In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devic...In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devices and provides the block I/O services as SAN. To overcome the drawbacks from FC, we employ iSCSI to implement the USN( Unified Storage Network) . To evaluate whether iSCSI is more suitable for implementing the USN, we analyze iSCSI protocol and compare it with FC protocol from several components of a network protocol which impact the performance of the network. From the analysis and comparison, we can conclude that the iSCSI is more suitable for implementing the storage network than the FC under condition of the wide-area network. At last, we designed two groups of experiments carefully.展开更多
In many engineering applications, it is necessary to calculate the min-area encasing box of a circumscription. In this paper, an algorithm for generating the min-area rectangle encasing box, based on revolving angle, ...In many engineering applications, it is necessary to calculate the min-area encasing box of a circumscription. In this paper, an algorithm for generating the min-area rectangle encasing box, based on revolving angle, is investigated and hence put forward. The algorithm computes the areas of the outer rectangular bounds of a closed contour in different revolving angles θ by dispersing approach where 0< θ < π/2 because of the axial symmetry. It is very simple, straight forward and highly efficient. The complexity of its computing time reaches O(n·k ). Practical applications suggest its usefulness and efficiency.展开更多
In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (...In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (k, n) threshold cryptography, Each node, whetherclusterhead or ordinary member, holds a share of the global certificate, and any k nodes cancommunicate securely. There is no need for any clusterhead to execute extra functions more thanrouting. Our scheme needs some prior configuration before deployment, and can be used in criticalenvironment with small scale. The security-enhancement for Lowest-ID algorithm can also be appliedinto other clustering approaches with minor modification. The feasibility of this method wasverified bythe simulation results.展开更多
A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to ...A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to sorting minutiae in order to speed up searching a minutia when pairing minutiae. The experimental result reveals that this method achieves improved recognition accuracy. Key words fingerprint matching - ridge-based minutiae matching - local relative orientation field - sorting minutiae CLC number TP 391 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: ZHU En (1976-), male, Ph. D candidate, research direction: pattern recognition, image processing and information security.展开更多
We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subje...We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to delay constraint on the aggregating path. We show that this problem is NP-hard and propose approximation algorithm proving the approximation ratio with lnm+1, where is the number of monitoring nodes. At last we extend our modal with more constraint of bounded delay variation. Key words network - distributed monitoring - delay constraint - NP-hard CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: LIU Xiang-hui(1973-), male, Ph. D. candidate, research direction: algorithm complexity analysis, QoS in Internet.展开更多
Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess ...Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess request is also given. In this model, we give themeasure of trustworthiness factor to access request- by using some idea of uncertainty reasoning ofexpert system, present and prove the parallel propagation formula of request trustworthiness factoramong multiple policies, and get thefinal trustworthiness factor to decide whether authorizing. Inthis model, authorization decision is given according to the calculation of request trustworthinessfactor, which is more understandable, more suitable for real requirement and more powerfulforsecurity enhancement than traditional methods. Meanwhile the finer access control granularity isanother advantage.展开更多
A novel construction algorithm is presented to generate a conforming Voronoi mesh for any planar straight line graph (PSLG). It is also extended to tesselate multiple-intersected PSLGs. All the algorithms are guarante...A novel construction algorithm is presented to generate a conforming Voronoi mesh for any planar straight line graph (PSLG). It is also extended to tesselate multiple-intersected PSLGs. All the algorithms are guaranteed to converge. Examples are given to illustrate its efficiency.展开更多
In this paper, digital image processing and computer vision techniques are applied to study tongue images for feature extraction with VC++ and Matlab. Extraction and analysis of the tongue surface features are based o...In this paper, digital image processing and computer vision techniques are applied to study tongue images for feature extraction with VC++ and Matlab. Extraction and analysis of the tongue surface features are based on shape, color, edge, and texture. The developed software has various functions and good user interface and is easy to use. Feature data for tongue image pattern recognition is provided, which form a sound basis for the future tongue image recognition.展开更多
This paper describes an application of a reusable mobile agent system in network management. A mobile agent reusable system is constructed to realize a new method in forming mobile agent systems. By using this method,...This paper describes an application of a reusable mobile agent system in network management. A mobile agent reusable system is constructed to realize a new method in forming mobile agent systems. By using this method, an agent can change its route dynamically without making any change to its specific behavior. By classifying mobile agents into two categories, the task agent can be reusable in different networks. In this way, a mobile agent system can easily carry out network management tasks.展开更多
