Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 November 2007, Volume 33 Issue 22
    

  • Select all
    |
    Degree Paper
  • SU Ming
    Computer Engineering. 2007, 33(22): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2007.22.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The linear complexity of periodic sequences is an important security index of stream cipher systems. It is noticeable that the linear complexity of a periodic sequence will be influenced when the values in some positions change. According to this, this paper proposes the concept of the k positions error spectrum to trace this influence on the linear complexity. Especially for 2n -periodic binary sequences, the periods of the 1position error spectrum for this kind of sequences are discovered and the number of the sequences with the same characteristic of the spectrum is given. These results are generalized to pn-periodic sequences over Fp.
  • CHEN Yuan-xu; LUO Yu-pin; HU Dong-cheng
    Computer Engineering. 2007, 33(22): 4-5,17. https://doi.org/10.3969/j.issn.1000-3428.2007.22.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    From the typical anisotropic diffusion equations, the PDEs for image super-resolution are deduced and, then a robust regularization-type reconstruction algorithm is devised. The proposed approach can suppress the system noise and preserve more details of the estimated HR image by orientation-selective regularization. The experimental results show that the PDE-based approach makes a promising progress in image super-resolution. It outperforms the previous methods in both numerical and perceived visual quality and is robust to noisy images.
  • LIANG Bing; LIU Qun
    Computer Engineering. 2007, 33(22): 6-8,11. https://doi.org/10.3969/j.issn.1000-3428.2007.22.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A temporal finite automata model of data association(DA) using formal method is presented, and the data association process properties of accuracy are verified by the model checker UPPAAL. A practical case is also presented to justify the method using model checking UPPAAL, results show that the veracity of multi-target tracks is efficient.
  • CHOU Shi-hao; William T. LIN; NI Yen-sen
    Computer Engineering. 2007, 33(22): 9-11. https://doi.org/10.3969/j.issn.1000-3428.2007.22.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Price forecasting approach to initial public offerings is sighificant both the oreticauy and practicauy. This paper. proposes a price forecasting approach for initial public offerings using genetic algorithm and neural network. This paper presents some factors influencing the stock price, applies some NASDAQ’s history prices of initial public offerings to the training samples, and uses these training samples to determine parameters of this proposed approach. It applies the marketing stock of other nine companies as test samples, and validates this proposed approach.
  • GU Xun-mei; SONG Guo-xin; SHAO Zhi-qing
    Computer Engineering. 2007, 33(22): 12-14,3. https://doi.org/10.3969/j.issn.1000-3428.2007.22.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Function point analysis is a method used to measure an application’s function size. It is independent of the implementation programming language and its measuring result can be compared between different development processes. Against shortcomings caused by complexity grade division, this paper presents the fuzzy function point analysis method. It is proved that this method can estimate software applications exactly and also has excellent practical operability.
  • CAO Chun-sheng; ZHANG Wei-dong; LI Feng
    Computer Engineering. 2007, 33(22): 15-17. https://doi.org/10.3969/j.issn.1000-3428.2007.22.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A real time wireless local area network (WLAN) media access protocol (MAC) is designed to deal with the applications which the stations have two classes of frame with different timing requirements. The station which has real time frame to send need defer a shorter inter frame space. If there happens a collision between real time frames, the access point will poll all the stations to solve this collision in time. Simulation results show the real time frames experience lower mean waiting times and can be transmitted in bounded times.
  • QU Lei; WEI Sui; LIANG Dong; WANG Nian
    Computer Engineering. 2007, 33(22): 18-20. https://doi.org/10.3969/j.issn.1000-3428.2007.22.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The TV inpainting model has good performance, but it is sensitive to parameters and time-consuming. Accordingly, a TV based inpainting method which synthesizes adaptive threshold and multiscalar is proposed. Experimental results show that better inpainting results can be achieved with much faster inpainting speed by using this method.
  • MING Yang; WANG Yu-min
    Computer Engineering. 2007, 33(22): 21-22. https://doi.org/10.3969/j.issn.1000-3428.2007.22.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Digital signature schemes provably secure in the standard model attract a great interest, since a proof in the random oracle model can only serve as heuristic argument and can not imply the security in the implementation. This paper shows that the two short signature schemes provably secure in the standard model are all insecure against key substitution attacks under the multi-user setting, namely an adversary can generate a new public key satisfying legitimate signatures created by the legitimate signer.

  • HU Zheng-wei; ZHONG Shun-an
    Computer Engineering. 2007, 33(22): 23-25. https://doi.org/10.3969/j.issn.1000-3428.2007.22.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new design method for multi-function array multiplier is proposed, which can work using different data styles. These styles are 64bits double precision floating point data, 32bits single precision floating point data, 32bits integer data and 16bits fixed point data. By using pipeline structure and carry look ahead addition method, the performance of this multi-function array multiplier can be enhanced distinctly. A multiplication unit whose instructions are compatible with TMS320C6701 is realized based on this method. The correctness and performance are confirmed by simulation results.

  • GUO Jun-bin; GUO Xiao-song; YANG Bi-wu; LEI Lei
    Computer Engineering. 2007, 33(22): 26-28,7. https://doi.org/10.3969/j.issn.1000-3428.2007.22.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to be in favor of image registration and mosaic in computer vision, a planar rectification which minimizes the deformation is studied. The rectification transform matrix is solved to seek the extremum of sum of projective transform weight change and minimize resampling effect that is weighed by Jacobian determinant. The generalized planar rectification coordinate system is built and normalized hypothetically. Minimizing distortion and resampling effect are calculated in the hypothetically normalized coordinate system. It keeps the similarity before and after transforming, and the visibility is improved.
    computer vision; image rectification; minimizing distortion; image mosaic
  • HE De-biao; CHEN Jian-hua; SUN Jin-long
    Computer Engineering. 2007, 33(22): 29-31,3. https://doi.org/10.3969/j.issn.1000-3428.2007.22.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes a hardware implementation of a cryptographic processor for RAS and ECC. The processor can not only compute modual exponent of RSA, which length is less than 2 048, but also compute point multiplication of ECC, which length is less than 256. The processor is implemented simply and can adjust area.
  • WANG Lian-qiang; LV Shu-wang; LIU Zhen-hua
    Computer Engineering. 2007, 33(22): 32-34. https://doi.org/10.3969/j.issn.1000-3428.2007.22.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Combined with existing security management tools, this paper discusses a security dynamical risk assessment model based on data fusion technique. By adopting AHP and Beyes network model to implement some key points of assessment, it can be used to dynamically prioritize the implementation of countermeasures.

