Author Login Editor-in-Chief Peer Review Editor Work Office Work

05 June 2007, Volume 33 Issue 11
    

  • Select all
    |
    Degree Paper
  • WANG Bingzheng; HUANG Yalou
    Computer Engineering. 2007, 33(11): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2007.11.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Frequent data updates in data stream make the whole database re-mineing impossible. This paper proposes maintaining generator representation and border sets based on recent data in stream. Representation changes aroused by data updates can be detected in those border sets. Then updating work is confined to those item sets related with updated transactions and achieves good results.
  • ZHENG Long; ZHOU Jinglun; PAN Zhengqiang
    Computer Engineering. 2007, 33(11): 4-6,9. https://doi.org/10.3969/j.issn.1000-3428.2007.11.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of optimal model of military transportation path and graph theory idea, generalized adjacent matrix and generalized cut-set-element matrix are constructed. Simple operation of the generalized cut-set-element matrix is used. Two kinds of cut set algorithm are proposed to obtain the path with a minimum generalized weight and the maximum flows of transport network. Applicable area and its complex degree are studied. This algorithm can solve all kinds of problems of military transportation path optimization with different parameters. An experiment is performed to show the effectiveness of the models and algorithms.
  • QU Binbin; LU Yansheng
    Computer Engineering. 2007, 33(11): 7-9. https://doi.org/10.3969/j.issn.1000-3428.2007.11.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Through analysing the attribute reduction algorithms of consistent decision table, reasons of inefficiency are found. A new algorithm is proposed which adopts hierarchy structure and boundary of attribute as heuristic function to choose the essential attribute. It can select the important attributes that reflect the characteristic of system while the universal is decreasing. Theoretical analysis and experiment results show that on the premise of unchanged of classification precision, the algorithm can obtain the best or sub-best attribute reduce set.
  • ZHANG Xiang; HU Changzhen; LIU Shenghang; TANG Chenghua
    Computer Engineering. 2007, 33(11): 10-12. https://doi.org/10.3969/j.issn.1000-3428.2007.11.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As one of the most important techniques about active defense, the forecast technique of network attack situation becomes more crucial. The indicator of network attack situation evaluation is defined. The method of support vector regression forecast is used to forecast the indicator of network attack situation evaluation in time series. The framework of learning module and forecast module in the algorithm are produced. Experiment results prove the method is correct.
  • LIU Yang; ZHAO Yuhua; ZHOU Xiaozhuang; PENG Guoxiong; YUN Meiping
    Computer Engineering. 2007, 33(11): 13-14,2. https://doi.org/10.3969/j.issn.1000-3428.2007.11.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The vehicle patrol problem can be regarded as Hamilton loop, which possesses the minimum total weight. The paper solves the partial optimization of classical algorithm with single point cut method, also proves the algorithm basic principle. The example demonstrates the process of the algorithm. The arithmetic improves the ability of classical algorithm of Hamilton loop.
  • MENG Lingkui; HU Chunchun
    Computer Engineering. 2007, 33(11): 15-17. https://doi.org/10.3969/j.issn.1000-3428.2007.11.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Cluster validity index is used to evaluate the validity of clustering. A new cluster validity index is proposed to identify the optimal fuzzy partition according to the basic properties of clustering. The index exploits two important evaluation factors: the measure of fuzzy partition and information entropy. The first factor is used to evaluate the compress within a cluster and the separation between clusters, and the second is to measure the uncertainty of the partition result. The experimental results indicate that the index is effective and efficient for evaluating the result of fuzzy clustering. Especially, for the spatial data, the index can correctly identify the optimal clustering number and is not sensitive to the weighting exponent .
  • DENG Baosong; GAO Yu; YANG Bing; WU Lingda
    Computer Engineering. 2007, 33(11): 18-20. https://doi.org/10.3969/j.issn.1000-3428.2007.11.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an accurate linear triangulation algorithm based on image sequence. Compared with traditional algebraic error based method, this algorithm uses geometrical error as the cost function, which ensures that the results are the best under physical meanings of Euclidean distance. This method is also linear, which is time efficient. In addition, the method can be extended to any number of images. Experimental results of real images and comparisons with traditional method demonstrate its feasibility and accuracy.
  • WANG Tao; LIU Daxin; ZHANG Jianpei
    Computer Engineering. 2007, 33(11): 21-22,3. https://doi.org/10.3969/j.issn.1000-3428.2007.11.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The existing response time analysis method for scheduling tasks with preemption threshold is lower in task response time, resulting in the tasks missing deadline. For the flaws above, this paper presents an improved response time analysis method for scheduling tasks with preemption threshold. Taking into account of the effect and time demand of release jitter and tick scheduling by using the modified task parameters in the computation of the time-demand function of task, simulation result shows that the improved method can obtain more exact analysis result using preemption threshold scheduling.


  • LIU Shouqiang; PAN Chunhua; QI Deyu; LIU Bo; YANG Bo
    Computer Engineering. 2007, 33(11): 23-25,2. https://doi.org/10.3969/j.issn.1000-3428.2007.11.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Compared with traditional security authorized mechanisms, trust management is a more competitive, direct, efficient and sound distributed authorization, which can be adapted to grid applications development. This paper studies the key part of trust management system——trust models. Two behavior-based trust models: basic network behavior-based trust model and trust intermediary-based model are studied and analyzed. The paper analyses their advantages and weaknesses respectively. Some future outlook for grid trust models is offered.

  • YANG Cheng; SUN Shixin
    Computer Engineering. 2007, 33(11): 26-28. https://doi.org/10.3969/j.issn.1000-3428.2007.11.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new model of evolutionary incomplete minority game (EIMG), which features a default hierarchy of rules with evolution. It introduces random bits into strategies of agents and is capable of applying the secondary rule in the absence of the primary one. Analysis of the numerical experiment results indicates that, in comparison with the evolutionary minority game (EMG) model, the EIMG model can greatly improve the overall performance and evolve to an approximate ideal status very soon with less memory steps and more stable combination of strategies.
  • WANG Xiaofeng
    Computer Engineering. 2007, 33(11): 29-30,4. https://doi.org/10.3969/j.issn.1000-3428.2007.11.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper presents an efficient dual space search algorithm for mining frequents. The algorithm takes full advantage of the duality characteristic in the transaction database via dual space mapping. The items dimension and transaction dimension in the transaction database are combined to increase the efficiency of mining frequents. It proves that dual space search algorithm is very efficient to mining frequents by way of experiment on the computer, new method is not sensitive to scale of data or the length of frequents.

  • CHENG Shu; ZHANG Hao; MA Yumin; ZHAO Rongyong
    Computer Engineering. 2007, 33(11): 31-33. https://doi.org/10.3969/j.issn.1000-3428.2007.11.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Considering hybrid system theory and method not sufficient enough to cope with unexpected events and uncertainties, the combination of intelligent theories with hybrid system theories can produce an effective solution. On the basis of analyzing the continuous and discrete parts in automatic assembly, a class of intelligent hybrid systems that integrate planning with scheduling in assembly is proposed. Intelligent decision interface and interconnection with intelligent techniques are given. Intelligent solution strategies based on fuzzy-neural network and rough set are analyzed, endowing a class of hybrid systems with intelligent decision ability. The feasibility and efficacy of the analyzing method are illustrated through the construction of a max-plus algebra model and simulation of neural network of an automatic assembly case.

