Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 May 2007, Volume 33 Issue 10
    

  • Select all
    |
    Degree Paper
  • WANG Lei; CHEN Zhiping;
    Computer Engineering. 2007, 33(10): 1-3,43. https://doi.org/10.3969/j.issn.1000-3428.2007.10.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Security schemes of pairwise key establishment, which enable sensors to communicate with each other securely, play a fundamental role in research on security issue in wireless sensor networks. A general framework for key predistribution named H2 (Hierarchical Hypercube) is presented, based on the idea of key distribution center and polynomial pool schemes. Theoretic analysis and experimental figures show that the new algorithm has better security performance and provides higher possibilities for sensors to establish pairwise key, compared with previous related works such as polynomial and polynomial pool-based pairwise key predistribution algorithms.
  • WANG Feng; QIU Xuesong; LI Wenjing; MENG Luoming
    Computer Engineering. 2007, 33(10): 4-6,33. https://doi.org/10.3969/j.issn.1000-3428.2007.10.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The main properties of network operation states can be described from limited performance measurements through performance measurement techniques for telecommunication networks. This paper presents a performance measurement method based on the periodic-sampling for telecommunication networks. Through the method the sampling period can be adjusted adaptively according to the variation of network operation states, and the network operation states can be reconstructed from the sampling results. The results of the experiment indicate that the measurement results gained through this method can describe the variance of the network operation states.


  • YU Shuchun; ZHAO Jie; CAI Hegao
    Computer Engineering. 2007, 33(10): 7-9. https://doi.org/10.3969/j.issn.1000-3428.2007.10.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A great deal work about stereo matching methods has been done. Such work shows that stereo matching methods generally perform five steps. Step of computing original matching-cost, step of computing candidate matching-cost and step of computing disparity are very important. In the light of this idea, a grading test platform for stereo matching methods is presented. This platform is designed in the environment of VC++6.0. Four type images are taken to control data-transfer. Performance-checking experiments of the test platform show the platform is excellent with clear structure, perfect function, simple and good expansibility.

  • ZHANG Jin; LIU Qingrang; SI Liang; WU Jiangxing
    Computer Engineering. 2007, 33(10): 10-12,2. https://doi.org/10.3969/j.issn.1000-3428.2007.10.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Explicit measurement of per-flow traffic is difficult in backbone networks because it needs large high-speed memories. The main contribution of this paper is a new flow traffic measurement algorithm based on two-layer memory hierarchy. Such memory hierarchy is constructed by small high-speed memory on the first layer and large low-speed memory on the second layer. Illumined by Quasi-Zipf’s law of network flow size, the measurement algorithm inclines to save the state information of flows with heavy traffic in layer-one memory and that of flows with light traffic in layer-two memory. The two-layer memory hierarchy makes a better tradeoff between space and speed compared with large high-speed memories. It shows experimentally that the algorithm proposed in this paper has a smaller and fairer estimation error.
  • SHI Yuexiang; B. Benhabib; CAI Zixing
    Computer Engineering. 2007, 33(10): 13-15,1. https://doi.org/10.3969/j.issn.1000-3428.2007.10.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an application with content-based image retrieval in intelligent monitor and operator. Usually, color is used to describe the image, but not exquisite in detail of image. The chain coding is built by eigenvalue of region description that is partite from image. The grid feature couple is used to locate and detect the human face for the captured image. Extraction the feature and calculating the chain coding, the similarity function can decide the match degree for the processing object. This system enhances the intelligence in how to identify the object when the camera captures its image.

  • XU Yong; SONG Rou
    Computer Engineering. 2007, 33(10): 16-18. https://doi.org/10.3969/j.issn.1000-3428.2007.10.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Conditional random field(CRF) is a newly proposed probabilistic model for segmenting and labeling sequence data, and has been successfully applied to many natural language processing tasks and information extraction. This paper introduces CRF model and applies it in encyclopedia text topic segmentation. With its long distance overlapping feature mechanism, the CRF model shows better performance than traditional HMM model on encyclopedia text segmentation task.
  • WANG Ling; MU Zhichun; GUO Hui
    Computer Engineering. 2007, 33(10): 19-21. https://doi.org/10.3969/j.issn.1000-3428.2007.10.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new batch processing incremental learning method based on support vector machines is proposed to improve the model accuracy and update the model for the increasing batch data in the real work. The proposed method has been applied to a practical case of modeling prediction ability of mechanical property of steel materials. Compared with the traditional support vector machine incremental learning algorithm, the obtained model results demonstrate this promising method improves the model accuracy.
  • FU Ping; FANG Shuai; XU Xinhe ; XUE Dingyu
    Computer Engineering. 2007, 33(10): 22-24. https://doi.org/10.3969/j.issn.1000-3428.2007.10.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The method of the shadow detection and remove which has application value is proposed based on analyzing visual properties concerning shadows for visual surveillance purposes. The method proposed is essentially based on background modeling and background subtraction which aim to segment moving object and the corresponding shadow. It decides whether there are shadows in a given foreground figures. A method based on illumination assessment is developed for this purpose. Multi-gradient analysis and a fast clustering algorithm for thresholded image are employed to detect the shadow. Shadow is removed and the object is segmented. Experimental results are given to demonstrate the effectiveness and practicality of the method.
  • LIU Bin; PENG Jiaxiong
    Computer Engineering. 2007, 33(10): 25-27. https://doi.org/10.3969/j.issn.1000-3428.2007.10.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A construction method of two-dimensional two-channel wavelets is presented. An image fusion method based on this wavelet is proposed. This fusion method uses the gradient map of low-frequency sub-image to merge high-frequency sub-images. The performance of the method is evaluated using the Entropy, error of mean square root. The experiment results show that the method is effective. The performance is better than the fusion method based on separable four-channel wavelets and the amount of computation is reduced to a half of the latter. This method can be used to merge many kinds of image.
  • XU Jianming; TANG Wansheng
    Computer Engineering. 2007, 33(10): 28-30. https://doi.org/10.3969/j.issn.1000-3428.2007.10.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the problems that terms relationships are not considered in the belief network model, this paper uses the query term synonyms, presents an extended belief network model for IR, introduces models topology and retrieval method, and illustrates an example. This model has better performance because it takes account of not only query terms but also query term synonym.


