Author Login Editor-in-Chief Peer Review Editor Work Office Work

05 October 2006, Volume 32 Issue 19
    

  • Select all
    |
    Degree Paper
  • SHI Weimin; NIU Xinxin; YANG Yixian; GAO Haiying
    Computer Engineering. 2006, 32(19): 1-2,5. https://doi.org/10.3969/j.issn.1000-3428.2006.19.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A verifier verifies only both signer’s signature using self-certified signatures. In PMI system, verifier sides need verify AC issued by AA besides PKC issued by CA which includes two verificationsm, namely user sign and PKC. To the above problem, this paper proposes a new digital signature scheme called multi-certification signature which extents self-certified signatures and verifies two extented to three certifications once. Then, it extents more multi-certification signature which can verfy multi-signatures once.
  • ZHAO Yonghua; CHI Xuebin; JIANG Jinrong
    Computer Engineering. 2006, 32(19): 3-5. https://doi.org/10.3969/j.issn.1000-3428.2006.19.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Abstract】Based on divide-and-conquer method of eigenvalues of symmetric tridiagonal matrices, a multilevel hybrid parallel algorithm that is suitable to cluster of SMP’s environments is presented. Parallel solution within the SMP node takes both coarse-grain and fine-grain OpenMP parallel. In order to improve load balance of pure MPI algorithm, a dynamic work sharing is used in hybrid parallel algorithm. An experiment analysis on the DeepComp 6800 shows the hybrid algorithm performs good scalability and speedup.

  • LIU Wang; SUN Shenghe
    Computer Engineering. 2006, 32(19): 6-8. https://doi.org/10.3969/j.issn.1000-3428.2006.19.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the rapid development of computer multimedia, how to protect digital products from being copied, pirated and juggled has been an urgent problem in the information security field. Digital watermark is a new method to solve the referred problems. This paper proposes a robust watermarking algorithm for Non-Uniform Rational B-Spline(NURBS) surfaces based on knot insertion for NURBS and spread-spectrum communication technique. The embedded watermark is invisible and withstands the common attacks such as knot insertion/removal, knot refinement, degree elevation and affine transforms (translation, rotation and scaling). The validity of proposed algorithm has been confirmed with experiments.
  • GAO Hong; HUANG Degen; YANG Yuansheng
    Computer Engineering. 2006, 32(19): 9-10,1. https://doi.org/10.3969/j.issn.1000-3428.2006.19.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a method of Chinese personal name recognition synchronized with Chinese word segmentation. Possible person names are generated according to their internal characters and those with high confidence are added into the segmentation digraph as vertices along with lexical word candidates. Bigram and Trigram are used to evaluate each path of segmentation digraph, thus the shortest path corresponds to the optimal segmentation of the Chinese sentence. Personal names can be recognized once the optimal segmentation is selected. The experimental results show the method achieves satisfying accuracy.
  • GUO Chenghao; ZHAO Yanli; WANG Jiwen; LIU Fengyu
    Computer Engineering. 2006, 32(19): 11-13. https://doi.org/10.3969/j.issn.1000-3428.2006.19.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Recently software system has been applied in any field of national economy widely, however its performance degradation makes the software system can’t meet the requirement of users. This paper takes C2-style to dynamic architectures, formalizes and analyses the model by Petri net, therefore, the research of a new system with self-adaptive function becomes very urgent reguirment.
  • XIA Renbo; LIU Weijun; WANG Yuechao
    Computer Engineering. 2006, 32(19): 14-16. https://doi.org/10.3969/j.issn.1000-3428.2006.19.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The scope of this paper is to propose an efficient mesh simplification algorithm which allows preservation of topology as well as preservation of sharp features on the mesh. As the curvature is useful to enhance the shape description, the quadric error metric matrix of the traditional edge collapse simplification algorithm is modified by weighting the Gauss function of vertex’s curvature to strengthen the effect of sharp vertex on the position of new vertex. The topological preservation of the mesh is one important engineering application to which is not paid enough attention currently. This paper discusses the different topological error and gives the corresponding preservation approaches of manifold topology. The execution rate of topological reconstruction is enhanced by introducing the AVL tree and half edge data structure. Finally, several examples are provided in order to assess the efficiency of the new simplification algorithm.
  • DING Guofang; TANG Yong; ZHANG Yun
    Computer Engineering. 2006, 32(19): 17-19. https://doi.org/10.3969/j.issn.1000-3428.2006.19.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Adding temporal data type to system, the temporal data can be managed conveniently and effectively in relational database system. This paper presents a temporal index method based on temporal data type, named MAP21*3B+-Tree, and accomplishes various temporal queries by creating temporal index for every domains of temporal data.

  • GAO Haichang; FENG Boqin; ZENG Ming; HE Xiaohong
    Computer Engineering. 2006, 32(19): 20-22. https://doi.org/10.3969/j.issn.1000-3428.2006.19.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A Markov chain model based on path usage model is developed to analyze the inner code structure in statistical software test. The statistical theory is used on software structure test to obtain the reliability of the software structure theoretically. A Markov chain with finite state, scattered time sequence is put forward as the usage model and test model of the program. The Kullback discriminant is used as the convergence judgment criteria of the test-chain to usage-chain, and the inevitability of the convergence is testified theoretically. The primary experiments and theorized analysis prove the method is approving and promising.
  • QIAN Yili; XUN Endong; SONG Rou
    Computer Engineering. 2006, 32(19): 23-25,2. https://doi.org/10.3969/j.issn.1000-3428.2006.19.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses the application of bintree based on SLM (Statistic Language Model) in speech pauses’ prediction. It constructs Trigram statistic language model based on large-scale corpus, and builds corresponding bintree for the sentence waiting disposal; and then it predicts speech pauses at two different angle using information provided by tree. The results of experiments show that the bintree based on SLM can make contribution to speech pauses’ prediction effectively.

  • LIU Jingfa; HUANG Wenqi
    Computer Engineering. 2006, 32(19): 26-28. https://doi.org/10.3969/j.issn.1000-3428.2006.19.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In very large scale integration (VSLI) design, the locations of some macro cells, such as RAM, ROM and CPU are often required to fix a priority and the other components are subject to be placed in the rest of the chip area without overlapping. These situations are formulated as the module placement with pre-placed modules. For solving the problem, the methods used are usually stochastic optimization placement algorithm. Based on the quasi-human strategy, this paper proposes the so-called corner-occupying and the largest cave degree first placement policy. An effective heuristic deterministic algorithm is presented, and the solution to this problem can be obtained quickly by applying this algorithm. Experimental results on MCNC benchmark circuits demonstrate that the algorithm is quite effective in solving the problem.

  • ZHANG Hongmei ; WANG Yong ; WANG Xingyu
    Computer Engineering. 2006, 32(19): 29-30,3. https://doi.org/10.3969/j.issn.1000-3428.2006.19.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Most of current products and models are poor at detecting novel attacks without an acceptable level of accuracy or false alarms. In order to figure out this problem, a network based intrusion detection system is established, and many up-to-date attack tools are used to attack the network. On the basis of the intrusion experiment, 29 variables are chosen as intrusion features to characterize the status of network connection. At the same time, the rough sets theory is exploited as a detector of network connection. The experimental results indicate that the features extracted from network connection are good indicators of the status of network and the rough sets theory is powerful in multi-class classification as well as effective in unknown attack detection.
  • HUANG Xiangyang; YIN Yixin; ZENG Guangping; TU Xuyan
    Computer Engineering. 2006, 32(19): 31-33. https://doi.org/10.3969/j.issn.1000-3428.2006.19.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This thesis presents a computational model of novel emotion-based NPCs, which live in a simulated world and have a synthetic body with autonomous behaviors. The model integrates emotional system with attention, intention and expression system. Forgetting characteristic of human, as well as mood instability, it also simulates to make NPCs be closer to PCs(player characters) or game player. Fuzzy representation is used to capture the inherent uncertainty of emotions and cognition. The model-view-controller(MVC) design pattern is adopted to separate AI from game engine and AI modules are built on much more interfaces and components.

