Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 November 2008, Volume 34 Issue 22
    

  • Select all
    |
    Degree Paper
  • XU Lin; GUO Zhong-quan; CHEN Xiao-qian; WANG Zhen-guo
    Computer Engineering. 2008, 34(22): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2008.22.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Parametric modeling is one of the key technologies of complex hypersonic vehicle system design. This article analyzes the features of Patran Command Language(PCL), which is the developing language of structural dynamic software MSC. Patran is used to realize parametric hypersonic vehicle structure model. The interface for system integration is also supplied for optimization. Results of static stress and mode calculations show the effects of grid and the correctness.

  • DANG De-peng; LIU Yun-sheng
    Computer Engineering. 2008, 34(22): 4-6. https://doi.org/10.3969/j.issn.1000-3428.2008.22.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    All the transaction-oriented policies of relaxing serializability such as epsilon serializability and similarity serializability and quasi consistent serializability can result in bounded inconsistency of data. After discussing transaction-oriented conflict serializability, user-oriented policies serializability and -serializability are presented. Formal definitions are given and the necessary and sufficient conditions are proved. Although they are more relaxing than traditional serializability, consistency of a mobile real-time database read by users is maintained.
  • WANG Sheng; SU Jin-shu
    Computer Engineering. 2008, 34(22): 7-9. https://doi.org/10.3969/j.issn.1000-3428.2008.22.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    When TCP protocol is offloaded into hardware, the process for management of disordered packet is so complicated that hardware can not implement it efficiently. This paper proposes a novel algorithm for reorder of disordered packet. The algorithm can place data directly according to the sequence in packets and reorder those disordered packets by mapping and comparision of sequences. Experimental results show that this algorithm can be easily implemented and performed efficiently. The rate of TCP data at 10G interface can reach 4.64 Gb/s.
  • BAO Yan-ru; CHEN Hai-ming; SHU Yan-tai; QIU Xiao-hong
    Computer Engineering. 2008, 34(22): 10-12. https://doi.org/10.3969/j.issn.1000-3428.2008.22.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an Reliable Energy-Aware Routing Protocol(REARP) which is based on reliable link layer model. The REARP tries to maximize the lifetime of the whole network, and at the same time, minimize the total energy cost for each packet. Moreover, the REARP appropriately handles packet losses by systematically integrating the reliability and power control techniques. Extensive simulations are conducted to evaluate the performance of the new routing algorithms compared to a number of existing routing algorithms.



  • MA Zhong-gui; WANG Zong-jie; TU Xu-yan
    Computer Engineering. 2008, 34(22): 13-15. https://doi.org/10.3969/j.issn.1000-3428.2008.22.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an intelligent technique of information acquisition and processing based on Intelligent Information Push-Pull (IIPP), which can extract the useful information and knowledge in the data for effective transmission. An intelligent communication method based on public knowledge base sharing is proposed, it only transmits the available new information directly to the users who need it, while various public knowledge bases can share information so as to reduce data transferring and improve communication efficiency. Experimental result shows the feasibility of the technique.
  • CHEN Xiao-jun; SHU Kuan; ZHANG Jian-guo; QIAN Li-wei ; WANG Cheng-tao
    Computer Engineering. 2008, 34(22): 16-18. https://doi.org/10.3969/j.issn.1000-3428.2008.22.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses the octree-based spatial search and intersection algorithm including cell distribution and intersection computing based on octree. This algorithm can be used in computer-aided surgery, including the location of anatomical landmarks, distance measurement, bone thickness measurement, interference and distance detection between 3D models, etc. It is efficient, universal, and extensible, so that it can be used in various computer-aided surgery softwares and surgery direction softwares.
  • LI Fu-fang; QI De-yu; ZHANG Xian-guang; ZHANG Li-min
    Computer Engineering. 2008, 34(22): 19-21. https://doi.org/10.3969/j.issn.1000-3428.2008.22.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Task scheduling is one of the key problems in the field of grid computing research area. Based on analyzing research works done in grid task scheduling field, this paper gives out a novel gird independent task scheduling algorithm based on hybrid clustering of grid tasks and resources. By using the method of fuzzy clustering of task and resources, this algorithm tries to schedule the task to the grid resource which exactly satisfies the needs of the task, and tries to avoid allocating the tasks to grid resources that extremely exceed the task’s needs. In this way, the algorithm reserves the competent grid resources for future use when they are needed by complex grid tasks, while efficiently satisfy the needs of current tasks. This novel algorithm has high efficiency and sound load balancing capability, and provides a new way for grid tasks scheduling.
  • SHI Yi; WANG Xin-lin; LU Ting-jin
    Computer Engineering. 2008, 34(22): 22-24. https://doi.org/10.3969/j.issn.1000-3428.2008.22.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at improving the extensibility of huge domain ontology, a domain ontology building method named MBECO is put forward. Through inheriting the framework of upper-ontology, formal sub-domain ontology models such as sensor ontology, EC ontology, command and control ontology can be constructed. Then integrating them under the rule of upper-ontology to get ECSON. Example indicates that, based on the method, the perfect warfare domain ontology for systemic distributed EC simulation can be achieved.
  • RONG Hui-gui; ZHOU Ning; LU Shao-fei; XIAO Shuang
    Computer Engineering. 2008, 34(22): 25-28. https://doi.org/10.3969/j.issn.1000-3428.2008.22.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Requirements are abstract and complex during software engineering. Requirements without verification will bring larger risk for the success of project. A method of requirements verification based on directed spanning graph is proposed, and UML dialog map and the mapping strategies of dialog map model are discussed. The process of task division and formal description are analyzed. Some other translation model and algorithms of the verification process are obtained. The validity is tested by the method analyses and a real application.
  • LAN Xiao-ji; XU Hong-wei; PAN Wei-feng; SU Jian-qiang
    Computer Engineering. 2008, 34(22): 29-31. https://doi.org/10.3969/j.issn.1000-3428.2008.22.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the features of the spatial data and difficulties and shortages of traditional methods in clustering analysis of spatial data. A novel spatial data clustering method based on improved evolutionary algorithm, called SDCEA is proposed. It effectively solves the main problems in clustering analysis of spatial data and enhances the flexibility and efficiency of the clustering analysis. Numerical experiments show that SDCEA has better performance.
  • HE Li
    Computer Engineering. 2008, 34(22): 32-33. https://doi.org/10.3969/j.issn.1000-3428.2008.22.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In Web environment, clustering Web users based on the browsing behaviors and building user browsing sequences prediction model based on user cluster are keys to achieve the personalized services. This paper produces similar user groups through clustering Web users. According to browsing features of each similar user group, the classified Markov chains based on the different similar user groups are built. Experimental result shows the efficiency of the model.
  • CHEN Kai; WEI Shen; ZHU Chang-an; WANG Cheng-en
    Computer Engineering. 2008, 34(22): 34-36. https://doi.org/10.3969/j.issn.1000-3428.2008.22.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the problem of the complex relations between parts and the difficulties to create BOM, a BOM generating system based on XML is proposed. It uses tree structure to express relations between parts, and stores parts information in XML document. Rijndael algorithm is used to encrypt XML for product data safe transmission between departments. In client, XML is decrypted to obtain the whole product information and BOM can be restored. The real system works efficiently in a factory.
  • Software Technology and Database
  • HUANG Yi-jun; XU Zhong-wei
    Computer Engineering. 2008, 34(22): 37-39. https://doi.org/10.3969/j.issn.1000-3428.2008.22.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Safety analysis is very important to the software system which matches the safety requirement. Based on the model of safety-critical software, this paper analyzes the existing safety analysis methods and UML modeling language in the applications of safety-critical software, proposes a new method of safety description against the weakness of UML modeling language, and sets up a model of ATP system to verify the feasibility and validity of the method.

