Author Login Editor-in-Chief Peer Review Editor Work Office Work

05 October 2009, Volume 35 Issue 19
    

  • Select all
    |
    Degree Paper
  • WAN Wu-nan; SUO Wang; CHEN Yun
    Computer Engineering. 2009, 35(19): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2009.19.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analysis of the current contract net model, this paper proposes an architecture for multi Agents. To ensure security, it gives a secure contract net model using a Bit commitment protocol and RSA algorithm, which implements both encryption and digital signature. It has high quality of security and can satisfy all the secure requirements of bid unforgeability, result verifiability, bid secrecy.
  • XU Man-kun; LI Tian-yun; PING Xi-jian
    Computer Engineering. 2009, 35(19): 4-6. https://doi.org/10.3969/j.issn.1000-3428.2009.19.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The problem of LSB matching steganalysis in grayscale images is considered and a new method for detection is provided. The matching embedding as a kind of image degradation by certain additive pulse noise is modeled, and the restored image by wavelet denoising technology as the estimation of the cover image is used. The ratios of 1D grayscale histogram features of test images and the estimated images as detectors are computed, and the cover and stego images with support vector machine are classified. Experimental results prove that this method is more reliable than the previous related methods.
  • SUN Xian-jun; XU Tong-fa; LIU Wei-dong; LIN Chuang
    Computer Engineering. 2009, 35(19): 7-9,12. https://doi.org/10.3969/j.issn.1000-3428.2009.19.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the issue of bandwidth wasting due to unbalanced data allocation for multi-channel multicast schedule, this paper proposes three dynamic bandwidth assignment schemes. It changes assignment priority by data items’ average lengths or number of queues, and analyzes their performance. Experiments show that Dynamic Assignment Bandwidth(DAB) can improve utilization rate by 43% at most compared with Static Assignment Bandwidth(SAB), and average-short-first assignment is the best.
  • SUN Li-bo; LIU Yan; SUN Ji-zhou; LIU Xin
    Computer Engineering. 2009, 35(19): 10-12. https://doi.org/10.3969/j.issn.1000-3428.2009.19.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at ergonomics test, a virtual hand simulation model is presented. A virtual hand kinematic model is established, and a new calibration method based on curve fitting is presented in order to gain accurate data to well control the motion of the virtual hand. The grasping force between virtual hand and grasped object is calculated through the establishment of hand spring model, and the feedback of this force is in the form of visual rendering to the users. Experimental results show that virtual hand can grasp 3D object naturally and the use of visual feedback avoids the purchase of expensive force feedback devices.
  • BAI He; TANG Di-bin; WANG Jin-lin
    Computer Engineering. 2009, 35(19): 13-16,1. https://doi.org/10.3969/j.issn.1000-3428.2009.19.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an architecture of distributed Web crawler system based on data-trapper. It implements a multi-topic schema based on classics-label, so that one crawler can contain different topics adaptively and designs a two-tiered weighted task partition algorithm that realizes target-guided URL configuration based on Agents’ load while providing better dynamic scalability. It improves URL storage with Trie tree, which efficiently supports URL search, insertion and repetition judgment.
  • WANG Jin-peng; ZHANG Ya-fei; MIAO Zhuang
    Computer Engineering. 2009, 35(19): 17-19. https://doi.org/10.3969/j.issn.1000-3428.2009.19.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to implement access control for Resource Description Framework(RDF) data, a RDF(S) triple-level inference control algorithm is proposed. The inference dependence graph is defined to get the logic expressions of sensitive RDF(S) triples. The candidate and optimal answers of the inference control problem are obtained by translating the logic expressions into the disjunctive normal form. Experiments show that this algorithm can prevent illegal inference and minimize the loss of semantic effectively.
  • LIU Ping-zeng; BI Shu-sheng; LIANG Yong; XUE Xin-yu; XU Cheng-zhi
    Computer Engineering. 2009, 35(19): 20-22,2. https://doi.org/10.3969/j.issn.1000-3428.2009.19.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An intelligent system is designed for livestock breeding environment. The entire system is comprised of upper-computer, terminal and external facilities. As core of the system, the terminal is made up of MSP430F149, wireless transmission module and monitor-control modules. To solve non-linear and delay of collected information, fuzzy control algorithm is used. And intelligent control is achieved for regulating livestock breeding environment by imitating people thinking way and operation experience.
  • LV Zhe; WANG Fu-li; CHANG Yu-qing; LIU Yang
    Computer Engineering. 2009, 35(19): 23-25. https://doi.org/10.3969/j.issn.1000-3428.2009.19.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the spur of the limitation that the conventional morphological skeleton extraction algorithms fail in poor connectivity, thickness and complicated structure, an improved morphological skeleton extraction algorithm is proposed. Morphology operation and connectivity-preserving strategy are combined in the novel algorithm during the shrinking process to prevent the extracted skeleton from being broken up. Two post-processing strategies, one-pixel thickness thinning and biased skeleton trimming, are also involved to enhance the performance of this improved method. The new algorithm is thus superior to the conventional one. Simulation tests verify the effectiveness of the algorithm.
  • Software Technology and Database
  • XU Jian-lin; LU Yi-ying; WU Yi-jian; ZHAO Wen-yun
    Computer Engineering. 2009, 35(19): 26-29. https://doi.org/10.3969/j.issn.1000-3428.2009.19.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the concepts of Web Service(WS) into Customer Relationship Management(CRM) system and puts forward a framework of CRM system based on WS, which effectively resolves insufficient heterogeneous compatibility and heavy workload on the server in the traditional CRM system. It elaborates on the working process of CRM system based on WS with a specific example. It summarizes the CRM system based on WS’ characteristics compared with the traditional CRM system.
  • YUAN Jian-mei
    Computer Engineering. 2009, 35(19): 30-32. https://doi.org/10.3969/j.issn.1000-3428.2009.19.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Using the Web service technique in network management, a model system of network management combined by the mode of distribution and centralization is proposed. After implementing the basic applications, the expansibility and convenience of the network management system are improved. A network management system with high efficiency and usability is built based on the Java technology.
  • CAO Di; CHEN Ping; BAO Liang; HU Sheng-ming
    Computer Engineering. 2009, 35(19): 33-35. https://doi.org/10.3969/j.issn.1000-3428.2009.19.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of repeatability and diversity in process of service-oriented computing migrations in traditional legacy systems, a legacy system migration scheme based on Service Component Architecture(SCA) is proposed, which transplants the legacy system into SCA system. The modules which can be scheduled by script are generated by using python extension generators. It is simulated on hardware platform, and the results show this scheme is feasible, and can avoid the repetition migration caused by the differences of service-oriented implementation shapes.
  • GAO Ni; ZHOU Ming-quan; GENG Guo-hua; WANG Xue-song; HE Yi-yue
    Computer Engineering. 2009, 35(19): 36-38. https://doi.org/10.3969/j.issn.1000-3428.2009.19.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On basis of analyzing the character of disasters news, a topic detection technique based on text mining is proposed, which uses Group Average Clustering(GAC) algorithm to organize the disasters news materials, generate the news special topics, provide the personality service, and shape the whole system. The similarity computing model based on both weight vectors of time and place and dynamic threshold model based on time are introduced. Experimental results show this algorithm can obtain better performance.
