Loading...

Table of Content

    20 October 2007, Volume 13 Issue 5
    Articles
    Axiomatic Assessment of UML Statecharts-Based Test Adequacy Criteria
    MIAO Huai-kou;FEI Li-zhi
    2007, 13(5):  489-496 . 
    Asbtract ( 2268 )  
    Related Articles | Metrics
    This paper presents a set of test adequacy criteria for UML statecharts,and proposes two new test coverage criteria, N-transition coverage criteria, and classified loop coverage criteria. An axiomatic assessment system of test adequacy criteria is proposed to assess these test criteria. The UML statecharts-based software testing coverage criteria are assessed against the axioms system. From the assessment, testers can get conclusions that help them apply these criteria in practice. The assessment of test adequacy criteria will provide software engineers with a guide to apply each criterion.
    Scalable Parallel Algorithm of Block Tridiagonal Systems
    for Initial Boundary Value Problem
    ZHANG Wu;ZHANG Heng;
    2007, 13(5):  497-503 . 
    Asbtract ( 2228 )  
    Related Articles | Metrics
    A scalable parallel algorithm of block tridiagonal systems is discussed to solve initial boundary value problems of 2D-parabolic equation with the Dirichlet boundary condition. A parallel degree of the difference scheme is proposed to show the intrinsic parallelism of the difference scheme. The relation between the parallel degree and the performance of the parallel algorithm is investigated. The proposed method has been implemented on the supercomputer “ZiQiang 3000” of Shanghai University. The numerical results closely match the theoretical analysis. At given accuracy, the linear speedup rate is obtained, and parallel efficiency over 90% is reached.
    Remote Monitoring and Control of Sluice and Pump
    Based on Lonworks and Web Server
    CHEN Yi-min;QIN Ting-gao;WANG Xiao-wei
    2007, 13(5):  504-510 . 
    Asbtract ( 2327 )  
    Related Articles | Metrics
    We introduce a monitoring and control system for sluice and pump based on Lonworks and Web Server, and describe the hardware and software structure and functions. Application and communication software is developed with VC++ and based on Web service. According to the real-time-circs in water-level, precipitation-rain-fall, sluice-turn-on-level, water-pump-flux and combining geography, and weather information of chief sluices, we have developed the sluice and pump monitoring and control system. We introduce the water-power-quality math-model and its usage. Depending on the expert decision-making sustain-system, we can achieve intelligent control in sluice and water pump constructed by Shanghai Water Affair Authority.
    Human Face Detection Based on Cluster Skin Color Model
    DING You-dong;DU Xiao-feng;Li Xiao-qiang
    2007, 13(5):  511-515 . 
    Asbtract ( 2434 )  
    Related Articles | Metrics
    Human face localization and detection is often the first step in applications such as video surveillance and human-computer interface. In this paper,a skin color model based on cluster and a novel selection method of best limitvalue is presented. An algorithmic flow for human face skin color detection is proposed. Examples are given to show the improved detection speed of the proposed algorithm and its robustness.
    Simulations of 3D Pattern Formation Based on Lattice Boltzmann Method
    LI Qing;XU Xu-feng;ZHOU Mei-lian
    2007, 13(5):  516-518 . 
    Asbtract ( 2362 )  
    Related Articles | Metrics
    The lattice Bhatnagar-Gross-Krook (LBGK) model D3Q7 for reaction-diffusion equations is presented in this paper. By using this model, we simulate the three-dimensional Turing pattern and spiral waves in a chlorite-iodidemalonic acid (CIMA) system.

    Management Strategy of Data Bits in Ternary Optical Computer

    JIN Yi
    2007, 13(5):  519-523 . 
    Asbtract ( 2240 )  
    Related Articles | Metrics
    Due to the absence of interference between light beams, optical computers will have a larger number of data bits. As an example, some ternary logic optical operator models built in our laboratory use 360 ternary-bits. In order to effectively manage the ternary-bits, six strategies are presented in this paper. In establishing these strategies, four new concepts, i.e., calculating path, calculating channel, calculating path type and calculating channel type, are defined. Since these strategies have incorporated some concepts of memory management used in operating systems, their feasibility is assured.
    A Method of Simplifying Complexity of Mutation Testing
    XU Shi-yi
    2007, 13(5):  524-531 . 
    Asbtract ( 2228 )  
    Related Articles | Metrics
    In this paper, a new idea of conditional fault collapsing in software mutation testing is proposed based on the theory of fault dominance and equivalence long being used in hardware testing. The new technique proposed can be used in software mutation testing and can greatly reduce the number of injected faults in software so as to decrease the number of mutants, shorten the testing time in mutation testing. It is shown that the complexity of software testing can be simplified and the effectiveness of testing is improved directly. Experimental results have justified the technique proposed in the paper.
