Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 September 2010, Volume 36 Issue 18
    

  • Select all
    |
    Networks and Communications
  • ZHANG Lian-Wei, LIU Xiao-Lin, CHEN Xiang, HE Han-Gen
    Computer Engineering. 2010, 36(18): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2010.18.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    o provide operators with complete and visual information of satellites on orbit, this paper builds a simulation system for satellites on orbit based on virtual reality technology by using distributing architecture. The system is composed of independent modules which adapt extensible interface. Management strategy for simulation states is discussed and the advance mode of simulation execution and coherence of time and space. It proposes the simulation flow. This architecture is simple and efficient and the data throughput is small.
  • SUN Dong-Yan, DIAO Jia-Xiang, DIAO Xiao-Meng
    Computer Engineering. 2010, 36(18): 4-6. https://doi.org/10.3969/j.issn.1000-3428.2010.18.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An approach to compute the global and robust optimal Variable Fractional Delay(VFD) filters based on Particle Swarm Optimization(PSO) is developed. A variable fractional delay filter is based on the Farrow structure which is comprised of a set of FIR sub-filters with invariable coefficients. The approach has two stages: in the first stage only the particles with much smaller dimension are invoked to recursively compute the coefficients of each sub-filter and accelerate the convergent speed; in the second stage, the results are yielded by global optimization. Experimental results demonstrate the effectiveness of the proposed approach in frequency responses.
  • LI Wei-Sheng, DIAO Ling-Zhi
    Computer Engineering. 2010, 36(18): 7-9. https://doi.org/10.3969/j.issn.1000-3428.2010.18.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a method for object recognition based on fusing multi-features of interest points. It uses Harris to detect corners, and then uses a simplified Local Binary Patterns(LBP) to wipe out some redundant corners. It gives a weight to every feature according to that it contributes to every class of object. In the K-Nearest Neighbors(KNN), it introduces weight of feature to distance function to achieve a classifier adapted to every object. Experimental results show that this method effectively improves the object recognition accuracy.
  • JIAO Liang-Bao, CHEN Rui
    Computer Engineering. 2010, 36(18): 10-12. https://doi.org/10.3969/j.issn.1000-3428.2010.18.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The efficiency of GPU parallel algorithms depends on the average implement efficiency of the kernel on the streaming multiprocessor. This paper introduces the implementation of the kernel and the relationship among the grid, the block and the thread. It refines the GPU kernel size, and applies it to the ray-tracing algorithm. Experimental results show that the size and direction distribution of GPU kernel affects internal consistency of a block, and the refinement of kernel size can increase the number of warps in one block which runs simultaneously.
  • YANG Xu-Cun, FENG Sui-Li, CUI Miao, XIE Wu
    Computer Engineering. 2010, 36(18): 13-14. https://doi.org/10.3969/j.issn.1000-3428.2010.18.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is difficult for data transmission over mobile voice business channel because of the working mode of mobile voice service in existing mobile communication system. It is necessary to design a special modem. Mapping from data to waveforms and from waveforms to data are good solutions to modulation and demodulation, and the key problem consists in the designer of waveform codebook. Some disadvantages of this method such as long stimulation epoch and slow convergence speed confined its application. Aiming at this problem, modeling analysis for GSM EFR voice business channel is done. Waveform code is designed and crossover scheme is improved. Stimulation results show that the improved algorithm has better error code performance.
  • ZHANG Ru-Yun, GUO Chu-Meng, LUO Xin-Guo, JI Xin-Sheng
    Computer Engineering. 2010, 36(18): 15-18. https://doi.org/10.3969/j.issn.1000-3428.2010.18.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the influence of HARQ and PDMA on the PFS algorithm in cdma2000 1xEV-DO Rev A protocol. With setting the threshold of the sensitive users number and employing the PDMA flexibly, this paper proposes an improved PFS algorithm partial to delay-sensitive traffics such as VOIP. Simulation results show that the algorithm enhances the ability of cdma2000 1xEV-DO Rev A protocol in supporting QoS of delay-sensitive traffics such as VOIP.
  • SU Xiao-Ke, LAN , XIANG , QIN Yu-Meng, MO Ren-Xia-1, CHENG Yao-Dong
    Computer Engineering. 2010, 36(18): 19-20. https://doi.org/10.3969/j.issn.1000-3428.2010.18.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a two-phase intrusion detection algorithm in mixed attributes data stream——KDDCUP99-10% network intrusion data set. The algorithm gains the statistical information in data stream by the incremental clustering. Weighted fuzzy clustering is done based on the statistical information according to proposed weighted fuzzy cluster feature. The number of clusters for fuzzy clustering can change dynamically. Theoretical analysis and experimental results show the algorithm can detect the intrusion behaviors effectively.

  • DIAO Dui, CHEN Yun-Hua, DENG Jiu-Yang
    Computer Engineering. 2010, 36(18): 21-23. https://doi.org/10.3969/j.issn.1000-3428.2010.18.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Bi-group evolutionary programming algorithm uses Gauss oscillating mutation operator to realize the large-scale and sightless exploration for solution space, which brings poor efficiency. Aiming at the problem, this paper proposes an improved bi-group evolutionary programming algorithm. The algorithm replaces Gauss mutation operator in the old bi-group evolutionary programming algorithm with new mutation operator. The new mutation operator is correlated with fitness function. Oriented search with high efficiency of solution space is realized. Simulation results show that the improved algorithm has higher performance than the old one.
  • SHI Xue-Fei, WANG Zhi-Liang, ZHANG Qiong
    Computer Engineering. 2010, 36(18): 24-25. https://doi.org/10.3969/j.issn.1000-3428.2010.18.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a two-layer artificial emotion model has inborn level and learning level according to the emotion psychology theory. The inborn emotion is recurrence through matrix model of state machine to overcome the defect that “event-emotion-behavior” sequence pairs need storage space. A neural cell model named Lapicque is used to describe the transition of emotion state. Simulation result is presented.

  • GUI Chen-Xue, SHU Jian-Meng
    Computer Engineering. 2010, 36(18): 26-28. https://doi.org/10.3969/j.issn.1000-3428.2010.18.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the data of vertical distribution, this paper gives a Naive Bayes Classification(NBC) protocol based on privacy preservation. This protocol uses homomorphic encryption, threshold password and digital envelope technology to realize data classification when data is vertical distribution, and it can promise not to disclose any other party with the irrelevant information. Theory analysis shows that this protocol is in safety and low communication and computing complexity.
  • WANG Wei-Xing, WANG Chen-Guang
    Computer Engineering. 2010, 36(18): 29-31. https://doi.org/10.3969/j.issn.1000-3428.2010.18.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the poor information sharing capability and business adaptability, by integrating logistics information system based on Service-Oriented Architecture(SOA), a fast and flexible integration method for enterprise information system is presented. Theory analysis and experiments show that it effectively reduces the cost of system adjustment, shortens the adjustment time, and improves the efficiency of execution and the quality of adjustment, so that the market competitiveness of enterprise is improved.
  • JIA Jia-Chi, WANG Wen-Le
    Computer Engineering. 2010, 36(18): 32-34. https://doi.org/10.3969/j.issn.1000-3428.2010.18.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at real-time transaction model based on alternative/compensate, this paper studies the alternative and transaction priority assignment issue and proposes an alternative and transaction priority assignment strategy based on the value density named Priority Based on Alternative and Compensation(PBAC). In PBAC, the alternative priority based on the value density relates to the execution time and urgency of alternative. Transaction priority inherits from alternative, and it is affected by the implementation degree of transaction. Simulation experimental result proves that PBAC enables the system favors to scheduling the transaction model based on alternative/compensate better.
  • DIAO En-Lai, HAO Wen-Ning, DIAO Shui-Ning, HAN Xian-Yong
    Computer Engineering. 2010, 36(18): 35-37. https://doi.org/10.3969/j.issn.1000-3428.2010.18.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to solve the problem that close military symbols may shelter each other while reducing scale of map in computer plotting, by analyzing the parameters of neighborhood, this paper uses Density-Based Spatial Clustering of Applications with Noise(DBSCAN) algorithm to seek the symbols sheltering each other, and uses plot instead of symbols in their centroid. Aiming at the shortcomings of DBSCAN algorithm, it proposes an improved algorithm named Based on Density and Irregular Region Clustering of Applications with Noise(BDIRCAN), which considers application conditions and changes the traditional circular neighborhood to the applied irregular polygonal neighborhood. Experimental result shows that BDIRCAN can solve the problem well and avoid clustering the symbols which stay near but do not shelter each other.

