Author Login Editor-in-Chief Peer Review Editor Work Office Work

05 January 2009, Volume 35 Issue 1
    

  • Select all
    |
    Degree Paper
  • XU Hao; YAN Bao-ping
    Computer Engineering. 2009, 35(1): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2009.01.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a peer-to-peer framework, which adopts Skip graph named CredentialIndex as the overlay network for credential storage and credential chain discovery. To guarantee discovery efficiency, CredentialIndex schemes policy language and extracts its semantic attributes as indexing keys in Skip graph. The P2P overlay network is constructed to aggregate prefix similar keys to support range query and keep load balance on peer nodes. Evaluation shows that the CredentialIndex system performs considerable credential chain discovery efficiency and reasonable load balance.
  • HAO Li-ming; LU Song-nian; YANG Shu-tang; TANG Jun-hua
    Computer Engineering. 2009, 35(1): 4-6. https://doi.org/10.3969/j.issn.1000-3428.2009.01.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The property of routing distance among each hop is mined in Chord routing protocol. An improved routing algorithm, DM-Chord, is proposed based on Chord without modifying each peer’s Finger table. Simulation results show that, compared with Chord protocol, DM-Chord can keep an average routing hops length similar to Chord while makes the load caused by forwarding messages to distribute more evenly and increases the routing success rate when the routing source node and routing destination node are fixed and Chord is stable.
  • SHU Zhao-gang; LI Di; HU Yue-ming; XIAO Su-hua
    Computer Engineering. 2009, 35(1): 7-9. https://doi.org/10.3969/j.issn.1000-3428.2009.01.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To improve the development efficiency of CNC system, this paper proposes a development method of code automatic generation based on domain modeling. Based on the meta-model of CNC domain, a modeling environment for CNC system is created, and based on the mapping rules from model data to source code, model interpreter for target platform are developed. According to different system requirements, system function can be reconfigured at model-level, and source code or configuration file is generated automatically by model interpreter. The method is applied on the development of tow-axis and three-axis motion control systems, and result shows that it can shorten the development cycle and improve the development efficiency for CNC system.
  • ZHAO Qi-yang; YIN Bao-lin
    Computer Engineering. 2009, 35(1): 10-12,2. https://doi.org/10.3969/j.issn.1000-3428.2009.01.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The fractal detection boundary is an important countermeasure to the Oracle attack. The paper investigates the effect of the attacking distance between the distorted signals from which the Oracle attack starts and the detection boundaries on the accuracy of watermark estimations. Analysis and experiments show that it is more accurate to estimate the watermarks with high detection values. The Oracle attacks directly launched from the object signals can eliminate the negative effect of fractal boundaries and remove the watermarks successfully.
  • LI Xiao-chao; JIAO Li-cheng; HONG Xin-hua; LU Xiao
    Computer Engineering. 2009, 35(1): 13-16,2. https://doi.org/10.3969/j.issn.1000-3428.2009.01.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For multimedia embedded system, source code optimization methodology is the key to get high profile media performance. With more embedded CPU adopting RISC plus SIMD architecture, this paper puts forward a code optimization flow to implicitly and explicitly explore this processor architecture. This method is used to optimize and tune the implementation of a MP3 audio decoder on the XScale portable embedded system. It shows that using this methodology can quickly and easily redesign the software to increase 60% performance over the original software in short time.
  • XIE Tian-bao; WU Chi-hong
    Computer Engineering. 2009, 35(1): 17-20. https://doi.org/10.3969/j.issn.1000-3428.2009.01.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Agile Supply Chain Management System(ASCMS) is designed to meet the running process of dynamic alliance, with the characteristics of distribution, reconfiguration, and supporting heterogeneous etc. By analyzing the characteristics of dynamics and heterogeneous of agile supply chain, this paper puts forward an agile supply chain management system model based on win-win cooperate mechanism. Further, the research of win-win negotiation model is stressed under the condition of incomplete information (viz. Weight value information is private) and its realizing algorithms. Experimental result proves the symmetry, fairness of this model and negotiation result is close to Pareto optimal.
  • JIANG Hong-chao; YIN Yi-xin; BAN Xiao-juan
    Computer Engineering. 2009, 35(1): 21-23,2. https://doi.org/10.3969/j.issn.1000-3428.2009.01.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To simplify and standardize the development of Web application system as well as to improve the portability and security of the system, based on the principle and characteristics of Web application system with Struts framework structure, this paper introduces SOA, which is service-oriented development model. It creates a new framework for the development of model by combining the SOA idea with Struts framework. By the demonstration of the case of information management system, the transition process of Struts framework based on SOA is introduced. SOA based framework for the new model Struts framework with great application prospect can achieve direct interoperability of platform, effectively enhances the portability of Web application and security.
  • LIU Jia; HAN Wen-bao
    Computer Engineering. 2009, 35(1): 24-26. https://doi.org/10.3969/j.issn.1000-3428.2009.01.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A publicly verifiable multi-secret sharing scheme is proposed, using non-interactive zero-knowledge proof protocol and Shamir’s sharing system. The security of the scheme is based on the intractability of integer factorization problem and discrete logarithm problem. The validity of the sharing distributed by the dealer can be verified by anyone. Recovering the secret, participants only need to provide a shadow of the sharing. It is difficult to get the sharing from the shadow. So the sharing can be reused to share the multi-secret. Moreover, the validity of the shadow can also be verified by anyone. So the scheme is secure, efficient, and can prevent both dealer and participant from cheating.
  • SUN Cheng-li; LIU Gang; GUO Jun
    Computer Engineering. 2009, 35(1): 27-29. https://doi.org/10.3969/j.issn.1000-3428.2009.01.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Speech rate and insert/delete error are the main sources of recognition error occurrence. A speech verification method based on subword LikeLihood Ratio(LLR) and subword duration features fusion is presented to decrease above errors. Minimum Classification Error(MCE) criterion based estimation algorithm is proposed to estimate subword feature fusional parameters. Compared with the LLR method, experiment on telephone switch system shows that the subword duration feature can explicitly enhance the system performance with the relative Equal Error Rate(EER) reduction by 3.35% in name keyword verification and 4.05% in digital string keyword verification.□
  • MENG Xiao-xuan; LI Yi-ming; BU Qing-zhong; JI Hai-tao; XU Lu
    Computer Engineering. 2009, 35(1): 30-32. https://doi.org/10.3969/j.issn.1000-3428.2009.01.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel buffer management model for network storage device(Service-oriented Buffer Management model, SBM). It supports not only configurable buffer management policy but also configurable policy-based buffer allocation mechanism. Compared with buffer management module in general-purpose OS, SBM enables I/O performance optimization targeted for specific storage application, and facilitates realizing storage QoS across multiple storage applications.
  • LIU An-an; LI Jin-tao; ZHANG Yong-dong; TANG Sheng; YANG Zhao-xuan; WU Jia-peng
    Computer Engineering. 2009, 35(1): 33-35. https://doi.org/10.3969/j.issn.1000-3428.2009.01.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an innovative hierarchically browsing and annotating system for news video. With the anchorperson detection algorithm based on Spatio-Temporal Slice(STS) analysis and the shot boundary detection method based on color histogram, structuralization on video is implemented. With Automatic Speech Recognition(ASR) technique and semantic concepts models, the anchorperson scenes with text information are respectively annotated and the news story scenes with visual semantic concepts are labeled. Therefore, the system can realize the interest-oriented browse for viewers and facilitate video edit for editors by providing effective indexing and browsing method for news video.
