Author Login Editor-in-Chief Peer Review Editor Work Office Work

Most cited

Baidu   Google scholar   CSCD   Crossref   Web of science   Sciencedirect

Published within: In last 1 yearsIn last 2 yearsIn last 3 yearsAll
Condition: Baidu + All
Please wait a minute...
  • Select all
    |
  • Artificial Intelligence and Recognition Technology
    YANG Chun-hua; GU Li-shan; GUI Wei-hua
    Computer Engineering. 2008, 34(16): 188-190. https://doi.org/10.3969/j.issn.1000-3428.2008.16.065
    CSCD(21)
    Considering the premature convergence problem of Particle Swarm Optimization(PSO), a new Adaptive Particle Swarm Optimization with Mutation(APSOwM) is presented based on the variance ratio of population’s fitness. During the running time, the inertia weight and the mutation probability are determined by two factors: the variance ratio of population’s fitness and the average distance of current population. The ability of APSOwM to break away from the local optimum and to find the global optimum is greatly improved by the adaptive mutation. Experimental results show that the new algorithm is with great advantage of convergence property over PSO, and also avoids the premature convergence problem effectively.
  • Software Technology and Database
    ZHANG Yu; WANG Ying-hui; ZHANG Xiang-nan
    Computer Engineering. 2010, 36(4): 59-62. https://doi.org/10.3969/j.issn.1000-3428.2010.04.021
    Baidu(66) CSCD(6)
    In order to build the mechanism of Model-View-Controller(MVC) pattern implementation that is efficient, flexible and easy to use, this paper gives a MVC framework based on Spring framework. This framework builds view layer by using JSP technology, enhances the function of control layer by the methods of combining overall control and local control and uses O/R Mapping class to achieve data access operation. It implements transaction management based on IOC/AOP technology and applies the framework to the development of network bookmark.
  • Artificial Intelligence and Recognition Technology
    XU Zhengguang; BAO Donglai; ZHANG Lixin
    Computer Engineering. 2006, 32(24): 186-188. https://doi.org/10.3969/j.issn.1000-3428.2006.24.067
    Baidu(70) CSCD(21)

    On the foundation of studying former connecting area algorithms, the paper presents a pixel labeled algorithm based on recursive method of connecting area in binary images. The algorithm determines the distribution and count of connecting areas through once scanning of image. It mainly includes two steps in the algorithm. Firstly, scanning the input binary image is used to get the whole connecting labeled area and the equal marks list. The second step is to analyze the equal marks list by recursive method to ascertain the right distribution and count of connecting areas. Experiments show that it can exactly detect any connecting areas in binary images, which contains complicated shapes and random number (less than 1 000).

  • Software Technology and Database
    ZHANG Yufang; PENG Shiming; LV Jia
    Computer Engineering. 2006, 32(19): 76-78. https://doi.org/10.3969/j.issn.1000-3428.2006.19.028
    CSCD(35)
    TFIDF is a kind of common methods used to measure the terms in a document. The method is easy but it undervalues these terms that frequently appear in the documents belonging to the same class, while those terms can represent the characteristic of the documents of this class, so higher weight is entrusted to them. The expression of IDF in TFIDF is modified to increase the weight of those terms mentioned, then is applied to the experiment to validate it. In the experiment, the improved TFIDF is used to select feature and genetic algorithm is used to train the classifier. The method is better than others and proves that the improved TFIDF method is feasible.

  • Engineer Application Technology and Realization
    SHAO Huanqing; KANG Jianchu
    Computer Engineering. 2007, 33(02): 220-222. https://doi.org/10.3969/j.issn.1000-3428.2007.02.077
    Baidu(47) CSCD(19)
    SOA(service oriented architecture) is being coming the mainstream of IT integration technology, component layer and Web service layer are foundations of SOA, and ESB(enterprise service bus) is the main infrastructure of SOA. Aimming at component layer and Web service layer, this paper discusses the principium of ESB, and expatiate how to use it to map and transmit component to Web service.