  • HU Haibo; LIU Weidong; TANG Shihao; ZHU Wenquan
    Computer Engineering. 2007, 33(10): 31-33. https://doi.org/10.3969/j.issn.1000-3428.2007.10.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To avoid the inefficiency during the procession of the vector-raster overlay, caused by “scanning” algorithm, which functions in pixel by pixel way, the paper brings forward a new algorithm based on overlay template, which is composed of rows-cols grids interpolated from polygon map-layer, and it takes the measure form vector-raster overlay to raster-raster overlay, which simplifies the procedure and performs perfectly. Moreover, the authors try to overcome the unmatchable raster-raster overlay, and deal with the three cases of irregular match.
  • Software Technology and Database
  • TONG Qiang; ZHOU Yuanchun; WU Kaichao; ; YAN Baoping
    Computer Engineering. 2007, 33(10): 34-35,6. https://doi.org/10.3969/j.issn.1000-3428.2007.10.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel method to find quantitative association rules by clustering the transactions of a database into clusters and projecting them into the domains of the quantitative attributes to form meaningful intervals which may be overlapped. Experimental results show the method can efficiently find quantitative association rules, and can find important association rules which may be missed by the previous algorithms.
  • ZHOU Zuan; WANG Tengfei; DAI Guangming
    Computer Engineering. 2007, 33(10): 36-37,4. https://doi.org/10.3969/j.issn.1000-3428.2007.10.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of analysis of current path plan methods and collision examining methods, a new robot path plan method is put forward: bi-directional Dijkstra with binary tree sorted algorithm. It is well known that Dijkstra algorithm solves the path plan problem in time O(n¬¬¬¬2). As an improvement on Dijkstra algorithm, because it begins from start point and end point at one time when it executes the algorithm, and sorts the set of the points which have not been marked by binary tree, the algorithm solves path planning problem in time O (nlog n). And the enhancement on the efficiency in robot path plan with the algorithm has been proved by testing some data, especially in the situation where the number of testing data is very large.

  • WANG Kebo; JIA Yan; HAN Weihong; WANG Zhiying; MA Yongzhu
    Computer Engineering. 2007, 33(10): 38-40. https://doi.org/10.3969/j.issn.1000-3428.2007.10.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Distributed components are independent deployable units which can be composed to applications. The software model cannot supply enough information to transform into a performance model. CCPE Profile and a UML model annotation approach based on CCPE for distributed component based applications are proposed, so as to integrate non-functional information into functional model. The approach can be used as a basis of tool-based transformation of software model to performance model for distributed component based software application.

  • DONG Chunli; ZHAO Rongcai; HAN Lin; ZHANG Ya
    Computer Engineering. 2007, 33(10): 41-43. https://doi.org/10.3969/j.issn.1000-3428.2007.10.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Minimizing communication by increasing the locality of data references is an important optimization for achieving high performance on large-scale parallel machines, but reorganization is inevitable in the progress of decomposition. It is important to find a method to solve the problem. This paper describes a linear decomposition algorithm which finds computation and data decomposition automatically, including finding data and computations decomposition that has data reorganization communication.


  • ZHENG Zhong; SONG Junqiang; WU Jianping
    Computer Engineering. 2007, 33(10): 44-45,4. https://doi.org/10.3969/j.issn.1000-3428.2007.10.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The earth science application software framework is the software framework oriented to the earth system modeling and simulation. It is used to enhance interoperability, ease of use, reuse, and performance portability in various complex applications. This paper introduces the background of the earth science application software framework and three classic frameworks, draws a comparison between them, and states the future direction of the earth science application software framework.
  • YAN Xiangtong; JIANG Pingyu
    Computer Engineering. 2007, 33(10): 46-48. https://doi.org/10.3969/j.issn.1000-3428.2007.10.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analysis and details of the design flows of many MEMS devices, a general top-down design process model for MEMS is established. Referring to XPDL of WFMC and taking the characteristics of MEMS design processes into account, an XML-based top-down design process description language for MEMS is proposed, called MDPDL (MEMS design process description language). It is extended from XML and described with XML DTD. The idea of design and implementation is introduced and a case is given to qualify the validity of MDPDL.
  • XU Yongtao; WANG Yanzhang; CHEN Xuelong
    Computer Engineering. 2007, 33(10): 49-51,9. https://doi.org/10.3969/j.issn.1000-3428.2007.10.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the problem of metadata representation for E-government information resources, this paper proposes entity-relation-problem (E-R-P) modeling system for metadata modeling and offers metadata representation model based on E-R-P modeling system. It takes metadata expression of star schema model of data warehouse as example. Corresponding system conceptual model is also proposed. And the practice proves the improvement of the model.
  • ZHANG Jing; ZHANG Yunsheng
    Computer Engineering. 2007, 33(10): 52-54. https://doi.org/10.3969/j.issn.1000-3428.2007.10.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Real-time data query processing has been widely used in industry information platform. XML is fast emerging as the dominant uniform data standard for representing data from every sub-system. This paper explores the more conservative approach of using traditional relational database engines for processing XML documents conforming to document type descriptors (DTDs). The paper develops a set of data models, transform rules, and algorithm descriptions to implement a prototype system that converts XML documents to relational tuples. It achieves the possibility of real-time data uniform description based on XML and query processing mechanism.
  • NAN Kai; YAN Baoping
    Computer Engineering. 2007, 33(10): 55-57. https://doi.org/10.3969/j.issn.1000-3428.2007.10.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A framework extending OGSA-DAI is proposed to make data integration by imposing service composition on OGSA-DAI data services. A prototype of the framework is implemented by taking advantage of extensibility of OGSA-DAI. Three kinds of integration operations are accomplished. Problems related to further applications of the framework, future work, and a brief comparison between OGSA-DAI and SDG-DAS (Data Access Service of Scientific Data Grid) are discussed.
  • LIU Bin; SHI Feng
    Computer Engineering. 2007, 33(10): 58-60. https://doi.org/10.3969/j.issn.1000-3428.2007.10.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A message mechanism orienting load information interchange is proposed. A distributed control and sender initiated dynamic load balancing algorithm designed on the message mechanism is also proposed, aiming at solving the dynamic balancing problem in homogeneous cluster system. The experiments prove the availability and practicability of the algorithm in dealing large scale computation –intensive task.

  • XU Lixin; HE Min; DI Wenhui
    Computer Engineering. 2007, 33(10): 61-63,1. https://doi.org/10.3969/j.issn.1000-3428.2007.10.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel method that simultaneously assures data confidentiality and data integrity of data items. The basic idea of this method is adding a verification table to existing database tables, and the verification items for each original data item are stored in the verification table. By using the line label and line concatenation techniques, this method not only assures the confidentiality of a database that has important and sensitive data, but also effectively protects data from being modified, exchanged, added or deleted illegally. A formal analysis and verification of this method is provided.
  • HONG Xueyu; ZHANG Ling; CHEN Baogang; XU Xiancheng
    Computer Engineering. 2007, 33(10): 64-65,9. https://doi.org/10.3969/j.issn.1000-3428.2007.10.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The Linux kernel techniques, such as non-interruptible kernel, coarse-grained time mechanism and lack of effective real-time scheduler etc., can’t well support the confirmability which is the basic characteristic of real-time operating system. Much research has been done on the real-time Linux in the world. In this paper, the shortcomings of Linux kernel when applied to real-time system and the relevant solutions implemented in some famous Linux projects, including RT-Linux, Kurt-Linux, and Hardhat-Linux, are introduced. Research on implementing interrupt in process is introduced and the final experiment shows that the research is effective and significant.

