Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 June 2009, Volume 35 Issue 12
    

  • Select all
    |
    Degree Paper
  • MA Hong; LI Zhen-wei; PENG Si-long
    Computer Engineering. 2009, 35(12): 1-4. https://doi.org/10.3969/j.issn.1000-3428.2009.12.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents the design of a high performance re-configurable 16-bit adder, which is well suitable for digital signal processor. The adder can add two 16-bit operands or four 8-bit operands. It is a hybrid of Conditional Carry Select adder(CCS) and Conditional Sum Select adder(CSS) with which the carry chain is also optimized. Simulation results show that the delay is reduced by 46% and the power is 5% lower compared with the general CCS under typical conditions with standard cell using 0.18 m technology.
  • SUN Xun; LI Jian-hua; HAO Li-ming; LU Song-nian;
    Computer Engineering. 2009, 35(12): 5-7. https://doi.org/10.3969/j.issn.1000-3428.2009.12.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To deal with trust negotiation in the heterogeneous platform composed of non-trusted computing and trusted computing platforms in Peer-to-Peer(P2P) system, a novel trust model is proposed based on Trusted Computing(TC) technology. Its framework and authentication flow are studied. The simulation result shows that peers have high anonymity degree and the model has good ability to withstand malicious peers’ behaviors.
  • DING Bo; SUN Li-juan
    Computer Engineering. 2009, 35(12): 8-10. https://doi.org/10.3969/j.issn.1000-3428.2009.12.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Collaborative virtual assembly technology, which is on the combination of virtual prototyping and virtual reality, is a new hot research. This paper adopts semantic feature modeling based on cellular model, proposes a uniform cooperative virtual assembly environment, which can realize transmission of parts and components. And because what the network transmits is modeling operation based on FDG, the network has a less load and a faster respond speed. Preliminary applications in the collaborative virtual assembly between HUST-CAIDS and UG are also introduced to prove the feasibility of the theories above.

  • ZHANG Zhong-ping; LIANG Yong-xin
    Computer Engineering. 2009, 35(12): 11-13. https://doi.org/10.3969/j.issn.1000-3428.2009.12.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Incremental mining algorithms based on local outlier factor demand multiple scans of the data set. Stream data Outlier Mining algorithm based on Reverse k Nearest Neighbors(SOMRNN) is proposed according to the concept that reverse k nearest neighbors is suitable to measure outlier degree. The sliding window is adopted to update the current window with one scan, which improves the algorithm efficiency. The capability of queries at arbitrary time on the whole current window is achieved by query manager procedure, which can capture the phenomenon of concept drift of data stream in time. Experimental results show that SOMRNN has feasibility and efficiency.
  • ZHANG Xia; YU Hong-yi; YANG Bai-wei
    Computer Engineering. 2009, 35(12): 14-16. https://doi.org/10.3969/j.issn.1000-3428.2009.12.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to set up message exchange model in coherent cooperative routing, the problem of energy efficiency for cooperative routing is analyzed. Through the experiment, some facts are discovered, and the conculsion is: cooperative routing isn’t as energy efficient as non-cooperative routing when the transmission distance is small because the extra circuit energy consumption exceeds cooperative energy savings, on the other hand, for long range transmission, when the channel evaluation period and packet length are given, the longer data packets and shorter interval, the more energy efficient cooperative routing is.
  • LI Qing; YU Hong-yi; ZHANG Da-long
    Computer Engineering. 2009, 35(12): 17-19. https://doi.org/10.3969/j.issn.1000-3428.2009.12.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To improve the efficiency of reliable broadcast/multicast MAC protocol in Wireless Sensor Network(WSN), this paper proposes an elimination algorithm for redundancy of acknowledgment based on geographical location information. This algorithm uses neighbors’ geographical location information to construct the minimum equivalent collision area for broadcast/multicast packet, which wipes off the redundant nodes from receiver nodes set in terms of acknowledgement. Simulation results show that this algorithm can decrease the number of nodes joining in acknowledgment with reliability, reduce packet sending cost and guarantee the packet transmission quality more efficiently.
  • HUANG Jia-qing; WU Juan; CHEN Qing-wen; CHEN Jing-wen
    Computer Engineering. 2009, 35(12): 20-21. https://doi.org/10.3969/j.issn.1000-3428.2009.12.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Large-scale simulation to typical BitTorrent algorithm is conducted by using parallel distributed simulation tool on the packet level, and large-scale P2P downloading algorithm performance is researched, the modeling method of which is introduced. Moreover, BitTorrent algorithm with scalability of the framework on platform of Parallel Distributed Network Simulator(PDNS) is simulated. Experimental results show this scheme can test the algorithm performance with hierarchical topology using multi-computer, and is effective.
  • CHEN Ming
    Computer Engineering. 2009, 35(12): 22-25. https://doi.org/10.3969/j.issn.1000-3428.2009.12.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Cooperative design is trend of engineering design. According to the requirement of collaborative design, a bridge collaborative system based on J2EE platform is presented by the thought of cooperative design combines with development course of traditional bridge CAD system. The studies include data representation model of bridge collaborative design, reasoning algorithm based on geometry constrained and reasoning algorithm based on design constrained. The model is used in an instance of collaborative design among seismic design group, structure design group and seismic motion information collection group and its feasibility is validated.

  • LIU Bin; LI Zhi-tang; ZHOU Li-juan; PAN Ting
    Computer Engineering. 2009, 35(12): 26-28. https://doi.org/10.3969/j.issn.1000-3428.2009.12.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A novel frequent item mining algorithm based on multi-dimentsional clustering is proposed, which uses clustering theory to mine significant flow and its rules automatically in network. On basis of this, P2P suspected identification is conducted to these flows. Combined with application layer feature recognition technology, highly suspected P2P significant flow is filtered, and unknown P2P traffic detection is implemented. Experimental results show this method is effective.
  • XIONG Zhong-min; HUANG Dong-mei
    Computer Engineering. 2009, 35(12): 29-31. https://doi.org/10.3969/j.issn.1000-3428.2009.12.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To address the slow speed of GN algorithm, a new algorithm based on betweenness scores of edges is presented for detecting the underlying community structure in networks. Employing component independency, this algorithm presents a new method through which all edges with the highest betweenness score in respect of each component is simultaneously removed when all betweenness scores are computed. It is proved that this algorithm is fast and effective through theoretical analysis and experiments with several real data sets which are acted as test beds.
  • DENG Zi-jian; LAI Xue-jia; HE Da-ke
    Computer Engineering. 2009, 35(12): 32-33. https://doi.org/10.3969/j.issn.1000-3428.2009.12.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a linguistic reputation system based on Computing with Words(CW). The buyer can comment the seller by using natural language, and nodes in the network can read the commentary for seller. This paper considers the weight of price of every tradeoff to obtain the last reputation result, and gives the effect of price factor on the reputation result. Compared with the traditional system using number to describe reliability of the node, this system is more tally with habit of human thought.