  • ZHA Xiu-qi, WU Rong-quan, GAO Yuan-jun
    Rise of Internet technology, resulting in more and more enterprises begin to migrate from C/S mode to B/S mode. In connection with traditional software reuse technology, which makes a deep analysis to the existing C/S mode system. This paper presents an implementation of converting application software from C/S mode to B/S mode. It uses the virtual application technology and .NET framework UIA technology, taking XML file as information exchange carrier, to make browser achieve remote operation on C/S software, which needs zero understanding of the C/S software and makes the use of existing resources to complete the development of B/S structure, and modifies the code of the C/S software to zero. It fully reflects the pattern of platform independence, and posses the features of interface uniformity, highly scalable, easy maintenance. Experimental results show that the method can be successfully applied in calculator program under Windows XP.
  • Software Technology and Database
    XIANG Yang; WANG Min; MA Qiang
    Computer Engineering. 2007, 33(14): 59-61. https://doi.org/10.3969/j.issn.1000-3428.2007.14.021
    Baidu(30) CSCD(12)
    There are a lot of difficulties in the ontology building such as the unclear building methods, ununified ontology languages, lack of tools. To solve these problems, this paper presents an ontology building method with Jena. The method is composed of 5 parts: class description, property description, link of property and class, individual creation, ontology metadata adding. The validity of the method is proved with an instance.
  • Engineer Application Technology and Realization
    LI Xiaodong; YANG Yang; GUO Wencai
    Computer Engineering. 2006, 32(21): 217-219,. https://doi.org/10.3969/j.issn.1000-3428.2006.21.076
    Baidu(67) CSCD(19)
    This paper analyzes the difficulties of current electronic government construction encountered and the prerequisite of building electronic government data share-and-exchange platform to overcome them. The characteristics of ESB are listed by introducing the definition, framework and basic capabilities of the burgeoning distributed computing technology-enterprise service bus. The author advances a new architecture for electronic government data share-and-exchange platform which is based on ESB. The function properties of the platform are presented, then the mechanism is given, which fulfills the loose coupling integration for heterogeneous applications.


  • Artificial Intelligence and Recognition Technology
    XIA Tian
    Computer Engineering. 2007, 33(06): 191-194. https://doi.org/10.3969/j.issn.1000-3428.2007.06.067
    Baidu(150) CSCD(23)
    Similarity computation of Chinese words is a key problem in Chinese information processing. This paper proposes a new method on similarity computation which is based on Hownet, geared to semantic and could be expanded. The new method defines a similarity computation formula among Hownet’s sememes according to information theory, finds a way out of the difficulty that OOV words cannot participate in semantic computation by implementing concept segmentation and automatic semantic production to OOV words, and realizes the similarity computation on the semantic level among arbitrary words finally. Experimental result of CILIN indicates that the accuracy rate of the new method is nearly 15% higher than present ones.
  • Artificial Intelligence and Recognition Technology
    LIN Shuang-mei; WANG Geng-sheng; CHEN Yi-qiu
    Computer Engineering. 2007, 33(17): 196-198,. https://doi.org/10.3969/j.issn.1000-3428.2007.17.067
    Baidu(84) CSCD(11)
    This paper proposes a user profile representation based on vector space model together with its dynamic learning algorithm, and studies feature selection in user modeling. A new feature selection method combining term frequency and TFIDF according to part-of-speech tagging is proposed. The experiment indicates that the dynamic learning algorithm can catch and record user’s latest interest in time, thus the user required information can be truly recommended. The experiment also shows that the effect of combining method based on part-of-speech tagging is better than that of using TF or TFIDF separately.
  • Networks and Communications
    WANG Hai-Chao, GU Zong-Pu
    Computer Engineering. 2011, 37(9): 112-114. https://doi.org/10.3969/j.issn.1000-3428.2011.09.038
    Baidu(11) CSCD(2)
    Model realization of Struts have some problems, such as complex JDBC connecting to database, high coupling between layers and difficult code maintenance, et al. Aiming at these problems, this paper presents a Web application development scheme based on Struts and Hibernate. It really achieves the loose coupling between layers and easy maintenance, reduces the difficulty of development of business model. Through part of development codes and running window of student management system, it explains the process of integration and proves the feasibility of integrated solutions.
