2003 Vol. 29, No. 10

Display Method:
Practical and efficient method for computations over real closed fields
Ma Shilong
2003, 29(10): 847-851.
Abstract:
The conventional methods do not work in practice when dealing with large polynomials because of their high complexity. Thus, finding practical and efficient methods (not necessary to be decision method) to solve systems of large polynomial equations and inequalities is very important in symbolic computation. Ritt-Wu's method was combined with Budan-Fourier's theorem to do such task. Though incomplete for the problems in general, the proposed method was found to be computationally more efficient in practice on many examples.
Association of management functions and managed objects in the dynamically constructed network management
Qian Depei, Luan Zhongzhi, Chen Heng, Li Yunchun
2003, 29(10): 852-855.
Abstract:
The association of management functions and managed objects is the key technology to obtain the scalability of the dynamically constructed network management. The concept of managed objects sets(MOS) was introduced as an important functional element of the association mechanism. The MOS offers the definition and description of managed objects about protocols, devices and applications. The structure of the MOS was shown by examples. The MOS was created and expanded by means of dynamic compilation technology. The connection between the managed objects and the management functions was established by accessing to the MOS. The process of association was illustrated in some detail.
WSDL presentation model and implementation method
Ma Dianfu, Ge Sheng, Liu Xudong
2003, 29(10): 856-859.
Abstract:
Web services description language(WSDL) plays an important role in web services technology. But since WSDL is usually described by protocols, it is lack of strictness and preciseness. From logic point of view, there's no consistent implementation technology of WSDL. A formalized model of WSDL, which is called services set was brought forward. The services set can be used to define formalized WSDL document with mathematics method, and it can also be used as WSDL presentation model. By using services set, document structure of WSDL and program semantics of WSDL implementation mechanism can be presented strictly and accurately. Based on this services set, an algorithm for the implementation of WSDL presentation model was put forward.
Goal operationalization-based multi-engine collaboration architecture
Zhang Wenyi, Huai Jinpeng, Liu Xudong
2003, 29(10): 860-864.
Abstract:
The goal operationalizational domain atomic operational model was proposed to analyze the essential problems in realizing goal-oriented system designand implementation. The interpreting engine was introduced to propose an integrative method for the goal-oriented formal model and software design and implementation. Above the system level middleware, the component service was introduced to propose a multi-engine architecture which deals with the task flow to realizethe goal. A component adaptor was implemented, by which operational service engine can access heterogeneous component service consistently.
Level of motion model for semi-dynamic objects in virtual scenes
Wang Lili, Zhao Qinping
2003, 29(10): 865-868.
Abstract:
There always are some semi-dynamic objects in virtual scenes for enhancing realistic immersion, such as trees, flame and smoke. In order to solve the problem of lower rendering speed brought by graphically modeling the action of these objects, level of motion(LOM) model for semi-dynamic objects was provided.The definition of semi-dynamic objects was given and LOM model including a multi-levels motion model and an algorithm for controlling the switches between neighbor levels was presented according as the characters of semi-dynamic objects. At last, a good example was given to verify LOM model. It is demonstrated that the LOM model is propitious to improve real-time performance as well as increase realistic immersion.
On adequate testing of context-free grammars
Li Hu, Jin Maozhong, Gao Zhongyi, Liu Chao
2003, 29(10): 869-872.
Abstract:
Grammar testing was discussed, including related concepts, its characteristics, application scenarios, and a comparison with traditional software testing. Test adequacy criterion of context-free grammar was formally defined and a family of grammar testing criteria was proposed. A formal analysis of the subsume relation between test adequacy criteria in the family was presented, and how the subsume relation between adequacy criteria guarantees a better fault detecting in the context of two classes of faults specific to grammar was also proved. Size complexity of the test adequacy criteria in the family was computed and compared. A grammar testing complexity metric was also developed, which can reflect the difficulty and effort to testing a grammar from the view of test adequacy.
Research on integrated model and transmission controlling algorithm for distributed multimedia information system
Hou Yarong, Xiong Zhang, Ouyang Yuanxin
2003, 29(10): 873-876.
Abstract:
To resolve the synchronization for multimedia communication and multimedia presentation of distributed multimedia system, a distributed multimedia information system integrated model(DMISIM) was put forward. In this model, distributed multimedia information system was formulated as synchronization interval units(SIU), communication channels and a mapping from the channels to the SIUs sequence. DMISIM describes not only the static attributes of multimedia information and communication channel but also the dynamic processes of multimedia communication transmission. Based on DMISIM, distributed multimedia communication transmission mechanism was researched and minimum deviation scheduling algorithm(MDSA) was described as the improvement of classic list scheduling heuristic(CLSH). It is proved by theoretical analysis and logical deduction, that MDSA has better performance than that of CLSH in such fields as channel usage factor, capacity requirement of destination buffers, whereas the algorithm complexity and multimedia synchronization quality are stable. MDSA is independent of communication subnet transport mechanism and can be widely used in multimedia communications.
