1998 Vol. 24, No. 4

Display Method:
Inductive Inference and Inductive Process
Li Wei
1998, 24(4): 373-381.
Abstract:
This paper analyzes the difference between inductive inference and deductive inference, presents a formal logic framework for inductive inference, and defines the concepts of reconstruction and inductive sequence. In addition, it gives an inductive procedure to generate inductive sequences. It prove...
Knowledge-Base Refinement Mechanism towards Machine Translation
Guo Honglei, Li Wei
1998, 24(4): 382-385.
Abstract:
Some principles to refine knowledge base are proposed. A knowledge-base (KB) refinement mechanism towards machine translation is provided,in which, the importance of errors serve as the refining indicators and the most serious errors are solved first, and the effectiveness and acceptance of KB refin...
Fractal Image Compression on Wavelet Domain
Li Bo, Lei Zhenyu
1998, 24(4): 386-390.
Abstract:
After analyzing the cause for generating tiling effect, an objective measure for calculating tiling effect is defined. In order to eliminate tiling effect, an original image is first transformed into wavelet domain, on which fractal compression and arithmetic coding are performed. This method inheri...
Confidential Theory of Inheritance in Nonmonotonic Semantic Network
Ma Dianfu
1998, 24(4): 391-394.
Abstract:
The confidential theory describes a new approach to inheritance reasoning in nonmonotonic semantic network allowing for multiple inheritance with exceptions. The approach leads to an analysis of defeasible inheritance that is well-defined and intuitively attractive. It yields unambiguous results app...
Implementation of an Analogical Reasoning Coprocessor
Shen Xukun, Zhao Qinping
1998, 24(4): 395-398.
Abstract:
Analogical reasoning technique is significant to the development of AI(Artificial Intelligence) systems . Computing systems based on conventional architecture are very inefficient in doing analogical reasoning,which obstructs the research and application of analogical reasoning. To solve this proble...
Research and Implementation of Data Warehouse and Data Mining in Decision Support Systems
Wang Bingqing, Huai Jinpeng
1998, 24(4): 399-402.
Abstract:
DSS (Decision Support System) is to support decision makers and improve the decision-making process,which is much promising in CIMS,virtual enterprise,medical diagnosis and so on.Some techniques related to DSS are introduced,such as data warehouse,knowledge discovery in database and distributed obje...
Software Architecture Model of Enterprise Information System Domain
Tao Wei, Chen Chong, Mai Zhongfan
1998, 24(4): 403-406.
Abstract:
Software architecture is a new method in Software Engineering.It provides a higher framework for software reuse. This paper introduces the basic concept and research achievement of software architecture into the construction of enterprise information system and puts forward the software architecture...
Research on UML Software Development Process and Support Environment
Zhang Li, Ge Ke, Wang Yun, Zhou Bosheng
1998, 24(4): 407-410.
Abstract:
UML (Unified Modeling Language) is one of the latest fruits in software engineering field. It terminated the fighting in the field of modeling language of object oriented technology. But how to use UML to solve the real world problem is still the hot topic on the field. From the view of the requirem...
Reversed Automatic Generation of Visualized Class Diagram of Object-Oriented Program
Liu Chao, Li Jian, Shen Haihua
1998, 24(4): 411-414.
Abstract:
Reversed modeling is the critical technique in analyzing and understanding object-oriented software, which is also the basis of its testing and maintenance.A set of basic rules for reversedly constructing program's class models are studied, and an inheritance-layered class diagram is proposed, whi...
Study on Hierarchical Model for Ada Parallel Softwares
Yao Shuzhen, Tang Fagen, Jin Maozhong
1998, 24(4): 415-417.
Abstract:
Having visualization and formalization, Petri net has been used to model and analyze parallel softwares. Comparatively,OPN(Object-oriented Petri Nets) is more capable of modeling.A hierarchical parallel software model based on OPN is presented. It refers to UML(Unified Modeling Language) description...