  • GONG Ti, ZHANG Zhen-Zhen, ZHANG Gang-Gang, MA Xiao-Hai, BAO Jie
    Computer Engineering. 2010, 36(18): 38-40. https://doi.org/10.3969/j.issn.1000-3428.2010.18.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a task allocation and scheduling algorithm for data parallel exchange based on synthetic decision method in fuzzy reliability allocation. The method considers each factors which influences the priority of tasks and their fuzzy features to confirm the priority of task and solves the fuzzy decision problem during task assignment procedure. Experimental results show that the algorithm can raise the success rate of task execution, and reduce the average waiting time.
  • LI Meng, WANG E-Bin, ZHANG Ji-Wen, WANG Xu-Yang
    Computer Engineering. 2010, 36(18): 41-42. https://doi.org/10.3969/j.issn.1000-3428.2010.18.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the deficiency of Conditional Random Fields(CRFs) can not describe structure relationship of the internal semantic roles more exactly, this paper proposes an approach to Semantic Role Labeling(SRL) which is based on Tree Conditional Random Fields(TCRFs) model. By labeling Hierarchical dependencies and Brother dependencies of syntactic dependency tree, it can deal with the long-distance dependencies between different state variants effectively. Meanwhile, taking advantage of CRFs model can add any features, some new combinative features and preposition phrase role are added to the system. Experimental results which are based on CoNNL 2008 Shared Task show that the proposed method can improve precision and recall rate of the system.
  • SHI Ya-Xian, LI Pu, XIAO Bao, HUI Ting-Ting, JIANG Yun-Cheng
    Computer Engineering. 2010, 36(18): 43-45. https://doi.org/10.3969/j.issn.1000-3428.2010.18.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of returning much results has low currency in traditional semantic query expansion method, this paper presents a semantic weighted query expansion which takes the tourism domain as a background. Query expansion is realized by combining reasoning abilities and the entity relatedness. Frequency weighted which includes TF-IDF algorithm and semantic relevancy weighted is combined to improve the ranking of search results. Experimental results show that this method can make more accord with the requirement of the search results in front, and improve the precision of tourism information query compared with the other two methods.
  • LI Xiao-Long, LIU Jian-Hua, CHEN Lei, LUO Xi, YAN Shao-Qing
    Computer Engineering. 2010, 36(18): 46-48. https://doi.org/10.3969/j.issn.1000-3428.2010.18.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper designs and implements meta-structure of real-time embedded software test tool, describes the generation, storage and transformation process, and presents the codes of inheritance graph of class and control flow graph. By analyzing the software and technologies it used, this paper designs a parser for C/C++ to implement the transformation from source code to meta-structure. It implements the interface to get data from meta-structure by using XSLT.
  • DAO Ke, WANG Yi-Ji
    Computer Engineering. 2010, 36(18): 49-51. https://doi.org/10.3969/j.issn.1000-3428.2010.18.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an algorithm of Mining Frequent closed itemsets with Window Sliding Rapidly(MFWSR) against the complexity of data structure and process for determination. With the data stream represented by compact data structure, process for determination simplified, MFWSR improves the temporal and spatial efficiency while it can response to the requests of user-specified support threshold. Experimental results show that compared with existing algorithms, MFWSR achieves higher temporary and spatial efficiency while the accuracy remains.
  • WANG Yan-Beng, MA Liang-Li, LIU Yong-Bao
    Computer Engineering. 2010, 36(18): 52-53. https://doi.org/10.3969/j.issn.1000-3428.2010.18.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the fault cause missing judgment problem in fault diagnosis, this paper presents a fault diagnosis algorithm based on Extended Fuzzy Time Petri Net(EFTPN). The algorithm confirms the states of all fault cause at the time when a fault occurs, uses bidirectional reasoning to resolve the fault cause missing judgment problem, and finds the primary, secondary and other causes. The gas turbine fault diagnosis example verifies the validity of the algorithm.
  • MA Jiang, LIU Pei-Lin
    Computer Engineering. 2010, 36(18): 54-56. https://doi.org/10.3969/j.issn.1000-3428.2010.18.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper designs a general configurable code generator to generate configurable codes in a variety of programming languages, and proposes a users’ description rule based on structures of programming languages. By using a programming grammar according to the rule described, users can write a simple module to generate the configurable code file with corresponding data structures in a variety of programming languages. The generator can be easily transplanted to many programming languages environment of different software and hardware systems to reduce development workload and time.
  • HE Lang, SHI Wei-Feng, DONG Jian-Gang
    Computer Engineering. 2010, 36(18): 57-59. https://doi.org/10.3969/j.issn.1000-3428.2010.18.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper designs a service-oriented computing model based on event-driven to solve the bottleneck of traditional Web service computing methods. The computing model adopts an event information component, which introduces the Event Driven Architecture(EDA) into the service oriented computing. EDA adapts and coordinates the invocation of each Web service, builds the semantic interoperability bridge between Web service, uses the complex event processing mechanism to process the information, and sends it to the SOA component. The Web service is presented to the interested subscribers to achieve dynamic collaboration.

  • TUN Chen-Hui, WANG Yang-Hui
    Computer Engineering. 2010, 36(18): 60-63. https://doi.org/10.3969/j.issn.1000-3428.2010.18.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper uses the Common Language Runtime(CLR), designs and implements a distributed software framework based on the common three-layer structure framework. This framework puts some codes of the business logic layer down to the DataBase Management System(DBMS), and adds the sub-layer of calling stored procedure which can reduce the data traffic of network and enhance the performance of the application in the distributed environment. It takes the expanding division-table module of the task time quota system in a large-scale manufacturing company as an example, expatiates the building process of this framework, and verifies the general adaptability of the framework in improving the running efficiency of the overall application.

