Author Login Editor-in-Chief Peer Review Editor Work Office Work

05 March 2010, Volume 36 Issue 5
    

  • Select all
    |
    Degree Paper
  • DU Yu-chuan; GENG Yuan-jing; SUN Li-jun
    Computer Engineering. 2010, 36(5): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2010.05.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The available travel demand data in local urban road network generally are traffic volume data of important intersections, and are not integrated OD matrix. In view of this point, this paper proposes a traffic assignment model for local area road network based on Monte-carlo method. Considering the good stability in temporal sequence, intersection turning ratio is adopted as the important parameter of this model. The formulation for local area road network assignment problem is proposed on the assumption of random Monte-carlo simulation. The compute process of traffic assignment coefficient matrix for local area road network is provided. The traffic assignment model based on Monte-carlo method is used in traffic analysis for an actual urban road network. Results comparing surveying traffic volume data and calculation volume data verify applicability and validity of the proposed methodology.
  • CAO Yi-ning; ZHENG Xiao-ping; LI Yan-he; ZHANG Han-yi
    Computer Engineering. 2010, 36(5): 4-6,9. https://doi.org/10.3969/j.issn.1000-3428.2010.05.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A short-light path preferred establishment mechanism is proposed to solve the virtual topology design problem in IP/WDM networks. The proposed mechanism limits the hop counts of the light path in optical layer to avoid overuse of bandwidth by the long-light path, and establishes more light paths with small hops. Simulation results show that the designed virtual topology with this mechanism effectively reduces network blocking probability and increases the traffic grooming efficiency in a large scale of traffic loads.
  • GAO Rui-ze; YU Jian; YAN Chao
    Computer Engineering. 2010, 36(5): 7-9. https://doi.org/10.3969/j.issn.1000-3428.2010.05.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper summarizes the overseas research situation of accelerating Computational Fluid Dynamics(CFD) codes using memory hierarchy techniques. The influence of Cache-friendly method on code efficiency is studied by means of analysis of modern CPU Cache structure. Three dimensional multi-block CFD FORTRAN code is optimized by two methods based on Cache-friendly method. A 3D optimized LU-SGS algorithm is presented. The numerical experiments executed in three kinds of microprocessors indicate that the running time of optimized code is from 20 percent to 50 percent of the original code.
  • GENG Li-zhong; JIA Hui-bo
    Computer Engineering. 2010, 36(5): 10-11,1. https://doi.org/10.3969/j.issn.1000-3428.2010.05.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The existing intrusion detection methods based on sequences of system calls have a large overhead to construct normal profile. An efficient algorithm using statistical language models is proposed based on STIDE in order to reduce the computing cost. The system calls which can represent the characteristics of normal behaviors are extracted by an N-gram method. The improved algorithm extracts the most relevant sequences of system calls. Experimental results demonstrate that the computing cost of the improved algorithm has a reduction of 70% than the standard one and no degradation of detecting rate and false positive rate.
  • QI Xing-yun; DOU Qiang; FENG Quan-you; CHEN Yong-ran; DOU Wen-hua
    Computer Engineering. 2010, 36(5): 12-14. https://doi.org/10.3969/j.issn.1000-3428.2010.05.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of implementing optical buffers in the present high performance computer optical interconnection difficultly, this paper presents a bufferless optical interconnection named Bufferless Optical Interconnection Network(BOIN). Based on modeling and analyzing the network topology, the relationship between the network delay and the offered loads as well as network sizes is studied. The condition of minimal delay of the network in a fixed offered loads and total number of nodes is given out. Simulation shows that the results are right.
  • ZHANG Lu; HE Xing-hua; LU Huan-zhang
    Computer Engineering. 2010, 36(5): 15-17. https://doi.org/10.3969/j.issn.1000-3428.2010.05.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In space environment, Single-Event Upset(SEU) occurs in the memories of information processing system which runs on the platform of space aircraft. Researching on the effect of SEU with different memory, a new boot system is designed and several measures such as adding Error Detection And Correction(EDAC) module and refreshing the FLASH-ROM are carried on to reduce the error probability on booting, and it increases the reliability of DSP system.
  • GAO Chao; LIU Ji-ming; ZHONG Ning; HUANG Jia-jin; QIU Hong-jun
    Computer Engineering. 2010, 36(5): 18-20. https://doi.org/10.3969/j.issn.1000-3428.2010.05.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to restrain the virus propagating in email networks, this paper analyzes the performance of betweenness-based strategies and traditional degree-based strategies in an interactive email model. It compares the efficiency and cost of different strategies both in the Enron email network and synthetic network. The numerical results show that node-betweenness immunization strategy can effectively restrain the virus propagation with least immunized nodes.
  • JIANG Min; XU Qin; SHANG Tao; GAO Wei-yi
    Computer Engineering. 2010, 36(5): 21-22,2. https://doi.org/10.3969/j.issn.1000-3428.2010.05.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As an algorithm based on Bayesian estimation, particle filtering is predominant on tracking nonlinear moving target. This paper proposes an algorithm, which is based on Mean-shift and particle filtering, named K-means and Mean-shift Embedded Particle Filter(KMSEPF). The KMSEPF algorithm improves the general mixture algorithms which are based on particle filtering and Mean-shift. Results show that the algorithm reduces the computation complexity, while maintains the high precision and the ability to control the occlusion, compared with the MSEPF algorithm.
  • XIA Zheng-min; LU Song-nian; LI Jian-hua; MA Jin
    Computer Engineering. 2010, 36(5): 23-25. https://doi.org/10.3969/j.issn.1000-3428.2010.05.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the impact of abnormal traffic on network self-similarity, an abnormal traffic detection method is designed through comparing the difference of Hurst parameter distribution under network normal and abnormal traffic conditions. This method uses wavelet analysis to calculate the Hurst parameter and the detection threshold can be self-adjusted according to the extent of network self-similarity. Test results on data sets of Lincoln Lab of MIT demonstrate that the new detection method has the characteristic of dynamic self-adaptive, higher detection rate and faster detection speed.
  • YUN Chao; BU Zhi-yong;
    Computer Engineering. 2010, 36(5): 26-27,3. https://doi.org/10.3969/j.issn.1000-3428.2010.05.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The pseudo period of the preamble in 802.16e systems disappears if there are inferences caused by neighboring segments. The method based on the pseudo period of the preamble can not work under this condition. A novel synchronization method based on the conjugate symmetry of the preamble is proposed. The method can implement frame detection, symbol timing estimation and carrier frequency offset estimation concurrently. It is efficient and can reduce the complexity of synchronization module of system. Simulation results show that this method can gain good performance even in multi-path channel with severe inferences caused by neighboring segments.
  • MENG Xian-ming; LING Pei-liang
    Computer Engineering. 2010, 36(5): 28-31. https://doi.org/10.3969/j.issn.1000-3428.2010.05.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper improves the Artificial Fish Swarm Algorithm(AFSA) by modifying the strategies such as the field of vision and step in. Combining with the characteristics of table tennis technique and tactic, it adopts pre-processing on table tennis technique and tactic original data. The classification rule data mining model of table tennis technique and tactic based on improved AFSA is established. The match instances of top athletes are analyzed and the results show that compared with association rule data mining of the table tennis technique and tactic, this model has great advantage of mining quality and mining effect.
  • YUAN Zhen-ming; JIN Gui-chao; ZHANG Jia
    Computer Engineering. 2010, 36(5): 32-34. https://doi.org/10.3969/j.issn.1000-3428.2010.05.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the limitation of restricting the user’s drawing style during the sketch grouping and recognition, a Bayesian network based sketch recognition algorithm is proposed. The algorithm combines the sketch grouping and the graphic symbol recognition into a unified procedure, which represents the sketch structure information as a Bayesian network. Based on the network, the growing sketches are grouped according to the maximum posterior probability, and each sketch group is recognized as a predefined symbol simultaneously. Experimental results show the effectiveness for the progressive sketch grouping and recognition, which has 71.3% procedure recognition rate and 85% final recognition rate.
