Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analy...Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analyzed by using these models.The results show that: (1) Dependency network does play a key role in software architecture;(2) The exponents of in-degree and total-degree distribution functions of different networks differ slightly,while the exponent of out-degree varies obviously;(3) Weak-coupling relationships have greater impact on software architecture than strong-coupling relationships.Finally,a theoretically analysis on these statistical phenomena is proposed from the perspectives of software develop technology,develop process and developer’s habits,respectively.展开更多
The paper proposes a conference control model between a web server and a telecom application server,referred to as the Conference Directed Graph(CDG) ,and describes an asynchronous communication mechanism between them...The paper proposes a conference control model between a web server and a telecom application server,referred to as the Conference Directed Graph(CDG) ,and describes an asynchronous communication mechanism between them. The Corba Interface Definition Language(IDL) interfaces are defined,and a message sequence chart is illustrated. This web conference control model provides conference users with a new approach to manage and control a conference and the participants. The performance of the system prototype is analyzed and verified in the 863 project named "The Multi-media and Mobile Services Enabled Soft-switch System".展开更多
In this paper, the relations of the network topology and the moving consensus of multi-agent systems are studied. A consensus-prestissimo scale-free network model with the static preferential-consensus attachment is p...In this paper, the relations of the network topology and the moving consensus of multi-agent systems are studied. A consensus-prestissimo scale-free network model with the static preferential-consensus attachment is presented on the rewired link of the regular network. The effects of the static preferential-consensus BA network on the algebraic connectivity of the topology graph are compared with the regular network. The robustness gain to delay is analyzed for variable network topology with the same scale. The time to reach the consensus is studied for the dynamic network with and without communication delays. By applying the computer simulations, it is validated that the speed of the convergence of multi-agent systems can be greatly improved in the preferential-consensus BA network model with different configuration.展开更多
The U.S. EPA (Environmental Protection Agency) established the CASTNET (Clean Air Status and Trends Network) and its predecessor, the NDDN (national dry deposition network), as national air quality and meteorolo...The U.S. EPA (Environmental Protection Agency) established the CASTNET (Clean Air Status and Trends Network) and its predecessor, the NDDN (national dry deposition network), as national air quality and meteorological monitoring networks. Both CASTNET and NDDN were designed to measure concentrations of sulfur and nitrogen gases and particles. Both networks also estimate dry deposition using an inferential model. The design was based on the concept that atmospheric dry deposition flux could be estimated as the product of a measured air pollutant concentration and a modeled deposition velocity (Vd). The MLM (multi-layer model), the computer model used to simulate dry deposition, requires information on meteorological conditions and vegetative cover as model input. The MLM calculates hourly Fa for each pollutant, but any missing meteorological data for an hour renders Vd missing for that hour. Because of percent completeness requirements for aggregating data for long-term estimates, annual deposition rates for some sites are not always available primarily because of missing or invalid meteorological input data. In this work, three methods for replacing missing on-site measurements are investigated. These include (1) using historical values of deposition velocity or (2) historical meteorological measurements from the site being modeled or (3) current meteorological data from nearby sites to substitute for missing inputs and thereby improve data completeness for the network's dry deposition estimates. Results for a CASTNET site used to test the methods show promise for using historical measurements of weekly average meteorological parameters.展开更多
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ...In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms.展开更多
In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of net...In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of network system. Fully understand and grasp of thenetwork protocols for managers is there is a big diffi cult. Network covert channel is the evaluation of intrusion detection system and fi rewallsecurity performance of an important means, the paper will start from the angle of the attacker, the fl aws of the research, and use this kind ofdefect to realize network covert channel, the random walk algorithm will be feasible for dealing with this issue. For achieving this, we integratethe genetic and random walk algorithm for systematic optimization.展开更多
Recognizing the drawbacks of stand-alone computer-aided tools in engineering, several hybrid systems are suggested with varying degree of success. In transforming the design concept to a finished product, in particula...Recognizing the drawbacks of stand-alone computer-aided tools in engineering, several hybrid systems are suggested with varying degree of success. In transforming the design concept to a finished product, in particular, smooth interfacing of the design data is crucial to reduce product cost and time to market. Having a product model that contains the complete product description and computer-aided tools that can understand each other are the primary requirements to achieve the interfacing goal. This article discusses the development methodology of hybrid engineering software systems with particular focus on application of soft computing tools such as genetic algorithms and neural networks. Forms of hybridization options are discussed and the applications are elaborated using two case studies. The forefront aims to develop hybrid systems that combine the strong side of each tool, such as, the learning, pattern recognition and classification power of neural networks with the powerful capacity of genetic algorithms in global search and optimization. While most optimization tasks need a certain form of model, there are many processes in the mechanical engineering field that are difficult to model using conventional modeling techniques. The proposed hybrid system solves such difficult-to-model processes and contributes to the effort of smooth interfacing design data to other downstream processes.展开更多
基金The paper is supported by the National High Technology Research and Development Program of China (863 Program) (No.2009AA01Z439) and the National Natural Science Foundation of China (U0835001)
文摘Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analyzed by using these models.The results show that: (1) Dependency network does play a key role in software architecture;(2) The exponents of in-degree and total-degree distribution functions of different networks differ slightly,while the exponent of out-degree varies obviously;(3) Weak-coupling relationships have greater impact on software architecture than strong-coupling relationships.Finally,a theoretically analysis on these statistical phenomena is proposed from the perspectives of software develop technology,develop process and developer’s habits,respectively.
