Author Login Editor-in-Chief Peer Review Editor Work Office Work

05 July 2007, Volume 33 Issue 13
    

  • Select all
    |
    Degree Paper
  • LI Xiehua; YANG Shutang; LI Jianhua; ZHU Hongwen
    Computer Engineering. 2007, 33(13): 1-3,39. https://doi.org/10.3969/j.issn.1000-3428.2007.13.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new checking model based on the authentication tests for security protocol analysis. With the model, each component of the ciphertext is verified to determine its originator, so that the replayed attack can be detected in time. The combination of the check model and authentication tests can overcome the deficiency of the original authentication tests in detecting message replay attacks. The proof of neuman-stubblebine protocol shows that the checking model can detect the type flaw attack efficiently, while the original authentication tests cannot.
  • WANG Lingqun; ; LU Xiaofang; ; ZHENG Yingping;
    Computer Engineering. 2007, 33(13): 4-6. https://doi.org/10.3969/j.issn.1000-3428.2007.13.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To raise the chip yield and on-time-delivery rate so as to promote the competitive ability of the chip producers, a multi-agent technology based dynamic schedule algorithm of semiconductor fabrication line is proposed. To optimize the schedule system, the machining center agents cooperate with each other, both up and down stream information is taken into consideration when scheduling. The validity of this algorithm is demonstrated by simulation.
  • YU Jing; HU Ximing; YI Peng; WANG Binqiang
    Computer Engineering. 2007, 33(13): 7-9. https://doi.org/10.3969/j.issn.1000-3428.2007.13.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on structured P2P routing system model and Markov-chain model, this paper presents a quantitative evaluation on routing performance on the network-level of structured P2P network. Utilizing the average path length as the gist, this method resolves the difficulty induced by the routing algorithms on the overlay-level. It can exactly evaluate the routing performance on the network-level, and provide an evaluation mechanism to the research on the routing algorithms of structured P2P network with exactness.
  • ZHANG Lei; XIE Qiang; WU Xiaofan; DING Qiulin; HUANG Tianqiang
    Computer Engineering. 2007, 33(13): 10-12,2. https://doi.org/10.3969/j.issn.1000-3428.2007.13.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Semantic heterogeneity baffles query processing on information sources in the enterprise where large numbers of semantically heterogeneous information sources exist. The method of semantic integration based on Ontology mapping is put forward and query processing on semantically heterogeneous information sources is specified aiming at the problem in the paper. An example is given to validate the method. Application in a certain aeronautical institute shows the method can solve the problem effectively.
  • LIN Yi; YAN Jie; ZENG Xiaohui; ZHANG Kai
    Computer Engineering. 2007, 33(13): 13-15. https://doi.org/10.3969/j.issn.1000-3428.2007.13.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper points out the shortage of the lack of unified semantic foundation among UML multi-views, and presents an object-oriented Petri net (OOPN) based approach, executable object structural model (EOSM), to deal with it. This method represents both the aspects of objects’ structure and behaviors in the form of sub-net of OOPN, so that behaviors belonging to different objects can be coupled dynamically upon ESOM models. Simulation of an example shows that EOSM can unify the structural and behavioral models successfully.
  • DU Junwei; XU Zhongwei
    Computer Engineering. 2007, 33(13): 16-18,4. https://doi.org/10.3969/j.issn.1000-3428.2007.13.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Fault tree analysis(FTA) can be used to analyze the events and states of system failure. It is an effective method in analyzing the reliability and safety of safety-critical system. Petri nets describing and analyzing concurrent system can be used to model dynamic behavior of the system. Safety of the model constructed by Petri nets can’t be proved strictly by analysis methods of itself. A new method combining the advantages of Petri nets and FTA is presented. And the model of interlocking system is analyzed by this method.
  • WAN Benting; GONG Xing
    Computer Engineering. 2007, 33(13): 19-21. https://doi.org/10.3969/j.issn.1000-3428.2007.13.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Microwave imaging belongs to nonlinear and non-adaptive problem. Many reconstruction algorithms proposed is not optimal. In order to get better image, a trust region reconstruction(TRR) is proposed. It transforms microwave imaging into restrainable least square algorithm, and then it transforms least square problem into LCP(linear complemental problem). The implementation shows that reconstruction image quality of TRR is better than L-M(Levenberg-Marquardt).
  • ZHANG Yajuan; LI Jingfeng; ZHU Yuefei
    Computer Engineering. 2007, 33(13): 22-24,5. https://doi.org/10.3969/j.issn.1000-3428.2007.13.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    MAKAP protocol is a mutual authentication key agreement protocol. An attack that makes the adversary to personate the receiver successfully is proposed. When the attack is finished, the server thinks he has established a session key with the user. But in fact, the user does not communicate with the server at all. An improved variant of the MAKAP protocol is given, and the paper proves that in the random oracle model, the improved protocol is a secure AK protocol assuming the DDHP is intractable.

  • LIU Jinwei; HUANG Zhangqin; HOU Yibin
    Computer Engineering. 2007, 33(13): 25-27,5. https://doi.org/10.3969/j.issn.1000-3428.2007.13.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the isolated word speech recognition for system on chip(SoC). The algorithms applied to isolated word speech recognition on SoC are chosen and designed. The paper analyzes and designs the endpoint detection algorithm, LPCC method and DTW method of speech frame. It is helpful towards the research and development on new types of speech recognition SoC and SoPC.
  • LONG Shigong; LUO Wenjun; PENG Changgen; LI Xiang
    Computer Engineering. 2007, 33(13): 28-30. https://doi.org/10.3969/j.issn.1000-3428.2007.13.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A strand space model with variables is provided based on traditional strand space, the undermined terms and subterms are expressed with variables, and the variable occurs in the message term and its calculus. The protocol consists of strands with variables belonging to different participants in the protocol running. Based on the concrete traces, the logic designed for reasoning about the principal action, consists of syntax, atoms and inference rules. The basic modal formula means that the action P is finished with the result of . By associating sequence of actions and attaching the formulas, it can prove the security properties of protocols such as secrecy and authentication. It analyzes Helsinki protocol through the method, and the logic leads directly to rediscovery of Horng-Hsu’s attack.
  • SHI Liang; DONG Huailin; WANG Beizhan; LONG Fei
    Computer Engineering. 2007, 33(13): 31-33. https://doi.org/10.3969/j.issn.1000-3428.2007.13.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to overcome the problems in resolving large scale 0-1 knapsack problem with genetic algorithm, this paper introduces the directed mutation into the genetic algorithm and presents an active-evolution-based genetic algorithm(AEBGA) for the 0-1 knapsack problem. The algorithm uses probability coding mechanism to construct seed individual, which is used to generate individuals in each generation. In each generation, inducement is generated and used for seed individual evaluation. SGA, GQA and AEBGA are applied to solve large scale 0-1 knapsack problem and experiment results show that AEBGA has good ability of global optimization and high efficiency.
