Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 August 2006, Volume 32 Issue 16
    

  • Select all
    |
    Degree Paper
  • PAN Weimin; LEI Yi;YAN Guangrong
    Computer Engineering. 2006, 32(16): 1-3,8. https://doi.org/10.3969/j.issn.1000-3428.2006.16.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The importance and development situations of the customized development platform of 3D digital design software are discussed. The key techniques of CAXASolid API including objects diagrams, naming convention, callback functions, App wizard and extension data object are researched. A complex application of CAXASolid API is also given, which is the 3D modeling of the bevel spiral gear based on the manufacturing process.
  • GAO Haiying;; YANG Yixian;; NIU Xinxin;
    Computer Engineering. 2006, 32(16): 4-5,22. https://doi.org/10.3969/j.issn.1000-3428.2006.16.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper investigates the capacity of a special kind of information hiding models based on the nested lattice in coding theory, introduces the formula of the capacity, and presents the methods of the information embedding and extracting to achieve the capacity. The information embedding and extracting methods based on lattice theory are explained by a simple example.
  • DU Guoning;ZHU Zhongying
    Computer Engineering. 2006, 32(16): 6-8. https://doi.org/10.3969/j.issn.1000-3428.2006.16.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The concept of classical fuzzy set’s level sets is the bridge between the classical fuzzy set and the classic crisp set. On the basis of analysing relations among type-2 fuzzy set, interval type-2 fuzzy set, type-1 fuzzy set and classical crisp set, a new concept of level sets has been extended to type-2 fuzzy set, and its main characteristics have been analysed. The results of the simulation prove the validity of level sets of type-2 fuzzy set, which can be new method to solve the problems of fuzzy decision making and fuzzy clustering, etc.
  • ZHANG Yan;WANG Lei; WU Qidi
    Computer Engineering. 2006, 32(16): 9-10,1. https://doi.org/10.3969/j.issn.1000-3428.2006.16.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Particle swarm optimization (PSO) is a new heuristic global optimization algorithm based on swarm intelligence after ant colony algorithm. The algorithm is simple, easy to implement and has good performance of optimization. Now it has been applied in many fields. However, when optimizing multidimensional and multimodal functions, the basic particle swarm optimization is apt to be trapped in local optima. This paper proposes a modified optimization method——stochastic particle swarm optimization (SPSO), which combines the standard version with simulated annealing algorithm. This modified version has stronger exploitation ability at the beginning, so it can keep particle swarm from getting into local optima too early. Simulation results on benchmark complex functions with high dimension show that this hybrid algorithm performs better than the basic particle swarm optimization.
  • GUO Yanfei;;LI Zhancai; WANG Qin
    Computer Engineering. 2006, 32(16): 11-13,2. https://doi.org/10.3969/j.issn.1000-3428.2006.16.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new area-efficient VLSI implementation method for Reed-Solomon (RS) decoder. By using the folding architecture to implement the equation solving circuits, this method can improve the reuse rate of main computation unit, simplify the hardware structure and reduce the chip area. Based on the TSMC 0.25 standard cell library, the proposed RS decoder consists of about 27 000 gates, which is about 39% smaller than the same kind of conventional ones. It has been integrated in a channel demodulation chip for HDTV and has been tested successfully in practice.
  • YANG Fan;WANG Ke;QIAN Zhihong
    Computer Engineering. 2006, 32(16): 14-16. https://doi.org/10.3969/j.issn.1000-3428.2006.16.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Relations between bit error rate and average received signal-to-noise ratio(SNR) in AWGN channel are derived for GFSK, π/4-DQPSK and 8DPSK modulation modes defined by Bluetooth EDR specification. The function expressions of packet retransmission probability and average received SNR of new ACL data packets are put forward. The transmission performance, including average throughput, average retransmission times and average transmission delay, of all data packets in different SNRs are investigated through the packet retransmission probability and different characteristics of packets. It’s the first time to research the newly adopted modulations and packet transmission performances of Bluetooth EDR specification, the analysis results contained can be sever as a theoretic benchmark against other researches.
  • WU Ping;;ZHANG Liping
    Computer Engineering. 2006, 32(16): 17-19,5. https://doi.org/10.3969/j.issn.1000-3428.2006.16.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The clustering for high-dimensional sparse data is one of important problem which need to be solved in the field of data mining. Most of the traditional clustering methods do not adapt to high-dimensional data. A clustering method is proposed based on set similarity (SS) and object set feature (OSF), and according to the supremum and infimum of clustering set, the new object can be distributed to different clusters. The idea of this kind method is very clear and easily implemented with reliable and exact results.
  • ZHAO Qigang;LI Qunzhan;PENG Hu
    Computer Engineering. 2006, 32(16): 20-22. https://doi.org/10.3969/j.issn.1000-3428.2006.16.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A model to predict IP traffic in IP-based next generation network is introduced. By using net flow traffic collecting technology, some traffic data for the analysis have been collected from an NGN operator. To build wavelet basis Neural Network (NN), the sigmoid function is replaced with the wavelet in NN, and wavelet multi-resolution analysis method is used to decompose the traffic signal and then the decomposed component sequences is employed to train the NN. By using the methods, an NGN traffic prediction model is built to predict one day’s traffic. The experimental results show that the traffic prediction method of wavelet NN(WNN) is more accurate than that without using wavelt in the NGN traffic forecasting.
  • GU Qingfan;WU Jieyi;ZHANG Sabing
    Computer Engineering. 2006, 32(16): 23-25. https://doi.org/10.3969/j.issn.1000-3428.2006.16.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Beginning with the analysis of system design and functional requirement, a PDM drawing and document management system which based on CORBA/Web Service is introduced. Making a emphasis on key technology: mapping IDL to WSDL and encapsulating CORBA object with Web Service. To solve the problem of mapping complex data type and interface inherent in IDL to WSDL which is not yet specified by OMG, a set of mapping rules is presented and a compiler——IDLW is implemented, thus making the system can be accessible on internet.

  • YU Jiguo; MA Bingxian ;CAO baoxiang;LIU Guizhen
    Computer Engineering. 2006, 32(16): 26-28. https://doi.org/10.3969/j.issn.1000-3428.2006.16.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Relations among behaviors of agents that can be modeled and analyzed accurately is one of the key factors for the smoothly running of a multi-agent system. Differing from methods based on Petri nets, modeling multi-agent systems by using hierarchical Petri nets technology is studied. Each agent has internal and external behaviors, internal behaviors can be described with a non-hierarchical Petri net system and external behaviors can be described within the hierarchical Petri net system of the multi-agent system. The internal structure of each agent is according to a substitute transition element of the hierarchical Petri nets system. Moreover, realations among dynamic behaviors, in particular, concurrent relatons of multi-agent system can be characterized and analysed at two layers ( system layer and agents layer).
  • Software Technology and Database
  • NI Ming
    Computer Engineering. 2006, 32(16): 29-30,3. https://doi.org/10.3969/j.issn.1000-3428.2006.16.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Whether mass customization enterprises can provide the more knowledge content in products or service is a key factor that determines enterprises’ competitive competence. The method of these problem solved cannot be chosen but by knowledge management (KM). Constructing a practical and feasible KM solution is the premise of implementing KM successfully. Enterprises KM solution is designed in the article based on the integrated technology platform and culture platform. The whole operation process of KM solution is described in terms of technology, tool and corporate culture.
  • ZHANG Wenyi;YOU Jinyuan
    Computer Engineering. 2006, 32(16): 31-33. https://doi.org/10.3969/j.issn.1000-3428.2006.16.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Facing the difficulty and long time consuming in GEF editor development, a kind of software architecture for automatically generating a GEF editor is proposed, which is implemented in the GEF editor generator (GEG) plug-in as a MDA tool. It can generate a full functional graphical editor within Eclipse by following the EMF way to generate code: JET and JMerge, and taking advantage of EMF.edit adapter mechanism. In the system design and implementation, two EMF meta-models are introduced: configuration meta-model and view meta-model.
