A novel broad concept of numbers was given out based upon the analyzing of numbers′ carrying rule. In international mathematics & computer science, all researches on numbers are only confined to same varying rule...A novel broad concept of numbers was given out based upon the analyzing of numbers′ carrying rule. In international mathematics & computer science, all researches on numbers are only confined to same varying rule of the FCN (fixed carrying numbers). The concept of VCN (variable carrying numbers) was presented, and some applied examples of practice were given out. So the engineering application of VCN for n-figures is wider than that of FCN in human society.展开更多
By investigating the limitation of existing wavelet tree based image compression methods, we propose a novel wavelet fractal image compression method in this paper. Briefly, the initial errors are appointed given the ...By investigating the limitation of existing wavelet tree based image compression methods, we propose a novel wavelet fractal image compression method in this paper. Briefly, the initial errors are appointed given the different levels of importance accorded the frequency sublevel band wavelet coefficients. Higher frequency sublevel bands would lead to larger initial errors. As a result, the sizes of sublevel blocks and super blocks would be changed according to the initial errors. The matching sizes between sublevel blocks and super blocks would be changed according to the permitted errors and compression rates. Systematic analyses are performed and the experimental results demonstrate that the proposed method provides a satisfactory performance with a clearly increasing rate of compression and speed of encoding without reducing SNR and the quality of decoded images. Simulation results show that our method is superior to the traditional wavelet tree based methods of fractal image compression.展开更多
With the development of location technologies, advanced LBS-based ITS increasingly requires the capability of database technologies to manage the continuously arrived vehicles’ location, traffic jam and other interre...With the development of location technologies, advanced LBS-based ITS increasingly requires the capability of database technologies to manage the continuously arrived vehicles’ location, traffic jam and other interrelated information of large amounts of traffic in the following years. And some burst arrival stream data will challenge the real-time performance and the allocation of limited resource. However, choosing a desirable database operator scheduling strategy can significantly improve the performance of the system. The path capability strategy was chosen and improved as ITS’ operator scheduling strategy to meet the real-time response and the minimal memory requirement of the system.展开更多
A simple and effective image inpainting method is proposed in this paper, which is proved to be suitable for different kinds of target regions with shapes from little scraps to large unseemly objects in a wide range o...A simple and effective image inpainting method is proposed in this paper, which is proved to be suitable for different kinds of target regions with shapes from little scraps to large unseemly objects in a wide range of images. It is an important improvement upon the traditional image inpainting techniques. By introducing a new bijeetive-mapping term into the matching cost function, the artificial repetition problem in the final inpainting image is practically solved. In addition, by adopting an inpainting error map, not only the target pixels are refined gradually during the inpainting process but also the overlapped target patches are combined more seamlessly than previous method. Finally, the inpainting time is dramatically decreased by using a new acceleration method in the matching process.展开更多
With the rapid urbanization, land banking has become an important means for rational land use and land configuration optimizing. Rational urban land reserve and supply plan are keys for an urban land banking. GIS has ...With the rapid urbanization, land banking has become an important means for rational land use and land configuration optimizing. Rational urban land reserve and supply plan are keys for an urban land banking. GIS has been used to model urban growth, growth at the rural-urban fringe specifically. This paper identifies that the urban land banking potential can be evaluated based on RS and GIS technology. 10 indicators were chosen in the integrated index system. As a case of Metropolitan area in Chongqing, urban land banking potential was evaluated based on RS and GIS technology. With GIS, two steps can help to finish potential analysis of land banking. One is goal driven process, such as the process of planning and definition; the other step is data-driven process, such as the process of Manipulating. The results are used to establish the current land banking plan.展开更多
In many real world planning domains, some observation information is optional and useless to the execution of a plan, and the information acquisition may require some kind of cost. So it is significant to propose a fr...In many real world planning domains, some observation information is optional and useless to the execution of a plan, and the information acquisition may require some kind of cost. So it is significant to propose a framework for planning with extended goals under partial observability, which can adapt to the idea of observation reduction. In this paper, a method was proposed to solve the problem. The definition of structured plans was given, which can encode sequential, conditional and iterative behaviors, and are expressive enough for dealing with incomplete observation information and with extended goals. In order to express extended goals over sub-plans and observation information, the interpretation of basic propositions in K-CTL and EAGLE (two important languages for expressing temporal requirements in nondeterministic domains) was extended.展开更多
