Journal of Xidian University 2004 Vol.31
Please wait a minute...
For Selected: Toggle Thumbnails

Hierarchical semi-frigile watermarking based on the reconstruction of DCT coefficients

GUO Bao-long;ZHANG Yong-ping;GUO Lei
J4   
Abstract1497)            Save
Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity becomes a major issue. In this paper, a new semi-fragile watermarking algorithm, claaed HSFW, is presented. Using a hierarchical structure and the idea of multi-resolution, HSFW can avoid the vector quantization (VQ) counterfeiting attack and identify the positions of corrupted blocks under different resolutions without the source image. By the reconstruction of DCT coefficient, HSFW can accept JPEG lossy compression on the watermarked image to a pre-determined quality factor, and reject malicious attacks. The experimental results show its effectiveness in protecting the content-integrity of images.
Related Articles | Metrics

The infrared image enhancement and the correlative technique based on the parallel genetic algorithm

GUO Run-qiu;LI Jun-feng;LIN Xiao-chun
J4   
Abstract2257)            Save
A new method for infrared image enhancement using the improved genetic algorithm is proposed. First the relation between gray levels for the input and output images is coded, and then the most effective relation of the effect is searched for by using a certain evaluation standard for the image quality. In order to improve the efficiency of the genetic algorithm, a calculation model based on the multi-threadlike parallel genetic algorithm is designed. The results of a large number of he simulation experiments show that the algorithm has good feasibility and effectiveness.
Related Articles | Metrics

Research on optimal scheduling of hybrid production processes

NIU Hai-jun1;MA Jian-hui2;Miao Wei-ping3
J4   
Abstract1598)            Save
We study the optimal scheduling method for hybrid production systems. Based on hierarchical modeling, we use the heuristics branch and bound algorithm to optimize scheduling. The objective is to minimize the production cost. According to the condition of production we have developed 5 rules, with two B&B algorithms structured. The cost includes not only the order and start time of production, but also the inventory cost.
Related Articles | Metrics

The process capability index analysis of non-normal distribution parameters

JIA Xin-zhang;SONG Jun-jian;PU Jian-bin
J4   
Abstract1368)            Save
Using the traditional method to calculate the process capability index Cpk of the non-normal distribution parameters appearing in semiconductor device production will result in wrong conclusion. A new method is suggested and a software program is developed for calculation the Cpk and yield of non-normal distribution parameters at the PPM level.
Related Articles | Metrics

The design of 32×32-b multiplier

LUAN Yu-xia;LI Cun-zhi
J4   
Abstract1406)            Save
The design of a 32×32-b multiplier by using a modified Carry-Select Adder, a 4-2 compressor, and a 4 Booth encoder is presented. The description of the multiplier in Verilog is simulated on Active-HDL 5.1, which shows that the design has advantages over some others in layout and frequency.
Related Articles | Metrics

Image information fusion and synthesis display of medical images

NA Yan;YANG Wan-hai;LI Yong-zhao
J4   
Abstract1714)            Save
A new CT and NMR medical image fusion method is described. According to the expected fusion results, a new wavelet transform-based maximum-chosen fusion method is presented after a detailed analysis of the basic imaging principles of CT and NMR. The wavelet transform of teh matched CT and NMR are taken first, and then a combined wavelet coefficient is obtained after comparing the same scale wavelet coefficients of CT and NMR and choosing the largest one. The fusion image can be obtained after making the inverse wavelet transform of the combined wavelet coefficient. The image obtained clearly displays the bone and soft tissues in one image.
Related Articles | Metrics

A secret sharing RSA digital signature scheme based on the vector space access structure

XU Chun-xiang;FU Xiao-tong;XIAO Guo-zhen
J4   
Abstract1821)            Save
A new digital signature scheme, i.e., the secret sharing RSA digital signature scheme based on the vector space access structure, is proposed, which includes the threshold RSA signature scheme as a particular case. In this scheme, the vector space secret sharing scheme is established in a finite ring, so that N participants share the secret in the RSA signature shceme. This scheme can assure that the group signature can be easily produced by the cooperation of the participants in an authorized subset in the vector space access structure Γ and it is impossible for them to generate a group signature by the cooperation of the participants in an unauthorized subset. Compared with the existing schemes, this scheme does not require inversion operations, and thus can find wide applications.
Related Articles | Metrics

