Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 July 2006, Volume 32 Issue 14
    

  • Select all
    |
    Degree Paper
  • LU Guangquan;XU Hongguo;LI Yibing
    Computer Engineering. 2006, 32(14): 1-3,10. https://doi.org/10.3969/j.issn.1000-3428.2006.14.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Line segment is important feature. Line detection based on chain code detection is proposed. First of all, chain codes are tracked in an edge image. The corners in chain codes are detected according to the estimated curvature, and chain codes are split at the corners. Chain codes of line segments are recognized, and only the chain codes which represent line segments are kept. Parameters of line segments are estimated according to the chain codes, and the broken parts of line segments are linked based on the linking criterions. Experiments with real images show that the method is effective to detecting line.
  • MA Bingxian;;WU Zhehui;XU Yinglei
    Computer Engineering. 2006, 32(14): 4-6,19. https://doi.org/10.3969/j.issn.1000-3428.2006.14.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    主体;多主体系统;计划;Petri网
  • GUO Junwen;QIN Zheng;HE Shengping;HUANG Hexiao
    Computer Engineering. 2006, 32(14): 7-10. https://doi.org/10.3969/j.issn.1000-3428.2006.14.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new function group formation algorithm based on attribute value for space group target, which has the ability to realize function group formation. The uncertainty of measurement space is mapped into the fuzzy attribute value space, and the uncertainty of measurement space is resolved via the fuzzy match mechanism. With lower calculation complexity less than O(n2), it is more efficient to generate group formation for maneuvering target by simulation results.
  • XIE Mande
    Computer Engineering. 2006, 32(14): 11-13. https://doi.org/10.3969/j.issn.1000-3428.2006.14.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A non-uniform-grid graph model is introduced and a self-adaptive iterative algorithm is presented for multi-layer gridless area routing. The algorithm can not only handle the case in which the number of metal layers is uncertain but also greatly reduce the search space of multi-layer maze routing by converting multi-layer into multiple two-layer pairs. Based on the feature of non-uniform-grid graph, the optimal maze routing algorithm, which generates the shortest length by steering clear of obstacles, is employed. The experiment data shows the algorithm has rapid search speed and better routing quality.

  • XIAO Jianyu;;ZHANG Deyun; CHEN Haiquan;DONG Hao
    Computer Engineering. 2006, 32(14): 14-16,4. https://doi.org/10.3969/j.issn.1000-3428.2006.14.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a algorithm for static slicing of concurrent programs. Based on the analysis of the fact that Krinke’s slicing algorithm produces imprecise program slice for the program structure which has loops embedded with one or more threads, a conclusion is drawn that the reason for the impreciseness is that Krinke’s data structure which threads program dependence graph and has over coarse definitions of data dependence relations between threads, The constraint puts on the execution path in concurrent program is too loose. An improved algorithm is proposed which added a new kind of data dependence relation between threads-loop carries data dependence crossing thread boundaries and introduces a new concept of regioned execution witness to further constrain the execution path. Examples show that the improved slicing algorithm could restrain the impreciseness of Krinke’s.
  • ZHAO Feng;;LI Qinghua;;ZHAO Yanbin;
    Computer Engineering. 2006, 32(14): 17-19. https://doi.org/10.3969/j.issn.1000-3428.2006.14.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In recent years, Bayesian approach becomes an important method in data mining because of its high ability on processing imperfect, overflow and noisy data. This paper applies Bayesian approach for sequential pattern mining and puts forward the statistics model for sequence data, and more. It designs a new mining algorithm for sequence based on Bayesian theory in a noisy environment, validates the correctness and analyzes the complexity of this algorithm.

  • SUN Haiyan;HOU Chaozhen
    Computer Engineering. 2006, 32(14): 20-22,4. https://doi.org/10.3969/j.issn.1000-3428.2006.14.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For the problems of clock synchronization in one-way network performance measurement. This paper puts forward the optimizing goal of minimizing normal distance. And the clock synchronization optimization algorithm which improves the accuracy of one-way network delay measurement is deduced based on the optimizing goal. Finally, the algorithm proves effective by analyzing an actual network delay measurement result.

  • XIA Yongquan;YANG Jingyu
    Computer Engineering. 2006, 32(14): 23-24,5. https://doi.org/10.3969/j.issn.1000-3428.2006.14.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a new binocular stereo matching approach based on Walsh transformation. This approach gets the Walsh coefficient through transform image by using Walsh orthogonal transform kernel, after the transformation, the coefficient embeds the characters of images, so the characters of image are represented in the form of Walsh coefficients. The provided algorithm in the paper uses the Walsh transform coefficient as match base to replace the pixel gray value. The result disparity, relevant data and figures are listed in the paper and the result indicates that this approach of using Walsh coefficients as match primitives is possible and valid.

  • Software Technology and Database
  • WANG Jimin;;GONG Bihong; MENG Tao
    Computer Engineering. 2006, 32(14): 25-26,6. https://doi.org/10.3969/j.issn.1000-3428.2006.14.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The Web queries submitted to search engines usually involves single or multiple topics. This paper investigates and analyzes the characteristics of multitasking Chinese Web searches based on the query logs of Tianwang system, a large-scale Chinese search engine. The results shows: More than one third of users often perform multitasking Web searching; More than half of multitasking sessions include two topics, with two to seven queries per session; The mean duration of multitasking sessions is twice that of regular sessions; Most multitasking searches in Tianwang systems have three topics: computer/network, entertainment and education; Nearly one fourth of multitasking sessions include inexplicit information. In addition, this paper also carries out the analysis of association rule and finds some relationships among session topics.
  • GENG Hui;FANG Jun;;HAN Yanbo
    Computer Engineering. 2006, 32(14): 27-30. https://doi.org/10.3969/j.issn.1000-3428.2006.14.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Dynamic binding and substitution of services is the key to keep the applications run smoothly. On the basis of the requirements of service matching for business end programming and the analyses of several prevailing algorithms, this paper presents a new service matching approach to support dynamic and agile application execution. It is proved that the algorithms meets the frequently changed business requirements. This approach is used in a project which aims to mediate individual services for the general public in the Olympic Games 2008.