  • Software Technology and Database
  • LI Guang-qiang; ZHENG Mao-yi; DENG Min
    Computer Engineering. 2010, 36(5): 35-36,3. https://doi.org/10.3969/j.issn.1000-3428.2010.05.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Depending on “k standard deviation” rule, a new Spatio-Temporal Outlier Detection(STOD) method is proposed, named as a Dual non-spatio-temporal attributes Deviation-based STO Detection(DDSTOD). For each time instant, in Spatial Neighborhoods(SN) of each feature, the rule is employed to judge whether the spatial feature is a spatial outlier, and all the spatial outliers form a spatial outlier set. In the Temporal Neighborhoods(TN) of each spatial outlier, the rule is utilized to check temporal outliers, too. All features which are outliers both in their SN and TN composite Spatio-Temporal Outliers set(STOs). Experimental results show this method is effective and feasible.
  • LIU Peng-cheng; CHEN Rong
    Computer Engineering. 2010, 36(5): 37-39. https://doi.org/10.3969/j.issn.1000-3428.2010.05.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Considering the features of cloud computing, a new live virtual machine migration framework is presented. It is implemented on basis of two typical open source Virtual Machine Monitor(VMM) Xen and KVM. Test results show this framework has good performance, which can dynamically control the migration process to meet Service Level Agreement(SLA).
  • LI Si-li; LI Juan
    Computer Engineering. 2010, 36(5): 40-42,4. https://doi.org/10.3969/j.issn.1000-3428.2010.05.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an algorithm and a strategy for mapping XML document to relational database based on analysis of some data mapping strategies. It avoids information loss in the process of data transfer and the problems in query and reconstruction caused by too many or too few relations in the transfer results. Example relation tables after transferring are given, which prove that the mapping strategy can solve the problems of element recursion efficiently and maintain the structure relationship between elements.
  • ZHANG Rui; PENG Qi-min; ZHAO Jun-suo
    Computer Engineering. 2010, 36(5): 43-45. https://doi.org/10.3969/j.issn.1000-3428.2010.05.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To counter transient fault, a fault tolerance compilation method is proposed. By using the information of variable, it cuts down the redundant logic for fault tolerance at instruction-level on LCC, which gets better performance. Experimental results show with the usage of this method, the program running time increases by only 0.043 times, and storage only 0.69 times. The overhead of it is better than that of others.
  • JIA Li; XU Jing; JIN Xin; TIAN He
    Computer Engineering. 2010, 36(5): 46-48,5. https://doi.org/10.3969/j.issn.1000-3428.2010.05.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An automatically system for Web functional test is presented, which is based on an XML description and integrates the Web pages structure analysis. It can generate test data as well as test cases automatically by the constraints and the rules. This system can record the path where user operates on a Web with all the pages that passed by. Refering to the definition of workflow, it defines a test-flow and is described by using XML. It can do the test as a user when following the test-flow with using the test data. It promotes the test efficiency.
  • WANG Chang-jing; LUO Hai-mei; ZUO Zheng-kang; XUE Jin-yun;
    Computer Engineering. 2010, 36(5): 49-51. https://doi.org/10.3969/j.issn.1000-3428.2010.05.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Using PAR method, this paper derives formally the Huffman algorithm program for solving optimal encoding problem. It takes full advantage of the properties of optimal encoding tree. As partitioning the source problem into sub-problem, it uses a new element to replace two or more old elements. It provides a suit of abstract notations to represent set, binary tree, which is close to mathematical language. The derivation process is concise and can produce correct algorithm. The Huffman algorithm can transform into executive program and run normally using the automatic generation system in PAR platform.
  • HAN Li; CEN Song-xiang; MA Jian; MA Yan
    Computer Engineering. 2010, 36(5): 52-53,5. https://doi.org/10.3969/j.issn.1000-3428.2010.05.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the features of Blog Webpage, a novel ranking algorithm called E-BlogRank is presented. The E-BlogRank value of each Blog is computed based on social relationship for reading comment among Bloggers. The Blog groups are changed with time. The active Blogs presently are encouraged by using decay factors. The Blogs that were welcomed but not update or the update frequency is low now are punished, which strengthens the timeliness of ranking results.
  • CHEN Wen
    Computer Engineering. 2010, 36(5): 54-56. https://doi.org/10.3969/j.issn.1000-3428.2010.05.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a weighted frequent k-itemset generation algorithm based on bit matrix. The algorithm introduces the concept of weighted support degree and minimum support expectation. It only scans the database once, prunes the weighted frequent k-itemset generation process based on the 2-itemset bit matrix by constructing filtering condition and improves the generation efficiency of weighted frequent itemset.
  • QIAO Yi; GUO Qi-yong; SHEN Yi-fan
    Computer Engineering. 2010, 36(5): 57-58,6. https://doi.org/10.3969/j.issn.1000-3428.2010.05.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the theory of sparse decomposition of signals over an overcomplete dictionary, this paper proposes a data classification algorithm based on sparse decomposition named SRC. By studying data sparse mapping relationships among different data classes, the test samples are mapped into a higher dimensional space. Decision function is defined according to the error of sparse reconstruction, which determines the class of test samples. It uses UCI dataset to evaluate the effectiveness of the algorithm, and compares the experimental results of Support Vector Machine(SVM) and Fld. The results show that SRC gains the highest accuracy in classification, and it has good robustness in the imbalanced dataset experiment.
  • WANG Miao; HAO Zhong-xiao;
    Computer Engineering. 2010, 36(5): 59-61. https://doi.org/10.3969/j.issn.1000-3428.2010.05.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper takes query point as a generation point of Delaunay diagram and utilizes the relationship between this point and its adjacent generation point to search Reverse Nearest Neighbor(RNN) in adjacent generation point set(less than six elements) of query point. It takes Delaunay tree generated during the process of Delaunay incremental generation as the query index structure, which can store Delaunay diagram and maintain Delaunay diagram topology when a point is added or deleted.
  • FU Bao-long; CHEN Ru-yun
    Computer Engineering. 2010, 36(5): 62-63,6. https://doi.org/10.3969/j.issn.1000-3428.2010.05.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on rule quantity and meansure standard of extraction ratio, this paper presents an association rule mining algorithm using parallel clonal annealing genetic strategy. This algorithm combines the merits of genetic algorithm, simulation annealing algorithm and immune clonal algorithm, and obtains the optimal solution of problem by operations such as cloning, mutation and crossover. Theoretic analysis and simulation experimental results demonstrate that this algorithm can solve association rule mining problem effectively and rapidly.
  • ZHU Liang; FENG Yan-chao; LIU Chun-nian; YANG Wen-zhu
    Computer Engineering. 2010, 36(5): 64-66. https://doi.org/10.3969/j.issn.1000-3428.2010.05.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Query selectivity estimation is one of the key issues for query processing and optimization. This paper presents a method based on domain distribution density to establish histograms in which the distribution of buckets is uniform or nearly. It utilizes the histograms to estimate query selectivity. Experimental results indicate that this method gets query selectivity with high precision for low-dimensional data and can estimate high-dimensional data.
  • XU Hui; YANG Yong-guo
    Computer Engineering. 2010, 36(5): 67-69. https://doi.org/10.3969/j.issn.1000-3428.2010.05.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to process the task in the open network environment quickly and efficiently, this paper presents the Multi-Agent cooperative processing model combining mobile Agent with computer supported cooperative work and researches on the implementing technologies in the model. Collaboration manager which can decompose task controls the mobile Agents to realize the cooperation between them. An effective algorithm is applied to model to get the best schedule of subtask to reduce the task processing time and improve efficiency.
  • LUO Zhi-wei; HUA Qing-yi; LI Juan;
    Computer Engineering. 2010, 36(5): 70-72. https://doi.org/10.3969/j.issn.1000-3428.2010.05.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to resolve the problem of difficulty developing user interface in distinct devices, this paper designs a SVG-based Self-adaptive User Interface Tool(SSUIT). The tool employs a multi-layered structure, and uses self-adaptive layout arithmetic based on paging idea to handle the problem of differentia in size of screen. A construction example of integrated tool for automatic generating self-adaptive user interface is given. Test results show that SSUIT has good practicality.