  • HUANG He;ZHOU Yingbiao
    Computer Engineering. 2006, 32(16): 34-35,5. https://doi.org/10.3969/j.issn.1000-3428.2006.16.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the implementation of DDT(data distribution tool)in EDAE(enterprise database accelerate engine), which includes two fragmentation technology: Hash horizontal fragmentation and vertical fragmentation. Some important problems about vertical fragmentation are discussed. Furthermore, by analyzing existing fragmentation algorithms, a vertical fragmentation algorithm on graphics is given, which can be applicable to OLTP nicely. Finally, the theoretical analysis and experimental study of these algorithms are presented.
  • LIU Xiaoli;WU Guoqing;JIANG Min
    Computer Engineering. 2006, 32(16): 36-37,4. https://doi.org/10.3969/j.issn.1000-3428.2006.16.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The quantifying method proposed is process-oriented, it manages non-functional requirements using quantifying the domain information. A non-functional goal refinement tree is generated during the goal refinement process, and then the domain information is incorporated into the tree. After quantifying the domain node, the best solution is selected through the analysis of the value of many different domain nodes. This method also supports system change.
  • GU Rui;QI Wei;YE Xiaojun
    Computer Engineering. 2006, 32(16): 38-40. https://doi.org/10.3969/j.issn.1000-3428.2006.16.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Tablespace is the main data storage management strategy of DBMS. This paper analyzes the two primary approaches to manage the tablespace: system managed space(SMS) and DBMS managed space(DMS). Then it proposes a strategy to co-exist the two strategies based on PostgreSQL, and especially presents the method for the implementation of DMS.
  • HU Junhui; WANG Youzhao
    Computer Engineering. 2006, 32(16): 41-43. https://doi.org/10.3969/j.issn.1000-3428.2006.16.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A key aspect of the modular design of Windows CE is that original equipment manufacturers (OEMs) and independent hardware vendors (IHVs) can implement device drivers that support their own hardware without additional development from Microsoft. This paper introduces the system structure of Windows CE and the process of developing device drivers for Windows CE. It provides an overview of device-driver architecture, elaborates the Windows CE device-driver models and interrupt handle. Windows CE supports the following four driver models: native device driver, stream interface device driver, universal serial bus (USB) device driver, network driver interface specification (NDIS) driver.
  • WU Yinfei; HE Qinming; WU Darui
    Computer Engineering. 2006, 32(16): 44-45. https://doi.org/10.3969/j.issn.1000-3428.2006.16.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses the advantages of Java Web development, XML and XSLT; analyses the framework of Struts, and its advantages and disadvantages; and then presents how to use HttpServlet, which can convert XML into HTML by XSLT. Finally, this paper presents how to use the framework of Struts + XML + XSLT to replace JSP, and analyses the advantages of the framework.
  • WU Haodong; LIU Qiang
    Computer Engineering. 2006, 32(16): 46-48. https://doi.org/10.3969/j.issn.1000-3428.2006.16.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper puts forward an information query model based on ontology in information portal. The model is consisting of two parts. One is the improved query module based on the domain ontology, the other is query refinement module based on the fuzzy ontology. The first module is applied in the case that users can express their information needs straightforwardly, and it can rank the results based on the similarity. The second module is applied in the case that users can’t express their information needs straightforwardly, it can give the suggestions to refine the users’ queries.
  • LIU Hua
    Computer Engineering. 2006, 32(16): 49-51. https://doi.org/10.3969/j.issn.1000-3428.2006.16.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes an intelligentized and individuation system for Web information extraction and corpus construction with C#. which includes Web pages content parsing, data cleaning, information extraction, field definition and storing with XML of corpus. It adapts to the construction of training and test corpus for text classing, topic identify and information
  • LI Ying; WANG Xin; MAO Dilin; GAO Chuanshan
    Computer Engineering. 2006, 32(16): 52-54,6. https://doi.org/10.3969/j.issn.1000-3428.2006.16.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Mobile information device profile (MIDP) is an important class library in J2ME technology. As part of MIDP, record management system (RMS) provides a mechanism for persistent storage on small, handheld devices with limited capabilities. This paper designs and implements RMS of MIDP based on Intel’s virtual machine named XORP, as well as own developed CLDC. This paper first compares the two initial designs of RMS, and then gives a description of the final implementation. After that, it presents the performance tuning techniques, and compares both pre- and post-tuned performance with Sun’s WTK.
  • LIU Youjun;WANG Linlin
    Computer Engineering. 2006, 32(16): 55-57. https://doi.org/10.3969/j.issn.1000-3428.2006.16.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the concept of pure interval, proposes a new splitting method based on pure intervals reduction to deal with numeric attributes for SPRINT algorithm. The method divides the numeric attributes to many intervals with equal-width histogram, reduces the pure intervals, calculates exactly the minimum gini value in the impure intervals, ensures the accuracy of split result and reduces computation.
  • LI Chuanhuang;WANG Weiming
    Computer Engineering. 2006, 32(16): 58-59,6. https://doi.org/10.3969/j.issn.1000-3428.2006.16.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Because of the capability of real-time processing and the character of open source, T-Kernel has occupied more than half in the global microprocessor’s operating system market share. This paper analyzes the task states and the scheduling mechanism of T-Kernel, and gives its scheduling opportunity and scheduling algorithm. From the real time character of the embedded real time operating system, the advantages of the scheduling mechanism are pointed out.
  • FEI Hongxiao;GUO Qiuhui; LIU Yong;XIE Wenbiao;QIU Fangmin
    Computer Engineering. 2006, 32(16): 60-62. https://doi.org/10.3969/j.issn.1000-3428.2006.16.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper presents a break sequences analysis method for such situation and implements extracting the users normal behavior patterns by using sequential analysis in the network environment. Then it presents a support computing algorithm based on stack structure, which can count the candidate sequences by scanning the database only once. The tests show that the algorithm is practical.
  • LIU Honghui;
    Computer Engineering. 2006, 32(16): 63-65. https://doi.org/10.3969/j.issn.1000-3428.2006.16.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Mining maximal frequent event sequence is an important topic in the data mining research. A new algorithm for mining user behavior pattern is proposed. It adopts a data format of bitmap index, an effective method based on extension of the frequent event sequence of the prefix tree, and effective prune techniques which prune the search space. Experimental comparison indicates that it accelerates the generation of maximal frequent event sequence obviously.
  • SHI Hongjun;LI Qingshan; CHEN Ping; XU Yongfeng; XIA Hui; LI Peng
    Computer Engineering. 2006, 32(16): 66-69. https://doi.org/10.3969/j.issn.1000-3428.2006.16.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    As for object-oriented system with characteristics of distribution and concurrency, extraction and representation of creating relations and communication relations among processes can help users to comprehend target system in the view of high-level architecture. After the analysis of principles of Rational Rose extensibility, a kind of representation technology of process structure graph (PSG), which can reflect creating relations and communication relations among processes, is presented in this paper. PSG is directly represented in the environment of Rational Rose by extending stereotypes of Rational Rose. Finally, a software system with features of distribution and concurrency is used as testing case to verify the validity of this representation technology.

  • GU Huajiang;WANG Hua;SHAO Peinan
    Computer Engineering. 2006, 32(16): 70-71,8. https://doi.org/10.3969/j.issn.1000-3428.2006.16.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the possibility of deadlock lying in structural confliction of workflow process models from the view of static structure of process models. To expatiate the topic more clearly, it introduces two conceptions: reachability and absolute transferability, which express the connection property between output point of a node and input point of another node. The paper expounds the situation of occurring deadlock and summaries five patterns of deadlock. Furthermore, it illuminates there is deadlock in a process model possibly if there is a structure which matches one of five deadlock patterns in the process model.
