Circles packing problem is an NP-hard problem and is di?cult to solve. In this paper, ahybrid search strategy for circles packing problem is discussed. A way of generating new configurationis presented by simulating t...Circles packing problem is an NP-hard problem and is di?cult to solve. In this paper, ahybrid search strategy for circles packing problem is discussed. A way of generating new configurationis presented by simulating the moving of elastic objects, which can avoid the blindness of simulatedannealing search and make iteration process converge fast. Inspired by the life experiences of people,an e?ective personified strategy to jump out of local minima is given. Based on the simulatedannealing idea and personification strategy, an e?ective personified annealing algorithm for circlespacking problem is developed. Numerical experiments on benchmark problem instances show thatthe proposed algorithm outperforms the best algorithm in the literature.展开更多
An open-loop fiber optic gyro (FOG) testing system is designed. The noise characteristic of open-loop fiber optic gyro signals is analyzed. The wavelet eliminating noise method is discussed and compared with other met...An open-loop fiber optic gyro (FOG) testing system is designed. The noise characteristic of open-loop fiber optic gyro signals is analyzed. The wavelet eliminating noise method is discussed and compared with other methods, such as smoothing and low-pass filter methods. Results indicate that the wavelet eliminating noise method can satisfy the measuring demand of the FOG weak output signal with noise disturbing. The wavelet analysis method can efficiently eliminate the noise and reserve the information of the signal. The eliminating noise effect of using different wavelet base functions is compared. The effectiveness of multiresolution wavelet analyses of eliminating noise is proved by experimental results.展开更多
An improved heuristic ant-clustering algorithm(HAC)is presented in this paper.A device of ’memory bank’ is proposed,which can bring forth heuristic knowledge guiding ant to move in the bi-dimension grid space.The de...An improved heuristic ant-clustering algorithm(HAC)is presented in this paper.A device of ’memory bank’ is proposed,which can bring forth heuristic knowledge guiding ant to move in the bi-dimension grid space.The device lowers the randomness of ants’ moving and avoids the producing of"un-assigned data object".We have made some experiments on real data sets and synthetic data sets.The results demonstrate that HAC has superiority in misclassification error rate and runtime over the classical algorithm.展开更多
Genomes are dynamic entities that evolve over time where the cumulative effects of small-scale sequence alterations caused by mutation play an important role. Mutations result either from errors in DNA replication or ...Genomes are dynamic entities that evolve over time where the cumulative effects of small-scale sequence alterations caused by mutation play an important role. Mutations result either from errors in DNA replication or from the damaging effects of mutagens such as chemicals and radiation that react with DNA and change展开更多
As the combining form of the orthogonal frequency-division multiplexing (OFDM) technique and the vertical Bell Labs layered space-time (V-BLAST) architecture, the V-BLAST OFDM system can better meet the demand of next...As the combining form of the orthogonal frequency-division multiplexing (OFDM) technique and the vertical Bell Labs layered space-time (V-BLAST) architecture, the V-BLAST OFDM system can better meet the demand of next-generation (NextG) broadband mobile wireless multimedia communications. The symbols detection problem of the V-BLAST OFDM system is investigated under the frequency-selective fading environment. The joint space-frequency demultiplexing operation is proposed in the V-BLAST OFDM system. Successively, one novel half-rate rotational invariance joint space-frequency coding scheme for the V-BLAST OFDM system is proposed. By elegantly exploiting the above rotational invariance property, we derive one direct symbols detection scheme without knowing channels state information (CSI) for the frequency-selective V-BLAST OFDM system. Extensive simulation results demonstrate the validity of the novel half-rate rotational invariance joint space-frequency coding scheme and the performance of the direct symbols detection scheme.展开更多
In this paper, a mechanism of bi-directional proxy is proposed, which supports authentication based on identity, and endue different users with different network access permissions. This technology is purposed with a ...In this paper, a mechanism of bi-directional proxy is proposed, which supports authentication based on identity, and endue different users with different network access permissions. This technology is purposed with a new idea towards the implementation of network security, which has a promising future in applications. Key words network security - firewall - bi-directional proxy server - identity authentication CLC number TP 368.5 Foundation item: Supported by the National Natural Science Foundation of China (60173051), The National Research Foundation for the Doctoral Program of Higher Education of China (20030145029). Teaching and Research Award Program for Outstanding Young Teachers in Higher Education Institution of the Ministry of Education; National 863 High-tech Program (2003AA414210)Biography: GAO Fu-xiang (1961-), male, Professor, Master, research direction: computer network security.展开更多
