Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 January 2007, Volume 33 Issue 02
    

  • Select all
    |
    Degree Paper
  • WANG Zhenxing ; DAN Tangren ; YE Changeqing ; LIU Yan ; LV Teng .; DING Tianhuai
    Computer Engineering. 2007, 33(02): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2007.02.001
    Abstract ( )   Knowledge map   Save
    In the environments of e-learning, different background people from different area and domain will participate in same virtual classroom, and they will understand the same concept differently because of their individual experience. To solve the problem, this paper presents ontology approach to avoid participant’s inconsistent understanding toward the same concept. The paper further analyzes the computer environment of CSCL and gives the CSCL model and the corresponding prototype.
  • (. Research Institute of Tsinghua University in Shenzhen; Shenzhen 80; . Department of Education and Information; East China Normal University; Shanghai 000; . College of Mathematics and System Science; Xinjiang University; Urumqi 800; . Department ; Artillery Academy; Hefei 00; . Department of Precision Instruments; Tsinghua University; Beijing 00080)
    Computer Engineering. 2007, 33(02): 4-5. https://doi.org/10.3969/j.issn.1000-3428.2007.02.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Ontology is widely used in intelligent information retrieve, e-business, and network collaboration. Meanwhile, many applications require the integrated query from related information resources, which arises the problem of semantic interoperation in heterogeneous information resources. There are many complex factors in integrating them, because different ontology creators adopt different semantics from his individual view. This paper proposes the framework of ontology integration though analyzing the problems in the process of ontology integration.
  • HAN Jun; ZENG Xiaoyang; TANG Tingao
    Computer Engineering. 2007, 33(02): 6-8. https://doi.org/10.3969/j.issn.1000-3428.2007.02.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system. As an attractive countermeasure, inserting random time delay into device’s running process is a straightforward and effective method. This paper presents the theoretical modeling on timing randomization against power analysis attacks, and gives the threshold condition to resist DPA. In order to obtain the minimal amount of overhead, it investigates different probability distributions of random delay. The optimized probability distributions are proposed, when random delays are inserted one or two times.
  • LI Deshi; CAO Yang
    Computer Engineering. 2007, 33(02): 9-11. https://doi.org/10.3969/j.issn.1000-3428.2007.02.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the increasing of ASIC complexity and the demand for time to market, great challenges for SoC(system on chip)design and verification have to be faced. CDFG(control data flow graph)can be used in system modeling, software and hardware partition, synthesis and verification. Aiming at the final goal of SoC verification, the paper discusses the system verification based on CDFG by raising the level of abstraction, a new verification flow is presented. By analyzing CDFG’s definition and its representation, the tree creating algorithm based on depth first search principle, CDFG division algorithm and CDFG searching algorithm are given. Then some examples of these algorithms are illustrated, which specify the operation of these algorithms in SoC verification flow.
  • YANG Ying; HAN Zhongming; YANG Lei
    Computer Engineering. 2007, 33(02): 12-14. https://doi.org/10.3969/j.issn.1000-3428.2007.02.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on Chernoff-Hoeffding bound, this paper adopts a novel mining algorithm of depth-first search with backtracking to mine interesting subspace, and testifies the effectiveness by using synthetic and real data. High-dimensional data mining faces the challengers of distributed data sparsity and overlapping feature subspace.
  • ZHANG Qingpo ; CHEN Lusheng ; WANG Xiaoming
    Computer Engineering. 2007, 33(02): 15-17. https://doi.org/10.3969/j.issn.1000-3428.2007.02.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    None of the signers is allowed signing wrong signatures in all of the existing multisignature schemes and threshold signature schemes. In some cases however, it is not necessary that all of the signers sign correct signatures. So a new multisignature scheme with threshold value is presented. In the new scheme, some of the signers can abstain or sign wrong signatures. The valid multisignature can be made as long as the number of the valid member signatures is not less than the threshold value. Without combining with the Shamir’s threshold scheme, the threshold value in the new scheme can be changed conveniently and it can defend against the corresponding attacks to the secret sharing scheme.
  • GAO Ying; GUO Heqing; ZOU Zhimin
    Computer Engineering. 2007, 33(02): 18-21. https://doi.org/10.3969/j.issn.1000-3428.2007.02.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to extract ontology from semi-structure information sources, analyse and deal with information sources accordantly, this paper provides a new conceptual model for data sources and a sets of rules from semi-structure information sources to conceptual model. Based on this model, a method to compute refined semantic similarity among objects of sources is provided.
  • WEI Jinwu; WU Jiangxing
    Computer Engineering. 2007, 33(02): 22-24. https://doi.org/10.3969/j.issn.1000-3428.2007.02.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Quantify long-range dependence is a fundamental building block of Internet traffic characteristics. The existing and widely used Hurst estimate algorithms are comprehensively summarized. Based on this, taking the fractal Gaussian noise (fGn) series with a prior known Hurst exponent into account, the performance of these Hurst algorithms impacting on the periodical signal and the Gaussian white noise respectively using reverse method is evaluated. The results show that there is no algorithm that can estimate the Hurst exponent accurately and reliably under the complexity environment. The main reason is that these algorithms apply average method in global domain to a certain degree, which may result that the high variability information of the network traffic is destroyed. Consequently, the estimate error of the different algorithm becomes larger.
  • LIANG Jinqian; GUAN Xiaohong
    Computer Engineering. 2007, 33(02): 25-27. https://doi.org/10.3969/j.issn.1000-3428.2007.02.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces an access control mechanism called PBAC (process-based access control), which models from the active process, based on the access control model of current operating system, according to the role of process, the process privilege is assigned and managed in more detail. It enhances information confidentiality, integrity and controllability, and reduces the malicious code threat to the computer system. The basic concepts of PBAC are introduced and a formalization description is given, and the implementation in the Windows platform is discussed.
  • LIANG Quan; LIANG Kaijian; YANG Yang
    Computer Engineering. 2007, 33(02): 28-30. https://doi.org/10.3969/j.issn.1000-3428.2007.02.010
    Abstract ( )   Knowledge map   Save
    Service-oriented grid system requires an underpinning quality of service(QoS) support. To guarantee users’ QoS requirements, an effective method is to discover and select grid services using QoS properties. This paper defines some basic QoS parameters to describe quality requirements of grid service, and puts forward a new concept, the service quality number(SQN). As the one of all QoS parameters, SQN can represent a profile of one grid service’s quality. To expedite matchmaking process and satisfy users’ QoS request, the matchmaking strategy and price model are proposed, the computation results indicate a good performance. Corresponding discussion and analysis are carried through.
  • LI Shengyang; TANG Ping; ZHU Chongguang;
    Computer Engineering. 2007, 33(02): 31-33. https://doi.org/10.3969/j.issn.1000-3428.2007.02.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In real imaging system, every sensor system has unique system response, that is point spread function of acquisition device, which can be considered as sampling kernel given a prior, but sampling process like this doesn’t satisfy Whittaker-Shannon sampling theorem’s requirements, in such case, exact interpolation to improve image resolution is impossible. Differencing with interpolation method of multiple images with complementary information, optimal single frame image interpolation method in the sense of mean square error that corresponds to imaging physics meaning is presented. Image resolution is improved by resampling. The test shows the better improvement effect can be obtained by this method.