  • WANG Zheng; ZHAO Ming; SI Xue-ming; HAN Wen-bao
    Computer Engineering. 2009, 35(1): 36-39,4. https://doi.org/10.3969/j.issn.1000-3428.2009.01.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Large scale environment, unreasonable certificate revocation management will bring enormous operations and burden of network transmission. This paper analyzes some kinds of CRL mechanisms, puts forward a maintenance scheme of certificate revocation list named PSHT-CRL, which inherits the character of segment-CRL, redirect-CRL and over issue-CRL. PSHT-CRL uses Hash table, partial signature, and link method to ensure the scheme’s security, to reduce the cost of user request response and certificate updating. PSHT-CRL solves the problems of other revocation schemes. The security and capability of this scheme are analyzed and PSHT-CRL compared with other CRL scheme.
  • Software Technology and Database
  • SHUAI Fei; WANG Jin-dong; WANG Kun; ZHANG Hen-wei
    Computer Engineering. 2009, 35(1): 40-42. https://doi.org/10.3969/j.issn.1000-3428.2009.01.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a kind of security defendable software policy component, aiming at the problems in the customization and administration. The conflict between the policy lack and redundancy in the policy selection is solved by the algorithm based on the users’ max satisfaction, while the consistency conflict in the policy customization is settled by the detecting algorithm of the associated component searching. It is proved that this policy component can solve the problems both in the customization and administration effectively.
  • ZHANG Yu-lian; LI Yan-wei; WANG Quan; YUAN Fu-yong
    Computer Engineering. 2009, 35(1): 43-45,4. https://doi.org/10.3969/j.issn.1000-3428.2009.01.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In recent years, with the search engine technology and the network data mining technology development, how to find the useful information from the search engine query log becomes an important research direction. This paper discusses the excellences and the disadvantages of the clustering algorithm proposed by Beeferman and the improved algorithm which is proposed by Chan. A new improved algorithm based on the user profile of the Webpage is proposed that can weaken the influence of the noises data. And the simulation experiment proves that the new algorithm is better than the Beeferman algorithm and the Chan algorithm.
  • ZHANG Fan; DOU Yong; WU Gui-ming
    Computer Engineering. 2009, 35(1): 46-48. https://doi.org/10.3969/j.issn.1000-3428.2009.01.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Data transfer between internal memory and external memory are bottlenecks in improving DSP performance. A memory optimization method is presented for sliding window algorithm in image processing. There are three steps in the method: prefetching data to local memory, reducing redundancy read and paralleling data transfer and data processing. It uses the method on TMS320DM642 DSP. Experimental result shows that the performance of program can get 30~70 speedup.
  • DONG Hui; FANG Jin-yun; ZHAO Hong-chao; CHENG Zhen-lin
    Computer Engineering. 2009, 35(1): 49-51,5. https://doi.org/10.3969/j.issn.1000-3428.2009.01.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the principle and requirement of integration & sharing in the national Science and Technology (S&T) infrastructure platform, this paper presents the software sharing system based on Citrix, which can technically support large device sharing, as well as the principle, design and implementation details of this system. This solution is helpful to improve the utility of software and reduce the related fees.
  • SUN Dong-pu; HAO Zhong-xiao;
    Computer Engineering. 2009, 35(1): 52-54. https://doi.org/10.3969/j.issn.1000-3428.2009.01.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Continuous nearest neighbor query is one of the key problems in spatio-temporal databases. A method for direct query of continuous nearest neighbors is proposed for historical trajectories of moving objects, and the related definition and theorems are introduced. By analyzing the characteristics such as the intersections of trajectories and the monotonicity of trajectory segments, and using the results of previous computation at the same time, the continuous nearest neighbor query processing is developed. Experimental results and analysis show that the algorithm has better performance.
  • XU Yong; WANG Zhi-xue; LI Zong-yong
    Computer Engineering. 2009, 35(1): 55-57,6. https://doi.org/10.3969/j.issn.1000-3428.2009.01.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper focuses on the concepts’ consistency in the domain ontology. It presents the formal definition of the domain ontology, describes the set of axioms in the domain ontology, analyzes nowaday consistency check method about concepts, and converts OWL ontology into UML description, and develops the UML description. It provides a consistency check method based on graph, which is laconic and easy to handle, and conquers the disadvantage of high formalization and complexity of the old check mechanism.
  • LIU Ling; SANG Nan; SU Rui; HUANG Xiao-hong
    Computer Engineering. 2009, 35(1): 58-60,6. https://doi.org/10.3969/j.issn.1000-3428.2009.01.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Version control is an important way to improve the maintainability of software. However, present version control mechanisms in common use lack the supporting of requirements tracing. This article presents a new version control mechanism, which can effectively trace the connection among function requirements, function design and codes and ensure that developers can get the necessary tracing information with precision. As a result, it is beneficial to the consistence maintenance of software products. Based on this mechanism, a new version control tool VCFQ which fully supports the tracing of requirements is designed and some critical technologies involved in the completion of this tool are discussed.
  • LIN Wei-wei; QI De-yu; DONG Min
    Computer Engineering. 2009, 35(1): 61-64. https://doi.org/10.3969/j.issn.1000-3428.2009.01.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    After analyzing problems in current grid theories and technologies, this paper presents a new grid architecture called FuseGrid based on the tree-shaped fusion of resources. FuseGrid supports high-performance computing, subject-oriented resource sharing and fusion, and self-similar constructing model for grid application. It can make use of existing substantial grid resources in network environments and quickly develop new grid applications adapting to the variable requirements of users. After introducing the basic idea of resource fusion and an overview of FuseGrid, the implementation framework of FuseGrid is presented. The key classes and interfaces for FuseGrid are given.
  • LUO Xiao; HOU Hong
    Computer Engineering. 2009, 35(1): 65-67,7. https://doi.org/10.3969/j.issn.1000-3428.2009.01.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on analyzing the main characteristics and limited aspects of many software test management tools in existence, regarding the requirement of many domestic software companies, aiming at some shortcomings of the software defect management process, this paper proposes an improvement scheme to the software defect management tool. It also gives the improved software defect analysis and measurement methods, analyzes the efficiency of developer and tester and the process on the base of the data collected from the project, and provides useful information for the decision-maker.
  • MA Min; LIU Lin-lan; FU Zheng; CHEN Xuan
    Computer Engineering. 2009, 35(1): 68-70. https://doi.org/10.3969/j.issn.1000-3428.2009.01.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Supporting multiple instances of one activity can make workflow management flexible on handling process, but it causes some problems, such as synchronization schedule and data sharing confliction. This paper proposes a scheme of “group-categorization”, which is based on flexible defining workflow activity. And its algorithm is presented. This scheme can not only offer a solution to synchronization schedule of multiple instances of one activity, but also be based on standard workflow model of Workflow Management Coalition(WfMC).
  • KE Xian-da; WANG Ying-lin
    Computer Engineering. 2009, 35(1): 71-73. https://doi.org/10.3969/j.issn.1000-3428.2009.01.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    How to build knowledge management system is becoming a hotpoint of current research. The reconfiguration and evolution ability to adapt the change of environment are the hard points of research. To get the reconfiguration, the KM system based on the domain ontology can be built. However, as the time goes by, the structure and the content of the domain knowledge change. Hence the ontology evolution, knowledge evolution and the consistent model become the key problems that must be resolved. The key issues of ontology evolution and version management are analyzed. The strategy and the algorithm are introduced. Then a framework for ontology evolution is propsed and this framework is adopted into the knowledge management system.The application of this framework and the directions of future research are introduced.
