Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 July 2007, Volume 33 Issue 14
    

  • Select all
    |
    Degree Paper
  • DUAN Hong; LONG Fei; JIANG Qingshan
    Computer Engineering. 2007, 33(14): 1-3,7. https://doi.org/10.3969/j.issn.1000-3428.2007.14.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes a method to reconstruct 3D face from a front face photo and a side face photo. After selecting key feature points and metamorphosing the basic face mode, the 3D grid face of the special person is created. After texture mapping, the special person’s 3D face model is reconstructed. This method is implemented on a PC. The experiment is successful because the 3D face model and the true face are alike.
  • XU Weihua; ZHANG Wenxiu
    Computer Engineering. 2007, 33(14): 4-7. https://doi.org/10.3969/j.issn.1000-3428.2007.14.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Assignment reduction is one of the most important problems in rough set theory. However, most of information systems are based on dominance relations due to various factors. To acquire brief decision rules from inconsistent systems based on dominance relations, knowledge reductions are needed. Therefore, the dominance matrix and decision assignment matrix are introduced in information systems based on dominance relations. The algorithm of assignment reduction is obtained, from which a new approach to knowledge reductions in inconsistent systems based on dominance relations is provided. An example illustrates the validity of this method, and shows the method is applicable to complex information system.
  • ZHENG Wei; MENG Xiaofeng
    Computer Engineering. 2007, 33(14): 8-10,2. https://doi.org/10.3969/j.issn.1000-3428.2007.14.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a bus firewall model for embedded system, which has built the intrusion immunity function on the system bottom frame. After importing the embedded system flexible bus and describing it with formalization mathematical method, a universal bottom frame is acquired. Based on this work, the paper adopts a positive rule mapping idea to establish the firewall rules. Experiments demonstrate that the firewall has good transplantability and high intrusion recognition rates.

  • HAN Chao; HAO Jianguo; HUANG Jian; HUANG Kedi
    Computer Engineering. 2007, 33(14): 11-13. https://doi.org/10.3969/j.issn.1000-3428.2007.14.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The reusability and scalability of the high level architecture (HLA) determine that multiple developed federations can be interconnected to enlarge the simulation scale quickly. Using the bridge federate is one of the approaches to interconnect HLA multiple federations. This paper describes the principle of the bridge federate, and provides the functionality description and use cases of federation management, declare management, object management, time management and ownership management through the bridge federate.
  • HAN Chao; HAO Jianguo; HUANG Jian; HUANG Kedi
    Computer Engineering. 2007, 33(14): 14-16,2. https://doi.org/10.3969/j.issn.1000-3428.2007.14.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The interconnection of HLA multiple federations is essential for large scale simulation, especially for the simulation on wide area network. Using the bridge federate is one of the approaches to interconnect HLA multiple federations. This paper presents the results of an in-depth study of the feasibility of an HLA bridge in the context of the current HLA interface specification. Problems and solutions are discussed and illustrated using particular HLA services.
  • SUN Xiaowei; JIN Guang; WANG Zhi;
    Computer Engineering. 2007, 33(14): 17-19. https://doi.org/10.3969/j.issn.1000-3428.2007.14.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Image segmentation is an important problem in image processing, the main of vision bottom in computer vision field, and the key technology of analyzing, understanding and characterizing images. In this paper an algorithm of extracting boundary geometrical characters from a bi-value image is constructed. Anomalous image segmentation is completed by analyzing concave properties of graph. The algorithm processes image data extracted without operating the image itself to avoid the loss of image information by traditional segmentation algorithm based on image morphology.
  • FENG Wenfeng; GUO Qiao; GUAN Zhitao; ZHANG Zhibin
    Computer Engineering. 2007, 33(14): 20-23. https://doi.org/10.3969/j.issn.1000-3428.2007.14.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A hierarchical Count-Min (HCM) sketch data structure is implemented to summarize the hierarchical structure in stream data. By designing and defining a XOR-based pair-wise independent family of Hash functions on the hierarchical domain U*, the sketch maps stream data items to a three dimensional array of counters of size L×D×W. Of the counter array, L is the number of layers in hierarchy, D is the number of uniformly and randomly chosen Hash functions, and W is the range of the Hash functions. The HCM sketch uses breadth-first search strategy to identify and evaluate the hierarchical frequent itemsets. The experiments demonstrate the improvement in update time, space usage and evaluating accuracy over the straightforward CM-based approach.

  • LI Xiaoguang ; SONG Baoyan ; YU Ge ; WANG Daling
    Computer Engineering. 2007, 33(14): 24-26,3. https://doi.org/10.3969/j.issn.1000-3428.2007.14.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The fitness of cluster model to data distribution is critical to probabilistic-model-based clustering. The single-component model fails to capture the distribution of document data completely because of the complexity of content-based distribution of document. This paper considers the characteristics of document are influenced mainly by two components: topic and general writting style, proposes the content-based cluster model mixed by topic model and general model, and gives the document clustering algorithm. Experimental results indicate that the content-based cluster model shows better fitness than single-component model and gets better quality of clustering.
  • DAI Kexue; LI Guohui
    Computer Engineering. 2007, 33(14): 27-29. https://doi.org/10.3969/j.issn.1000-3428.2007.14.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a background modeling and subtraction algorithm to detect moving objects from color video sequence captured by surveillance system. Background values are quantized into codebooks with respect to color distortion and brightness distortion. Pixel values of new frames are compared with the codebooks to identify foreground pixels. The algorithm is efficient in computation and takes up less memory. It can also handle scenes containing moving backgrounds and illumination variations.


  • NIE Xiangfei; LI Chunguang; GUO Jun
    Computer Engineering. 2007, 33(14): 30-32. https://doi.org/10.3969/j.issn.1000-3428.2007.14.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A novel method for frontal face detection is presented. EMD (empirical mode decomposition) and matching pursuit algorithm are used for face feature extraction, and the Bayes classifier is trained for classification. The proposed method is compared with eigenfaces method on FERET face database. Experimental results demonstrate that the method has lower computational complexity and higher accuracy than Eigenfaces method.
  • Software Technology and Database
  • ZHANG Chuanming; PAN Mao; XU Huihong
    Computer Engineering. 2007, 33(14): 33-35,7. https://doi.org/10.3969/j.issn.1000-3428.2007.14.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the introduction of common data models and rendering algorithms for volume data, this paper proposes a hybrid octree encoding to describe it. Self-adaptive blocking method is applied to store and manage mass volume data. Volume rendering and multi-resolution rendering for hybrid octree via cell projection and 3D-texture mapping are implemented. Experimental results show that the algorithms effectively solve storage, management and rendering for hybrid octree based mass volume data.
  • YANG Hongmei; ZHANG Jianqiang; GENG Boying; QIAO Jing
    Computer Engineering. 2007, 33(14): 36-37,4. https://doi.org/10.3969/j.issn.1000-3428.2007.14.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of enterprise-group’s information system, the article puts forward a system structure based on both the C/S and B/S structure mode. The system structure uses soft-bus technique to realize the integration of the sub-system in existence. The article researches on the technique of soft-bus based on agent, and gives a realization scheme.