  • YAN Yong; WAN Shu-chao; YANG Yan; HUANG Tao
    Computer Engineering. 2008, 34(22): 40-42. https://doi.org/10.3969/j.issn.1000-3428.2008.22.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper takes a Content Management System(CMS) as the subsystem of a portal, analyzes document lifecycle management in CMS, including multi-level permissions, users, document statuses and actions, transition of the statuses, concurrency, etc. It presents a method for document lifecycle management, which is configurable, cooperating and loose coupling with RBAC-like mechanism. The models and the key points to implementation are discussed.
  • CHEN Yuan; CHEN Rong; HU Jun-feng; LIN Lin; ZHANG Jing-bo; YU Zhong-hua
    Computer Engineering. 2008, 34(22): 43-45. https://doi.org/10.3969/j.issn.1000-3428.2008.22.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Text segmentation is an important filed in the area of natural language processing. However, there is a defect that the existing models cannot effectively segment small general-text. For the reason, an algorithm based on Hidden Markov Model(HMM) is proposed in this paper. The algorithm segments a small general-text with a single topic into its different aspects of discussion using the length distribution of every structure block and the terms. Two methods are designed for computing symbol emission probabilities of the HMM, one of them is based on sentence group while the other is based on segmentation point. Experiments on Medline abstracts show that the effect of the algorithm proposed is much better than the TextTiling algorithm.
  • ZHANG Pu
    Computer Engineering. 2008, 34(22): 46-48. https://doi.org/10.3969/j.issn.1000-3428.2008.22.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To the question of cache consistency problem in J2EE multi-tier application, the mechanism of maintaining cache consistency by using Oracle Data Change Notification(DCN) is proposed. It takes distribution resource planning system as an example, uses Java Caching System(JCS) in middle tier to cache database query results that are frequently accessed, and utilizes DCN in data layer to maintain cache consistency. The implementation technology is discussed. The case proves that the scheme is effective and feasible.
  • XU Chao; WANG Meng; HE Ting-ting; ZHANG Yong
    Computer Engineering. 2008, 34(22): 49-51. https://doi.org/10.3969/j.issn.1000-3428.2008.22.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Automatic summarization is an important issue in natural language processing. This paper proposes a new method for automatic summarization of Chinese text based on extracting sentences from subtopics. The document is segmented into several units in terms of the subtopics in the document. The most representative sentences in each subtopic unit are selected as the summary sentences. By analyzing semantic structure of the documents in advance, the summary sentences are not redundancy and the coverage of each subtopic is balanced. Experimental results show that the method is effective.
  • ZHENG Rong; MA Shi-long
    Computer Engineering. 2008, 34(22): 52-54. https://doi.org/10.3969/j.issn.1000-3428.2008.22.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The characteristics of data resources in seismological and geological industries are analyzed. Utilizing the data grid middleware OGSA-DAI, an XML-based heterogeneous data access and integration framework is presented, and it can provide data transparent access and fusion query. The system chooses XML as a common data model, utilizes the three-layer schema integration mechanism. XQuery is used as both the mapping language among XML schemas and the global query language, so that the global view construction and the query processing of the system are simplified.

  • DONG Lin
    Computer Engineering. 2008, 34(22): 55-56. https://doi.org/10.3969/j.issn.1000-3428.2008.22.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper improves predictive object points method and proposes a UML based metric to solve the problems of software estimation accuracy. Case model, sequence diagram and class diagram can be used to get software metric. The result proves this method’s precision increases by 5% compared with predictive object points, and subsystems have same deviation direction.

  • YI Xian-hui; PENG Li
    Computer Engineering. 2008, 34(22): 57-59. https://doi.org/10.3969/j.issn.1000-3428.2008.22.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    There are many common problems such as confusion and ambiguity in the visualization results. A new novel method ARVMiner for visualizing association rules is introduced, which uses three-dimensional coordinate to improve those existed visualization techniques. A system for visualizing association rules based on ARVMiner is implemented with Java 3D. The system is not only efficiently and orderly visualizes all kinds of association rules, but also filters the mined results by constraint condition.
  • HUANG Bin; YU Jian-xin
    Computer Engineering. 2008, 34(22): 60-62. https://doi.org/10.3969/j.issn.1000-3428.2008.22.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Improving the efficiency of flash memory garbage collection and prolonging the life time of flash-memory can be achieved by finding out hot data. A framework of hierarchical hot data identification is proposed, which can find out hot data from large data set by recording the hot data information at several different levels. Experimental result shows this method can identify and predict hot data from large data set with restricted resources.
  • XU Zhi-lin; LU Chao-jun
    Computer Engineering. 2008, 34(22): 63-66. https://doi.org/10.3969/j.issn.1000-3428.2008.22.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel method for data source management in a grid-based information integration system for huge volume of dynamic data. It includes an object-oriented metadata description specification, a data query mechanism and a schema integration strategy,, which can effectively solve the management problem of dynamic data sources in data gird. An effective class mining algorithm based on clustering technique is also used to optimize the performance.

  • RONG Yao; WANG Jian-dong
    Computer Engineering. 2008, 34(22): 66-69. https://doi.org/10.3969/j.issn.1000-3428.2008.22.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the lack of software foundation for predicting flight delay, a Web service to predict flight delay is designed and implemented. The effect to propagated flight delay of critical flight resources is analyzed, and a flight delay propagation model is created. Then the interfaces and algorithms of the Web service are designed and implemented. And a simulation analysis through front-end system that invokes the Web service is presented. It shows that the Web service offers an effective approach to quantitative analysis of flights delay.
  • MA Yi-ping; ZHUANG Yi; YE Yan-feng; ZHANG Xia
    Computer Engineering. 2008, 34(22): 70-72. https://doi.org/10.3969/j.issn.1000-3428.2008.22.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To improve the correct-rate and completeness-rate of search, a topic-specific meta-search engine is designed. A bogus crawler is invented, which collects information by the normal search engines, so that the search-area is wider than the normal search engine. The feedback mechanism is adopted and the search-history of user is considered, which make the search result is more imminent to the purpose of the user. Owing to the strategy of topic-specific and mending the arithmetic of similitude-degree of the texts, the correct-rate is improved. Both the correct-rate and completeness-rate of searching are improved, the response time is decreased as well, at the same time, the request of capability of the server is reduced.
  • HU Ren-long; YUAN Chun-feng; WU Gang-shan; PU Xiao-jia
    Computer Engineering. 2008, 34(22): 73-76. https://doi.org/10.3969/j.issn.1000-3428.2008.22.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    There are many on-line shopping Web sites on WWW, and commodity information in these Web pages can be extracted for E-commerce and Web-query. This paper presents an automated approach for Web information extraction against these Web sites. The approach finds the topic area by detecting repetitive patterns and analyzing the characteristics of topic area in a single Web page. There are no human interactions during extraction. The approach tests 10 on-line shopping sites and experimental results show that the approach is effective.
  • WANG Er-feng; CUI Du-wu; CHEN Hao; CUI Ying-an; FEI Rong
    Computer Engineering. 2008, 34(22): 77-79. https://doi.org/10.3969/j.issn.1000-3428.2008.22.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to resolve the mining problem of the quantitative association rule, a concept of similar attributes set matrix is proposed. In the meanwhile, a new algorithm of the quantitative association rules(Qarmasm) is proposed based on this concept. The algorithm does not need to expend attribution of tradition, and it has higher efficiency of reducing. It can produce pre-frequent itemsets and get support directly, and find frequent itemsets efficiently. The paper analyzes the complexity of algorithm and validates its validity, gives the application and contrast to indicate that this algorithm is much better than the traditional algorithm.
  • QIU Tao-rong; YUAN Xin-di; WEI Ling-ling; XU Su
    Computer Engineering. 2008, 34(22): 80-82. https://doi.org/10.3969/j.issn.1000-3428.2008.22.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characteristic of data stored in rough relational databases, one approach to index uncertain data is put forward. The values of attributes of tuples in rough relational databases are represented by binary string. Based on the improved formula of Hamming distance, the distance between tuples is calculated and a distance matrix is constructed. On the basis of the distance matrix, the tuples are classified and index of tuples is implemented. An algorithm for index of rough relational databases is described and illustrated by using a soil analysis example. The example shows that the proposed approach is useful and effective.