The calculation of thermal radiaiton distortion for large deployable antennas in satellites

ZHU Min-bo;CAO Feng-yun;LIU Ming-zhi;HE En
J4   
Abstract1496)            Save
Thermal analysis is a key technique in designing the antenna in a satellite. We use the finite-element method to calculate the large unfold antenna structure's temperature distribution and thermal distortion, and study the influence of the basic structure's parameters on the distortion of the antenna. The result of calculation will be beneficial to antenna design and th control of the antenna's temperature.
Related Articles | Metrics

New design method for the optimal energy delay product of FPGA based on the interconnect

MA Qun-gang;YANG Yin-tang;LI Yue-jin
J4   
Abstract1670)            Save
With the segmentation structure and low-swing circuit of the integrated circuit interconnect, an optimal design method is developed for efficiently solving the challenge of the FPGA energy delay product. OPtimizing the segmentation number of the FPGA interconnect with transmission line effects, the driving unit and receiving unit of the low-swing circuit are respectively connected to the input and output of the interconnect, and optimal size repeaters are inserted in the segmented interconnect. Both theoretical and experimental results show that the improvement of the FPGA energy delay product with this new technique is about an order of magnitude when compared to existing commerical architectures while keeping the good area performance of FPGA.
Related Articles | Metrics

The anti-cheating property of the Asmuth-Bloom secret sharing system

MA Wen-ping;REN Ya-an
J4   
Abstract1323)            Save
Martin Tompa and Heather Woll demonstrated that Shamir's Scheme is not secure against cheating and this attack is called Tompa-Woll attack. In this paper, we show that the Asmuth-Bloom's System is also not secure against strong cheating. A little modification of this scheme retains the security and efficiency of the original scheme and is secure against strong cheating.
Related Articles | Metrics

Output feedback control of the nonlinear various structure unctertain system: its application to fuzzy adaption

BO Hong1;DUAN Bao-yan1;YAN Li2
J4   
Abstract1804)            Save
By considering the special characteristics of an unknown disturbance and an unknown plant of single-input/output nonlinear variable structure systems, based on the fuzzy adaptive controller, a new method with the projection function for controlling the variable structure is presented. ecause the method can track satisfactorily all types of state of a class of uncertain variable structure systems, it can extend the nonlinear state error feedback control law(NLSEF) and auto disturbance rejection controller(ADRC) application field. Furthermore, the proof of the stability of the method is made mathematically. Finally, three examples are given to demonstrate the method.
Related Articles | Metrics

Relationship between performance and structural parameters of a metering pump with an adjustable stroke

LI Tuan-jie;CAO Yan;ZHOU Xiao-yong
J4   
Abstract1284)            Save
A multi-bar mechanism with an adjustable stroke applied to metering pumps is presentedd. The analytical kinematic model is established. The output capability of metering pumps is studied with different stuctural parameters. The relationship between performance and different choices of structural parameters is revealed, thus providing the theoretical basis for the design and control of metering pumps. The research results indicate that the stroke length of a piston is varied by adjusting the length of the control links, and the requirement i satisfied that it allows the piston stroke to be adjusted in length and permits the pump flow to be changed during the pump functioning.
Related Articles | Metrics

Design and implementation of a software quality evaluation system based on ISO/IEC 9126

YANG Zong-kui1;2;ZHOU Jin-hui1;2;LIU Xia2;WANG Qing2
J4   
Abstract1552)            Save
The software quality evaluation is significant for the improvement of software progress and the control of software quality. In order to obtain the quantitative and objective evaluation result of software quality, this paper presents a system framework for software quality evaluation based on the international standards of ISO/IEC 9126 and the implementation method of the system. The implementation covers an overall software lifecycle and is driven by the user's quality goals. According to the quality goals, the evaluators can select suitable indicators to start the evaluation. At the same time, the results of the evaluation are useful for the improvement of software progress.
Related Articles | Metrics

A unified percolation model for gate oxide breakdown

MA Zhong-fa;ZHUANG Yi-qi;DU Lei;BAO Jun-lin;WAN Chang-xing;LI Wei-hua
J4   
Abstract1572)            Save
Based on the Percolation theory and defects creation mechanisms of bothe E model and 1/E model, a unified percolation model for gate oxide breakdown is brought forward. The trigging mechanism of gate oxide breakdown is believed to be the extending of the localized states induced by the defects such as oxygen vacancy in an oxide. The defect creation dynamics such as oxygen vacancy is described synthetically. As a result, the results of this model both in a high electric field and in a low electric field fit well with the experimental data. So, the long-existing dipute between 1/E and E models is settled.
Related Articles | Metrics

