Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 December 2010, Volume 36 Issue 24
    

  • Select all
    |
    Networks and Communications
  • XU Ji-Xiao, LIU Kai-Hua, SHI Wei-Guang
    Computer Engineering. 2010, 36(24): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2010.24.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the state of highway management system in defect of real-time management of vehicles, this paper presents a novel algorithm to measure vehicle speed and location based on Radio Frequency Identification(RFID). By constructing moving vehicle model, spectral estimation is used to measure vehicle Doppler shifter and New-Town iteration method is used to solve the nonlinear characteristic of models in order to obtain the vehicle real-time speed and relative location. Simulation experimental result shows that the method for vehicle speed measurement and location can achieve high precision with little operation and simple maneuverability.
  • YANG Bin, ZHANG Wei-Dong, ZHANG Li-Xin, ZHANG Li-Jun, WU Zhang-Meng
    Computer Engineering. 2010, 36(24): 4-5. https://doi.org/10.3969/j.issn.1000-3428.2010.24.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A Web client is constructed based on Ajax and Observer design pattern to solve the problem of poor real-time and the lower rate of code reuse for existing monitoring system. It uses the Ajax to solve the real-time graphical display problem, and combines with observer design pattern. The rate of code reuse is increased, and the coupling between modules is reduced. Demonstration system is used to validate that the proposed method is feasible.

  • DAO Chao, TAN Yi-Hua, CA Hua-Jie, TIAN Jin-Wen
    Computer Engineering. 2010, 36(24): 6-8. https://doi.org/10.3969/j.issn.1000-3428.2010.24.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Image object segmentation method in accord with human vision perception, which consists of double-scale region segmentation and object extraction based on object model, is proposed in this paper. An image is smoothed by nolinear scale operator in coarse-scale, color quantization and perceptual color clustering are exploited to form the initial segmented regions. The initial regions are merged based on the region distance in the original finest-scale. Object model is used to implement image object extraction. Experimental results demonstrate that the proposed algorithm gets better image object segmentation with favorable consistency to human vision perception.
  • ZHANG Xin, LI Jin, WANG Hui
    Computer Engineering. 2010, 36(24): 9-11. https://doi.org/10.3969/j.issn.1000-3428.2010.24.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a fine-grained identification method of P2P-TV traffic based on channel signatures. It mines the channel signatures of popular P2P-TV applications through statistical analysis on their pure traffics. Channel signature matching is used to realize fine-grained identification of the application and channel of the traffic on a particular(IP, Port). Experimental results on PPStream, QQLive and UUSee prove that the method proposed is effective and accurate.
  • LIU Yong, LIU Li, HE Wang-Quan
    Computer Engineering. 2010, 36(24): 12-14. https://doi.org/10.3969/j.issn.1000-3428.2010.24.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    All-to-all communication in parallel algorithm is similar to transposing a square matrix. The Latin-square plays an important role as commutator in the process. This paper proposes an efficiently realization of short-message all-to-all communication algorithm based on Latin Square, and constructs a model analysis on this maximum message-volume, which is prior to the direct algorithm. Some tests verify this algorithm and model without considering the detail of network topology.
  • HE Fei, LI Min, YANG Jian-Hong, XU Jin-Wu
    Computer Engineering. 2010, 36(24): 15-17. https://doi.org/10.3969/j.issn.1000-3428.2010.24.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Because of the nonlinear coupling relationship among process parameters, it is difficult for condition recognition of production process. A new criterion of kernel mapping is proposed, and the gradient optimum algorithm is used to select kernel parameter. Kernel Fisher discriminant analysis is applied to reduce dimension for realizing the multi-classification in the visual plane with layer by layer analysis method. The judgment on the current state can be realized. The Tennessee Eastman(TE) process data are used for model validation, the proposed method has more satisfactory performance on condition diagnosis, compared with kernel principal component analysis.

  • ZHANG Si-Wen, NI Zhi-Wei, WANG Li, LI Zhi-Dong
    Computer Engineering. 2010, 36(24): 18-20. https://doi.org/10.3969/j.issn.1000-3428.2010.24.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    On the basis of studying the theory of dynamic Virtual Enterprise(VE) based on Web Service architecture, this paper proposes a new model of cooperative partner selection for dynamic VE with extension QoS constraint in the large extended, it extends the traditional QoS, monitores and processes the enterprise extension QoS in a real-time sense by using QoS monitoring system, gives partner selection process under the model, and some key issues for the implementation of partner selection are analyzed. Some evaluations of the model performance is given, experimental result shows the rationality and feasibility of the model.

  • TUN Yi, LIN Xiao, CHEN Lian-Feng
    Computer Engineering. 2010, 36(24): 21-23. https://doi.org/10.3969/j.issn.1000-3428.2010.24.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A general model of wireless multiple video transmission schedule is proposed to achieve real-time monitoring of multiple scenarios. The model includes the communication setup method between the remote device and monitoring center in the beginning of transmission, the multiple video streams transmission schedule model based on the connection state, and the encrypting control method of the video stream. The model is adapted to any kind of IP network. It is applied in wireless video transmission system based on CDMA1x network, and good application effect is achieved.