  • ZHAO Zhuo;WU Liping;CHEN Qi; HU Lei
    Computer Engineering. 2006, 32(16): 72-73,7. https://doi.org/10.3969/j.issn.1000-3428.2006.16.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The active database management system is different from traditional database management tools. It forecasts and finds the questions while running through real-time watching the system and network reasouce. It points out where has questions, and provides the suggests of transition. It improves the capability of the whole system and ensures the system running in the course of nature.
  • YING Wei; WANG Zheng’ou;AN Jinlong
    Computer Engineering. 2006, 32(16): 74-76. https://doi.org/10.3969/j.issn.1000-3428.2006.16.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper puts forward a method of multiclass text categorization based on an improved support vector machine with binary tree and the pre-extracting support vectors and circulated iterative algorithm. Compared with existing multiclass classification support vector machines methods, the present method possesses much higher computation efficiency. It gives the concrete procedure of the algorithm, and applies it to the text classification. Experimental results demonstrate the effectiveness and the efficiency of the approach.

  • MIAO Jianming;;ZHANG Quan;WU Chen;
    Computer Engineering. 2006, 32(16): 77-79. https://doi.org/10.3969/j.issn.1000-3428.2006.16.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The sentence format (SF) indicates the relationship among the components of the sentences, and it can provide guiding knowledge forcomputer in nature language processing. This paper gives a new improved sentence format comparing to the old sentence format, and provides anewcodes. The changes between the new sentence format and the old sentence format has been discussed and explained. The results of the test indicatethat the new sentence format has the upper hand in sentence structure expression upon the old one, and will benefit the computer processing in NLParea.
  • XU Yanli;ZHANG Yaling;ZHANG Yikun
    Computer Engineering. 2006, 32(16): 80-82. https://doi.org/10.3969/j.issn.1000-3428.2006.16.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Introducing scenario of use case to object-oriented software testing is very helpful for the design of test suit. This paper applies the advantages of intuition and better coupling characteristic provided by CPNs model to description of UML scenario, and presents an integration algorism for CPNs scenario model, chameleon tokens of which is used to capture not only the scenarios in UML specification but also the further added to it. The paper discusses how to generate test cases according to the CPNs scenario integration model as the result of the algorism.
  • QIN An;FU Hongguang
    Computer Engineering. 2006, 32(16): 83-85,9. https://doi.org/10.3969/j.issn.1000-3428.2006.16.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A computer algebra system (CAS) is a software platform that facilitates the symbolic computation and the big number computation. The typical software includes Maple and Mathematica. However, in building CAS, one of difficult problems is the design and implementation of its compiler. GiNaC is a symbolic computation package running on the Linux platform. Based on the package, this paper presents a new design method to implement the CAS compiler, and implements a new CAS compiler on Linux platform. The novel CAS compiler is compatible with Maple’s program language. The testing results show its efficiency is not inferior to Maple.

  • CHEN Rui; ZHANG Guangmei;; LI Xiaowei
    Computer Engineering. 2006, 32(16): 86-88. https://doi.org/10.3969/j.issn.1000-3428.2006.16.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To large-scale software, the existing of infeasible paths in procedure increases assumptions of software testing and impacts accuracy of testing seriously. Eliminating the impaction of infeasible paths is propitious to each steps of structure testing. A manner of applying information of dataflow to detection of infeasible paths is discussed in this paper. Determination of infeasible paths is implemented by detecting of branch correlation in control flow graph. Then the manner increases the rate of branches covered by selecting proper condition predication.
  • RONG Xiaofeng;; SU Ruidan;LIU Ping;ZHOU Lihua
    Computer Engineering. 2006, 32(16): 89-91. https://doi.org/10.3969/j.issn.1000-3428.2006.16.033
    Abstract ( )   Knowledge map   Save
    This paper presents the results of the analysis and design of a TSS server system architecture. By using multi-threading, TSS can schedule system resources to support parallel time stamping among crypto chips in crypto modules of the co-server. In order to decrease the cost of creating and releasing threads frequently, the thread pool is used to create and manage TSS’ task server threads. Finally, the algorithm of managing TSS task thread pool is presented and implemented.

  • KONG Xiangsong; JIA Zhuosheng
    Computer Engineering. 2006, 32(16): 92-94. https://doi.org/10.3969/j.issn.1000-3428.2006.16.034
    Abstract ( )   Knowledge map   Save
    In software engineering, software requirement always is a most important phase. The quality of the software requirement directly concerns software development’s success. This article presents a method of software requirements based on rational unified process from the practice view, and takes local area network management system(CNETMAN) as the example to demonstrate its application process in practice. And presents how to use the software requirements architecture when software requirements have changed.

  • BAO Liang;CHEN Ping
    Computer Engineering. 2006, 32(16): 95-96,9. https://doi.org/10.3969/j.issn.1000-3428.2006.16.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper is focus on the implementation of C++ reflection mechanism. The definition and classification of reflection is simply introduced first. Then, the possibility and methods on how to add reflection mechanism to C++ programming language are discussed. Finally, simple C++ reflection (SCR), a macro definition, template and generic programming based solution, is discussed.
  • ZHANG Wei;QIN Zhen;YUAN Yingchun
    Computer Engineering. 2006, 32(16): 97-99. https://doi.org/10.3969/j.issn.1000-3428.2006.16.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Service resources allocation and scheduling is one of the challenging and complex problems in computation-economy-driven open grid service architecture. This paper proposes a time-cost tradeoff workflow scheduling algorithm in which cost is optimized for schedules with the expectation to minimize workflow duration. Dynamic service selection strategy is adopted to adapt to dynamic shared and autonomous resources in grids. Simulation results show that the algorithm can achieve less completion time and lower cost which can meet requirements in practical applications.

  • LI Ming; ZHANG Baowei; ZHAO Li
    Computer Engineering. 2006, 32(16): 100-102,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Dominance-based rough set approach (DRSA) is an extension of classical rough set theory (RST). Approximation of class unions is a very important approach in DRSA. Aiming at the disadvantage of the classical method, this paper presents a new methodology for approximation of class unions based on dominance-matrix. It only needs to calculate the dominance-matrix and does not need to consider the preference relations one by one. Thus it greatly simplifies the process and decreases the computing complex by k times(where k is the number of the decision classes). Besides it is intuitive and efficient. The example illustrates its feasibility and efficiency.
  • Networks and Communications
  • YANG Zhe
    Computer Engineering. 2006, 32(16): 103-104,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Network performance and use pattern are important for the applications. Through net flow analysis, use pattern can be gotten, there are lots of redundant information in net flow datum. Through data mining, some potential used patterns can be distinguished. The SOM clustering algorithm is used to analyze the net flow. And most users in same local network have the normal use pattern, and there still exist some exceptional use patterns, which are called outlier.
  • XUE Jiansheng;GU Yu; WANG Guangxing
    Computer Engineering. 2006, 32(16): 105-106. https://doi.org/10.3969/j.issn.1000-3428.2006.16.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A design method of congestion control strategy is presented based on OSPF protocol. Making use of the free bits of link state advertisements of OSPF protocol, it gives notify other router about the congestion status and traffic status to avoid network congestion. It utilizes fast convergence of OSPF to know network congestion status and avoids congestion early. The simulation indicates that the method can control network congestion and reduce delay for getting network load balancing.