  • PENG Fei; QIU Shuisheng
    Computer Engineering. 2007, 33(13): 34-36. https://doi.org/10.3969/j.issn.1000-3428.2007.13.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    PEM, PGP and S/MIME improve the security of E-mail, but problems such as low speed and lack of security still exist. A novel secure E-mail system is proposed to handle these problems. A block cipher based on chaotic maps, a one-way hash function based on two-dimension hyper-chaotic maps and a digital signature algorithm based on chaos and elliptic curves are introduced to construct the scheme. Analysis and application show that the system possesses good performance on operation speed and security, and it has great potential in practice.
  • LI Qing; LI Zhishu; ZHU Mingfang; YIN Feng; YE Jun; CHEN Liangyin
    Computer Engineering. 2007, 33(13): 37-39. https://doi.org/10.3969/j.issn.1000-3428.2007.13.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve the efficiency of grid service selection, a new approach based on Q-learning is proposed. A new model based on Markov decision processes is proposed and the correlative novel algorithm is implemented with the adaptive ability of improved Q-learning for dynamic grid service selection. The experiment results show that the method is more effective than the traditional ones. Thus, it provides a good solution for grid service selection.
  • WEN Dongxin; WANG Ling; YANG Xiaozong
    Computer Engineering. 2007, 33(13): 40-42,7. https://doi.org/10.3969/j.issn.1000-3428.2007.13.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    High-level design technology in VLSI is a main trend in EDA, while high level synthesis is the key in it. Scheduling and interconnection is an important task at high level synthesis. This paper introduces some algorithms and provides a new idea of application of DVS technology which can dynamically change clock speed and supply voltages under satisfying performance and time constraints in order to reduce power consumption. It still makes, a feasible research plan.
  • ZHANG Lianming; CHEN Zhigang; DENG Xiaoheng; ZHAO Ming
    Computer Engineering. 2007, 33(13): 43-45. https://doi.org/10.3969/j.issn.1000-3428.2007.13.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To obtain the kinetic behavior characteristic of large-scale network teletraffic, this paper proposes a network teletraffic model based on fractional Gaussian noise (FGN) and fractional Levy noise (FLN), and the corresponding algorithms of estimating the parameter and generating the teletraffic. Extensive simulation demonstrates that the model proposed better than other classical teletraffic models, and it can accurately obtain the kinetic behavior characteristic of real-world teletraffic, including self-similarity and impulsion.
  • Software Technology and Database
  • LI Jie; XU Yong; WANG Yunfeng; WANG You
    Computer Engineering. 2007, 33(13): 46-48. https://doi.org/10.3969/j.issn.1000-3428.2007.13.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Conventional mining algorithms often produce too many rules for decision makers to digest. Instead, the concept of minimal association
    rules is introduced from the aspect of application in this paper. Minimal rule set, which includes rules with single item as consequent and the minimal
    number of items as the antecedent, can be used to derive the same decisions as other association rules without information loss, while the number of
    minimal rules is much less than of all rules. A mining algorithm without redundant rules is proposed and the mining efficiency is improved.
  • GAO Yong; ZHU Xiaoxi; ZHANG Jing
    Computer Engineering. 2007, 33(13): 49-51. https://doi.org/10.3969/j.issn.1000-3428.2007.13.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    GIS interoperation is desired of the spatial information science and technology. To support the implementation of GIS interoperation, this paper presents three design patterns: data adapter, façade and bridge. These design patterns can provide reusable implementation strategies of GIS software to fulfill the interoperation of spatial data and processes. And they can also improve the quality and efficiency of interoperable GIS software both in the design and the implementation phases.
  • YIN Yang ; FENG Shuo; LIU Zhenjun; XU Lu
    Computer Engineering. 2007, 33(13): 52-55. https://doi.org/10.3969/j.issn.1000-3428.2007.13.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    SonD system is a new type computing environment based on network storage, which provides a simple method for deployment and management of computers in very large scale computing environment. The method of sharing cache between virtual storage devices in SonD system implements the memory cache sharing of the physical sharing data of virtual storage devices on file level, and efficiently avoids the problem of data consistency because of cache sharing. It is proved that the method improves the performance of SonD system efficiently.
  • XIA Jiaoxiong; XU Jun; GAO Jue
    Computer Engineering. 2007, 33(13): 56-58,6. https://doi.org/10.3969/j.issn.1000-3428.2007.13.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Analytic hierarchy process (AHP) is put forward suits to multiple attribute decision problem of complicated hierarchy structure. With the AHP, complicated decision system is structured, weightiness of the connection factor is compared, validity model is formed, and quantitative basis for decision and analysis is provided. The database preprocessing approach on AHP is to evaluate every database for data warehousing building. And the approach selects the appropriate database to preprocess so as to raise the efficiency of data preprocessing. The model is an application to data cleaning in data preprocessing, so three data indexes, such as completeness, smoothness and consistency, are defined differently to incomplete, noisy, and inconsistent in data cleaning. The approach regards the three data indexes as a rule, insures the valuation’s stability, flexibility and contrast, and increases the effects on data cleaning.
  • XIE Tiezheng; LIANG Feng
    Computer Engineering. 2007, 33(13): 59-61. https://doi.org/10.3969/j.issn.1000-3428.2007.13.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Placing service in reasonable position to let grid client access service more efficiently improve the performance of grid. This paper presents a dynamic service deployment and access system based on dynamic partition in grid environment. The grid nodes divide themselves into multi partition based on service quality dynamically. The service can deploy to reasonable position dynamically so that the grid client can access service more efficiently and fast.
  • DU Jing; AO Fujiang; YANG Canqun
    Computer Engineering. 2007, 33(13): 62-64. https://doi.org/10.3969/j.issn.1000-3428.2007.13.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Load balance is a key technology to improve the performances of parallel system and make full use of system resources in systems based on parallel component. This article brings forward a parallel component based load pool balance technology. Different from the traditional policies, the technology considers synthetically the influence of communication latency, fault tolerance and data consistency upon the load balance policy, its goal is to improve accurateness, high efficiency and robustness of the load balance policy, and enhancing the system performances on run time.
  • CHEN Xiang; LIU Junli
    Computer Engineering. 2007, 33(13): 65-67. https://doi.org/10.3969/j.issn.1000-3428.2007.13.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Due to complexity of implementing workflow management system and problems of soundness verification of workflow model, a combination method of workflow nets and ECA (event-condition-action) rule that constructs a workflow management system is brought forward. The semantics description and control of workflow nets are unified by the workflow description and executive mechanism based on ECA rule. Through establishing workflow description table based on ECA rule, the flow of the workflow is expediently controlled by adding ECA rules into workflow route mechanism. Through event trigger and message handle mechanisms, workflow description table can be executed and controlled by actually system.
  • ZHENG Zhiyun; YU Zhengtao
    Computer Engineering. 2007, 33(13): 68-70. https://doi.org/10.3969/j.issn.1000-3428.2007.13.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article proposes a metadata classification storage method based on the combination of rule and learning, extractes universal feature rules that affect metadata classification greatly through statistical analysis; for those metadata that cannot be classified using the rules, categorizes them through constructing classifier by adopting text learning method and regarding metadata record as a text that is composed of many attribute fields. According to experimental results, the system has good search performance when adopting metadata classification storage method.
