Author Login Editor-in-Chief Peer Review Editor Work Office Work

05 December 2006, Volume 32 Issue 23
    

  • Select all
    |
    Degree Paper
  • PENG Xuena; ZHAO Hong
    Computer Engineering. 2006, 32(23): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2006.23.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A scale-free susceptible application network based topology worm propagation model is introduced, and its several features are analyzed, including its full infection time and resource occupation feature and etc. Compared with other worms, the worm is both faster and stealthier, and harder to be detected before final malicious attack. All these special features make it an even more risky worm type. According to its latent threat, several possible defense mechanisms are also introduced.
  • CHEN Xiaojun; YAN Shiju; WU Yiqun; WANG Chengtao
    Computer Engineering. 2006, 32(23): 4-6. https://doi.org/10.3969/j.issn.1000-3428.2006.23.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the key technology in the image guided oral implantology system (IGOIS) —— registration. With the fabrication of tooth-supported polymer resin templates, a software system is developed to obtain the coordinates of fiducial points respectively under the virtual coordinate system(VCS) and the world coordinate system(WCS) by programming in VTK so that non-invasive point-to-point registration is realized through ICP algorithm. The result shows that the RMS error is less than 1mm, which can meet the clinical requirements of oral implantology.
  • PU Shujin; YANG Lei; YANG Shenyuan; HU Weiwei
    Computer Engineering. 2006, 32(23): 7-9. https://doi.org/10.3969/j.issn.1000-3428.2006.23.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the insufficiencies existing in D-S evidence theory when they deal with the conflicting evidences, many scholars present modified rules base on reallocation of the basic probability assigned to conflict. A new combination rule is presented to mend the disadvantages of the rules. This rule analyzes the validity of evidences according to the extent of conflict with the use of the reliability of evidential sources and support measure of the evidence, and realizes information fusion rationally. Experiments show that the new combination rule overcomes the insufficiencies, and the outputs are constringent on the aspect of rationality, which enhances robustness of systems effectively.
  • WU Mingqiao; ; JIN Shiyao
    Computer Engineering. 2006, 32(23): 10-12. https://doi.org/10.3969/j.issn.1000-3428.2006.23.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Stego is a steganography software using text to hide secret information. It transforms any binary file into nonsense text based on a dictionary either given explicitly or built on the fly from a source document. By studying the mechanism of Stego, this paper proposes two steganalysis methods to detect it. When the first letters of words in dictionary are lowercases, the steganalysis method based on the signature characters is used to detect Stego; When it’s not in above condition, the steganalysis method based on statistical characters is used to detect Stego. The results of experiments show that the two methods have high credibility.
  • RAO Yunhua; CAO Yang; YANG Yan; WANG Xiwen
    Computer Engineering. 2006, 32(23): 13-14. https://doi.org/10.3969/j.issn.1000-3428.2006.23.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The FARIMA traffic model which holds long-range dependence and short-range dependence simultaneously is employed to study the performance of FIFO queue system. The asymptotic analytic expression of queue length with FARIMA input is obtained with the appointed buffer overflow probability. It is showed that queue length distribution is influenced by the short-range dependence with small buffer, but the queue length will be asymptotic weibull distribution with increasing buffer size, this is irrespective with short-range dependence. Monte-carlo simulation confirms the validity and efficiency of these results.
  • PEI Erming ; LIU Baoxu
    Computer Engineering. 2006, 32(23): 15-17. https://doi.org/10.3969/j.issn.1000-3428.2006.23.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As one of the key steps of IT security management, risk assessment, on which more and more attention is paid, needs an scientific model to guarantee its effective implementation. This article, according to a series of ISO/IEC and commercial standards, introduces an effective risk assessment model and its algorithm, describes the steps of implementation, which offers a good reference to organizing self-assessment.
  • LI Xuefeng; LIU Lu; ZHANG Zhao
    Computer Engineering. 2006, 32(23): 18-20. https://doi.org/10.3969/j.issn.1000-3428.2006.23.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The rapid development of e-commerce has promoted the growth of online auction business based on C2C context. However, the ever-increasing user size and auctioned goods cause the problem of information overload, and how to enhance the customer loyalty becomes a critical issue faced by most online auction websites. One way to overcome the problem is to use recommender systems to provide personalized information services. Since there exists much difference between B2C and C2C context, it is a new challenge for usere to apply recommender systems to the latter setting. This paper analyzes the user behaviors on the auction website and constructs the user preference model under the C2C context. Then the collaborative filtering technique is used to recommend auctioned goods.
  • LIU Junbao; XIAO Guozhen
    Computer Engineering. 2006, 32(23): 21-23. https://doi.org/10.3969/j.issn.1000-3428.2006.23.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to provide incentive to cooperate with authentication and confidentiality in multi-proxy signature scheme, a new multi-proxy signcryption scheme from pairings, with (t,n) threshold shared unsigncryption, is proposed and its security is analyzed, which indicates that this scheme is correct and secure. In this scheme, an original signcrypter could authorize a proxy group as its proxy agent. Then only the cooperation of all the signcrypters in the proxy group can generate the proxy signcryption on behalf of the original signcrypter. In the scheme, any t or more of n receivers can unsigncrypt the message and any t-1 or fewer receivers can not unsigncrypt the message.
  • ZENG Wandan; CHANG Guiran; DAI Bo; ZHENG Xiuying
    Computer Engineering. 2006, 32(23): 24-26. https://doi.org/10.3969/j.issn.1000-3428.2006.23.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    OGSI-compliant grid system is proposed. In order to adapt to the dynamic and complex grid environment, the mobile agent and static agent are used at different circumstances to implement the system. The interaction workflow between the agent and grid services in grid schedule is also given. The migration of the mobile agent schedule is discussed.
  • ZHONG Weibo; JIN Shengzhen; NING Shunian
    Computer Engineering. 2006, 32(23): 27-29. https://doi.org/10.3969/j.issn.1000-3428.2006.23.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Image restoration is an important part of space solar telescope(SST) image processing. The SIMO is introduced and used in SST image restoration for its multi-channel observation. This paper proposes a SST image blind restoration algorithm based on SIMO and NAS-RIF. Simulation shows that the new blind SIMO image restoration algorithm behaves better and can be used in SST image processing.
  • HU Chunhua; WU Min; LIU Guoping; WANG Sichun
    Computer Engineering. 2006, 32(23): 30-33. https://doi.org/10.3969/j.issn.1000-3428.2006.23.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aimed to the problem that the availability of Web service workflow is influenced for the dynamic bringer and disappearance of service in the Internet, this paper proposes a method of available service workflow based on service virtual system, and analyzes the method’s structure architecture and organized protocols. It can effectively shield the physical difference of Web service and improve the availability of workflow by copying and backuping Web service in Internet. In the end, the validity is tested by the theory analyses and a real application.
  • LIU Yining; LI Hongwei; TIAN Jinbing
    Computer Engineering. 2006, 32(23): 34-35. https://doi.org/10.3969/j.issn.1000-3428.2006.23.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Micropayment schemes based on hash chain have been developed in recent years for hash function’s efficiency. Quan Son Nguyen proposed n-dimensional hash chain structure in WCC’2005. This paper analyses it is impractical, and modifies it to apply to Rivest’s payword scheme.