To construct a high efficient text clustering algorithm the multilevel graph model and the refinement algorithm used in the uncoarsening phase is discussed. The model is applied to text clustering. The performance of ...To construct a high efficient text clustering algorithm the multilevel graph model and the refinement algorithm used in the uncoarsening phase is discussed. The model is applied to text clustering. The performance of clustering algorithm has to be improved with the refinement algorithm application. The experiment result demonstrated that the multilevel graph text clustering algorithm is available. Key words text clustering - multilevel coarsen graph model - refinement algorithm - high-dimensional clustering CLC number TP301 Foundation item: Supported by the National Natural Science Foundation of China (60173051)Biography: CHEN Jian-bin(1970-), male, Associate professor, Ph. D., research direction: data mining.展开更多
Program slicing can be effectively used to debug, test, analyze, understand and maintain objectoriented software. In this paper, a new slicing model is proposed to slice Java programs based on their inherent hierarchi...Program slicing can be effectively used to debug, test, analyze, understand and maintain objectoriented software. In this paper, a new slicing model is proposed to slice Java programs based on their inherent hierarchical feature. The main idea of hierarchical slicing is to slice programs in a stepwise way, from package level, to class level, method level, and finally up to statement level. The stepwise slicing algorithm and the related graph reachability algorithms are presented, the architecture of the Java program Analyzing TOol (JATO) based on hierarchical slicing model is provided, the applications and a small case study are also discussed. Keywords software engineering - hierarchical model - program slicing - JAVA - stepwise algorithm - JATO This work is supported by the National Natural Science Foundation of China under Grant No.60473065 and the Outstanding Youth Teacher Support Foundation of Southeast University under Grant No.4009001011.Bi-Xin Li is a professor in Southeast University from Jan., 2004. He received the Ph.D. degree in computer software and theory from Nanjing University in 2001. From Apr. 2001 to Apr. 2002, he worked at TUCS (Turku Center for Computer Science) for one year as a post-doctoral researcher. From Apr. 2002 to Dec. 2003, he worked. at Department of Computer and Information Science, NTNU (Norwegian University of Science and Technology), and CWI (the Centrum voor Wiskunde en Informatica), both as an ERCIM Fellow. His current research interests include software construction, software testing, SQA techniques, software architecture and component techniques, safety-critical system and formal verification, etc.Xiao-Cong Fan is a senior researcher in the Inteligent Agent Lab of the Pennsylvania State University from 2002. He received the Ph.D. degree from Nanjing University in 1999. From 2000 to 2002, he worked at the turku Centre for Computer Science and the Computer Science Department of Abo Akademi University in Finland, where he participated in the projects SOCOS and SPROUT, which developed a methodology for software platform construction based on the Refinement Calculus. He currently works on formal agent theories in teamwork, and projects for applying these theories.Jun Pang is now a Ph.D. candidate in CWI, the Netherlands. He received the B.Sc. and M.Sc. degrees in computer science from Nanjing University, China, in 1997 and 2000. His research interests include protocol verification, process algebra, safety critical systems, security, testing, software architecture etc.Jian-Jun Zhao is an associate professor of computer science at Fukuoka Institute of Technology, Japan. He received the B.S. degree in computer science from Tsinghua University, China, in 1987, and the Ph.D. degree in computer science from Kyushu University, Japan, in 1997. His research interests include program analysis and compiler, software architecture analysis, aspect-oriented software development, and ubiquitous computing environment.展开更多
In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special si...In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.展开更多
Required by the application in the investigation of the Cauchy integral operators on Lipschitzsurfaces, the classical martingales are generalized to ones defined with respect to Clifford algebravalued measures. Meanwh...Required by the application in the investigation of the Cauchy integral operators on Lipschitzsurfaces, the classical martingales are generalized to ones defined with respect to Clifford algebravalued measures. Meanwhile, very general Φ-equivalences between S(f) and f* , the same as inthe classical case, are established too.展开更多
Distributed research & academic gigabits open network lab (DRAGON-lab) is the only test-bed for research purpose related to next generation interact (NGI) which based on the confederation network using three laye...Distributed research & academic gigabits open network lab (DRAGON-lab) is the only test-bed for research purpose related to next generation interact (NGI) which based on the confederation network using three layers cloud structure. As an essential part of NGI, the research related to the Internet of things (loT) devices should be applied on the DRAGON-lab platform. This paper proposes an approach to converging the IoT devices to confederation network by integrating each layer of cloud structure between DRAGON-lab and IoT. This research activity extends the use of DRAGON-lab, makes the IoT and wireless sensor network (WSN) devices working well in the confederation network. It was also a foundational research for three layers cloud structure, which could be reused for other related research. Finally, it finishes the preparation work for IoT internet protocol version 6 (IPv6) devices research in DRAGON-Jab, which is essential for the NGI.展开更多