  • DENG Chunhong;
    Computer Engineering. 2006, 32(14): 31-32,5. https://doi.org/10.3969/j.issn.1000-3428.2006.14.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper presents the topological interpretation of compatibility kernel. Given a compatibility relation R on the universe of discourse, it is pointed out that the topology of interior sets, associated with the quasi-discrete closure space that is induced by binary relation R, is precisely the topology, which has as base the collection of R_ relative set of each element. Also, by exploiting the specification preorder of this topology, it is pointed out that the compatibility kernel of each element is the closure, in the sense of the topology of interior sets, of singleton.
  • ZHANG Chunying; LIU Baoxiang
    Computer Engineering. 2006, 32(14): 33-34,4. https://doi.org/10.3969/j.issn.1000-3428.2006.14.012
    Abstract ( )   Knowledge map   Save
    Using set pair analysis (SPA) method, this paper defines the upper approximation and the lower approximation of set in a incomplete information system with one-direction transfer, puts forward the one direction transfer rough sets model and its mathematicas structures in an incomplete information system, shows the existing background and meaning of the one direction transfer rough sets in an incomplete information system. One direction transfer rough sets in an incomplete information system is perfect to the theory of one direction S-rough sets in a complete information system and the rough sets in an incomplete information system.
  • HAN Bo;;KANG Lishan;CHEN Yuping;SONG Huazhu
    Computer Engineering. 2006, 32(14): 35-36,3. https://doi.org/10.3969/j.issn.1000-3428.2006.14.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a fusion approach, which combines radius-basis-function artificial neural network model learning from global data with spatial interpolation model sampling from local data. The integration model minimizes the mean squared prediction errors by optimizing weights of their outputs and correcting the errors. It evaluates the fusion approach by cross-year-validation based on multi-angle imaging spectra radiometer (MISR) collected from January 2002 to December 2003 over 26 local regions in the continental US. It is noticed that fusion model can significantly reduce prediction error on land and desert.
  • SU Weiji;ZHAO Hai;ZHANG Wenbo;XU Ye
    Computer Engineering. 2006, 32(14): 37-39. https://doi.org/10.3969/j.issn.1000-3428.2006.14.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The nodes of sensor networks is a computer system based on embedded devices whose request is strict with function, reliability, cost, volume, power. In this system each task, device and connection of network all need enough memory, so selecting adaptive memory management algorithm and more effective using memory are important problem to improving system performance. Based on independently developed sensor network node operating system (SNNEOS), this paper discusses memory allotment algorithm and memory collection algorithm of memory management. An effective method of memory management is provided.
  • CHEN Yiying; ; WU Qiang;LI Wenbin;
    Computer Engineering. 2006, 32(14): 40-42. https://doi.org/10.3969/j.issn.1000-3428.2006.14.015
    Abstract ( )   Knowledge map   Save
    Many researchers focus on mining association rules, in which the most important step is generating frequent items set (FIS). This paper puts forward a new method named tree-DM to mining association rules, which is based on operators of transaction tree. Tree-DM has many advantages such as: (1) it only scans transaction database one time; (2) it can find transaction set which includes frequent items set; (3) it has reasonable complexity of time; etc.
  • ZHANG Shuying;; LIU Shufen;BAO Tie
    Computer Engineering. 2006, 32(14): 46-48. https://doi.org/10.3969/j.issn.1000-3428.2006.14.017
    Abstract ( )   Knowledge map   Save
    This paper proposes a distributed data collecting system based on cluster, which implements data collection on the components, namely: task assignment center, cluster manage center, collection agents based on multilayer structure. In addition, three assign strategies of cluster, choice mechanisms of the manage center and the design project of collecting agents are also proposed. Experimental results show that the methods proposed in this paper are applicable and can effectively improve the speed of the data collecting and resolve the disadvantages of the traditional methods in the large scale networks, such as overload of the data transmission and bottleneck of the data transaction etc. They have great potential and application value in the field of the data collecting.
  • MAO Yifei;TAO Shiqun
    Computer Engineering. 2006, 32(14): 49-50,6. https://doi.org/10.3969/j.issn.1000-3428.2006.14.018
    Abstract ( )   Knowledge map   Save
    Semantic query optimization in deductive database is based on integrity constraints to convert user’s query to another one that is the equivalence to the former and more efficient. This paper proposes the dynamic query optimization, which deletes the null expansions in the process of the query so that the cost can be simply measured by the scale of deleted these null expansions. In the field such as deductive database that has more null expansions, the dynamic query optimization algorithm shows more applicability.
  • ZHANG Fan;ZHOU Xingshe;YAN Shoumeng
    Computer Engineering. 2006, 32(14): 51-53. https://doi.org/10.3969/j.issn.1000-3428.2006.14.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyses the problem in network processor based software development, proposes a network processor programming model based on component, which has high portability and extensibility, and introduces the key technology in the implementation of this model, which resolves the difficulty in the application of traditional network processor.
  • JI Mengluo; LI Jun;WANG Xin; QI Zhichang
    Computer Engineering. 2006, 32(14): 54-56. https://doi.org/10.3969/j.issn.1000-3428.2006.14.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a worst-case execution time (WCET) analysis method where its automatic program flow analysis method is based on value range propagation method supported by abstract interpretation. The WCET analysis method is for modern RISC processor including pipelining and caching. Based on this method, the paper implements a WCET analysis tool——NPCA-WCET.
  • RUAN Jun;;YANG Chunjin
    Computer Engineering. 2006, 32(14): 57-59. https://doi.org/10.3969/j.issn.1000-3428.2006.14.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Software reuse for software architecture is a certain demand on mass production of software for computers. This paper discusses a software architecture based on patterns, which is a multi-tiered distributed system’s structure by technique of Borland Data Snap. In this scheme, business logic layer is encapsulated by an expanded “Facade”, and remote data module is optimized by using two-object pooling.
  • SUN Mandun; LI Junshan;HAN Xianfeng
    Computer Engineering. 2006, 32(14): 60-62. https://doi.org/10.3969/j.issn.1000-3428.2006.14.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Grid is an innovative information services infrastructure to implement dynamic, distributed resources sharing and collaboration. In accordance with current state of grid application’s research and development, a layered grid workflow architecture is proposed:modeling grid workflow in design layer with grid workflow logic and grid workflow semantic, operating task in running layer utilizing grid workflow scheduling engine and grid workflow operating engine, and grid middleware is the interface of resource layer and running layer. For supporting the architecture, an extended computing net model is defined based on (extended) workflow net and computing net. At last the environment of layered grid workflow is presented.
  • LIU Zhichen; MENG Yimin; YU Junjie
    Computer Engineering. 2006, 32(14): 63-65. https://doi.org/10.3969/j.issn.1000-3428.2006.14.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Some problems are caused by the periodic timer interrupt in µC/OS-II, so the improving algorithm for the timer is proposed and implemented to solve the problems. If the improving algorithm is implemented in µC/OS-II, the performance of the kernel will be enhanced. And the application range of µC/OS-II is expanded.
  • ZHOU Xing; LIU Zhaohong; XIA Ying; GE Junwei; BAE Hae-young
    Computer Engineering. 2006, 32(14): 66-68. https://doi.org/10.3969/j.issn.1000-3428.2006.14.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    With the development of location technology, advanced location-based services will increasingly require database technologies capable of tracking the positions of large amounts of continuously moving objects in the following years. TPR*-tree is a kind of index structure which supports to query the current and future positions of moving objects. TPR*-tree concurrency control scheme in main memory is presented, which can satisfy to correctly query positions of moving objects. Two most important techniques for implementing scheduler are combined: locking and timestamping technologies which drop conflict and execution time. The scheme improves concurrent efficiency.