  • JI Ye, CHEN Yan, YANG Jian, MU Rong
    Computer Engineering. 2010, 36(24): 24-26. https://doi.org/10.3969/j.issn.1000-3428.2010.24.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characteristics of life services, a model of life-oriented vertical search engine is proposed. The model describes specific algorithms and implementations of four functional modules, which include information collection, information extraction, index instruction and information retrieval. Practical application shows that the model search works well. The interfaces of HTML and WML are used to support the search request. It successfully supports search services for catering, entertainment and yellow pages information, covering nearly 40 Chinese cities.
  • WANG Yong-Beng
    Computer Engineering. 2010, 36(24): 27-29. https://doi.org/10.3969/j.issn.1000-3428.2010.24.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to meet the requirements for user to access cultural information in a wide range, accurately, and quickly, design of digital museum objects information retrieval system is given. During the design process, some technologies are used, such as multi-threading, the information and then filtering, re-classification of information technology. The information acquisition, information analysis, information classification technology are improved. To solve the current number of limitations of the museum, there is the issue of information sources, while improving the accuracy of information, making a clear cultural information classification to achieve a fast retrieval of information objects.
  • LIU Zhong-Jie, JU Heng-Meng
    Computer Engineering. 2010, 36(24): 30-32. https://doi.org/10.3969/j.issn.1000-3428.2010.24.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analysis of the loss of NTFS security attributes during data transfers to non-NTFS file systems or over network, this paper proposes a security attributes preservation scheme for lossless data transfer in Windows. Compared with traditional file copy and Windows NTBackup, the scheme preserves the original security attributes of the files transmitted and provides strong protection for data transmission.
  • XU Zhang-Jie, GE Wei
    Computer Engineering. 2010, 36(24): 33-35. https://doi.org/10.3969/j.issn.1000-3428.2010.24.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In SOA, there are several decentralized orchestration engines and their purpose is decomposing a BPEL process to several software agents. As these process distribution methods break a BPEL process to its building activities and encapsulate each activity in one agent, it results in producing a lot of agents. This paper proposes an Intelligent Process Distribution(IPD) approach based on process mining. The recommended IPD approach can improve three aspects of system quality: the amelioration of business process adaptability with run-time environment, choosing the best agent granularity based on detecting most relevant activities and encapsulating them in agents and decreasing of resource usage due to reduced and improved number of produced agents and messages.
  • LIANG Bao-Hua, CA Min, TUN Ji-Lin, HONG Shi-Xi
    Computer Engineering. 2010, 36(24): 36-38. https://doi.org/10.3969/j.issn.1000-3428.2010.24.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As the majority updating algorithms for association rules have the same shortcomings which only take account of the minimum support and data increase, without the minimum confidence and data decrease. This paper proposes a new updating algorithm for dynamic database which can avoid some shortcomings of the above. It can effectively mine some interested knowledge and save a large amount of mining time. Experimental result shows that the proposed approach is feasible.
  • DING Zheng-Jian, ZHANG Lu
    Computer Engineering. 2010, 36(24): 39-41. https://doi.org/10.3969/j.issn.1000-3428.2010.24.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a synthesized approach of similarity computation. It uses the Hirst-St-Onge semantic relativity algorithms to determine whether there is correlation among different domain ontologies. It takes account of the name, attributes, instances, relations of concepts and compares in many ways if it is relevant. A comprehensive similarity measuring method based on the MD3 model is proposed. It tests the method with two group data and then compares the results. Experimental results show that the approach is better than the MD3 model in recall rate and precision rate.
  • LI Chun-Chi, DIAO Lei
    Computer Engineering. 2010, 36(24): 42-44. https://doi.org/10.3969/j.issn.1000-3428.2010.24.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Pre-FUFP algorithm updates the frequent pattern tree effectively based on the concept of pre-large items. But when there are pre-large items becoming frequent items, the algorithm need check which transactions in the original database contains the pre-large items. In this paper, an index table of pre-large items to their corresponding original transactions is proposed to find out the transactions need to be processed and fasten the process of FUFP-tree modification. The frequent patterns by using compact FP-Tree and matrix based algorithm are worked out. Experimental result shows the algorithm outperforms the pre-FUFP algorithm.

  • YANG Chang-Chun, SUN Jing
    Computer Engineering. 2010, 36(24): 45-47. https://doi.org/10.3969/j.issn.1000-3428.2010.24.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By analysis of Web user access sequence, it can find the factors of user’s hobbies, interests, habits etc.,and provides the necessary support of information for the upgrade and amendment of Web sites. This article proposes a method of data mining by analysis of the user access sequence. It can reduce the number of Web pages of the session sequence and compress the size of frequent traversal sequence by taking the duration time of Web page as a parameter. Experimental results show the algorithm can reduce the cost of mining and provide a useful reference for mining of Web users’ commercial data.
  • GE Rong-Wan, JIAN Dun-Pan, DIAO Ling-Zhong
    Computer Engineering. 2010, 36(24): 48-50. https://doi.org/10.3969/j.issn.1000-3428.2010.24.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the analysis of the concrete semantics of programs, this paper proposes a method to detect the information privacy. It establishes corresponding relation between concrete semantics and abstract semantics, then establishes abstract semantics according to the properties of the programs to be checked, and meanwhile adopts bound methods to optimize detecting efficiency on the basis of abstraction. By this method, the complexity of program detecting is reduced, and the efficiency is raised and accuracy of detection is improved.
  • QI Xiao-Wan, WANG Chao, MA Chuan
    Computer Engineering. 2010, 36(24): 51-53. https://doi.org/10.3969/j.issn.1000-3428.2010.24.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The inconsistency of interactive behavior’s sequence before and after component evolution will cause system behavior deviates from its goal. Interactive behavior between components is described based on Process Algebra(PA) and interactive behavior’s consistency is defined. The restriction which interactive behavior’s consistency will fulfill is epurated, and an approach to ensure consistency of interactive behavior is presented. An example is presented to illustrate the feasibility and validity of the approach.

  • YANG Chun-Xia, WANG Yang-Hui, WANG Hong-Chao
    Computer Engineering. 2010, 36(24): 54-56. https://doi.org/10.3969/j.issn.1000-3428.2010.24.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The consistency verification and removal of redundancy behavior of composite component is an important issue in the field of Component Based Software Development(CBSD). The theory of interface automata is analyzed, and a more visualized presentation method of illegal state is presented by viewing composed component as a cycle process of initial state to itself. With scenario based requirement specification can always be modeled as sequence of events, digraph is used to model composed interface automata to give an algorithm of consistency verification. With the results of consistency checking, a method to remove redundancy behavior is also discussed.

  • ZHANG Jun
    Computer Engineering. 2010, 36(24): 57-58. https://doi.org/10.3969/j.issn.1000-3428.2010.24.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the load characteristics of storage devices, and proposes the expansion model for load. An object distribute module is discussed, real-time load info are collected for an object distribution algorithm, which make the objects distribute in a reasonable way, and dispatch I/O capabilities effectively among storage nodes. Simulation results show that the algorithm enables the loads to distribute balanced, and reduce the emergence of load imbalance effectively.
  • WANG Hua, GU Li-La-?A-Dong-Bie-Ke
    Computer Engineering. 2010, 36(24): 59-61. https://doi.org/10.3969/j.issn.1000-3428.2010.24.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Kazak as one of the minority languages and characters being universally applied or used in Xinjiang, frequency statistic of word in Kazak natural language treatment becomes the problem to be solved urgently. This paper introduces the relation of Zapf in Kazak word segmentation, which is based on frequency statistic of the word. Through the system, continuous Kazak character bunch input can be segmented, and then the cut apartment word bunch output can be gotten. The cut apartment word bunch usually is two Kazak word bunch, and dictionary can be gotten. The dictionary stores Kazak word and the frequency that the word appears in these disposal test that combines proceeding Kazak covariance of article experiment. Experimental result expresses the relation of frequency of the Kazak word, and the resulting Kazak word frequency distribution accords with power-law of Zapf.

  • CENG Xue-Lan, CHEN Qing, MEI Liang-Cai
    Computer Engineering. 2010, 36(24): 62-63. https://doi.org/10.3969/j.issn.1000-3428.2010.24.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the incompleteness of interval-valued partial ordering relation which causes the problem of information loss in interval-valued information system which does not include decision attribute, this paper proposes a new interval-valued ordering relation based on interval-valued fuzzy number, then uses it to construct interval ordered information system, and analyzes its related monotonicity and included of upper and lower approximation. Furthermore, it presents an algorithm for attribute reduction based on indiscernibility function. Experimental result illustrates the algorithm is simple and effective.