A formal specification language iFL based on i* framework is presented in this paper to formally specify and analyze the early requirment of multi-agent system. It is a branching temporal logic which defines the conce...A formal specification language iFL based on i* framework is presented in this paper to formally specify and analyze the early requirment of multi-agent system. It is a branching temporal logic which defines the concepts and models in i* framework in a rigorous way. The method to transform the i* models to iFL formal specification is also put forward. Key words Agent - early requirement - logic - requirement engineering CLC number TP 18 Foundation item: Supported by the National Natural Science Foundation of China (60373022)Biography: MAO Xin-jun (1970-), male, Ph. D, Associate professor, research direction: object-agent software engineering, Agent theory.展开更多
This paper presents a new hybrid genetic algorithm for the vertex cover problems in which scan-repair and local improvement techniques are used for local optimization. With the hybrid approach, genetic algorithms are ...This paper presents a new hybrid genetic algorithm for the vertex cover problems in which scan-repair and local improvement techniques are used for local optimization. With the hybrid approach, genetic algorithms are used to perform global exploration in a population, while neighborhood search methods are used to perform local exploitation around the chromosomes. The experimental results indicate that hybrid genetic algorithms can obtain solutions of excellent quality to the problem instances with different sizes. The pure genetic algorithms are outperformed by the neighborhood search heuristics procedures combined with genetic algorithms.展开更多
Pulse coupled neural network (PCNN) has a specific feature that the fire of one neuron can capture its adjacent neurons to fire due to their spatial proximity and intensity similarity. In this paper, it is indicated t...Pulse coupled neural network (PCNN) has a specific feature that the fire of one neuron can capture its adjacent neurons to fire due to their spatial proximity and intensity similarity. In this paper, it is indicated that this feature itself is a very good mechanism for image filtering when the image is damaged with pep and salt (PAS) type noise. An adaptive filtering method, in which the noisy pixels are first located and then filtered based on the output of the PCNN, is presented. The threshold function of a neuron in the PCNN is designed when it is used for filtering random PAS and extreme PAS noise contaminated image respectively. The filtered image has no distortion for noisy pixels and only less mistiness for non-noisy pixels, compared with the conventional window-based filtering method. Excellent experimental results show great effectiveness and efficiency of the proposed method, especially for heavy-noise contaminated images.展开更多
Rare categories become more and more abundant and their characterization has received little attention thus far. Fraudulent banking transactions, network intrusions, and rare diseases are examples of rare classes whos...Rare categories become more and more abundant and their characterization has received little attention thus far. Fraudulent banking transactions, network intrusions, and rare diseases are examples of rare classes whose detection and characterization are of high value. However, accurate char- acterization is challenging due to high-skewness and non- separability from majority classes, e.g., fraudulent transac- tions masquerade as legitimate ones. This paper proposes the RACH algorithm by exploring the compactness property of the rare categories. This algorithm is semi-supervised in na- ture since it uses both labeled and unlabeled data. It is based on an optimization framework which encloses the rare exam- ples by a minimum-radius hyperball. The framework is then converted into a convex optimization problem, which is in turn effectively solved in its dual form by the projected sub- gradient method. RACH can be naturally kernelized. Experi- mental results validate the effectiveness of RACH.展开更多
In the past decade, the booming of Internet challenges the middleware in three aspects: quality of service,balance of changes and stabilization, and across-Internet integration. This paper presents our work on distrib...In the past decade, the booming of Internet challenges the middleware in three aspects: quality of service,balance of changes and stabilization, and across-Internet integration. This paper presents our work on distributed object computing middleware technology for these challenges, as well as the research and development on StarBus+, which is a CORBA standard-compliant middleware suite with the features such as object request broker supporting multi-* quality of service, component model, and integration with Web Service. This paper comprehensively presents the design and characteristics of StarBns+, and demonstrates how StarBus+ is enhanced to address the challenges of Internet computing through three case studies: inter-enterprise integration over Internet, application evolution through dynamic reconfiguration,and great massive information system building. The paper also suggests some research directions which are important for Internet computing.展开更多
Chinese-English machine translation is a significant and challenging problem in information processing.The paper presents an interlingua-based Chinese-English natural language translation system(ICENT).It introduces t...Chinese-English machine translation is a significant and challenging problem in information processing.The paper presents an interlingua-based Chinese-English natural language translation system(ICENT).It introduces the realization mechanism of Chinses language analysis,which contains syntactic parsing and semantic analyzing and gives the design of interlingua in details .Experimental results and system evaluation are given .The sesult is satisfying.展开更多
文摘In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devices and provides the block I/O services as SAN. To overcome the drawbacks from FC, we employ iSCSI to implement the USN( Unified Storage Network) . To evaluate whether iSCSI is more suitable for implementing the USN, we analyze iSCSI protocol and compare it with FC protocol from several components of a network protocol which impact the performance of the network. From the analysis and comparison, we can conclude that the iSCSI is more suitable for implementing the storage network than the FC under condition of the wide-area network. At last, we designed two groups of experiments carefully.