  • Software Technology and Database
  • YU Weihong; JIA Chuanying
    Computer Engineering. 2007, 33(11): 34-36. https://doi.org/10.3969/j.issn.1000-3428.2007.11.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the meaning of data mining in shipwreck data, improves the Apriori algorithm and applies it into finding frequent patterns of shipwreck data warehouse which is organized as a snowflake schema while improving direct rule graph to visualize the association rules. Research result shows that data mining technology for further research on historical shipwreck data can overcome the limitations of the traditional statistics and analysis and can mine a lot of knowledge so that some references can be provided for future navigation safety.
  • GUO Shuhang; LAN Yuqing; JIN Maozhong
    Computer Engineering. 2007, 33(11): 37-38,4. https://doi.org/10.3969/j.issn.1000-3428.2007.11.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Analyzing and defining the consistent requirements of software dependability is critical to the development of complex dependable software systems. How to solve this problem directly influences the quality of requirements specification, as well as the final software production. Based on a widely-recognized management framework of NFR, this paper points out one requirement specification method of software dependability, which utilized the B AMN and thinking of goal-oriented theory. Such method can be named as the software profile of dependability. It may be applied in the UML area and also provides the formal input for the B proof though the B AMN.
  • JIANG Yunlian; SUN Guangzhong; XU Yinlong
    Computer Engineering. 2007, 33(11): 39-41. https://doi.org/10.3969/j.issn.1000-3428.2007.11.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Efficient application scheduling is critical for achieving high performance in heterogeneous computing environment. This paper proposes a novel algorithm based on list-scheduling and task-duplication on a great number of fully connected homogeneous machines. The comparison study, based on both randomly generated graphs and the graphs of Gaussian elimination, shows that the scheduling algorithm significantly surpass existing algorithms.
  • WANG Shuning; YU Jianxin
    Computer Engineering. 2007, 33(11): 42-43,4. https://doi.org/10.3969/j.issn.1000-3428.2007.11.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Great attention is paid to pervasive computing system ever since it is proposed in the 1990s. The context-aware is one of the critical problems in the system. With introduction of the context-aware system and the modules in it, the rapid prototype model in software methodology is utilized. It gives a simple example using OWL language to state the construction process of sensor module within the system.

  • JIANG Liehui; ZHOU Bo; FEI Qinfu; HE Hongqi; HAN Xiaokun; ZHANG Youwei
    Computer Engineering. 2007, 33(11): 44-46. https://doi.org/10.3969/j.issn.1000-3428.2007.11.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a generic module analysis algorithm for code at assembly level in majority of processors with different architectures. A formal description for the algorithm and the recording method for module analysis results are given. Experimental data based on the implementation of the algorithm in binary code assistant analysis system (BCAAS) demonstrate that the algorithm can be used towards binary code in different kinds of processors and achieves relatively high speed and accuracy.
  • PANG Liaojun; LI Huixian; WANG Li; WANG Yumin
    Computer Engineering. 2007, 33(11): 47-49. https://doi.org/10.3969/j.issn.1000-3428.2007.11.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    VRML is a kind of virtual reality modeling language used on Internet, but it does not support network communication. The function of Script node is extended to support network communication which makes VRML nodes receive data through network and render the scene in real time. VRML and Java are independent of operating system platform, so are the application systems built with the proposed method. Without considering the speed, the method can be used to rebuild the whole Internet network into a large-scale multi-user application system. An application example is implemented to illuminate the feasibility of the scheme.
  • WAN Benting; CHEN Ming; LU Qiang
    Computer Engineering. 2007, 33(11): 50-52. https://doi.org/10.3969/j.issn.1000-3428.2007.11.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Since user task arriving at heterogeneous distributed system is random and user has requirement of service for the task, it needs to make heterogeneous distributed system satisfy user QoS, and make system transact tasks as much as possible, and it is an important target to make system keep load balance, so it is very important to find a good schedule strategy. A QoS guided meta-task schedule strategy is described, which can make distributed system use CPU sufficiently and can make system transact tasks as much as possible. Comparing to Min-Min schedule strategy, it reasonably reduces ratio of task discarded and improves CPU using ratio of the system. Experimental result shows it has actual effect.
  • HUANG Jianbin; JI Hongbing; SUN Heli
    Computer Engineering. 2007, 33(11): 53-55,5. https://doi.org/10.3969/j.issn.1000-3428.2007.11.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an improved approach for finding data blocks in the HTML tag tree to mine the data regions embedded in a Web page. A policy of combining the Web page clustering and cross-page data region analysis is proposed to identify the dynamical Web data regions. Experimental results show the effectiveness of given approach.
  • LI Shaohua; GAO Wenyu
    Computer Engineering. 2007, 33(11): 56-58. https://doi.org/10.3969/j.issn.1000-3428.2007.11.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a hierarchical classification-based PageRank algorithm. HC-PageRank uses hierarchical classification to consider page relativity, and gives different weight factors to different input links. The method can compute PageRank value of Web pages more fair and more effective. Hierarchical classification can reflect page property more precise, and more effective classification algorithm can be designed based on hierarchical classification architecture. The online complexity of HC-PageRank is the same as that of PageRank. HC-PageRank is also a non-keywords-dependent query algorithm, which has good scalable performance.
  • ZHANG Dong; WANG Jiayao; ZHU Wenyuan; LI Ying
    Computer Engineering. 2007, 33(11): 59-61. https://doi.org/10.3969/j.issn.1000-3428.2007.11.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Geographic information grid dissemination system(GIGD) for disseminating spatial geographic information(SGI) to remote user is presented. Grid resource nodes, presented according to the graph theory, are defined. The relationships among SGI, grid resources and GIGD formal presentation are established. Six grades grid hiberarchy oriented to services and a series of user-defined grid services based on OGSA services and interfaces patterns are designed. GIGD flow without grid center is implemented to support request/response model. The performances of grid services and copy mode in the process of resources location are tested. The results show that Grid Services can achieve SGI dissemination effectively as copy mode, faster in maxiam transferring speed while less dependent on data flow.
  • ZHOU Ruqi; CHEN Wenwei
    Computer Engineering. 2007, 33(11): 62-63. https://doi.org/10.3969/j.issn.1000-3428.2007.11.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Kullback-Leibler distance of information can be used to measure the difference degree between the random variables. This paper presents the concept of extended Kullback-Leibler distance. A new reduction algorithm based on extended Kullback-Leibler distance for knowledge is put forward, and the complexity of the algorithm is analyzed simply. The experimental results show that this algorithm can find out the relative minimal reduction for most decision tables.
  • LIU Xin; LIU Renren; HOU Jingchuan
    Computer Engineering. 2007, 33(11): 64-66,6. https://doi.org/10.3969/j.issn.1000-3428.2007.11.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper proposes a new algorithm named whole-priority algorithm to solve geometrical TSP, and the key thought of which is “adjusting while constructing”. A large number of experimental results indicate that the time complexity and space complexity of the algorithm are low, and its search-optimization ability is quite strong. The comprehensive performance of the algorithm exceeds some major algorithms and it is especially suitable for solving TSP on PC.