  • LI Zhuang, CAO Bao-Xiang, JIA Xiao-Na
    Computer Engineering. 2010, 36(18): 64-66. https://doi.org/10.3969/j.issn.1000-3428.2010.18.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The cost of compensation may be expensive and it is a subset of non-compensation Web services in transaction of Web services composition. For these two issues, this paper defines the cost of failure risk, provides a scheduling algorithm named WSDSA based on Web services time constraints and the cost of failure risk. It uses the theoretical proof and simulation methods and simulations show that compared with traditional methods, WSDSA reduces the failure cost of Web services compositon and times of non-compensable Web services needing to be compensated.
  • ZHANG Chun-Ling, LV Shen-Yu, LIU Zun-Feng
    Computer Engineering. 2010, 36(18): 67-69. https://doi.org/10.3969/j.issn.1000-3428.2010.18.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the field of data synchronization based on virtual log, Huge log records affect the efficiency of data synchronization, when the master side has frequent changes in same record. For the problem, data synchronization is proposed based on the virtual log compression. Virtual log compression is calculate and merge log records, and only those records related with data synchronization are left and therefore reducing network traffic and improve the efficiency of data synchronization. Results show that virtual log compression is particularly suitable for heterogeneous database and asynchronous data synchronization in WAN.
  • JIANG Gong-Yan, LIN E-Beng, HU Yu-Feng
    Computer Engineering. 2010, 36(18): 70-72. https://doi.org/10.3969/j.issn.1000-3428.2010.18.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to control traffic flow congestion, a Call Admission Control(CAC) strategy for resource partial-shared systems with Variable Bit Rate(VBR) services is proposed. It is dependent on the max bandwith and the expired threshold of the cell loss probability online connections of each type of service. An approach of the call blocking probability and the packet loss probability are presented. The relations between QoS indicators and control parameters used in the strategy are analyzed, and some related conclusions are proved mathematically or numerically.
  • WANG Gui-Feng, WANG Yong, DAO Xiao-Ling
    Computer Engineering. 2010, 36(18): 73-75. https://doi.org/10.3969/j.issn.1000-3428.2010.18.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of analyzing the Low Energy Adaptive Clustering Hierarchy(LEACH), a clustering routing algorithm for Wireless Sensor Network(WSN) based on Ant Colony Algorithm(ACA) is proposed in this paper. ACA is applied to inter-cluster routing mechanism and the best path from cluster head to base station is looked for. Thanks to the algorithm, the transmission of information, for the cluster head node away from the base station, along with the best path is achieved and the energy consuming of cluster head node is decreased. Meanwhile, not only the node residual energy, but also the distance between the cluster head is considered for the selection of cluster head. It results in the more even distribution of cluster head. Simulation result indicates that the algorithm effectively balances the network energy consumption and prolongs the network life cycle compared with LEACH and DADC.
  • ZHOU Xin, ZHANG Jin, LI Guan, ZHENG Ba-Feng
    Computer Engineering. 2010, 36(18): 76-78. https://doi.org/10.3969/j.issn.1000-3428.2010.18.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of the traffic prediction of GPRS cells, this paper proposes a method based on multiple seasonal Auto- Regressive Integrated Moving Average(ARIMA). The traffic changes of GPRS cells is analyzed in detail, according to the characteristic of cells traffic changing in one day cycle, the multiple seasonal ARIMA model is used to model the process to construct the prediction model of GPRS cells traffic. Based on the previous GPRS cells traffic, the constructed model can predict the traffic and give the decision proof to keep the performance of GPRS cells.
  • SHU Ying-Feng, LEI Lei, HU Zong-Ze
    Computer Engineering. 2010, 36(18): 79-81. https://doi.org/10.3969/j.issn.1000-3428.2010.18.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traditional Ad Hoc network routing protocols are mainly based on the condition called shortest path, it can not support multi-rate mechanism well and usually lead to local congestion. This paper proposes a Synthetical Metric Routing Protocol(SMRP) with cross-layer design. It takes rate on physical layer, competition on MAC layer and queue length on network layer into account. This method can utilize multi-rate support better and avoid local congestion. Simulation results show that SMRP performs better than traditional routing protocols including network throughput and delay.
  • TUN Dong, CHEN Yuan-Yan, WANG Wen-Juan
    Computer Engineering. 2010, 36(18): 82-84. https://doi.org/10.3969/j.issn.1000-3428.2010.18.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aggregate-based Congestion Control(ACC) mechanism leads to the bandwidth reduction of non-malicious flows when network congestion recovers. In order to resolve this problem, Enhanced Aggregate-based Congestion Control(EACC) is put forward which is based on ACC. EACC can identify the Distributed Denial of Service(DDoS) malicious flows according to destination address and packet loss rate, and solve the network congestion by reducing the bandwidth of malicious flows. Experimental results prove that EACC is effective. It can recover the network from fast congestion and also ensure the bandwidth of non-malicious flows.
  • CHEN Guan, XIE Hui, DIAO Meng
    Computer Engineering. 2010, 36(18): 85-87. https://doi.org/10.3969/j.issn.1000-3428.2010.18.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of how to use the cooperative relations and limited cache resources of nodes to avoid network traffic and improve communicating performance, this paper proposes an opportunistic network cooperative caching policy, which is referred as HMP-Cache. According to the nodes movement characteristics, the standard of target address matching is used to choose cooperative caching nodes. Caching information can be shared by synchronization of caching table in local region. Simulation results show that the policy can control the network cost effectively and the network data latency is reduced.
  • WANG Yang-Jie, JU Shi-Guang, LIN Xiao-Jia
    Computer Engineering. 2010, 36(18): 88-90. https://doi.org/10.3969/j.issn.1000-3428.2010.18.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the problem of the limited power of sensor and redundancy of sensor data, this paper proposes a distributed space-time wavelet transform method which is based on the 5/3 integer wavelet and a package duplication strategy. Simulation experimental results show that the proposed method effectively reduces amount of data on the time and space orientation, and extends the network life by one-quarter compared with wavelet compression method using lifting.

  • DIAO Huan, QUAN Hou-De
    Computer Engineering. 2010, 36(18): 91-94. https://doi.org/10.3969/j.issn.1000-3428.2010.18.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new Medium Access Control(MAC) protocol for Ad Hoc networks named RIMA-MC(Receiver Initiated Multiple Access based on Multiple Channels) is introduced. The protocol which extends the usage mode of MACA-BI to multi-channel condition is designed to be applied in circumstances that the channel has low speed(1 Kb/s~10 Kb/s), whereas can be divided into multiple sub-channels, and every terminal is equipped with only one transmitter. RIMA-MC intends to increase the throughput by means of reducing the control overhead and increasing the spatial reuse of the channel. The throughput performance of the protocol versus MACA-BI and RTS/CTS-based protocol is analyzed, which proves that RIMA-MC archives higher throughput in high loads.
  • CHEN Guan, LI Qiang-Hua
    Computer Engineering. 2010, 36(18): 95-97. https://doi.org/10.3969/j.issn.1000-3428.2010.18.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The data flow entering the node is regulated by leaky bucket, and the node provided rate-latency service for the flow. It has derived the TCP throughput upper bound for wireless Ad Hoc network based on the existing link throughput model using network calculus theory. For grid topology wireless Ad Hoc network, all simulated results for different data flows are bounded by theoretical results. These show the TCP throughput upper bound model performs well and the wireless TCP still needs more improvements.
  • FANG Li-Cai, LEI Lei, HU Zong-Ze
    Computer Engineering. 2010, 36(18): 98-100. https://doi.org/10.3969/j.issn.1000-3428.2010.18.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the multi-channel hidden terminal problem in Ad hoc networks, this paper presents an asynchronous multi-channel Medium Access Control(MAC) protocol based on neighbor node cooperation announcement mechanism. In this protocol, the idle neighbor node sends an announcement broadcast frame to the nodes which have not received channel consultation control frames. It can effectively solve the multi-channel hidden terminal problem. Simulation results show that, compared with the IEEE 802.11 and MMAC protocol, this protocol can improve the average throughput of the network significantly and reduce the average packet delay simultaneously.
  • LI Shu-Wen
    Computer Engineering. 2010, 36(18): 101-104. https://doi.org/10.3969/j.issn.1000-3428.2010.18.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    P2P network becomes more and more popular due to its good scalability and robustness. However, because of anonymity and openness, P2P network also becomes an ideal environment for some malicious behaviors. This paper proposes a P2P reputation estimation mechanism based on power-law distribution for identifying good behaviors and resisting malicious behaviors. Simulation results show that computing reputation score for P2P by using the mechanism has less computing cost and better accuracy, it is adaptable to dynamics in peer joining and leaving and robust to disturbance by malicious peers.

  • LI Zhou-Zhi, WANG Xiao-Dong, WANG Zhen-Zhi, FENG Zhi-Min, ZHOU Yu
    Computer Engineering. 2010, 36(18): 105-108. https://doi.org/10.3969/j.issn.1000-3428.2010.18.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to implement the communication protocol regarded to multi-channel supported data transmission technology and hybrid transmission mode, this paper achieves a data transmission mechanism based on multi-priority buffer queue by getting into the concept of two priorities queue mode. The mechanism is composed of data input queue facing to upper layer and data output queue facing to diverse communication channels. To satisfy the demand for the data transmission system, both retransmission mechanism of communication channel exchange and data packets reuse mechanism are added based on the queue model. Having gone through a practical application under remote monitor system as well as a series of example tests, it preliminarily identifies the feasibility and reliability of the designed queue model.
  • WANG Bin, CHEN Qiang-Guo, WANG Wen-Hua, ZHONG Qi
    Computer Engineering. 2010, 36(18): 109-111. https://doi.org/10.3969/j.issn.1000-3428.2010.18.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Most of one-hop lookups have characteristic that operation amount of any two-node pair decreased with the increases of physical distance, such as multi-media service. This paper designs an efficient two-hop-worst P2P system, which can ensure any lookup is finished within two hops, also with reasonable bandwidth requirement and size of routing table. It applies the model in VoIP system, and finds some valuable results through analysis: in the VoIP system using the model, about 80% customers take one-hop-lookup service, and only about 20% customers take two-hop-lookup service.