  • LIU Zhen-guo; JIANG Lie-hui; LIU Hui; ZHAO Zhao; ZHOU Wu-ming; WANG Ying
    Computer Engineering. 2008, 34(22): 83-85. https://doi.org/10.3969/j.issn.1000-3428.2008.22.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the net topology of FC-SW Storage Area Network(SAN), advances the I/O addressing flow in FC-SW SAN, and predicts the performance of storage subsystem in FC-SW SAN based on queue theory. It describes the impact on I/O response time made by disk cache hit rate, probability of read/write disk, and network FC switch performance.
  • QIN Qing-wen; WANG Ji; SUN Xu-guang; MEI Wen-hua
    Computer Engineering. 2008, 34(22): 86-88. https://doi.org/10.3969/j.issn.1000-3428.2008.22.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Binary program transformation has played an important role in reverse program analysis. This paper proposes a program transformation method. In the method, machine code is first disassembled by IDA Pro. Along with rules and optimizing strategies, the program is transformed to intermediate language. The deterministic finite automata and context-free grammars are designed to parse assembly language, and the code optimization theory is also included in dataflow analysis. The intermediate language has a good readability, generality and comprehensibility. After transformation, the code contracts dramatically. The technique described can run automatically, which effectively reduce the amount of time in solving software analysis problems and debugging executable programs. A transform instance using this technique is presented.



  • ZHU Bi-cen; XIA Qing-guo; ZHU Zheng-zhou
    Computer Engineering. 2008, 34(22): 89-90. https://doi.org/10.3969/j.issn.1000-3428.2008.22.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To resolve inefficiency of the polling approach, this paper focuses on three standard interfaces of WS-Notifications(WSN). It designs a grid service model based on WSN. Through the concrete steps, it implements the model using the notification based on the Globus Toolkit 4.0 platform. Experimental results show that the model is flexible and efficient.
  • TANG Ai-guo; WANG Ru-long
    Computer Engineering. 2008, 34(22): 91-93. https://doi.org/10.3969/j.issn.1000-3428.2008.22.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Focusing on the software project faced with failure risk problem, one kind of new software project risk assessment model is presented, it uses the Bayesian networks to infer the probability method which the risk occurres, uses the fuzziness language to appraise the risk consequence and the loss method. In particular, through using software project risk assessment model based on Bayesian networks, software enterprise risk management consciousness are reinforced, risk occurrence probability is reduced, and software development success rate is improved.
  • Networks and Communications
  • SHE Hua-jun; JIANG Kai-da
    Computer Engineering. 2008, 34(22): 94-96. https://doi.org/10.3969/j.issn.1000-3428.2008.22.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    There are many needs to know the existence of LAN in the management of big networks. Facing this problem, a technique to detect the existence of LAN in a large network is described, and the number of active hosts in the LAN is counted. The technique is based on the technology of packets capture. By processing the IP_SEQ, SRC_IP, SRC_PORT, DEST_IP, and DEST_PORT of the captured packets, those packets send from individual machines can be discriminated, and the number of machines can be determined. The implementation, tested on real network environment, can properly count the number of LAN in the network and the number of hosts behind a LAN, which demonstrates the feasibility of the algorithm.
  • HUANG He; WANG Ya-di; HAN Ji-hong
    Computer Engineering. 2008, 34(22): 97-99. https://doi.org/10.3969/j.issn.1000-3428.2008.22.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The advantages and drawbacks of some existed certificate revocation notification schemes in Ad Hoc network are analyzed, and a certificate revocation notification scheme based on subscription is proposed. When the node’s certificate state changes, the latest state of the certificate will be actively informed to all nodes which subscribe this certificate state in time. The identification of subscription and certificate state notification messages is implemented by using one-way Hash chain, and these messages are diffused with self-healing community method. Moreover, this scheme is realized by Jini technique. Experimental results show this scheme is effective.
  • RONG Feng; WANG Wei; LU Xiao-cui
    Computer Engineering. 2008, 34(22): 100-102. https://doi.org/10.3969/j.issn.1000-3428.2008.22.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Fragment and reassembly is one of the major functions in IP protocol layer. The principle of fragment and reassembly algorithm is introduced and the algorithm is implemented in RFC815 and Linux environment. A scheme to realize this algorithm in embedded environment is proposed and tested. Experimental results show this scheme is feasible.

  • XU Cheng; CAI Hong-ming; JIANG Li-hong
    Computer Engineering. 2008, 34(22): 103-105. https://doi.org/10.3969/j.issn.1000-3428.2008.22.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Massive data exchange among nodes is a bottleneck of deploying distributed visual steering systems. P2P Streaming becomes one of the solutions. Current P2P Streaming models are not suitable for such applications because they are short on real-time interactivity. Typical models and design improved model are analyzed by applying QoS concept and heuristic algorithm for P2P streaming. It is indicated by the result of simulations that new model is better than typical ones in metrics such as average delay and time to first package.
  • WANG Ruo-wen; ZHANG Yue-guo; LI Jian-hua
    Computer Engineering. 2008, 34(22): 106-108. https://doi.org/10.3969/j.issn.1000-3428.2008.22.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Network simulation is one of the most important means for the research of network equipments. This paper applies XML to the simulation of network equipments which are based on the MIB information. As a result, the network topology can be constructed on a certain scale, and the implementation of the simulation system which is capable of visualization and manipulation is in sight. Therefore this paper puts forward a new technique for the principles of network simulation and an economical solution to the teaching and research of computer network. Also it can provide an elaborate environment for the research of information security.
  • YUAN Jing-bo; SHI Hong-wei; DING Shun-li
    Computer Engineering. 2008, 34(22): 109-111. https://doi.org/10.3969/j.issn.1000-3428.2008.22.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the low efficiency and large consumption of P2P search software, a network topology structure based on physical location is presented combined with subnet mask technology. A directional query resource search algorithm(D-Searching) based on study is also introduced, which stores the latest resource information and hot information by inserting route index table into terminal nodes. Simulation results show this D-Searching algorithm achieves improvements in the messages, the average hop and query efficiency.

  • SUN Xue-mei; ZHANG Zhi-qiang; LI Chun-qing
    Computer Engineering. 2008, 34(22): 112-114. https://doi.org/10.3969/j.issn.1000-3428.2008.22.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the lack of extension of flat multicast routing protocols in Ad Hoc network of large scale, this paper proposes a multicast routing protocol based on hierarchical structure. The protocol refers to the advantages of fitness for high-speed movement of mesh-based on demand multicast routing protocol, and adopts an Enhanced Weighted Clustering Algorithm(EWCA) to manage its topology structure hierarchically. The simulation experiment proves that this protocol is suitable for Ad Hoc network of large scale.
  • XIANG Wang; WANG Zhi-wei; GAO Chuan-shan
    Computer Engineering. 2008, 34(22): 115-117. https://doi.org/10.3969/j.issn.1000-3428.2008.22.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of large-scale WLAN which using traditional architecture, this paper analyses the centralized WLAN architecture, and researches on the communication protocol. It introduces four protocols: LWAPP, SLAPP, CTP, WiCoP, then discusses the architecture, implementation mechanism, packet format and security of IETF’s CAPWAP protocol.