  • LUO Jie; DUAN Jianmin; CHEN Jianxin
    Computer Engineering. 2006, 32(19): 34-37. https://doi.org/10.3969/j.issn.1000-3428.2006.19.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a coevolution-based multi-agent distributed intelligent control architecture. It adopts the method of decomposing the complex distributed control system into basic behavior modules which can be set regulable activity, and constructs them into multi-agent system. The coevolution-based distributed parallel learning structure and its coevolution algorithms are shown. It makes every basic behavior rule-base and global behavior coordination rule-base coevolve. This architecture is simple but effective, and its local control and global behavior coordination obtain adaptive online learning capability. The expansibility of this system is well. The system is practical, and may be applied to embedded control system operating at limited resource.
  • Software Technology and Database
  • ZENG Biqing; CHEN Zhigang
    Computer Engineering. 2006, 32(19): 38-39,4. https://doi.org/10.3969/j.issn.1000-3428.2006.19.014
    Abstract ( )   Knowledge map   Save
    It is an important research topic to process the large-scale multidimensional dataset by program. When the data is input or output, the speed of reading and writing is limited by the mechanism movement of disks itself. The parallel I/O technology is efficient to eliminate the I/O bottleneck. Parallel I/O can decluster the multidimensional dataset and store them. Based on this fact, a new cyclic declustering strategy for the large-scale multidimensional dataset is proposed. The experiment shows its validity.


  • LU Zhifeng
    Computer Engineering. 2006, 32(19): 40-42. https://doi.org/10.3969/j.issn.1000-3428.2006.19.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An expert system for appraising pottery and porcelain is designed, which includes a huge database. It is the main factor of how to use main memory source effectively during the period of the system design. An management policy is designed, which can redistribute main memory source of B+ tree index file buffer. It can also promote the running efficiency of the system due to redistributing page layout of the main memory in file buffer.
  • WANG Yichen; LIU Bin; RUAN Lian
    Computer Engineering. 2006, 32(19): 43-45,4. https://doi.org/10.3969/j.issn.1000-3428.2006.19.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a framework of reliability simulation test environment for embedded software. After the simulation features and function components of the simulation test environment are illustrated, it analyzes the function requirements of the run-time component in simulation testing environment, and expatiates the static and dynamic features of the run-time component of the framework through the abstract class diagram and the sequence diagram in UML, it concludes the advantages of the simulation test environment framework.

  • LI Li; MIAO Cheng; WSHUR·Silamu
    Computer Engineering. 2006, 32(19): 46-48. https://doi.org/10.3969/j.issn.1000-3428.2006.19.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This thesis outlines the differences between the Chinese and minority language of Uighur, Kazak, Khalkhas, which are generally used in Xinjiang Province. On the basis of internationalization framework of Linux, the paper designs multilanguage Linux system which supports input and display of Uighur, Kazak, Khalkhas, Chinese and English. It also introduces implementation of master module, such as input, complex text layout.
  • CAO Donglei; TIAN Sihua; JIN Beihong
    Computer Engineering. 2006, 32(19): 49-50,5. https://doi.org/10.3969/j.issn.1000-3428.2006.19.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Xerces is the most popular and best performed parser till now. But its architecture is so complicated that it limits its performance. By optimizing lexical and syntax processing for XML, along with constructing the light-weighted architecture, an efficient XML parser――OnceSAXParser is implemented. The paper compares it with Xerces which is a most popular XML parser from the view of structure analysis and performance test. The results of performance tests are given to show that OnceSAXParser is 27% faster than Xerces on the average.
  • XIAO Jianyu; ZHANG Deyun; CHEN Haiquan; DONG Hao
    Computer Engineering. 2006, 32(19): 51-53. https://doi.org/10.3969/j.issn.1000-3428.2006.19.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A scheme of applying technique of conditioning to preprocess a program is proposed to alleviate the problem of state space explosion faced by software model checking. It takes the antecedent of an implication form in linear temporal logic formula of program properties as the condition of program conditioning, reasons the path condition of each control point of the program after symbolic execution, and deletes the irrelevant statements with respect to the verification of the program properties. Theoretical analysis and experiments show that the scheme can effectively reduce a program’s state space and satisfy the safety requirement imposed by software model check.
  • LI Haibo; WANG Lizhen; YANG Li; NI Zhiling
    Computer Engineering. 2006, 32(19): 54-56,5. https://doi.org/10.3969/j.issn.1000-3428.2006.19.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An access control mechanism, which is uniform, topic-based and role-based, is proposed for spatial data warehouse. It unifies inner-privilege and outer-privilege, spatial data privilege and attribute data privilege of spatial data warehouse. It is used to support constructing for experiment platform in national natural science foundation project--the studying project about “the three parallel rivers area” representative plant spatial data warehouse and biological diversity.
  • XING Dehai; DONG Xuyuan
    Computer Engineering. 2006, 32(19): 57-59. https://doi.org/10.3969/j.issn.1000-3428.2006.19.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Main component analysis is a new mathematical method in system analysis. The application of main component analysis in EHR system induces effectively to combine qualitative and quantitative analysis in decision makers of human resource departments, which makes many multiple-factor problems be solved scientifically. The practicality of Tianjin University indicates that the application of EHR system integrating management of data, processes and resources, which are relative to personnel, improves the efficiency of human resource management, and can be improved.

  • CHENG Miao; HU Sheng; YUAN Zhengwu; GE Junwei; BAE Haeyoung
    Computer Engineering. 2006, 32(19): 60-61,7. https://doi.org/10.3969/j.issn.1000-3428.2006.19.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In spatio-temporal databases, nearest neighbor(NN) query is used to find out one or more queried objects that are nearest to query object. This paper introduces an effect query algorithm based on TPR tree, such algorithm can support kNN query for moving objects and has a better performance than known algorithms.

  • CHEN Le; YANG Xiaohu
    Computer Engineering. 2006, 32(19): 62-64. https://doi.org/10.3969/j.issn.1000-3428.2006.19.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As the distributed technique develops, the use of MVC becomes wider and wider, MVC is no longer limited to the construction of components, but also can be used in the software design of distributed application. This paper introduces basic concepts of MVC pattern, analyzes how to apply the MVC pattern properly and efficiently in distributed environment and provides an implementation framework for distributed MVC pattern using Web services and message oriented middleware. This framework can help to build a well-architected, loosely-coupled distributed application.
  • LIU Xinfeng; LI Ying; LUO Xiaopei; DENG Shiyi
    Computer Engineering. 2006, 32(19): 65-67. https://doi.org/10.3969/j.issn.1000-3428.2006.19.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Enterprise system is one of the most important management information systems. Legacy enterprise system is mainly based on CS (Client/Server) technology, so it is very difficult to deploy and hardly to support the rapid business increment. This paper, based on the R&D experience of many years, brings out a new-generation smart architecture of enterprise system in complex environment, which solves these problems completely and has a good result in real development.