  • CHEN Hao;XIONG Wei;WU Qiuyun;CHEN Hongsheng
    Computer Engineering. 2006, 32(14): 69-71. https://doi.org/10.3969/j.issn.1000-3428.2006.14.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Compatible with Oracle PL/SQL V8.0 specification, a solution scheme of parsing and identifying the object in PL/SQL programs is proposed on a native database management system GKD-Base and PL/SQL engine. So the object-oriented technique is introduced to GKD-

  • ZHU Zhiqiang;TANG Xiaoming
    Computer Engineering. 2006, 32(14): 72-74. https://doi.org/10.3969/j.issn.1000-3428.2006.14.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the autonomous control platform of unmanned combat aerial vehicles (UCAVs), the architecture of the core-computer is proposed. This core-computer can meet the requirements of real-time response, information processing and intelligence decision, even under hash environment. Meanwhile, this core-computer is such a hybrid computer that integrates the multiprocessor technology, neural network and fuzzy reasoning.
  • WANG Weike;WU Jian
    Computer Engineering. 2006, 32(14): 75-77. https://doi.org/10.3969/j.issn.1000-3428.2006.14.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As NE (network element) devices become more and more intelligent, the software resources of NEs, turn out to be more important. However, the traditional NE management system lays emphasis on the management of the hardware layer. To solve the problem, this paper proposes a CORBA-based design model for NE software management and implements the functions of the management.
  • WANG Jinhua; WU Rongquan
    Computer Engineering. 2006, 32(14): 78-80,1. https://doi.org/10.3969/j.issn.1000-3428.2006.14.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Subject-based publish/subscription can transform data from data source to destination. The technology can be used to publish and subscribe database information, it can also be used to publish and subscribe real time information from application. This technology can be applied to realtime database replication and realtime information replication. It can also be used to conform datahouse and can be used in data distribution environment.
  • Networks and Communications
  • WANG Hongjun;;WANG Dadong ;LIANG Haiying;GAO Yuan
    Computer Engineering. 2006, 32(14): 81-82,1. https://doi.org/10.3969/j.issn.1000-3428.2006.14.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A method to dynamically detect BGP configuration errors is proposed. The method focuses on two types of misconfigurations, origin misconfiguration and export misconfiguration. To find the origin misconfiguration, the method checks the prefixes of inbound or outbound routes to verify whether the prefixes announced belong to the original AS. According to the commercial relationship between ASes, the method finds the export misconfiguration by checking whether one AS in the AS-PATH violates the export guideline. Finally, the method is proved to be feasible through simulation.

  • HE Yanxiang; WEN Weidong; JIN Hui; LIU Haowen
    Computer Engineering. 2006, 32(14): 83-84,1. https://doi.org/10.3969/j.issn.1000-3428.2006.14.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel routing scheme named by Ant-CEDAR for mobile Ad Hoc network (MANET), which enhances core-extraction distributed Ad Hoc routing algorithm (CEDAR) using ant-like mobile agents to get efficient routing. The results of simulation experiments show Ant-CEDAR gains more efficiency and lower cost.

  • HUANG Xiaolu;;MIN Yinghua;
    Computer Engineering. 2006, 32(14): 85-86,1. https://doi.org/10.3969/j.issn.1000-3428.2006.14.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a semi-Markov model to character Internet traffic, which is applied to traffic prediction. Some practical trace data with different time scales from WAN and LAN is employed to verify the model and the prediction method respectively. The prediction accuracy of all data is smaller than the confidence set beforehand. The result shows that the model is well matched to real network traffic and the prediction method based on the model has good performance.
  • SU Weiji;ZHAO Hai;ZHANG Wenbo;XU Ye
    Computer Engineering. 2006, 32(14): 87-88,9. https://doi.org/10.3969/j.issn.1000-3428.2006.14.032
    Abstract ( )   Knowledge map   Save
    A kind of sensor router algorithm based on free scale networks’ character is brought forward. The algorithm could realize self-organized creating and dynamic adjusting topology, and form virtual backbone network on the topology to support entire network data routing. High redundancy routing design principle is adopted so as to improve the reliability. And data fusion function is also included, in which each backbone network node fuse redundancy data gathered before spread. All these functions can obtain sensed object’s information more effective and reduce spread cost and accordingly improve life cycle of the network.
  • HUANG Jingwei;FAN Qingfeng;WU Qiongli;HE Yanxiang
    Computer Engineering. 2006, 32(14): 89-91. https://doi.org/10.3969/j.issn.1000-3428.2006.14.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The dynamic updating and replication of LDAP (light weight directory access protocol) directory tree would happen frequently for grid information system is distributed widely, highly fault-tolerant, dynamic and diversiform. To improve the system efficiency, this paper puts forward the strategy of caching plus cascading replication and fast spread. Compared with many other replication strategies and considered in different grid infrastructure, the strategy of caching plus cascading replication and fast spread can boost the efficiency of grid information service system that regards the distributed database of LDAP as the foundation.
  • YI Fasheng;WANG Yan;XIA Mengqin;ZENG Jiazhi
    Computer Engineering. 2006, 32(14): 92-94,9. https://doi.org/10.3969/j.issn.1000-3428.2006.14.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper puts forward a GACK-based improved algorithm of slide window protocol, which asks that receiver sends an acknowledgement for a group of packets according to sender’s request. Compared to delayed ACK, the algorithm reduces the number of ACK, and eliminates bad influence on efficiency of the data transportion. The simulation results demonstrate that the algorithm reduces the request to network sources in slide window protocol and keeps nice transporting efficiency.
  • XU Wenbo;ZHANG Tao
    Computer Engineering. 2006, 32(14): 95-97. https://doi.org/10.3969/j.issn.1000-3428.2006.14.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    How to schedule resource successfully in complex grid environment is a NP problem. Parallel genetic algorithms have been proven to be a good way to solve this problem, but they have shortcomings such as premature and slow convergence. In order to overcome these shortcomings, it brings ant colony algorithm in. Combining two algorithms can exert each advantage, parallel genetic algorithms can solve computing resource scheduling problem more effectively.
  • ZHOU Caibao
    Computer Engineering. 2006, 32(14): 98-100. https://doi.org/10.3969/j.issn.1000-3428.2006.14.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The dilatability increase of network scale, the rapidity enhancement need of network bandwidth by users, the emergence in endlessly of vary kinds of new services, the technical need of intellectualized management and upgrading applications speed up the naissance of network processor. A new generation of network equipment architecture based on the kernel of network processor has been formed. This paper introduces simply the definition and functions of NP, the architecture and characteristics of NP, the main differences between NP and general CPU are analyzed, and the architecture of micro-engine which is the main logic block of NP is described. Then some keystones how to design micro-engine are given.
  • ZHENG Chuangming;YANG Shitai
    Computer Engineering. 2006, 32(14): 101-103. https://doi.org/10.3969/j.issn.1000-3428.2006.14.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The routing protocols have been the focus of the researchers for Ad hoc network study in recent years. How routing protocols can be adaptive to the rapid change of the Ad hoc network topology is the most important of all their care. That QoS performance of Ad hoc network is improved by use of power control technology is put forward in this article. And this algorithm is described in detail in the paper. Some key parameters of calculation method used in new algorithm are provided, and how the new algorithm is implemented in actual equipment. new algorithm is also demonstrated in the designed simulation model in OPNET software. The result of simulation proves that the new algorithm can be adaptive to the rapid change of the Ad hoc network topology.