Both the cross and road section are basic components in traffic systems. Ageneral cellular automaton model of two-dimensional traffic flow containing road section wasestablished. The model was simulated with respect t...Both the cross and road section are basic components in traffic systems. Ageneral cellular automaton model of two-dimensional traffic flow containing road section wasestablished. The model was simulated with respect to various section lengths and the randomdistribution of section lengths. The effect of road sections on the performance of traffic flow wasdiscussed based on simulation results展开更多
A general theory on charges relaxation process in particle-fluid systems is introduced in this article. The method to derive analytical solutions for the charge relaxation equation is illustrated, and some respects fo...A general theory on charges relaxation process in particle-fluid systems is introduced in this article. The method to derive analytical solutions for the charge relaxation equation is illustrated, and some respects for this theory are discussed in detail.展开更多
文摘Circles packing problem is an NP-hard problem and is di?cult to solve. In this paper, ahybrid search strategy for circles packing problem is discussed. A way of generating new configurationis presented by simulating the moving of elastic objects, which can avoid the blindness of simulatedannealing search and make iteration process converge fast. Inspired by the life experiences of people,an e?ective personified strategy to jump out of local minima is given. Based on the simulatedannealing idea and personification strategy, an e?ective personified annealing algorithm for circlespacking problem is developed. Numerical experiments on benchmark problem instances show thatthe proposed algorithm outperforms the best algorithm in the literature.
文摘An open-loop fiber optic gyro (FOG) testing system is designed. The noise characteristic of open-loop fiber optic gyro signals is analyzed. The wavelet eliminating noise method is discussed and compared with other methods, such as smoothing and low-pass filter methods. Results indicate that the wavelet eliminating noise method can satisfy the measuring demand of the FOG weak output signal with noise disturbing. The wavelet analysis method can efficiently eliminate the noise and reserve the information of the signal. The eliminating noise effect of using different wavelet base functions is compared. The effectiveness of multiresolution wavelet analyses of eliminating noise is proved by experimental results.
文摘An improved heuristic ant-clustering algorithm(HAC)is presented in this paper.A device of ’memory bank’ is proposed,which can bring forth heuristic knowledge guiding ant to move in the bi-dimension grid space.The device lowers the randomness of ants’ moving and avoids the producing of"un-assigned data object".We have made some experiments on real data sets and synthetic data sets.The results demonstrate that HAC has superiority in misclassification error rate and runtime over the classical algorithm.
文摘Genomes are dynamic entities that evolve over time where the cumulative effects of small-scale sequence alterations caused by mutation play an important role. Mutations result either from errors in DNA replication or from the damaging effects of mutagens such as chemicals and radiation that react with DNA and change
文摘As the combining form of the orthogonal frequency-division multiplexing (OFDM) technique and the vertical Bell Labs layered space-time (V-BLAST) architecture, the V-BLAST OFDM system can better meet the demand of next-generation (NextG) broadband mobile wireless multimedia communications. The symbols detection problem of the V-BLAST OFDM system is investigated under the frequency-selective fading environment. The joint space-frequency demultiplexing operation is proposed in the V-BLAST OFDM system. Successively, one novel half-rate rotational invariance joint space-frequency coding scheme for the V-BLAST OFDM system is proposed. By elegantly exploiting the above rotational invariance property, we derive one direct symbols detection scheme without knowing channels state information (CSI) for the frequency-selective V-BLAST OFDM system. Extensive simulation results demonstrate the validity of the novel half-rate rotational invariance joint space-frequency coding scheme and the performance of the direct symbols detection scheme.
文摘In this paper, a mechanism of bi-directional proxy is proposed, which supports authentication based on identity, and endue different users with different network access permissions. This technology is purposed with a new idea towards the implementation of network security, which has a promising future in applications. Key words network security - firewall - bi-directional proxy server - identity authentication CLC number TP 368.5 Foundation item: Supported by the National Natural Science Foundation of China (60173051), The National Research Foundation for the Doctoral Program of Higher Education of China (20030145029). Teaching and Research Award Program for Outstanding Young Teachers in Higher Education Institution of the Ministry of Education; National 863 High-tech Program (2003AA414210)Biography: GAO Fu-xiang (1961-), male, Professor, Master, research direction: computer network security.
