Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 August 2010, Volume 36 Issue 16
    

  • Select all
    |
    Networks and Communications
  • LI Pei, WANG Hui, ZHANG Xin
    Computer Engineering. 2010, 36(16): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2010.16.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Given that links are under throughput requirements, the impact of selfish rate adaptation behavior on the network performance is studied. The existence of the optimal transmission strategy is proved, and a repeated dynamic game is proposed. It is found that the link scheduling order affects the feasibility of the throughput requirement and the total power consumption. A pricing function is introduced to motivate links to share channel fairly and efficiently. Simulation results show that the proposed approach leads to not only more feasible solutions, but also less power consumption.
  • ZHANG Jing-Bo, DIAO Rong-Cai, LONG Jian-Min, FU Wen
    Computer Engineering. 2010, 36(16): 4-6. https://doi.org/10.3969/j.issn.1000-3428.2010.16.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper presents a method to recovery high-level control structures from binary executables, which is based on propositional calculus. This method formalizes the control dependence relation between low-level instructions to propositional variables. These variables can be propagated and calculated follow the execution path of the object code, and high-level control structures can be identified by some specified results of propositional invariants. Experimental results show this method can recognize and recovery loops and conditionals effectively, and have the ability of analyzing the predicated instructions.

  • CHEN Meng
    Computer Engineering. 2010, 36(16): 7-10. https://doi.org/10.3969/j.issn.1000-3428.2010.16.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve active sharing among groups of bridge alarming system, an active sharing trigger is incorporated into the distributed database. The trigger can excite groups participate collaborative works according to database condition. The active trigger includes five modules, such as safety control, environment perception, data extraction, data process and sharing active. Simulation results demonstrate the approach can realize data active sharing among groups in alarming system and meet the real-time demand of alarming system.
  • XU Gong-Hua, ZHANG Shen, LIU Feng
    Computer Engineering. 2010, 36(16): 11-12. https://doi.org/10.3969/j.issn.1000-3428.2010.16.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    On the basis of the introduction of the fountain codes and the Luby Transform(LT) codes, the Raptor codes are explored. Then the improving Raptor codes based on RS codes through the analysis of the precoding method are put forward, which can overcome the deficiency that time and space overhead is not fixed in the LT code. The improving method has many advantages such as high decoding rate and provides appropriate solution to the problem of safe transmissions and high availability in the Internet transformation. Simulation indicates that the improving Raptor codes can improve correctly decoding probability.

  • ZHONG Ming, FANG Cun-Hao, TIAN Feng-Wei, WENG Lin-Kai
    Computer Engineering. 2010, 36(16): 13-15. https://doi.org/10.3969/j.issn.1000-3428.2010.16.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Current methods usually take long retrieval time and low accuracy when retrieving components to satisfy user’s complex requirements. This paper presents a novel component retrieval method based on simulated annealing algorithm to quickly and iteratively select approximate optimal set of components. The realization of this method includes the definition of serial matching solution and its neighborhood, the formula of probability of acceptance, as well as the process of iteratively selecting sets of components with the lowest cost. Experiments show positive results in terms of execution time and retrieval accuracy.
  • HU Min, LIU Wei
    Computer Engineering. 2010, 36(16): 16-17. https://doi.org/10.3969/j.issn.1000-3428.2010.16.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to predict the surrounding ground settlement of deep foundation pit excavation accuracy, a new method GGEP(Grey Gene Expression Programming) is proposed to predict the surrounding ground settlement of deep foundation pit excavation, which combines Gene Expression Programming(GEP) with Gray Model(GM). The new model is verified by Shanghai Metro engineering. Experimental results show it is higher goodness of fit with actual monitor data than traditional method. Not only its forecasting accuracy is higher, but also it can self-study to adapt new environment.

  • YANG Hong-Zhi, HAN Wen-Bao, LI Guang-Song
    Computer Engineering. 2010, 36(16): 18-20. https://doi.org/10.3969/j.issn.1000-3428.2010.16.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    AES and Camellia are the two most widely used block cipher algorithms. The reconstruction and high-speed implementation characteristics of them are very important in both theories and practices. In this paper, on the foundation of analyzing the algorithms, the reconfiguration of AES and Camellia is studied. Based on the S-box transformation, reconfigurable architecture of the two algorithms is given by parallel processing and reconfigurable technology. Moreover, high-speed realizations of AES and Camellia algorithms are proposed using the reconfigurable architecture. Testing results show the scheme has a higher speed and it can reduce the area cost greatly.

  • LIU Xiao-Meng, LUO Zhou-Quan, YUAN Gui-Jiang, SHU Jing-Ling, YANG Biao
    Computer Engineering. 2010, 36(16): 21-23. https://doi.org/10.3969/j.issn.1000-3428.2010.16.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Some achievements in the field are emphasized such as database technology, CAD systems development technology, network technology and three-dimensional visualization technology and so on. Some relevant technologies are developed such as electronic measurement traverse, mineralize model CAD management system, graphics system and information management system of geology and survey. The geological database, hydro-geological database, three-dimensional deposit model are established. FTP server of geology, survey and mining are set up. Three large stopes are monitored using cavity monitoring system and three-dimensional visualization of stope model is established. All kinds of mining index of stope is calculated accurately. The research indicates that the widespread application of geology and survey engineering information technology have extremely vital significance to speeds up our country numeral mine construction.

  • WANG Cheng-Zhang, BAI Xiao-Meng
    Computer Engineering. 2010, 36(16): 24-26. https://doi.org/10.3969/j.issn.1000-3428.2010.16.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To improve the recognition rate of color face, this paper proposes a recognition algorithm based on Fisher block diagonal Local Non-negative Matrix Factorization(LNMF). The algorithm employs block diagonal matrix to encode color information of different channels for color images. Block diagonal constraint and Fisher discrimination constraint are imposed on LNMF algorithm to compute color information of different channels simultaneously for face feature extraction. Experimental results on CVL and PIE color face databases verify the effectiveness of the recognition algorithm.
  • WEI Wen-Gong, LI Qing-Xia, LI Yong
    Computer Engineering. 2010, 36(16): 27-29. https://doi.org/10.3969/j.issn.1000-3428.2010.16.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on semantic network theory and CGNET, a new semantic P2P network named Semantic GCNET is proposed. Using small world characteristic of GCNET, Semantic GCNET limits the query in the range of cluster. Compared with some other semantic overlay networks, this structure provides more efficient search for topic cluster. It provides effective approach to search for content based on complicated queries. Experimental result shows that semantic GCNET has efficient performance in semantic search and search recall ratio.
  • LIU Yuan-Yuan, GAO Qiang-Yi, CHEN Yang
    Computer Engineering. 2010, 36(16): 30-32. https://doi.org/10.3969/j.issn.1000-3428.2010.16.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the large granularity of Virtual Machine(VM) resources and the great amount of data transferred in the process of migrating, this paper presents a load balancing method based on VM migration. It uses the threshold to predict load tendency of host machine, which ensures that a small transient spike does not trigger needless VM migration. After triggering migration, it uses probability-weighted approach to select the target node, which resolves the problem of accumulation conflicts. Experimental results show that the method can improve the system performance in the case of great imbalance of the host machine load distribution.
  • SHU Fei-Wen, DIAO Zheng-De
    Computer Engineering. 2010, 36(16): 33-35. https://doi.org/10.3969/j.issn.1000-3428.2010.16.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of Bug regression and software requirement changing during software maintenance stage, this paper presents a Up-BuVer software maintenance technique. This technique integrates with Bug management, automatic upgrade and version control, it can cut down the period and cost of software maintenance, improve the maintainability and ensure normal operations of enterprise information system. Application result in Vent-Pipe order and report management system verifies the feasibility of Update, Bug, Version(Up-BuVer) technique.
  • LIU Jia, GU Cai-Yan
    Computer Engineering. 2010, 36(16): 36-38. https://doi.org/10.3969/j.issn.1000-3428.2010.16.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper introduces a Tree-Augmented Na?ve Bayes(TAN) text categorization model, analyzes its problem of threshold selection, and proposes an Automatic TAN(ATAN) text categorization framework. Two algorithms based on ATAN are compared to the BL-TAN with the best classification performance at a specified threshold both on Chinese and English imbalanced datasets. Results show that algorithms based on ATAN have higher performance than BL-TAN.

