Author Login Editor-in-Chief Peer Review Editor Work Office Work

05 November 2008, Volume 34 Issue 21
    

  • Select all
    |
    Degree Paper
  • QU Hai-ping; WANG Xiu-wen; DONG Yu-min; FENG Shuo; SONG Chun; XU Lu
    Computer Engineering. 2008, 34(21): 0-3.
    Abstract ( ) Download PDF ( )   Knowledge map   Save
  • WANG Xiu-wen; FENG Shuo; QU Hai-ping; XU Lu
    Computer Engineering. 2008, 34(21): 4-6. https://doi.org/10.3969/j.issn.1000-3428.2008.21.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the expansion of enterprise scale, there exist management systems implementing different management architecture. It is necessary to integrate and interact in an open and shared way. This paper concentrates on storage domain, and presents a common open management architecture based on standard information model and function model. Through the share of management information and management behavior, the series of Bluewhale storage system is integrated, and the interaction is realized.
  • YU Wan-jun; LI Qian-qian; ZUO Guo-ming; HU Zhao-wei
    Computer Engineering. 2008, 34(21): 7-9. https://doi.org/10.3969/j.issn.1000-3428.2008.21.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper analyzes the problems of implicit places and implicit transitions. In view of the shortage of α algoritm to resolve the implicit problems, α+* algorithm is presented. In this algorithm, the implicit tasks are marked in another style, the model are constructed by the dependency of the tasks. It uses CPN Tools to general log files and mines the logs by ProM and α+* algorithm. The simulation results validate the efficiency of the algorithm.

  • LI Xiao-feng; SHI Jin-fei; YAN Wei-wu
    Computer Engineering. 2008, 34(21): 10-11,2. https://doi.org/10.3969/j.issn.1000-3428.2008.21.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the minimum Makespan scheduling problem of Hybrid FlowShop(HFS), this paper proposes a tabu search algorithm in varying neighborhood approach based on critical path theory, and its key technic is discussed. To prevent the algorithm from tripping in local optimal solution, the concept of adjacent neighborhood is proposed. If it cannot improve solution, tabu search will search adjacent neighborhood of moves by using the change neighborhood search strategy. Simulation results show that this algorithm can get a better solution than other algorithms.
  • XIA Xiu-feng; XIE Guang-yu; SHI Xiang-bin; XU Lei
    Computer Engineering. 2008, 34(21): 12-14,1. https://doi.org/10.3969/j.issn.1000-3428.2008.21.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is a hot topic to detect and dispose the exceptional data in the field of data-cleansing operation of data warehouse system. After analyzing the current detection technology, a detection method of the deviated group data based on confident interval is proposed, in which an effective stylebook is screened out from the group data, a credible stylebook is found from the effective stylebook using a genetic arithmetic, a confident interval is obtained based on credible stylebook, then the group data will be detected and disposed using the confident interval. The data disposed by this method can be irrelative to the time scales, and the detection and identification speed of the “dirty data” in a large volume of data is fast. Experimental results indicate that this method can effectively implement the detection of the deviated group data in the random data, and good effects are obtained in practical applications.
  • LI Gui-ming ; LUO Jia-rong ; LIU Ying; LI Shi
    Computer Engineering. 2008, 34(21): 15-17. https://doi.org/10.3969/j.issn.1000-3428.2008.21.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    One of the project missions of the whole superconducting tokamak EAST is the realization of 1 000 second plasma discharge. Correspondingly, it’s necessary to construct a high speed distributed Real-Time Data System(RTDS) with the capacity of real-time data transmission, storage and distribution. This paper describes the hardware structure of the EAST RTDS from the aspects of function structure and realization method. Its interfaces and realization methods based on time slice mechanism are also analyzed at length.
  • ZHU Sheng-lin; YANG Bo; ZHANG Ming-wu; HU Yue-ming
    Computer Engineering. 2008, 34(21): 18-19,2. https://doi.org/10.3969/j.issn.1000-3428.2008.21.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Low-cost Radio Frequency Identification(RFID) tags are passive, on account of the limitation of cost and resources, can not afford the public key encryptions, symmetric encryptions, or even hash functions. EPCglobal Class-1 Gen-2 RFID specification defines the low-cost RFID tag which only can support on-chip 16 bit Pseudo-Random Number Generator(PRNG) and a 16 bit Cyclic Redundancy Code(CRC) checksum. In this paper, an authentication protocol conforming to EPCglobal Class-1 Gen-2 RFID specification only using PRNG is proposed, and it achieves tag-to-reader and reader-to-tag authentications, the anonymity of tag and forward secrecy.
  • ZHANG Peng; DENG Gao-ming; ZHAO Qiang; CHEN Kai-yan
    Computer Engineering. 2008, 34(21): 20-22. https://doi.org/10.3969/j.issn.1000-3428.2008.21.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new type of side channel attack based on Cache behaviors. For the implementation of Data Encryption Standard(DES) which takes the operations of looking up tables, with the assistant of mathematical analysis, the search area of the secret key can be reduced effectively by discovering the Cache hit information during the first 2 rounds of DES. The result from the experiment of Cache behaviors-based attack simulation shows that the DES key can be recovered with 26 chosen-plaintexts in 230 times off-line DES encryption. Several countermeasures for attack of this type are introduced.
  • REN Pei; ZHOU Jing-lun; LUO Peng-cheng; YANG Guang
    Computer Engineering. 2008, 34(21): 23-25. https://doi.org/10.3969/j.issn.1000-3428.2008.21.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper focuses on the time delay of JTIDS. Three message transmission processes, direct message transmission, message transmission through relay and prior message transmission are analyzed and modeled as queue theory models. Methods to calculate the time delay are proposed. It analyzes the time delay of early warning plane under certain time slot allocation method. Results show that, JTIDS meets the operation needs by controlling the time delay with respect to the category of the message.
  • LAI Xin; HE Da-ke; HUANG Xiao-fang
    Computer Engineering. 2008, 34(21): 26-27,3. https://doi.org/10.3969/j.issn.1000-3428.2008.21.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on elliptic curve discrete logarithm problem and KEM-DEM hybrid encryption construction, a novel certificateless hybrid encryption scheme is proposed. Elliptic Curve Signature Algorithm(ECSA) is used to provide unforgeability of user public key. Owing to KEM-DEM construction user public key is used to generate session key and session key encapsulation. Plaintext is encrypted by symmetry encryption scheme with session key, which provides the confidentiality of plaintext without the strict limitation for plaintext message space. The main operations is point operation in elliptic curve. Compared with previous certificateless encryption schemes related to bilinear pairing operation the scheme is more efficient on computation.
  • WANG Rui-hu; Brendan McCane; YIN Zhang-qun
    Computer Engineering. 2008, 34(21): 28-30,3. https://doi.org/10.3969/j.issn.1000-3428.2008.21.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an approach to compute curvature by means of Shape Form Shading(SFS) technique. Initially it traces the contour of SEM RBCs image, and grows regionally from center point of each cell. The height field depth is derived from the intensity variation with SFS, which is also the 3D points related to the corresponding pixel. As curvature is defined on smooth curved surface, the piece-wise smooth surface can be obtained using least squares method and surface fitting. The shape is featured by mean curvature and Gaussian curvature. Results show that it is promising and practicable.
  • ZHU Xiao-jin; LU Mei-yu; ZHAO Xiao-yu; ZHANG He-sheng
    Computer Engineering. 2008, 34(21): 31-34. https://doi.org/10.3969/j.issn.1000-3428.2008.21.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As an important part of experimental research and method verification, the development and design of measurement and control platform and software environment play an important role. Based on the background of space panel vibration shape perception and active control, using Visual C++, OpenGL and embedded measurement and control units, this paper emphasizes on the design of fiber optic smart panel vibration shape perception, real-time visualization and active vibration control, including design idea, key technology, main function and kernel unit. Testing results prove the development and design of software environment effective, and it supports environment-friendly software platform with powerful function for testing platform and measurement and control system.