  • ZHAO Zhi-chao; ZHAO Zheng
    Computer Engineering. 2009, 35(1): 74-75,7. https://doi.org/10.3969/j.issn.1000-3428.2009.01.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To address the problem of frequently broken mapping paths caused by peer dynamically departing and returning the network due to their autonomous nature in PDMS, an absent peer bypassing method is proposed based on schema mapping backup mechanism, which provides tree-structure organized mapping information to the downstream peers. When a peer departs in the mapping path, queries of its downstream peers rely on the mapping information and the backup upstream mappings to bypass the absent peer. Simulation and analysis result shows that the in mapping backup mechanism increases the query achievability, so that results can be returned from more local databases.
  • XU De-zhi; CHEN Ai-ming
    Computer Engineering. 2009, 35(1): 76-78. https://doi.org/10.3969/j.issn.1000-3428.2009.01.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve the accuracy of ontology mapping, multiple different mapping conditions are needed to consider. For example 1:1, 1:n, n:m. As for existed mapping methods, the simple one to one mapping is focused on, while the problem of the complex mapping which also takes important seats has been neglected. Aiming at solving the loss of mapping precision, this article proposes a new complex mapping method based on multiple relationships. Experimental results show good efficiency of the method.
  • ZHANG Wei; LIU Feng
    Computer Engineering. 2009, 35(1): 79-81. https://doi.org/10.3969/j.issn.1000-3428.2009.01.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes Price Coloured Petri Net(PCPN), which is a kind of Coloured Petri Net(CPN) extended with price information to meet the demand of costs and budget analysis in the business process modeling. The transition step rule of PCPN is defined, and the minimum costs generation algorithm is introduced. A business process case is demonstrated how to apply the model. The conclusion is that PCPN does well in solving the costs and budget analysis problem in the business process modeling.
  • ZHANG Zi-peng; LIU Hai-tao; GUAN Hai-bing
    Computer Engineering. 2009, 35(1): 82-83,8. https://doi.org/10.3969/j.issn.1000-3428.2009.01.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    None of the classic distributed file systems can help users to identify which files are trustable. To solve this problem, this paper presents a distributed file system named TrustFs, which uses digital signature for file owner’s authentication and trust management techquines for users’ trust metric evaluation. Aided by TrustFs, users can easily distinguish unsafe files from others. TrustFs is implemented as a stackable file system, so it can be ported to any Unix system and it is very extensible.
  • ZHANG Zhong-ping; LI Yan; YANG Jing
    Computer Engineering. 2009, 35(1): 84-86. https://doi.org/10.3969/j.issn.1000-3428.2009.01.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    How to mine the frequent itemsets efficiently is a main problem in association rule mining. According to the theory of congregation and matrix, a frequent itemsets mining algorithm based on matrix is proposed. Through scanning database only once, all transactions are transformed to be rows of matrix and all items and itemsets are transformed to be columns of matrix. This algorithm can one-off product all frequent itemsets, and need not rescan the database when support threshold value changes. Experimental results show the mining efficiency of this algorithm is higher than Apriori algorithm.
  • WANG Zheng; ZHANG Yi
    Computer Engineering. 2009, 35(1): 87-89. https://doi.org/10.3969/j.issn.1000-3428.2009.01.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces some typical directory organization schemes and analyzes their advantages and disadvantages. By full using advantages of full-map directory and limited directory, an improved directory-based Cache-coherent protocol is presented and discussed here, which adds a Cache level upon the memory level. It limites the space cost increase, while the system performance and system scalability have a remarkable enhancement.
  • SUN Hong-hao; WANG Shu-yi; LIN Xiao-bin; WANG Xiao-fei
    Computer Engineering. 2009, 35(1): 90-92,1. https://doi.org/10.3969/j.issn.1000-3428.2009.01.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Pointer analysis plays an important role in the dataflow analysis of programs which are written by C. This paper gives an introduction of the complexity of the pointer analysis problem, classification of algorithms and algorithms which people have promoted until now. Adopting the idea of function type signature filtering given by Atkinson, this paper gives an improvement for the algorithm promoted by Liu Qiang which is a context-sensitive inter-procedural one, and this improvement decreases the size of the set of pointers at the statements where indirect function calls occur and improves the precision of pointer analysis.
  • BAO Fu-liang; XU Jie; FANG Zhi-gang
    Computer Engineering. 2009, 35(1): 93-94. https://doi.org/10.3969/j.issn.1000-3428.2009.01.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Because the compiled Java class files are easily decompiled, the security for original code in Java application has been a problem. On the basis of ClassLoader encryption, an improved method for transferring the local decrypted interface with Java Native Interface(JNI) technology is proposed, after analyzing the traditional protecting way for Java class files. The decrypted interface garantees the communication security when JNI technology transfers the local decrypted interface, which promotes the security of Java class files. Experimental results show this method is effective.
  • Networks and Communications
  • ZHANG Peng; YANG Shou-bao; HU Yun; WANG Da-peng; TENG Da
    Computer Engineering. 2009, 35(1): 95-97,1. https://doi.org/10.3969/j.issn.1000-3428.2009.01.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In view of the demerits of Wireless Mesh Network(WMN) in its performance and stability, a network model called FIA-WMN is introduced with accessing to Internet by using the features of wireless nodes. The strategy of node access control is also proposed. Simulation experimental results show FIA-WMN model and this access strategy can effectively promote the performance of WMN.
  • CAO Jia
    Computer Engineering. 2009, 35(1): 98-100. https://doi.org/10.3969/j.issn.1000-3428.2009.01.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Network nowadays displays dynamic, scale and self-organizing characteristics. How to estimate the number of certain kind of nodes of the network in distributed manner is important. This paper studies sampling-based size estimation methods which are robust and scalable. The methods are suitable to be used in unstructured network environment. Two algorithms are researched, which are based on sample-collision and binomial-distribution. The experiments show that sample-collision based algorithm has lower cost and higher veracious. When sampling few large-sample, distribution based algorithm is better.
  • XU Tong; YANG Shou-bao; HU Yun
    Computer Engineering. 2009, 35(1): 101-104. https://doi.org/10.3969/j.issn.1000-3428.2009.01.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The number of transferring hops affects wireless network performance, and the neighboring nodes in P2P network are not always physical neighbors. These characteristics bring larger information search delay in P2P network. This paper proposes a super node selection strategy based on physical characteristic of Wireless Mesh Network(WMN). Based on the role and position of Mesh nodes, Mesh domain is ensured, and a super node cluster is formed. This strategy makes nodes in a cluster close with minimal hop count, and achieves shorter end-to-end transforming delay. Simulation results show that this strategy can decrease about 50% information search delay.
  • GUO Qiang; PAN Li; LI Jian-hua
    Computer Engineering. 2009, 35(1): 105-107. https://doi.org/10.3969/j.issn.1000-3428.2009.01.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the network covert timing channel, aiming at the defect of existing synchronization method of covert timing channel and presents a new synchronization method based on smoothing algorithm. The sender sends data in blocks and the receiver estimates the time interval for receiving the next packet by synchronization method. Experimental results demonstrate that under certain circumstance, compared with previous methods, this method needs shorter inter-packet interval to receive data with no error and increases the speed for data transmission by 33%.