Path planning is one of the most important problems in the design of a mobile robot.A novel approach called generalized Voronoi diagrams(GVD)may deal with this matter.First,a method was introduced to normalize the obs...Path planning is one of the most important problems in the design of a mobile robot.A novel approach called generalized Voronoi diagrams(GVD)may deal with this matter.First,a method was introduced to normalize the obstacles and present efficient techniques for generating GVDs.Then a best path searching algorithm was presented.Examples implemented were given to indicate the availability of the mentioned algorithms.The approaches in this paper can also be used in applications including visualization,spatial data manipulation,etc.展开更多
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ...Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.展开更多
The wide use of Internet Service in distributed computing and e-business has made the evolution of Internet Service to be one of the most prevalent research fields in software development domain. Traditional methods f...The wide use of Internet Service in distributed computing and e-business has made the evolution of Internet Service to be one of the most prevalent research fields in software development domain. Traditional methods for software development cannot adapt to the challenge of Internet Service oriented software development. In this paper, we propose a new paradigm for the evolution of Internet Service with active objects from the characteristics of Intemet Service and principles of active objects. The paradigm uses an automatic monitoring mechanism of active object to detect and process evolution requirement in system based on Internet Service.展开更多
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput...With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.展开更多
In the reputation modeling of wireless sensor networks(WSNs) many literatures have proposed creative reputation indirect update methods,such as reputation integration,discounting,aging to eliminate,and filtering mal...In the reputation modeling of wireless sensor networks(WSNs) many literatures have proposed creative reputation indirect update methods,such as reputation integration,discounting,aging to eliminate,and filtering malicious reputation information. However,few have discussed the reputation direct update. In this paper,based on sound statistical theories,a negative binominal distribution method in the reputation direct update for WSNs is proposed. Results show that the proposed method is more suitable and time-saving for the reputation update of the resource constraint WSNs and can improve the computation power efficiency as well.展开更多
Digital city, a large complex system, is comprised many subsystem of different fields. It involves common field data, flexible field processes, seamless intra-organization and inter-organization collaborations, and in...Digital city, a large complex system, is comprised many subsystem of different fields. It involves common field data, flexible field processes, seamless intra-organization and inter-organization collaborations, and increasing connectivity and interoperability between distributed or decentralized systems. All above these are involved Foundation Data of Digital city. To promote the sustainable development of Digital City, this paper investigates to the construction of Foundation Data Platform (FDP) from the view of the architecture. The paper introduces the conceptions, characteristics and underlying problems of the FDP, and discusses the key issues of the architecture paradigms what FDP might adopted via comparing Object-Oriented Architecture (OOA), Component-Based Architecture (CBA), and Service-based Architecture (SBA). The Process Embedded Service-Oriented Architecture (SOA), one of the recent SOA Application Architecture is introduced. The results indicate that the Process Embedded SOA could promote the sustainable development of Digital City and accommodate the dynamic development environments of different fields which constantly changes requirements.展开更多
The successful rate of transmission coordination of opportunistic routing (OK) is analyzea systematically, and then two efficient transmission coordination mechanisms (TCMs) are proposed for OR: a batch sliding w...The successful rate of transmission coordination of opportunistic routing (OK) is analyzea systematically, and then two efficient transmission coordination mechanisms (TCMs) are proposed for OR: a batch sliding window-based TCM and a bit map-based TCM, to reduce the total number of packet transmissions and improve end-to-end throughput for OR. The batch sliding window-based TCM avoids the oscillation of the successful rate of transmission coordination by transmitting packets in continuous batch mode so as to improve the average successful rate of transmission coordination efficiently, while the bit map-based TCM improves end-to-end throughput of OR by reducing the overhead of transmission coordination. Exhaustive simulations show that the average end-to-end throughput gains of the two proposed TCMs are 15.4% and 6.4% over the batch map-based TCM, respectively.展开更多
The causality diagram theory, which adopts graphical expression of knowledge and direct intensity of causality, overcomes some shortages in belief network and has evolved into a mixed causality diagram methodology for...The causality diagram theory, which adopts graphical expression of knowledge and direct intensity of causality, overcomes some shortages in belief network and has evolved into a mixed causality diagram methodology for discrete and continuous variable. But to give linkage intensity of causality diagram is difficult, particularly in many working conditions in which sampling data are limited or noisy. The classic learning algorithm is hard to be adopted. We used genetic algorithm to learn linkage intensity from limited data. The simulation results demonstrate that this algorithm is more suitable than the classic algorithm in the condition of sample shortage such as space shuttle’s fault diagnoisis.展开更多