  • LIU Ling; ZENG Xiao-ping; ZENG Hao
    Computer Engineering. 2009, 35(12): 34-37. https://doi.org/10.3969/j.issn.1000-3428.2009.12.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Signal source number estimation is very important to spatial spectrum estiamtion. Usually, eigenvalues of the received signals covariance matrix are used in some different detection criteria. The proposed algorithm method replaces the eigenvalue by singular value, which can be calculated by the data matrix directly. Since the covariance matrix estimation and eigenvalues calculation are avoided, the new algorithm reduces the computation load and estimation error. The spacial smoothing of data matrix resolves the coherent signals. The mathematical calculations and computer simulation show the validity of the new alogrithm.
  • Software Technology and Database
  • WANG Tao; ZENG Zhi-wen; CHEN Zhi-gang
    Computer Engineering. 2009, 35(12): 38-40. https://doi.org/10.3969/j.issn.1000-3428.2009.12.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Task scheduling is an integral part of parallel and distributed computing and one of the important problems in Heterogeneous Computing System(HCS). The tasks scheduling problem is an NP-hard in general. In order to obtain better solutions, many scheduling heuristics are presented in the literature. This paper analyzes the typical algorithms of list scheduling, and there are some disadvantages of them. It proposes a new algorithm, Dynamic Unrestricted Node Lag(DUNL) that can generate an optimal scheduling. The algorithm selects the Unrestricted Nodes(UN) dynamically and then schedules them after all the other nodes, so it can schedule the nodes that have more influence on the schedule length in the Direct Acyclic Graph(DAG) first, and then the schedule length is shorter. The result of experiments shows that this algorithm is obviously better than ETF, MCP and BDCP algorithms.
  • LI Jia-li; WANG Nian-bin; SUN Wei-hong
    Computer Engineering. 2009, 35(12): 41-43. https://doi.org/10.3969/j.issn.1000-3428.2009.12.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper researches on related technology of ontology representation. These ontology representation methods are compared with their expressiveness and inference capabilities, advantages and disadvantages of these methods are summarized. Based on the comparison, a Unified Modeling Language(UML) & Object Constraint Language(OCL)-based ontology representation method is presented, and this paper especially studies reasoning on this ontology representation method. This method is applied.
  • FANG Yi-qiu; RAN Hua-feng; GE Jun-wei
    Computer Engineering. 2009, 35(12): 44-46. https://doi.org/10.3969/j.issn.1000-3428.2009.12.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aspect-Oriented Software Development(AOSD) deals with the crosscut concerns well at the program-level. This paper discusses how to separate the crosscut concerns during requirement and analysis phase by AOSD. It states how to model the crosscut concern through the use cases technology, so as to improve the reusability and maintainability of software. A real case is given to specify the modeling, the crosscut concern is dealed with as an exstendable use case that composed into requirement modeling, it can improve the degree of system modular and requirement traceability.

  • YANG Mei-rong; SHI Jian-feng; LI Ming-xing
    Computer Engineering. 2009, 35(12): 47-49. https://doi.org/10.3969/j.issn.1000-3428.2009.12.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem that how to transform business model to code, this paper presents a design of code generator to implement code generated automatically in Model-Driven Architecture(MDA). It introduces a business object-oriented Platform Independent Model(PIM) described with XML, designs and implements a code generator which realizes the automatic transformation from PIM to code to support rapid changes of system behaviors and automatic code generation after business model changing. It illustrates the application of the code generator.

  • ZHANG Feng; SHAO Xiu-li; LI Yao-fang
    Computer Engineering. 2009, 35(12): 50-53. https://doi.org/10.3969/j.issn.1000-3428.2009.12.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An heterogeneous data integration enquiry system based on the Web Service is proposed, which uses B/S and C/S combination of multi-storey distributed architecture to improve the system’s practicality. The heterogeneous data and differences of system patterns are shielded. Simulation experimental results show this design scheme can achieve the fact that much more heterogeneous systems can be integrated, the functions of transparent user query are implemented, and the safety of the data source is ensured.

  • ZHANG Zhong-ping; LUAN Jian-feng; WANG Kun-bo
    Computer Engineering. 2009, 35(12): 54-55. https://doi.org/10.3969/j.issn.1000-3428.2009.12.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the actual instance that old existed methods of data integration are not suitable to the high dynamical data integration in grid environment, this paper proposes a new method of data integration based on P2P and gives an integration framework of heterogeneous XML data resources. By establishing schema mappings directly at different Peers and using the decomposation-reform algorithm, the dynamical XML data resources on different gird nodes are integrated efficiently.
  • SHEN Gang; LUO Jun
    Computer Engineering. 2009, 35(12): 56-58. https://doi.org/10.3969/j.issn.1000-3428.2009.12.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The problem of XML redundancy detection with semantics is very meaningful to prevent update anomalies and the key problem of XML normalization theory. In this paper, the definition of XML schema and XML function dependency etc. are given and the new XML function dependency and normal form model are proposed and based on this model a new XAP algorithm is designed to discover function dependency and detect redundancy. It also analyzes its complexity.
  • LI Xia; CHEN Zi-jun; LV Qing-chun
    Computer Engineering. 2009, 35(12): 59-60. https://doi.org/10.3969/j.issn.1000-3428.2009.12.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    All the heuristic approaches are realized by deleting an item or inserting an item, of which the negative effect on non-restricted rules is too much. Focusing on the shortcoming, this paper presents an algorithm combining those two operations, which insert an item into proper transaction after deleting that item. Experimental results show that privacy preserving data mining algorithm based on item-moving has lower miss rate and dissimilarity.
  • MA Chi; WANG Nian-bin; ZHANG Hai-yan
    Computer Engineering. 2009, 35(12): 61-63. https://doi.org/10.3969/j.issn.1000-3428.2009.12.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Ontology mapping is an effective method to realize the interoperation and share of heterogeneous ontology. This paper presents a similarity calculation method, in accordance with the various relationships between concepts, and takes into account the impact of already established mapping experience on the unsolved concept similarity. It proposes a method based on the ontology axiom to verify the results of mapping methods, ensures the accuracy of the mapping under the premise of effectively improving the mapping speed. In addition to identify the equal and similar concepts, this paper considers the sub-class and super-class relationship between mapping concepts.
  • HUANG Shuai; MENG You-xin; ZHANG Rui-quan
    Computer Engineering. 2009, 35(12): 64-66. https://doi.org/10.3969/j.issn.1000-3428.2009.12.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a supplier selection model for small and medium manufacturing enterprises. It evaluates and analyzes the project by combining point value judgment matrix with interval value judgment matrix, adds pre-selected suppliers stage on the basis of traditional analytical hierarchy process, and chooses the actual needs methods of evaluation calculation, consistency checking and adjusting to ensure the scientific of the evaluation system. The implementation results of the computer management system in a small and medium manufacturing enterprises show the feasibility and validity of the model.
  • WANG Bin; ZHOU Liang; ZHU Wei; SHEN Jin-fang; GUI Wei-hua
    Computer Engineering. 2009, 35(12): 67-69. https://doi.org/10.3969/j.issn.1000-3428.2009.12.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aspectual component composition platform needs a new kind of architecture description language to support architecture description and verification. Based on analyzing Wright, this paper proposes an extended aspectual component composition architecture description language——AWright. In order to illustrate the mechanism and the description ability of AWright, it presents a medical diagnosis system described in AWright as a case study.
  • CHEN Hai-yong; LI Nan
    Computer Engineering. 2009, 35(12): 70-72. https://doi.org/10.3969/j.issn.1000-3428.2009.12.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Scheduling of grid resource reservations is an effective way to improve the grid Quality of Service(QoS) as a whole. This paper introduces the benefit functions and priorities into resource reservations, which keeps the reservation processes from continuous interactions and improves the reservation success rate. Simulations are performed to compare the algorithm with an existing approach. The result indicates that the proposed algorithm has better performance by satisfying large number of reservation requests.
  • DUAN Xing-hui; HUA Jian-wen; DAI Zuo-xiao; JIN Xiao-qiang
    Computer Engineering. 2009, 35(12): 73-75. https://doi.org/10.3969/j.issn.1000-3428.2009.12.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Because of its special working circumstance, onboard software should be of high reliability and fault-tolerance. A system failure is mostly due to its software failure. One of the reasons is that software reliability is behind the one of hardware. This paper analyzes the characteristic of onboard software. According to the software developing flow, it expounds some measures to improve the software reliability and fault-tolerance during the software developing process. Practical results show that these fault-tolerance technologies are necessary and effective.
  • CHEN Zhen; YU Jiong; LI Feng-jun; TIAN Guo-zhong
    Computer Engineering. 2009, 35(12): 76-77. https://doi.org/10.3969/j.issn.1000-3428.2009.12.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Focusing on the complexity problem of managing and scheduling system resources in gird environment, this paper proposes a grid resources allocation model based on competition mechanism, which includes user layer, broker layer and resource layer. The resource allocation policy and a new cost optimization algorithm are proposed. Simulation experiments show that it fits the dynamic changes better in the grid environment and adjusts balance between supply and demand.
  • Networks and Communications
  • LIANG Xiao-man; WANG Guo-jun; XIE Yong-ming
    Computer Engineering. 2009, 35(12): 78-81. https://doi.org/10.3969/j.issn.1000-3428.2009.12.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the defects that the existing paper didn’t give a good method to reduce the energy consumption and data collisions of the nodes on the boundaries of holes because of packets traveling along the boundaries of hole, also to avoid the problem of local minimum phenomenon. The paper proposes the HRAEM algorithm, according to different locations of the source and destination appear in the wireless sensor networks using different forwarding strategies. Simulation results show that the algorithm optimizes routing path of the hole-routing and has a good performance on data packet delivery, average delay, and network life cycle.