  • ZHANG De-Dong, LI Ren-Pu, XU Chao
    Computer Engineering. 2010, 36(24): 64-67. https://doi.org/10.3969/j.issn.1000-3428.2010.24.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    From the view of rule base, a batch incremental algorithm for rule induction is presented in this paper. An equivalence class table is built for all new objects. Original rule base is efficiently matched with the equivalence class table. The rule base is updated for the new objects based on the different match types. The algorithm can deal with both complete and incomplete data and accomplish the rule update through only accessing rule base twice. Theoretical analysis and comparison experimental results on UCI datasets demonstrate that the algorithm outperforms traditional algorithms.
  • CHEN Yan-Yan, GU Xun-Mei
    Computer Engineering. 2010, 36(24): 68-70. https://doi.org/10.3969/j.issn.1000-3428.2010.24.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on COSMIC-FFP and object-oriented method requirements model, the mapping rules between COSMIC-FFP and object-oriented method are summarized. Functional reuse is produced from the users’ perspective of function. And potential reuse through three kinds of generalization relationships in the object-oriented method requirements model is analyzed. According to use case models, a set of formulas are given to count functional requirements. Synchronously, an indicator is produced in order to indicate the proportion of the reused functional requirements and the total amount of functional requirements delivered. A case study is introduced to illustrate the measurement process of functional reuse for object-oriented systems.
  • ZHOU Lei, CHEN Ke-Fei
    Computer Engineering. 2010, 36(24): 71-73. https://doi.org/10.3969/j.issn.1000-3428.2010.24.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on symbolic operation, a novel approach is proposed to recognize and reduce Induction Variables(IV). It replaces all l-values in assignments by the original variables which can represent the iteration and dependence relationships among them, and constructs variable dependence digraphs to recognize IV. It establishes recursive equation sets to solve the problems based on symbolic operations, and gets their independent expressions composed of iteration number. Experimental results show that the method fits with different kinds of IV and overcomes the shortages of current methods.
  • JIANG Jiu-Lei, WANG Jiang-Jing
    Computer Engineering. 2010, 36(24): 74-75. https://doi.org/10.3969/j.issn.1000-3428.2010.24.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The high performance of Solid State Disk(SSD) has failed to be improved in the existing database systems. Aiming at this problem, a new connection method is proposed in this paper. The algorithm is optimized Flash database connection on the column files. Using the small size of column storage and the advantages of SSD high-speed random read, the algorithm overcomes the mismatch with the flash memory. Experimental results show that compared with the original algorithm, the query time of the new algorithm is less under the conditions of different query rate and different memory.

  • HE Shi-Biao, ZHANG Xin-Chun, HU Zhi-Lun, CENG Wei
    Computer Engineering. 2010, 36(24): 76-78. https://doi.org/10.3969/j.issn.1000-3428.2010.24.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Dynamic spectrum allocation provides a promising way out of the underutilization of many licensed frequency bands. However original graph-coloring algorithm is thoughtless for the cognitive user’s demand, which results in excessive allocation of resource to users with less demand and wastes spectrum resource. To solve the problem, a demand-based spectrum allocation algorithm is proposed, to match between channel and user’s demand. The performance simulation demonstrates that compared with the original algorithm, the proposed algorithm can better satisfy demand in the network.
  • DIAO Jing, KONG Jin-Sheng
    Computer Engineering. 2010, 36(24): 79-80. https://doi.org/10.3969/j.issn.1000-3428.2010.24.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to solve the problem of network congestion, this paper proposes a network congestion control algorithm based on Tabu Search (TS) genetic optimization named TSGA, which combines TS and Genetic Algorithm(GA). An optimization mathematical model on multiple constrained QoS routing with the objectives of network resource consumption minimization and load distribution balance is presented. Simulation experimental results prove that the algorithm can realize network congestion control, and improve network performance effectively.

  • JI Hai-Jin, JU Xiu-Meng
    Computer Engineering. 2010, 36(24): 81-83. https://doi.org/10.3969/j.issn.1000-3428.2010.24.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characteristic of Ad hoc On-demand Distance Vector(AODV) protocol which is relatively stable on the running time, a running time optimization method of AODV is proposed. The method exchanges the information between neighbor nodes and selects the optimal route to implement the routing optimization by the three link state values of route hop counts, battery power of nodes and RF signal strength. Simulation results prove that the improved routing protocol can increase packet delivery ratio and reduce average end-to-end delay.
  • CHEN Han-Xin, CUI Wei-Liang, JIANG Hua
    Computer Engineering. 2010, 36(24): 84-86. https://doi.org/10.3969/j.issn.1000-3428.2010.24.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of colored noise interruption and multi-spectral peak signals judgment in signal detection, this paper proposes a pre-processing algorithm for signal detection based on morphology, which treats the spectrum as one-dimensional gray-scale image. With regard to character of short wave channel and signal spectrum, it whitens colored noise by employing Top-Hat transform, and enhances signals by applying closing operation. Simulation experimental results show that colored noise can be suppressed, and weak signals and multi-spectral peak signals are reliably detected in complicated short wave channel environment.
  • HE Jian, BAI Guang-Wei
    Computer Engineering. 2010, 36(24): 87-89. https://doi.org/10.3969/j.issn.1000-3428.2010.24.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a Markov chain model for performance analysis and evaluation of S-MAC protocol. The model uses the moment generating function and signal flow graph to analyze MAC access delay of S-MAC protocol. M/G/1/K queuing model is applied for performance analysis of the protocol in non-saturation condition. Mathematical analysis and simulation experimental results demonstrate the model can describe the access way of S-MAC protocol well.
  • XU Xiao-Bo, WANG Yong, DAO Xiao-Ling
    Computer Engineering. 2010, 36(24): 90-92. https://doi.org/10.3969/j.issn.1000-3428.2010.24.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a Wireless Sensor Network(WSN) node positioning algorithm based on studying Received Signal Strength Indicator(RSSI) and Support Vector Classification(SVC). It considers node RSSI value as a multi-classification problem of characteristic quantity, converts RSSI into node position directly by SVC which has good generalization ability to realize symbolic positioning and physical positioning, and achieves a higher positioning accuracy. Experimental results show that the symbolic positioning effect of the algorithm is good, when the anchor node density is 20%, 98.19% of the nodes can get correct position.

  • YAN Bi-Cheng, LI Feng
    Computer Engineering. 2010, 36(24): 93-95. https://doi.org/10.3969/j.issn.1000-3428.2010.24.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on Serving GPRS Support Node(SGSN) and Gateway GPRS Support Node(GGSN), this paper implements a communication mechanism between mobile terminal and remote computer with analyzing the 4-layer construction of J2ME and the relationship between different virtual machines, configuration layers and profiles. It implements the communication mechanism with the functions such as receiving information, sending information and controlling at mobile terminal with J2ME, and initialization, sending and receiving data, command parsing and execution at remote terminal with VB 6.0. Experimental results indicate that the mechanism has good communication ability and it can satisfy the communication requirements of many kinds of remote control system.
  • LIU Bin, YANG Jian, DIAO Yu
    Computer Engineering. 2010, 36(24): 96-98. https://doi.org/10.3969/j.issn.1000-3428.2010.24.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Previous dynamic cluster configuration methods are based on the specific physical experimental models without the description of mathematical models. Aiming at the problem, this paper proposes a prediction-based dynamic clusters configuration strategy, which uses least mean square to predict the situation of service requests in the future time according to the network historical information of service requests. On the basis of the load requests and the clusters processing power, it decides the servers’ scale and dynamically adjusts the opening and shutdown of the computers in the server cluster. Experimental result verifies the feasibility and superiority of the schedule strategy.