  • GAO Zhi; ZHONG Si-dong
    Computer Engineering. 2007, 33(22): 35-38. https://doi.org/10.3969/j.issn.1000-3428.2007.22.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new rotation invariant matching algorithm which is robust against illumination variation is proposed. The gradient orientation angle is a relative stable feature in the condition of illumination fluctuations and object rotation. This paper uses a two-step method to realize the matching of rotated object in changed illuminations by quantifying and statistical analyzing this feature: (1)histograms of this feature of every subimage are employed for approximating the rotation angle of object; (2)rotated matching of templet and subimage in the space of quantification is performed by using the angle value. The effectiveness and robustness of this proposed algorithm has been proved by many experiments designed with real scene images.
  • WU Yue-xian; GE Lin-dong; XU Zhi-yong; XUE Fu-qiang
    Computer Engineering. 2007, 33(22): 39-41,4. https://doi.org/10.3969/j.issn.1000-3428.2007.22.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A novel modulation recognition method for MQAM signals is proposed. It employs a modified genetic algorithms (GA) based clustering method to rebuild and recognize constellations. The presented clustering algorithm not only overcomes the sensitivity to initial centers as fuzzy C-means with the effective global searching ability of GA, but also determines the number of clusters adaptively via validity analysis. Experiments show that this MQAM recognition method is effective.
  • HAN Wei; HAN Zhong-yuan
    Computer Engineering. 2007, 33(22): 42-44,4. https://doi.org/10.3969/j.issn.1000-3428.2007.22.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Q learning requires each state-action transform be visited infinitely, which limits its application when comes to large state-action space. This paper puts forward a black-board-model based multiagents cooperation learning algorithm. Agents cooperate and coordinate by a bull function which is defined in state-action space. By this bull function, agents can find those effective update more quickly and thus avoid those useless updates. Simulation proves the method can speed up the learning process at lower cost.
  • ZHANG Yun-liang; ZHANG Quan
    Computer Engineering. 2007, 33(22): 45-47. https://doi.org/10.3969/j.issn.1000-3428.2007.22.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Vector space model is a mature model of text representation in automatic text categorization. Words and phrases are commonly used as feature items, but these items provide little local semantic information. This paper uses sentence categories, which include more semantic information, as feature items. To reduce the dimensionality of sentence category vector space, it divides mixed sentence categories and reformes the weights by tfc algorithm and buildsthe classifier by KNN algorithm. The average precision and recall of the classifier are acceptable, especially in the case of categories having different abstraction. The performance can be improved by HNC techniques and machine learning algorithm.
  • LI Ying-qi; HE Ming-yi; FANG Xiao-feng
    Computer Engineering. 2007, 33(22): 48-50. https://doi.org/10.3969/j.issn.1000-3428.2007.22.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an unsupervised texture-based segmentation algorithm which uses reduced Contourlet transform sub-bands and mean shift clustering, to analyze the texture information of high resolution SAR images. Two steps and criteria are proposed to reduce the sub-bands and dimension of the feature space. The mean shift clustering method is used to obtain the number of texture regions and the centre of the label class. Group the pixels into corresponding texture region by their simple distance to the class centre pixel. Experiments on a mixture of Brodatz texture and SAR images show the proposed algorithm of using Contourlet transform and mean shift clustering gives satisfactory results.
  • Software Technology and Database
  • LUO Ying-wei; ; WANG Xiao-lin; ; YU Li-shan; LIANG Bin; WANG Yi-xin; XU Zhuo-qun
    Computer Engineering. 2007, 33(22): 51-53. https://doi.org/10.3969/j.issn.1000-3428.2007.22.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A novel strategy is presented to solve the consistency problem of maintaining intersection relation among spatial entities in map simplification. In this strategy, a new data structure is designed to express the intersection relation between two entities, and a new mechanism is adopted to record the evolvement of intersection relation during entity simplifying. Also, four conflict levels of the intersection relation are defined for map simplification, so users can select different levels to control the displacement of the point of intersection. The strategy can keep a high visual effect after simplification, and is suitable to map simplification for mobile device.
  • HUANG Qiang; ZHANG Xiao-mei; RAN Ming; LOU Xin-yuan
    Computer Engineering. 2007, 33(22): 54-56,5. https://doi.org/10.3969/j.issn.1000-3428.2007.22.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    RM framework provides an effective way to eliminate the resistance between object and relative database. Nowadays, although lots of excellent ORM frameworks are widely applied to enterprise projects, some intrinsic defects of ORM, such as fussy configuration files and relative domain models, over complicated persistence APIs and inefficient cache structures, brought some negative effects to project development as well as increase costs of study. In order to solve them, a class metadata based lightweight ORM framework called Speed is proposed, ORM mapping files can be completely dispelled with convention rules and class metadata reflection technology. By using simple and efficient object identifier caches and query caches, speed improves the system performance in effect. Fast system development by using compact Speed APIs is expatiated with combination of actual system.
  • GAO Yong; LIU Yu; WU Lun; ZHU Xiao-xi
    Computer Engineering. 2007, 33(22): 57-59. https://doi.org/10.3969/j.issn.1000-3428.2007.22.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at planar moving points in the Euclidean space, based on 9I model, this paper defines spatial topological relations model of reference features, which is expressed as a triple of the topological relations at the three sequential times, describes the categorical topological relations between moving points and reference points, or reference features in lines and polygons. The model expresses the dynamic characteristics of moving points clearly, which is significant for researches of intelligent transportation and LBS applications.
  • LI Jun; GUAN Hai-bing; LI Zeng-xiang; LIANG A-lei
    Computer Engineering. 2007, 33(22): 60-62. https://doi.org/10.3969/j.issn.1000-3428.2007.22.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Many dynamic binary translators chose basic block as the unit of translation and execution, the basic blocks to be translated in dynamic binary translation may have the same instructions as the other ones which have been translated. This situation consequently leads to repeating translation and incurs the unnecessary overhead. This paper focus on how to detect and eliminate the overhead caused by basic blocks overlapped redundancies from the view of dynamic binary translation optimization technology. Experiment results show there are about 5% overlapped redundancies in the course of translation. By eliminating the redundancies results in a speed up of 1%~4% in translation performance.
  • WANG Guang-qi; SHEN De-rong; LIU Jian; YU Ge
    Computer Engineering. 2007, 33(22): 63-65. https://doi.org/10.3969/j.issn.1000-3428.2007.22.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the development of P2P technology, people can implement management of grid data services by using P2P structure. Compared with the way of single server, P2P structure has several advantages, such as preventing single failure, good expansibility and so on. This paper proposes an improved P2P structure——MultiChord based on Chord, and provides good support for the management of grid data services based on the domain.

  • XIE Dong; YANG Lu-ming; PU Bao-xing; LIU Bo
    Computer Engineering. 2007, 33(22): 66-67,8. https://doi.org/10.3969/j.issn.1000-3428.2007.22.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper combines with original probabilistic databases based on the clusters which is produced by tuple matching techniques, and proposes a new probabilistic approach based on clustering in inconsistent databases. It analyzes a basic technique for queries rewriting based on believable cluster, considers the appropriate tuple probabilities, interval values and expectation values. The approach needs not procedural pre-processing, so the rewritten queries can be efficiently optimized and executed by commercial database systems. In order to understand the flexibility of the approach for considering distinguishing degrees of inconsistency and database sizes, the experiments use the data and queries of the TPC-H specification, and results show that the approach is efficient.