  • WANG Zhenyu; CAO Lizheng
    Computer Engineering. 2007, 33(13): 71-74. https://doi.org/10.3969/j.issn.1000-3428.2007.13.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Data integration is one fundamental component of service-oriented-architecture-based enterprise application integration. Open source project OpenAdaptor can quickly support data integration, has the features of standards, rapid development, flexibility, easily customization and high reuse. This paper analyzes its principles and implementation, and gives an example to implement publish/subscribe model adaptor.
  • LIN Maokai; WANG Xiaofang; LIN Heng
    Computer Engineering. 2007, 33(13): 75-77,9. https://doi.org/10.3969/j.issn.1000-3428.2007.13.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To realize the transformation from ladder diagram to instruction list, a new algorithm is introduced. It translates the ladder diagram into directed acyclic graph, sorts and unites the serial and parallel relationship of the graph, and stores the serial-parallel structure in lists, generates the instruction list based on the lists. Traditional topological sort algorithm applied in the transformation does not always provide the correct instruction list when the structure of the ladder diagram is complex, while the new algorithm overcomes the flaw. The new algorithm provides the function of checking the logical faults in the ladder diagram. The time complexity of the new algorithm is O(n) in the best situation, O(n2) in the worst situation, which is basically the same with the topological sort algorithm. In normal condition, it is a little better than the topological sort algorithm.
  • LIANG Shanshan; ZHANG Junchao; FENG Xiaobing
    Computer Engineering. 2007, 33(13): 78-80. https://doi.org/10.3969/j.issn.1000-3428.2007.13.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A compiler can get accurate execution profile information about the program through profiling. It takes advantage of this information to aid trade-off making in various optimizations and improves the performance of the final code. This paper introduces the edge profiling technology in Godson/ORC compiler, gives the performance test report of CPU2000 with edge profiling enabled.
  • LIU Jie; XU Lizhen
    Computer Engineering. 2007, 33(13): 81-83. https://doi.org/10.3969/j.issn.1000-3428.2007.13.027
    Abstract ( )   Knowledge map   Save
    SwiftDB is a mobile database management system developed by college of computer science & engineering, southeast university. This paper proposes a method of using XML in synchronization mechanism of mobile database to process semantic combinations and detect conflicts. The method eliminates operation redundancy, simplifies transient transaction, reduces synchronization time, enhances success-ratio of synchronization transaction.
  • SHI Lei; YE Haiqin; WEI Lin; LIAN Weimin
    Computer Engineering. 2007, 33(13): 84-86. https://doi.org/10.3969/j.issn.1000-3428.2007.13.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Two metrics are commonly utilized in the performance evaluation of Web caching replacement policies: hit ratio HR and byte hit ratio BHR. Most of the researches make the assessment by only considering one of the two metrics or based on the experimental results, and have the limitation of lacking the performance evaluation from the viewpoint of relationship between the two metrics, which is discussed in the paper. A new Web caching performance metric: FBR is proposed which can be used as a performance measurement of Web caching replacement policies. FBR can also be made use of in the Web prefetching area so as to provide a basis for an efficient Web caching management.
  • ZHAO Rui; LI Hong
    Computer Engineering. 2007, 33(13): 87-89. https://doi.org/10.3969/j.issn.1000-3428.2007.13.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper develops a decision tree classifier SSC(similarity of same and consistent) for multi-valued and multi-labeled data, improves on MMC’s formula for measuring the similarity of label-sets to determine the goodness of splitting attributes. It proposes a new measure approach considering both same and consistent features of label-sets. The experiment shows SSC has improved accuracy of MMC.
  • YAN Mingchun; GAO Jing
    Computer Engineering. 2007, 33(13): 90-92,9. https://doi.org/10.3969/j.issn.1000-3428.2007.13.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An evaluation model to supplier based on combined AHP is proposed. Standard AHP is used to eastablish the weight of each rule in evaluation system. AHP based on interval is used to evaluate each project and give the interval number of evaluation. Order rules applicable to interval number is defined, and used to choose supplier according to final interval number. This solution can solve the state of being indeterminate of constructing judgement matrix with number in using standard AHP, and has been applied in an ERP system.
  • HONG Chunyu; LI Wenli
    Computer Engineering. 2007, 33(13): 93-95. https://doi.org/10.3969/j.issn.1000-3428.2007.13.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The contract net with confirmation protocol (CNCP) is a widely used coordination mechanism in multi-agent systems (MAS). But it can easily make the performance degrade when the number of participants and initiators increases. By setting a proper threshold of participants during the interaction between initiators and participants, it can reduce the risk of initiators and the amount of messages. How to determine the threshold becomes the key to solving the problem. Risks of both participants and initiators are analyzed, and the risk formule of participants and initiators are defined. A new method based on risk analysis (MRA) is proposed. This method solves the problem of how to determine the participant threshold. An example is given, which proves that MRA can limit the risk of participants and initiators, and reduce the amount of messages, which improves the performance of MAS.
  • LIU Mutao; ZHANG Lei; WANG Yan; ZHOU Xiaozhong; ZHANG Honglei; ZUO Yun
    Computer Engineering. 2007, 33(13): 96-98. https://doi.org/10.3969/j.issn.1000-3428.2007.13.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the research of API test, this paper uses software test technology to do API validity test, and designs the frame of automatic API test. It also gives the design and implementation scheme of automatic API test tool by using XML language and automation of API information pick-up, test case generation and test case implementation comes true with it. This tool is mainly used to verify the functions of third-party APIs and is adapted to software unit tests because of frequent use of API test in unit tests.
  • KAN Hongwei; MA Xiaoping; DU Lin
    Computer Engineering. 2007, 33(13): 99-100,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the uC/OS-Ⅱ v2.52 which is task management system, this paper presents solutions for increasing the number of usable tasks. An example of the least RTOS is given under the ARM MCU. Through the clock cycles from an experiment under the ARM7 MCU LPC2294, the solution is confirmed feasible.
  • ZHAO Xiaolong; YANG Yan
    Computer Engineering. 2007, 33(13): 101-102. https://doi.org/10.3969/j.issn.1000-3428.2007.13.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Granular computing is an emerging research method to deal with information and knowledge processing which is an umbrella term to cover any theories, methodologies, techniques and tools that make use of granules in problem solving. This paper reviews the research of status of granular computing, the models and approaches of granular computing, the application in data mining of granular computing and future research issues are also given.
  • WEI Lan; LI Wenfeng
    Computer Engineering. 2007, 33(13): 104-106. https://doi.org/10.3969/j.issn.1000-3428.2007.13.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A compiler system for visual programming language is designed by introducing the object-oriented technology into the design process. This paper analyzes complicated visual picture grammars, and syntax phenomenon are abstracted and classified into syntax unit class form. The design strategy of compiler-compiler is presented. The method to resolve translating visual pictures layout language into pseudoinstruction code is discussed. Also, how to realize steady, efficient compile system applying to hardware is studied. Visual programming language parser generator and a small simulated C compiler are used together to generate the final compiler system for visual programming language.