  • HU Haibo; LIU Weidong; LI Jing; ZHU Wenquan
    Computer Engineering. 2007, 33(02): 34-36. https://doi.org/10.3969/j.issn.1000-3428.2007.02.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The problem of the model computing for GIS application is that the processed-data is being more and more gigantic, and its procedure is much more complex than ever. The grid computing is the key to solve it. The computing mode of GIS model could be listed as the parallel, the serial and the parallel-serial. Based on these modes, the paper brings forward three prototypes to fulfill grid computing, such as the pieced-processing, the stepped-processing and the cubic-processing. Consequently, it also gives the principles of dividing vector data, and the parallel algorithm of histogram, convolution, and curving-fitting, which could be the basic and extension of the other more parallel algorithm for GIS application.
  • GAI Lingxing; SHI Xiaoan; ZHOU Xingshe
    Computer Engineering. 2007, 33(02): 37-39. https://doi.org/10.3969/j.issn.1000-3428.2007.02.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By analyzing the simulation results of the performance of current notification service, this paper finds that the notification service needs overload protection. A feedback control based admission control of notification service is presented and the closed loop stability is analyzed. Experiments to evaluate the performance of this mechanism indicate that this mechanism can control the load and achieve performance guarantees in the presence of load unpredictability, while it can also ensure allocating and utilizing system resources reasonably and efficiently.
  • Software Technology and Database
  • GUO Siwen ; HE Wei ; WANG Peng
    Computer Engineering. 2007, 33(02): 40-43. https://doi.org/10.3969/j.issn.1000-3428.2007.02.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Network security log file database is a kind of historical database. It is very important to research it. A lot of data mining methods to research it are found. A new method is provided to analyze and mine this kind of time serial database. Multi-resolution analysis of wavelet transform method is used to analyze and mine the data of network security log file database on different time scale. The period law of the attack number every hour is found by this method. Finally the wavelet threshold method is used to de-noise from the data. It is proved that this method can get good results.
  • GONG Hongfang; TONG Xiaojiao
    Computer Engineering. 2007, 33(02): 44-46. https://doi.org/10.3969/j.issn.1000-3428.2007.02.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The state test of class is an important component part of object-oriented software test. Class unit test comes down to test the data member and member function. An approach of test cases generation based-on the class state model is proposed, and test consistency and integrality of classes form state constant, state variable and member function. A result is gained that only the test data which satisfies the restraint conditions of state constant and the pre-condition and post-condition of state variable fully test inconsistency and imperfect in tested classes.
  • JIANG Shaohua; DANG Yanzhong
    Computer Engineering. 2007, 33(02): 47-49. https://doi.org/10.3969/j.issn.1000-3428.2007.02.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Extraction of new domain-specific terms is one of the important topics in Chinese natural language processing. Aiming at the limitation of the current methods and the specialties of many domain-specific terms are lettered-words, a novel approach combined with statistic technique and rule is proposed to extract new special semantic strings. Co-occurrence of character strings is formed by text segmentation based on matching longer strings first combined with frequency statistics. No-meaningful character strings are trimmed by collocation rules. Filtered by domain lexicon and membership degree, new domain-specific terms are extracted finally. This method can extract new special semantic strings, phrases and words, including unknown words like lettered-words and domain-specific terms, their frequency is larger than 2. Experiments show that this extraction technique is effective and indicate new domain-specific terms’ distribution characteristic of precision ratio.
  • WU Qing; ZHAI Jianshe; YANG Jianyong
    Computer Engineering. 2007, 33(02): 50-52. https://doi.org/10.3969/j.issn.1000-3428.2007.02.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Operation transformation technique is not perfect in solving concurrency control of real-time distributed cooperative systems. This article proposes 2-dimension sequential state vector operation transformation algorithm and also presents a solution of LateComer. The algorithm improves efficiency and continuity of cooperative editing.
  • YU Shoujian; ZHU Qin; LE Jiajin
    Computer Engineering. 2007, 33(02): 53-55. https://doi.org/10.3969/j.issn.1000-3428.2007.02.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes limitations of typical UDDI registry. Utilizing peer-to-peer technology, it proposes a novel distributed Web services catalog service based on the efficient data location ability of distributed hash table. The paper discusses the procedure of Web service publication and discovery under this system, as well as the system evolution. This system enables distribution of description information to each peer, which will overcome the shortcomings of centralized UDDI registry.
  • ZHAO Liang; XIAO Deyun; LIU Zhentao
    Computer Engineering. 2007, 33(02): 56-58. https://doi.org/10.3969/j.issn.1000-3428.2007.02.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The conventional framework for mining association rules is the support-confidence framework which has some limitations. For one thing, it can not prune such useless rules as satisfy both minimum support and minimum confidence with their antecedents and consequents independent. For another thing, it can neither separate the negative association rules from the positive ones. The purposes of this paper are to find a quantitative criterion for mining both positive and negative association rules, and further put forward a novel framework whose efficiency is tested in analyzing a questionnaire.
  • JIANG Tengjiao; WAN Changxuan
    Computer Engineering. 2007, 33(02): 59-61. https://doi.org/10.3969/j.issn.1000-3428.2007.02.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper discusses the problem of efficiently ranking results for keyword search queries related to content-only over XML documents. Evaluating keyword search over XML documents, as opposed to Web-based XML pages, it introduces many new features. This paper presents a new ranking model that is designed to handle these new features of XML keyword search, and designs inverted list indexing structure and search engine’s architecture to satisfy the ranking model.
  • RAO Hui; HE Guiming
    Computer Engineering. 2007, 33(02): 62-64. https://doi.org/10.3969/j.issn.1000-3428.2007.02.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an approach to store XML data in LDAP server through mapping DOM nodes to LDAP entries. It also implements XPath queries in LDAP directory service. The feasibility of the approach, as well as its comparatively high store rate is backed up by experimental data. The more important thing is that the efficiency of evaluation XPath queries in LDAP system is better than traditional DOM-based implementations, which is also supported by the comparative experiments.
  • HU Jixiang; ; XU Hongbo; LIU Yue; CHENG Xueqi
    Computer Engineering. 2007, 33(02): 65-67. https://doi.org/10.3969/j.issn.1000-3428.2007.02.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel term extraction method based on repeats, which can extract meaningful terms from text. For Chinese, it need not word segmentation. Experimental results show that the proposed approach can remarkably reduce the dimensionality and effectively improve the performance of traditional clustering algorithms.
  • LI Ming; HUANG Wentao; WANG Li
    Computer Engineering. 2007, 33(02): 68-70. https://doi.org/10.3969/j.issn.1000-3428.2007.02.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Information entropy theory proved an effective method of the attributes reduction. Based on the latest research of rough sets, this paper demonstrates the relation between the decision table and information table, proposes a new method using the information entropy to reduce decision table. It lays the foundation for finding the more efficient decision table reduction algorithm.
  • SONG Yong; CHEN Xianfu; YAO Haidong
    Computer Engineering. 2007, 33(02): 71-73. https://doi.org/10.3969/j.issn.1000-3428.2007.02.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    High quality random numbers play an important role in information security. Based on the idea of double randomizing, this paper uses the true random source to reset the parameters of a high quality pseudo-random number generator (p-rng), by which random numbers are produced continually. From these numbers, a certain binary bit is sampled respectively and meanwhile filled into an integer unit randomly which is normalized until being filled. Analysis shows that this true random number generator has good performance.
