2004 Vol. 30, No. 11

Display Method:
Research and design of a datalink user's safeguard strategy
Li Qianmu, You Jing, Zhang Hong, Liu Fengyu
2004, 30(11): 1029-1032.
Abstract:
To solve the datalink problem of capability and service/price, a frame work model——a new datalink user's redundant strategy was proposed, based on reliability theory. The redundant strategy could be combined with the normal maintenance, which greatly improved the performance of the network system. T...
Study of new measure to recover and control DOS/DDOS atta ck
Fang Zhiyi, Zhang Meiwen, Wei Hua, Wang Wei
2004, 30(11): 1033-1037.
Abstract:
DOS(denial\|of\|service)/DDOS(distributed denial\|of\|service) network attack no t only causes harm to attacked target, but also disturbs other flows that share the same network with attacked target. By adding computing into every bosom node (route, switch), a mechanism system to recover and control...
Web services enabled VHE platform
Wan Neng, Chen Junliang, Su Sen
2004, 30(11): 1038-1042.
Abstract:
VHE(virtual home environment) is an important concept for the 3rd gen eration mobile communication networks, which enables PSE(personal service environment) mobility across network boundaries and between terminals. A service-oriented VHE platform, WSEVHEP(Web services enabled VHE platform), was pres...
Analysis of model of concurrent multimedia workloads retrieving data form storage systems
Li Zhong, Wang Gang, Liu Jing
2004, 30(11): 1043-1047.
Abstract:
The multimedia applications need the guarantee of the QoS(quality of servi ce) when retrieving data form the storage systems, the fraction of requests whose response time exceeds a specific delay limit must below a certain proport ion. In the concurrent multimedia workloads, many applications access...
Research on Web information fusion infrastructure
Li Bing, He Keqing, Liu Jin, Li Ruixuan
2004, 30(11): 1048-1051.
Abstract:
Meta modeling is an effective approach to implement interoperability a mong distributed and heterogeneous information sources on Web. MMF (meta model f ramework) is a set of meta objects and meta modeling constructs to be used in th e development a metamodel in actual implementation of information r...
Resource dependency based grid resources assignment
Guo Wencai, Yang Yang, Liu Li
2004, 30(11): 1052-1056.
Abstract:
As a component of a grid job, a grid service is required to select suit able resource from global wide providers so that the different resource assignme nts will have distinctive impact on the utility of the job,which results in SRA(service resource assignment) problem.Addressing it a novel method T...
IPSec interworking issues under mobile wireless network scenarios
Ye Runguo, Feng Yanjun, Zhang Fangzhou, Song Cheng
2004, 30(11): 1057-1060.
Abstract:
IPSec protocol can provide end-to-end security for IP-based applicati ons in fixed wired networks; IPsec can also be used to provide communication sec urity for numerous mobile wireless terminal devices in future mobile wireless ne tworks. Interworking issues between IPSec protocol and other network...
Research of middleware technology for next generation network
Zhang Yunyong, Zhang Zhijiang, Liu Yunjie, Li Guojie
2004, 30(11): 1061-1065.
Abstract:
NGN(next generation network) will be a uniform and integrated netw ork which imports distributed computing and communication technology. NGN h ave multiple kinds of applications and network environment. Middleware for NGN w as studied and practiced. Traditional middleware and mobile middleware were ...
Wireless video streaming oriented packet scheduling algorithm
Niu Jianwei, He Rui, Hu Jianping
2004, 30(11): 1066-1070.
Abstract:
Based on end-system, an end-to-end wireless video streaming architecture was proposed. The video frame importance was defined in terms of the contribution of the VP(video packet) to the decompression video quality within a GOP(Group Of Picture). Based on this concept, a WVSPSA(wireless video streami...
Communication model for data-intensive grid
Chen Qingkui, Na Lichun
2004, 30(11): 1071-1075.
Abstract:
For resolving the conflict problem of the peak communication in data-intensive grid that composed of CC(computer clusters), a MGCM(multi-level grouping commun ica tion model) was discussed. A series of formal definitions, such as the DGDN(dat a-intensive grid data node) and the complete graphics com...
Monitoring grid on service level, GSLMA and its test bed
He Chuan, Gu Lei, Du Bin, Wu Jianfeng
2004, 30(11): 1076-1079.
Abstract:
Grid monitoring toolkits was classified into three categories from the point the view of architecture and a novel architecture of grid monitoring, GSLMA(grid s ervice level monitoring architecture) was presented,which was based on SLA(serv ice level agreement). GSLMA was a SOA(service oriented archi...
Hybrid genetic algorithm for independent tasks scheduling in heterogeneous computing systems
Zhong Yiwen, Yang Jiangang
2004, 30(11): 1080-1083.
Abstract:
Efficient tasks scheduling is critical for achieving high performa nce in heterogeneous computing systems. The tasks scheduling problem is NP-hard in general. In order to obtain better solutions, many scheduling heuristics were presented in the literature. Based on genetic algorithm and MCT(minimum ...