  • LI Hui; HOU Yi-bin; HUANG Zhang-qin; HE Fu-gui; CHEN Rui
    Computer Engineering. 2008, 34(21): 35-37. https://doi.org/10.3969/j.issn.1000-3428.2008.21.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the shortcoming of current anti-forge technique. Combining the information security with RFID technique theory, it presents the anti-forge RFID reader which conforms to international standard. The discussion about anti-forge mechanism and the encrypt algorithm are emphasized. The realization of anti-forge reader prototype system based on FPGA is introduced. The anti-forge algorithm and authentication of reader algorithm is realized. The IP core of anti-forge algorithm is realized in the hardware system. The effective distinguish and the protection for commodity is provided.
  • Software Technology and Database
  • WANG Yang; HUANG Ya-lou; LIU Jie; LI dong; KUAI Yu-hao
    Computer Engineering. 2008, 34(21): 38-39,4. https://doi.org/10.3969/j.issn.1000-3428.2008.21.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper focuses on how to find out the most useful data to label and how to learn a more plausible ranking model with a smaller set of labeled data in learning to ranking field. It brings the idea of active learning into ranking problem, and proposes an active ranking algorithm based on PRank to reduce the labeling cost. Experimental results on real-world dataset show that the algorithm can reduce the labeling cost without decreasing the ranking accuracy.
  • DOU Zhi-cheng; YUAN Xiao-jie; HE Song-bai
    Computer Engineering. 2008, 34(21): 40-41,4. https://doi.org/10.3969/j.issn.1000-3428.2008.21.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes query repetition in a large-scale Chinese search engine log. It provides detailed statistics about query repetition and individual query repetition. Key conclusions include: query frequency, document click frequency and user frequency follow Zipf distributions. Queries are with high repetition ratios. Query repetition ratio increases when users’ search histories become rich. The users who search more frequently have higher query repetition ratios. These conclusions are useful for improving search performance of Chinese search engines.
  • SONG Rui; YIN Zhao-lin; KONG Liang; DING Ling; FAN Bao-de
    Computer Engineering. 2008, 34(21): 42-44. https://doi.org/10.3969/j.issn.1000-3428.2008.21.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The purpose of mobile Web services is to offer information services for any limited resource mobile instruments whenever and wherever. This paper takes a mobile tourist entertaiment system for example, discusses the system structure of mobile Web services, the interaction among its main system component objects, and the realization of personalized services. It discusses the function, model, and realization technology of context management, and introduces the realization of context management interface and WSDL.
  • TURDI Tohti; WINIRA Musajan; ASKAR Hamdulla
    Computer Engineering. 2008, 34(21): 45-47. https://doi.org/10.3969/j.issn.1000-3428.2008.21.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the key problems of Uyghur, Kazak, Kyrgyz full-text search engine retrieval server and proposes an effective solution, including inputting Uyghur, Kazak, Kyrgyz keywords and shows normal search results without installing the local input method in users’ computers, detecting and correcting Uyghur, Kazak, Kyrgyz keywords with high spelling mistake rate, returning the correct and comprehensive search results to users, etc. Experimental results indicat that the solution provides convenience for users and obviously improves the precision and recall of Uyghur, Kazak, Kyrgyz search engine.
  • XIANG Shi-wu; CAO Feng
    Computer Engineering. 2008, 34(21): 48-50. https://doi.org/10.3969/j.issn.1000-3428.2008.21.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the problems of document development and management in many companies, this paper proposes a design of document format transform tool based on Docbook. It adopts the method of changing XML and HTML files defined by users themselves into files that correspond with Docbook, and transforms them to other format files by XSLT. The tool can change XML files defined by users to many other format files, thereby the efficiency of document development and management is improved .
  • ZHANG Dan; GAO Jian-hua
    Computer Engineering. 2008, 34(21): 51-53,7. https://doi.org/10.3969/j.issn.1000-3428.2008.21.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the real test, using exhaustive test method will cause explosion of test case sets, low efficiency and resources wasting. Although orthogonal array can produce better test case set, its range of application is greatly restricted. This paper proposes a method named covering array to solve such problems. It takes orthogonal array and derives arrays from orthogonal array to construct covering array, which can reduce the number of testing cases, improves the efficiency of testing and increase its range of application. The algorithm is realized with .net tool, and it is proved valid and can find a more excellent test collection quickly.
  • HUANG Li-guo; SUN Li; HAN Cong-ying
    Computer Engineering. 2008, 34(21): 54-55,5. https://doi.org/10.3969/j.issn.1000-3428.2008.21.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A totally asynchronous parallel algorithm based on the synchronous parallel transformation algorithm is developed, which is proposed by Fukushima to solve unconstrained minimization problem. The algorithm seeks to remove synchronization points form a parallel implementation. Global and linear rate convergence is obtained under certain conditions. Computational results show that the asynchronous implementation outperforms its synchronous counterpart.
  • WANG Jia-yang; XUE Shuang-ying
    Computer Engineering. 2008, 34(21): 56-58. https://doi.org/10.3969/j.issn.1000-3428.2008.21.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the time-consuming problem of calculating generalized dynamic reduction, a fast method based on the validity of reduction is proposed. The algorithm decreases the number of sub-tables, which are calculated by using the stability degree threshold, and filters the reduction of sub-tables that are not to be the generalized dynamic reduction by utilizing the classic stability coefficient. Theoretical analysis and experiment show that the fast method is more effective than the traditional algorithm.
  • YUAN Fang; CHEN Ping
    Computer Engineering. 2008, 34(21): 59-61,6. https://doi.org/10.3969/j.issn.1000-3428.2008.21.022
    Abstract ( )   Knowledge map   Save
    Applications in real-time transport software must perform large numbers of I/O operations. Concurrency strategies play a vital part in building this kind of software. This paper introduces and implements a solution based on proactor pattern and provides an effective way to concurrently handle I/O operations. In practice, the solution serves in a military real-time transport software and satisfies main parameters of capability.
  • GONG Chao; GONG Liang; YANG Yu-pu
    Computer Engineering. 2008, 34(21): 62-64. https://doi.org/10.3969/j.issn.1000-3428.2008.21.023
    Abstract ( )   Knowledge map   Save
    This paper puts forward a method of implementing OPC data access between heterogeneous operating system platforms based on TCP/IP. In this method, smartly, TCP/IP communication acts as the bridge between the heterogeneous platforms, so it realizes the cross-platform OPC data access effectively and conveniently. This method can be used for universal reference towards various cross-platform OPC data access problems in industry process control field. It is successfully applied to the Alpha Magnetic System-02(AMS-02) Cryogenic Ground Support Equipment-Electric System(CGSE-ES) project, and the interface program is real-time, flexible, reliable and very easy to realize.
  • QI Chao; ZHANG Jing; HE Ju-hou
    Computer Engineering. 2008, 34(21): 65-67. https://doi.org/10.3969/j.issn.1000-3428.2008.21.024
    Abstract ( )   Knowledge map   Save
    For there is no OGSA or WSRF-compliant grid service middleware presently to support the gird resource management based on QoS negotiation commendably. A service-oriented Service Level Agreement(SLA)-based framework which can negotiate resource reservation and monitor the QoS of the resource is advanced in this paper. The XML Schema of resource reservation which can make resource requestor negotiate the agreement of resource reservation with resource provider based on WS-Agreement is defined. A set of WSRF-compliant Web services used to construct a Framework of reservation and QoS Mointoring of the resource based on WS-Agreement(RMF) is designed and developed. The performance of RMF is evaluated by the experiment.