  • ZHOU Ming; LI Hong
    Computer Engineering. 2007, 33(02): 74-76. https://doi.org/10.3969/j.issn.1000-3428.2007.02.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traditional algorithms for mining frequent itemsets are proved to be inefficient and produce many redundant patterns when they are applied to dense datasets or long datasets, such as gene expression datasets. To solve this problem, some researchers propose closed pattern conception and some algorithms. It is proved that these algorithms based on the conception of closed pattern can substantially reduce the number of rules and redundant patterns. According to the characters of biological datasets, a novel algorithm called REMFOR is dlsigned to mine frequent closed pattern. It is based on the conception of closed pattern, using row enumeration and vertical data structure, building row fp-tree on row set to mine frequent closed pattern. And it is proved to be correct and efficient by example and tests.
  • WU Yingjie; WANG Xiaodong; WANG Yilei
    Computer Engineering. 2007, 33(02): 77-78. https://doi.org/10.3969/j.issn.1000-3428.2007.02.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The difference between RAM model and computer is analyzed, and a new memory model—ideal-cache model is introduced, then the funnel structure is analyzed detailedly, and cache-oblivious funnelsort algorithm is designed and implemented. Lastly, the availability is validated through simulation experiment.
  • YUAN Qin; YANG Xiaohu
    Computer Engineering. 2007, 33(02): 79-81. https://doi.org/10.3969/j.issn.1000-3428.2007.02.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper depicts an ontology classification based Web service composition model, which extends the standard specification of WSDL service description to map the service itself and its parameters onto ontology concept hierarchy, and saves the semantic information into service description. Then the model restricts the scope of services which can be used in the composition process by domain ontology filtration, and thus insures the validity of integrated services. Based on users’ requirements, interface match algorithm implements automatic discovery and composition of appropriate Web services. The model can also select the best composite services according to users’ service quality measures. The whole model implements the automatic service composition in some extent.
  • HE Xiang ; LI Jun ; XU Wei ; FAN Zhonglei
    Computer Engineering. 2007, 33(02): 82-84. https://doi.org/10.3969/j.issn.1000-3428.2007.02.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the steady increasing of data importance, data protection becomes vital to maintain business continuity. But globalization causes the backup window shrunk sharply. How to backup data efficiently and effectively is one of the most urgent questions today. This paper presents a NDMP-based block-level backup and recovery method, which can significantly decrease backup time and storage cost, compared with traditional file system backup method. It also presents data-merge and data-extract techniques to improve block level recovery performance.
  • LI Hui; SONG Huaiming; JIAO Limei; LIU Ying; WANG Yang; WANG Qirong
    Computer Engineering. 2007, 33(02): 85-87. https://doi.org/10.3969/j.issn.1000-3428.2007.02.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To satisfy the need of simple, efficient and high-available large-scale database system. This paper defines service-oriented architecture, which divides the complicated system into many service modules. Each of the modules realizes its functions independently. It also introduces how the architecture achieves service harmonization, deployment, communication and high-availability to keep uniform management and contact among these loosely coupled services. Service-oriented architecture simplifies large-scale database system and makes the system architecture much clearer.
  • LI Changhe; ZHAO Jie; ZHANG Yaling; SHI Zhenghao
    Computer Engineering. 2007, 33(02): 88-89. https://doi.org/10.3969/j.issn.1000-3428.2007.02.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    One of the primary bottlenecks preventing large enterprises from integrating information is that data cannot be exchanged smoothly among heterogeneous databases. A technique of security heterogeneous data exchange is proposed to deal with troubles in terms of data exchange between heterogeneous databases and poor security. XML template mapping and digital signature technology, together with network gap technology between internal and external network databases, is used to make operation between external and internal network heterogeneous database transparent, fully guaranteeing data security and integrity. Such solution to a practical project has been proved sound.
  • JIANG Sufang; CHEN Tianzi
    Computer Engineering. 2007, 33(02): 90-93. https://doi.org/10.3969/j.issn.1000-3428.2007.02.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the MBR and the direct query predicate, this paper proposes a weighted processing method which mainly contributes to optimize the filter step of the multi-way R-tree join and extends the structure of R-tree and the MRJ algorithm. This method contributes to get a set of more effective candidates and then reduce the frequency of disk access and the overhead of CPU as well as I/O. Through the experiment of specific application by using this method, the paper shows the significant superiority in optimizing the spatial query of SDBMS.
  • JIANG Liehui; CHEN Liang; WU Jinbo; HE Hongqi; FEI Qinfu; ZHAO Rongcai
    Computer Engineering. 2007, 33(02): 94-96. https://doi.org/10.3969/j.issn.1000-3428.2007.02.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Generally, the disassembly strategy can be divided into the liner-scanning strategy and recursion-scanning strategy based on control flow. Through researching on the recursion-scanning strategy based on control flow and instruction sets of many processors, this essay proposes a kind of disassembly strategy based on the static program flow traversal graph, and makes use of six strategies to pick up the hidden program sections from the data sections, thereby raising the precision of the disassembly result.
  • Networks and Communications
  • XIE Chenggang; GUO Deke; CHEN Honghui
    Computer Engineering. 2007, 33(02): 97-98. https://doi.org/10.3969/j.issn.1000-3428.2007.02.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Global information grid(GIG) employs service oriented architectures(SOA). The use of SOA enables loosely coupled applications, service reuse, flexibility in system design and the ability to rapidly assemble applications/solutions in an ad-hoc fashion. The key to all of this is the ability to discover relevant data and services in a timely fashion. This paper presents two distributed and scale-well approaches for fully autonomous registries and cooperative registries to overcome the disadvantage of traditional registries. In other words, it provides an unstructured peer-to-peer network for fully autonomous registries and a structured peer-to-peer network for cooperative registries.
  • YANG Guozheng; LU Yuliang; XIA Yang
    Computer Engineering. 2007, 33(02): 99-101. https://doi.org/10.3969/j.issn.1000-3428.2007.02.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the features of IPv6 networks, and presents several problems which are different from IPv4 networks. It also presents solutions to these problems, and designs a whole system framework for IPv6 network topology discovery. The module functions and algorithmic technology are described later.
  • CHEN Heng; QIAN Depei; LUAN Zhongzhi; XU Dawei
    Computer Engineering. 2007, 33(02): 102-104. https://doi.org/10.3969/j.issn.1000-3428.2007.02.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the expansion of the Internet, new network devices can be deployed into the network at anytime. But the network management system (NMS) is statically configured and in continuous operation, it is difficult for the NMS to cope with the dynamic deployment of network devices, affecting the performance of the network. To solve this problem, this paper proposes a new network management architecture based on dynamic management information base (MIB) compilation. It can dynamically load and unload MIB modules in adaptation to changes in the network. With this capability, the NMS can provide management to the newly added devices. To improve the efficiency, the storage of MIB objects is segmented based on module, so the complexity of searching an object in the MIB is kept constant.