Design and Implementation of Modelbase and Algorithmbase Based on the Component Object Model
Wang Baojiang, Huai Jinpeng, Xia Wanqiang
1998, 24(4): 418-421.
Abstract:
This paper provides a kind of design theory and system structre of the intelligent decision support system development enviroment in the analysis and design process of this development enviroment implementation. It also discusses the design and implementation of modelbase and algorithmbase in decisi...
Integrated Process Engineering Environment and its Architecture
Wang Lei, Zhou Yuchen, Gao Zhongyi, Lu Boying
1998, 24(4): 422-425.
Abstract:
Modern enterprise is a very complicated integrated human-machine system, of which internal enactment needs the supports by computer-based application system. So a process-centered and computer-aided integrated process engineering environment combining process engineering and software engineering tog...
Empirical Study of Personal Software Process
Che Xiangdong, Xu Hong, Ma Yunjing, Liu Youcheng
1998, 24(4): 426-429.
Abstract:
To verify the effect of the PSP(Personal Software Process) on software development,Software Engineering Institute of Beijing University of Aeronautics and Astronautics made an experiment on the application of the PSP in 1997.After a brief introduction to the principles and methods of the PSP,the exp...
MIS with Visual System Modeling Language
Tan Wenan Zhang Xiuguo, Xu Hong, Lu Boying, Zhou Bosheng
1998, 24(4): 430-433.
Abstract:
VSML(Visual System Modeling Language) is successfully used for describing computer-based application systems from functions, behaviors, data and architecture, and supporting object-oriented rapid prototyping and software reuse methods.VSML's design considerations, the definition of primitives, the b...
Genetic Algorithms and Its Application in Software Test Data Generation
Jie Wei, Xie Junkai, Xi Hongyu, Gao Zhongyi
1998, 24(4): 434-437.
Abstract:
Test data generation is a hard problem in software testing area and its implementation can greatly enhance the automation of software testing. The main contribution of this paper lies in that a pratical model, which utilizes genetic algorithms as searching policy to generate software structural test...
Encoding Methods of Parameters of Genetic AlgorithmsApplied in Ada Dynamic Testing
Shi Xiaohua, Gao Zhongyi
1998, 24(4): 438-440.
Abstract:
The principles and methods are introduced, which are used to encode parameters when applying the genetic algorithms in Ada structural testing. First , two main principles of encoding are introduced. Because Ada language could use dynamic data types in its parameter tables, the method used to handle ...
Practical Metric for Software Testing
Deng Yi, He Zhitao
1998, 24(4): 441-444.
Abstract:
The measurement to software testing process is addressed.Software testing is to find software internal problems. It is crucial part of quality assurance. But it is pity that we cannot achieve complete testing due to practical limitations and theoretical impossibility. And just as the old saying "fai...
Debugger Design of Fault Tolerant Computer
Jin Huihua, Liu Yanpeng, Chen Yongping
1998, 24(4): 445-448.
Abstract:
The debugging method and tools of fault tolerant computing systems are explored. The presented approach is based on use of RT scope multitask debugging tools at the operating system level on a prototype of the system considered. The paper first discusses requirement on environment during developing ...
Improvement and Implementation of Marching Cubes Algorithm Based on Surface-Based Rending
Shen Xukun, Liu Jingwei, Zhao Qinping
1998, 24(4): 449-453.
Abstract:
Three-dimensional imaging of medical objects from volume data is considered increasingly useful in various fields, such as medical diagnosis, forensic medicine, palaeoanthropology etc.Marching Cubes algorithm, as one of the advanced surface-based rendering algorithms,is analyzed.The algorithm is imp...
Design and Implementation of High Performance BLAS for Pentium Pro
Li Zhongze, Chen Jin, Long Xiang, Li Wei
1998, 24(4): 454-457.
Abstract:
BLAS is basic linear algebra libraries for science and engineering applications.It plays an important role in high-performance computing. By identifying and optimizing frequently used, numerically intensive operations, BLAS can help in reducing the cost of computation, enhancing portability, and imp...