Research on algorithm for distributed service register and recovery based on hierarchical model
Yuan Man, Hu Jianping, He Rui, Kan Zhigang
2003, 29(10): 877-880.
Abstract:
Based on research for data replication protocol, a kind of algorithm for distributed service register and recovery based on hierarchical model was proposed. All the service locators(SL) locating different administrative domains were organized hierarchically, by means of data replication protocol, it implements service register with all service locators. In order to speed up the messages of service register propagation, a kind of inter-domain and intra-domain control policy was proposed. The algorithm proposed was simulated, the result shows that the policy control speeds up message propagation.
Web and component based bandwidth adaptive multimedia surveillance system
Fan Shengyin, Li Bo, Zhang Guangwei
2003, 29(10): 881-884.
Abstract:
The useability and expandability are insufficient in digital multimedia surveillance systems. Most of them cannot be adapted to the fluctuation of available network bandwidth. To enhance the useability, the new surveillance structure was presented, which based on browser/server model and media-streaming system structure. To improve the expandability, the new surveillance software architecture was designed, which based on DirectShow architecture and component object model and combined unicast with multicast. To be adapted to the available network bandwidth dynamically, the adaptive control strategy and method was introduced, and the closed loop feedback transmission system was accomplished.
Research and implementation of security architecture for Web service runtime
Xue Wei, Liu Xudong, Ge Sheng, Lin Xuelian
2003, 29(10): 885-888.
Abstract:
The application modes and security requirements of Web service runtime (WSR) were analyzed using several fundamental concepts, such as security administration domain. A security architecture based on processing chain structure was presented. The security architecture supports the latest security technologies and related specifications. It's flexible and configurable, provides fairly comprehensive protection for WSR and those Web services managed by it.
Research and implementation of composite Web service supporting system
Du Zongxia, Huai Jinpeng, Wang Yong, Zhang Yu
2003, 29(10): 889-892.
Abstract:
To realize inter-enterprise business process integration, the requirement of composite Web service supporting system was analyzed. Based on the requirement, the principle of system and the architecture were proposed. With this system, you can design, deploy, execute and monitor the composite Web service.The dynamic composition method was proposed to satisfy the dynamics in the inter-enterprise environment.
MPLS traffic engineering routing system supporting fault recovery
Huang He, Li Weiqin, Zhang Hui
2003, 29(10): 893-896.
Abstract:
Based on network policy and traffic profile information, a new constrained routing algorithm for MPLS traffic engineering was proposed. The algorithm pre-allocates the network bandwidth resources to different traffic classes according to the traffic profile information. Through the combination of explicit route computation and fault recovery mechanisms , a MPLS based fault recovery system was designed and implemented. It was shown that both the utility of network resources and the survivability of MPLS traffic engineering system were enhanced through the treatments.
Research and implementation of Web services-based software runtime platform
Ge Sheng, Ma Dianfu, Hu Chunming, Du Zongxia
2003, 29(10): 897-900.
Abstract:
Web services based application supporting environment(WebSASE)is a set of software, which can interact with each other to build an environment for Web services applications deployment, running, monitoring and management. The platform adopted the layered design method. Key runtime environment, dynamic services deploying and plug in style in resources management are three characters in the platform architecture. The platform consists of four key components, such as information portal, workflow system, application supporting services and security control mechanism,which can provide an application framework for Web services based internet software.
Research of automatic intrusion response implementation methods based on mobile agents
Lang Bo, Zheng Jiudan, Liu Junhe
2003, 29(10): 901-904.
Abstract:
To protect the system promptly and effectively when an intrusion was detected, a mobile agent based automatic intrusion response system was advanced. The response plan was automatically created and the mobile agents were sent to the hosts that are attacked to disable accounts, close ports, make the speaker aloud and shut down the host. Response agents can also reconfigure firewalls. The implementation of a response plan was monitored and the plan can be adjusted dynamically. The prototype of the system was used in the dynamic network defense system of Jinhang network. The running result shows that the mobile agent based intrusion response method is much more effective.
Algorithm for robust blind image watermark
Cai Su, Qi Yue, Shen Xukun
2003, 29(10): 905-908.
Abstract:
Based on DCT(Discrete Cosine Transformation) domain, an algorithm for robust blind color image watermark was presented. It inserted adaptively a gray image for watermark to a color image according to block correlation of DCT coefficients, and extracted watermark without the original image. It can be used to detect the piratical digital works on internet. Experimental results demonstrate that this algorithm is transparent and robust. It is strong to withstand JPEG compression, cropping and some other image processing attacks.
Review of augmented virtuality technology in virtual reality
Hao Aimin, He Bing, Zhao Qinping
2003, 29(10): 909-913.
