2001 Vol. 27, No. 4

Display Method:
A Fast Motion Estimation Algorithm Using Adaptive Search Technique
LI Bo, TU Ya-ming
2001, 27(4): 373-376.
Abstract:
In the motion estimation of MPEG and H.263,full-search algorithm doeswell in matching accuracy, but involves in a very high computational complexity. Some fast search algorithms such as three-step search still need to be improved in both computational complexity and matching accuracy. The proposed new algorithm, ASA, takes good advantage of both the center-biased motion vector distribution characteristics of the real world video sequence and the correlation among the motions of adjacent blocks. It performs as accurate as full-search, but needs much less computation. Compared with existing algorithms, it is more efficient, more effective and more robust.
Virtual Assembly Model with Mixed Control of Position/Force
WU Wei, SUI Ai-na
2001, 27(4): 377-380.
Abstract:
At present, the study in the field of virtual environment application focuses mainly on the reality of optical, and during the interaction the force is very important. Therefore, the paper adopts the method of mixed control of position/force in the assembly. Then the effect of touch can be acquired through assembling the virtual objects with the force feedback data-glove in the virtual constraint space. The manipulator can feel the minute process of operating, which like the direct touch between the operator and the object. So, the purpose of "being there" is reached during the assembly. As is shown in the experiment, adopting the technique of force control can remarkably improve the design quality and assembly speed of parts.
Application of Distributed Object Technology in Management System of Telecommunications Networks
LANG Xin-pei
2001, 27(4): 381-385.
Abstract:
With the quick growth of the telecommunication networks, the demands of the management system of telecommunication networks have focused on several points such as open quality, efficiency and extensibility of software system. The distributed management becomes one of the feasible ways to solve the problem. The Distributed object technology is one embranchment of Object-Orient technologyin the distributed field, which preferably supports the open quality, the distribution and the reusability of software system. The distributed management system of telecommunication networks based on the distributed object technology adjusts to the current demands of the management system of telecommunication network, which should be widely used in the implement of the management system of telecommunication network.
Design and Implementation of IP Security
XU Jin, MA Dian-fu, HUAI Jin-peng, LI Wei
2001, 27(4): 386-390.
Abstract:
IPSec is a suits of protocol that can seamless bring security into IP and it's the only one Security Protocol for all Internet traffic. Besides IPv4, the IPSec can be also used in the next generation IP——the IPv6. We analyzed the architecture of IPSec, designed an IPSec implementation in Windows NT/2000, and give some application of IPSec in Internet. Finally, we discussed the limitation and the farther development of IPSec.
C++ Program Static Analyzer Based on Element Relation Model
WANG Hao, JIN Mao-zhong, CHEN Qi, GAO Zhong-yi
2001, 27(4): 391-395.
Abstract:
On the need of the Object-Oriented (OO) testing and measurement, and even OO program compiler construction, to analyze the elements in OO programs becomes an important task. The ERM (Element Relation Model) is presented here, on which a static analyzer was constructed for better OO testing and measurement effectiveness and efficiency. Based on ERM and MFC (Microsoft Foundation Class) a VC+ + 6.0 program analyzer is introduced here to depict how ERM can help test and measure OO software. Furthermore, the paper introduces some primarily concerned key technologies on constructing OO program analyzer, even OO compiler, such as how to structure the symbol table by namespace, how to incrementally extract ERM from OO programs. The static analyzer has proved the efficiency and correctness of the ERM. And at the same time it proved ERM would be helpful in OO testing and OO measurement practice and research.
Design of Distributed Fault-Tolerant System for UMS
SHANG Li-hong, RUAN Jun-bo, ZHANG Rui, JIN Hui-hua
2001, 27(4): 396-399.
Abstract:
It is a trend that the aircraft onboard machine-electronic equipment is controlled and managed integrated. Based on distributed fault tolerant technique, high reliable bus technique of avionics and application technique of embedded real-time operation system, a design and an implementation of a distributed fault tolerant computer system which can control and manage aircraft onboard machine-electronic equipment integrated are presented. The work feature and structure of the system, the communication network, the redundancy management and the real-time fault-tolerant administer software is discussed.
Automatic Moving Object Detection and Indexing of Surveillance System
HAN Jun, XIONG Zhang, GONG Sheng-rong, SUN Wen-yan
2001, 27(4): 400-403.
Abstract:
Aiming at the shortcoming of existing video surveillance system, an intelligent surveillance system which can accomplish automatic detection and classification of moving objects by making use of the computer system is presented. Moving object is detected by means of a higher-order statistics performed on a group of inter-frame differences, followed by a motion detection phase, producing a binary moving object. Morphological operator is used to reduce false alarm, moving object is tracked by concept of detecting block. Detecting of moving object and event of interest is used to automatically annotate raw video data, and generate video indexing database. The user can specify object-based queries on the surveillance video sequence and "jump" to events of interest. The experimental results show that the performance proposed method is efficient and robust in the intelligent surveillance system.
