Author Login Editor-in-Chief Peer Review Editor Work Office Work

05 June 2006, Volume 32 Issue 11
    

  • Select all
    |
    Degree Paper
  • WANG Weiming; WANG Zhen; HU Jie; YIN Jilong; PENG Yinghong
    Computer Engineering. 2006, 32(11): 1-3.
    Abstract ( )   Knowledge map   Save
    The concept and model of GDCN (generalized dynamic constraints network) supporting for concurrent and collaborative design is presented. Then, a data-mining algorithm named fuzzy-rough algorithm is developed, and it is used to mining the knowledge constraint from the numerical simulation data. Finally, the crank and connecting rod design of one V6 engine are given to show the validity of these modeling methods.
  • WANG Huayong; CHEN Yu; DAI Yiqi
    Computer Engineering. 2006, 32(11): 4-6.
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to resolve the problem of saving power in soft real-time embedded systems, this paper proposes a DVS algorithm which overcomes the uncertainty due to variable task execution times and pursues the optimal scheduling scheme during runtime. The experiment results show that this algorithm guarantees the CPU utilization and the stability of the soft real-time systems. Even in the situation of overload, the scheduling system can adjust itself automatically, and more than 99% tasks can be completed before their deadlines. The random tests to multiple task sets also demonstrate that more than 15% energy can be saved in average by this DVS algorithm.
  • ZHANG Yong; ZHANG Yi; WANG Weinong
    Computer Engineering. 2006, 32(11): 7-9.
    Abstract ( )   Knowledge map   Save
    This paper presents a new group key management scheme, which is based on keys tree, xor operations and one-way function chains. It provides backward and forward security: Newly admitted group members cannot read previous messages and evicted members cannot read future messages, even with collusion by arbitrarily many evicted members. As far as transmission, computation and storage costs are concerned, the new scheme presented in this paper is better than other existing schemes, which are based on keys tree.
  • ZHANG Guiling; SUN Jizhou
    Computer Engineering. 2006, 32(11): 11-12.
    Abstract ( )   Knowledge map   Save
    This paper extends these works by applying an improved dynamic neural network (IDNN) to network intrusion detection system. The weights and parameters of the improved dynamic neural network are tuned by improved genetic algorithm (IGA). A given fully connected feed-forward dynamic neural network may become a partially connected network after learning, which implies that the cost of implementing the IDNN may be reduced to very low. Four network intrusion detectors (corresponding to Dos, Probe, R2L and U2R, respectively) based on the improved dynamic neural network are developed, which can give balance detection accuracy between different types of intrusion. The proposed intrusion detectors are evaluated by KDD’99 network intrusion detection data sets. Experimental results demonstrate that the proposed intrusion detectors have enough accuracy for network intrusion detection.
  • HOU Jianhua; ; TIAN Jinwen
    Computer Engineering. 2006, 32(11): 13-15.
    Abstract ( )   Knowledge map   Save
    A locally adaptive wavelet denoising method is proposed by exploiting the correlation among image wavelet coefficients in a sub-band. Firstly, under the rule of Bayesian maximum a posteriori (MAP), this paper deduces Laplacian prior distribution based MAP estimator formula and sub-band adaptive MapShrink threshold. In order to make this threshold locally adaptive, a new stochastic model for wavelet coefficients is presented, in which each coefficient in a sub-band is assumed to be Laplacian with different marginal standard deviations, and these marginal standard deviations are modeled as random variables with high local correlation and thus can be estimated from a local neighborhood. Experiment results demonstrate that compared with classical sub-band adaptive algorithms, the proposed denoising method has significantly increased peak signal-to-noise ratio and improved the quality of subjective visual effect.
  • LI Ye; YIN Rupo; CAI Yunze; XU Xiaoming
    Computer Engineering. 2006, 32(11): 16-17,2.
    Abstract ( )   Knowledge map   Save
    This paper presents a feature selection algorithm for support vector machine based on the rough sets and Boolean reasoning approach put forward by Nguyen. The level of consistency, coined from the rough sets theory, is introduced to measure the information loss during discretization so that irrelative or redundant attributes are eliminated while the necessary information for classification is preserved. Experiment results show that the presented algorithm can improve the prediction accuracy and reduce the training time of support vector machine.
  • ZHANG Qingfeng
    Computer Engineering. 2006, 32(11): 18-21.