  • HAN Dianfei; YUAN Ruixi; GUAN Xiaohong
    Computer Engineering. 2007, 33(02): 105-107. https://doi.org/10.3969/j.issn.1000-3428.2007.02.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The correct configuration of domain name servers is the foundation of good and robust performance of network service. Past operation practice has shown that incorrect configuration has severe impact on network services. In recent years, the .CN domain, an important part of Internet developed very rapidly. However, there are many issues arising in its management. The DNS configuration errors in .CN domain are measured and analyzed. It is found that over 30% zones suffer from misconfiguration errors. This problem may pose serious hinder to efficient and secure operation of Internet in China and should be brought enough attentions.
  • LIU Liang; YANG Shoubao; LIU Pengzhan; GUO Leitao;
    Computer Engineering. 2007, 33(02): 108-110. https://doi.org/10.3969/j.issn.1000-3428.2007.02.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on grid service and grid information service, a new architecture is proposed to construct grid monitor system and a prototype system implementation is also given. This architecture is well adaptive and scalable by using grid service invoking technique and adopting some features of hierarchical model and GMA architecture. The use of different information gathering mechanisms meets different monitor requirements and enables the flexibility and reliability in monitor system.
  • ZHANG Jin
    Computer Engineering. 2007, 33(02): 111-113. https://doi.org/10.3969/j.issn.1000-3428.2007.02.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Compared with RSVP, CR-LDP dose not provide support for multicast, yet RSVP provide support for multicast at the beginning of design. Although there have been drafts of standardization about MPLS multicast architecture, it dose not describe how to realize multicast with CR-LDP in MPLS network and just discuss the choice of multicast route protocol and the relation between multicast and optional parts of LDP. A new method is proposed to build a shared multicast distribution tree centered at a rendezvous point using CR-LDP message(extensions). This paper discusses how to realize multicast with CR-LDP in MPLS network.
  • Security Technology
  • YANG Lingyi; CHEN Jianhua; ZHANG Lina
    Computer Engineering. 2007, 33(02): 114-116. https://doi.org/10.3969/j.issn.1000-3428.2007.02.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A much more effective measurement for intrusion detection is provided by introducing the technique of mobile agent into intrusion detection system. This paper explains the integral structure and working modes of the instruction detection system based on mobile agents, and analyzes the main security problems that current mobile agent technique face with. A security mechanism based on elliptic curve cryptosystem is given in the end.
  • QIN Boping; ZHOU Xianwei; YANG Jun
    Computer Engineering. 2007, 33(02): 117-119. https://doi.org/10.3969/j.issn.1000-3428.2007.02.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory(GADM). Utilizing features of grey theory that less data is needed in model construction, and method that each node undertakes detection tasks, this model will save energy consumed in attack detection. Through data collection and analysis on each node and combined detection and response between nodes, attack behavior can be forecasted and a forecasting model on attacks for wireless network is constructed, therefore security of routing protocols is effectively improved. It provides frameworks of the attack detection model and specific process of formulation for constructing the model. An emulation experiment proves the affectivity of the model.
  • LI Hongjiao; LI Jianhua; ZHU Hongwen
    Computer Engineering. 2007, 33(02): 120-121. https://doi.org/10.3969/j.issn.1000-3428.2007.02.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model. Some existing anomaly detection techniques based on system call sequences are analyzed and discussed in this paper. They are compared from three dimensions: the information extracted from system call, the system call level used in anomaly detection and the information recorded by anomaly detector. Future work in this direction is also presented.
  • SHAO Liping; QIN Zheng; HENG Xingchen
    Computer Engineering. 2007, 33(02): 122-124. https://doi.org/10.3969/j.issn.1000-3428.2007.02.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Combined with Arnold transformation, this paper proposes a spatial domain image watermarking algorithm based on scrambling transformation and gives the methods of how to select proper scrambling transformation variables. The experiments of the attack and performance comparison show it is very robust in keeping resilience to cutting attack in a large area, random erasing and noise attack with high intensity, and it is superior to the classic spatial domain watermarking algorithms.
  • ZHANG Yongping; SU Guangchuan
    Computer Engineering. 2007, 33(02): 125-126. https://doi.org/10.3969/j.issn.1000-3428.2007.02.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel feature orientation watermark algorithm based on digital wavelet transform (DWT). Feature points are extracted by utilizing the characteristic of image from the low frequency sub-band of wavelet coefficients as index of watermark embedding positions. The technology is suitable to watermark blind detection. Simulation results show that algorithm has prefect positioning accuracy and unaffected characteristics. Practicality is perfect due to good balance between transparency and robustness.
  • JING Yinan; TU Peng; WANG Xueping; ZHANG Gendu
    Computer Engineering. 2007, 33(02): 127-129. https://doi.org/10.3969/j.issn.1000-3428.2007.02.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of analysis about advanced marking scheme(AMS), a reverse-validation IP traceback scheme is proposed, which no longer requires the too strong assumption of AMS. In order to improve other adaptive algorithms, an adaptive edge marking scheme (AEMS) is proposed. Theoretic analysis and simulation results prove that it can converge more quickly and stably than AMS.
  • GAN Yuanju; XIE Shiyi; FU Dongyang; ZHENG Xiaoping
    Computer Engineering. 2007, 33(02): 130-132. https://doi.org/10.3969/j.issn.1000-3428.2007.02.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Most previous proxy signatures only provide the delegated authenticity and don’t provide the confidentiality. An efficient proxy multi-signcryption scheme is presented. The proposed scheme has the following properties: Original signer and proxy signer don’t use secure channel; Only the specified recipient can check the validity of the proxy signcryption; When the proxy signer repudiates the signcryption, the recipient can convert this proxy signcryption into an ordinary proxy signature alone.
  • MENG Yingjie; WU Chao; ZHANG Wen; ZHANG Xiujuan
    Computer Engineering. 2007, 33(02): 133-135. https://doi.org/10.3969/j.issn.1000-3428.2007.02.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper researches the registration process zero-watermark for relation database. it constructs the model of the zero-watermark registration and designs a mechanism of zero-watermark registration, then describes the algorithm in detail, at last it analyzes the character of the scheme.
  • HAN Junjie; KANG Le; LIU Shengli
    Computer Engineering. 2007, 33(02): 136-138. https://doi.org/10.3969/j.issn.1000-3428.2007.02.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A traffic-analysis-based honeypot for Windows system is designed and implemented. Based on the library of IDS rules, the network driver of Windows DDK and NDIS middle-ware technology are used to realize filtering and diversion of network flow. This mechanism diverts the unauthorized flow from reaching the real server. In the meantime, it collects a vast amount of “hacking techniques” from the unauthorized flow to continuously adapt the system to the various “hacking techniques”. It improves the efficiency of Honeypot and protects the real servers.
  • XU Peng; ZHANG Yuqing
    Computer Engineering. 2007, 33(02): 139-141. https://doi.org/10.3969/j.issn.1000-3428.2007.02.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the development of the scale of the LAN and the seriously worse situation of the network security, patch auto-management system attracts more and more attention. According to the related works, the paper proposes and realizes a new design of a patch system which can automatically download, detect and install patches and also supports multiple network extension.