  • HU Tao; ZENG Bin; WEI Jun
    Computer Engineering. 2007, 33(22): 68-70. https://doi.org/10.3969/j.issn.1000-3428.2007.22.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The high data intensity of real-time monitoring systems makes it difficult to ensure that subtasks can maintain sufficient memory to store and analyze the data gathered form the sensors. This paper describes the design and implementation of a memory scheduler for these types of monitoring systems. The memory scheduler mediates between multiple real-time tasks and the facilities of a real-time operating system——using feedback and other inputs, it adjusts memory allocations over time to ensure that high application-level QoS is maintained. The scheduling connects to its monitored tasks in a non-invasive manner based on and integrated with standard middleware, and implements an open architecture for new memory management policies. The test results show that the overloads of scheduler are reasonable and allow the monitoring system to function in the face of run-time memory resource contention.
  • ZENG Bi-qing; CHEN Zhi-gang; WU Rui-zhen
    Computer Engineering. 2007, 33(22): 71-72,8. https://doi.org/10.3969/j.issn.1000-3428.2007.22.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the P2P EIR-tree framework, the range query and search processing algorithm is improved and adapted to query multi-dimensional dataset on P2P network system. The main idea and realization methods of the range query and search processing policy is discussed. A series of simulation experiments are done to validate the results and confirm the main factors affecting efficiency and data access speed.

  • CHEN Liang; YANG Dong-qing; WANG Teng-jiao; CHANG Lei
    Computer Engineering. 2007, 33(22): 73-75. https://doi.org/10.3969/j.issn.1000-3428.2007.22.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The mobile communication industry witnesses an increasing demand to share and exchange standardized data mining models among geographically distributed business analysis systems. Although PMML is recognized as the industrial standard for mining model exchange format, no framework has been developed to guide the production process of standard exchange models. This paper proposes a framework for decision tree construction algorithms that supports both model exchange and mobile communication churn analysis. A churn predictor conforming to this framework algorithm is implemented, and its validity is testified with simulated customer churn records. Proper extension is made to the standard exchange model to support more effective churn analysis of mobile communication data.
  • ZHANG Yan; ZHAO Jian-jun; FENG Bin
    Computer Engineering. 2007, 33(22): 76-79. https://doi.org/10.3969/j.issn.1000-3428.2007.22.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Unit test is regarded as crosscutting concern, which is a very important testing behavior in the process of software test. However, the main objective of aspect-oriented programming(AOP) is to separate crosscutting concerns, so AOP is fit for unit test. This paper brings forward several problems existing in object-oriented unit testing and shows how the AOP can be used to solve them. Virtues and shortcomings of using traditional method and AOP methods to support object-oriented unit test are compared.

  • TAO Ming-liang; ZHANG Shu; WANG Li-jun; BU Hong-jian
    Computer Engineering. 2007, 33(22): 80-82. https://doi.org/10.3969/j.issn.1000-3428.2007.22.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    P2P technique is an effective way to have resources shared in distributed and shared system. The efficiency of resource allocation is greatly enhanced based on P2P, but the download workload is not always balanced for some fatoros like the network bandwidth, the location of resource etc. As to solve this problem under the condition of multi-resource single user and multi-user single resource, a new method based on network bandwidth is proposed, through the resource provider self-discovery and self-request other available resource to achieve balanced distribution of resources load. It is proved by experiment.
  • ZHENG Xin-jie; ZHU Cheng-rong; XIONG Qi-bang
    Computer Engineering. 2007, 33(22): 83-85. https://doi.org/10.3969/j.issn.1000-3428.2007.22.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An approach based on Hadoop is presented to speed up ray tracing by utilizing MapReduce. It improves the rendering speed considerably by employing distributed computing, and simplifies the design of the distributed application by using MapReduce paradigm. Hadoop implementation provides a convenient and flexible framework for distributed computing on a cluster of commodity machines. The design and implementation is presented. The results and some related discussions are also given.
  • YU Lei; YAN Hai-hua; HE Jian-ying
    Computer Engineering. 2007, 33(22): 86-88. https://doi.org/10.3969/j.issn.1000-3428.2007.22.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    How to track and control software testing projects is urgent. This paper analyses the method of tracking and control in software testing process. It studies the relationship among testing plan, tracking and control, then presents the method of tracking and control based on the platform which is implemented, including the details of the testing plan, the status of the information gathered in testing process and the ways of project control.
  • SHI Jing; LIU Yong-shan
    Computer Engineering. 2007, 33(22): 89-91,9. https://doi.org/10.3969/j.issn.1000-3428.2007.22.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper extends the basic abstract class of open shape and puts forward concepts of open trapezoid and open sector. It models on the direction relation of spatial object based on theory of extended open shape, and extends the current technology into the direction relations queries under the different reference frameworks. Experiments demonstrate the advantages of the technology in performance compared with traditional range query methods.
  • ZHA Wei-zhong; YANG Ji-wen
    Computer Engineering. 2007, 33(22): 92-94. https://doi.org/10.3969/j.issn.1000-3428.2007.22.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By analyzing the workflow model of OA application and referring the XML process definition language(XPDL) of workflow management coalition(WFMC), this paper works out a basic workflow meta-model of OA application, which is composed of the workflow model of OA application, the schema of meta-model and the schema of process management. It can resolve the key issue of OA application in standardizing the process management, and publishing the handicraft of workflow model used for trade area, which is good for improving the standardization of OA application.
  • LI Gui; LI Zheng-yu; HAN Zi-yang; LUAN Fang-jun;WANG Guo-ren
    Computer Engineering. 2007, 33(22): 95-97,1. https://doi.org/10.3969/j.issn.1000-3428.2007.22.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Distributed object management is important in implementing distributed object interoperability. This paper presents an expanded and improved basic trading model of ODP to implement the local management of object services. Based on the new trading model, it proposes a federated trading model in large-scale distributed object interoperability environments, which provides new concepts of trading space and confidence. It describes the rigorous federated search procedure and search rules and the algorithm for the best federated search route, and also provides the structure model of federated trading and the federated consultation protocol to establish federated trading.

  • ZHOU Cong-hua; LIU Zhi-feng
    Computer Engineering. 2007, 33(22): 98-100. https://doi.org/10.3969/j.issn.1000-3428.2007.22.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper introduces the past temporal operators into computation tree logic(CTL), and obtains a new specification language CTLP which is more expressive than CTL. CTLP model checking algorithm is proposed and its time complexity is the same as CTL. The fixpoint representation of CTLP is presented which makes CTLP model checking symbolic. The symbolic algorithm can overcome the state explosion problem efficiently in model checking.