  • LI Qianmu; ZHOU Feng; XU Manwu; ZHANG Hong
    Computer Engineering. 2007, 33(10): 66-69. https://doi.org/10.3969/j.issn.1000-3428.2007.10.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Computing tasks management runs through the entire life cycle of the grid computation, the goal of which is to plan, organize, instruct and control the computation economically and regularly, and realize dynamic optimization on the time, expense and technical effect. This paper proposes a grid computation resource management algorithm. It studies the resource management of computing tasks with carrying on the formalized analysis to the resource management target, and gets the integration decision of computing consumes, cost and resources balances. The simulation experiment proves the algorithm is feasible and effective.
  • DU Dawei; JIE Anquan
    Computer Engineering. 2007, 33(10): 70-72. https://doi.org/10.3969/j.issn.1000-3428.2007.10.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the realization of the concurrency program based on technology of virtual machine, and realizes a platform of virtual machine using C language in order to achieve the concurrency of clients’ task after adding the control process in it to get the control of concurrency. The test which is under a number of processes and complex relation of semaphores’ relies the results are all right. The test shows concurrency can be realized in platform which executes in linear without using the lower level and hardware.
  • XIAO Chuangbai; FENG Weiwen; LIU Shiguang
    Computer Engineering. 2007, 33(10): 73-75,7. https://doi.org/10.3969/j.issn.1000-3428.2007.10.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a way to build a data warehouse by using linguistic representation and gives an example for building the three-layer data warehouse. Based on the model, a new method is proposed to manage fuzzy data and apply fuzzy query. It also introduces the application of the method in a tobacco sale enterprise.
  • WANG Jianfang; YAN Baoping; WU Kaichao; SHEN Zhihong
    Computer Engineering. 2007, 33(10): 76-78. https://doi.org/10.3969/j.issn.1000-3428.2007.10.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper puts forward a new data management model: data management model based on meta-directory. An application instance is given to make the model understood more clearly. This new model has many advantages such as flexibility and adaptability. The model is applied in many practical applications such as integrating data, on-time sharing data and controlling data. It is especially useful in integrating and applying abundant data.
  • REN Jiangtao; SUN Jinghao; HUANG Huanyu; YIN Jian
    Computer Engineering. 2007, 33(10): 79-80,8. https://doi.org/10.3969/j.issn.1000-3428.2007.10.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new feature selection method for the high-dimensional data, which realizes the feature subset search by genetic algorithm, and the feature subset fitness is evaluated by the separability measure based on boundary points. The experiments show that the proposed algorithm can find out the feature subsets with good separability, which results in the low-dimensional data and the good classification accuracy.
  • LI Yupeng; HOU Hong
    Computer Engineering. 2007, 33(10): 81-83. https://doi.org/10.3969/j.issn.1000-3428.2007.10.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By investigating the defect fixing method of large-scale CMOS chip testing software maintenance, including corrective maintenance and perfective maintenance, after outsourced of certain company, this paper concludes and gains basic control process of defect fixing. Aiming at some shortcomings of this basic control process, it gives a series of improved schemes and new defect fixing process. It also analyzes software quality and working efficiency of improved process.
  • HAN Mei; LIU Guohua
    Computer Engineering. 2007, 33(10): 84-86. https://doi.org/10.3969/j.issn.1000-3428.2007.10.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Mapping table is a popular tool of data mappings in peer data management systems. Mapping inference technique creates a large number of new mappings, which facilities the data share in systems. The existing research in this area concentrates on theory analysis. According to the study of inference problems of data mappings, a mapping relation model is proposed and the architecture of a data mapping inference system is given.
  • YIN Huaxiang; TING Yulei; XU Zhu; HONG Xuehai; LIU Jingang; HONG Shengzhong; QIU Zhenge
    Computer Engineering. 2007, 33(10): 87-89. https://doi.org/10.3969/j.issn.1000-3428.2007.10.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In graphic programming based on module composition, there are many modules which are independent of each other and can be executed in parallel. The translating program traverses the DAG, generates a thread for every module, and generates a semaphore for every arc in order to synchronize the executing sequence of the modules which are dependent on each other, then generates a multithread program, which runs in parallel more efficiently at last.
  • Networks and Communications
  • WU Suyan; GUO Qiao; WANG Jian
    Computer Engineering. 2007, 33(10): 90-91,1. https://doi.org/10.3969/j.issn.1000-3428.2007.10.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the system of IPv6 video grid with guarantees of service quality, video data packets are transported by TCP protocol. According to the feature of TCP protocol, this paper utilizes passive measurement based on client method to realize the measurement of the network performance parameter of user’s video stream, such as delay, bandwidth, jitter, and proposes the concept and computation method of late rate.
  • ZHAI Weibin; YE Jinxing; CHEN Yu; XU Rongsheng;
    Computer Engineering. 2007, 33(10): 92-94. https://doi.org/10.3969/j.issn.1000-3428.2007.10.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The spam mails are inconvenient and harmful to people’s life. The paper designs a spam mail analysis system based on network processors, which has the ability of snatching, restoring mails and dispatching mails, which can identify spam mails effectively. The good performance of this model is presented.
  • XU Shixu; ZHENG Jian; SUN Weiguo
    Computer Engineering. 2007, 33(10): 95-97. https://doi.org/10.3969/j.issn.1000-3428.2007.10.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Controller Link (CLK) is a factory automation network developed by OMRON, which is widely used in large and middle scale control systems. Its nodes are PLC and PC. FINS is a communication protocol used in OMRON FA networks. Data Link and FINS communication among nodes can be realized in CLK network. It is often required that each PLC node in CLK network is monitored by PC node in real application. A monitor system design of CLK on the computer node, based on FINS protocol by use of Visual C++ 6.0 is given. It has been successfully applied in the city sewage disposal system.
  • ZHANG Tianle; LI Zhongcheng; LIU Min; ZHANG Yongliang
    Computer Engineering. 2007, 33(10): 98-100. https://doi.org/10.3969/j.issn.1000-3428.2007.10.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a scheme of forwarding in partially connected network based on alternate activity mode. Delay of forward is suitable for partially connected network. An evaluation of delay period is given. A self-adjustment scheme based on state machine is introduced. By tuning the size of forward window according to the evaluation of activity of neighbors, packet loss is reduced. Simulation shows that this method can increase the packet delivery ratio and reduce the end-to-end delay.
  • RUAN Hongyi ; PENG Zhiyong; QIANG Shiduan
    Computer Engineering. 2007, 33(10): 101-102,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes a method of modeling Web servers and managing unpredictable server load using H-infinity robust control theory. It shows that a Web server may be simulated as a multi-tank system. A robust Web server model is subject to unknown additive load disturbances and uncertain model matching. Overload control techniques are based on adaptive admission control to achieve timing guarantees. The paper evaluates the performance of the model by using a complex simulation that is subject to varying model parameters and massive overload.
  • HU Ning; SUN Qindong; ZHANG Deyun
    Computer Engineering. 2007, 33(10): 103-104,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to decrease the traffic in the wireless sensor networks, a data dissemination scheme based on forecast is presented. Two matching predictors with the same parameters are deployed at the source and the sink respectively, which predict the next immediate sampling value simultaneously. The sampling value is sent to the sink only when the difference between the actual and the predicted value at the source exceeds a certain threshold. The predictors adopt the double exponential smoothing forecast model to estimate the future values based on the past samples. The experiment results show that this energy-saving data dissemination scheme is very effective, which can filter about 83% data and remain high precision yet.
  • JIE She; SUN Lechang
    Computer Engineering. 2007, 33(10): 105-107. https://doi.org/10.3969/j.issn.1000-3428.2007.10.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    There exists the weakest link problem, which results in poor convergence of path reconstruction in most probabilistic packet marking(PPM) schemes for their overwritten marking and fixed marking probability. A new scheme of un-overwriting PPM for IP traceback, which gets more available space for marking by overloading partial IP offset filed, is presented in this paper. With purpose of illustration, the detailed algorithmic description and coding method of FMS are given. The aspects of trace scope, convergence time, fragment reassembly, false positives and computational complexity performance are analyzed. The proposed scheme is shown to be superior to FMS by contrasting qualities.
  • LI Wei; WANG Shan; WEI Jibo
    Computer Engineering. 2007, 33(10): 108-110. https://doi.org/10.3969/j.issn.1000-3428.2007.10.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the rapid development of the WALN, more and more people wish to use it to connect to the Internet and it has become a very good accessible mode with its super advantages. Now the WLAN MAC layer protocol is a hotspot in the WLAN research.This paper researches the IEEE 802.11 DCF protocol and proposes a scheme to make a bridge between the Ethernet and WLAN. It expatiates the function of the main module unit and makes a more particular introduction to the main idea and workflow of the implementation of the IEEE 802.11 DCF protocol with FPGA.
  • LIU Tianhua; ZHU Hongfeng; TAN Zhenhua; CHANG Guiran
    Computer Engineering. 2007, 33(10): 111-113,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to remove CPU from heavy services of communication and alleviate the bottlenecks of communication system to suit for the high speed network, this paper adopts Linux platform and combines ML403 development board, codes or modifies portion of kernel code and designs hardware section with VHDL. It finally tests with LKM mechanism. It puts forward a ML403-based solution for TOE architecture design, builds a system experiment platform with some simulation results. Initial success of test indicates that this solution is correct and effective, which will make contribution to the performance improvement of whole communication system and popularization of the TOE network card.