  • YANG Ming; LI Xin-ke
    Computer Engineering. 2010, 36(5): 73-75. https://doi.org/10.3969/j.issn.1000-3428.2010.05.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Absorbed the basic methods of the design model which is specially used to deal with changeability, this paper brings forward a scalar quantity to measure the software architecture change depth. It analyzes the change impact from extent and depth by using matrix. It studies elementarily the blowout phenomenon. It puts forward two scalar quantities to measure the software architecture changeability. It suggests an order to modify the software architecture. Experimental results prove that the proposed quantities can express the changeability of software architecture.
  • GUI Bing-xiang; HE Jian
    Computer Engineering. 2010, 36(5): 76-78. https://doi.org/10.3969/j.issn.1000-3428.2010.05.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a distributed data mining approach with high performance cloud, prescribes its structure design briefly. The design of this cloud results in the data is able to process frequently in one place without moving it. With the special layered service structure, this data mining parallelism can be used for mining large distributed data sets over clusters connected with high performance wide area networks. Experimental results show that the data parallel approach is better than Hadoop method.
  • KAN Ying-ying; CAO Tian-jie
    Computer Engineering. 2010, 36(5): 79-80,8. https://doi.org/10.3969/j.issn.1000-3428.2010.05.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of privacy leak exists in the grouping unrelated-question model, this paper presents an improved grouping unrelated-question model to achieve the Privacy-preserving association rules through disguising and changing the original data. Experimental results show that the rule which algorithm gets has a lower error and better privacy compared with the original rule.
  • LIU Jin-ling
    Computer Engineering. 2010, 36(5): 81-83. https://doi.org/10.3969/j.issn.1000-3428.2010.05.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Combined with semantic similarity of text data, this paper gives a method of text data clustering based on semantic density. According to the characteristics of text data, from a randomly selected text object, it expands towards the most intensive area of the text data, organizes into a structure to reflect the corpus in an orderly sequence, and then clusters. In dealing with noise text data, it uses the results of the reorganization of an effective strategy to support the re-positioning noise text data. Experimental results show that the method has good clustering performance.
  • DAI Zhi-li; LI Xia; LV Qing-chun
    Computer Engineering. 2010, 36(5): 84-85. https://doi.org/10.3969/j.issn.1000-3428.2010.05.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traditional privacy preserving association rule mining algorithms do not consider the correlation of the left hand side and the right hand side, which affect non-restrictive rule support negatively. In order to solve the problem, this paper presents an algorithm which adjusts the correlation coefficient to hide restrictive rules because the value of this rule can not be found. Experimental results show that the algorithm has lower miss rate and dissimilarity.
  • Networks and Communications
  • ZHAO Yuan-tao; YANG Shou-bao; TENG Da; HUANG Yan-bin; HE Wei-qing
    Computer Engineering. 2010, 36(5): 86-88. https://doi.org/10.3969/j.issn.1000-3428.2010.05.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In Worldwide Interoperability of Microwave Access(WiMAX) Mesh network, resource allocation can be handled by centralized schedule scheme and distributed schedule scheme, but most QoS researches focus on one of the schemes. This paper proposes a QoS guarantee mechanism named CDCSQ(Combined Distributed and Centralized Schedule QoS), which combines the two schedule schemes. QoS is improved by adopting different schedule schemes for different services. Centralized schedule is used to guarantee real-time services and distributed schedule is used to enable direct communication between two nodes in Mesh network. Simulation results show that the service delay of the mechanism is less than that of IEEE 802.16 standard.
  • WANG Xiao-nan; TANG Zhen-min; QIAN Huan-yan
    Computer Engineering. 2010, 36(5): 89-90. https://doi.org/10.3969/j.issn.1000-3428.2010.05.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a fast handoff scheme for Hierarchical Mobile IPv6(HMIPv6) based on multicast tree in order to shorten the handoff delay time for mobile node. This scheme employs fast handoff to establish the multicast tunnel between the anchor and the mobile node. In the same domain, the mobile node is always identified by one multicast address. Simulation results show that handoff time in the scheme is shorter, the packet loss radio is lower and the performance is better, compared with existing HMIPv6 scheme.
  • ZHAGN Qing; QU De-xiang; CHAI Qiao-lin
    Computer Engineering. 2010, 36(5): 91-94. https://doi.org/10.3969/j.issn.1000-3428.2010.05.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In clustering Wireless Sensor Network(WSN) using multi-hop routing, the nearer to the sink node, the more load will be put on the header, headers near the sink node will quickly lose energy and cause a lot of process of re-clustering. Aiming at these problems, this paper proposes Energy-Efficient Reliable Clustering(EERC) algorithm for WSN based on complete graph to balance energy cost among clusters, designs a dynamic header alternation mechanism to supporting quick header selection and failure recovery. Simulation results show that this algorithm can overwhelm in prolonging network lifetime, reduce energy cost and support reliable data delivery.
  • ZHAO Yi-sheng; LI Yun; LIU Zhan-jun; LIU Qi-lie
    Computer Engineering. 2010, 36(5): 95-96,9. https://doi.org/10.3969/j.issn.1000-3428.2010.05.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the heterogeneous trend of wireless network, this paper extends the heterogeneous network composed of WLAN and UMTS, and makes it contain WLAN, WiMAX and UMTS. Simulation model of vertical handover in extended heterogeneous network is built based on Media Independent Handover(MIH). It analyzes the handover delay, packet loss count and network usage efficiency during the handover period. Simulation results indicate that Link Going Down(LGD) mode has little handover delay and packet loss count than Link Down(LD) mode. The network usage efficiency decreases when the power level threshold coefficient increases gradually.
  • CHEN Xue-wen; FAN Xun-li
    Computer Engineering. 2010, 36(5): 97-99. https://doi.org/10.3969/j.issn.1000-3428.2010.05.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to adapt the mutative application environment, prolong the use cycle of Wireless Sensor Network(WSN), this paper proposes a sensor network service architecture based on Open Services Gateway initiative(OSGi) specification. This architecture can provide service for various electronic equipment and external applications, implement the remote management of data interaction of the wireless network gateway node and gateway service. Experimental result proves that this architecture enhances the openness, interoperability of WSN.
  • GAO Jing-ju; LIU Yu-hua; ZHU Long-quan; LI Yu-ling
    Computer Engineering. 2010, 36(5): 100-102,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to enhance the flexibility of generated cluster, this paper proposes a new clustering algorithm based on communication facility in Wireless Sensor Network(WSN). Different from traditional clustering algorithm which generates cluster construct by cluster head, this algorithm combines with communication facility of node to form complete cluster structure, inter-cluster communication and intra-cluster communication are all in multi-hop way. Simulation result shows that this algorithm is of less energy consumption, it is suitable for small node density and large-scale networks.
  • ZENG Ying-lan; ZHENG Jin-hua
    Computer Engineering. 2010, 36(5): 103-105. https://doi.org/10.3969/j.issn.1000-3428.2010.05.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper improves classical Differential Evolution(DE) algorithm, gets a Spacial Distance based Multi-Objective Differential Evolutionary(SD-MODE) algorithm, applies it to coverage optimized in Wireless Sensor Network(WSN). Compared with classical NSGA-II algorithm and ε-MOEA algorithm, simulation results demonstrate that SD-MODE algorithm can orient mobile node better, enhance percent of coverage, and decrease average movement distance.
  • TANG Tian-bing; SHEN Wen-jie; WEI Ling-yun
    Computer Engineering. 2010, 36(5): 106-108. https://doi.org/10.3969/j.issn.1000-3428.2010.05.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A hybrid Genetic Algorithm(GA) based on DNA is proposed for the optimization of multicast routing with Quality of Service(QoS) constraint. Based on the framework of GA with DNA coding and improved crossover and mutation operators, the proposed algorithm is also combined with improved simulated annealing and niche operation to make the individuals of a niche enforce simulated annealing operation independently and to keep the diversity of population, and further to improve search capability of the algorithm and convergence rate. Experimental results demonstrate this algorithm is viable and efficient.
  • SU Rui; WANG Yong; YANG Zhi-hui
    Computer Engineering. 2010, 36(5): 109-110,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In view of the question that the hierarchical mold does not satisfy the power law distribution rule in the existing topological modeling research, this paper proposes a hierarchical network topology model and a topology generating algorithm PPHM based on topology potential and power law. It realizes node stratifying by computing the topology potential, exactly discovers network important connection. Through comparing with the topological properties such as average minimum road length and so on, the validity of this modeling method is proved.