  • LUO Dong-Mei, HE Shi-Biao, GU Cheng
    Computer Engineering. 2010, 36(24): 99-101. https://doi.org/10.3969/j.issn.1000-3428.2010.24.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Chaotic sequence with its good correlation performance being sensitive to initial condition and hard to decrypt is used as spread-spectrum code in Direct Sequence Code Division Multiple Access(DS/CDMA) system. In order to improve the security of DS/CDMA system and decrease the multiple access interference, the traditional optimized selection algorithm of chaotic sequence is improved. By studying the chaotic cross-correlation optimization, a new cross-correlation optimized selection algorithm of chaotic spread-spectrum sequence is proposed, and the performance of the optimized sequence is simulated and compared. Experimental results show that the algorithm has better correlation performance, larger capacity and lower multiple access interference.
  • HU Chao-Fang, ZONG Qun, SUN Lian-Kun
    Computer Engineering. 2010, 36(24): 102-103. https://doi.org/10.3969/j.issn.1000-3428.2010.24.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The controller design for networked controller with bandwidth constraints is studied in this paper. The scheduling strategy based on stochastic communication logic is presented using Poisson process with time-dependent intensity. Then the limit updates are obtained. According to its Markov jump linear characteristic, the controller is co-designed based on update time. Simulation results show that the times of state update are reduced, the influence of bandwidth on control performance is decreased, and the dynamic performance of the system is improved by means of introducing stochastic communication logic.

  • WANG Cui-Bai, DUAN Tian-Dong, GUO Gong
    Computer Engineering. 2010, 36(24): 104-106. https://doi.org/10.3969/j.issn.1000-3428.2010.24.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The route of HF networks is influenced by many factors, and it is very difficult to select the best path. Aiming at these problems, a dynamic source route protocol appropriate for HF networks is designed based on Analytic Hierarchy Process(AHP). The influence of the link quality, path length, node load and survival time on the HF route path selection is analyzed. A mathematical model of AHP is constructed which makes the comparative matrices and calculates the weight vector based on the factors of path selection. HF route protocol is designed and an example is concluded to analyze the route discovery and update.
  • JIANG Ming-Xun, CUI Wei
    Computer Engineering. 2010, 36(24): 107-109. https://doi.org/10.3969/j.issn.1000-3428.2010.24.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Network coding is inherent vulnerable to the data pollution attacks. To address this problem, it discusses two random linear network coding pollution data detection schemes, one is based on homomorphic hash function which deduces the general formation and proves its correctness. The other is linear space signature. It comparatively analyzes their computational cost and payload efficiency under different data block size conditions, and proposes a new combinatory detection scheme for this problem.

  • WANG Yong-Feng, ZHANG Jian-Zhong
    Computer Engineering. 2010, 36(24): 110-112. https://doi.org/10.3969/j.issn.1000-3428.2010.24.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes a group signature scheme that it has the property of member deletion, points out that signature open algorithm and validated algorithm are all invalid, and it has redundant data because of signature parameter setting incorrectly. It improves group signature scheme on the basis of it. By attaching the signature public key to signature parameters, it resolves the problem of the identity revelation algorithm invalidity. By modifying group centre to trusted centre and removing the group manager entity, it resolves the problem of the group centre excessive power to improve the overall effectiveness of improved scheme.
  • LIU Chi, ZHENG Xiao-Lin, XU Ai-Wu, CHEN De-Ren
    Computer Engineering. 2010, 36(24): 113-115. https://doi.org/10.3969/j.issn.1000-3428.2010.24.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The probability theory and social network theory are applied to trust delivering and multiple trust route modeling. Aiming at the actual business network characteristics of C2C transaction platform, this paper presents a C2C trust evaluation model based on social network and reputation. It introduces similarity computation to establish cluster and cluster relationship to solve the common problems in C2C transaction network such as division of labor, sparse and clustering. Analysis results of TAOBAO transaction platform data show that this model has a very good improvement and complement to the existing reputation system of TAOBAO, and it simulates the interpersonal relationships of trust and recommendation in real life.
  • DUO Xin, CA Guo-Yong, SHI Lei, LUO Bai-Fa
    Computer Engineering. 2010, 36(24): 116-118. https://doi.org/10.3969/j.issn.1000-3428.2010.24.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Traditional research on trust model is based on environment with history cooperative information, it can hardly meet the needs of dynamic evolution of the cooperative environment. Aiming at situations which are without direct history information, indirect trust model based on the third-party organization is analyzed by referring to the third-party management method in modern E-commerce, and a DRI(Direct, Recommending and Indirect) trust model is proposed by combining with Bayesian trust model. Experimental result by comparing with traditional trust model shows that the cooperation based on DRI trust model can effectively improve the reliability of cooperative object selection, and improve the average successful rates of cooperation.
  • FU Geng-Li, CAO Bao-Xiang, JIA Xiao-Na
    Computer Engineering. 2010, 36(24): 119-121. https://doi.org/10.3969/j.issn.1000-3428.2010.24.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In view of drawbacks of current permission systems and role authorization, this paper designs IPC_URBAC model, adds user direct authorization mechanism based on user inheritance constraint and user role assignment mechanism based on priority constraint, puts forward authorization conflict resolution strategy based on individual and priority, and gives algorithms for solving the set of privileges belonged to a user and a role. It uses IPC_URBAC model, designs binary authorization mask to resolve setting problem of complex permission, and separates permission controls from concrete business by using Web service to complete the fine-grained permissions check, realizes a flexible authorization system having nothing to do with business.
  • HU Ru, ZHOU Qiang, LI Li, WANG Yu-Wen
    Computer Engineering. 2010, 36(24): 122-124. https://doi.org/10.3969/j.issn.1000-3428.2010.24.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Aiming at the coding characteristic of GIF image, this paper presents an image selection encryption algorithm under degradation and confidentiality modes. Intra-set shuffle index method is used to control image degradation visibility for degradation model. It encrypts only fractal of the image, the whole image is protected for confidentiality model. Analysis results show that this algorithm can meet the requirements of security, format-compliance, and it also can constant compression-ratio.

  • ZHANG Tian-Xiang, BO Feng, LI Xiu-An, WANG Shi-Feng
    Computer Engineering. 2010, 36(24): 125-126. https://doi.org/10.3969/j.issn.1000-3428.2010.24.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    According to the changes of the historgrams of the first digital distribution and the individual DCT coefficients caused by the steganography algorithm, such as Outguess, F5, Steghide, this paper proposes a new detection algorithm for the JPEG Image. It extracts 144 features by using the first digital distribution and the histograms of individual DCT coefficients, and uses Fisher classifier for recognition. Experimental results show that the algorithm has high detection rate and chronic adaptability.