  • Networks and Communications
  • LI Wei; DENG Zhuanhua; HUANG Dexiu
    Computer Engineering. 2007, 33(13): 107-108. https://doi.org/10.3969/j.issn.1000-3428.2007.13.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The computing formula of the blocking probability for all-optical network with wavelength converters is presented. A quick dynamic genetic algorithm- variable mutation and crossover rates of genetic algorithm(VMCR-GA) is proposed to analyze the network blocking probability. The mutation and crossover operators in the VMCR-GA can be adjusted dynamically according to the search range to improve the speed of the algorithm. Comparing with the normal GA, the revised algorithm can improve speed 60% and reduce the network blocking by simulation on NSF network.

  • ZHANG Yikui; QIU Xuesong; CHENG Lu
    Computer Engineering. 2007, 33(13): 109-111. https://doi.org/10.3969/j.issn.1000-3428.2007.13.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Service quality assessment is a important content in service level agreement management. In order to solve current problems of existing service quality assessment approach and meet new requirements of service quality assessment, the general set of service quality indicator is studied and the policy-based approach for service quality assessment is proposed, service quality assessment process is described and characteristics of the approach are analyzed. implementation of a prototype validates that the approach can realize the real-time, finely granular, dynamic, automatic, scalable and quantitative service quality assessment.
  • LU Kezhong; LIU Yingling
    Computer Engineering. 2007, 33(13): 112-114. https://doi.org/10.3969/j.issn.1000-3428.2007.13.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    System lifetime is very important to wireless sensor networks. Under the precondition of keeping performance, through sensor nodes schedule, i.e. some work while others sleep, system lifetime can be prolonged effectively. As the performance of present schedule algorithms aren’t good, a scan line based sensor nodes schedule algorithm is proposed. In this algorithm, monitor region of node is approximated to scan lines by which redundant node is judged. Simulations show that the performance of this algorithm is good. The number of active nodes generated by schedule is about 91% of present algorithms and average coverage is about 1.84.
  • BAI Dongwei; LIU Chuanchang; CHEN Junliang
    Computer Engineering. 2007, 33(13): 115-117. https://doi.org/10.3969/j.issn.1000-3428.2007.13.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Non-functional attributes matchmaking of Web service plays an important role in enhancing the discovery precision of web services and ensuring the successful invocation. However, current researches pay more attention to some specific non-functional attributes, lacking general matchmaking approach. This paper proposes a general approach of non-functional attributes matchmaking of Web service based on policy. This approach uses Web services policy language(WSPL) to descript the non-function attributes of Web services, and introduces the policy combination into non-function attributes matchmaking. It also proposes the concept of layered-policy and its different attachment method. This general approach supports different kinds of non-function attributes, and is convenient to work with other function attributes matchmaking method to form an integrated Web services discovery and matchmaking system.
  • WANG Feng; LI Wenjing; QIU Xuesong
    Computer Engineering. 2007, 33(13): 118-120. https://doi.org/10.3969/j.issn.1000-3428.2007.13.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Performance control function associates the variance of network performance with the variance of network configuration. This paper presents a policy based general performance control method. The performance control policy model is defined according to the DEN-ng model framework, and the policy conflicts are detected and resolved within a network element. The results of the experiment indicate that the performance control system can adjust the network configuration dynamically to improve the network performance on the trigger of the performance event according to the performance control policy.
  • LIU Shouqiang; QI Deyu; LIU Bo; PAN Chunhua; YANG Bo
    Computer Engineering. 2007, 33(13): 121-123. https://doi.org/10.3969/j.issn.1000-3428.2007.13.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Network reputation systems are the systems that record, aggregate and distribute information about the past behavior of peers in an application. In the P2P resource-shared system, reputation systems serve two primary purposes: helping peers decide whom should be trusted and providing incentives to peers to be well-behaved. This paper introduces the concept of P2P network and its reputation systems, and analyses the present reputation systems, their models and algorithms. Based on the above new reputation system model is designed, in which the peer’s reputation metric can be queried by trust links. Reputation metric delaminating is also presented and the reputation system has been implemented with Java. At last some prospect of reputation system is given.
  • XU Chunrong; CAO Zheng; YANG Xianfeng
    Computer Engineering. 2007, 33(13): 124-126. https://doi.org/10.3969/j.issn.1000-3428.2007.13.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    More and more people pay attention to multicast because of its advantages in saving bandwidth and lightening servers’ load. Now CERNET2 has accelerated the transition from IPv4 to IPv6. The transition of multicast must be a hot spot. The article introduces a multicast transition method based on gateway. The model design and its implementation are showed. The test result indicates that this model is suitable to the transition of multicast.
  • LU Xiaotian; LI Xi; ZHOU Xuehai; JI Jinsong
    Computer Engineering. 2007, 33(13): 127-129,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The router’s forwarding rate is usually limited by the rate of route lookup. Thus, the method of route lookup and update are both important for router design. A method for implementing fast route lookup and update in hardware is described, which translates address range finding into prefix matching and uses B-tree for storing routing table. The method only uses a small on-chip SRAM and an off-chip DRAM. Tests show that the method can achieve the forwarding rate of OC-48.
  • DAI Pei; GE Baozhong
    Computer Engineering. 2007, 33(13): 130-132. https://doi.org/10.3969/j.issn.1000-3428.2007.13.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the analysis on the frameworks of the paging channel of CDMA,this paper computes the ratio of all messages of paging channels, and educes the relation between paging load with BHCA. Having estimated the paging load of Zhengzhou, it puts forward a solution of in zone paging and reduces the paging load from 65 percent to 50 percent or so.
  • YAO Ye; CAI Wandong; LI Hongliang
    Computer Engineering. 2007, 33(13): 133-134,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The problem of development on IP multicast, the developing status on application layer multicast, and scattercast are recommended. Based on the expansion of scattercast’s systematical architecture, a new systematical architecture of large scale application layer multicast is set forth in order to solve the expansibility and compatibility with IP multicast. This paper recommends performance evaluation parameters.
  • GAO Li; LI Renfa; LUO Juan
    Computer Engineering. 2007, 33(13): 135-137. https://doi.org/10.3969/j.issn.1000-3428.2007.13.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a distributed broadcasting algorithm based on optimized ants algorithm for sensor networks. The basic idea is as follows: it parts cluster according to nodes’ density, and optimized ants algorithm is used to find the optimal route starts from the broadcasting source node and traversals each node in the network and returns the source node. The data broadcasting and gathering can be achieved by the positive feedback of the ants. The experimental results show that the algorithm is efficient and scalable.
  • LIU Zheng
    Computer Engineering. 2007, 33(13): 138-140,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A scheme of energy-efficient policies for cluster-based embedded Web server is presented. It is implemented in embedded cluster platform with Linux. The energy-efficient policies of front end and back end in cluster platform are discussed. It designs a dynamic load estimating algorithm, and assigns a threshold mechanism in on/off algorithm in order to manage back end efficiently. It uses DVS policy in back end in order to select frequency appropriately when load changing. Simulation results show that compared with standard Linux kernel and other energy-efficient policies, this scheme has much better performance in terms of energy consumption saving.
  • CHEN Lei; WANG Yongsheng; LIU Zhen
    Computer Engineering. 2007, 33(13): 141-143. https://doi.org/10.3969/j.issn.1000-3428.2007.13.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To realize an effective and real-time data transmission in UAV communication network, on the basis of the study of routing protocols in existing networks, a novel best integrated link performance first routing protocol which utilizes Dijkstra algorithm is designed and realized. A node state addressing protocol is proposed for information exchange between UAVS in UAV communication network. The protocol is simulated and the results is given.