  • SU Lin-feng; GUO Gen-cheng
    Computer Engineering. 2007, 33(22): 101-103. https://doi.org/10.3969/j.issn.1000-3428.2007.22.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes elements of remote invocation method, points out the initialization, JNDI search and remote invocation are the key factors affecting the EJB performance. Thus, an idea optimizing EJB design pattern is proposed. Based on the theory of Session Facade, EJBHome factory, Value Object and other EJB design patterns, the paper comes up with the optimization scheme for EJB design patterns. This scheme has good extensibility and reusability.
  • DING Yue-hua; LI Guan-yu.; XU Cong; DING Wei-hua
    Computer Engineering. 2007, 33(22): 104-106. https://doi.org/10.3969/j.issn.1000-3428.2007.22.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Most of advanced transaction models can not be employed in realistic workflow systems, because of their complicated structures or difficulties in implementation. This paper presents Esaga (extended Saga), a new advanced transaction model, which is based on Saga model and mixed with OTS technology and improved by multi-agent. Esaga model, which supports the distributed environment, offset the shortage of Saga in deep extent.
  • LIU Wen-yuan; HAN Yan; CHEN Guo-ying; WANG Ya-dong
    Computer Engineering. 2007, 33(22): 107-109,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Dependency relations among user views are important in data analysis and data modeling in information resource planning(IRP). This paper introduces the definition of user view dependency and divides it into data dependency and operation dependency. Based on that, it measures the user view dependency relation and describes two methods: depending degree and depended degree, which provide a foundation for standardizing user views.
  • Networks and Communications
  • HU Si-kang; CAO Yuan-da
    Computer Engineering. 2007, 33(22): 110-112. https://doi.org/10.3969/j.issn.1000-3428.2007.22.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Automatically acquiring knowledge on Internet is always a bottleneck for intelligent systems. Web pages distribution and knowledge of Web pages distribution on Internet have influence on knowledge acquiring and its applied technology to some extent. This paper describes a survey of Web pages distribution and hyperlinks distribution between Web pages, puts forward existing problems. Method of research on knowledge distribution on Internet by random walk approach is introduced on the basis of the above description.
  • LEI Ting; YU Zheng-wei
    Computer Engineering. 2007, 33(22): 113-115,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Applying entropy coefficient instead of space distance to determine the neighbor point with their weights in phase space, a novel weighted local linear model is created, this model can overcome the defect of the traditional weighted local model in which the neighbor points with their weights are generally determined by distance so that when it is used to forecast the chaotic time series with the high embedded dimension are not so effective. The result of simulation shows the presented model can greatly improve precision of network traffic forecast when the embedded dimension of network traffic time series is high, compared with the traditional method.
  • HE Lei; ZHI Ying-jian; QIN Liu; WANG Su-nan
    Computer Engineering. 2007, 33(22): 116-118. https://doi.org/10.3969/j.issn.1000-3428.2007.22.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Focusing on the characteristics of the access convergence router (ACR), this paper analyzes the requirement of integrated management for the ACR, proposes the integrated network management fabric (INMF). The design of network management station based on INMF for ACR is described. Experimental results show that the INMF is reliable, securable and can fully satisfy the integrated management requirement of the ACR.
  • CHEN Xiao-mei; WANG Bao-sheng; ZHAO Feng; TU Rui
    Computer Engineering. 2007, 33(22): 119-120,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on ForCES(forwarding and control element separating) theory, the router can be separated into control layer and forwarding layer. This kind of design may bring forward great benefits, such as lower development cost, more scalable and reliable system. This paper introduces a kind of ForCES-based IPv6 router, gives the design and implementation of the control plan software modules, including route module, kernel protocol module, OpenRouter Master module and OpenRouter Agent module.
  • LU Yu; WEI Min; WU Qin-zhang
    Computer Engineering. 2007, 33(22): 121-123,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In view of features for common communication medium and subtle influence from network load in the mobile Ad Hoc network, an OLSR(optimized link state routing) protocol improvement solution based on MAC(medium access control) layer information is proposed. The solution reduces discarded packets in the physical and MAC layers modifying HELLO and TC(topology control) messages to carry congestion information of the MAC layer for the congestion evaluation and bettering the routing selection algorithm to choose a route which load is not heavy. The solution also reduces missing packets in the network layer using the two-sending strategy based on the same sequence number in TC message source nodes to compensate for the lost control information in the network layer, which can benefit the protocol’s stabilization in the heavy load situation. Simulation results in the wide range of different moving speed of the mobile nodes show that the communication success ratio and route capacity using the improved solution can be raised effectively in contrast to the classical OLSR protocol, especially when the network load is heavy.
  • LI Li; QIN Bin; ZHANG Chun-yuan
    Computer Engineering. 2007, 33(22): 124-126. https://doi.org/10.3969/j.issn.1000-3428.2007.22.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Dynamic spectrum access(DSA) networks provide a promising way out of the dilemma of spectrum scarcity and the underutilization of many licensed frequency bands. This paper introduces the trend of open spectrum and the enabling radio technology——cognitive radio and ultra-wideband. It discusses the architecture of DSA networks and introduces their radio resource management from the aspects of spectrum sensing, spectrum analysis, spectrum sharing and spectrum handoff. The routing, transport and QoS protocol design are discussed. The future research issues of DSA networks is investigated.

  • HU Ying-song; GAO Guo-qiang
    Computer Engineering. 2007, 33(22): 127-129. https://doi.org/10.3969/j.issn.1000-3428.2007.22.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It’s difficult to find a feasible path meeting low delay and high call admission rates in a heavy network. This paper proposes an improved distributed QoS routing algorithm based on the existing ones to address this problem. Before an immediate node forwards a probe packet, it must process a forward test based on the accumulated delay to decrease message complex. According to certain strategy, the destination node chooses the best path from the feasible ones to send ACK. Computer simulation reveals that this improved algorithm has low delay and high call admission rates in the heavy network.
  • WANG Jing-cun; XIE Xin-ai; WANG Qin; FAN Yong; LIU Lan-jun
    Computer Engineering. 2007, 33(22): 130-133,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    iSLIP schedule algorithm is widely employed in high performance switches and routers, but its performance decreases dramatically under non-uniform and burst traffics. Based on iSLIP algorithm, this paper proposes a traffic adaptive algorithm named TA-iSLIP, which iterates the schedule decision between slots. To make good use of the matched resources and decrease the system matching overhead, it intelligently estimates the traffic type by using queue length, and then adopts different processing methods accordingly. Simulation results show that TA-iSLIP achieves high performance under uniform and non-uniform traffic. It provides the description and performance evaluation of TA-iSLIP, and compares it with iSLIP, FIRM and EDDR. The stability proof of TA-iSLIP is proposed.