Characteristics of the Ni/4H-SiC Schottky barrier diode at high temperatures

WANG Yue-hu;ZHANG Yi-men;ZHANG Yu-ming;CHEN Rui-biao;WANG Lei;ZHOU Yong-hua
J4   
Abstract2383)            Save
The I-V characteristics of the Ni/4H-SiC Schottky Barrier Diode(SBD) are measured first in the temperature range from 297K to 677K. The diode shows an excellent forward I-V characteristic. The devices present a behavior in accordance with the thermionic emission theory in the forward bias. The temperature influences obviously the forward characteristic of the SBD. The influence on the reverse current is small in the range of the applied voltages of less than 30V. The ideal factor n ranges from 1.165 to 1.872, the Barrier height ranges from 0.916 to 2.117eV, and the threshold voltage is 0.5V.
Related Articles | Metrics

The correctional Square-6 attack

WEI Bao-dian;LIU Dong-su;WANG Xin-mei
J4   
Abstract1378)            Save
The Square-6 attack was once thought to be one of the most effective attacks against the AES algorithm Rijndael of six rounds. It was performed with a time complexity of 272 by means of applying a Square-5 attack to a Λ set that contains an active byte. The Λ set was constructed by guessing four bytes of the initial round key. We point out in this paper that no proper Λ set can be built in the Square-6 attack and therefore the overall attack will fail without doubt. Based on the technique of the partial sums, a correctional Square-6 attack independent of the initial round key is described. The time complexity of the correctional attack is 250.
Related Articles | Metrics

Estimation of the operation range of the active laser surveillance

ZHAO Ming-jun1;2;HU Yong-zhao1;2;ZENG Xiao-dong1
J4   
Abstract1452)            Save
The principle of the active laser surveillance is based on the cat's eye effects of optical systems. The retrodirective reflection of the optical systems against the incident laser is introduced and the laser ranging equation of the targets which have such effects is derived in detail in this paper. The limis to the surveillance range are discussed in two types of backgrounds: the large size targets with diffuse reflection characteristics on the ground and the small size targets with diffuse reflection characteristics in the air. The conclusion is proved by the experimental analysis.
Related Articles | Metrics

A novel genetic algorithm based on the quantum chromosome

YANG Shu-yuan1;2;LIU Fang3;JIAO Li-cheng1;2
J4   
Abstract1721)            Save
The genetic algorithm is an efficient optimization tool for its independence of problems, intrinsic parallelism and inherent learning capacity; however, it has some disadvantages such as slow convergence and prematurity. In this paper, a novel algorithm, called the quantum genetic alrogithm--QGA, is proposed based on the combination of the quantum theory with the evolutionary theory. By adopting the qubit chromosome as a representation, QGA can represent a linear superposition of solutions due to its probabilistic representation. The random observation simulating the quantum collapse can bring diverse individuals, and the evolution of quantum chromosome can also pilot the evolution. So it has better diversity than the classical genetic algorithm. Rapid convergence and good global search capacity characterize the performance of QGA. The paper not only proves the global convergence of the QGA, but also some simulation experiments are shown to prove its superiority over other algorithms.
Related Articles | Metrics

Application of wavelet analysis in medical image fusion

TAO Guan-qun1;LI Da-peng2;LU Guang-hua1
J4   
Abstract1583)            Save
In practical clinic applications, the 3D reconstrution of the single-modality medical image(CT, MRI) can not provide enough information for clinical doctors. Because of a different imaging mechanism and highly complexity of body tissues and structures, different modality medical images provide non-overlay complementary information. Fusion rules of maximum, local gradient and area energy based on wavelet transform are advanced. Compared fusion results of CT and MRI images are gien, which show the proposed method based on the area energy fusion rule can achieve better fusion performance than other usual fusion rules. The fusion image can combine the merits of two original images, providing not only the exact orientation reference of pathological changes but also the clear pathological tissue.
Related Articles | Metrics