  • SHAN Zheng;ZHAO Rongcai; XIE Kangmin
    Computer Engineering. 2006, 32(16): 107-108,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at what the benchmark tools can offer in network processor application design and their limitations, the paper brings in four disciplines, which are beneficial for NP-based application design, and which ought to be obeyed on the four levels of system, function, task and hardware. Then five formulas are given specifically for Intel NP-based application design. In the third, an application design case and its testing result are given with these disciplines and formulas applied. Finally the paper points out under which circumstances these formulas can be applied.
  • SU Pei; ZHANG Yong;HU Yungui
    Computer Engineering. 2006, 32(16): 109-111. https://doi.org/10.3969/j.issn.1000-3428.2006.16.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Resource scheduling is the core administration component in grid computing. Based on the Globus framework and technologies, this paper proposes a resource rescheduling model named R2_Scheduler, with resource dynamic characteristics in mind. The scheduling strategies must be adapted according to the resources’ dynamic and cross-administration-domain characteristics. According to the preceding scheduling results, R2_Scheduler negotiates with the user who invokes the request to determine whether to startup the task or not, in the condition that resource is lack. The limitation or availability of resource is reflected by a startup-factor. With the agreement of the user, the failure of the request is avoided, and the whole system network load is reduced by restricting the resource in the same co-allocator’s management domain.
  • ZHANG Ruixue;CHEN Luo;LI Jun;QI Yu
    Computer Engineering. 2006, 32(16): 112-114. https://doi.org/10.3969/j.issn.1000-3428.2006.16.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Grid resource information service (GRIS) is one of the key parts of grid infrastructure. It defines a set of mechanisms for discovery and monitoring of grid resources, and thus provides information for higher-level grid application, such as fault detection, performance analysis, and scheduling etc. Accurate obtaining, effective managing and efficient retrieving of resource information are the key technologies in GRIS. This paper proposes an approach which is based on GMA architecture and hierarchically organizes grid resource information. A Windows-oriented GRIS is designed and implemented with this approach, and it has been applied in a project.
  • XU Chuan;TANG Hong; ZHAO Guofeng
    Computer Engineering. 2006, 32(16): 115-117. https://doi.org/10.3969/j.issn.1000-3428.2006.16.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Decreasing packet-loss ratio is a key technology in network traffic measurement, current traffic measurement systems can not catch up with the high-speed network, so they represent packets losing. Designing and developing the network meter to adapt high speed network have become the one of the network technique hotspots. Aiming at the high Packet-loss problem which widely exists in 1 000Mbps network Meter based on Linux kernel , this paper puts forwards the measure of buffer mapping from user-space to kernel-space. Practice shows that the measure is so effective in solving packet-loss problem.
  • Security Technology
  • XIE Jianquan;;YANG Chunhua
    Computer Engineering. 2006, 32(16): 118-119,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    RSA encryption algorithm is a popular unsymmetrical encryption with high secure character. There are some special requirements in the selection of the large prime number in order to prevent the decryption. An efficient method has been introduced, which can be used to select the large prime numbers, and the some reasons which cause lower security by selecting incorrect prime number have been proved.
  • YANG Hong; YANG Deli
    Computer Engineering. 2006, 32(16): 120-121,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An unascertained measure model for evaluating the risks of information system is established on the basis of analyzing the factors affecting the risks of information system by applying the unascertained measure theory. The method is suitable for evaluating the risks of information system. Its evaluating results are reasonable. An example of practical application is given to show the effectiveness of this method. The model is more efficient than former models and can be easily realized in practice.
  • LI Min;FEI Yaoping
    Computer Engineering. 2006, 32(16): 122-124. https://doi.org/10.3969/j.issn.1000-3428.2006.16.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new kind of multi-blind digital watermark algorithm based on image scrambling. The features of presented algorithm to embed the watermark are: (1)Multiple watermarks can be embedded to mark different owners; (2)The difference between the watermarked image and the original image is perceptually invisible; (3)Using a secret key in the procession of embedding and extracting the watermarks; (4)The position of embedding only depends on the secret key; (5)Extracting of the embedded watermarks do not need the original image and original watermarks; (6)The watermarks are robust against LSB and crop attack.
  • LIU Peishun;WANG Xuefang
    Computer Engineering. 2006, 32(16): 125-126,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes the method for generalization and specialization of attack pattern using inductive learning, which can be used updating and expanding knowledge database. The attack pattern is established from an example by using the colored Petri net and EDL, after generalization it can be used to detect unknown attacks whose behavior are similar to the example. In practice the attack pattern first described by EDL from an example, then the pattern is generalized thus the concept spaces of attack are given and they can be transformed to Colored Petri net, when detection searches the intrusion from the top down by virtue of the concept space of the attack pattern. In fact the concept space of pattern indicates a depth-first search way.
  • HUANG Qian;WANG Zhen;WEI Tao;CHEN Yu
    Computer Engineering. 2006, 32(16): 127-129. https://doi.org/10.3969/j.issn.1000-3428.2006.16.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an algorithm for intrusion detection, based on one-class support vector machine (SVM) and online training of SVM. The algorithm formulates intrusion detection as a one-class classification problem. The model-building part of the algorithm works even when the training data is noisy, and therefore compared with regular SVM algorithms, it imposes fewer requirements on the training set and has a higher detection rate. For the testing data containing new types of attack, the algorithm can add such data to the training set and update the training result real-time. It tests the algorithm on KDD CUP’ 99 benchmark data set for intrusion detection and the result shows that the algorithm is able to shorten the training time, and in the same time, obtain a high detection rate.
  • CHEN Huaxing; LU Shiwen
    Computer Engineering. 2006, 32(16): 130-132. https://doi.org/10.3969/j.issn.1000-3428.2006.16.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The complexity and security of IKE protocol is always paid close attention by many researchers. Reference[1] simplifies the exchange of IKE. This paper discusses the security properties of the simplified IKE and presents some suggestions to solve the problems of denial of service attack and identification leak for man-in-the-middle attack. It is proved that the design is available and feasible. It reduces the influence of attack.
  • CHEN Weitong;; QIAN Yuntao;
    Computer Engineering. 2006, 32(16): 133-135. https://doi.org/10.3969/j.issn.1000-3428.2006.16.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a network intrusion detection method based on rough set theory, and uses a hybrid method with genetic algorithm to find a possibly short reduct which can reduce computing time. The result of the experiment shows that this model has high detection rate and low false reject rate in detecting DoS and probe attacks, and performs well in detecting R2L and U2R attacks either.
  • JIN Li’na;JIANG Xinghao; LI Jianhua
    Computer Engineering. 2006, 32(16): 136-138,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The security problem including confidentiality, integrity, nonrepudiation, authentication, authorization and access control has become the main obstacle for WS before its large scale application. This paper presents an attribute certificate based authorization mechanism for WS and analyzes the characteristics of access control model for WS aiming at the authorization and access control problem WS faces.
  • LIN Xuehui
    Computer Engineering. 2006, 32(16): 139-140,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at ensuring digital image information security, and starting from characters of binary tree, this paper proposes a novel method of digital image scrambling based on binary tree traversal, and its periodicity and inverse transformation are discussed. The approach is easy to realize for digital images of arbitrary size, and has a good result and a large periodicity of scrambling. Under some attacks, the original image can be reconstructed from scrambled image, so the algorithm satisfies the robustness requirement of image encryption and hiding to a certain extent.
  • TAN Yu’an; ZHANG Juan;CAO Yuanda;ZHANG Xuelan
    Computer Engineering. 2006, 32(16): 141-142,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper proposes a virtual hard drive which hides the encrypted data through the creation of a device driver in Windows. The security is implemented in a two-step process. First, the driver encrypts the data being written to the drive with the AES encryption algorithm. Secondly, it uses steganography to hide the encrypted data in an audio file by changing the least 4 significant bit of 16-bit sampled audio signal. The WAV files are used as the carrier to improve the I/O performance instead of the bit-map image files. PESQ test verifies that the embedded data is nearly undetectable by the human ear.