  • LU Jingbo;CHEN Zhigang;LIU Anfeng
    Computer Engineering. 2006, 32(14): 104-106. https://doi.org/10.3969/j.issn.1000-3428.2006.14.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on Linux virtual server(LVS), this paper implements a dynamic load balancing scheme. It evaluates the whole system’s load balance, chooses the server set which is adjusted. Then it uses the feedback method to adjust the weight of these servers according to their loading. By this way, a dynamic load balancing of the Web server clustering is implemented.
  • Security Technology
  • WANG Xuren;;XU Rongsheng
    Computer Engineering. 2006, 32(14): 107-108,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Intrusion detection system has some defects, such as signatures being generated manually, updating difficulty and doing nothing in front of large data set. This paper discusses intrusion detection system with machine learning techniques. By making usage of Gene algorithm and Bayes classifiers, the defects mentioned above can be reduced to some extent and some tests have been done to show machine learning magic capability in intrusion detection system.
  • FU Maosheng;REN Zhe;HOU Zhengfeng
    Computer Engineering. 2006, 32(14): 109-110,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an alerts association analysis technology based on intrusion intention in order to overcome the problems exited in today’s alerts association analysis technologies. This method not only inherits the merits of the alerts association analysis technology based on intrusion strategy such as foreseeable, but also improves the adaptability of the intrusion strategy model. Furthermore, it gives the “skipping step” analysis mechanism and its improvement on the comprehension ability of the intrusion detection system.
  • QIN Zhongyuan;HU Aiqun
    Computer Engineering. 2006, 32(14): 111-113. https://doi.org/10.3969/j.issn.1000-3428.2006.14.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Trusted computing is the new stage of information security. It brings security chip architecture in the computing hardware platform, and the whole system’s security is greatly improved correspondingly. The origin and development of trusted computing are introduced, especially its architecture and the key components such as the trusted platform module, root of trust, etc. The current research has also been concluded.
  • HUA Jianguo;XU Zhengquan;CHEN Lin; MA Haibo
    Computer Engineering. 2006, 32(14): 114-115,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Multicast protocol is a mechanism to send a message to multiple receivers simultaneously. But the security of multicast hinders the wider application of multicast, of which the most important problem is key management. But most of current schemes of key management have problems such as long delay, poor scalability, poor reliability. According to features of multicast address of IPv6 and MLD protocol, a novel distributed multicast key management scheme of pattern logical key tree based on IPv6 and limited members is proposed in the paper. The result of simulation shows that the scheme has the advantages of short delay, rich scalability and rich reliability.
  • LI Qunhui; WEI Renyong; LI Zhiyong
    Computer Engineering. 2006, 32(14): 116-118,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.043
    Abstract ( )   Knowledge map   Save
    Most secret sharing schemes have the problem that other participants’ shadow must be recalculated if an old participant is deleted or a new participant is added. An efficient multi-secret sharing scheme has been proposed based on general access structure. In the proposed scheme, the dealer can add a new participant or delete an old participant without changing other participants’ shadow. Moreover, the scheme not only can detect the cheating of the dealer or any participant efficiently, but also the participants can reconstruct a secret with parallel procedure in a secret recovery phase
  • ZHANG Baiyi;CUI Shangsen;
    Computer Engineering. 2006, 32(14): 119-121. https://doi.org/10.3969/j.issn.1000-3428.2006.14.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characteristics of the concurrence of network intrusion and the uncertainty of an attack action, a kind of intrusion detection method based on fuzzy Petri net model is extracted to express the knowledge and the reasoning rules. Firstly, the paper defines 6-tuple as the fuzzy Petri net structure. Secondly, two basic types of the fuzzy production rules are extracted from a number of practical rules. And then a fuzzy reasoning algorithm is programmed. Using a practical instance to test the algorithm at the last, the results show that the algorithm is simple, high-powered and universal. Specially, it has parallel reasoning ability and fits reasoning for the large-scale FPN model. It is an efficient method for intrusion detection.
  • WANG Na; WANG Yadi;WANG Binqiang
    Computer Engineering. 2006, 32(14): 122-124. https://doi.org/10.3969/j.issn.1000-3428.2006.14.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The present methods to design secure protocol have the following characters: abstract, the narrow application range, complexity, and non-system. This paper presents a novel approach, which firstly combines the implementation modules of protocol type and secure properties to construct the original protocol, and then according to protocol requirements, perfects it to form the final protocol. The approach can be applied to all secure protocols, and it is easier for people to design secure protocol, and to implement the auto-design of secure protocol. At last, the paper illustrates the two-part key establishment protocol to show how one use this approach to design secure protocol.
  • ZHANG Bo;LI Weihua
    Computer Engineering. 2006, 32(14): 125-126,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The phishing hazard becomes more and more terrible. This paper introduces and analyses the phishing attack behaviors. It adopts the methods of building the attack forest and sorting the attack behaviours and then constitutes the attack model. It presents the anti-phishing theory system and some countermeasure. Furthermore it analyses the phishing attack and defence based on the IPv6.