  • MA Zhanxin; HUANG Weitong; LU Yuchang
    Computer Engineering. 2007, 33(11): 67-69. https://doi.org/10.3969/j.issn.1000-3428.2007.11.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Relative degree is an important parameter in evaluating a rule whether it is interesting or not in association rules mining. Different from previous research, the paper focuses on the importance of upgrade rate and influence ratio in the study of relative degree calculation and points out the dissymmetry and imperfection of the traditional calculation method. Theoretical analysis and experiments show that applying upgrade rate and influence ratio to relative degree calculation is more accurate and reliable than traditional method.
  • WANG Jingyuan; HU Yunfa; GE Jiaxiang
    Computer Engineering. 2007, 33(11): 70-72,7. https://doi.org/10.3969/j.issn.1000-3428.2007.11.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An indexing model called inner-relative successive trees which can unify the index of full-text data and XML-tree data is presented. A notion named successive pattern tree is proposed to effectively process the regular expression search in XPath. Based on successive pattern tree, a united method to search nodes and text in XPath is introduced. The experiment results indicate that this method improves the efficiency of the united search of nodes and text in XPath.
  • HE Jin; LIU Qiang
    Computer Engineering. 2007, 33(11): 73-75. https://doi.org/10.3969/j.issn.1000-3428.2007.11.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Beginning with decomposing the complex loop patterns, this paper introduces the methods to resolve the problems of obstacle complex loop patterns bring. Static-method is involved to generate reasonable and correct duration of complex loop pattern with “loop duration table” and adjustment rule. In order to control the live workflow instances dynamically, it uses “loop management stack” and the results gained from static-method to apply corresponding methods.
  • ZHANG Yu; YUE Lihua; JIN Peiquan
    Computer Engineering. 2007, 33(11): 76-78,8. https://doi.org/10.3969/j.issn.1000-3428.2007.11.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a spatial-temporal indexing technique named TPR+-tree that supports the predictive window query, presents the data structure and the key algorithms and introduces the concept of double-extremum childnode. TPR+-tree reduces the area and overlap of nodes by checking and eliminating the double-extremum childnodes. The experimental results indicate that TPR+-tree promotes the query performance. It is an efficient spatial-temporal index for predictive window query.
  • ZHAI Xiaodong; JIN Peiquan; YUE Lihua
    Computer Engineering. 2007, 33(11): 79-81. https://doi.org/10.3969/j.issn.1000-3428.2007.11.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the study on spatial-temporal semantics, an ER-compatible conceptual modeling approach to spatial-temporal database design is proposed, which is named STXER. The spatial-temporal semantics foundation and the spatial-temporal conceptual modeling procedures are discussed, and the implementation and a modeling example of STXER are presented. The STXER approach can support rich spatial-temporal semantics and thus can be used to suit different types of spatial-temporal applications.
  • ZHANG Lin; WANG Qingjiang
    Computer Engineering. 2007, 33(11): 82-84. https://doi.org/10.3969/j.issn.1000-3428.2007.11.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To improve the performance of data parallel pipelines on computational grids, the algorithm of simulated annealing is used to optimize scheduling. An experimental method is used to determine the initial control parameter, and a random method is used to choose the next scheduling scheme. By adjusting the stability times of the best scheduling scheme, the trade-offs between optimization cost and optimization effect can be made. Experiments show the simulated annealing here can effectively optimize the scheduling of pipelines.
  • ZHU Chen; ZHANG Zhongneng
    Computer Engineering. 2007, 33(11): 85-86,8. https://doi.org/10.3969/j.issn.1000-3428.2007.11.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of the flexibility of BPMN’s boundary and the problem of mapping to BPEL, this paper puts forwards a method of defining the model boundary by using the conceptual token as the internal element and translating the mapping into two different phases.
  • MA Manfu; YAO Jun; FENG Baiming; WANG Xiaoniu
    Computer Engineering. 2007, 33(11): 87-89. https://doi.org/10.3969/j.issn.1000-3428.2007.11.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming to overcome the shortcomings of economy model in grid resource scheduling, this paper presents a restricted commodity market model(RCMM) which employs trust and price control in resource selection. The trust includs resource credit, grid services consumer credit and grid services provider credit. Price control is implemented by Tâtonnement process, in which price depends on supply and demand. Simulations are performed to compare the RCMM scheduling and none minimisation algorithm. Results show RCMM scheduling reduce breach of faith, improve the stability of price, select credible resource for task and help task agent evaluate a given resource allocation for robustness against uncertainties.
  • SONG Jingjing; JIA Zhiping
    Computer Engineering. 2007, 33(11): 90-92. https://doi.org/10.3969/j.issn.1000-3428.2007.11.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the characteristics of embedded real-time database systems, this paper proposes a new join order optimization algorithm, which is a combination of greedy algorithm(GA) and iterative improvement(II). This algorithm can meet the real-time requirements and controls the query optimization time, therefore it is more suitable for the need of different kinds of transactions than traditional query optimization strategies. The simulation experiments show that the algorithm can find the optimal solution with less time and space complexity compared with exhaustive search(ES) and obviously outperforms GA and II in terms of output quality in situations where ES is not viable.
  • ZHANG Wenbo; JIANG Yueqiu; ZHAO Hai; GONG Yishan
    Computer Engineering. 2007, 33(11): 93-94,9. https://doi.org/10.3969/j.issn.1000-3428.2007.11.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is significant for an EOS to decide whether a process could be scheduled depending on whether it could be completed before absolute deadline. In order to forecast the complete time of a new process, some modifications is made in ARMLinux kernel. Run queue is ordered by real-time priority, every timer interrupt, scheduling if there is a process in run queue with higher priority than current process; deleting SCHED_RR scheduling policy. With these modifications, the complete time of a process can be forecasted in new kernel. So the decision of the acceptance or refusal for a new task can be made. The modifications for the ARMLinux kernel have been verified through test.
  • LEI Xiangdong; ZHAO Yuelong; CHEN Songqiao; YUAN Xiaoli
    Computer Engineering. 2007, 33(11): 95-97. https://doi.org/10.3969/j.issn.1000-3428.2007.11.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Multiversion optimistic concurrency control(MVOCC) protocol and mobile transaction real-time commit(MTRTC) protocol are presented for mobile distributed real-time database systems(MDRTDBSs). In MVOCC transaction, validation is performed at two levels: local validation and global validation. Dynamic adjustment of serialization order is adopted to avoid unnecessary restarts of transactions. The MTRTC is a real-time commit protocol and significantly reduces the message cost. The results of experiment show that transaction processing protocol combing MVOCC with MTRT performs better than other transaction processing protocols.
  • LAI Yonghao; XIE Zanfu
    Computer Engineering. 2007, 33(11): 98-99. https://doi.org/10.3969/j.issn.1000-3428.2007.11.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Bring forward an improved algorithm which judge the kind of text through optimizing dictionary match. This algorithm judges the kind of text basing on real-time analysis of the content of text, by analyzing two-hundred thousand characters per second, it judges bad text in Web real-time and effectively. The bad Web filter based on the algorithm of anti-interferential pretreatment and anti-miscarriage of justice improves the recognition rate(above 95%) and reduces the anti-miscarriage of justice rate. It offers more substantial foundation of keeping away unuseful information.
