期刊文献+
共找到29篇文章
< 1 2 >
每页显示 20 50 100
XML-based integration data model and schema mappingin multidatabase systems 被引量:5
1
作者 LiRuixuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期437-444,共8页
Multidatabase systems are designed to achieve schema integration and data interoperation among distributed and heterogeneous database systems. But data model heterogeneity and schema heterogeneity make this a challeng... Multidatabase systems are designed to achieve schema integration and data interoperation among distributed and heterogeneous database systems. But data model heterogeneity and schema heterogeneity make this a challenging task. A multidatabase common data model is firstly introduced based on XML, named XML-based Integration Data Model (XIDM), which is suitable for integrating different types of schemas. Then an approach of schema mappings based on XIDM in multidatabase systems has been presented. The mappings include global mappings, dealing with horizontal and vertical partitioning between global schemas and export schemas, and local mappings, processing the transformation between export schemas and local schemas. Finally, the illustration and implementation of schema mappings in a multidatabase prototype - Panorama system are also discussed. The implementation results demonstrate that the XIDM is an efficient model for managing multiple heterogeneous data sources and the approaches of schema mapping based on XIDM behave very well when integrating relational, object-oriented database systems and other file systems. 展开更多
关键词 multidatabase systems common data model schema mapping extensible markup language (XML).
下载PDF
Turbo-Based DNW Algorithm for Compressed Video in VLC Domain 被引量:3
2
作者 LINGHe-fei LUZheng-ding ZOUFu-hao 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期297-302,共6页
In order to improve the robustness of the differential number watermarking (DNW) algorithm proposed by us before, we proposed turbo-based DNW (T-DNW) in which the turbo code was employed in the DNW algorithm. The turb... In order to improve the robustness of the differential number watermarking (DNW) algorithm proposed by us before, we proposed turbo-based DNW (T-DNW) in which the turbo code was employed in the DNW algorithm. The turbo code was used to encode the message prior to watermark embedding and decode the watermark posterior to watermark detection. From the analysis and experiments, the following conclusion could be drawn. The T-DNW algorithm has little higher computational complexity than DNW. And both algorithms have the same performance in terms of watermark visual quality impact. Furthermore, the T-DNW algorithm is much more robust against some common attack than DNW. Although the T-DNW algorithm sacrifices a half payload, we think the achievements are encouraging. 展开更多
关键词 REAL time video watermarking TURBO based DNW (T DNW) VLC domain
下载PDF
An Efficient Crash Recovery Technique for Real-Time Main Memory Database 被引量:3
3
作者 XIAOYing-yuan LIUYun-sheng LIAOGuo-qiong LIANGPing 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期61-64,共4页
This paper presents an efficient recovery scheme suitable for real-time mainmemory database. In the recovery scheme, log records are stored in non-volatile RAM which is dividedinto four different partitions based on t... This paper presents an efficient recovery scheme suitable for real-time mainmemory database. In the recovery scheme, log records are stored in non-volatile RAM which is dividedinto four different partitions based on transaction types. Similarly, a main memory database isdivided into four partitions based data types. When the using ratio of log store area exceeds thethreshold value, checkpoint procedure is triggered. During executing checkpoint procedure, someuseless log records are deleted. During restart recovery after a crash, partition reloading policyis adopted to assure that critical data are reloaded and restored in advance, so that the databasesystem can be brought up before the entire database is reloaded into main memory. Therefore downtime is obvionsly reduced. Simulation experiments show our recovery scheme obviously improves thesystem performance, and does a favor to meet the dtadlints of real-time transactions. 展开更多
关键词 real-time main memory database crash recovery log scheme
下载PDF
Testing and Evaluation for Web Usability Based on Extended Markov Chain Model 被引量:2
4
作者 MAOCheng-ying LUYan-sheng 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期687-693,共7页