  • LI Shi-Bao, HONG Li
    Computer Engineering. 2010, 36(18): 112-114. https://doi.org/10.3969/j.issn.1000-3428.2010.18.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of heavy routing overhead that is brought by AODV routing protocols when using full-net query flooding during route discovery, an adaptive L-hops expanding ring search route discovery algorithm is proposed. A theoretical model is developed to get the formula of L. Based on probability characteristic, the cached “experience” is used to optimize search arguments and the optimal L is calculated, in order to minimize the routing overhead. Simulation results show that the algorithm can reduce the routing overhead, cut down the average routing delay.
  • SHEN Jian-Fang, CHENG Liang-Lun
    Computer Engineering. 2010, 36(18): 115-117. https://doi.org/10.3969/j.issn.1000-3428.2010.18.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    QoS requirements are different in different services in middle-and-high-rate sensor networks. Aiming at the circumstance, this paper proposes a multi-parameter self-adaptive cross-layer scheduling algorithm based on Differentiated Services(DiffServ). By dynamically adjusting values of the two parameters of delay compensatory factor and throughput compensatory factor, it can meet the demands of smaller delay in real-time services and larger throughput in non-real-time services. Simulation results show that the algorithm can achieve compromise between system efficiency and users’ QoS satisfaction flexibly, and guarantee fairness among different users.

  • SHU Cheng-Jian, JIANG Bing, DIAO Ti
    Computer Engineering. 2010, 36(18): 118-120. https://doi.org/10.3969/j.issn.1000-3428.2010.18.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the delay distribution of link and proves it deriving from the Wei Bull theory: the probability of short delay after the parallel-link is larger than any separate way, and the probability of long delay is smaller than any separate way. A special multi-path transmission program is put forward to copy 20% of voice information and transport it independently. After testing by the NS2 simulation, it shows that end-to-end delay and packet loss rate is obviously improved by increasing 20% of bandwidth.
  • BANG Yu-Xu, LI Huan
    Computer Engineering. 2010, 36(18): 121-122. https://doi.org/10.3969/j.issn.1000-3428.2010.18.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The Quality of Service(QoS) of Voice over Wireless Sensor Network(VoWSN) is a challenging task because of its large data and complex task processing. This paper summarizes the current research progresses of QoS routing protocols and Admission Control(AC) in WSN. Admission control may be classified into plane admission control and cluster-based admission control according to topological structure of network. The paper provides a new idea of QoS routing protocol combined with admission control for improving the quality of voice transmission over wireless network.

  • XU Jing-Dong, LI Miao, DIAO Wen-Yao, LEI Hua-Jun
    Computer Engineering. 2010, 36(18): 123-125. https://doi.org/10.3969/j.issn.1000-3428.2010.18.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To make data transmission more energy-efficient is an essential design issue of Wireless Sensor Network(WSN) routing protocol. This paper proposes a new routing protocol: Energy-Aware and Load-Balance(EALB), which is based on Link Estimation and Parent Selection(LEPS) protocol and adopts energy-aware mechanism as well as broadcast delay method. Simulation results show that compared with LEPS, EALB reduces redundant data transmission and realizes the load balance.
  • XU Ning, GU Nan, GONG Ban
    Computer Engineering. 2010, 36(18): 126-128. https://doi.org/10.3969/j.issn.1000-3428.2010.18.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    On the basis of the research on WSN in voice communication, this paper discusses a WSN voice communication scheme in which WSN node of JN5139 and CODEC WM8510 is hardware basis. It expounds the process of WSN-based voice communication and the software realization technique, proposes a performance evaluation system of WSN voice communication, and analyzes the results of evaluation based on the practicability criterion.

  • YAN Xiao-Fang, SU Jin-Hai
    Computer Engineering. 2010, 36(18): 129-131. https://doi.org/10.3969/j.issn.1000-3428.2010.18.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To meet the demand of the distributed networks, this paper presents an ECC-based self-certified public key distribution scheme under distributed environment by combining the threshold secret sharing scheme and the self-certified public key. It realizes the process that user can generate its self-certified public key with the distributed key distribution center. Compared with the existing schemes alike, the scheme does not rely on the combiner so as to increase the scheme’s usability and reduce the computation and communication costs of the key distribution. Furthermore, the scheme also increases the randomness of the key.
  • ZHOU Li, LI Qing-Bao, FAN Min, DIAO Yan
    Computer Engineering. 2010, 36(18): 132-134. https://doi.org/10.3969/j.issn.1000-3428.2010.18.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the isolation state detection of logic-unknown Programmable Logic Device(PLD), black-box detecting method is studied. By analyzing the PLD’s I/O structure, the principle of the pin attributes identification in course of detecting is expounded, and the performance of three types of identification algorithms is analyzed. For state-driven issues, the implementation idea of existing driven algorithms is elaborated, the space complexity is analyzed and the time complexity of state search as well as transfer path length is analyzed. Then the problems needed to focus on in the following study are raised.
  • CHENG Xiang-Ran, CHEN Xing-Yuan, ZHANG Bin, YANG Yan
    Computer Engineering. 2010, 36(18): 135-137. https://doi.org/10.3969/j.issn.1000-3428.2010.18.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With respect to conflict problems raised when implementing security principals such as separation of duty, least privilege in RBAC, this paper formalizes five RBAC policy conflict types, discusses causing reasons, and proposes a conflict detecting algorithm as well as simulation results, which can effectively detect conflicts defined in this paper. The work in this paper provides the basis for implementation for RBAC conflict detection.
  • BO Mao-Ru, CAO Tian-Jie
    Computer Engineering. 2010, 36(18): 138-140. https://doi.org/10.3969/j.issn.1000-3428.2010.18.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The realization mechanism of the Direct Kernel Object Manipulation(DKOM) and call gate are analyzed and proposed. By using call gate, it can promote the program’s privilege to modify the kernel’s process list to hide the process without the driver. A Trojan program is designed and implemented, and the hidden and survival functions are verified in experimental conditions based on the proposal. The experiments have proved that the Trojan can hide the process effectively and escape the detection and killing of the common security software. It also analyzes the Trojan program’s detection method.
  • XU Xiong, DUAN Bin, LIN Yuan-Yuan, ZHANG Yan
    Computer Engineering. 2010, 36(18): 141-143. https://doi.org/10.3969/j.issn.1000-3428.2010.18.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Monitoring and control communication in wind farms based on TCP/IP have communication security problems such as easily being wiretaped, tampered and used to do other illegal operation by illegal users. The solution of using SSL is proposed according to the standard IEC 62351-3. Aiming at the embedded environment of wind farm secure communication module, the embedding of SSL is implemented by the use of MatrixSSL. In accordance with regulations on the commercial passwords of the state, the cipher computing in SSL is realized by adopting of cipher chip, and COS program together with application programming interface of cipher chip are developed.
  • XIONG Yan, CA Xiang, MIAO Fu-You
    Computer Engineering. 2010, 36(18): 144-146. https://doi.org/10.3969/j.issn.1000-3428.2010.18.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A revocation self-healing key management scheme in hierarchical Wireless Sensor Network(WSN) is proposed. The key updating, self-healing and the revocation function can be all achieved by only a single broadcast while the authentication mechanism is implemented. The analysis result shows that the scheme can reduce the cost of energy while guaranteeing the security and improves the security and the usability of WSN based on data aggregation.
  • JING Zheng-Jun, TUN Fang-Sheng, LI Bing-Zhang, GU Chun-Sheng
    Computer Engineering. 2010, 36(18): 147-149. https://doi.org/10.3969/j.issn.1000-3428.2010.18.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To encrypt and decrypt the data generated by all types of application software, this paper proposes a document encryption and decryption system based on the trusted process reading and writing, in which a information block with certain length wrote to the tail of file is used to identify the file encryption attribute. In order to ensure the efficiency of establishing the credit path and the security of data communication between the client and server, the fixed algorithm for SSL communication mechanism is used.
  • DENG Li, WANG Xiao-Feng
    Computer Engineering. 2010, 36(18): 150-152. https://doi.org/10.3969/j.issn.1000-3428.2010.18.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An improved remote user authentication scheme with smart cards using bilinear pairings is proposed, by analyzing the remote user authentication scheme with smart cards using bilinear pairings. It is found the scheme is still vulnerable to masquerade attack and server disguise attack. By encrypting and decrypting with the server’s public key, and inducting sequence number so that there is a bidirectional authentication between user and server, the improved scheme not only inherits the security of original one, but also can resist masquerade attack and server disguise attack with stronger security.
  • WANG Yi-Wei, DIAO Ti-Hua, LI Xiao-Cong
    Computer Engineering. 2010, 36(18): 153-154. https://doi.org/10.3969/j.issn.1000-3428.2010.18.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the standard authentication mechanism of EPC-C1G2 protocol and existing improved schemes. A lightweight RFID authentication scheme is proposed according to the security problem of existing UHF RFID authentication schemes. The mutual authentication between reader and tag can be achieved in the scheme, and the lightweight encryption algorithm of the scheme can guarantee that the transmission of messages is secure. Analysis results show that the scheme has good security performance and can meet the security requirements of UHF RFID.
  • TIAN Li, BAO Huan-Su
    Computer Engineering. 2010, 36(18): 155-157. https://doi.org/10.3969/j.issn.1000-3428.2010.18.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes an improved Medium Field Equation(MFE) multivariate public key scheme, and finds some shortages of the design. Namely, the order of the medium field is very small, and input variables of the central map can be partitioned into two parts. Based on the above shortages, it can partition the space of plaintext into two disjointed subspaces. When it selects randomly an element in one subspace, a part of input variables of the central map are fixed, then it can get sufficient linear functions. The plaintext can be recovered from the ciphertext easily, hence the improved scheme is broken.
  • HUANG Xiao-Fang, ZHOU E-Jian, LAI Xin, YANG Xi-Xian
    Computer Engineering. 2010, 36(18): 158-159. https://doi.org/10.3969/j.issn.1000-3428.2010.18.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On basis of the research of existing mobile payment schemes, the weaknesses of these schemes are presented. A new secure mobile payment based on the third-party payment platform is given. The new scheme uses the one-time key distribution method in the transaction to improve the weaknesses of existing mobile payment schemes. Furthermore, considering the fairness of transaction, the new scheme provides message confidentiality, unforgeability, non-repudiation support. The protocols in the new scheme are formal analyzed by strand space model.
  • HU Yun-Song, CHAN Hong
    Computer Engineering. 2010, 36(18): 160-162. https://doi.org/10.3969/j.issn.1000-3428.2010.18.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a key management scheme for Heterogeneous Wireless Sensor Network(HWSN). The scheme generates different numbers of key chain generation for H-Sensor and L-Sensor. The key chain is built by Hash function and key chain generation. After that, it takes cipher block chaining to build a session key by using generated key chain and recursion number. Theoretic studies show that the scheme needs less storage payload to get more key connectivity and has the ability to solve the security problem after mass nodes are compromised.
  • WANG Ying, LI Xiang-He, GUAN Long, CUI Bao-Jiang
    Computer Engineering. 2010, 36(18): 163-165. https://doi.org/10.3969/j.issn.1000-3428.2010.18.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the problem that shellcode threats the security of the operating system, this paper researches on the shellcode attack and the method against the attack. Principle, consisting and process of the shellcode attack are analysed. The GS and ALSR work against the shellcode attack, and the effect of the GS and ALSR protection mechanism is tested. Experimental results show that it needs some conditions when the attacker carries out the shellcode attack, and the new protection mechanism can limit this condition against the attack.