  • XIONG Zhong-yang; LI Chun-ling; ZHANG Yu-fang
    Computer Engineering. 2008, 34(21): 68-70. https://doi.org/10.3969/j.issn.1000-3428.2008.21.025
    Abstract ( )   Knowledge map   Save
    To solve the problem that ontology can not provide all knowledge in semantic search, this paper proposes hybrid information retrieval model based on domain ontology. It makes use of semantic relevance in domain concepts, constitutes basic matrix and extend matrix index. When there is no available domain ontology, it can work based on keywords. Meanwhile, it exerts the advantage of keywords retrieval and semantic retrieval, and improves retrieval performance.
  • WANG Han; KONG Ling-fu; LIAN Qiu-sheng
    Computer Engineering. 2008, 34(21): 71-72,7. https://doi.org/10.3969/j.issn.1000-3428.2008.21.026
    Abstract ( )   Knowledge map   Save
    Most data mining algorithms of association rules can not adapt well to the changes of support and datasets. This paper proposes a novel algorithm based on image mapping, namely Pix-DM. By using the points of images displaying and storage on operating system, and combining the method of data mining, it carries out the process of data mining in a linear space and improves the flexibility of the support and datasets changes. The experiment on real datasets proves that Pix-DM is effective and feasible.
  • LI Jian-jun; ZHU Min; LIU Xiao-juan; SHAO Pei-nan
    Computer Engineering. 2008, 34(21): 73-75. https://doi.org/10.3969/j.issn.1000-3428.2008.21.027
    Abstract ( )   Knowledge map   Save
    Beginning with analyzing the testability of UML model, this paper puts forward an approach to generate test cases for distributed system based on UML sequences diagrams, gives a schema to model the UML sequence diagrams with XML based on parsing the MDL file, and generates test cases for distributed system based on sequences diagrams. Experimental results indicate that test cases reach the standard of determinantor and overlay, and it has a good prospect of application.
  • ZHANG Li-fang
    Computer Engineering. 2008, 34(21): 76-77,8. https://doi.org/10.3969/j.issn.1000-3428.2008.21.028
    Abstract ( )   Knowledge map   Save
    The index technique in relational database can judge rapidly a duplicate record. But the cost of time and resource is more for maintaining the index in massive database when its records updates frequently. Considering the characteristic of traffic packet and traffic massive database, this paper puts forward a time order interval model for traffic real-time packet, gives and proves an algorithm for rapidly judging a duplicate packet based on interval records, analyses the algorithm complexity, and discusses several improved methods. The algorithm introduced here has the characteristic that the complexity is independent on the database size, the efficiency is high, and can be realized easily.
  • Networks and Communications
  • ZHU Xiao-li; LIU Xiao-tian
    Computer Engineering. 2008, 34(21): 78-80. https://doi.org/10.3969/j.issn.1000-3428.2008.21.029
    Abstract ( )   Knowledge map   Save
    There are the problems of Mobile Node(MN) communications services delay increasing and load convergence in Hierarchical Mobile IPv6 (HMIPv6) for the unreasonable selection of MAP. A new MAP selection algorithm according to MN movement characteristics is proposed based on the comprehensive account of the speed, mobile track and other factors of MN. Simulation results show that the MAP selection algorithm can optimally select the MAP for different mobile nodes, reduce the communication delay of MN.
  • YIN Yin; YANG Yu-hang; YAN Zheng-hang
    Computer Engineering. 2008, 34(21): 81-83. https://doi.org/10.3969/j.issn.1000-3428.2008.21.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a method for adaptive bit loading under the imperfect CSI gotten by the channel estimation based on the comb-pilots insertion. The subcarriers are divided into a few groups and then CSI based on the channel estimations are got by comb-pilots to track the time-varying channel. It implements the bit loading algorithm. Sub-channel allocation and bit loading are performed to decrease the computation. The simulation results show that this algorithm can save more than 10 dB compared with the equal bit allocation algorithm of static sub-channel allocation methods.
  • SHI Jia-qing; NIU Ji-zhen; WANG Fan
    Computer Engineering. 2008, 34(21): 84-85,8. https://doi.org/10.3969/j.issn.1000-3428.2008.21.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By doing some analyses of the APM based Web server, this paper uses the dynamic cache to reduce the response time of the server. Some experiments are done on the factors which are related to the performance of the server with dynamic cache. These factors are the Web file size, the link of the Web file and the modification time of the Web file. Based on the analyzing results of the experiments, a BCLFL strategy is given to solve the problems that are found. A new method which adopts two-process architecture to test the Web system performance is used to test the BCLFL strategy system. The results show that the system is totally improved.
  • CHEN Liang; ZHANG Hong; HU Wei-min
    Computer Engineering. 2008, 34(21): 86-88. https://doi.org/10.3969/j.issn.1000-3428.2008.21.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Proportional Integral(PI) algorithm in Active Queue Management(AQM) can control the queue size of bottleneck nodes in Ad hoc network effectively, and stability of the algorithm is the base of congestion control. Now the designs of PI-AQM always lack theoretic analysis of stable region. This paper analyzes stability characteristic of PI-AQM in wireless and delay Ad hoc network because of the multi-hop and large-delay, and gives stable regions of PI-AQM controllers in delay and non-delay networks to improve PI controllers. Matlab and NS2 simulations validate the conclusion.
  • (Department of Information Engineering; PLA Institute of Electronic Engineering; Hefei 00)
    Computer Engineering. 2008, 34(21): 89-91,1. https://doi.org/10.3969/j.issn.1000-3428.2008.21.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The recognition of different PSK signals is carried out through extracting the characteristic of PSK signals. Because the initial phase of modulated signal reflects the characteristic of different PSK signals, the PSK signals recognition method through extracting the initial parameter from instantaneous phase is given. The methods of un-collapsed phase histogram and rose graph are used to recognize the four kinds of PSK signals: BPSK, QPSK, OQPSK and UQPSK. The simulation using Matlab are carried out and the results prove that two methods both can recognize the four different signals: BPSK, QPSK, OQPSK and UQPSK, and the rose graphic method is proved to be more effective. In addition, the method of statistical adjacent code phase is used to identify the signal of QPSK and OQPSK further.
  • GUAN Mo; LI Bo; ZHAO Hai
    Computer Engineering. 2008, 34(21): 92-94,9. https://doi.org/10.3969/j.issn.1000-3428.2008.21.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Using the Internet monitoring data offered by CAIDA Skitter project and the method of statistics, the statistical regularity of average shortest path and node degree distribution of the Internet are studied and analyzed. Statistical result reveals the topology of the Internet is not homogeneous. It is a highly clustered network, which means the shortest distance between two random nodes is short. The average shortest path of the Internet is about 14 hops. The node degree distribution is power-law distribution. The statistical results also show that the Internet is not random network, but complex network with the characteristics of “small world” and “scale-free”.
  • JIANG Wan-chang; HUO Cong; REN Jia-dong
    Computer Engineering. 2008, 34(21): 95-97. https://doi.org/10.3969/j.issn.1000-3428.2008.21.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Considering communications resource of remote nodes is limited, this paper presents a histogram-based load shedding for window multi-joins over data streams. The formula of load shedding rate is given based on the load of central processing and data source nodes. A central histogram and source histograms are designed by using clustering technique, and load shedding is proposed based on these histograms. The results show that the algorithm can produce maximum subset of exact join result and it is efficient for shedding the load of streaming window multi-joins.

  • WU Zhi-hua; SHEN Gong-xun; TANG Li-zheng
    Computer Engineering. 2008, 34(21): 98-99,1. https://doi.org/10.3969/j.issn.1000-3428.2008.21.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the positioning problem of the traditional Global Position System(GPS) under the weak GPS signal, the method of Assisted Global Position System(AGPS) based on General Packet Radio Service(GPRS) is AGPRS wireless communication is implemented by adding communication protocol into GPS module, and information required by the AGPS receiver is transmitted through GPRS. Hardware components and software design of network transport protocols are separately introduced. Testing results show that this system not only can connect to Internet rapidly and improve the signal capture capability of GPS receiver under the weak GPS signal sharply, but also can accelerate the fixing speed of GPS receiver.
