scispace - formally typeset
Search or ask a question

Showing papers in "Application Research of Computers in 2003"


Journal Article
TL;DR: The background and general framework of CORBA Component Model from Enterprise Requirement to distributed middleware development is described and particular analysis to model's main section and steps for implementing a component are given.
Abstract: This paper describes the background and general framework of CORBA Component Model from Enterprise Requirement to distributed middleware developmentIt gives particular analysis to model's main section and steps for implementing a component,so makes us clearer to basic concept and main idea of CORBA Component technology. 

126 citations


Journal Article
TL;DR: This paper presents EC feature implemented by the authors in the test model of the draft ITUT video coding standard H.26L, adopted and now included in the latest H. 26L reference software TML9.0.
Abstract: This paper presents EC feature implemented by the authors in the test model of the draft ITUT video coding standard H.26L.The selected EC algorithms are based on weighted pixel value averaging for INTRA pictures and boundarymatchingbased motion vector recovery for INTER pictures. The specific concealment strategy and some special methods, including handling of Bpictures, multiple reference frames and entire frame losses, are described. Both subjective and objective results are given based on simulations under Internet conditions. The feature was adopted and is now included in the latest H.26L reference software TML9.0.

121 citations


Journal Article
TL;DR: Its applications in some basic areas: function optimization, neural network training and fuzzy control system are summarized and its potential application in computer aided process planning is proposed.
Abstract: A new optimizer-Particle Swarm Optimization(PSO) is introducedDevelopments in the PSO such as inertia weight,constriction factor,tracking and optimizing dynamic systems etc are reviewedThen,its applications in some basic areas:function optimization,neural network training and fuzzy control system are summarizedFollowing this,several important engineering application examples are givenFinally,the research and application of PSO in the future are pointed out and its potential application in computer aided process planning is proposed

44 citations


Journal Article
TL;DR: A method that based on semantic dependency relationship analysis to compute sentence similarity, and the experiment result of this method is satisfied.
Abstract: Sentence similarity computation is very important in all the fields of Natural Language Processing.In Multi-document Summarization Technology,sentence similarity computation is a key problem.As we know,a Chinese sentence can be presented by many kinds of style,if we want to describe what a sentence means,we should dip into the semantic level and consider about the dependency structure.In this paper,we applied a method that based on semantic dependency relationship analysis to compute sentence similarity,and the experiment result of this method is satisfied.

30 citations


Journal Article
TL;DR: This paper deals with how to make use of the Data Selfdescription in XML to offer applications runtime parameters and frame work in order to implement RAD.
Abstract: This paper deals with how to make use of the Data Selfdescription in XML to offer applications runtime parameters and frame work in order to implement RAD.We also build up such an instance based on DOM and Java Servlet/JSP technologies. 

17 citations


Journal Article
TL;DR: The theory, language and structure of Agent and the architecture of Multi-Agent system are introduced and an analysis on Agent, object, process control system, software spirit and the difference of problem solving of MultiAgent and distribution is profoundly made.
Abstract: Intelligent Agent and MultiAgent System has become the focus of distributive artificial intelligence since 1980sIn this paper the theory,language and structure of Agent and the architecture of MultiAgent system are introduced;an analysis on Agent, object, process control system, software spirit and the difference of problem solving of MultiAgent and distribution is profoundly made

14 citations


Journal Article
TL;DR: A survey of existing automatic face recognition methods is given, mainly aiming at the latest progress and key factors of research difficulties are concluded and distilled as suggestion to future research.
Abstract: In this paper,research background of automatic face recognition and it′s development are briefly reviewedA survey of existing automatic face recognition methods is given,mainly aiming at the latest progress Key factors of research difficulties are concluded and distilled as suggestion to future research.

14 citations


Journal Article
TL;DR: This paper briefly introduces the conception of web mining, including the taxonomy and function, and discusses the relationship between information mining and retrieval on the web, and the difference between web mining and data mining.
Abstract: This paper briefly introduces the conception of web mining,including the taxonomy and function,and discusses the relationship between information mining and retrieval on the web,and the difference between web mining and data mining.Then definition and classifications and applications of web text data mining are given,including a taxonomy of content mining.The method of text mining on web are discussed in detail,including text categorization and text clustering,etc.It discusses multimedia text data categorization and its alteration

10 citations


Journal Article
TL;DR: This paper introduces MVC design pattern briefly, and discusses J2EE technology, and construct J 2EE Enterprise Platform based on MVCDesign pattern.
Abstract: This paper introduces MVC design pattern briefly,and discusses J2EE technology,and construct J2EE Enterprise Platform based on MVC design pattern.

6 citations


Journal Article
TL;DR: This paper will review the digitalimage watermarking, analyze its model, main properties, application fields, classical algorithms and usual attacks, and finally make an expectation about its possible development directions.
Abstract: This paper will review the digitalimage watermarking, analyze its model, main properties, application fields,classical algorithms and usual attacks, and finally make an expectation about its possible development directions.