  • HUANG Yi, CENG Fan-Beng, CAO Jing
    Computer Engineering. 2010, 36(16): 39-41. https://doi.org/10.3969/j.issn.1000-3428.2010.16.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of the security analysis of library functions, this paper proposes a Fuzzing test approach based on dynamic tracking of library functions. It can dynamic track target program calls to unsafe library functions, and can locate the fault injection point accurately by searching and matching call parameters in the input data. A testing tool which is designed and implemented according to the method is compared with other two tools in a testing experiment on the software with vulnerabilities. The approach is verified to be effective and highly efficient by the experiment.
  • LIU Min, BI Xiang-Dong, HU Shu, YANG Cheng
    Computer Engineering. 2010, 36(16): 42-43. https://doi.org/10.3969/j.issn.1000-3428.2010.16.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Frequent database connection generally influences the performance of large-scale Air Traffic Control(ATC) system. In order to solve the problem, this paper improves OCI9 database call interface by using connection pool technology, so that the system costs brought by the frequent creating and destroying of database connection object are avoided and the performance of the system is enhanced. Experimental result proves the effectiveness of the method, and a stack overflow error of Oracle InstantClient Version 10.2.0.5 is found.

  • LIANG Bao-Hua, CA Min
    Computer Engineering. 2010, 36(16): 44-46. https://doi.org/10.3969/j.issn.1000-3428.2010.16.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Traditional mining method is easy to omit rules which is comprised by high frequent item set and it is non-standard for function degree value range. Aiming at these problem, this paper presents a positive and negative association rule mining method based on comparison influence degree. It can control the quantized result between [-1, 1], effectively mine positive and negative association rule. Application of this method into esophagus cancer case data which is a high incidence in Chaohu of Anhui, it can mine some potential relevant factors and give some corresponding measures to guard against esophagus cancer.

  • FU Wen, DIAO Rong-Cai, LONG Jian-Min, ZHANG Yi-Chi
    Computer Engineering. 2010, 36(16): 47-48. https://doi.org/10.3969/j.issn.1000-3428.2010.16.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Locating main function from binary code is not an easy task when there is no symbol table in it. Aiming at this problem, this paper presents a novel approach for Portable Executables(PE). It analyzes the execution process of a PE from the entry point to abstract some patterns for locating. Instruction pattern matching is used to locate the address of function main() from a PE file. Experimental result shows that the approach based on pattern matching is favorable and effective on locating function main() from portable executables in different platform. It can improve the analyzing ability of binary code analysis tools.

  • ZHANG Jian-Jun, SUN Wei-Jue, TUN Zong-Pan, ZHANG Li, XU Juan
    Computer Engineering. 2010, 36(16): 49-51. https://doi.org/10.3969/j.issn.1000-3428.2010.16.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve Knowledge Unity(KU) problem in remote collaborative fault diagnosis system, by researching the characteristics of fault diagnosis knowledge and object-oriented method, this paper puts forward mathematical model of metadata integration for diagnosis knowledge, and adopts improved virtual approach to heterogeneous metadata integration to realize diagnosis knowledge unity. Explanation of a certain diagnosis knowledge integration process on grinder proves that the method can realize diagnosis knowledge unity, and improve the efficiency for knowledge searching and transferring.
  • CHEN E-Nan, DIAO Rong-Cai, WANG Xiao-Qin, LIN Hua, LU Hai-Jun, ZHANG Xin-Yu, LI Feng-Fei
    Computer Engineering. 2010, 36(16): 52-53. https://doi.org/10.3969/j.issn.1000-3428.2010.16.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the defects of low effectiveness and function missing of traditional file test, this paper proposes a file fuzzy test method based on file format description. It gives file deduced rules which show the relationship between structure variables based on file format description, generates different kinds of files according to one special file format and performs fuzzing tests on them. Experimental results show that software vulnerability can be found by the method effectively.

  • LIU Yu-Lou
    Computer Engineering. 2010, 36(16): 54-56. https://doi.org/10.3969/j.issn.1000-3428.2010.16.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at redundancy computing problem of spatial association rule mining algorithm, this paper proposes a spatial association rule mining algorithm based on numerical index, which is suitable for mining monolayer transverse spatial association rules. It uses ordering to generate numerical index in the course of bottom-up and top-down search, and uses numerical index to prune repeated candidate and delete redundancy computing in the course of double mining, so that the efficiency of the algorithm is improved. Experimental result indicates that the algorithm is more efficient and effective than other algorithms.

  • LU Jian-Xiang, WANG Ru-Long, ZHANG Jin, HUANG De-Jun
    Computer Engineering. 2010, 36(16): 57-59. https://doi.org/10.3969/j.issn.1000-3428.2010.16.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To achieve large scale collection of Web service automatic composition, this paper presents a heuristic service composition algorithm based on Successor Cost Function(SCF). This algorithm adopts best-first principle, calculates the cost value of successor services according to SCF, dynamically chooses and composes Web service by comparing with the cost value, and acquires a best service composition in global scope. Experimental results show that the algorithm has better performance on large scale service composition compared with simple traverse algorithm and A* service composition algorithm.
  • XU Xu, FU Wei, LI Fen, TUN Wen-Yang, ZHANG Jian-Gang, HAN Xiao-Meng
    Computer Engineering. 2010, 36(16): 60-62. https://doi.org/10.3969/j.issn.1000-3428.2010.16.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    For problems of current backup system, such as large amount of duplicate data, too many data transmit over the network, and low data security, this paper presents a new file level backup system, which is built on the open source Bacula backup system. It uses the disk as a storage medium, based on content-based addresses to store data, and carries out de-duplication technology to save storage space. Performance test results show that the system can effectively ease the pressure on storage and network transmission, while improving data security.

  • SHUAI Zheng-Hua, ZHOU Hua-An
    Computer Engineering. 2010, 36(16): 63-64. https://doi.org/10.3969/j.issn.1000-3428.2010.16.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the problem of filtering malicious information which contains transformed keyword, this paper presents a feature extraction method in Chinese text based on flexible matching. The method adopts flexible matching technology to identify transformed keyword, improves the computational method of feature term weight in Vector Space Model(VSM). The keyword which has transmutative form is endowed high weight to enhance extraction efficiency for feature information. Experimental result shows that the method of feature information extraction for filtering has high recall in the condition of ensuring precision.