文摘To construct a high efficient text clustering algorithm the multilevel graph model and the refinement algorithm used in the uncoarsening phase is discussed. The model is applied to text clustering. The performance of clustering algorithm has to be improved with the refinement algorithm application. The experiment result demonstrated that the multilevel graph text clustering algorithm is available. Key words text clustering - multilevel coarsen graph model - refinement algorithm - high-dimensional clustering CLC number TP301 Foundation item: Supported by the National Natural Science Foundation of China (60173051)Biography: CHEN Jian-bin(1970-), male, Associate professor, Ph. D., research direction: data mining.
文摘Program slicing can be effectively used to debug, test, analyze, understand and maintain objectoriented software. In this paper, a new slicing model is proposed to slice Java programs based on their inherent hierarchical feature. The main idea of hierarchical slicing is to slice programs in a stepwise way, from package level, to class level, method level, and finally up to statement level. The stepwise slicing algorithm and the related graph reachability algorithms are presented, the architecture of the Java program Analyzing TOol (JATO) based on hierarchical slicing model is provided, the applications and a small case study are also discussed. Keywords software engineering - hierarchical model - program slicing - JAVA - stepwise algorithm - JATO This work is supported by the National Natural Science Foundation of China under Grant No.60473065 and the Outstanding Youth Teacher Support Foundation of Southeast University under Grant No.4009001011.Bi-Xin Li is a professor in Southeast University from Jan., 2004. He received the Ph.D. degree in computer software and theory from Nanjing University in 2001. From Apr. 2001 to Apr. 2002, he worked at TUCS (Turku Center for Computer Science) for one year as a post-doctoral researcher. From Apr. 2002 to Dec. 2003, he worked. at Department of Computer and Information Science, NTNU (Norwegian University of Science and Technology), and CWI (the Centrum voor Wiskunde en Informatica), both as an ERCIM Fellow. His current research interests include software construction, software testing, SQA techniques, software architecture and component techniques, safety-critical system and formal verification, etc.Xiao-Cong Fan is a senior researcher in the Inteligent Agent Lab of the Pennsylvania State University from 2002. He received the Ph.D. degree from Nanjing University in 1999. From 2000 to 2002, he worked at the turku Centre for Computer Science and the Computer Science Department of Abo Akademi University in Finland, where he participated in the projects SOCOS and SPROUT, which developed a methodology for software platform construction based on the Refinement Calculus. He currently works on formal agent theories in teamwork, and projects for applying these theories.Jun Pang is now a Ph.D. candidate in CWI, the Netherlands. He received the B.Sc. and M.Sc. degrees in computer science from Nanjing University, China, in 1997 and 2000. His research interests include protocol verification, process algebra, safety critical systems, security, testing, software architecture etc.Jian-Jun Zhao is an associate professor of computer science at Fukuoka Institute of Technology, Japan. He received the B.S. degree in computer science from Tsinghua University, China, in 1987, and the Ph.D. degree in computer science from Kyushu University, Japan, in 1997. His research interests include program analysis and compiler, software architecture analysis, aspect-oriented software development, and ubiquitous computing environment.
文摘In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.
文摘Required by the application in the investigation of the Cauchy integral operators on Lipschitzsurfaces, the classical martingales are generalized to ones defined with respect to Clifford algebravalued measures. Meanwhile, very general Φ-equivalences between S(f) and f* , the same as inthe classical case, are established too.
文摘Distributed research & academic gigabits open network lab (DRAGON-lab) is the only test-bed for research purpose related to next generation interact (NGI) which based on the confederation network using three layers cloud structure. As an essential part of NGI, the research related to the Internet of things (loT) devices should be applied on the DRAGON-lab platform. This paper proposes an approach to converging the IoT devices to confederation network by integrating each layer of cloud structure between DRAGON-lab and IoT. This research activity extends the use of DRAGON-lab, makes the IoT and wireless sensor network (WSN) devices working well in the confederation network. It was also a foundational research for three layers cloud structure, which could be reused for other related research. Finally, it finishes the preparation work for IoT internet protocol version 6 (IPv6) devices research in DRAGON-Jab, which is essential for the NGI.
文摘Both the cross and road section are basic components in traffic systems. Ageneral cellular automaton model of two-dimensional traffic flow containing road section wasestablished. The model was simulated with respect to various section lengths and the randomdistribution of section lengths. The effect of road sections on the performance of traffic flow wasdiscussed based on simulation results
文摘A general theory on charges relaxation process in particle-fluid systems is introduced in this article. The method to derive analytical solutions for the charge relaxation equation is illustrated, and some respects for this theory are discussed in detail.