  • WANG Yongheng; JIA Yan; YANG Shuqiang
    Computer Engineering. 2007, 33(14): 38-40. https://doi.org/10.3969/j.issn.1000-3428.2007.14.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the rapid development of information technology, huge data is accumulated. A vast amount of such data appears as short documents. It is very useful to cluster such short documents to get knowledge automatically. But most of the current clustering algorithms can’t handle massive data which is at TB level. It is also difficult to get acceptable clustering accuracy since key words appear less time in short documents. This paper proposes a frequent term based parallel clustering algorithm which can be used to cluster massive short documents. Semantic information is also used to improve the accuracy of clustering. The experimental study shows that the algorithm is accurate and efficient.
  • GAO Ping′an; CAI Zixing; MENG Zuqiang
    Computer Engineering. 2007, 33(14): 41-42,4. https://doi.org/10.3969/j.issn.1000-3428.2007.14.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The problem of dada classification is a fundamental issue in KDD. There are still many open theoretical problems such as modeling for data classification. Granular computation theory offers a proper new theoretical basis for KDD. In fact, the process of constructing the connotation of a concept from its extension can be considered as a granularity computation process. This paper proposes a novel granularity representation method to study the problem of data classification in KDD and a novel data classification model.
  • LI Gang; JIN Beihong;
    Computer Engineering. 2007, 33(14): 43-45. https://doi.org/10.3969/j.issn.1000-3428.2007.14.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    High performance concurrency control can improve parallel processing capabilities while decreasing perceived interactive time. This paper discusses the complexity in concurrency programming, and analyzes thread based concurrency infrastructures. Now, thread based concurrency infrastructures have been successfully adopted in the distributed transaction processing monitor OnceTX.
  • WANG Xueguang
    Computer Engineering. 2007, 33(14): 46-48. https://doi.org/10.3969/j.issn.1000-3428.2007.14.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Bit-parallelism is a fast scheme for packet classification, but it scales poorly as the filter databases grow in size. By thinking of BV and ABV algorithm, taking the bit-parallelism scheme and adding the ideas of bitmap mapping and tuple space, this paper presents a new algorithm. The new algorithm reduces the complexities of both the time and storage and can scale well with the growth of the filter databases in size. It realizes the algorithm in a virtual environment and analyzes the experimental data.
  • MA Xinyu; LIU Qiong; QIAN Leqiu;
    Computer Engineering. 2007, 33(14): 49-50,5. https://doi.org/10.3969/j.issn.1000-3428.2007.14.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The traditional architecture of UDDI becomes more and more inappropriate to industrial reality. The cost of data synchronization and replication is huge, and domain-specific attributes of UDDI are not contained. This paper expands the traditional architecture of UDDI. A component called UDDI Broker is proposed, which contributes to the new distributed UDDI architecture. Also the mechanism of service advertisement and request according to UDDI Broker is presented.
  • SUN Qiang; WANG Yinglin
    Computer Engineering. 2007, 33(14): 51-53. https://doi.org/10.3969/j.issn.1000-3428.2007.14.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes the data model of the complex product configuration in UML language, and establishes a practical data model. Under the business requirements of the mass customized products, industry of discrete manufacture demand for high efficiency dynamic management on product configuration. This data model establishes a structure of product tree with flexible properties, includes a parameter driven rule representation, and combines the convert procedure of tree view from design to build.
  • HU Chenguang; ZHENG Qilong; XU Yinlong; YAO Zhen; YAO Zaiyong; ZHANG Hongtao;
    Computer Engineering. 2007, 33(14): 54-56. https://doi.org/10.3969/j.issn.1000-3428.2007.14.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new cache simulation tool, which uses only single computer to simulate cache access of those parallel programs running under heterogeneous environment is presented. By specifying the parameters and substitution algorithms for each cache model bounded to each or a group of subprocesses/subthreads within one parallel program, users can obtain groups of cache access parameters. The work listed here is helpful to reduce the dependency to those real parallel environments when doing parallel simulation, meanwhile, its function can easily be extended by defining users’ own substitution algorithms or inter-process communication block to meet their own need.
  • WEI An
    Computer Engineering. 2007, 33(14): 57-58,6. https://doi.org/10.3969/j.issn.1000-3428.2007.14.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents the realization of mix file system based on embedded Linux. This file system realizes data dynamic and static storage over different storage media based on several popular file system of embedded Linux, which matches the different storage requirement as well as optimize the system storage resources. This paper describes the details to design each module and the method to build the mix file system. The result shows that this mix file system is superior to those single file systems and has the advantage of optimized structure and good performance, which can fully meet the system requirements.
  • XIANG Yang; WANG Min; MA Qiang
    Computer Engineering. 2007, 33(14): 59-61. https://doi.org/10.3969/j.issn.1000-3428.2007.14.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    There are a lot of difficulties in the ontology building such as the unclear building methods, ununified ontology languages, lack of tools. To solve these problems, this paper presents an ontology building method with Jena. The method is composed of 5 parts: class description, property description, link of property and class, individual creation, ontology metadata adding. The validity of the method is proved with an instance.
  • MO Qian; LIU Xiao
    Computer Engineering. 2007, 33(14): 62-65. https://doi.org/10.3969/j.issn.1000-3428.2007.14.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The object of aspect oriented software development(AOSD) is to provide methods of systematizing marking, modularizing and assembling transverse cut attention in the software life cycle. With the development of the AOSD technology, a manual supporting good projecting aspect oriented system development is required. This paper presents a study of existing approaches to aspect-oriented software engineering. It examines approaches such as consideration for aspects at the requirements, design and implementation phases and provides criteria for comparing approach. It provides guidelines for the selection of a particular approach(or set of approach) for actual aspect-oriented applications.
  • XUE Hong; WANG Min
    Computer Engineering. 2007, 33(14): 66-68,8. https://doi.org/10.3969/j.issn.1000-3428.2007.14.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With supermarket sale data, the supermarket sale DSS of C/S framework is designed and developed based on data warehouse, OLAP and data mining technologies. This paper introduces the established process of data warehouse and realization of online analytical processing technology from application requirement. The data mining function module seeks the optimal putting layout of goods shelves by analyzing the sale record of merchandise. The module can help managers set down member card serving strategy and sales promotion project according to the analysis of member information to adapt well to consumers and keep steady consumption group.
  • DENG Wenping; ZHU Peidong; LU Xicheng
    Computer Engineering. 2007, 33(14): 69-70,8. https://doi.org/10.3969/j.issn.1000-3428.2007.14.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new definition of similar data set is proposed for some special data sets which have the same attributes in a relational database model. For compression of a single data set, the database normalization is performed by partitioning the relations; for multiplet similar data sets, a data lossless compression algorithm is proposed, which is based on a 0-1 status tag sequence. With the compression method, redundancies among similar data sets evidently decrease, and decompression finishe fast and completely. Experimental results show that with the method compression on similar data sets is efficient without any loss and access to the data is fast.
  • SONG Li; LIU Guohua; TONG Bing
    Computer Engineering. 2007, 33(14): 71-72,9. https://doi.org/10.3969/j.issn.1000-3428.2007.14.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Although it is convenient to exchange data by publishing view, some information may be disclosed in the publishing process, Therefore, it is a new issue of database security to ensure the publishing view safety. This paper proposes the theorem of query-view security determining and method of measuring disclosure, and gives algorithm of eliminate the information disclosure. Experimental results show that algorithms eliminate the information disclosure efficiently, and ensure the view security.