  • ZHANG Zhenbo; YANG Hebiao; MA Zhenhua
    Computer Engineering. 2006, 32(19): 68-70. https://doi.org/10.3969/j.issn.1000-3428.2006.19.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The cache mechanism of Web system that stores object in the memory buffer, lowers the systematic expenses produced by frequently creation and destruction of the object, avoids frequently data exchange with database and improves the fast response ability of system. By analyzing the design and implementation principle of cache, the cache framework based on J2EE with LRU algorithm is implemented.
  • LI Xu; LIU Zongtian; QIANG Yu;
    Computer Engineering. 2006, 32(19): 71-73. https://doi.org/10.3969/j.issn.1000-3428.2006.19.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The development process of TSP emphasizes that data is important and requests for full-scale metrics, but it is difficult for most of software enterprise, so it needs a strategy so-called “moderate metrics”. The analysis of data reduces workload of metrics and provides suggestions and references for the latter developments or process improvement. This paper puts forward the application of formal concept analysis to TSP metrics model, achieves goal of “moderate metrics” and gains valuable process improvement information by association rules mining based on concept lattice. Some experimental projects prove validity and practicability of application of FCA in TSP measurement model.
  • SUN Zhizhuo; GONG Jianmin; LIU Lidong; HU Kai
    Computer Engineering. 2006, 32(19): 74-75,7. https://doi.org/10.3969/j.issn.1000-3428.2006.19.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Most CISC or VLIW processors are microprogrammed processors, horizontal microinstruction is widely used for its high degree of parallelism, efficiency and flexibility, it is necessary to encode one or several groups of mutually exclusive microoperations in different fields in optimizing the microcode ROM. To ascertain each group of mutually exclusive microoperations accurately and expediently, the algorithm is presented based on set theory and tree in data structure. It realizes the automation of ascertaining mutually exclusive microoperations. It is
    applicable to those CISC or VLIW processors that may include dozens, hundreds or even more different microoperations.

  • ZHANG Yufang; PENG Shiming; LV Jia
    Computer Engineering. 2006, 32(19): 76-78. https://doi.org/10.3969/j.issn.1000-3428.2006.19.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    TFIDF is a kind of common methods used to measure the terms in a document. The method is easy but it undervalues these terms that frequently appear in the documents belonging to the same class, while those terms can represent the characteristic of the documents of this class, so higher weight is entrusted to them. The expression of IDF in TFIDF is modified to increase the weight of those terms mentioned, then is applied to the experiment to validate it. In the experiment, the improved TFIDF is used to select feature and genetic algorithm is used to train the classifier. The method is better than others and proves that the improved TFIDF method is feasible.

  • HE Ping; YANG Shuqiang; JIA Yan; ZOU Peng
    Computer Engineering. 2006, 32(19): 79-81. https://doi.org/10.3969/j.issn.1000-3428.2006.19.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article introduces the concept of the very large database and describes the primary requests for backup and recovery of data in the VLDB. It does some researches for technology of backup and recovery of Oracle10g. It proposes a reasonable and efficient solution for a reality multi-node VLDB system by comparing several backup and recovery modes.
  • GUO Haifeng; YANG Guogui
    Computer Engineering. 2006, 32(19): 82-84,8. https://doi.org/10.3969/j.issn.1000-3428.2006.19.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses the skill and implementation for the Oracle DBMS on the KYLIN OS, using TPC-C benchmark as the instrument, and it analyzes the memory’s distribution of the system, the structure of Oracle’s process, the physical design of the database, the observation and the treatment of the wait events. As the result of the experiment, the performance of Oracle database can be improved by 50% at least, by using reasonable tuning skill.
  • CHEN Xizhen; WANG Shumao; XU Yongjun
    Computer Engineering. 2006, 32(19): 85-87. https://doi.org/10.3969/j.issn.1000-3428.2006.19.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyses the schedule mechanism of TinyOS, which is a representative operating system of WSN, and also points out some shortages of TinyOS. Then some improving methods are presented accompanied with the realization of prioritized task schedule scheme. The simulation result and application result on the actual WSN system-GAINS indicate that the priority schedule of TinyOS can improve communication performance significantly.

  • LIANG Chengcai; ZHANG Daiyu; LIN Haijing
    Computer Engineering. 2006, 32(19): 88-90. https://doi.org/10.3969/j.issn.1000-3428.2006.19.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Software defect is the most important concept in software quality category, and software defect measurement is the core measurement in software quality measurement category. The related concepts of software defect such as error, defect, fault and failure are discriminated. The classifying model and severity-level grading model of software defect are established by using the orthogonal defect classification method, the life cycle of software defect is analyzed. The basic and practical metrics of software defect such as defect density, defect leakage matrix, defect injection rate and defect removal rate are given.

  • YE Feiyue; MENG Delong; YUAN Hongjuan
    Computer Engineering. 2006, 32(19): 91-93. https://doi.org/10.3969/j.issn.1000-3428.2006.19.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Storing and querying semistructured data will be a very important and challenging research because it lacks schema information. Using RDBMS to store semistructured data can reuse database’s query optimizer and transaction manager, which can ensure semistructured data’s consistency and integrality. This paper presents a new approach for storing and querying semistructured data. An algorithm is given to rewrite from semistructured data-based query to relation-based one, and a visual query program is introduced.

  • ZANG Zeshuai; JIN Haibo; DING Yunliang
    Computer Engineering. 2006, 32(19): 94-96. https://doi.org/10.3969/j.issn.1000-3428.2006.19.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The increment of calculation measures and development of network make people start to pay attention to the distributed optimization design technology. Distributed optimization design technology applies the distributed object technology of computer science to optimization design subject. It has many advantages, such as increasing calculation efficiency, that making use of current resources adequately, lowering the calculation cost and shortening the period of design. The article gives an example, proves this system can obtain the anticipant effect.
  • ZHANG Wenjia; LEI Hang; GAO Feng
    Computer Engineering. 2006, 32(19): 97-99,1. https://doi.org/10.3969/j.issn.1000-3428.2006.19.035
    Abstract ( )   Knowledge map   Save
    The common component technologies, such as COM, CORBA etc., have been perfect, but there is some limit when they are plied to embedded systems. On the basis of embedded systems characteristics, this paper analyzes the present common component model and the characteristics of embedded component technologies, presents a new embedded component model, embedded component model based on intertask communication. The model has the advantages such as support for real-time scheduling, demanding less underlying technologies support and consuming less resource. This paper provides the explaining of system framework, implementation method and the method of developing component.

  • GUO Dongliang; ZHANG Lichen
    Computer Engineering. 2006, 32(19): 100-102. https://doi.org/10.3969/j.issn.1000-3428.2006.19.036
    Abstract ( )   Knowledge map   Save
    This article proposes a new technique to model aspect-oriented constructs and mechanisms by extending UML, which can represent constructs and weaving mechanism of AspectJ and AspectC++ with appropriate semantics. In this method, aspect is subclass of class; pointcut and advice are derived from feature, thus pointcut and advice are parts of aspect; relationship between aspects and base classes is represented by special crosscut dependency. The notation of pointcut can express crosscutting behavior of many aspects at same join point. Advice can model structural crosscutting and behavior crosscutting in a uniform way. By adding a new block, advice sending focus, in sequence diagram and regard advice as message, this method can clearly model where and when and how advices affect system behavior.