  • XU Lin; BAI Guang-wei
    Computer Engineering. 2009, 35(1): 108-110,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Stream Control Transmission Protocol(SCTP) is a message-oriented, reliable transport protocol operating on top of a potentially unreliable connectionless packet service such as IP. However, it requires high network bandwidth. As a partially reliable version of SCTP, PRSCTP achieves better performance in limited bandwidth network environments. This paper explores a new strategy Bandwidth Management based SCTP(BMSCTP) which tries to switch between SCTP and PRSCTP adaptively by using a bandwidth estimation mechanism. For performance analysis and evaluation, a series of simulation experiments are designed and conducted in this work. Simulation results demonstrate that the BMSCTP may provide significantly advantageous over the SCTP and PRSCTP for real-time multimedia applications in dynamic network environments, in terms of delivery ratio, end-to-end delay, etc.
  • TAO Shao-hua; YANG Chun; LI Hui-na; ZHANG Yong
    Computer Engineering. 2009, 35(1): 111-113. https://doi.org/10.3969/j.issn.1000-3428.2009.01.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of larger connection degree for the prediction nodes in BA model and its extended model, a complex networks evolving model based on new network evolving based on node attraction is proposed, including attractive factor model, the degree distribution of BA model, clustering coefficient and average path length. The attractive factor model and BA model are imitated by using programming simulation method, and both of which are compared in the same network scale. Experimental results show the fact that the degree distribution of nodes presents power-law distribution under the affection of attractive factor, which has similarity with BA model, and the clustering coefficient is less than BA model, while the average path length is longer than it.
  • GUO Zhong-ning; SUN Wen-jun
    Computer Engineering. 2009, 35(1): 114-116,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The Information Transmission Control Technique(ITCT) is the key to guarantee the information to be sent correctly without any error. This paper proposes a design method of setting up an elemental net transmission control service software focused on the current situation and features existing in nowsdays electronic information transmission system. With the application of the above-mentioned ITCT, it establishes a relevant elemental structure in the information transmission system and transmission control system correspondently. A remarkable effect has been achieved after the ITCT is put into operation in a project. Results show that the ITCT not only efficiently resolves the actual problems troubling us in the system, but also tremendously improves the flexibility/efficiency/reliability in the duration of the information transmission for the whole system at the same time.
  • WANG Li-min; GAO Xue-dong; GONG Yu; MA Hong-quan
    Computer Engineering. 2009, 35(1): 117-119. https://doi.org/10.3969/j.issn.1000-3428.2009.01.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The detection of community structure becomes the current hot research topic in the area of complex networks. The paper analyzes typical algorithms of present community structure discovery. A new method of detecting community structure is proposed, which is based on relative density. The method efficiently resolves these problems that parameters are very sensitive and are too difficult for user to determine. The method is applied to synthetic networks and compared with the SCAN algorithm. Experimental results show the feasibility and effectiveness of the proposed approach.
  • LI Ya-hong; WANG Jian-guo; WEI Bi-fan
    Computer Engineering. 2009, 35(1): 120-122. https://doi.org/10.3969/j.issn.1000-3428.2009.01.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of CPU management mechanism, and according to the characteristic of active network, a Multi-priority Shortest Packet First (MSPF) algorithm is put forward. It is easy to implement this algorithm, which satisfies the requirement of active network. This algorithm is also simulated and the experimental results show it has the superiority to some extent.
  • XU Lei; LI Xiao-hui; FANG Hong-yu
    Computer Engineering. 2009, 35(1): 123-125. https://doi.org/10.3969/j.issn.1000-3428.2009.01.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Ad Hoc network model is constructed by using the node model of OPNET software which supports the IEEE802.11 standards. The network achieves the best performance by configuring the parameters of the interface of input and output reasonable, and the comparative analysis to the network performance is carried on. Simulation results show that relationships existing among network parameters, and the network optimization parameters have uniqueness, network performance optimization state can be picked out by comparing the network load and standard load.
  • LIU Xin; XIE Qi
    Computer Engineering. 2009, 35(1): 126-127,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the SOAP serialization of messages and the verbose SOAP messages, this paper provides optimizing the SOAP message by using SOAP extension. For the SOAP request, it realizes differential encoding by adding SOAP message skeleton, for the SOAP response, it compresses long message or realizes differential encoding of the short SOAP message. It can save the bandwidth and optimize the Web services.
  • YANG Shi-rong; CHENG Dong-nian; LI Fang
    Computer Engineering. 2009, 35(1): 128-129,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the pinball route problem of the communication in nested mobile network nodes, an routing optimization scheme based on binding update is proposed. This scheme uses the the information taken by the binding update messages to create the route information of the Mobile Router(MR) in nested domain, which implements the function of MR, and resolves the pinball route problem effectively. It also avoids the waste of bandwidth caused by channel nesting. Experimental results show this scheme is feasible.
  • MA Hua-lin; LI Cui-feng; ZHANG Li-yan
    Computer Engineering. 2009, 35(1): 130-131,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new network traffic prediction method is put forward. This method uses Grey Model(GM) called GM(1,1) to conduct prediction according to the historical data of network traffic, and also uses adaptive filtering method to modify the residual error producted by GM(1,1), which achieves a higher accuracy. Moreover, this method integrates some characters of GM(1,1), such as less data needed and easy for operation. It has higher value for application. Experimental results show this method is effective and feasible.
  • WANG Zhe; WANG Fu-bao; CHEN Zhen-hua
    Computer Engineering. 2009, 35(1): 132-134,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A routing-header-embedded low-cost time synchronization algorithm is proposed, which integrates the synchronization into the routing header of the message, and implements the synchronization by putting the precise time-stamp on routing message of both sides of transmitter and receiver. It also avoids the transmission of periodicity time synchronization message, and reduces the energy cost. Simulation experimental results show this algorithm is effective.
  • MA Rong-fei
    Computer Engineering. 2009, 35(1): 135-137,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems existed in mobile Virtual Private Network(VPN), a novel mechanism for internal network detection is proposed, which uses IPv6 to support the mobile VPN. This mechanism achieves a higher detection accuracy by combining mobile IP detection with VPN detection. VPN is also implemented. Experimental results show this mechanism is effective and feasible.
  • Security Technology
  • CHEN Jin-yan; SUN Ji-zhou; ZHANG Ya-ping
    Computer Engineering. 2009, 35(1): 138-139,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an aggregation-based reputation evaluation algorithm for P2P e-commerce. The main feature of this algorithm is aggregating peers into several peers groups according to their behavior similarities, and the reputation of these groups is calculated iteratively. The group with the largest amount of peers has priority in the calculation of reputation. The honest peers will aggregate into one group because of their behavior similarity. Experimental results show that this algorithm has less variance compared with the algorithms of social networks or probabilistic estimation based reputation evaluation system.
  • XU Nan-nan; LIAN Yi-feng; WEI Yong
    Computer Engineering. 2009, 35(1): 140-143. https://doi.org/10.3969/j.issn.1000-3428.2009.01.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes and compares several typical existing methods of security situational assessment, and proposes a brand new way of assessing the security situation of distributed systems based on network topology, which incorporates both graph algorithms and a clustering algorithm of data mining. Clustering result of the connected graph corresponding to the distributed system is generated by graph clustering algorithm to calculate the integrity reference as a measure of the degree of integrity of the distributed system topology, which is used for quantitative situation assessment. This method achieves less artificial interference and its correctness and applicability are verified by simulated experiments with the network simulation tool.
  • LI Ying; CHEN Lu-sheng
    Computer Engineering. 2009, 35(1): 144-146. https://doi.org/10.3969/j.issn.1000-3428.2009.01.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new e-cash scheme, which supports delayed payment. The new function is implemented by ID-based encryption technology. It designs an e-cash secure model, which regards bank as an untrust party. In this model, bank’s behaviors can be inspected, and the new scheme is secure.