    Abstract ( )   Knowledge map   Save
    The paper suggests and proves some properties of straight line under the condition of the best approximation that are different from the corresponding ones under the condition of the low approximation. Then, a span-by-span algorithm for straight line based on best approximation is deduced from these properties. Comparing with the span-by-span algorithm based on low approximation, the new one holds better precision and equally efficiency. A theoretical analysis demonstrates that it is faster than such previous algorithms as Bresenham’s, double-step, triple-step, and quad-step algorithm. Hardware implementation will be more efficient.
  • HUANG Wei; JING Zhongliang; LI Jianxun; LI Zhenhua
    Computer Engineering. 2006, 32(11): 22-23,3.
    Abstract ( )   Knowledge map   Save
    This paper proposes an image fusion method based on lαβ space for merging a low-resolution multispectral image and a high-resolution panchromatic image. This image fusion method is designed to generate a fused image integrating the quality of both panchromatic and multispectral images: the high spatial resolution and the high spectral resolution. Experimental results indicate that the proposed method outperforms the IHS merger, PCA merger, improved IHS merger and improved PCA merger.
  • LI Jie; LIU Xianxing; HUANGFU Wei
    Computer Engineering. 2006, 32(11): 24-25,2.
    Abstract ( )   Knowledge map   Save
    The exponential growth of the Internet coupled with the increasing popularity of dynamically generated content on the World Wide Web, has created the need for more and faster Web servers capable of serving the over 100 million Internet users. To converge the control method has emerged as a promising technique to solve the Web QoS problem. In this paper, a model of adaptive session is presented and a session flow self-regulating algorism based on Kalman filter are proposed towards Web Server. And a Web QoS self-regulating scheme is advanced. To attain the goal of on-line system identification, the optimized estimation of QoS parameters is fulfilled by utilizing Kalman Filter in full domain. The simulation results shows that the proposed scheme can guarantee the QoS with both robustness and stability .
  • YE Jixiang; TAN Guanzheng
    Computer Engineering. 2006, 32(11): 26-28.
    Abstract ( )   Knowledge map   Save
    This paper applies AIS and Bayes network to the spam filtering, proposes a new spam filtering means based on artificial immune system and Bayes network, and analyses the key problems of the algorithm, and solves these problems and designs affinity’s formula as well as the structure of Ag/Ab. After comparing with AdaBoost algorithm in the PU1 bare corpus, it provides the experimental result finally.
  • LIU Peng; ZHANG Yan
    Computer Engineering. 2006, 32(11): 29-31.
    Abstract ( )   Knowledge map   Save
    A video interpolation algorithm based on triangulation analysis and high-frequency compensation is proposed. And its VLSI architecture implementation is given in this. Triangulation analysis can detect and preserve the edges in video frames. Furthermore, high-frequency compensation can improve the fidelity of the frames. The VLSI architecture is regular, and video signal processing speed is very high, because of the regularity of the proposed algorithm. This algorithm and its VLSI implementation have practical value. The experiment results show that this algorithm can obtain the better video frame than conventional interpolation methods. CMOS technology is employed to implement this algorithm, which consumes about 18.96mW at 100MHz work frequency and 1.98V voltage supply.
  • WU Panlong; LI Yanjun; ZHANG Ke
    Computer Engineering. 2006, 32(11): 32-33,8.
    Abstract ( )   Knowledge map   Save
    For the segmentation of moving targets in the IR imaging guidance system, a new automatic segmentation method is presented. First, the IR image is filtered by multiscale morphological filters, suppressing the background and eliminating the clusters to enhance the contrast between the object and background. Secondly, the joint relative entropy threshold is applied to get the threshoded image; Finally, the thresholded image is filtered by morphological filter again. The experimental results verify the effectives and robustness of this segmentation method which can facilitate the target recognition and tracking in the next step.
  • WU Zhongdong; YU Jianping; XIE Weixin; BAI Yinji
    Computer Engineering. 2006, 32(11): 34-36.
    Abstract ( )   Knowledge map   Save
    A security enhanced method of a verifiable threshold signature scheme based on the elliptic curve is presented by adopting threshold cryptography and proactive secret sharing. The private key of signature service of an online CA is distributed to a few sharing servers. A set of sharing servers which are below the threshold can not obtain the private key by colluding each other, and can not interpolate and corrupt the private key. The confidentiality, integrality and availability of the private key are guaranteed.