  • NIU Guangfeng; LIN Tong; WANG Dongan; GE Jingguo; NAN Kai
    Computer Engineering. 2007, 33(10): 114-116. https://doi.org/10.3969/j.issn.1000-3428.2007.10.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is becoming essential to protect Web servers against overload by providing admission control. This paper presents the design that performs admission control based on TCP header, and implements it in the Linux OS. There are six 1-bit flags in TCP header. The packets with flags, such as ACK packets, are more important than the application request packets. The experiments demonstrate its effectiveness, and show that the approach is efficient during overload.
  • SUN Mei; ZHAN Wu
    Computer Engineering. 2007, 33(10): 117-119,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The paper proposes an analytical method of network survivability performance based traffic, in which the topology characteristic and the traffic characteristic are both considered. In addition, for the network that relies on another network, a solution to survivability analysis is proposed.

  • YANG Yun; CHEN Liya
    Computer Engineering. 2007, 33(10): 120-122. https://doi.org/10.3969/j.issn.1000-3428.2007.10.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It’s difficult to plan the link bandwidth according to requirement and network topology in optical network bandwidth plan. The paper analyzes several methods about bandwidth plan, and given costs and reliability, it presents a new method to computer link bandwidth based on genetic algorithms (GA). An approach is proposed to code the bandwidth in order to keep feasible characters after genetic operations. And an improved method is presented by analyzing the results.
  • Security Technology
  • MA Baolin; SUN Jizhou; YU Ce; ZHANG Guiling
    Computer Engineering. 2007, 33(10): 123-125. https://doi.org/10.3969/j.issn.1000-3428.2007.10.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a trust model to evaluate the history behavior of entity. The model considers the number of transactions, the evaluation of other nodes and these nodes’ credibility. The simulation results demonstrate the model can precisely evaluate entity behavior, thus can efficiently resolve the safety problem of the entity behavior.
  • LI Li; ZOU Hua; YANG Fangchun
    Computer Engineering. 2007, 33(10): 126-127,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An agent-based automatic security capability negotiation mechanism is proposed. This mechanism includes an agent-based security capability negotiation model, a kind of negotiation agent and negotiation process. Security requirement and negotiation policy can be described in the form of a security capability negotiation description language (SanDL) document. The negotiation agent accomplishes the negotiation automatically according to the SanDL document. The definition of a communication adaptor and a set of basic negotiation primitive makes the communication interface of negotiation agent more secure, flexible and extensible.
  • LIU Baoxu; MA Jianmin; CHI Yaping
    Computer Engineering. 2007, 33(10): 128-130. https://doi.org/10.3969/j.issn.1000-3428.2007.10.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analysis of the development trend about computer network security emergency response technologies, this paper researches the emergency response key technologies such as intrusion detection, incident isolation, emergency restore, forensic, networked trap and entrapment technology, and draws relevant conclusion. An emergency response system is designed and its work mechanism is analyzed.