  • CHU Shan-Shan, MA Chun-Bei, AO Fa-Liang
    Computer Engineering. 2010, 36(24): 127-129. https://doi.org/10.3969/j.issn.1000-3428.2010.24.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In Ad hoc networks, group key management is one of the most important secure problems. This paper proposes a hierarchical group key management scheme adapted to large groups according to network characteristics. The scheme puts STR hierarchical tree structure into distributed subgroup management model effectively, and combines layer-based key management with cycle-based key management, in order to reduce the communication and computation cost greatly. Experimental result shows that this scheme is of good attribute in expansibility and lange Ad hoc networks.

  • XIAO Zi-Bi, YANG Bei, LI Shou-Gui
    Computer Engineering. 2010, 36(24): 130-131. https://doi.org/10.3969/j.issn.1000-3428.2010.24.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper analyzes a certificateless verifiably encrypted signature scheme which is proposed by Zhou Min et al and points out that their scheme can’t resist the public key replacement attack, it does not satisfy two basic security properties of verifiably encrypted signature: unforgeab- ility and extractability. Moreover, their scheme has key escrow issue, so it has not the advantages of certificateless public key cryptosystem.

  • BANG Li-Hui, ZHANG Jian-Zhong
    Computer Engineering. 2010, 36(24): 132-133. https://doi.org/10.3969/j.issn.1000-3428.2010.24.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In the proxy signature schemes from pairings, the pairing operations are the most time-consuming. In order to reduce times of the pairing operations, this paper proposes a new proxy signature from bilinear pairings. The security of the scheme depends on the hardness assumption of discrete logarithm problem and the computation Diffie-Hellman problem. Its security is analyzed and the result shows that this scheme is secure and effective, it can effectively resist the strong forgery attacks and satisfy the security properties of strong proxy signature. Compared with other schemes, the new scheme has better computational efficiency.

  • HE Meng-Ke, HAO Zhi-Yong
    Computer Engineering. 2010, 36(24): 134-135. https://doi.org/10.3969/j.issn.1000-3428.2010.24.048
    Abstract ( )   Knowledge map   Save

    A trust model based on social rules and the topology characteristic of unstructured P2P network is proposed in this paper. A distributed storage mechanism of evaluation information is designed. The calculating, updating and searching methods of reputation information are given. The computation complexity and communication cost of this algorithm are low. Experimental results show that the proposed trust mechanism can resist the attack of malicious peers effectively.

  • HE Li, LEI Bing-Yuan
    Computer Engineering. 2010, 36(24): 136-138. https://doi.org/10.3969/j.issn.1000-3428.2010.24.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For fuzzy-uncertainty with class overlap and rough-uncertainty with lack of features, this paper proposes a fuzzy-rough nearest neighbor clustering classification algorithm based on Expectation-Maximization(EM), named EM-FRNN. Through the experments with UCI emergency water pollution cases database, compared with the classic algorithms, such as KNN, FKNN, FRNN, EM-FRNN algorithm improves classification precise and reduces computation.
  • XU Shu-Chun, HE Hun-Feng, WEI Yan-Hui
    Computer Engineering. 2010, 36(24): 139-141. https://doi.org/10.3969/j.issn.1000-3428.2010.24.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A partition reconstruction method for disparity image based on homogeneous RBF network is presented. Disparity image is divided into some regions by reconcilable threshold and edge detection. Reconstruction based on RBF neural network is carried out in every region. All regions are combined and reconstruction result comes into being. When reconstruction based on RBF is executed in different region, data which have different resolving power are used in training according to structure of different region. Experimental results show that good reconstruction can be attained by the using method proposed.

  • GUO Wen-Hua
    Computer Engineering. 2010, 36(24): 142-144. https://doi.org/10.3969/j.issn.1000-3428.2010.24.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For the target-tracking using active sensor and passive sensor with asynchronous sampling frequency, a new decoupled algorithm is proposed. On the sampling time without distance measurement, the tracking filter is processed by making up virtual measurement point. Because all the angle measurement information is effectively utilized by the algorithm, the performance of tracking filter is elevated. Simulation results show that the algorithm has high tracking precision and its computational cost is smaller.
  • LIN Chun-Li, WANG Ke-Dun, WANG Ke-Cheng, JIA Tu- , CHENG Mo-Qing
    Computer Engineering. 2010, 36(24): 145-146. https://doi.org/10.3969/j.issn.1000-3428.2010.24.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    To efficiently resolve action classification problem, a classification algorithm based on Action Energy Image(AEI) is proposed. The high dimensional feature space is reduced to lower dimensional space with (2D)2PCA. The nearest-neighbor classifier is adopted to distinguish different actions. It need not extract the period of the video, which is indispensable in some other methods. Experimental results show that the algorithm achieves higher classification accuracy with less running time and less memory space.

  • CHEN Xi, LI Miao, YUAN Yuan, GAO Hui-Yi, ZHENG Gao-Wei
    Computer Engineering. 2010, 36(24): 147-149. https://doi.org/10.3969/j.issn.1000-3428.2010.24.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes an advanced co-evolutionary model fitting algorithm. It optimizes the process in the course of solving the symbolic regression, especially to the shortcomings of traditional Genetic Algorithm(GA). It abstracts the modeling and optimization into a variety of inter-group co-evolution, associating these populations through exchange of fitness value, while extending the intelligent algorithm both in spatial and temporal scope when optimizing the parameters modeling. For the various groups with different gene expression, they have their nature self-contained in solving certain problems. It is more conducive to take advantages of the intelligent algorithms(GA, Genetic Programming(GP)). Compared with the traditional algorithm, the co-evolutionary model fitting algorithm shows a significant improvement in stability and convergence rate.

  • CHENG Zhao-Gan, WANG Hong-Guo, SHAO Ceng-Zhen, YANG Yi
    Computer Engineering. 2010, 36(24): 150-152. https://doi.org/10.3969/j.issn.1000-3428.2010.24.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    For the dynamic environment problem, this paper presents a self-learning function of the Symmetry Particle Swarm Optimization(SymPSO). The algorithm proposes to detect changes of the environment by using a static virtual particle swarm, and based on the thought of symmetric particles, without increasing the computational complexity, generates multiple symmetric virtual population. It can significantly expand the ability of population. To ensure the algorithm to escape from local optimum as quickly as possible, this paper proposes wide-area learning strategies to enhance self-learning ability of particles. Simulation comparative tests based on DF1 environment show that SymPSO algorithm can track the optimal value changes and escape from local optimum quickly, indicating the effectiveness of the algorithm.