  • YANG Chen-wei; LENG Su-peng
    Computer Engineering. 2010, 36(5): 111-113. https://doi.org/10.3969/j.issn.1000-3428.2010.05.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    NS2 doesn’t support simulation of multi-channel, multi-interface, which becomes an obstacle to some relevant researcher when conducting simulation. To solve this problem, this paper proposes a solution of generality which makes NS2 support the simulation of multi-channel, multi-interface, power control and Cognitive Radio(CR) network by modifying the framework of network module and extending functions. An example is studied to verify the effectiveness of the proposed solution.
  • LI Xin; LIU Dong-lin
    Computer Engineering. 2010, 36(5): 114-115. https://doi.org/10.3969/j.issn.1000-3428.2010.05.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With rapid development of P2P technology and its protocol complexity, traditional P2P traffic identification solution is not accurate and efficient. Aiming at this problem, this paper proposes a solution based on new P2P statistic characteristic and neural network to identify P2P traffic. Experimental results show that this method has proper accuracy on P2P traffic identification.
  • LIANG Ke-jie; WEI Wen-hong; WANG Gao-cai
    Computer Engineering. 2010, 36(5): 116-118,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the problem of network multi-outlet traffic schedule and unbalance problems based on Linux, this paper utilizes history traffic rate and schedule weight to advance an efficient solution for managing the traffic of multi-outlet, which can adjust the network traffic and adapt the proportion of export traffic automatically, and presents a whole configuration procedure and the realization of the key schedule algorithm of the two-outlet campus network. Simulation experiment shows that the solution effectively schedules the multi- outlets’ traffic, and solves the problem of network load balance.
  • XIA Min; WU Zhong-hai; YANG Ya-hui
    Computer Engineering. 2010, 36(5): 119-121. https://doi.org/10.3969/j.issn.1000-3428.2010.05.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the sending end/receiver to send rate control-related research results on the basis of a two-based buffer to send the rate control method. This method can increase the number of concurrent flow of the streaming media server, keep the media sending the data rate control to a certain extent, and make the server send data rate and customer data received by the termination rate to be smooth.
  • WANG Yan-mei; QIN Shao-hua; CAO Jian; YE Jia-ning; HUANG Yong-ping
    Computer Engineering. 2010, 36(5): 122-124. https://doi.org/10.3969/j.issn.1000-3428.2010.05.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at two basic service models in Multimedia Sensor Networks(MSNs): event-driven and query-driven, this paper analyzes traffic patterns in various service models based on Differentiated Service(DiffServ). A Fairness Schedule Based Traffic Prediction(FSTP) is proposed, which achieves fairness based on the given QoS of two service flows. FSTP uses a Dynamic Fairness Buffer Sharing(DFBS) mechanism and rate allocation algorithm based on traffic prediction to ensure the fairness QoS between event-driven flows and continuous flows. Simulation results show that FSTP can achieve fairness in packet transmission delay and packet loss rate.
  • YU Yong; WANG Kang-hua; SUN Wei
    Computer Engineering. 2010, 36(5): 125-127,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Hierarchical Mobile IPv6(HMIPv6) is an improved technology based on Mobile IPv6(MIPv6). It is proposed to solve the handover problem during macro/micro mobility management. Aiming at that choose inconsequential Mobility Anchor Point(MAP) will increase service time-lag of the mobility node and the load of MAP is too convergent and so on, this paper proposes a LT-TMAP fast handover scheme on HMIPv6, and describes the carry out process in theory. Simulation results show that this scheme can use MAP resources of the network more effectively. It improves the handover efficiency and possesses better real-time performance.
  • MA Xiao-qiang; ZHANG Chun-ye; ZHANG Bo; YANG Shi-qiang
    Computer Engineering. 2010, 36(5): 128-130. https://doi.org/10.3969/j.issn.1000-3428.2010.05.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the application background, overall composition and characteristics of wireless data transmission network used for pipeline monitor, gives the application designs of wireless data transmission network used for pipeline monitor based on ZigBee network and GPRS network, including hardware and software design of SCM, ZigBee and GPRS, also technical application superiority of this design proposal, and analyses experimental results of the application.
  • Security Technology
  • KONG Hua-feng;
    Computer Engineering. 2010, 36(5): 131-133. https://doi.org/10.3969/j.issn.1000-3428.2010.05.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a blind audio watermark algorithm based on chaotic spread spectrum and difference of energy coefficients during the research of audio watermark technique. The watermark data is encrypted by Chebyshev chaotic spread spectrum based on secret key. Audio signal is decomposed by wavelet transform and the energy differences of the approximation coefficients and detail coefficients are collected and classified into two classes according to the relationship between the energy differences and the thresholds based on psychoacoustics model. In this way, the watermarks are embedded, extracted and achieved not only the blind signal detection, but also greater degree of increase watermark robustness. The restoration of the linear scaling is used to resist the influence of the linear scaling on time axis. Experimental results show that this algorithm is robust to many operations and attacks on digital audio signal.
  • ZHANG Hui; GUO Cui-fang; NIU Xia-mu; WU Chun-huan
    Computer Engineering. 2010, 36(5): 134-136. https://doi.org/10.3969/j.issn.1000-3428.2010.05.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The latest researches and products of disk encryption are outlined, and the special requirements are analyzed. The existing constraints of disk encryption developments and researches are proposed by discussing the standard P1619 developed by SISWG. Typical disk encryption cipher modes are analyzed and some practical advices are listed. The study focuses and development tendency of disk encryption are summarized.
  • YAN Tong-jiang; LI Shu-qing
    Computer Engineering. 2010, 36(5): 137-139,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Lots of new binary sequences of period p and q are presented. These sequences are formed with the Legendre sequences with the periods p and q, where p and q are different odd primes. Based on the constructive relation of these sequences with Legendre sequences, this paper obtains the trace presentations from their defining pairs. Linear complexity is calculated by E.L. Key method. The results show that these sequences possess better properties of symbol balance and linear complexity. Used as key streams, they can resist the attack from the application of the Berlekamp-Massey algorithm.
  • WANG Lei; LING Xiang
    Computer Engineering. 2010, 36(5): 140-142. https://doi.org/10.3969/j.issn.1000-3428.2010.05.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Process hiding is a typical application of Rootkit technique. Hidden malicious codes are threats to computer security. By analyzing the Windows Rootkit technology used for process hiding both in the user mode and kernel mode, this paper puts forward several hidden process detection technologies which do not depend on the system services. These detection methods directly use the underlying data structure of the system, and have relatively strong detection ability.
  • FENG Chao-sheng; DENG Jie; QIN Zhi-guang; LIU Xia; Laurence Cuthbert
    Computer Engineering. 2010, 36(5): 143-145. https://doi.org/10.3969/j.issn.1000-3428.2010.05.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By analyzing the properties of instant message worms and instant networks, a discrete-time math model of Instant Message(IM) propagation worms is proposed. To validate this model, a propagation simulation software is developed. Large-scale simulations validate that this model can be used for analyzing behaviors of worms and foreseeing tendency of worm spread.
  • QU Wei-li; MA Man-fu; LI Yong; HE Ting-nian
    Computer Engineering. 2010, 36(5): 146-148,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Current trust models lack sufficient control mechanism for trust evaluation. It seriously influences the application of trust models under open computing environment such as grid. Based on traditional trust evaluation model, a trust model with evaluation control is presented, in which interpolation technique is introduced and corresponding incentive and punishment mechanism are put forward. With the estimation of service quality, the model effectively filters and tunes the user’s rating. Simulation shows that the model outperforms the existing control model, and can well solve the reliable trust evaluation problem of grid entity, and can decrease the influence of malicious ratings on trust evaluation models.
  • PING Yuan; LI Hui-na
    Computer Engineering. 2010, 36(5): 149-150. https://doi.org/10.3969/j.issn.1000-3428.2010.05.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a one-time limited authorization password mechanism based on DSA, which allows password-owner to grant his right to a temporary user without releasing original password and limit the access time and frequency with a high degree of freedom and oversee the access behavior. Based on the difficulty of computing discrete logarithms, the mechanism which has highly practical valuable, can generate limited authorization password safely without being forged or re-used effectively.