  • TANG De-Jun, DIAO Yi-Sheng, LI Yun
    Computer Engineering. 2010, 36(16): 65-67. https://doi.org/10.3969/j.issn.1000-3428.2010.16.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    When multiple mobile node moves in the environment with cellular networks and wireless local area networks, this paper jointly considers battery lifetime of mobile node, load of base station and access point and cost of mobile node. Multi-objective optimization method is used to handover decision for selecting suitable target networks by all the mobile nodes, and the whole network resource can be utilized reasonably. Simulation results indicate that this method outperforms in aspects of total remaining battery lifetime and load balance, but it performs worse in terms of total cost compared with traditional strongest signal first method.
  • HUANG Jun-Yi, TUN Jing, ZHANG Hui
    Computer Engineering. 2010, 36(16): 68-70. https://doi.org/10.3969/j.issn.1000-3428.2010.16.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The current study is to use Machine Learning(ML) techniques and classify Internet traffic based on per-flow features. Since a lot flow features can be used for flow classification and there are many irrelevant and redundant features among them, feature selection plays a vital role in algorithm performance optimization. This paper uses two filter-based feature selection methods for classification algorithms such as C4.5, Bayesnet, NBD, NBK. Experimental results show the approach can improve computational performance without negative impact on classification accuracy.
  • HU Rong, YANG Chun, HE Jun, LI Ai
    Computer Engineering. 2010, 36(16): 71-73. https://doi.org/10.3969/j.issn.1000-3428.2010.16.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the sensor networks inter-cluster disadvantages of disequilibrium energy consumption load and traditional topology’s high redundancy connectivity, a simulated annealing algorithm-based inter-cluster multi-hop routing protocol is put forward. In the routing, between cluster leader and base station, the traditional one hop routing is changed to multi-hop routing by this protocol. The next-hop routing of leader node is balanced based on degree-constraint and energy consumption so as to avoid the problem of energy hotspot. Experimental result shows that compared to LEACH and EECS protocol, the inter-cluster energy load is balanced, the overall network power consumption is reduced and the sensor network’s lifetime is prolonged effectively by the topology obtained with this protocol.
  • LUO Wen-Hua, WANG Ji-Liang
    Computer Engineering. 2010, 36(16): 74-76. https://doi.org/10.3969/j.issn.1000-3428.2010.16.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at wavelet function with arbitrary supports, a distributed data compression algorithm based on chain topology is proposed. In this algorithm, the correlation among the data is eliminated before they are transmitting to the cluster head. A chain topology adaptive to wavelet transform is introduced. The position where the wavelet coefficients are stored and the corresponding chain are chosen. A data compression adaptive to wavelet function with arbitrary supports is proposed. From the point of energy consumption and data accuracy, experiment shows that the algorithm functions correctly.
  • XIE Jin, WANG Jian-Xin, YUAN Yin-Hang, ZHANG Xiang-Li
    Computer Engineering. 2010, 36(16): 77-78. https://doi.org/10.3969/j.issn.1000-3428.2010.16.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traditional TCP variants use packet loss as the indicator of congestion and reduce its congestion windows size, which results in TCP throughput degrade. This paper studies how WECN solves this problem and enhances performance over wired/wireless hybrid networks. The contribution of this paper is implement of WECN in Linux operating system and emulation of its combination with TCP Reno, TCP Westwood in a testbed. Test results show that WECN can be extended to current TCP variants and can improve TCP throughput in lossy links.
  • DIAO Guo-Feng, YAN Liang
    Computer Engineering. 2010, 36(16): 79-81. https://doi.org/10.3969/j.issn.1000-3428.2010.16.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a keywords decompound Hash algorithm for quick flow classification based on keywords decompound. It receives the key by decompounding the keywords to small blocks, xored with selected primes and multiplied. Compared D-hash with IPSX, CRC32 and Bob Jenkins Hash algorithms. Experimental results indicate that the algorithm has good capability in rate, well-proportioned keys and collision rate. The classification rate is 18 Mp/s, D-hash can satisfy the quick net flow measurement.
  • ZHOU Chan, LI Cuan
    Computer Engineering. 2010, 36(16): 82-84. https://doi.org/10.3969/j.issn.1000-3428.2010.16.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper presents a network performance comprehensive evaluation approach to the performance requirements of Wireless Sensor Network(WSN) in industrial field. The indexes weights and the comprehensive evaluation value are calculated by objective and subjective combined method and the linear weighted method respectively. Experimental results illustrate effectiveness of the proposed method.

  • XU Jing-Dong, HE Liang, XU Bo-Xiang, XU Yun-Chao, LIU Ba-Xin, LI Song
    Computer Engineering. 2010, 36(16): 85-87. https://doi.org/10.3969/j.issn.1000-3428.2010.16.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new topology control method that focuses on prolonging the lifetime of WSN. It can prolong the network lifetime based on the information about the residual energy and minimal neighbor number of sensor nodes, which uses sensors’ working record as a metric to estimate their residual energy. Furthermore, LBA-TC can adaptively adjust sensors’ minimal neighbor numbers. The method is evaluated by comprehensive experiments, whose results show that it can significantly prolong the network lifetime.
  • LI Jing-Jing, CHAN Hong
    Computer Engineering. 2010, 36(16): 88-90. https://doi.org/10.3969/j.issn.1000-3428.2010.16.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In Wireless Sensor Networks(WSN) MAC addressing technologies currently, the schemes using Huffman code short the average address length while in need of several negotiation. The schemes based on cluster structure of networks have clear frames but with unfair address assignment, and that based on geographical location information can provide assistant to routing while the precise location information is hard to achieve. Based on the analysis of address reuse principle, this paper enumerates several representative schemes and compares their performance diversities and application area.

  • KANG Jiang, CAO Xie-Wen
    Computer Engineering. 2010, 36(16): 91-93. https://doi.org/10.3969/j.issn.1000-3428.2010.16.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the next generation network, real-time multimedia applications need better network performance, such as lower handoff delay and packet loss rate. This paper proposes a new protocol named Hierarchical Bicasing-based SIP(HBSIP). HBSIP is an improved version of traditional mobile SIP, its key idea is the use of bicasting mechanism and hierarchical structure. HBSIP may increase additional network traffic load, and significantly enhances the network performance, such as reducing handoff delay and packet loss rate.
  • LUO Sha-Sha, XU Cheng, LIU Pan
    Computer Engineering. 2010, 36(16): 94-96. https://doi.org/10.3969/j.issn.1000-3428.2010.16.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to solve fault-tolerant problem in Network on Chip(NoC), this paper proposes a low-latency and reliable delivery algorithm based on end-to-end communication. By sending redundant data packets initiatively from sending end and dividing data into packages to increase the utilization of link, the algorithm can reduce delay. The sending end sends next package only after receiving the affirmation of current package. Constant sending data and end-to-end feedback promise the correctness of transmission, which guarantee high reliability. Experiments on NS-2 prove that the algorithm has low delay and high reliability of communication on a chip, and can handle transient errors in transmission efficiently.

  • LI Yang, JING Zhi-Hong, WANG Jun-Beng
    Computer Engineering. 2010, 36(16): 97-99. https://doi.org/10.3969/j.issn.1000-3428.2010.16.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To achieve the requirement of Single Frequency Network(SFN) area management that traditional operation algorithm of SFN area can not meet, E-MBMS logical architecture and deployment consideration are introduced and the characteristic of SFN area is studied by emulation. A novel and simple algorithm is proposed to meet the requirement, which is proved by emulation that the operation algorithm of SFN area of the traditional dynamic MBSFN is improved. How to select thresholds of algorithm is investigated. Its feasibility is demonstrated.
  • SHU Shi-Ding, NIE Jing-Nan
    Computer Engineering. 2010, 36(16): 100-102. https://doi.org/10.3969/j.issn.1000-3428.2010.16.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Based on the distributed wireless networks, this paper proposes a new MAC mechanism protocol——Distributed Dynamic Frame Reservation Multiple Access(DDFRMA) which supports voice and data transmitting together. The Markov model is built to analyze the relationships between nodes and the voice packets dropping probability. Simulation results show that the protocol can support voice transmitting of distributed networks, improves the voice capacity of access mechanism, compared with the CSMA/CA mechanism.

  • GAO Lei, ZHENG Xiang-Quan, JI Guo-Wei, BAO Jin-Fei
    Computer Engineering. 2010, 36(16): 103-105. https://doi.org/10.3969/j.issn.1000-3428.2010.16.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces the hardware of Wireless Sensor Network(WSN) based on MSP430 singlechip, analyses the application of traditional sensor network. In order to solve the special application of wireless sensor node, network protocol and maintained network protocol to build bidirectional link based on tree frame is presented. It is proved that the bidirectional link is set up through programming and compiling.
  • YANG Xue-Zhou, LI Sai-Min
    Computer Engineering. 2010, 36(16): 106-107. https://doi.org/10.3969/j.issn.1000-3428.2010.16.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Owing to the particularity of the wireless sensor network, the energy supply becomes a major technical problem that constraints its constant development. However, rectenna which is able to carry out the wireless power transmission is exactly in line with the technical features of the wireless sensor network. This paper designs a new type of rectenna. It employs a method of directly matching a rectifying circuit to a microstrip-patch antenna, as a result, the rectenna’s efficiency is improved and its dimension is reduced. This design realizes conversion efficiency of 82.4% at 5.8 GHz, so that it can satisfy the need of wireless sensor network better.

  • TUN Guo-Wei, ZHANG Yan
    Computer Engineering. 2010, 36(16): 108-109. https://doi.org/10.3969/j.issn.1000-3428.2010.16.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a hop-by-hop cross-layer congestion control algorithm, according to detecting buffer occupancy ratio and congestion degree. This algorithm adaptively adjusts channel access priorities in MAC layer based on open loop hop-by-hop rate control. It can adaptively adjust the information sending rate according to local congestion condition of network nodes. NS simulation results show that the algorithm can improve network performance and congestion control efficiency.