  • ZHAO Na; ZHAO Jinxin; LI Tong
    Computer Engineering. 2007, 33(14): 73-75,8. https://doi.org/10.3969/j.issn.1000-3428.2007.14.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Software evolution becomes an important characteristic in software life cycle. System dynamic development model, which supports software concurrent engineering, is extended with standardization, role model, resource model and hierarchy. It produces the second generation SDDM, which is configurable, reusable, supporting the standardization and software evolution model.
  • ZHANG Yikun; XIA Hui; SHI Fengming
    Computer Engineering. 2007, 33(14): 76-78. https://doi.org/10.3969/j.issn.1000-3428.2007.14.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem that component resource code is unidentified, this paper abstracts two kinds of test information from component specification and interface, and then generates component state test cases. Component attributes and states can be analyzed through test information. Attribute-relationship and ideal state space can be obtained from attribute-state relationship. Test tree is constructed and test cases are generated by different coverage criteria.
  • JIANG Wei; MA Guangsi
    Computer Engineering. 2007, 33(14): 79-81. https://doi.org/10.3969/j.issn.1000-3428.2007.14.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Advantages and disadvantages of different popular frameworks are studied according to the request of actual project. In order to make a full use of their advantages, a technology integratiy spring with other four popular MVC frameworks, namely, struts, tapestry, JSF and Webwork2 is discussed, the process of these integrated frameworks is analyzed, and the key configuration is displayed. Experimental results show that the new framework enhances the application development at every layer, and promotes the project’s development.
  • Networks and Communications
  • GAO Lijuan; ZHAO Hongli; JIANG Taijie
    Computer Engineering. 2007, 33(14): 82-85. https://doi.org/10.3969/j.issn.1000-3428.2007.14.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the research of mathematic model, a single-and-multi-layer model is established, on which a new multilayered routing algorithm for space information network is proposed. Results of analysis and simulation show that the algorithm has little delay and reduces the handover probability of path, which effectively improves the routing performance of the space information network.
  • PI Xingyu; YU Hongyi; JIA Guangxin
    Computer Engineering. 2007, 33(14): 86-88. https://doi.org/10.3969/j.issn.1000-3428.2007.14.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A distributed and cooperative localization method for the target in wireless sensor network system is presented. This new approach uses energy measurements from the individual sensors in the sensor field to detect the targets. The position of the target can be estimated based on a distributed and cooperative localization model using the energy measurements. Extensive simulation results show that this new approach can locate the target effectively. It can reduce the complexity of the processing. It is a feasible and attractive localization method for the wireless sensor network system.
  • PEI Lei; CHEN Min; ZHANG Guangxing; WU Yue
    Computer Engineering. 2007, 33(14): 89-91. https://doi.org/10.3969/j.issn.1000-3428.2007.14.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    NAT-PT transition gateway is based on NAT-PT, in onder to ensure the proper operation of it and the network, the gateway need to implement network management on it. This paper aims at NAT-PT peculiar framework, realizes the collection of distributed MIB, and on the basis, designs and realizes the agent of SNMP.
  • DUAN Lianguo; YE Yousun; HU Zhongyu
    Computer Engineering. 2007, 33(14): 92-94,1. https://doi.org/10.3969/j.issn.1000-3428.2007.14.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Using simulation for analyzing the MPLS network is a valid approach. This paper studies the MPLS technology based on ATM, implements the simulation model of the label switch router based on ATM after referring to the MPLS model in the OPNET simulation tools, and constructs the MPLS simulation model. The performance of the data transmission in the experimental network that uses the MPLS model is superior to the network that does not use MPLS. The development of the model benefits the study of the performance of MPLS network.
  • SHEN Bin; SHI Bingxin; LI Bo
    Computer Engineering. 2007, 33(14): 95-97. https://doi.org/10.3969/j.issn.1000-3428.2007.14.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Although an autonomous mobile Ad Hoc network (MANET) is useful in many scenarios, a MANET connected to the Internet is more desirable. In such integrated scenarios, commonly known as hybrid Ad Hoc networks, performance of the Internet connectivity will be degraded greatly if obvious unidirectional links are ignored and gateway discovery packets are rebroadcasted blindly during MANET nodes discovery available Internet gateway. The routing protocol called Ad Hoc on-demand distance vector (AODV) has been modified to set up multihop paths to the Internet gateways in the MANET. Through exchanging HELLO packets which are identical to the AODV hello packets except for the additional neighbor list and partner list, unidirectional links are removed from route computations and redundant rebroadcast of the broadcast packets are inhibited simultaneously in the procedure of gateway discovering. Performance results using NS2 simulations, under varying number of unidirectional links and node speeds, show that the Internet connectivity scheme can provide better performance than others due to avoiding unidirectional links and relieving broadcast storm, and is a step closer to making the large-scale deployment of MANETs a reality.
  • LIU Changshu; LI Jun; YU Haiyan
    Computer Engineering. 2007, 33(14): 98-100. https://doi.org/10.3969/j.issn.1000-3428.2007.14.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper points out the necessity of sharing GUI application in Grid environment. It compares GAS with related works in the fields of thin client computing and distributed window system. This paper gives the goals and the details of the system design and implementation. It measures the performance and states the future work considerations.
  • WANG Xiaonan; QIAN Huanyan
    Computer Engineering. 2007, 33(14): 101-103. https://doi.org/10.3969/j.issn.1000-3428.2007.14.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The existing designs for providing Anycast services are either by confining each Anycast group to a preconfigured topological region or by globally distributing routes to individual Anycast group which causes the routing tables to grow proportionally to the number of all global Anycast groups in the entire Internet to result in Anycast scalability problem, both of which restrict and hinder the application and development of Anycast services. A new scheme of implementing Anycast service is proposed and it solves both Anycast scalability and other existing problems, such as router table explosion, TCP communication errors, and so on, which are generally caused by performing Anycast services on IP layer. The feasibility and validity of this new scheme are analyzed and discussed. Meanwhile, the performance of this scheme is analyzed according to experimental data.
  • YE Jinxing; ZHAI Weibin; LIU Baoxu; JIANG Zhuoming; XU Rongsheng
    Computer Engineering. 2007, 33(14): 104-106. https://doi.org/10.3969/j.issn.1000-3428.2007.14.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The main part of high speed network content auditing system(HSNCAS) is introduced. The process model of HSNCAS is classified into pipelining model and multi-section model. An algorithm of multi-priority memory feedback (MPMF) for pipelining model is presented and system software architecture is designed based on it. The MPMF algorithm forecasts and sends feedback of different priorities to the load balancer by the memory usage of every part of the system. It can effectively use the hardware resources and improve the overall data processing rate. A solution for “half session” is also proposed.
  • YUAN Zhihao; GU Naijie; REN Kaixin; LIU Xiaohu; BI Kun;
    Computer Engineering. 2007, 33(14): 107-109. https://doi.org/10.3969/j.issn.1000-3428.2007.14.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Internet consists of many autonomous systems and the interconnection of the ASes reflect the macrostructure of the Internet. Research on the interconnection among ASes can help analyze the characteristics of the network. This paper focuses on the discovery of AS-level Internet topology. It implements an Internet topology discovery system which analyzes BGP tables to get the AS-level topology then display it directly. By analyzing degree distribution properties in the topology, the inherent power-law distribution property of the derived topology can be seen.