  • LIU Xi-xiang; XU Xiao-su
    Computer Engineering. 2009, 35(12): 82-83. https://doi.org/10.3969/j.issn.1000-3428.2009.12.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The function requirement of double redundant Network Interface Card(NIC) is analyzed and an intelligent dual-redundance NIC is designed. Whether the NIC should be active shift is decided by the link state of NIC and the reliability and stability of network. And based on the characteristics of UDP protocol and in order to improve the stability of communication, the NIC should be passive shift according to the changes of target communication node. Test result shows that the method is reliable and the shift time is shortened to millisecond grade.
  • WU Gong-yi; LIU Qian; WANG Jun; YANG Yang; XU Jing-dong
    Computer Engineering. 2009, 35(12): 84-86. https://doi.org/10.3969/j.issn.1000-3428.2009.12.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the problem that traditional unstructured P2P networks use the same searching mechanism for the files of different popularity, which consumes a large amount of network resources, this paper proposes a file popularity evaluating mechanism based on LogLog algorithm by researching Gnutella protocol, and combines it with Expanding Ring(ER) algorithm to present a new searching mechanism. Compared with Expanding Ring, this mechanism can reduce network overhead and response time, particularly the response time of the rare files.
  • XU Jiu-qiang; DING Yu-guan; ZHAO Hai; ZHANG Xi-yuan; BI Fu-wei
    Computer Engineering. 2009, 35(12): 87-89. https://doi.org/10.3969/j.issn.1000-3428.2009.12.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the limited energy and the special requirement of transmission reliability for Wireless Sensor Network(WSN), an energy-balanced routing metric measure method, EBETX is proposed,. This method avoids the data packet transmit along the lower energy path, and selects the path which has more surplus energy. It makes the energy of the nodes in the network keep balance. Simulation results by NS2 show that this method can prolong the life time of the network and implement the effective balance of transmission reliability and energy balance.
  • SHE Feng; WANG Xiao-ling
    Computer Engineering. 2009, 35(12): 90-91. https://doi.org/10.3969/j.issn.1000-3428.2009.12.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper exploits distinctive flow characteristics of attacks when they communicate on a network, and proposes a semi-supervised classification method that can accommodate both known and unknown attacks. In training the classifier, it employs Sequential Forward Selection(SFS) to get the best feature subset. Meanwhile, it proposes weighted sampling techniques to obtain training flows. Performance evaluation using KDD CUP1999 data shows that high flow and byte classification accuracy can be achieved.
  • CHEN Wan-yong; YU Ri-tai; WAN Jian
    Computer Engineering. 2009, 35(12): 92-94. https://doi.org/10.3969/j.issn.1000-3428.2009.12.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the deficit of the existing grouping search mechanism, an improved search mechanism is proposed, which establishes a logical group reasonably based on the cosine similarity of term weight vector, integrating with considering the distance between the nodes. A task-sharing strategy is presented in the inter-group search, letting different members act as the managers of the links. Experimental result shows that the mechanism has strong expansibility, efficient search capability and higher recall rate.

  • MAO Jun-peng; CUI Yan-li; HUANG Jian-hua; ZHANG Jian-biao
    Computer Engineering. 2009, 35(12): 95-96. https://doi.org/10.3969/j.issn.1000-3428.2009.12.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Universality of Peers’ distribution, churning of Peers’ behavior, anonymity of Peers’ transmission and Internet environment change caused by P2P application make traditional network monitoring method invalidly to P2P application. By analyzing the overlay structure and characteristics of Modern Large-Scope Application of P2P network(MLSA-P2P), this paper constructs MLSA-P2P model. Based on the model, it researches searching model and its algorithm of special resource, provides monitoring architecture of P2P network, and solves the problem of monitoring special resources of network.

  • WANG Yan; WANG Kai-yu; JIN Shun-fu
    Computer Engineering. 2009, 35(12): 97-99. https://doi.org/10.3969/j.issn.1000-3428.2009.12.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the different QoS requirement of real-time affairs, considering the priority of packet, and based on the classical Distributed Coordination Function(DCF) and several modified DCFs, this paper presents a Packet priority-based Modified Distributed Coordination Function(PMDCF). It uses the method of Markov chain to analyze the performance of PMDCF and gets the formula of saturation throughput for the system. Numeral example and simulation results show that compared with existing DCFs, PMDCF can effectively improve the system performance.
  • Security Technology
  • FANG Zhuo-ran; PI De-chang; QI Fang
    Computer Engineering. 2009, 35(12): 100-102. https://doi.org/10.3969/j.issn.1000-3428.2009.12.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the fact of server’s unstabilization caused by the mass consumption of resource due to the operation by SSL Protocol during the course of shaking hands, this paper puts forward a technical solution founded on the Quality of Service(QoS) restriction of application layer. Thus, in order to meet its requirement of stable running, the server makes ajustment in answer to the customer’s respondence. Under the circumstances of the relatively insentive request, it appropriately reduces in the intensity of the secret key when the customer permits. It inreases intensity appropriately without affecting the servers performance and makes full use of the calculation resources of the servers. Experimental result show the method is safe, efficient and feasible.

  • ZHAO Yao-dong; QI Wen-feng
    Computer Engineering. 2009, 35(12): 103-105. https://doi.org/10.3969/j.issn.1000-3428.2009.12.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    RSA is widely used in public-key cryptosystem. But running this algorithm needs lots of time and memory. This paper proposes a RSA signature algorithm to fit for the devices with low computational power. The new signature algorithm is based on the Chinese Remainder Theorem which has a relative short private key. This paper gives the cryptoanalysis of this algorithm. Results show that the algorithm can resist the lattice attack.