文摘In many engineering applications, it is necessary to calculate the min-area encasing box of a circumscription. In this paper, an algorithm for generating the min-area rectangle encasing box, based on revolving angle, is investigated and hence put forward. The algorithm computes the areas of the outer rectangular bounds of a closed contour in different revolving angles θ by dispersing approach where 0< θ < π/2 because of the axial symmetry. It is very simple, straight forward and highly efficient. The complexity of its computing time reaches O(n·k ). Practical applications suggest its usefulness and efficiency.
基金Supported by the National High Technology Re search and Development Program of China (2003AA142080)
文摘In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (k, n) threshold cryptography, Each node, whetherclusterhead or ordinary member, holds a share of the global certificate, and any k nodes cancommunicate securely. There is no need for any clusterhead to execute extra functions more thanrouting. Our scheme needs some prior configuration before deployment, and can be used in criticalenvironment with small scale. The security-enhancement for Lowest-ID algorithm can also be appliedinto other clustering approaches with minor modification. The feasibility of this method wasverified bythe simulation results.
文摘A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to sorting minutiae in order to speed up searching a minutia when pairing minutiae. The experimental result reveals that this method achieves improved recognition accuracy. Key words fingerprint matching - ridge-based minutiae matching - local relative orientation field - sorting minutiae CLC number TP 391 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: ZHU En (1976-), male, Ph. D candidate, research direction: pattern recognition, image processing and information security.
文摘We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to delay constraint on the aggregating path. We show that this problem is NP-hard and propose approximation algorithm proving the approximation ratio with lnm+1, where is the number of monitoring nodes. At last we extend our modal with more constraint of bounded delay variation. Key words network - distributed monitoring - delay constraint - NP-hard CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: LIU Xiang-hui(1973-), male, Ph. D. candidate, research direction: algorithm complexity analysis, QoS in Internet.
文摘Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess request is also given. In this model, we give themeasure of trustworthiness factor to access request- by using some idea of uncertainty reasoning ofexpert system, present and prove the parallel propagation formula of request trustworthiness factoramong multiple policies, and get thefinal trustworthiness factor to decide whether authorizing. Inthis model, authorization decision is given according to the calculation of request trustworthinessfactor, which is more understandable, more suitable for real requirement and more powerfulforsecurity enhancement than traditional methods. Meanwhile the finer access control granularity isanother advantage.
基金Supported by the Science Technology Development Program of Beijing Municipal Education Commission (KM200510011004)
文摘A novel construction algorithm is presented to generate a conforming Voronoi mesh for any planar straight line graph (PSLG). It is also extended to tesselate multiple-intersected PSLGs. All the algorithms are guaranteed to converge. Examples are given to illustrate its efficiency.
文摘In this paper, digital image processing and computer vision techniques are applied to study tongue images for feature extraction with VC++ and Matlab. Extraction and analysis of the tongue surface features are based on shape, color, edge, and texture. The developed software has various functions and good user interface and is easy to use. Feature data for tongue image pattern recognition is provided, which form a sound basis for the future tongue image recognition.