  • LI Renjian; CHEN Liqian; WANG Ji
    Computer Engineering. 2007, 33(14): 110-112. https://doi.org/10.3969/j.issn.1000-3428.2007.14.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The best way to bring satellite into Internet is using IP technology in the satellite communication. During the design and research of some onboard computer, this paper explores the use of IP protocol and its routing technology in satellite communication. It develops ATM driver for the RTOS RTEMS, implements IPOA to support IP protocol, and implemented RIP. It tries to simplify the protocol stack and improves its security for onboard usage. It successfully makes onboard computer work as a router in space.
  • LI Jia; CHEN Zhigang; ZHANG Zhibing; CHEN Rong
    Computer Engineering. 2007, 33(14): 113-115. https://doi.org/10.3969/j.issn.1000-3428.2007.14.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Task distribution and scheduling is important in grid computing. Through constituting task scheduling judge system, this paper proposes a judge of scheduling capability on the account of communication cost, processor’ utilization and load balance. By giving definition on some problems, it brings forward relation probability, processor satisfaction and load pressure. Explanation of algorithm structure and steps is given. Several different distributed methods are computed by mathematic computing and the computing result is analyzed, the conclusion is given.
  • DU Mingfang
    Computer Engineering. 2007, 33(14): 116-117,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    All possible uncertain delays and their mechanism in closed-loop networked control system(NCS) which includes a remote network are analyzed. Considering real projects’ real-time request, some effective strategies to resolve the network-induced delay problems are put forward which include two main aspects. One is applying time-driven way to poll the field data by estimating and testing the best scanning period, and the other is applying event-driven way to response the uncertain control commands at a priority level. Through the program’s proposal, the uncertain delay is transformed into a controlled delay. This method can make up the NCS’s performance losing caused by the uncertain delay.
  • DAI Xuan; DING Wei; CHENG Guang;
    Computer Engineering. 2007, 33(14): 118-120. https://doi.org/10.3969/j.issn.1000-3428.2007.14.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An attribute-oriented asymmetric metrics for TCP flow is proposed, including the definition and the way of calculation, with which and after being rebuilt to TCP flow, two traces of IP packet sniffed from a gigabyte backbone boundary of CERNET are analyzed on the attributes of TCP flow length (packet number) and flow bytes. Some interesting characteristics behind the flow are obtained, which can be used for network behavior research.
  • Security Technology
  • GU Yu; FAN Jing; ZHANG Tianjun
    Computer Engineering. 2007, 33(14): 121-122,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A multi-agent distributed intrusion detection method based on random subspace method is put forward. Support vector machine method is the key detection algorithm of intrusion detection agent. The knowledge complementarity of multiple agents is created by the introduction of random subspace method, then these agents are distributed to detection nodes in the network. Subsequently the conclusions of each agent are composed by the ensemble idea. The robustness of the system is effectively improved by distributed intrusion detection based on multi agent. The experiment results show that detection precision of this method is higher than that of single SVM and Bagging.
  • LI Chaorong; ZHANG Ying; ZHANG Anni
    Computer Engineering. 2007, 33(14): 123-124,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A multi-detector IDS model based on computer cluster is put forward. In this system every detector comprises several PCs that can improve the response speed of the system’s. In order to improve the prediction and generalization ability of the detector, twice PSO algorithm is proposed to construct neural network ensemble, which is designed in PVM parallel environment.
  • ZHANG Tao; FAN Mingyu; WANG Guangwei; LU Xiaojun
    Computer Engineering. 2007, 33(14): 125-127. https://doi.org/10.3969/j.issn.1000-3428.2007.14.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Elliptic curve cryptosystem (ECC) is well suited for the implementation on memory constraint environments due to its small key size. However, side channel attack (SCA) can break the secret key of ECC on such devices, if the implementation method is not carefully considered. The scalar multiplication of ECC is particularly vulnerable to SCA. This paper proposes a refined width-w NAF method with pre-computed table, which is essentially intended to resist SPA, DPA, RPA and ZPA. The proposed scheme utilizes Masking technology to thwart those attacks; Meanwhile, pre-computed table by the characteristic of the even and odd scalar is optimized. The cost of computation and the size of pre-computed table in the algorithm are less than Mamiya’s WBRIP method.
  • HUANG Xiaosheng; GU Jingwen
    Computer Engineering. 2007, 33(14): 128-129,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An image encryption algorithm based on compound chaotic sequence and wavelet transform is proposed for the possible degradation of single chaotic map sequence and the high computing work of scrambling encryption of image. The algorithm combines Logistic mapping with Chebychev mapping which are both controlled by a random initial parameter generated by m-sequence to substitute encryption the image, then decomposes the image with wavelet transform, and in the end scrambles the approximation wavelet coefficient. The experiment result shows that the algorithm improves the degradation problem of single chaotic sequence with better randomness and improves the histogram distribution of the image. The algorithm has good encryption result to digital image data.
  • GAO Fei
    Computer Engineering. 2007, 33(14): 130-132. https://doi.org/10.3969/j.issn.1000-3428.2007.14.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to get binary sequences, which are random and sensitive to the initial values, this paper presents an approach of generating extended chaotic sequences based on Bernstein function and interpolation method. Simulation results show that the sequences generated by this approach have good pseudo-randomicity. With nonlinear dispersion of one-dimension and two-dimension, the process of dispersion becomes safer. The application of the sequences in image encryption is presented. The algorithm has good efficiency in image encryption.
  • WANG Yue; CAI Wandong; ZHANG Yi
    Computer Engineering. 2007, 33(14): 133-135. https://doi.org/10.3969/j.issn.1000-3428.2007.14.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Safety critical network determines the survival and the development of the safety critical system. With the change of safety critical system’s environment, survivability and real-time communication have become two crucial questions. This paper analyzes the structures of five kinds of safety critical networks and indicates the shortage of them. It proposes a new structure of survivability safety critical network based on fibre channel, and suggests a dual self-healing algorithm to reduce the recovery time and improve the rate of recovery.
  • SHOU Jiamei; GU Dawu
    Computer Engineering. 2007, 33(14): 136-138,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on Chong Hee Kim’s scheme, an improved pay-TV management scheme for multiple channels is presented. The scheme can be used for multiple channels, each of which has its own private key. Only one secret key shall be kept by each user regardless of the number of channels. Channel revocation can be easily done as well as re-subscription. A black box piracy tracing algorithm is used in the scheme to prevent customers from releasing their private keys.
  • WU Zhongwei; WANG Yi’an; HAN Jin; XIE Li;
    Computer Engineering. 2007, 33(14): 141-141.
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The widely used P2P file share software has incurred a significant threat to the modern network security. A P2P file share monitor system is presented. The system employs the way of distributed protection, and security policy is set by managers collectively, but it performs at each network terminal, which avoids the problem of network performance bottlenecks and achieves fine-granularity access control.
  • YANG Houjun; CUI Xueying; FAN Yanbin
    Computer Engineering. 2007, 33(14): 142-144,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An improved combined watermarking scheme for image authentication and protection is proposed. By utilizing error correction code, the robustness of robust watermark is improved. This algorithm is a public (watermarking scheme) and the two kinds of watermarks can be retrieved without knowing the original image. Compared with others schemes, the ability to resisting all kinds of tamper is improved. Meanwhile, besides telling whether an image has been tampered, the fragile watermark can reflect the distortion status truly and intuitively.