  • SHI Zhi-cai; TAO Long-ming
    Computer Engineering. 2009, 35(12): 106-108. https://doi.org/10.3969/j.issn.1000-3428.2009.12.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is difficult to detect complicated network attacks effectively. The inherent characteristics of complicated network attacks are analyzed. A new HMM model for detecting sophisticated network attacks is proposed. The alarm event sequences from different network monitors are correlated and their inherent relationship is mined so as to detect complicated network attacks. Experimental results show that the model can recognize complicated network attacks effectively.
  • SUN Chao; DONG Yi-hong; TAI Xiao-ying
    Computer Engineering. 2009, 35(12): 109-110. https://doi.org/10.3969/j.issn.1000-3428.2009.12.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    All privacy-preserving distributed mining algorithms can not deal with collusion problem efficiently. Based on Clifton’s secure multi-party association rule mining algorithm, this paper proposes Advanced Kantarcioglu-Clifton Algorithm(ACKA) algorithm, which adopts secure multi-party sum by collaboratively constructing and solving equation sets. It is proved that the algorithm can not only deal with collusion attack perfectly, and detect malicious substitution.
  • CAO Bing-hua; ZHANG Hong-qi; DU Xue-hui; QIAN Yan-bin; ZHANG Wen-bo
    Computer Engineering. 2009, 35(12): 111-113. https://doi.org/10.3969/j.issn.1000-3428.2009.12.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analysis of several typical zero-knowledge proof authentication protocols, this paper presents an authentication protocol with key-exchange function based on self-certified public key and zero-knowledge proof, which combines Girault’s self-certified public key theory and the advantages of ECC. Analysis show that the scheme has higher security. Compared with the congeneric schemes, the proposed scheme is more efficient and has advantages in storage, communication overheads and computation cost.

  • LIU Peng-yuan; SUN Bao-lin; GUI Chao
    Computer Engineering. 2009, 35(12): 114-116. https://doi.org/10.3969/j.issn.1000-3428.2009.12.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The main functional attributes of personal firewall system are defined. The core technology for realizing is packets filtering. The Architecture of Window’s Network(AWN) is presented, and on the basis of comparison between OSI and AWN, several solutions of packet filtering are listed. The solution using SPI is selected after reviewing and its key realization points to filter packets are offered. The personal firewall system realized using SPI shows good performance for filter network packets.

  • JING Gang; WU Jun-min; XU Hong-li; HUANG Liu-sheng;
    Computer Engineering. 2009, 35(12): 117-119. https://doi.org/10.3969/j.issn.1000-3428.2009.12.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a security threat model called impersonating attack model. In this model, the malicious beacons supply forged location information to the regular sensors, so as to attack the location applications. Since sensor nodes are power and computational capacities limited, a scheme based on symmetric cryptography is proposed to defense against impersonating attack. Experimental results show that, even in the presence of impersonating attack, the scheme can decrease the cumulative localization error of Weighted Centroid Algorithm. The probability which the localization error is within 1 m can be improved from 40% to 70% with the scheme.

  • LI Guang-zheng; SHI Ding-hua
    Computer Engineering. 2009, 35(12): 120-122. https://doi.org/10.3969/j.issn.1000-3428.2009.12.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Stochastic SIS model of epidemic spreading on small-world network is studied. Using the computational method of quasi-stationary distribution, the distribution of the number of infective nodes at the steady state is obtained. Taking expectation of the distribution, the epidemic threshold is proved the same with the result of the mean-field method. Through simulating the epidemic curve of the stochastic SIS model, existing fluctuations in the real epidemic process is interpreted. The stationary epidemic results of stochastic SIS model fit well with the mean-field method, thus verifying the mean-field method is reasonable.
  • ZHANG Yi; CHEN Wen-xing
    Computer Engineering. 2009, 35(12): 123-124. https://doi.org/10.3969/j.issn.1000-3428.2009.12.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    So far, methods of whole detecting cheaters in threshold secret sharing are few. If another participant can join in the t participants, t+1 participants in total, according to the scheme proposed in this paper, the existence of cheaters can be checked out only calculating equations once, requiring no other information. This scheme is a perfect sharing scheme. Its information rate is 1. The probability of one cheater’s success is 0 and it is less than 1/p (where p is a large prime) for two or three cheaters in probability of success.
  • QIAN Yan-bin; CHEN Xing-yuan; DU Xue-hui
    Computer Engineering. 2009, 35(12): 125-127. https://doi.org/10.3969/j.issn.1000-3428.2009.12.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Due to the open nature and the frequent network topology changes, space network is vulnerable to various attacks. It can not satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. This paper analyzes thoroughly characteristic of CCSDS in particular in the data link layer Advanced Orbiting Systems(AOS) protocol, and proposes the layered secure accessmodel mechanism at the data link and network layers, expecting that it can establish integration access protection system. This paper also discusses the realization way under the CCSDS protocol system. When the trust to certain node that is authenticated changed, the mechanism proposed can automatic reaction in time, and enhance the security, the compatibility and performance of secure access.

  • MA Xiao-lei; LI Hong-chang
    Computer Engineering. 2009, 35(12): 128-130. https://doi.org/10.3969/j.issn.1000-3428.2009.12.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an image multi-watermark algorithm based on Turbo code and spread spectrum. Different information can be represented by binary images embedded in an image. Using the excellent error-correcting of Turbo code and spread spectrum communication technology, the watermark is embedded in the DCT coefficients mid-frequency, which is arranged by Pseudo-random, coded by Turbo code and spread spectrum, in accordance with the visual characteristics of the human eye. At the same time, the algorithm under several attacks is simulated. The experimental results show that the algorithm is good at invisibility and robust on implementing the watermark.

  • MA Ji; ZHOU Xiao-guang; XIN Yang; YANG Yi-xian
    Computer Engineering. 2009, 35(12): 131-133. https://doi.org/10.3969/j.issn.1000-3428.2009.12.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Due to the lack of consideration in Session Initial Protocol(SIP) security, a lot of threats to SIP are emerging and attracting enormous attention. Authentication is one important aspect of SIP security issues. The present authentication-related mechanisms are analyzed. Based on the concept of “trust domain”, a more advanced and effective authentication mechanism scheme is proposed and its implementation process is given. Further research objective in SIP authentication is discussed.
  • WANG Lin-lin; ZHU Kai-wei
    Computer Engineering. 2009, 35(12): 134-136. https://doi.org/10.3969/j.issn.1000-3428.2009.12.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For traditional intrusion detection algorithms, the lack of self-adaptive and intelligent has become increasingly prominent when they cope with unknown attacks. This paper presents a new unsupervised, adaptive detection algorithm, Clustering Quantum Genetic Algorithm(CQGA). This algorithm employs the Euclidean distance between the samples as the standard of similarity measurement. Furthermore, it can auto-classify the sample sets in the unsupervised condition through quantum genetic algorithm finding the cluster center. Experimental result indicates that the algorithm can classify the test data set accurately, and solve the problem of self-adapting and intelligent effectively.
  • Artificial Intelligence and Recognition Technology
  • GUO Xiao-song; LI Yi-peng; GUO Jun-bin
    Computer Engineering. 2009, 35(12): 137-139. https://doi.org/10.3969/j.issn.1000-3428.2009.12.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of targe tracking in Bayesian filtering process, some typical Bayesian filtering methods such as EKF, UKF, PF and UPF are proposed. On basis of the frameworks set up by these methods, the performance of these methods are tested and compared, and the characteristics of them are discussed in non-linear environment. Simulation experimental results show that, in non-linear and non-Gaussian environment, the performance of UPF is the best.
  • CHE Jian-bo; YE De-qian
    Computer Engineering. 2009, 35(12): 140-142. https://doi.org/10.3969/j.issn.1000-3428.2009.12.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an object segmentation and tracking algorithm based on prior information. It is based on the assumption that the color histogram and area of tracked object are nearly stationary from frame to frame. It finds the final contour of tracked object by minimizing the difference of color histogram and area between current frame and previous frame in dynamic programming way. Compared to gradient vector flow algorithm, the algorithm can find better contour in complicated scene, and is robust to the initial contour.