  • WU Nan; GUO Pei-yuan; CHEN Yan; YUE Ming; WEI Hong-xing
    Computer Engineering. 2008, 34(21): 100-102. https://doi.org/10.3969/j.issn.1000-3428.2008.21.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on embedded Linux, this paper presents how to realize long-distance or short-distance double control mode of robot system. The communications system is made of terminal of embedded Linux system and robot system. By using the technology of GSM/GPPS expander board and Qt/Embedded software, through GPRS network and serial communication separately, it makes long-distance or short-distance control robot go ahead, go back and move the four axes machine-arm.
  • LIU Qing-kun; YIN Yuan-you; ZHENG Xiao-wei; LIU Shao-hai;
    Computer Engineering. 2008, 34(21): 103-105. https://doi.org/10.3969/j.issn.1000-3428.2008.21.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A Linux network installation model is put forward based on the network installation technology Kickstart and Heartbeat. By modifying the correlative config files of these two techniques, a relationship among the parts of installation is established, which avoids the single failure point of server, implements installation loadbalance, enhances the availability of installation service, and promotes the creditability of non-person installation. This model can be used for massive linux installation.
  • LIU Bo; LU Pei-zhong; ZOU Yan
    Computer Engineering. 2008, 34(21): 106-108,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the problem of justification recovery in digital demultiplexing stage in the environment of high error channel, a high error-resilient of justification recovery algorithm, High Error-Resilient Prediction(HERP) algorithm is proposed in this paper. HERP algorithm makes use of the justification statistics knowledge of 2-ary digital group and the feedback information from justification indicating code. This algorithm considers the justification prediction of the current frame in a continuous prediction sequence, which can lead to a global optimal prediction sequence and implement high error-resilient in justification. The simulation experiment shows HERP algorithm has improved nearly by ten times in the aspect of error-resilient and accuracy compared with most decision algorithm which is recommended by ITU.
  • Security Technology
  • MA Ji; JIANG Wei-qiang; YANG Yi-xian
    Computer Engineering. 2008, 34(21): 109-111,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the mechanism of issuing and managing system of certificates and its signature process, and describes the scheme of issuing and managing system of certificates based on J2EE multilayer model. This scheme utilizes EJB component technology to implement relevant functions, including certificate/CRL creating, issuing, query, downloading, certificate verifying, revoking and certificate templates management, etc. It decreases the cost and difficulty of development and of application systems, and ensures good extensibility.
  • SUN Hai-bo; ZHANG Quan; TANG Chao-jing
    Computer Engineering. 2008, 34(21): 112-114. https://doi.org/10.3969/j.issn.1000-3428.2008.21.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Security is the essential demand of multicast applications, to which a secure and efficient multicast key management scheme is the key. According to the analysis of the security demand of multicast communication, a multicast key management scheme based on key matrix is proposed. The scheme makes use of key pair for rekeying and is suitable for the demand of network, of which the topology dynamically changes and the bandwidth is limited. By compared with the scheme of multicast key management such as LKH and Iolus in communication overhead, key storage and computation complexity, this scheme is much better.
  • ZHANG Jing; HU Hua-ping; XIAO Feng-tao; LIU Bo
    Computer Engineering. 2008, 34(21): 115-117,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    P2P worm has become a severe threat to the P2P network and Internet. This paper presents a P2P worm detection method according to the relations between the messages in P2P network, and establishes a series of filter rules to realize the detection and containment for P2P worm. Simulation experimental results show that the distribution of resources has a great influence on the effect of containment for P2P worm propagation in this method and this method has a good effect on P2P worm detection.
  • TU Feng; ZHAO Yi-ming
    Computer Engineering. 2008, 34(21): 118-119,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Identity-based, threshold and blindness are three important concepts in current cryptology. This paper presents an identity-based threshold blind signature scheme from current blind signatures and threshold signatures by bilinear pairing. Compared with current identity-based signature schemes, this scheme is easier to carry out. It holds blindness and threshold properties.
  • DU Yi-bin; HUANG Xiao-ying; TENG Ji-hong
    Computer Engineering. 2008, 34(21): 120-123. https://doi.org/10.3969/j.issn.1000-3428.2008.21.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper constructs the probability model of multi-value additive clock combined generator, and discusses homogeneous Markov property, ergodic property, strict placidity, numeral character and the property of large numbers of the random variables sequenc with this kind of output sequence. It gets the probability formula of the coincidence between the output sequence and the input sequence, which gives reference to the design and security analysis of the multi-value keystream clock controlled generator in crypotography.
  • KUANG Chun-guang; CHEN Hua; ZHANG Lu-feng
    Computer Engineering. 2008, 34(21): 124-125,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve the security of Java software, this paper suggests a dataflow based taint analysis method to solve the problem of vulnerability analysis related to Java programs. The idea of the dataflow based taint analysis method is introduced and the process of taint analysis method is presented. Analysis system built according to the method can effectively find the vulnerabilities in Java ByteCode programs, such as XPath injection, SQL injection, etc. Results verify the correctness and validity of the method.
  • YANG Feng; ZHONG Cheng; YIN Meng-xiao
    Computer Engineering. 2008, 34(21): 126-128. https://doi.org/10.3969/j.issn.1000-3428.2008.21.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a diffluent algorithm based on bidirectional drive by applying heterogeneous cluster computing systems. It divides high traffic into several data streams, sends them to the most suited node in heterogeneous cluster computing systems, and implements the high-speed network intrusion detection system based on heterogeneous cluster. Experimental results show that this system can ensure that all data packages which take on the same source or destination with period of time are sent to the same IDS analysis engines, keep high detection rate on high-speed network and resolve the load balancing problem effectively.
  • WU Kun-hong; LE Hong-yan
    Computer Engineering. 2008, 34(21): 129-131. https://doi.org/10.3969/j.issn.1000-3428.2008.21.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the principles how rootkit malicious softwares hided files by hooking SystemServiceDispatchTable and utilizing inline function pacthing, this paper presents a method of integrity detection and restoration based on kernel file, which is proved to ensure the integrity of outcome of querying file.
  • CHEN Dong-fang; WANG Hua; GU Jin-guang;
    Computer Engineering. 2008, 34(21): 132-135. https://doi.org/10.3969/j.issn.1000-3428.2008.21.048
    Abstract ( )   Knowledge map   Save
    Now the security policy is always static, which is unsuitable for the complicated and changed network. In order to change that, Intrusion Prevention System(IPS) design based on risk-aware is put forward which makes up the defect of the pattern of “yes/no”. The SNMP is used to realize the linkage of the firewall and authorization end. The network is protected in the dynamic aspect.
  • ZHOU Shan-shan; LIN Shan; WANG Cui-rong
    Computer Engineering. 2008, 34(21): 136-138. https://doi.org/10.3969/j.issn.1000-3428.2008.21.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    GEAR is a location-based energy-aware geographically-informed routing protocol. To solve the problem that it is incapable of defending against bogus routing information, sybil and selective forwarding attacks, this paper presents a location pairwise keys bootstrap scheme based on secure geographical and energy aware routing protocol that exploits deployment knowledge. It analyzes the security performance of the SGEAR protocol and proves that it has good capability of connectivity and resilience against node capture.