  • BO Dun-Lin, CHEN Yi-Fan, CHEN Wen-Bin
    Computer Engineering. 2010, 36(18): 166-168. https://doi.org/10.3969/j.issn.1000-3428.2010.18.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of high error rate when extracting foreground objects from background in an image, this paper proposes a new two-scale matting model based on depth, making full use of intrinsic features of an image(extracted as a Laplacian matrix), as well as space information of objects, which greatly reduces the artifacts that arise from ambiguities near the boundaries of foreground objects and background when they have similar colors. Experimental result proves that the model improves the results of classic matting models by human vision.
  • LIU Gong, GU Yu, CHENG Hong, HUI Sui
    Computer Engineering. 2010, 36(18): 169-170. https://doi.org/10.3969/j.issn.1000-3428.2010.18.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A novel algorithm for recovering depth of objects from defocus images is presented, based on the anisotropic heat diffusion model. The defocus process is modeled using the model of anisotropic heat diffusion. The depth recovery problem is converted into the energy functional minimum problem with a regularization term of total variation. The depth information of the object is obtained by iterative procedures. The algorithm avoids recovering a focus image and exerting excess restrictions. Experimental results show that the algorithm is valid with small error.

  • CHENG Chao, HOU Yu-Jing, LI Meng-Li, CHANG Zhe
    Computer Engineering. 2010, 36(18): 171-1763. https://doi.org/10.3969/j.issn.1000-3428.2010.18.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new image retrieval method which utilizes distinct interest points of the image, and combines color moments and the distance histogram. Interest points of the image are regarded as the main visual cues concerned by users, and it includes detecting distinct interest points, calculating the color distance histogram and color moments. This method not only uses the local color characteristics of an interest point, but also considers space relations of the distance between interest points, and overcomes the traditional color moments’ lacking location information. Experimental results show that the method is simple, and it can effectively increase the efficiency of the image retrieval.
  • BO Lin, HUANG Lin-Lin, WEI Li-Fang, TU Lun
    Computer Engineering. 2010, 36(18): 174-176. https://doi.org/10.3969/j.issn.1000-3428.2010.18.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Embedded confidence fundus vessel detection method is proposed in terms of the bad effection, large calculation and low degree of automation of existing fundus vessel detection method. This method improves the traditional gradient-based edge detection algorithm, using the confidence of edge to assist detection. Experimental results show that by properly choosing the parameters, this method can rapidly and accurately detect the edge of the blood vessels, including small edge, and be able to inhibit the effects of noise.
  • KONG Lian-Xia, YUAN , HU Qiang-Xi
    Computer Engineering. 2010, 36(18): 177-179. https://doi.org/10.3969/j.issn.1000-3428.2010.18.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An entity hole boundary identification algorithm for 3D closed triangle mesh hole is presented in this paper. The area sounding the hole is selected by a smoothed curve which is dragged by the mouse. By using the dot product between the triangle normal and the viewing direction, the model silhouettes, and a continuous hole silhouette can be obtained. The 3D hole boundaries of the inner surface and the outer surface can be searched according to the curve point set and the hole silhouette. This whole flow is used to simplify the interactive operation for the identification of hole boundaries on the model which is a 2-manifold, oriented, closed and non-simple connected triangle mesh, which can improve the convenience for design system.
  • HONG Xiao-Chao, XU Da-Cheng
    Computer Engineering. 2010, 36(18): 180-181. https://doi.org/10.3969/j.issn.1000-3428.2010.18.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of slow thinning speed, ridge breaking, not thinning to one pixel in fingerprint image thinning algorithm using template-based Pulse Coupled Neural Network(PCNN), four thinning templates are added, the rectangle templates are redesigned, the process is changed, and an improved thinning algorithm is presented. Experimental results show that this algorithm has many advantages such as complete thinning, high speed, smooth skeleton without spikes. It can be applied to other binary images.
  • ZHANG Jian-Meng, YANG Feng-Qing, FANG Fang, DUAN Li
    Computer Engineering. 2010, 36(18): 182-184. https://doi.org/10.3969/j.issn.1000-3428.2010.18.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the Small Sample Size(3S) problem in face recognition, this paper presents face recognition method based on Fast Kernel Principle Component Analysis(FKPCA) and double decision subspace. FKPCA method is used to map original input space to high-dimensional space and reduce the dimension of input samples. It can get the regular decision information by using Fisher criterion and gain the irregular decision information by employing between-class scatter criterion. Weighted Euclidean distance is employed to fuse two kinds of features, and classification is implemented with nearest neighbor classifier. Experimental results on ORL database show that this method can reach a higher correct recognition rate and good speed.
  • GENG Yu-Juan, ZHANG Cheng-Wen, LI Meng
    Computer Engineering. 2010, 36(18): 185-187. https://doi.org/10.3969/j.issn.1000-3428.2010.18.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a hierarchical speaker verification approach based on mixed Principal Component Analysis(PCA) classifier and Kernel Fisher Discriminant(KFD). PCA is utilized to reduce the dimension of registered speakers’ feature vectors, and Principal Component Space(PCS) and Truncation Error Space(TES) are obtained based on the transform matrix. A mixed-PCA classifier is proposed based on PCS and TES to select the most possible R target speakers fast. And the target speaker is found with KFD. Experimental results validate the effectiveness of the approach.
  • GU Xiao-Min, LIN Jin-Guo, MEI Xue
    Computer Engineering. 2010, 36(18): 188-190. https://doi.org/10.3969/j.issn.1000-3428.2010.18.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a face recognition algorithm based on classifiers fusion using fuzzy integral. Wavelet transform is taken on after an appropriate mother wavelet and decomposition layer are chosen by theory and simulation, and the low-frequency component coefficients of the last layer are extracted to make one classifier. 2DPCA is applied to make the other. Fuzzy integral is applied to reach the final decision. Experimental results show the algorithm can obtain complementary information and improve the classification capbility so as to promote the recognition performance.