Research on the protocol of the subliminal-free channel in digital signatures

DONG Qing-kuan;ZHANG Chuan-rong;XIAO Guo-zhen
J4   
Abstract1877)            Save
Some defects of G.J.Simmons' subliminal-free protocol are discovered during our study. In this paper two narrow-band subliminal channels are given based on the protocol. One is the channel we have constructed based on harmless messages, and the other is the channel constructed by Y.Desmedt based on the component r of ElGamal signature (r,s). Then a sound discussion shows that it is impossible to construct a complete subliminal-free channel in digital signatures. At the same time the lowest transmission efficiency is discussed.
Related Articles | Metrics

Application of data fusion in SAR image denoising

SHENG Guo-fang1;LENG Zhao-xia2;JIAO Li-cheng1
J4   
Abstract1879)            Save
The CMAP filter based on the statistic feature of SAR image and the filter based on the wavelet transform show different characteristics in the application of SAR image denoising. The CMAP filter can reduce the influence of the speckle better, but the detail of the image in lost greatly. The wavelet transform can keep the detail of the image well, but the effect of reducing the speckle is not good. In this paper, we use the two results of these two filter methods according to a certain fusion rule. The experimental result shows that this method can reduce the influence of the speckle and keep the image detail well.
Related Articles | Metrics

Design o space-time block codes with pre-coding

LI Ying;WANG Xin-mei
J4   
Abstract1801)            Save
A design method for the space-time block code(STBC) with pre-coding is proposed to utilize both space diversity and time diversity. The constellations are rotated first. Then the L-dimension signal vector a is transformed to a new vector x, which is divided into L/2 sub-vectors. These L/2 sub-vectors are used to construct the signal matrix and transmitted via two antennas one by one. When m receive antennas are fixed, the diversity achieved by the pre-coding STBC in Lm, which is L/2 times that of the traditional methods over quasi-static flat fading channels. Compared with the space-time trellis code(STTC), the Pre-coding STBC has lower complexity without performance deterioration.
Related Articles | Metrics

Angular resolution of jammers of the passive monopulse seeker

XU Song-tao1;2;YANG Shao-quan1
J4   
Abstract1550)            Save
The angle resolving method of two narrow band Gaussian noise jammers for the passive monopulse seeker is presented. In the case of one jammer within the main beam, the average angle of arrival given by the seeker points in the direction of the jammer. In the case of two jamers within the main beam, the average angle of arrival points at the power centroid. One or two jammers within the main beam can be distinguished by the complex angle. By using the complex angle and clustering analysis, an angle resolving method of two jammers is presented. The method is verified with the results of digital computer simulation.
Related Articles | Metrics

Oblivious transfer with extractors

ZHAO Tie-shan;GE Jian-hua;YANG Bo
J4   
Abstract1566)            Save
Reductions among oblivious transfers have a long history in cryptography. This paper describes a (2 1)-1-OTk protocol that can be reduced to a single execution of UOT by using privacy amplification with extranctors. An extractor allows to efficiently isolate the randomness of some source into virtually-random bits, using a small number of perfectly-random bits as a catalyst. With extractors, less information is transmitted and the leaked information is at most 2-n-1/2-o(1) bits. The conditions under which the protocol is unconditionally secure are investigated.
Related Articles | Metrics

Recent developments of consumer behavior stochastic models

DU Rong;HU-Qi ying
J4   
Abstract1359)            Save
This paper makes a survey of recent developments in the area of consumer behavior stochastic modeling. We first outline some basic models including category choice, brand choice, and purchasing incidence models. Then, we formulate in detail some newly extended models for brand choice and purchasing rate, including the negative binomial model and the Markovian model introducing explanory variables, the Markovian model introducing variety seeking, brand choice models considering dynamic consumer preferences and product attributes, the cyclical choice model and the household choice model, bying incidence models introducing explanory variables and consumer heterogeneity, and the comprehensive model integrating brand choice with buying incidence. Furthermore, we analyze the particular characteristics and common natures of teh ablve metioned extended models. After that, we point out the new trends of consumer behavior stochastic models. Finally, we conclude the survey by posing several problems needed to be studied further.
Related Articles | Metrics

Effect of the cell culture dish configuration on the millimeter-wave irradiation dose