  • LIU Feng; LI Ming-lu
    Computer Engineering. 2008, 34(22): 118-120. https://doi.org/10.3969/j.issn.1000-3428.2008.22.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper combines the design ideas of Ad hoc On-demand Distance Vector(AODV) and Greedy Perimeter Stateless Routing(GPSR), and proposes Limited Flooding Routing based on Direction(LFRD). With the help of geographic information, LFRD improves AODV, and takes both advantages of the two protocols. It can obtain best route without any detour by flooding. On the other hand, while requesting route, limited flooding based on direction sharply reduces the RREQ packets and signal collisions so as to bring on high delivery ratio. LFRD’s feasibility is validated through simulations, and compared with AODV, it is better on the metrics of delivery ratio and protocol overhead.
  • YAN Hong; YA Wen
    Computer Engineering. 2008, 34(22): 121-123. https://doi.org/10.3969/j.issn.1000-3428.2008.22.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Message Handling System(MHS) is a foundational service which is used to adopt OSI X.400 and OSI X.500 protocols. But wireless communication network is a challenge for MHS. This paper prompts a framework design of MHS including protocol architecture and system composition, based on Standardization Agreement(STANAG) 4406 and Light weight Directory Access Protocol(LDAP). It discusses the transmission protocol, Allied Communications Protocol(ACP) 142, to guarantee the reliability of message transmission.
  • HONG Zhong; ; TANG Yi-zhu
    Computer Engineering. 2008, 34(22): 124-126. https://doi.org/10.3969/j.issn.1000-3428.2008.22.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Through the research on stream scheduling algorithms, the idea of quntization is introduced based on NSTF algorithm. A new algorithm called QNSTF is also proposed. This algorithm makes the quantized next schedule time as precondition, which makes a good balance between the efficiency and fairness. Simulation experimental result shows that QNSTF reduces the average waiting time while maintaining relatively low level in refusal radio and unfairness, and provides the customers with reliable service time guarantees. The algorithm improves the capability and performance of a VoD system.
  • YE Juan; LIU Ming
    Computer Engineering. 2008, 34(22): 127-128. https://doi.org/10.3969/j.issn.1000-3428.2008.22.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In wireless sensor networks, nodes closer to the base station are prone to die because of excessive flow, resulting in “hot spot” problem. This paper is based on ring belt model, through adding nodes to balance energy consumption among rings, which can reduce “hot spot” problem and efficiently prolong network lifetime. Moreover, the ring belt model can ensure minimum number of nodes for entire and seamless coverage.

  • YANG Qin; SUN Ting
    Computer Engineering. 2008, 34(22): 129-131. https://doi.org/10.3969/j.issn.1000-3428.2008.22.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    How to realize routing transmit efficiently is a key issue in network routing design. Based on the current cluster-based delamination routing mechanism, this paper proposes a routing transmit model, in which least-hop arithmetic is used in the built clusters. This arithmetic is easy and extensible. The nodes in the clusters can remember the transmitting nodes sets within one hop bound to transfer data to the head of cluster along shortcut. Simulation results show that it has better power saving performance and can prolong the lifetime of the network.
  • FAN Hong-yong; ZHANG Jin; Zhang Jia-jie; WANG Bin-qiang
    Computer Engineering. 2008, 34(22): 132-134. https://doi.org/10.3969/j.issn.1000-3428.2008.22.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Deskew and data reorganization are core difficulties of implementation of SPI4.2 interface within FPGA. According to the analysis of skew principle and data reorganization principle, the design and implementation solution based on FPGA is given, and the hardware schematics of key part are shown. The online test results prove that the solution can realize SPI4.2 interface functions.

  • CHENG Wei; YANG Shou-bao; WEI Dong; WU Bin; GUO Liang-min
    Computer Engineering. 2008, 34(22): 135-137. https://doi.org/10.3969/j.issn.1000-3428.2008.22.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on an improved Chord routing model, this paper introduces hierarchical classification and designs a P2P file sharing mechanism named CTI-Chord. Using efficiently positioning method, CTI-Chord employs the category tree, which is the kernel structure as well as the innovation of CTI-Chord, to solve the problem of the disorder information management in P2P network and forms a novel information network framework. The distribution, acquisition and update of information is not based on key but property, which can support fuzzy search. In addition, due to the reconstruction of category tree, users can download their interesting subtree, assemble their category tree and customize individual share information.

  • SHI Xiang-bin; LOU Pei-li; DU Ling; BI Jing; XIA Xiu-feng
    Computer Engineering. 2008, 34(22): 138-139. https://doi.org/10.3969/j.issn.1000-3428.2008.22.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A packet aggregation mechanism for P2P Massively Multiplay Online Game(MMOG) is proposed, which aggregates game packets into a single packet based on game interactivity threshold and aggregation threshold. The number of transmissions for data packets and the load caused by the header of packets are reduced. Moreover, an analysis method is developed to evaluate this aggregation mechanism in terms of the average aggregation degree and aggregation latency. Experimental results show this aggregation mechanism saves bandwidth and satisfies the real-time requirement of P2P MMOG.
  • WU Ya-jun; HU Ai-qun; SONG Yu-bo
    Computer Engineering. 2008, 34(22): 140-142. https://doi.org/10.3969/j.issn.1000-3428.2008.22.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Existing Wireless Local Area Network(WLAN) protocol analysis systems use mostly PC-based single-point mode. These systems have to be operated by the administrators on the spot. It can bring about many defects such as small range, less flexibility and so on. This paper presents a distributed multi-point analysis architecture, in which not only one WLAN is analyzed by placing several data collecting devices at the same time. Data collecting devices can be controlled remotely by the administrator via CDMA2000 network. The methods of analyzing WLAN protocol, the design and implementation of the data collecting device are also described in this paper. Test results prove that this device can collect WLAN communication information effectively. This system can be applied in many circumstances such as security protection and network monitoring.
  • LIU Wen-wen; MA Rui; XU Hai-bin
    Computer Engineering. 2008, 34(22): 143-144. https://doi.org/10.3969/j.issn.1000-3428.2008.22.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Energy of nodes is exhausted unbalancedly due to many-to-one data stream in wireless sensor network, which influences the network fairness and reduces its life span. An improved AODV scheme is put forward. By the alteration of RREQ protocol packets, the reserved energy of nodes is transported to the route and the flood transmission is also optimized. The simulation by J-Sim illustrates this scheme can effectively balance all the nodes’ energy, amend the unbalanced problem of network flux, and prolong the network lifetime.