As the increasing popularity and complexity of Web applications and the emergence of their new characteristics, the testing and maintenance of large, complex Web applications are becoming more complex and difficult. W... As the increasing popularity and complexity of Web applications and the emergence of their new characteristics, the testing and maintenance of large, complex Web applications are becoming more complex and difficult. Web applications generally contain lots of pages and are used by enormous users. Statistical testing is an effective way of ensuring their quality. Web usage can be accurately described by Markov chain which has been proved to be an ideal model for software statistical testing. The results of unit testing can be utilized in the latter stages, which is an important strategy for bottom-to-top integration testing, and the other improvement of extended Markov chain model (EMM) is to present the error type vector which is treated as a part of page node. this paper also proposes the algorithm for generating test cases of usage paths. Finally, optional usage reliability evaluation methods and an incremental usability regression testing model for testing and evaluation are presented. Key words statistical testing - evaluation for Web usability - extended Markov chain model (EMM) - Web log mining - reliability evaluation CLC number TP311. 5 Foundation item: Supported by the National Defence Research Project (No. 41315. 9. 2) and National Science and Technology Plan (2001BA102A04-02-03)Biography: MAO Cheng-ying (1978-), male, Ph.D. candidate, research direction: software testing. Research direction: advanced database system, software testing, component technology and data mining. 展开更多
关键词 statistical testing evaluation for Web usability extended Markov chain model (EMM) Web log mining reliability evaluation
下载PDF
An Improved Interconnection Network Based on NIN 被引量:1
5
作者 LiFei LiZhi-tang 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第3期303-308,共6页
The Novel Interconnection Network (NIN) based on inverted-graph topology and crossbar switch is a kind of lower latency and higher throughput interconnection network. But it has a vital disadvantage, high hardware com... The Novel Interconnection Network (NIN) based on inverted-graph topology and crossbar switch is a kind of lower latency and higher throughput interconnection network. But it has a vital disadvantage, high hardware complexity. In order to reduce system hardware cost, an improved NIN (ININ) structure is proposed. As same as NIN, ININ has constant network diameter. Besides of keeping advantages of NIN, hardware cost of ININ is lower than NIN. Furthermore, we design a new deadlock-free routing algorithm for the improved NIN. Key words NIN - ININ - inverted-graph interconnection network - hardware complexity - network band-width - network throughput CLC number TP 302 Foundation item: Supported by the National Natural Science Foundation of China (69873016)Biography: Li Fei (1974-), male, Ph. D candidate, research direction: architecture of interconnection network. 展开更多
关键词 NIN ININ inverted-graph interconnection network hardware complexity network band-width network throughput
下载PDF
A Novel Fast Algorithm of Mono Transition Region Determination with Gray Image 被引量:1
6
作者 ZhangAi-hua 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第3期309-312,共4页
There is a transition region between objects and background in any gray image. Many valuable applications of image segmentation and edge detection based on transition region determination have been developed in recent... There is a transition region between objects and background in any gray image. Many valuable applications of image segmentation and edge detection based on transition region determination have been developed in recent years. But, the complexity of calculation for determining transition region is too high. It results in the very limitation of applications based on transition region. A new novel fast method for transition region determination is presented in this paper, which will reduce the complexity of calculation dramatically. Many experiments have showed that this algorithm is effective and correct and will lay a good foundation for applications based on transition region. Key words image segmentation - transition region - maximum point - efficient average gradient (EAG) CLC number TP 391.4 Biography: Zhang Ai-hua (1965-), male, Ph. D candidate, research direction: image processing. 展开更多
关键词 image segmentation transition region maximum point efficient average gradient (EAG)
下载PDF
Integrating XML with CORBA-Based Multidatabase Systems 被引量:1
7
作者 LIRui-xuan LUZheng-ding WUWei XIAOWei-jun 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期676-680,共5页
In this paper, we first introduce the architecture for a CORBA-based multidatabase system and then give an approach of schema mapping between XML and relational database system. Finally, we investigate the ability to ... In this paper, we first introduce the architecture for a CORBA-based multidatabase system and then give an approach of schema mapping between XML and relational database system. Finally, we investigate the ability to apply the integration of XML with CORBA-based multidatabase systems. This integration extends the ability of a CORBA-based multidatabase system to implement data sharing and interoperability. Key words heterogeneity - XML - schema mapping - multidatabase systems CLC number TP311. 13 Foundation item: Supported by the National Key Technologies R&D Program of China(2002BA103A04)Biography: LI Rui-xuan(1974-), male, Ph. D candidate, research interests: heterogeneous information integration. 展开更多