  • ZHAO Yan; ZHAI Weibin; YANG Zeming; XU Rongsheng
    Computer Engineering. 2007, 33(14): 145-147. https://doi.org/10.3969/j.issn.1000-3428.2007.14.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A comprehensive information security audit system is designed, and system structure and audit function are analyzed. By studying the Web services and correlated technologies such as XML, SOAP, WSDL, UDDI, and other protocols, this paper describes the interface of the audit system. This audit system is a LCS, and can be reused and called by other users conveniently and frequently via network.
  • SHA Kaibo; LIU Xiaojie; LI Tao; HU Xiaoqin; MAO Chang
    Computer Engineering. 2007, 33(14): 148-150. https://doi.org/10.3969/j.issn.1000-3428.2007.14.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an E-mail-based secure information transmission (EBSIT) method, and describes its model of application on Web. EBSIT is built on the public key infrastructure (PKI). It can provide secure services (such as digital signature, data encryption, integrity verification and so on) for data transmission in an application system. EBSIT can also ensure data secure in the period of data storage to some extent.
  • LIN Yang; LIU Guiquan; YANG Lishen
    Computer Engineering. 2007, 33(14): 151-153. https://doi.org/10.3969/j.issn.1000-3428.2007.14.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the application of intrusion detection, SVM maintains fine detection status on the condition of small-scale dataset. This paper proposes an improved SVM method. Through cutting non-effective records from training set under the guidance of specific probabilities, it gains better classification results and greatly ameliorates the situation of high resources occupation and time cosumption in traditional SVM training and classification. The tests on DARPA dataset show that this method performs well in intrusion detection.
  • LI Yang
    Computer Engineering. 2007, 33(14): 154-156. https://doi.org/10.3969/j.issn.1000-3428.2007.14.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces an intrusion detection model based on clustering analysis and realizes an algorithm of K-means which can set up a database of intrusion detection and classify safe levels. Experiential data are not required to set up this detection system, which is capable of re-classifying intrusion behaviors in terms of related data automatically. Simulation experiments show that the technique possesses strong applicability and self-adaptability.
  • LIU Lianhao; CUI Jie; HU Ruida; LIU Shangli
    Computer Engineering. 2007, 33(14): 157-159. https://doi.org/10.3969/j.issn.1000-3428.2007.14.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the short-block encryption algorithm based on AES, studies the S-box of the algorithm, and points out that the size of S-box has great influence on encryption performance. The new decimal S-box is constructed by taking multiplicative inverse and applying affine transformation, and its size is 10 times of the original one. And the new S-box is applied in the short-block encryption simulation system, and it shows that the new S-box strengthens the resistance of the algorithm against attack and improves the security of the encryption algorithm. Experiments and simulation indicate that the new S-box improves all the diffusion rate, during which the key to cipher in encryption process increases by 25 percent.
  • WANG Huimei; WANG Yongjie; XIAN Ming
    Computer Engineering. 2007, 33(14): 160-162. https://doi.org/10.3969/j.issn.1000-3428.2007.14.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Attack effect evaluation technology for computer networks is an important and challenging subject of security evaluation in information systems. This paper proposes a data collection model of computer network attack effect evaluation based on mobile agent and proper network security index set from the study of the performance of networked information system. Mobile agent technology is studied. The implementation idea of the data collection of attack effect evaluation system based on mobile agent and the corresponding model verification method are also presented.
  • Artificial Intelligence and Recognition Technology
  • LI Jie; SHEN Shituan; CHEN Xing
    Computer Engineering. 2007, 33(14): 163-165,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The “intelligent guide completeness process rule tree” is put forward for knowledge expressing mode and storage structure based on thorough research on aerial electronic instruments and fault diagnosis expert system. It implements the function of completely recording the experience of expert troubleshooting, and a method of diagnosis supporting rule-tree is designed. The method can simulate expert thought truly and automatically by operating computer. It has been applied in an important national project successfully. It is proved that the system can improve the accuracy and rapidity of detecting faults; meanwhile, the method is general for some system fault diagnosis in other fields.
  • LIU Dexi; HE Yanxiang; JI Donghong; YANG Hua
    Computer Engineering. 2007, 33(14): 166-167,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel multi-document summarization strategy based on basic element(BE) vector clustering. In this strategy, sentences are represented by BE vectors instead of word or term vectors before clustering. The BE-vector clustering is realized by adopting the k-means clustering method, and a novel clustering analysis method is employed to automatically detect the number of clusters, k. The experimental results indicate a superiority of the proposed strategy over the traditional summarization strategy based on word vector clustering.
  • ZHANG Haiying; ZHANG Tianwen ; WEN Xuan
    Computer Engineering. 2007, 33(14): 168-170. https://doi.org/10.3969/j.issn.1000-3428.2007.14.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to detect the point targets in the case of occlusion with cloud, following the track before detection framework, this paper presents an information association method based on grey and contrast. Multiple targets detection is achieved based on the accumulated trajectories. The following experiments prove its validity.
  • ZHANG Hengbo; OU Zongying
    Computer Engineering. 2007, 33(14): 171-173. https://doi.org/10.3969/j.issn.1000-3428.2007.14.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents and realizes a new image retrieval method by combining the information of color connected area and its features of texture. The image is distributed into several parts, the color connected areas in the image is computed, the primitive co-occurrence matrix of four colors’ corresponded with the connected area of each color is extracted, the image retrieval on the basis of the content is realized through the use of the feature similar function which is designed according to these features. The result of the experiment shows that this method effectively combines the information of image’s textures and its color constitution as well as its distribution which has a good effect.
  • SONG Chunlin; FENG Rui; LIU Fuqiang; CHEN Xi
    Computer Engineering. 2007, 33(14): 174-176. https://doi.org/10.3969/j.issn.1000-3428.2007.14.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By studying the limitations of existing hybrid fractal-wavelet image compression methods, this paper proposes a novel hybrid fractal-wavelet image compression algorithm. Briefly, it adopts diverse error thresholds as well as searching steps, considering varied significance pertaining to coefficients of adjacent subband images with the same orientation but different frequencies, when fractal searching is made among them. Great searching steps along with small error thresholds applies to high frequency subbands, while the contrary is suitable for low ones. Theoretical analysis and experiment results indicate that this algorithm largely increases the compression rate and the speed of encoding without reducing SNR and quality of decoded images, which is superior to the traditional wavelet tree based algorithms of fractal image compression.
  • TAN Tianxiao; ZHAO Hui; ZHAO Zongtao
    Computer Engineering. 2007, 33(14): 177-179. https://doi.org/10.3969/j.issn.1000-3428.2007.14.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Intelligence is one of deciding factor in informational combat. This paper presents a retrieval model——AIRSM based on multi-agent, contemporarily, it constructs a user model through the method of latent semantic indexing(LSI), AIRSM can adapt to retrieval demands of different users. The experiment proves that AIRSM can achieve military intelligence retrieval intelligently and individually to a certain extent.