  • ZHANG Ni, XI Xue-Feng, LIU Wei-Zhong, LIU Wen-Liang
    Computer Engineering. 2010, 36(16): 110-112. https://doi.org/10.3969/j.issn.1000-3428.2010.16.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The identity-based proxy blind signature scheme proposed is analyzed, and it is found that their scheme does not possess the unforgeability property. Because the proxy signer can recover the original signer’s private key, one can forge the signing capabilities of the original signer. At the same time, it is found there is mistake about the process of proving their signature scheme satisfying blindness. An improved proxy blind signature scheme is proposed, which can resolve the security problems existing in the original scheme. Analysis indicates that improved proxy blind signature scheme is secure against the proxy signer’s forgery attack, and remains other merit of the original scheme.
  • MA Bo, BAO Shi-Gang, DAI Xian-Yang
    Computer Engineering. 2010, 36(16): 113-115. https://doi.org/10.3969/j.issn.1000-3428.2010.16.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper researches representational countermeasures resisting power analysis attack and mainly analyzes their operation efficiencies. According to the operation capability of smart card, it compares the operation price of different coordinates and evaluates schemes by selecting the most efficient coordinates. The paper proposes an improvement scheme, it mainly chooses the best set of coordinates and parts the secret key into many short keys with the same length. Application results show the ability of ECC arithmetic resisting attack is not weakened and the extent of elevation on performance efficiency can achieve above a quarter.
  • ZHANG Jian-Zhong, ZHANG Yi-Lin
    Computer Engineering. 2010, 36(16): 116-117. https://doi.org/10.3969/j.issn.1000-3428.2010.16.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a (t, n) threshold multi-secret sharing scheme based on LUC cryptosystem. In this scheme, every participant’s secret shadow is their private-key. And the secret dealer does not have to distribute secret message to each participant. In the recovery phase, each cooperative participant can check pseudo-shadow others’ share is true or not. Each participant can share many secrets one time with other participants by holding only one shadow, even many times.
  • ZHANG Fu-Zhi, GAO Feng, BAI Long
    Computer Engineering. 2010, 36(16): 118-120. https://doi.org/10.3969/j.issn.1000-3428.2010.16.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Recent attack detection algorithms can not avoid misjudgment phenomenon of the spam users and the real users, which seriously affect the accuracy of the personalized collaborative recommendation system. In order to solve the problem, the concept of time concentrated characteristic is introduced into the attack detection. An approach to measure the suspicious ratings based on normal cloud model and time concentrated characteristic is proposed. On the basis of these, an users credibility calculation method based on attack detection is presented. Experimental results show that this method can not only calculate the trust for every user based on the facticity of users ratings but also improve the accuracy of the recommendation algorithm.
  • DONG Hui-Hui, GUO E-Jun, BANG Yun
    Computer Engineering. 2010, 36(16): 121-123. https://doi.org/10.3969/j.issn.1000-3428.2010.16.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of selecting safe and reliable node always affects the realization in distributed Wireless Sensor Networks (WSNs), this paper proposes a trustworthy computing model of cluster-based grouping and hierarchical, in which the cluster nodes, cluster heads and base stations calculate their trust values hierarchically. In this way, the malicious nodes can be identified and discarded timely that ensures the reliability of nodes which perform various tasks in networks. Simulation results show that using the model can enhance the stability of networks and keep minimum resource utilization, identify malicious nodes effectively to ensure network security.
  • SHU Hui-Fang, WANG Cai-Fen, WANG Zhi-Cang
    Computer Engineering. 2010, 36(16): 124-125. https://doi.org/10.3969/j.issn.1000-3428.2010.16.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Universal designated-verifier signature allows a signature holder to designate the signature to a desire designated-verifier, in such a way only the designated verifier can verify this signature. Using the merits of Elliptic Curve Cryptosystem(ECC) and self-certified signcryption, a new self-certified universal designated-verifier signcryption based on ECC is presented. The scheme eliminates certificate existence problem and key escrow problem. It has low algorithm complexity, quick proceeding speed and little storage space, so it is propitious to applications in E-vote and E-auction.
  • ZHANG Fu-Zhi, LIU Ting, BIAN Su-Dan
    Computer Engineering. 2010, 36(16): 126-128. https://doi.org/10.3969/j.issn.1000-3428.2010.16.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the accuracy decreasing problem of the recommendation algorithm using Randomized Perturbation Techniques(RPT), the concept of perturbation intensity weight, its measurement and an improved method for similarity calculation are introduced in this paper. An improved privacy preserving collaborative filtering recommendation algorithm is also proposed. The algorithm calculates each recommender’s perturbation intensity weight according to its perturbation intensity. Both users’ rating similarity and perturbation intensity weight are considered when similarity is calculated. Experimental results show that the improved algorithm outperforms the initial one in accuracy without affecting the effectiveness of privacy protection.
  • HU Xiao-Meng, HU Hua-Jie, ZHANG Zhe
    Computer Engineering. 2010, 36(16): 129-130. https://doi.org/10.3969/j.issn.1000-3428.2010.16.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Two forgery attacks are presented on two classes of blind proxy multi-signature schemes which have the properties of blind proxy signature schemes and proxy multi-signature schemes. In order to resist the two attacks, two classes of improved blind proxy multi-signature schemes are proposed. Result is proved that improved blind proxy multi-signature schemes not only resist the above two attacks, but also are more efficient than others. The computation cost is less and the length of proxy signature is shorter.

  • DAI Lei, DIAO Yi-Ming, TAN Xiao
    Computer Engineering. 2010, 36(16): 131-134. https://doi.org/10.3969/j.issn.1000-3428.2010.16.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the security deficiency of the pre-distribution mechanism in the field of key management for Wireless Sensor Network(WSN), a key updating protocol, RME, is proposed for WSN. With low power consumption, this protocol fixes the problem that, the longer the network works, the lower the security standard will decrease. Meanwhile, this protocol provides support for large-scale networks. Security analysis and simulations are constructed to show that RME is practical.
  • WANG Tian-Cheng, ZHANG Jian-Zhong
    Computer Engineering. 2010, 36(16): 135-136. https://doi.org/10.3969/j.issn.1000-3428.2010.16.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on Shamir’s threshold scheme and ElGamal cryptosystem, by using Lagrange interpolation method and the restoration of secret splitting, this paper proposes a dynamic multi-secret sharing scheme. Participants share the secret of their choice by the participants, among the participants do not need to maintain a safe channel, and a number of secrets can be shared. When the secrets update, and the participants join or exit the system, each participant’s share does not require updates. In the secret reconstruction process, the legitimate participants or the attacker try to produce a false sub-secret secret to deceive the generator, which is not feasible. The program does not require re-constructing polynomial when it implements the dynamic threshold secret sharing, and its computation overhead is even smaller.
  • CHEN Qi, FANG Hai-Yang
    Computer Engineering. 2010, 36(16): 137-139. https://doi.org/10.3969/j.issn.1000-3428.2010.16.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The time-memory trade-off algorithm is a method for quickly inverting a one-way function, using pre-computed tables. This paper combines time-memory trade-off algorithm with Word document decryption, based on rainbow table, gives a definition of a one-way function according to the encryption mechanism of Word document, a time-memory trade-off algorithm suitable for Word document is designed. Experimental result shows that the algorithm has high performance on attacking Word document.

  • XIE Juan, SHU Yan-Qin, LUO Chi-Shao
    Computer Engineering. 2010, 36(16): 140-142. https://doi.org/10.3969/j.issn.1000-3428.2010.16.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of elliptic curve digital signature and Oblivious Signature-Based Envelope(OSBE), an enhanced oblivious transfer scheme is proposed which solves the access control problem for an oblivious transfer protocol. In addition to have the properties of oblivious transfer, the scheme also has the following properties: the receiver who can decrypt the message if and only if he has the trusted third party’s signature, and the sender neither decides which message the receiver acquires nor decides whether the receiver is an authorized user or not. The scheme has less data, faster computation speed and less consumption than others based on Finite Field Discrete Logarithm Problem(FFDLP), it can be widely applied in many fields.
  • JIA Song, HAN Wen-Bao
    Computer Engineering. 2010, 36(16): 143-144. https://doi.org/10.3969/j.issn.1000-3428.2010.16.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The background of AKE protocol in multiple PKG environments are introduced. Through the analysis of M-B protocol and AKE protocols in multiple PKG environments, it points out their security leak separately. The latter is improved. A new AKE protocol in multiple PKG environments is presented. Heuristic analysis results show that, compared with other protocols, the enhanced protocol holds perfect security property.
  • HUANG Shao-Qing, LI Ji-Guo
    Computer Engineering. 2010, 36(16): 145-147. https://doi.org/10.3969/j.issn.1000-3428.2010.16.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    LEAP scheme has a disadvantage that during key establishment phase, due to a sensor node is captured, the security of the other sensor nodes in the whole network is threatened. This paper proposes a key management scheme for Wireless Sensor Network(WSN) based on symmetric bivariate polynomial. The proposed scheme not only overcomes the defect in LEAP scheme but also has some advantage that well prevents capture capacity, resists conspiracy attack and Hello Message attack. Compared with LEAP scheme, the scheme has the same storage and communication cost and has a little higher computation cost.
  • YANG Xiao-Gong, XIE Dong-Jing, ZHOU Zai-Gong, CHEN Tian-Yu
    Computer Engineering. 2010, 36(16): 148-150. https://doi.org/10.3969/j.issn.1000-3428.2010.16.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The false positive rate of the HDPM scheme can be much higher than it is claimed when the number of ingress router interfaces is larger than the number of attackers. This paper proposes a Novel MAC-based Authenticated Deterministic Packer Marking(NADPM) scheme for IP trace. This method uses IP address and MAC authentication information based on different network protocols to choose for different packet marking the median. The implementation and evaluation demonstrates NADPM algorithm compared with other HDPM algorithms, the false positive rate reduces a lot, and can trace the maximum number of simultaneous attackers increasing to 140 000.