Abstract:
Augmented virtuality(AV) is a kind of technology which can be used to describe very complex models and accelerate rendering with images based modeling and rendering(IBMR) under the framework of graphics based modeling and rendering(GBMR). It can decrease the conflict between realism display and real-time rendering in virtual reality. The major work about augmented virtuality was classified into three categories according to the proportion of geometric information in the scene image objects, with no geometry, implicit geometry and using IBMR to accelerate rendering. Some representative work in these categories was surveyed and compared to the theory,method,process. Five problems in future research were provied and possible way to solved them were present.
Software bypass and fine-grained parallel scheduling on VLIW
Zhu Kaijia, Wang Lei, Yin Baolin
2003, 29(10): 914-918.
Abstract:
A new very long instruction word(VLIW) machine model was described and analyzed.In order to exploit the parallelism in this model, a software bypass method based on static single assignment and an integrated operation-based instruction scheduling and register allocation algorithm were presented. Compared with traditional software bypass and cycle based scheduling algorithm, the new methods can efficiently allocate result registers, schedule micro operations, reduce "hazard value" spills caused by result register reuse, thus yield high quality target code.
Multi-level and multi-policy model of distributed network information filtering system
Huang Xin, Yin Baolin
2003, 29(10): 919-922.
Abstract:
On the basis of analyzing the current network information filtering technologies, a scalable multi-level and multi-policy model of a distributed network information filtering system was described, which combines the functions of the packet analyzing, filtering and forwarding. A fine-granularity information filtering policy was provided, which effectively enhances the information security, increases the speed of data transfer, and decreases the latency. The filtering plug-ins can be conveniently configured and loaded. The model is scalable and open in architecture that can be easily configured and organized in order to meet a variety of requirements and run on the distributed system for gaining better performances. The information processing is transparent to the client hosts and applications so that the side effects to the users are minimal.
Design and implementation of embedded infrared video digital recorder
Wang Qingyuan, Wang Rui, Li Bo, Teng Hao
2003, 29(10): 923-926.
Abstract:
An embedded infrared video digital recorder was designed and implemented. Based on PC/104Plus embedded computer architecture, the recorder implements parallel operation between infrared video acquisition and data transmission, parallel operation between infrared video output and data transmission, with using FPGA to control two memory units accessed in turn. It has friendly man-machine interface and powerful file management function.
Modified DS evidence combination strategy based on evidence classification and uncertain entropy
He Bing
2003, 29(10): 927-930.
Abstract:
A modified DS evidence combination method based on evidence classification and uncertain entropy was introduced. Such a method imitates human's behavior in classification to solve the problem of combing evidences with high degree of conflict. When a series of beliefs are available, first those evidences were classified into several sets to decide which ones correspond with each other and can be combined with DS rule reasonably, and then all the combination results were integrated with weight rule to form the final result.
Study on software measurement process
Ren Fake, Zhou Bosheng, Wu Chaoying
2003, 29(10): 931-934.
Abstract:
Software measurement process is a basis of implementing software process improvement. In order to establish the software measurement process for software process improvement, several standards and models were investigated. Then, an improved process that base on the practical software measurement was proposed, and the implementation was explained.
Research and realization of UML-based integrated software development environment
Tian Licong, Zhang Li, Zhou Bosheng
2003, 29(10): 935-938.
Abstract:
Unified modeling language (UML) lays the foundation of building integrated object-oriented software development environment. After analyzing the characteristics of current modern software development method, combining with the consideration of the users' real requirements, an approach of building UML-based integrated software development environment was proposed, main functions provided were discussed in detail, and then the architecture and implementation of UML/Designer, a UML-based visual modeling tool, was introduced as an example of realizing this approach.
Self-organizing network measurement infrastructure
Li Yunchun, Li Wei, Qian Depei
2003, 29(10): 939-942.
Abstract:
To solve the problem of deploying the network measurement node in a large scale distributed environment, a management mechanism based on hierarchical overlay network was introduced to make all measurement nodes self-organizedinto equivalent classes and reduce inconsistence introduced by manual intervene. This work combined P2P policy with gird measurement architecture (GMA), and improve the expansibility and scalability of the measurement infrastructure.
Design and implementation of a compositional Web service modeling tool
Cui Hang, Ma Dianfu, Wang Yong, Du Zongxia
2003, 29(10): 943-946.
Abstract:
Based on analyse of the Web service flow language(WSFL) proposed by IBM,a composed Web service modeling tool(CWSMT)was proposed. The tool can help user to design the interaction model among Web services easily and can be integrated with a Web service runtime environment, translating graphic modeling result to deployable, run-able compositional Web services.
Empirical-based software defect content estimation improvement
Zhu Yongchun, Xu Hong
2003, 29(10): 947-950.
Abstract:
Capture-recapture models were often used to estimate the number of defects remaining in the product after inspection. Using mean square error as the evaluation criterion, performance of several estimators based on capture-recapture models were evaluated. An improved empirical-based estimator was proposed and the performance of both original and improved estimators was compared and analyzed.