  • MA Rong-fei
    Computer Engineering. 2009, 35(19): 39-42. https://doi.org/10.3969/j.issn.1000-3428.2009.19.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    From the theoretical and practical aspects of starting, the different aspects of Object-Oriented Programme(OOP) dynamic update are researched. The solution method is proposed, and the concept of dynamic update event is introduced, which overcomes the restrains that OOP update is only used to some simple cases, and guarantee the security of updated types. In view of Java programming, a novel design method with dynamic update program is proposed. Experimental results show this method is feasible and effect.
  • CHEN Zhen-qing
    Computer Engineering. 2009, 35(19): 43-45. https://doi.org/10.3969/j.issn.1000-3428.2009.19.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The chief task of consistent automatic checking UML model is to solve the formalization problem. Description Logics(DLs) is a decidable subset of first-order predication logic which possesses powerful function of knowledge expressing and reasoning. Aiming at the problem of UML model formalization, this paper puts forward the formalization methods based on DLs and analyzes the accordant relationships between model elements of UML class diagram and DLs SHOIN(D). It proposes the formalization method of UML class diagram on the basis of SHOIN(D) and proves the correctness of changing UML class diagram into SHOIN(D) knowledge base.
  • LIU Ning; ZHANG Li-jie; SHI Yi-min
    Computer Engineering. 2009, 35(19): 46-48. https://doi.org/10.3969/j.issn.1000-3428.2009.19.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new parallel migration strategy for a query plan in order to adapt the continuity of queries and variability of system environment and date itself. This strategy can ensure output results correctness and time sequence. Experimental results show that this strategy can insure smooth migration between query plans, avoid the silence that without output tuple of migration process, maintain a low intermediate tuple count and high output rate when the system resource is lacking and the speed of data stream is too fast.
  • YU Xiao-gao; YU Xiao-peng
    Computer Engineering. 2009, 35(19): 49-52,5. https://doi.org/10.3969/j.issn.1000-3428.2009.19.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    k-nearest Neighbor search algorithm(KNNs) can not satisfy the needs of distributing, real time performance and expansibility for data mining. Aiming at this problem, a P2P-based self-adaptive distributed KNNs(P2PAKNNs) is proposed. This paper expounds GHT* structure, and gives similarity measure function HDSF(X, Y). Insert algorithm, range find algorithm and search algorithm in GHT* are discussed. Implementation process of P2PAKNNs is given, and its correctness is validated by experiment.
  • CHAO Hong-kun; CHEN Hong-zhong
    Computer Engineering. 2009, 35(19): 53-55. https://doi.org/10.3969/j.issn.1000-3428.2009.19.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Several XML Schema type validation algorithms are introduced. In them, one algorithm based on tree automata is researched deeply. Aiming at the problem in process of validating XML document with nesting complex type, an improved algorithm is proposed, which adds a processing state label for each end mark. The data types expressed by XML documents are validated. Through the experiment, its performances are tested, and the results show this algorithm is effect.
  • LIN Sen; TANG Fa-gen
    Computer Engineering. 2009, 35(19): 56-58,6. https://doi.org/10.3969/j.issn.1000-3428.2009.19.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems in feature selection algorithm of text classification system based on vector space model, a feature selection algorithm based on Log likelihood ratio is proposed, which introduces the Log likelihood ratio statistic, and considers the positive impact on classification results by uncommon events, while controlling the negative ones. It is compared with typical feature algorithm by using K Nearest Neighbor(KNN) method. Experimental results show this algorithm can obtain better performance.
  • ZHENG Sheng; HAO Hao-hao
    Computer Engineering. 2009, 35(19): 59-61. https://doi.org/10.3969/j.issn.1000-3428.2009.19.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Efficient and scalable data management becomes increasingly important in large-scale distributed storage systems. A key enabling technique is a flexible, balancing and scalable data object placement and location scheme that automatically adapts to the dynamic change of storage nodes. An algorithm for data placement is proposed, which is based on laws of large number. The basic algorithm promises probabilistically even data distribution and minimizing data movement when the number of storage nodes dynamically changes.
  • SHAO Yong; CHEN Bo; SHI Bao-dong; LIU Chang-zheng
    Computer Engineering. 2009, 35(19): 62-64,6. https://doi.org/10.3969/j.issn.1000-3428.2009.19.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the maintenance problems of maximum frequent itemsets based on support change and interconversion between frequent itemsets and maximum frequent itemsets, this paper proposes three relevant algorithms. It adjusts the support rating constantly during the process of mining maximum frequent itemsets to realize fast update of maximum frequent itemsets. Based on support counting of the subsets of maximum frequent itemsets, existing maximum frequent itemsets are transformed into frequent itemsets.
  • LIANG Zhong-xing; LUO Gui-ming; KUANG Hong-bin
    Computer Engineering. 2009, 35(19): 65-68. https://doi.org/10.3969/j.issn.1000-3428.2009.19.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In model checking of concurrent programs, the redundant parallel composition and combinatorial state explosion are the crucial issues. This paper presents a novel approach to compute the persistent sets for partial-order reduction of labeled transition systems. The method is incorporated in Counterexample-Guided Abstraction Refinement(CEGAR) frame for on-the-fly deadlock detection in C program. The results prove that the algorithm slowdowns the state space explosion and has a significant improvement in efficiency compared with the algorithms used before.
  • GAO Jie; XU Tao; ZHANG Lian-rong
    Computer Engineering. 2009, 35(19): 69-70,7. https://doi.org/10.3969/j.issn.1000-3428.2009.19.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to enhance the flexibility and agility of system in service-oriented design, this paper applies design pattern to construct service-oriented application system based on Civil Aviation Public Information Platform(CAPIP). It expounds and realizes service interface pattern and service gateway pattern in the design of the core services of CAPIP. The design patterns are proved effective in service-oriented application system.
  • HUANG Qiang; WANG Wei; ZHANG Xiao-mei; LI Min
    Computer Engineering. 2009, 35(19): 71-74. https://doi.org/10.3969/j.issn.1000-3428.2009.19.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Asynhronous JavaScript and XML(AJAX) has a big resistance to the communication between JavaScript at client side and the service module. AJAX service component is difficult to be integrated with current MVC framework non-invasively. Data exchange system based on structural XML occupies many system resources and transmission bandwidth, so its structure can not be matched effectively between client and server system. Aiming at these problems, a plug-in called MyAJAX based on JSON data exchange which can be seamlessly integrated with current mainstream MVC frameworks and can be interfaced by AJAX remote method is designed. With the Inverse of Control(IoC) container, the JavaScript dynamic stub generation and the JSON serializing model of service module are proposed to realize transparent remote call between JavaScript and the service module inside the container. Application instance of MyAJAX is given.