  • SONG Chun-yan; XU Jian-liang; LI Shen-hua
    Computer Engineering. 2008, 34(21): 139-140,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a secure role-based workflow model, which combines the role-based access control RBAC96 with workflow. Concepts such as DcAC, EP, EPA, IP, IPA are proposed to be convenient for interpreting authorization management. The model is expressed by a formal description and a graph. Compared with the former role-based models, its security researches focus on dealing with the authorization relationships among roles, tasks and documents, can manage the authorization on documents better than them.
  • ZHU Chun-hua; MU Xiao-min
    Computer Engineering. 2008, 34(21): 141-143,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A novel blind watermark algorithm in Modified Discrete Chirp-Fourier Transform(MDCFT) domain is proposed, which includes watermark embedding and watermark detecting. The two-dimensional chirp signal is embedded in MDCFT domain by inversing MDCFT to obtain the watermarked image. The watermark is detected by MDCFT. DCFT can be implemented by FFT, so the algorithm is simple in computation and easy in implementation comparing with other watermark algorithms in time-frequency domain. The experimental results show that the algorithms can make the watermark invisible perpetually, and are also robust to some common image processing, such as adding Gauss noise, cropping, rotating and JPEG compressing, etc.
  • WANG Zi-liang; ZHENG Yu-ming; LIAO Hu-sheng
    Computer Engineering. 2008, 34(21): 144-146. https://doi.org/10.3969/j.issn.1000-3428.2008.21.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Data mining technique has a lot of merits, but it faces criticism like privacy threatening. This paper focuses on how to preserve privacy in clustering analysis and introduces the Independent Noise Algorithm(INA). This algorithm preserves original data by adding noises while keeping its distribution. The noises won’t influence the data distributing badly so that the mining can be done directly on the amended data later. The experimental results demonstrate that INA is effective and provide acceptable values for balancing privacy and accuracy.
  • GAO Guang-yong; LI Xin-wu
    Computer Engineering. 2008, 34(21): 147-149. https://doi.org/10.3969/j.issn.1000-3428.2008.21.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Focusing on security problems in electronic document interchange and encryption bringing attention of attacker, this paper proposes a secure electronic document interchange arithmetic based on image disguise. It builds BP model with the vicinity pixels relation of image, transforms output signal of BP model and document into redundancy signal by wavelet transform, and makes them unitary, coding, adding operation. It hides operation result and parameters of BP model into the image after encrypted, and sends the image to receiver. Experimental results show the method has some advantages such as easy operation, unapperceiving, preventing modifications and good security.
  • LI Ping; LIN Ya-ping; WU Jia-ying
    Computer Engineering. 2008, 34(21): 150-152. https://doi.org/10.3969/j.issn.1000-3428.2008.21.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Key pre-distribution schemes based on regular network such as hypercube have several advantages in Wireless Sensor Networks(WSN). Examples are lower storage cost and able to find a proper key path more quickly. However, the probabillity to establish direct keys is fairly low in hypercube-based key pre-distribution. Based on available connected components, the framework of hierarchical connectivity is presented in key-sharing graph of sensor networks. The definition of node’s hierarchical degree is included, and also localized searching algorithm is proposed. Experiments show that presented algorithm do improve node’s average key-sharing degree.
  • WANG Rong-bin; CHEN Shu-yu; YU Ling; JI Xiao-bo
    Computer Engineering. 2008, 34(21): 153-156. https://doi.org/10.3969/j.issn.1000-3428.2008.21.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the management problem of lacking extensibility and dynamic adaptability in grid domains, this paper puts forward Dynamic Model Based on Reputation-Guarantee in Grid Domains(DMRGGD). In order to join the grid domain and construct the trust with others without the central server for the new domain member, it presents the domain recommendation model based on worthiness. The relations are evaluated and the worthiness is updated for domain members dynamically by computing the direct reputation and indirect reputation of multipath. With the joint responsibility for guarantor, the model is able to prevent malicious guarantee.
  • SHANG Yu-lian; JIA Wu-yuan; WANG Hong-mei; SHI Kai-Quan
    Computer Engineering. 2008, 34(21): 157-158,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper makes research on grey half-generation arithmetic and puts forward a secret sharing scheme based on the grey half- generation. The scheme just requires the secret dealer find an integer muster randomly, then educes the half-generation key muster by using the grey half-generation arithmetic and ensures the shadows of the participants by distributing the elements’ position of the grey half-generation muster. Furthermore, the paper also constructs the shield shadows and against participant cheating by a simple discrete logarithm function.
  • JIN Ye; SUI Xin-guang
    Computer Engineering. 2008, 34(21): 159-160,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyses the models of natural texts, studies the statistical characteristics and finds that there is great distance between the average length of words in natural texts and that in the vocabulary of the same ones. But this distance is small in stego-texts created by the mimic method. This paper analyzes the difference and puts forward a new detecting algorithm of text document information hiding. Experimental result shows that the detecting algorithm can achieve a high degree of detecting reliability to these texts hiding information by the mimic.
  • ZHAO Xiao-min; ZHENG He-rong
    Computer Engineering. 2008, 34(21): 161-162,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is essential to protect the electronic evidence for its admissibility in computer forensics due to the weakness of computer data. This paper presents a secure protection policy for electronic evidence supporting computer forensics, in which some algorithms of SHA-1, RSA and Rabin fault tolerance are used. It can transfer the original records in real time and securely, store them dispersively for the authenticity and integrality, and make validity assessment in fast check and recovery.
  • Artificial Intelligence and Recognition Technology
  • HUANG Wei; WANG Yu-yan; ZHANG Jian-xiong
    Computer Engineering. 2008, 34(21): 163-165. https://doi.org/10.3969/j.issn.1000-3428.2008.21.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming to the specific application environment of embedded processors, this paper gives a hybrid mechanism which combines custom-designed Branch Target Buffer(BTB) with improved neural network arithmetic for the dynamic branch prediction. In this mechanism, neural network arithmetic implements an approach of global indexing with less resource rather than the normal indexing way based on the instruction address. In use of the unique feature of embedded applications, the BTB structure makes accurate prediction for the final branch instruction in the loop logic. The result indicates that this mechanism achieves high precision with lower complexity.
  • CHEN Zi-jun; QIAO Liang; WANG Xin-yu
    Computer Engineering. 2008, 34(21): 166-168. https://doi.org/10.3969/j.issn.1000-3428.2008.21.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the algorithm of Multi-Markov model has higher time complexity, this paper proposes a new approach to model user navigation sequences based on dynamic sorting Markov model. This model gets users navigation characters and uses the characters to sort users and predict users’ navigation pattern. In particular, this model can shorten the time of prediction obviously and the result is more accurate in prediction.
  • HU Jing-feng; LV Yue
    Computer Engineering. 2008, 34(21): 169-171. https://doi.org/10.3969/j.issn.1000-3428.2008.21.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The algorithm is presented for detecting text areas in business card from color image captured by mobilephone camera. It is carried out by three steps: edge detection using sobel arithmetic operators in four directions, connected component analysis, text area candidate detection and decision. Experimental results demonstrate that the proposed approach has good performance for segmenting text areas in mobilephone camera captured images with varying font-sizes, font-colors, background and languages.
  • JIANG Qian-ping; TANG Jie; YUAN Chun-feng
    Computer Engineering. 2008, 34(21): 172-174. https://doi.org/10.3969/j.issn.1000-3428.2008.21.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    When the surfaces to be dealt with in geological modeling contain large amounts of triangles, the intersection speed becomes a bottleneck. To solve this problem, this paper presents a fast triangle mesh intersection algorithm, which accelerates the access of intersection element pairs by using uniform grid for pretreatment. Experimental results show that, compared with other algorithms, this algorithm can effectively speed up the intersection process, and it is successfully applied to a certain geological modeling system.