  • KONG Pan; DENG Hui-wen; HUANG Yan-yan; JIANG Huan
    Computer Engineering. 2009, 35(12): 143-144. https://doi.org/10.3969/j.issn.1000-3428.2009.12.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel validity index for fuzzy clustering. This index can determine the optimal partition and optimal number of clusters for fuzzy partitions obtained from the Fuzzy C-Means algorithm(FCM). It combines compactness and separation information of fuzzy clustering. The compactness is obtained by computing inter-cluster weighted the square of error. The separation is obtained by computing similarity between fuzzy clustering. Comparison experiment is done in three synthetical datasets and three real datasets, and the results prove that this index is superior effectiveness compared with other validity indexes.
  • ZHANG Hong
    Computer Engineering. 2009, 35(12): 145-147. https://doi.org/10.3969/j.issn.1000-3428.2009.12.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes several existing Chinese word segmentation methods, brings out a keywords extraction algorithm which according to the weight formula. The parameters are trained and optimized by the means of genetic algorithm, so a set of parameters which are suit for Chinese text are received and the precision of subtopic segmentation is improved. Experiments show that the extraction system can cut out named entity effectually, complete the task of extraction keywords accurately, and this method is current.
  • WANG Jia-yang; XIE Ying
    Computer Engineering. 2009, 35(12): 148-150. https://doi.org/10.3969/j.issn.1000-3428.2009.12.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Attribute reduction is a key point of rough set theory. In order to get minimal subsets of attributes, this paper proposes a rough set attributes reduction algorithm based on Quantum Particle Swarm Optimization(QPSO). A parameter selection method is involved into the algorithm. It not only keeps the ability in getting reduction but also deduces the number of attribution, and it can obtain the prime effect. Experimental result proves the efficiency of the algorithm.
  • YU Dong-fang; YIN Jian-ping; ZHANG Guo-min; LUO Lei
    Computer Engineering. 2009, 35(12): 151-153. https://doi.org/10.3969/j.issn.1000-3428.2009.12.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Building shadows in high-resolution and multi-spectrum remote sensing images are important. The detected building shadows are always influenced by big trees shadows. Aiming at this problem, this paper models the colors of trees in the intensity detachable Lab color space and detects the trees exactly by look-up table method in the remote sensing images. A tree shadow removal method for building shadows based on the detected tree regions and the orientation of the sun light is proposed and is proved effectively by experiment.
  • YU Wei-hong
    Computer Engineering. 2009, 35(12): 154-155. https://doi.org/10.3969/j.issn.1000-3428.2009.12.054
    Abstract ( )   Knowledge map   Save
    Multi-Agent System(MAS) is a main area of research in distributed artificial intelligence. This paper analyzes the communication of MAS and discusses the communication mechanism in search and rescue at sea intelligent decision support system based on MAS. Low-level implementation details are given. As a research highlight, it introduces the practical application of Remote Method Invocation(RMI) in search and rescue at sea intelligent decision support system based on MAS and summarizes the main advantages of RMI communication.
  • YE Ming-quan; ZHANG Yan-ping; HE Fu-gui
    Computer Engineering. 2009, 35(12): 156-158. https://doi.org/10.3969/j.issn.1000-3428.2009.12.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Due to the factor for rainfall forecast is more, and the relation between them is very complex, monthly rainfall forecast is a difficult field in climate prediction, this paper proposes a rainfall forecast model based on the fusion of multiple classifier. The Multi-side Increase by Degrees Algorithm(MIDA) is introduced to extract features, obtaining several features subsets(several sides), and then some sub-forecast models are built in the feature subspace to classify the unknown sample. The majority voting principle based on expert is adopted to combine the class results from the forecast sub-model. Experimental results show that a higher accuracy rate of rainfall forecast can be achieved.
  • XU Yue-zhu; LIU Da-xin; SUN Xiao-hua
    Computer Engineering. 2009, 35(12): 159-160. https://doi.org/10.3969/j.issn.1000-3428.2009.12.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of studying the generic architecture, this paper proposes a method for constructing CD system which is based on intelligent Agent. It analyzes function of any intelligent Agent and information processing process among all Agents of the architecture, which integrates intelligent Agent into CD process, and provides flexible practice application platform for CD.
  • XU De-zhi; LI Peng; YIN Yan
    Computer Engineering. 2009, 35(12): 161-163. https://doi.org/10.3969/j.issn.1000-3428.2009.12.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the current problems of computation concept similarity by the multi-strategies and integrating similarity, this paper improves some key strategies, and proposes making use of Analytic Hierarchy Process(AHP) to distribute weights quantificationally to similarity computation by the multi-strategies. Experimental results show that this method improves multi-strategies effectively and distinguishes the important degree of similarity computed by different strategies commendably to mapping result, improves the precision of ontology mapping.

  • GU Hai-hong; QI Ming-jun; LI Shi-yong
    Computer Engineering. 2009, 35(12): 164-165. https://doi.org/10.3969/j.issn.1000-3428.2009.12.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Focusing on the problem of sensitivity to local convergence when using QDPSO to handle complex functions of the best answer, this paper proposes hybrid QDPSO, named CODPSO, which using chaos searching to solve premature convergence. Numerical simulation results show that, compared with QDPSO, it is effective, with strong ability to avoid being trapped in local minima and robust to initial value.

  • ZHAO Xiao-chuan; LUO Qing-sheng; HAN Bao-ling; XIAO Wei
    Computer Engineering. 2009, 35(12): 166-168. https://doi.org/10.3969/j.issn.1000-3428.2009.12.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper establishes a navigation and localization system of biologically inspired hexapod robot based on the TMS320VC 5509A DSP and Superstar II GPS receiver. In order to improve the navigation system’s real-time performance, Marconi Binary serial data communication protocol is used, and a novel coordinate transform and navigation algorithm is proposed. The approach is implemented and tested under experimental environments, which demonstrates its real-time performance, effectiveness, robustness and high efficiency.

  • 孙林嘉;李 茹;屈元子
    Computer Engineering. 2009, 35(12): 169-171. https://doi.org/10.3969/j.issn.1000-3428.2009.12.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    By combining rough sets and neural networks, this paper develops a knowledge acquisition model for colliery gas forecast, which consists of four modules: sample refreshment, rough sets preprocessing, neural network training and rules extraction. It is applied in the real-time data, whose results show that it solves the problem of the knowledge acquisition difficulty of colliery gas forecast, and has good real-time characteristic, high reliability and perfect precision. The model provides foundation for establishing knowledge database of colliery gas forecast.

  • SHANG An-na
    Computer Engineering. 2009, 35(12): 172-174. https://doi.org/10.3969/j.issn.1000-3428.2009.12.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a recursive forecast method for elevator traffic flow based on outlier detection. It analyzes elevator traffic flow data using seasonal time series and gets a initial model, then starts the outlier detection module and gets corrected series. It can get the finial SARIMA model of elevator traffic flow. It transforms the finial SARIMA model to state space model, adjusts the state vector using Kalman filter, and realizes the on-line forecast. Result of simulation shows that this method is valid.
  • GE Yan; SHUI Wei; HAN Yu; WEI Zhen-gang
    Computer Engineering. 2009, 35(12): 175-177. https://doi.org/10.3969/j.issn.1000-3428.2009.12.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve operational efficiency and survival probability of Unmanned Air Vehicle(UAV), efficient route must be designed before the UAV performs a mission. This paper uses route planning method which combines the threat intensity assessment algorithm for Bayesian network model and ant colony algorithm. Ant colony algorithm is improved according to characteristic of UAV route planning. Simulation results show that this method can satisfy the needs of real-time battlefield better and get a favorable optimized route.
  • LI Wei-wei; WANG Jian-dong; FANG Li-ming; DING Jian-li
    Computer Engineering. 2009, 35(12): 178-180. https://doi.org/10.3969/j.issn.1000-3428.2009.12.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems in process of orienting edges of Bayesian networks, a novel edge-oriented approach of Bayesian networks based on tabu Genetic Algorithm(GA) is proposed, which introduces the diversification of Tabu Search(TS) into the cross arithmetic operators and the variation arithmetic operators, and is applied into orienting edges of flight departure delay skeleton. Simulation experimental results show this approach is effective and feasible.
  • MU Chao-xu; LIANG Rui-xin; LI Xun-ming
    Computer Engineering. 2009, 35(12): 181-183. https://doi.org/10.3969/j.issn.1000-3428.2009.12.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to obtain inverse system of nonlinear systems, a novel method of allied inverse controller for Least Squares Support Vector Machine(LSSVM) in nonlinear systems is proposed. The whole structures of allied inverse controller and original system are introduced. The linear decoupling control is implemented. Simulation experimental results show that the identification of the allied inverse controller by using LSSVM provides satisfactory performance with excellent accuracy, the generalization is also very strong, and has the values of application.