  • SHI Hao; WANG Zheng
    Computer Engineering. 2008, 34(22): 145-147. https://doi.org/10.3969/j.issn.1000-3428.2008.22.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    When networking communication with frequency hopping technology, there exists many problems caused by the collision conflict, the longer network time, address conflicting, and timeliness reduces. In order to solve these problems, this paper proposes an allocation model based on the family derived tree and the corresponding degradation algorithm, which adopts synchronized non-orthogonal network method and the dynamic allocation model. Using this model can avoid collisions conflict effectively, enhance the network healthy and the working efficiency, and bring the convenience for the network system auto-adapted expansion and the degeneration.
  • ZHANG Zhi-long; DU Xue-hui; QIAN Yan-bin
    Computer Engineering. 2008, 34(22): 148-149. https://doi.org/10.3969/j.issn.1000-3428.2008.22.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the solution about the compatibility between IPSec and Network Address Translation-Protocol Translation(NAT-PT) in IPv4/IPv6 interim, and puts forward an enhanced IPSec application solution in segments. It increases the discovery and automatic mechanism through the improvement to IKE protocol, and improves the transparence of the NAT-PT translation gateway. The performance analysis shows that it is more secure and flexible, and is convenient for the implement of security strategy in transition network.
  • Security Technology
  • LIU Pei-shun; WANG Xue-fang; LAN Shun-guo
    Computer Engineering. 2008, 34(22): 150-152. https://doi.org/10.3969/j.issn.1000-3428.2008.22.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Identity-Based Cryptographic(IBC) schemes are considered to secure Ad Hoc networks due to their efficient key management properties. However, proposed schemes do not provide efficient mechanisms for identity authentication. In order to solve this problem a new key management scheme is promoted combining with identity-based and password authentication in this paper. The peer identity is identified by password in Ad Hoc networks. It shows that identity-based key management schemes are effective and efficient for key distributing. The formal proof of its security is presented based on the ROM model.
  • HAN Jing-jing; XU Zhong-wei; YU Gang
    Computer Engineering. 2008, 34(22): 153-155. https://doi.org/10.3969/j.issn.1000-3428.2008.22.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The safety requirement of software is not considered completely in component composition, so it maybe bring on failure of the software. While ensuring the functionality requirement of its basic component, this paper uses the time constraints to satisfy its safety requirement after component composition. According to the strict temporal logic, the states transition of this system can avoid the fault effectively.


  • CHEN Bin-bin; WU Qing-bo; WEI Li-feng
    Computer Engineering. 2008, 34(22): 156-158. https://doi.org/10.3969/j.issn.1000-3428.2008.22.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Kernel level rootkit is the main threat that breaks kernel integrity, which breaks into kernel often through loading a loadable kernel module or patching files that will be loaded into kernel memory. Confronted of such a threat, this paper presents a defense model. From integrity validation in bootstrap to loadable kernel module verification when system is running, the whole process starts from a trusted root, transfers by a trust chain, and one stair attests next stair to guarantee the whole process trustful. The model’s performance expense is analyzed.
  • KANG Xin-zhen; WANG Zhen-yu; XU Rui
    Computer Engineering. 2008, 34(22): 159-161. https://doi.org/10.3969/j.issn.1000-3428.2008.22.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper shows that the Trusted Computing Group(TCG) command validation protocols are exposed to a Dolev-Yao Man in The Middle(MiTM) attack, which will tamper with the security and the trustworthiness of the entire system. In order to avoid such attack, this paper proposes a countermeasure which makes an effective way through which the caller and TPM can well understand the session state of each other.

  • CUI Ying-an; CHEN Hao
    Computer Engineering. 2008, 34(22): 162-164. https://doi.org/10.3969/j.issn.1000-3428.2008.22.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a solution of the integrated operation system security of commercial bank in data concentration environment. It introduces the framework of information security system, the main function and some key technological problems, including the design and implementation of hierarchy key management, Data Authority Code(DAC), Message Authority Code(MAC) and so on. The solution has been successfully implemented in N21-Core Bank countrywide of a large-scale commercial bank and runs well.

  • CHEN Xu; XU Zhong-wei; YU Gang
    Computer Engineering. 2008, 34(22): 165-167. https://doi.org/10.3969/j.issn.1000-3428.2008.22.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Safety is an important attribute of safety-critical software. The technology based on traditional component can not suit safety-critical software development request. Safety-component is a special component having functionality and safety request. This paper proposes a method for safety-component modeling using Colored Petri Net(CPN) and arithmetic for component compositing based on this model. The model is used to ensure system satisfy relevant safety-require. It is used in CTCS-2 Train Control Center (TCC) modeling.

  • SUN Ji-feng; YUAN Chun-lin; SHENG Yan-qing; LIU Bin
    Computer Engineering. 2008, 34(22): 168-170. https://doi.org/10.3969/j.issn.1000-3428.2008.22.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the features of frequently accessing memory, recurrent execution and the minimum/maximum loop boundary decided by input length in a cryptography algorithm, this paper proposes an instruction set architecture, including corresponding hardware realization of five pipeline stages. It designs and implements an entire co-processor including hardware and software implementation. Experimental results indicate that there are characters of excellent structure and function in the co-processor.
  • LIU Hong-jiang; SANG Nan; LUO Hui-qiong
    Computer Engineering. 2008, 34(22): 171-173. https://doi.org/10.3969/j.issn.1000-3428.2008.22.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Considering the distance constraint of wireless communication, it is very difficult to detect malicious node with high speed in Wireless Mesh Networks(WMNs). This paper proposes an intrusion detection model based on detection information exchange for WMNs. Based on most of mesh routers in WMNs with minimal mobility, this model uses the method of exchanging intrusion information among mesh routers to detect malicious Mesh routers with high speed.
  • CHEN Bo; LI Ming-chu; REN Yi-zhi
    Computer Engineering. 2008, 34(22): 174-176. https://doi.org/10.3969/j.issn.1000-3428.2008.22.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Effectively preventing dishonest entities access to local resources is always one of the main issues in trust management. Most existing training credential chain discovery methods ignor the trust level between two entities. This paper proposes a modified credential chain discovery algorithm based on trust worthiness. This algorithm uses threshold of trust worthiness from another sidee to shield dishonest user. Experimental results show that modified algorithm takes more consideration for dishonest user, which conforms to the fuzziness of trust relationship between entities in open environment, and also strengthens the system’s security.
  • XIE Yong; LAI Xue-jia; ZHANG Xi-zhe
    Computer Engineering. 2008, 34(22): 177-178. https://doi.org/10.3969/j.issn.1000-3428.2008.22.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The Extensible Firmware Interface(EFI) specification provides a standard environment for the program before booting an OS. This paper proposes a Dual-core EFI-based Security Architecture(DESA). EFI is a secure domain that is physically and logically separate, and performs several security components services such as real-time monitoring, co-processing and auditing. A prototype for virtual disk’s secure access and real-time monitor is designed and implemented. Experimental results show that DESA can enhance performance and security improvements, and provide security services for OS with low performance cost.