  • CHEN Jie; PENG De-wei
    Computer Engineering. 2008, 34(21): 175-177. https://doi.org/10.3969/j.issn.1000-3428.2008.21.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a novel resource discovery strategy based on the multi-agent and distributed caches technology. Agents maintain local resource information and mobile agents migrate on network to discover shared resource. Distributed caches can provide an effective searching method. System model and decision algorithm is described. Resource can be quickly acquired and network traffic can be reduced greatly, scalability and robustness can be improved based on this model in P2P network.
  • YANG Jian; MA Xiao-lan; YANG Deng-qi
    Computer Engineering. 2008, 34(21): 178-180. https://doi.org/10.3969/j.issn.1000-3428.2008.21.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper integrates the CBR technique into the knowledge’s representation and reasoning of the expert system of Chinese traditional medicine, puts forward the system’s model, introduces the basic framework of case reasoning: case retrieval nets and case extraction algorithm. It explains the mechanism of case study and revise, and puts forward a method to explain the diagnosis result and to build an assistant tutoring system of Chinese traditional medicine by using case-base explanation. This paper makes a summary of the advantages of the system, and puts forward the further research and development directions.
  • TIAN Feng; WANG Chuan-yun; GUO Wei
    Computer Engineering. 2008, 34(21): 181-183,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the complex environment of coal mine, there are some challenges in wireless sensor networks such as organization of following nodes, rebuilding of the network after disaster and adding of nodes taken by rescuers. A clustering algorithm is proposed based on competitive learning, in which the remaining energy and the number of neighboring nodes for sensor node are normalized and the competition between nodes are achieved by similarity comparison. Simulation results show that the algorithm represents low communication energy consumption, balance of network energy consumption, better expansibility and stronger ability to resist destruction.
  • XU Su-xia; FU Xiu-fen; HU Jin-xia; GAO Bao-qing; SU Lei
    Computer Engineering. 2008, 34(21): 184-186. https://doi.org/10.3969/j.issn.1000-3428.2008.21.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at intrusion detection system dynamic load balancing in the high-speed network environment, this paper advances a strategy based on multi-agent load identification and Genetic Algorithms(GA) to improve the dynamic load balancing, achieves the intrusion detection system intelligent load balancing, presents the system corresponding model, and experiments show that the technology can be used to solve the problem of intrusion detection system load balancing in the high-speed network.
  • GAO Yan-fang; ZHAO Qing-song; CHEN Ying-wu
    Computer Engineering. 2008, 34(21): 187-189. https://doi.org/10.3969/j.issn.1000-3428.2008.21.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Bayesian networks have many merits which are applied in data mine, tobacco smoking quality is predicted and evaluated using Bayesian networks. But some important smoking quality has unequal classification cost. Cost-sensitivity Bayesian network is proposed accordingly. Structure of the cost-sensitivity Bayesian networks is learned using generative criterion. Then parameters of the cost-sensitivity Bayesian networks are evaluated based on cost-sensitivity loss function. A Bayesian network is learned to form a tobacco smoking quality dataset. Experimental results show that cost-sensitivity Bayesian network is feasible to evaluate tobacco smoking quality.
  • QI Chao; ZHANG Jing; MA Jun-liang
    Computer Engineering. 2008, 34(21): 190-192. https://doi.org/10.3969/j.issn.1000-3428.2008.21.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For joining the computational resources in large field into the implementation of PSO to enhance the computational efficiency and reduce the computational cost, a Parallel Multi-swarm Cooperative PSO Framework(PMCF) of Service Level Agreement(SLA) implementing is presented in this paper. A Parallel Multi-swarm Cooperative PSO(PMCPSO) algorithm adapted to Grid environment is proposed. Based on WS-Agreement, how to make use of Grid technologies and PMCPSO algorithm to design PMCF becomes the emphasis of research. PMCF has a meta-scheduler for the seamless resource discovery, selection and negotiation of QoS. The performance of PMCF is evaluated by the experiment.
  • ZENG Wei-biao; CAI Zi-xing
    Computer Engineering. 2008, 34(21): 193-195,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An improved complete coverage algorithm based on Acar algorithm is presented for static environment with unknown obstacles. If the walking direction of robot is changed, the critical points can be detected. the neighboring cells of all obstacles are covered by robot according to some rules. When the robot finds concave critical points and both the left and the right convex critical point set are empty, the complete coverage is accomplished. The algorithm can overcome some defects of Acar algorithm. Experiments validate the feasibility and correctness of the algorithm.
  • LIU Wei-feng; WANG Zeng-fu
    Computer Engineering. 2008, 34(21): 196-198. https://doi.org/10.3969/j.issn.1000-3428.2008.21.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As an important apparatus in the face, the eyes features play an important role for facial expression recognition. Therefore it needs to extract the eye-contours. Considering the known contour character, a new eye-contour extraction algorithm is proposed in this paper based on the combination of the shape parameters got from the transform projection and the image information in the eye field. The characters of deformable template and transform projection are analyzed, and then the eye-contour extraction method based on transform projection is presented. Experimental results on JAFFE(a facial image database) show the validity of this method. In addition, the proposed idea can also be used for the detection of other shapes.
  • JING Zheng-jun; ZHOU Jun
    Computer Engineering. 2008, 34(21): 199-201,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To meet the stability and real-time to process data of centralized control robot soccer system, the architecture of its host computer system based on multithreading technology is introduced and constructed while system task is discomposed by analysing its working principles. In the realization process of system, this paper adapts the way of combining windows kernel synchronization mechanisms and message mapping mechanism to accomplish the synchronization between threads, and uses multi-level buffers designed in loop linking queue to transfer data.
  • WANG Sheng; PAN Yu
    Computer Engineering. 2008, 34(21): 202-204. https://doi.org/10.3969/j.issn.1000-3428.2008.21.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Some relevant theories of social behavioral and psychology are integrated in particle swarm optimization’s improvement, in order to make each particles have more intelligence characteristics. An individual inspiration Particle Swarm Optimization(PSO) is proposed and applied to benchmark functions for testing, and modified approach’s impact on the algorithm’s searching and convergent ability is analyzed. Those changes are explained by sociological theory and phenomenon. Experimental results show that the modified algorithm has better searching and convergence performances.
  • Multimedia Technology and Application
  • HU Yun-feng; WANG Jia
    Computer Engineering. 2008, 34(21): 205-207,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the Unequal Error Protection(UEP) problem of video via error channel and describes a novel channel code rate allocation scheme, which discriminates frames in a Group Of Pictures(GOP) and provides different intensity of protection. The system takes into account the error propagation problem of video and the error concealment method used by the decoder to estimate the distortion introduced by channel error and formulates the optimal rate allocation problem. After that, genetic algorithm is utilized to solve the problem and gets the optimal result. Experiments with H.264/AVC video compression standard show that the method effectively improves the performance of the system.
  • GUO Li-hua
    Computer Engineering. 2008, 34(21): 208-209,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Chaotic permutation-based preprocessing is proposed to solve the burst error problem in video distributed coding, which uses the chaotic mapping to permute the image for scattering the error. After preprocessing, the traditional distributed video coding with permutation preprocessing can implement video coding efficiently. Experimental results show that permutation-based preprocessing can improve the performance of distributed video coding, and it has low-complexity and can be applied in some security fields.
  • CHEN Wei; ZHANG Xian-min
    Computer Engineering. 2008, 34(21): 210-212. https://doi.org/10.3969/j.issn.1000-3428.2008.21.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For content-based video sequence retrieval and matching, this paper brings forward a description method to block-image combined by grey and texture feature, while proposes the conception of grey-gap-order to describe grey feature. It unites Harr wavelet and Gabor transform, and puts forward a new method to distill texture feature. In addition, it brings forward a steped-sift scheme for advertising-video retrieval and matching, which remarkably decreases complexity of computing and boosts the retrieval efficiency.