  • ZHANG De-hai; SHA Yue-lin
    Computer Engineering. 2009, 35(19): 75-77,8. https://doi.org/10.3969/j.issn.1000-3428.2009.19.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies and implements an ontology and workflow-based knowledge service system, the WFBK-Service which integrates business process and Knowledge Management(KM) together. It adopts workflow technology to analyze the current work item that should be done. It presents technologies such as domain-specific ontology analysis, knowledge service strategies and knowledge pushing to provide different work items with different knowledge based on the employees’ own knowledge requirement.
  • ZHAO Feng; QIN Feng
    Computer Engineering. 2009, 35(19): 78-80. https://doi.org/10.3969/j.issn.1000-3428.2009.19.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An algorithm on cell-based outlier detection is put forward. The data spatial cell partitioning and data object allocation methods in cell outlier detection algorithms are discussed. Algorithm is improved to overcome the limitation of requiring threshold. Using the data of taxpaying behavior. Compared with other algorithm, result shows that this approach can not only detect the outliers efficiently, but also decide the position of outliers.
  • LIU Run-tao; ZHANG Jia-jia
    Computer Engineering. 2009, 35(19): 81-82,8. https://doi.org/10.3969/j.issn.1000-3428.2009.19.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve Reverse Nearest Neighbor(RNN) search in a dataset, Voronoi diagram and the hulls of dataset are used for RNN search. By determinating the location relation between query point and convex hulls, many points can be cut. And an algorithm and judgment method for the change of the RNN of query point are given when data points are added or deleted. To be convenient to search, corresponding spatial storage structures are designed. Comparative analysis shows that this method has evident advantages when many query points are dealt with.
  • SHI Bin; YAN Jian-zhuo; WANG Pu; FANG Li-ying
    Computer Engineering. 2009, 35(19): 83-85. https://doi.org/10.3969/j.issn.1000-3428.2009.19.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new measure which combines the graph-based measure and information content-based measure. The measure computes the path length of the two concepts in the concept graph, local density and the connect power of the edge, and integrates them with edge weight and information content. Experimental result indicates the measure performs well.
  • PENG Hui-li; ZHANG Xiao-jian
    Computer Engineering. 2009, 35(19): 86-87,9. https://doi.org/10.3969/j.issn.1000-3428.2009.19.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The current methods in session streams for mining Top-k Closed Sequential Pattern(Topk_CSP) may lead to a conflict between output precision and memory consumption because of using ρ. This paper proposes TStream algorithm, which is based on False-Negative approach. TStream utilizes two constraint strategies to restrict ρ, and employs a weighted harmonic count function to calculate the support of each pattern progressively. Experimental results show that the algorithm is efficient.
  • XUE Ji-wei; JIANG Bo; LIU Qing-qiang; WANG Zheng
    Computer Engineering. 2009, 35(19): 88-90. https://doi.org/10.3969/j.issn.1000-3428.2009.19.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With slow transition and so on, traditional reciprocal task schedule postpones tasks and suspend systems. Based on capability sensory mechanism, a novel reciprocal task schedule algorithm is proposed. The algorithm can detect and abstract schedule information. According to the interests and capabilities of operators and the characteristics of tasks, it schedules, issues and manages the tasks. Experimental results show that the algorithm has shorter transition delays, better responsibilities and higher satisfaction.
  • YAO Quan-zhu; BAI Min; HUANG Wei
    Computer Engineering. 2009, 35(19): 91-93,9. https://doi.org/10.3969/j.issn.1000-3428.2009.19.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the characteristics of AP model, based on the formal definition of objects in meta-models, this paper proposes an improved design model and an optimized algorithm for mapping conceptual models to logical models. The algorithm can map the simple source or the multi- source models in the foundation of data Extract-Transformation-Load(ETL) workflow, and raises the efficiency of concurrent execution of state node. Experimental result proves that this method provides good foundation for the design of ETL based on model driven and rapid realization of ETL in data integration.
  • LI Jian; YAN Bao-ping; LI Jun
    Computer Engineering. 2009, 35(19): 94-96. https://doi.org/10.3969/j.issn.1000-3428.2009.19.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    After introducing Local Outlier Factor(LOF) algorithm, memory effect and MELOF algorithm, this paper gives the theoretical analysis of memory effect. According to the analysis, it proves the correctness of MELOF algorithm, and finds both the shortcoming of MELOF algorithm and some features of memory effect. It improves MELOF algorithm. The research areas in the future, such as selecting proper parameter value automatically and rising the efficiency with the help of divide and conquer method are introduced.
  • WANG Gui-lan; WANG Zhen-qi; LUO Xian-jin
    Computer Engineering. 2009, 35(19): 97-98,1. https://doi.org/10.3969/j.issn.1000-3428.2009.19.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Acyclic database has many good characteristics, so acyclic is an important characteristic for database schema. Based on γ acyclic database schema, this paper presents the definitions of none XML_ cycle, the characteristics of none XML_ cycle in XML documents and design method of XML schema for none XML_ cycle. Theory analysis proves the effectiveness of the rules designed.
  • ZHAO Jiang-bin; LIU Shi-yuan; XUAN Jian-ping; HU You-min
    Computer Engineering. 2009, 35(19): 99-101. https://doi.org/10.3969/j.issn.1000-3428.2009.19.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Software sequential structure of virtual instrument makes it suited to apply pipeline technology to improve its performance. This paper investigates the running process of continuous sampling virtual instrument system, and introduces throughput and latency, the two performance measures of a self-timed pipeline. It gives an experimental example, result shows that, pipeline technology can greatly improve continuous sampling virtual instrument software system throughput, while not degrade its latency.
  • Networks and Communications
  • CHANG Ning; YU Hong-yi
    Computer Engineering. 2009, 35(19): 102-104. https://doi.org/10.3969/j.issn.1000-3428.2009.19.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characteristics of the HF burst-mode communication, the paper studies square root Kalman algorithm of adaptive equalization based on the decision-feedback condition. The parameter selection of this algorithm is sensitive to the speed of equalization convergence and the velocity of channel fading. This paper proposes a modified square root Kalman algorithm based on the original algorithm, and the performance of these two algorithms are simulated and compared by Matlab. Simulation results show that the modified algorithm overcomes the shortcomings of the original algorithm, provides nice stability while guaranteed the speed of convergence, and has the advantages over the square root Kalman algorithm for HF channel.
  • DING Rui; NAN Jian-guo
    Computer Engineering. 2009, 35(19): 105-107. https://doi.org/10.3969/j.issn.1000-3428.2009.19.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Many new Medium Access Control(MAC) protocols have been designed according to different applications, including the S-MAC, PMAC, DEANA, EMACs, Z-MAC and AIMRP protocols. This paper analyzes characteristics and performance of various typical MAC protocols. Design principles and classification methods for MAC protocols are summarized and compared in detail. Results show that a good MAC protocol is that it has the ability to make tradeoffs between energy-efficiency and other performances of WSNs in term of application conditions. According to the same principles, the future devisable tactics of MAC protocols in WSNs are pointed out.
  • ZHU Yong-li; CHEN Tao
    Computer Engineering. 2009, 35(19): 108-110. https://doi.org/10.3969/j.issn.1000-3428.2009.19.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the shortcomings and problems of the TopDisc algorithm that the flexibility of the building network is not well, repetitious the implementation of the algorithm spends too much time and remaining energy of nodes don’t be considered. This paper introduces an improved algorithm on the base of TopDisc and mades it more stabe. It uses the OPNET network tool to carry on the simulation. Simulation results show that the improved TopDisc algorithm has better energy conservation and stability compared with the original one.