ZHAO Jian-xun1;LU De-qiang2
J4   
Abstract1759)            Save
An analysis is made of the millimeter-wave(MMW) dosimetry in culture dishes used in experiments on MMW biological effects at the cellular level. The finite-difference time-domain(FDTD) technique is employed to compute the MMW power density(PD) irradiated into cells in two culture dishes with typical configurations and the MMW specific absorption rate(SAR) of cells with consideration of the 8mm wavelength. A qualitative analysis as well as quantitative illustrations is carried out for the outcomes. As indicated in the results, distributions of the MMW PD irradiated into cells, the SAR of cells, and experimental results are significantly influenced by culture dish configurations which should be seriously considered in related experiments.
Related Articles | Metrics

Compact space-like hypersurfaces with constant scalar curvature in locally symmetric de Sitter space

SHU Shi-chang1;2;LIU San-yang1
J4   
Abstract1363)            Save
The compact n dimensional space-like hypersurfaces with constant scalar curvature in locally symmetric de Sitter space Nn+11 are studied, with some rigidity characterization theorems obtained by introducing a self-adjoint operator and by using the moving frame method. As a corollary, the rigidity characterization theorem is obtained on the space-like hypersurfaces in a de Sitter space Sn+11. These results generalize the results of Zheng and Liu, and the pinching constants do not depend on the dimensional n.
Related Articles | Metrics

An AKE protocol for mobile networks

YU Bin-xiao;WANG Xin-mei
J4   
Abstract1503)            Save
For mobile communication networks, the main security troubles including the authentication of entities, establishment, delivery, and negotiation of conversation keys mostly concentrate on the wireless interface duo to its inherent openness. In this paper, we first propose a new AKE protocol on the basis of research on other alike ones, then analyze its security and other performance and finally discusses some correlative issues about the protocol. As the analysis shows that our protocol has not only higher safety, but more suppleness, better efficiency, low operation times, and better applicability, thus being suitable for mobile use.
Related Articles | Metrics

Hedging strategy of a contingent claim as the price of the underlying asset follow jump-diffusion process

LIU Xuan-hui1;HU Qi-ying2
J4   
Abstract1429)            Save
The price of underlying assets follows a jump-diffusion process. We introduce the dynamic measure of risk to the incomplete market. We have acquired optimal replication of contingent claim in the auxilizar finance market which is induced by a risk neutral probability measure. With an application clark formula the paper provides the optimal hedging strategy for a contingent claim.
Related Articles | Metrics

PKC and chosen ciphertext security

CHEN Yuan;WANG Yu-min;XIAO Guo-zhen
J4   
Abstract1525)            Save
Security against the chosen ciphertext attack of PKC is discussed(simply denoted by chosen ciphertext security of IND-CCA2). Some schemes which make general PKCs IND-CCA2 are compared and analyzed, on the basis of which we classify all the present methods which can obtain IND-CCA2 and find a common idea among them, which is the contruction of a test of ciphertext validity. Finally a problem in the IND-CCA2 security proof of OAEP+ is pointed out together with its two solutions.
Related Articles | Metrics

A cut-plane algorithm for semidefinite programming and its application

WANG Xin-hui;LIU San-yang;LIU Hong-wei
J4   
Abstract1364)            Save
A cut plane algorithm for semidefinite programming is presented in this paper, which relaxs the semidefinite programming to a linear programming, thus solving large scale semidefinite programming effeciently. Its covergence is proved. As an applications, a numerical example of the Max-cut problem is given.
Related Articles | Metrics

Theoretical frameworks for KDD based on intelligence

ZHENG Jian-guo1;2;ZHOU Ming-quan1;GENG Guo-hua1
J4   
Abstract1392)            Save
Data mining is currently a hot research topic of the knowledge discovery domain. The core components of data mining technology have been under development for decades in research areas such as statistics, artificial intelligence, and machine learning. By analyzing the concept and theory of immunity in life sciences, the theoretical frame of KDD based on intelligence is discussed.
Related Articles | Metrics

Euclid algorithm for finding the inverse and generalized inverse of the permutation factor circulant matrix

JIANG Zhao-lin1;2;LIU San-yang1
J4   
Abstract1331)            Save
A new algorithm for finding the inverse of a nonsingular permutation factor circulant matrix is presented by teh Euclid algirytm of polynomial. Extension is made to compute the Moore-Penrose inverse of a singular permutation factor circulant matrix. Finally, numerical examples show the effectiveness of the algorithm.
Related Articles | Metrics