  • LV Xin; CHENG Guo-sheng; XU Feng;
    Computer Engineering. 2009, 35(1): 147-149. https://doi.org/10.3969/j.issn.1000-3428.2009.01.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the proper threat of mobile Ad Hoc network, and proposes a threshold authentication scheme without the trusted center based on bilinear pairings. The cost of storage and computational capacity, requiring of each node, can be effectively reduced and security problems such as inner nodes attack, passive attack can be solved. Compared with the existent protocol, this scheme is faster in generating certificate and has lower complexity of computing.
  • ZHAO Ming-wei; MAO Rui; JIANG Rong-an
    Computer Engineering. 2009, 35(1): 150-152. https://doi.org/10.3969/j.issn.1000-3428.2009.01.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In traditional encryption software, the documents have to be decrypted manually before being used, and encrypted manually after being used. It is cumbersome. During this operation, the documents exist as clear texts and are stored on hard drive, which has hidden risks of security. In view of the traditional encryption software insufficiency, this paper designs and realizes a transparent encryption file system model using filter driver technology. This system can real-time transparently encrypt data in the entire process without changing the user habit, effectively protect the data security, significantly raise the work efficiency and greatly improve the user experience.
  • LUO Yang-xia; MA Jun; ZHANG Zhi-gang; FANG Ding-yi
    Computer Engineering. 2009, 35(1): 153-155,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at robustness and efficiency of traditional Dynamic Graph Watermark(DGW), a DGW-AB algorithm based on threshold scheme is proposed, in which the idea of secret sharing to the software watermarking is introduced. Experimental results have shown that the proposed method can make up the weakness of CT algorithm, and prevent invaders from getting the original watermark.
  • YANG Tao; GUO Yi-xi; ZHANG Hong
    Computer Engineering. 2009, 35(1): 156-158,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Penetration testing is one of the most popular methods of assuring network security. The current process of penetration testing is refined in this paper, the deficiencies of traditional penetration testing model is discussed, and the attack testing colored Petri net used for network attack simulation and organization of the testing is presented. It discusses the integration of different attack scenario and generation of testing case. A example is provided to illustrate its application.
  • Artificial Intelligence and Recognition Technology
  • ZHANG Li; MU Xiao-dong; ZHAO Zong-tao
    Computer Engineering. 2009, 35(1): 159-161. https://doi.org/10.3969/j.issn.1000-3428.2009.01.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The prevention and cure of deadlock of command information system for united combat of multi-troops is the fundamental problem to ensure the safety and the reliability of system. It is also one of difficult problems to be solved. This paper puts up a kind of formal method which describes the command information system——Petri net model, giving an example of setting up intelligent running models of planning battle plan and brigade-level communication and command system, sums up the method of setting up models, puts up its deadlock prevention and cure algorithm DLPCA, it can prevent deadlocks of system and provide reliable theory foundation for setting up integration information system. Through simulation test, the algorithm is proved to be effective and feasible. In longer period of system’s working, the amount of deadlocks has been reduced by about 50%.
  • LI Ming; LONG Jia-li; SHENG Wei-xiang
    Computer Engineering. 2009, 35(1): 162-164. https://doi.org/10.3969/j.issn.1000-3428.2009.01.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The quality of the initial population size directly affects the performance and efficiency of the Genetic Algorithm(GA), and how to choose the initial population size“N”is the important problem. The initial population size is studied based on the defined partial function, favor and back difference equations, and the schema theorem. The inner relations――two excellent inequations between the initial population size and the code length are obtained when binary and natural number codes are used in GA operations. Experimental results of this method on two classical complex multimodal functions show its validity and superiority.
  • GONG Gu; HUANG Yong-qing; HAO Guo-sheng
    Computer Engineering. 2009, 35(1): 165-167. https://doi.org/10.3969/j.issn.1000-3428.2009.01.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to effectively solve the disadvantages of Interactive Genetic Algorithm(IGA) which converges slowly and easily runs into local extremism, some improved strategies are proposed. The improved strategies which reserve some elitist genes can reduce useless crossover effectively and thus the convergence speed and the search capability are greatly improved when the Elitist Reserved Genetic Algorithm(ERGA) that keeps best strategies compared with IGA. The efficiency of the proposed method is analyzed, at the same time the improved algorithm is applied to fashion design and the simulation validates its efficiency. Experimental results show that the rapidity of convergence and the probability of the improved algorithm can be superior to GA.
  • ZHOU Zi-li; WANG Yan-na; WANG Xin-wei
    Computer Engineering. 2009, 35(1): 168-170,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper designs a multi-phase traffic signal control system based on congest parameter b of traffic flow. The system includes prolong of green light fuzzy controller and phase-choosing fuzzy controller. The first fuzzy controller’s output is the prolonged time of current green phase according to congest parameter of traffic flow of current cross and next cross. If the prolonged time is zero, it will enter phase-choosing fuzzy controller, whose output is the next phase to perform. Simulation result shows that this design can do well in controlling multi-phase traffic signals control.
  • LV Shi-pin; WANG Xiu-kun; SUN Yan; TANG Yi-yuan
    Computer Engineering. 2009, 35(1): 171-172. https://doi.org/10.3969/j.issn.1000-3428.2009.01.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An improved feature selection algorithm based on gradient is proposed, aiming at the problem of feature subset selection when applying Support Vector Machine(SVM) to classification. The algorithm ranks the features by the criterion of the local gradients of distance function, measuring the distance from a datapoint to the classification hyperplane in the kernel-induced feature space, and eliminates the calculation of the angles of gradients with every axis. Experimental results show that the proposed algorithm simplifies the method of feature selection based on angle calculation and keeps the results consistent.
  • YU Shi-cai; MA Ning; KANG Jun-xian
    Computer Engineering. 2009, 35(1): 173-175. https://doi.org/10.3969/j.issn.1000-3428.2009.01.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Neural Network(NN)’s incomprehensible quality is always an inherent defect that limits its self-development. This paper, from the functional point of view, describes a method that employs a ICS algorithm to extract rules from NN. The method uses tactics of immune clone in rules extraction from NN and clusters outputs of hidden neurons of NN, to reduce the searching scale and extract succinct sign rules of good understanding. The method can be used in all kinds of NN based classifier not depending on concrete net structure and training algorithm. The result of experiment shows its practicability and feasibility.
  • TAN Qi; YANG Pei
    Computer Engineering. 2009, 35(1): 176-177,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A variable-window neural network ensemble model is proposed, which takes use of the self-correlation analysis method to construct all the individual neural networks with different types. This model improves the generalization ability of forecasting system. It can also remove outlier series effectively and promote the accuracy of forecasting. The model is simulated by using real data sets. Experimental results show this forecasting model has higher accuracy of forecasting and can predict the traffic of mobile communication effectively.
  • ZHENG Hong-zhen; CHU Dian-hui; ZHAN De-chen; XU Xiao-fei
    Computer Engineering. 2009, 35(1): 178-179,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    From a consumer point of the sequence of preference, data mining is used in the field of symbolic sequence clustering methods to detect market segmentation structure. This paper proposes a symbolic sequence clustering methodology and framework, gives the similarity metric RSM model. By adjusting RSM model, parameters can be changed into RSM and edit distance, Hamming distance equivalent to the similarity metric. RSM is compared with other sequence similarity metric, and is more similar to the expression of the concept of capacity. As to express different similarity, the concept of RSM can be applied to different applications environment. Based on the SOM annealing symbol clustering model, the consumer preference for market segmentation can be studied in the structure, which means it is realized in practical application.