  • XU Lu; CHEN Yangzhou; JU Hehua;
    Computer Engineering. 2007, 33(14): 180-182. https://doi.org/10.3969/j.issn.1000-3428.2007.14.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the obstacle avoidance of mobile robot in unknown environment or partially unknown environment, this paper presents the dynamic behavior control method. The method is making a use of dynamic window to analyze the information, excitating the relevant behavior to control, and fusing the behaviors to obtain the feasible path and velocity value. The move to goal behavior adopts fuzzy control method, and the obstacle avoiding behavior uses VFH method. The paper takes into account of the dynamics and kinematics restrict conditions, making the dynamic behavior control method much practical. The simulation results show that the method is efficient and feasible.
  • GENG Xiwei;WU Huiling; SHEN Jianjing
    Computer Engineering. 2007, 33(14): 183-184,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper designs a fighting command system used by missile unit based on MAS/CDMA. This system has a lot of advantages, such as good security, easy use and save of cost. It offers a new route for intelligent information-based development of the military command system of troops. It can also be used in other management of the combat troop of tactics or vehicle, etc.

  • ZHANG Ruifeng;
    Computer Engineering. 2007, 33(14): 185-187. https://doi.org/10.3969/j.issn.1000-3428.2007.14.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A universal mathematical model of vehicle routing problem with time windows is stated. On the basis of analyzing the weakness of genetic algorithm in local search, a new stochastic approach called the genetic simulated annealing algorithm is proposed to vehicle routing problem with time windows, and makes some experimental computations. The computational results demonstrate that the genetic simulated annealing algorithm can overcome the weakness of genetic algorithm and local search algorithm, so the high quality solutions to the vehicle routing problem with time windows is obtained.
  • XIAO Chaoyun; ZHU Weixing
    Computer Engineering. 2007, 33(14): 188-189,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In image segmentation, threshold selection is very important. A partial recursive algorithm of threshold selection and segmentation is put forward, which is based on the Otsu threshold selecting method. Based on the information of entropy of image pixels, a partial recursive algorithm is used to search optical threshold. It not only reduces the running time, but also has better self-adaptability. With this algorithm, the image can be segmented effectively even if it is uneven and not the single-modal or bimodal one. The segmentation result has more details, which is good to the feature extraction. An experiment with Lena image is made and good result is obtained.
  • LIU Haizhong; ZHU Qingbao
    Computer Engineering. 2007, 33(14): 190-191,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a locally adaptive nearest neighbor classification method based on supervised learning style which works well for the classes more than two. In this method, the ellipsoid clustering learning method is applied to estimate an effective metric for producing neighborhood that is elongated along less discriminating feature dimensions and constricted along most discriminating ones. As a result, the class conditional probabilities can be expected to be approximately constant in the modified neighborhoods, whereby better classification performance can be achieved. The experimental results show that this is an efficient and robust classification method for multi-class problems.
  • Multimedia Technology and Application
  • YANG Bo; LIAO Jianxin; ZHU Xiaomin; LV Xinrong
    Computer Engineering. 2007, 33(14): 192-194. https://doi.org/10.3969/j.issn.1000-3428.2007.14.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A novel architecture for peer-to-peer streaming media system is presented, which is named Zigzag enhanced topology-aware architecture(ZETA). The corresponding media content duplication and caching algorithm ZSDC(ZETA segment-based duplication and caching) are designed. Simulation experiment results show that, by employing the ZSDC algorithm, the ZETA structured system improves the quality of streaming service effectively and saves the storage resource of peers, provides streaming media service platform with strong expansibility, good performance, high service quality, loading-balance and fault-tolerance characters.

  • JIANG Xiuyan; YE Dejian; SUN Haojun
    Computer Engineering. 2007, 33(14): 195-197. https://doi.org/10.3969/j.issn.1000-3428.2007.14.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is an important problem for UDP streaming media server to get through the intranet so that the client computers can visit it smoothly. It is necessary for the streaming media server know the address and port where the data will be sent. However, intranet clients by NAT Server can’t tell the streaming media server such information. It proposes a method called ClearNat that provides address mapping related to ClearSerer streaming media server. By providing mapping information between NAT IP & port and Intranet IP& port, ClearNat method makes the ClearServer transmit data to the client smoothly. Results show that the method has the advantages of small computing complexity, supporting large concurrent clients, less modification for main program of ClearServer and little affecting of ClearServer’s effectiveness.
  • WANG Xinwei; ZHOU Lili; XIAO Yonglong
    Computer Engineering. 2007, 33(14): 198-200. https://doi.org/10.3969/j.issn.1000-3428.2007.14.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a motion estimation algorithm based on the Horn-Schunck optical flow estimation method. The first step estimates the forward gradients and backward gradients of the current frame. Through selecting the gradients adaptive to reduce the occlusion problem in computing optical flow, the algorithm is implemented on different kinds of video sequences and good segmentation results are achieved.
  • PEI Shibao; LI Houqiang; YU Nenghai
    Computer Engineering. 2007, 33(14): 201-202,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    H.264/AVC emploies RDO technique in inter-frame mode selection to enhance coding efficiency, but it increases computational complexity drastically. The proposed fast algorithm exploits rate distortion characteristic and spatio-temporal correlation among neighboring macroblocks to reduce the range of candidate modes, which can efficiently save the inter prediction complexity. Experimental results show that the approach reduces the coding time by 25%~46% with similar visual quality and bit rate of H.264/AVC.
  • 赵 旭
    Computer Engineering. 2007, 33(14): 205-206. https://doi.org/10.3969/j.issn.1000-3428.2007.14.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is a new idea of color image coding algorithm that considers R, G, B frames of a color image as a whole and makes use of three-dimensional discrete cosine transform (3D-DCT) to compress. In order to improve the color image coding efficiency based on this method, the new color image coding algorithm based on three dimensional feature classification is proposed. The experimental results show that the proposed method can improve the compression ratio by about 22 percent with the same quality of reconstructed image compared to traditional color image coding method. It can also improve the performance of color image coding based on 3D-DCT.
  • Engineer Application Technology and Realization
  • LIU Lanjun; ZHANG Xiaotong; WANG Jingcun
    Computer Engineering. 2007, 33(14): 207-209. https://doi.org/10.3969/j.issn.1000-3428.2007.14.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the implement methods of a high-speed optical interconnection network adapter for double token-ring network topology cluster. This network adapter is implemented based on FPGA technology and adopts high-speed high-bandwidth DDR DIMM bus as interface, optical fiber as network transmission media. Its routing protocols are implemented based on hardware logic embedded in FPGA chip. The network characteristics such as high-bandwidth, low-latency, high-reliability are ensured.
  • ZHANG Xiaodan; ZHAO Hai
    Computer Engineering. 2007, 33(14): 210-212. https://doi.org/10.3969/j.issn.1000-3428.2007.14.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new fusion model is proposed, which is the combination of integration BP neural networks models and DS evidence reasoning model, to solve the problems of low precision rate in automotive engine fault diagnosis by traditional expert system. The method of this paper not only realizes feature level fusion of all subjective observation data and expert experiments on different parts of engineer, but also realizes the predominance compensation of different models. In simulation experiment, by comparison between the two methods, this method proposed can improve diagnosis precision by 7.1% while reduces time and complexity.