  • LIU Linyuan; ZHU Haibin
    Computer Engineering. 2006, 32(19): 103-104,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.037
    Abstract ( )   Knowledge map   Save
    As a tool of expanding the human collaboration space, CSCW (computer supported cooperative work) systems should not only provide virtual face-to-face collaborative environments but also improve face-to-face collaboration by providing more mechanisms to overcome the drawbacks of face-to-face collaboration. Roles are one of the effective ways of solving this problem, because roles can help users specify clearly their responsibilities and rights, dynamically change and transfer their positions to improve the efficiency of people’s collaboration. This paper introduces the basic concepts and principles of roles, discusses the architecture of role-based collaborative systems, and mainly demonstrates the implementation of the role transition in collaboration.
  • DONG Minggang; ; LIANG Zhengyou
    Computer Engineering. 2006, 32(19): 105-107. https://doi.org/10.3969/j.issn.1000-3428.2006.19.038
    Abstract ( )   Knowledge map   Save
    Aiming at the lack of parallel computing, a new parallel computing method based on ProActive in Windows is proposed. The key technology including the architecture of system, nodes dynamic deployment, parallel programming method based on ProActive and scheduler of parallel tasks is discussed and designed in Windows. A prototype is realized. Experiment demonstrates it is feasible and valid.
  • CAO Hongqi; NIU Tianyun; SUN Zhihui
    Computer Engineering. 2006, 32(19): 108-110,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Frequent pattern mining based on XML document is an important content in XML-related research. An efficient algorithm called AFPMX_CST is presented to discover frequent pattern in XML data based on compressed structure tree of storing XML data, with the existing frequent tree structure mining algorithm WL. It compresses the searching space, reduces scanning times, so it is much better than WL in time efficiency and space efficiency. At the same time, the methods and process to change mining results into corresponding DTD patterns are researched. It is proved both in theory and practice that this algorithm is adoptable and effective.

  • WANG Yujian; LIU Chen; TIAN Xing
    Computer Engineering. 2006, 32(19): 111-113. https://doi.org/10.3969/j.issn.1000-3428.2006.19.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characteristics of data processing in the middle-small enterprises, a distributed memory management system based on LAN is proposed. The manner of data organizing, the design principle and the concrete implementation of every function entity in the system are introduced. The system uses the memory resource in the LAN to store data, solves the problem about I/O capability bottleneck. The data is divided into packages, and the package management entity is used for the management of memory resource. Main package and backup package are kept synchronization by synchronous protocol mechanism. The results of test show that the efficiency of data processing by using the system is 5 to 7 times as high as that by using the local fixed disk.
  • Networks and Communications
  • LI Qianmu; XU Manwu; ZHANG Hong; LIU Fengyu
    Computer Engineering. 2006, 32(19): 114-116. https://doi.org/10.3969/j.issn.1000-3428.2006.19.041
    Abstract ( )   Knowledge map   Save
    The mechanism to guarantee the QoS on UT network is proposed, it focuses on the realization of end-to-end QoS framework. In the framework, function of protocol on each layer is discussed, and the characteristics of ATM network is also considered. Such work processes as the negotiation of QoS, the modification of QoS and the renegotiation of QoS when users perform inter-region handover are described. The result is presented by test work process and the QoS of services.

  • WU Yu; YU Shuyao; SONG Cheng
    Computer Engineering. 2006, 32(19): 117-119. https://doi.org/10.3969/j.issn.1000-3428.2006.19.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a query-agent based blind searching algorithm for unstructured P2P network, which collects and analyzes the information of the P2P network in querying process, and adaptively adjusts the sub-query scale according to the query situation. Compared with the present algorithms, the query-agent algorithm provides more delicate control ability for redundant cost, and avoids the optimizing dilemma of the present algorithms. This paper runs the contrastive experiment, and the simulation result proves that the query-agent algorithm can reduce the redundant cost more effectively.
  • LI Zhonghua; LI Weihua
    Computer Engineering. 2006, 32(19): 120-122. https://doi.org/10.3969/j.issn.1000-3428.2006.19.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper uses linear error correction code(LECC) of the informatics encoding theoretics to solve the problems of slowness and low reliability on transmission of big data file. LECC algorithm partitions the data into blocks and encodes it redundantly, then the encoded packages are transmitted in the erasure channel (Internet for example). If enough encoded packages are received, the receiver can decode the original data, regardless of which package is lost. It saves the time for package acknowledging and retransmitting. In the experiment, the receiver can finish decoding as long as it gets 4 percent encoded packages more on average in LECC transmission, the cost of encoding, decoding and the increased packages transmitting is less than the ARQ error controls in transmission of big data file. LECC algorithm improves the reliability of channel and the efficiency of data transmission.
  • LIU Yaping; GONG Zhenghu
    Computer Engineering. 2006, 32(19): 123-124. https://doi.org/10.3969/j.issn.1000-3428.2006.19.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traffic engineering can be classified as inter-domain traffic engineering and intra-domain traffic engineering. They are concerned with different range of Internet and different sides of problems. And inter-domain traffic engineering is inherently more difficult than intra-domain traffic engineering. But they have same general process model. What’s more, they depend on each other with tight relations. When the problem of traffic engineering is researched on, they should be considered at the same time.
  • WANG Jianxin; LI Jian; ZHU Xianman
    Computer Engineering. 2006, 32(19): 125-127,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Mobility model is used to describe the movement of node in MANET. Utilizing a proper mobility model is important for performance evaluation. The paper gives three evaluations— neighbor ratio, link life time and average link life time based on correlative properties of routing protocol. Under a lot of simulation, it analyzes and compares the random walk, random waypoint, Gauss-Markov and boundless simulation area mobility models. These results are helpful to protocol designation, especially to the routing protocol in MANET.

  • WANG Jin; JIANG Yali; LI Daxing; JIA Zhongtian
    Computer Engineering. 2006, 32(19): 128-130. https://doi.org/10.3969/j.issn.1000-3428.2006.19.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An extended RBAC model with spatial character is presented. By dynamically changing user-role or role-permission assignments, it is possible to control the available set of permissions based on where the user is situated. This paper also extends a role-based authorization constraint model to describe constraints with spatial character on different levels, which is suited for wireless network.


  • LIU Hongzhao; ZHAO Baohua; QU Yugui
    Computer Engineering. 2006, 32(19): 131-132,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Protocol test is an important method to ensure that implementations are consistent with specifications. OSPF is a link state protocol that is widely used. Smoke test is very helpful for reducing system integration risk, improving visibility in development process and shortening product development cycle. A protocol smoke test system based on TCL is designed and implemented. Moreover, this paper implements test set for OSPFv3 protocol and tests the router product.
  • GUO Lin; ZHANG Dafang; LI Wenwei; XIE Kun
    Computer Engineering. 2006, 32(19): 133-135. https://doi.org/10.3969/j.issn.1000-3428.2006.19.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is difficult to detect traffic anomaly accurately in real-time network management. A traffic anomaly detection algorithm based on steady model is proposed. Both weighted mean value and variance statistics method are used to build and update the steady model. Furthermore ROC curve method is used to assess performance. The complexity of the new algorithm is comparatively low with occupying little system resource and it possesses real-time auto-alarm function. Also simulation shows that the study is a valuable reference for advancing exploration of real-time traffic anomaly detection.
  • SHEN Zengwei; ZHOU Gang
    Computer Engineering. 2006, 32(19): 136-138. https://doi.org/10.3969/j.issn.1000-3428.2006.19.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To carry out network topology discovery based on the characteristics IPv6 network is fundamental to process effective IPv6 network management. Most recent research mainly focuses on the method of IPv6 backbone network’s topology discovery, but there’s hardly any exploration to the IPv6 access network’s topology discovery at present. A strategy of topology discovery in the IPv6 access network is presented. The correctness and effectiveness of the approach is analyzed through some practical tests.