  • XU Xiao-dong; YANG Hai-liang; ZHU Shi-rui
    Computer Engineering. 2008, 34(22): 179-181. https://doi.org/10.3969/j.issn.1000-3428.2008.22.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is inefficient to judge whether SYN flood happens by using the ratio between SYN packets and total TCP packets. Normal network traffic has the characteristic of heavy-tailed, and it is hard for SYN flood attack to fabricate the same distribution as that of normal network traffic. This paper presents a method to detect it by combining the ratio between SYN packets and total TCP packets and heavy-tailed distribution of network traffic. Experiment with the dataset of MIT Lincoln Laboratory shows that the method can detect SYN flood attack quickly and has higher detection efficiency.
  • CHEN Yang; ZHU Yue-fei; MEI Qiang
    Computer Engineering. 2008, 34(22): 182-183. https://doi.org/10.3969/j.issn.1000-3428.2008.22.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The mechanisms which proctect the stack in Windows Vista make it more difficult to exploit a stack overflow vulnerability. This paper analyzes three mechanisms which are close to exploiting stack overflow in Windows Vista. They are stack overflow detection, SAFESEH and Address Space Layout Randomization(ASLR). In allusion to a real vulnerability it analyzes Windows Vista’s ability of resisting the stack overflow being exploited, and gives the improved methods.
  • LI Hui; HOU Yi-bin; HUANG Zhang-qin; HE Fu-gui; CHEN Rui
    Computer Engineering. 2008, 34(22): 184-186. https://doi.org/10.3969/j.issn.1000-3428.2008.22.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a security authentication server system based on parallel computing, and it gives the system’s algorithm model. The authentication server environment uses the parallel master-slave mode. The privacy segment is saved in the physical nodes in accordance with sub-private key. The master node controls certification process as well as distributing private key from the node. The slave node preserves key and private key calculation. The prototype system is realized based on the algorithm model, and the safety program is evaluated. Results show that the method has a strong anti-attack capability, speed certification and stability of the structure characteristics.
  • XIA Chao; QIU Wei-dong
    Computer Engineering. 2008, 34(22): 187-188. https://doi.org/10.3969/j.issn.1000-3428.2008.22.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a method to detect buffer-overflow vulnerabilities for executables. Combining dynamic analysis and static analysis, it makes further detection of buffer-overflow vulnerabilities. Static methods mainly deal with the internal semantic relationship of assembly instructions and the properties of a function’s stack frame for executables. Dynamic emulation provides a virtual run-time environment, which enables the program to combine its static properties while virtually executed, and then it can get the function’s semantic results on buffer manipulation, and determine whether there is a buffer-overflow vulnerability.
  • WANG Yu-hui; CHEN Hao-peng
    Computer Engineering. 2008, 34(22): 189-191. https://doi.org/10.3969/j.issn.1000-3428.2008.22.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The complexity and mass-transfer of XML documents of Rich Interntet Application(RIA) technology become its development obstacle. By improving the transfer mode called asynchronous XML-RPC of traditional RIA, a new transfer framework for RIA is proposed according to the compression and encryption XML. This framework makes the information transfer more efficient and secure. It is also extendable.
  • LI Yong-qiang; WANG Hai-hang
    Computer Engineering. 2008, 34(22): 192-194. https://doi.org/10.3969/j.issn.1000-3428.2008.22.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes the wireless Man In Middle(MIM) framework, which actively proves the vulnerability of MIM by applying the MIM technique in WLAN environment, whose security is applied with 802.1X and Extensible Authentication Protocol(EAP). It describes the design of the required functions and modules, proposes that it is possible to collect WLAN authentication information of the unauthorized user by using the wireless MIM framework under the EAP-MD5 and EAP-TTLS environment.
  • YANG Hong-qiao; WU Fei; LIU Yu-shu
    Computer Engineering. 2008, 34(22): 195-197. https://doi.org/10.3969/j.issn.1000-3428.2008.22.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the requirement of secure information exchange under the condition of network isolation in Hospital Information System(HIS), this paper researches the application on secure data exchange technology in HIS, and realizes a LIS result query system with the technology, which solves the problem of secure data publishing through outer network. Expectation about the foreground of using secure data exchange in HIS is given.

  • Artificial Intelligence and Recognition Technology
  • PENG Jun-jian; LIU Ji; GENG Yan-feng; HAN Jian-da; TANG Yan-dong
    Computer Engineering. 2008, 34(22): 198-200. https://doi.org/10.3969/j.issn.1000-3428.2008.22.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In region-based stereo matching algorithm, the ambiguity parts, which can not be optimized by WTA, normally are considered as error matches and are discarded. This paper presents a novel approach based on epipolar line segment. It adopts 1-D region as match unit and introduces occlusion and smooth terms to construct a new match cost function, density disparity map can be obtained in virtue of static and dynamic matching strategy. Experimental results validate the algorithm to textureless regions and real-time.

  • WANG Ling-juan; WEI Cheng-jian; LI Cheng-xiang
    Computer Engineering. 2008, 34(22): 201-203. https://doi.org/10.3969/j.issn.1000-3428.2008.22.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To combine the advantages of Self-Organizing Migrating Algorithm(SOMA) and Society Cognitive Optimization(SCO), two parameters are used in the optimization to put SOMA process in SCO, resulting in a good improvement. Large number of experiments have been done and two parameters have been chosen which fit the algorithm most and perfect it. Although it causes a slight effect to the optimization solution, the improved optimization algorithm puts the convergence speed to a more quickly level.
  • CAO Zhi-Jiang; HAO Kuang-rong; DING Yong-sheng;
    Computer Engineering. 2008, 34(22): 204-206. https://doi.org/10.3969/j.issn.1000-3428.2008.22.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new approach of body contour extraction is raised in this paper. The ideal edge map is derived from edge detection with embedded confidence. Imprecise contour is extracted based on morphological image analysis and it is used as the GVF-Snake model’s initial contour. And an optimized GVF-Snake model is used to extract precise contour. The result from comparative experiment of extracting contour of human body shows that described approach has a good effect and practicability.

  • LI Jing; HUANG Shuang; ZHANG Bo
    Computer Engineering. 2008, 34(22): 207-209. https://doi.org/10.3969/j.issn.1000-3428.2008.22.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new algorithm which can assess the pronunciation quality of the English spoken by Chinese students. The new algorithm uses Gaussian Mixture Model(GMM) and Universal Background Model(UBM), which is successfully used in speaker verification. It calculates the duration normalized log-likelihood ratio of each phone as phonemic pronunciation scores. It combines each phonemic score to obtain the overall pronunciation quality. The algorithm is evaluated by using a corpus of non-native speech. Experimental results show that the approach outperforms other assessment algorithms on correlations with expert scores at the sentence level. In the test database, this method obtains high correlation(0.700).
  • YI Hai-lun; WANG Qing
    Computer Engineering. 2008, 34(22): 210-212. https://doi.org/10.3969/j.issn.1000-3428.2008.22.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Under the framework of L1-norm based Super-Resolution Reconstruction(SRR), by introducing a method for automatically estimating regularization parameter, a SRR method based on mixture prior model is proposed according to difference image statistics combined with probability distribution model. Experimental results indicate the proposed approach which results in good robustness and effective convergence outperforms the old one.
  • XIAO Jin-jie; XIE Qing-song; LIU Xiao-hua
    Computer Engineering. 2008, 34(22): 213-214. https://doi.org/10.3969/j.issn.1000-3428.2008.22.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses approximation greedy algorithm for K-median and its property in actual computation. It presents a greedy algorithm for K-median and then proves that the approximation ratio of the greedy algorithm is at most O(ln(n/k)). The test data shows that the greedy algorithm can get good results in actual computation and about 90% clients can be serviced by the facility whose distance to the client is the 1st, 2nd, 3rd.

  • QU Zhao-yang; GAO Yu-feng; NIE Xin
    Computer Engineering. 2008, 34(22): 215-217. https://doi.org/10.3969/j.issn.1000-3428.2008.22.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In view of inherent insufficiency of traditional network fault diagnoses expert system in the aspect of knowledge acquisition, together with the characteristics of decision tree algorithm and expert system, this paper puts forward a new network fault diagnoses expert system model based on decision tree, discusses the reasoning mechanism, the reasoning algorithm, and the method of knowledge acquisition of the model. Experimental results demonstrate that this model has the characteristics of simple process, low computation complexity and strong adaptability.