Technique of Predicting Potential Reusability of Class Component
LI Hu, NI Hui, CHENG Du-ping, GAO Zhong-yi
2001, 27(4): 404-408.
Abstract:
Based on analyzing the shortages of the Judith Barnard model which can predict the reusability of class components, provides several optimizing solutions and extends the concept of "Class Component" to the concept of "Reusable Class Group". Besides, gives the algorithm to pick up the "Reusable Class Group".This technique makes the predicting result of the potential reusability of the class components more reasonable and precise.
Adaptive Voiced/Unvoiced Segmentation for Mandarin Syllable
WANG Yu-fang, YIN Bao-lin
2001, 27(4): 409-412.
Abstract:
Discrete Wavelet Transformation(DWT) is used to realize voiced/unvoiced segmentation for Mandarin syllable.The algorithm is speaker-independent and robust for different sample rate and background noise, which defines the proper scale of DWT adaptively. Several experiments in different conditions,such as male /female,different sample rate and SNR, are given. It can achieve 99.44% for clean speech, and 99.20% for different SNR value. The effectiveness and robustness of the algorithm for noise and different speaker are proven by the experimental results.
2D Object Recognition Based on Geometry Invariant and BP Network
WANG Qiang, HU Wei-ping, HU Jian-ping, QIN Shao-hua
2001, 27(4): 413-416.
Abstract:
A 2D object recognition algorithm based on geometry invariant and BP Network. is proposed. It can be applied to object recognition under rotation scaling translation (RST) and projection transform. By normalizing the number of pixel in the edge of image of the object to be recognized and computing the 5-point invariant in exhausting way the problem of selecting correspond points between the training and the testing object is solved, The influence to the correct recognition of the object is removed by using 5-point invariant from different view and rotation of the object image as the training set of the BP network. These makes the algorithm can be used for the recognition of the object with curve edge.
Aircraft Lifecycle Process Modeling Technology and its Supporting System
ZHANG Li, ZHOU Bo-shen, CUI De-gang, LIU Meng-zhao
2001, 27(4): 417-420.
Abstract:
For meeting the requirement of the modeling and analyzing of an aircraft lifecycle process, the method to modeling a huge complex process is presented and the visual process modeling language is extended. Based on this language and the methodology for modeling a large complex process, the process modeling and simulating system is developed. Now this system is successfully used to modeling an aircraft development lifecycle process.
Turing Equivalence of Fuzzy Max-Min Operator Neural Networks
LIANG Jiu-zhen, HE Xin-gui
2001, 27(4): 421-424.
Abstract:
The definition region of Zadeh fuzzy operator is extended and the max-min operator is redefined such that it satisfies the exchange law, the combination law and the 0-element law. On the above basis, a max-min operator neural network is proposed according with the general definition of fuzzy operator neural networks. Comparing with traditional fuzzy Zadeh operator neural networks, the present network has high mapping ability. It is showed in detail that the max-min operator neural network can compute part-recursion function, which is equivalent to Turing machine. This indicates that fuzzy max-min operator neural network has the same computation ability as Turing machine. This extends the result of Turing equivalence of traditional neural networks of neuron M-P model to fuzzy neural networks.
Study on Real-Time Software Developing Method of Multiprocessor System with OOPN Model
REN Ai-hua, JIN Mao-zhong
2001, 27(4): 425-428.
Abstract:
The time relativity and interactive property with the environment of a real-time system make the real-time software development very difficult. If in the case of multiprocessor environments the development work will be more difficult. In order to simplify the concurrent programming in the multiprocessor environment and reduce errors in the programming, the paper introduces a programming approach for the multi-processor system along with the software developing and enacting environment under this method. The method supports multiprocessor system software developing based on a visible graph mode (i.e. Object Oriented Petri Net) with witch the software can be developed efficiently and the reliable software can be obtained.
Locating in Mobile IP of Mobile Hosts
KAN Zhi-gang, HU Jian-ping, MA Jian
2001, 27(4): 429-432.
Abstract:
Internetworking protocols such as IP currently do not allow "mobile hosts" to interoperate easily or conveniently with other hosts on the network. The Mobile IP Working Group of the Internet Engineering Task Force (IETF) has been working over the past few years to develop standard protocols to support mobile hosts operating in the Internet. Locating in mobile Internet of mobile hosts is an important extension of this protocol. The infrastructure and the "Agent Discovery" of the Mobile IP protocol are described and the Cellular Mobile Internet is defined. Finally a new method named "Addresses Sliding Window" for locating of mobile hosts is presented.