  • TANG Zhang-Guo, ZHONG Meng-Quan, LI Huan-Zhou, ZHANG Jian
    Computer Engineering. 2010, 36(16): 151-153. https://doi.org/10.3969/j.issn.1000-3428.2010.16.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The exploiting of the software vulnerabilities is a hotspot of information security research. The shortage of current vulnerability exploiting implements is analyzed. The function demands of vulnerability exploiting and analysis based on Fuzzing are emphasized. A heuristic construction of abnormality data based on structural storage characteristic is proposed. The file format vulnerability intelligent exploiting and analysis system are designed and developed. The system’s software structure and run mechanism and critical technology are given. Experimental result proves its effectiveness and intelligence.

  • LIU Shuang, BANG Li
    Computer Engineering. 2010, 36(16): 154-156. https://doi.org/10.3969/j.issn.1000-3428.2010.16.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to overcome the effects which light source, the thickness of the hand skin or water refraction take on the hand vein picture, this paper proposes a novel algorithm to extract the hand vein features. It includes the nearest-neighbor interpolation, Canny operator and an improved FCM algorithm considering the information of pixels and based on picture grayscales. Experimental results indicate the new method can reduce the iteration times of image segmentation, and can filter the noise effectively.
  • LIU Fen, SHUAI Jian-Mei
    Computer Engineering. 2010, 36(16): 157-160. https://doi.org/10.3969/j.issn.1000-3428.2010.16.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes uses gradient histogram and color histogram as classification feature to analyze the difference between Least Square-Support Vector Machine(LS-SVM) algorithm and Support Vector Machine(SVM) algorithm. It compares the LS-SVM algorithm with several traditional algorithms and introduces LS-SVM algorithm into image spam filtering. Experimental results show that the method can improve the detection rate of image spam.
  • SHANG Er-Ke, LI Jian, AN Xiang-Jing, SHI Mei-Ping
    Computer Engineering. 2010, 36(16): 161-163. https://doi.org/10.3969/j.issn.1000-3428.2010.16.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a real-time Hough transform method based on Field Programmable Gate Array(FPGA) to solve the problem of low real-time performance of Hough transform. The range of angle parameter is divided into several parts, so that Hough transform can be implemented in parallel in space. For each part, a pipeline structure is employed for parallel computation and storage of Hough space parameter. Each voting operation can be completed within one clock with the help of dual-port RAM. A FPGA based fast 2-step search algorithm for extremum finding is proposed. Experimental results show that compared with DSP, the method is more efficient and can meet the real-time processing requirement.
  • LI Ren-Bing, LI Ai-Hua, BAI Xiang-Feng, DIAO Jing-Ru
    Computer Engineering. 2010, 36(16): 164-165. https://doi.org/10.3969/j.issn.1000-3428.2010.16.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the unclassifiable region problem in 1-v-r and 1-v-1 Support Vector Machine(SVM), this paper proposes a weighted k-nearest neighbors method(Wk-NN). Wk-NN computes distances between the sample falling into the unclassifiable region called unclassifiable sample and each training sample. It selects k samples with least distances and votes for the classes by them. The votes are weighted according to the distances and the class with the largest votes is labelled for the unclassifiable sample. Experimental results show that Wk-NN eliminates the unclassifiable region in conventional multi-classification SVM and improves its classification performance.
  • WANG Li-Juan
    Computer Engineering. 2010, 36(16): 166-168. https://doi.org/10.3969/j.issn.1000-3428.2010.16.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to relax the curse of dimensionality, a new algorithm for K Nearest Neighbor Classifiers(KNNC) fusion through multimodal perturbation based on Genetic Algorithm(GA) is proposed, called GA-MKNNC. The unsolved problem is decomposed into multi sub-problems by target perturbation, and each sub-problem is independently classified. In the process of classification, one sub-problem is classified by the corresponding data, feature and parameters, which are called data perturbation, feature perturbation and parameter perturbation. Data perturbation selects data by bagging. Feature perturbation and parameter perturbation are learned by GA. The decisions from sub-problem classifiers are combined by maximum rule to get the final decision. Experimental results show GA-MKNNC is better than KNNC and most multiple classifier systems. In addition, the number of component classifiers in GA-MKNNC is less than that in FASBIR.
  • TANG Dun, DIAO Xiao-Juan
    Computer Engineering. 2010, 36(16): 169-170. https://doi.org/10.3969/j.issn.1000-3428.2010.16.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the shortcoming of the traditional network base stations planning method, a new method is proposed based on immune algorithm. The mathematical model of multi-objective optimization problem for base station planning is given. The immune algorithm uses the mechanism for regulating the concentration of selection probability, the exclusion algorithm of neighboring memory cells, loop crossover and mutation operations. All ensure the diversity of the antibody and the Pareto optimal solution set of the distribution. Experimental results show that the algorithm can effectively find the optimal distribution scheme of base station and the coverage reaches to 97.6%.

  • CHEN Zhi-Feng, YANG Shi-Qin
    Computer Engineering. 2010, 36(16): 171-173. https://doi.org/10.3969/j.issn.1000-3428.2010.16.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A key of the Clustering with Obstructed Distance(COD) problem is solving the shortest distance between two points in the presence of obstacles. Aiming at this problem, this paper presents the concept of edge visible points, and proposes a solution to the problem. It departs from the point, and finds edge visible points on the set of obstructions, and sequential connects these points. It forms a shortest path along upper edge and a shortest path along lower edge, the final shortest path is the shorter of the two. Experimental results verify the effectiveness of the method.
  • SONG Wen-Jiang, MA Xi-De, HE Qing-Zong
    Computer Engineering. 2010, 36(16): 174-175. https://doi.org/10.3969/j.issn.1000-3428.2010.16.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    To solve serious interference problems of redundant edges for edge-based statistical features of license plate location, a new vehicle license plate location method based on Pulsed Coupled Neural Network(PCNN) is proposed, which introduces the simplified PCNN model based on traditional license plate location algorithms. In the algorithm only the candidate area is produced by PCNN iteration in order to reduce the computational complexity and improve the rate of license plate location. Simulation experiments with 300 frames of vehicle license plate image that are taken under various kinds of conditions can get a 98.3% extraction rate.