    Semantic Constraint Maintenance in Transformation
    between XML and Relations
    YE Fei-yue;LI Xia;ZHANG Bin
    2007, 13(5):  532-538 . 
    Asbtract ( 2238 )  
    Related Articles | Metrics
    Based on shared inlining, we present a lossless algorithm to map XML to relations according to XML FDs, which can denote the relative constraints. A new algorithm is proposed to reconstruct the original XML document, using a foreign key join and a path-mapping rule. We show that the normal forms of relations or XML documents after mapping have relations with the mapping algorithm with a normalization degree of original XML DTD or relations. XML normal forms are defined, and propositions and proofs are presented to study the relationship between XML normal forms and the corresponding forms of relations after mapping.
    Simulation and Implementation of SystemC Bus Model
    WU Yue;REN Zhi-qing;YANG Hong-bin
    2007, 13(5):  539-544 . 
    Asbtract ( 2377 )  
    Related Articles | Metrics
    We discuss a method for designing bus simulation model (BSM) with SystemC. The BSM is constructed using the interface method cell (IMC). The BSM achieves the bus functions, and is equipped with several types of device interfaces to provide good expandability.
    Parallel Training Strategy Based on Support Vector Machine
    LEI Yong-mei;WANG Xiong;GUO Heng-ming;JIN Heng-ke
    2007, 13(5):  545-549 . 
    Asbtract ( 2161 )  
    Related Articles | Metrics
    We propose a parallel training strategy, which is an improved parallel algorithm of support vector machine (SVM), to shorten the training time based on SVM's classification. The strategy uses the master-salve mode and divides the whole training task into several subtasks, each sub-task computed by a node. The master node collects the training results from slave nodes to produce the classifiable model. Performance of this algorithm is analyzed and evaluated with sparse and dense dataset on a high-performance computer ZQ3000 cluster. The results indicate that the proposed method can ensure high precision in the original multi-classification and reduce training time.
    Time-Fusion Based on Time-Series Mining and
    Application of Sea Surface Temperature Forecast
    XU Ling-yu;FANG Xiaojun;XU Renjie;SHEN Liwei
    2007, 13(5):  550-553 . 
    Asbtract ( 2213 )  
    Related Articles | Metrics
    We use a time-series mining algorithm to fuse the dynamic sea surface temperature (SST) data in order to predict the future values and the trend. An improved method is proposed that uses the parabola regression model to forecast the future SST values based on median smooth and a threshold limit. By modification to the judgment of inflection points, the parabola regression model is improved in the trend prediction. Experiments show that the improved method has a better effect on the forecast of the slowly varying dynamic SST data.
    Automatic Image Acquisition for ID Card
    XU Hua-hu;WANG Hui-ya;WAN Jie;GAO Jue;XU Lin
    2007, 13(5):  554-559 . 
    Asbtract ( 3360 )  
    Related Articles | Metrics
    Automatic image acquisition software for the secondgeneration ID cards is developed. The software consists of four parts: digital video recording, graph processing, photo output, and storage. This paper presents a detailed description in image processing and studies edge detection for image enhancement, segmentation and feature extraction.
    Reusable Monitor of Testbench
    YANG Hong-bin;HAN Xia;WU Yue
    2007, 13(5):  560-565 . 
    Asbtract ( 2126 )  
    Related Articles | Metrics
    With the increasing complexity of SoC, functional verification and development of the verification platform has become a bottleneck in designing and developing electronic products. A transaction-based and reusable verification platform is an effective method to realize effective functional verification. This paper describes transaction-based verification based on the reusable methodology, and presents a new design method for monitor which separates physical signals and the data, and transforms the signal and data into transaction description for efficient verification and efficient construction of the verification platform.
    Attribute Reduction and Rule Extraction for Earthquake Data
    Based on Dominance Relation Rough Set
    WU Shao-chun;ZHENG Yu;WU Geng-feng;ZHU Bing-bing
    2007, 13(5):  566-570 . 
    Asbtract ( 2218 )  
    Related Articles | Metrics
    After discussing the classical rough set theory based on indiscemibility relation and its reduction algorithms on earthquake data, we present a new definition of dominance discemibility matrix by taking advantage of the unique characteristic of the extended model. The corresponding reduction and rule extraction algorithms are then given accordingly to enhance efficiency in seeking the reduction to some extent. We use the rough set theory based on dominance relation to get 272 rules with realistic meaning from 44 381 items in a small set of earthquake data of China.