  • LIU Ziying; CHEN Jianyun
    Computer Engineering. 2006, 32(19): 139-140,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents the end-to-end QoS structure for the ISP Internet through analyzing the QoS technology, and discusses the implementation of its structure. Then it has a conclusion that the QoS guarantee is realized in the ISP network based on making IntServ, DiffServ, MPLS and SBM together.
  • YE Deqian; ZHANG Shuguo
    Computer Engineering. 2006, 32(19): 141-142,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    SIP is one of the most important protocol in the area of VoIP. Since dedicated serves are used, SIP systems are typically needed to be configured and maintained by hand, and the scalability is limited. To solve these problems, the paper analyses the VoIP and Skype system, and proposes a pure P2P-VoIP architecture based on DHT overlay. The architecture is self-organized and provides good scalability.

  • YANG Wei; ZHU Qiaoming; LI Peifeng; QIAN Peide;
    Computer Engineering. 2006, 32(19): 143-145,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to realize an effectively dynamic load balance in load balance cluster, it is necessary to predict server load accurately. This article introduces the properties of server load and three models of time series, then proposes the method of server load prediction, time series based on the regularity of load’s dynamic varieties, and applies this method to predict load of IP control gateway server. It is proved by the experiment that the predicting method has highly effectiveness in practice.
  • Security Technology
  • HE Debiao; CHEN Jianhua; HU Jin
    Computer Engineering. 2006, 32(19): 146-148. https://doi.org/10.3969/j.issn.1000-3428.2006.19.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes a hardware implementation of an arithmetic processor over GF(2m) used in public key cryptography. The processor consists of special perational blocks for montgomery modular multiplication unit, addition unit, EC point addition unit, EC point double unit, EC point multiplication unit, main control unit. An improved method for montgomery modular multiplication is also presented.