  • XU Wuping; YAN Puliu; XIA Delin
    Computer Engineering. 2006, 32(23): 36-39. https://doi.org/10.3969/j.issn.1000-3428.2006.23.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new distributed algorithm for the dynamic computation of multiple disjoint paths is presented, which is called p-DMR (probability-disjoint multi-paths routing), probability is adopted to format disjoint paths. Combined to a traffic balancing algorithm, its average performance is analyzed by simulation and compared against equal cost multi-path(ECMP).
  • WANG Mingqiang; WANG Xiaoyun; ZHENG Shihui
    Computer Engineering. 2006, 32(23): 40-42. https://doi.org/10.3969/j.issn.1000-3428.2006.23.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The concept of fuzzy signatures allow two entities to produce two signatures in such a way that, from the point of view of any third party, both signatures are ambiguous with respect to the identity of signing party until an extra piece of information is released by one of the parties. This paper designs a new fuzzy signature scheme based on the discrete algorithm problem. From this concurrent scheme, it proposes a signature protocol in which the signature can be fairly exchanged between signers.
  • Software Technology and Database
  • ZHANG Jianpei; YANG Yue; LIU Zhuo
    Computer Engineering. 2006, 32(23): 43-44,6. https://doi.org/10.3969/j.issn.1000-3428.2006.23.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the continual change and update of data in database, and the character of interesting in recent data in real life, an incremental mining algorithm of association rules based on sliding window filter(SWFAI) is presented. In the executing process of SWFAI algorithm, non-frequent item sets are given up in time by the way of dividing groups. The stress of main memory is abated, the times of scan of database are cut down, and the algorithm executes more efficient mining of association rules in time-variant database. An experiment is designed to prove that SWFAI algorithm can perform the mining of association rules availably, and the efficiency is improved at a certain extent.
  • HUANG Chao; WU Qinglie; WU Zhong
    Computer Engineering. 2006, 32(23): 45-46,5. https://doi.org/10.3969/j.issn.1000-3428.2006.23.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new type of nonseparable biorthogonal symmetric wavelet filter is constructed. The coefficients of this filter are rational, the corresponding wavelet function has 4 vanishing moments and the scaling function has better Hölder smoothness. Boundary extension method for data reconstruction based on this filter is also proposed. The experiment results by using SPIHT and SPECK algorithms show that the filter has good performances on two dimension data compression.
  • LI Shan; WANG Xiaoyan; WANG Jian; SHENG Yijun
    Computer Engineering. 2006, 32(23): 47-48,6. https://doi.org/10.3969/j.issn.1000-3428.2006.23.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the feasibility of business process reengineering based on timed Petri net. By using timed Petri model, the deadlock, manufacturing lead date, executing time and resource cost of manufacturing process are analyzed and evaluated. At last, the enterprise will reduce the blindness and risk of process reengineering by analysis results.
  • QI Ning; ZHAO Rongcai
    Computer Engineering. 2006, 32(23): 49-51. https://doi.org/10.3969/j.issn.1000-3428.2006.23.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the translation of IA-64 binary code, one of the important problems is that of recognizing the switch statements implemented via jump table. The paper first analyzes the compiler’s strategies when creating jump table, then presents a technique for recognizing and recovering switch statements by combination of forward prefetch and backwards slicing plus expression substitution, reduces to a normal form which allows people to determine where the jump table is located, proposes a method to recovery the target addresses of jump table. Using such a technique, it can translate the IA-64 binary code that contains jump table into high level switch statements. The presented technique is tested in a binary translation framework I2A. The test shows that the technique is suitable for IA-64 binary code generated by compiler gcc 2.96 and gcc 3.2.3 with multi optimization options.
  • YE Zhou; WANG Dong
    Computer Engineering. 2006, 32(23): 52-54. https://doi.org/10.3969/j.issn.1000-3428.2006.23.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Previous researches on data cleansing use inflexible hardcode or inefficient manual work to detect and repair data quality problems. This paper presents a rules engine based data cleansing architecture(REBDCA) to solve this problem. REBDCA uses rules to describe data cleansing logic and then uses rules engine to excute it. An integration of REBDCA and ETL tool is presented as an example, and its performance is measured.
  • XU Yi; PENG Xin; ZHAO Wenyun
    Computer Engineering. 2006, 32(23): 55-57. https://doi.org/10.3969/j.issn.1000-3428.2006.23.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The component-oriented software architecture (SA) is composed by components and connectors, in which connector plays a very important role. Nonetheless, the existing connector models can only allow the specific SA style, and lacks a general connector model to support. A general connector model is presented to describe different connector types. Now, components’ interactions are becoming the core of components’ composition, an effect way to conquer the problem is using complex component. Based on the general connector model, four composition mechanisms are presented to fit component composition and dynamic software architecture.
  • YIN Yixin; QIU Bo; HU Changjun; XU Zhengguang; WANG Jue
    Computer Engineering. 2006, 32(23): 58-60. https://doi.org/10.3969/j.issn.1000-3428.2006.23.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is an effective way to advance the cluster system efficiency that implements the MPI functions efficiently based on those various cluster low-level communication libraries. MPI_HPCL(Massage Passing Interface Based HPCL_USTB) is just an implementation of zero-copy MPI on the top of a cluster low-level communication library named HPCL_USTB(High Performance Communication Lib of USTB). It is capable of managing pin-down memory and avoiding deadlock. MPI_HPCL realizes the characteristics of good efficiency, safety and reliability by adopting some methods, such as separating the control of the send/receive pin-down memory and using the delayed queue.
  • YUAN Mingxuan; ZHANG Xuanping; JIANG Yu; ZHAO Zhongmeng
    Computer Engineering. 2006, 32(23): 61-63. https://doi.org/10.3969/j.issn.1000-3428.2006.23.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A common Web page could be separated into two categories: valuable segments and noise segments. The first step of information retrieval on the Web is to eliminate noise segments or blocks. This paper studies the properties of Web pages and finds out that Web pages with a common URL prefix always have the similar presentation styles and noise segments. Based on vision-based page segmentation (VIPS), it proposes an approximate sub-tree matching algorithm, which could be used to eliminate noise segmentations in a Web page. The implemented algorithm could achieve 95% accurate noise block.
  • MA Zhen; ZHANG Yikun; LIANG Rong; LU Xiaofeng; XU Yanli; XIE Jiancang
    Computer Engineering. 2006, 32(23): 64-67. https://doi.org/10.3969/j.issn.1000-3428.2006.23.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper suggests a model of test case generation of component-based software (MTCGCBS) based on an immune genetic algorithm (IGA), and introduces the basic thought of IGA. Through comparing IGA with both traditional genetic algorithm and random algorithm, IGA is further proved to be superior in generating test case for component-based software, and at the same time, the correctness of MTCGCBS is validated.