  • WANG Fei; XI Hong-sheng; YANG Jian;
    Computer Engineering. 2008, 34(21): 213-215. https://doi.org/10.3969/j.issn.1000-3428.2008.21.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As Video-on-Demand(VoD) users may stop watching in the middle of a movie, so different parts of the same movie have different playback probabilities, which cause potential load unbalance problem for traditional segment based storage scheme. This paper analyzes the user’s behavior pattern statistically and proposes a probability model to describe it. According to the model, it proposes an improved segment based storage scheme, and demonstrates its advantages in better load balance and system efficiency through simulation.
  • Engineer Application Technology and Realization
  • RAO Yun-tao
    Computer Engineering. 2008, 34(21): 216-218. https://doi.org/10.3969/j.issn.1000-3428.2008.21.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the intention of solving a problem that a message with low priority may be delayed over in CAN system sometimes, its cause is the principle for event triggering communication with fixed arbitration priority of message on CAN bus. It is introduced by an example that how to design a Time Triggered CAN(TTCAN) basic system and an arithmetic, according to TTCAN principium. Such design can ensure normal operation in autocontrol systems which demands more instant ability and higher security, but it sacrifices the flexibility during configurating or altering a CAN system.
  • HU Wei; ZHU Yong-xin; JIANG Lei
    Computer Engineering. 2008, 34(21): 219-221,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper provides Integer Linear Programming(ILP) formulation of optimal code generation for Transport-Triggered Architecture (TTA) architectures, which integrates instruction scheduling, multiplies register files allocation, global register allocation and software bypass. A framework has been implemented to testify this model and the experimental results show the algorithm is applicable up to 40 transport instructions per basic block and generates optimal code.
  • LI Hong-li; MA Xin
    Computer Engineering. 2008, 34(21): 222-224. https://doi.org/10.3969/j.issn.1000-3428.2008.21.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The series-communication is described in this paper, based on VB6.0, applied in the Roll dyeing mill monitor and control system, between Omron CJ1M PLC, Danfoss frequency converter and Honeywell temperature control meter. The series-communication between the host computer and Programmable Logic Controllor(PLC) is based on the host link protocol embedded FINS command. The series-communication between the host computer and converter is based on the FC protocol. The series-communication between the host computer and temperature control meter is based on the Honeywell DC1020 temperature control meter protocol. The monitor and control software for the host computer is designed and applied in the roll dyeing mill monitor and control system.
  • JIANG Yan-hong
    Computer Engineering. 2008, 34(21): 225-226,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the features of Universal Asynchronous Receiver Transmitter(UART), a FPGA-based embedded design algorithm is proposed. The algorithm includes state machine design and level design techniques. The transmission function of full-duplex to receive/sends data is realized. The functional test circuit of UART is also designed. Experimental results show that the design has the advantages of programmable digit of the send/receive data and functional expansion etc.
  • LIU Chang; QIAO Yan-feng; WANG Zhi-qian; SHEN Cheng-wu
    Computer Engineering. 2008, 34(21): 227-229. https://doi.org/10.3969/j.issn.1000-3428.2008.21.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to prevent the impact in running process, the double loop servo system is designed on the base of the principle of technology of mutiposition north-seeker. The system applys the method of indexing localization, which chooses the equal-space points aroud swivel table. Every point adjusts position and speed of real time by PID controller, the time of running is less than 200 ms and orientation precision is 1.1′. The method realizes short-time and high-accuracy orientation information survey. It is the safeguard for the high- precision results.
  • TAO Hong; FAN Pan-guo; LIANG Bo
    Computer Engineering. 2008, 34(21): 230-232. https://doi.org/10.3969/j.issn.1000-3428.2008.21.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the frequency analysis results of the single slope linear sweep frequency signals from Direct Digital Frequency Synthesis(DDS) AD9954, the relationship of linear sweep frequency stepper frequency △ƒ and the relevant frequency spectrum resolution ratio △ƒ’ under different periods of the control signal are got. A distance formula of linear frequency-modulated continuous wave radar is reached, it is compared with the classic distance resolution ratio formula in fuzzy function, and the parameters are determined, which affect distance resolution ratio in DDS.
  • ZHAO Zhao; JIANG Lie-hui; ZHAO Qiu-xia; LIU Hui; LIU Zhen-guo
    Computer Engineering. 2008, 34(21): 233-235. https://doi.org/10.3969/j.issn.1000-3428.2008.21.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Multi-core is the trend in the field of processor. Communication in the multi-cores is realized either by the cache-share (cache memory), which is based on the bus system, or by the interlink technology-on-chip. In the architecture of multi-core processor which is based on bus-share, how to solve the bus contention between the multi-cores, and quantificationally analyze the delay time is the main gist of architecture optimization. By introducing queuing theory, this paper quantificationally analyzes delay of bus contention, gains the factors which infect the delay of bus contention, and provides quantitative gist for architecture optimization.
  • Developmental Research
  • ZHU Bin; CHENG Ming-xiao
    Computer Engineering. 2008, 34(21): 236-238. https://doi.org/10.3969/j.issn.1000-3428.2008.21.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The device driver of PC104 data acquisition card is designed and implemented in the embedded Linux environment based on the PC104 platform. The interfaces between the device driver and system boot, system kernel, peripheral devices separately are also designed. By using this driver, characteristics of all hardware are masked and DMM-16-AT can be accessed easily through file system. It is proved that this driver can solve the sampling problems on industrial chromatograph by DMM-16-AT in embedded Linux environment.
  • WEI Shen; ZHONG Xiao-qiang; CHEN Kai; ZHU Chang-an
    Computer Engineering. 2008, 34(21): 239-241. https://doi.org/10.3969/j.issn.1000-3428.2008.21.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To respond quickly to market, to improve design efficiency, this paper brings a rapid design system of metalfroming machines’ assembly models based on Pro/Toolkit technology aiming at the metalforming product’s characteristics of small batch, various classes, long design period. It analyzes the module partition, module design, products modeling and assembling technologies. It validates these technologies through a realized system, shows its design process and outputs.
  • MA Bao; LIU Yuan; LENG Wen-hao
    Computer Engineering. 2008, 34(21): 242-244,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper offers an exposition of the design and implementation of the self-developed database of ship technology and capability, in order to actualize the visualization of ship data. The new technology of Autodesk DWF and the NURBS arithmetic about curve is imported to empolder 3D ship figure. JNI technology is applied to actualize the integration of figure in the system. The technology of communion between files and database is used to dispose figure data. The combination of the whole bag of tricks actualizes the visualization of DWF file format figure in the WEB information system.
  • SHI Yi; LU Ting-jin; WANG Xin-lin
    Computer Engineering. 2008, 34(21): 245-246,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Through applying HLA and Agent modeling and simulation technology, a distributed simulation federation dealing with electronic countermeasure in ballistic missile penetration is built. This paper studies Agent communication based on HLA, application of ontology model in Agent interaction of knowledge layer and approach of improving simulation efficiency. The result shows that the environment of integrating HLA and Agent can efficiently support analysis of complex system combat.
  • ZHAI Dong-sheng; HUANG Yan
    Computer Engineering. 2008, 34(21): 247-249,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Referring to the standardization about multi-objective decision-tree, the generic index-system model is standardized to a two-level tree which has a root and several leaves. According to the methodology about domain ontology modeling, the index-system ontology is modeled based on DL, and the ontology is formalized by Protégé3.1.1. The warning prototype system is established by Jena and Able, and it proves the feasibility about ontology introduced into warning system from the experiment.