  • WANG Chun-Zi, ZHANG Bin
    Computer Engineering. 2010, 36(18): 191-193. https://doi.org/10.3969/j.issn.1000-3428.2010.18.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a kind of RBF neural network prediction model based on hidden layer optimization algorithm, named HLOA-IRBFM. By introducing rough set into the traditional Immune RBF Neural Network Model(IRBFNM), the initial hidden layer can be classified. It offers a reduction algorithm about the redundant and isolated points by defining the hidden layer area density and relative approximation. The new hidden layer space distributes evenly and the sample space can be covered entirely with few hidden nodes, which bridges a gap of over dependence on the parameters selection of IRBFNM. Experimental result proves that prediction performance of HLOA-IRBFM is more stable and accurate than that of IRBFNM.
  • LIU Ju-Xin, XU Cong-Fu
    Computer Engineering. 2010, 36(18): 194-196. https://doi.org/10.3969/j.issn.1000-3428.2010.18.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the unequal cost problem of spam filter that the cost of ham misclassification is much more than the cost of spam misclassification, this paper proposes a combinational classifier with two-layer structure. Email samples are pre-processed. The filter combines the behavioral features and text features, and optimizes the combination of different classifiers based on improving the performance of a single one. The classifier adjusts the model by timely feedback to make the filter obtain efficient self-learning function.
  • HU Meng-Xiao
    Computer Engineering. 2010, 36(18): 197-199. https://doi.org/10.3969/j.issn.1000-3428.2010.18.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to identify plagiarisms for local document set, this paper defines the document plagiarism distance as an approximate generalized edit distance based on returning number and skipping number, then uses this distance. After analyzing the sufficient conditions of satisfying triangle inequality or weak triangle inequality for the distance, it proposes an efficient full-text identification algorithm which can find out all ordered plagiarizing document pairs faithfully. Experimental results show that the algorithm improves the identifying efficiency by 3 times to 5 times meanwhile it does not lower the recall ratio.
  • BAI Ke-Jia
    Computer Engineering. 2010, 36(18): 200-202. https://doi.org/10.3969/j.issn.1000-3428.2010.18.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The degeneracy problem and the huge computational cost limit the usage of the traditional particle filter tracking algorithm, especially in video surveillance occasions which required higher real-time processing. The mean-shift algorithm is introduced to make particles herd to the nearby local maximum position, and the integral histogram can speed up the computing of the histogram of each particle. The speeds and effects of the traditional particle tracking algorithm are improved, and can meet the needs of real-time tracking. Experimental results prove the effectiveness of the improved algorithm.
  • DU Xiu-Quan, CHENG Jia-Xin, SONG Jie
    Computer Engineering. 2010, 36(18): 203-204. https://doi.org/10.3969/j.issn.1000-3428.2010.18.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Prediction of protein-protein interaction sites is a hotspot in current bioinformatics. This paper conducts evolutionary information and conserved score as feature functions based on the influential factors which are crucial to the states of protein interface residues. These kinds of information materialize the influence of short threads and long threads between ammonias of protein sequences. Maximum entropy model is used as the classifier for protein-protein interaction sites. Multi-source information is integrated into a single probability model. Experimental results show that compared with other machine learning methods, this method gets higher specificity by 2%~8% and higher accuracy rate by 3%~11% with higher correlation coefficient.

  • LIU Cha-Rong, DAN Yong-Zhao, MAO Qi-Rong
    Computer Engineering. 2010, 36(18): 205-207. https://doi.org/10.3969/j.issn.1000-3428.2010.18.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To obtain more abundant emotional information and recognize emotion of long speech effectively, a new method for speech emotion recognition of multi-granularity segment fusion using D-S evidence theory in decision fusion is proposed. Speech sample is segmented by two methods. Each segment has a result after being recognized by SVM. Results of segments carry through fusion by D-S evidence theory to get those of speech samples. Results of two segment methods fuse again. Experimental results show that, the recognition performance of this method is better, and the speech emotion recognition accuracy rate is improved effectively.
  • CHENG Le, XU Xi-Han, ZHANG Hong-Bin, JIAN Zhao-Lou, FENG Gang
    Computer Engineering. 2010, 36(18): 208-209. https://doi.org/10.3969/j.issn.1000-3428.2010.18.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a new bionics optimization algorithm named Food Truck-Cockroach Swarm Optimization(FT-CSO). Food is thrown by food truck in solution space, and cockroaches crawl to the food and search for optimal solutions. Nest migration, food filtration and equality search are used to enhance global and local search ability of FT-CSO. Simulation experimental result shows that the algorithm has high optimization rate and convergence speed.