  • QIAO Jia-xin; ZHOU Sen-xin
    Computer Engineering. 2010, 36(5): 151-153. https://doi.org/10.3969/j.issn.1000-3428.2010.05.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to resolve the security model used for XML mutli-communication, this paper presents XML united-signature technology, analyzes its principle, designs the syntax structure of the XML united-signature, provides the sending and validating process of the XML uinted-signature application model, researches on the function and the structure of the system function modules. It ensures the confidentiality, authenticity, integrity and non-repudiation of these XML data of the mutli-communication.
  • ZHANG Jia-jia; PAN Hong-bin; HUANG Hui-xian
    Computer Engineering. 2010, 36(5): 154-155,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To provide larger capacity of the hidden secret data and to maintain a better visual quality of stego-image, this paper presents a image steganographic method based on Self-Organizing feature Map(SOM) neural networks and wavelet contrast. It divides an image into blocks, and decomposes every block into one-level wavelet to obtain the wavelet contrast. The method classifies blocks into 3 kindsby SOM, and embeds secret information with steganography, which is based on modulus. Experimental results show that the proposed method hides much more information and maintains a better visual quality of stego-image.
  • HE Xu
    Computer Engineering. 2010, 36(5): 156-158. https://doi.org/10.3969/j.issn.1000-3428.2010.05.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Domain Name System(DNS) rebinding destroys the browser’s regional sources, affects the used plug-in browser and browser plug-ins and their interactions. According to DNS rebinding attack mechanism, analyses the used shorter TTL that responds to DNS requests for rebinding the host to the target server’s IP address, seduces browser to mistake two servers belong to the same-origin, and describes the browser access to the same-origin policy and multi plug-ins browser vulnerability. Prevent direct socket access to the client is presented, in order to prevent cheating to get into the internal network firewalls and abuse within the services running, hijacking IP address click fraud, sending spam and framed client.
  • WANG Xin-sheng; CHEN Jing-nan; WANG Wei-jie
    Computer Engineering. 2010, 36(5): 159-161,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the limitation of present schedule algorithms in grid that largely ignore the impact of the trust mechanism, based on the behavior trust model and ability trust evaluation, this paper proposes a new trust driven resource schedule algorithm TDS. TDS not only focuses on performance QoS but also pays attention to trust QoS. Situational experiment results show the TDS performs better than Min-min and TD Min-min algorithms at the aspect of least complete time and the ratio of successful request submission.
  • Artificial Intelligence and Recognition Technology
  • SHEN Yun; ZHANG Li-qing
    Computer Engineering. 2010, 36(5): 162-164. https://doi.org/10.3969/j.issn.1000-3428.2010.05.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of Voice Activity Detection(VAD) in signal process area, this paper presents a probabilistic method employing Gaussian Process(GP) prior to deal with speech enhancement. Clean speech is estimated by posterior probability calculated with GP model, while VAD is solved by the scale of one hyperparameter of GP model estimated in learning process. Experimental results show good performance of this method for white and colored noise.
  • LIU Ming-hui; WANG Lei; DANG Lin-ge; SHI Jing-lan
    Computer Engineering. 2010, 36(5): 165-167. https://doi.org/10.3969/j.issn.1000-3428.2010.05.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a structure learning method of Bayesian network to solve the problem of structure learning with uncertain prior information. A description method of the uncertain prior information is given. An improved MDL score method named SMDL is proposed to fit the uncertain prior information in learning process. Simulated annealing method is used to solve the problem. This method is validated by experiments.
  • DENG Zhi-yun; SONG Zhi-gang; WANG Rong
    Computer Engineering. 2010, 36(5): 168-169,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Imaging-guided weapon system must have the capability of real-time extraction for target feature during multi-target real-time tracking. This paper realizes a real-time extraction algorithm for target feature based on TMS320C64x DSP platform. According to the enhanced memory access characteristics of C64x DSP, the algorithm is optimized by using multi-pixel information synchronization extraction and pixel merging approach. Experimental results show that the optimized algorithm has high implementation efficiency and high real-time performance.
  • HU Bin; YANG Jing-shu; WANG Li-bin
    Computer Engineering. 2010, 36(5): 170-172. https://doi.org/10.3969/j.issn.1000-3428.2010.05.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the problem of multi-parameter waveform optimization during multipurpose jamming, a chaos genetic algorithm based on real-encoded is presented. In order to enhance the uniformity and randomization of chaos sequence, an chaotic random number generator is used in this algorithm for the first time. By competing excellent individuals obtained from crossover with new populations, the convergence speed is quickened. The modified chaotic genetic algorithm improves the convergence and search capability compared with normal genetic algorithm. The availability and validity of this method is verified through simulations.
  • HE Guo-bin; ZHAO Jing-lu
    Computer Engineering. 2010, 36(5): 173-175. https://doi.org/10.3969/j.issn.1000-3428.2010.05.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Combined with the sequence table and leaping form fast inquery characteristic, this paper presents an improvement structure of segmentation dictionary. Hashing and binary search is used to segmentation match for enquiring, and in view of the characteristics of the mechanical Chinese word segmentation, by introducing the random number, a Chinese word automatic segmentation probabilistic algorithm is discussed. Experiment indicates that the arithmetic can improve the speed of Chinese segmentation and precision, also, strengthen the processing of dispelling ambiguity.
  • WANG Lian-guo; SHI Qiu-hong; HONG Yi
    Computer Engineering. 2010, 36(5): 176-178. https://doi.org/10.3969/j.issn.1000-3428.2010.05.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a hybrid algorithm of Particle Swarm Optimization(PSO) and Artificial Fish Swarm Algorithm(AFSA) by combining the advantages of PSO algorithm and AFSA. Hybrid algorithm divides the swarm into two sub-groups. In each iteration, one sub-group evolves using PSO algorithm, the other sub-group evolves using AFSA, and two algorithms share the information of groups extremum. Through comparing PSO-AFSA hybrid algorithm with standard PSO algorithm in evolving solution to five standard functions, results show that PSO-AFSA hybrid algorithm outperforms PSO algorithm.
  • ZHOU Lan-feng; XU Fang
    Computer Engineering. 2010, 36(5): 179-181. https://doi.org/10.3969/j.issn.1000-3428.2010.05.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aimming at coordination question of multiple robots, this paper presents a distributed coordination algorithm for collision avoidance between robots in unknown environments. This algorithm is based on a distributed bidding model to coordinate the movement of multiple robots. Past assumptions are not used in the coordination algorithm. Both the data error of the sensors and physical size of the robot are taken into account. By adjusting adaptively the bidding time parameter, the efficiency of the algorithm is improved. To overcome the problem of information inconsistency caused by communication delay, a probing method is developed by the prior order. Simulation test is made to prove the feasibility of the algorithm.
  • AI Ling-mei; LI Ying; MA Miao
    Computer Engineering. 2010, 36(5): 182-184,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A classification algorithm based on Empirical Mode Decomposition(EMD) and Principal Component Analysis(PCA) is presented, which uses Support Vector Machine(SVM) to classify the P300 ElectroEncephaloGram(EEG) signals spell experiments. It is decomposed by EMD in order to wipe off noise and strength the useful signals. The signals are extracted and focused in the help of feature scales which contain much P300 information with method of PCA. The signals are send to SVM to be classified. Experimental results show this algorithm can obtain the correct classification rate as high as 96%.
  • ZHAO Jun; XU Yu-long; SUN Xiao-jing
    Computer Engineering. 2010, 36(5): 185-187. https://doi.org/10.3969/j.issn.1000-3428.2010.05.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Two different methods for coding is compared. On this basis, a novel algorithm with real-time discovery and solving the deadlock is presented, which does not abandon any of chromosomes, just adjusts the genes dispatching order in deadlock chromosome. It schedules all chromosomes, and finds out the optimal solution quickly. Simulation results show this algorithm is effective.