A new motion retargeting algorithm is presented, which adapts me motion capture data to a new character. To make the resulting motion realistic, the physically-based optimization method is adopted. However, the optimi...A new motion retargeting algorithm is presented, which adapts me motion capture data to a new character. To make the resulting motion realistic, the physically-based optimization method is adopted. However, the optimization process is difficult to converge to the optimal value because of high complexity of the physical human model. In order to address this problem, an appropriate simplified model automatically determined by a motion analysis technique is utilized, and then motion retargeting with this simplified model as an intermediate agent is implemented. The entire motion retargeting algorithm involves three steps of nonlinearly constrained optimization: forward retargeting, motion scaling and inverse retargeting. Experimental results show the validity of this algorithm.展开更多
This paper proposes a self-adaptive approach to converting irregular genus-O meshes into those with subdivision connectivity. To assure a maximal utilization of the multiresolution techniques on the remesh, we map the...This paper proposes a self-adaptive approach to converting irregular genus-O meshes into those with subdivision connectivity. To assure a maximal utilization of the multiresolution techniques on the remesh, we map the original mesh onto the unit sphere and construct a base mesh with only four vertices. We also introduce a self-adaptive relocation operation, which is used to adapt the vertex distribution of the spherical subdivision mesh to that of the parameterized mesh, to improve the visual appearance of the remesh. The experimental results show that our method can not only make the number of irregular vertices in the remesh as small as possible, but also preserve the details of the original mesh well.展开更多
The peer-to-peer(P2P) file-sharing network as a vehicle of disseminating files has become very popular. The appearance of dozens of kinds of passive worms on this network has, however, made it unsecured. This proble...The peer-to-peer(P2P) file-sharing network as a vehicle of disseminating files has become very popular. The appearance of dozens of kinds of passive worms on this network has, however, made it unsecured. This problem has been paid attention and a few of models for passive worm propagation has been presented. Unfortunately, the dynamic properties of this network are ignored in these models. Given the fact, the characteristics of both this network and the passive worm are identified, and on this basis a new mathematical model of passive worm propagation on the P2P network is presented in applying epidemiology in this paper. Note that the dynamic properties of this network are considered in the presented model. The model has been validated by large scale simulation experiments, which demonstrates that the presented model may be used for analyzing the behaviors of passive worms and predicting the trend of their propagation.展开更多
A P2P scientific collaboration is a P2P network whose members can share documents, co-compile papers and codes, and communicate with each other instantly. From the simulation experiment we found that P2P collaboration...A P2P scientific collaboration is a P2P network whose members can share documents, co-compile papers and codes, and communicate with each other instantly. From the simulation experiment we found that P2P collaboration system is a power-law network with a tail between -2 and -3.We utilized the algorithm that searches by high-degree shortcuts to improve the scalability of p2p collaboration system. The experimental result shows that the algorithm works better than random walk algorithm.展开更多
基金This research is supported by the Nature Science Foundation of Fujian Province of China(item No.2006J0414foundation No.A0640015)
文摘A novel broad concept of numbers was given out based upon the analyzing of numbers′ carrying rule. In international mathematics & computer science, all researches on numbers are only confined to same varying rule of the FCN (fixed carrying numbers). The concept of VCN (variable carrying numbers) was presented, and some applied examples of practice were given out. So the engineering application of VCN for n-figures is wider than that of FCN in human society.
基金Project 60571049 supported by the National Natural Science Foundation of China
文摘By investigating the limitation of existing wavelet tree based image compression methods, we propose a novel wavelet fractal image compression method in this paper. Briefly, the initial errors are appointed given the different levels of importance accorded the frequency sublevel band wavelet coefficients. Higher frequency sublevel bands would lead to larger initial errors. As a result, the sizes of sublevel blocks and super blocks would be changed according to the initial errors. The matching sizes between sublevel blocks and super blocks would be changed according to the permitted errors and compression rates. Systematic analyses are performed and the experimental results demonstrate that the proposed method provides a satisfactory performance with a clearly increasing rate of compression and speed of encoding without reducing SNR and the quality of decoded images. Simulation results show that our method is superior to the traditional wavelet tree based methods of fractal image compression.
基金This work is supported by the MIC ( Ministry of Information and Communication) , Korea ,under the ITRC(Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assess-ment) .
文摘With the development of location technologies, advanced LBS-based ITS increasingly requires the capability of database technologies to manage the continuously arrived vehicles’ location, traffic jam and other interrelated information of large amounts of traffic in the following years. And some burst arrival stream data will challenge the real-time performance and the allocation of limited resource. However, choosing a desirable database operator scheduling strategy can significantly improve the performance of the system. The path capability strategy was chosen and improved as ITS’ operator scheduling strategy to meet the real-time response and the minimal memory requirement of the system.