  • Engineer Application Technology and Realization
    LIU Miao; WANG Tianmiao; WEI Hongxing; CHEN Youdong
    Computer Engineering. 2006, 32(22): 222-224. https://doi.org/10.3969/j.issn.1000-3428.2006.22.079
    Baidu(88) CSCD(15)
    This paper discusses a hardware and software architecture of embedded numerical control system. This system is built on uCOS-II and ARM. The timing specification of uCOS-II is analyzed based on the performance of RTOS. The method for getting the longest timing specification of uCOS-II is described. And the time of system schedule is measured. The paper also analyzes the system real-time performance and stability. The result indicates that this embedded numerical control system has perfect real-time character, low cost and high-performance. It has extensive application.
  • Degree Paper
    DING Zhenhua; LI Jintao; FENG Bo; GUO Junbo;
    Computer Engineering. 2006, 32(21): 9-11. https://doi.org/10.3969/j.issn.1000-3428.2006.21.004
    Baidu(48) CSCD(7)
    RFID middleware is regarded as the nerve center of RFID systems. This paper discusses the current state of RFID middleware research, points out the deficiencies of current techniques, then describes the progress in this area, especially in RFID event process, at last gives the future research direction.

  • Networks and Communications
    LUAN E-Jian, HUANG Chong-Min, GONG Gao-Cheng, DIAO Tie-Zhu
    Computer Engineering. 2010, 36(14): 262-263. https://doi.org/10.3969/j.issn.1000-3428.2010.14.095
    Baidu(29) CSCD(17)

    As applications programs based on MapReduce model growing up, Hadoop’s performance depends on applications. From applications, this paper analyzes the limitations and shortcomings of Hadoop architecture and storage technology, and proposes a feasible and cost-effective solution to address the problem. It builds a series tests to convince the idea. The solution is multi-level parallel, both on job and I/O levels, which makes full use of disk and network bandwidth, reduces I/O bottlenecks and improves performance.

  • Developmental Research
    WANG Ya-gang
    Computer Engineering. 2010, 36(06): 267-269. https://doi.org/10.3969/j.issn.1000-3428.2010.06.091
    Baidu(31) CSCD(6)
    Due to the specialty and diversity of the embedded systems, much tedious transplant work must be done when embedded Linux is deployed on the target embedded system. In order to overcome the blindness of transplant work and speed up the entry markets time of the embedded products, a brief introduction to the embedded system Bootloader(U-Boot as an example) is given, with emphasis on its basic structure and mechanism. Based on the implementation of transplanting U-Boot to HHPPC852T target, a typical method for transplanting Bootloader to a new target is presented, which is simple and practicable.
  • Developmental Research
    WANG Lisheng; MEI Yan; CAO Nanyang
    Computer Engineering. 2007, 33(02): 246-248. https://doi.org/10.3969/j.issn.1000-3428.2007.02.087
    Baidu(61) CSCD(4)
    The paper introduces the light-weight stack. It describes the standard TCP/IP stack. It gives emphasis to the characters of TCP/IP stack in embedded system and design methods. A comparison between standard TCP/IP stack and light-weight TCP/IP stack is listed.
  • Artificial Intelligence and Recognition Technology
    XIAO Chaoyun; ZHU Weixing
    Computer Engineering. 2007, 33(14): 188-189,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.066
    Baidu(98) CSCD(17)
    In image segmentation, threshold selection is very important. A partial recursive algorithm of threshold selection and segmentation is put forward, which is based on the Otsu threshold selecting method. Based on the information of entropy of image pixels, a partial recursive algorithm is used to search optical threshold. It not only reduces the running time, but also has better self-adaptability. With this algorithm, the image can be segmented effectively even if it is uneven and not the single-modal or bimodal one. The segmentation result has more details, which is good to the feature extraction. An experiment with Lena image is made and good result is obtained.
  • Networks and Communications
    LIU Dun, TAN Jian-Jun, SHAO Chang-Gao
    Computer Engineering. 2010, 36(10): 242-244. https://doi.org/10.3969/j.issn.1000-3428.2010.10.084
    Baidu(50) CSCD(16)
    In view of disadvantages of poor interactive, slow response and low scalability in traditional WebGIS application, this paper proposes a rich Internet WebGIS framework based on Flex after studying Flex technology. It elaborates on the hierarchical structure, composition and reciprocity of this framework and gives implementation. After applied in a public information service system, it shows that this framework can effectively enhance user’s experience, improve operating efficiency and provide stronger technical support for the release of spatial information.