  • ZHANG Qiang; ZHAO Zheng
    Computer Engineering. 2007, 33(13): 144-146,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A geographical location based routing protocol is presented to augment TCP performance in high mobility wireless ad-hoc networks. This paper introduces a skyrocket broadcast by the integration of unicast and broadcast, which can drop system overhead. A new routing detection method is introduced based on random competition, which reduces the cost of routing discovery. The routing can be updated in time through periodic routing detection whose interval is adjusted automatically according to the estimation of nodes’ speed. The data packets are transmitted by a new label routing method that can reduce the packets’ head and make it easy to switch to a new routing. The simulation shows that LADRU can increase delivery ratio and throughput of TCP.
  • XIAO Deqin; WANG Jingli; YANG Bo; LUO Xiwen
    Computer Engineering. 2007, 33(13): 147-149. https://doi.org/10.3969/j.issn.1000-3428.2007.13.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Route infection motivates the novel concept of trouble nodes address that are identified, probed and isolated by the sink(s), and a trusted architecture is proposed based on isolation of trouble nodes for sensor networks. A trust routing protocol is introduced for the architecture, which selects trusted paths without any trouble nodes by avoiding trouble nodes and routing around them efficiently using modified geographic routing. Simulations show how the scheme effectively increases the good throughput and energy-efficiency of a sensor network and alleviates the influence of route infection. The scheme is easily used in the data-centric model in energy-constrained sensor network.
  • ZHANG Bencheng; FAN Huilian; QU Kun
    Computer Engineering. 2007, 33(13): 150-152. https://doi.org/10.3969/j.issn.1000-3428.2007.13.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyses the lack of flexibility of the CSCL system in personalization and mobility, and proposes a SIP-based CSCL model system, combining the characteristics of flexibility, convenience and being scalable of SIP Protocol as a signal control protocol. It also discusses the systemic structure and the solution for the personalization and mobility.

  • Security Technology
  • WU Jianwu
    Computer Engineering. 2007, 33(13): 153-154,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    User authentication service has become an important component of network security, especially over open network environment. Using
    the cryptographic one-way hash function and exclusive-or operation, this paper proposes a new mutual authentication scheme between the remote
    user and server. Compared with several existing similar schemes proposed in recent years, the new scheme shows good security and efficiency.
  • WANG Changguang; WANG Fangwei; ZHANG Yunkai; MA Jianfeng
    Computer Engineering. 2007, 33(13): 155-157. https://doi.org/10.3969/j.issn.1000-3428.2007.13.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    E-mail worms may cause the spread of Internet spam and threaten the security of Internet. This paper presents a propagation model of E-mail worms in scale-free networks. The model explains the behaviors of E-mail users by the frequency of their checking E-mails and the probability of their opening E-mail attachments. It also simulates the propagation of worms in scale-free networks and random networks respectively. The simulation results show that worms spread more quickly in a scale-free network than in a random network, which is important to study the defense strategies against E-mail worms.
  • DU Xuehui; CHEN Xingyuan; WANG Yadi; CAO Lifeng
    Computer Engineering. 2007, 33(13): 158-160. https://doi.org/10.3969/j.issn.1000-3428.2007.13.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The purpose of mobile secure connection is to access Intranet safely in any connection way on any platform and at any situation. This paper expounds the relationship of system state conversion by establishing three data aggregation: online user, communication relationship and policy service and puts forward an integrated protocol system used for the mobile secure connection. A new integrated architecture of mobile secure connection is established, which solves the problems of pervasion, expansibility and security in mobile connection effectively.
  • GU Yan; ; QIANG Jiang; YING Mingfeng;
    Computer Engineering. 2007, 33(13): 161-163,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the development of the distributed computing, traditional role-based access control model doesn’t meet the demand of distributed computing security any more. An evidence-based code access control(EBCAC) model, which can provide the lower access control of system security, is generalized from code access control of Microsoft in this paper. It gives a formalized description and describes an improved system architecture based on it. It also discusses how to implement and gives an instance of EBCAC model.
  • FAN Tiesheng; GAO Hongyu
    Computer Engineering. 2007, 33(13): 164-167. https://doi.org/10.3969/j.issn.1000-3428.2007.13.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As an important branch of the information hiding technology, digital steganography is gaining more and more attention in Internet. This paper presents an arithmetic of digital steganography based on JPEG images, and discusses its anti-attack. The experimental datas show that the arithmetic suits for both JPEG-compressed format images and uncompressed format images to transport information securely, which can be enshrouded better.
  • BAI Xuemei
    Computer Engineering. 2007, 33(13): 168-170,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the latest research achievements of software watermark technology, this paper presents a new dynamic path-based watermark scheme which is based on obfuscated transformations. The scheme utilizes the property, called as the difficulty of alias analysis on dynamic graphs, to create relevant conditions for the conformation of opaque predications, performs control flow obfuscated transformations to a program by manufacturing cheap, secrete and robust opaque constructs, and embeds the watermark data into the specific executed tracks of the obfuscated program. It analyzes the performance of the scheme from aspects such as data rate, secxecy and robustness.
  • ZHAO Wei; JIA Zhenghong
    Computer Engineering. 2007, 33(13): 171-172,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    There are many applications using Arnold transformation in digital image watermark and digital image scramble technology, but because of the long periodicity of traditional anti-Arnold transformation, and large time and memory consumption of computation, the further development is limited. According to a new anti-Arnold transformation, this paper offers different algorithms used in different environment, so the iterative times are quickly reduced, then a new digital image watermark embedded and extract technology is offered, and then is tested the robustness with many attack experiments. The satisfied experimental result meets the demands of robustness requirement of digital image encryption and digital image hiding.
  • CHEN Jun; XIA Xu; ZHU Congxu
    Computer Engineering. 2007, 33(13): 173-175. https://doi.org/10.3969/j.issn.1000-3428.2007.13.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the security problem of P2P collaboration work, combining with the characteristics of digital watermark, and puts forward a solution based on the digital watermark. This solution may prevent the illegal user from carrying on the deceit to other users, at the same time also maintain the integrity of resources.
  • KANG Bin; YU Zhaoping
    Computer Engineering. 2007, 33(13): 176-178. https://doi.org/10.3969/j.issn.1000-3428.2007.13.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on elliptic curve, a new secret sharing scheme for general access structure is proposed. It is able to prevent adversaries from getting the secret and efficiently guard against cheating among participants. Each participant’s secret is selected by participant himself and the dealer need not deliver any secret information to each participant. The secret do not need to be changed when the shared secret is renewed, the access structure is altered, or participants added/deleted. This paper analyzes the security and efficiency of this scheme, and compares it with the scheme.