  • SHAN Linwei;SHAN Xiuming;REN Yong
    Computer Engineering. 2006, 32(14): 127-129. https://doi.org/10.3969/j.issn.1000-3428.2006.14.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Multimedia network conference is an important network application. The security support of implementing the network conference is necessary. This article firstly introduces the session initiation protocol and the inter-domain network conference model; then, it analyzes the security framework principles and presents the full design; finally, it combines the security framework with the network conference management functions and presents an example of signaling flow.
  • SHI Liang;WANG Beizhan; YAO Junfeng
    Computer Engineering. 2006, 32(14): 130-132. https://doi.org/10.3969/j.issn.1000-3428.2006.14.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an alerts association analysis technology based on intrusion intention in order to overcome the problems exited in today’s alerts association analysis technologies. This method not only inherits the merits of the alerts association analysis technology based on intrusion strategy such as foreseeable, but also improves the adaptability of the intrusion strategy model. Furthermore, it gives the “skipping step” analysis mechanism and its improvement on the comprehension ability of the intrusion detection system.
  • SHI Liang;WANG Beizhan;YAO Junfeng
    Computer Engineering. 2006, 32(14): 133-135. https://doi.org/10.3969/j.issn.1000-3428.2006.14.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new authentication scheme based on smart cards and fingerprint recognition, which solves the insecure problem of the present one using identities and passwords for electronic filing of tax returns systems. This scheme combines fingerprint recognition with the enhanced remote user authentication scheme using smart cards proposed by Awasthi, and uses fingerprint information to justify the owners of smart cards and generate random numbers, keys and passwords, which has the characteristics of dynamic keys, dynamic passwords and two-way authentication, and improves the security of electronic filing of tax returns systems.
  • TIAN Xiuxia;CAO Zhenfu
    Computer Engineering. 2006, 32(14): 136-137. https://doi.org/10.3969/j.issn.1000-3428.2006.14.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the base of blind signature, this paper presents an identity-based(ID-based) authenticated blind signature scheme, it implements effectively user΄s identity authenticated function and blind signature, makes blind signature more secret and effective in electric business and cash charge business, makes user not need exceed certified system to vertify identity legal, it improves system work efficiency.
  • ZHANG Lei;ZHANG Chuan; XU Zhengquan
    Computer Engineering. 2006, 32(14): 138-140. https://doi.org/10.3969/j.issn.1000-3428.2006.14.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
  • CHEN Xiang;ZUO Hongfu
    Computer Engineering. 2006, 32(14): 141-142,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Now XML data encryption method is focus on special application, lacks of description for encryption process, it is not common and efficient. A new language which controls the encrypting process is designed based on symmetric cryptography and asymmetric cryptography. With this language, encrypting process could be universal and more efficient. Furthermore, implementation of this method is provided.
  • ZHENG Ting;SHI Xingrong;YUAN Pingbo
    Computer Engineering. 2006, 32(14): 143-145. https://doi.org/10.3969/j.issn.1000-3428.2006.14.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A secure solution scheme based on certificates issued by nodes themselves has been proposed for mobile ad hoc networks (MANETs). The certificate hunter algorithm which the scheme uses can only assure obtain a certificate link in probability. It also requires that nodes have good storage and computing capability, and is short of certificate management. Combining the idea of issuing certificates nodes themselves and certificate link, this paper proposes a new security solution scheme of MANETs, which enhances the security from improving certificate management, how to obtain the verifiable public key of destination node, proposing mutual entity authentication based on challenge-signature and securing communication.
  • FENG Chaosheng;YUAN Ding
    Computer Engineering. 2006, 32(14): 146-148. https://doi.org/10.3969/j.issn.1000-3428.2006.14.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses how keys are distributed in database encryption system and proposes an easily implementing scheme of key distribution which requests an user to own only a key instead of keys of all datum classes which can be accessed by users. When a user accesses the system, it is extremely easy for the system to work out those keys of all secure datum classes which can be accessed according to user,s key. In the scheme, it became easy to add or delete a datum class or a user class and alter a user’s security.
  • WANG Bin;ZHANG Yuanyang
    Computer Engineering. 2006, 32(14): 149-150,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Through analysis of the security of the One-time Password scheme mentioned in article[1], this paper finds that this scheme uses a single authentication protocols which can not resist the men-in middle attack. To solve the problem, it proposes an improved scheme—a mutual authentication protocols. The new scheme can conquer the security problem of the original scheme with the same computational complication and hold all security characteristics of the original scheme. So the developed scheme has higher security than the original scheme.
  • CAI Weijun;;HUANG Hao;
    Computer Engineering. 2006, 32(14): 151-153. https://doi.org/10.3969/j.issn.1000-3428.2006.14.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    IP tracing and source-finding technology has great significance in anti-DDoS attack. This paper classifies present IP tracing and source-finding technology systemically, analyzes various IP tracing and source-finding technology comprehensively, and compares them each other. It discusses the development trend of IP tracing and source-finding technology in the basis of currently status.
  • ZHU Zhi;YAN Xiaoguang
    Computer Engineering. 2006, 32(14): 154-156,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In view of the standpoints of data encryption and intrusion detection of the PDM system, This paper analyzes the information security systematically introduces security architecture and presents security strategy about running and maintaining the PDM system via software engineering methods. The emphasis is how to design the architecture for protecting the valuable data and preventing the system from intruding in order to insure the PDM system running safely and efficiently and thereby improving the security level of the PDM system.
  • TANG Feng;ZHONG Luo
    Computer Engineering. 2006, 32(14): 157-159. https://doi.org/10.3969/j.issn.1000-3428.2006.14.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a new Kerberos assisted Authentication Mechanism in Mobile Ad-hoc Networks named KADH,KADH migrates a number of features from traditional, wired Kerberos environments to the Ad-hoc environment and provides secure extensions to support the more challenging demands of ad-hoc network. Due to the mobility and short range of the nodes, we introduce measures like replication, elections and optional check to ensure maximum connectivity of the clients with the servers and minimize the risk of malicious attacks from within the network.
  • SHI Huaji;WENG Zhengling;LI Xingyi
    Computer Engineering. 2006, 32(14): 160-162. https://doi.org/10.3969/j.issn.1000-3428.2006.14.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a semi-fragile watermarking scheme based on MPEG-I II videos authentication. While being fragile to malicious manipulations, the scheme is robust against content-preserving manipulations like re-encoding. A content based on feature code is derived from the multimedia document, basing on a constant energy relationship between two groups of blocks, being added copyright and control information to construct the authentication code, which is robustly embedded in the VLC domain of MPEG-I II video as communications with side information. In the process of detection, it compares the content based on feature code and the retrieved watermark to detect and locate manipulations and presents experimental results to demonstrate the feasibility of the scheme.
  • XU Humin; ZHOU Dong; LI Haijie;LI Guangya
    Computer Engineering. 2006, 32(14): 163-165. https://doi.org/10.3969/j.issn.1000-3428.2006.14.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Design of information security integrating management and keeping away system realizes the standardization of all kinds of data, centralized managing, auto act, aptitude analyzing of security things, integrating evaluating and more alarm modes aiming at increasingly security problems, security products and systems. This system makes coupling degree among all kinds of products improving, increases the work efficiency and the ability of responding and dealing quickly with outburst security things and gives users a simple managing windows and a unify operation interface.
  • LIU Qingyun; YANG Chaofeng;LIU Lijun
    Computer Engineering. 2006, 32(14): 166-168. https://doi.org/10.3969/j.issn.1000-3428.2006.14.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to enhance the security of network by using multi-security technologies, this paper designs and realizes a uniform security cooperation mechanism. This mechanism uses cooperation rules to describe cooperation information, uses information bus to exchange relative data, and make use of cooperation engine to realize the dynamic configuration and cooperation option. According to intensive tests, this cooperate mechanism can realize the cooperation between different security products easily, and can be deployed and expanded flexibly.
  • Artificial Intelligence and Recognition Technology
  • HE Li;; YAN Dongmei;HAN Wenxiu
    Computer Engineering. 2006, 32(14): 169-171,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The application of ontology in the world wide web provides an effective solution to share web information with awareness of semantics. This paper proposes a new model for knowledge discovery based on web log files and ontology, chiefly discusses the presentation of user access behaviors and the definition and discovery algorithm of semantic user profiles. Finally, it introduces an application framework of Web usage knowledge discovery model in Web personalization system.
  • MA Dawei;JING Zhongliang; ; SUN Shaoyuan;XIAO Gang; ;LI Zhenhua
    Computer Engineering. 2006, 32(14): 172-173,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a novel image fusion method based on wavelet decomposition and color transfer. A specific fusion algorithm for the need of color transfer is applied to the fusion process of infrared and visual images. The color transfer approach based on one color space transform is conducted to colorize the fused image. Finally, the grayscale fused image, the false color image and the color-transferred image are compared respectively to emphasize the fact that, in the aspect of natural color representation, the color-transferred image outperforms the conventional false color image, and improves efficiently in the discrimination between targets and the environment.
  • LIU Zhen;DENG Su;LUO Xueshan;HUANG Hongbin
    Computer Engineering. 2006, 32(14): 174-176. https://doi.org/10.3969/j.issn.1000-3428.2006.14.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a framework of task-link-based intelligent querying of information assets in peer-to-peer networks (TLB-PPIQA). It combines the features of peer-to-peer networks with ones of technology of task-link-based knowledge management to provide the capability of more flexible domain knowledge modeling and the capability of semantic-oriented, intelligent querying in decentralized environment. This paper gives emphasis on the introduction of the structure of knowledge base and the flow of intelligent query processing.
  • FU Bo
    Computer Engineering. 2006, 32(14): 177-178,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The automatic software test data generation is one of the elementary problems in software testing. The problem of test data generation is reduced to a search or combinatorial optimization problem with discontinuity and nonlinearity. Therefore, it can be suitably resolved by using AI techniques such as neural networks and genetic algorithms. This paper summarizes and analyzes the application research of AI techniques on automatic test data generation. Future research directions and some of the researching problems are also addressed.
  • CHEN Fubing; ; CHEN Xiuhong; ; ZHANG Shengliang; YANG Jingyu
    Computer Engineering. 2006, 32(14): 179-180,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents modular two dimensional principal component analysis (M2DPCA)——a novel technique for human face recognition. First, the original images are divided into sub-images images in proposed approach. Then, the well-known 2DPCA method can be directly used to the sub-images obtained from the previous step. There are two advantages for this way: (1)dimension reduction of original pattern features can be done efficiently; (2)singular value decomposition of matrix is absolutely avoided in the process of feature extraction so the discriminant features can be gained easily. Moreover, 2DPCA is the special case of M2DPCA. To test and to evaluate the performance of M2DPCA, a series of experiments are performed on ORL human face image database. The experimental results indicate that the recognition performance of M2DPCA is superior to that of PCA and is robust than that of 2DPCA at the same time.
  • SONG Naihua;XING Qinghua
    Computer Engineering. 2006, 32(14): 181-183. https://doi.org/10.3969/j.issn.1000-3428.2006.14.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Standard BP algorithm is a kind of learning algorithm of multilayer perceptrons. It is designed based of gradient method. To overcome its defects, the paper proposes a new learning algorithm of BP network —— particle swarm learning algorithm. The algorithm adopts parallel technology to quicken the speed, and it is simply achieved by programming. Simulation results indicate that the particle swarm learning algorithm is a simple and efficient learning algorithm, and it has widely application prospect.