  • Artificial Intelligence and Recognition Technology
    SUN Shibao; QIN Keyun
    Computer Engineering. 2007, 33(13): 200-201,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.068
    Baidu(99) CSCD(9)
    The method of data clustering will influence the effect of clustering directly. The algorithm of k-means is discussed, the shortages of this algorithm such as it can not deal with symbolic data and it is sensitive for data of isolation point and noise are demonstrated. A modified k-means clustering algorithm based on weights is put forward, it changes the shortcomings of k-means. Its complexity is analyzed from theoretical. The experiments show that, compared with traditional method based on means, the modified data clustering algorithm can improve the efficiency of data clustering.
  • Networks and Communications
    WANG Hui-Feng, ZHOU Li-Chi, ZHANG Jie
    Computer Engineering. 2010, 36(19): 216-218. https://doi.org/10.3969/j.issn.1000-3428.2010.19.076
    Baidu(21) CSCD(20)
    Bicubic interpolation is an effective way to get well-qualified high-resolution image, but with high calculation load. The common used interpolation methods are discussed. A new region-based bicubic interpolation is proposed. Without segmenting the image, the mean value of the four neighboring points of the interpolated point is calculated which is used to divide the image into two regions: the flat region and the complex region with more details. Two different interpolating algorithms are chosen for each region. Experimental results show that the proposed algorithm can keep the image quality equal to the original algorithm while reducing the calculation load more than 10 percents. It is useful for applications.
  • Software Technology and Database
    YUAN Fang; ZHOU Zhiyong; SONG Xin
    Computer Engineering. 2007, 33(03): 65-66. https://doi.org/10.3969/j.issn.1000-3428.2007.03.024
    Baidu(213) CSCD(44)
    The traditional k-means algorithm has sensitivity to the initial start center. To solve this problem, a new method is proposed to find the initial start center. First it computes the density of the area where the data object belongs to; then finds k data objects all of which are belong to high density area and the most far away to each other, using these k data objects as the initial start centers. Experiments on the standard database UCI show that the proposed method can produce a high purity clustering result and eliminate the sensitivity to the initial start centers.
  • Security Technology
    ZHANG Lin; ZENG Qing-kai;
    Computer Engineering. 2008, 34(12): 157-159. https://doi.org/10.3969/j.issn.1000-3428.2008.12.055
    Baidu(20) CSCD(9)
    This paper summarizes two strategies of software security flaw detection, named static analysis and program verification. Several static detection methods such as lexical analysis, rule checking, type theory deduction, model checking, theorem proving, and symbol execution are also synthetically reviewed. It discusses the advantage, applicability and tendency of static detecting techniques.

  • Developmental Research
    YANG Linnan; LI Honggang; ZHANG Lilian; PENG Lin
    Computer Engineering. 2007, 33(07): 246-248. https://doi.org/10.3969/j.issn.1000-3428.2007.07.089
    CSCD(1)
    The design and implementation of high speed multichannel data gathering system based on FPGA is introduced. The system is applied in the electric locomotive silicon-controlled rectifier installation real-time monitor system. As the front end of data gathering of the electric locomotive silicon-controlled rectifier installation real-time monitor system, the system can carry on the confirmation of the technical condition of the silicon-controlled rectifier in the course of the actual operation, and the examination effect is good.
  • Software Technology and Database
    CHEN Le; YANG Xiaohu
    Computer Engineering. 2006, 32(19): 62-64. https://doi.org/10.3969/j.issn.1000-3428.2006.19.023
    Baidu(34) CSCD(10)
    As the distributed technique develops, the use of MVC becomes wider and wider, MVC is no longer limited to the construction of components, but also can be used in the software design of distributed application. This paper introduces basic concepts of MVC pattern, analyzes how to apply the MVC pattern properly and efficiently in distributed environment and provides an implementation framework for distributed MVC pattern using Web services and message oriented middleware. This framework can help to build a well-architected, loosely-coupled distributed application.
  • Software Technology and Database
    LI Jianhua; CHEN Songqiao; MA Hua
    Computer Engineering. 2006, 32(20): 100-102. https://doi.org/10.3969/j.issn.1000-3428.2006.20.037
    Baidu(30) CSCD(10)
    Service-oriented architecture(SOA) is a coarse-grained, loosely coupled system architecture which supports dynamic enterprise application integration. A SOA reference model (SOA-RM) cored with service enactment engine (SEE) is presented. By analyzing the genetics medical resource net project and specializing this reference model, one integration support system is designed based on SOA that is used to implement effectively dynamic enterprise application integration.