  • ZHANG Lihua; ZHU Chengjiu; GUO Qiang; FAN Xiaohong; LV Shanwei
    Computer Engineering. 2007, 33(13): 179-181,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    】A new remote user authentication scheme using smart cards and a NTRUSign signature scheme against Malleability weak are proposed. The security of the scheme relies on Hash function and the fact that for most lattices, it is very difficult to find extremely short vectors. The scheme has four phases: registration phase, login phase, authentication phase and password change phase. Furthermore, the scheme has many merits: it let users freely choose and change password at their own will; it provides mutual authentication between two entities; it has more lower computational costs; it resists man-in-middle attack and denial of service attack. In addition, it has forward security and strong security reparability, as well as black list eviction mechanism. In a word, the proposed scheme is a better scheme with lower cost and strong security.
  • ZHANG Qiuyu; SUN Ning; CHI Ning; LIU Ye
    Computer Engineering. 2007, 33(13): 182-184. https://doi.org/10.3969/j.issn.1000-3428.2007.13.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Obtaining of security situation of networked systems is not isolated. It is a complex systemic work including association of three attack factors(attack frequency, attack difficulty, attack importance) and data fusion based on service, host and LAN level. By distinguishing interdependent association of attack factors, this paper makes use of fuzzy information fusion to associate the factors. And it also makes use of statistic method on service, host and LAN level to attain situation information. Experiments show that the model can evaluate the security situation effectively.
  • Artificial Intelligence and Recognition Technology
  • HU Weiwei; LI Shuguang; WU Zhouzhou
    Computer Engineering. 2007, 33(13): 185-187,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a method for real-time vehicle shape classification based on its side outline. It extracts the background dynamically, through the trigger of soft sensor, gets the silhouette of the vehicle from the difference between current frame and background frame and reaches the vehicle shape classifier based on side outline character. Compared with the other approach, it shows a higher efficiency and accuracy, which enables the excellent application in the real-time system.
  • YU Suping; ZENG Peifeng; CHEN Jianping
    Computer Engineering. 2007, 33(13): 188-190. https://doi.org/10.3969/j.issn.1000-3428.2007.13.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A method of segmentation on cotton fiber cross sections based on mask is presented. By this method, touching cross sections of fibers can be separated effectively, and the following processes will save time greatly for many pixels can be confirmed as background during this process. Two-double edge output can be restrained after the processing of this method.
  • YANG Yong; HUANG Shuying; ZHANG Feng
    Computer Engineering. 2007, 33(13): 191-193,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A novel spatial potential function weighted FCM algorithm for image segmentation is presented. The algorithm is formulated by incorporating the spatial neighborhood potential function information into the original FCM clustering algorithm. The weight plays a key role in this algorithm, which is based on the principle of k-nearest neighbor (k-NN) algorithm and is extended to the neighboring pixels. The algorithm is initialized by a statistical histogram based FCM algorithm, which can speed up the convergence of the algorithm. Experimental results show the proposed algorithm is effective and more robust to noise and other artifacts than the conventional FCM algorithm.
  • QIN Jing; ZHOU Mingquan; WANG Xingce; SHEN Fuxing
    Computer Engineering. 2007, 33(13): 194-196,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the pattern recognition field, music information retrieval (MIR) is receiving more and more attention. To improve the accuracy of MIR system, a novel automatic algorithm based on dynamic thresholds note segmentation and weighted synthesis match is presented. Dynamic steps are set for amplitude difference, get dynamic thresholds to segment notes and improve segmentation veracity. Music scores are transformed into frequency templates by standard frequency and the input signal pitch is normalized to enhance the accuracy. To improve the adaptability and the robustness, traditional approximate string match algorithm and DTW algorithm are synthesized. The simulation results are provided to show the validity of the algorithm.
  • YE Famao; SU Lin; LI Shukai
    Computer Engineering. 2007, 33(13): 197-199. https://doi.org/10.3969/j.issn.1000-3428.2007.13.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Image registration is used in many practical problems in diverse fields, and it is an important step in those applications. A new algorithm for image registration based on artificial immune network is proposed. It takes Partial Hausdorff distance as the similarity metric, and uses artificial immune network to find the optimal transformation parameters. Experimental results show that the proposed approach is a promising method for registration of image, and can be a good solution for image registration.
  • SUN Shibao; QIN Keyun
    Computer Engineering. 2007, 33(13): 200-201,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The method of data clustering will influence the effect of clustering directly. The algorithm of k-means is discussed, the shortages of this algorithm such as it can not deal with symbolic data and it is sensitive for data of isolation point and noise are demonstrated. A modified k-means clustering algorithm based on weights is put forward, it changes the shortcomings of k-means. Its complexity is analyzed from theoretical. The experiments show that, compared with traditional method based on means, the modified data clustering algorithm can improve the efficiency of data clustering.
  • BU Jiang; WU Yi; WANG Jiongqi; HU Yonggang
    Computer Engineering. 2007, 33(13): 202-204. https://doi.org/10.3969/j.issn.1000-3428.2007.13.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A local image fusion algorithm based on dimension reduction technology is proposed and used to fuse two gray images. The method combines image fusion technique with dimension reduction technology and divides images to be fused, represents image blocks as related matrix, it uses MDS(multidimensional scaling) method to process the related matrix to get the region of interest image, and fuses the region of interest image with wavelet method so that the images to be fused are smaller than the former. The experiment results demonstrate that the algorithm can improve the speed of processing and make a contribution to ATR and change detection process.
  • LIU Meiru
    Computer Engineering. 2007, 33(13): 205-206. https://doi.org/10.3969/j.issn.1000-3428.2007.13.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The technology of the automatic parting text meaning paragraph is an extremely important research task in natural language understanding field. This papar divides the text into the meaning paragraph on the basis of research and practice.This papar proposes mathematical model of automatic parting text meaning paragraph with computer, calculates word frequency of the text with computer, builds triangular matrix of reused word frequency, gives restricted condition of generated meaning paragraph. By practice, it’s proved that this mathematical model presents objective structure of some text.
  • GU Yaolin; YANG Lizhi
    Computer Engineering. 2007, 33(13): 207-209. https://doi.org/10.3969/j.issn.1000-3428.2007.13.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    When browsing some images, relationship must be known between two local areas of the images. If the image is too large, the user has to spend much of times and vigor on switching between the two local image areas. In this paper, an optimized path is constructed by analyzing the contrail of a virtual camera that moved in the image space and is used as the control parameters to form a sub-image sequence in which every part is smoothly transited to the next. The result shows that each part of the sub-image transited smoothly and naturally, with it the user gets information rapidly and accurately.
  • XIONG Wei; CHEN Rong; LIU Jia; XU Miao; YU Zhonghua
    Computer Engineering. 2007, 33(13): 210-212. https://doi.org/10.3969/j.issn.1000-3428.2007.13.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Automatic alignment of parallel corpora is an important research subject in natural language processing area. An efficient small-dictionary-oriented algorithm for alignment of English-Chinese parallel corpora is proposed in this paper in order to improve the efficiency of translation-based approach to parallel corpora alignment, and enhance its precision when the dictionary used is small. The algorithm has competitive precision under the condition of small dictionary, and doubles the efficiency of the traditional approach. The validity of the algorithm is argued through theoretical analysis and experiments.