  • ZHU Congxu; LI Li; CHEN Zhigang
    Computer Engineering. 2007, 33(02): 142-144. https://doi.org/10.3969/j.issn.1000-3428.2007.02.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new chaotic image encryption algorithm which shuffling the positions and changing the grey values of image pixels are combined. Firstly, the general Arnold map is used to shuffle the positions of the image pixels in the spatial-domain. Then the sequence values of the Liu chaotic system is adopted to generate integer keys for the grayscale image encryption, and the shuffled image is encrypted by the integer keys pixel by pixel. The experimental results demonstrate that the image encryption algorithm shows advantages of large key space, high-level security, and the ciphered image has random-like distribution behavior of grey values, adjacent pixels have zero co-correlation properties.
  • XU Qian; LEI Yongmei; CAI Hongxia
    Computer Engineering. 2007, 33(02): 145-147. https://doi.org/10.3969/j.issn.1000-3428.2007.02.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Although it makes the authorization easier, role-based access control (RBAC) model will cause authorization problem when combining with proxy mechanism. This paper discusses the authorization problem and defines the conception of covered role, presents a proxy mechanism oriented role-based access control (PRBAC) model. In the model, it introduces some notions to describe PRBAC model. In PRBAC model, user’s role can be appointed by kinds of coalition policies and role appointed unit. This model can efficiently resolve the covered role and enhance authorization of service nodes.
  • WANG Tianyin; CAI Xiaoqiu; ZHANG Jianzhong
    Computer Engineering. 2007, 33(02): 148-149. https://doi.org/10.3969/j.issn.1000-3428.2007.02.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new secure and efficient proxy blind signature scheme based on bilinear pairings is proposed, and it is compared with those proposed schemes. The new scheme overcomes the security leaks and has the merits of little communication and low computation complexity etc.
  • YU Guoping; YANG Wei
    Computer Engineering. 2007, 33(02): 150-151. https://doi.org/10.3969/j.issn.1000-3428.2007.02.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper presents the solution of the electronic seal in electronic contract signature .The system uses PKI/CA and serial number method and can fuse the direct-vision of electronic seal system with security of digital signature. It analyzes and verifies the security and reliability of the electronic seal.
  • Artificial Intelligence and Recognition Technology
  • WU Chunyao; QU Wenlong; YANG Bingru
    Computer Engineering. 2007, 33(02): 152-154. https://doi.org/10.3969/j.issn.1000-3428.2007.02.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a feature evaluation algorithm by using users click in order to analysis similarity between query and texts in search engines. This method gets features from potential evaluation of user search results because user’s clicks to search results reflect the inner relation between query and documents in search results. EM algorithm is used to calculate feature weights. It is difficult to know whether the model’s function is convergent because of its complexity. So the simulation annealing algorithm validates the model’s convergence as the complement of EM algorithm. The experiment is carried out in Baidu’s advertisement ranking. The samples have 100 advertisement and 144 132 queries related to these advertisement. The experiment shows its precision is 93.32% and its recall is 87.43%. All features in the experiment are convergent.
  • XU Zhichao; HU Xiangpei; HUANG Minfang; LI Yongxian
    Computer Engineering. 2007, 33(02): 155-157. https://doi.org/10.3969/j.issn.1000-3428.2007.02.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper focuses on the real-time and intelligent process of the E-Commerce order. The control and reasoning of the real-time and intelligent processing of E-Commerce order is studied to apply the blackboard approach that is the method to solve the complex reasoning of artificial intelligent. The real-time intelligent processing of E-commerce order is the knowledge-based multiple tasks’ processing. So the blackboard-based reasoning is put forward to solve the application of experience and knowledge and calling of tasks. It is beneficial to improve the real-time, scientific and intelligent process of E-commerce order.
  • ZHANG Gang; GUO Yan; ZHANG Kai
    Computer Engineering. 2007, 33(02): 158-159. https://doi.org/10.3969/j.issn.1000-3428.2007.02.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Resource selection is one of the most important problems in distributed information retrieval. In this paper, resource selection is converted to document retrieval problem. Some document retrieval method is adopted to solve the resource selection problem. Each retrieval method is tested both on the document retrieval and resource selection problem. Compared to the well known resource selection method CORI, language model based retrieval method achieves a quite promising result.
  • CHE Shengbing; HUANG Da
    Computer Engineering. 2007, 33(02): 160-162. https://doi.org/10.3969/j.issn.1000-3428.2007.02.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the relevancy among the pixels in the vicinity, expanding the pixels on the edge of the image, filling the expanding areas with the first row and column, making curve fit from known pixels by ERBF kernel function, it solves the problem dexterously of sampling pixels, that do not include the original image pixels. Experimentations suggest that, when the low resolving image, obtained by taking out 25% pixels with even rows and even columns from original image, become the high resolving image after interpolating, the parameter PSNR of the latter is 38.53dB, which is higher than any other image interpolation algorithms. And, there is no need to choose a threshold, which is always a difficult problem. It also puts forward a new effective method to compare different image interpolation algorithms by absolutely minus image for the first time.
  • MIN Jin; HUANG Xuanjing
    Computer Engineering. 2007, 33(02): 163-164. https://doi.org/10.3969/j.issn.1000-3428.2007.02.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Text filtering is the procedure of retrieving documents relevant to the requirements of specific users from a large-scale text data stream. This paper introduces a text filtering system merging topic classification based on vector space model and sentiment classification based on support vector machine. The experimental results show this method has high classification precision and recall.
  • ZHAO Fang; WU Yadong; SU Jikui
    Computer Engineering. 2007, 33(02): 165-167. https://doi.org/10.3969/j.issn.1000-3428.2007.02.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Much of the work on content based music query focuses on polyphonic music files. However the polyphonic format causes large calculation and complex algorithms for matching. This paper represents a model for auto melody extraction method for multi-track MIDI files based on melodic features. The results are compared with manual output and show that the implemented method can extract melody track from multi-track MIDI file effectively.
  • WANG Daling; LU Jiale; WU Shuang; ZHANG Yifei; YU Ge
    Computer Engineering. 2007, 33(02): 168-170. https://doi.org/10.3969/j.issn.1000-3428.2007.02.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The function of medical image mining in computer-aided diagnoses is discussed. The idea of using luminance grade as the features of CT image and the method of extracting and storing the luminance grade are proposed. The results of classification based on decision tree and clustering based on density to some brain and breast CT images and the analysis to them are introduced. Moreover, the conclusion and future work are given.
  • ZHU Wenqiu; LIU Qiang
    Computer Engineering. 2007, 33(02): 171-173. https://doi.org/10.3969/j.issn.1000-3428.2007.02.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a method based on AdaBoost to identify the sex of a person from a low resolution grayscale picture of their frontal facial images. A heuristic search algorithm is used within the AdaBoost framework to find new features providing better classifiers. The experiments result of gender classification with the method presented in this paper indicate that the method is extremely fast and achieves over 93% accuracy with less than 500 pixel comparisons operations, these match the accuracies of the SVM-based classifiers which the best classifiers published to date.
  • LIU Hongmei; LI Fanzhang
    Computer Engineering. 2007, 33(02): 174-176. https://doi.org/10.3969/j.issn.1000-3428.2007.02.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the information processing of the electronic commerce, some dynamic, vague and indefinable problems are often analyzed and judged. The paper introduces the dynamic fuzzy logic (DFL) theory and its application in the information procession of the E-commerce, for example: obtain such respects as customer’s information, logistics providing and delivering and stock control, etc. Then through a concreted example, this paper describes the method and the inferential process that how to apply the DFL to deal with information processing problem.