  • Graph and Image Processing
  • TENG Kai-feng; ZHANG Jian-qiu; ZHOU Bai-yang
    Computer Engineering. 2009, 35(1): 180-182. https://doi.org/10.3969/j.issn.1000-3428.2009.01.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the mechanism how image translation affects image registration algorithms to improve their robustness. The relationships of the subband correlation functions among the scales are derived. The analytical result shows that the aliases of the correlation functions are mainly responsible for the translation sensitivity. An analytic-wavelet-based algorithm is proposed to solve this problem. Theoretic analysis demonstrates that the method is robust against image translation. The effectiveness of the proposed method is validated by practical data.
  • TANG Jian-gang; WANG Ze-xing
    Computer Engineering. 2009, 35(1): 183-185. https://doi.org/10.3969/j.issn.1000-3428.2009.01.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Duplicate image detection is one problem in automatic image tagging. On the basis of discussing the large-scale images database, a duplicate image detection algorithm is proposed, which does not depend on the specific characteristic of images. This algorithm can find the duplicate image by setting up the index, and promote the accuracy of query effectively. Experimental results show the algorithm is feasible and can be used into other relevant cases.
  • WANG Xiang-rong; ZHAO Jie-yu
    Computer Engineering. 2009, 35(1): 186-188. https://doi.org/10.3969/j.issn.1000-3428.2009.01.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Energy based Cluster Update (ECU) algorithm proposed by Ralf has its drawback that it is inefficient in sampling and slow in convergence. A new algorithm is proposed to improve the ECU algorithm. It preprocesses the image to merge single pixels to atomic region, thus processes the image on atomic region instead of pixels with the algorithm. It improves the sampling method with Metropolis sampler, which speeds up the convergence of the model. It successfully uses the algorithm on both the static images and video sequences as an application. Experimental results show that the algorithm is more efficient and has higher speed.

  • KE Jian-guang; ZHAO Qun-fei; SHI Peng-fei
    Computer Engineering. 2009, 35(1): 189-191,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a blind way recognition algorithm based on image processing, which contains thresholding, color image segmentation, texture-based segmentation and line detection technique. It can study the characters of the blind ways then segment them from the pavements. Experimental results show that this algorithm is effective for most of the images of the blind way. It can partition the area of the blind ways and tell the turning direction of the blind ways. As this algorithm can adaptively select the fastest method to run, it can be implemented in the real-time blind direction system.
  • ZENG Qing-ye; TANG Ping
    Computer Engineering. 2009, 35(1): 192-194. https://doi.org/10.3969/j.issn.1000-3428.2009.01.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an affine invariant feature construction method, and fulfills automatic registration of aerial image sequence using this feature. Affine invariant feature is constructed based on scale space and second moment matrix, image registration is performed using pyramid method and distance calculation acceleration, and reliability is ensured by registration probability model. Experimental result shows without any position information automatic registration of aerial image sequence is performed efficiently using affine invariant features.
  • Engineer Application Technology and Realization
  • LIU Yu; XU Yong-an; SUN Yan-feng
    Computer Engineering. 2009, 35(1): 195-197. https://doi.org/10.3969/j.issn.1000-3428.2009.01.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the crime of placarding notice and altering keyboard, cash exit, card entrance, combined with image preprocessing, contour tracing and different thresholds are used in subareas. Improved Laplace operator is used to extract the contour of ATM monitor image. The contour of ATM monitor image and template, consecutive contours are compared. When the difference of consecutive contour is more than given value and the same contour with template is less than given value, an alarm can be sent to monitor center in time. The practical ATM monitor system applies this technology. It is convenient to the watch. It improves the security and reliability of service.
  • ZHANG Lei; DENG Jiang-ping; WANG Jian-yu
    Computer Engineering. 2009, 35(1): 198-200. https://doi.org/10.3969/j.issn.1000-3428.2009.01.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a new idea of converting RF to IF, samplings the analog signal into digital signal. And then it researches the acquisition, tracking and position resolution based on DSP technology. Through the design of GPS software receiver and signal processing, it is shown that the high flexibility in algorithms and software can be realized based on software radio technology, and the system performance of GPS receiver can be developed.
  • ZHAO Hui; HUANG Shi
    Computer Engineering. 2009, 35(1): 201-203,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Utilizing the resource of the processor to improve the execution efficiency of the program and to increase the flexibility of the code is the key problem of optimizing complier for SIMD processor. This paper introduces M language and Li-Shan Single Instruction Multiple Data(LS SIMD) computer architecture and presents optimization method and implementation method of the M compiler for SIMD coprocessor combining with modern compiler techniques. It includes assigning register combining single value and compressing code, etc. Experimental result shows that the M compiler can generate exact and high efficient target code.
  • LI Lei; ZHENG Wei-min; LIU Jin-gang
    Computer Engineering. 2009, 35(1): 204-206. https://doi.org/10.3969/j.issn.1000-3428.2009.01.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper elaborates the initial flow of Loongson Basic Input-Output System(BIOS) based on PMON and Video Graphics Array(VGA) BIOS emulator to emulate the initial x86 binaries in ROM of ATI VGA Card. The critical issues such as the initial process of PCI devices, VGA BIOS emulator, and the distribution of North Bridge’s address ranges are discussed. After debugging and extensive tests, expanded Loongson 2E BIOS has run reliably in mainbords for Loongson 2E, and can steadily load Debian kernel ported for Loongson 2E.
  • ZHANG Jun-jie; ZHANG Feng-lin; YE Jia-jun
    Computer Engineering. 2009, 35(1): 207-209,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A 100 MS/s data acquisition system based on PCI bus is designed to meet the need of high-speed radar signal sampling. The 6 GB sampling ADC data can be saved on this card and transferred to the computer simultaneously, which is controlled by one FPGA chip. The transfer rate between this card and the computer can reach up 60 MB/s. The SNR of the sampled data can reach 55 dB at 30 MHz.
  • YAN Xin-huang; RU Hui-su; WU Rong-quan
    Computer Engineering. 2009, 35(1): 210-212. https://doi.org/10.3969/j.issn.1000-3428.2009.01.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the test mechanism of boundary-scan test and the functional requirement of test supported system, and presents a design project based on USB-bus high-speed boundary scan master controller. It uses CY7C68013 as USB2.0 interface controller and uses CPLD to implement JTAG master core. So it can accomplish conversion of JTAG protocol and USB-bus protocol, and can modulate the frequency of TCK which can run at a maximum rate of 48 MHz. Users can use this boundary-scan master controller to complete boundary scan test more expediently and efficiently.
  • CHENG Xiao-yu; BI Du-yan; CAI Ye
    Computer Engineering. 2009, 35(1): 213-215. https://doi.org/10.3969/j.issn.1000-3428.2009.01.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The real-time operation system μC/OS-II is transplanted to Loongson 2E PC104 Plus CPU module. The process is described and three methods for real-time performance evaluation are discussed. Rhealstone benchmark method is chosen to measure and analyze real-time performance of the system. Experimental results show that μC/OS-II in Loongson 2E PC104 Plus CPU module can meet the requirement of general real-time applications.