  • YANG Shiping; LI Xiang
    Computer Engineering. 2007, 33(10): 136-137,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The digital signature and symmetric key exchange in the scheme both are established over a finite field and the computational intractability of the elliptic curve discrete logarithm problem (ECDLP) over the finite field enhances security of the scheme. Each entity in a network generates a pair of keys to be used for encryption and decryption of the transmitted messages, where the private one of the two keys must be kept secret and the public key is distributed in realtime on requests by KDC. The electronic official-documents and their digital signatures are encrypted with IDEA and then transmitted in the network. The scheme provides mutual authentication between entities and ensures confidentiality, integrity and nonrepudiation of the transmitted messages.
  • LI Changgang; ZHANG Xin; ZHU Fanglai; YING Yanjie; WANG Yongbin
    Computer Engineering. 2007, 33(10): 138-140. https://doi.org/10.3969/j.issn.1000-3428.2007.10.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The security of stream cipher is mainly dependent on the randomness degree of the secret key stream. How to design key stream with perfect randomness turns into the main problem. This paper considers some properties of block ciphers such as DES and RC5, in which there are some favorable nonlinear generating methods. It designs a new algorithm to generate a pseudo-random sequence. The randomness of the sequence is analyzed. The result indicates that the algorithm is safe.
  • TONG Xiaojun; JIANG Wei; SONG Xinfang; CUI Minggen
    Computer Engineering. 2007, 33(10): 141-143. https://doi.org/10.3969/j.issn.1000-3428.2007.10.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper systematically describes the elliptic curve digital signature algorithm(ECDSA) published by ANSI in 1999, and presents an improved digital signature scheme based on elliptic curve cryptosystem. It shortens the time for digital signature, and accelerates the speed of the operation. A batch signature based on the improved elliptic curve digital signature algorithm is designed with binary tree batch signature. The scheme is able to sign many different messages simultaneously using almost the cost of one signature operation of the signer. The unrelated recipients can authenticate signed messages independently. The security of the scheme is the same as ECDSA.
  • DAI Xiaopeng; YU Fei; ZHANG Lingfen; SHEN Yue
    Computer Engineering. 2007, 33(10): 144-146. https://doi.org/10.3969/j.issn.1000-3428.2007.10.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Intrusion detection is an efficient way to protect information system. This paper explains a new anomalous intrusion detection method. It uses system calls as input, and creates a FSA for the functions in the program. Then the FSA is used to detect the attack. It finds the place where the vulnerability exists in the program. This can help alter the source program. Experiment proves the method is effective in many intrusion events.
  • YUAN Yiqun; LI Wei; LU Peizhong
    Computer Engineering. 2007, 33(10): 147-149. https://doi.org/10.3969/j.issn.1000-3428.2007.10.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A novel audio content authentication algorithm is proposed. The authentication message is embedded by modifying the DWT coefficients of the original audio without obvious perceptual degradation, and correlation-based method is adopted for detection. The algorithm can differentiate common content-preserving operations like MP3 compression, up and down resampling from malicious tampering, and precisely locate tampered positions and further approximately recover the modified audio clips.
  • CAO Aixia; ZHAO Yiming
    Computer Engineering. 2007, 33(10): 150-152. https://doi.org/10.3969/j.issn.1000-3428.2007.10.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Ad Hoc network, composed by a collection of mobile nodes, is a temporary autonomic system. Since Ad Hoc Network doesn’t rely on any fixed network facilities, there exist a lot of security problems. Although ID-based authenticated key can achieve authentication and realize secret communication, the general communication is a difficult problem because there are no trusted third parties in Ad Hoc network. This paper proposes an ID-based key exchange protocol that can be applied in Ad Hoc network. The design of which is based on the idea of the polynomial secret share and the ID-based authenticated key exchange under PKI.
  • HU Kangxing; TANG Dongbing
    Computer Engineering. 2007, 33(10): 153-154,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve IDS’s ability of generalization for knowledge of intrusion, a method is put forward that applies fuzzy clustering to obtain hierarchy generation for intrusion feature set. The experiments prove that it can improve ability to detect and attain best balance between rate of detection and rate of false alarms by adjusting parameter.
  • WANG Shumei; MA Hongyang
    Computer Engineering. 2007, 33(10): 155-157. https://doi.org/10.3969/j.issn.1000-3428.2007.10.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper designs a mutual quantum secure direct communication scheme, which shared a sequence of single photons and greenberger-horne-zeilinger (GHZ states) in the quantum networks. S1, S2, …, Sn-1 members in cluster S directly encode their respective keys on the states of single photons; then generalizes this situation transmit to the last one of the cluster. Sn encodes the secret message directly on a sequence of particle states and transmits them to D1, D2,…, Dn supervised via one of the cluster M. It proves that it is unconditionally secure.
  • HE Bo; CHENG Yongjun; TU Fei; YANG Wu
    Computer Engineering. 2007, 33(10): 158-160. https://doi.org/10.3969/j.issn.1000-3428.2007.10.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Most intrusion detection system can not adapt to the variation of network environment. Aiming at this problem, this paper proposes an adaptive strategy which composed of state space and strategy space. The former described network environment and the latter described the strategies. There is an exclusive strategy corresponds to a certain environment state in state space. On the base of the adaptive strategy, it designs an adaptive intrusion detection expert system model based on rule-based reasoning and case-based reasoning, namely, AIDESM, which had expert knowledge database and intrusion case database. It takes advantage of adaptive strategy and evaluation & learning mechanism to realize adaptive intrusion detection. The experiments indicate that adaptive strategy is effective.
  • HUANG Li
    Computer Engineering. 2007, 33(10): 161-163. https://doi.org/10.3969/j.issn.1000-3428.2007.10.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyses the security dangers that the wireless sensor networks faces. According to the practical characteristics of the sensor networks, a “distributed cluster authentication defensive system” is designed. The system divides the networks into clusters and brings cluster-
    authentication-system into the normal sensor networks routing protocol so that when the routing protocol chooses data to transmit the next hop, it is necessary to use the head node of the cluster in advance to confirm the authenticity of the candidated node’s cluster-subordinate-identification. The confirmative communication through cluster head node based on PKI ’s distributed self-organized system to ensure the authenticity and reliability of cluster identification system. It takes the accustomed Sybil attack for example to introduce the design process of the security system. It gives general evaluation to the security of the system.
  • WANG Huafeng; ZHANG Guixiang; SHAO Yong
    Computer Engineering. 2007, 33(10): 164-165,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Some particular attributes of chaos system are more suitable for stream cipher design, such as the sensitivity to initial conditions and control parameters, pseudo randomness, mixing and exactness, etc. Taking Logistic mapping as example, this paper shows out its primary characteristics, illustrates the difference and improvement of the discrete distribution and uniform distribution under conditions of the standard byte output method and the improved bit output method.
  • ZHANG Yan; HUANG Xianwu; LIU Jiasheng
    Computer Engineering. 2007, 33(10): 166-168. https://doi.org/10.3969/j.issn.1000-3428.2007.10.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Chaos is widely used in image encryption because of its high sensitivity to initial conditions and parameters and its generated chaos series without circle and of pseudo stochastic. An image encryption algorithm based on improved chaotic cat maps is proposed. In this method, the image is encrypted by diffusion function and improved chaotic cat maps, which can encrypt image not only based on disordering the positions of image pixels but also based on changing image pixels’ value, thereby significantly increasing the resistance to statistical attacks. The method is proved to work well.
  • WANG Chang; XIANG Mingsen; LIU Meilian
    Computer Engineering. 2007, 33(10): 169-171. https://doi.org/10.3969/j.issn.1000-3428.2007.10.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses problems of the malicious host attacking mobile agent, and gives a security model based on MASS and JavaCard. The model provides an available method to solve the security problems. Managing and updating JC certificates need further exploring.
  • SHEN Jian; ZHOU Xingshe; ZHANG Fan; YU Zhiyong
    Computer Engineering. 2007, 33(10): 172-174. https://doi.org/10.3969/j.issn.1000-3428.2007.10.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes the design scheme of state packet inspection firewall based on network processor, and describes the optimized design of key technologies for IXP2400’s hardware structure, including the storage structure and item searching of the access control list and the status session table. The proposed approach will enhance the performance of firewall observably.
  • Multimedia Technology and Application
  • ZUO Sen; GUO Xiaosong; WAN Jing; YANG Biwu
    Computer Engineering. 2007, 33(10): 175-177. https://doi.org/10.3969/j.issn.1000-3428.2007.10.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A parallax image mosaic algorithm is presented. For two wide baseline parallax images whose epipolar lines are parallel with each other, the sparse correspondences can be got by detecting the local feature region by Hessian-Affine region detector, by describing the local feature region by SIFT descriptor, and by computing the Euclidean distance of the feature vectors. The sparse scene points can be got by those sparse correspondences, and the scene can be approximated as piecewise planar by those scene points. Then the scene is re-projected to create a push-broom image. The large image is got by mosaicking the push-broom image with the two original images. Example of constructing successful mosaics from real images is shown. The experiment demonstrates the feasibility of the algorithm for mosaic images with parallax.
  • YAN Guangwei
    Computer Engineering. 2007, 33(10): 178-180. https://doi.org/10.3969/j.issn.1000-3428.2007.10.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A point-sampled model is divided into some parts, and these parts are organized in hierarchy. The model acts as base model of variety editing. Through editing color, geometry, material attributes of point primitives of every part, a variety hierarchy model is constructed. Through real-time operating the variety point model, variety rendering of dynamic scenes is implemented. Experiments show the method can create and render variety point models, and the data compression ratio is high. The method can be used in the fields of network games, war field environments simulation, urban environments simulation etc.
  • YANG Huijun; HUANG Lvwen; HE Dongjian
    Computer Engineering. 2007, 33(10): 181-183. https://doi.org/10.3969/j.issn.1000-3428.2007.10.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel half-transparent volume modeling arithmetic: learn inputed image sequence in order to create processing texture, the color regions of image can be obtained by synthesizing texture’s boundary, and draws the outline of image by scanning boundary of region and computes color value for every boundary of gridding according to current color, creates 3D model according to color value of gridding. Experiment shows that this modeling arithmetic of motion scenery can satisfy demand of painting timely and is robust and consecutive.