  • SHAO Meng-Zhi, XU Yun, WANG Ying, LI Wen-Jun
    Computer Engineering. 2010, 36(18): 214-216. https://doi.org/10.3969/j.issn.1000-3428.2010.18.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on existing RT-PSM algorithm, this paper proposes a new peptide identification algorithm called FPI-PSM, which transforms the digestion of protein into peptide database and proposes an optimization strategy for effective peak extraction. Ignoring post-translational modification, it conducts tests on the recognized Keller dataset. Compared to RT-PSM, FPI-PSM improves the sensitivity by 5%, and decreases the average time of identifying each mass spectra from 13.6 ms to 5.6 ms.
  • LV Lin-Chao, DAN Fu-Jun
    Computer Engineering. 2010, 36(18): 217-219. https://doi.org/10.3969/j.issn.1000-3428.2010.18.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Since there is no unified standard for iris image quality assessment at present, the recognition rejection rate and false acceptance rate cannot always be decreased efficiently. Aiming at this problem, this paper proposes a novel model for the assessment of iris image. According to the characteristics of different interfering factors in the iris image, regionalization and weighted methods are adopted on the basis of a prior knowledge in order to perform an incremental pixel-level evaluation of various interfering factors in iris images. The image-level overall evaluation based on pixel-level assessment results proceeds. Experimental results show that the pixel level iris image quality assessment has a better performance in blur recognition and interference term identification, image-level assessment of iris image quality assessment is consistent with the manual.
  • DAI Jing, CHENG Jian, SONG Min
    Computer Engineering. 2010, 36(18): 220-222. https://doi.org/10.3969/j.issn.1000-3428.2010.18.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the cooperation resource scheduling problem of near space warning detection platform, by analyzing traits of near space detectors and detecting tasks, and considering all kinds of constrains, this paper constructs a detection resource optimization and scheduling model of near space. In order to solve the large-scale and complicated model, an adaptive Differential Evolution(DE) based on population catastrophe is developed. Simulation results show that the algorithm has higher convergence speed and better optimization capability than traditional algorithms.
  • GU Cheng-Yang, TUN Xiao-Dun
    Computer Engineering. 2010, 36(18): 223-225. https://doi.org/10.3969/j.issn.1000-3428.2010.18.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a face gender classification method based on improved Eigenspace Separation Transform(EST) and SVM. Classification experiments are conducted on FERET database and student human face database of Huaiyin Teachers College to compare different feature extraction methods and classification methods of the human face on the issue of gender classification. The results show that the performance of the new method is satisfied, and it is superior to Principal Component Analysis(PCA) and Linear Discriminant Analysis(LDA).
  • CANG Wen-Ke, YANG Jie, HAN Xiu-Ping
    Computer Engineering. 2010, 36(18): 226-228. https://doi.org/10.3969/j.issn.1000-3428.2010.18.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Conventional evolutionary computation is applied to architectural design, but the success rate of direct evolutionary optimization of the program operation is not high, and the pace of evolution is slow. This paper presents a multi-population co-evolution model based on sets of dynamic niche sets, and combines the dynamic niche sharing and the advantages of evolutionary computation to achieve the concept of design innovation. This model has a good adaptability and stability. The application shows that this model can improve the level of design innovation, stimulate creative inspiration for designers.
  • ZHOU Ben-Da, YUE Qin, CHEN Meng-Hua
    Computer Engineering. 2010, 36(18): 229-231. https://doi.org/10.3969/j.issn.1000-3428.2010.18.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the defects of Genetic Algorithm(GA) for the Maximum Clique Problem(MCP) in the deficiency of keeping population diversity, prematurity, time consuming, low success rate and so on, the crossover operation in GA is redesigned by Uniform Design Sampling(UDS). Combined with immune mechanism, chromosome concentration is defined and clonal selection strategy is designed, thus an immune GA is given based on UDS for solving the MCP. Simulation examples show that solution quality, convergence rate and other various indices are improved by the new algorithm. The new algorithm is not inferior to such classical search algorithms as DLS-MC and QUALEX, and it gets better solutions to some examples.
  • KUANG Hong-Wu, HAO Kuang-Rong, DING Yong-Sheng
    Computer Engineering. 2010, 36(18): 232-234. https://doi.org/10.3969/j.issn.1000-3428.2010.18.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a dynamics visual servo method for robot’s grasping moving object. The motion object target position is detected and tracked by dual stereo vision. With CMAC network, a learning visual impedance controller taking the quadratic of vision impedance as training target is adopted. It promotes the adaptability of position controller of the system structure parameters, so the impedance parameters are optimized. Experimental results show that the dynamics characteristics are improved and a flexible trajectory control is obtained with the method.

  • DE Ling-Xiao, MA Cha-Zhong, LIU Yan-Hong, DI Zheng-Jun
    Computer Engineering. 2010, 36(18): 235-237. https://doi.org/10.3969/j.issn.1000-3428.2010.18.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    High Level Architecture(HLA) can adopt a set of standard interfaces to package the heterogeneous simulation nodes for the federate members with the same interface, supporting for co-simulation of the heterogeneous models. But for some simulation nodes which are not open enough or can not be packaged for the federation members of HLA, there is no unified approach to be integrated into the framework of the entire HLA-based simulation system at present. The HLA/LAN mixed isomers simulation system is designed, and a preliminary simulation system is constructed. Test results show that the system is stable and reliable to meet the simulation requirements.
  • ZHANG Juan, SU Hai-Bing, TUN Qin-Zhang
    Computer Engineering. 2010, 36(18): 238-239. https://doi.org/10.3969/j.issn.1000-3428.2010.18.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    System connection or communication rate of different groupwares in a system becomes a bottleneck which blocks the improvement of system performance in typical embedded system. This paper describes the difficulty that current bus encounters, introduces the protocol and application of high-speed SRIO interface and researches the application of SRIO in system connection of multi-processor and the loading technology based on SRIO. The experiment implements reading and writing operation in multi-DSP which can stably work at the rate of 3.125 Gb/s for every channel. The efficiency achieves 86%. The DSP can be loaded through SRIO.
  • XU Xin-Peng, WANG Xiang, LIU Jian-Hua, XU Jun, ZHANG Xiao-Xian
    Computer Engineering. 2010, 36(18): 240-242. https://doi.org/10.3969/j.issn.1000-3428.2010.18.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem that the main and commercial tool chains for designing automotive electronics software are lack of universality and reuse, based on the standard of AUTomotive Open System Architecture(AUTOSAR), this paper analyzes the process of application component configuration and extracts the kernel elements. Modeling of the elements, a platform for developing domestic automotive electronics software based on ReWorks operating system is realized. And the platform has the pluggable ability and portability.
  • HUANG Zhen-Zhong, NI Meng, CHAI Xiao-Li
    Computer Engineering. 2010, 36(18): 243-244. https://doi.org/10.3969/j.issn.1000-3428.2010.18.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Based on the study of the RapidIO interconnect standard and TCP/IP protocol, the RapidIO-IP architecture is designed, and the principle of END in VxWorks operating system and the working mechanism of RapidIO bus in SBC8641D platform are analyzed. While solving a number of key technologies which are needed to implement on END driver based on RapidIO bus, this paper implements RapidIO-IP successfully, and provides a basis for the application of RapidIO protocol in the embeded system.

  • CA Qi-Xian, LIU Meng, TU Jie-Feng
    Computer Engineering. 2010, 36(18): 245-246. https://doi.org/10.3969/j.issn.1000-3428.2010.18.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper introduces a modeling and implementation procedure for a MIPS32/64 instruction set simulator using software programming method. It simulates the CPU hardware behavior using C++ program language. By choosing different option during the compile time, it can respectively simulate embedded processor MIPS32 and MIPS64 instruction set architecture, and it can decode and execute all the commands except float point commands. The main benefit of this method is that the code is reusable and has a good performance for extending commands.

  • ZHANG Hai-Jiang, DOU Li-Hua, FANG Gao
    Computer Engineering. 2010, 36(18): 247-249. https://doi.org/10.3969/j.issn.1000-3428.2010.18.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the map building problem of mobile robots using stereo vision, a grid map building approach based on ground disparity distribution is proposed. The ground disparity distribution is used to determine each pixel in disparity images corresponding to obstacle or ground plane, both obstacle-pixels and ground-pixels are projected onto the grid map with a unified projection model but different parameter values. The projection model considers the quantization and match error of stereo vision, the ground disparity and the spatial distribution of occupancy probability. Experiments with a mobile robot in unstructured environments show that the proposed approach can build integral information and precise grid map in real time.
  • YUAN Tie-Zhu, WANG Lei
    Computer Engineering. 2010, 36(18): 250-252. https://doi.org/10.3969/j.issn.1000-3428.2010.18.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With regarded to the problem that the current system’s recall ration and users’ satisfaction usually appears low during service discovery, this paper presents a method that takes the mechanism of memory strength to analyze the received history records of Web service in order to update service information of the memory vault. According to the request, the memory vault can get the ordinal service list and match it and another service set provided by the service center of the UDDI matched to based on keys to get the service list required by the clients by means of semantic, and finally the system provides service list to meet users. Experimental results indicate that the new model can improve the recall ration and users’ satisfaction of Web service discovery.
  • TANG Yi-Jian, LIAO Xiang-Ke, SHAO Li-Song
    Computer Engineering. 2010, 36(18): 253-255. https://doi.org/10.3969/j.issn.1000-3428.2010.18.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Chip multithreading processor provides high throughput and parallel performance for the modern commercial workload, and brings about puzzles for the design and performance optimization of operating system and software. Aiming at the above problem, this paper demonstrates a multithreading benchmark with fully configurable integrated workload, runs performance test on the chip multithreading processor with various configurable workload, analyzes the influence of different scheduling on the performance, and proposes some optimization advice to the multithreading scheduleing in operating system.
  • GU Yan-Chao, YU Hui-Qun
    Computer Engineering. 2010, 36(18): 256-258. https://doi.org/10.3969/j.issn.1000-3428.2010.18.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a trustworthy credit reputation model Based on C2C. The model is based on historical records of transactions, which takes into account of various aspects of transactions such as payment amount of transactions, buyer and seller reputation scores, number of transactions, and number of negative feedbacks, neutral feedbacks of transactions. It adopts dynamic calculation method, and provides a reliable basis for successful transactions. The model can effectively identify malicious users and guileless users, which reduces the credibility of the defamation and extraction in trust, and improves the security of C2C online transaction.
  • JIA Bai-Hua, DAO Xiao-Yu
    Computer Engineering. 2010, 36(18): 259-261. https://doi.org/10.3969/j.issn.1000-3428.2010.18.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Timeslot requirement analysis is important in application of TDMA data link. For dedicated access mode and contention access mode, the relationships between timeslot requirement and reaction time or collision probability are investigated in theory, and simulation models are set up. Theory analysis results are almost the same with simulation results, and priority for urgency message which should be sent in time is put forward according to the simulation results. The theory analysis methods and simulation systems given in the thesis are useful for data link’s network designing and checking.
  • DU Jian-Qing, YANG Jia-Hai, HUANG Shao-Jun
    Computer Engineering. 2010, 36(18): 262-263. https://doi.org/10.3969/j.issn.1000-3428.2010.18.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper analyzes and defines application-oriented social networks, it proposes a new social network discovery algorithm through characteristic analysis of application-based communities on the basis of the results of traffic classification and identification. Typical case study is conducted on a real traffic dataset, result shows the effectiveness and efficiency of the algorithm. The algorithm is good for the community- based network operation management and measurement research.