  • Multimedia Technology and Application
  • SONG Jingzhou; SHI Fazhong; SUN Hanxu; JIA Qingxuan; GAO Xin
    Computer Engineering. 2007, 33(02): 177-179. https://doi.org/10.3969/j.issn.1000-3428.2007.02.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a kind of function approximation optimization model to solve the color calibration problem of multi-projection immersive virtual environment systems. This color calibration model adopts a digital camera as the color feedback instrument to obtain the luminance transfer function and the chrominance transfer function of a base projection, and then finds a luminance amendment function and a chrominance amendment function for all of the other projection, which makes the L2 distances about luminance transfer function and chrominance transfer function between the based projection and the calibrated projection be minimal. It compensates the difference of projectors input response according to these amendment functions to deal with the color continuity of the display. It gives out the approximation correction algorithms and its program implementation. Using a three-channel experimental systems, it shows the method is effective for the color calibration problem of multi-projection immersive virtual environment systems.
  • ZHANG Aijun; WANG Shi; LU Jiande
    Computer Engineering. 2007, 33(02): 180-182. https://doi.org/10.3969/j.issn.1000-3428.2007.02.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The interaction has become the focus which people have studied recently. This article points out the importance of interactive sports, and designs the interactive system structure drawing based on MPEG-4, carries on the detailed design to each module, and produces one interactive soccer example.
  • CHEN Yan; YANG Dongyong; SHEN Zhengwei
    Computer Engineering. 2007, 33(02): 183-185. https://doi.org/10.3969/j.issn.1000-3428.2007.02.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Omnidirecitonal images generated from omnidirecitonal vision system can obtain 360-degree horizontal view, so it’s suitable for applications which need large field of view. This paper introduces the imaging process of the omnidirectional image, the generation of panorama and perspective images from omnidirecitonal images. The unwarping process of omnidirectional video based on DirectShow technology is also included. An experiment is presented to prove the method at last.
  • GU Yaolin; JI Xiaojuan
    Computer Engineering. 2007, 33(02): 186-188. https://doi.org/10.3969/j.issn.1000-3428.2007.02.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Vector fields visualization is one of the most challenge researches of visualization in scientific computing. A new method about create, protract and display streamlines step by step based on time delay is presented. It can accurately depict topology, direction and velocity at any points of 2D steady vector fields as a form of animation. It can be proved that the method presented in this paper is simple, visual and imaginable.
  • Engineer Application Technology and Realization
  • CHENG Xiaoyu; CAI Ye; BI Duyan; ZHENG Weimin
    Computer Engineering. 2007, 33(02): 189-190. https://doi.org/10.3969/j.issn.1000-3428.2007.02.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on Godson2 PC104 Plus CPU module, an airborne video recording system is implemented. The main idea of system design is given. The design of Godson2 PC104 Plus CPU module and video compress system is described. The key technology of software including BIOS programming, operating system porting, device driver and application software development is discussed.
  • LI Shengguang; ZHANG Qishan
    Computer Engineering. 2007, 33(02): 191-193. https://doi.org/10.3969/j.issn.1000-3428.2007.02.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper gives the solutions to pivotal problems of FLASH memory devices in embedded Linux system. Then it analyzes the support of Linux kernel to FLASH memory devices and programming codes, and gives the design and the application of file system. This scheme is a useful reference for the designs of storages of embedded system.
  • ZHU Yunfang; DAI Chaohua; CHEN Weirong
    Computer Engineering. 2007, 33(02): 194-196. https://doi.org/10.3969/j.issn.1000-3428.2007.02.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A general method of recursive mother wavelet is introduced, and an optimal method of wavelet construction is proposed too. Moreover, the time-frequency characteristics of recursive wavelet are analyzed. In view of the fact that traditional ART2 loses the amplitude information of input patterns and is sensitive to pattern sequence, an improved ART2 are presented. The AE signals of tool conditions are decomposed using a recursive wavelet from which the features are extracted and delivered to an improved ART2 network for fault recognition. The results show that recursive wavelet is convenient to analyze tool condition signals with real-time characteristics. The modified ART2 becomes more robust, and its consumed time accounts for only 3.79% that of traditional ART2, and the recognition rate is up to 100%.
  • ZHOU Xin; YANG Genke
    Computer Engineering. 2007, 33(02): 197-199. https://doi.org/10.3969/j.issn.1000-3428.2007.02.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on supervisory control problem of modular production system (MPS), a structured 3-layer extended Petri net(PN) is proposed, which describes the MPS in view of entire system, components and details respectively. The message-places are employed to solve communication problem among different sub-PNs. This method not only reduces the MPS modeling complexity efficiently, and enhances the reliability and reusability of the corresponding supervisory control system. Finally supervisory control software for the MPS is developed in terms of the PN modeling, to certify the effectiveness of this method.
  • LI Fangfang; ZHAO Yingkai; JIANG Zhibing
    Computer Engineering. 2007, 33(02): 200-202. https://doi.org/10.3969/j.issn.1000-3428.2007.02.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the local data from hydrogenation equipment, a predictive model using support vector machines is established for three important quality targets of diesel oil in this paper, and compared with neural network on precision. It proves that the proposed predictive models based on support vector machines can predict the quality target efficiently and rapidly. It provides a method for online diagnosing fault of quality targets.
  • REN Puzhou; HE Hongli
    Computer Engineering. 2007, 33(02): 203-204. https://doi.org/10.3969/j.issn.1000-3428.2007.02.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the identification of the outliers in trajectory data processing, and provides a fault–tolerant sliding algorithm, which is applied to a series of outliers identification. Data processing of flight test indicates that this method is good for the process of measurement with a series of outliers.
  • MA Biao
    Computer Engineering. 2007, 33(02): 205-207. https://doi.org/10.3969/j.issn.1000-3428.2007.02.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article introduces a design and application of electricity power measure and management system based on ADE7757, the hardware and software design of the system are introduced in detail, the electric loads detecting and control is realized by making use of the software method.
  • WANG Deyi; LUO Xingqi; YAN Wei; QIU Jindong
    Computer Engineering. 2007, 33(02): 208-210. https://doi.org/10.3969/j.issn.1000-3428.2007.02.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    this paper presents a new method of frequency and phase angle measurement based on digital signal processor(DSP). Compared with singlechip, PLC or FPGA measurement devices and others, measurement device based on this method is of high precision and reliability and the hardware circuit is greatly simplified, so that the precision and reliability of excitation control are greatly raised.
  • ZHANG Yan; XIONG Tinggang; MA Zhong
    Computer Engineering. 2007, 33(02): 211-213. https://doi.org/10.3969/j.issn.1000-3428.2007.02.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Embedded computer based on X86 platform has been widely applied to many fields. There are a great amount of interest in speeding up the configuration of embedded BIOS, shortening the developing period, and discarding the old complicated BIOS configuration process. This paper brings forward a new design method of BIOS differing from tradition¬al ones——to separate codes of test and initialization from the data of initialization, which simplifies the maintenance of core codes during the configuration. The practice shows that the new method is more simple and effective in the embedded BIOS configuration.