  • ZHAO Qi; LIU Jiao-yao; XU Jing-dong
    Computer Engineering. 2007, 33(22): 134-136,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Flooding-based unstructured P2P systems handle all queries identically no matter how popular the querying objects are, hence it result in a great amount of unnecessary messages. Aiming at improving search efficiency, this paper proposes a search mechanism with multiple small-scale floods initiated by proxy peers for a query. Querying sources control query processes by adopting different numbers of floods. Compared with standard flooding used in Gnutella, the new search mechanism can reduce the average query traffic cost by up to 56% while achieving comparable success rate. The mechanism can shorten response time by up to 15% while achieving the same query hits.
  • ZHANG Yan-mei; YU Zhen-wei
    Computer Engineering. 2007, 33(22): 137-139. https://doi.org/10.3969/j.issn.1000-3428.2007.22.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A design method of overlay service network is proposed, which includes two subproblems. A node placement model is presented and three kinds of algorithms are simulated, among which the Lagrangian relaxation algorithm is the best in finding out the optimal result. Simulation is made to show the impact of different link selection strategy on OSN routing performance, the result indicts that adjacent connection topology has high failure recovery rate and low routing overhead, so it can be selected as OSN’s topology.
  • JING Yun-yu; WAN Xiao-yu; FAN Zi-fu
    Computer Engineering. 2007, 33(22): 140-141,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The Internet draft stipulates how SIP can be extended. SIP extension is often used to support multimedia conference. But such extension adopts a single conference member server to conserve the state that the conference member has, which restricts the controllability of conference system. Due to the shortage, by combining the multicast model of multimedia multipoint conference, this paper suggests a SIP extension method to support a multipoint conference, and studies the consistency of conference member.
  • LI Wen; PAN Qiao; ZHU Chang-hua; PEI Chang-xing
    Computer Engineering. 2007, 33(22): 142-144. https://doi.org/10.3969/j.issn.1000-3428.2007.22.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An end-to-end measurement method, called IPv6-pckt-pr, is proposed to estimate the bottleneck bandwidth in the next generation Internet. This method gives same flow labels to the probing packet pairs, sets the traffic class of the probing packets to the highest level, estimates the end-to-end bottleneck bandwidth by sending packet pairs of different size. The explicitly generated self-similarity cross traffic in OPNET simulation allows the research to be more efficient. Theoretical analysis and simulations show this method is accurate, with less probing time and low bandwidth expense.
  • ZHANG Na; ZHENG Jun
    Computer Engineering. 2007, 33(22): 145-147. https://doi.org/10.3969/j.issn.1000-3428.2007.22.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A triangle grid quorum based dynamic location management algorithm which can effectively reduce the cost of location information management is presented. Experimental results show the proposed algorithm can ensure reliability for location management by comparing the performance of the protocol against standard grid protocol and crumbling walls protocol in terms of reading and writing availability and quorum size.
  • CAI Wen-yi; CHEN Yi-min
    Computer Engineering. 2007, 33(22): 148-150,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As one of the important protocol of NGN, SIP is widely used in multimedia communication transactions such as VoIP. But SIP can not traverse NAT/Firewall, which blocks the development of it on WAN. With the analysis of problems about SIP/NAT traversal, a scheme is proposed to support SIP signal and media stream traversing NAT/FW with the cooperation of SIP proxy and RTP proxy. The principle and topology of the schema is presented and the implementation how to traverse NAT/FW is described.

  • SONG Li-zhi; ZHANG Hong
    Computer Engineering. 2007, 33(22): 151-154. https://doi.org/10.3969/j.issn.1000-3428.2007.22.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Streaming media content with enormous data quantity in IP network bring about more and more pressure for servers and skeleton network. Content delivery system plays a very important role in ensuring streaming media QoS. Through analyzing two kinds of new-style content delivery technologies, CDN and P2P, this paper puts forward multi-source reticulation hash P2P model and an ameliorated content caching algorithm, and designs a content delivery system based on combining CDN and P2P. The system can content conditions of more request and less request, and improves streaming media QoS.
  • CHEN Lei-song
    Computer Engineering. 2007, 33(22): 155-157. https://doi.org/10.3969/j.issn.1000-3428.2007.22.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For the applications that require real-time processing of high-volume data streams, the scheduling strategy must be adaptability. The Greedy algorithm focuses solely on minimizing the maximum run-time memory usage, ignoring the important aspect of output latency. This paper proposes a quality adaptation framework that adjusts the application behavior based on the control theory and designs a scheduling strategy that minimizes the maximum run-time system memory, while maintaining the output latency within specified bounds.
  • WU Chun-xue; HAN Wen-dong
    Computer Engineering. 2007, 33(22): 158-160. https://doi.org/10.3969/j.issn.1000-3428.2007.22.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    End-to-end delay is a basic element that affects the stability of Internet-based networked control system(NCS). This paper presents network model and NCS model, analyzes the characteristics, the components and the bottleneck of the end-to-end delay based on the OPNET simulation results, and studies the relationship between the data packet size and delay. A NCS instance is modeled to examine the affection of end-to-end delay on the stability of NCS. When designing a NCS, grasping the end-to-end delay is helpful to enhance the stability of the system.
  • SHAN Zheng; ZHAO Rong-cai
    Computer Engineering. 2007, 33(22): 161-162,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at what the benchmark tools can offer in network processor performance evaluation and their limitations, this paper presents a network processor performance evaluation model. The model divides the network processor system into four levels, namely, system, function, task and hardware. And the model makes the system performance evaluated level by level, which simplifies the complexity of multilevel parallel system performance evaluating and insures its efficiency and precision.
  • Security Technology
  • LIU Wen; LUO Shou-shan; CHEN Ping
    Computer Engineering. 2007, 33(22): 163-165,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The solution of socialist millionaires’ problem has been used to build basic modules of the solutions to many application systems. This paper presents a model of sliding window, conducts a new solution to the socialist millionaires’ problem based on sliding window and commutation encryption function, and proves the security of this solution based on simulator.
  • YANG Zhi-jun; MA Jun-xiao; TIAN Di; ZHOU Bin
    Computer Engineering. 2007, 33(22): 166-168. https://doi.org/10.3969/j.issn.1000-3428.2007.22.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A NDIS-IMD IPSec model based on the intermediate driver(IMD) of network driver interface specification(NDIS) is proposed. It is used to resolve such problems as source code lacking and flexibility restriction of IPSec in Windows 2000 OS. The NDIS-IMD IPSec consists of IPSec IMD module and application layer module, which communicate each other based on Windows driver model (WDM) mechanism. This IPSec can provide flexible and personalized IP security services for Windows 2000 users’ end-to-end communication.

  • WU Bei; WANG Jin-lin; NI Hong; CHEN Jun
    Computer Engineering. 2007, 33(22): 169-171. https://doi.org/10.3969/j.issn.1000-3428.2007.22.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Broadcast encryption can allow a center to broadcast secure transmission to an arbitrary set of recipients, which is popular in pay TV, telephone conference and so on. Based on the comparison and analysis of the existing broadcast encryption schemes, this paper proposes a broadcast encryption tree’s regrowth method. By making the logical key tree grow bottom-up, this method can add new users in batches without influencing the previous users. So it solves subset and layered subset difference scheme’s unscalability.
  • LV Min-fang; CAO Zhen-fu
    Computer Engineering. 2007, 33(22): 172-174,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an efficient scheme for off-line electronic cash that can be applied easily on hardware with limited computing power and limited storage (e.g. smart card). This scheme has high efficiency and requires small storage size, and it also has provable security properties of E-cash. It expands the scheme to an electronic tickets scheme and an agent electronic cash scheme.
  • KANG Bin; YU Zhao-ping
    Computer Engineering. 2007, 33(22): 175-177. https://doi.org/10.3969/j.issn.1000-3428.2007.22.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new kind of dynamic key escrow scheme is presented with a new secret sharing scheme. The scheme has the following properties: the user’s key is generated by himself and KMC, which can prevent subliminal channels attack; malice escrow agency fail to obtain the user’s secret key, even if the number of malice escrow agency is more than or equal to the value of threshold; every escrow agency can verify correctness of the secret shadow that he escrows during secret shadow distribution and monitor agency can exactly decide which escrow agency forges or tampers secret shadow during monitor procedure; the scheme is dynamic and can accept or fire a key agency easily; the problem of “once monitor, monitor forever” is solved effectively and it is also against LEAF feedback attack.
  • XIANG Nan; DAI Zi-bin; XU Jin-song
    Computer Engineering. 2007, 33(22): 178-180. https://doi.org/10.3969/j.issn.1000-3428.2007.22.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new way of efficiently doing arbitrary N-bit permutations in reconfigurable cryptographic chip with very efficient hardware implementation. The new method is based on the BENES multistage interconnection network which is widely used in ATM switcher. An accurate and compact sorting routing algorithm is also described. This method can support new crypt algorithm, speed up execution, and reduce resource consumption.