  • LI Yong-Shun, GU Rui-Yu
    Computer Engineering. 2010, 36(16): 176-179. https://doi.org/10.3969/j.issn.1000-3428.2010.16.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the conflict between validity and extensibility of the covering algorithm, on the basis of information view of rough set theory, this paper presents the concept of covering entropy. It takes the conditional information entropy of decision attribute to classifier as constraint condition. Under the condition of ensuring the classified ability of the algorithm, the uncertainty of the classifier is decreased by reducing the covering which has the largest covering entropy in a group of coverings. Experimental results prove that the reducing covering algorithm based on conditional information entropy has a good validity and extensibility, and has a good ability of dealing with fuzzy and uncertain data.
  • TUN Gong, HU Yong-Beng, DAN Fu-Li, YANG Feng
    Computer Engineering. 2010, 36(16): 180-182. https://doi.org/10.3969/j.issn.1000-3428.2010.16.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to get a best attack path in a short time and improve operational effectiveness of aerocraft, this paper researches two-dimensional path planning based on improved Estimation of Distribution Algorithm(EDA). It introduces coordinate transformation and candidate nodes. For that EDA is easy to fall in local optimum in the process of problem solving, it proposes simulated annealing EDA whose annealing temperature is denoted by information entropy.
  • LIANG Cuo-Meng, XIAO Jin-Gong, LONG Wen, ZHONG Nian-Bing
    Computer Engineering. 2010, 36(16): 183-185. https://doi.org/10.3969/j.issn.1000-3428.2010.16.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem that the ant colony algorithm is limited in solving continuous problem by its discrete quality, this paper presents an Ant Colony Optimization algorithm(ACO) for continuous domain. A random generator is used with Gaussian distribution to sample and generate candidate points for every ant. Function of the tabu list in the ACO is replaced by the memory table. The pheromone update is accomplished by replacing the good solutions in the memory table dynamically. Compared with other continuous optimization methods, this algorithm has satisfactory performance in aspects of complexity and stability.
  • ZHOU Ku-Xin, ZHOU Jun, SONG Li, CHEN Li
    Computer Engineering. 2010, 36(16): 186-188. https://doi.org/10.3969/j.issn.1000-3428.2010.16.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A new algorithm is proposed for small objects tracking, which uses both Gaussian Mixture Model(GMM) and Particle Filter(PF). Considering to the problem of missing in detecting on small objects, the algorithm uses the information of objects feed back by PF to instruct the GMM in background modeling. The results of experiment show that the algorithm can achieve auto-detecting and auto-tracking of multi-objects while overcoming the missing of small objects in former algorithms.

  • DOU Chang-Xu, WANG Yu-Mei
    Computer Engineering. 2010, 36(16): 189-191. https://doi.org/10.3969/j.issn.1000-3428.2010.16.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the problem that grid deformation algorithm needs fix point and operating point defined by user under multi-fix point restraining, this paper presents a quadratic interpolation deformation algorithm of polygon central point vector. According to the moving area of rotation between source and destination polygon central point vector and the difference between the corresponding vectors to build a similarity function. It adopts quadratic Bezier interpolation method in the process of deformation and uses improved dynamic programming algorithm in the process of corresponding. Experimental results show that this algorithm can reduce skew angle of polygon in the process of deformation, and it has low computation complexity, short corresponding time, natural deformation effect.

  • HOU Ti-Qian, TAN Qiang-Chang, SUN Qiu-Cheng
    Computer Engineering. 2010, 36(16): 192-194. https://doi.org/10.3969/j.issn.1000-3428.2010.16.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a super-resolution reconstruction algorithm based on multiple low-resolution images, which is suitable for inner independence model or static state model. Various weights and regularization parameters are assigned to each low-resolution image, and weights and regularization parameters are updated in each iteration process. The optimal solutions are obtained with relaxation iteration method, so that the image is reconstructed. Experimental result shows that the effect of reconstruction with the algorithm is better than those of cubic B-spline interpolation and traditional MAP estimation method.
  • CHENG Lin-Lin, CHEN Zhao-Jiong
    Computer Engineering. 2010, 36(16): 195-197. https://doi.org/10.3969/j.issn.1000-3428.2010.16.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the shortcomings of image Non-Photorealistic Rendering(NPR) algorithms and Regions of Interest(ROI) extraction algorithms, this paper proposes a NPR algorithm based on ROI. It uses Mean-Shift algorithm to implement NPR effect, combines ROI of image to solve the problem of low-efficiency of existing algorithms, and uses the method of color transfer to reach a better visual effect. Experimental results show that the algorithm gains good art effect, and improves the efficiency.
  • LI Ban, CHEN Wu-Fan
    Computer Engineering. 2010, 36(16): 198-199. https://doi.org/10.3969/j.issn.1000-3428.2010.16.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the problem that the accuracy is low when Fuzzy C-Means(FCM) clustering algorithm segments MR images with low signal-to-noise ratio, this paper proposes a modified algorithm named MS-FCM, and applies it in MR image segmentation. Considering the property that the membership values corresponding to the neighboring pixels which belong to the same cluster are similar, it filters membership data sets in the iterate process to decrease the influence on clustering accuracy caused by noise. Experiments on simulation brain MR images with different level noises and real brain MR image show that MS-FCM can improve the accuracy of segmentation.

  • DAN Yi
    Computer Engineering. 2010, 36(16): 200-202. https://doi.org/10.3969/j.issn.1000-3428.2010.16.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The Hao-Cecilia image interpolation algorithm can eliminate the zigzagging artifacts better, but the shortcoming of the expansion ratio of 2 is inherent. In this paper, a novel linear image interpolation method is proposed to overcome it. The Euler equation of the variational regularizer is discretized using a Taylor expansion. The interpolation takes place along the direction of level line, which eliminates the zigzagging artifacts and suppresses blurring of edges. Numerical experiments demonstrate that the proposed algorithm can obtain better visual effect and higher Peak Signal Noise Ratio(PSNR).
  • HONG Li-Hua, LIAO Xiao-Feng, XIANG Chao, DIAO Liang
    Computer Engineering. 2010, 36(16): 203-204. https://doi.org/10.3969/j.issn.1000-3428.2010.16.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on mixed noise and chaotic flow password of wavelet transform, this paper presents an image artificial deterioration algorithm. The original image is decomposed into N-level sub-class image of different frequencies. A noise is added to the sub-image of high-frequency components. It improves the capability against the filtering attack by analyzing the image deterioration degree and security. Experimental results show that the algorithm can achieve image degradation and restoration rapidly, and has good performance of anti-attack.
  • JU Xi-Nuo, SUN Ji-Yin, LIU Jing
    Computer Engineering. 2010, 36(16): 205-207. https://doi.org/10.3969/j.issn.1000-3428.2010.16.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the characteristic of Fourier transformation, image spectrum takes place related change for rotation, scaling and intensity varying. Aiming at this feature, spectrum information is converted into polar coordinate system. One dimensional invariant based on the statistic of radius is used to ground object target tracking algorithm. The criterion for template updating is defined by target scale transformation based on the statistic of angle. Experimental result proves that the tracking performance of this algorithm is good for image which is rotation, scaling and intensity varying, and its tracking precision is higher and time-consuming is less compared with Nprod and SSAD algorithm.
  • TUN Lin, LI Hai-Yan
    Computer Engineering. 2010, 36(16): 208-209. https://doi.org/10.3969/j.issn.1000-3428.2010.16.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an interactive segmentation algorithm for bio-medicine image by combining threshold approach and region growing algorithm. The region of interest in the image is selected by the user and pre-segmented by threshold approach. It identifies the seed pixel and the similarity criteria of region growing according to the object region by threshold segmentation, and gets the final segmentation result. Experimental results show that the algorithm is simple and fast, and it has good segmentation result for bio-medical image.
  • LI Zhong-Hai, SHEN Wei-Feng
    Computer Engineering. 2010, 36(16): 210-212. https://doi.org/10.3969/j.issn.1000-3428.2010.16.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the large computing costs problem for gradient orientation of the image applied in rotation-invariant template matching, this paper proposes an improved rotation-invariant template matching method based on gradient orientation code. It uses integral histogram to reduce the computing costs of computer histograms, and uses pixel-jump method to reduce a lot of ineffective matching operations. Experimental result shows that the method can speed up from 3 to 6 times in the premise of ensuring matching accuracy, so it can meet real-time requirement.

  • JIANG Feng, HE Zhi-Ye, WANG Zhe-Meng
    Computer Engineering. 2010, 36(16): 213-215. https://doi.org/10.3969/j.issn.1000-3428.2010.16.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    iming at the shortages of long monitoring cycle and limited monitoring scale in traditional water environment monitoring, this paper proposes a water environment monitoring system based on Wireless Sensor Network(WSN), and designs hardware and software system of its wireless gateway. This gateway uses ZigBee and GPRS wireless transmission technology, realizes data bidirectional communication between data monitoring nodes and remote monitoring center. Experimental results show that the system which applies this gateway is stably and reliably, it can well meet the need of remote real time water environment monitoring, it also has wide application prospect.
  • DENG Yao-Hua, LIU Gui-Xiong, TUN Li-Meng
    Computer Engineering. 2010, 36(16): 216-218. https://doi.org/10.3969/j.issn.1000-3428.2010.16.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    To meet the demands of application situation of mass data throughput, this paper researches memorizing control algorithm which supports high treatment efficiency and data continuous read/write operation, and uses Field Programmable Gate Array(FPGA) to design SDRAM embedded control algorithm. The controller uses CMD order mode, assigns time-delay of continuous read/write based on burst length, enhances the data processing efficiency by team working between data channel control and read/write operation. Testing results show that running frequency of this controller is higher than 100 MHz, data processing efficiency is above 95%, and it applies to data buffer of video acquisition and large size display control of LED.