  • DING Li-hua; ZHANG Xiao-gang
    Computer Engineering. 2008, 34(22): 218-219. https://doi.org/10.3969/j.issn.1000-3428.2008.22.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A learning incremental Bayesian classifier algorithm based on class support is presented. In the sample selection process of the incremental learning algorithm, a kind of support factor λ is introduced. According the size of λ, the samples are selected from test sample aggregation and are joined in the classifier gradually. The experiments show that this algorithm has higher precision compared with simple incremental Bayesian classifier with small training data set and it can reduce largely the computing time that costs in samples optimal selection in incremental learning.
  • HU Qin; WANG Wen-zhong; XIA Shi-hong; LIU Ren-ren; LI Jin-tao
    Computer Engineering. 2008, 34(22): 220-222. https://doi.org/10.3969/j.issn.1000-3428.2008.22.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper researches the key technologies of human motion capture. A robust self-corrected tracking method is presented in this paper. This method combines Kalman filter technology, the smooth of point’s track and multiple cameras’ epipolar geometry to track points. This method is used in 3D human gait motion capture, and is implemented in a gait capture system based on markers and multiple cameras. The effectiveness of this method is verified by experiments.

  • YU Wei-jun; Askar; LUO Wan-fu
    Computer Engineering. 2008, 34(22): 223-225. https://doi.org/10.3969/j.issn.1000-3428.2008.22.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the Bayes weak point moving target tracking technology by using probabilistic data associated with the Kalman filter method, which is based on position, velocity information. The key is in the region of tracking, detector works in Basyes mode, detection threshold changes with goal’s priori probability change. A new threshold calculation is proposed. Based on CFAR(CFAR probability) guidelines tracking technologies, the process of detection to track the number of false alarm target is decreased. Simulation results show that it is a real-time and accurate algorithm.
  • ZHENG Wei-ping; QI De-yu; XIANG Jun; XU Ke-fu
    Computer Engineering. 2008, 34(22): 226-228. https://doi.org/10.3969/j.issn.1000-3428.2008.22.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Current adaptive Websites seldom consider adaptability towards user environment. For this reason, a new concept is presented about user-context adaptive Website and its architecture based on multi-Agent technology. Related Agents and interactions in user-context collecting, mining, and Website transformations are fully discussed. Policies for recommendation and presentation transformations are given according to network bandwidth and terminal screen size from client environment. A prototype Web store for furniture is setup using this architecture.
  • WU Bo; ZHAO Yin-di; ZHOU Xiao-cheng
    Computer Engineering. 2008, 34(22): 229-230. https://doi.org/10.3969/j.issn.1000-3428.2008.22.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An endmember constrained Nonnegative Matrix Factorization(NMF) method for mixture pixels unmixing is proposed. A penalty function imposed by maximizing difference between endmembers among all possible simplexes is presented in the image. The maximum posterior probabilistic method is utilized to formulate a novel iterative algorithm by trading off abundance nonnegative attribution and endmember difference. Experimental result with PHI data shows the proposed algorithm is an alternative approach for endmember abstraction and abundance estimation. Comparison with IEA validates the efficience of the proposed method.
  • OUYANG Lei; HUANG You-rui; HUANG Yi-qing
    Computer Engineering. 2008, 34(22): 231-233. https://doi.org/10.3969/j.issn.1000-3428.2008.22.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A kind of intelligent PID controller based on fuzzy RBF neural network is proposed to the problem that traditional PID controller is difficult to achieve good control effect because of the fixed parameters. This method includes the reasoning ability of fuzzy control and study ability of neural network. Fuzzy control and RBF neural network are applied in order to adjust the parameters of PID online to a group of kp, ki and kd which is matching the plant best. Simultaneously the algorithm is applied to electro motor control system PID for parameter optimization. The simulation result shows that the PID controller greatly improves dynamic quality of electro control system.
  • Engineer Application Technology and Realization
  • LIU Zhi-hua; YOU Zhi-qiang; ZHANG Da-fang; CHENG Yong-sheng
    Computer Engineering. 2008, 34(22): 234-235. https://doi.org/10.3969/j.issn.1000-3428.2008.22.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With regard to the multiple scan inputs in practical circuit, a new multiple scan tree structure is designed, which reduces the test application time and average test power consumption. Experimental results show the test application time of this scheme is reduced up to 52.4% and the average power consumption is reduced up to 60.8%, when there are two scan inputs.
  • 黄清泉;洪 沙;吴垣甫;
    Computer Engineering. 2008, 34(22): 236-238. https://doi.org/10.3969/j.issn.1000-3428.2008.22.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The mechanism of task priorities assignment in Real Time Operating System(RTOS) for master devices is added, and the arbitrate policy of arbiter based on Monte Carlo methods is implemented. Moreover, various memory models for slave devices are also set up. The whole model of bus system is completed at transaction level by using SystemC. Simulation results illustrate this arbitrate algorithm is effective.
  • WANG Zhen-yu; LIU Xin-jie; REN Jie; LIU Hai-lei; WU Jie
    Computer Engineering. 2008, 34(22): 239-241. https://doi.org/10.3969/j.issn.1000-3428.2008.22.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper discusses the key problems to build embedded trusted computing environment, such as embedded trusted boot process, the extension and driver design of TPM, embedded TSS and trusted security component. The embedded trusted boot process is able to ensure the trusted attestation among users, terminals and application by making a combination of BR, USBKey and TPM. The scheme is able to make embedded platform more secure, practical and reusable.