Automated Test Case Generation Based on UML Activity Diagram Model
ZHANG Mei, LIU Chao, SUN Chang-ai
2001, 27(4): 433-437.
Abstract:
In order to design and generate test cases of workflows, test outline model is defined. The three-tier process to transform an activity diagram into its test outline model and then into its test case model,as well as the test coverage criteria, is introduced, including a set of basic rules, by which unstructured flows is eliminated to modularize test outline units, and concurrency flows can be instantiated. The principles on the instantiated input data for each input operation in the system and the creation of the test case model by assigning the instantiated set of input data to the outline model,and then methods to generate the complete set of test cases based on the model are discussed.
Memory Simulation in CPU Simulator MCS
LI Feng, WANG Lei, LIU You-cheng, ZHOU Bo-sheng
2001, 27(4): 438-442.
Abstract:
Simulator is a powerful tool for hardware design evaluation, system software development, and computer architecture study. Memory simulation is an important part of a system level simulator, it will affect the whole performance. By introducing MCS——a CPU simulator based on VLIW architecture, the authors study the implementation of efficient memory simulation. As a running environment of the target codes,MCS can be used to evaluate the design of CPU, analyze the efficiency of instructions, and debug the target compiler.
Integrated Environment for Dynamic Optimizing Enterprise Process
TAN Wen-an, ZHOU Bo-sheng, ZHANG Li, ZHOU Jian-guo
2001, 27(4): 443-447.
Abstract:
Enterprise process optimization methods are introduced, and integrated environment for dynamic optimizing enterprise process (IEDOEP) has been developed by integrating process defining tool (PDT), process simulating tool (PST), and process optimizing tool (POT) with decision supporting system (DSS). Following are the component functions and architecture. IEDOEP is instructive for enterprises to be dynamic optimized, implement business process reengineering (BPR) and enterprise resource planning (ERP) management.
3 Dimension Visualization for Geology-Constructed-Model
ZHU Da-pei, NIU Wen-jie, YANG Qin, XIONG Zhang, CHEN Qi-ming
2001, 27(4): 448-451.
Abstract:
Three dimension visualization of geology constructed model is used to display the exploration data in graphics methods directly, which is an important means to learn the geo body structure better, and provides useful proof for oil simulation. Based on the triangulation and interpolation algorithm, the geology layer and fault triangular grid models are constructed. Then four geology constructed model visualization methods, geology layer visualization, geology body visualization, geology profile visualization and dynamical geology visualization, are analyzed. The three dimension geology body is constructed by closing surfaces including boundary, faults and top layer. The geology boundary is triangular grids constructed by seaming layers adjacent; the fault surfaces are also triangular grids constructed by seaming fault lines adjacent. Three vital algorithms are implemented, which are the nearest neighbor first piecewise triangular reconstruction, triangular grid surfaces outer polygon boundary tracing and interaction line tracing between triangular grid surfaces and plane. In the end, visualization of various geology constructed model is given.
Research of ObjectWeb Technology
LANG Bo, LI Wei-qin
2001, 27(4): 452-455.
Abstract:
With the development and popularization of Internet, there are many kinds of resource appear. But the Web at present has many restrictions and can not support the sharing of resources on Internet more widely and more deeply. The ObjectWeb is such a technology that can improve this situation, and it is a new phase of Web. The core technology of ObjectWeb is discussed, and some frameworks that are at the primary stage of ObjectWeb are described. The idea of integrating CORBA with Agent and Multiagent to construct an ideal ObjectWeb framework is also set forth.
A Web-Based Workflow System Design and Implementation
ZHAO Hai, MA Dian-fu, HUAI Jin-peng, LI Wei, ZHANG Han-li
2001, 27(4): 456-460.
Abstract:
The combination of workflow technologies and software application systems is one of the research directions in computer application area. On the basis of researches of workflow technology, a Web-based Workflow System (WebWFS), which is based on script interpreter and is independent of application data, is presented. OOD method is used in workflow engine and a description language basedon the script and a IIS Filter are discussed. In order to verify the adaptability of WebWFS, a example which is a plan management module of MIS is presented for analyzing the process of application of WebWFS. The conclusion is that WebWFS is reusable and flexible.
Control Techniques Based on Metric Analysis During Software Testing Process
QIAN Hong-bing, LIU Chao, YAN Hai-hua, HE Zhi-tao
2001, 27(4): 461-464.
Abstract:
The paper starts by describing the basic testing process of software system and the documents, role and activities associated with the testing process. It then focuses on discussing various techniques used to monitor, control and manage the whole testing process according to the data collected from the testing process. For example, the analysis techniques on test schedule change, software problem distribution, human resources, software problem processing time and reproducible software problem, etc. These techniques give support to ensuring software quality, increasing efficiency, reducing cost and improving testing process.