  • LIU Jian-Wei, LI Shuang-Cheng, LUO Xiong-Lin
    Computer Engineering. 2010, 36(24): 153-155. https://doi.org/10.3969/j.issn.1000-3428.2010.24.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of clustering algorithm long time in processing high-dimensional mass data, a sampling-based multi-modal distribution clustering optimization algorithm is proposed, which greatly reduces the clustering time. In iterative correction procession, the algorithm randomly extracts small samples from whole datasets. The optimal configuration parameter of algorithm is found by a large number of experiments. Experimental result shows that the optimization algorithm fulfills 88% of the clustering accuracy with 11.8% of the clustering time, and provides the optimal clustering scheme for the application environment of high time cost.
  • XIE Jing
    Computer Engineering. 2010, 36(24): 156-157. https://doi.org/10.3969/j.issn.1000-3428.2010.24.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the contradictory between convergence speed and precocity and stagnation in ant colony algorithm, this paper references the ability of the self-regulation mechanism to maintain the population diversity on immune algorithm. The immune-ant colony algorithm is presented. According to micro-diversity, macro-diversity and the concentration of arc, this algroithm dynamically adjusts the selection probabilities of the paths and the trail information updating. Simulation experimental results on symmetric and asymmetric TSP show that the presented algorithm has much better intensification and diversification than that of classical ant colony algorithm and is more suitable for solving large scale TSP.
  • GAO Wei-Song, JIAN Hui, CHEN Feng
    Computer Engineering. 2010, 36(24): 158-160. https://doi.org/10.3969/j.issn.1000-3428.2010.24.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to give more help to athletes’ exercise, a human motion simulation system based on binocular stereo vision is established. Using a mark-less motion capture algorithm, the pixel coordinates of human skeletons in the image are captured. According to binocular stereo vision theory, the world coordinates of human skeletons are computed and the 3-D human model is constructed. The human model is optimized by computing the energy function. The human motion is simulated and the parameters of human motion are figured out. Experimental results demonstrate that the simulation system can do well in motion capture and simulation of human motion.

  • DONG Yuan-Fang, LI Xiong-Fei, LI Jun
    Computer Engineering. 2010, 36(24): 161-163. https://doi.org/10.3969/j.issn.1000-3428.2010.24.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    For problem of imbalanced data learning, a gradually learning classification algorithm is proposed. This classification algorithm gradually adds the synthetic minority class examples according to attribute value-range distribution, and removes timely the synthetic examples which the stage classifier misclassifies. As the data achieves the desired degree of balance, the method uses raw data and synthetic data training learning algorithm, and gets the final classifier. Experimental results show that the gradually learning algorithm is better than C4.5, and better than SMOTEBoost and DataBoost-IM on most data sets.

  • XU Qun-Ling
    Computer Engineering. 2010, 36(24): 164-166. https://doi.org/10.3969/j.issn.1000-3428.2010.24.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the schedule optimization problem of city bus drivers, this paper proposes a solution of schedule by using immune optimization. The mathematical model of schedule problem of bus drivers is expounded, a frame of immune optimization algorithm is given, proportional cloning operator and neighborhood mutation operator with real-number encoding are designed, and simulation experiments are done to validate algorithm. Experimental result shows that optimization algorithm given in this paper can solve the schedule problem of bus drivers, and has the advantage of good application value.
  • HAN Jun-Ling, LI Feng-Gang
    Computer Engineering. 2010, 36(24): 167-168. https://doi.org/10.3969/j.issn.1000-3428.2010.24.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    It is an important task for knowledge-based systems to select and evaluate the attributes as well as a critical factor affecting systems’ performance. Using the genetic operator of the searching approach and correlation analysis, which characterizes Genetic Algorithm(GA), as the evaluation mechanism, this paper presents a new method to select the optimal subset of attributes for a given case library. Experimental results show that the proposed method can identify the most related subset to classify and predict, while reducing the representation space of the attributes whereas hardly decreasing the classification precision.

  • WANG Lian-Guo, SHI Qiu-Gong
    Computer Engineering. 2010, 36(24): 169-171. https://doi.org/10.3969/j.issn.1000-3428.2010.24.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of Artificial Fish Swarm Algorithm(AFSA), such as long running time or being in local extremum, caused by inappropriate parameters setting, this paper uses the improved Global edition Artificial Fish Swarm Algorithm(GAFSA), optimizes three benchmark functions to conduct simulation studies with different parameters matching, and analyzes the change law of the optimization performances and the convergence speed of the artificial fish swarm algorithm under the influence of the main parameters, and gives the appropriate ranges of parameter setting. Experimental results show that reasonable parameter settings make algorithm get better optimization performances and quickly convergence to the global better solution.
  • LI Jin-Long, YANG Hong-Wu, LIANG Jing-Jing, FEI Dong, LIU Hui-Juan
    Computer Engineering. 2010, 36(24): 172-174. https://doi.org/10.3969/j.issn.1000-3428.2010.24.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As the amateur singer’s timbre is not converted in the process of voice imitation from amateur singer to the professional singer, this paper presents a singing voice Morphing algorithm based on Gaussian Mixture Model(GMM). The spectrum parameters are extracted from the source and the target singing voices are modeled by GMM respectively, and the singing’s timbre is converted by mixing their model parameters. Experiments demonstrate that the accuracy of ABX test can be up to 100% in the case of k=0 or 1, and the accuracy still be higher than 62.5% in the case of 0
  • SUN Rong-Zong, MIAO Dui-Qian, WEI Zhi-Hua, LI Wen
    Computer Engineering. 2010, 36(24): 175-177. https://doi.org/10.3969/j.issn.1000-3428.2010.24.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The traditional K Nearest Neighbor(KNN) has a fatal defect that time of similarity computing is huge. For text classification task with high dimension and huge samples, it has extremely complexity. This is not practicable for real applications. In this paper, rough set theory is introduced into classification process. The distribution of training samples is described with the concepts of upper approximation and lower approximation and also the range of upper approximation space and lower approximation space of each class are computed in the training process. According to the position of the documents in the sample space, this algorithm can label some documents directly. It reduces the searching range of KNN of some documents in the classification process. The results of experiments show that this algorithm can save largely the classification time and has almost the same classification performance as that of the traditional KNN classification algorithm.

  • WANG Cheng, LI Chao-Fa, HE Kai
    Computer Engineering. 2010, 36(24): 178-179. https://doi.org/10.3969/j.issn.1000-3428.2010.24.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a hybrid method of simplified Pulse Coupled Neural Network(PCNN) and quick region identification for localizing car plate, and the algorithm can locate the car plate precisely and segment the characters simultaneously. The simplified PCNN is used to enhance the car plate image. Based on the car plate characters features of the region, texture and structure, the enhanced binary image is filtered to get the rough location of the car plate region, which is located precisely on the borders except the region of Chinese character. Afterwards, it expands the rough region to the left and fixes on the Chinese character region from the vertical projection of the expansion area, and the car plate region is located. Experimental results show that the precision can get 97.5%, which is higher than other localization methods on the same image database.
  • GAO Hong-Yuan, DIAO Ming
    Computer Engineering. 2010, 36(24): 180-182. https://doi.org/10.3969/j.issn.1000-3428.2010.24.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to obtain the optimal values of multiuser detection problem in the shortest time, a neural network fish swarm algorithm is proposed in MC-CDMA systems. Three kinds of neural network behaviors of artificial fish may solve the multiuser detection problem with low randomness and arbitrariness of search, and speed up the convergence speed of original fish swarm algorithm. Simulation results show that the algorithm can achieve the global optimal value in fast convergence rate, and it is superior to the multiuser detectors based on some intelligence algorithms in terms of the multiple access interference and the mitigation of near-far effect.
  • GUO Fei, WANG Cheng
    Computer Engineering. 2010, 36(24): 183-185. https://doi.org/10.3969/j.issn.1000-3428.2010.24.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a face recognition method based on Laplacian Matrix Projection(LMP) and Kernel Principal Components Analysis(KPCA). After the Laplacian matrix transformation being used on graphs of human faces, KPCA method is used for feature extraction. Nearest Neighbor(NN) is used to construct classifier and classificate graphs of face. Smoothness features of faces are obtained and the dimensions of the pictures are reduced effectively after the Laplacian matrix transformation. Numerical experimental results in ORL database show that this face recognition method has a faster operational efficiency than the simple KPCA method while there is little difference between the recognition rates.