  • SHU Xiang-Qiang, CHEN Zhi-Xiong, HONG Hui
    Computer Engineering. 2010, 36(16): 219-221. https://doi.org/10.3969/j.issn.1000-3428.2010.16.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As far as little topology change of Wireless Sensor Networks(WSNs) in application is concerned, network is divided into two grades. The low-grade is composed of multiple clusters, the high-grade consists of cluster heads, it uses routing algorithm of tree between nodes in cluster and cluster heads. A kind of WSNs is constructed by using this algorithm based on STC89C52 MCU, wireless module IP-Link 122x and 1-wire temperature and humidity sensor DS18B20, DHT11. Experiment proves that this design scheme is easy to realize, suitable for building large scale static wireless network.
  • WANG Jie, CHEN Hai-Bin
    Computer Engineering. 2010, 36(16): 222-225. https://doi.org/10.3969/j.issn.1000-3428.2010.16.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new architecture of parallel BCH encoder and decoder applied in NAND Flash Controller is proposed. In order to obviously increase the throughput of decoder, pipeline operation and prefetch decoding in group operation are applied in the design. It takes 565 cycles to correct 8 bit random error after NAND Flash’s 2 KB page read operation, which is a quarter of the time cost by prefetch & decode in page.
  • LI Wei
    Computer Engineering. 2010, 36(16): 226-228. https://doi.org/10.3969/j.issn.1000-3428.2010.16.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    For satisfying the urgent need of enhancing the operation reliability and cutting down the malfunction rate by broadly applying lots of embedded control nodes based on the field-bus standard in the distributed control system, a kind of embedded control node according with the Modbus communication protocol is developed. In this industry node, an AT89C51 is selected to work as the main controller, the hardware design and work mechanism about some function modules are discussed, such as Modbus communication module, monitor and control module, display module etc., and the Modbus communication protocol and communication flow are given out, so that a supervisory control station can effectively monitor and control the work state of all nodes through this Modbus communication interface.

  • HU Dui, XUE Xiao-Zhong, SUN Rui-Qing, DUAN Xiao-Ju
    Computer Engineering. 2010, 36(16): 229-231. https://doi.org/10.3969/j.issn.1000-3428.2010.16.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper uses Simulink module to generate equivalent GPS IF signal instead of real signal, adding messages of real pseudo range and rate for simulate receiver’s time difference and bias. All baseband signal processing procedures are carefully investigated, the performance of FLL are discussed in details. An optimized method is chosen into the model. An absolute receiver is completed by least squares method. Simulation results show the availability and reliability of the software receiver and a whole receiver system can be finished by software simulation.
  • SUN Da-Wei, QU Bo, LI Xiao, JIANG Zao, CHANG Gui-Ran
    Computer Engineering. 2010, 36(16): 232-233. https://doi.org/10.3969/j.issn.1000-3428.2010.16.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems that IP multicast depending on UDP protocol in the network layer can not guarantee reliable transmission, an end-to-end reliable transmission system with the properties of high-speed, high efficiency and stability to all kinds of application is proposed, the key technologies include CRC-32, end-to-end error recovery, end-to-end congestion control and so on. It is successfully applied in Passenger Information System(PIS) of Shenyang subway. The implementation of end-to-end reliable transmission system is tested and analyzed. Test results indicate that the system can guarantee reliable transmission among the end-to-end systems, as well as maintaining the advantages of saving network bandwidth resources and improving the data transmission efficiency in IP multicast.
  • TUN Hua, XIE Li-Ying, XU Ze-Yu
    Computer Engineering. 2010, 36(16): 234-236. https://doi.org/10.3969/j.issn.1000-3428.2010.16.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A design scheme of thermal infrared camera based on ARM9 and Linux is presented. The conversion of thermal radiation to electrical signal with the utilization of PHOTON 160 is achieved. The converted signal is collected through the FPGA and temporarily stored in SRAM. Infrared data is trasmitted to the host computer to display or to deal with through the network interface of ARM. The schemeis in actual use, which has significance for the engineering and market value.
  • LI Xiu-Ping, DONG Yun-Wei
    Computer Engineering. 2010, 36(16): 237-239. https://doi.org/10.3969/j.issn.1000-3428.2010.16.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the problem of diverse simulation application and improve the efficiency of development, a general simulation system for embedded software is designed, which adopts Model-Driven Architecture(MDA) development to construct simulation model for embedded system simulation based on the Matlab/Simulink. A simulation component library is built to achieve rapid establishment of the simulation system model. Extensible hardware of simulator is designed to fit variable I/O interfaces of the embedded system. The system has some strong advantages, such as reusability, portability, and can be used in the development of various embedded software.
  • LI Li-Jia, JIA Hua-Zhi, CHU Kui
    Computer Engineering. 2010, 36(16): 240-242. https://doi.org/10.3969/j.issn.1000-3428.2010.16.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Since the traditional situation plotting system is single-user mode that is not able to meet the requirement of shipborne command and control system in distributed environment to plot manually, automatically, or through knowledge base. A Computer Supported Cooperative Work (CSCW) situation plotting system is designed and built. This paper describes the architecture, framework and main technologies, including collaborative management, plotting action, concurrent control polices and algorithm. The system can solve the problem of multi-user collaborative plotting activities.
  • CHEN Lei, BO Bin, ZHOU Sheng, YAN Xiao-Lang
    Computer Engineering. 2010, 36(16): 243-245. https://doi.org/10.3969/j.issn.1000-3428.2010.16.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes and implements an efficient multi-processor Network Access Controller(NAC) based on message transfers in Network-on-Chip(NoC). It supports receiving and transmitting simultaneously, contains a series of configurable registers, and introduces a Message Table(MT) based receiving method which makes data transfer more efficient by recording and updating receiving configuration information of messages automatically. The hardware scale of the NAC is about 20 443 gates and it operates at 300 MHz AHB clock in SMIC 0.18 μm technology.

  • ZHANG Ji, LI Ning-Bei
    Computer Engineering. 2010, 36(16): 246-248. https://doi.org/10.3969/j.issn.1000-3428.2010.16.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    介绍基于构件化的仿真器设计方法,比较动态二进制翻译和静态二进制翻译的区别,分析动态二进制翻译技术在仿真器开发中的应用,并对基于二进制动态翻译的仿真器的关键技术——指令集仿真、T-cache缓存管理等问题进行分析,针对二进制动态翻译中的自修改代码翻译问题,给出具体的解决方案。
  • GAO Feng, WANG Guo-Bi, YU Wen, FENG Meng-Nong, LUO Qi
    Computer Engineering. 2010, 36(16): 249-250. https://doi.org/10.3969/j.issn.1000-3428.2010.16.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the monitoring targets and their characteristics of meteorological database system in order to monitor the operational status of the meteorological database system from the bottom in real-time, and gives two types of surveillance information check strategies according to the monitoring time characteristics, which are time rolling operational monitoring and irregular surveillance. Monitoring the operation needs to take different technical approaches, that is to say, mainly uses the OS commands and executing SQL statements to check current status of the meteorological database system. Operational monitoring function is implemented based on the policy configuration in order to achieve a long-term and stable operational monitoring system.
  • HE Jia-Dun, LIAO Hong-Yu, CHEN Wen-Zhi
    Computer Engineering. 2010, 36(16): 251-253. https://doi.org/10.3969/j.issn.1000-3428.2010.16.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the fact that 3D graphics hardware acceleration is not unconsummated on Kernel-based Virtual Machine(KVM), a method which makes KVM support OpenGL is proposed. It uses an open source project which works for accelerating the 3D application in virtual machine on KVM, and supports accelerating the 3D application. By improving the framework and functionality of VMGL, KVM can receive and display the result, which is rendered and accelerated by the host.
  • SHU Jian-Fei
    Computer Engineering. 2010, 36(16): 254-256. https://doi.org/10.3969/j.issn.1000-3428.2010.16.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the property of output voltage non-constant characteristic in the discharge process of battery supply system, this paper designs a voltage self-adaptive overtime strategy in critical voltage area. Overtime threshold value is dynamically adjusted on-line according to variation of workloads, the value of ?t(?V) is changed when the value of ?V(?t) is constant in order to reach the balance of system performance and battery life, and it extends dynamic voltage management adaptive object areas. Application result in embedded system development platform shows that the strategy can reduce the system power consumption and prolong the battery continued utility time.
  • CHEN De-Bin, JIANG Li-Gong, CA Hong-Meng
    Computer Engineering. 2010, 36(16): 257-260. https://doi.org/10.3969/j.issn.1000-3428.2010.16.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to achieve enterprise application interaction and integration, this paper introduces the concept of enterprise resource, builds domain ontology resource library by identifying and describing enterprise resource using OWL. Enterprise business functions are encapsulated as Web services, which are described under the framework of this model, and mapping between services and domain ontology is established. The enterprise resource service encapsulation model is realized with OWL-S, and the correctness and feasibility of the model are proved through prototype system.