  • Networks and Communications
  • LIU Dan; ZHAO Youjian
    Computer Engineering. 2007, 33(11): 100-102. https://doi.org/10.3969/j.issn.1000-3428.2007.11.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    TCAMs are popular for designing forwarding engine on the router. They are fast and simply to implement. However, the main drawback is high power consumption. This paper presents a scheme that use trie data structure for partitioning the routing table into TCAM blocks to improve power efficiency. Compared with traditional TCAM, the scheme can reduce the power consumption by about 80% for 200 prefixes and more reduced ration for more prefixes.
  • YANG Ting; PEI Xichun; ZHOU Genbao
    Computer Engineering. 2007, 33(11): 103-104,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes a algorithm of physical topology which is made up of elements of multi-vendor, which bases on standard SNMP protocol. A theorem is educed in terms of theories of seniorities and practice. Based on this theorem a kind of better algorithm is proposed, which can discover physical layer topology in a simple, complete and efficient way. The algorithm can be applied to discover hubs and bridges that don’t support SNMP protocol in subnet.
  • ZHOU Zhizhao; DU Juan; TIAN Gang; CHEN Xiaoping
    Computer Engineering. 2007, 33(11): 105-106,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the packet radio network, MAC protocols based on competition may often limit the network performance because of packets collision, which can not fit for the tactical transmission demand especially. This paper presents an application scheme of wireless network based on TDMA, which distributes the wireless channel depends on time slots and ensures the packets to be transmitted timely and reliably in its own channel. The scheme can also handle the status of nodes increase and abrupt transmission by remaining time slots. An actual TDMA wireless network is established using GPS synchronization and DSP protocol board, which can meet the requirement of tactical transmission more compatibly.
  • ZHANG Jiajie; HU Hongchao; LIU Qiang; WANG Binqiang
    Computer Engineering. 2007, 33(11): 107-109. https://doi.org/10.3969/j.issn.1000-3428.2007.11.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article is based on the requirement of access convergence router of national 863 plan. It puts forward an IPTV multicast implementation scheme based on FPGA, and designs the FPGA program of 10Gb card about IPTV multicast. The test results indicate that the scheme can fulfill the requirement of access convergence router scheme of 10Gb card IPTV performance.
  • LI Li; LI Min; XIAO Qing; JIANG Minbin
    Computer Engineering. 2007, 33(11): 110-112,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes and discusses two congestion control mechanism in the continuous media stream communications in which UDP Is used, one is based on loss-rate, the other is based on RTT, and it points out each deficiency. It proposes a congestion control mechanism AOWDCC based on one way delay. Test in network simulate proves the superiority of the mechanism.
  • LIU Wangjun; HUANG Xiaoyu
    Computer Engineering. 2007, 33(11): 113-115. https://doi.org/10.3969/j.issn.1000-3428.2007.11.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The channel simulation of 802.16/WiMAX on NLOS and multi-landform communication environment using MATLAB is studied. By simulating the baseband model based on 802.16 OFDM PHT, it evaluates the major capabilities with different modulate modes and two ordinary equalizers: multichannel and dispersion specialties, SINR, etc.. The study offers theory base for computer simulate in system layer and technical reference for FPGA/DSP design.
  • SHI Xingang; YIN Xia
    Computer Engineering. 2007, 33(11): 116-117,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the conformity test requirement of mobile IPv6 protocol, uses a formal model to generate test suite, and designs the extended reference implementation based on a general conformance test system. Test capability, configurability and automation are improved. Test practice is carried out on various implementations and the results are analyzed.
  • HUANG Yingchun; LI Xiangli; QIU Baozhi
    Computer Engineering. 2007, 33(11): 118-119,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the analysis of IPv6’s QoS properties, DiffServ and MPLS, a new mechanism of QoS achievement in IPv6 network based on MPLS is proposed by using the traffic class field in IPv6 header. The new mechanism can simplify the network structure design and conveniently provide end-to-end QoS. The simulation results show it can optimize resource utilization and network performance.
  • FU Qingyun; LIU Xinsong
    Computer Engineering. 2007, 33(11): 120-122. https://doi.org/10.3969/j.issn.1000-3428.2007.11.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    his paper proposes a high performance distributed Web proxy model based on global in-memory object caching pool (GMOCP). It introduces a DSM like in-memory caching pool in system wide, and caching hottest objects in GMOCP, the average service time on these objects can be reduced, and system performance is improved. Based on trace-driven simulation method,the system is evaluated. The results show good speedup on performance of distributed proxy servers.
  • YUAN Peiyan; LI Layuan
    Computer Engineering. 2007, 33(11): 123-125. https://doi.org/10.3969/j.issn.1000-3428.2007.11.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The study of energy constrained routing protocols in Ad hoc networks is attracting more attention currently. Typical routing protocols presented by the MANET of IETF are the shortest routing, that is, it is with the least hops but without considering saving energy. Because the Ad hoc networks is an energy constrained system with portable devices, whether network lifetime can be extended or not becomes very important metric to evaluate the protocols. There are a few evaluations of the energy constrained routing protocols. Based on the mobility model, this paper analyzes the performances of four Ad hoc routing protocols with metrics of energy consumption and draws some instructive conclusions as reference for the study of Ad hoc routing protocol based on energy consumption.
  • Security Technology
  • CUI Zhongjie; HU Changzhen; TANG Chenghua;
    Computer Engineering. 2007, 33(11): 126-128. https://doi.org/10.3969/j.issn.1000-3428.2007.11.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to keep the system with higher collection frequency of fault symptom information in initial bandwidth threshold of fault management, an intelligent polling algorithm is presented. This algorithm decomposes parameter value which includes the time variations of fault symptom into sinusoids with different frequencies by means of discrete Fourier transformation. According to various fault alert initial threshold, the max or min frequency from decomposition is regarded as polling interval time. This algorithm is proved with more efficiency and reliability than others in experiment.
  • XU Yanyan; XU Zhengquan; CHEN Xi
    Computer Engineering. 2007, 33(11): 129-131. https://doi.org/10.3969/j.issn.1000-3428.2007.11.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new de-centralized multicast key management scheme. The main idea is introduced and its advantages and disadvantages are analyzed. The scheme is scalable, re-key cost effective. When data is transmitted among different subgroups, the problem of low efficiency in data transmission caused by multiple encryptions/decryptions in existing de-centralized schemes is solved. Also the forward/backward secrecy is guaranteed.
  • WANG Weiping; CHEN Wenhui; ZHU Weiwei; CHEN Huaping
    Computer Engineering. 2007, 33(11): 132-134. https://doi.org/10.3969/j.issn.1000-3428.2007.11.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As enterprises’ network security barrier, firewalls play a very important role. Since enterprises configurate firewalls according to its need; the rule table will be included. However, problems may occur during configuration. On one hand, the administrator himself may make some mistakes during initial configuration. On the other hand, possibility of conflicts among different rules increases with rule numbers in the table growing. This paper analyzes possible mistakes in the configuration process. It introduces several familiar types of mistakes in configuration, puts forward the algorithm which can find mistakes. The paper improves the algorithm according to the characteristics of the firewall rule table, which increases efficiency of detecting configuration mistakes.