  • SUN Lijuan; FENG Li; WANG Ruchuan
    Computer Engineering. 2006, 32(19): 149-150,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper establishes the IDS(Intrusion Detection System) model based on artificial immune, which is based on multiple intelligent technologies such as intelligent protocol analysis, clonal selection algorithm, artificial immune system and genetic algorithm. It takes further research on the clonal selection algorithm, and puts forward an improved scheme of Forrest’s static clonal selection algorithm. The simulation results indicate that the improved algorithm is superior to Forrest’s static clonal selection algorithm in performance.
  • LIU Qiang; WANG Binqiang; LIU Caixia; ZHAO Liang
    Computer Engineering. 2006, 32(19): 151-154. https://doi.org/10.3969/j.issn.1000-3428.2006.19.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Dynamic host configuration protocol (DHCP protocol) has successfully solved the management and insufficiency problem of network address. But the lack of security control in DHCP protocol makes insecurity in address distribution. This paper presents an improved DHCP protocol based on user visiting control mechanism and DH encryption algorithm, discusses its concrete implementation in the four stages of address requiring, secret key negotiating, address distributing and address releasing, and analyses its security performance. The work in this paper offers reference to applications with high security requirement.
  • LIU Xudong; LI Zhancai; WANG Qin
    Computer Engineering. 2006, 32(19): 154-156. https://doi.org/10.3969/j.issn.1000-3428.2006.19.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Because Internet key exchange authentication with signatures is vulnerable to the man-in-the-middle attack, the user ID may expose to the outside in the IKE protocol. Aimeing at this issue, this paper proposes a solution to hide the user ID. This solution not only maintains the framework of ISAKMP but also resists the man-in-the-middle attack and brutal force attack effectively, with cheap system cost. This solution has already adopted by the design of an IPSec coprocessor.
  • XU Jing; FENG Weicheng; ZHOU Lianying; SUN Xiaoming
    Computer Engineering. 2006, 32(19): 157-158,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Many problems exist in the systems like denying, losing, misusing, stealing, and double-spending. A new e-cash system using a modified partial blind signature scheme is introduced. This paper proposes an e-cash system in which a temporary anonymous public key is embedded in the partial blind signature against the above attacks.
  • WANG Zhiling; ; ZHANG Yuqing; YANG Bo
    Computer Engineering. 2006, 32(19): 159-161. https://doi.org/10.3969/j.issn.1000-3428.2006.19.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the characteristic of fair exchange protocol, the authors propose several principals which are considered in fair exchange protocol design. Moreover, the authors also give an optimistic fair contract singing protocol. In the end, they discusse the protocol’s security. The protocol is simple and effective and satisfies the most important property of fair exchange protocol including fairness, etc..
  • YANG Lijie; LIU Yongshan
    Computer Engineering. 2006, 32(19): 162-164. https://doi.org/10.3969/j.issn.1000-3428.2006.19.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A fragile watermarking algorithm embedding a meaning watermark into spatial domain of an image is proposed. Non deterministic characteristics based on image content is adopted to improve the security of the algorithm. The conference pixels are determined by information of the pixels from its neighborhood centered at that pixel. Every pixel’s value is adjusted according to conference pixels and its related watermark bit to embed a watermark bit. The experimental results show that the algorithm is sensitive to modification of data replacement, cut and etc.. The proposed algorithm is capable of localizing modification.
  • MA Hongyang; GUO Zhongwen; GONG Zhaojie
    Computer Engineering. 2006, 32(19): 165-166,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.060
    Abstract ( )   Knowledge map   Save
    The quantum secret sharing scheme can be implemented within realistic, highly secure multi-user communication network, using Greenberger Horne Zeilinger (GHZ) states. The quantum communication network marries a variety of GHZ states to well establish the secure key distribution system employed in conjunction with the nodes and control centers. Compared with the classical quantum cryptography, it is theoretically proved that an eavesdropper Eve invariably introduces errors within communication network if she wants to gain useful information. The nodes and control centers must find Eve to guarantee the security of the network.
  • LI Na; ZHENG Xiaoshi; LI Shifeng
    Computer Engineering. 2006, 32(19): 167-169. https://doi.org/10.3969/j.issn.1000-3428.2006.19.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An adaptive image watermark algorithm based on wavelet transform is proposed. It adds pseudorandom sequence onto gray image and the host image is required for detecting the watermark. The algorithm has two characteristics: it is adapted to various gray images owing to using the mean value of selected coefficients; The appropriately embedded depth can be found for every gray image. Experiment results show that the proposed algorithm is invisible and robust against common image processing.
  • Artificial Intelligence and Recognition Technology
  • WANG Wenjun; MENG Fankuo; WANG Yuelong; LUO Yingwei; XU Zhuoqun
    Computer Engineering. 2006, 32(19): 170-172. https://doi.org/10.3969/j.issn.1000-3428.2006.19.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    When planning with emergency response plan template(ERPT) is talked about, it means standard operating procedures to use for solving typical problems and as a starting point for solving novel problems. ERPTs are transformed into preparatory plans on account of current states of resources, which are finally transformed into executable plans. Without ERPT, emergency management loses clarity and efficiency in meeting essential disaster-related demands. KB planning and Planning with templates are hot spots in research field. Research on these two topics is introduced, ERPT ontology is defined based on ABC ontology; with the vocabulary in ERPT ontology, ERPT expression is given.
  • ZHAO Yingnan; YANG Jingyu; MENG Xianquan
    Computer Engineering. 2006, 32(19): 173-175. https://doi.org/10.3969/j.issn.1000-3428.2006.19.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    During the course of Gabor filters-based feature extraction, the design for parameters of filters is important. Experiment-based and optimization-based methods are two popular ways in this domain. However, the parameters are not precise in the former and the algorithm is too complex in the latter. To avoid these defects, a more practical one is given. The main idea is to set the orientation parameters manually based on directional characters in Gabor features, then at each orientation with the help of the bandwidth parameters to search the optimal single Gabor filter on the basis of Fisher rule. The parameters of Gabor filters are close to optimization, and the algorithm is simple and data dependent as well. The experimental data on vehicle detection and vehicle classification show that this method is available and efficient.
  • YU Ruixing; LI Yanjun; ZHANG Ke
    Computer Engineering. 2006, 32(19): 176-177,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new level set way based on multi-direction gradient is proposed, in order to solve the problem of the level set gradient that is got only through the derivative of x and y direction. The two-layer steerable pyramid is used to get some different scale and directional images. And the different scale image gradient of the level set stop item adapts the two-direction gradient modulus in the old model to the four-direction gradient modulus. The interpolation method is used to pass the result from the coarser scale to the finer one. The method is compared with the original level set method. And the experimental results show that the developed algorithm is verified better than the traditional one.
  • XU Zhengguang; WU Nan; MU Zhichun
    Computer Engineering. 2006, 32(19): 178-180. https://doi.org/10.3969/j.issn.1000-3428.2006.19.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper puts forward a new method of ear recognition. In this method, independent component analysis(ICA) which considers the high-order statistics and obtains the inner character of images, is applied to extract ear feature, and then adopts the nearest distance classification based on Euclidean distance to recognize the ear image. Compared with principal component analysis(PCA), the ICA has a better identify ability. The result of experiments shows that the ICA algorithm is more efficient and has better robust to illumination and pose variation.
  • LI Yunfeng; OU Zongying
    Computer Engineering. 2006, 32(19): 181-182,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper combines the Gabor wavelet transform with support vector machines classification method for face recognition. Facial feature points are located roughly through the matching between certain face templates which are represented by Gabor wavelet transform coefficients and a face image. Gabor wavelet transform coefficients are extracted at every facial feature points and these coefficients are catenated into a vector to represent a face image. A hierarchical decomposed support vector machines binary decision tree is used for classification. Experimental results show the feasibility of the proposed face recognition method.
  • LIU Zhengyi; GONG Jiancheng ; WU Jianguo
    Computer Engineering. 2006, 32(19): 183-184. https://doi.org/10.3969/j.issn.1000-3428.2006.19.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    During text categorization based on VSM, too large vector dimension becomes the most important problem, this vector regard word as feature selection vector. As the input of alternative covering algorithm is point sets distributed in the n-dimension space, it can ignore the size of dimension, express text in the most precision and improve precision of text categorization. This paper introduces alternative covering algorithm to categorize Chinese texts, good effects are obtained and exactness reaches 98.32% in close tests.
  • ZHOU Zikang; YANG Heng; TANG Wansheng
    Computer Engineering. 2006, 32(19): 185-187. https://doi.org/10.3969/j.issn.1000-3428.2006.19.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Considering portfolio selection issue with the realistic environments of the stock exchange market in China, this paper presents probability criterion model of portfolio selection. The experimental distribution acquired on real history data is adopted to approach the real distribution and stratified sampling technique is employed. GASS II (genetic algorithm with stochastic simulation of stratified sampling intelligently integrated) is constructed to solve the probability criterion model. A demonstration with bearable return-loss risk efficient frontier is provided.
  • Software Technology and Database
  • LI Lishuang; HUANG Degen; MAO Tingting; XU Xiaoxiao
    Computer Engineering. 2006, 32(19): 188-190,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the characteristics of person names in Chinese texts, a method of automatic recognition of Chinese person names using support vector machines (SVMs) is proposed. The character itself, character-based POS tag, the information whether a character appears in a last names table, the probability of a character’s occurrence in person names and context information are extracted as the features of the vectors. Each sample is represented by a long binary vector, and thus a training set is established. The machine learning models of automatic identification of person names are obtained by testing polynomial Kernel functions. The results show that the models are efficient in identifying person names from Chinese texts. The recall, precision and F-measure are up to 92.14%, 96.43% and 94.24% respectively in open test.
  • Artificial Intelligence and Recognition Technology
  • FANG Haiguang; CHEN Peng ; SHE Li ;
    Computer Engineering. 2006, 32(19): 191-192,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Software cost estimate with the traditional experience function has the shortcoming, and applying CBR estimate method can make up these problems. This paper describes the research on software cost estimate and the CBR characteristic, introduces the COSCBR system architecture. The essential aspects are presented: the structure of the software cost factors; the hierarchy reasoning process; the COSCRB case expression; and the calculating similarity arithmetic.
  • WANG Xingling
    Computer Engineering. 2006, 32(19): 193-195. https://doi.org/10.3969/j.issn.1000-3428.2006.19.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a method based on template match and maximum variance between clusters to segment the characters of license plate. The template of character string on license plate is designed, according to the character string’s structural features. The template slips on the license plate to match the right location, and this matching process regarded as a classifying process combines with the judge rule of maximum variance between clusters to get the optimizational matching location to segment the characters.
  • ZHOU Yongquan; CHENG Dongyong; LI Taosheng
    Computer Engineering. 2006, 32(19): 196-198. https://doi.org/10.3969/j.issn.1000-3428.2006.19.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper converts a structure of a functional neuron, presents a Sigma-Pi functional network(SPFN) structure, and proposes the Sigma-Pi functional networks learning algorithm. Using numerical analysis method, the Sigma-Pi functional network is applied to XOR problem. The results demonstrate that the functional network has powerful classification capability. The method has the advantages of using a variable function for multi-dimensional function approximation and important practical significance.
  • HU Lan; XIA Limin
    Computer Engineering. 2006, 32(19): 199-201. https://doi.org/10.3969/j.issn.1000-3428.2006.19.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Age change is the mainly factor of causing variations in the appearance of human faces. Due to many lifestyle factors, it is difficult to precisely estimate age from face images. This paper presents a method to estimate age from facial images and uses NMF for extraction of facial features. These facial features are used to build a function for an age estimation——a relationship between a facial image and its corresponding age using RBF neural network. In order to improve the precision of the RBF neural network for age estimation, it uses boosting algorithm to build a integration-neural network, a set of experiments of age estimation are presented. Experiment results show good estimation performance of the method.
  • ZHA Yufei; NIU Jianglong; BI Duyan
    Computer Engineering. 2006, 32(19): 202-204,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel watershed segmentation based on multi-resolution image, in order to overcome the drawbacks of traditional watershed segmentation: low calculated efficiency and over-segmentation. Watershed segmentation is completed in low resolution to reduce the burden of computer. A new function based on the edges is proposed to merge regions, which can detect the high frequency information lost in low resolution image. An adaptive threshold is proposed for gradient image to denoise. The arithmetic reduces the effect of Gaussian noise to avoid over-segmentation and reduces the burden of merging. Experiments show that the method balances calculated efficiency and segmentation accuracy.
  • LIU Zhibin; LI Zhanli; CAO Baoxiang; LIU Xiaofeng
    Computer Engineering. 2006, 32(19): 205-207. https://doi.org/10.3969/j.issn.1000-3428.2006.19.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Texture mapping is one of the key problems in cloth animation. This paper adopts the mass-spring model for dynamic cloth, and proposes a rapid and available method mapped a triangle texture onto another triangle in object space, and realizes antialiasing effect. Experiment results show that those approaches have good real-time performance and vivid effect.
  • HE Guohui; GAN Junying
    Computer Engineering. 2006, 32(19): 208-210,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Combined with the advantages of principal components analysis (PCA) and linear discriminant analysis (LDA), PCA-LDA on gender classification is presented. Feature sub-space of training samples is obtained by way of PCA, and feature sub-space from LDA is calculated on the basis of PCA. In the meanwhile, the two feature sub-spaces from PCA and LDA are fused, and the fusion feature space is acquired. After training samples and test samples are respectively projected towards the fusion feature space, recognition features are accordingly gained. Nearest neighbor rule is utilized in gender classification. Experimental results on ORL face database show that PCA-LDA is better than PCA in recognition performance, and is a valid method in gender classification.
  • TIAN Xuedong; ZHANG Liping; YANG Peng
    Computer Engineering. 2006, 32(19): 211-213. https://doi.org/10.3969/j.issn.1000-3428.2006.19.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analysis of formula features, an approach composed of Parzen windows and Bayes theorem is proposed to extract mathematical formulas. Improved Parzen windows approach is used to extract the isolated formulas from the printed documents and Bayes theorem is used to extract the embedded formulas from the text lines. The experiments show that the combination of the two methods can obtain satisfactory results.
  • LI Yongliang; LIU Haiyan; CHEN Jun
    Computer Engineering. 2006, 32(19): 214-216. https://doi.org/10.3969/j.issn.1000-3428.2006.19.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The machine learning algorithms play an important role in current spam filter, but a single machine learning algorithm has its own drawback which restrains it from further application in E-mail filter. This paper introduces some typical machine learning algorithms, and constructs a voting E-mail filter model based on multi-machine learning algorithms. The experiments show that this method makes use of every machine learning algorithm’s advantage, and offsets its disadvantage, and achieves better filter performance than a single algorithm.
  • FEI Fengchang; FANG Zhijun; ZENG Weiming; ZHANG Lin
    Computer Engineering. 2006, 32(19): 217-220. https://doi.org/10.3969/j.issn.1000-3428.2006.19.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new grey-level mapping law for direct histogram specification, interval mapping law(IML). This law is based on the classical single mapping law (SML) and group mapping law (GML). By analyzing an example of the general equalization, IML draws forth the iso-interval mapping law (IIME), a method of direct histogram equalization. In the end, data analysis from the experiment proves the superiority of IML and IIME.
  • Multimedia Technology and Application
  • LI Qicheng; WANG Guoping
    Computer Engineering. 2006, 32(19): 221-223. https://doi.org/10.3969/j.issn.1000-3428.2006.19.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a progressive transmition of 3D model on network, designs a C/S network architecture for SmoothLOD transmition, realizes the effect of smooth transmition from a single point to the complex model when being browsed and conveniently implements the incremental transmission on network. As the application of digital museum project shows, the method can realize the streaming transmition of model on network and reduce the network delay of data transmition.
  • JIANG Wei; HU Jianling
    Computer Engineering. 2006, 32(19): 224-226. https://doi.org/10.3969/j.issn.1000-3428.2006.19.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    During image processing, a single DSP sometimes couldn’t meet the need of real-time, thus it is needed to use multiple DSPs to cooperation. According to the features of image signal and the principle of DM642 video port, the paper provides an available video port expansion based on multiprocessor. In the design, FPGA is used as preprocessing of digital video signal and realizes the flow-distribution of video data. In the mean time, FPGA provides the seamless connection with DM642 video port. The design greatly improves the DSP system’s throughput and concurrent processing abilities. It effectively solves the bottleneck during high-bandwidth application using DSP.
  • ZHANG Zhen; YING Jikang
    Computer Engineering. 2006, 32(19): 227-229. https://doi.org/10.3969/j.issn.1000-3428.2006.19.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the problems of existing P2P media streaming systems and makes research on the control topology technology and data topology technology of ZIGZAG. Hereby an P2P live media streaming system——P2P-Streaming is designed. Moreover, it implements the P2P-Streaming system and runs it at the LAN. The analysis and test shows that P2P-Streaming reduces the overhead of peers efficiently, and has a good scalability.
  • ZHANG Peng; GUO Baolong
    Computer Engineering. 2006, 32(19): 230-232. https://doi.org/10.3969/j.issn.1000-3428.2006.19.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel motion estimation algorithm based on texture analysis of motion vector in H.264 (TAMV). According to motion vectors distribution and correlation within modes, TAMV proposes an efficient inter mode decision approach to reduce the number of candidate modes of macro block. And it selects a directional diamond search pattern in the motion estimation while maintaining the coding efficiency. Experiments show that TAMV can obtain good PSNR performance and very fast speed as well as low bit rates.
  • Engineer Application Technology and Realization
  • ZHANG Zuping; XIAO Bo
    Computer Engineering. 2006, 32(19): 233-235,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on creation pattern and requirements of the telemeter reading system, characters of factory pattern, singleton pattern and builder pattern are analyzed, and the thinking of OOD is introduced. This paper proposes the novel solutions of multi protocol with system expansibility, spending and encapsulation. The problem of the long-distance telemeter reading is solved completely and efficiently.
  • WEI Peijie; LUO Jiarong; LI Guiming; WANG Hua
    Computer Engineering. 2006, 32(19): 236-238,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analyse of the present HT_7 data acquisition system, this paper introduces a series of renovation and elevation schemes, and a new large scale of distributed data acquisition control system has been developed, which consists of several isomerous acquisition modes and is of high auto control. An application of this system has been demonstrated succeed on HT-7 tokamak in 2005.