6 citations


Journal Article
TL;DR: A new trust model, quite different from those of traditional Client/Server structure, is proposed that can create the trust relationship upon ″the suggested″ values between network nodes and therefore supply with a higher security and avoid vicious attacks.
Abstract: PeertoPeer network structure developed rapidly recent years. This paper proposed a new trust model,which is quite different from those of traditional Client/Server structure.It can create the trust relationship upon ″the suggested″ values between network nodes and therefore supply with a higher security and avoid vicious attacks. The mathematical models to resolve trust values and its algorithm are also given here. Besides, the paper has carried out the theoretical evaluation on this trust model.

Journal Article
TL;DR: Two practical data hiding methods are presented in this paper and good results are gained.
Abstract: Text document is difficult to hide information for its relative little redundancy.Two practical data hiding methods are presented in this paper and good results are gained.

Journal Article
TL;DR: A model that build a profile based on lexical chain is given that is able to adapt to user's interest changes and automatically modify the user model to recognize the changes.
Abstract: In this paper we first give some information about the text filtering and the defects in VSM(Vector Support Machine),then we introduce the concept of lexical chain,give a model that build a profile based on lexical chain.We first analyse the text,then express the text with lexical chain.We use this lexicalchained profile to sift the information which may be of the user's interest.A filtering system should be able to adapt to user's interest changes,so we automatically modify the user model to recognize the changes.Experimental results show that the methods can improve the text filtering performance.

Journal Article
TL;DR: The edge detection algorithm based on region homogeneity measure is presented, which can attain the initial contour automatically and fit theInitial contour to true contour based on edge points using active contour models, and realize the automatic segmentation of cell image.
Abstract: Because of the nature of cell image and the influence of microscope,automatic segmentation for microscopic cell image becomes one difficult question.Because edge detection accurately indicates the edge points of the image, we present the edge detection algorithm based on region homogeneity measure. Then we can attain the initial contour automatically and fit the initial contour to true contour based on edge points using active contour models. At last we can realize the automatic segmentation of cell image.

Journal Article
TL;DR: The paper first discusses the limitation existing in current solution of Web service security and introduces the content and framework of WSSecurity and its solution to this issue, and uses an example to illustrate how to exchange secure message according to WSSecurity specification.
Abstract: The paper first discusses the limitation existing in current solution of Web service security and introduces the content and framework of WSSecurity and its solution to this issue. Then it uses an example to illustrate how to exchange secure message according WSSecurity specification. Finally it introduces an available implementation of WSSecurity and the direction of WSSecurity in the future.

Journal Article
TL;DR: This paper has introduced the basic concept about third Party Payment System, given the structure, payment flow, and discussed the sloution of security based on SSL protocol.
Abstract: This paper has introduced the basic concept about third Party Payment System,given the structure,payment flow,and discussed the sloution of security based on SSL protocol.

Journal Article
TL;DR: A multi heterogeneous system integration model is proposed, and the model presented in this paper is used and analyzed in a practical project.
Abstract: On the basis of analyzing system integration design, heterogeneous system features and function requirements, several system integration schemas are discussed, a multi heterogeneous system integration model is proposed, and the model presented in this paper is used and analyzed in a practical project.

Journal Article
TL;DR: A new approach to extracting information based on an application ontology that describes a domain of interest is presented, which extracts its constants and applies a recognizer to organize extracted constants as attribute values of tuples in a generated database schema.
Abstract: Electronically available data on the Web is exploding at an ever increasing pace.Much of this data is unstructured,which makes searching hard and traditional database querying impossible.For these kinds of documents we present a new approach to extracting information based on an application ontology that describes a domain of interest.For each unstructured document of interest,we extract its constants and and apply a recognizer to organize extracted constants as attribute values of tuples in a generated database schema.Our experiment data is come from World Wide Web.

Journal Article
TL;DR: It’s time to dust off the dustbin lids and start cleaning up after yourself.
Abstract: 提出基于B/S模式的、以知识管理为中心的办公自动化系统模型.模型中增加了内部文档转换和知识查询权限控制机制,为更好地与企业的知识管理系统协作提供了统一的文档类型,加强了安全控制,并以公文管理为例加以说明.

Journal Article
TL;DR: A practical efficient one-time password authentication protocol is presented which conquers common challenge-response protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack.
Abstract: Some common onetime password authentication protocols are analyzed.A practical efficient onetime password authentication protocol is presented which based on the symmetric algorithm,which conquers common challengeresponse protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack.It also can boost up the security of the application security system by integrating with it.

Journal Article
TL;DR: The fuzzy neural network is trained by means of computer simulation in the intelligent transportation control system to analyze the dynamic characteristic of transportation and form the global optimization control order.
Abstract: In this paper,an intelligent transportation control system is introduced.Depend on the vehicle counters,get the crossway transportation data first,then make use of the expert system and neural network etc.to analyze the dynamic characteristic of transportation and form the global optimization control order.And the method of utilization fuzzy control realizes the local signal lamp control.We train the fuzzy neural network by means of computer simulation in the system.