  • Networks and Communications
    LEI Rong, FAN Yong, CHEN Nian-Nian, WANG Dun-Bei
    Computer Engineering. 2010, 36(21): 178-180. https://doi.org/10.3969/j.issn.1000-3428.2010.21.064
    Baidu(28) CSCD(21)
    Geometric feature extraction from image is a crucial step in image classification and recognition algorithms. It requires to calculate the Minimum Enclosing Rectangle(MER) of the image to get some attributes, such as length and width. This paper proposes an algorithm based on the combination of the vertex chain code and the discrete Green theorem to extract MER from image. According to this algorithm, it can calculate the area, centroid, and principal axis of the image easily, only with its point coordinates from the veritical or hrizontal direction of the vertex chain code. Experimental results show that the rotation method’s speed is two times of the current algorithms, while the principal axis method is three times of the rotation method.
  • Networks and Communications
    HU Xiao-Dong, XIAO Yin-Chao, SHU Shi-Rui
    Computer Engineering. 2011, 37(10): 272-274. https://doi.org/10.3969/j.issn.1000-3428.2011.10.094
    Baidu(52) CSCD(12)
    The propagation of rumors is similar to virus spreading in social networks. This paper builds SIR model and discusses the propagation taking into account topology of microblogging communication network and the rules of rumor. The mathematical derivation and computer simulation reveal that the propagation is impacted by the infection rate and degree distribution entropy. More serious the infection rate affects, more enormous the scale of infection is. Smaller the degree distribution entropy is, easier the rumors spread in it.
  • Developmental Research
    WU Liping; ZHAO Zhuo;CHEN Qi;SHI Guorong ;ZHENG Jianqun
    Computer Engineering. 2006, 32(17): 283-284. https://doi.org/10.3969/j.issn.1000-3428.2006.17.100
    Baidu(16) CSCD(4)
    The paper proposes an architecture model for design system management software. The model consists of a management platform and one or more management applications that run upon the platform. The management platform is actually a policy-based, three-tiers, center-oriented, multi-tiered framework. Management application is a software module that performs concrete management functions. The most important advantage of the model is that it has good extensibility. It lays emphasis on the design of the management platform.
  • Artificial Intelligence and Recognition Technology
    ZHAO Wan-jin; GONG Sheng-rong; LIU Chun-ping; SHEN Xiang-jun
    Computer Engineering. 2008, 34(10): 212-214. https://doi.org/10.3969/j.issn.1000-3428.2008.10.077
    Baidu(76) CSCD(21)
    This paper analyzes the theory of Harris operator, and points out its disadvantage. It proposes an auto-adaptive Harris operator based on the ideology of image break and neighboring point eliminating method. It makes the corners are well-proportioned distributing, and avoids too many corners stay together effectively. Experimental results show that the algorithm can detect corner more reasonable, and can be used in image mosaics well.
  • Degree Paper
    FU Ping; FANG Shuai; XU Xinhe ; XUE Dingyu
    Computer Engineering. 2007, 33(10): 22-24. https://doi.org/10.3969/j.issn.1000-3428.2007.10.008
    Baidu(21) CSCD(8)
    The method of the shadow detection and remove which has application value is proposed based on analyzing visual properties concerning shadows for visual surveillance purposes. The method proposed is essentially based on background modeling and background subtraction which aim to segment moving object and the corresponding shadow. It decides whether there are shadows in a given foreground figures. A method based on illumination assessment is developed for this purpose. Multi-gradient analysis and a fast clustering algorithm for thresholded image are employed to detect the shadow. Shadow is removed and the object is segmented. Experimental results are given to demonstrate the effectiveness and practicality of the method.
  • Artificial Intelligence and Recognition Technology
    WANG Xingling
    Computer Engineering. 2006, 32(19): 193-195. https://doi.org/10.3969/j.issn.1000-3428.2006.19.071
    CSCD(3)
    This paper presents a method based on template match and maximum variance between clusters to segment the characters of license plate. The template of character string on license plate is designed, according to the character string’s structural features. The template slips on the license plate to match the right location, and this matching process regarded as a classifying process combines with the judge rule of maximum variance between clusters to get the optimizational matching location to segment the characters.