  • GUO Hui;LI Yangming;WANG Lifen
    Computer Engineering. 2006, 32(16): 143-145. https://doi.org/10.3969/j.issn.1000-3428.2006.16.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the theory of access control model based on role and task, and analyzes task and the shortage of above models. It puts forwards a new access control mode based on role and task to make access control more flexible. The formalized meaning, restriction and application in school grid are also presented.
  • XIA Feng;XIE Dongqing; KUANG Huaqing
    Computer Engineering. 2006, 32(16): 146-147. https://doi.org/10.3969/j.issn.1000-3428.2006.16.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Forward security digital signature schemes existed are mostly based on difficulty of factoring. Qin Bo and Wu Keli et al. proposed a forward security digital signature scheme based on discrete logarithm respectively. This paper points out this class of scheme is not forward secure, because its time-parameter is not a valid parameter when its validity is verified. If a secret key is revealed, adversary can forge a valid digital signature in any time period with the current secret key. This paper proposes a new forward security signature scheme based on ElGamal scheme. The scheme embeds the current private key in the signature, and time-parameter is necessary when its validity is verified. The method in the new scheme can also be applied to Qin’s scheme.
  • YANG Jie;LI Tao;WANG Shuda;WANG Lihui;DU Yu
    Computer Engineering. 2006, 32(16): 148-150. https://doi.org/10.3969/j.issn.1000-3428.2006.16.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an improved SSL VPN system. The system hooks data packets from virtual device driver at socket layer and sends them though an encrypted SSL tunnel to the peer who will perform decryption and reconstruction of the packets. The system is more flexible and adaptable compared to traditional SSL VPN system.
  • LI Kai; LUO Guiming
    Computer Engineering. 2006, 32(16): 151-151,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the concept of multipartite access structure. In this structure, the set of participants is partitioned into w subsets and all participants in the same subset play an equivalent role. The (t, n)-threshold scheme is a mechanism that allows a set of n participants to share a secret such that only subsets of t or more participants can recover it. This paper presents ideal secret sharing schemes that can realize multipartite access structures by using threshold scheme repeatedly and proves that multipartite access structures are ideal access structures.
  • DU Yu;LI Tao; WANG Lihui;LIU Yingna;YANG Jie;WANG Shuda
    Computer Engineering. 2006, 32(16): 153-154,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By analyzing and studying the Linux kernel and Netfilter framework, This paper presents a hybrid gateway, which integrate multiple secure functions. The gateway implements the functions of firewall, intrusion detection system and content filtering as kernel modules and loads up these modules into kernel by utilizing the expansibility of Netfilter framework. Then the gateway implements the integration of different secure function at different layer of network.
  • BAI Xuemei; LING Jie
    Computer Engineering. 2006, 32(16): 155-157,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In terms of the restrictions between the performance criteria of dynamic gragh-based watermarks, this paper presents a devising method to improve the quantity of hidden data by which is splitting a watermarking number instead of splitting a watermarking gragh; It analyzes a so-called abstract watermarking scheme, meanwhile combining with the evident advantages of dynamic gragh-based watermarks, and gives a novel dynamic watermarking scheme based on Chinese remaindering theorem, points out the further developing directions of software watermarking techniques through analyzing the strategies to improve the performance of dynamic gragh-based watermarks.
  • YU Zhaoping; ;YAN Shanjun;ZHANG Wenzheng;LI Yunqiang
    Computer Engineering. 2006, 32(16): 158-159. https://doi.org/10.3969/j.issn.1000-3428.2006.16.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Using the advantage of simulate annealing algorithms, this paper presents an evolutionary searching algorithm to search the best linear approximation of DES, analyzes its properties and gives the simulate experiment results. This method is applicable to block ciphers with feistel constructures, and it would still be very applicable when the length of block increases.
  • ZHANG Ruiwu; ;XIA Jingbo; LUO Yunqian
    Computer Engineering. 2006, 32(16): 160-162. https://doi.org/10.3969/j.issn.1000-3428.2006.16.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the research of the biological immune system principle, an innovative intrusion detection immune system model is presented and analyzed in full. The mathematic description model of the dynamic self, dynamic immune tolerance and immune memory is established, and a memory detector dynamic demotion mechanism based on the LRU algorithm is provided. The experiment results show that the proposed intrusion detection model has a better adaptability and validity than the traditional method.
  • CHEN Jun; ;HOU Zifeng
    Computer Engineering. 2006, 32(16): 163-164. https://doi.org/10.3969/j.issn.1000-3428.2006.16.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In public key cryptography application, getting multiplicative inverse of a modulo is often operating which usually adopts extended Euclid algorithm, but its use has limit. On the basis of actual application, a fast and suited embedded environment algorithm is proposed, which needs less memory and runs 5 times faster than extended Euclid algorithm.
  • Artificial Intelligence and Recognition Technology
  • ZHANG Shengliang; YANG Jingyu
    Computer Engineering. 2006, 32(16): 165-166,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traditional algebraic feature extraction approachs are based on vector patterns. When patterns are not vectors such as facial images, these methods may meet many problems. Recently two-dimension PCA (2DPCA) can directly compute the features by using original image matrixes. But the features extracted by 2DPCA are also matrixes; it could cause the magnitude of features too much and slow down the classification speed. This paper combines the virtues of 2DPCA and PCA, presents a 2DPCA plus PCA feature extraction method. It firstly use 2DPCA to deal with the original image matrixes, and then uses PCA to compress the feature matrixes again. The experiments on ORL face database indicate that the 20 times average recognition rates are respectively PCA (94.98%), 2DPCA (95.48%) and 2DPCA+PCA (95.83%).
  • XIANG Yang;SHEN Hong
    Computer Engineering. 2006, 32(16): 167-169. https://doi.org/10.3969/j.issn.1000-3428.2006.16.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper puts forward a new approach to solve the problem in decision support system which overcomes the disadvantage of current system. The paper designs the structure of intelligent decision support system by connecting the agent theory and practice with this approach. It consists of model selecting agent, model-constructing agent, model solving agent, and human computer interactive agent. This overcomes the difficulty in adapting the environmental changes when solving problem using DSS based on model and turns the DSS to be a problem oriented system and improves the intelligence of the system thus enables the system to make some adjustments according the changes of the problem and meet the requirements of the user.
  • ZHAO Yuqian;;GUI Weihua;CHEN Zhencheng; LI Lingyun
    Computer Engineering. 2006, 32(16): 170-171,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on basic theories and methods of mathematical morphology and morphological reconstruction filter, morphology alternating sequential filter by reconstruction is put forward. It is applied to segment brain magnetic resonance image. The experimental results indicate that useless information in the brain magnetic resonance is filtered effectively and the original shape is left unaltered by the proposed method. After applying the morphological gradient operator, geodesic distance and watershed transformation to the processed image, the cranium and meninges of brain magnetic resonance image are segmented precisely.
  • WANG Jianyong;ZHOU Xiaoguang; LIAO Qizheng
    Computer Engineering. 2006, 32(16): 172-173,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An improved algorithm of line detection is proposed to aim at the drawbacks of Hough transform. It reduces algorithm complexity based on the principle of ‘many-to-one’. The idea ‘from partial to global’ is also adopted. The parameters of line are gotten in sub-areas in order to reduce quantization error. Then it searches other points of the line within whole image according to the parameters. Algorithm complexity is also analyzed. Experiments show that the algorithm has better properties of computing efficiency and robustness.