Design of the Link Layer Protocol of the High Performance Cluster Network
Wu Wenjun, Xiang Xiaohua, Long Xiang
1998, 24(4): 458-461.
Abstract:
A high performance computer cluster system requires an interconnect network with high bandwidth , low latency and high reliability. Only when a simple and effient network protocol is developed , a high performance interconnect network will come into being. A data link layer protocol framework suitab...
Unified Parallel Debugged Object Model for PVM
Huang Ning, Jin Maozhong
1998, 24(4): 462-465.
Abstract:
It is important to well understand the debugged parallel program in researching and developing its parallel debuggers.Although many parallel debuggers define events to be occurrence instances of program actions,little of them give the complete definition of action. PVM(Parallel Virtual Machine) syst...
Hierarchical Network Management System
Sun Yaqiu, Zhang Weidang, Li Weiqin
1998, 24(4): 466-469.
Abstract:
A hierarchical network management system is presented,which consists of a main manager and many submanagers. The main manager delegates management tasks to submanagers by using NMP(Network Management Procedure). Idealy, the main manager runs at the management center and the submanager runs at the ma...
Firewall System with Strong Authentication
Zhu Chun, Yan Jihe, Li Weiqin
1998, 24(4): 470-474.
Abstract:
The fundamental theory,key technology and prevailing solution in the security fields were analyzed.A new firewall architecture was discussed in detail.Compared with traditional firewall,it has markedly advantage in generality,transparency and authentication.Firewall,as a comprehensive security prote...
Study on CAD/CAE System Architecture Supporting MEMS
Kang Jianchu, Yin Baolin, Gao Peng
1998, 24(4): 475-478.
Abstract:
CAD/CAE technique plays an important role in MEMS(Micro Electro Mechanical Systems) research, while MEMS CAD/CAE shares some common techniques with conventional CAD/CAE systems, it is also different in many ways.The characteristics of CAD/CAE techniques supporting MEMS were introduced firstly, then ...
Content-Based Visual Multimedia Query Language
Gong Shengrong, Xiong Zhang, Liu Xudong
1998, 24(4): 479-482.
Abstract:
At present, there are two ways to get multimedia information from multimedia database. One is applying query language to manipulate information directly,it can exactly tell computer about relative query information,but its user interface is not friendly.The other one is developing query interface,bu...
Description and Presentation of Multimedia courseware
Liu Xiaodong, Jin Maozhong
1998, 24(4): 483-486.
Abstract:
The Key problem of developing multimedia courseware authoring system is how to present the instruction flow and presentation.GNT(Generalized Transition Network) is used to describe instruction flow and instruction content is expressed by PC(Presentation Context)in multimedia courseware.In the meanti...
Research of Simulation Technique for Concurrent Software on OPN
Tang Fagen, Yao Shuzhen, Deng Yanqun
1998, 24(4): 487-490.
Abstract:
The performance evaluation for concurrent software is one of the important means to improve the quality of development. This paper mainly discusses applying the combination of object-orientation and Petri nets to the system modeling of concurrent software development, and the simulation technique fo...
Object-Oriented Petri Net Based Method for the Concurrent Program Modeling
Ren Aihua, Niu Jinzhong, Zhang Yongming
1998, 24(4): 491-494.
Abstract:
An approach for concurrent system modeling based on the object-oriented high-level Petri net is described. The O-O Petri net is constructed by combining object-oriented techniques with Petri net theory. The modeling of the O-O Petri net not only can reduce the complexity of the model, but also make ...
Algorithm for Constructing the Simplified DFA of Regular Expressions
Tan Fengqin
1998, 24(4): 495-498.
Abstract:
An algorithm for constructing the simplified DFA(Deterministic Finite Automaton) is introduced,which is equivalent to a given regular expression. The first step constructs an NFA(Nondeterministic Finite Automaton) equivalent to the regular expression, where the operation for constructing finite auto...