Journal Article
TL;DR: An architecture that integrates Agent with Web service to achieve agile and flexible management on the supply chain and the result is that Agents are able to mobile, download, duplicate and reconfigure in the system to achieve the reuse of Agents and obtain the information with more in time and convenient from Web service.
Abstract: In order to reduce the cost,build rapidly business strategy and find new market,supply chain management solutions must take into account the collaborative manner.Web service are defined by their service describe of publication and discovery and binding to communicate with other Web service.We present an architecture that integrates Agent with Web service to achieve agile and flexible management on the supply chain.In this architecture,workflow processes are defined by configuration workflow specifications from the user.The software Agents are hired to fulfill the specified workflow tasks and also enhance the performance of Web service.The result is that Agents are able to mobile,download,duplicate and reconfigure in the system to achieve the reuse of Agents and obtain the information with more in time and convenient from Web service. 

Journal Article
TL;DR: Using MVC software architecture in the development of enterprise application based on J2EE can simplify the process of developing software and improve the quality and the maintainability of software.
Abstract: The article discussed the J2EE technology and MVC software architecture.J2EE technology provides the foundational framework for developing enterprise application, while the software architecture is the key to the quality of enterprise application. Using MVC software architecture in the development of enterprise application based on J2EE, we can simplify the process of developing software and improve the quality and the maintainability of software. The article also discussed how to apply MVC in the developing of software process management system.

Journal Article
TL;DR: This paper's main content is to introduce that the algorithm of divided selection at random in intelligent grouping testpaper, it compare with the tradition grouping algorithm on the execute efficiency and provide one way to resolve the difficulty in storing the modification of database.
Abstract: This paper's main content is to introduce that the algorithm of divided selection at random in intelligent grouping testpaper, it compare with the tradition grouping algorithm on the execute efficiency. In additional, it provide one way to resolve the difficulty in storing the modification of database. This system runs under Windows environment, and uses ADO database access technology to visit the Microsoft Access database by Borland Delphi 6.0.

Journal Article
TL;DR: This paper analyzes the technology of WebGIS's realization and elaborates some typical webGIS mutual operating model and discusses WebGis's realization tactics and developing trend.
Abstract: WebGIS is a spatial information management technology which is developing based Internet and has wide application prospects. This paper analyzes the technology of WebGIS's realization and elaborates some typical WebGIS mutual operating model. And at the same time, it discusses WebGIS's realization tactics and developing trend.

Journal Article
TL;DR: On the basis of virtual hand generated by sensing data of glove, Hertz' collision detection algorithm, which is used to detect if virtual hand collides with virtual parts or not, is studied and equations and steps are given considering the surface of the finger as a local spherical one.
Abstract: It is a very important method by using data glove operating virtual parts in virtual assembly.In this paper,on the basis of virtual hand generated by sensing data of glove,Hertz'collision detection algorithm,which is used to detect if virtual hand collides with virtual parts or not ,is studied,the equations and steps are given considering the surface of the finger as a local spherical one.

Journal Article
TL;DR: This paper analysis a threetier B/S structure based on J2EE and some key J2ee technologies used to build a B2B Ecommerce platform.
Abstract: This paper analysis a threetier B/S structure based on J2EE and some key J2EE technologies used to build a B2B Ecommerce platform. According to the development of certain tobacco vocation's B2B Ecommerce system, this paper discusses how to construct the basic framework of a B2B Ecommerce platform on the condition of J2EE.

Journal Article
TL;DR: F fuzzy theory and database system are combined, new data query technique is provided, and a theoretical frame is built for query in the fuzzy database.
Abstract: In the realism living,the objects of query involve a great deal of fuzzy data besides accurate data. The traditional query is unable to satisfy the need. In this paper fuzzy theory and database system are combined, new data query technique is provided. The format of the fuzzy query command is set up;many fuzzy query sentences are constructed and applied in an instance.It is confirmed by the instance's running results that the query's effect is definite.A calculates formula for nature language is set up,which is closer to the meanings of the nature language. A theoretical frame is built for query in the fuzzy database. 

Journal Article
TL;DR: A new clustering algorithm is proposed to contribute similar colors into some dominant colors, that is, to quantize color, and this algorithm can be used to show the distributing info of dominant colors and use histogram intersection algorithm to search similar images from the image repository.
Abstract: As an important visual info, color is now widely used in image retrieval. The dominant color can reflect the main situation of an image. It's essential is to present the image by means of less color and make little difference between the new image and the original image. So we propose a new clustering algorithm to contribute similar colors into some dominant colors, that is, to quantize color. After that , we can use histogram to show the distributing info of dominant colors and use histogram intersection algorithm to search similar images from the image repository. The result of the experiment is satisfied.

Journal Article
TL;DR: This article research the design pattern of this model, the implementation of the main architecture and the structure of UDDI information model in detail and puts forward building U DDI Registry of higher education and Web Service application model ofHigher education.
Abstract: Based on UDDI technology and Web Service application architecture, this article puts forward building UDDI Registry of higher education and Web Service application model of higher educationThen we research the design pattern of this model,the implementation of the main architecture and the structure of UDDI information model in detail