  • SHI Yipeng; WANG Liming; CHEN Zhanglong; TU Shiliang
    Computer Engineering. 2007, 33(10): 184-186,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Requests for high level of entertainment, fashion and business are definitely leading to the development of mobile 3D graphics technology in the embedded system. This paper, according to JSR-184 which is the specification defined the mobile 3D Graphics API (M3G) for J2ME, is implemented an implementation of mobile 3D based on embedded Java. It brings forward a clear cut of the specification and relative render pipeline, and proposes the architecture and solution of implementation. It takes an overview of the mobile 3D industry.
  • WEI Jizeng; SUN Jizhou; LI Xiaotu
    Computer Engineering. 2007, 33(10): 187-189,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The direct volume rendering is the important method of visualization of three-D data. Because the scale of volume data is very big in application, it is urgent how to decrease the computation workload to get higher speed of rendering. This paper proposes a parallel Splatting volume rendering algorithm based on sparse matrix which runs in cluster system. This algorithm uses sparse matrix to optimize volume data structure and gets satisfied results from the experiments.
  • CUI Hanguo; CHEN Jun; WANG Dayu
    Computer Engineering. 2007, 33(10): 190-192,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Though only two fisheye images can be mosaicked into one panorama image because of its wide angle of view, it has severe distortion. Using spherical perspective projection (SPP) constraint on fisheye image’s curves of space line’s projection, radial and tangential distortion parameters are calculated, thus distortion correction of fisheye image is accomplished in the paper. According to minimum brightness difference between overlap area of images to be mosaicked, panorama images mosaics based on image fission on overlap area is discussed in the paper. Satisfactory correction and mosaics results are obtained.
  • ZHANG Shi; ZHANG Mingliang; BAO Xirong; SHE Lihuang
    Computer Engineering. 2007, 33(10): 193-195. https://doi.org/10.3969/j.issn.1000-3428.2007.10.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper designs and optimizes a MPEG-4 video decoder based on OMAP5910 dual-core processor with the power of real-time decoding. It details the important parts of MPEG-4 simple profile decoding process and optimization process on DSP platform. The design of arithmetic is based on TI XDIAS standard and can be used on all the C5000 series of DSP platform. The process of decoder and the method of optimization are valuable as references on video process and other applications on OMAP platform.
  • Artificial Intelligence and Recognition Technology
  • GAO Hongyuan; DIAO Ming; JIA Zongsheng
    Computer Engineering. 2007, 33(10): 196-198. https://doi.org/10.3969/j.issn.1000-3428.2007.10.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A neural network quantum algorithm (NNQA) that employs a genetic quantum algorithm (GQA) and a Hopfield neural network (HNN) for the multiuser detection problem in code-division multiple-access (CDMA) communications system is proposed. Using this algorithm, the Hopfield neural network is embedded into the GQA to improve further the fitness of the population at each generation. Such a hybridization of the GQA with the Hopfield neural network reduces its computational complexity by providing faster convergence. A better initial data estimation supplied by the GQA improves the performance of the HNN, and the embedded Hopfield neural network improves the performance of the GQA. Simulation results show that the proposed approach of multiuser detection has significant performance improvements over conventional detector and the previous detectors based on intelligent algorithms in terms of bit-error-rate, multiple access interference and near-far resistance.
  • ZHENG Shiqin; WANG Xiufeng
    Computer Engineering. 2007, 33(10): 199-201. https://doi.org/10.3969/j.issn.1000-3428.2007.10.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new method to find fuzzy rules using an improved clonal selection algorithm. In the new method, the evaluation function of rules includes not only the confidence degree and implication membership function, but also the consistency contribution degree and completeness contribute degree which can quantify the impact of one rule to integrality of the rule set. In the demonstration, it uses the method above to find the fuzzy rules between the 20 days moving average line and other history price variables, and get content results.

  • WANG Xiaobo; LI Yijun
    Computer Engineering. 2007, 33(10): 202-204. https://doi.org/10.3969/j.issn.1000-3428.2007.10.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The logistic distribution under electronic commerce environment has the character of dispersive customer positions, large order forms, little batches and many repeated routes. Traditional optimizing route methods meet with diversified problems at different levels and are difficult to play their roles. Therefore, according to the particularity of logistic distribution under electronic commerce environment, the improved two-phase algorithm is needed. The test proves the validity of this improved algorithm by examples.
  • LI Longxing; YUN Shiwei; YANG Bingru
    Computer Engineering. 2007, 33(10): 205-206. https://doi.org/10.3969/j.issn.1000-3428.2007.10.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Attribute reduction is one of the key topics of rough set theory. Search for minimum reduction has been proved to be a NP-hard problem. The definition of attribute condition distinguish ability is given in information system. On this basis, a heuristic algorithm of attribute reduction based on the conception of the condition distinguish ability is put forward. By analyzing the example, it is indicated that this algorithm can get the minimum reduction in information system under most situations.
  • HAN Hui; WANG Wenyuan; MAO Binghuan
    Computer Engineering. 2007, 33(10): 207-209. https://doi.org/10.3969/j.issn.1000-3428.2007.10.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To improve the classification performance of minority class, this paper combines the advantages of boosting and over-sampling, and presents an over-sampling algorithm based on MCMO-Boost of Adaboost. MCMO-Boost is compared with C4.5, Adaboost and SMOTE, and the results show that MCMO-Boost performs better than others for the classification performance of minority class and the whole data set.

