Bimonthly    Since 1986
ISSN 1004-9037
Indexed in:
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Distributed by:
China: All Local Post Offices
  • Table of Content
      10 September 1997, Volume 12 Issue 5   
    For Selected: View Abstracts Toggle Thumbnails
    A Stochastic Approach for Blurred Image Restoration and Optical Flow Computation on Field Image Sequence
    Gao Wen; Chen Xilin;
    Journal of Data Acquisition and Processing, 1997, 12 (5): 385-399. 
    Abstract   PDF(893KB) ( 1889 )  
    The blur in target images caused by camera vibration due to robot motion or hand shaking and by object(s) moving in the background scene is different to deal with in the computer vision system. In this paper, the authors study the relation model between motion and blur in the case of object motion existing in video image sequence, and work on a practical computation algorithm for both motion analysis and blur image restoration. Combining the general optical flow and stochastic process, the paper presents an approach by which the motion velocity can be calculated from blurred images. On the other hand, the blurred image can also be restored using the obtained motion information. For solving a problem with small motion limitation on the general optical flow computation, a multiresolution optical flow algorithm based on MAP estimation is proposed. For restoring the blurred image, an iteration algorithm and the obtained motion velocity are used. The experiment shows that the proposed appro…
    A Multi-View Face Recognition System
    Zhang Yongyue; Peng Zhenyun; You Suya; Xu Guangyou;
    Journal of Data Acquisition and Processing, 1997, 12 (5): 400-407. 
    Abstract   PDF(643KB) ( 1416 )  
    In many automatic face recognition systems, posture constraining is a key factor preventin g them from application. In thi5.paper, a series of strategles. will be described to achieve a system which enables face recognition under varying pose. These approaches include the multi-view face modeling, the threshold image based face feature detection, the affine transformation based face posture normalization and the template matching based face idelltification. Combining all of these strategies, a face recognition system with the pose invariance is designed successfully. Using a 75MHZ Pentium PC and with a database of 75 individuals, 15 images for each person, and 225 test images with various postures, a very good recognition rate of 96.89% is obtained.
    Simulation of Waters
    Xu Yingqing; Su Cheng; Qi Dongxu; Li Hua; Liu Shenquan;
    Journal of Data Acquisition and Processing, 1997, 12 (5): 408-413. 
    Abstract   PDF(313KB) ( 1348 )  
    This paper presents a model of the waters based on the hydraulic equations.Conditioning the initial values of the equations and solving the equations by finite-difference method, many kinds of waters and waves can be simulated,such as torrents, ripples, tides, the dam breach flood and tidal bores. Rendered examples are given and described.
    A Radiosity Solution for Curved Surface Environments
    Sun Jizhou; Richard L;
    Journal of Data Acquisition and Processing, 1997, 12 (5): 414-424. 
    Abstract   PDF(345KB) ( 1318 )  
    Radiosity has been a popular method for photorealistic image generation.But the determination of form factors between curved patches is the most difficult and time consuming procedure, and also the errors caused by approximating source patch's radiosity with average values are obvious. In this paper,a radiosity algorithm for rendering curved surfaces represented by parameters is described. The contributed radiosity from differential areas on four vertices of the source patch to a receiving point is calculat…
    Constructive Sets in Computable Sets
    Mi Thxi;
    Journal of Data Acquisition and Processing, 1997, 12 (5): 425-440. 
    Abstract   PDF(711KB) ( 1312 )  
    The original interpretation of the constructive set theory CZF in Martin-Lof's type theory uses the 'extensional identity types'. It is generally believed that these 'types' do not belong to type theory. In this paper it will be shown that the interpretation goes through without identity types. This paper will also show that the interpretation can be given in an intensional type theory. This reflects the computational nature of the interpretation. This computational aspect is reinforced by an w-Set model of…
    A Partial Evaluator for A Parallel Lambda Language
    Kuang Hairong; Sun Yongqiang; Lin Kai;
    Journal of Data Acquisition and Processing, 1997, 12 (5): 441-457. 
    Abstract   PDF(731KB) ( 1330 )  
    This paper describes theoretical and practical aspects of a partial evaluator that treats a parallel lambda language. The parallel language presented is a combination of lambda calculus and message passing communication mechanism. This parallel language can be used to write a programming language's denotational semantics which extracts the parallelism in the program. From this denotational definition of the programming language, the partial evaluator can generate parallel compiler of the language by self ap…
    NUAPC: A Parallelizing Compiler for C++
    Zhu Genjiang; Xie Li; Sun Zhongxiu;
    Journal of Data Acquisition and Processing, 1997, 12 (5): 458-469. 
    Abstract   PDF(261KB) ( 1344 )  
    This paper presents a model for automatically parallelizing compiler based on C++ which consists of compile-time and run-time parallelizing facilities.The paper also describes a method for finding both intra-object and inter-object parallelism. The parallelism detection is completely transparent to users.
    Mapping Between 2-D Meshes of the Same Size
    Peng Guoqiang;
    Journal of Data Acquisition and Processing, 1997, 12 (5): 470-475. 
    Abstract   PDF(157KB) ( 1386 )  
    Given two 2-D meshes 1171 and MZ of sizes si x t; where si≤ti(i=1, 2) and s1 x fl=s2 x t2, embedding Ml to MZ with minimum dilation is……….
    CIMS Network Protocol and Its Net Models
    Luo Junzhou; Gu Guanqun;
    Journal of Data Acquisition and Processing, 1997, 12 (5): 476-481. 
    Abstract   PDF(275KB) ( 1457 )  
    Computer communication network architectures for CIMS are based on the OSI Reference Model. In this paper, CIMS network protocol model is set up on the basis of the corresponding service model. Then the authors present a formal specification of transport protocols by using an extended Predicate/Transition net system that is briefly introduced in the third part. Finally, the general methods for the Petri nets based fornlal specification of CIMS network protocols are outlined.
SCImago Journal & Country Rank

ISSN 1004-9037


Editorial Board
Author Guidelines
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China

E-mail: info@sjcjycl.cn
  Copyright ©2015 JCST, All Rights Reserved