  • XU Jing; ZHANG Yan; WANG Hai-yang
    Computer Engineering. 2009, 35(12): 184-186. https://doi.org/10.3969/j.issn.1000-3428.2009.12.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming the lack of effective perception mechanisms in present CSCL system, system the application of learning-Agent which has awareness function model to the CSCL system is proposed. The inter architecture of the Agent is described. The decomposition of group-task and the construction algorithm of task-graph are given. The function of awareness intensity is defined, and the process of awareness information show is described. Some general problems, such as population interaction effect, disorder of awareness information are given a better solution.

  • Graph and Image Processing
  • LI Yi-jing; ZHANG Jian-qing;
    Computer Engineering. 2009, 35(12): 187-188. https://doi.org/10.3969/j.issn.1000-3428.2009.12.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For a scene which is not open, it is difficult to watch the scene behind the barrier through the single-viewpoints. But the cross-cutting in the multi-viewpoints space can make up for its shortcomings. Panoramic technology in single technology is mature. Under such circumstances, the smoothing browser between all viewpoints become the key. This paper describes a construction mind of multi-perspective of the virtual scene. It designs a smooth roaming approach in the virtual space based on multi-viewpoints. Using the image-matching and the line-extraction method, it implements a single-view panoramic and transition-image-between-viewpoints generation platform, as well as the multiple-viewpoints scene browser platform, and gets a good visual effects in the smooth transition between the viewpoints.

  • FU Zeng-liang; CHEN Xiao-jun; YE Ming; LI Feng; WANG Cheng-tao
    Computer Engineering. 2009, 35(12): 189-191. https://doi.org/10.3969/j.issn.1000-3428.2009.12.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Minimally invasive ablation using surgical navigation technology gradually becomes the main-stream method in atrial fibrillation surgery. Extracting ventricle and atria out fastly and accurately is key technology in minimally invasive ablation. According to heart CT image’s characteristics, a segmentation method, which combines traditional pixel-based method with level-set-based active contour model is proposed to do pre-segmentation. The segmentation result is directly used as the initial contour of the variational level set. The curve smoothly matches the edge of object after several iterations.

  • WANG Chun-hua; YANG Ke-jian
    Computer Engineering. 2009, 35(12): 192-193. https://doi.org/10.3969/j.issn.1000-3428.2009.12.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Many studies have been made on techniques in which the shapes of trees are modeled but only a few studies have been reported on methods to incorporate the shapes with motions in a wind field. After investigating the principle of trees’ swing in wind, this paper proposes an approach combining a stochastic method and a simulation method. After modeling the 3D trees with L-system, it analyzes the detailed process of trees’ swing with the present method. Experiment result shows that the method is vivid and can be applied in virtual reality to simulate trees’ swing in wind.

  • WANG Xiao-jun; WU Jian; XIA Jie; CUI Zhi-ming
    Computer Engineering. 2009, 35(12): 194-197. https://doi.org/10.3969/j.issn.1000-3428.2009.12.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to meet the requirement of three-dimensional fractal graphics description, this paper proposes a new three-dimensional fractal graphics description language system called E-L system on the basis of the traditional L-system. In E-L system, the traditional symbols of L-system are expanded to support three-dimensional fractal graphics description. The intrinsic randomness is added to the symbol for more reality fractal graphics. The type and form of symbol is limited for providing a more convenient way to express vary acts. A three-dimensional fractal graphics morphology control way is designed to overcome the shortcoming of the traditional final fractal graphics which is always beyond control. Experimental result shows that the E-L system has a very good description capability for self-similar three-dimensional fractal graphics.
  • SHEN Zheng-yan; SANG En-fang; LI Yuan-shou
    Computer Engineering. 2009, 35(12): 198-200. https://doi.org/10.3969/j.issn.1000-3428.2009.12.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Rectangular or fan-shaped images in 2D are usually used to display 3D visualization of chirp sonar data with multiple beams, so this paper proposes a method of data visualization in 3D based on OpenGL. It processes the received data with wavelet decomposition, maps the data as texture in a 3D coordinate system according to time frame, and eliminates the shelter by setting transparence, which makes the data including different time information blend in one 3D scene to improve the space feeling of imaging.

  • TANG Hong-zhong; XIAO Ye-wei; HUANG Hui-xian; ZHANG Jia-jia
    Computer Engineering. 2009, 35(12): 201-203. https://doi.org/10.3969/j.issn.1000-3428.2009.12.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new approach to vector ordering based on Principal Component Analysis(PCA) in HSV color model. Color image is represented by a vector field and each pixel is imposed on color vector, color vectors are ordered according to the projection scores obtain by projecting each color vector on the principal axis. Based on the vector ordering scheme, supremum and infimum are defined, and the color morphological operators are extracted. By applying the vector order statistics to color image segmentation, result holds favorable consistency in terms of human perception. Furthermore, the experiment demonstrates the algorithm is vector preserving, compared with standard color morphological operators, has better segmented properties and robust.
  • Engineer Application Technology and Realization
  • ZHU Wei-hua; YANG Wei-kang; YANG Meng-hui
    Computer Engineering. 2009, 35(12): 204-207. https://doi.org/10.3969/j.issn.1000-3428.2009.12.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    An intelligent transport system based on Digital Terrestrial Multimedia Broadcast(DTMB) is proposed, and its server system is implemented. Real-time traffic information of all styles is standardized, and encoded according to Transport Protocol Experts Group(TPEG) protocols. Information encoded is transferred into TS stream that can be transmitted through DTMB, the information is received by terminals with capability of receiving digital television after being sent through DTMB send system, terminal completes dynamic navigation using the information matched with static map. The prototype system validates the feasibility of the architecture.

  • LIU Lian-hao; DU Zhao-dong
    Computer Engineering. 2009, 35(12): 208-210. https://doi.org/10.3969/j.issn.1000-3428.2009.12.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By analyzing the research and application situation of pollutant water quality on-line auto-monitoring systems of our country at present, the paper gets their faults. According to the actual situation of water quality monitoring in our country, it presents a new pollutant water quality on-line auto-monitoring system which can meet the demands of hard work environment, stability and reliability and can do reliably remote monitoring on pollutant water quality via internet, and introduces its structures, functions and advantages. The system has been used in the pollutant water quality on-line auto-monitoring project in Zhongshan city, and achieves good result.
  • GAO Bing; YANG Ming-li; SHEN Yi; XIE Fei
    Computer Engineering. 2009, 35(12): 211-213. https://doi.org/10.3969/j.issn.1000-3428.2009.12.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An embedded control system of constant pressure and speed duplex pump based on ARM9 is introduced. The system takes the embedded processor S3C2410 as the core, meanwhile adopting the expanding hardware equipments as AD, DA converter and LCD, Windows CE as operating system, using PB and EVC++4.0 to develop application software. It has many advantages such as low-cost, friendly interface and so on. It can realize to control the duplex pump accurately and steadily.