  • ZHAO Yao; HAN Ze-yao; FU Yu-zhuo
    Computer Engineering. 2009, 35(1): 216-217,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To get the accurate LDPC decoder power analysis, large numbers of random input vectors should be simulated on gate-level, which consumes a lot of time. However, bit error rate and average iteration number on various signal-to-noise ratios can be easily got by fixed point Monte Carlo simulation on the decoding algorithms. Accurate power analysis can be calculated conveniently and efficiently with gate level simulation and Monte Carlo simulation combined. It is approved to be practical and efficient by power analysis on an LDPC code in IEEE802.16e.
  • LI Guo-dong; WANG Meng-xiao
    Computer Engineering. 2009, 35(1): 218-220. https://doi.org/10.3969/j.issn.1000-3428.2009.01.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is difficult to obtain the satisfactory controlling performance with the normal PID controller in the temperature controlling system in practice. A PID control algorithm based on the immune feedback principle is presented. The Centroid defuzzification method is adopted in order to get the output of the controller. The 3 coefficients of the PID controller change with the variation of output of the controller. Simulation results show that the Fuzzy-Immune-PID control strategy is adaptive to the object’s parameter variations, and its controlling performance is better than that of the traditional PID control strategy. The system obtains the performance of strong robustness and self-adaptibility.
  • HUANG Ya-wen; LI Xiang; LIU Hai-qing; CHAI Xiao-li
    Computer Engineering. 2009, 35(1): 221-223. https://doi.org/10.3969/j.issn.1000-3428.2009.01.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In embedded multiprocessor systems interconnection, the highway demands higher demands to satisfy the large number of real-time data transmission, so the traditional shared bus way becomes the interactive bottlenecks of data. This paper analyzes the popular bus technology, and focuses on the StarFabric interconnect technology features, which includes network topology design and StarFabric software technology. And it designs and realizes a high-speed bus-based simple communication protocol. Practical application proves its characteristics of high bandwidth and low latency.
  • WANG Fei; TAN Ming; HE Dao-jun; XU Jin-fu
    Computer Engineering. 2009, 35(1): 224-225,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The reuse of IP cores in SoC brings more difficulties in the test reuse of IP core. This paper proposes a method of constructing Test Access Mechanism(TAM) based transparent paths. Experiment is performed on PARWAN processor. Experimental results show that PARWAN after constructing transparent paths has lower area overhead, and test application time reduces obviously when PARWAN constructed transparent paths is applied in SoC as TAM.
  • SHI Wen-hao; LI Qiu-xian; LIU Hong-yan
    Computer Engineering. 2009, 35(1): 226-228. https://doi.org/10.3969/j.issn.1000-3428.2009.01.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article discusses the ISA servo control card under Win2000 environment work process, the WDM device driver’s principle, the structure and running process. It researches the WDM device driver design and exploitation by taking the ISA bus as the example. Servo control program is written and PID controller is designed, the parameters are adjusted on-line. Experimental results of AC servo motor show that writing the device driver can realize high-precision timing and controll the position of high-precision servo electromotor.
  • BAI Rui-lin; LIU Yang; QU Ming-bo
    Computer Engineering. 2009, 35(1): 229-231,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    High speed embroidery machine has to produce high quality product at high speed, meanwhile, to keep low noise. The difficulty lays in how to control the step motor X/Y precisely and steadily within the dynamically limited time. ARM9 controller together with CPLD is used to construct the control system to improve efficiency of control and reduce the complexity of coding. Based on the research of embroidery control system and according to the kinetics function of the whirling objects and the moment-frequency feature of the step motor, the selection of control pulses, interrupt handling and architecture of the stream driver are analyzed, and the development of the stream driver for the step motors under WinCE5.0 is completed.
  • LI Hua-jun; WANG Zhong-ren; LIU Zhi-gang
    Computer Engineering. 2009, 35(1): 232-234. https://doi.org/10.3969/j.issn.1000-3428.2009.01.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A good detection system should get working statues of all components and transfer them to the terminal in time, so the system must have good real time performance. Although Linux is an excellent operating system, it is not suitable for real time applications, so the detection system is implemented based on RTLinux, which has good real time performance. The system is divided into two parts, the real time part and the non-real time one. The real time part communicates with hardware, collects and sends data, and the non-real time part exchanges data between the terminal and the real time part. Result shows the system has good performance and meets the requirement.
  • Developmental Research
  • LI Yu; ZHENG Min-juan; CHENG Guo-jian
    Computer Engineering. 2009, 35(1): 235-236,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the classification problem of one-class data, a classification algorithm based on Support Vector Data Description(SVDD) is proposed, which uses SVDD to obtain the minium sphericity boundary containing one-class data. The unknown sample data is classified with this boundary. In addition, the quadratic programming problem in boundary optimization is solved by using feasible direction method. This algorithm is also compared with LS-SVM in UCI dataset. Experimental results show this algorithm not only achieves higher classification accuracy, but also has lower running time.
  • LING Yong-hong; HUANG Xiao-wei
    Computer Engineering. 2009, 35(1): 237-239. https://doi.org/10.3969/j.issn.1000-3428.2009.01.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For the oilfield geologic information project, the geometry modeling is realized by regulation grid method which transforms the discrete drill data to regulation grid collection. A method called Kring interpolation is used to acquire attribute values of layer-upon-layer grid points from the interpolation of the drill data geo-property. And the shape function is brought forward to get any space point’s property from the attribute values. Based on the method, the 3D visualization of geological entity, the drawing of geologic column and the drawing of geologic section can be realized by the software called GeoPetrel for oilfield geologic modeling.
  • HUANG Yu-feng
    Computer Engineering. 2009, 35(1): 240-241,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses the shortage of traditional virtual cutting surface reconstruction algorithm in medical image, which can not reconstruct a complex cutting surface. This paper proposes a virtual cutting surface reconstruction algorithm based on marked points to reconstruct a cutting surface along marked points in 3D environment. The algorithm includes marked points measure, cutting path fitting and cutting surface reconstruction. Experimental results show that the algorithm can provide good reconstruction image and high precision.
  • ZOU Yao; LIU Pei-lin
    Computer Engineering. 2009, 35(1): 242-244. https://doi.org/10.3969/j.issn.1000-3428.2009.01.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the developing time of traditional assembler for off-the-shelf processors is too long to meet the requirement of configurable processor and changeable demand, this paper provides a method to design and implement configurable assembler based on user description. It highly abstracts the ISA dependent part in the assembler and by using high level description of ISA, and can quickly and directly reflect the changes of the demand and ISA into the assembler’s source code. Experimental results indicate that it reduces about 50% developing work and brings down the threshold to develop the assembler.
  • ZHANG Hong-yu; CHAI Yi-fei; TU Shi-liang; CHEN Zhang-long
    Computer Engineering. 2009, 35(1): 245-246,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a container management system, in which the technologies on sensor networks and active RFID are used. A four-level architecture network combined with efficient protocol and localization algorithm is designed according to the situation of container stacking area. The system presents a new way to manage containers, which is more efficient and reliable than traditional method largely relying on manpower. It can help to solve the “container missing” problem which can result in big cost. The work proposed in this paper is of great practical meaning.
  • YANG Li; CAO Xie-dong; YUAN Hai-yan
    Computer Engineering. 2009, 35(1): 247-249,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Analysing present situation of oil and gas production and defect of present monitor control system, three-ties architecture is presented. Terminal subsystem is the first layer, which is mainly made of RTU, flow computer, wireless sensor network. The Second layer is security transmission subsystem, which is made of GPRS(CDMA)+APN. The last layer is centre monitor subsystem, which is exchange platform based on virtual data centre. Four key technologies are applied to the remote monitoring system. As a result, work efficiency of oil-gas production has been greatly increased, and safety accidents have been reduced.