  • TIAN Yong-tao; LI Juan; TIAN Lin-huai; SUN Bing-rong
    Computer Engineering. 2008, 34(21): 250-251,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The distortion center must be solved in order to correct the image distortion resulting from the lens in computer vision system. A concentric circles-based method is proposed in the paper to find the distortion center. In the method, the concentric circles in different positions are captured perpendicularly, and then the centroids of distorted concentric circles in corresponding image are computed to determine the straight lines. The intersection point of such different lines is solved as the distortion center. The method needs no special equipments and avoids complex nonlinear optimization procedure. An experiment is performed and the presented method proves to be simple and reliable. Its accuracy can meet the common industrial requirement.
  • DING Lei; SHEN Hui-zhang; LIANG Zhen; ZHANG Yong-zhe; YU Bin; WANG Rui-zhong; BO Tao
    Computer Engineering. 2008, 34(21): 252-254,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper illustrates the evaluation, supervision and multilevel feedback model of the hierarchical breakdown of all levels of tasks under the environment of network information system based on B/S model, on the basis of the flow model of tree-form relationship management as well as the evaluation indicator model of tasks and innovation performance. The breakdown of tasks, establishment of tree-form association and multilevel feedback mode are realized through computer coding technology in the frame of the hierarchical structure of corporate departments, on the base point of the post a department belongs to, and by the linkage of the leadership relationship between the staff. The system solves the problems of evaluation and trend analysis on the intellectual employees’ abilities and innovation ability by the enterprise through practical indicator system and applicable evaluation process, providing technical assistance for the objectivity, justice and timeliness of evaluation on intellectual employees.
  • LIU Hui; JIANG Lie-hui; ZHOU Wu-ming; ZHAO Zhao; WANG Ying
    Computer Engineering. 2008, 34(21): 255-258. https://doi.org/10.3969/j.issn.1000-3428.2008.21.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The development of supercomputer is very fast, not only the speed changes with each passing day, but also the structure becomes more and more complicated and diversiform. In order to describe supercomputer’s structure rightly and availably, and give the uniform description method, this paper brings forward the multi-level structure and description of supercomputer. It can ground in farther abstracting or programming supercomputer simulator and help to design supercomputer system.
  • LIU Hai-xia; LI Ren-wang; YANG Gui; ZHANG Peng-ju
    Computer Engineering. 2008, 34(21): 259-261,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To develop the interaction of virtual logistics system, the technology based on VRML and Java3D is discussed. The virtual logistics equipments are built by 3D software. These equipments are loaded to VimlPad and optimized. The files of the equipments are leaded into Java3D scene via the loader interface. The interactive virtual assembly and the bidirectional drive between the virtual scene animation and the stocks are implemented by using the Java event-handling model, combined with the database technology. An example about virtual logistics system demonstrates that the scheme is effective.
  • PAN Jia-hui; BAO Su-su; ZHU Zhi-you; LIAO Qi-guang; DUAN Xiu-li
    Computer Engineering. 2008, 34(21): 262-264. https://doi.org/10.3969/j.issn.1000-3428.2008.21.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A liver virtual surgery simulation system for surgeons is introduced. Based on force feedback device named PHANTOM produced by SensAble Inc., this system makes use of virtual reality technology to implement the surgery procedures of liver and tissue. The visual feedback and force feedback are provided in real-time. This simulation technology explores a feasible path for the practical usage of virtual reality technology in surgery simulation.
  • CHEN Fen; XU Wen-bo
    Computer Engineering. 2008, 34(21): 265-266,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In wide area distributed environment, file resources are stored in distributed and heterogeneous environment and accessed by various protocols. A service oriented file management system for the demand of the wide area distributed environment and data intensive applications is proposed. By using virtualization techniques, the distributed and heterogeneous storage resources are converged into a single uniform storage resource. This file management system also provides a uniform file view and interface to share the data storage resource. Practical testing results show the efficiency of this system.
  • ZHENG Wei-feng; XU Tao; GU Qing-fan
    Computer Engineering. 2008, 34(21): 267-269. https://doi.org/10.3969/j.issn.1000-3428.2008.21.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A civil aviation integrated information platform based on Service Oriented Architecture(SOA) is introduced. According to the characteristics of civil aviation industry, the components of the core service logic in integrated information platform are designed by using the top-to-down method with the idea of service oriented. These components are packed to the core service in integrated information platform, which implements the operation of database at lower layers. Experimental results show this service system is effective.

  • WANG Hui; MA Wei-hua
    Computer Engineering. 2008, 34(21): 270-272. https://doi.org/10.3969/j.issn.1000-3428.2008.21.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A programming method about UART serial communication handset equipment based on WINCE.NET platform is introduced. Some multiple meter-reading modes such as RS232, infrared and RF are also designed. The drivers for PDD layer in series are transplanted and modified, and the serial driver is added into the system registry. Experimental results show these meter-reading modes are effective.
  • ZHENG Fu-qiang; HUA Qing-yi; ZHANG Feng-jun
    Computer Engineering. 2008, 34(21): 273-275. https://doi.org/10.3969/j.issn.1000-3428.2008.21.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper computes the information of region division, presents a stencil shadow volume algorithm based method to render the road net to solve the problems when rendering road net in the 3D virtual scene especially in the LOD terrain based virtual scene. Simulation result shows that this method can render the roads exactly on the terrain surface.
  • XU Tao; LI Yan-ming; MIAO Yu-bin; LIU Cheng-liang
    Computer Engineering. 2008, 34(21): 276-278,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.098
    Abstract ( )   Knowledge map   Save
    The remote monitoring for port machinery based on sensor data driven is implemented combined with virtual reality technology. The total scene and the port-machinery model library are established by such tools as 3DMax and Pro/Engineer. DirectX is adopted to develop the rendering engine of virtual scene. Field bus and wireless net of sensors are used to collect information of port machinery, including location, orientation and working state information, according to which the virtual model is driven in this rendering engine. A real-time monitoring environment is implemented, which is 3-dimensional, highly vivid and interactive. On this basis, expert diagnosis system of the central database and Web Service technology are used to implement predicted alarm and diagnosis of malfunctions.
  • CAO Jian-dong; ZHENG Si-fa; LI Bing; LIAN Xiao-min
    Computer Engineering. 2008, 34(21): 279-280,. https://doi.org/10.3969/j.issn.1000-3428.2008.21.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the function requirements analysis of logistics operation assistant system, the software and hardware platform are designed. Software for logistics operation assistant system is developed based on WebSphere and Oracle in J2EE. This system is now used in a large logistics enterprise and runs stably with high efficiency, which improves the information management and customer service in logistics enterprise as well as reduces the cost.
  • DING Lei; SHEN Hui-zhang; LIANG Zhen; ZHANG Yong-zhe; YU Bin; WANG Rui-zhong; BO Tao
    Computer Engineering. 2008, 34(21): 281-283. https://doi.org/10.3969/j.issn.1000-3428.2008.21.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the problems of enterprise talents evaluation and individual growth, the network imformation system for enterprise task allocation, evaluation and analysis is constructed based on B/S mode. A practical evaluation, statistics and analysis indicator model is proposed aiming at the tasks and innovation performance management of intellectual employees in the enterprise. This model makes the managers conduct evaluation, statistics, data accumulation and trend analysis on the tasks or innovation performance of the intellectual employees in a timely and comprehensive manner. Moreover, the model can also help the high level managers to analyze the individual ability of employees in a dynamic and profound manner, which lays a foundation for the talents effective identification and selecting mechanism of intellectual employees in the network information system.
  • HU Jian-jun;
    Computer Engineering. 2008, 34(21): 284-封三. https://doi.org/10.3969/j.issn.1000-3428.2008.21.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The description of Traditional Chinese Medicine(TCM) information is not uniform, so data preprocessing is a key process in data mining system. This paper develops data mining system for TCM prescription information, introduces the system architecture and the mining process are described, analyzes the characteristic of data in TCM, and preprocess data such as filtering noisy data, jargon of TCM uniform, absent data processing, measurement units of dose uniform, measurement of effect for medicine, quantity of effect and so on.