  • NIU Rui-ping; YU Xue-li
    Computer Engineering. 2007, 33(22): 181-183,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Grid security mainly resolves the problem of the authentication and authorization among entities in gird. Now, existing grid authorization models are mostly based on traditional access control, and they do not take the particular task or the executing environment into account. According to the research of existing access control, this paper extends the role-based access control model through introducing the concept of task and condition, and achieves dynamic authorization based on task.
  • XU Li-ping; SUN Xian-jiao; LU Yan-sheng
    Computer Engineering. 2007, 33(22): 184-186. https://doi.org/10.3969/j.issn.1000-3428.2007.22.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an advanced scheme based on the resource states and role-based access control. The scheme extends the grid information service with the authorization server’s information, and defines the host local roles as the target resources in the policy database. It supports the authorization of the user outside virtual organization, and provides fine-grained authorization based on the resource’s states. The test shows that the scheme optimizes the authorization in the virtual organization with a large number of users and resources, and mitigates the bottleneck of the authorization server.
  • GENG Jing-shi; LI Ming-chu
    Computer Engineering. 2007, 33(22): 187-189. https://doi.org/10.3969/j.issn.1000-3428.2007.22.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Consistent security policy is the base of successful interaction between service provider and service requester in gird environment. This paper proposes a kind of security policy negotiation agent, which can complete the security policy negotiation task, which is the base of security task. It also presents architecture of the security-policy negotiation agent and its major function modules including policy analysis module, policy detection module, and policy evaluation module and negotiation policy database.

  • QIAN Quan; YAN Jia-de
    Computer Engineering. 2007, 33(22): 190-192. https://doi.org/10.3969/j.issn.1000-3428.2007.22.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Web Service plays an important role in integration of E-Commerce and business application systems in distributed computing environments, which loosely couple the computation services across network. With the development of Web Service in different areas, security issues are being widely focused on. Trough analyzing the Web Service architecture and implementation deficiency of Web service security only by SSL or firewall, this paper divides the Web service security into three levels: business process level, Web service catalog and registry level, and communication level. The different security strategies used in different levels and the corresponding implementation methods are also discussed in detail in the paper.
  • Artificial Intelligence and Recognition Technology
  • LIN Guang-yu; WEI Lang
    Computer Engineering. 2007, 33(22): 193-194,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses the vehicle traveling parameters related to the road traffic marking to monitor drivers working states at real time, with the help of images taken by an on-board CCD image sensor. Based on suppressing noise and detecting the position of road traffic marking in the images by using image processing techniques such as median filter and edge detection, it establishes models for perspective projection and drivers working states recognition. Experimental results show that the approach is effective in judging driving condition and it is important to cut down traffic accidents caused by drivers’ personal factors.
  • ZHANG Guang-mei; LI Xiao-wei; HAN Cong-ying
    Computer Engineering. 2007, 33(22): 195-197. https://doi.org/10.3969/j.issn.1000-3428.2007.22.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Path test is an important white-box test method, which can detect more program errors than others. Basis path set contains so many program paths that it will cover all the statements and branches in a program. It gains the better result by testing all the paths in a basis set under the limited test resource. This paper proposes an automatic generation of basis path set method based on depth-first searching. In order to avoid the condition that the algorithm never stops and reduces the searching procedure, and to improve its efficiency, the generation of sub-path method is adopted.

  • CHEN Zhi-ya; FANG Xiao-bin; LEI Ding-you
    Computer Engineering. 2007, 33(22): 198-199. https://doi.org/10.3969/j.issn.1000-3428.2007.22.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Since analytic solution of the fuzzy cluster can not be gained by FCM algorithm, the algorithm is not convenient in some applications. This paper proposes a new fuzzy cluster strategy based on particle swarm algorithm(PSO). By using particle swarm algorithm to adjust the center and membership function parameter of the fuzzy cluster automatically, result of fuzzy cluster can be adapted to the feature of data distribution and the membership function for each fuzzy cluster can be obtained. The effectiveness of the method is demonstrated by typical fuzzy classification problem.
  • ZHANG Guang-yuan; LI Jing-jiao; WANG Ai-xia
    Computer Engineering. 2007, 33(22): 200-202. https://doi.org/10.3969/j.issn.1000-3428.2007.22.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Correct strokes separation has great influence on the recognition result. This paper elaborates on the method separating and recognizing off-line handwritten Manchu character strokes. Based on the structure and characteristic of Manchu, the character is pre-processed. Then the mid-axis of Manchu character is defined and stroke growth algorithm is created to separate the strokes. The separated stroke is recognized by comparing its characteristic with the standard stroke characteristic. Simulation results show that the method is effective in separating and recognizing restricted off-line handwritten Manchu characters.

  • ZHOU Zhen-huan; ZHAO Ming
    Computer Engineering. 2007, 33(22): 203-205,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Since there are errors of brightness and clipping in gray-based paring algorithm, a scene matching algorithm based on moments invariant is developed and improved, in which, error of translation invariance is reduced by replacing raw moment with central moment, clipping error of rotation is eliminated by replacing rectangle measurement image with round one, affect of brightness difference between reference map and real time image is avoided by adding brightness factor and pyramidal search algorithm is adopted to reduce search times and speed up matching rate. Experiments show that matching algorithm based on moments invariant is very stable with high accurate rate.
  • ZHAO Pan; JIA Xi-sheng; HU Qi-wei
    Computer Engineering. 2007, 33(22): 206-208. https://doi.org/10.3969/j.issn.1000-3428.2007.22.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to build battlefield damage assessment intelligent tutoring system, this paper studies the development cognitive model of battlefield damage assessment. According to some actual battlefield damage assessment processes, a battlefield damage assessment process for training is built and the logical and effective assessment decision-making process is determined. It also describes and analyzes the content of each step in the battlefield damage assessment process and the knowledge of battlefield damage assessment is analyzed as well. Based on the theory of intelligence and skill levels, the cognitive task of battlefield damage is discussed. According to the cognitive task model in medical treatment, the cognitive model is built.
  • YANG Guo-liang; REN Jin-xia; WANG Zhi-liang
    Computer Engineering. 2007, 33(22): 209-211,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper defines personality, mood and emotion space based on the basic emotion theory. The mapping relationships among them are established. An equation for updating the affective and mood states is induced. Affective computing model is presented which can accords with the human affection active role. Simulation results demonstrate that the model can simulate the dynamic process of emotion and mood change well in the various environment stimulation. The model provides a valid method to the emotional robot modeling and affective decision system.
  • LI Zhu-lin; ZHAO Zong-tao; LIU Yan-bao; LIU Xing-ping
    Computer Engineering. 2007, 33(22): 212-213,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Stereo matching with regions is a key method for binocular image matching of wide baseline and it is difficult to extract the invariant region. This paper proposes stable extremal region(SER) and its extracting algorithm. To magnify the intensity change and identify its edges easily, the exponent transform is used. It computes the affine invariant moments of SER and measures the Euclid-distance between the region and another. Experiment result shows that the extremal points locate accurately and the SER are stable. The corresponding regions precision improves to 70.9%.
  • YAO Yu; ZHU Shan-feng; CHEN Xin-meng
    Computer Engineering. 2007, 33(22): 214-216. https://doi.org/10.3969/j.issn.1000-3428.2007.22.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the rank fusion problem via voting algorithms. Based on two widely discussed classical voting rules: Borda and Condorcet, some elimination voting algorithms and their variants, including Kemeny method, are analyzed in a graph theoretic approach. Because Kemeny ranking is a NP-hard problem, a new heuristic elimination voting algorithm is proposed. Some experiments are carried out on TREC data for evaluating these voting algorithms on rank fusion. Experiments show that these elimination algorithms have comparable performance with Borda algorithm, and sometimes outperform it.
  • CHAI Hong-lin; LI Hong; PENG Jia-xiong
    Computer Engineering. 2007, 33(22): 217-219. https://doi.org/10.3969/j.issn.1000-3428.2007.22.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The extraction of runway’s location and orientation from image sequence is required by landing navigation at night for vision-based unmanned air vehicle (UAV) and researched under universal hypothesis but without any auxiliary equipment, which reduces the dependence on the environment information and surveying instruments, enhances the independence of the system, and reduces the cost at the same time. By night, the pilot lamp of the runway can reflect the location and orientation of the runway, and these lamps which are in the same side of the runway are almost on the same line. Enough feature points can be gained after the runway image has been disposed with gray scale morphology and neighborhood processing methods. The boundary and the midline of the runway are extracted by Hough transformation. The presented method is tested with the real images, and the validity of the method is proved.