  • WAN Xiangkui; XU Du; ZHANG Jun
    Computer Engineering. 2007, 33(14): 213-215. https://doi.org/10.3969/j.issn.1000-3428.2007.14.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The embedded system contributes scientific instrument new technical characters, which improve the performances of scientific instrument and make it more intelligent. The framework and characteristics of embedded system are analyzed, and the approaches of constructing scientific instrument with high performance based on embedded system are researched. Three constructing patterns are presented. It gives a materially constructing example, which illustrates the feasibility of the technique.
  • ZHANG Hua; GUO Jian; HAN Jungang
    Computer Engineering. 2007, 33(14): 216-218,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new verification methodology that uses PSL assertion to verify broadband digital cross connection chip XYDXC160, which supports 64 links SDH traffic of STM-16 frame at a speed of 2.488Gb/s and carries out 1 024×1 024 full exchange with the grain of STM-1. By adopting the assertion technology, it successfully deals with the complexity of verification effectively and quickens the verification process.
  • HUANG Guangqiu; QIAO Kun; LU Qiuqin
    Computer Engineering. 2007, 33(14): 219-221,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A visualized simulation on underground water bursting out and spreading along tunnels in an underground tunnel network system when an underground flood disaster happens based on the cellular automata model is put forward. In the simulation model, the cellular automata model is applied to describe the tunnel system and a cellular is used to represent an energy unit of spreading water which is eradiated from break-points of rock aquiclude and contains such status parameters as velocity and quantity of contained water. In simulating process, a great deal of quantitative information about flood spreading, destruction dynamics, degree of casualty and feasible measurements of adjustment and control can be obtained. Time, space and behaviors of system are linked together, thus a more authentic and visualized simulation on flood spreading along tunnels is made.
  • ZHANG Xiaopei; LI Xiang; PENG Changgen; LUO Wenjun
    Computer Engineering. 2007, 33(14): 222-224. https://doi.org/10.3969/j.issn.1000-3428.2007.14.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses the key techniques of realizing GPS orientation in 3G mobile phone based on Nucleus Plus embedded operation system. It manages all requests by queue and timer mechanism based on characteristic of Nucleus Plus OS, avoiding competition of resources and satisfying every request real-timely. It resolves communication of server and client and disunion problem between network data and GPS hardware data format by combining X1 message of 3GPP protocol, and realizes GPS orientation and car navigation of 3G mobile phone by adding compass module.
  • GUO Xiaohe; WANG Shaoping; JIAO Zongxia
    Computer Engineering. 2007, 33(14): 225-226,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the real-time feature and reliability of 1553B, studies the redundant configuring modes and analyzes its management methods of redundancy by status word and mode codes of 1553B. A simulation test of a flight control system with dual buses and dual RTs is realized.
  • ZHAO Hongjun; YANG Rijie
    Computer Engineering. 2007, 33(14): 227-229,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A simulator of sonar target echo has been designed on the base of its mathematical model, target echo model and reverberation model. It can generate active or passive sonar echo signal including passive or active sonar signal, target radiated noise, sea clutter and reverberation signal for passive or active sonar test and inspection. Output form of the sonar target echo simulator is acoustic signal. It has been proved that the simulator meets the standard of the design function and performance by way of performance test and test with practical sonar system. The paper introduces the mathematical model of sonar target echo simulator, and it emphasizes the way to achieve the simulator system’s hardware and software.
  • FENG Jiangfan; ZHANG Hong; SHA Yuejin
    Computer Engineering. 2007, 33(14): 230-232. https://doi.org/10.3969/j.issn.1000-3428.2007.14.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By analyzing the problems in current mobile living video systems, the paper points out that location based mobile living video is the direction for future development, and a mobile supervisory system based on GIS and GPS is proposed. The architecture, working principle and primary function of the system are discussed. Four key techniques adopted in the system are summarized and analyzed.
  • ZHANG Ka; WEI Peijie; XIAO Bingjia; YUAN Qiping
    Computer Engineering. 2007, 33(14): 233-235. https://doi.org/10.3969/j.issn.1000-3428.2007.14.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The engineering commissioning of EAST is the charge of the magnetic coils for purpose of testing the performance of the device and the main parameters of its subsidiary system. During the experiment, lots of data that reflect the status of the device should be monitored. This paper designs the real-time monitor system of EAST according to the requirement of the experiment and the network structure of EAST. The B/S and C/S combination design of the system make it possible for experiment scientists to analyze the data timely and decide what to do. The system is very important for the discharge experiments of EAST.
  • DUAN Guiping; SUN Yong; CHAI Xiaoli; JIANG Qiming
    Computer Engineering. 2007, 33(14): 236-238. https://doi.org/10.3969/j.issn.1000-3428.2007.14.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the CPCI system, processor card can work as system control card and intelligent peripheral card. Because of the traditional single mode PCI-to-PCI bridge can only works in transparent mode or non-transparent mode, accordingly, the CPCI processor cards based on these bridges can only work as system control card or intelligent peripheral card. In order to avoid this limit, this paper designs a universal CPCI processor card using the universal mode PCI-to-PCI bridge PCI6254 and a PowerPC G4 processor, which can work as system control card and intelligent peripheral card.
  • DENG Gaoming; CHEN Kaiyan;ZHANG Peng; ZHAO Qiang
    Computer Engineering. 2007, 33(14): 239-240,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper declares the principle of the differential power analysis(DPA) attack technology and the behavior of the encryption (decryption) chip’s power consumption during work at different abstract levels, gives several simulated models of power consumption at different abstract levels, and introduces the usage of the models in the simulator of the differential power analysis attack during the design of the crypto chips by a simulated DPA attack against DES.
  • ZOU Rong; ZHAO Lejun
    Computer Engineering. 2007, 33(14): 241-243. https://doi.org/10.3969/j.issn.1000-3428.2007.14.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The liquid water content (LWC) is a key variable in researching and defining fog structure. It is an important variable relative to weather. Currently, the method to measure the liquid water content is mainly manual sampling in China and foreign countries, which is hard and time consuming. This paper builds the multiple scattering model of imaging in fog and presents the algorithm of fog water content measure based on images blur degree. It also gives the structure of the automatic fog water content measuring system based on the algorithm. The result of simulation indicates that the algorithm can bring forward satisfactory result.
  • ZHANG Rongxin; GAO Sumei; GUO Jingwu
    Computer Engineering. 2007, 33(14): 244-246. https://doi.org/10.3969/j.issn.1000-3428.2007.14.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traditional osteoporosis treatment therapy is mechanized operation, lacking intelligent control system. This paper absorbs and learns from the results of studies, combing the software engineering thinking, designs the control system of medical treatment device and accomplishes an intelligent control for the instrument of laying the foundation for further popularization.
  • WANG Chuan; ZHOU Bing
    Computer Engineering. 2007, 33(14): 247-248,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In response to the feature of mixed flow assembly in car industry, with Siemens programmable controller at the core to cooperate a series of produces about Siemens MOBY discernment and human-computer interface, a variety of flexible management computer system in network making is construted. It achieves a variety of batch mixed flow production and satisfies the needs for different series and types transmission cases in assembly line. On assembly line, it uses PLC monitor hitch and supply situation for fittings in service positions, and uploads to PC machine for live monitoring. These measures can improve the output and quality of production.
  • Developmental Research
  • ZHENG Feng
    Computer Engineering. 2007, 33(14): 249-250,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses the service architecture of E-government, which is the single point of contact to user. It is based on trust and authorization system, supported by E-government sharing platform, and it takes the workflow engine, the general E-government structural unit and the service integration module as main contents. The service courses, including identity certification procedure, application authorization procedure, service scheduling procedure, are described. As an example, an imaginary tax system, used to verify the service architecture, is developed and deployed in the Internet.