基金Supported by the National Natural Science Foundation of China (No. 60403044, No. 60373070) and partly funded by Microsoft Research Asia: Project 2004-Image-01.
文摘A simple and effective image inpainting method is proposed in this paper, which is proved to be suitable for different kinds of target regions with shapes from little scraps to large unseemly objects in a wide range of images. It is an important improvement upon the traditional image inpainting techniques. By introducing a new bijeetive-mapping term into the matching cost function, the artificial repetition problem in the final inpainting image is practically solved. In addition, by adopting an inpainting error map, not only the target pixels are refined gradually during the inpainting process but also the overlapped target patches are combined more seamlessly than previous method. Finally, the inpainting time is dramatically decreased by using a new acceleration method in the matching process.
文摘With the rapid urbanization, land banking has become an important means for rational land use and land configuration optimizing. Rational urban land reserve and supply plan are keys for an urban land banking. GIS has been used to model urban growth, growth at the rural-urban fringe specifically. This paper identifies that the urban land banking potential can be evaluated based on RS and GIS technology. 10 indicators were chosen in the integrated index system. As a case of Metropolitan area in Chongqing, urban land banking potential was evaluated based on RS and GIS technology. With GIS, two steps can help to finish potential analysis of land banking. One is goal driven process, such as the process of planning and definition; the other step is data-driven process, such as the process of Manipulating. The results are used to establish the current land banking plan.
基金supported by the National Natural Science Foundation of China under grant No.60773201Guangdong Natural Science Foundation under grant No. 07006474Guangdong Scientific and Technological Project Foundation under grant No.2007B01020044
文摘In many real world planning domains, some observation information is optional and useless to the execution of a plan, and the information acquisition may require some kind of cost. So it is significant to propose a framework for planning with extended goals under partial observability, which can adapt to the idea of observation reduction. In this paper, a method was proposed to solve the problem. The definition of structured plans was given, which can encode sequential, conditional and iterative behaviors, and are expressive enough for dealing with incomplete observation information and with extended goals. In order to express extended goals over sub-plans and observation information, the interpretation of basic propositions in K-CTL and EAGLE (two important languages for expressing temporal requirements in nondeterministic domains) was extended.
基金supported by Beijing Natural Science Foundation (contact no.4062010)
文摘Path planning is one of the most important problems in the design of a mobile robot.A novel approach called generalized Voronoi diagrams(GVD)may deal with this matter.First,a method was introduced to normalize the obstacles and present efficient techniques for generating GVDs.Then a best path searching algorithm was presented.Examples implemented were given to indicate the availability of the mentioned algorithms.The approaches in this paper can also be used in applications including visualization,spatial data manipulation,etc.
文摘Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.
基金Project (No. 2005C21025) supported by the Science and Technology Department of Zhejiang Province, China
文摘The wide use of Internet Service in distributed computing and e-business has made the evolution of Internet Service to be one of the most prevalent research fields in software development domain. Traditional methods for software development cannot adapt to the challenge of Internet Service oriented software development. In this paper, we propose a new paradigm for the evolution of Internet Service with active objects from the characteristics of Intemet Service and principles of active objects. The paradigm uses an automatic monitoring mechanism of active object to detect and process evolution requirement in system based on Internet Service.
基金This work is supported by National Natural Science Foundation of China (Grant No.60773093, 60873209, and 60970107), the Key Program for Basic Research of Shanghai (Grant No. 09JC1407900, 09510701600, 10511500100), IBM SUR Funding and IBM Research-China JP Funding, and Key Lab of Information Network Security, Ministry of Public Security.
文摘With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.
基金supported by the National Natural Science Foundation of China under Grant No. 6107311
文摘In the reputation modeling of wireless sensor networks(WSNs) many literatures have proposed creative reputation indirect update methods,such as reputation integration,discounting,aging to eliminate,and filtering malicious reputation information. However,few have discussed the reputation direct update. In this paper,based on sound statistical theories,a negative binominal distribution method in the reputation direct update for WSNs is proposed. Results show that the proposed method is more suitable and time-saving for the reputation update of the resource constraint WSNs and can improve the computation power efficiency as well.