  • CUI Jingsong; XIANG Yongqian; PENG Rong
    Computer Engineering. 2006, 32(19): 239-241,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The portability and reusability of the embedded system are often suffered from the complex relationships between the hardware components and the constraints of the software running and development environments. An electronic motor controller architecture is proposed based on MDA. The division and definitions of the hardware and software modules in the architecture enable the smooth transplantation between different hardware platforms and software development tools. It also permits the customization. The author has transplanted the controller system between the three platforms: EM78P458, P87LPC768, ATMega8L under the guidance of the architecture.
  • ZHANG Yi; ZHU Xinjian
    Computer Engineering. 2006, 32(19): 242-244,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article analyzes the structure and implementation of a new MMS ward system with embedded terminals. Based on the servlet structure, the system interacts with users through the platform of MMS service provider. Meanwhile, it communicates with the embedded terminals using TCP/IP protocol over Internet. The cheap and universal embedded terminal captures and transports real-time images. The system offers online warding service by their cell phone anywhere and anytime.
  • LI Yukai; ZHU Youchan; QIN Jinlei
    Computer Engineering. 2006, 32(19): 245-247. https://doi.org/10.3969/j.issn.1000-3428.2006.19.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces .NET Remoting system structure, which is a new generation of distributed application technology, and its features in distributed application. Taken the application in SCADA master system for an example, it purposes a new method replacing traditional DCOM component with .NET Remoting technology so as to realize the function of soft data bus. As a result, this method solves the “DLL Hell” problem, which has been existing under Windows environment and enhances the flexibility and scalability of SCADA master station system. It presents its implementation method and procedure with C# .NET.