  • LI Chao; YU Zhaoping
    Computer Engineering. 2006, 32(23): 68-69. https://doi.org/10.3969/j.issn.1000-3428.2006.23.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper improves Apriori algorithm based on Matrix. At the same time, improves the algorithm of finding association rules. It can reduce the times of accessing database to enhance the efficiency of this algorithm. The examples show that the algorithm is an effective method of association rulers mining.
  • WANG Xia; MA Zhongmei; HE Xiaoqing; JIANG Wenrui; HUANG Wuling
    Computer Engineering. 2006, 32(23): 70-72,9. https://doi.org/10.3969/j.issn.1000-3428.2006.23.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Linux with real-time constraints are growing in the field of embedded system. In order to break through obstacle in real-time applications aspects, it is sensible to add preempt feature in Linux kernel, improve timer resolution and modify schedule strategy to satisfy real-time requirments. The thesis summarizes several modification methods of improving timer resolution and focuses on popular method named HRT, which applies comprehensively in embedded Linux system.
  • YANG Aihua; BAI Xiaoying
    Computer Engineering. 2006, 32(23): 73-75. https://doi.org/10.3969/j.issn.1000-3428.2006.23.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a newly developed prototype STACMS for supporting the management of software test assets. This tool applies the methodology of software configuration management to the test process. It is constructed to trace the evolution of test artifacts, maintain the relationships between different versions and support change impact analysis.
  • YAN Jingui; LUO Jun; ZHOU Nana
    Computer Engineering. 2006, 32(23): 76-77,8. https://doi.org/10.3969/j.issn.1000-3428.2006.23.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on RDB, this paper introduces the hierarchic primary key model (HPKM) based on E-R model and its strongpoints, presents the approach of the transformation from E-R model to HPKM, discusses the dimensional hiberarchy of HPKM. It analyzes the method of the transformation from HPKM to multidimensional model.
  • QU Yu; WANG Yadi; HAN Jihong; ZHAO Yu
    Computer Engineering. 2006, 32(23): 78-81. https://doi.org/10.3969/j.issn.1000-3428.2006.23.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analysis of BM algorithm, this article represents a new pattern-matching algorithm, namely QBM algorithm. This algorithm uses the concept of max-length prefix, and applies only one shift table to calculate the movement distance of pattern strand. The article proves that QBM algorithm is superior to BM algorithm from the aspects of theory and practice.
  • YANG Hebiao; ZHANG Jimin; ZHU Yuquan
    Computer Engineering. 2006, 32(23): 82-84. https://doi.org/10.3969/j.issn.1000-3428.2006.23.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The relations of the dependencies are found and formalized. The scope of impact raised by requirements change is confirmed by backtracing algorithm, and the impact is quantitively described by using impact factor. Then the algorithm is presented to evaluate the impact of this quantitive description. An example of case study shows the feasibility of this evaluation algorithm.
  • SHEN Jinrong; LIU Xiang
    Computer Engineering. 2006, 32(23): 85-87,1. https://doi.org/10.3969/j.issn.1000-3428.2006.23.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Lucubrating the frame, the design and the user interface of the embedded system will do great help to the development and the implication of the embedded system. The passage takes μC/OS-II kernel of RTOS for example, analyses the task arrangement mechanism of the OS, and together with example of the project, and shows the process of the multi-task scheduler realization.
  • ZHANG Bing; WU Quanyuan; PENG Kun
    Computer Engineering. 2006, 32(23): 88-90. https://doi.org/10.3969/j.issn.1000-3428.2006.23.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the problem in server-based enterprise application integration and J2EE connector architecture specification published by Sun microsystems, a solution about integration J2EE application server with InforBroker is introduced. A resource adapter called InforBroker/RA is designed and implemented. Layer architecture is adopted in the design of the resource adapter, the mechanism of integration and the implementation of connection management, interaction standard and security control is described.
  • CAI Miaohong; WANG Qing
    Computer Engineering. 2006, 32(23): 91-93. https://doi.org/10.3969/j.issn.1000-3428.2006.23.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A favorable embedded spatial index framework, named ESIL, which is suitable for mobile GIS platform is presented. Based on the visitor design pattern, the spatial index interface is designed. The spatial index module is implemented using the R-tree data structure and algorithms. And based on the adapter design pattern, index structure and spatial data are accessed and persisted in the relational table. The application results indicate that ESIL can improve query efficiency, enhance storage management ability, and is provided with better extensibility and flexibility.
  • Networks and Communications
  • TIAN Jing; HUANG Yalou; WANG Liwen; LI Guohong
    Computer Engineering. 2006, 32(23): 94-96. https://doi.org/10.3969/j.issn.1000-3428.2006.23.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Message model in the worst-case for CAN bus is analyzed and a schedule algorithm based on fixed priority is proposed. According to the requirement and characteristic of the real control system, messages which are transferred in the six degree of freedom system are scheduled with the fixed priority algorithm. Through experiments, it is proved that the algorithm improves the performance of the six degree of freedom system and the networks utilization. It is also proved that the messages deadline is satisfied.
  • WU Xianguo; LIU Min;
    Computer Engineering. 2006, 32(23): 97-99. https://doi.org/10.3969/j.issn.1000-3428.2006.23.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The IPv6 tunnel broker is designed for scatted users and is an important mechanism of transition from IPv4 to IPv6. However, the mechanism does not support NAT users, which generally exist in the world widely, especially in China. The mechanism is modified to allow NAT users to connect with IPv6 networks. The system is implemented on Linux platforms and the performance of the tunnel server is tested.

  • LU Jinjun; WANG Zhiquan
    Computer Engineering. 2006, 32(23): 100-103. https://doi.org/10.3969/j.issn.1000-3428.2006.23.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Chaotic characteristics of the Internet traffic data flows is studied on the theory of the phase space reconstruction, and some parameters such as correlative dimension and Lyapunov exponent are computed, the Internet traffic chaos phenomena lying in Internet traffic data flows are demonstrated. A radial basic function(RBF) neutral network model is constructed to forecast the Internet traffic data flows. The simulation results show that the forecast method of the RBF neutral network compared with the forecast method of back propagation (BP) neutral network has faster learning capacity and higher accuracy of forecast.
  • YANG Zhijun; ZHAO Dongfeng
    Computer Engineering. 2006, 32(23): 104-105. https://doi.org/10.3969/j.issn.1000-3428.2006.23.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the development of network technology, how to efficiently manage network becomes outstanding and especially fault management is crucial. This paper analyzes the polling scheme based on SNMP, and proposes a new algorithm for polling system. By the embedded Markov chain theory and the generation function method, the mathematic model is explicitly obtained. Theoretical analysis and simulation results demonstrate the efficiency of new algorithm.
  • CUI Can; CHANG Yilin; ZHENG Jianqun
    Computer Engineering. 2006, 32(23): 106-107,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To improve the management on the topology, devices status and traffic engineering of the wireless subnet of Tactical Internet(TI), a novel solution using active network technologies is presented. The active network management server is allocated in TI gateway or radio controller. It is used to detect the information about network membership and perceive node working status, link status etc., and control packets routing, select delivery priority and transport protocol automatically based on transported message type and queue information. This passive detection and active calculation method enhances TI management service and policy, reduces management reaction time and unnecessary network management traffics, improves network service capability. It can also work well with SNMP system and gives a practical way for traffic engineering and service management.