  • HUANG Rui; FU Yu-zhuo; ZHAO Feng
    Computer Engineering. 2008, 34(22): 242-244. https://doi.org/10.3969/j.issn.1000-3428.2008.22.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on how to realize triangle rasterization, and enhance the speed of triangle rasterization, a triangle raster algorithm which integrates clipping and filling is presented. The scan and sample algorithm is independent in this algorithm. The different sample algorithms can be used in different applications. The algorithm is realized on Xilinx Virtex 2P XC2VP30 FPGA. The experimental results show that the implementation can raster a triangle (an equilateral triangle which edges 5 pixels) in about 2 500 ns.
  • Developmental Research
  • LONG Kai-wen; FU Yu-zhuo
    Computer Engineering. 2008, 34(22): 245-246. https://doi.org/10.3969/j.issn.1000-3428.2008.22.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Interrupt handling strategy is one of main factors influencing characteristic of system-level dynamic binary translator system. Based on the performance analysis of passive interrupt handling strategy, this paper presents a proactive strategy to handle interrupt which occurs at the translated code’s execution stage. This strategy is also implemented. Experimental results show that the proactive strategy advances over the
    passive one.
  • WU Zi-xing; PAN Mao; QU Hong-gang; ZHU Lei
    Computer Engineering. 2008, 34(22): 247-249. https://doi.org/10.3969/j.issn.1000-3428.2008.22.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Urban geological information management and service system is a 3D Geographic Information System(GIS) oriented to the urban geology domain. The functional and unfunctional requirements in this domain are analyzed, including the integrated management of multi-kind and multi-source data, spatial data visualization, basic and professional data analysis, Web application, data sharing and service and security & certification. Based on the requirements specification, several common software architecture patterns such as C/S, B/S, Pipe-and-Filter and work flow are discussed to find out how each pattern fits to the system architecture. Moreover, the scheme of system architecture with mixed 3-tier C/S pattern and B/S pattern is proposed, in which the components are reused at a high degree. Experimental results show this scheme is feasible.
  • ZHANG Peng-ju; CHEN Kun-chang; LI Ren-wang; ZHANG Zhi-le; YANG Gui
    Computer Engineering. 2008, 34(22): 250-252. https://doi.org/10.3969/j.issn.1000-3428.2008.22.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the structure and running property of automatic storage and retrieval system, this paper proposes a simulation platform based on Virtual Reality(VR). The design and implementing means of this platform is discussed. Path optimization methods of solid warehouse laneway-stacker are studied after dispersing the warehouse’s running fashion. The analysis and simulating of arithmetic are accomplished. The practicability and validity of the simulation platform are verified by an instance of simulation platform which is in possession of immersion, interaction and imagination.
  • XING Chong; FU Yu-zhuo
    Computer Engineering. 2008, 34(22): 253-255. https://doi.org/10.3969/j.issn.1000-3428.2008.22.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the coexistence of several address space in system-level binary translation, this paper presents 2 code Cache index methods using virtual-address index and physical-address index. Physical-address index helps to share translated code Cache between processes. Experimental results show that physical-address index achieves better performance than virtual-address index in multi-process environment.
  • AI Ju-mei; ZHOU Shu-min; PENG Jian
    Computer Engineering. 2008, 34(22): 256-257. https://doi.org/10.3969/j.issn.1000-3428.2008.22.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the current WAP restricted bandwidth and a great amount of payment, this paper proposes a design of the mobile search based on Multimedia Messaging Service(MMS) and Web GIS. The design regards Web GIS as the spatial information engine, takes MMS 7.0 and CMPP3.0 as communication protocols, realizes Chinese index and segmentation based on Lucene as technological frame, and sets up the mobile spatial information search platform. It can accept the search information from mobile users and make the search result as the spatial information and send to subscribers by way of multimedia message. Experimental result shows that this scheme is feasible, and reduces the search cost effectively.
  • LI Hai-yan; ZHANG Chun-yuan; LI Li; REN Ju
    Computer Engineering. 2008, 34(22): 258-260. https://doi.org/10.3969/j.issn.1000-3428.2008.22.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Graphics Processing Unit(GPU), which has powerful stream computing capability, makes itself as an efficient scheme for real-time stream applications. This paper abstracts a stream execution model of GPU, describes its stream execution process, and implements the discrete cosine transform on GPU. Experimental results show that the coding efficiency of standard definition video compression on GPU can reach 70 fps.
  • NI Xiao-fan; NIU Ji-zhen; WANG Fan
    Computer Engineering. 2008, 34(22): 261-262. https://doi.org/10.3969/j.issn.1000-3428.2008.22.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A QoS constrained service discovery model QCSLP is proposed. An entity of QM is designed in the existing Service Location Protocol(SLP) working pattern based on DA to mainly support the calculation and feedback of QoS. The conception of QoS standardization and integration is imported and the mechanism of QoS feedback is adopted in the QM entity. Experimental result shows that QCSLP can help user find services that meet the service requests of type and attribute, and the service requests of QoS at the same time in the simulation environment of LAN including 6 entities.
  • WANG Zhong-ming; CAI Li-min
    Computer Engineering. 2008, 34(22): 263-265. https://doi.org/10.3969/j.issn.1000-3428.2008.22.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An information regulation is a foundation to realize the mutual operation between equipments of different type, equipment information management and maintenance. This paper establishes the framework of information description in home network with reference to objects and servers of BACnet protocol. It adopts XML pattern to universe the information description of different digital equipment. Experiments prove that using the XML document according with this pattern to store equipment information can combine the display and dispose of information efficiently, and simplify the system realization and information management.
  • HAN Xia-lin; ZHAO Wei-dong; JI Jun; WEI Gang; LIU Xian-hui;
    Computer Engineering. 2008, 34(22): 266-267. https://doi.org/10.3969/j.issn.1000-3428.2008.22.094
    Abstract ( )   Knowledge map   Save
    The general situation and basic principle of Radio Frequency Identification(RFID) technology are introduced, according to which the nearest neighbor algorithm for indoor location system LARNDMARC based on RFID is proposed. Some factors influencing the positioning accuracy are taken into account. Moreover, an improved nearest neighbor algorithm is presented. It is proved this enhanced algorithm achieves better positioning accuracy than the existed one by conducting simulation methods.
  • JING Bo; LIU Ying; HUANG Bing
    Computer Engineering. 2008, 34(22): 268-270. https://doi.org/10.3969/j.issn.1000-3428.2008.22.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The workflow is very important in enterprise information system. Irrational workflow not only leads to an awful operation of enterprise, but also limits the executive of business strategy. The algorithm uses the frequency of workflow, the concept of distance-based outlier detection, empirical rule and method of exhaustion to mine three types of workflow outlier, including less happened workflow outlier of each process(abnormal workflow of each process), less happened workflow outlier of all processes(abnormal workflow of all processes) and never happened workflow outlier(redundant workflow).
  • TANG Lun; CHEN Qian-bin; ZENG Xiao-ping; LI Yun
    Computer Engineering. 2008, 34(22): 271-273. https://doi.org/10.3969/j.issn.1000-3428.2008.22.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Ubiquitous network is an open, large-scale and complex system, facing up many questions, such as local autonomy, heterogeneous, complexity and chaos. This paper designs an ubiquitous network architecture based on social network analysis and a network simulation platform, speciously focuses on management, organization and cooperation of social network analysis, uses Multi-Agent technology to design architecture, simulation platform, virtual organization, agent acting as manager or worker, and uses the XML to expend the KQML and develops some software packages for the new ubiquitous network architecture. Simulations of complex services and applications of ubiquitous network on the platform can be done.
  • KONG Xiang-yan; CHEN Liang-liang; CHENG Tian-tian; LI Yun-fei
    Computer Engineering. 2008, 34(22): 274-276. https://doi.org/10.3969/j.issn.1000-3428.2008.22.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at overcoming the following problems: the present virtual instrument hardware system is giant, which is hard to satisfy the application need in particular condition, and the software design can not get rid of the dependence on hardware, this paper proposes an embedded virtual instrument design method, which primarily realizes the minimization of virtual instrument hardware and component-based software, makes the instrument have better stability, interoperation, extensibility and maintainability. The application of this virtual instrument on the inverter test system verifies the feasibility and effectivity of this method.

  • ZHANG Feng-chuan; MIAO Yu-bin; LIU Yin-feng; LI Lian-feng
    Computer Engineering. 2008, 34(22): 277-279. https://doi.org/10.3969/j.issn.1000-3428.2008.22.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the actual condition of public traffic communication management in China and the present situation of GPS technology development, a new intelligent transportation monitoring system is developed. The structure and operation principle of the system are introduced. The design of hardware and software for the main modules, transportation protocols, and the implementation of GIS are given. Experimental results prove that the system is with high precision for information collection, high efficiency and stability for information transportation.
  • LI Zhi-sheng; SUN Yue-heng; HE Pi-lian
    Computer Engineering. 2008, 34(22): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2008.22.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    There are two main deficiencies in the existing methods based on pattern: the amount and reliability of patterns are restricted by the training set, and the methods for scoring patterns and candidate terminologies are too simplified. This paper introduces self-training study mechanism into terminology translation system. This system accomplishes initial study in a pair of terminologies stuff, and selects a more reliable candidate automatically which is retrained in practical running. It adds the model scoring into this system, and improves the method of scoring the candidate terminologies by applying heuristic rules. Experimental results indicate that the improved system has higher performance than the existing systems.
  • DENG Lei; CHEN Zhi-gang; HUANG Jian; QIU Liang
    Computer Engineering. 2008, 34(22): 283-285. https://doi.org/10.3969/j.issn.1000-3428.2008.22.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Through introducing Aspect-Oriented Programming(AOP), this paper proposes a new intelligent Web cache framework ABWC. It describes in structure and principle of ABWC and discusses transparency, consistency, replacement algorithm, prefetching policy and other main problems which need to be solved in cache designing. Significance testing and analysis in it validates that this cache framework can improve the performance of Web application system significantly.