  • CHEN Shenglei; WU Huizhong; HAN Xianglan; XIAO Liang
    Computer Engineering. 2006, 32(11): 37-39.
    Abstract ( )   Knowledge map   Save
    Belief commitment which is suited in product preliminary design is proposed. Then the formalization of agent is described and the agent cooperation mechanism based on belief commitment is discussed. Collaborative design environment based on MAS is constructed for preliminary design of complex product and the agent cooperation mechanism is applied to this environment. The application indicates the effectiveness of the cooperation mechanism.
  • HUA Dongming; HOU Zifeng; WEI Wei; WU Qiuxin
    Computer Engineering. 2006, 32(11): 40-41,9.
    Abstract ( )   Knowledge map   Save
    In order to design highly secure security protocols, an agent-oriented logic is provided, which can be utilized to formally and systematically design shared key security protocols. Cryptographic mechanisms are abstracted to different channels, so that their implementation details need not be considered while security protocols are designed. Design principles of transfer are provided, which are regarded as available measures to prevent attacks. A new shared-key security protocol using the logic and design principles is designed, so as to attain mutual authentication and key distribution together with to prevent attacks that are opposite to design principles.
  • YOU Jing; ZHAO Xuelong; XU Jian; LIU Fengyu
    Computer Engineering. 2006, 32(11): 42-43,4.
    Abstract ( )   Knowledge map   Save
    To counteract software aging during the running time of system, it is essential to bring a proper software rejuvenation policy into effect. The conventional time-based software rejuvenation policy (PolicyⅠ)can be implemented simply with less interval, which incurs higher rejuvenation cost. While the detection-based rejuvenation policy (PolicyⅡ)can rejuvenate timely but incur higher detection cost. Therefore a software rejuvenation policy based on time & detection (Policy Ⅲ) is put forward in this paper for overcoming these defects. The numerical results of analyzing and comparing the mean time cost of three policies demonstrate that the policy Ⅲ prolongs rejuvenation interval without too much detection cost, consequently decreases total implementation cost.
  • ZHANG Shengliang; CHEN Fubing; XIE Yonghua; YANG Jingyu
    Computer Engineering. 2006, 32(11): 44-46.
    Abstract ( )   Knowledge map   Save
    Principal component analysis (PCA) is an important method widely used in images data compression and feature extraction. But conventional PCA usually uses total scatter matrix as a generation matrix, and two-dimension (2D) image matrices must be transformed into vectors. This paper gives a 2D-PCA, which uses original image matrices to compute between-class covariance matrix and its eigenvectors are derived for images feature extraction. The experiments on ORL and NUSTFDBⅡface-databases indicate that the recognition rates are higher than PCA and 2D-PCA using total scatter matrix, and the speed of feature extraction is faster.
  • HU Jianli; WANG Jiazhen; LIU Aizhen; SUN Yan
    Computer Engineering. 2006, 32(11): 47-49.
    Abstract ( )   Knowledge map   Save
    Migration policy for mobile agents is one of the key technologies. In order to fulfill a user’s specified work, mobile agents usually need to move to multi-hosts, forming a host sequence for migrating. Most of traditional migration strategies design a fixed host sequence in terms of some methods or indexes in advance, and are not appropriate to predict dynamically the next hop in migration paths of mobile agents. The paper proposes a prediction algorithm for migration paths, the results can be applied to the design and application of IDS. Analyzed by an experimental model, this algorithm shows good performances.
  • GAO Xiaolei; MIAO Huaikou; LI Yong
    Computer Engineering. 2006, 32(11): 50-57,5.
    Abstract ( )   Knowledge map   Save
    This paper introduces the data type for Z language specification realized by C++ template, and then gives the design of data structure and member function for the template. The implementation of the template is to reuse code, and it is helpful to refine the system and improves the efficiency of software development.
  • TAN Huafang; SUN Lili; HOU Zifeng
    Computer Engineering. 2006, 32(11): 52-54.
    Abstract ( )   Knowledge map   Save
    In distributed storage systems, replication is the most widely used approach to offer high data availability, increased fault-tolerance of the overall system. Replication-based systems implement replica control protocols that enforce a specified semantics of accessing the data. A new method to control the consistency of multiple replica is presented. It can support a crash-recovery model, and decrease bandwidth consumption for read in normal case and needn’t synchronize logical clock.