    Image Similarity Based on Hierarchical Wavelet Transform
    DING Guang-tai;WANG Wei
    2007, 13(5):  571-577 . 
    Asbtract ( 2367 )  
    Related Articles | Metrics
    Scalar relationship between wavelet transforms of two subimages from two different images is discussed. Image similarity based on this relationship is defined and studied. Hierarchical wavelet transform of a local area (subimage) is demonstrated using the matrix form of wavelet transform. Based on the hierarchical wavelet transforms, linear similarity of two images of a particular type of medical images such as CT and MRI and a k-form wavelet similarity measure are discussed. The algorithm for computing similarity of two sub-images is analyzed. Numerical calculation shows effectiveness of the described similarity calculation, especially for medical images.
    An Approach to Verification of Web Application Design
    ZENG Hong-wei;MIAO Huai-kou
    2007, 13(5):  578-582 . 
    Asbtract ( 2181 )  
    Related Articles | Metrics
    A formal model representing the navigation behavior of a Web application as a Kripke structure is proposed, and an approach that applies the model checking technique to verify Web application design is presented. A collection of properties that a Web application should satisfy is specified in CTL formulas, and then model checked against the formal model by using model checker NuSMV. A prototype that embeds the NuSMV verifier automatically parses the XMI output of UML tool and builds the NuSMV program.
    Description and Implementation of Component Dependency
    CAO Min;YUAN Shi-zhong
    2007, 13(5):  583-587 . 
    Asbtract ( 2159 )  
    Related Articles | Metrics
    Techniques that build distributed applications with reusable components are increasingly adopted. However, these components are developed by different programmers either in homogeneous or heterogeneous environments, with different methodology. It is hardly to build a robust and efficient system unless component dependency is clearly described. This paper represents a novel approach to describe the static component dependency. An event-based mechanism is also designed for dynamic change of component dependency. We have implemented a prototype using the proposed model. It has been shown that the approach combines both static and dynamic dependency.
    Role-Based Access Control Model with Enhanced Constraints
    ZHOU Ming;ZENG Jun-dong;CAI YU-hua
    2007, 13(5):  588-592 . 
    Asbtract ( 2266 )  
    Related Articles | Metrics
    The mechanism of constraint in NIST standard of role-based access control (RBAC) is analyzed. To resolve the problem of shortages of constraints in the authorization process and accessing objects process, a novel RBAC model with enhanced constraints is proposed by extending the constraints and mapping true-life operation that has constrainted capability into RBAC model. The formalization definitions of the new model are presented and its security analyzed.
    Open System Framework for Economical Operation of Power Plants
    XIN Ming-jun;ZHANG Li-qiang;QIAO Xin;SU Qing
    2007, 13(5):  593-597 . 
    Asbtract ( 2106 )  
    Related Articles | Metrics
    Using dummy unit modeling with distributed components and real-time data processing, we propose an open system framework to support economic operation of power plants. Key modules are implemented by using the framework for such functions as economical operation analysis, cost accounting, real-time data processing, fuel and equipment management, information briefing and human-machine interaction. As a case study, coal consumption of a thermal power plant is analyzed, showing that the key modules work normally in a distributed computing environment. The system can provide technical support for power plants in resource allocation and economical operation.
    Feature Selection for Ensemble Learning
    LI Guo-zheng;LI Dan
    2007, 13(5):  598-604 . 
    Asbtract ( 2531 )  
    Related Articles | Metrics
    Ensemble learning and feature selection are hot topics in machine learning studies. The improvement of generalization performance of individuals comes primarily from the diversity caused by re-sampling the training set. Feature selection for ensemble learning can also improve diversity in three aspects: feature selection for individuals, selective ensemble learning, and multitask learning. This paper gives an overview of feature selection methods for ensemble learning in recent years, and summarize some general techniques useful in the further studies.
    Coding and Location Algorithm of Knowledge Map
    LUO Xiang-feng;YU Zhi-an;HU Qing-liang;CHEN Bo
    2007, 13(5):  605-610 . 
    Asbtract ( 2503 )  
    Related Articles | Metrics
    Hash based method to code the domain direction of knowledge map (KM) is proposed in order to form a domain direction island. The coding methods with KM concept vector and relation types between concepts are proposed. Base on the coding method, chord in peer to peer is used to perform a fast location of the vast number islands. C-location and R-location are proposed to carry on a fast location of KM within domain direction under the control of island. The island can cluster KM with the same domain direction automatically. Computations of instances show that the proposed method can perform valid coding and precise location of KM and have better flexibility.
    Message Passing Mechanism and Routing Algorithm in Message
    ZHU Yong-hua;YAO Hong;XU Wei-ming
    2007, 13(5):  611-616 . 