  • Software Technology and Database
    NI Wan-cheng; LIU Lian-chen; WU Cheng
    Computer Engineering. 2008, 34(4): 79-81. https://doi.org/10.3969/j.issn.1000-3428.2008.04.027
    Baidu(59) CSCD(22)
    Web service composition, as a new technology to fulfill the user’s requirements using existing ones, has become a pop topic in the research of Service Oriented Architecture(SOA). The survey is made on current WSC methods. The concepts and implementing frameworks of WSC are discussed. And based on the research emphases and its dependent technology, WSC methods are classified into process driven WSC such as work-flow based, state-figure and process algebra based methods, and semantics based automatic WSC. The evaluation models and the challenges in research and implementation of WSC have been summarized.
  • Software Technology and Database
    LIU Ning; LU Rong-guo; MIAO Wan-sheng
    Computer Engineering. 2008, 34(4): 107-110. https://doi.org/10.3969/j.issn.1000-3428.2008.04.037
    Baidu(17) CSCD(4)
    To design and develop the complicated software system requiring interactive response, a new multi-dispatch-based behave-type-binding and knowledge-decoupled architecture framework pattern is educed. It is based on the methodology idea system and leaded by continuously-abstracting strategy. An evolutionary iteration process is implemented on the traditional MVC architecture pattern. Integration Signals and Logic Tool SAL Studio 1.0 are implemented to show how to implement the new evolutionary design methodology idea system in a real project. The results demonstrate that the new solution is more reliable, flexible, dynamic and reusable for the software design and development.
  • Engineer Application Technology and Realization
    Computer Engineering. 2006, 32(12): 123-129.
    Baidu(19) CSCD(4)
    The explosion of P2P file sharing has a significant impact on the Internet. It brings the serious problems such as network congestion and traffic hindrance caused by the excessive occupation in the bandwidth, and the hidden trouble in security. This paper studies the key technologies on traffic identification and control policies. An integrated traffic identification system is proposed, and a prototype model of traffic identification and policy control is designed and presented.
  • Software Technology and Database
    DONG Yaozu;;ZHOU Zhengwei
    Computer Engineering. 2006, 32(13): 71-73. https://doi.org/10.3969/j.issn.1000-3428.2006.13.026
    Baidu(43) CSCD(11)
    This article introduces the current status of X86 architecture based paravirtualization technology and full-virtualization technology, especially for hardware assistant virtualization technology, proposes two systemic virtual machines, Denali and XEN, which support the paravirtualization technology. Then it discusses the development of full-virtualization technology. In the meantime, it presents the solution scheme that supports these two technologies, and focuses on the trends of development of virtualization technology and its usage model.

  • Artificial Intelligence and Recognition Technology
    ZHOU Kaijun; CHEN Sanbao; XU Jiangling
    Computer Engineering. 2007, 33(04): 198-200. https://doi.org/10.3969/j.issn.1000-3428.2007.04.069
    Baidu(69) CSCD(12)
    An edge detection-projection feature based algorithm to locate the LP and a vertical projection-template matching algorithm to segment the characters are proposed. The edges are detected in a gray-level vehicle image, the result of experiment shows that the speed of detecting license plate is high and the obtained contour is very legible. The LP region is located by projection method, the tilt angle of LP is corrected by Hough transform. The character is segmented by LP segmentation algorithm, and some problems are solved effectively under complex scenes. To demonstrate the effectiveness of the proposed algorithm, it conducts extensive experiments over a large number of real-world vehicle license plates. It reports that the proposed algorithms have high accuracy and robustness.
  • Engineer Application Technology and Realization
    MENG Hui; LIU Xuefeng
    Computer Engineering. 2006, 32(23): 253-255,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.090
    Baidu(22) CSCD(4)
    Whether in or out of computer systems, unified bus standards and improvement of bus bandwidth are needed. This paper analyzes the feature and architecture of PCI express bus from the technical point of view, discusses the criterion of interface and physical architecture. It forecasts the foreground of the PCI express bus.