  • HUANG Xian-Li
    Computer Engineering. 2010, 36(24): 186-188. https://doi.org/10.3969/j.issn.1000-3428.2010.24.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Cross domain text classification aims at leveraging the knowledge in labeled source domains to predict the unlabeled data in another domain, where the distribution is different from the source domains. This paper proposes a new algorithm for cross domain classification in a multi-view learning perspective, named MulTi-View(MTV) transfer classification. By incorporating discriminative information related to labels, a more discriminative common low dimensional space is extracted. In MTV perspective, MTV algorithm provides a clear and neat way to transfer knowledge between domains. By applying KCCA, MTV also gives a closed form solution. Experiments show that MTV algorithm can significantly improve the performance of traditional supervised learning methods on extensive sentiment text datasets.
  • LEI Zhen-Yu, JIANG Yu-Meng
    Computer Engineering. 2010, 36(24): 189-191. https://doi.org/10.3969/j.issn.1000-3428.2010.24.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to overcome the disadvantage of multi-population Genetic Algorithm(GA) that it has low efficiency and tends to premature in multimodal-function-optimization, this paper proposes a dual population GA based on autonomic computing. It has two distinct population including a main population and a help population. The help population transmits superior individual and adjusts migrate strategy dynamically to help the main population evolution by interior or exterior monitor. The improved fitness function makes migrant not be weeded out prematurely which can maintain the diversity. Experimental results show that the algorithm outperforms Single Genetic Algorithm(SGA) and Multi-population Genetic Algorithm with two Populations(2PMGA).
  • ZHOU Jing
    Computer Engineering. 2010, 36(24): 192-194. https://doi.org/10.3969/j.issn.1000-3428.2010.24.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve disorder among information items and lack of information item in the field of information extraction, this paper proposes a solution to deal with chunks labeling and Entity Relation Extraction(ERE) based on the conditional random fields model. This paper defines the representation of Chinese chunk and entity relation, and uses label dataset of “People’s Daily” as sample dataset to train an optimized model for the entity extraction. Experimental results show this method has better extraction performance.
  • WANG Jiang, LIANG De-Qun, BI Qing, ZHANG Chao
    Computer Engineering. 2010, 36(24): 195-196. https://doi.org/10.3969/j.issn.1000-3428.2010.24.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    To solve the problem of long encoding time, a fast fractal encoding algorithm based on structural information feature is proposed. The definition of structural information feature is given, and every block’s structural information feature is computed as the feature which is used for classification and nearest neighbor searching to arbitrary range block among the local domain pool. Then, the matching procedure takes place in the neighborhood of the searching result. Experiments show that in the case of the same encoding time, better decoded image quality can be achieved than similar algorithms.

  • FU Hui, HUANG Xin-Yuan
    Computer Engineering. 2010, 36(24): 197-199. https://doi.org/10.3969/j.issn.1000-3428.2010.24.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Specular reflection regions can cause erroneous results on segmentation and recognition. Leaf image commonly includes natural texture as background which can interfere in the location. This paper proposes a method for the identification of highlights in leaf image that utilizes Retinex algorithm and color matching. The specular reflection regions and diffused reflection regions are obtained based on reflection intensity image, hue and saturation. The specular reflection regions are detected using color matching. Experimental results show that the method is effective.

  • DIAO Liang, DIAO Chun-Xia, ZHANG Er-Hua
    Computer Engineering. 2010, 36(24): 200-202. https://doi.org/10.3969/j.issn.1000-3428.2010.24.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a new way to reconstruct countour surface from unorganized points, which uses the shortest path method on the cross-sections. This technique generates the vertexes contour lists on each planes, then reconstructs the fitting surface according to the similarity of countours’ topology, and smooths the fitting surface. The algorithm simulates the process of human beings to understand the 3D data, and the result of the method shows that the details of 3D shape are maintained well. And the algorithm can handle the connected data points on the cross-section, and keep robustness on noised data. The method works well in 3D seismic data visualization.

  • LIN Ying, YI Gui-Sheng, YANG Yun
    Computer Engineering. 2010, 36(24): 203-205. https://doi.org/10.3969/j.issn.1000-3428.2010.24.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    To effectively perform medical images segmentation in the case of intensity inhomogeneity, this paper presents a novel variational level set method. Statistical features of object neighborhood are integrated into a level set segmentation framework based on Bayes decision principle, in order to increase the ability to capture weak border of objects. In addition, a simple and efficient stochastic optimization scheme is designed to search an approximately global optimal solution using global information of the segmented object. The purpose is to alleviate the problem of local minimum caused by gradient descent solution used in level set method. Experiments and contrast analysis evidently demonstrate robustness, accuracy of the proposed model in the case of intensity inhomogeneity scenes.

  • LI Han, SONG Tie-Jie, WANG Ying, LI Meng-Meng
    Computer Engineering. 2010, 36(24): 206-207. https://doi.org/10.3969/j.issn.1000-3428.2010.24.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Images from the digital image sensor are corrupted by all kinds of noise interference, including additive, multiplicative and mixed noise. In particular, the extent of multiplicative noise changes with signal amplitude, there is no better removing method, and Total Least Squares (TLS) estimation is used on image de-noising in this paper. The size of the image patches impacting more greatly on estimation is studied. In addition, de-mosaic impacting on noise propagation in image pipelines is analyzed, and the overall advantages of de-noising using TLS method are comparatively given.