  • WANG Wen-tao; YIN Yi-long; DAI Hong-jun; WANG Wen-hui
    Computer Engineering. 2010, 36(5): 188-190. https://doi.org/10.3969/j.issn.1000-3428.2010.05.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve the index speed and the accuracy of the network-based fingerprint recognition system for the large population, a fingerprint classification algorithm based on multi-level index is proposed. Quality feature is used to classify fingerprints into two types: low quality and high quality. For the low quality fingerprints, three features, including ridge shape, macroscopic curve and average period are used to establish three-step index, which decreases the index space gradually. Experimental results show this algorithm has more accuracy, and improves the index speed effectively. It has better real-time performance.
  • ZHOU Gang; WANG Xiao-ling; WEI Zheng-xi
    Computer Engineering. 2010, 36(5): 191-192,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the contradiction between the network’s high speed and reliability in traditional C/S distributed computer model based on DCOM/CORBA/EJB, this paper adapts Aglet mobile Agent platform to build mobile Agent environment of gas field production supervisory control management system and combines Servlet and JSP technique under the Strusts frame to conquer the disadvantage of the traditional desktop application software. It implements information communication and sharing of gas field production manage departments at all levels that makes the gas field production supervisory control management system has attributes such as better cooperation, rapid response, easy reconstruction and meets the need of gas field production manage better.
  • HUANG Xian-feng; ZHANG Tong; MO Jian-wen; YUAN Hua; OUYANG Ning
    Computer Engineering. 2010, 36(5): 193-195. https://doi.org/10.3969/j.issn.1000-3428.2010.05.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Most of the existing characteristic extraction methods just use simple shape characteristics and exist problem of low walking and running recognition rate. This paper combines the velocity characteristics of movement and the Principal Component Analysis(PCA) shape characteristics obtained after more accurate segmentation and unifying the size of images. It uses Support Vector Machine(SVM) to recognize seven kinds of human behaviors including running, squat, standing, bending, waving, directing and walking from eight directions. Experimental results show that walking and running get higher recognition rate.
  • WANG Yu; LI Ming; LI Ling
    Computer Engineering. 2010, 36(5): 196-198. https://doi.org/10.3969/j.issn.1000-3428.2010.05.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    If active contour model based on Kernel Density Estimation(KDE) has not proper interruption method, it is hard to obtain a desirable result on the edge changed violently, and its robustness is bad under big noise environment. In order to solve the problem, this paper proposes a new cost function. By combining the curvature information of edge mapping, it improves the convergence effect of the exsisted algorithm on break edge, and decreases its dependence on initial contour.
  • ZHENG Long; ZHOU Jing-lun; SUN Quan
    Computer Engineering. 2010, 36(5): 199-201,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on stochastic property of the transportation system, the function relation between stochastic travel time, the loss, and the flow are studied. A Frequency-domain Spanning Graph(FSG) model for searching multi-objective optimal path of the time-dependent stochastic transportation network is presented, and the corresponding algorithm is designed to deal with the model. Through the mutual transformation of probability function between time-domain and frequency-domain, O-D multi-objective probability change is capable of quantitative analysis. Continuous probability distribution and discrete probability distribution can be dealt with in the model. Experiment with Matlab proves the feasibility and effectiveness of the algorithm.
  • ZHANG Jing-lei; WANG Xiao-yuan
    Computer Engineering. 2010, 36(5): 202-204. https://doi.org/10.3969/j.issn.1000-3428.2010.05.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to develop the Intelligent Transportation System(ITS), combined RBF network with ARIMA forecast, a method of short-term traffic flow prediction is put forward. The hybrid forecasting method combines the two methods to make use of the non-linear RBF neural network which has a structure of three layers. The simulation test of the three forecasting methods is taken placed used field data, and the results show that the non-linear hybrid model, which takes advantage of the unique strength of the two models in linear and nonlinear modeling can produce more accurate predictions than that of single model. The hybrid model can be an efficient method to the short-term traffic flow prediction.
  • Graph and Image Processing
  • WU Xiao-yan; LIU Xi-yu; XU Qing
    Computer Engineering. 2010, 36(5): 205-206,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To overcome the long block matching time of traditional fractal image coding, this paper proposes an improved genetic algorithm which combines with the average variance of image block, uses the improved algorithm’s optimal solution search capabilities to replace the complex process of block matching in fractal image coding. Combined with the constraints of contrast factor, this method can limit the search space and reduce the coding time. Experimental results show that compared with the other genetic method, the proposed algorithm can speed up the coding process, while improving the image quality.
  • YANG Ju-yi
    Computer Engineering. 2010, 36(5): 207-209. https://doi.org/10.3969/j.issn.1000-3428.2010.05.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an algorithm of color image denoising based on the second generation Curvelet transform. The wavelet transform has inherent defect in describing directional characteristics of color picture edge. The new algorithm overcomes these defects and is more suitable for analyzing the edge characteristic of curves or straight lines in two-dimensional image. It has better approaching accuracy and spares ability of expression. Results of simulation experiment to 512×512 Lena and Babon color image show the new algorithm is superior to wavelet and Ridgelet algorithm either in visual effect or in performance criteria.
  • LIANG Chun-ying; WANG Guo-ying; KANG Jin-feng
    Computer Engineering. 2010, 36(5): 210-211,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper researches the image retrieval based on salient regions. It improves the extraction method of salient point of wavelet domain, solves the problems that content of image feature extraction is limited and the image content can not be effectively expressed. It presents the method for extracting salient regions by using salient points as clues. It can distinguish the background image from object image. For object image, it only retrieves the salient regions. It can effectively reduce the interference of background area in retrieval process, and improve the speed and accuracy of retrieval.
  • FAN Jin-jin; HU Liang-mei; LING Hu
    Computer Engineering. 2010, 36(5): 212-214. https://doi.org/10.3969/j.issn.1000-3428.2010.05.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem that how to improve the accuracy and speed of image registration, this paper presents a pyramid approach for image registration based on mutual information and Fourier-Mellin, which integrate the accuracy of calculating linear parameters in Fourier-Mellin-based method and the accuracy of calculating rotation and scale parameters in mutual-information-based method. Experimental results on remote sensing images demonstrate the presented method can decrease the registration time and improve the accuracy.
  • JIANG Lin; FANG Bin; TANG Yuan-yan; XU Da-yuan
    Computer Engineering. 2010, 36(5): 215-217. https://doi.org/10.3969/j.issn.1000-3428.2010.05.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Texture retrieval with Dual-Tree Complex Wavelet Transform(DTCWT) is effective to improve performance relative to conventional wavelet transform due to its multi-directional information. The conventional wavelet transform gives different directional information from DTCWT. Aiming at this problem, this paper proposes a texture image retrieval approach combining the DTCWT and the conventional wavelet transform to extract features. Experimental results on Brodatz database show that the proposed method has better performance than the DTCWT and the traditional wavelet transform.
  • LUO San-ding; WANG Jian-jun
    Computer Engineering. 2010, 36(5): 218-220. https://doi.org/10.3969/j.issn.1000-3428.2010.05.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Medical images with fuzzy and non-uniform characteristics make it difficult to accurately extract target contour, aiming at this problem, this paper adopts an improved genetic algorithm to make active contour model finish boundary extraction. It adopts prepotent operator to keep inheritance of quantitative characteristic and select proper crossover operator. In the anaphase stage of the improved genetic algorithm, it solves its changeover from global optimization to local optimization. Experimental results show that it is anti-fuzzy with good robustness in extracting contour of targets.
  • KONG Yue-ping; SONG Lin
    Computer Engineering. 2010, 36(5): 221-222. https://doi.org/10.3969/j.issn.1000-3428.2010.05.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Considering the property of error-diffused halftone noise, an inverse halftoning algorithm based on the Partial Differential Equation(PDE) is proposed. By studying denoising principle of the PDE, a normalized third order B-spline function is adopted as a diffusion one and an inverse halftoning image is obtained by solving the PDE with the iteration scheme and updating the initial image. The modulating parameter is estimated by computing the increment of the gradient magnitude between two iterated images. The problem of adaptive selection of parameters is resolved in the application. Experimental results demonstrate that the proposed algorithm has better abilities in noise smoothing and edge preserving.