  • Developmental Research
    FENG Run-min
    Computer Engineering. 2009, 35(6): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2009.06.098
    CSCD(4)
    This paper proposes that technology of architecture for Struts, Hibernate and Spring(SSH) is available in the development and application of high education student management system which is based on B/S model, and presents the rapid procedure of design and development during the course of Web information system. Result proves that SSH not only can improve efficiency of system development and system maintainability but also can strengthen extensibility.
  • Artificial Intelligence and Recognition Technology
    WANG Jiaqin; LI Renfa; LI Zhongsheng; TANG Jianbo
    Computer Engineering. 2007, 33(11): 201-203. https://doi.org/10.3969/j.issn.1000-3428.2007.11.073
    Baidu(35) CSCD(8)
    This paper proposes a different ontology concept semantic similarity algorithm, which uses entities similarity to get the initial concept semantic similarity, and integrates two coefficients which influence concept semantic similarity to get the final concept semantic similarity. Comparing with probability statistic, experiments prove that this method is valid. The research can be applied in the field of knowledge searching.
  • Developmental Research
    YANG Wei; LIU Qiang; GU Xin
    Computer Engineering. 2006, 32(19): 283-284. https://doi.org/10.3969/j.issn.1000-3428.2006.19.102
    Baidu(25) CSCD(2)
    Programming for USB device drivers is a complex job. The Linux USB core subsystem has offered a large amount of relevant mechanisms and application programming interface(APIs) to support the USB device works Plug-and-Play(PNP) and relax the job developing of USB device drivers. With a representative example, the paper introduces some related concepts of USB, analyses the pattern, data structures related to Linux USB subsystem. It emphasizes on how Linux support the protocol of USB and describes the general method and skill in development of Linux USB drivers.
  • Networks and Communications
    LI Bin; LI Wen-feng
    Computer Engineering. 2008, 34(9): 127-129. https://doi.org/10.3969/j.issn.1000-3428.2008.09.046
    Baidu(30) CSCD(4)
    Wireless Sensor Network(WSN) changes human being and the nature interactive mode, and radio frequency identification puts up the bridge between the physics world and current information system. If WSN and RFID and connect with IEEE802.15.4 and ZigBee, people will get WSID network, that has great improvement in the respect of communication distance, clock synchronism, localization and data aggregation, etc. relative to available WSN and RFID. The paper brings forward the software platform architecture based on Service-Oriented Architecture(SOA) and XML Web Services according to the applied characteristic of the omnibus system.
  • Software Technology and Database
    ZHOU Deng-peng; XIE Kang-lin
    Computer Engineering. 2007, 33(18): 95-96,1. https://doi.org/10.3969/j.issn.1000-3428.2007.18.034
    Baidu(48) CSCD(4)
    As an information retrieval library written in Java, Lucene, with high performance and easy to scale, can easily add searching and indexing capabilities to applications. This paper discusses the vector space model used in Lucene, analyzes the structure of index files and ranking algorithm, and describes the compressing algorithm in Lucene. An experiment is done to test the indexing process of Lucene.
  • Engineer Application Technology and Realization
    KUANG Xinghong; SHAO Huihe
    Computer Engineering. 2007, 33(06): 228-230. https://doi.org/10.3969/j.issn.1000-3428.2007.06.080
    Baidu(68) CSCD(9)
    This paper introduces a design of gateway of wireless sensor networks, expatiates on the methods of hardware and software. The communication to nodes of WSN based on CC1010 and the communication to Internet by TCP/IP based on GPRS are implemented. The reliable link between WSN and the other networks is described.
  • Networks and Communications
    XIE Chuan
    Computer Engineering. 2011, 37(10): 87-89. https://doi.org/10.3969/j.issn.1000-3428.2011.10.029
    Baidu(31) CSCD(9)
    Aiming at a large number of RREQ packet flooding problems in the route discovery process, an advanced AODVjr algorithm resulting from node energy and Cluster-Tree algorithm is proposed. The new AODVjr algorithm tries to avoid the low-energy nodes when choosing route and can control the general direction and hops of the RREQ packet. At the same time, the simulation results indicate that the new AODVjr algorithm can cut down the total energy cost effectively, share the network load properly, reduce the death of nodes, and extend the network life cycle.