基金the National High-Tech Research and De-velopment Plan of China (No.2001AA121021)the Na-tional Research Foundation for the Doctoral Program of Higher Education of China (No.20020013004)+2 种基金the Na-tional Grand Fundamental Research 973 Program of China (No.2003CB314806)the National Natural Science Foundation for Distinguished Young Scholars of China (No.60125101)the Cheung Kong Scholar’s Program and the Promotion Project for Creative Teams of the Ministry of Education (Networking Theory and Tech-nology in Telecommunication) (No.IRT0410).
文摘The paper proposes a conference control model between a web server and a telecom application server,referred to as the Conference Directed Graph(CDG) ,and describes an asynchronous communication mechanism between them. The Corba Interface Definition Language(IDL) interfaces are defined,and a message sequence chart is illustrated. This web conference control model provides conference users with a new approach to manage and control a conference and the participants. The performance of the system prototype is analyzed and verified in the 863 project named "The Multi-media and Mobile Services Enabled Soft-switch System".
基金Supported in part by Chinese National Natural Science Foundation under Grant Nos. 60774016 60875039+2 种基金 60904022 60805039the Science Foundation of Education Office of Shandong Province of China under Grant No. J08LJ01
文摘In this paper, the relations of the network topology and the moving consensus of multi-agent systems are studied. A consensus-prestissimo scale-free network model with the static preferential-consensus attachment is presented on the rewired link of the regular network. The effects of the static preferential-consensus BA network on the algebraic connectivity of the topology graph are compared with the regular network. The robustness gain to delay is analyzed for variable network topology with the same scale. The time to reach the consensus is studied for the dynamic network with and without communication delays. By applying the computer simulations, it is validated that the speed of the convergence of multi-agent systems can be greatly improved in the preferential-consensus BA network model with different configuration.
文摘The U.S. EPA (Environmental Protection Agency) established the CASTNET (Clean Air Status and Trends Network) and its predecessor, the NDDN (national dry deposition network), as national air quality and meteorological monitoring networks. Both CASTNET and NDDN were designed to measure concentrations of sulfur and nitrogen gases and particles. Both networks also estimate dry deposition using an inferential model. The design was based on the concept that atmospheric dry deposition flux could be estimated as the product of a measured air pollutant concentration and a modeled deposition velocity (Vd). The MLM (multi-layer model), the computer model used to simulate dry deposition, requires information on meteorological conditions and vegetative cover as model input. The MLM calculates hourly Fa for each pollutant, but any missing meteorological data for an hour renders Vd missing for that hour. Because of percent completeness requirements for aggregating data for long-term estimates, annual deposition rates for some sites are not always available primarily because of missing or invalid meteorological input data. In this work, three methods for replacing missing on-site measurements are investigated. These include (1) using historical values of deposition velocity or (2) historical meteorological measurements from the site being modeled or (3) current meteorological data from nearby sites to substitute for missing inputs and thereby improve data completeness for the network's dry deposition estimates. Results for a CASTNET site used to test the methods show promise for using historical measurements of weekly average meteorological parameters.
基金Supported by 863 Project of China (No.2006AA01Z224)
文摘In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms.
文摘In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of network system. Fully understand and grasp of thenetwork protocols for managers is there is a big diffi cult. Network covert channel is the evaluation of intrusion detection system and fi rewallsecurity performance of an important means, the paper will start from the angle of the attacker, the fl aws of the research, and use this kind ofdefect to realize network covert channel, the random walk algorithm will be feasible for dealing with this issue. For achieving this, we integratethe genetic and random walk algorithm for systematic optimization.
文摘Recognizing the drawbacks of stand-alone computer-aided tools in engineering, several hybrid systems are suggested with varying degree of success. In transforming the design concept to a finished product, in particular, smooth interfacing of the design data is crucial to reduce product cost and time to market. Having a product model that contains the complete product description and computer-aided tools that can understand each other are the primary requirements to achieve the interfacing goal. This article discusses the development methodology of hybrid engineering software systems with particular focus on application of soft computing tools such as genetic algorithms and neural networks. Forms of hybridization options are discussed and the applications are elaborated using two case studies. The forefront aims to develop hybrid systems that combine the strong side of each tool, such as, the learning, pattern recognition and classification power of neural networks with the powerful capacity of genetic algorithms in global search and optimization. While most optimization tasks need a certain form of model, there are many processes in the mechanical engineering field that are difficult to model using conventional modeling techniques. The proposed hybrid system solves such difficult-to-model processes and contributes to the effort of smooth interfacing design data to other downstream processes.