  • TANG Lianchun; LI Haiyan; CHEN Jianhua
    Computer Engineering. 2007, 33(10): 210-211,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a method of fast detecting and locating face eigenvalue under complex background. Color face image is converted into gray scale image and digitized as binary image. The binary image is filtered with morphologic filter. After locating the eyes of the face image the face area is identified. The experiment result proves the availability of the algorithm.
  • DENG Bo; FAN Xiaozhong; YANG Ligong
    Computer Engineering. 2007, 33(10): 212-214. https://doi.org/10.3969/j.issn.1000-3428.2007.10.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper studies entity relation extraction of Chinese in information extraction. To extract Chinese entity relation, it imports technology of word semantic match into pattern match technology. Performance between general pattern match technology and semantic pattern match technology is compared. Experiment shows that general pattern match technology can’t get acceptable result in task of Chinese, but new method presented by this paper is more adapted to deal with task of Chinese entity relation extraction.
  • DONG Guiyun; HAN Peiyou
    Computer Engineering. 2007, 33(10): 215-217. https://doi.org/10.3969/j.issn.1000-3428.2007.10.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on volume rendering technology, this paper puts forward a new idea of volume transparency analysis. It gives many algorithms including volume segmentation algorithm and enhancement contrast algorithm of volume data based on generalized fuzzy rough sets GFRS, and studies the application of the algorithms above. The volume transparency analysis system making use of interactive data language IDL6.2 is implemented. The successful test of the system with the first American and the first Chinese human body data indicates the value in theory and practice and wide market of the system.
  • ZHU Chengjun; LI Chao; XIONG Zhang
    Computer Engineering. 2007, 33(10): 218-219,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Text presented in video frames can provide important supplemental information for video indexing and retrieval. In order to make researchers know the academic area more systemically, this paper gives an overview of state of the art of text detection and recognition technique in video. Typical techniques and method based on feature and learning theory are discussed, as well as their merits and shortcomings. With the present problem, the paper gives some work and issues that can be researched in the future.

  • WU Qiang; WANG Xingyu
    Computer Engineering. 2007, 33(10): 220-221,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A novel image fusion algorithm based on independent component analysis is proposed. Suppose the images have been registered, the independent component analysis bases are obtained by offline training images with the same texture. The images are fused in the ICA transformed domain by different fusion rules. The result is got by inverse ICA transform. Experimental results demonstrate the effectiveness of the method.
  • NIU Kun; CHEN Junliang; ZHANG Shubo
    Computer Engineering. 2007, 33(10): 222-224. https://doi.org/10.3969/j.issn.1000-3428.2007.10.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Taking maximum classification tree as a tool to analyze empirical risk and structural risk, this paper addresses the problem of classification accuracy limit of decision tree. Aiming at the difficulty to estimate the classification effectiveness of decision tree externally, it discusses the existence condition of classification accuracy limit and presents the method to get it. It points out four theorems which demonstrate the existence of classification accuracy limit under four distribution conditions of empirical risk and structural risk with analysis from machine learning theory and practical modeling. The theorems are validated from experiments on ten public datasets.
  • LI Qian; Shrestha Kedar; WANG Shuozhong
    Computer Engineering. 2007, 33(10): 225-226,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An algorithm for extracting scores and personal information from optical mark reader (OMR) cards has been developed, which takes input images from a scanning device, and locates marks based on horizontal and vertical projections. Input images are rotated before processing to ensure satisfactory alignment with the correct orientation. This is achieved by maximizing standard deviation of the vertical projection. The obtained results are then sent to a database for further manipulation. Experiments show that the algorithm is reliable and efficient.
  • MA Xiaokai; LI Shaofa
    Computer Engineering. 2007, 33(10): 227-229. https://doi.org/10.3969/j.issn.1000-3428.2007.10.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Video motion object detection is a foundation of aptitude security surveillance. Considering the spatial-temporal distribution of video, a six dimension video distribution (SDVD) is constructed for segmentation of motion object. The on-line Gaussian mixture model is employed to update the background image and to calculate for every specified pixel color difference in temporal dimension. Texture feature is also used to describe the local structure information of pixel neighbor in spatial dimension, so as to enhance the robustness of light change and shadow existence. The experiment results show that the proposed SDVD is effective and practical.
  • WANG Jianping; LIN Fei; CHEN Jun
    Computer Engineering. 2007, 33(10): 230-232,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Handwritten Chinese characters stroke width extraction and a technique to normalize handwritten Chinese characters based on stroke width extracted are advanced. The method of recombined handwritten Chinese character is created. The algorithm of a handwritten Chinese character recognition method which is based on stroke extraction is achieved. The system of handwritten Chinese character recognition is designed. It is proved the original features of the Chinese characters stroke are reserved and handwritten Chinese characters are recognized effectively.
  • ZHOU Xiuling; SUN Chengyi
    Computer Engineering. 2007, 33(10): 233-236. https://doi.org/10.3969/j.issn.1000-3428.2007.10.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Pareto mind evolutionary computation (Pareto-MEC) is a new multi-objective evolutionary algorithm (MOEA), which introduces the theory of Pareto into MEC for multi-objective optimization. Feasibility and efficiency of Pareto-MEC are illustrated by numerical results. The concepts of local Pareto optimal solution set and local Pareto optimal state set are presented. And it is proved that the sequence of population generated through operation similartaxis strongly converges to local Pareto optimal state by using the probability theory.
  • Engineer Application Technology and Realization
  • ZHOU Binghai; PAN Qingzhi; TAO Lihua
    Computer Engineering. 2007, 33(10): 237-239,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a model method of extended object-orient hybrid Petri net (EOHPN). To treat with the complexity of the wafer fabrication systems, object-oriented abstraction mechanisms such as encapsulation and classification are combined into EOHPN models. To reduce the complexity of the systems, a hybrid Petri net is introduced and extended with object-oriented modeling technology. Development of object models is suggested on the basis of the defined EOHPN. And a case is presented to illustrate how the proposed EOHPN is used to model the wafer fabrication systems. The resulting model validates that the EOHPN can deal with the modeling complexity of the wafer fabrication systems
  • LIU Zhenjun; XU Wei; HE Xiang; XU Lu
    Computer Engineering. 2007, 33(10): 240-242. https://doi.org/10.3969/j.issn.1000-3428.2007.10.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    VSVM is a logical volume manager providing an ordinary-application-oriented iterative snapshot mechanism. This paper presents a series of backup/recovery mechanisms and methods that focus on VSVM performance and system construction to protect and restore user’s data on volumes and the snapshot logic of these volumes, which can further maintain snapshot-logic-based system performance. The backup data of a (snapshot) volume is independent of its exactly initial data status. Based on that, other mechanisms and methods enable VSVM to support independent backup policies on different logical volumes, while maintaining the simplicity of data backup and recovery processes.
  • LIN Yifan; ZENG Xiaoyang; CHEN Jun; WU Min; GONG Ming
    Computer Engineering. 2007, 33(10): 243-245. https://doi.org/10.3969/j.issn.1000-3428.2007.10.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    】With the fast development of SoC, more and more clock domains are merged into a single chip. Therefore a reliable high-speed synchronizer is more and more important for the performance of the whole system. This paper proposes a brand new circuit structure for synchronizers. And the high-speed synchronizer is fulfilled for burst-data operation based on multi-synchronizer groups, which are pipelined and paralleled to each other. The technology boosts not only the data handover speed for several times but keeps the same reliability as the most conservative synchronizer.
  • DING Zhaoqing; DONG Chuanliang
    Computer Engineering. 2007, 33(10): 246-248. https://doi.org/10.3969/j.issn.1000-3428.2007.10.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The goal of distributed application integration(DAI) is to connect distributed applications freely and share these data and functions. This article analyzes the concept, character, arrangement and problems of integration, and then provides a layered architecture based on SOA and J2EE.