  • XIE Zhi-de; LIN Ya-ping; HU Yu-peng
    Computer Engineering. 2009, 35(19): 111-113. https://doi.org/10.3969/j.issn.1000-3428.2009.19.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes and implements a Region-Partition and Energy-Balanced routing algorithm(RPEB). It achieves the result of regional motes pseudo-non-uniform by region-partition, that is, under condition of equal density, the nearer the base station there are more motes. This algorithm can achieve the purpose of energy balance and avoid conflicting caused by dense motes. It implements RPEB on the test bed of Berkeley Micaz sensor motes. Experimental results show that RPEB prolongs remarkably the network lifetime and improves data service.
  • CHEN Jian; ZOU Tao; LIANG Gen-chi
    Computer Engineering. 2009, 35(19): 114-116,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to reduce energy consumption of soft real-time system in WSN, this paper establishes mathematical model of energy consumption, introduces an optimal control problem in the Discrete Event System(DES) framework to minimize the objective function, resorts to linear programming method for solving the problem, obtains a scalable algorithm of low complexity, and optimizes the algorithm. Numerical results show that the performance of optimal algorithm is improved greatly, Dynamic Voltage Scaling(DVS) controls with the optimal algorithm in WSN nodes can save much power while meeting the requirements of deadline.
  • YE Xue; SUN Yan
    Computer Engineering. 2009, 35(19): 117-119. https://doi.org/10.3969/j.issn.1000-3428.2009.19.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a low energy Cluster-Based Time Synchronization algorithm(CBTS) for wireless sensor networks. The algorithm makes use of the principle of high-crystal to obtain frequency stability, and achieves network-wide time synchronization by clusters topology of high-crystal heads. It acquires the effect that prolong the cluster update synchronization time and reduce the transmissions of data messages. Experimental result shows that in the condition of some precision, compared with TPSN algorithm, the algorithm can reduce the energy consumption of the whole network.
  • LI Juan; FENG De-min
    Computer Engineering. 2009, 35(19): 120-122,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Dynamic Source Routing(DSR) protocol is well applied to small and medium-sized ad hoc network environment. There are certain limitations to use not well in non-peer-to-peer network environment. This paper analyzes the characteristics and problems on DSR protocol. A new routing protocol, CDSR, is proposed with combined non-peer-to-peer environment and hiberarchy routing strategy. Simulation results about CDSR’s performance evaluation show that algorithm has better performance and can improve network capability.
  • ZHANG Jian; LI Ou; LIU Guang-yi
    Computer Engineering. 2009, 35(19): 123-125. https://doi.org/10.3969/j.issn.1000-3428.2009.19.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the complexity of the wireless communication channel and the characteristics of the sensor nodes, this paper presents an improved Time Of Arrival(TOA) positioning algorithm, which does not need additional hardware. The receiver replies with the processing time automatically, so the time synchronization of nodes is not necessary. It averages the measuring results to reduce the influence of random noise. Simulation results show that the algorithm is of high positioning accuracy, and possesses better practicability.
  • GUO Xiao-lei; YANG Shou-bao; HU Yun
    Computer Engineering. 2009, 35(19): 126-128,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Gateway selection problem is brought in multi gateway Wireless Mesh Network(WMN). Gateway selection influences network performance in various aspects. This paper proposes a gateway selection strategy in a way of gateway load balancing. It tries to add information to 802.11s management frames in order to pass the gateway’s load information to the related nodes. When selecting gateway, gateway’s load and metrics are considered both. This paper also emulates the method in NS2 and analyses the result.
  • ZHANG Jie; BO Yu-ming
    Computer Engineering. 2009, 35(19): 129-131,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Considering a class of networked control systems with time delays and unknown interferences, the fault detection is carried out when the output delays are present. By increasing sampling frequency in controller and equally dividing the sampling period of the sensor, the time delays can be approximate to several times the sampling frequence of the controller. On this basis, the robust H∞ fault observer is constructed based on discrete switching systems, and a linear matrix inquality gives the stability condition of this observer. The fault detection threshold is selected with solving the minimization problem involving a linear matrix inequality constraint. In this way, the robustness and sensitivity of fault detection is enhanced. An illustrative example is given to demonstrate the effectiveness of the proposed method.
  • LI Yan-hua; PENG Man-man; ZENG Fan-zai
    Computer Engineering. 2009, 35(19): 132-134,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Since wireless sensor networks with limited energy, the transmission scheme must be energy efficient in order to prolong the lifetime of network. In this paper, an energy-efficient chain-based cooperative MIMO transmission scheme is proposed to maximize the network life-time. An optimization model is proposed to find the optimum number of cooperative nodes, transmission rates and number of chains. Simulation results prove that tremendous energy saving is possible with judicious choice of designed protocol parameters even considering the circuit energy cost and channel training overhead, and the scheme can reduce the latency.
  • Security Technology
  • YU Wei-hua; LU Song-feng
    Computer Engineering. 2009, 35(19): 135-137,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the current security problems in using the removable storage medium, an information security system in local area network is designed and implemented. It adopts C/S pattern and consists of anti-connecting-Internet server, department server and client. Based on multi-level security control idea and inside-and-outside defend idea, it protects client computer and removable medium from threaten not only in the LAN, but also on the Internet. The system safeguards the secrecy, integrality, usability of the information saved in the removable storage medium.
  • TANG Yan; DU Yu-yue; LIU Wei
    Computer Engineering. 2009, 35(19): 138-140. https://doi.org/10.3969/j.issn.1000-3428.2009.19.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper brings forward the software development process based on Model Driven Architecture(MDA) and improves efficiency & testability of software with executable formalization specification. By way of run-time monitoring technology, the credibility of system is guaranteed and the errors created by test stage and the risk of system unlawful invasion are reduced and eliminated.
  • YANG Hong-mei; HU Yu-pu; ZHAO Ying-hua; GAO Wei
    Computer Engineering. 2009, 35(19): 141-144. https://doi.org/10.3969/j.issn.1000-3428.2009.19.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The goal of password-based group key exchange is to establish a high entropy session key used for secure communication through a low entropy password, reach the multi-security requirement between members. In this paper, the protocol is based on the protocol of Burmester and Desmedt, through introducing pseudorandom ensemble and signature scheme. A provably secure password-based protocol under standard model is proposed, and its security is analysed.
  • LIU Jing; HE Wen-juan; WANG Bing-bo
    Computer Engineering. 2009, 35(19): 145-147. https://doi.org/10.3969/j.issn.1000-3428.2009.19.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the inefficient watermark detection due to the variant feature points, a novel robust image watermark method is proposed based on dividing watermark insertion and the feature points. The Harris detector is utilized to extract feature points. According to the feature points, a convex polygon is adaptively constructed which is then optimally triangulated by dynamic programming. The watermark is embedded into the circles centering around the centeroid of each triangle. With the invariant feature points, the original image and the distorted images are matched so that the geometric manipulation can be computed. Experimental results show that the proposed method is considerably robust against Rotation, Scale, and Translation(RST) attacks.