基金This work is supported by the MIC ( Ministry of Information and Communication) , Korea ,under the ITRC (Information Technology Research Center) support program supervised by the IITA(Institute of Information Technolo-gy Assessment)
文摘Digital city, a large complex system, is comprised many subsystem of different fields. It involves common field data, flexible field processes, seamless intra-organization and inter-organization collaborations, and increasing connectivity and interoperability between distributed or decentralized systems. All above these are involved Foundation Data of Digital city. To promote the sustainable development of Digital City, this paper investigates to the construction of Foundation Data Platform (FDP) from the view of the architecture. The paper introduces the conceptions, characteristics and underlying problems of the FDP, and discusses the key issues of the architecture paradigms what FDP might adopted via comparing Object-Oriented Architecture (OOA), Component-Based Architecture (CBA), and Service-based Architecture (SBA). The Process Embedded Service-Oriented Architecture (SOA), one of the recent SOA Application Architecture is introduced. The results indicate that the Process Embedded SOA could promote the sustainable development of Digital City and accommodate the dynamic development environments of different fields which constantly changes requirements.
文摘The successful rate of transmission coordination of opportunistic routing (OK) is analyzea systematically, and then two efficient transmission coordination mechanisms (TCMs) are proposed for OR: a batch sliding window-based TCM and a bit map-based TCM, to reduce the total number of packet transmissions and improve end-to-end throughput for OR. The batch sliding window-based TCM avoids the oscillation of the successful rate of transmission coordination by transmitting packets in continuous batch mode so as to improve the average successful rate of transmission coordination efficiently, while the bit map-based TCM improves end-to-end throughput of OR by reducing the overhead of transmission coordination. Exhaustive simulations show that the average end-to-end throughput gains of the two proposed TCMs are 15.4% and 6.4% over the batch map-based TCM, respectively.
基金Funded by Chongqing High Tech Projects Foundation (No. 8277).
文摘The causality diagram theory, which adopts graphical expression of knowledge and direct intensity of causality, overcomes some shortages in belief network and has evolved into a mixed causality diagram methodology for discrete and continuous variable. But to give linkage intensity of causality diagram is difficult, particularly in many working conditions in which sampling data are limited or noisy. The classic learning algorithm is hard to be adopted. We used genetic algorithm to learn linkage intensity from limited data. The simulation results demonstrate that this algorithm is more suitable than the classic algorithm in the condition of sample shortage such as space shuttle’s fault diagnoisis.
文摘A new motion retargeting algorithm is presented, which adapts me motion capture data to a new character. To make the resulting motion realistic, the physically-based optimization method is adopted. However, the optimization process is difficult to converge to the optimal value because of high complexity of the physical human model. In order to address this problem, an appropriate simplified model automatically determined by a motion analysis technique is utilized, and then motion retargeting with this simplified model as an intermediate agent is implemented. The entire motion retargeting algorithm involves three steps of nonlinearly constrained optimization: forward retargeting, motion scaling and inverse retargeting. Experimental results show the validity of this algorithm.
文摘This paper proposes a self-adaptive approach to converting irregular genus-O meshes into those with subdivision connectivity. To assure a maximal utilization of the multiresolution techniques on the remesh, we map the original mesh onto the unit sphere and construct a base mesh with only four vertices. We also introduce a self-adaptive relocation operation, which is used to adapt the vertex distribution of the spherical subdivision mesh to that of the parameterized mesh, to improve the visual appearance of the remesh. The experimental results show that our method can not only make the number of irregular vertices in the remesh as small as possible, but also preserve the details of the original mesh well.
文摘The peer-to-peer(P2P) file-sharing network as a vehicle of disseminating files has become very popular. The appearance of dozens of kinds of passive worms on this network has, however, made it unsecured. This problem has been paid attention and a few of models for passive worm propagation has been presented. Unfortunately, the dynamic properties of this network are ignored in these models. Given the fact, the characteristics of both this network and the passive worm are identified, and on this basis a new mathematical model of passive worm propagation on the P2P network is presented in applying epidemiology in this paper. Note that the dynamic properties of this network are considered in the presented model. The model has been validated by large scale simulation experiments, which demonstrates that the presented model may be used for analyzing the behaviors of passive worms and predicting the trend of their propagation.
文摘A P2P scientific collaboration is a P2P network whose members can share documents, co-compile papers and codes, and communicate with each other instantly. From the simulation experiment we found that P2P collaboration system is a power-law network with a tail between -2 and -3.We utilized the algorithm that searches by high-degree shortcuts to improve the scalability of p2p collaboration system. The experimental result shows that the algorithm works better than random walk algorithm.