  • ZHOU Xiao-zhou; ZHANG Jia-wan; SUN Ji-zhou
    Computer Engineering. 2007, 33(22): 220-222. https://doi.org/10.3969/j.issn.1000-3428.2007.22.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of multi-object image segmentation, a novel image segmentation method is proposed based on mutual information and Chan-Vese model, which integrates the idea of multilevel segmentation and introduces the concept of mutual information in information theory instead of gray average deviation to decide whether the segmentation has been wholly completed. The results of experiments indicate its validity and effectiveness in segmentation of multi-object image and the objects with weak boundaries.
  • LU Min; WANG Xi-gang
    Computer Engineering. 2007, 33(22): 223-225. https://doi.org/10.3969/j.issn.1000-3428.2007.22.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper puts forward a new method combining the improved analysis hierarchy process(AHP) with the fuzzy synthetic evaluation to evaluate satisfactory degree of an uptown. It extracts the typical evaluation indices of satisfactory degree through the practical study and analysis of an uptown in Anshan city. An improved AHP is adopted to determine the weight of those satisfaction degree indices. It adopts the fuzzy mathematical theory to evaluate the degree of the residents’ satisfaction with the uptown. The practical evaluation results show that this new method can evaluate the satisfactory degree of an uptown correctly and effectively.

  • WU Xi-sheng; DANG Xiang-ying; ZHAO Yong
    Computer Engineering. 2007, 33(22): 226-228. https://doi.org/10.3969/j.issn.1000-3428.2007.22.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Lower computational complexity of the algorithm and better subjective quality are important in video and network signal processing. The interpolation of pixel is accomplished by double-channel method. To estimate relative information at high resolution, the algorithm analyzes the multiple directions relativity of local neighbors and makes full use of six down-sampled neighbors involved in the low resolution image. Experimental results demonstrate that algorithm not only decreases the computational complexity but also substantially improves the visual quality of the interpolated images.
  • YIN Hong ; XU Wei; ZHAO Ke; DANG Jian
    Computer Engineering. 2007, 33(22): 229-231,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper presents the research on Chinese ellipsis recovering based on concept model. It focuses on how to determine on the possible semantic ellipsis through the mapping from semantic level to syntax level which is based on the present semantic model. An ellipsis recovering model is proposed which is applied to the domain natural language understanding. Simulation results show the advantages of the proposed approach in Chinese formal ellipsis recovering.

  • GUO Hai-xia; XIE Kai
    Computer Engineering. 2007, 33(22): 232-234. https://doi.org/10.3969/j.issn.1000-3428.2007.22.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    o avoid the disadvantages of SUSAN, a new algorithm based on USAN is proposed. Corner pre-detection, which utilizes a window of three multiply three for detecting the candidate corners, can reject background, edges and noisy pixels. Intensity discrepancy between nucleus is redefined and its neighbors based on different area have different contrast. This makes the corners well-distributed. False corners are removed according to corner features, which is defined based on USAN. Experimental results show this corner detection method has good capabilities of detection and localization in different contrast image.
  • HE Ting-ting; ZHANG Xiao-peng
    Computer Engineering. 2007, 33(22): 235-237. https://doi.org/10.3969/j.issn.1000-3428.2007.22.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an approach to mining domain-dependent ontologies using term extraction and relationship discovery technology. There are two main innovations in the approach. One is extracting terms using log-likelihood ratio, which is based on the contrastive probability of term occurrence in domain corpus and background corpus. The other is fusing together information from multiple knowledge sources as evidences for discovering particular semantic relationships among terms. In the experiment, traditional k-mediods algorithm is improved for multi-level clustering. The approach to produce an ontology for the domain of computer science is applied and promising results are obtained.
  • LIU Sheng; WANG Xing-yu; YOU Xiao-ming
    Computer Engineering. 2007, 33(22): 238-239,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characteristics of artificial immune system(AIS), the structure of immune agent is analyzed and designed, the network model of multi-agent system based on biological immune mechanism and its formalization are presented. The method for constructing a complex distributed system, which will be more robust and flexible in dynamic environment and can be self-updated locally, is expounded.
  • Multimedia Technology and Application
  • CAI Qun; LU Song-nian; YANG Shu-tang
    Computer Engineering. 2007, 33(22): 240-242. https://doi.org/10.3969/j.issn.1000-3428.2007.22.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A novel audio-visual feature-based framework for porn video segment detection is presented, which extracts and analyses audio and video features independently, and combines their results to give out a final detection result. A support vector machine (SVM) is used to learn and then classify the audio sections, and skin info is used to give out a visual analysis result. Experiment results indicate that this approach has a high recognition rate, so it can be adopted to surveillance for video streams and segmentation of particular content in videos.