  • WANG Xuan; ZHANG Xiao-jing; MA Jin-ming
    Computer Engineering. 2010, 36(5): 223-224,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel image denoising algorithm based on Contourlet domain. By using Contourlet transform, the noised image is decomposed into a low frequency subband and a set of multiscale and multidirectional high frequency subbands. Optimal thresholds and neighbouring window sizes for each subband are determined by minimizing the loss expectation of estimating Contourlet coefficients and image denoising is implemented via shrinkage of Contourlet coefficients. Simulation results show the superiority of the proposed method in denoising noise and preserving texture details compared with the existing methods and the proposed method yields better visual effect and higher PSNR as a result of considering dependencies of Contourlet neighborhood coefficients.
  • LIU Rui-xiang; ZHAO Shan; BAO Hong
    Computer Engineering. 2010, 36(5): 225-227. https://doi.org/10.3969/j.issn.1000-3428.2010.05.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a JPEG image retrieval algorithm. After entropy decoding, the difference of DC coefficients is becoming binary data. According to the character, the DC vector is introduced to embody the gray distribution of the original image. The AC coefficients of the distribution are taken into account and nine AC coefficients are chosen to extract the AC distribution vector. Experimental results show that the proposed method has a good performance in retrieval efficiency.
  • Engineer Application Technology and Realization
  • WANG Ping; CHEN Zhou; LIU Si-dong; WANG Ting
    Computer Engineering. 2010, 36(5): 228-230,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at Ethernet for Plant Automation(EPA) network gateway security control problem of industrial control, this paper proposes EPA network security configuration technology based on EPA configuration software. It designs EPA network security configuration module, realizes access control object through configuration of function block, set encrypt key, checkout key and checkout arithmetic. Access control object is download to safe device after translation and edition to decide the run state of safe device. Test result shows that this technology can effectively satisfy the design of EPA control system and the needs of security, and enhance the safety and reliability for EPA network control in the field of industrial control network.
  • ZHAO Xiao-jun; SU Hai-xia; REN Ming-wei; CAO Yong; CHEN Lei; WANG Fei
    Computer Engineering. 2010, 36(5): 231-233. https://doi.org/10.3969/j.issn.1000-3428.2010.05.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper researches the remote monitor and control system based on ARM9 and CAN bus, and introduces interface methods of ARM9 and Ethernet, conversion methods of CAN/Ethernet protocol and construction of the network database. By adopting the technologies of embedded network interface device in the network environment of self-identification, self-description and interoperability, it realizes the functions of dynamic configuration and reconstruction for network sensors. Test results show that the system can meet the requirements of real-time and reliable maintenance, monitor and control, and realizes remote monitor effectively.
  • MA Yong-gang; PAN Jian-shou; WANG Jian
    Computer Engineering. 2010, 36(5): 234-236. https://doi.org/10.3969/j.issn.1000-3428.2010.05.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the application demands of current domestic digital substation, this paper designs an all-optical switching transmission loop network according with IEC61850 to connect the first and the second devices which belong to the process level and the bay level in digital substation. GOOSE and SMV data services can be transmitted end to end between these devices by using the special loop network. The key technologies are presented. The special address scanning method is used to implement multicast and isolation among services of several types, and the “connected” idea is introduced to UDP protocol to make the network management simple and reliable.
  • HU Jian-sheng; LUO Wei-bing; QIAN Yuan
    Computer Engineering. 2010, 36(5): 237-239. https://doi.org/10.3969/j.issn.1000-3428.2010.05.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at common TFT-LCD controller existing the shortage of large volume and bad display effect, this paper designs an embedded TFT-LCD controller. It realizes a universal MCU interface by using double First In First Out(FIFO) circuits, solves the problem of conflict between reading and writing frame cached based on the Time Division Multiplexer(TDM) technology, produces control time sequence signal by using status shift mechanism, designs the modules of TFT-LCD controller by hierarchy. On ARM+FPGA hardware flat, simulation result shows that this controller has good display effect, fast response speed and strong universal property.
  • XIE Hao-fei; ZHENG Ming; WANG Ping
    Computer Engineering. 2010, 36(5): 240-242. https://doi.org/10.3969/j.issn.1000-3428.2010.05.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an IP core design, aiming at the problem of randomized jitter and large error in pure software design of traditional Precision Time Protocol(PTP). It gives prominence to adopt digital logic circuit to achieve getting of precision time stamp, synchronization algorithm and quartz oscillator frequency-compensated algorithm and state-transfer controlled algorithm, makes use of oscillator’s divided frequency adjusted to reduce influence of oscillator’s frequency-excursion and circumstance factor to precision and stability of synchronization. Simulation result shows that this design has higher synchronization precision, and precision value can reach 10 ns.
  • LV Xi-wu; LIU Kai-hua; ZHAO Yan
    Computer Engineering. 2010, 36(5): 243-244,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper designs a wireless monitor system based on Zigbee network. By placing Zigbee network in monitor area, the system collects monitor data in embedded gateway to realize unified data management, users’ remote access and routing monitor function of Zigbee network. The realization of hardware and software is presented, including data frame format and how to program the wireless nodes and coordinator.
  • LI Shuo; LI Peng-yang
    Computer Engineering. 2010, 36(5): 245-247. https://doi.org/10.3969/j.issn.1000-3428.2010.05.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Annealing furnace is an important equipment in metal heat treatment whose stability of temperature control and accuracy of control directly affect the product quality. Aiming at the needs of an enterprise, an intelligent control system of gas-burning annealing furnace based on PLC is developed by selecting configuration software and VB as the development tools. Through this system, the parameters can be set, the process data can be displayed in time, and the historical data can be saved for later use. Experimental results show that this temperature control system has characteristics such as high-precision, good dynamic performance, excellent control effect, energy saving and emission reduction.
  • XIE Yi-zhuang; LONG Teng
    Computer Engineering. 2010, 36(5): 248-249,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper designs a two dimensional pulse compression processing system by using the embedded processor MicroBlaze in FPGA as the control kernel. Two realization architectures of pulse compression are presented according to the resource assignment conditions in FPGA. DDR SDRAM controller implemented by FPGA realizes matrix transposition processing efficiently by using matrix partition linear mapping method. A simple SAR imaging processing is simulated, and its result proves the validation of the system.
  • WANG Sheng-zhong; CHEN Wei-nan; PENG Cheng-lian
    Computer Engineering. 2010, 36(5): 250-252. https://doi.org/10.3969/j.issn.1000-3428.2010.05.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the shortage of long configuration time and flexibility constrained for existing reconfigurable computing hardware platform, this paper proposes an improved design. Based on Virtex-4 Field Programmable Gate Array(FPGA) chip supporting 2D reconstructed area, it makes the module placement faster and higher utilization of chip area, makes more compact of system structure through integrating single FPGA and extras in a printing circuit diagram, uses FPGA embedded microprocessor to reduce cost of communication and access memory. Debugging result shows that improved platform is more flexible, function and extendibility is more strong.
  • Developmental Research
  • ZHU Wen-ying; GUAN Zhi-jin; HANG Yue-qin
    Computer Engineering. 2010, 36(5): 253-254. https://doi.org/10.3969/j.issn.1000-3428.2010.05.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a cascaded algorithm based on reversible network of Positive/Negative Control(PNC) gate, designs the corresponding templates for 3 bit input/output function, and gives a reduction algorithm for the cascaded network. Experimental results show that comparing with the network which is composed of cascaded Toffoli gates, the reversible network using PNC gates contains fewer gates and has an advantage in reducing the cost of network.
  • ZHANG Zhi-wei; LIU Deng-di; CAI Jian-yu; YUAN Kun-gang; ZHU Jin-hui
    Computer Engineering. 2010, 36(5): 255-256,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of data record and playback in HLA/RTI structure based simulation framework, this paper researches on key technologies of HLA based data record and playback system, including interaction mechanism, object model, data store model, data playback model and filter mechanism. It implements a system based on these key technologies and apply it to a red and blue combating system, and results show that the model presented in this paper are applicable.