  • XU Zhong; DAI Guanzhong; YANG Deming; ZHANG Zhi
    Computer Engineering. 2007, 33(11): 135-137,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The existing routing protocols of ad hoc networks works on the fact that IP addresses of hosts are already configured before they join the network, and all nodes exchange data on the basis of trusting each other. So they are less secure and unavailable in a hostile environment. A new secure scheme of authentication and auto-configuration for mobile ad hoc networks is proposed. This scheme authenticates the participants using digital certification and automatically allocates the IP addresses resulted from a one-way hash function on the public key before nodes access to network, so it can prevent attacks such as address spoofing and those associated with authentication and auto-configuration in the ad hoc network. Security and efficiency of the scheme are discussed.
  • JIANG Yefeng; LI Zhongwen; CHEN Qiong
    Computer Engineering. 2007, 33(11): 138-140. https://doi.org/10.3969/j.issn.1000-3428.2007.11.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Because of the coexistence of multi-PKI, how to implement authentication for multi-domain would become one of the most important problems on active network security. This paper proposes an authentication model and designs a suit of protocols to satisfy these actualities. The model which supports cross-domain mutual entity authentication is very suitable for the practice of authentication on active network.
  • YANG Yan; ZHOU Jing; WANG Lu
    Computer Engineering. 2007, 33(11): 141-143,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The dual signature is a new application of digital signature in SET protocol. It resolves security correspondence of the consumer, business and bank in electronic transaction. This paper analyzes the dual signature technology, puts forward a design project of dual signature presentation experiment, and realizes it by using the developing tool C# based on cryptography model of .NET framework.
  • SUN Ming; LU Changsheng
    Computer Engineering. 2007, 33(11): 144-146,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Access control for XML documents is a non-trivial topic, as it can be witnessed from the number of approaches presented in the literature. Several encryption schemes can be used to serve this purpose but all suffer from a static way of sharing data. But there are many situations where access control rules are user specific and dynamic which is difficult to predict. Models compiling access control policies in the data encryption cannot tackle this dynamic. With the emergence of hardware and software security elements on client devices, dynamic client-based access control schemes can be devised. A hybrid client access control model for XML documents is proposed. The validity and feasibility are verified through examples, experiment comparisons.
  • GUO Ping
    Computer Engineering. 2007, 33(11): 147-150. https://doi.org/10.3969/j.issn.1000-3428.2007.11.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Beginning with the kernel of PKI, which is certificate authority, this paper brings the concept of intrusion tolerance to CA, and gives a feasible scheme of CA based on intrusion tolerance. The most important part is that it discusses the system architect, a digital signature of CA based on intrusion tolerance, and the working process of the whole system. Aiming at some shortcomings, it points out where to be improved in the future.
  • WANG Jieqi; LU Jiecheng; XU Mingzhong
    Computer Engineering. 2007, 33(11): 151-153. https://doi.org/10.3969/j.issn.1000-3428.2007.11.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an attacking scheme on digital watermark based on changing energy distribution of frequency domain. The image embedded with digital watermark is decomposed by performing 1-level wavelet transformation, then the energy distribution of frequency domain is changed. Therefore the designer can not pick up the digital watermark, and the attacks can be achieved. Since human visual system (HVS) is considered attack in the quality of the attacked image is hardly affected.
  • CHEN Wenbing
    Computer Engineering. 2007, 33(11): 154-156,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a type of method using XML digital signature to design application system with security request. It analyses the defect using the recommended XML digital signature & validation model to sign and validate XML message. It presents the ideal of design and implement for CXML/SSoap_SV system based SOAP digital signature & stream validation. It concludes that the streaming validation model can enhance the performance of application system, and increase the memory efficiency of the system.
  • CHEN Can; HU Fengsong; ZHOU Haiyan
    Computer Engineering. 2007, 33(11): 157-159. https://doi.org/10.3969/j.issn.1000-3428.2007.11.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper proposes a feature point detection method which based on scale-space theory. The feature points can resist large-scale transformations, and the characteristic scale of every point changes in proportion with the picture’s scaling. Referring to feature scale and feature points’ relative position, the self-spanning patterns are generated as the watermark embedding area. The figure can change along with the transformation of points’ relative position, and then geometric robust watermark can obtain. Experiment result shows that the proposed method is robust against common geometric distortions.
  • BIAN Ruizhao; MA Zitang; WANG Huifang
    Computer Engineering. 2007, 33(11): 160-162. https://doi.org/10.3969/j.issn.1000-3428.2007.11.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the limitation of traditional intrusion detection system and proposes a model of intrusion detection system—— IDS-DLRMA. The fundament of the dynamic logic-ring is discussed. The model can process a mass of net information in distribution, and middle-agents manage all the groupware dynamically through the logic-ring, settling the problems such as one point failure, lack of recovery mechanism and load balance.
  • SHENG Suying; LU Guoping; WU Xinhua
    Computer Engineering. 2007, 33(11): 163-165,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Chaotic strict synchronous technique is the key to achieve chaotic digital secure communication. Based on actual network chaotic speech secure communication platform, the transport protocol is firstly applied in chaotic synchronization. Inspired by chaotic impulsive synchronization, a new chaotic protocol synchronization technology is proposed and studied, so that the key technical difficulties of digital secure communication can be solved. The proposed technology is improved, and a simple protocol synchronous mechanism is engendered. Such technology can be embedded into existing communication system easily, having strong security and practicability.
  • Artificial Intelligence and Recognition Technology
  • ZHANG Xiaofei; HUANG Heyan; CHEN Zhaoxiong; DAI Liuling
    Computer Engineering. 2007, 33(11): 166-167,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In cross language information retrieval, the query sentence often comprises some query keywords, but not a complete sentence. Because of the lack of necessary contextual and syntactic information in the series of query keywords, it is impossible to accurately translat the query sentence. In this paper, based on large-scale bilingual corpora and theory of vector space model and lexical mutual information, traditional mono-language IR technology is applied to convert the problem of translating query sentence into computing the “boost” value of the query keyword translation in bilingual dictionary, and the target language query sentence is reconstructed.

  • YU Suping; ZENG Peifeng; CHEN Jianping
    Computer Engineering. 2007, 33(11): 168-169,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An approach of self-adaptive thresholding is presented for Canny edge detection operator for fiber cross-sectional images. It is applicable to all fiber cross-sectional images regardless of the amount and/or the density of fiber cross-sections. The fiber edges can be detected exactly, and the pseudo edges resulted in from white noise can be restrained effectively.
  • CHEN Jing; MU Zhichun; FANG Xin; DU Dapeng
    Computer Engineering. 2007, 33(11): 170-172. https://doi.org/10.3969/j.issn.1000-3428.2007.11.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Chinese characters recognition is an important research field in Chinese characters cognition. This paper proposes a model based on multi-layer self-organizing neural network. The process of Chinese characters recognition based on Chinese characters cognition is researched from the aspect of Chinese characters cluster and components splitting. Results from this simulation suggest that the model is able to recognize the architecture and components of Chinese characters. It can detect some rules of Chinese characters recognition by learning. So it can simulate the process of Chinese characters recognition to some exteht.
  • JIANG Lifen; LU Guizhang; XIN Yunwei
    Computer Engineering. 2007, 33(11): 173-175. https://doi.org/10.3969/j.issn.1000-3428.2007.11.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper puts forward a formal context model based on ontology, which is suitable for pervasive computing environment. The ontology is expressed using the Web ontology language (OWL), which improves context expressing ability and rapid prototyping. The model provides a feasible method for context modeling, context application and context reuse in pervasive computing environment.