    Asbtract ( 2456 )  
    Related Articles | Metrics
    Message passing interconnection networks are widely used under various conditions, with the scales ranging from VLSI internal bus to WAN. In this paper, message passing mechanism and routing algorithm in a message passing interconnection network—3D-torus interconnection network are discussed. A combination of DOR and partial adaptive routing algorithm with deadlock-free and livelock-free characteristics are presented. Two typical message-passing mechanisms, virtual cut-through and store-and-forward, are investigated to evaluate the performance. Test and comparison between the message passing mechanisms and routing algorithms in a simulator of 3D-torus topology show that the proposed partial adaptive routing algorithm can improve the network performance in terms of transmission latency and throughput, and also show that different message passing mechanisms will definitively affect the network transmission efficiency.
    Proxy Signature Scheme with Controlled Proxy Signing Capability
    DAI Jia-zhu;LI Shi-hui;NIU Zhi-hua
    2007, 13(5):  617-622 . 
    Asbtract ( 2867 )  
    Related Articles | Metrics
    To avoid abuse of proxy signing capabilities is a key problem in proxy signature. A proxy signature scheme with controlled proxy signing capability is proposed. In this scheme, the proxy signing times are designated by an original signer when he delegates his signing capability to the proxy signer. The proxy signer is unable to sign on behalf of the original signer for more than the designated proxy signing times, but it is easy for the original signer to revoke the proxy signing capability when needed. The proposed scheme can be used in electronic commerce and other fields.
    Feature Weighting based Ensemble of Adaptive Resonance
    Theory Networks and Its Application
    LIU Yue;WU Geng-feng;DING Zhi-guo;
    2007, 13(5):  623-628 . 
    Asbtract ( 2362 )  
    Related Articles | Metrics
    Generalization ability is a principal issue in the field of machine learning. Feature weighting is a general case of feature selection, which has the potential of performing better (or at least similar) feature selection. This paper proposes a new ensemble method named FWEART (Feature Weighting based Ensemble of Adaptive Resonance Theory networks), in which an adaptive genetic algorithm is used to conduct a search for the weight vector that can optimize the classification accuracy of the individual Category ART networks. Furthermore, the generalization ability of the ensemble is improved. Experiments on the UCI datasets show that FWEART has good generalization ability. Finally, FWEART is applied to predict the types of earthquake. The result is satisfactory.
    Grid Resource Selection Strategy Based on an Adaptive
    Parallel Genetic Algorithm
    WU Pin;LI Jian-dun;LIU Quan-sheng;LI Song-bei
    2007, 13(5):  629-633 . 
    Asbtract ( 2347 )  
    Related Articles | Metrics
    With a large amount of computer resources becoming available in the network, grid can been used to handle a single problem simultaneously. Selecting more than one outstanding resource from numerous resources is an NP problem. In this paper, a new adaptive parallel genetic algorithm (NAPGA) is proposed, with which parallel model simulation of the grid resources selection strategy on C+MPI platform is made. The result indicates that the algorithm can effectively solve the problem of premature convergence, and produce results that are better than a new improved parallel genetic algorithm (NIPGA). Searching and converging disciplinarian of genetic algorithm are discussed.
    Efficient Identity-Based Blind Signature Scheme
    NIU Zhi-hua;ZHAO Ding
    2007, 13(5):  634-639 . 
    Asbtract ( 2076 )  
    Related Articles | Metrics
    Recently, use of bilinear pairing such as Weil pairing or Tate pairing on elliptic and hyperelliptic curves in cryptography has attracted considerable attention. Several identity-based cryptosystems using bilinear pairings of elliptic or hyperelliptic curves have been presented. This paper proposes a new efficient identity-based blind signature scheme based on the bilinear pairings. The scheme uses identity-based public key instead of digital certification public key. It can omit the process of getting the public key from the system in verifying phase, improve efficiency of the system and reduce the storage space, and also analyze its security and efficiency.
    Intuitive and Quantitative Color Space Comparison for Skin Detection
    FANG Yu-chun
    2007, 13(5):  639-646 . 
    Asbtract ( 2360 )  
    Related Articles | Metrics
    Skin color is important in image retrieval, face analysis and gesture analysis. Performance of skin detection is determined by the color space used. Histograms to visualize the specific distribution of skin samples in 2- and 3-dimensional color spaces are adopted. An evaluation function is proposed based on the Fisher's criterion to perform a quantitative analysis between skin and nonskin samples. The comparison result is validated by the verification experiment with Gaussian model. Through such intuitive observation and quantitative comparisons, better general color spaces are obtained for skin detection.