  • LUO Xiang-yu; CHEN Yan
    Computer Engineering. 2010, 36(5): 257-259. https://doi.org/10.3969/j.issn.1000-3428.2010.05.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A Web service composition is modeled as a multi-agent system. The MCTK, a symbolic model checker for temporal logic of knowledge, is used to model a Web service example of loan approval and verify some related temporal epistemic specifications. Within the same experimental environment, the example is also modeled and verified via MCMAS, which is another model checker for temporal logic of knowledge. Experimental results show the presented model checking approach for Web services based on MCTK is more efficient than the approach based on MCMAS.
  • YANG Yu; GUAN Qun; HU Kai-heng; LI Hong-lei
    Computer Engineering. 2010, 36(5): 260-262,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on Geographic Information System(GIS) technology and distributed hydrological model, a computational system of debris-flow watershed is designed and implemented. With data such as rainfall, elevation and slope introduced, the system simulates rainfall-runoff and rainfall-sediment of the watershed to calculate runoff, sediment yield and sediment concentration automatically for each day.The system is applied to Jiangjia Valley, a debris-flow basin of Yunnan Province. Calculated result agrees well with the measured sediment concentration, which shows that the system has high reliability and applicability.
  • LIN Li; ZHOU Ting; YU Lun
    Computer Engineering. 2010, 36(5): 263-265. https://doi.org/10.3969/j.issn.1000-3428.2010.05.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the mode mixing problem caused by intermittency signal in the sifting process of Empirical Mode Decomposition(EMD), this paper proposes a new method that can separate the intermittency signal by normalized amplitude-frequency coefficie which is defined by the instantaneous frequency and amplitude of the first Intrinsic Mode Function(IMF). The results indicate that the influence of intermittency signal is removed in the following empirical mode decomposition and the intermittency signal can be decomposed into one intrinsic mode function.
  • REN Shu-xia; ZHAO Zheng
    Computer Engineering. 2010, 36(5): 266-268. https://doi.org/10.3969/j.issn.1000-3428.2010.05.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the unjust and inefficiency phenomena of the bidding process of extracting the evaluation experts, the bidding expert system based on multi-channel sound card is designed. This paper refers to the advantages of multi-channel sound card and adopts automated synthetic voice technology to automatically complete the work of automatic voice response and extracting information of the evaluation experts to be put to storage through the initiative dial-up. The test run of the system proves it has the characteristic of low cost and broad scope.
  • DUAN Fu-hai; YANG Yong; ZHANG Qiang-chao
    Computer Engineering. 2010, 36(5): 269-271. https://doi.org/10.3969/j.issn.1000-3428.2010.05.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at software reliability problem, and according to software engineering approach, software development process, including software requirements analysis and software design, of autopilot system signal sources simulation equipment are presented in detail. Several questions which are deserved to be mentioned are discussed. Practical application proves that autopilot signal sources simulation equipment software has high quality, and it can simulate many digital signals, which is connected with autopilot, such as aircraft sensors subsystem and Electronic Flight Instrument System(EFIS). Moreover the equipment software can provide better test environment and evaluation environment for autopilot close-loop dynamic simulation.
  • ZHANG Ran-ran; WU Jiong; DING You-dong; HAO Peng-yi
    Computer Engineering. 2010, 36(5): 272-273. https://doi.org/10.3969/j.issn.1000-3428.2010.05.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of flicker exists in image sequences, this paper proposes an approach based on motion compensation, it uses three steps search algorithm to estimate motion vectors, which can detect motion regions more accurately. Threshold method to detect flicker, avoide non-flicker regions in painting, and improve the efficiency. Experimental results show that with the accurate correction of intensity flicker, the proposed algorithm can preserve the wanted effects with similar features, and shorten the time of intensity flicker correction.
  • DAI Yong; WANG Qiu-zhen; ZHANG Xin
    Computer Engineering. 2010, 36(5): 274-276,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The communication between service desk and passengers mainly depends on the local telephone in hotels, guest houses and other places. The local phone communication is friendly, but it is not timely and accurate. To achieve timely and accurate communication, this paper proposes a better way according to key recognition rate, which is based on the network entrance guard system of one lower machine with multi-lock. The system converts information into description words and transmits it to the corresponding lock machine, which broadcasts or prints the information for the passenger according to the key recognition rate. Result shows that this way can realize the timely and accurate communication between service desk and passengers.
  • FANG Fang; LIU Da-you; WANG Xin-hua; LIU Meng;
    Computer Engineering. 2010, 36(5): 277-278,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the increasing competition of telecommunications market, telecom Customer Relationship Management(CRM) system with its own merits becomes a key point to improve the quality of service, reduce customer turnover rate and enhance the competitiveness of telecommunications enterprises. A comprehensive survey on CRM theory combining with On-Line Analytical Processing(OLAP) technology, Data Mining(DM) techniques, the complex network theory and technology is presented, including related algorithm with improvement program, and some further research directions of CRM are discussed.
  • ZHOU Chang-le; QI Jing-feng; ZHUANG Xiong-xiong; LV Lan-lan; GAO Song-di
    Computer Engineering. 2010, 36(5): 279-281. https://doi.org/10.3969/j.issn.1000-3428.2010.05.102
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the status quo and problem of Guqin informationization, proposes an octal Yihe code system for Jianzi, improves current method of processing Jianzi images, discusses using Enhanced Metafile(EMF) provided by 32 bit Windows operating system to help processing Jianzi images, gives a rational solution and introduces a Word plug-in to facilitate process.
  • PENG Ri-guang; LI Ren-fa; LIU Yan; CHEN Yu; LI Lang
    Computer Engineering. 2010, 36(5): 282-284. https://doi.org/10.3969/j.issn.1000-3428.2010.05.103
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Finding the available start time and empty space for arrival tasks on FPGAs with runtime partially reconfigurable abilities is the most important phase in on-line schedule algorithm. This paper proposes the Look-aheadest algorithm based on vertexes of the already running tasks. It takes schedule time of tasks as the time dimension, constructs a cost function according to the adjacent surface of the arrival tasks and placed tasks, gets the location and starting time that have the maximum cost function value to schdule the arrival tasks. By utilizing the temporal information and optimized place strategy, the proposed algorithm achieves high schedule performance and reduces the waste of reconfigurable resources. Simulation results show that the proposed algorithm can achieve higher task accept ratio, and the runtime efficiency is acceptable.
  • SU Qiang; MA Lin-hua; CHEN Zheng-kang; PENG Xin
    Computer Engineering. 2010, 36(5): 285-286,. https://doi.org/10.3969/j.issn.1000-3428.2010.05.104
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper investigates LLR algorithm of Low-Density Parity-Check(LDPC) codes in 8 Phase-Shift Keying(8PSK). The computation of the initial information of LDPC is analyzed in 8PSK modulation. The formulas of the computation of the initial information are deduced, and the algorithm is simulated. Simulation results indicate that the decoding performance of LDPC is excellent in 8PSK modulation. For example, the BER can reach 10-6 at 3.5 dB SNR.
  • SUN Ji-hong; LIU Zhan; WEI He-long; GUO Jia-shu; SONG Xue-feng; XU Qi;
    Computer Engineering. 2010, 36(5): 287-289. https://doi.org/10.3969/j.issn.1000-3428.2010.05.105
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on comprehending the needs analysis of drilling mud logging and wireline logging data, this paper designs united database platform based on three layers architecture. According to the multiple source and magnanimity feature of drilling mud logging and wireline logging data, it proposes the conceptual model and physical model of drilling mud logging and wireline logging database at the aim of oil-gas exploration, discusses the data interface design of database platform and realizes the database platform, and tests the database platform using oil-gas exploration data of some blocks in Shengli oil field. Result shows the database platform can manage drilling mud logging and wireline logging data effectively, implement the data searching quickly, and provide forceful support for the oil field production.
  • RONG Hui-gui; CHEN Xu-yi; ZHANG Xiang-rong
    Computer Engineering. 2010, 36(5): 290-封三. https://doi.org/10.3969/j.issn.1000-3428.2010.05.106
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Service-Oriented Architecture(SOA) can provide flexible business flows for information management system. According to the merits of SOA, this paper designs and constructs an Interface Prototype Driven Development(IPDD) model oriented to information service and presents some formal descriptions of IPDD model, where four sub-processes are discussed respectively. An instance is analyzed to show how to apply this model to guide the software development process to accomplish fast conversion from requirements analysis to effective design.