Logical Network Based Customer Service Management
HUANG Dong-quan, XU Zhen-ya, LI Wei-qin, XIA Chun-he
2001, 27(4): 465-468.
Abstract:
The concepts and functionalities of customer service management have been analysed. A novel hierarchical representation method of abstract network, logical network, is provided. The structure, attributes and computation of logical network as well as a CSM management model have been studied. An implementation prototype of CSM system is provided. At the underlying layer, CORBA, common object request broker architecture, is used as a supporting environment and for achieving representation, management, update and access of CSM-MIB. At the higher layer, customers are allowed to reassemble the physical network and generate a hierarchical "logical network" through methods of definition, creating and maintenance. Thereby the functionalities of CSM such as agreement, assignment, performance monitoring and reporting can be implemented.
Design and Implementation of SSL Based Secure Transmission System
YANG Ya, LI Wei
2001, 27(4): 469-473.
Abstract:
SSL protocol is a de facto standard to protect data transferred securely on the Internet. According to the SSL protocol, we design and implement a SSL based secure transmission system. It includes two parts: Client Secure Proxy(CSP) and Server Secure Gateway(SSG) through which a secure tunnel can be established between peers to protect sensitive data from being eavesdropped, altered and faked. This paper presents a detailed structure of this system and key techniques such as the implementation of handshake protocol, the negotiation of secret keys, the fragmentation and padding of record layer, session reuse etc. Our SSL Secure Proxy can establish an secure tunnel.
Process Management for Software Quality Assurance Based on Document Status
YAN Hai-hua, HU Jia, ZHANG Li-feng, HE Fei
2001, 27(4): 474-477.
Abstract:
Software document are found in entire software life cycle, are important parts of software product. Due to their effect on software quality, after investigating process of software document, a concept of document status was proposed first, then based on document status, document role, document action, document version and the relations between documents were described in detail. Finally, attention was focused on how they are used together to control, trace and manage process of document, and how to implement process management for software quality assurance.
Implementation of Management Network for Telecommunication Cable Switching Box, MNTCSB
WANG Hua-ning, HUANG Li-jun
2001, 27(4): 478-481.
Abstract:
Using advanced technologies of computer networks and communications, MNTCSB implements automatic management of telecommunication cable switching box. The components of the system are presented, as well as communication methods, addressing and resolution, key algorithms, and implementation of some management functions.
Design and Implementation of a Web Reporting Tool
TANG Min, XU Wei, LI Zhao-yuan
2001, 27(4): 482-485.
Abstract:
The Web-based Reporting is becoming the mainstream of reporting application in enterprise information systems. At present most of the reporting tools are limited within two-tier client/server applications, and do not support the Intranet/Internet reporting development, and also they are difficult to use and develop with. On the basis of the analysis of latest Web database integration technologies, the scheme of a component-based Web reporting tool is brought out, with emphasis on some key technologies, such as the communication mechanism between client and server, database access interface policy, XML-based communication package design, which is helpful in the reporting development of enterprise information systems.
Network QoS Model Supporting CIPOA
XIA Chun-he, ZHANG Guang-ming, LI Yun-chun
2001, 27(4): 486-489.
Abstract:
With the recent explosive growth of the Internet, the QoS (Quality of Service) in the data transmission plays an important role in the real-time and multimedia applications. And it is one of the crucial features of ATM (Asynchronous Transfer Mode) networks to provide different QoS to different user-s applications with diverse transparent attributes and grades. With the idea of the Differentiated Services, this paper maps some IP applications to appropriate classes of service in ATM, designs the Differentiated Services policy by different QoS parameters, and implements the Network QoS Model in the NS2 simulator on the base of the Differentiated Services Code Point protocol in CIPOA (Classical IP over ATM).
Forecasting Display Technique of Distributed Virtual Human
WU Wei, WANG Yan, SUI Ai-na
2001, 27(4): 490-494.
Abstract:
The simulation of human in the distributed virtual environment is different from the simulation of vehicle. Due to the human's many joints, to implement the real-time performance of the interaction between the virtual human and the environment, the quantity of information broadcasted in the network will be increased. So with the growing of the quantity of virtual human added to the network, the network burthen would augment rapidly. Therefore, for the simulation of virtual human this paper divides organically the motion parts of the body, which makes those body parts that often interact with the environment are described according to the joints while other parts are described according to the action information. Simultaneity, this paper adopts Dead Reckoning to reduce the quantity of information needed by maintaining the reality motion of virtual human. The experiment indicates that the forecasting display technique can efficiently reduce the network burthen and enhance the interaction of virtual human.