  • Multimedia Technology and Application
  • YANG Bo; LIAO Jianxin; LV Xinrong; WANG Chun; ZHANG Tianle
    Computer Engineering. 2007, 33(13): 213-215. https://doi.org/10.3969/j.issn.1000-3428.2007.13.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characters of mobile streaming system such as low bandwidth in wireless access network and small memory size in mobile handset, a novel caching system architecture WSCA for 3G WCDMA network is proposed. A cache-based mobile streaming schedule policy named WSCS is designed, and technique details are discussed. Analysis shows, combining with WSCS streaming schedule policy, WSCA architecture can effectively decrease the core network transmission cost and improve the quality of services, and it is valuable for 3G streaming service application system.
  • HU Shuangyan; LI Junshan; LI Jianjun
    Computer Engineering. 2007, 33(13): 216-217. https://doi.org/10.3969/j.issn.1000-3428.2007.13.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Latent semantic analysis is based on video analysis. It constructs the video feature matrix via a kind of mapping and realizes video based content retrieval. The paper discusses the main idea of latent semantic analysis and researches the method color texture extraction. The result proves latent semantic analysis performs preferable in content based video retrieval.
  • WEI Wei; YE Bin; ZHANG Yuanmao
    Computer Engineering. 2007, 33(13): 218-220,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Video content representation is important for video semantic understanding. Visual and audio content representation methods are presented. Frame-segment key-frame strategy and attention selection model are used to concisely represent spatio-temporal visual content. The basic visual semantics are recognized by classifier. Audio semantics are represented by stochastic model. Experiment results show that the representation methods can represent video semantic content effectively and concisely.
  • HE Qing; LIU Yuncai
    Computer Engineering. 2007, 33(13): 221-223,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents the methods of femur modeling and deformation. The femur model is reconstructed from CT images in the database, and the model is deformed to match the real femur by Kriging interpolation with the physiological markers as the control points. The methods can be used for visualization of robot assisted total knee replacement surgery.
  • HUANG Boyuan; HUANG Bojun; LIU Chunnian
    Computer Engineering. 2007, 33(13): 224-226,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Skeleton of digital character is one of the most important parts in 3D animation. This paper presents a method on automatic generation of character skeleton with flexible structure. After obtaining position information of skeleton joints through motion capture system, it can build a tree-shaped description of skeleton based on the corresponding XML file. By changing the XML file, it can acquire different kinds of flexible skeletons which could meet the special needs of real Cartoons.
  • LV Rui; QING Linbo; HE Xiaohai; LONG Jianzhong
    Computer Engineering. 2007, 33(13): 227-229. https://doi.org/10.3969/j.issn.1000-3428.2007.13.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A cross hexagon search(CHS) algorithm is proposed for fast motion estimation(ME). CHS algorithm utilizes both the center-based distribution characteristic of motion vectors(MVs) and the correlation among MVs. In ME, the initial search points are decided by prediction at first, then at early searching stage CHS employs cross search pattern and halfway-stop technique in searching the local areas around the initial search points priority, and at later stage CHS enlarges searching range and completes ME by using hexagon search patterns. Experiment results show that CHS gains 45% average reduction in average searching point(ASP) over original hexagon-based search(HEXBS) algorithm, and that CHS can effectively reduce the computational complexity of ME over some new fast searching algorithms with similar searching precision.

  • Engineer Application Technology and Realization
  • HUANG Chenling; LIU Yuan; HAN Yifeng; MIN Hao
    Computer Engineering. 2007, 33(13): 230-232,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A novel design of RFID (radio frequency identification) digital receiver is presented. In order to meet the real time requirement for RFID system, this paper uses simplified correlation algorithm instead of the DPLL (digital phase lock loop) structure. The receiver can adaptively capture the burst mode input signal ranged from 31.2kHz to 780.8kHz and finish the decoding process. The design is more robust to noise interference compared with that using the zero crossing method. The digital receiver is implemented on Altera Stratix II EP2S60 and has great performance.
  • SHI Ke
    Computer Engineering. 2007, 33(13): 233-235. https://doi.org/10.3969/j.issn.1000-3428.2007.13.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Manufacturing resources integration is a top priority for many organizations attempting to streamline business processes, coordinate disparate functions, improve corporate responsiveness to customers and partners and optimize manufacturing processes in an effort to improve productivity. To solve dynamic integration problems of manufacturing resources, a service grid based framework solution is proposed. The manufacturing resources (devices, equipments, processes and applications) are virtualized as stateful Web services compliant with WSRF (Web services resource framework) standards, and they can offer their services and functionality through the standardize interfaces and inter-operation protocols. A service based cooperative workflow model is also developed to support dynamic discovery, selection, composition and execution of manufacturing resources and their corresponding virtualized grid services under given tasks and workloads. The application on mould and die making industry demonstrates the proposed methods can optimize the business process, support inter-organization cooperation and improve the productivity.
  • SHEN Xianhao; JIN Weimin; GONG Chuanlei
    Computer Engineering. 2007, 33(13): 236-238. https://doi.org/10.3969/j.issn.1000-3428.2007.13.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By combining CAN Fieldbus with Ethernet and Interne, a kind of remote diagnosis and monitor system of DNC machine tool is presented. The system structure, the function of each part and their relations are studied, and the key technologies for realizing system are discussed in detail.

  • DONG Guoqing; TONG Weiqin
    Computer Engineering. 2007, 33(13): 239-241,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The grid monitor system is very important in the grid environment. Based on traditional GMA, this paper puts forward a mobile agent based grid monitor architecture (MA-GMA). The grid monitor architecture is designed based on the features of open grid service architecture (OGSA) standard with the cache mechanism based on period of validity of grid resources, and the intelligence, mobility characteristic of mobile agent is merged into current OGSA, constructing a dynamic and extensible monitor system to ensure the quality of grid service. In the grid environment, it can be used to discover unknown performance problems, find out the root failure in time, analyze the system performance bottleneck, resume and adjust the system in shortest time.
  • MA Zenghui; XIE Jiancang; ZHANG Yongjin; LUO Jungang
    Computer Engineering. 2007, 33(13): 242-244. https://doi.org/10.3969/j.issn.1000-3428.2007.13.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As a kind of information and resources integration paradigm, Portal can effectively integrate information resource in the J2EE enterprise application. Portlet is the important component of Portal. In the actual application, it is quite ubiquitous that multi-Portlet together complete a task. However, the current Portlet criterion (JSR-168), doesn’t define approach and realization of multi-Portlet interaction, which doesn’t satisfy the demands of Portal application. By extending implement interface of Portlet, increasing interactive describe of Portlet and so on, AAFPortlet is produced to implement multi-Portlet interaction, based on JSR-168 standard. It is implemented in eXo and used in the practical application system. The effect is remarkable.
  • LIU Ying; ZHU Yuanchang; DI Yanqiang
    Computer Engineering. 2007, 33(13): 245-247. https://doi.org/10.3969/j.issn.1000-3428.2007.13.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Oriented for maintenance training domain and under the research of the system fault generating mechanism, this paper uses object-oriented method to set up a system fault model based on fault spreading directed graph. In the engineering perspective, its constructing rules is introduced. And the maintenance simulation system is realized, indicating the runtime structure of the directed graph and the generation of the measuring data during the simulation. On all above, an evaluation method is mentioned according to the relativity between the measuring point and the standard fault diagnosis routes.