  • CAO Feng; CHEN Shuzhen;WEI Dan
    Computer Engineering. 2006, 32(16): 174-176. https://doi.org/10.3969/j.issn.1000-3428.2006.16.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The traditional algorithm which combined wavelet module maxima and invariant moment is an effective algorithm for content based trademark image retrieval. Aiming at the inaccurate orientation and weak antinoise ability in the edge for the invariant moment calculation, This paper uses the method to track the wavelet transform amplitude maxima to mend it. Searching by the images, it found the modified algorithm remarkably improve the recall ratio and the precision ratio when the image have moved, circumrotated, twisted.

  • YU Quan;WU Hui;SHENG Zhijie;LIU Yuncai
    Computer Engineering. 2006, 32(16): 177-179. https://doi.org/10.3969/j.issn.1000-3428.2006.16.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper novelly introduces the least-square method for dynamically estimating traffic state in urban road system. Using GPS data of taxis, it establishsd a model to compute the states of traffic flow in a city road network. The boundary conditions, the degenerated cases of the model, illness condition of least-square algorithm are well considered in the research. The experiments show that the model is correct and can be used in many applications of intelligent transportation system.
  • CHEN Li;ZHOU Yue;WANG Yonggang
    Computer Engineering. 2006, 32(16): 180-182. https://doi.org/10.3969/j.issn.1000-3428.2006.16.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new color C-V method is proposed, which makes an extension of the scalar C-V method to the vector-valued case while giving some amelioration to C-V method. This paper proposes a color C-V method which makes sufficient use of color information in images so that it segments color images efficiently. It makes some amelioration to the original C-V method in order to enhance the globality, and considering the characteristics of human vision, chooses the appropriate color space. This paper applies the method to the segmentation of halftone images. The result of experiments show that color C-V method is far better than traditional methods when it transacts halftone images within fuzzy edges and severe pollution of noise.

  • LI Jiangping; ZHANG Shensheng;LI Kun
    Computer Engineering. 2006, 32(16): 183-184,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the essence of inside and outside clipping of close graphs, which is unified to intersection operation of connected regions. Region can be presented by directed rings based on quadratic B-spline curves. This clipping algorithm is presented through the construction of a list of points of intersection between the rings.

  • HE Juan; GAO Zhiqiang; LU Qingjian;QU Yuzhong
    Computer Engineering. 2006, 32(16): 185-187. https://doi.org/10.3969/j.issn.1000-3428.2006.16.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the development of Semantic Web, the number of ontologies is increasing greatly. In order to use those ontologies effectively, different ontologies must be mapped, compared and integrated. As the basis of these three tasks, ontology matching has great practical significance. ISWC held a workshop called EON2004 to evaluate accuracy and recall of different ontology matching tools. This paper proposes an element level ontology matching algorithm, named LANA(Lexical Analyzer), to map the elements of two given ontologies by calculating lexical similarity. Compared with other element level matching algorithms in EON2004 competition, LANA has higher accuracy and recall without increasing complexity of matching.

  • GAO Jian;CUI Zhixie
    Computer Engineering. 2006, 32(16): 188-189,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Co-evolutionary is an important technique in study of multi-agent systems. Recent year, it is widely interested and quickly developed, and may be a major study of evolutionary. This paper introduces the study status of co-evolutionary, includes the basic characters of co-evolutionary, and presents what may be developing trend of study of co-evolutionary.
  • LIU Lingli;;LI Lijuan
    Computer Engineering. 2006, 32(16): 190-192. https://doi.org/10.3969/j.issn.1000-3428.2006.16.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A set algorithm for preprocessing and minutiae extraction of fingerprint image is proposed in this paper. It is based on the analysis of the inherent feature of fingerprint. The method to get ridge frequency and the method to eliminate holes of binary image are proposed. Besides, a new approach to eliminate false minutiae of thinned fingerprint image is presented. These proposed algorithms have been widely tested and checked for hundreds of fingerprint images and excellent results are obtained.

  • LIN Rukun;LIU Fang;DAI Changhua;YAO Li
    Computer Engineering. 2006, 32(16): 193-194,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It’s difficult to define conceptions and relations between the conceptions in an ontology. Restriction in OWL is an effective method for this difficulty. Restriction is the core of OWL, facilitates to define a more complete and more explicit ontology, which satisfies minimal ontological commitment. This paper illustrates how to use restrictions of OWL to define a complete and explicit ontology by the Wine ontology provided by W3C.
  • YE Yufen;GUO Baolong;MA Jia
    Computer Engineering. 2006, 32(16): 195-197. https://doi.org/10.3969/j.issn.1000-3428.2006.16.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a perceived error-based error diffusion (PEB Error Diffusion)which aims at reducing the structured artifacts introduced by error diffusion. First the continous-tone image is halftoned by error diffusion, then the halftoned is rectified by the error between the perceived continous-tone image and the output halftone image. The algorithm efficiently reduces the structured artifacts in midtone area and results in higher visual quality. Besides, dot-overgain is weakened in some way.
  • ZHANG Wenguang ;ZHOU Shaolei ;DAI Shaowu;LI Xin;ZHAO Haiying
    Computer Engineering. 2006, 32(16): 198-200. https://doi.org/10.3969/j.issn.1000-3428.2006.16.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new BP wavelet neural network based on improved genetic algorithm (IGA) is proposed, and the simulation experiments about the XOR problem and the nonlinear-model identification have been done. The simulation results show that the new BP wavelet neural network based on improved genetic algorithm not only has the local property of wavelet analysis and the learning and classification capability of artificial neural network, but also has the advantages of the fast global searching of genetic algorithm. And compared with BP WNN based on simple genetic algorithm (SGA), it is clearly improved in terms of convergent speed and stability.
  • YANG Zhanhua;YANG Yan
    Computer Engineering. 2006, 32(16): 201-202,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The self-organizing maps (SOM) is an unsupervised learning algorithm, which is capable of self organization and visualization and has been used in many areas. In this paper, the background of self-organizing maps algorithm and basic algorithm are introduced, the parameter setting-up and disadvantage of SOM are analyzed. The improved algorithms have been reviewed emphatically, and research hotspot and applying fields are also discussed briefly. Finally, some remarks on future research are given.
  • MEI Shuli;GAO Wanlin
    Computer Engineering. 2006, 32(16): 203-204,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For eliminating boundary effection in image chaos encryption based on wavelet coding, a new image chaos encryption technology is proposed based on interval wavelet coding. Comparing with the traditional image extent method, the special extent processes is not needed in this method before the wavelet transform(WT) to image and after the inverse wavelet transform(IWT) to chaos encryption serials. The test results show that this method not only eliminates the boundary effect, but also compresses the image file. Otherwise, the value of parameter L can be changed to satisfy different precision request to the reconstruction of image.
  • Multimedia Technology and Application
  • FAN Ce
    Computer Engineering. 2006, 32(16): 205-206,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Because binary images can be regarded as mapping of Boolean functions, this paper proposes an encoding scheme based on minimization of Boolean function for representing binary images. The bigger storage compression is achieved compared to quadtrees and other tree-type representations. The result shows that the number of codes required to represent a binary image by the proposed scheme is about half of that by the quadtrees.
  • WANG Xiuli;NING Zhengyuan
    Computer Engineering. 2006, 32(16): 207-209,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Assessment of curvature is an important tool for the analysis of curves and surface in the interactive design system. The fairing algorithm by curvature for B-spline curves has been perfect. But fairing algorithm by curvature (including Gaussian and mean curvature)for B-spline surface is no more maturity. This paper presents a new algorithm based on the least square optimal method. That should lead to a desired result. This algorithm includes two steps: modifying the curvature of surface by curvature criterion of fairing surface, a new surface obtained by utilizing the least square optimal method based on result of the first step.