  • ZHANG Bin; LI Ming; JIN Chen-hui
    Computer Engineering. 2009, 35(19): 148-150. https://doi.org/10.3969/j.issn.1000-3428.2009.19.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A chaotic cipher is analyzed. This cipher is a shift cipher constructed by chaotic mapping. A known plaintext attack on the shift cipher is presented to recover the quantified sequence generated by chaotic mapping. The first several bits of quantified sequence are not sensitive to the least significant bits of chaos initial state. A divide-and-conquer attack to recover the chaos initial state from the quantified sequence is proposed. When the parameter k=4, r=4 and the length of key is 56 bit, the success probability of the divide-and-conquer attack is 0.917 1, the computational complexity is about 228, and the memory complexity is about 220.
  • ZHOU Shen; YANG Lu-ming; DUAN Gui-hua
    Computer Engineering. 2009, 35(19): 151-153. https://doi.org/10.3969/j.issn.1000-3428.2009.19.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Virtual Laboratory of Cryptology based on Components(VLCC) uses topological sorting in Directed Acyclic Graph(DAG) to manage the data-dependant and execute-order between components. Based on the Java thread and “wake” mechanism, this paper proposes a new DAG parallel arithmetic. Compared with topological sorting, new arithmetic’s time-complexity is highly reduced. Experimental result shows that VLCC works much faster and the usage rate of resource is heightened, and makes user more satisfied. New arithmetic is a better solution for VLCC.
  • BU Shan-yue; FENG Wan-li; WANG Ru-chuan
    Computer Engineering. 2009, 35(19): 154-156. https://doi.org/10.3969/j.issn.1000-3428.2009.19.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The Number Theory Research Unit(NTRU) algorithm is a public key cryptosystem based on rings. When compared with other typical encryption algorithms such as RSA and ECC, the NTRU algorithm has obvious advantages in security and speed. This paper analyzes some existing methods which are comparatively mature in attacking the NTRU, and gives a method of choosing parameters for the NTRU, which enhances security under different application circumstances, avoiding blindness in choosing parameters for the NTRU. It achieves the goal of increasing the algorithms speed of NTRU, as well as reducing occupation of system resources.
  • ZHANG Ming; XU Wan-li
    Computer Engineering. 2009, 35(19): 157-160. https://doi.org/10.3969/j.issn.1000-3428.2009.19.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper classifies the different kinds of exception handling mechanism according to their features and discusses their internals, especially their disassembling realization and characteristics. It further focuses on their important application in software security field. Through the research, the paper explains that it can use exception handling mechanism in more fields besides handling different kinds of errors and exceptions, which can help to further study and expand application’s fields.
  • CAI Bing; YE Ling
    Computer Engineering. 2009, 35(19): 161-163. https://doi.org/10.3969/j.issn.1000-3428.2009.19.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to meet the requirements of Wireless Sensor Network(WSN) to information source ID authentication, the Ellipse Curve Cryptography(ECC) digital signature algorithm is implemented on TelosB hardware nodes. The dot product module of ECC is optimized. Compared with existed functional softwares, the operation complexity and practical nodes operation situations are better. Experimental results show this improved ECC algorithm can promote the operation speed effectively with the same hardware platform and cryptography intensity.
  • CAO Min; CHENG Dong-nian; ZHANG Jian-hui; WU Xi
    Computer Engineering. 2009, 35(19): 164-167. https://doi.org/10.3969/j.issn.1000-3428.2009.19.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Most of abnormal traffic detection algorithms use fixed threshold, but these methods cannot describe action of network clearly. This paper presents an self-adaptive threshold residual ratio detection method which introduces the refreshing mechanism. The mechanism mixes action of previous time and gets a dynamic threshold which can act as judge rule. The method also sets an interpose in order to depict network action exactly. The paper does experiment to validate the validity and advance in performance of this method.
  • ZHANG Guo-hua; HUANG Yan-bo
    Computer Engineering. 2009, 35(19): 167-169,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at large flow and inefficiently to incent peer in the current trust model, this paper proposes a Trust Model base on Chord Layer construction(TMCL). It can access the information efficiently and alleviate flow impact which widely exists in trust model based on recommendation. At the same time it adopts bi-direction select mechanisms in transaction which prevents the malicious peers and incentive peer provides better services. Experiment shows that compared with the existing trust model, TMCL has better performance in reducing network overhead and improves the QoS in network.
  • LI Jian; YE You-pei; HE Chun-mei; HAN Mu
    Computer Engineering. 2009, 35(19): 170-171,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The image watermark scheme based on Scale Invariant Feature Transform(SIFT) feature is proposed for resisting geometric attacks. The feature points are used to construct the Delaunay triangular mask, which can make the triangle to against geometric attacks based on the SIFT point’s ability of resisting geometric attacks. Watermark according the several-for-one principle is embedded in the image content using additive method. Experiments demonstrate that the algorithm can well withstand geometric attacks and usual signal processing attacks.
  • Artificial Intelligence and Recognition Technology
  • ZHANG Qing-hua; LIU Guo-cai; LI Qi-feng; WANG Yao-nan
    Computer Engineering. 2009, 35(19): 172-174. https://doi.org/10.3969/j.issn.1000-3428.2009.19.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The binary Mumford-Shah(M-S) model and its corresponding C-V model can not work if there are more than one objects (or multi-phase) in the image. M-S model based on Piecewise Constant Level Set Method(PCLSM) can solve the minimal image partition problem. The PCLSM based Mumford-Shah model is applied to the segmentation of optic cup and disk in optic nerve head images. On this basis, the image of optic cup and disk is reconstructed. The tests demonstrate that this technique can segment simultaneously the optic cup and disk in the optic nerve head images from the different glaucoma patients, which is different from hierarchical M-S model.
  • FAN Ji-wei; LI Chao-feng; WU Xiao-jun
    Computer Engineering. 2009, 35(19): 178-180. https://doi.org/10.3969/j.issn.1000-3428.2009.19.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems that the classifier in Support Vector Machine(SVM) is influenced by sample isolated points easily, an improved active SVM algorithm is proposed, which uses K-means algorithm to obtain less representative sample as training sample. By training it, an initial classifier is got. The type of best unlabled sample is identified by means of active learning strategy, which is added into training sample sets to train classifier again. This paper repeats the process until it meets some requirements. It is tested with Iris data and remote sensing data. Experimental results show this algorithm is effective.
  • CHEN Jia-de; WU Xiao-jun
    Computer Engineering. 2009, 35(19): 181-183. https://doi.org/10.3969/j.issn.1000-3428.2009.19.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Offset determines the position of optimal separating plane of Support Vector Machine(SVM) and Fuzzy Support Vector Machine(FSVM) and affects the performance of classification greatly. In order to improve the recognition rate of FSVM, this paper proposes a new calculation approach for offset based on Fisher discriminant analysis method and uses it to design FSVM multi-classification. Test results of three data sets show that the recognition rate of FSVM using new offset is higher than the one using normal offset.