  • ZHANG Ling, WANG Yang-Lin
    Computer Engineering. 2010, 36(16): 261-263. https://doi.org/10.3969/j.issn.1000-3428.2010.16.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traditional ontology modeling approach is too simple to fit the complicated and multi-dimension knowledge. This paper demonstrates an approach to ontology model the graph structure. This approach can express the graph structure object fully and elegantly, and it uses a clear work flow to form result ontology. Moreover, it applies a storage model to persistent ontology, so it has very good performance. Every enterprise may reuse the approach to model the graph structure object.
  • DI Zhen-Jiang, XU Pei-Song
    Computer Engineering. 2010, 36(16): 264-266. https://doi.org/10.3969/j.issn.1000-3428.2010.16.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A computing resource sharing and aggregation platform in the heterogeneous environments called DCSA is presented and described. DCSA is a parallelization platform that enables the programmer to build distributed parallel applications using a high level and easy-to-use parallel programming paradigm. DCSA is designed for a general system by defining XML approach with which the application developer can document and evaluate the results of program. A light-weight check point mechanism and a highly customizable communication mechanism are presented that prove the fault tolerance and efficiency of DCSA. Results obtained from examples analysis show that DCSA is feasible and efficient computing resource sharing platform.
  • WANG Wen-Zhu, GUO Hua, TUN Qiang-Bei
    Computer Engineering. 2010, 36(16): 267-269. https://doi.org/10.3969/j.issn.1000-3428.2010.16.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The quick response and correct execution of task is decided by the precision of timer in real-time system. In the common embedded Linux, the timer’s precision is low, and can not fit the requirement of real-time system. By researching the high resolution timers, a resolution based on PowerPC platform is implemented. A framework of high resolution timers based on PowerPC is designed, which is easy to transplant. Experimental results show that the improvement makes the precision and delay of timer in micro-second, which provides the necessary condition for the real-time task in this system.
  • LI Xiao-Yun, TU Ying
    Computer Engineering. 2010, 36(16): 270-272. https://doi.org/10.3969/j.issn.1000-3428.2010.16.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper introduces the structure of the personalized recommendation system and the design method. It states the process of establishing user interest model, including data collection and pretreatment, data refining, fuzzy linguistic processing, defuzzification, and satisfaction calculation. It analyses clustering items and processes, implements self-adaptive recommendation services based on the fuzzy adaptive resonance theory. Experimental results show that the system is stable and effective to predict users interest preferences and capture users excursion of interests.

  • LI Zhi, LI Yi, GONG Lian-Kan, ZHANG Jian-Xiong
    Computer Engineering. 2010, 36(16): 273-275. https://doi.org/10.3969/j.issn.1000-3428.2010.16.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the functional verification of microprocessor, because of the invisibility of Cache, chip-level verification of Cache is difficult to obtain high controllability(construction of a particular test scenario) and observability(detection of test results). This paper presents a novel approach, which provides services for the construction of test scenario by Testbench Call(Tb Call) to help software control Cache, and records behavior of Cache-initiated system bus operations and checks the results of simulation. Experimental result shows that the method is easy to develop test program and reduces verification time.
  • DONG Jing, LEI Yu-Tong, CHEN Hai-Chao
    Computer Engineering. 2010, 36(16): 276-277. https://doi.org/10.3969/j.issn.1000-3428.2010.16.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes workload characteristics and power usage characteristics of parallel high-performance computing system, proposes a power management algorithm to reduce the power consumption of these systems by restricting the resource allocation and controlling the power state(sleep or active) of nodes. Detailed experiment using data from Parallel Workloads Archive tests the power management algorithm. Experimental result shows that the algorithm can achieve considerable overall system energy savings with small or no performance impact.
  • CHEN Fu-Meng, TIAN Li-Qi
    Computer Engineering. 2010, 36(16): 278-280. https://doi.org/10.3969/j.issn.1000-3428.2010.16.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new method used to evaluate the entity behavior trustworthiness in distributed GIS is discussed. This paper puts forward the ordered hierarchical structure model. The acquirement and standardization of evidences are discussed. The Fuzzy Analytical Hierarchy Process(FAHP) is used to decide the weights of all evidences and attributes. The whole entity behavior is evaluated based on the discussion. An example and the conclusion analysis are given. The evaluation method makes it scientific to decide the weights and easy to carry out evaluation.
  • YIN Xiu-Wen, CENG Bi, XU Si-Shan, TUN Qing-Quan
    Computer Engineering. 2010, 36(16): 281-282. https://doi.org/10.3969/j.issn.1000-3428.2010.16.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the application requirement of high-performance electronic products in embedded system, this paper researches and implements a design scheme of embedded Ethernet radio based on HS3210 Godson SoC microprocessor. Taking the HS3210 as the system core, it introduces the implementation of Linux operating system on the Godson SoC microprocessor, and the election of the extern circuit chip and interface design. Experimental results show that the embedded Ethernet radio has low cost and is high efficient and easy to extend function.
  • WANG Chang-Da, YANG Wen-Bin, JU Shi-Guang
    Computer Engineering. 2010, 36(16): 283-285. https://doi.org/10.3969/j.issn.1000-3428.2010.16.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem that it is rare to concern patients’ privacy protection in traditional digital signature schemes of Electronic Health Record(EHR), a digital signature scheme for EHR is presented. It fulfills a kind of new security requirement based on the Content Extraction Signature(CES) algorithm, i.e. verifies the part of the content within EHR without to disclose the whole document. The scheme has the merit of average digital signature and can protect the privacy of patient according to their wills. An experimental system is developed based on C#.
  • DIAO Dang-Li, DI Hui-Sheng, HU Yong-Hui
    Computer Engineering. 2010, 36(16): 286-287. https://doi.org/10.3969/j.issn.1000-3428.2010.16.102
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The time difference between the local 1PPS time reference and the satellite one including outliers is important effect on instability of the satellite 1PPS signal and ambient interference and measurement noise in GPS/BD “dual-mode” satellite common view system. An adaptive Kalman filtering based on residual chi-square test is presented, which is effectively resistant to outliers and increases the result of common view comparison.

  • YANG Chuan, YANG Bin
    Computer Engineering. 2010, 36(16): 288-290. https://doi.org/10.3969/j.issn.1000-3428.2010.16.103
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper finds the program’s bottleneck in inefficiency of loop’s operation by analyzing the traditional Fourier transform, besides, when the program is running, it is only distributed in one hardware core, so it doesn’t make the best of the multi-core. Aiming at the above problem, through researching the Intel Threading Building Blocks(TBB), the paper puts the loop’s operation into several mutually independent partition, and puts these partitions into multi-core, so it implements the traditional algorithm parallelization, the parallel program achieves an excellent effect.

  • YANG Bei, ZHANG Ti
    Computer Engineering. 2010, 36(16): 291-292. https://doi.org/10.3969/j.issn.1000-3428.2010.16.104
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An algorithm based on multiple variable-width template matching for Premature Ventricular Contraction(PVC) recognition is presented. A template database is created by means of training samples, in which the width of each template is based on its RR interval. A two-stage strategy is proposed, which is based on template queue matching and template database matching, combining correlation coefficient with ratio of RR intervals. And the new template can be added to the database automatically. The performance of this algorithm is evaluated on the MIT-BIH arrhythmia database and it shows that the sensitivity for PVC reaches 98.66%, and AER is 1.11%.