  • LI Yan;;WANG Yongdong;WU Wenzhi;WU Xiaodong
    Computer Engineering. 2006, 32(16): 210-212,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The texture synthesis from samples is a texture quilting method, which is developed after the proposal of procedural texture synthesis and texture mapping method. This paper presents a new approach for texture synthesis matching patch along a spiral path with the help of "texture consistency". The algorithm searches for new matching patch among the neighbors of the previous matched patch along a spiral path and continues this process in a recursive manner until the synthesizing image is fully filled. Compared with the Efros approaches under synthetic quality constant condition, the velocity, the synthesizing process of our technique, has raised 10 times in average. Experiments show that synthesizing results are quite satisfactory.
  • GUO Qiuping;XIANG Jie
    Computer Engineering. 2006, 32(16): 213-214,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An implementation of multi-channel full-duplex 16kbps CVSD voice codec by the DSP chip TMS320VC5509 of TI. Inc. is proposed in this paper. The design details of the CVSD algorithm is given too. Using embedded system based on MPC860 of Motorola Inc., a method of extending the DSP application filed is brought forward and might provide some valuable reference to the other applications of DSP.
  • ZHANG Kai;LI Chao;LIN Hai;SHI Jiaoying
    Computer Engineering. 2006, 32(16): 215-217. https://doi.org/10.3969/j.issn.1000-3428.2006.16.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the development of computer graphics hardware and distributed parallel rendering, the rendering capabilities of graphics workstations and PC clusters have improved a lot. But, the display resolution of monitors is far from enough. So, more and more people are focusing on using multiple projectors to form a display wall and provide large display resolution; one key problem of these kinds of systems is how to calibrate the projectors and makes the whole display seamless and perfect. This paper presents a universal display wall calibrating system which is independent of specific applications. And the system has successfully solved the traditional problems of universality, calibrating speed, and can achieve great calibrating results.
  • ZHANG Lina;GU Yaolin
    Computer Engineering. 2006, 32(16): 218-220. https://doi.org/10.3969/j.issn.1000-3428.2006.16.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The discrete gradient vector filed based on the Morse theory is presented, and is applied to visualization of topologies. This method and another flow visualization way are respectively demonstrated with the Moebius strap and the trumpet shell, the analysis and the compare are presented. The correlative theories are introduced first and then to construct the discrete gradient vector field. Finally the vector filed is visualized, and experiments show the availability of the result, and this method can be used for CAD and VR rendering.
  • SONG Ling;HU Fanliang
    Computer Engineering. 2006, 32(16): 221-223. https://doi.org/10.3969/j.issn.1000-3428.2006.16.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the key controlling technologies of video-audio QoS in software video conference. Based on RTP/RTCP, some methods are presented to realize the control of the data lost, audio-video synchronization and delay jitter, such as using high efficient coder/decoder, multi-thread programming, setting video key frame and adjusting the sender rate, sampling and receiving buffers dynamically. The results indicate that the performance of the system is satisfactory.
  • Engineer Application Technology and Realization
  • LIANG Weijie;HAO Jianping;LIU Anqing;LV Jianfeng
    Computer Engineering. 2006, 32(16): 224-226,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.086
    Abstract ( )   Knowledge map   Save
    Pointing at the problem in the process of using virtual maintainability analysis and evaluation system (VMSAS), such as the data sharing and access management, coherent control and security management, a system integration and data management project based on the product data management (PDM) system is put forward including the reasonable classification, organization, storage and management of data and technical information. A system integration project is come out between VMSAS and a PDM solution -TeamCenter, the realization and the key technology of the interface system are given.
  • GUO Wei;HEN Zongyu;I Congxin;U Xuejun
    Computer Engineering. 2006, 32(16): 227-228. https://doi.org/10.3969/j.issn.1000-3428.2006.16.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the features of PC/104. The development of control system of auto leveling device based on PC/104 is presented, including choosing the PC/104 models, the hardware structure design of the control system. The concept and the flow chart of the software and the main functions of the control system are also given. Through test, the control system is reliable, high precision and steady, it has low price, compact structure and small space, so it has better application foreground.
  • WANG Chonghai; ZHU Yunlong; YIN Chaowan
    Computer Engineering. 2006, 32(16): 229-231. https://doi.org/10.3969/j.issn.1000-3428.2006.16.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The demands of resource management in the distributed computing environment, the method and mechanism of the global integration and allocation of enterprise resources based on mobile agents, as well as its architecture are put forward. Resource class based resource integrated mode and its information model are put forward, and the two-layer integrated mechanism of resources is established. Mobile agents based resource allocation and the relative algorithms based on market rules are presented. At last, the example S2-ARIMS is developed.
  • ZOU Zhiqiang;
    Computer Engineering. 2006, 32(16): 232-234. https://doi.org/10.3969/j.issn.1000-3428.2006.16.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the realization of share memory technology based on CPCI bus, gives an instance of share memory based on Intel 21555 non-transparent PCI-to-PCI bridge, describes the theory of CPCI bus share memory technology, the software setting, and realizes the accessing to share memory space between two processor modules.
  • WANG Yi;SHEN Haibin;FAN Junfeng
    Computer Engineering. 2006, 32(16): 235-236,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As the LCD player is widely used in the embedded system, LCD controller IP becomes an important component of SoC. This paper introduces a design of LCD controller which supports TFT and STN LCD. This design uses a frame rate control algorithm based on space-hash to improve the quality of the LCD display. It uses two-level buffer structure to ensure steady output flow. The paper also introduces a modularized configurable automatic verification scheme. This design has been implemented on FPGA.
  • TAN Yu’an;WANG Wanxing;YU Qiang;ZHU Ligu;ZHANG Xuelan
    Computer Engineering. 2006, 32(16): 237-239. https://doi.org/10.3969/j.issn.1000-3428.2006.16.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The SCSI commands (XDWRITE, XDREAD and XPWRITE) are already on fibre channel drives to involve the drives participating in performing RAID 5 XOR functions. For “small writes”, traditional RAID-5 implementation requires a host or a RAID controller to read the original parity block, then construct the new parity block by computing the exclusive-or (XOR) of the original parity block and data blocks. the new SCSI commands have been adopted to implement the “small writes” without reading the parity block, and cause the drive to construct and update the parity block itself. By utilizing the disk’s XOR engine, the throughput is increased and the average latency is also reduced.
  • CHEN Lin;LIU Gui;;XU Yanqi;HE Hongqi
    Computer Engineering. 2006, 32(16): 240-242. https://doi.org/10.3969/j.issn.1000-3428.2006.16.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Using SystemC, this paper discusses the methodology of transaction level modeling in connection with on-chip bus models and with the chip of video post-processing, gives an example of transaction level modeling. The time bottleneck of current hardware/software co-design method can be eased effectively. This model can improve efficiency and reduce the cost of products.
  • TAN Ke;GUO Guangyou;PAN Xinhua;WANG Yongjun;XIONG Yueshan
    Computer Engineering. 2006, 32(16): 243-244,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a kind of nasoscope surgery simulation system used in rhinologist simulation training, and discusses the actualization of related techniques such as system structure design, 3D reconstruction, collision detection, elastic deformations of soft tissues and force feedback. It also briefly introduces its multiplicate navigation modes, virtual instruments and four kinds of simulation surgery.
  • MA Yuchun;SUN Bing;WANG Jianming
    Computer Engineering. 2006, 32(16): 245-246,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The computer monitor systems are almost used in every area in nowadays, the measure and control module is the very important I/O devices. To study these modules is beneficial to development, test and teaching. This paper designs and develops a virtual digital I/O module, including the hardware environment, communication protocols and the techniques for data processing. The virtual module is tested strictly, and gives an example for using the virtual module.