  • XU Kang, NING Hong, DENG Qing-Lan, ZHANG Yi
    Computer Engineering. 2010, 36(18): 264-265. https://doi.org/10.3969/j.issn.1000-3428.2010.18.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper expands the mechanism of dynamic module loading of VxWorks, a widely used real-time embedded operating system, to achieve a dynamic loading management system, which gets the loading information and the modules’ dependencies and supports users to query and set, so that the dynamic loading can work well during the real run time. On this basis, it allows the users to set the modules’ automatically loading state, saves and controlls by the management system, to support the automatical loading after reboot eventually.
  • CA Qi, YANG Xiao-Hu
    Computer Engineering. 2010, 36(18): 267-269. https://doi.org/10.3969/j.issn.1000-3428.2010.18.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    By analyzing the problems while transmitting securities trading data, necessity of data compression is indicated. This paper proposes a hybrid arithmetic coding for messages of Securities Trading Exchange Protocol(STEP). The coding improves adaptive binary arithmetic coding by using template-based binarization scheme and independent source model. Experimental results show that hybrid arithmetic coding provides a much better compression ratio and slightly faster processing time than adaptive binary arithmetic coding.

  • CHEN Qi, JU Zhi-Bing, ZHANG Min
    Computer Engineering. 2010, 36(18): 270-272. https://doi.org/10.3969/j.issn.1000-3428.2010.18.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In content-based publish/subscribe, in view of subscription conflict and low efficiency in subscription reconfiguration, an algorithm that meets the features of mobile Ad Hoc network is proposed. The algorithm improves subscription forwarding method and forwards the message only on reconfiguration path, which avoids subscription conflict and improves efficiency. Experimental results show the algorithm decreases subscription reconfiguration time and its performance suffers little influence from network scale.
  • GAO De-Dong, ZHENG Gao-Jun, TAO Wang, HE Dui
    Computer Engineering. 2010, 36(18): 273-275. https://doi.org/10.3969/j.issn.1000-3428.2010.18.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Based on the analysis of needle forces and deflection, flexible needle insertion into soft tissue is modeled with virtual spring. The trajectory of the flexible needle body and tip is simulated with Matlab software in the different cases. The simulation results show that the elastic deformation of the flexible needle does not affect needle tip trajectory evidently, and the main factors of effects on needle tip trajectory are the controlling coordination of lengthways direction and the initial angle between needle base and level line. Considering the soft tissue deformation during flexible needle insertion, the theories proposed can be used in robot-assisted needle insertion steering, path planning and obstacle avoidance can be realized.

  • MA Lin, HE Hua, LI Xiu-Zhi
    Computer Engineering. 2010, 36(18): 276-278. https://doi.org/10.3969/j.issn.1000-3428.2010.18.096
    Abstract ( )   Knowledge map   Save
    In order to study the impact of data backup system to network delay and server load, this paper analyzes application of NDMP protocol in the data backup and internal structure of application layer in OPNET’s. By modifying the system model, it makes data backup as an application loading to the application layer. Simulation results show that a sharp increase server load appears and network latency is significantly longer while adding the application of data backup to the basis of the existing service. It suggests that through application of data backup transfering to another network and other equipment to reduce the delay and server load method.
  • GONG Dan-Dan, LIU Guo-Qiang
    Computer Engineering. 2010, 36(18): 279-281. https://doi.org/10.3969/j.issn.1000-3428.2010.18.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A new Independent Component Analysis(ICA) algorithm is introduced by histogram estimation and maximum likelihood estimation. When estimating the probability density function, the corresponding step function is smoothed using parameter . It is proved that depends on statistical characteristics of signals and total number of samples. Simulation results demonstrate that signal-to-interference ratio has significant improvement.

  • HU Yun-Peng, DIAO Yang-Kai, LI Li-Juan
    Computer Engineering. 2010, 36(18): 282-284. https://doi.org/10.3969/j.issn.1000-3428.2010.18.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    o improve the precision of soft sensing model, a method of Bagging-PCA is proposed to detect gross error. Using the integrated idea of Bagging algorithm, it improves the stability of classical PCA and detects gross errors effectively by weakening the effect of the big errors in part variable. The method is used to detect gross errors in modeling data for a propylene concentration soft sensing and good results are obtained.
  • XU Ying, BAI Guang-Wei, WANG Meng-Chao, CAO Lei
    Computer Engineering. 2010, 36(18): 285-287. https://doi.org/10.3969/j.issn.1000-3428.2010.18.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Considering that 802.11 DCF does not support any Quality of Service(QoS) for real-time traffic, this paper proposes a novel and simple priority-based backoff scheme to provide service differentiation according to different QoS requirements from different classes of traffic. For high-priority data flow, a strategy of reducing retransmissions is adopted. For low-priority data flow, an improved RWBO+BEB backoff algorithm is introduced to make the Probability Distribution of Slot Selection(PDoSS) even, and thus to reduce the packet collision probability. A Markov chain model is deployed and used to analyze and evaluate the mechanism performance. The mathematical analyses demonstrate that the proposed mechanism can support QoS in 802.11 DCF effectively, moreover, improve the overall system performance significantly.

  • LI Jian-Hua, MO Gong
    Computer Engineering. 2010, 36(18): 288-290. https://doi.org/10.3969/j.issn.1000-3428.2010.18.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A remote control system for rat micro-stimulator system is described. The system mainly consists of the following parts: control platform based on PC, transceiver, and stimulator. The control command is transmitted from control software by wireless transceiver and is received by stimulator which sends stimulation pulses to the rat brain to control the rat motion. The amplitude of stimulation pulse can be regulated and it is easy to set the proper stimulation parameters for different motion controls. Frequency hopping is also applied to improve the reliability of wireless communication. Moreover, the system is small and light as a result of using SMT components. Experimental results show that the system runs steadily within 200 m.
  • GUO Xiang-Rong, WU Yue-Shan
    Computer Engineering. 2010, 36(18): 291-293. https://doi.org/10.3969/j.issn.1000-3428.2010.18.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to ISO18000-6C air interface protocol, this paper presents a transmitter model of Radio Frequency Identification(RFID) reader. This model uses raised cosine filter to limit the out band spurious spectrum and reduce the interference between channels. The direct conversion architecture with IQ branch makes the system flexible for Double Side Band modulation(DSB), Single Side Band modulation(SSB) and carriers sending. It constructs the model in Simulink to simulate data-link in the transmitter, gets the waveform of DSB and SSB in time domain and ripple amplitude ratio under different roll-off factor.