  • ZHANG Zhengqiang; TAN Yuejin
    Computer Engineering. 2007, 33(10): 249-251. https://doi.org/10.3969/j.issn.1000-3428.2007.10.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The problem of operation planning for satellite is investigated. Task decomposition approach of hierarchical task network(HTN) is adopted. Based on the analysis of system structure for satellite, the planning domain model is built and decomposition methods of two main kinds of tasks of satellite are defined. Subsequently an algorithm for the model is developed, which is based on the forward search algorithm. An example is given to evaluate the model and corresponding algorithm and the results show that the autonomous planning problem can be solved successfully using the approach.

  • GONG Guan; LIAO Xiangke
    Computer Engineering. 2007, 33(10): 252-254. https://doi.org/10.3969/j.issn.1000-3428.2007.10.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the rapid increase of computer network scales and network service complexities, researches on monitor network operations and service operations have become an important subject in the region of computer networks. This paper proposes a scheme of distributed network and service operation monitor system, and studies resolutions to several key technologies. Although the monitor system is developed for a special network and service system, some readers may be interested in the issues and their solutions are discussed.
  • HAO Zhiquan; WANG Zhensong
    Computer Engineering. 2007, 33(10): 255-257,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Synthetic aperture radar(SAR)image has some common features such as huge data volume, relative complex algorithm. Realizing SAR image algorithm is worthy of being studied in the domain of embedded high performance computing(EHPC). Some improvements of PGA algorithm and the classic autofocus algorithm are presented. The architecture of the autofocus processor based on FPGA and the principle of how to map the improved algorithm to FPGA architecture are discussed.
  • LI Heqing; HOU Zhixiang
    Computer Engineering. 2007, 33(10): 258-260. https://doi.org/10.3969/j.issn.1000-3428.2007.10.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Distributed control is widely used in industry fields. This paper completes the integral design of a simple set of distributed control system, which uses two stepper motors as the controlled object. The system is composed of personal computer and single chip microcomputer, which realizes communication with Visual Basic serial communication controls and RS-232 bus. The personal computer sends out the control commands and shows the real-time velocity graph, and the single chip microcomputer realizes the speed and direction control of two stepper motors through serial communication. The results show the practicability and reliability of the system by real-time running of the product.
  • HE Dongzhi; YU Jingzhi; WANG Shufeng; GAO Shuo; SUN Yansen
    Computer Engineering. 2007, 33(10): 261-262,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For seamless delivery of services and applications in Europe, in 1999, IST Program Advisory Group (ISTAG) presents an ambient intelligence (AmI) landscape in its vision statement for framework program 5 challenging. AmI builds on three key technologies: high embeddability, intelligence and mobility. The intelligent housing system, as one subsystem of AmI, services real-time control on home information appliances, such as refrigerator, microwave oven, TV set, by personal digital assistant (PDA) or networking computer. This paper focuses on solving implementing function and architecture of intelligent housing system based on ambient intelligence.
  • Developmental Research
  • CHENG Zhijun; GUO Bo
    Computer Engineering. 2007, 33(10): 263-264,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A kind of PDA-oriented maintenance assistant system for equipments is studied and implemented. During the process of equipments fieldwork, the fast fault diagnosis, real-time query and resources share can be realized by this system. This paper presents the structure and function modules of system. Some key technologies in the design and implementation of system are introduced.

  • YAO Yong; TU Shiliang; CHEN Zhanglong
    Computer Engineering. 2007, 33(10): 265-267,. https://doi.org/10.3969/j.issn.1000-3428.2007.10.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes the design and the implementation of an embedded real-time operating system (RTOS): FDCX08, used for CAN and LIN bus, and introduces the design of a usual-controller based on this operating system. FDCX08 is used in CAN, LIN or CAN and LIN mixed bus. According to CAN and LIN bus’s character, it designs a mailbox system, which supports the communication of tasks among operating systems, to make FDCX08 as CAN node, LIN node, gateway note and so on. This system is real-time, lightweight, and simple-interface, which makes it suitable to be used in many fields, such as auto electron and industry control, where CAN and LIN bus are needed.
  • DU Jiafei; WANG Kuanquan; YUAN Yongfeng
    Computer Engineering. 2007, 33(10): 268-270. https://doi.org/10.3969/j.issn.1000-3428.2007.10.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Cardiac myocytes electrophysiological model plays an essential role in research of heart simulation. However, there are some issues that need to be addressed in current research, such as: standard for model description need to be defined; compatibility of models need to be improved. So models can be easily understood by researchers and used in various simulation systems. CellML is a free, open-source, extensible markup language based standard for defining mathematical models of cellular function. It uses content MathML to provide both a human- and computer-readable description. Using CellML can effectively fulfill the aforementioned needs. This paper summarizes the structure of CellML, also gives some examples to specify how to describe models by CellML and the experimental result of cardiac myocytes simulation based on the model which is described by CellML.

  • YU Yinhui; YU Zhenwei; YANG Chuandong; ZHANG Ying
    Computer Engineering. 2007, 33(10): 271-273. https://doi.org/10.3969/j.issn.1000-3428.2007.10.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Storage area network is a new network storage architecture and has become an important research aspect in storage field. Performance research is quite important in network storage research work. Based on the analysis of the transfer process of SAN, a queueing network model for SAN is established. On the basis of the model, it proposes a quantitative performance analysis model for the SAN based on fiber channel protocol. The simulation results show that the difference of SAN system and system models’ performance between the analysis model and simulation result is small.
  • ZHANG Yuan; LU Zexin; LIU Yaping
    Computer Engineering. 2007, 33(10): 274-276. https://doi.org/10.3969/j.issn.1000-3428.2007.10.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traditional network file system can not meet the demand of high-performance computing systems, but object-based global parallel file system——Lustre can resolve the problems of traditional file systems in scalability, availability, performance. This paper introduces the architecture and advantage of the object-based file system——Lustre. It does the test of NFS over Lustre, and compares its result with Lustre, NFS and Ext3. It points out the reason of the differences and gives a feasible method.
  • AN Linglei; BAI Yanqi
    Computer Engineering. 2007, 33(10): 277-279. https://doi.org/10.3969/j.issn.1000-3428.2007.10.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the reasons why the information islands come into being, and its harm to the equipment support, emphasizes the kernel status of the IRP at the construction of the information of the equipment support. This dissertation presents basic steps and important factors, for better IRP, and indicates that the army must strengthen the IRP if it needs grandeur development.
  • ZHANG Dexue; GUO Li; FU Zhongqian; HE Li
    Computer Engineering. 2007, 33(10): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2007.10.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Javacard is the development direction of smart card. Most of the Javacard systems use the software virtual machine to execute Javacard instruction. The system takes up a great deal of hardware resources, and it is unefficient. The resolution is to implement the hardware Javacard instruction processor. This paper describes a design of Javacard hardware processor based on microcode.
  • GONG Songjie
    Computer Engineering. 2007, 33(10): 283-封3. https://doi.org/10.3969/j.issn.1000-3428.2007.10.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As Web service technologies are firmly established and widely adopted, traditional transaction semantics and protocols are proved to be inappropriate for some Web services-based applications. This paper proposes a Web services transaction model, and researches two-phase commitment extended protocol, coordination algorithms and transaction compensation. This model has the advantages of flexibility and practicability in transaction, and provides powerful support for commercial Web services.