  • GAO Shengguo; WANG Hanxing;
    Computer Engineering. 2006, 32(23): 108-110. https://doi.org/10.3969/j.issn.1000-3428.2006.23.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In AODV routing protocol, an intermediate node can reply a RREQ when it has a route with a sequence number that is greater than or equal to that contained in the RREQ, no matter how many packets are waiting to send in it. These routes’ performance may degrade because local congestions may incur on those nodes with the increase of offered load. This paper proposes an improved-AODV routing protocol, which only allow the intermediate nodes whose sending queues are not too long can reply a RREQ or locally repair a route to decrease local congestions. The simulation results show that improved-AODV performs better than AODV.
  • ZHANG Xiaoyu; JIN Lianfu
    Computer Engineering. 2006, 32(23): 111-113. https://doi.org/10.3969/j.issn.1000-3428.2006.23.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To aim at the requirement of flexibility, scalability and robustness in daemon design, the paper presents a message-map based control pattern that integrates the message handling mechanism in Windows programming and FSM often used in daemon design so that it can support consistent handling to daemon’s multiservice and multiversion, smooth switch of users’ current type of service, convenient modification of implementation and redefinition of program’s flow.
  • CHEN Xiaomin; GUO Aihuang;
    Computer Engineering. 2006, 32(23): 114-115,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In terms of split-step Fourier transform, the numerical solution of nonlinear coupled Schrodinger equation is gotten, a 40Gbps WDM propagation model is established. The propagation performances of RZ and NRZ are simulated, and the results are analyzed by time-frequency analysis. The simulation results show that RZ format has more concentrated energy distribution and a lower BER. And PMD is restrained in some degree when RZ format is used. With the same power, the peak value of RZ format is higher than NRZ format, so that the require of OSNR in system is less. It is favorable for the existing optical system of 10Gbps to update to the system of 40Gbps。
  • CAI Jiayong; LI Dan; CHEN Mo
    Computer Engineering. 2006, 32(23): 116-118. https://doi.org/10.3969/j.issn.1000-3428.2006.23.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Session initiation protocol(SIP), which is delivered by IEFT for IP telephone signaling, is greatly used in video-phone, instant- messaging, and etc. recently. However what makes SIP difficult is the widely using of NAT devices in network, so how to traverse NAT efficiently becomes the SIP researching hotspot. All the existed approaches are reviewed for SIP NAT traversing, and found out their limitation in topology and flexibility. Basing on understanding on SIP, a new SIP NAT traverse approach is developed, which keeps the flexibility of SIP without assuming any topology and maintaining too much addresses mapping information. In the end, the transparency of the approach through a full test is demonstrated.
  • ZHAO Zhengrong; LAN Julong
    Computer Engineering. 2006, 32(23): 119-120,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the development of IPv6 and MPLS protocols, forwarding engines need provide the line speed processing of IPv4, IPv6 and MPLS packets. The usual way is to establish different processing channels for each type, which consumes a lot of logic and store resources. This paper puts forward a solution that processes the IPv4, IPv6 and MPLS packets in a single channel. The experiments demonstrate this solution makes a 10Gbps forwarding performance.
  • TAO Yi; WANG Dong
    Computer Engineering. 2006, 32(23): 121-123. https://doi.org/10.3969/j.issn.1000-3428.2006.23.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Internet topology graph is a powerful tool to develop and utilize Internet on a large scale. The Internet As level topology graph portrays Internet characteristic on the autonomous system level and has the widespread application on many domains at present. This paper proposes a Complete-Waxman-Tree(CWT) hiberarchy algorithm that can generate Internet As-level topology graph with three levels, which are consistent with the Internet very well in the distribution of the node’s degree, the tree’s size and the tree’s depth.
  • CHEN Junhua; WANG Zhongmin
    Computer Engineering. 2006, 32(23): 124-126. https://doi.org/10.3969/j.issn.1000-3428.2006.23.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The technology of VPN provides a secure reliable manageable Internet service for scattered departments. This paper illustrates the application field and network structure of BGP/MPLS VPN, discusses the producing course of routing information and the transmitting course of data information in BGP/MPLS VPN.
  • CHU Rui; HUANG Yongzhong; HU Jianwei
    Computer Engineering. 2006, 32(23): 127-128,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As a kind of wide area and large scale distributed environment, grid has large numbers of resources. The resources are complicated, distributed and dynamic. It is very possible to design a management mechanism in the environment, which can provide information service about the information of resources login, resources discovery and resources state for users and will be shown to users as a single system image. The paper designs a model of information service system in the grid enviourment, and gives a concrete implementation based on Web Service and LDAP.
  • ZHANG Li; WANG Yongjun
    Computer Engineering. 2006, 32(23): 129-131. https://doi.org/10.3969/j.issn.1000-3428.2006.23.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traffic engineering is a key technology to improve network performance, and constraint-based routing(CBR) associating with MPLS is a new way to realize it. This paper proposes a new dynamic CBR algorithm——TERA, which satisfies bandwidth constraint and aims to achieve high throughput while holding network load balanced. After giving the mathematic model of TERA, it analyzes and describes the algorithm. Simulation result and conclusion are given.
  • Security Technology
  • ZHAO Hongzhi; WANG Qin; JING Tao
    Computer Engineering. 2006, 32(23): 132-134. https://doi.org/10.3969/j.issn.1000-3428.2006.23.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper expatiates one kind of secure network computer system which characterizes high usage of network resources, excellent user mobility and security. It discusses the design goal, architecture, character, function model and the main procedure. This system can meet the demand in area such as e-government .
  • ZHANG Haojun ; ZHU Yuefei
    Computer Engineering. 2006, 32(23): 135-136,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Several shortcomings of two security standards in WLAN: IEEE 802.11i and WAPI are analyzed on efficiency and security. A fast/efficient authentication scheme for WLAN (FWAI) is proposed, which is based on tokens derived from Hash chains. Compared with 802.11i and WAPI, the proposed scheme needs fewer messages to authenticate STA in the foremost time, as well as session keys are negotiated efficiently. The scheme canot only against personating STA, AP and AS and messages replay attacks, but also can against DoS attacks effectively.
  • FANG Dingyi; TANG Zhanyong; CHEN Xiaojiang; WU Xiaonan
    Computer Engineering. 2006, 32(23): 137-139. https://doi.org/10.3969/j.issn.1000-3428.2006.23.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Because of the deficiency of unknown worms behavior analysis in traditional honeynet, an optimized solution based on genetic algorithms is proposed. The worms’ behavior item collection is described accurately by defining behavior vector structure, and the unknown worm behavior profile mining is optimized using genetic algorithms. The contrast research indicates that the solution has the remarkable improvement in two aspects, that is, the integrality and prediction of unknown worm behavior items are enhanced, and the support degree and confidence rate to the behavior pattern are increased. Using pattern familiarity comparison, statistical and experimental results on the behavior detection of the system infected specific worm’s are illustrated and analyzed, which indicate that the algorithm is more intelligent and adaptive than those using the pure knowledge engineering approaches.