  • ZHAO Xue-wei; SHEN Xu-kun; QI Yue
    Computer Engineering. 2007, 33(22): 243-245,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To provide better walkthroughs of 3D scene over the Internet, an interactive 3D publishing system based on Browser/Server architecture is designed. The system concerns key techniques of 3D walkthroughs, including navigation, ROI inspection, smooth viewpoint transition, terrain following and progressive transmission etc., and presents an interactive 3D browser embed in Web browser, in which users can walk in the scene with the help of 2D navigation map, rotate and scale the models, inspect ROI, control the light, and select the polygon rasterization mode such as point, line and fill to check 3D models.
  • CHEN Xue-liang
    Computer Engineering. 2007, 33(22): 246-248. https://doi.org/10.3969/j.issn.1000-3428.2007.22.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    AVS is digital video encoding and decoding standard constituted by China. In order to accelerate technology of digital audio and video into using phase, it is necessary to produce the transcoder from MPEG-2 to AVS. This paper directly adds the AVS algorism of rate control to the transcoder, on which improvements are achieved. So the bit rate get closer to the target bit rate, and stream of frame becomes smoother than before.
  • Engineer Application Technology and Realization
  • ZHANG Ka; XIAO Bing-jia; WANG Hua-zhong; SHU Shuang-bao
    Computer Engineering. 2007, 33(22): 249-251. https://doi.org/10.3969/j.issn.1000-3428.2007.22.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    PID control is the disciplinarian frequently used in feed-back control system. In Tokamak device, the behavior of plasma is difficult to analyze and control. The plasma control system of Tokamak consists of PID control for different objects. The low pass filtering PID algorithm based on the digital filtering technology is designed. The algorithm enhances the control precision by filtering the noise intermingled in the error signal and is well used in the plasma control system.
  • LIU Hu; XIAO Yong-tian; ZHANG Jun
    Computer Engineering. 2007, 33(22): 252-254. https://doi.org/10.3969/j.issn.1000-3428.2007.22.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the design of Ethernet IP core with an AMBA AHB bus interface in a 32-bit SoC. The IP core has passed RTL level testing and FPGA verification. Performance testing proves that the IP core can meet the demands of many practical applications. The IP core is also reusable because of its standard bus interface.
  • JIN Miao; ZHAO Yong-hui; WU Jian-sheng; XIE Xiong-yao
    Computer Engineering. 2007, 33(22): 255-257. https://doi.org/10.3969/j.issn.1000-3428.2007.22.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Using database technology, the observation system is built as the new trend of modern engineering supervision technical. 3D visualization tunnel supervision system has been finished for Qiandao islands branch line of the Hangqian highway using Visual Basic 6.0 program combined with OpenGL. Combining 3D visualization module with tunnel observation system, the system shows the observation data as several kinds of vision. It improves the exhibition of data, and is more efficient.
  • BAO Ke-jin; LI Tong-liang; LIU Cheng; WU Jian-yong
    Computer Engineering. 2007, 33(22): 258-260. https://doi.org/10.3969/j.issn.1000-3428.2007.22.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characteristics of the large-scale model of semi-active suspension, an hierarchical controller is developed. By using the large-scale system hierarchical technique, the control structure is established. The platform of the control system for the suspension is built on ARM. Including the sub-system based on the fuzzy neural network and the sub-program of harmonization, the software is designed. The systematic damping coefficient of semi-active suspension is regulated. The test has been done on road. Result of the test indicates that the controller can meet the request of control system of semi-active suspension voluntarily.
  • ZHANG Ai-hua; YU Dong; ZHU Liang; JIN Wu-yin
    Computer Engineering. 2007, 33(22): 261-263. https://doi.org/10.3969/j.issn.1000-3428.2007.22.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traditional pulse sensors can not completely obtain multi-point pulse waves. By adopting the pulse image detecting instrument, the dynamic image of pulse is collected and the method of acquiring the multi-point pulse waves from image difference value is presented. Analysis and comparison of the experimental results obtained form the different ways indicate that the image difference method according to the referential image can acquire reliable pulse waves. How to choose the referential image is discussed, and acquiring multi-dimensional pulse waves from the radial artery is realized. It provides new idea and approach to detecting pulse wave and objective study on the pulse diagnosis.
  • LE Ren-chang; HE Zhi-jie; CAI Si-jing
    Computer Engineering. 2007, 33(22): 264-265,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Constructed from a universal gamma-ray detector, a universal data acquisition board and a computer, a gamma-ray spectrometer is developed based on C#.NET programming technique. An object-oriented design of the gamma-ray spectrometer system is given. A programming approach of the multi-channel pulse amplitude analyzer is described. This study indicates that computerization of gamma-ray spectrometer is available.
  • WANG Jian-fang; XIA Qing-guo
    Computer Engineering. 2007, 33(22): 266-268. https://doi.org/10.3969/j.issn.1000-3428.2007.22.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A kind of approach about a wire train bus network node computer based on SOPC is discussed. As the soft-core of the system, the NiosII soft-core processor and the WTB control logic are integrated on the single FPGA. The primary approach that the industrial control node computer and the control component are combined is replaced. It greatly speeds up the system and reduces the hardware cost. The whole design scheme of the system has been given. The result of test is analyzed.
  • Developmental Research
  • DENG Ji-qiu; WU Qian-hong; LIU He-tao
    Computer Engineering. 2007, 33(22): 269-271. https://doi.org/10.3969/j.issn.1000-3428.2007.22.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The following theories of software engineering, object-oriented methods and standards of OpenGIS, the system structure, function, data organization and database of the Changsha-Zhuzhou-Xiangtan regional biology geochemistry analysis system are designed based on system background and requirement analysis. This system is developed based on MapInfo MapX by using VS.Net. The integrative display, component development and realization of evaluation models are researched.
  • HU Ying; JIANG Jian-guo
    Computer Engineering. 2007, 33(22): 272-273,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    PC-Phone service has recently become focal point. Soft Phone is a kind of software which can sustain audio and video multimedia session. This thesis investigates and applies this software based on SIP protocol, and stands out an improved LZW algorithm, which realizes the compression of SIP messages to decrease the transmission delay and shorten the session setup-time.
  • LI Quan-zhong; ZHANG Jun-ben
    Computer Engineering. 2007, 33(22): 274-276. https://doi.org/10.3969/j.issn.1000-3428.2007.22.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at severe harm of hard disk for programs and data, this paper analyzes the causes that the MBR of the hard disk protected by hard disk guard or recovery program can not be read by the usual methods, and gives a new viable reading method and its Delphi realizing program. The problem to backup the MBR is solved.
  • WANG Jian-guo; HONG Sheng-feng; QI Sheng-bo; WU Shu-ming
    Computer Engineering. 2007, 33(22): 277-279,. https://doi.org/10.3969/j.issn.1000-3428.2007.22.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a new method based on system on programmable chip(SOPC) technology and dual NiosII processor to design VoD system with 16 terminals. It provides a technique about how to apply the “Ping-pong” theory to achieve high speed data transfer, and how to communicate synchronously between two CPUs.
  • HU Li-hui; TIAN Yue; PAN Shan-rong
    Computer Engineering. 2007, 33(22): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2007.22.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
  • LAI Hong-xiao; CUI Ying-an; CUI Du-wu
    Computer Engineering. 2007, 33(22): 283-285. https://doi.org/10.3969/j.issn.1000-3428.2007.22.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the idea of multiple-layer design, this paper designs a universal programming frame, which can build a middle or small-scale call center with flexible configuration. The frame can shorten system development period and promote software efficiency, providing a reference model of experiences for establishing middle and small-sized call centers. It proceeds with analysis and implementation on technical plan of flow control’s dynamic configuration. Practice of the projects proves the correctness and feasibility of the universal frame of the call center based on voice card.