  • GAO Shang
    Computer Engineering. 2006, 32(14): 184-186. https://doi.org/10.3969/j.issn.1000-3428.2006.14.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper discusses several methods for assessing the effectiveness.In weapon system analysis, the first place is to select the character parameters of weapon system. The character parameters of weapon system are selected based on reduction of knowledge. A parameter effectiveness model is established by using support vector machine. The method is illustrated through examples. The results obtained from support vector machine method are compared with that from index method and neural network method. The comparing results show that the support vector machine method is more accurate and simple than the index method and neural network method.
  • YUAN Peixin;CHEN Changhai;SUN Lina
    Computer Engineering. 2006, 32(14): 187-189. https://doi.org/10.3969/j.issn.1000-3428.2006.14.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    All times, amounts of stick-materials are counted by man. This method is inefficient and veracious. In order to improve efficiency, it is very important to excogitate one method to realize count amounts automatically. This paper puts forward an improved method of outline extraction by study to familiar outline extraction method. Eliminate the influence of filament and object area by outline extraction, partition, closed operation, fine, then get more exact outline curve and figure out outline’s roundness degree and stick-material’s radius which is an important parameter to recognize stick-materials automatically. The result of program shows that improved method of outline extraction can extract stick-material’s outline exactly.
  • LI Changjun;CHEN Xuequan;DING Zhiguo
    Computer Engineering. 2006, 32(14): 190-192. https://doi.org/10.3969/j.issn.1000-3428.2006.14.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Based on the seaport remote sensing images at different time in the same place, a new method is proposed for ship targets change detection in ROI of the seaport. This method detects and recognizes the ship targets in seaport first, then compares the location change of ship targets, and finally gives the quantitative analysis result. Also, an algorithm is developed for targets distance calculation in which the latitude and longitude information are used to get the distance change of targets. As a result, the affection of disturbing factors caused by environment-different or time-different images are eliminated. Meanwhile, in the present method, the ship targets distance and length are integrated into one parameter, so that the change analysis of ship targets is simplified.

  • Multimedia Technology and Application
  • ZHOU Fangfang; FAN Xiaoping;ZHAO Ying
    Computer Engineering. 2006, 32(14): 193-195. https://doi.org/10.3969/j.issn.1000-3428.2006.14.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the robotic inverse kinematics visual algorithm which includes two parts. Firstly two (or one) non-linear equations are numerically computed, and then the remaining four (or five) joint values are determined in closed form once two (or one) joint values are known. And the visualization of the robot models produced by D-H parameters is used to determine the solutions effectively.
  • XU Peng;LIAO Jianxin;WU Naixing
    Computer Engineering. 2006, 32(14): 196-198. https://doi.org/10.3969/j.issn.1000-3428.2006.14.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    SIP is a very important protocol for call-control in next generation network (NGN) and the R&D of it is well going all around the world. The article is based upon the development practice of a key NGN equipment——media server. It describes how to use SIP to control media server to provide media services in NGN. With the example of interactive voice response (IVR), it gives a solution of using SIP and its extensions to control multimedia session and analyzes the merits and demerits.
  • TAN Yu’an;AI Benren;CAO Yuanda;ZHANG Xuelan
    Computer Engineering. 2006, 32(14): 199-201. https://doi.org/10.3969/j.issn.1000-3428.2006.14.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A real-time audio playout strategy for Internet phone tools in Windows is proposed. On a non-realtime system, the time interval between two instances of the audio playout thread being scheduled is not strictly equal, the audio output buffer exhaust then gaps of slience are produced. DirectSound is ultilized to control the playout at the granularity in millisecond level, an threshold is adjusted for each talkspurt based on the current load. The experiments show that this algorithm is able to reduce the slience gaps significantly at the cost of a small latency.
  • ZHONG Sidong;GAO Zhi
    Computer Engineering. 2006, 32(14): 202-204. https://doi.org/10.3969/j.issn.1000-3428.2006.14.074
    Abstract ( )   Knowledge map   Save
    The browsing of 3D models can be realized by parsing the 3DS format file based on OpenGL. The significant innovation of this paper is to do the point selection of 3D models through high accuracy interactive operation. On the basis of these, the operation of measure and management can be completed. The expressive ability and applicable value of 3D models are greatly improved by using these techniques.
  • WANG Dayong
    Computer Engineering. 2006, 32(14): 205-207. https://doi.org/10.3969/j.issn.1000-3428.2006.14.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Three-dimensional stratum simulation is an important task in some field such as prospect for recourses, earthquake research. And constructing it based on Java 3D is a new research way. This paper presents the implementation of Java 3D technology in constructing three-dimensional stratum simulation system. It conducts analysis for the specific construction and relevant technical problems. It brings forward a new approach and finally provides original insights.

  • MA Jie; ;FAN Jianping
    Computer Engineering. 2006, 32(14): 208-210. https://doi.org/10.3969/j.issn.1000-3428.2006.14.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Evaluation through simulating is a major measure to validate researcher’s conclusion in streaming media cache research. It can truly evaluate research conclusion and condense the period of research. This paper introduces a simulator of streaming media cache named LittleDuck. Convenience for adding new cache mechanism and rapidity for obtaining simulation result is two characters of LittleDuck. It has great effect on the development of interrelated research area.
  • Engineer Application Technology and Realization
  • CHEN Ming
    Computer Engineering. 2006, 32(14): 211-213,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Code is important foundation of design. For correctly and efficiently fulfilling design task, engineer must understand the kernel theory and accurately use design list in the codes. Integrating design codes and computer technology is the desire of engineer. Introducing design codes into CAD system and making it commercial are also a new development direction of design codes. Based on collaborative design idea, this paper presents an object-based structural code- checking model on J2EE platform. Practice has proved the system reduced the load of data processing of the structural design. Design efficiency and design quality are also guarantee.