  • QIAN Pengjiang; WANG Shitong
    Computer Engineering. 2006, 32(23): 140-142. https://doi.org/10.3969/j.issn.1000-3428.2006.23.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes the security trouble of authentication algorithm based on environment variable in CGI mode and points out it’s caused by excessively trust the environment variable of server. Moreover, this paper also introduces a replaced algorithm based on validation of random image code with irregular background in client.
  • ZHANG Ning; CHEN Zhixiong; XIAO Guozhen
    Computer Engineering. 2006, 32(23): 143-144,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Fast scalar multiplication on two family of supersingular elliptic curves in characteristic 2 and 3 is discussed. Provable secure cryptographic scheme can be obtained on these curves. With the complex multiplication property of these curves, a fast algorithm without precomputation is derived from Frobenius endomorphism and another fast endomorphism, which is 4 times and 3 times faster than IEEE1363 standard method.
  • LI Yueqiang; SUN Xingming; ZHOU Tianliang
    Computer Engineering. 2006, 32(23): 145-147,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new algorithm of digital audio watermark based on the complex cepstrum transform. The audio signal is divided into several frames which include the same samples, the mean value of frames is calculated, the frames of mean value is greater than or equal 0 is transformed by complex cepstrum, and mean value of complex cepstrum coefficient of the frames and threshold value is compared, according to the result of comparison and combining watermark bit, adopting the way of not changing, increasing or reducing coefficient of the complex cepstrum. Watermark is embedded into the complex cepstrum coefficients. The result demonstrates that the algorithm is robust, transparent and blind against common signal processing manipulations and attacks, such as re-sample, remodulation, noise, low-pass filter and conversion etc.
  • LI Sujuan; ZHANG Futai; HUANG Xinyi
    Computer Engineering. 2006, 32(23): 148-150. https://doi.org/10.3969/j.issn.1000-3428.2006.23.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Proxy signature and designated-verifier signature are useful tools in cryptography. They both have wide applications in real life. In a proxy signature, an original signer can delegate his signing power to a proxy signer who signs a message on behalf of the original signer. In a designated-verifier signature the verifier is restrictive. The characteristics of proxy signatures and designated-verifier signatures are combined. Using the schnorr signature scheme based on DLP, a designated-verifier proxy signature scheme is presented. The new scheme satisfies the security properties of both proxy signature schemes and designated-verifier signature schemes. Analysis shows that the new scheme is secure and efficient in computation and communication.
  • CHEN Lei; XU Aiqing
    Computer Engineering. 2006, 32(23): 151-152. https://doi.org/10.3969/j.issn.1000-3428.2006.23.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new reputation evaluation system for P2P network based on super-node structure. This system not only can help to build trust between peers based on the feedback from other peers, but also can detect malicious peers to maintain the P2P network in proper operation.
  • LI Zongxiu; BAO Wansu; WANG Xiang
    Computer Engineering. 2006, 32(23): 153-155,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the security of Elgamal elliptic curve cryptosystem with Brier-Joye formula on binary fields, proposes some countermeasures to collision-point attack and gives standards of choosing elliptic curves to resist side channel attack, which make the Brier-Joye formula work well.
  • BAO Kejin; SONG Yonggang
    Computer Engineering. 2006, 32(23): 156-158,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Finite field inversion, an important module of elliptic curve cryptosystems and hyper-elliptic curve cryptosystems, is introduced. Through analyzing and comparing three inversion algorithms that have been invented, an optimized fast algorithm based on FPGA is put forward. According to the optimized algorithm, an inversion module is designed and realized with VHDL. This design is compiled, synthesized, and fitted into Altera’s EP1S10F780C6 FPGA, using its QuartusII software. The result indicates that this optimized algorithm has advanced performance in both speed and area than other past algorithms.
  • LI Yongzhong; SUN Yan; LUO Junsheng
    Computer Engineering. 2006, 32(23): 159-161. https://doi.org/10.3969/j.issn.1000-3428.2006.23.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characteristics of IDS, the sequence pattern data mining algorithm is applied to IDS in this paper. The algorithm of WINEPI in IDS is presented, and the instance of using WINEPI algorithm is also presented. The results of sequence pattern data mining are explained.
  • ZANG Ping; FAN Yanbin
    Computer Engineering. 2006, 32(23): 162-164. https://doi.org/10.3969/j.issn.1000-3428.2006.23.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Image watermark based on wavelet packet and multi-wavelet is researched and compared here. Different images are used in the experiment and the result is studied comparatively. These results appear that under the same conditions such as the primary image, the position of watermark and the styles of attacks, image watermark based on multi-wavelet is better in attacks such as noise, filtering, and image swelling. While wavelet packet is more robust, it can better adapt the image than multi-wavelet, especially in the attacks of cut and JPEG compressing. Moreover, wavelet packer watermark is realized simply and it is more practical.
  • HAN Ruofei; WANG Houxiang; DU Hui; WANG Lu
    Computer Engineering. 2006, 32(23): 165-167,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The traditional mandatory access control tragedy (MAC), which is weak in maneuverability and flexibility, can not fit well in the military field gradually, which is definitely divided into several posts, geographically widely distributed and high real-timely demanded as well. The task_role_based access control tragedy (T_RBAC) which combines advantages of both RBAC and TBAC has a good practicability. The spirit of MAC is analyzed and then introduced into a task_role_based access control model. At last, a task_role_based access control model for military use is built, and its capability is simply analyzed.
  • LI Li; ZHU Congxu; CHEN Zhigang
    Computer Engineering. 2006, 32(23): 168-170. https://doi.org/10.3969/j.issn.1000-3428.2006.23.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper points out that the substitute encryption algorithm proposed in reference1 cannot resist known-plaintext attack. The analyses show that the key of this cipher can be found with very few known plaintext-cipher pairs; and the permutation algorithm is only provided with very small key space. So an attack scheme is proposed, and the example of the attack scheme successfully brokes the encryption algorithm. A proposal for improvement algorithm is proposed, too.
  • CAO Sihua; HE Hongjun;
    Computer Engineering. 2006, 32(23): 171-173. https://doi.org/10.3969/j.issn.1000-3428.2006.23.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the design and implementation of the current security systems based on BLP model, subject’s security label and access right inherit from the user’s. This may enlarge the access ability which violates the least privilege theorem and give the malious subject the chance to gain higher security label and more rights to steal and damage information. To solve this problem, the paper presents an improved BLP model based on user’s intention——IB_BLP model. In the new model, subject needs to get user’s intention to meet the least privilege theorem while accessing object.
  • DU Yusong; WANG Daxing; SHEN Jing
    Computer Engineering. 2006, 32(23): 174-176. https://doi.org/10.3969/j.issn.1000-3428.2006.23.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The principle of a kind of differential fault analysis on AES-128 is described. The attacking algorithm is given. The probability of accomplishing the algorithm is analyzed. The intermediate encrypted result M9 is obtained by the algorithm, the last round key of AES-128 can be deduced from M9 and a correct cipher text, the initial key of AES-128 is then recovered. The result of software emulation shows that if one induces 140 bit faults into M9 repeatedly and randomly, the probability of recovering the initial key is more than 90%, when physical techniques are available. It is presented that AES with CBC mode can counter the attack mentioned above.