  • YAO Heping; MA Jiezhong; WANG Ji; ZHAI Zhengjun; LI Xue
    Computer Engineering. 2007, 33(14): 251-253,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Vega has already become the common development tools in the scene simulation, but the API of Vega is process-oriented. It makes the development of large-scale system very complex and the reuse of the code very low. By analyzing different Vega based scene simulation systems, these systems have great similarities in program structure and commonability in the code. This paper combines the interface that Vega offered with characteristic of scene simulation and encapsulated the interface progressively to make it have the properties of objected-oriented, and offers a kind of common program structure.
  • TANG Jianbing; LI Ge
    Computer Engineering. 2007, 33(14): 254-256. https://doi.org/10.3969/j.issn.1000-3428.2007.14.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The basic situation and the federate structure of the warfare simulation based on HLA are introduced. Focusing on VV&A process of a warfare simulation as an example based on HLA, the VV&A process is divided into seven stages. Each stage is studied. The result shows that the warfare simulation meets the requirement of credit and it can be accredited. Research on VV&A gives help for federation development and improvement of the system, and increases the reliability of federation.
  • WANG Zijian; ZHANG Jun; LUO Xiling
    Computer Engineering. 2007, 33(14): 257-259. https://doi.org/10.3969/j.issn.1000-3428.2007.14.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve some problems in the traditional hardware-in-the-loop simulation, a new hardware-in-the-loop simulation platform based on VxWorks is proposed. Standard and extensible hardware of simulation computer is designed to fit the variable and extensible I/O interface. Foundation of simulation models is simplified by using Simulink. Models are automatically transformed into executable code running on real time operation system VxWorks based on hardware platform through real time workshop of Matlab. The efficiency of development is improved through automatic code generation. The requirement of real time is satisfied by executable code running on VxWorks. Some key techniques in this platform, such as the I/O interface driver, the porting of VxWorks operation system over hardware platform, automatic code generation based on hardware platform, modification of model parameters and collection of simulation results in real time, are discussed.
  • LIU Feng; WEI Jin; LONG Teng
    Computer Engineering. 2007, 33(14): 260-263. https://doi.org/10.3969/j.issn.1000-3428.2007.14.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the techniques such as PCI, MAILBOX handshake protocol and LINK port which belong to TigerSHARC processor, an in-circuit FLASH ROM programming software is designed, which is required by the agile booting module in multi-DSP system. The software can generate booting data file for multi-DSP system, facilitate the swift in-circuit FLASH ROM programming process, and be compatible with FLASH ROM from various chip venders and various booting module hardware interface.
  • JING Hao; ZHANG Jing; LI Junhuai
    Computer Engineering. 2007, 33(14): 264-266. https://doi.org/10.3969/j.issn.1000-3428.2007.14.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A design method of control connectivity from local network to multi-ISP is presented on the basis of link track policy and PBR. This disposition plan overcomes the defects of traditional static access that the real time detection and the instantaneous shift of gateway fail to function in case of the failure of an ISP, realizes link backup, effectively loads balancing in multi-entry network, and solves the difficult problems of datacenter network break. The feasibility and practicability of the solution are verified by typical engineering. It provides a practical way to solve connection problems in multi-entry network.
  • ZENG Liang; QI Huan; WANG Xiaoping; WANG Junfeng
    Computer Engineering. 2007, 33(14): 267-269,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Web service as a new mode for Web application has become the hotspot research in software engineering. The Web service technology provides a technical framework to integrate and co-operate numerous applications on heterogeneous platforms. Web services composition, which is composed of a number of basic services, is designed to implement complex business logic. This paper presents a lightweight Web services composition architecture based on SOAP and WSDL. It also shows how the architecture is used to solve the problems of integrating the data and applications on the navigation co-scheduling project for the Three Gorges-Gezhouba Dams.

  • SUN Li; MU Dejun; LIU Hang
    Computer Engineering. 2007, 33(14): 270-271,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Secure hash algorithms are important tools for cryptographic application such as digital signatures. To satisfy the requirements of computation speed, the paper divides SHA-1 into five modules of hardware architecture. Every module works independently and every module is optimized. It do not affect other modules when one module is modified.
  • JIANG Yiming; ZHANG Shensheng; SUN Yuanhao
    Computer Engineering. 2007, 33(14): 272-274. https://doi.org/10.3969/j.issn.1000-3428.2007.14.097
    Abstract ( )   Knowledge map   Save
    The extensible firmware interface(EFI) specification provides a standard environment for booting an OS. And NUWA system is a graphics user interface specialized for EFI environment with multi-layer design model. Graphics abstract layer(GAL) and input abstract layer (IAL) are the two abstract layers in NUWA system independent of any hardware. And the codes to implement these two layers initiate the “graphics engine” of NUWA, like the drivers in OS. This paper introduces the implementation of GAL using the EFI drive model.
  • GUO Qiong; LI Xiubin
    Computer Engineering. 2007, 33(14): 275-276,. https://doi.org/10.3969/j.issn.1000-3428.2007.14.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In consideration of characteristics of financial system, this paper proposes an automated test proposal based on WinRunner, test database, data drive and backup of database. It introduces developing environment of financial system, selection of test tools, construction of automated test database, automated test of data drive and backup of database etc. It gives emulation mode of the peripheral equipments. These peripheral equipments include keyboard, screen, card reader, code keyboard and printer.
  • DU Xu; LU Zhigang; ZHAO Mengxin
    Computer Engineering. 2007, 33(14): 277-279. https://doi.org/10.3969/j.issn.1000-3428.2007.14.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The integration of embedded system and wireless connection provides a prosperous foreground. This paper introduces the design and realization of WLAN communication technology based on PCMCIA, analyzes the key problems of the related driver design, and gives out a solution for the combination of the embedded system and WLAN.

  • GUO Rui; HUANG Zhangqin; HOU Yibin
    Computer Engineering. 2007, 33(14): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2007.14.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To make ambient intelligence identification system sense users in or out and identity as soon as possible, an approach of applying bluetooth technology into the system is proposed. The identifying strategy in the ambient intelligence is made, the architecture of software and hardware and communication criterion of bluetooth sensor and bluetooth adapter are designed, and the design details of key technique are also depicted. The communication problem of interface between bluetooth adapter and host is resolved. At last, bluetooth sensor and bluetooth adapter realized with the approach are applied into the identification system, and the experiment results show the system is stable and the sensing speed is fast.
  • CUI Xianyue; LI Jijun
    Computer Engineering. 2007, 33(14): 283-285. https://doi.org/10.3969/j.issn.1000-3428.2007.14.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A FAS-based data mining system AR_Miner with the latest mining results are designed. It consists of five parts: data preprocessing, initial calculation of frequent itemsets, update calculation of frequent itemsets, choice of frequent itemsets and generation of association rules. It visualizes generated results in support-confidence form, and provides an easily accessible and user-friendly interface for interactive mining based on frequent itemsets. The paper uses it into mining the association rules of tax offence of the historical data, receives some reasonable knowledge, and increases the level of inspection historical data management to provide a strong tax reform policy support.