  • YUE Jun; CHEN Wenbin; SHEN Yifan
    Computer Engineering. 2007, 33(11): 176-178. https://doi.org/10.3969/j.issn.1000-3428.2007.11.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Recently point based graphics is becoming one of hot topics in computer graphics. This paper presents a conformal parameterization method for point set surface. In the method, traditional Euclidean distance is replaced by geodesic length. That is based on the observation that geodesic is more appropriate than Euclidean distance in describing the surface implied by the point set. So the error caused by the unorganization feature of point set surfaces is reduced and the parameterization quality is improved.
  • YOU Linru; LAO Zhongjian; DING Fei
    Computer Engineering. 2007, 33(11): 179-181. https://doi.org/10.3969/j.issn.1000-3428.2007.11.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Fingerprint matching is one of the most important issues in automatic fingerprint identification system(AFIS). This paper proposes a new minutia matching method in pursuit of solving the problem of determining the reference points with information of ridgelines and vector triangles, and then finishes the minutia matching process in the polar coordinate. This method divides the matching process into two steps to reduce the reject identification time and imports the information of ridgelines to reduce the false reject rate, and it is invariant to rotation or scale changes. Experimental results demonstrate that this method has high identification speed and correct rate, and it can satisfy the requirement of real-time systems.
  • LIU Shan; ZHANG Hui
    Computer Engineering. 2007, 33(11): 182-183. https://doi.org/10.3969/j.issn.1000-3428.2007.11.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Information quantity is the effective quantity method which delineates the classified knowledge. The computing question of the attribute reduction of information system can be turned into the calculation of the information quantity. This paper proposes a new dynamic computing information quantity algorithm. When the number of the object in the information table increases, instead of treating the changed information table as a new one and computing the information quantity again like rough set reduction algorithm does, the dynamic computing information quantity algorithm just updates the old information quantity based on the increased objects, so the computation time is greatly saved. An illustrated example shows that by the dynamic computing information quantity algorithm, the same information quantity is computed with the less objects, furthermore the results are right and effective.
  • CAO Hui; CAO Ligang; JIAN Xingxiang
    Computer Engineering. 2007, 33(11): 184-186. https://doi.org/10.3969/j.issn.1000-3428.2007.11.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traditional personal identification system based on single biometric (such as face, fingerprint, voice) is often not able to meet the requirements of system. The multi-biometric technology can improve the recognition accuracy comparing the single biometric feature system. This paper presents a multi-biometrics system, which integrates face and acoustic subsystem using neuron network. Experiments show that the fusion system performs well both in response time and system accuracy especially in noisy background.
  • DOU Jianhua; LIN Jie
    Computer Engineering. 2007, 33(11): 187-189,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A MAS simulation system is built based on ant colony algorithm, aiming at the problem of MC supply chain coordination for multi-enterprise under the condition of complete shared information. The design steps of algorithm and the structures and functions of MAS and agents are described. The specific technology methods for implementing the MAS in the JADE environment are explained. The results of the simulation are analyzed and compared.
  • GUO Yong;
    Computer Engineering. 2007, 33(11): 190-192. https://doi.org/10.3969/j.issn.1000-3428.2007.11.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Semantic technology can improve the analyzing accuracy of the Web documents. Two semantic technologies are introduced in this paper: concept semantic technology and formalization semantic technology. The concept semanteme based on non-negative matrix factorization is a novel method, which can consider the concept semantic accuracy and the complexity of algorithm. Ontology is a current formalization semantic technology. Ontology-based information systems suffer from the problem of ontology heterogeneity. It introduces the definitions of simplified multielement bounds to find the best approximations of the concepts, and presents the idea for searching the simplified multielement bounds.

  • HU Jianxiu; ZENG Jianchao
    Computer Engineering. 2007, 33(11): 193-195. https://doi.org/10.3969/j.issn.1000-3428.2007.11.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The inertia weight is the crucial parameter of the particle swarm optimization(PSO). It can balance the global search and local search to improve PSO’s convergence. This paper analyzes the effect of inertia weight on PSO’s performance. To enhance the global optimality, a few adjusting methods on inertia weight are put forward. The results on four benchmark functions prove these methods are feasible, and indicate these methods can improve the global convergence and convergence speed.
  • WANG Yanping; WANG Yiding
    Computer Engineering. 2007, 33(11): 196-198. https://doi.org/10.3969/j.issn.1000-3428.2007.11.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The diversity of mobile devices with limited display capability, storage, processing ability and the changing bandwidth of the wireless network are main obstacles for mobile devices to access the images in Internet with WAP technology. This paper proposes a new method to design a WAP gateway, which can modify the images in Internet adaptively according to QoS estimation system. Image quality, mobile device capability and network bandwidth are used to establish an optimal target function. An improved genetic algorithm(GA) with a new coding scheme and developed new crossover operator and mutation operator is adopted to solve the optimal image modifying parameters. The simulation results show that the proposed method can quickly access the Internet images with the QoS.
  • LIN Hongwen; YANG Shaoqing; XIA Zhijun; KANG Chunyu
    Computer Engineering. 2007, 33(11): 199-200. https://doi.org/10.3969/j.issn.1000-3428.2007.11.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a sea-aero targets detection approach based on fractal image coding. Code the image with fast no search scheme after smooth filter, use root mean square error of each range block to estimate if there is man-made object in the block,and mark those blocks covered by artificial object, connect all the marked blocks nearby and thus obtain the whole target region. Experimental results show that the method is very effective to sea and sky background image, and it has strong noise restraining ability and is fast enough to support real time detection.
  • WANG Jiaqin; LI Renfa; LI Zhongsheng; TANG Jianbo
    Computer Engineering. 2007, 33(11): 201-203. https://doi.org/10.3969/j.issn.1000-3428.2007.11.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a different ontology concept semantic similarity algorithm, which uses entities similarity to get the initial concept semantic similarity, and integrates two coefficients which influence concept semantic similarity to get the final concept semantic similarity. Comparing with probability statistic, experiments prove that this method is valid. The research can be applied in the field of knowledge searching.
  • LIANG Juan; WANG Xuan; CHEN Weiwei; FU Bo; WANG Yiyan
    Computer Engineering. 2007, 33(11): 204-205,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new user recognition approach using keystroke features based on difference subspace is proposed. The proposed approach calculates the common feature vector to depict a user’s keystroke pattern according to keystroke features of the user’s several recent successful authentications, and then utilizes Euclid distances between current keystroke pattern vectors and common feature vectors to identify users. The performance of the proposed approach is evaluated and experimental results show the computational simplicity, high efficiency and low false recognition rates of the proposed approach compared with some existing methods, it is also shown that the approach is robust.
  • XIE Chunguang; ZHU Junsheng; CHEN Shengquan
    Computer Engineering. 2007, 33(11): 206-208,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By adding cost factor of probability in ants election path, and increasing only the fine quality of information, this paper improves the existing ant colony algorithm to speed up its convergence speed. Combining the improved ant colony optimization algorithms and the tiered plan, it presents a parallel algorithm for constructing minimum price multicast trees under transmission constraints.