  • YUE Ke-qiang; ZHAO Zhi-jin; ZHAO Zhi-dong
    Computer Engineering. 2009, 35(19): 184-186. https://doi.org/10.3969/j.issn.1000-3428.2009.19.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To improve further performance of multi-user detection based on Discrete Shuffled Frog Leaping Algorithm(DSFLA), a novel hybrid algorithm that employs DSFLA and Hopfield Neural Network(HNN) for the multi-user detection is presented. Using this approach, updating each family in DSLA, a number of frogs are chosen at random using the updating strategy of HNN to find the global optimum. Simulation results show that the HDSFLA-MUD has significant performance improvement over conventional receivers and previous multi-user detectors based on previous optimum algorithm in terms of convergence, bit-error-rate, capacity of system and near-far resistance.
  • YING Zi-lu; LI Jing-wen; ZHANG You-wei;
    Computer Engineering. 2009, 35(19): 187-188,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Support Vector Machine(SVM) can deal with binary class problem. By using “one against one” and “one against all” approach, binary class SVM can be expanded to multi-class SVM. A construction method for multi-class SVM based on binary class SVMs fusing is proposed. The classifier fusion approaches include Maximum, Minimum, Product, Mean, Median, Major Voting fusion methods and decision template fusion methods. This method is applied to the facial expression recognition for Japanese female expression database JAFFE and proved to be effective.
  • DUAN Ai-ling; WANG Wei; CHENG Feng-juan
    Computer Engineering. 2009, 35(19): 189-191. https://doi.org/10.3969/j.issn.1000-3428.2009.19.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Bidding evaluation is an important part during engineering projects. The difficulty using genetic algorithm is lack of the fitness function design methodology that is proper and feasible. On the basis of coding rule of genetic algorithm, this paper leads the Analytic Hierarchy Process (AHP) to the design of fitness function. It explains all the process of making the design of fitness fuction in the use of AHP method through the example calculation. Results show that the algorithm can be effectively applied to the bidding evaluation of engineering projects.
  • LI Yi-feng; LIU Yi-hui
    Computer Engineering. 2009, 35(19): 192-194,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem in process of dimensionality reduction, classification and living creature label recognition for protein mass spectrometry data, a feature selection method based on Genetic Algorithm(GA) is proposed. Some usual relevant strategies are introduced, including elitism coupled with rank based stochastic universal sampling selection strategy and uniform mutation with adaptive mutation rate strategy. On this basis, two fitness functions are put forward, which are wrapper and multivariate sizer. They are introduced into GA, and the performances are tested and compared. Experimental results show that the performance of the wrapper-based GA outperforms all the other feature selection methods, and the one of multivariate filter-based GA is better than univariate one.
  • LIU Xiao-ke; SUN Xie-hua; ZHOU Yong-xia
    Computer Engineering. 2009, 35(19): 195-197. https://doi.org/10.3969/j.issn.1000-3428.2009.19.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper adds some new detection features on the basis of Haar-like feature, gives the feature calculation method and integration method, and achieves multi-angle face detection. It divides multi-angle face into three categories: all side face, half side face and positive face. Continuous Adaboost algorithm is used to train various types of face detector. It cascades various types of face detectors into a multi-angle face detector by using pyramid-style structure. In CMU face detection aggregation, the success rate of this detector is 85.2% which is higher than that of Adaboost algorithm and float Adaboost algorithm.
  • WU Fang-ming; ZHAO Xiao-zhe; GUO Rui
    Computer Engineering. 2009, 35(19): 198-199,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the reasoning difficulties in fuzzy inference of recessive knowledge named quantifier embodied in fuzzy expert system. According to the positions of quantifiers appearing in propositions, quantifiers are divided into two situations and discussed. It proposes the method of quantifier inference through querying table and expatiates the building principles of querying tables under two situations. This method can avoid the complexity of fuzzy inference calculation.
  • Graph and Image Processing
  • WANG Wen-ming; SUN Feng-rong; LIU Wei; YAO Gui-hua; ZHANG Yun
    Computer Engineering. 2009, 35(19): 200-202. https://doi.org/10.3969/j.issn.1000-3428.2009.19.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Vessel tree reconstruction for thoracic CT data is a prerequisite in Solitary Pulmonary Nodule(SPN) detection. This paper proposes a novel method to reconstruct the pulmonary vessel tree, integrating morphological filters and the local feature structure. It uses morphological operators to extract the general structure of the vessel tree, and removes the voxels not belonging to the tissue according to the Hessian matrix eigenvalues of the special tissue voxels. Experimental results show the method is capable of quickly and effectively realizing the reconstruction of pulmonary vessel tree.
  • LI Zhi-mei; XIAO De-gui; WANG Li-li
    Computer Engineering. 2009, 35(19): 203-205. https://doi.org/10.3969/j.issn.1000-3428.2009.19.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a fast colore image segmentation algorithm based on wavelet transform and Kernelized Fuzzy C-Mean(KFCM) clustering algorithm. By using the multiresolution of wavelet transform, mean-shift clustering is implemented on the LL sub-band of maximum size and the initial coarse image segmentation is obtained. Based on the initial coarse segmentation, KFCM is implemented and the result of the previous level is used to initialize the next level until the lowest resolution appears. The initial image is segmented with the minimum classifier. Experimental results demonstrate that this method has fast speed and performs better than traditional Fuzzy C-Mean(KFCM) algorithm and mean-shift algorithm.
  • WANG Zhong; FU A-li
    Computer Engineering. 2009, 35(19): 206-209. https://doi.org/10.3969/j.issn.1000-3428.2009.19.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    2D Otsu method considers both the gray information and spatial neighbor information between pixels in the image, so it is efficient but with larger computing load. This paper proposes a strategy based on Chaos Particle Swarm Optimization(CPSO), applies it into 2D Otsu method, and makes simulation experiments to compare the method and Standard PSO(SPSO). Experimental results show that this method can increase the speed of segmentation, overcome the disadvantage of SPSO, and gain the ideal result of the image segmentation.
  • XU Qiu-ping; GUO Min; WANG Ya-rong
    Computer Engineering. 2009, 35(19): 210-212,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Image segmentation methods based on graph cuts have a unified segmentation framework combined with various knowledge, and can get a global optimal solution. Such algorithms have poor efficiency because of massive pixel level processing units and iterative solving model. On the basis of GrabCut algorithm, this paper transforms the image into color-similarity-blocks using the watershed algorithm, and estimates the Gaussian Mixture Model(GMM) parameters with blocks instead of pixels, so sharply decreases the problem scale and significantly improves the algorithm efficiency.
  • LI Cheng-jie; LIU Hong; LI Xia
    Computer Engineering. 2009, 35(19): 213-215. https://doi.org/10.3969/j.issn.1000-3428.2009.19.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a method of rule composition based on fractal image primitives for fractal composition. With the concept of rule which is used to control the procedure of drawing, the method creates new types of patterns based on fractal image primitives and the patterns obtained is an extendence of fractal patterns. Three types of rule including symmetry transformation, rotation transformation and fusion transformation are given as well as the corresponding composition models and pattern samples. Experimental results show that patterns obtained this way are novel, complex and fantastic, and the patterns extend the fields of fractal patterns.