  • CHEN Xilin; XIAO Mingqing; WANG Xueqi
    Computer Engineering. 2007, 33(13): 248-250,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the development of BDAR support platform(BDARSP), the paper analyses the four implemental schemes of multi-base cooperator, and puts forward a new implemental scheme with 5 service + 1 core based on software bus. And a multi-base cooperating platform core based on CORBA is set up. What’s more, a developing method of service object in CORBA system and a structure model of object adapter are put forward, and methods are applied to set up a domain-oriented multi-base cooperating platform, which is for the BDAR decision support of airborne missile camp.
  • YU Wei; LAI Jinmei; SUN Chengshou; TONG Jiarong
    Computer Engineering. 2007, 33(13): 251-254. https://doi.org/10.3969/j.issn.1000-3428.2007.13.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The boundary scan circuit (BSC) applied in the FPGA chip focuses on the PCB-level test and can provide JTAG program mode as well as the function test of the chip. Owing to the increasing pads of FPGA chip and the larger number of the corresponding BS cells, the clock skew is going to be the major consideration in circuit design to avoid the error of data-input. Meanwhile, as BS chain contains a large number of BS cells, the effective test speed will be largely reduced during PCB-level test. In order to solve these problems, modification is made for the original structure of BSC. And the new generation of the BSC not only can realize the function of test, programming, but can provide significant immunity to races, thus, effectively guarantee the correct operation of the circuit. With the modified BSC, the boundary scan chain would be reconfigured to any desired length. In this way, it can improve the effective speed of PCB-level test.
  • SHI Guanghua
    Computer Engineering. 2007, 33(13): 255-256,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper gives a group control method of multi-process in a LAN. Based on UDP protocl, using enumerate processes and compare multi-process, through the definition of ATCP (assistant teaching control protocol)agreement, real-time sends the agreement and automatic controls the user processes of a group clients. The performance of this method is estimated through test data.

  • WANG Hui; FU Ce; LI Yang; YANG Xiaojia; CHEN Yan
    Computer Engineering. 2007, 33(13): 257-259. https://doi.org/10.3969/j.issn.1000-3428.2007.13.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the development of 3G, it is necessary to establish the port’s virtual logistics’ chain. According to the characters of the port’s virtual logistics’ chain, the semantic open grid services architecture based on semantic Web service is given. Then by analyzing the structure, the workflows, definition for the ontology and the operating model, the port’s virtual logistics’ chain is established based on SOGSA.
  • ZHU Rongzhe; RONG Mengtian; LIU Wenjiang
    Computer Engineering. 2007, 33(13): 260-262. https://doi.org/10.3969/j.issn.1000-3428.2007.13.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With IC fabrication technology reaching deep sub-micrometer, system-on-chip technology is widely used because of its high performance, small volume and low power consumption. And on chip bus is used for IP cores connection. This paper describes the design and implementation of VGA/LCD controller based on SoC. Use AHB bus of AMBA specification as on-chip bus architecture. Burst transfer, split transfer, ping-pong frame buffer switch and dual-clock FIFO clock control are involved to make the bus occupation rate as low as possible while ensuring the video image display.
  • WU XihongPP; LING JiePP
    Computer Engineering. 2007, 33(13): 263-265. https://doi.org/10.3969/j.issn.1000-3428.2007.13.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses the structure and function of embedded safe network card and analyses the principle, the detecting methods and defending measures of network sniffing. It proposes a scheme about putting embedded safe network card to network sniffing. There is an encryptor which is important part in the embedded safe network card. It can encrypt data and decrypt data through different encrypt algorithms and decrypt algorithms, and it can settle the bottleneck of encrypted operation. When the computer that is set such network card transfer data, the data which are sniffed are encrypted. It realizes the security of data in the course of network transmission.

  • KUANG Guofang; WU Liangjie; CONG Huizhi
    Computer Engineering. 2007, 33(13): 266-267,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    General packet radio service(GPRS) is a new operation of China Mobile Company. This paper analyses the character of data monitor of oil field, and designs a system that suits it. It introduces the architecture, principle and function of oil field remote data monitor system based on GPRS, and focuses on introduction of software. The implementation of the system changes the traditional way of data monitoring and improves the efficiency of oil field data monitoring.
  • LI Miao; YIN Bijun; WANG Yuyan; DUAN Guodong
    Computer Engineering. 2007, 33(13): 268-271. https://doi.org/10.3969/j.issn.1000-3428.2007.13.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the flow control technology in Ethernet switch to the problem of frames losing. The flow control technology to Ethernet switch is applied. In the design, the flow control mechanism based on the data buffer is realized and the data buffer in reason is distributed. Thus the frame losing which results from buffer can be resolved.

  • DU Juan
    Computer Engineering. 2007, 33(13): 272-273,. https://doi.org/10.3969/j.issn.1000-3428.2007.13.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at security level low of information storage and transmission in mobile computer system, this paper presents a design scheme of serial interface security module combined with actual application, it implements some functions, such as security module configuration, information encryption/decryption, self-destroy etc. The scheme has been applied in hand computer project, serial interface security module satisfies security demands of wireless communication and storage information in mobile computer system.
  • Developmental Research
  • SUN Qindong; HUANG Xinbo; WANG Qian; GUAN Xiaohong; GAO Peng
    Computer Engineering. 2007, 33(13): 274-276. https://doi.org/10.3969/j.issn.1000-3428.2007.13.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to prevent the flooding of illegal short messages(SM), the sending mechanism of SM is analyzed and a monitoring scheme of SM is proposed. The audit model is established, which could filter both the text short messages and multimedia short messages, and the function of each module is discussed. The key audit technologies are discussed, and the main ideas of algorithms used in the audit system are proposed.
  • WANG Yuanzhi; WANG Shaowei; SUN Lijuan
    Computer Engineering. 2007, 33(13): 277-279. https://doi.org/10.3969/j.issn.1000-3428.2007.13.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Within network collaborative design environment, real-time data exchange and feature semantic conformity become a key problem for collaborative design on semantic feature modeling. A semantic feature modeling is proposed, according to the structure of semantic feature model, the strategy of the modeling operation commands being transmitted is adopted. In order to maintain feature semantic conformity, a new method by which OFM is introduced to control operation’s executing is suggested. An example is introduced.

  • ZHAO Zhenliang; XU Lihong; DENG Wupeng; XU Huihui
    Computer Engineering. 2007, 33(13): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2007.13.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the information era coming, the digital video recording system is very important, but developing a suitable and beautiful GUI is more important. This paper describes the research and design of the Chinese graphical user interface, based on MIPS framework and embedded Linux OS.

  • LU Weini; PANG Jun
    Computer Engineering. 2007, 33(13): 283-封三. https://doi.org/10.3969/j.issn.1000-3428.2007.13.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new architecture for computer network virtual laboratory based on Internet. In the architecture, the client side is Java Applet, the communication bridge between Java and NS is CORBA, the computing tools in the server side are JavaBean and NS. The architecture has many strongpoints of Java language. The client is simple and safe, the server can be developed quickly and accurately with the help of NS.