  • GUO Hui; SONG Guan-fu; MA Liu-qing; WANG Shao-hua
    Computer Engineering. 2009, 35(1): 250-252. https://doi.org/10.3969/j.issn.1000-3428.2009.01.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In most of recent GIS systems, the geographic location information is described in text rather than geographic coordinate. To solve this problem, the key technology and accomplish method of geocoding have been proposed, including address standardization, address matching, address geocoding quantification and so on. Using the design and method, this paper adds the address geocoding module in GIS Platform. Experiment proves that the design and method proposed have low error.
  • LI Su-yun; TANG Jie; WU Gang-shan
    Computer Engineering. 2009, 35(1): 253-254,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a geology surface reconstruction algorithm based on geology constraints. A solution is introduced to aim at generating linear discontinuous horizon pieces in 3D geology modeling. Horizon triangular mesh surface without constraints is reconstructed from point cloud by applying the “marching cubes” algorithm. In order to make every piece of the horizon surface well represent the effect that faults cut horizon near the intersection line, mesh fitting process is applied to the horizon surface based on constraint of fault surfaces and using point cloud. Results demonstrate that the algorithm is stable and effective.
  • XU Zhao-yang; ZHANG Xin-hua; KANG Chun-yu
    Computer Engineering. 2009, 35(1): 255-256. https://doi.org/10.3969/j.issn.1000-3428.2009.01.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Failed elements can seriously degrade the performance of an array and a method for array failure correction based on signal-reconstruction is presented. The received signals at neighbouring elements differ only by a constant phase coefficient in an ideal equispaced linear array, so the distorted output of the failed elements can be reconstructed by synthesizing the output signals of neighbouring elements and the degraded sidelobe level can be partially compensated. The method is proved to be effective with the simulation.
  • WANG Yi-xue; WANG Lun-jin; LV Ke
    Computer Engineering. 2009, 35(1): 257-259. https://doi.org/10.3969/j.issn.1000-3428.2009.01.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the related concepts of specification, taxonomy, instance about XBRL, shows the core thinking of dealing with financial statements by XBRL technology, through a example which is data mapping from tables to XML, XML files parsed forming XBRL files, presenting XBRL files through XSLT displays the whole process that is financial statements implement network sharing. This paper points to format conversion’s key point from XML to XBRL is instance creator, and XSLT transformer is necessary means to improve sharing visibility and analysis.
  • HAN Hu; ZENG Qing-liang; SUN Cheng-tong; WANG Cheng-long
    Computer Engineering. 2009, 35(1): 260-262,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the base of studying basic theory, technology and method, this paper puts forwards the system structure and function constitute of the virtual prototype collaborative development platform for complex products, designs the united data access interface, individually develops software of virtual prototype collaborative development platform for complex products. The software mainly includes some function module, such as, individual work space management system, simulation and modeling system, data management system, workflow management system, model data base system, simulation and evaluating system, which can support the whole multi-disciplinary collaborative development procedure of complex products¬¬designing, simulating, analyzing and optimizing. It complishes integration administration to such resource, which is related to collaborative development, as project, personnel, model, data and workflow, and offers the distributed supporting environment of the design, simulation and resource management for the virtual prototype collaborative development for complex products.
  • XUE Bo; ZHOU Yu-jie
    Computer Engineering. 2009, 35(1): 263-265. https://doi.org/10.3969/j.issn.1000-3428.2009.01.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A design scheme of a CPU simulator which is compatible with MIPS32 instruction set is presented. It simulates hardware behavior of CPU by using C language, and it can implement all the MIPS32 instructions excluding floating-point instruction, such as parameterize main memory, unifies 2-way set associative instruction and data cache, embeding reconfigurable branch predictor and ELF interpreter. An application example is given.
  • TIAN Ming-hao; FENG Yong-xin; LIU Fang;
    Computer Engineering. 2009, 35(1): 266-268. https://doi.org/10.3969/j.issn.1000-3428.2009.01.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In a direct sequence spread spectrum communication system with long period pseudorandom code, the search speed of the pseudorandom code impacts the overall performance of the receiving system seriously. Aiming at the question on rapid search for long code, a rapid search strategy of long code is proposed, which expands the search scope of pseudorandom code adopting expansion and average technologies. Theoretical analysis and numerical results show that the acquisition method can effectively improve the acquisition speed of the pseudorandom code when searching large-scale codes.
  • WU Bing-fang; ZHOU Yue-min
    Computer Engineering. 2009, 35(1): 269-271. https://doi.org/10.3969/j.issn.1000-3428.2009.01.094
    Abstract ( )   Knowledge map   Save
    This paper discusses how information technologies, such as 3S, spatial database, component Geographic Information System(GIS), Web GIS, 3D visualization, multimedia, are applied to the development of soil conservation monitoring information system for the Miyun watershed, and it emphasizes to expound the architecture, functions and key techniques of the information system.
  • HUANG Yang-fan; GAN Ping; LIU Xiao
    Computer Engineering. 2009, 35(1): 274-276. https://doi.org/10.3969/j.issn.1000-3428.2009.01.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems which high-speed signal test of PCB is facing, this paper introduces the test ways of high-speed signal of PCB based on virtual instrument, and makes use of the combination of the digital technique of virtual instruments and computer soft analysis technique. It can provide perfect test ways and technique means for high-speed signal test of PCB and the validation of logic function in the process of design. It can provide reasonable and beneficial reference to improve the design of high-speed PCB that can upgrade signal quality.
  • LI Guo-dong; LIU Zhong-qiang; LIU Chang-an
    Computer Engineering. 2009, 35(1): 277-279,. https://doi.org/10.3969/j.issn.1000-3428.2009.01.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aimming at full consideration of the characteristics of the network technology in a various methods of classification of resources and a large quantity, this paper proposes a kind of crawler algorithm based on directory tree. The algorithm extracts and recognizes the directory links based on domain ontology knowledge as effective evaluation, and links the nodes effectively through a modified strategy of link analysis, eventually carry through collecting operation. The algorithm not only studies in-depth on the crawler architecture, but also pays attention to the speed of access to the latest resources optimization. Experimental results show that the algorithm can effectively achieve the established objectives both in speed and efficiency.
  • WANG Fan; TAN Guo-zhen; WANG Hao; HE Qin-lai
    Computer Engineering. 2009, 35(1): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2009.01.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Applying domain engineering to intelligent transportation system, carrying on the seal, the isolation and abstraction in variability- requirements of transportation domain better, instructing design and realization of transportation components, it can solve the problem of identification, organization and utilization of reusable information in transportation domain, and meet the demands of software reuse, resource sharing and collaboration in traffic domain. Basing on the engineering analysis in FODA domain, this paper extends its feature-oriented modeling method, implements traffic engineering, publishes service application example combined with the transportation information of traffic engineering, and illustrates the feasibility of modeling method in feature-oriented domain.
  • YANG Ni-na; WANG Qing
    Computer Engineering. 2009, 35(1): 283-封三. https://doi.org/10.3969/j.issn.1000-3428.2009.01.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve junk message intercepting efficiency, one scheme is adopted by filtering junk message according to sending numbers, sending frequencies and content synchronously, which filters sending numbers based on the black-and-white list first and analyzes the spam content afterwards. Sending frequencies is applied to realize the blacklist generation. The core of this method is content filtering which is expounded. This paper designs a spam intercepting module just based on the Struts framework. Experimental result shows that the system’s succee can reach 90.69%.