  • LIU Huafu; ZHANG Wensheng
    Computer Engineering. 2007, 33(11): 209-212. https://doi.org/10.3969/j.issn.1000-3428.2007.11.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is rather difficult to design a fuzzy massive data classification system by using support vector machine directly. To solve this problem, fuzzy classification system is proposed by computing support vector based on neighborhood theory, and by obtaining classification hyper plane using support vector. The result of experiment shows the problem in designing fuzzy massive data classification system can be effectively solved by this method.
  • Multimedia Technology and Application
  • GAO Xin; JIA Qingxuan; SUN Hanxu; SONG Jingzhou
    Computer Engineering. 2007, 33(11): 213-215. https://doi.org/10.3969/j.issn.1000-3428.2007.11.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper uses Face Fixer compression algorithm to compress connectivity data of polygon meshes, and uses a order-3 adaptive arithmetic coder to further improve compression rates. By transforming the vertex positions to a local coordinate system defined upon the reference polygon and combining the quantization, parallelogram prediction of vertex coordinates and order-3 adaptive arithmetic coder, this paper implements the compression of geometry data of polygon meshes. It demonstrates excellent compression rates, almost without damage to model quality.

  • PAN Hao; GAO Zhibao; HE Xiaohai; YIN Junlin
    Computer Engineering. 2007, 33(11): 216-218,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A Pedestrian flow detection method in public transport system based on the computer vision is presented. By analyzing the video data of the spot pedestrian flow and using the techniques of the image processing, the pedestrian flow through the field of vision can be extracted from the video image. The algorithm of extraction of human head characteristic curve against a dynamic background low definition and specific shooting angle is presented. And the parameter estimating of ellipse template through partial ellipse is presented. The results show that the algorithm is correct and efficient.
  • LIU Ziyan; CHEN Linzhouting
    Computer Engineering. 2007, 33(11): 219-221. https://doi.org/10.3969/j.issn.1000-3428.2007.11.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the principium of constructing video mixer in video conference system. In re-encoding the mixing picture in video mixer, a method of using the useful information drawn from already compressed bitstream is proposed, which can reduce the calculation and improve the encoding efficiency greatly.
  • ZHANG Jun; GAO Xieping
    Computer Engineering. 2007, 33(11): 222-223,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An image compression method based on a new class of wavelet-nonseparable wavelet is proposed. Some wavelet filter banks with different characteristics (such as orthogonality, symmetric, vanishing moment) are constructed. Using these filters, an image compression method in non-separable wavelet-domain is implemented; the comparative studies of the application of the non-separable wavelet transform and the tensor product wavelet transform in case of different characteristics are proposed. Experimental results show that non-separable wavelet is a class of multi-dimensional wavelet with good application potentials, which has more advantages compared with wavelet and multi-wavelet.

  • Engineer Application Technology and Realization
  • LIU Xuan; LU Tijun; JIA Huibo
    Computer Engineering. 2007, 33(11): 224-226. https://doi.org/10.3969/j.issn.1000-3428.2007.11.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Cache plays an important role in most calculation, match occasion. It can improve access efficiency, reform system performance, and so on. In addition to the use in processor, cache can be used in Web access and storage system to increase the access rate. This paper analyses the replacement algorithm used in processor and Web Cache, considers the character of network attached optical jukebox and brings forward a new replacement algorithm. The algorithm combines the specialty of LFU algorithm and MQ algorithm to improve the hit-rate in cache. It shows the replacement algorithm has a close relation with access model.
  • MENG He; ZHAO Zheng
    Computer Engineering. 2007, 33(11): 227-229. https://doi.org/10.3969/j.issn.1000-3428.2007.11.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As wireless content delivery platforms, some only support one kind of contents, others don’t have either security or copyright protection mechanism. This paper develops a general wireless content delivery platform, which supports the maintenance, management and delivery of all kinds of different contents. It also implements MIDP 2.0 and OMA DRM, which strengthens the security and property right protection during the delivery process. The basic principle and implementation method of the system are discussed.
  • YANG Xueming; CHEN Yong; ZHANG Jinkai; YUAN Jinsha
    Computer Engineering. 2007, 33(11): 230-232. https://doi.org/10.3969/j.issn.1000-3428.2007.11.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the light of the feature for highway construction management, this paper brings out the idea of constructing integrated highway construction management information system. The function and structure of the system are illustrated. The system modeling method is also discussed by using the unified modeling language(UML) and the CASE tool power designer. A practical system is realized and applied instance is presented.
  • XUE Shaowei; GENG Weidong; MIAO Yongwei;
    Computer Engineering. 2007, 33(11): 233-235,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    SIP is a key protocol in next generation network(NGN), the command and dispatch system of enterprises based on SIP protocol is a new important research topic. After presenting some techniques of SIP protocol and the command and dispatch system, a new centralized IP dispatch system using SIP as control signal is proposed. Some function requirements of the system and the implement details of some main modules are given.
  • LIU Yunhui; LIU Tie; WANG Quanliang; LUO Siwei
    Computer Engineering. 2007, 33(11): 236-238. https://doi.org/10.3969/j.issn.1000-3428.2007.11.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Detecting the rail surface defects is one of the important means to guarantee safe transportation. This paper adopts the image processing technique to detect the defects automatically. A detection system scheme is designed and the detection algorithm is studied with emphasis. It put forwards a rapid real-time detection algorithm based on the pixels brightness. Experiment verifies the validity and high efficiency of the algorithm.
  • CHU Zhaoliang; WANG Qinghua; CHEN Hailin; XU Shoushi
    Computer Engineering. 2007, 33(11): 239-241,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Optical remote sense images have become more and more useful in our life. Focusing on the medium or high resolution optical remote sense images, this paper presents a method based on minimum error threshold for detecting ship targets from coastal regions. In this method, an adaptive oriented orthogonal projective decomposition method is used to get a more accuracy approximation of the histogram, and the candidate ship targets can be detected by an improved minimum error threshold algorithm based on the shannon information entropy function. A multi-criteria target detection idea is used to detect ship exactly. The method is applied in detecting more than one hundred optical remote sense images and proved to be fast, exact and robust.

  • ZHANG Xiao¬ming; WANG Hangyu; HUANG Da
    Computer Engineering. 2007, 33(11): 242-243,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A method of data fusion based on D-S evidence theory is analyzed to resolve cooperative multi-platform data fusion problems. The idea of design and configuration are brought forward. The method is applied in cooperative multi-platform data fusion for target recognition of the warship. The result shows that the application of D-S method in cooperative multi-platform data fusion reduce the uncertainty of target recognition compared with that in single platform data fusion by MATLAB simulative. The results indicate the theory is effective and correct.
  • WANG Qigang; TAN Jie
    Computer Engineering. 2007, 33(11): 244-246. https://doi.org/10.3969/j.issn.1000-3428.2007.11.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the background of application requirements of multiple readers on the dressmaking stream line. The paper presents a general connection and communication method——utilizing CAN field-bus to complete the communication between PC and RFID readers, After the comparison of RS485 field-bus to CAN field-bus, the hardware architecture for communication is introduced as well as format and means of the communication protocol. The whole communicating flow chart and the description to the key code of the communication program are given with problems to be noticed.
  • YUAN Huaimin
    Computer Engineering. 2007, 33(11): 247-248,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This system realizes the comprehensive management about water, electricity and gas with one CPU card. The system security is guaranteed by using secret key to manage and control popedom to read-write program of database.