  • WANG Jiang;LIU Peilin;CHEN Yingqi
    Computer Engineering. 2006, 32(16): 247-249. https://doi.org/10.3969/j.issn.1000-3428.2006.16.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A software and hardware co-simulation environment has been built for the HDTV decoder SoC based on MIPS processor core. Using the VMC’s support of MIPS instruction set, and by running the assemble program for test in this environment which connects the VMC model of the MIPS processor core and the RTL model of the HDTV SoC, the software and hardware of SoC synchronously can be debuged, which can lead to a high-efficiency of SoC verification.
  • ZHANG Jian;HUANG Bei;WANG Yuyan
    Computer Engineering. 2006, 32(16): 250-252. https://doi.org/10.3969/j.issn.1000-3428.2006.16.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Regarding the high verification’s complexity of VLSI, This paper refers to a multi-port switch controller as a design under verification, analyzes the feature of high verification language, researches the strategy of verification, designes a verification testbench and accomplishes functional verification of the switch controller. The benefit of using the high verification language to build a verification testbench is of shorter verification cycle, less cost of verification, higher quality of verification.
  • XING Hui;WU Yuqiang
    Computer Engineering. 2006, 32(16): 253-255. https://doi.org/10.3969/j.issn.1000-3428.2006.16.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Component object model technology is the base of many Microsoft software, it provides a universal access to component object by spanning the program language, operating system and net, and makes it possible to integrate software by component object. This article realizes the mixed programming of MATLAB and Borland C++ Builder through COM technology, thus realizes the design of a self-adopted fuzzy PID controller.
  • SUN Li;PAN Hui;ZHANG Lifeng
    Computer Engineering. 2006, 32(16): 256-258. https://doi.org/10.3969/j.issn.1000-3428.2006.16.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The bottleneck between Intranets and control nets is an important problem for power plant control and management. Service gates based on OPC can be a solution to the problem. OPC, which is an open industry standard, can standardize the data communication in power plants and integrate Intranets and control nets. OPC service gates can be employed to transmit real-time data, to monitor system load and so on. Based on the analysis of Intranets and control nets, a scheme that utilizes OPC service gates is proposed with detailed explains of its key technology. OPC service gates can solve the problems including availability, real-time, security, network address translator(NAT) and so on.
  • Developmental Research
  • LI Mintong;ZHANG Zhanguo
    Computer Engineering. 2006, 32(16): 259-260,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new method of designing the menu of the tree-like topological structure with linear array of one dimension. This method has high efficiency in using the memory, and has a simple and clear logic relation. In addition, the setting-up and modification of the menu is very convenient. The new method is suitable for the application system of the single-chip computer.
  • WU Zhengyang;LI Jigui
    Computer Engineering. 2006, 32(16): 261-263. https://doi.org/10.3969/j.issn.1000-3428.2006.16.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Along with the development of the semantic technology, Web Service is already applied in the E-commerce field abroadly. However, how find the Web Services effectively is still the difficulty in study field. This paper presents a structure defined by the OWL-S for Web Services finding and matching, and designs a model based on the structure. This model uses the OWL-S’s characteristics which make Web Services could being found, transferred, composed and monitored. At the same time, the running of the antetype system indicates: the model can improve the efficiency to find and match the Web Services, and presents a good solve scheme for the system indiciduation and interface integration to E-commerce.

  • ZHANG Jizheng;LI Dong;GUO Jing;JIA Huibo
    Computer Engineering. 2006, 32(16): 264-266. https://doi.org/10.3969/j.issn.1000-3428.2006.16.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper uses popular benchmarks to test their iSCSI storage systems, and gives the essential difference between iSCSI and NAS which is another important IP-based network storage technology and draws a comparison between iSCSI and NFS protocol in Linux and CIFS protocol in Windows (NAS scheme) by performance testing. iSCSI metadata operations are also be examined. The obtained experimental results indicate that iSCSI can provide high performance in most cases but may be limited by implementation. And iSCSI metadata operations should be properly treated to improve the performance of iSCSI protocol.
  • MA Huan;WUSHOUER·Silamu
    Computer Engineering. 2006, 32(16): 267-268. https://doi.org/10.3969/j.issn.1000-3428.2006.16.102
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article has a major discussion on how to analyze and research the text analyze model of the Uighur text to speech system based on the features of the Uighur language and phonetics. Through the understanding for some sound factors for example the syllable and word of Uighur,the paper analyses the syllable construction (Satisfy this rule basically: Usyl=C+V+C+C) and the word construction. Based on these it concludes the syllable demarcate rule, etyma and affix demarcate rule and the vary rules of accent, tie-up and tone, that establishes a solid foundation for the Uighur realize speech synthesis system further.
  • CHEN Guozheng
    Computer Engineering. 2006, 32(16): 269-270,. https://doi.org/10.3969/j.issn.1000-3428.2006.16.103
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces advantage of open computer laboratory management based on Linux, makes use of the powerful network in Linux function, perfect software supports, realizing to open the laboratory management. It puts forward the design solution of the network flow account based on Linux. It’s proved that the design is available and feasible, the method is more efficient than former models and can be easily realized in practices.
  • LI Qiqing;CHENG Chengqi;GUO Shide;HE Huawei
    Computer Engineering. 2006, 32(16): 271-273. https://doi.org/10.3969/j.issn.1000-3428.2006.16.104
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    BNs classifications for remote sensing image is divided into three courses include preprocessing, the BNs model construction and image classification. Preprocessing is the foundation of the other two steps. The preprocessing step has large effect on the whole classification results. The goal of preprocessing is to extract the information high-efficiency and exactly and to eliminate disturbance from image features. This paper introduces the process about data preprocessing technique and the algorithm implementation. Because of the characteristic of remote sensing data and BNs method, the preprocessing is divided into two parts, one is spectrum space segmentation, and the other is mutual information computation. The principles and the algorithms of two parts are introduced. It is very important for the development of preprocessing technique.
  • LIU Shaoqiu;QIU Weidong;CHEN Kefei
    Computer Engineering. 2006, 32(16): 274-276. https://doi.org/10.3969/j.issn.1000-3428.2006.16.105
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Intermediate business is a new rising point in banking economy. This paper presents a scheme to realize the integrated front-banking system based on intermediate business. This paper expatiates on the system’s framework, function and security. The practical system is working well in one commercial bank now. The system is not only compatible with old intermediate business, but also can meet the demand of business development, it provides the support for bank.
  • ZHANG Ping;YAN Yixin;XU Chagxin;CHEN Jinfeng
    Computer Engineering. 2006, 32(16): 277-279. https://doi.org/10.3969/j.issn.1000-3428.2006.16.106
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article makes software development process of SPM-CMMI based on CMM/CMMI software development model. Furthermore, it applies SPM-CMMI model to the simulation of port and city economy system evolution in Yangtze River delta. The development process of YRDM project proves that SMP-CMMI1.0 enables software process of CMM/CMMI.
  • ZHOU Yonghua
    Computer Engineering. 2006, 32(16): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2006.16.107
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper elucidates the functional objectives of the system of mobile transportation information service, designs the system architecture, and proposes the solution based on such critical techniques as mobile network, mobile positioning, geographical information system for transportation, traffic-flow data collection and processing, XML-based organization and application of transportation geographical information, grid computing, flow media service, etc. The technique of predictive control-based vehicle navigation is presented, which is set as an example to analyze the application of designed system and employed critical techniques.
  • LUO Jianchao;FENG Hao;LUO Lei
    Computer Engineering. 2006, 32(16): 283-285. https://doi.org/10.3969/j.issn.1000-3428.2006.16.108
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As the embedded technology has been widely applied, to ensure the communication security of embedded applications becomes more and more necessary. However, independent SSL product for embedded applications has not appeared. This paper gives a design of the embedded SSL protocol stack. Furthermore, one kind of embedded network architecture model, which can be commonly used, is presented.