  • YANG Rong-gen; REN Ming-wu; YE You-pei
    Computer Engineering. 2009, 35(12): 214-215. https://doi.org/10.3969/j.issn.1000-3428.2009.12.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem that signal has low SNR in actual test environment and the noise impacts the accuracy of Time Delay Estimation(TDE), this paper provides a generalized correlation method and gives an algorithm using FFT to compute it. It is used in leakage detection of oil conveying pipeline. Experimental results illustrate that it can compute time delay of leakage signal arrive the pipeline two ends and the error is less than 2%. It promotes performance of correlation computing and detection precision.

  • Developmental Research
  • CHEN Xin-zhong; GU Wen; LI Cheng-yan; ZHANG Jie
    Computer Engineering. 2009, 35(12): 216-219. https://doi.org/10.3969/j.issn.1000-3428.2009.12.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As a typical open complexity system-of-systems, the openness and complexity of C4ISR determines that it must be developed by the direction of system engineering theory and method. System architecture modeling is one of the most important ways in top-level design, which can reduce the risk, shorten developing period and ensure to satisfy the military’s requirements. Aiming at the system architecture modeling and validation, adopting the top-level design method based on DoDAF, this paper puts forward the specific process and takes the strategic location air-defense command and control system for an example, demonstrates the process of modeling and validation. The result proves that this method is practicable.

  • DENG Qing-yong; DUAN Bin; YAN Na
    Computer Engineering. 2009, 35(12): 220-222. https://doi.org/10.3969/j.issn.1000-3428.2009.12.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to international communication standard IEC61400-25, this paper proposes a scheme of designing embedded communication service module in wind turbine components to address the issue that existing wind farm components restricted with the resources of hardware and software can not achieve seamless communication with the next generation of wind turbines. MMS technology and Web services are adopted based on ARM + Linux + J2ME platform to provide unified communication methods and interfaces. Results prove that the method can effectively solve the issues of compatible difficulty in monitoring systems, unified operation and maintenance difficultly in wind farm.
  • WU Yan-hong; CHEN Xiang-ning
    Computer Engineering. 2009, 35(12): 223-225. https://doi.org/10.3969/j.issn.1000-3428.2009.12.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In view of the requirement of Quality of Service(QoS) realization mechanism and strict dynamic priority arrangement, this paper introduces a kind of heap sort algorithm for FPGA realization easily in the exchange system design. The algorithm which unifies the modulation and the condition machine is used to produce the module design mentality, the emulator executes by using XilinxISE8.2i+ModerSim6.2, and the procedure downloads the experiment developping board to validate the system. The result indicates that the design has a high utilization rate of resources and a quick speed of operating. It is suitable for the realization of outstanding QoS mechanism in hardware.
  • WANG Wen-jing; LI Ru; SONG Xiao-xiang
    Computer Engineering. 2009, 35(12): 226-228. https://doi.org/10.3969/j.issn.1000-3428.2009.12.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the lack of semantic analysis to the question in consultation system at present, this paper proposes to carry on the semantic analysis to the related transportation question in Chinese FrameNet(CFN) database foundation, and carries on the extraction and answer processing using the traveling ontology. A new method of question classification is given. The ontology is classified combining with the traditional classification. This classified method is also integrated with CFN, which enhances the question recognition efficiency.

  • WU Xing; MAO Jian-lin; CHI Yi-lin
    Computer Engineering. 2009, 35(12): 229-232. https://doi.org/10.3969/j.issn.1000-3428.2009.12.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    No matter what software technology used to implement condition monitoring and fault diagnosis systems, all of them should comply with the same conceptual model of high-level abstraction. This paper proposes a conceptual model using Unified Modeling Language(UML), which is supported by a project Web-based Remote Monitoring and Fault Diagnosis System(WRMFDS). Key objects models are proposed based on object oriented analysis and design patterns. A prototype system of WRMFDS is designed and implemented based on the above conceptual model. It is proved to be correct and effective.
  • SHI Xiao-li; ZHANG Fa-cun
    Computer Engineering. 2009, 35(12): 233-234. https://doi.org/10.3969/j.issn.1000-3428.2009.12.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the analysis and research of domestic and international typical architecture of data parallelism computer, closely consulting the architecture of LS-MPP computer in our country, this paper proposes a kind of abstract model of SIMD computer based on two-dimensional array structure. Through an analysis of time sequence of each logic part implements interpretive instruction SIMD simulator, it gives consideration to simulating efficiency while carrying on one grade of modeling of detailed grain size clock. The simulator test results indicate that the simulator has certain application value.
  • DING Yue-hua; WANG Song-zhen; XU Hao
    Computer Engineering. 2009, 35(12): 235-238. https://doi.org/10.3969/j.issn.1000-3428.2009.12.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem how to develop a mobile game in a short time, this paper brings forward a project about code generation. The theory of MDA and code generation technology are introduced. The processing phrases of the code generation based on Model Driven Architecture(MDA) and the structure of the code generation are discussed. And a cell phone game is generated by code generation through maintaining the GDF file.

  • GAO Jun-jie; DENG Gui-shi; ZHANG Guang-qian
    Computer Engineering. 2009, 35(12): 239-241. https://doi.org/10.3969/j.issn.1000-3428.2009.12.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of analyzing the status and shortage of existing methods about ontology learning from relational databases and considering the fact that structural case bases imply more semantic information and include vast domain knowledge, an automatic mapping algorithm from structural case bases to OWL ontology with low time-complexity is proposed and specified in this paper. Semantic information implied in case bases can be discovered and knowledge items about cases and rules stored in case bases can be mapped to individuals of OWL ontology directly to achieve domain knowledge reuse by the greatest extent. Validation of the algorithm is proved by an experiment.
  • WANG Meng-meng; BAO Ke-jin
    Computer Engineering. 2009, 35(12): 242-244. https://doi.org/10.3969/j.issn.1000-3428.2009.12.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the shortage of existing segment argorithm, this paper propses a segment cache strategy based on user random behavior. It considers the differences influidities of different stream media objects and different segments in an object. The space schedule is according as the fluidity of segments, it combines with the prefix cache, guarantees the cache efficiency, improves the hit ratio and delay start ratio. The experiment indicates the hit ratio each raises 8% and 18% compared with focus cache and adaptive segment cache.

  • (Institute of Automation; Zhejiang Sci-Tech University; Hangzhou 008)
    Computer Engineering. 2009, 35(12): 245-247. https://doi.org/10.3969/j.issn.1000-3428.2009.12.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a general design method on serial interface device driver, which is based on the analysis of Modbus protocol and QNX Operating System(QNX OS) device driver architecture. It specifies serial port communication in C program under QNX OS, and tests its communication with SIEMENS S7-200 PLC. The test result proves that the method is real-time, stable and reliable.

  • HE Biao; ZHOU Kai-ban
    Computer Engineering. 2009, 35(12): 248-249. https://doi.org/10.3969/j.issn.1000-3428.2009.12.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a long-rang real-time ECG monitoring system based on smart mobilephone. The smart mobilephone receives the ECG data from ECG monitor through bluetooth network, filters the exception data automatically, and sends it to remote kernel server through GPRS network. Doctors analyze the exception data and feedback the result to patients. This system can make doctors relieve their workload while patients have the real-time monitoring service.