  • Software Technology and Database
    SU Tan-ying; GUO Xian-yong; JIN Xin
    Computer Engineering. 2007, 33(23): 94-96. https://doi.org/10.3969/j.issn.1000-3428.2007.23.032
    Baidu(29) CSCD(2)
    This paper proposes a model of Chinese full-text retrieval system based on Lucene which is an open source full-text retrieval engine, and expatiates its frame. This model is composed of seven modules, among which the index module and the search module are the core parts. It designs them concretely, and improves the search efficiency of the full-text retrieval system with index technology and search technology. The system model concludes an encryption module to encrypt the index and increases the system security.


  • Networks and Communications
    WANG Xiao-Dun, LIU Xu-Min, GUAN Yong
    Computer Engineering. 2012, 38(14): 196-198. https://doi.org/10.3969/j.issn.1000-3428.2012.14.059
    CSCD(25)
    Referring to the image which is in the medical field, and similar to the medical image as red blood cells needs to detect cell size, roundness, and number of other features detection requirements, this paper proposes an image edge detection algorithm based on improved Canny operator. It calculates the optimal high and low dual-threshold through iteration arithmetic, and uses mathematical morphology to detect image thinning. Experimental results prove that this algorithm can effectively reduce interference and noise edge, and make more prominent detection characteristics of medical cell image.
  • Networks and Communications
    HE Jiang, YAN Li
    Computer Engineering. 2011, 37(3): 210-212. https://doi.org/10.3969/j.issn.1000-3428.2011.03.074
    Baidu(33) CSCD(18)
    Aiming at the disability of traditional Canny operator in noise suppression and detecting low-intensity edge, this paper proposes an edge detection method combined LOG operator and Canny operator. LOG operator is used to the picture for noise filtering and Canny operator is improved in the flowing three aspects to execute the edge detection: (1)It designs Gaussian smoothing kernel to intense the edge of picture filtered noise, which makes the low-intensity edge detect easily; (2)Gradient magnitude and direction are calculated by pixels within a M-by-N neighborhood; (3)It integrates gradient direction with the calculation of gradient magnitude, which can be the ground for gradient magnitude in edge detection. Through carrying out a lot experiment for picture increased salt and pepper noise, the method proposed in this paper can not only suppress noise in the largest degree, but also detect more low-intensity edge.
  • Artificial Intelligence and Recognition Technology
    CHEN Yan-yan; WANG Yuan-qing
    Computer Engineering. 2008, 34(17): 202-204. https://doi.org/10.3969/j.issn.1000-3428.2008.17.072
    Baidu(43) CSCD(18)
    Based on whole qualitative analysis, this paper compares and validates merits and demerits of various edge detection algorithms in a quantificational way from several typical judgement standards for edge detection algorithms like edge connectivity, nosie resistence ability, operation complexity. By means of B cubic spline interpolation, it improves the quality of the detected images. Experiental results show that this methods can be well applied in the region of image processing.
  • Networks and Communications
    LIU Yuan-Yuan, GAO Qiang-Yi, CHEN Yang
    Computer Engineering. 2010, 36(16): 30-32. https://doi.org/10.3969/j.issn.1000-3428.2010.16.011
    Baidu(29) CSCD(10)
    Aiming at the large granularity of Virtual Machine(VM) resources and the great amount of data transferred in the process of migrating, this paper presents a load balancing method based on VM migration. It uses the threshold to predict load tendency of host machine, which ensures that a small transient spike does not trigger needless VM migration. After triggering migration, it uses probability-weighted approach to select the target node, which resolves the problem of accumulation conflicts. Experimental results show that the method can improve the system performance in the case of great imbalance of the host machine load distribution.
  • Artificial Intelligence and Recognition Technology
    QIAN Guang-chao;¸JIA Rui-yu; ZHANG Ran; LI Long-shu
    Computer Engineering. 2008, 34(23): 196-198. https://doi.org/10.3969/j.issn.1000-3428.2008.23.070
    Baidu(44) CSCD(16)
    This paper introduces the principle and efficiency of the Apriori algorithm which is the classical algorithm of association rules mining, and proposes an improved Apriori algorithm――En-Apriori algorithm which is aimed at the disadvantage of Apriori algorithm. This algorithm adopts a matrix method and need scan the database only once and optimizes the join operation, so it is more efficient. The experiment shows that the En-Apriori algorithm outperforms Apriori algorithm, and gets a good practicality.