关键词 HETEROGENEITY XML schema mapping multidatabase systems
下载PDF
Fair Electronic Payment Scheme Based on DSA 被引量:1
8
作者 WANGShao-bin HONGFan ZHUXian 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期203-206,共4页
We present a multi-signature scheme based on DSA and describes a faireleetronic payment scheme based on improved DSA signatures. The scheme, makes both sides in e-qualpositions during the course of electronic transact... We present a multi-signature scheme based on DSA and describes a faireleetronic payment scheme based on improved DSA signatures. The scheme, makes both sides in e-qualpositions during the course of electronic transaction A Trusted Third Party (TTP)is involved in thescheme to guarantee the fairness of the scheme for both sides. However, only during the course ofregistration and dispute resolution will TTP be needed TTP is not needed during the normal paymentstage. 展开更多
关键词 fair electronic payment multi-signatures DSA signatures E-COMMERCE
下载PDF
Complex Threshold Key Management for Ad Hoc Network 被引量:1
9
作者 GUOWei XIONGZhong-wei LIZhi-tang 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期132-136,共5页
A complex threshold key management framework has been proposed, which canaddress the challenges posed by the unique nature of Ad hoc network. Depending on the cooperation ofthe controller and participation nodes, this... A complex threshold key management framework has been proposed, which canaddress the challenges posed by the unique nature of Ad hoc network. Depending on the cooperation ofthe controller and participation nodes, this scheme should be efficient in the operationenvironmental alteration and toleianl faults of node, which take the advantages of the benefits ofboth key management approaches and alleviate their limitations. For the cooperation of thecontroller and participation nodes, a (t, n) threshold Elliptic curve sign-encryption scheme withthe specified receiver also has been proposed. Using this threshold sign-encryption scheme, the keymanagement distributes the trust between a controller and a set of participation nodes. 展开更多
关键词 key management Ad hoc network threshold cryptography communicationsecurity
下载PDF
Web-Based Information Systems and Applications: A Survey 被引量:1
10
作者 XUBao-wen XULei +4 位作者 MENGXiao-feng YUGe LUZheng-ding HEYan-xiang SHENJun-yi 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期537-541,共5页
Biography: XU Bao-wen(1961-), male, Ph.D. Professor, research direction: programming language, software engineering, Web-based technology, etc.
关键词 WEB WWW 信息系统 因特网 数据管理
下载PDF
Image Retrieval Based on Objects’ Spatial Orientation Relationships
11
作者 CHENChuan-bo LIQi-shen GONGWen-jie 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第3期520-524,共5页
A new concept of characteristic scanning radial (CSR) is proposed for thesegmented image on the basis of two shape-specific points of its shape-objects. Subsequently, twocharacteristic attribute sequences (CAS) of rel... A new concept of characteristic scanning radial (CSR) is proposed for thesegmented image on the basis of two shape-specific points of its shape-objects. Subsequently, twocharacteristic attribute sequences (CAS) of relative distance and relative direction are derived torepresent the spatial orientation relationships among objects of the image. A novel image retrievalalgorithm is presented using these two CASs. The proposed retrieval approach not only satisfies thetransformational invariance, butalso attains the quantitative comparison of matching. Experimentsidentify the effectiveness and efficiency of the algorithm adequately. 展开更多
关键词 image retrieval spatial relationship transformation invariant shape-specific point characteristic scanning radial characteristic attribute sequence
下载PDF
Distributed Role-based Access Control for Coaliagion Application
12
作者 HONGFan ZHUXian XINGGuanglin 《Geo-Spatial Information Science》 2005年第2期138-143,共6页
Access control in multi-domain environments is one of the important questions of building coalition between domains. On the basis of RBAC access control model, the concepts of role delegation and role mapping are prop... Access control in multi-domain environments is one of the important questions of building coalition between domains. On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization. Then, a distributed RBAC model is presented. Finally the implementation issues are discussed. 展开更多
关键词 ROLE access control MULTI-DOMAIN DELEGATION MAPPING
下载PDF
Distributed and Parallel Component Library
13
作者 XUZheng-quan XUYang YANAi-ping 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第2期375-379,共5页
Software component library is the essential part of reuse-based softwaredevelopment. It is shown that making use of a single component library to store all kinds ofcomponents and from which components are searched is ... Software component library is the essential part of reuse-based softwaredevelopment. It is shown that making use of a single component library to store all kinds ofcomponents and from which components are searched is very inefficient. We construct multi-librariesto support software reuse and use PVM as development environments to imitate large-scale computer,which is expected to fulfill distributed storage and parallel search of components efficiently andimprove software reuse. 展开更多