  • CHENG Yan
    Computer Engineering. 2009, 35(19): 216-218,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a stable Super Resolution(SR) reconstruction algorithm to image analysis for enhancing the quality of images. It proposes Lorenztain-based Maximum A Probability(MAP) algorithm by modeling the edge image, which is iterated by the Lorentzwidth parameter adaptively to modify the reconstruction. Experimental results demonstrate validity and superiority of the algorithm, which can get ideal and stable reconstructions when applying to image forensics practices.
  • Multimedia Technology and Application
  • HAN Rui; WU Guo-bin; NI Hong; PAN Liang
    Computer Engineering. 2009, 35(19): 219-221. https://doi.org/10.3969/j.issn.1000-3428.2009.19.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    rvice, and how to select the corresponding metadata standards to meet the requirements. The service system is designed and service front-end system is implemented. This paper presents a complete solution of the content-triggered interactive service based on Digital Video Broadcasting(DVB) protocol and several metadata standards. It analyzes two common metadata standards in digital TV area including DVB-SI and MPEG-7, discusses the metadata requirements of this interactive se
  • XIE Zheng-guang; BAO Zhi-hua; XU Chen; ZHANG Guo-an; ZHANG Shi-bing; YANG Yong-jie
    Computer Engineering. 2009, 35(19): 222-223. https://doi.org/10.3969/j.issn.1000-3428.2009.19.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to eliminate the artifacts such as edge blur and image “ghosting” (motion blur) when applying the existing pre-processing algorithm to video sequences, an adaptive pre-processing algorithm based on motion-estimation is proposed for noise reduction and bit-rate decrease. This algorithm which maps temporal-filtering into spatial-filtering can avoid edge and motion blur and de-noise and enhance coding-ratio. The algorithm is applied to H.264 video code JM9.8 and experimental results show the bit-rate can decrease by 12%~32% under the condition of the same PSNR. Up to 9 dB PSNR higher is achieved compared with results of the existing methods.
  • SHAO Song-nian; HUANG Zheng; XU Che; SHI Shao-pei; YANG Xu
    Computer Engineering. 2009, 35(19): 224-226,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a method for detecting the digital audio through its characteristics without any digital watermark or signature embedded in. It gets the incidental background noise characteristics of the sample audio by wavelet de-noising, and compares it with the background noise of other audio to detect whether it is tampered by another piece of audio recorded by another type of device, which provides the evidence for judicial authentication.
  • GAO Peng; TENG Guo-wei ; SHEN Li-quan; XIE Jin-hui
    Computer Engineering. 2009, 35(19): 227-229,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a Unequal Error Protection(UEP) scheme for the scalable video with a combined spatial, temporal, and quality(SNR) scalability over wireless channels. The bit stream is divided into three types according to the importance to the reconstructed picture. Each sub-bit-stream is protected by unequal quantities of bits. Experimental results show the scheme can improve coding efficiency of PSNR by 2.0 dB and 0.5 dB compared with traditional Equal Error Protection(EEP) and UEP scheme.
  • Engineer Application Technology and Realization
  • HU Jun-guo; QI Heng-nian; WANG Hang-jun
    Computer Engineering. 2009, 35(19): 230-232. https://doi.org/10.3969/j.issn.1000-3428.2009.19.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the shortcomings of basic land information acquirement methods, this paper puts forward the basic land information acquirement technique based on Linux and combines 3S technique. It takes Linux as core and designs an embedded GIS module with intellectual property, in order to fit the use in the palmtop, it proposes a quadtrees-dual buffer access module to improve the electron map showing rate. Making use of quadtrees, it achieves large-scale base map vision. Through integrating land management software, it achieves the data collection. The technique is proved the availability, which is successfully applied with good result.
  • LIU Chang-long; MA Xin; ZHANG Bei-ke
    Computer Engineering. 2009, 35(19): 233-235,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In view of the characteristics of modern chemical process flow, this paper models the process flow of chemical production by utilizing Signed Directed Graph(SDG) model, and obtains causality diagram that describes the mechanism of process flow. By using the reasoning ability of SDG, the causality diagram is transformed into production rule. And based on the reasoning features of SDG model, the paper puts forward a practicable design scheme for diagnosis expert system to store the obtained rules into knowledge base and conduct fault diagnosis by means of forward reasoning. The method has been proved effective and feasible in practical application.
  • WU Shao-gang; FENG Da-qiang
    Computer Engineering. 2009, 35(19): 236-238. https://doi.org/10.3969/j.issn.1000-3428.2009.19.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Supporting Windows CE on the Godson-based platform, has an important significance to expanse the field of industrialization application for Godson processors. This paper presents the design of a portable basic architecture for EBoot of Windows CE, and the implement of the EBoot of Windows CE. Experimental results show that this plan satisfies the functions and stability requirements of Windows CE on the platform for Godson.
  • MIAO Li-dong
    Computer Engineering. 2009, 35(19): 239-241. https://doi.org/10.3969/j.issn.1000-3428.2009.19.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the principle of xPC target driver, solutions are put forward targeting the key issues of parameters transmission and base address lookup in development of xPC target drivers. The solutions involve block mask and selection of valid base address. Tests are conducted with an industry computer and a DIY PC respectively, and result shows that the drives with seven-channel A/D conversion can achieve 10 kHz while the signals can be visualized in real time. Tests prove that the proposed solutions are effective and the developed drivers are portable, which can help the development of xPC target drivers
  • LIU Yi-hong; DAI Qing-yun; ZHOU Ke; LIU Ze-xi
    Computer Engineering. 2009, 35(19): 242-244. https://doi.org/10.3969/j.issn.1000-3428.2009.19.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a kind of TDMA technology of RF433M communication against the low utilization rate of turn-requiring network model in real-time data acquicition. Compared with traditional RF turn-inquiry mechanism, a initiative mechanism of RF network is made according to this technology in project. The results show that the technology performs better effect in transmission rate, stability and flexbility of network,it can solve the problem of synchronization in wireless network and can improve the utilization rate and data rate of the network more effectively.
  • Developmental Research
  • DA Liang-long; ZANG Tao; YANG Ting-wu; LIU Bei
    Computer Engineering. 2009, 35(19): 245-247. https://doi.org/10.3969/j.issn.1000-3428.2009.19.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the low rate of route planning due to huge, complex 3D data, this paper proposes a 3D data field route planning based on Compute Unified Device Architecture(CUDA). The method takes the 3D underwater acoustic field as the threaten model, the navigational submarine as the background,uses CUDA to do the route planning under massive data field, computes the part which can parallel computing with CUDA. Simulation result proves that the method can raise planning speed, and optimize initial route.
  • WANG Hui; WU Zhen; SONG Guang-fei; WANG Feng
    Computer Engineering. 2009, 35(19): 248-250. https://doi.org/10.3969/j.issn.1000-3428.2009.19.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve TCP performance in the satellite network of a long delay, high bit error rate and asymmetrical bandwidth, this paper builds a heterogeneity network architecture model consisting of limited network, Performance Enhancing Proxies(PEP) and Geosynchronous Orbit(GEO) satellite network by PEP. It builds simulation environment between wired network and satellite network in NS2. Simulation results show the model can improve the performance of TCP in satellite network.