  • WANG Yong
    Computer Engineering. 2006, 32(23): 177-179.
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper brings out the concept of key authentic degree in the light of the rubber-hose attack and ciphertext only attack. At the same time, a new cryptosystem that has low key authentic degree is designed. When it is used to encrypt, it is easy to find pseudokeys that can confuse and mislead cryptanalyst.
  • Artificial Intelligence and Recognition Technology
  • JIANG Xiangkui; YUAN Sicong; WANG Fazhan
    Computer Engineering. 2006, 32(23): 180-182. https://doi.org/10.3969/j.issn.1000-3428.2006.23.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper discusses the application of grey system theory to image retrieval using relevance feedback and proposes a kind of image retrieval algorithm using relevance feedback based on grey system theory. It dynamically updates the query vectors in order to make image retrieval results nearer to people’s subjective perception, so it has the character of self-adaptation. The experiment results indicate that the method in the article is very effectual.
  • ZHOU Siyue; GONG Zhenbang; YUAN Jun
    Computer Engineering. 2006, 32(23): 183-185. https://doi.org/10.3969/j.issn.1000-3428.2006.23.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Controlling the grasp mode is a very important part of the manipulation of the dexterous hand. This paper describes three typical grasp modes, parallel grasp mode, center grasp mode and nipper grasp mode. Regarded as input variable for the size of object and output variable for the grasp modes, the paper introduces a controlling arithmetic of dexterous hand grasp mode based on fuzzy logic and deduces the arithmetic. The application in the dexterous hand virtual teleoperation system shows that the arithmetic control of dexterous hand grasp mode is correct and valuable.
  • CHEN Zhong; ZHAO Zhongmin
    Computer Engineering. 2006, 32(23): 186-187,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Watershed transformation is a powerful morphological tool for image segmentation, which can automatically generate a series of closed segmentation regions. However, the watershed transformation might give rise to over-segmentation. In order to overcome the inherent drawback of watershed algorithm-over-segmentation, a kind of non-linear filter algorithm and a modified fast region merging algorithm are proposed to improve initial segmentation result obtained by the watershed transformation. According to the all kinds of characteristic explored from the high resolution remote sensing image, the modified fast region merging is implemented combined with multi-characteristic. Experimental results show the proposed algorithm not only can obtain the good segmentation result by making good use of the characteristics explored from the high resolution image, but also the processing time are drastically reduced.
  • HE Tingting; ZHANG Yong
    Computer Engineering. 2006, 32(23): 188-190. https://doi.org/10.3969/j.issn.1000-3428.2006.23.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In view of Chinese word characteristic, this paper proposes an ATE algorithm, which is based on the decomposition of prime string. Word can be classified to two groups: prime words with simple structure and combined words with complex structure. Prime words are extracted using the F-MI parameter, and combined words are extracted by the decomposition of prime string. Experiments show the algorithm can effectively improve the precision in Chinese ATE. Now this method has been applied to the project of National Language Resources Monitor & Research Center (Network Media) for the extraction of words online.
  • FANG Huan; YIN Yulan; XU Yuyin
    Computer Engineering. 2006, 32(23): 191-192,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the proof of first-order predicate propositions. By using predicate/transition net, first-order predicate propositions of general form can be expressed. Furthermore, two proving methods, which are proved by graphics and matrix are proposed. In the end, an example is given to illustrate the main idea of the proving procedure.
  • YUAN Yuan; LI Bingfa; YANG Jie; DING Ying; PENG Daiyi
    Computer Engineering. 2006, 32(23): 193-195,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new parallel iterative deepening A* searching algorithm by discussing iterative deepening A* algorithm and its parallel properties. This algorithm has the advantages in both static and dynamic load balancing, and achieves very high speedup and efficiency. It shows how to realize Java RMI with this algorithm. The experimentations on 72-node parallel machine indicate that this algorithm can improve the speedup and efficiency of parallel searching algorithm heavily.
  • LIU Yan; LU Yuchang
    Computer Engineering. 2006, 32(23): 196-198. https://doi.org/10.3969/j.issn.1000-3428.2006.23.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Plan for learning path in ICAI is important symbol of intelligent system. There are much drawdown of knowledge points in learning, which don’t reach purpose for learning effect. Aiming at this, this paper makes use of Apriori algorithm in data mining concept and technique. Association rules are finded and applied for drawdown of knowledge points based on large knowledge base. Intelligent plan algorithm is given for path to rectify learning. This improves ability of ICAI to teach students in accordance with their aptitude.
  • LU Xiaoliang; CHEN Jirong; HUANG Gexiang
    Computer Engineering. 2006, 32(23): 199-201. https://doi.org/10.3969/j.issn.1000-3428.2006.23.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the principle and algorithm of independent component analysis (ICA) and then puts forward a new method to recognize finite set characters utilizing ICA and support vector machines(SVM). It develops the “one-versus-one” model of multi-classification of traditional SVM and at the same time reduces the influence of undivided area. The presented algorithm can be applied to the recognition of license plate characters, handwritten English letters, handwritten numbers, printed letters, printed numbers and other finite set characters. The experiments to recognize Chinese characters on license plates and handwritten English characters can achieve a recognition rate of more than 95%. The results show that this algorithm holds advantage in the finite set characters recognition.
  • TIAN Xuedong; LI Na; XU Lijuan
    Computer Engineering. 2006, 32(23): 202-204,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Mathematical expressions recognition is an important part of OCR technology. It is also a bottleneck in the development of recognition technology. To the structural analysis stage, which is a crucial course in printed formula recognition, this paper proposes a method which makes use of baseline and operator range with syntax analysis based on the introduction of the development state of mathematical expressions recognition. In experiments, this method shows robust adaptability for the structure of mathematical expressions, and will have a good foreground.
  • WANG Mingxin; ZHOU Shaomei
    Computer Engineering. 2006, 32(23): 205-207. https://doi.org/10.3969/j.issn.1000-3428.2006.23.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The solution of imbalance B-assignment problem is studied. An assignment’s model and network are discussed, and then a new algorithm based on transient chaotic neural networks is proposed. The results show the proposed performance and the quality of solution are better than that based on Hopfield neural networks. The TCNN is extended for solving file assignment problem(FAP), which is of one of the NP-complete problems.
  • ZHANG Yongqiang; CHEN Huashan
    Computer Engineering. 2006, 32(23): 208-210,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the problem of IP network traffic modeling and predicting, this thesis puts forward an ameliorated model, which is included ordinary differential equation based on the traditional GP model that has some shortages on the precision of traffic behavior and the extrapolated capability of the evolvement. The dynamic description capability of the model can be improved. The complexity of the model can be reformed, and the IP network traffic transformation orderliness can be reflected accurately.
  • ZHAO Lei; ZHU Wenxing
    Computer Engineering. 2006, 32(23): 211-213. https://doi.org/10.3969/j.issn.1000-3428.2006.23.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper puts forward a new definition for the comprehensibility of a classification rule. The paper also gives a method for computing a rule’s comprehensibility by using attribute’s information gain. The method of mining classification rules using GA is also analyzed. The experiment on breast cancer statistical data shows that it can find accurate as well as comprehensible rules.
