, geometric shape of the character model is approximated with several simple colliding objects,which involve spheres and simplified convex hulls according to skinning animation technique.During the real-time simulation stage,these colliding objects driven by skeleton replace character meshes for fulfilling collision handle with cloth pieces.Moreover,in order to quickly compute collision response information,the space locality of intersection test is exploited by introducing external map mechanism.Experimental results demonstrate that the method can effectively avoid penetrations between cloth piece and character model,and significantly reduce the computational cost of collision handle.The real-time system,even with complicated garment mesh,still keeps a high simulation frame rate.
    25  A Color Image Representation Method Based on Non-Symmetry and Anti-Packing Model
    ZHENG Yun-Ping CHEN Chuan-Bo
    2007, 18(11):2932-2941.
    [Abstract](4265) [HTML](0) [PDF 962.40 K](5736)
    Abstract:
    With the concept of the packing problem,this paper presents a color image representation method based on the non-symmetry and anti-packing pattern representation model(NAM).By describing the NAM and the method of the binary-bit plane decomposition(BPD)for the color image,a novel NAM-based representation algorithm for the color image is proposed.Also,the total data amount of the algorithm is analyzed.The theoretical and experimental results presented in this paper show that the NAM-based representation method can reduce the data storage much more effectively than the hierarchical structural linear quadtree-based representation method and is a better method to represent the color image pattern.The method is a new research area with respect to the color pattern representation and is valuable for the theoretical research and potential practical values such as decreasing the storage room,increasing the transmission speed,quickening the process procedure,matching pattern,and so on.
    26  P2P Video-on-Demand Content Distribution Schemes
    ZHENG Chang-Yi WANG Xin ZHAO Jin XUE Xiang-Yang
    2007, 18(11):2942-2954.
    [Abstract](8477) [HTML](0) [PDF 922.41 K](10363)
    Abstract:
    Video-on-Demand,which is an important application in peer-to-peer(P2P)networks,has attracted a lot of research interests recently.As P2P network is easy to deploy and can provide a large-scale substrate networks, many P2P VoD content distribution schemes have emerged to offer the basic function of data transportation.This paper presents a survey on the state-of-the-art P2P VoD content distribution schemes.It first summarizes the key issues in designing P2P VoD schemes and then categorizes these schemes into four groups according to data transportation method.Finally,it discusses the application-level performance and outlines possible future work.
    27  Screen Calibration Techniques for Multi-Projector Tiled Display Wall
    WANG Xiu-Hui HUA Wei LIN Hai BAO Hu-Jun
    2007, 18(11):2955-2964.
    [Abstract](4676) [HTML](0) [PDF 720.26 K](6287)
    Abstract:
    Multi-Projector tiled display wall is thought to be an effective technique to tackle the conflict between the increasing demands for super-resolution display and the resolution limitations of a single display equipment,but currently there lack of normal forms and normalized methods to support screen calibration with a high precision and high reliability.This paper tries to solve this problem with a new color calibration scheme.The main problems in screen calibration and the existing solutions are introduced first.Then the screen calibration process and geometry calibration methods are listed.After that,evaluation criterions for screen calibration are discussed,and a generalized color model for projectors color calibration and a visual seamlessness algorithm are presented in detail. Only employing a digital camera,the new scheme can build tiled display walls with high-precision visual seamlessness,which results in higher construction efficiency and lower maintenance cost.The methods have been verified and applied in a variety of tiled display wall,and have shown great theoretical and practical significance for building and maintain tiled display walls.

    Current Issue


    Volume , No.

    Table of Contents

    Archive

    Volume

    Issue

    联系方式
    • 《Journal of Software 》
    • 主办单位:Institute of Software, CAS, China
    • 邮编:100190
    • 电话:010-62562563
    • 电子邮箱:jos@iscas.ac.cn
    • 网址:https://www.jos.org.cn
    • 刊号:ISSN 1000-9825
    •           CN 11-2560/TP
    • 国内定价:70元
    You are the firstVisitors
    Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
    Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
    Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
    Technical Support:Beijing Qinyun Technology Development Co., Ltd.

    Beijing Public Network Security No. 11040202500063