  • YANG Jinhui; LI Meng
    Computer Engineering. 2006, 32(11): 55-57.
    Abstract ( )   Knowledge map   Save
    A independent platform model based on unified modeling language (UML) is presented to improve the development and reuse of railway interlocking software on the heterogeneous embedded platform. UML is applied to provide static structure of the software, as well as its dynamic behavior in simple scenarios. In order to guarantee safety, Petri net is exploited to add precise and strict formal description for its complex dynamic behavior and restriction rules.
  • HUANG He ; CHENG Yong ; SHI Zhongzhi ; HE Xiaoxiao ;
    Computer Engineering. 2006, 32(11): 58-60.
    Abstract ( )   Knowledge map   Save
    The WWW is landmark of information era. Information systems based on WWW should not only run on different platforms and distributed information networks, but also provide a common platform to interoperate with large independent and various data sources. Open knowledge services architecture (OKSA) is proposed. It is used to construct a dynamic, and cross-platform virtual knowledge environment, which can help people to acquire, publish, share, and manage Web resources, and provide on-demand knowledge services to support cooperative working, problem solving and decision support.
  • LI Jinping; REN Yingchao; YANG Chongjun; YANG Jianyu
    Computer Engineering. 2006, 32(11): 61-63.
    Abstract ( )   Knowledge map   Save
    This paper proposes a method to implement OpenGIS WMS. Based on pipeline pattern makes the system fully scalable and flexible. The definition, design and implementation are introduced. GML data stream flows in the pipeline system is parsed by SAX. The whole system owns concise framework and low resource usability and is easy to be realized.
  • TIAN Zhimin; ZHAO Jian; YANG Yang; CHEN Donge; ZHAI Zhengli
    Computer Engineering. 2006, 32(11): 64-65.
    Abstract ( )   Knowledge map   Save
    With the advent of grid model based on open grid service architecture, the problem about job matching and scheduling has increasingly become important. This paper proposes a service-oriented grid scheduling framework, introduces stochastic process theory, and gives a dynamic algorithm about job matching and scheduling. This solves the dynamic problem in grid computing efficiently.
  • YUAN Xinwei; QIN Zheng; CAI Jun
    Computer Engineering. 2006, 32(11): 69-71.
    Abstract ( )   Knowledge map   Save
    A two-period decision model for COTS software component selection is presented. In the first period, the initial candidates are selected by case-based retrieval. In the second period, a (0-1) integer goal programming model is applied to decide the final candidates. The two-period method declines the complexity of computation and increases the rationality of selection.
  • Special Paper
  • LU Hui ;MAO Kefei
    Computer Engineering. 2006, 32(11): 128-130.
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The test instrument of user cognition not only ensures the compatibility and the relationship between the airborne communication equipment and the auto test system, but also brings many problems such as the variety interface and complex operation. The special virtual instrument is given, at the same time the analysis of realization method of virtual instrument is achieved and the design of special virtual instrument is designed according to the character of airborne communication auto test system. The favorable effect is gained to meet the user’s demand and enhance the visual alternation through the engineering practice.
  • Network Security
  • GUO Run;WANG Zhenxing;DUN Yanan
    Computer Engineering. 2006, 32(11): 186-188. https://doi.org/10.3969/j.issn.1000-3428.2006.11.068
    Abstract ( )   Knowledge map   Save
    Neighbor discovery protocol assumption of a fully trustworthy network contributes to its various security threats, this article analyzes ND protocol’s security threats and various methods of spoofing on-link nodes, which can lead to man-in-the-middle attack. It is proved that the design is available and feasible. It reduces the influence of attack.
  • Security Technology
  • NIU Xuelian;LING Li
    Computer Engineering. 2006, 32(11): 194-196. https://doi.org/10.3969/j.issn.1000-3428.2006.11.071
    Abstract ( )   Knowledge map   Save
    This paper discusses the problem which exists in designing the operating system of mobile phone through analyzing the platform security design architecture used in Symbian operating system. It interprets three basis conception including unit of trust, capability model and data of improvement and particularizes several measures Symbian uses. It draws out Symbian’s security design idea. On the base of this, it makes suggestions at the end.