  • WU Qin; HOU Chaozhen; YUAN Jumei
    Computer Engineering. 2006, 32(23): 214-215. https://doi.org/10.3969/j.issn.1000-3428.2006.23.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the problem which different results predicted by different reliability models for the same software in practice of reliability engineering of software, this paper presents a new method using neural network to get a multi-model prediction method for software reliability. This technique solves the problem in practice of reliability engineering of software more availably. It uses some data sets to demonstrate the approach’s efficiency.
  • SHEN Lei; SHI Shengping; YAN Jikun
    Computer Engineering. 2006, 32(23): 216-217,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies how to classify unbalanced data using single side bagging and LPU. The main steps of the classification are as below: the paper labels all unlabeled data to be negative, and together with the positive data to train single side bagging classifier. After that, it uses the classifier to classify unlabeled data to get reliable negative (RN), then uses the positive data and RN to train SSBagging classifier. As one important technique of LPU is using Rocchio method and EM algorithm in the steps, it compares this method of LPU and the proposed method, finding that the latter one is better than the former when it is very distinctive of the unbalancity of data.
  • Multimedia Technology and Application
  • HAN Weijie; ZHANG Wen; LI Xiaomei
    Computer Engineering. 2006, 32(23): 218-220. https://doi.org/10.3969/j.issn.1000-3428.2006.23.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Grid-oriented data visualization shares geographically distributed data sources, analysis facilities and visualization facilities, and also supplies transparent data access capabilities. This paper develops a Web-based visualization system on the grid and the system divides into three components: Web Sheet, Web server, visualization server. The system supplies the users with Web access interface built on JSP, and the embedded VisPortal supplies grid access portal. Web server is to manipulate, dispatch, utilize grid resources, and coordinate the interaction between the user and the grid resources. It builds a visualization server based on Vis5D as a grid source, which implements visualization of 5-D grid datasets generated from the numerical weather model.
  • GAO Shangbin; ZHANG Jianwei; XIA Deshen
    Computer Engineering. 2006, 32(23): 221-223. https://doi.org/10.3969/j.issn.1000-3428.2006.23.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the research of the fractal image coding in DCT domain, this paper presents an improved algorithm. In the improved algorithm, plain blocks are selected based on human visual system. Then by selecting out the uniform parts in the DCT domain, the direct current encodes directly without any fractal matching. For matching time reducing, the mean squared error computations of the eight orientations of the domain blocks are simply reduced into two groups of inner products in the DCT domain. The result shows for the same matching errors, this algorithm not only makes the image compressed effectively with high PSNR and much better visual effect, but also reduces processing time in an efficient way.
  • GUO Weiqing; ZHAO Jianfeng; WU Xiaogang
    Computer Engineering. 2006, 32(23): 224-225,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming for the 3D surface reconstruction with precise cross-sectional data, a surface skinning reconstruction method based on NURBS is proposed. The method produces a continuous NURBS surface, it improves the weakness that surface shape loses the true and calculation is unsteady when traditional methods of surface reconstruction is dealing with non-uniform 3-D scanned data points. The method is verified in practical system.
  • CUI Xiutao; GUO Zhongjun; HE Li; LI Zhuohui; GU Junzhong
    Computer Engineering. 2006, 32(23): 226-228. https://doi.org/10.3969/j.issn.1000-3428.2006.23.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the implementation way of T.120 data conference in H.323 multimedia conference system, proposes an improved out-band method by which the development of conference is simple, the structure is flexible. At last it proves the feasibility way through the conference development and implementation.
  • Engineer Application Technology and Realization
  • FENG Yalin; ZHANG Shuping
    Computer Engineering. 2006, 32(23): 229-231. https://doi.org/10.3969/j.issn.1000-3428.2006.23.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As a development direction of IC in 21st century, SoC, based on IP core reusing technique, very deep sub-micron technique, co-design of software and hardware technique, is a revolution in system integration and microelectronic design. The challenges in design and verification of SoC, development and reuse of IP core and physical synthesis in very deep sub-micron, co-design of software and hardware, low pawer design, design for test and reusability technique of engineering oriented SoC are described.
  • CHEN Mingxue; ZUO Siyuan
    Computer Engineering. 2006, 32(23): 232-235. https://doi.org/10.3969/j.issn.1000-3428.2006.23.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    At present, there is not the equipment to test railcar electro-door control unit on the spot. The efficiency and veracity is very low by hand-test, and tester is required to know well the design of railcar electro-door control unit. Based on the analysis of the principle and logic by hand-test, this paper designs the equipment with embedded CPU and Linux, so test man can easily make a quantitative analysis. The paper introduces the equipment’s structure, function and main technique.
  • QI Yue; LI Zhancai; WANG Qin
    Computer Engineering. 2006, 32(23): 236-237,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In recent years, power consumption along with silicon area has become the key factor in the chip design, especially in the digital signal process block. Most of digital signal process block are designed in standard cell. One way of low power design based on standard cell is using minimum-sized device. This paper presents a low-power scheme for the VLSI implementation of finite-impulse response (FIR) filters based on standard cell. The scheme is a cross level solution in the view of design flow. A multi-hierarchy pipeline scheme is in the architecture level, integrating addition into Wallace_Tree is used in logic level, which guarantees achieving minimum-sized device solution in circuit level. Simulation shows that 20% of the power is saved with the proposed scheme, which is flexible and can be applied to other similar designs.
  • LI Ming; YUAN Yan; YANG Yupu
    Computer Engineering. 2006, 32(23): 238-240. https://doi.org/10.3969/j.issn.1000-3428.2006.23.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes a design and realization method of EPP-CAN bus communication. The hardware composition and software realization with C on Linux system are discussed. EPP is the standard configuration of PCs, and its high-speed transmission can enhance the high-efficient and high-speed characters of CAN bus. This method provides great facilities for PC’s direct and high-efficient access to CAN bus.
  • ZHANG Tao; YAN Guozheng; LIU Hua
    Computer Engineering. 2006, 32(23): 241-243,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a new mechanics of miniature bionic hexapod robot, which combines motion with rotation rationally. The following introduction is focused on the special combination method and program design of the robot’s control system and the analysis of the kinematical stability and flexibility of the robot. In the end, it presents some experimental results and analysises. A robot prototype have been successfully maden according to the new mechanics, and it is named “Silver Scarab I”. The size of the prototype is 3cm in radius, 4.2cm in height, and it weighs 49g. The experimental result shows that the “Silver Scarab I” is very agile and reliable.
  • WANG Yuhua; NIU Liping; ZHANG Huanguo; SHEN Zhidong
    Computer Engineering. 2006, 32(23): 244-246. https://doi.org/10.3969/j.issn.1000-3428.2006.23.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the rapid development of cryptography, the strength of security protocols and encryption algorithms consumingly relies on the quality of random number. This paper presents a new and security random number generator. The philosophy architecture is based on SHA-2 (512), whose security strength ensures the unpredictability of the produced random numbers. Furthermore, an FPGA-based implementation of architecture is described. The proposed architecture is a flexible solution in many applications taking into account the performance, power consumption, flexibility, cost and area.