  • REN Qiao; XIONG Zhang; ZHANG Shu; ZHANG Ting
    Computer Engineering. 2007, 33(02): 214-216. https://doi.org/10.3969/j.issn.1000-3428.2007.02.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the rapid development of radio frequency identification (RFID) system, the practical application of RFID system often uses RS232 serial port or other industrial bus to communicate with the control platform. But those methods are lack of deploy ability or difficult for use. In order to extend the application field of RFID system, an RFID system with general network interface is introduced. An integral framework and design of this system are put forward to implement the functions of RFID system and its communication with the control platform. It can work as an endpoint of Internet to exchange data and implement remote control.
  • MA Bo; HAN Jungang
    Computer Engineering. 2007, 33(02): 217-219. https://doi.org/10.3969/j.issn.1000-3428.2007.02.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Assertion based verification is a new approach for hardware verification, which can increase the productivity and quality of verification especially for complex ASIC and SoC design. In a practical design of a digital cross connect chip which is a key device for synchronous digital hierarchy, by using ModelSim6.0 of Mentor Graphics Corp., it embeds PSL (Property Specification Language) assertions into Verilog designs, and simulation results show that PSL can assist the check efficiently.
  • SHAO Huanqing; KANG Jianchu
    Computer Engineering. 2007, 33(02): 220-222. https://doi.org/10.3969/j.issn.1000-3428.2007.02.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    SOA(service oriented architecture) is being coming the mainstream of IT integration technology, component layer and Web service layer are foundations of SOA, and ESB(enterprise service bus) is the main infrastructure of SOA. Aimming at component layer and Web service layer, this paper discusses the principium of ESB, and expatiate how to use it to map and transmit component to Web service.
  • Developmental Research
  • GUO Yuhui; WANG Yanyu; QIAO Weimin
    Computer Engineering. 2007, 33(02): 223-224. https://doi.org/10.3969/j.issn.1000-3428.2007.02.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to realize of remotely monitor and access physics experiment equipment, it should adopt 32 bit kernel chip and base on the CPLD time sequence programming to carry out the 3U VME control bus system. S3C4510B is the CPU designed by the Samsung according to the application of network, with the network controller of 100Mbps, and uClinux system has perfect TCP/IP protocol, thereby, the coalescent provides the powerful function of network service to consumer. This system makes use of the embedded network and bus runs side technology to achieve the stabilization and dependable accessed and provided data.
  • ZHANG Lina; CHEN Jianhua; ZHANG Jiahong; YANG Linyi
    Computer Engineering. 2007, 33(02): 225-226. https://doi.org/10.3969/j.issn.1000-3428.2007.02.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces data encryption standard(DES) and triple data encryption standard(3DES), and gives a pipelined high-speed and area-efficient implementation of them. The method considers such factors as area and speed, etc. Passing FPGA verification. it is proved that the method has strong practicability.
  • XU Yang; ZHONG Wei; TONG Shuiguang
    Computer Engineering. 2007, 33(02): 227-229. https://doi.org/10.3969/j.issn.1000-3428.2007.02.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the research of a general engineering information graphic marking system. Using object-oriented technology, a system model is build and described by unified modeling language, then, the graph transformation problem is resolved and an applied instance based on the control of Autodesk DWF viewer is provided. The technology can be widely used in the pos-processing function of engineering calculation software.
  • CAI Yiling; NI Yanrong; FAN Feiya
    Computer Engineering. 2007, 33(02): 230-232. https://doi.org/10.3969/j.issn.1000-3428.2007.02.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To deal with the diversity and complexity of the application services in ASP business support system, based on the application service meta-model, the two-phase definition approach is proposed for the application services definition. XML and database LOB technology are used to solve the key problem. This approach has been adopted to build the business support system of Shanghai advanced manufacturing environment platform, and it has efficiently supported the flexible definition of many professional application services.
  • LI Pengyang; LI Yan; YANG Mingshun; FANG Yingwu; YUAN Qilong
    Computer Engineering. 2007, 33(02): 233-235. https://doi.org/10.3969/j.issn.1000-3428.2007.02.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on analyzing the typical question of information construction of manufacture enterprise at present and analyzing the function model of manufacturing execution system, a method of information transmission based on GSM and driven by work flow is brought forward in the manufacturing execution system. The gap of information systems is carried out well by short message of mobile cell, the process of the production can be well monitored, and the platform of information transmission is developed. The platform is applied successfully in a enterprise’s manufacturing execution system. The practice indicates the platform is useful for enterprises.
  • ZHOU Weidong; HAO Yanling
    Computer Engineering. 2007, 33(02): 236-238. https://doi.org/10.3969/j.issn.1000-3428.2007.02.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes the practical design method for fault-tolerant program of warship integrated navigation.Both N-version programming and the recovery block scheme are considered in applied software of integrated navigation. The model and simple algorithm for evaluating reliability of software system consisting of fault-tolerant components.
  • DU Chenglong; ZHONG Li; XIAO Yun
    Computer Engineering. 2007, 33(02): 239-240. https://doi.org/10.3969/j.issn.1000-3428.2007.02.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The auto-update method is the present software system essential function. This article systematically analyzes and designs the auto-update software structure, and describes the procedure. It uses the C# language to designe the essential technology of auto-update software. This article’s design method has the practical reference value.
  • XIAO Hui; ZHANG Yuqing
    Computer Engineering. 2007, 33(02): 241-243. https://doi.org/10.3969/j.issn.1000-3428.2007.02.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Nessus is an advanced vulnerability scanner, which checks the vulnerability by the plugins. The paper analyses the advantage of the Nessus attack scripting language. It gives the steps of developing a Nessus plug-in. An example of weak password is presented to show the progress of developing a Nessus plugin.
  • ZHANG Pengfei; TANG Jianxun; LONG Xingwu
    Computer Engineering. 2007, 33(02): 244-245. https://doi.org/10.3969/j.issn.1000-3428.2007.02.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to meet the requirement of SINS, a navigation computer based on the technology of DSP and CPLD is developed. It is a computer control system with the high speed DSP single-chip computer TMS320VC33. The count functions of the signal of accelerometers and the signal of odometer have been designed with CPLD, and the communication functions have been achieved with peripheral equipment. Thus, this system is provided with some characteristics, such as simple structure, lesser size and lower power consumption, and enhances the real-time performance of the system.
  • WANG Lisheng; MEI Yan; CAO Nanyang
    Computer Engineering. 2007, 33(02): 246-248. https://doi.org/10.3969/j.issn.1000-3428.2007.02.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper introduces the light-weight stack. It describes the standard TCP/IP stack. It gives emphasis to the characters of TCP/IP stack in embedded system and design methods. A comparison between standard TCP/IP stack and light-weight TCP/IP stack is listed.
  • LI Min; LIU Shengli; CHEN Kefei
    Computer Engineering. 2007, 33(02): 249-251. https://doi.org/10.3969/j.issn.1000-3428.2007.02.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the development in DRM and home network DRM. Through the comparison between them, it proves the integration of both kinds of systems is necessary. It proposes a novel solution for the integration. The solution can not only make content and certificates sharable at home but also protect the benefits of content providers and provide the ability to control and trace. It discusses the feasibility of the solution and the results prove it.