文摘This paper describes an application of a reusable mobile agent system in network management. A mobile agent reusable system is constructed to realize a new method in forming mobile agent systems. By using this method, an agent can change its route dynamically without making any change to its specific behavior. By classifying mobile agents into two categories, the task agent can be reusable in different networks. In this way, a mobile agent system can easily carry out network management tasks.
文摘A formal specification language iFL based on i* framework is presented in this paper to formally specify and analyze the early requirment of multi-agent system. It is a branching temporal logic which defines the concepts and models in i* framework in a rigorous way. The method to transform the i* models to iFL formal specification is also put forward. Key words Agent - early requirement - logic - requirement engineering CLC number TP 18 Foundation item: Supported by the National Natural Science Foundation of China (60373022)Biography: MAO Xin-jun (1970-), male, Ph. D, Associate professor, research direction: object-agent software engineering, Agent theory.
基金This project was supported by the National Natural Science Foundation of China the Open Project Foundation of Comput-er Software New Technique National Key Laboratory of Nanjing University.
文摘This paper presents a new hybrid genetic algorithm for the vertex cover problems in which scan-repair and local improvement techniques are used for local optimization. With the hybrid approach, genetic algorithms are used to perform global exploration in a population, while neighborhood search methods are used to perform local exploitation around the chromosomes. The experimental results indicate that hybrid genetic algorithms can obtain solutions of excellent quality to the problem instances with different sizes. The pure genetic algorithms are outperformed by the neighborhood search heuristics procedures combined with genetic algorithms.
基金supported by the National Natural Science Foundation of China(Grant Nos.60371044,60071026)the National Visiting Scholar Fund
文摘Pulse coupled neural network (PCNN) has a specific feature that the fire of one neuron can capture its adjacent neurons to fire due to their spatial proximity and intensity similarity. In this paper, it is indicated that this feature itself is a very good mechanism for image filtering when the image is damaged with pep and salt (PAS) type noise. An adaptive filtering method, in which the noisy pixels are first located and then filtered based on the output of the PCNN, is presented. The threshold function of a neuron in the PCNN is designed when it is used for filtering random PAS and extreme PAS noise contaminated image respectively. The filtered image has no distortion for noisy pixels and only less mistiness for non-noisy pixels, compared with the conventional window-based filtering method. Excellent experimental results show great effectiveness and efficiency of the proposed method, especially for heavy-noise contaminated images.
文摘Rare categories become more and more abundant and their characterization has received little attention thus far. Fraudulent banking transactions, network intrusions, and rare diseases are examples of rare classes whose detection and characterization are of high value. However, accurate char- acterization is challenging due to high-skewness and non- separability from majority classes, e.g., fraudulent transac- tions masquerade as legitimate ones. This paper proposes the RACH algorithm by exploring the compactness property of the rare categories. This algorithm is semi-supervised in na- ture since it uses both labeled and unlabeled data. It is based on an optimization framework which encloses the rare exam- ples by a minimum-radius hyperball. The framework is then converted into a convex optimization problem, which is in turn effectively solved in its dual form by the projected sub- gradient method. RACH can be naturally kernelized. Experi- mental results validate the effectiveness of RACH.
文摘In the past decade, the booming of Internet challenges the middleware in three aspects: quality of service,balance of changes and stabilization, and across-Internet integration. This paper presents our work on distributed object computing middleware technology for these challenges, as well as the research and development on StarBus+, which is a CORBA standard-compliant middleware suite with the features such as object request broker supporting multi-* quality of service, component model, and integration with Web Service. This paper comprehensively presents the design and characteristics of StarBns+, and demonstrates how StarBus+ is enhanced to address the challenges of Internet computing through three case studies: inter-enterprise integration over Internet, application evolution through dynamic reconfiguration,and great massive information system building. The paper also suggests some research directions which are important for Internet computing.
文摘Chinese-English machine translation is a significant and challenging problem in information processing.The paper presents an interlingua-based Chinese-English natural language translation system(ICENT).It introduces the realization mechanism of Chinses language analysis,which contains syntactic parsing and semantic analyzing and gives the design of interlingua in details .Experimental results and system evaluation are given .The sesult is satisfying.