  • FANG Ming; QIAO Fei; LIU Wensheng; XU Xiaohong
    Computer Engineering. 2006, 32(19): 248-250. https://doi.org/10.3969/j.issn.1000-3428.2006.19.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    During the process of modeling and simulating the wafer production line, a classification of static and dynamic process region is presented and implemented based on Simul8 software. For the high complicated dynamic process region, three ways of solution are presented, and their advantages and disadvantages are compared. The simulation results show that this key technique of dealing with the semiconductor production line can improve the performance of simulation, and make production guided by simulation possible.
  • WANG Qi; ZHU Yu
    Computer Engineering. 2006, 32(19): 251-252,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the design and implementation of a digital video surveillance system based on network. This system based on the structure of B/S is composed of video encoder, central server and video browser, etc.. This paper gives much emphasis on the system module and the method to realize each function block. It provides a feasible way for centralization management of distributed monitor space.
  • LUO Ming; YU Limin; NI Ming; CHAI Xiaoli
    Computer Engineering. 2006, 32(19): 253-255. https://doi.org/10.3969/j.issn.1000-3428.2006.19.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A matrix connection of the panel using buttons and rotating shaft encoders is developed after the principle of rotating shaft encoders is introduced. This type of connection is characteristic of simplified circuit, less I/O resource exhausting, ease of soft realization. Then, with the help of efficient soft method, for example, timing-interrupt scanning, vector-based data processing, FIFO-based data accessing, time-recording-based knob recognizing, soft debounce processing and soft realizing of PS/2 protocol, a PS/2 interfaced panel is realized, which is applied in advanced intelligent instrument with the strong points of low cost, high performance, in-time responding, speed-up output.
  • YE Jirong; XU Donglai; AN Liansheng; ZHAO Yongjun
    Computer Engineering. 2006, 32(19): 256-257,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the application of VB & PLC in the research and manufacture of the monitor and control system for drop and shock test and the work method of PLC. And it describes the design method of the program for this control system. The system has good operating GUI and running pattern with varied setting, it fills in the internal gaps in the high performance shock test system.
  • DENG Quanliang; ZOU Yuntao; ZOU Yiren
    Computer Engineering. 2006, 32(19): 258-260. https://doi.org/10.3969/j.issn.1000-3428.2006.19.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    MES is a key aspect in integrated automation of process industry. And data integration is the core function of MES. How to implement data integration in heterogeneous environment is a hard problem in system integration. An integration model based on real time data platform technology is put forward. The model is applied to real system integration and brings a lot of benefit to the enterprise.
  • Developmental Research
  • WU Ying; LIU Jing
    Computer Engineering. 2006, 32(19): 261-263. https://doi.org/10.3969/j.issn.1000-3428.2006.19.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The research on distributed storage system focuses on system implementation, but not provides available access methods to distributed storage system. This paper proposes an Internet distributed storage access model, which provides access service to remote distributed storage system through Internet.
  • MENG Jian; CAO Liming; WANG Xiaoping; YAO Liang
    Computer Engineering. 2006, 32(19): 264-266. https://doi.org/10.3969/j.issn.1000-3428.2006.19.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As the tree structure of XML agrees with the characteristics of medical records, an XML-based electronic medical record is realized. An improvement is made to multisignature and is used in rules of XML electronic medical records. A multisignature scheme is designed and realized. The efficiency and flexibility is improved through signing the rules of the record, and the expansibility can be obtained to some extent.
  • TANG Zhifu; ZOU Hengming
    Computer Engineering. 2006, 32(19): 267-269. https://doi.org/10.3969/j.issn.1000-3428.2006.19.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Location of data is a heart problem in P2P field. Among many techniques of data location, distributed hash table (DHT) is most advantageous. The paper discusses most of popular techniques of data location and the benefits of DHT. It analyses the four algorithms of implementing DHT, and compares their preferences.
  • ADU Jianhua; GONG Bin
    Computer Engineering. 2006, 32(19): 270-272. https://doi.org/10.3969/j.issn.1000-3428.2006.19.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an open grid services architecture(OGSA)-based accounting system known as Shandong University grid (SDUGRID). It is developed with an emphasis on a consistent data model and easy integration into existing scheduling at a few independent campus clusters. This accounting system, the SDUGRID accounting system (SDUGAS) mainly addresses to resolve the problem of accounting and charging of resources usage on the campus grid and provides good quality of services for users. It introduces the basic implementation mechanism of SDUGAS architecture, collection process of resources usage information, resource reservation, resource price policy and gridbank etc. An example of a simple task run on the SDUGAS is provided to illustrate the process of accounting and charging.
  • QI Aiqin; SHEN Yongjun; ZHANG Guidong
    Computer Engineering. 2006, 32(19): 273-274. https://doi.org/10.3969/j.issn.1000-3428.2006.19.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analysis of ID cards applications in the minority areas, especially in the Tibetan area, referring to the corresponding criteria about making and changing the second resident ID cards, according to the current problem in the Tibetan area in making ID cards, a novel ID cards system is designed and implemented.
  • YU Pengfei; ZHOU Hao; LIU Bing
    Computer Engineering. 2006, 32(19): 275-277. https://doi.org/10.3969/j.issn.1000-3428.2006.19.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Information concealment technology is used in secret communication and copyright protection of digital media. COM add-in uses COM interface to extend office software’s function. This paper discusses the realization of E-mail hiding plug-ins under Outlook. The E-mail hiding plug-ins, which can be used to hide E-mail content into an image file, and it is integrated seamlessly in Outlook, provides a novel method for E-mail security.
  • WU Jiangyao; WANG Haihang
    Computer Engineering. 2006, 32(19): 278-279,. https://doi.org/10.3969/j.issn.1000-3428.2006.19.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the comparison and analysis of some existing signature software, the requirement of electric signature law and the specialty of file transferring, a new format of file encapsulation is designed, which supports cosigning and signing on files and folders. Based on the new format, the prototype of supplementary signature system is implemented; the interfaces are also designed for the purpose of joining with other business system easily. Finally, the key problems, which are encountered while developing, are put forward and explained.
  • Engineer Application Technology and Realization
  • ZHAO Youjie; CAO Yongzhong; ZHANG Jianfeng; LU Wanghong
    Computer Engineering. 2006, 32(19): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2006.19.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Due to the disadvantages of initialization and result in the K-medoids clustering algorithm, a new density-based K-medoids clustering is described. And it combines sequence alignment, dynamic programming and other theories, accomplishes the clustering analysis in the nucleic acid sequences. Experiments prove that this method has better initialization, less iterative times and satisfying results compared with the ordinary K-medoids clustering.
  • Developmental Research
  • YANG Wei; LIU Qiang; GU Xin
    Computer Engineering. 2006, 32(19): 283-284. https://doi.org/10.3969/j.issn.1000-3428.2006.19.102
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Programming for USB device drivers is a complex job. The Linux USB core subsystem has offered a large amount of relevant mechanisms and application programming interface(APIs) to support the USB device works Plug-and-Play(PNP) and relax the job developing of USB device drivers. With a representative example, the paper introduces some related concepts of USB, analyses the pattern, data structures related to Linux USB subsystem. It emphasizes on how Linux support the protocol of USB and describes the general method and skill in development of Linux USB drivers.