  • PAN Fangsheng; ZHAO Feng; XI Jun; LUO Yi
    Computer Engineering. 2006, 32(23): 247-249. https://doi.org/10.3969/j.issn.1000-3428.2006.23.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the field of high-speed real-time signal processing, the conventional single-chip system can hardly achieve goals due to poor processing ability. Therefore, multiple-processor parallel signal processing system turns to be the focus. The paper presents a parallel processing system based on 4 chips of TMS320C6701——high performance floating-point DSP of TI. The system accomplishes the communication between DSPs through the software-FIFO architecture in FPGA.
  • WU Mingxing; HAN Yinhe; HU Yu; LI Xiaowei
    Computer Engineering. 2006, 32(23): 250-252. https://doi.org/10.3969/j.issn.1000-3428.2006.23.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    After analyzing the change of test requirement, this paper presents a waveform data format based on the similar-STIL in test vector translation from EDA to ATE. Based on this waveform data format, a compressing and coding algorithm, which is to solve the large test vector, is developed. Experimental results show that this format is efficient in test vector translation and algorithm reduces the test data storage.
  • MENG Hui; LIU Xuefeng
    Computer Engineering. 2006, 32(23): 253-255,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Whether in or out of computer systems, unified bus standards and improvement of bus bandwidth are needed. This paper analyzes the feature and architecture of PCI express bus from the technical point of view, discusses the criterion of interface and physical architecture. It forecasts the foreground of the PCI express bus.
  • Developmental Research
  • MEI Denghua; MIN Huaqing
    Computer Engineering. 2006, 32(23): 256-258. https://doi.org/10.3969/j.issn.1000-3428.2006.23.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Business and flow controlling couple with each other tightly in most of commercial bank credit management system. The system is not stable when adjusting the business flow for program code changing. And it is not flexible to baffle the business expansion. It is also difficult to process the complex data flow. The paper analyzes the service of commercial bank credit, separates the service and flow controlling. It is practice effective for a commercial bank credit management system.
  • WU Jing; CHEN Shuzhen; ZENG Libo; WEI Fenfen
    Computer Engineering. 2006, 32(23): 259-260,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces reversible integer-to-integer wavelet transforms, progressive coding algorithms and entropy coding algorithms into the field of the lossless progressive transmission of medical image sequence, designs schedule algorithms, provides a lossless progressive transmission scheme suitable for the medical image sequence, gives out its VC implementation based on C/S structure. The experimental results show that the proposed scheme is simple and practical.
  • YI Ming; JIN Hai
    Computer Engineering. 2006, 32(23): 262-264. https://doi.org/10.3969/j.issn.1000-3428.2006.23.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article focuses on the design of WSRF-based WS-Resource. It introduces WSRF(Web services resource framework) and its realization in Globus Toolkit 4. The point relates the Globus Toolkits 4 platform’s foundation: common runtime, information services, execution management, data management, security, and the core of the WSRF: WS-Resource. Through the concrete step, it provides the process that constructs the WS-Resource of the good flexible function based on the Globus Toolkits 4 platform.
  • QIAN Zhibin; ZHAO Weidong
    Computer Engineering. 2006, 32(23): 265-267,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Being the kernel of realizing multi-layer GIS application, GIS middleware is capable of offering spatial information service efficiently and shielding the difference of heterogeneous spatial data source. After summarizing GIS middleware technology, BSGIS as the framework of WebGIS middleware is proposed and the system architecture, processing flow, realization of BSGIS is introduced. Moreover a government road information management system making use of key technologies of GIS middleware is developed to prove feasibility of BSGIS and to solve the problems of high complexity, lower cost and success rate in WebGIS development.
  • XU Ning; SHI Ce; CHENG Meili
    Computer Engineering. 2006, 32(23): 268-270. https://doi.org/10.3969/j.issn.1000-3428.2006.23.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The newly introduced techniques adopted by H.264/AVC encoder requires large memory space for a programmable processor implementation without optimization. An improved algorithm of mb-level (Macroblock-level) interpolation and deblocking filter are proposed for H.264/AVC encoder based on memory usage analysis of the reference software (JM8.4). In order to implement the encoder on an embedded processor, an efficient memory management scheme is also presented. Experimental results show the approach can greatly improve encoding speed (74.9%) and reduce memory complexity (cycles: 68.2%) with negligible coding efficiency loss.
  • NIE Shengwei; LU Shiqiang; CHENG Enhui
    Computer Engineering. 2006, 32(23): 271-272. https://doi.org/10.3969/j.issn.1000-3428.2006.23.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a mathematical algorithm for extended precision in 32-bit embedded system. The algorithm can be applied in the system without the support of mathematical coprocessor and provides high precision. It provides 32-bit multiplication algorithm implementation, 64-bit multiplication algorithm implementation, 32-bit division algorithm and 32-bit square root algorithm implementation.
  • YU Kanghua; LU Yiqin; LV Jin
    Computer Engineering. 2006, 32(23): 273-274,. https://doi.org/10.3969/j.issn.1000-3428.2006.23.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes the software and hardware system of a renovated PDA based on ARM9. The architecture and general task are introduced. How to implement wireless Internet connection with GPRS module and ViewML embedded Web browser is proposed, and how to support Java downloading with ViewML is also presented.
  • SHENG Huixing; WANG Haibin; SHEN Jianli
    Computer Engineering. 2006, 32(23): 275-277. https://doi.org/10.3969/j.issn.1000-3428.2006.23.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    SIP server, which is composed of redirect server, proxy server and registrar server, plays an important role in VoIP system. This paper ports Linux 2.6 to the hardware platform based on ARM CPU S3C2410 and realizes SIP protocol and server. This server has already been successfully deployed as a real-time voice communication platform of an e-government system in a department of the Ministry of Water Resources.
  • WANG Fenhua
    Computer Engineering. 2006, 32(23): 278-280. https://doi.org/10.3969/j.issn.1000-3428.2006.23.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes the conceptions, classification and key technology of the drivers on Linux, including numbers, operations, register and uninstall of the devices. By taking LED drivers as the example, the design method of char drivers on Linux is discussed. The LED driving procedures are debugged on Samsung ARM9 2410 development board.
  • TIAN Fang; XU Xianghong
    Computer Engineering. 2006, 32(23): 281-282. https://doi.org/10.3969/j.issn.1000-3428.2006.23.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes examination systematic online based on active server pages (ASP) technology. Examination procedure is divided into design procedure of examination plan, inquire procedure of examination plan, choice of test subject for students and the paper carries on analysis and design about the three parts.
  • ZHANG Meihua; LI Ming; SUI Yanli; WU Yiqing
    Computer Engineering. 2006, 32(23): 283-284. https://doi.org/10.3969/j.issn.1000-3428.2006.23.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the global concept of digital city, the article designs an information and control platform to control the landscape lighting of whole city by utilizing the advanced network technology, integrated technology. And it makes a further study on the access and control protocol, which is the key technology realized to the platform.