  • LIU Chengze;ZHU Xinjian
    Computer Engineering. 2006, 32(14): 214-215,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the power demand for the robot outdoors, the fuel cell powered robot based on 32 bit microcontroller is designed. With the control system oriented with the 32 bit embedded microcontroller, the power status of fuel cell and the status parameters of the robot body can be real-time inspected. Then the pose and power demand can be adjusted accordingly. The design of whole scheme is brought up and the hardware and software implementation is clarified.
  • WU Mingzan;WANG Zhigong
    Computer Engineering. 2006, 32(14): 216-217,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.079
    Abstract ( )   Knowledge map   Save
    The software realization of wavelet image manipulation is mellow, but hardware realization is few. This paper uses the Blackfin DSP serial productions ADSP-2135 chips of AD company to realize the wavelet image fusion algorithm scheme. It discusses the process of algorithm realization by ADSP. The actual results prove that the wavelet image fusion algorithm can be real-time realized by ADSP-2135.
  • XU Chang;;LV Jianhong;CHENG Ming;ZHENG Yuan
    Computer Engineering. 2006, 32(14): 218-220,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper improves the hidden nodes pruning strategies of MRAN. The improved MRAN has more compact structure than MRAN. Combining the improved MRAN with IMC, an internal model adaptive control based on improved MRAN is presented, and applied to control the superheated steam temperature of a power station boiler. Simulation results show the presented algorithm has better performances than the conventional control algorithm.
  • WANG Jiahui;LU Yiqin;LI Wenle
    Computer Engineering. 2006, 32(14): 221-223. https://doi.org/10.3969/j.issn.1000-3428.2006.14.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The paper proposes an approach to telecommunication services modeling based on colored Petri net. This approach can reflect the hierarchical structure of net elements, so that it is easy to integrate service features and detecting their interactions after modeling. As applications, some features are modeled with CPN Tools. Their interactions are detecting by using the simulation facility provided by CPN Tools.
  • LI Tao; LIU Peifeng;YANG Yulu
    Computer Engineering. 2006, 32(14): 224-226. https://doi.org/10.3969/j.issn.1000-3428.2006.14.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Partially run-time reconfiguration(RTR)fully takes advantage of the partial reconfigurable characteristics in FPGA devices and promotes the development of reconfigurable computing. It saves hardware resources as well as the time to configure the FPGAs, and improves the overall performance of the system dramatically. This paper introduces two methods to implement partially RTR, and successfully verify them by Spartan-II FGPA.
  • ZHANG Qing;XU Guanghua;LIU Dan;WANG Jing
    Computer Engineering. 2006, 32(14): 227-229,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characters of medium and small equipment’s condition information acquired by route inspection, which are numerous, various, isolated and dispersive, the information model of route inspection is cereated. In this model, condition information is divided into measurement information, display information and observation information, and information demands of route inspection participant are analyzed. The instrument for information collecting, information administration manner, interaction mode and security are designed respectively. Three units, workstation, server and client are developed to collect, manage and utilize the information. They are integrated to construct a whole system call MTREE, so as to resolve the administration problem of route inspection information in manufacture.
  • LI Hongjun; LI Xun;MA Hongxu
    Computer Engineering. 2006, 32(14): 230-232. https://doi.org/10.3969/j.issn.1000-3428.2006.14.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper brings forward a UAV’s system structure according to its application background and function demanding. It designs the control subsystem based on AT91RM9200 microprocessor and the communication subsystem organized by wireless communication module and Ethernet communication module. Through analyzing the operating system’s configuration and working principle, the paper puts the design of the embedded Linux OS based on ARM and MPEG-4 arithmetic for video. It achieves transmitting and processing of the system’s information.
  • LONG Tao;YE Yuanyuan;ZHU Huayong;SHEN Lincheng
    Computer Engineering. 2006, 32(14): 233-235,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The communication protocols between ground mission control station (MCS) and airborne autonomous control system of unmanned aerial vehicles (UAV) system are discussed, and the research concentrates on the mission list. According to the function, mission list is divided into four plans: navigation plan, sensor plan, communication plan, transfer plan, therefore the model of mission list which can supports multiple complex tasks is established. Then the format of mission list based on XML is provided, the standard performance and versatility of mission list are enhanced. Lastly, the simulation scenario in which one MCS controls several UAVs is realized.
  • WANG Jun;; WANG Hong;XU Aidong;ZHOU Tong
    Computer Engineering. 2006, 32(14): 236-237,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The EPA profile that is the first industry Ethernet profile of China is constituted. It has been a PAS in IEC. After the author developed equipment of EPA network control system on WLAN, the paper analyses and expatiates some methods for an integrated hybrid(wired/wireless) EPA fieldbus to adapt to different conditions, and provides a model of wireless fieldbus equipment framework on EPA. It provides some theory foundation for EPA occupying more market on wireless fieldbus.
  • JIN Yongming;RONG Mengtian;ZHU Fuchen;LV Yongqi
    Computer Engineering. 2006, 32(14): 238-240. https://doi.org/10.3969/j.issn.1000-3428.2006.14.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a high speed symmetric key data encryption/decryption IC according to the algorithm which is designed on the basis of encryption standards established by the national information security domain. In order to balance the speed and the area of the chip, the algorithm uses pipeline structures to realize the core and non-pipeline circuits to design the key expansion module. It also introduces the improved binary decision circuits to realize the byte substitution function so that the critical path delay is significantly reduced. The design is implemented in a 0.18μm CMOS standard cell library of SMIC and successfully fabricated. The chip, which supports three different lengths of key and four working modes, runs steadily at a maximum 80MHz, the data throughput is up to 2.56 Gbps.


  • CHEN Shaolei;;HE Yuanjun
    Computer Engineering. 2006, 32(14): 241-242,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As key component of embedded graphics generator, one video controller can accomplish twin channels video control mission when using time sharing technology. This kind of video controller can accurately generate video control time sequence of two frame graphics data in the same time. And the two frame graphics data are storaged in one physical frame memory. This kind of video controller has been used in the glass cockpit display system of a helicopter.
  • LI Xiaobo ;;ZHANG Heng; ZHANG Fuxin; TANG Zhimin
    Computer Engineering. 2006, 32(14): 243-245. https://doi.org/10.3969/j.issn.1000-3428.2006.14.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a module hierarchy construction algorithm and an improved K-L algorithm which efficiently reduce the number of the interconnect signals during the partition of the design. It employs the CPM (certify pin multiple) method to solve the insufficiency of pins caused by the too many interconnections between several FPGAs. On the other hand, the working frequency of FPGA is much lower than that of the actual chips, so it adds delay registers in the interface and modifies the system software to evaluate the actual performance of the taped out chips, and the experiment result shows that the error is below 2%.
  • GUO Xiaosong;PENG Aiping;CAI Wei;TAN Lilong
    Computer Engineering. 2006, 32(14): 246-248. https://doi.org/10.3969/j.issn.1000-3428.2006.14.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces a fault diagnosis expert system for electric control equipment of a weapon system, including its system architecture and implementing method. The expert system adopts Microsoft Access97 as the configuration form of database and DAO as the database access technique in Visual Basic6.0 environment. This paper also discusses knowledge representation method integrating general production rule with fuzzy production rule, reasoning mechanism integrating precise reasoning with fuzzy reasoning, and reasoning strategy integrating rule-based reasoning with case-based reasoning.
  • ZHONG Wen; YU Xinsheng
    Computer Engineering. 2006, 32(14): 249-251. https://doi.org/10.3969/j.issn.1000-3428.2006.14.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the Socket communication, this paper uses the program technology of MFC and SDK to obtain the remote machine’s screen and realize the control function. In the paper, the interface of client use MFC, and the server use SDK, this design can realize the interface of client expediently, and adapt for the requirement that the server not need interface but socket communication.