  • FANG An-ru; YE Qiang; LU Qi; LI Yi-jun
    Computer Engineering. 2009, 35(19): 251-253. https://doi.org/10.3969/j.issn.1000-3428.2009.19.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Data mining techniques are broadly used in customer relationship management, which enhance the capacity of customer segmentation to a new level. Since there is no unified framework model for customer segmentation by now, this paper analyzes the recent relation of customer relationship management structure and customer segmentation, and proposes a customer segmentation framework model based on data mining, which includes space model and DFM(Data, Function, Method) model.
  • XU Wen-jie; DING Zhi-gang; ZHANG Wei-hong;
    Computer Engineering. 2009, 35(19): 254-256,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at a new Monahans processor, this paper proposes a power management scheme combining with its own power management function and relative content of power management subsystem in Linux. The scheme can monitor system operating states in real time in order to dynamically decrease frequency and voltage of system operating, process conversion of power states. Application result proves that the scheme can decrease power of system, extend using time of battery.
  • YAN Yi; HU Feng-ling
    Computer Engineering. 2009, 35(19): 257-259. https://doi.org/10.3969/j.issn.1000-3428.2009.19.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem that different requirements for signal scan cycle lead to the low control efficiency in embedded Programmable Logic Controller(PLC), this paper proposes a schedule algorithm based on Group I/O Task. It realizes the automatic division of fast and slow task sets, and adopts different schedule strategies for two sets to improve the control for machine. Experimental results show that the algorithm has low system cost, good portability, and it is applicable to limited resource of embedded PLC.
  • LIAO Qiang; WEN Rong; XIA Yang; YAN Wei; LUO Jian
    Computer Engineering. 2009, 35(19): 260-262,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of processing and transmitting huge image data for wide format ink-jet printer, realizing the complex algorithm for the system movement controller and succeeding products upgrade and exploitation, Nios II processor is used as the core of the embedded system. This paper designs a wide format ink-jet printer control system based on System On Programmable Chip(SOPC) by adding peripheral memory component, communication component and control parts. Experimental result shows that the system has high integration, good performance of processing and transmitting huge image data, and high reliability.
  • MA Jie; FAN Wei; YUAN Hong-yu
    Computer Engineering. 2009, 35(19): 263-265. https://doi.org/10.3969/j.issn.1000-3428.2009.19.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at decreasing the rate of missing report caused by the imbalanced samples in weather report, this paper proposes a C weighted Support Vector Machine(SVM) technology based on data field. The technology classifies the imbalanced weather data, uses superimpose data filed potential value according as the data sample, the best samples for the SVM learning are filtered for training C weighted SVM. Experimental result proves that it can shrink the scale of training set, decrease the rate of missing report, boost the g-means in thunderstorm weather which has too many numbers of sample and prominent imbalanced property.
  • ZHANG Qian-yuan; DING Wei-long; GU Hui
    Computer Engineering. 2009, 35(19): 266-267,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Most works for detail simulate for plant organs are focused on the overall performance of plant organs at present, while works for plant hairs are relatively less. Aiming at this issue, this paper proposes a method which based on generalized cylinder and linear interpolation. It uses generalized cylinder to simulate the plant organs and single hair, and computes the attach point by linear interpolation. Experimental results show that using this method can get good visual results.
  • MAO Qian; XU Bo-qing; ZENG Xiao-qing
    Computer Engineering. 2009, 35(19): 268-271. https://doi.org/10.3969/j.issn.1000-3428.2009.19.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Considering the different sensitivities for bit errors of the information in Communication-Based Train Control(CBTC) system, this paper proposes a new error-correcting code for the more important information, which is R-S Unequal Error Protection(UEP) code. The algorithm constructs the code space by separating the minimum ideal, and a new decoding algorithm for R-S UEP codes which have two error protection levels are two is proposed. Simulation show that R-S UEP code makes the SNR of the information with high-level protection reduce by 0.5 dB at least.
  • WANG Hai-yan; ZHOU Si-fang; ZHI Jian-fei
    Computer Engineering. 2009, 35(19): 272-273,. https://doi.org/10.3969/j.issn.1000-3428.2009.19.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper designs an e-paper management system. It adds the function to bring output of e-paper into XML document based on the existing examination system. It is based on XML metadata exchange algorithm. The system extracts e-paper of student from the database to generate the original answer of students and XML documents of information marked by teachers according to the predefined XML document template. Experimental result proves that the e-paper documents can no longer rely on the existing examination system, and it enhances the later period management of e-paper.
  • CHEN Yi; ZHAO Gao-peng; LIU Di
    Computer Engineering. 2009, 35(19): 274-276. https://doi.org/10.3969/j.issn.1000-3428.2009.19.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a camera calibration method based on simplified Unscented Kalman Filtering(UKF) algorithm. The feature points in the planar target images are considered as motion coordinates of one feature point at different time. To avoid the singular problem from Euler angle description, the quaternion is used to represent the transform relation between world coordinate system and camera coordinate system. The intrinsic and extrinsic camera parameters are taken as system state variables. According to the application background, it simplifies the original UKF algorithm and uses it to estimate camera parameters, and reduces the calculation complexity while the calibration precision is kept. Simulation results show that this method is effective.
  • JI Chun-yang; TANG Zhi-hao; HU Ke-jin
    Computer Engineering. 2009, 35(19): 277-279. https://doi.org/10.3969/j.issn.1000-3428.2009.19.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To convert strategy alignment and IT savvy theories into quantitative results so as to support enterprise IT decision-making, the Analytic Network Process(ANP) is introduced, and collaboration between business and IT strategy is simulated. Business strategy management of Porter, and strategy alignment management of Henderson are borrowed to represent business strategy and IT strategy. Based on this, the impact of IT savvy on IT project is also considered. An IT decision-making model based on the quantitative results of strategic alignment and IT savvy is put forward and validated through computation and analysis of real case.
  • MAO Wei-hua; TANG Shou-guo; GAO Shu-juan; BAI Xue-song
    Computer Engineering. 2009, 35(19): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2009.19.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Business collaboration is very critical for the success of the enterprise IT infrastructure. To solve the problems lie in the complexity of the business logic and the scale of the whole system, this paper does a detailed research and practice based on information integration projects in universities. A well-designed scalable platform is provided to achieve data integration, process integration and application integration in large-scale campus.
  • WU Fang; ZHAO Zhi-jin; YE Xue-yi
    Computer Engineering. 2009, 35(19): 283-封三. https://doi.org/10.3969/j.issn.1000-3428.2009.19.095
    Abstract ( )   Knowledge map   Save
    This paper implements Intelligent Agent(IA) distributed system used in multi-layer network on the basis of IA technology and distributed network technology, utilizing Python language with its good system compatibility and object oriented. It builds a credible communication mechanism by using network monitoring, address list and XML communication format. Experimental result shows that the system has the good propriety of cross-platform and proposed communication mechanism is helpful for improving the communication reliability and efficiency.