  • HU Zhixin; WANG Yinghui; YIN Yong; CHEN Youping
    Computer Engineering. 2007, 33(11): 249-250. https://doi.org/10.3969/j.issn.1000-3428.2007.11.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The development method of a kind of new PCI-based card integrating network function for physical isolation is provided, introducing the function characteristics, the hardware structure and workflow etc.. The card that can replace a piece of normal card for physical isolation and two pieces of network cards realizes the function of three pieces of cards with a piece of card and has such advantages as tight structure, high security, cheap price and convenient usage etc.. The card is applicable to such customer units that request very strict data safety and expect to be connected into Internet.

  • Developmental Research
  • JING Hao; ZHANG Jing; LI Junhuai
    Computer Engineering. 2007, 33(11): 251-253,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To deal with the characteristics of networked manufacturing integration platform authentication, WSRF-based single sign-on strategy is proposed. Its design ideology is expounded. Some key technologies including verification system design in SSO, unity of centralized identity authentication and authorization mechanism, function guarantee are detailed. And solution is given. The system realizes authentication and authorization in the dynamic loose-couple environment, solves difficult problem of resource-grade authorization. Feasibility and practicability of the solution are verified by real engineering.
  • ZHANG Ping; XU Jing
    Computer Engineering. 2007, 33(11): 254-259. https://doi.org/10.3969/j.issn.1000-3428.2007.11.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article discusses the design and implementation of keyboard device driver based on embedded Linux and Qt/Embedded. Based on the working process and keyboard driver characteristics, the article divides the keyboard driver into two modules: bottom device driver module and upper text input module.
  • MENG Qingchun; WANG Xiaojing
    Computer Engineering. 2007, 33(11): 256-258. https://doi.org/10.3969/j.issn.1000-3428.2007.11.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    During the process of constructing control system with high reliability, researchers put forward a kind of fault-tolerant pattern based on software redundancy called as process pair pattern. Although this pattern has many advantages such as low fault recovery time, the problem that check point messages are with is the error during transmission process or not integral when reaching destination can not be solved. In order to solve the problem, this paper uses LDPC code to encode data information from main servers to backup storage devices, and RS code is used to encode the check point messages received by backup servers. Analysis result proves improved method can effectively solve the problem to strengthen the reliability of the control system.
  • SHAN Zheng; ZHAO Rongcai; ZHANG Zheng
    Computer Engineering. 2007, 33(11): 259-260,. https://doi.org/10.3969/j.issn.1000-3428.2007.11.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a network authentication/accounting system based on Intel IXP2400 platform. Embedded with technologies like 802.1x, the system enables binding information on different dimensions. It makes possible the authentication/accounting without switching devices and supports multiple methods of access. The IXP2400 platform on the system has an excellent performance of 3Gbit/s throughput, it is able to overcome lots of obstacles in network authentication/accounting in IP network operation.
  • GE Wei; FAN Dong
    Computer Engineering. 2007, 33(11): 261-263. https://doi.org/10.3969/j.issn.1000-3428.2007.11.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at solving the problem of selecting optimal maintenance unit for maintaining manufactures in multi-units, this paper abstracts the factors that affect optimization with operational researches and shows a method to solve the problem based on multiobjective decision making. It puts forward the optimal model and brings up the computing course.
  • CHENG Zhuanpeng; ZHANG Yue
    Computer Engineering. 2007, 33(11): 264-266. https://doi.org/10.3969/j.issn.1000-3428.2007.11.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To deal with modern medical care needs, a design of real-time telecardiogy monitor terminal based on 32-bit embedded technology is proposed. This monitor utilizes uCLinux operation system and S3C44B0X microchip which integrates ARM7 micro-processor. The terminal realizes ECG acquisition, wireless transmission, real-time analysis and a warning mechanism for emergency. By connection with central monitor system, remote ECG diagnosis and care is achieved.
  • DONG Shuleng; MAO Hongwei
    Computer Engineering. 2007, 33(11): 267-269. https://doi.org/10.3969/j.issn.1000-3428.2007.11.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the constitutes and control principle of automatic sorting system and describes the design and implementation of serial communication between the Panasonic’s FP1 series PLC and the host-computer in the system with introduction to the communication protocols and parameters setting and part of the serial-communication programs based on visual basic 6.0. The implementation of communication ensures that the automatic sorting system has the property of high intelligence, high reliability and ease of second development.
  • XIONG Jing; LIU Ronghui; HUANG Weixiang
    Computer Engineering. 2007, 33(11): 270-272. https://doi.org/10.3969/j.issn.1000-3428.2007.11.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As the centralized maintenance thought is concerned, framework and functionality modules of data centralized management system are introduced. Design project of modularized layers of the system is put forward, while data synchronizing protocol is introduced. Implement methods of synchronizing interface, which could be configured dynamically and is based on both ASX stream frame and multi-thread mechanism, are discussed. Systematic solution for data centralized maintenance and management of operators’ service systems is put forward.
  • CAI Daojia; HOU Xiuhong; WANG Guoan; HUANG Xiaoqiao
    Computer Engineering. 2007, 33(11): 273-275. https://doi.org/10.3969/j.issn.1000-3428.2007.11.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new polling algorithm based on SNMP network management system, called trap-directed transmit polling (TTP). The algorithm improves the traditional trap-directed Polling algorithm. It introduces the idea of transmission and grouping. Agents of each equipments on the net take charge of the transmission of the polling Datagram. As a result, TTP reduces a great deal of manager’s work, especially for the big network management system.
    【Key words】
  • SUN Liping
    Computer Engineering. 2007, 33(11): 276-封三. https://doi.org/10.3969/j.issn.1000-3428.2007.11.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Software programming is a process of team collaboration. It requires team members to work independently and coordinate closely during the exploration activities. The software process(TSP) provides effective and actual help for the standard software development and improvement process ability. But there are some problems in implementing TSP, which are caused by the poor understanding of process, difficulties in communication and collaboration, heavy workload of disposing process data, etc. This paper provides computer supported cooperative work (CSCW)-TSP system to solve these problems. CSCW-TSP system utilizes CSCW principles and technologies to make a new practical way for TSP as the software tool. It enables the software engineering team to apply TSP more effectively, enhances the efficiency and the quality of software development.
  • LI Fujuan; WANG Luping; LIU Zhongying
    Computer Engineering. 2007, 33(11): 279-281. https://doi.org/10.3969/j.issn.1000-3428.2007.11.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article establishes the timing optimization model of airlines schedule based on the objective function of maximum profit. A tabu search algorithm is brought forward. Through some pre-processing and skill to the schedule data, the efficiency of tabu search algorithm is enhanced, and it is very useful for airlines. The feasibility of the model and algorithm is verified by an example of airlines.
  • LI Donghua; SHEN Wenxuan; ZHANG Yuanyuan
    Computer Engineering. 2007, 33(11): 282-封三. https://doi.org/10.3969/j.issn.1000-3428.2007.11.102
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The method proposed can obtain an enterprise MAS model based on some models of enterprise which are built with the enterprise modeling method, by agentify them with agent elicitation rule. This development method comprises two joint steps: modeling of problem domain and agentify process, which are integrated systematic method, provides guide in theory and methods for application system development. As an illustration of the presented method, it describes the real case of enterprise management diagnostic system in detail.