  • LI Yanhua;QIU Jinlun;SONG Jiong;
    Computer Engineering. 2006, 32(14): 252-254. https://doi.org/10.3969/j.issn.1000-3428.2006.14.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article introduces Web Services and business process modeling notation(BPMN) as well as business process execution language for Web Services(BPEL4WS). The article constructs Web Services component and Web Service modeling by BPMN and BPEL4WS to integrate various application platform of enterprise and extend the inner business to the Internet, so it can reache the optimal configuration of business resources and achieve the universal interoperability between application programmes as well as the informational communication between corporations to adapt the complicated commerce.
  • Developmental Research
  • ZHU Chuanbao;LI Congdong
    Computer Engineering. 2006, 32(14): 255-257. https://doi.org/10.3969/j.issn.1000-3428.2006.14.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The project of electric power capital construction has such characters as long construction time, mass investment, many constructors and complex interface management. In order to solve these problems, an information management system of electric power capital construction based on .Net platform is put forward. The information system has MVC architecture. It is a multi-tier information system including presentation layer, business layer and data storing layer. To improve the flexibility and usability, the workflow and short message system are used. As a data-centered and application-integrated information system, its successful application achieves the information’s centralizing and sharing of all projects such as contractors and devices.
  • YANG Yuhong;ZHENG Shibao
    Computer Engineering. 2006, 32(14): 258-260. https://doi.org/10.3969/j.issn.1000-3428.2006.14.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents the design of a HDTV decoder SoC platform that is integrated with IP cores such as MIPs CPU, HDTV video decoder, video processor, OSD and many peripheral IP devices. Cores can be integrated with the platform through non-glue wrappers. By estimating the bus and memory access bandwidth it can manage the data path effectively. It is also much flexible to append new functions without changing the system structure. So the SoC architecture fits wide application of digital media processing.
  • HE Zhengfang;JIN Ou;;HE Jianbiao;;PENG Haoming
    Computer Engineering. 2006, 32(14): 261-262,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In this paper, communication control principle and protocol for bill acceptor are discussed. Constitutes and functions of Javax.comm API are introduced. With Java serial communication technology, communication control for bill acceptor is realized on different OS platform— Windows and Linux. Combining with Java’s powerful network function, it is more easy to remotely control the equipments.
  • LIU Heyang;;WANG Jianhua;;HUANG Yonghong;;DING Chunling;
    Computer Engineering. 2006, 32(14): 263-265. https://doi.org/10.3969/j.issn.1000-3428.2006.14.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This article proposes a general framework for the development of e-gov management system based on Web, which separates data logic, business logic and view logic from the system. The framework is implemented by light J2EE technology——Spring. It also analyses the significance of the framework in the e-gov system development. With this framework to develop the e-gov system based on Web, the developers can pay more attention on the implementation of business logic and user interface, then the cost of the software development can be reduced, the efficiency of development can be improved and system maintenance can be simplified.
  • WANG Xiaoyan;LOU Shuntian
    Computer Engineering. 2006, 32(14): 266-268. https://doi.org/10.3969/j.issn.1000-3428.2006.14.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The analysis of the cause which cased the natural gradient algorithm divergence in over-determined BSS problem with an unknown or dynamical changing source number is made. A new adaptive blind separation algorithm is constructed. The new algorithm overcomes the drawback of being unable to convergence stably, and can delete the redundant components without basing on correction among output components, which simplifies the computation and complexity. The simulation results illustrate the convergent stability and the separating efficiency.
  • ZHANG Jianfeng
    Computer Engineering. 2006, 32(14): 269-270,. https://doi.org/10.3969/j.issn.1000-3428.2006.14.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The field of PocketPC’s application becomes more and more broad. This paper tells of the instance in the area of mobile communication, it includes the functions of information process, receiving and sending, recording manage of GPS, short-message and manual mapping. It adopts layer’s design structure to raise the reuse and replant degree, discusses detailed the system realization of communication system through introducing the task-list, circular-queue and multi-thread.
  • YANG Yongzhi;TANG Yuhua
    Computer Engineering. 2006, 32(14): 271-273. https://doi.org/10.3969/j.issn.1000-3428.2006.14.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Implementation of device driver is an important part of embedded system development. Current way is to find some existing code according to the specified device, and analyze it thoroughly before porting. If no code is found, it has to write the code. It is time consuming and some kind of wasting. This article suggests a model of designing highly portable device driver and defines its interfaces, based on current models. So the porting of device driver is limited to implementation and adapting of those interfaces. The portability is built.
  • SUN Rupeng;JIA Zhiping;WU Shunpeng
    Computer Engineering. 2006, 32(14): 274-276. https://doi.org/10.3969/j.issn.1000-3428.2006.14.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    After analyzing the architecture of distributed monitoring and control system, the design of distributed monitoring and control system based on the OPC XML-DA standard is presented in this paper. According to the practice sea environment monitoring system, the framework of server side program is given and the series service of “subscribe” is described in detail. According to the real time requirement of sea environment data, standard “Read” service based on the persistent connection mechanism of HTTP 1.1 protocol is extended.
  • ZHANG Yanling;PAN Zhengyun; WANG Li
    Computer Engineering. 2006, 32(14): 277-279. https://doi.org/10.3969/j.issn.1000-3428.2006.14.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the concept of business rules management system, from the “E-card in tour” billing system, which needs a number of business rules, it studies and designs the application of BRMS technology and presents a suitable BOM of this system and discusses how to pick up the business rules with the form of parameter and procedure, which are embedded in the “E-card in tour” billing system.
  • XU Dahua
    Computer Engineering. 2006, 32(14): 280-282. https://doi.org/10.3969/j.issn.1000-3428.2006.14.102
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the wide application of HIS, this paper designs the architecture of CIS, which is based on HIS, and expounds the principle of structure and the method of maintenance for component module management sub-system. Further more, it puts forward a standard of universal interface, made design for a model of interface component model. Then poses the approach and function of the design. Finally, the feasibility of the approach is demonstrated by the smooth running of CIS.
  • WANG Li ; PAN Zhengyun; LIU Wei
    Computer Engineering. 2006, 32(14): 283-285. https://doi.org/10.3969/j.issn.1000-3428.2006.14.103
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aimed at the faultiness of police mobile application system at present, a new-style design is proposed, especially the design of client model and police mobile application platform. This optimized system regarded J2ME as the developing platform of the police mobile phone, used with several key technologies which are filter and database connection pool, etc, combined Servlet, JSP, JavaBean modules, it provids a convenient, accurate communication mode between police mobile phone and police mobile application service platform, in conclusion, the efficiency of polices’ working is improved drastically.