关键词 software reuse component library parallel virtual machine distributedstorage parallel search
下载PDF
Design and Implementation of a Proxy Caching System for Streaming Media
14
作者 TanJin YuSheng-shengI ZhouJing-li 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第1期31-36,共6页
With the widespread use of streaming media application on the Internet, a significant change in Internet workload will be provoked. Caching is one of the applied techniques for enhancing the scalability of streaming s... With the widespread use of streaming media application on the Internet, a significant change in Internet workload will be provoked. Caching is one of the applied techniques for enhancing the scalability of streaming system and reducing the workload of server/network. Aiming at the characteristics of broadband network in community, we propose a popularity-based server-proxy caching strategy for streaming medias, and implement the prototype of streaming proxy caching based on this strategy, using RTSP as control protocol and RTP for content transport. This system can play a role in decreasing server load, reducing the traffic from streaming server to proxy, and improving the start-up latency of the client. Key words streaming server - proxy - cache - streaming media - real time streaming protocol CLC number TP 302 - TP 333 Foundation item: Supported by the National High Technology Development 863 Program of China (2001AA111011).Biography: Tan Jin (1962-), male, Ph. D candidate, research direction: network communications, multimedia technologies, and web caching. 展开更多
关键词 streaming server PROXY CACHE streaming media real time streaming protocol
下载PDF
The Boundary Processing of Wavelet Based Image Compression
15
作者 YuSheng-sheng HeXiao-cheng ZhouJing-li ChenJia-zhong 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第3期296-302,共7页
When an image, which is decomposed by bi-orthogonal wavelet bases, is reconstructed, some information will be lost at the four edges of the image. At the same time, artificial discontinuities will be introduced. We us... When an image, which is decomposed by bi-orthogonal wavelet bases, is reconstructed, some information will be lost at the four edges of the image. At the same time, artificial discontinuities will be introduced. We use a method called symmetric extension to solve the problem. We only consider the case of the two-band filter banks, and the results can be applied to M-band filter banks. There are only two types of symmetric extension in analysis phrase, namely the whole-sample symmetry (WS), the half-sample symmetry (HS), while there are four types of symmetric extension in synthesis phrase, namely the WS, HS, the whole-sample anti-symmetry (WA), and the half-sample anti-symmetry (HA) respectively. We can select the exact type according to the image length and the filter length, and we will show how to do these. The image can be perfectly reconstructed without any edge effects in this way. Finally, simulation results are reported. Key words edge effect - image compression - wavelet - biorthogonal bases - symmetric extension CLC number TP 37 Foundation item: Supported by the National 863 Project (20021111901010)Biography: Yu Sheng-sheng (1944-), male, Professor, research direction: multimedia information processing, SAN. 展开更多
关键词 edge effect image compression WAVELET biorthogonal bases symmetric extension
下载PDF
Design and Implementation of Hierarchy Cache Using Pagefile
16
作者 XIEChang-sheng LIURui-fang TANZhi-hu 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第6期890-894,共5页
This paper presents a novel hierarchy cache architecture for the purpose of optimizing IO performance. The main idea of the hierarchy cache is to use a few megabytes of RAM and a pagefile to form a two-level cache arc... This paper presents a novel hierarchy cache architecture for the purpose of optimizing IO performance. The main idea of the hierarchy cache is to use a few megabytes of RAM and a pagefile to form a two-level cache architecture, The pagefile is equivalent to the cache disk in DCD (Disk Caching Disk). The pagefile outperforms data disks, because data are accessed in different units and different ways. Small writes are collected in the RAM cache first, and data will be transferred to the pagefile in large writes later. When the system is idle, it will destage data from the pagefile to data disks. The performance test results show that the hierarchy cache can improve IO performance dramatically for small writes, and the mail server using the hierarchy cache driver can handle transactions about 2.2 times faster than the normal mail server. The hierarchy cache is implemented as a filter driver, so it's transparent to the current Windows 2000/ Windows XP operating system. Key words hierarchy cache - pagefile - small write - disk caching disk - filter driver CLC number TP 311 Foundation item: Supported by the National Natural Science Foundation of China (60273073)Biography: XIE chang-sheng (1945-), male Professor, research direction: storage system, network storage. 展开更多