A dynamic secret sharing scheme to identify cheaters

HE Ye-feng;ZHANG Jian-zhong
J4   
Abstract1630)            Save
A dynamic secret sharing scheme based on discrete logarithms is proposed which can detect cheaters. The shadow of every participant can be used by many times without restriction, so that the system secrets can be renewed without renewing the shadows of the participants. The system can also accept a new participant or fire a participant freely. Due to its properties of security and efficiency, the scheme will find wide applications in distributed key escrow and electronic commerce.
Related Articles | Metrics

Principle of the reconfiguration expert system for a reconfigurable manufacturing system

CAI Zong-yan
J4   
Abstract1328)            Save
The reconfiguration expert system for a reconfigurable manufacturing system is one of the most important technologies that can be used to design a candidate reconfigurable manufacturing system. The principle of a reconfiguration expert system for a reconfigurable manufacturing syste is suggested in this paper. Moreover, the automatic and CBR-based reconfiguration method of the reconfigurable modular machine tool and the reconfiguration method of a reconfigurable manufacturing system, according to a given order form, are brought forward. These reconfiguration methods are primary enabling technologies of a reconfiguration expert system for a reconfigurable manufacturing system.
Related Articles | Metrics

An undeniable cryptographic protocol for both the sender and the receiver

LI Yan-ping;ZHANG Jian-zhong
J4   
Abstract1307)            Save
We survey the state of non-repudiation cryptographic protocols, almost all of which have weaknesses. The paper proposes a perfect protocol which can be used to realize the strong fairness and non-repudiation of both parties even if the channels are not reliable. Usually the protocol only needs three interactions of participants and the transferring data remain confidential for others but the sender and the receiver, who are unknown to others. The Trusted Third Party(TTP) acts as a notary rather than a delivery and its bottleneck problem is solved completely. Finally the security of the protocol is analysed in detail.
Related Articles | Metrics

Study of DC characteristics models of SiGe HBT

DAI Xian-ying1;ZHANG He-ming1;HU Hui-yong1;Lü Yi1;WANG Wei1;LI Kai-cheng2
J4   
Abstract1519)            Save
The SiGe HBT DC models of and the analytic expressions for various currents with definite physical meanings are established, based on the solution to equations of drift and diffusion. The established current models are suitable for both large and small current injections. MEDICI is used to simulate the effects of Ge content and doping concentration on current density. The simulating results show that the decrease of the current gain is due to the decrease of the collector current and the increase of the neutral base recombination current caused by the increase of base doping cocentration. The effects of the collector current, backward hole injection current, neutral base recombination current and space-charge region recombination current on the current gain are also analyzed and discussed.
Related Articles | Metrics

A novel optimal model of and the solution to the layer yield of IC's

JING Ming-e;HAO Yue;ZHAO Tian-xu;MA Pei-jun
J4   
Abstract1447)            Save
Based on the need for the method to improve the IC's integrated profit, a novel layer yield optimal model is presented. Firstly, an integrated performance function is formulated. Secondly, accoring to the integrated performance function, all factors, such as designable parameters, the number of layers and layered parameters, are considered together to establish the optimal model. Thirdly a special algorithm is designed for this model with efficient sampling technology--Uniform Design. Finally, encouraging results have been obtained thus far, with numerical and circuit examples given to demonstrate the model.
Related Articles | Metrics

The reliability study of EEPROM with the FLOTOX structure

LUO Hong-wei1;2;YANG Yin-tang1;ZHU Zhang-ming1;XIE Bin3;WANG Jin-yan3
J4   
Abstract1551)            Save
A type of EEPROM with the FLOTOX structure is intoduced. The main reliability issues of the FLOTOX EEPROM are studied, i.e., the degradation of the programming windows, the degradation of the retention characteristics and the time dependent dielectric breakdown(TDDB). The reliability of FLOTOX is correlative to the quality of the tunnel oxide. The degradation of FLOTOX depends on the trap charges which come from the tunnel oxide, which is proved by experimental results.
Related Articles | Metrics

Fluid neural network based routing algorithm

BO Hua1;MA Fu-long2
J4   
Abstract1527)            Save
From the heuristic viewpoing, the maximum probability criterion for the choice of the routing of a communication network is proposed by comparing the communication network with the fluid neural network. The routing algorithm based on the fluid neural network is developed. Experimental results indicate that the proposed algorithm is much faster than any existing routing algorithm.
Related Articles | Metrics