Complex wavelet packet based MIMO-OFDM wireless system
Xiao Zhengrong, Yu Zhi, Zhao Shaogang, Wu Weiling
2004, 30(11): 1084-1087.
Abstract:
To provide high speed data service in frequency selective fading channels, a new MIMO-OFDM(multi-input multi-output-orthogonal frequency division multiplexi ng) system was proposed. The system used CWPT(complex wavelet packet transform) instead of FFT(fast Fourier transform) to realize OFDM. For t h...
Quantum algorithm analysis of knapsack problem
Lü Xin, Feng Denggu
2004, 30(11): 1088-1091.
Abstract:
Speeding up knapsack problem, one of the NP complete problems, which could be us ed to design public-key cryptosy stems, was discussed using quantum algorithm. How to use Grover's quantum search ing algorithm to speed up the knapsack problem was talked about based on computa tional complexity theory...
Model of network fault diagnosis
Chen Lin, Huang Jie, Gong Zhenghu
2004, 30(11): 1092-1096.
Abstract:
Network diagnosis problem aims to obtain compatible fault mode which c an explain symptoms by a set of actions. Some diagnosis models have been propose d, but their descriptions of the problem with dependent actions were not accurat e enough and the results are not very optimal. A DBN(diagnosis Baye...
Job scheduling algorithm based on credit model in cluster environment
Zhang Shudong, Cao Yu, a, Liao Lejian
2004, 30(11): 1097-1100.
Abstract:
A novel job scheduling algorithm based on credit model was presented for cluster system. In the credit model, every computing node was looked as a c redit entity. The scheduling system gave each entity a credit value according it s power ability, its status and its history records. The scheduling sy...
New evolutionary neural networks
Gao Wei
2004, 30(11): 1101-1105.
Abstract:
Nowadays, the genetic algorithm is a main evolutionary algorithm in ev olutionary neural network study. But the previous researches show that, this kin d of evolutionary neural network model have many shortcomings, such as genetic c ode problem, genetic operation problem and restriction on structure...
Method of cooperative detecting DDoS attacks across multiple domains
Su Heng, Ju Jiubin
2004, 30(11): 1106-1110.
Abstract:
To prevent the DDoS(distributed denial of service) attacks effectivel y, a cooperative detection model was proposed based on the cooperation among the IDSs(intrusion detection systems) distributed in multiple administrative domai ns. Surrounding some valuable network assets, the enclosed defense rin...
Loop unrolling optimization for software pipelining
Li Wenlong, Liu Li, Tang Zhizhong
2004, 30(11): 1111-1115.
Abstract:
Loop unrolling can m ake software pipelining achieve fractional initiation interval and improve resou rce utilization. Optimizations based on unrolling can reduce resource requiremen ts and the heights of critical paths. An algorithm named UTBPC(unrolling times based program characteristics) for det...
Flow control algorithm based on ECN probabilistic marking
Yang Zhen, Ding Wei
2004, 30(11): 1116-1120.
Abstract:
A flow model upon users' utility function was proposed, with which the optimization-based congestion control could transform optimization-based flow c ontrol. A dual gradient projection algorithm was given to optimize network flow control. In this algorithm, sources selected transmission rates that ...
Load balance for network parallel computing
Hu Kai
2004, 30(11): 1121-1124.
Abstract:
The principle of the dynamic load balance for a distributed system was used to design a preemptive dynamic load balancing architecture to meet require ments of the network distributed and parallel computing environment. A centraliz ed information system was introduced to collect all process's inform...
Modeling trust with uncertainty for open networks
He Rui, Niu Jianwei, Hu Jianping
2004, 30(11): 1125-1128.
Abstract:
Since trust relationships are uncertain in open networks, it is necess ary to consider uncertainty when modeling trust.A novel trust model was proposed based on the cloud model, which was a useful tool to describe uncertain concept . Modeling trust with cloud, the proposed model could present trust ...
HPI based multi-processor system for neural network image matching
Shi Zhenghao, Feng Yaning, Zhang Suinan, Huang Shitan
2004, 30(11): 1129-1132.
Abstract:
Aim at the characteristics of embedded image matching, TMS320C6X family processo rs were used for parallel neural computing units, and a multi-processo r system structure based on TMS320C6X HPI(host parasite interface) interlinkin g for neural network image matching was presented. In this parallel c...
Research on self-adapted security cooperation framework based on peer-to-peer network
Chen Haitao, Pei Jinze, Hu Huaping, Gong Zhenghu
2004, 30(11): 1133-1136.
Abstract:
A new decentralized security cooperation framework based on P2P(peer-to -peer) network was proposed which supported many kinds of security service such as se cu rity management, the storage and sharing of security related data and distributi on of security information.A security management method wh...