关键词 hierarchy cache pagefile small write disk caching disk filter driver
下载PDF
ACSEPP On-Line Electronic Payment Protocol
17
作者 WANGShao-bin ZHUXian HONGFan 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期717-721,共5页
With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol. Its aim is to... With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol. Its aim is to design a practical electronic payment protocol which is both secure and conveinent. Without using PKI_CA frame, it realized the anonymity of consumer and merchant, the convenient of handling, the low cost of maintenance and the security. Key words electronic commeree - electronic payment - convenient - anonymity CLC number TP 393 Foundation item: Supported by the National High Technology Development 863 Program of China (863-301-1-3) and Huazhong University of Science and Technology of Ph. D. Fund Project.Biography: WANG Shao-bin, male, Ph. D, research direction: information security and electronic commerce. 展开更多
关键词 electronic commeree electronic payment CONVENIENT ANONYMITY
下载PDF
TrustedRBAC——A Distributed Authorization Infrastructure Span Multiple Autonomous Domains
18
作者 WANGZhi-gang LUZheng-ding LIRui-xuan WUWei WANGXiao-gang 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期694-698,共5页
TrustedRBAC is a scalable, decentralized trust-management and access control mechanism for systems that span multiple autonomous domains. We utilize X.509 attri- bute certificates to define trust domains, roles to def... TrustedRBAC is a scalable, decentralized trust-management and access control mechanism for systems that span multiple autonomous domains. We utilize X.509 attri- bute certificates to define trust domains, roles to define controlled activities, and role delegation across domains to represent permissions to these activities. This paper describes the TrustedRBAC model and its scalable design and implementation. 展开更多
关键词 X.509 attribute certificate RBAC AUTHORIZATION virtual enterprise
下载PDF
Data Mining Based on Computational Intelligence
19
作者 WANGYuan-zhen ZHANGZhi-bing +1 位作者 YIBao-lin LIHua-yang 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第2期371-374,共4页
This paper combines computational intelligence tools: neural network, fuzzylogic, and genetic algorithm to develop a data mining architecture (NFGDM), which discovers patternsand represents them in understandable form... This paper combines computational intelligence tools: neural network, fuzzylogic, and genetic algorithm to develop a data mining architecture (NFGDM), which discovers patternsand represents them in understandable forms. In the NFGDM, input data arepreprocesscd byfuzzification, the preprocessed data of input variables arc then used to train a radial basisprobabilistic neural network to classify the dataset according to the classes considered, A ruleextraction technique is then applied in order to extract explicit knowledge from the trained neuralnetworks and represent it m the form of fuzzy if-then rules. In the final stage, genetic algorithmis used as a rule-pruning module to eliminate those weak rules that are still in the rule bases.Comparison with some known neural network classifier, the architecture has fast learning speed, andit is characterized by the incorporation of the possibility information into the consequents ofclassification rules in human understandable forms. The experiments show that the NFGDM is moreefficient and more robust than traditional decision tree method. 展开更多
关键词 data mining rule extraction neural network fuzzy logic genetic algorithm
下载PDF
Blind and readable image watermarking using wavelet tree quantization
20
作者 HUYuping YUShengsheng ZHOUJingLi SHILei 《Journal of Chongqing University》 CAS 2004年第1期34-38,共5页
A blind and readable image watermarking scheme using wavelet tree quantization is proposed. In order to increase the algorithm robustness and ensure the watermark integrity,error correction coding techniques are used ... A blind and readable image watermarking scheme using wavelet tree quantization is proposed. In order to increase the algorithm robustness and ensure the watermark integrity,error correction coding techniques are used to encode the embedded watermark. In the watermark embedding process, the wavelet coefficients of the host image are grouped into wavelet trees and each watermark bit is embedded by using two trees. The trees are so quantized that they exhibit a large enough statistical difference, which will later be used for watermark extraction. The experimental results show that the proposed algorithm is effective and robust to common image processing operations and some geometric operations such as JPEG compression, JPEG2000 compression, filtering, Gaussian noise attack, and row-column removal. It is demonstrated that the proposed technique is practical. 展开更多
关键词 readable image watermrk error correction code wavelet transform QUANTIZATION
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部