  • ZHONG Cheng; YUE Li-hua; WEI Peng
    Computer Engineering. 2009, 35(12): 250-253. https://doi.org/10.3969/j.issn.1000-3428.2009.12.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper researches the wear-leveling among chips when multi-bank writing on multi-bank flash storage architecture, propose an identification of hot data based on frequency of data access to solve the balanced distribution of frequently accessed data among multi-chips. Experimental results show that the identification methed of hot data based on frequency of data access is not only accurate for identifying hot data, but also appropriate for the hot data distribution among multi-chips.
  • LIU Huan; LUO Da-yong
    Computer Engineering. 2009, 35(12): 254-255. https://doi.org/10.3969/j.issn.1000-3428.2009.12.088
    Abstract ( )   Knowledge map   Save
    When conducting a pollutional simulation experiment in a virtual scene, it should compromise the demands of fidelity and property of real-time. This paper presents an approach for the simulation of polluted airflow emission based on particle system. User can see the polluted airflow change in different kinds of environment by adjusting parameters in the dynamics equation of particles. It imposes gradually changing of special particle size and diaphaneity in density field, achieves realistic effect of smog, reaches the intent of reducing particle number. Experimental results show that the method can achieve real-time of protracting speed in common PC platform.
  • LIU Qing-min; TIAN Lan; HE Guo-yuan; YU Yuan-ming
    Computer Engineering. 2009, 35(12): 256-258. https://doi.org/10.3969/j.issn.1000-3428.2009.12.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at intelligent requirement of GPRS Data Terminal Unit(DTU), this paper proposes a design scheme for embedded hybrid file system Cramfs+JFFS2+Initramfs. It adopts combination of top-down analysis and bottom-up analysis, takes dropbear as the example to introduce component choosing method and implementation process. In the design of system integration, it gives a design tactics to adopt soft link technology instead of copying, and illustrates the script design. It has become a key module of intelligent GPRS DTU and it runs steadly.

  • WAN Shu-ping
    Computer Engineering. 2009, 35(12): 259-260. https://doi.org/10.3969/j.issn.1000-3428.2009.12.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper uses Vague set to represent the fuzzy measurement information of sensors, and proposes a new fusion method for multi-sensor data based on Vague set. The method describes accurately the fusion model based on Vague set, and defines the distance between two Vague sets. By appliying Technique for Order Preference by Similarity to Ideal Solution(TOPSIS) method, the fusion algorithm is given by virtue of the relative closeness degree. It considers sufficiently the uncertain information of membership and non-membership degrees for measurement information. Simulation example proves that the method is effective.

  • ZHAO Huan; XIONG Min; HOU Wei-guo
    Computer Engineering. 2009, 35(12): 261-263. https://doi.org/10.3969/j.issn.1000-3428.2009.12.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the decline of performance of noise estimation and speech enhancement in unstable circumstance, this paper presents a quickly self-adaptive noise spectrum estimation algorithm in Bark domain. The new algorithm based on the perceptual model transforms the noisy signal from frequency domain to Bark domain, and executes speech enhancement based on masking properties in Bark domain. Simulation experiment shows the algorithm can make full use of the correlation among frequency bins in the same Bark band, track the change of noise quickly and improve the performance of speech enhancement, and reduce the computation and complexity.

  • TIAN Yuan; REN Guo-qiang; WU Qin-zhang
    Computer Engineering. 2009, 35(12): 264-265. https://doi.org/10.3969/j.issn.1000-3428.2009.12.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the problem of real-time data storage for high frame frequency and big area CCD, the architecture of Linux block device driver is introduced and a high-speed data storage technique based on embedded Linux is suggested. A device driver module based on SCSI technique is included, which implements direct data storage from a PCI acquisition card to SCSI disks. The analysis focuses on some factors that influence the data storage speed most. This technique has been tested on the system and can make speed up to 190 MB/s.
  • WU Yong-ming; LUO Hai-ju
    Computer Engineering. 2009, 35(12): 266-268. https://doi.org/10.3969/j.issn.1000-3428.2009.12.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the μC/OS-Ⅱsystem, the task scheduling mechanism is to execute tasks just according to the tasks’ priority, and the task supervision mechanism may happen unexpected dead-lock accidents because of abnormities of interface to outside environment. In order to solve these problems, some improvement methods are proposed. A new task having the lowest priority is added to the system to take charge of task scheduling agilely, and a variable of time limitation is added to the task data structure to control the task running time for avoiding system breakdown when the task dead-lock happens. The improved system is applied to a massage-chair control system successfully. It illustrates the proposed methods are feasible.
  • KANG Xun ; XIAO Ming
    Computer Engineering. 2009, 35(12): 269-271. https://doi.org/10.3969/j.issn.1000-3428.2009.12.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses the underdetermined blind separation problem when the sensors is less than sources. Matrix Recovery in Single Source Intervals(MRISSI) algorithm in the frequency domain is proposed. It is an extension of Searching-and-Averaging Method in Time Domain (SAMTD). Compared with the traditional clustering algorithms, its computational complexity is low and it has the precisely estimated matrix. In theory, it can estimate the mixing matrix without any error. In the sources recovery, a simplified method to resolve the L1-norm is obtained in term of the sparse principle assumes the only m sources is large or nonzero and the remained sources is smaller or zeros. Several sound sources experiments demonstrate its performance and practicality.
  • LIU Zhi-gui; LIU Liang; WANG Xue-jing; YE Fan; REN Jun-yan
    Computer Engineering. 2009, 35(12): 272-274. https://doi.org/10.3969/j.issn.1000-3428.2009.12.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new method to design the parity matrix of QC Low Density Parity Check Code(QC-LDPC) with the constraints of hardware implementation. The exchanges in rows and columns are adopted to improve the performance. Matrixes with length of 1 200 designed by this method are used to be implemented with RTL code and synthesized with SMIC 0.13 μm standard CMOS technology. It can achieve throughput of 660 Mb/s and area of 3.1 mm2. It is proved that matrixes designed by this method can realize low complexity LDPC decoder circuit.
  • SHAO Yi-chuan; SHEN De-rong; ZHAO Hong-wei; NIE Tie-zheng
    Computer Engineering. 2009, 35(12): 275-278. https://doi.org/10.3969/j.issn.1000-3428.2009.12.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the problems of lacking intelligence and server overload in the traditional Ajax engine, a new Ajax engine based on the browser caching mechanism named Smart Client Flow Engine(SCFE) is proposed. It separates business logic layer from data access layer and transfers business logic layer and the relevant data to the client catch to implement. Theory and practice prove that SCFE can reduce the frequency of accessing server effectively, solve the server overload problem, and make the Web applications more intelligent.
  • WANG Mei-juan; WU Ning
    Computer Engineering. 2009, 35(12): 279-282. https://doi.org/10.3969/j.issn.1000-3428.2009.12.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the shortages of existing test vestor, this paper proposes a method on automatic test vectors generation that can be thrown to scan chains. The method acquires the interconnection, boundary-scan and scan chains information of the devices by analyzing web-list and boundary-scan description language files. The board-level test vectors are generated automatically with the testing algorithms. The test vectors are extended to chain-level vectors by using the number of scan chains and their interconnection. Experimental result shows that the method detects stack-at 0, stack-at 1 and open-short faults in the circuits with multiple scan chains and provides practical and efficient test vectors for test systems.

  • JI Xiao-peng; ZHANG Qi-feng; GE Long; WANG Zhi-quan
    Computer Engineering. 2009, 35(12): 283-封三. https://doi.org/10.3969/j.issn.1000-3428.2009.12.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Crosstalk often happens under the excitement of high-speed signals in interconnect systems. This paper deduces a system model of high-speed interconnect lines with distributed parameters in time domain, sets the transfer function from the exciting voltage to the voltage of the end of the aggressive line and both ends of the victim line correspondingly, and studies the problem of crosstalk noises from the systematic aspect. Simulation results demonstrate the validity and the universality of the method compared with the numerical method.