  • LI Cheng; LI Huawei
    Computer Engineering. 2007, 33(02): 252-254. https://doi.org/10.3969/j.issn.1000-3428.2007.02.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the rapid increase in network bandwidth and emergence of various new network applications, original solutions based on general purpose processor(GPP) and application specific integrated circuit (ASIC) can not fulfill the requirements of high performance, flexibility and extensibility. Network processors are getting wide acceptance with its powerful processing ability and programmability. Almost all the network processors of high performance consist of multiple processing elements which are powerhouse for deep packet processing process packets concurrently. This paper discusses the design of processing elements, proposes a flexible yet efficient architecture for processing element, and demonstrates its feasibility through FPGA prototyping.
  • ZHANG Wei; CHENG Hong; WEI Sui
    Computer Engineering. 2007, 33(02): 255-256. https://doi.org/10.3969/j.issn.1000-3428.2007.02.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a calibration system,which adopts a method named direct calibration for intrinsic parameter of camera by the use of reference object. The whole system is implemented under VC++ by the help of IPL and OpenCV. With an image of reference object, the intrinsic parameter can be computed and displayed accurately in a minute by the system. The authors came to a conclusion of its validity by 3D reconstruction experiments. Compared with the Matlab procedure, it is a swifter system which can be used conveniently.
  • ZHU Chuanbao; LI Congdong; BI Yanqin
    Computer Engineering. 2007, 33(02): 257-258. https://doi.org/10.3969/j.issn.1000-3428.2007.02.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the problem of financial management about group corporation, Wuhan Iron and Steel Group Corporation implements a new financial information system which takes integration as core idea. The system has the character of data-centered and financing-centered, it can help corporation establish financial management system based on total budget and use money properly in order to control financial risk and cut down financial cost, also it can help corporation to establish a set of full, comprehensive financial analysis system.
  • ZHAO Mingfu; DONG Yu; CHEN Yan; ZHANG Xiaochuan
    Computer Engineering. 2007, 33(02): 259-260. https://doi.org/10.3969/j.issn.1000-3428.2007.02.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the analysis on the soccer robot function in China at present, in order to improve the robotic board’s hard ware system, this paper designs a kind of soccer robot which is based on the DSP control core and connected with the Fuzzy-PID arithmetic. The experiment testifies because of the high speed, the various interface and the low consumption of power, it is very good for improving the robot’s active capability, control precision and real time capability.
  • LING Qinghua; SHI Zhiqiang; CHENG Weiming
    Computer Engineering. 2007, 33(02): 261-263. https://doi.org/10.3969/j.issn.1000-3428.2007.02.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper designs and implements a SIP-based network video surveillance system, using SIP call mechanism, and gives a solution to the interconnection among multi-surveillance systems. Using media negotiation in SIP, it integrates a variety of video servers, and solves the interconnection under complex network. It describes the process of design and implementation, and discusses some key technologies. The system runs well in the community network with integrated services.
  • SONG Youquan; GAO Xiaopeng; LONG Xiang
    Computer Engineering. 2007, 33(02): 264-266. https://doi.org/10.3969/j.issn.1000-3428.2007.02.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the embedded VPN gateway ESG-1 and discusses the design outlines of device driver program for the PCI Ethernet adapter based on RTEMS. This paper adopts the service threads to dispose the network interrupt, uses the producer and consumer model to implement the buffer management and supports the multitude Ethernet adapters managed by one device driver program through the event-driven technique. The problems of optimizing the memory copy for device driver program and zero copy technique are discussed. After analyzing the test data, it concludes that the performance of Ethernet adapter driver is improved by both optimizing the memory copy and adopting the zero copy technique.
  • LI Guangqiang; WU Weimin; LAI Tianwu; WANG Jing; SUN Yinai
    Computer Engineering. 2007, 33(02): 267-269. https://doi.org/10.3969/j.issn.1000-3428.2007.02.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to reduce the difficulty of software maintenance and meet changing user-requests, this paper presents a control and XML based method of customized software development, which is specifically oriented to Windows applications. This method makes use of XML to store key information of software development, separating the development platform and design information. In this way, it reduces the coupling with other modules and makes the software made through this method has considerable extensibility. This method has been used to develop a warehouse system of electronic parts and a configuration tool of a printed circuit board and proved to be feasible.
  • CHENG Yang; ZHANG Jie; QU Zhaorong
    Computer Engineering. 2007, 33(02): 270-273. https://doi.org/10.3969/j.issn.1000-3428.2007.02.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Through the research of the whole life cycle of enterprise informatization, an evaluation system is established, which can evaluate by stages. And evaluating through progressive method of AHP model gives a phase-in and an all-around result. More than one hundred companies have practiced, which get reasonable and comprehensive result. Totally, the evaluation system that is scientific, rational and more exercisable provides the enterprise timely feedback and improved information.
  • ZHANG Xiaoming; DU Chunyan; LU Jiande
    Computer Engineering. 2007, 33(02): 274-276. https://doi.org/10.3969/j.issn.1000-3428.2007.02.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the embedded network application processor mpc8245 and the HHPPC8245-4ETH-R1 development platform based on this processor. It also discusses the development of embedded IPsec-VPN based on this platform, including porting and cross-compiling Linux-2.6 kernel and applications, building RAMDISK file system. A performance test is given, which proves that the VPN on this platform is feasible and efficiency.
  • WEN Lina; XIE Bin; LI Lianyun
    Computer Engineering. 2007, 33(02): 277-279. https://doi.org/10.3969/j.issn.1000-3428.2007.02.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    When developing embedded applications, cross-development environment needs to provide various kinds of host tools such as cross compiler, remote debugger, interactive shell, and real-time resource browser etc. The heavy host-target communication and inconsistency caused by tools make target agent more complex. This paper proposes a mechanism which establishes the communication line between several host-resident tools and embedded application, and develop a target agent running in the embedded real-time operating system——ReWorks.
  • WU Qiulan; LIANG Yong; ZHANG Chengming; GE Pingju
    Computer Engineering. 2007, 33(02): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2007.02.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Wireless hydrological automatic measurement system(WHAMS) based on GPRS is provided. In WHAMS, data collected by hydrological data collection instruments is transmitted to data processing and monitoring center through GPRS wireless communication network of mobile. The system collects, transmits and processes hydrological data automatically and has advantages of real time, high efficiency, high accuracy, low investment, low running cost, etc. It solves many serious problems such as human labor is needed to take care of the manual measurement instruments and to keep an eye on it all the time, data collecting, processing and handing in involves human labor, data measurement, recording and transmission is not real time resulting in water allocation and in-time flood prevention can’t reach first hand data in time. The system has nontrivially social and economical benefits.
  • ZHU Qianlin; YUN Xiaochun; WANG Yongheng; ZHAI Jianhong
    Computer Engineering. 2007, 33(02): 283-284. https://doi.org/10.3969/j.issn.1000-3428.2007.02.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A design of coordination platform based on event-triggered and policy-driven is presented. The policy-driven model of event-triggered, the architecture of platform and the process of coordination are described. Rules are applied to treat security events queue, which improves the efficiency of policy. Policy is described with XML which is simple with high efficiency. Adopting the thought of component with well flexibility and extensibility, a management mode of centralized control and decentralized response is achieved through implementing all the security functions as the components of the platform. Demonstrated in practice, the coordination platform improves the efficiency of network security management and is greatly useful to the security management of large-scale network.