  • LIU Jia-Qing, SHU Can-Yan, HONG Yi-Ming, ZHONG Xin-Rong-
    Computer Engineering. 2010, 36(24): 208-210. https://doi.org/10.3969/j.issn.1000-3428.2010.24.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    By using Euclidean distance norm to describe position correlation of image pixels, a novel image scrambling effect evaluation method is proposed in this paper. It evaluates image scrambling effect of image encrypted by two scrambling algorithms such as Arnold transform and M-sequence transform. Experimental results show that the proposed method is effective to describe the relation of the image scrambling effect and the number of scrambling. It is in accordance with the subjective evaluation results.
  • ZHOU Wan-Hui, LIU Wen-Ping
    Computer Engineering. 2010, 36(24): 211-213. https://doi.org/10.3969/j.issn.1000-3428.2010.24.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The Fuzzy C-Means(FCM) algorithm is one of the most popular image segmentation methods, but the FCM is sensitive to noise. A new image segmentation algorithm is proposed aiming to improve the segmentation precision and robustness of the FCM algorithm by introducing the Type-2 fuzzy theory. A piecewise-linear stretching method is applied to the membership values for each pixel. These membership values are derived using the FCM algorithm. The result of stretching defines a new membership function, which is used for image segmentation. Experimental results show the algorithm has higher image segmentation accuracy and better noise immune ability.

  • ZHANG Xin-An, GONG Pan-Jun, CHEN Ai-Wu
    Computer Engineering. 2010, 36(24): 214-216. https://doi.org/10.3969/j.issn.1000-3428.2010.24.077
    Abstract ( )   Knowledge map   Save

    This paper proposes a kind of fast search algorithm which is apt for AVS-M based on predicted sub-pixel Motion Estimation(ME). The algorithm expels the less possibility points by doing matching error relation of sub-pixel points selected analysis, which assures the accuracy of sub-pixel search. Through effective search strategy, compared with the half-pel full search algorithm and Center Biased Fractional Pixel Search(CBFPS), experiments show that the proposed algorithm can respectively reduce the sub-pel search points by 68.50%~87.69% and 44.68%~67.38% on average PSNR lost less than 0.01 dB to the video sequences with different motion characteristics.

  • FAN Ming-Na, YANG Jian, DIAO Yu
    Computer Engineering. 2010, 36(24): 217-219. https://doi.org/10.3969/j.issn.1000-3428.2010.24.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    An Adaptive Media Playout(AMP) algorithm based on probability estimation is proposed to reduce the video playout jitter and playout halt caused by buffer underflow. It adjusts the duration of each frame according to the channel state and the estimated probability of underflow and overflow. It controls the playout rate range and the variation of the playout rate of the consecutive video frames to achieve the purpose of eliminating buffer outage and smoothing the video playout speed. Simulation results demonstrate that as compared to other AMP schemes, the proposed algorithm provides better performance.

  • LIANG Yong-Sheng, CHEN Xu, LIU Wei, ZHANG Ji-Hong
    Computer Engineering. 2010, 36(24): 220-222. https://doi.org/10.3969/j.issn.1000-3428.2010.24.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to make good use of network bandwidth and balance the relation between video quality and subscriber real-time access, a new progressive streaming transmission approach of Video Streaming Media(VSM) based on content-aware is proposed. On the basis of video content analysis and comprehension, frames importance according to coding key parameters and slice data importance are determined. Applying MGS coding, experimental study is performed on MobileIP test platform. Experimental results show that the approach to progressive streaming transmission of VSM is accurate and effective, and can adapt to network bandwidth and quality scalability of VSM. .

  • JIA Feng, SONG Xue-Hua, CHEN Jing-Zhu, CHEN Li-Lian
    Computer Engineering. 2010, 36(24): 223-225. https://doi.org/10.3969/j.issn.1000-3428.2010.24.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The reference soft rm52j for AVS1-P2 standard adopts RDCost algorithm to balance the coding quality and coding rate pretty well to achieve better efficiency, but it takes plenty of coding time because of high computational complexity. Aiming at this problem, a fast algorithm is proposed to reduce candidate prediction modes with increasing predication speed according to the directivity of luminance variation within a 8×8 block and the correlation of adjacent blocks. Experimental results show that the fast algorithm can save coding time by 17% on average with code rate increasing slightly and PSNR almost unchanged.
  • FENG Fei-Long, CHEN Yao-Wu
    Computer Engineering. 2010, 36(24): 226-227. https://doi.org/10.3969/j.issn.1000-3428.2010.24.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Based on multi-core architecture of H.264 real-time encoding, according to data dependency of encoding modules, a parallel algorithm based on neighboring macroblocks is proposed. It is integrated with slice level and macroblock row level parallel algorithms to achieve multi-grain parallel encoding algorithm. Experimental results show that the parallel algorithm effectively improves parallel speedup with negligible quality loss.

  • SUN Ye-Chao, HAN Min, YANG Yang, SUN Wei-Feng, YANG Meng-Jiang
    Computer Engineering. 2010, 36(24): 228-230. https://doi.org/10.3969/j.issn.1000-3428.2010.24.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem that the great amount of the radar signal data cause difficulties on the storage and transmission of signals, this paper proposes a radar signal compression algorithm based on adaptive re-sampling. The signal is divided into blocks, and a re-sampling rate is determined by the characteristics of the radar signal spectrum adaptively for each block. The radar signal can be compressed by re-sampling with the rate obtained, and be reconstructed successfully by zero-interpolation and low-pass filtering. Experimental results prove the effectiveness of the algorithm.
  • SHU Bao, YANG Shun-Hun
    Computer Engineering. 2010, 36(24): 231-232. https://doi.org/10.3969/j.issn.1000-3428.2010.24.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the lack of low time accuracy on Cristian algorithm and Berkeley algorithm, this paper presents a clock synchronization algorithm. It gets more accurate drift rate by calculating more accurate delay, and determines a more precise synchronization cycle and synchronization mode by using the redundant synchronization strategy. Experimental result shows that compared with Cristian algorithm, the algorithm proposed has higher time accuracy.
  • LING Heng, TUN Xiao, WANG Yu-Yang, DONG Yun-Wei
    Computer Engineering. 2010, 36(24): 233-235. https://doi.org/10.3969/j.issn.1000-3428.2010.24.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the simulation system based on xPC Target for embedded software, this paper researches the disadvantage of some key techniques and implementation methods of real-time monitoring system in simulation system, an optimized scheme is proposed, which can solve the problems of simulation result data missing and data repeat well. These problems can lead simulation result distortions. The modular and hierarchical design policy is used in the monitoring system, and the main technique of implementation is multithreading. Experimental result of applying the monitoring system to the smart home simulation shows that the system can ensure the data integrity very well, which provides accurate simulation results for professionals.
  • CHEN Xi-Wan, SONG Xian-Chen, LV Hai-Yan
    Computer Engineering. 2010, 36(24): 236-238. https://doi.org/10.3969/j.issn.1000-3428.2010.24.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Windows XP does not work real-time due to its schedule based on thread priority and task with the highest thread priority will be executed when introducing PC to Time Triggered CAN(TTCAN). In order to solve the problem, this paper introduces realization of TTCAN with PC combined with universal CAN controller SJA1000 being time-host by studying high-precision timer in PC and analysis of TTCAN principium. The design can ensure application of TTCAN whose time window is milliseconds.
  • QI E-Jun, JIANG Lin
    Computer Engineering. 2010, 36(24): 239-240. https://doi.org/10.3969/j.issn.1000-3428.2010.24.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In study of Network-on-Chip(NoC) traffic generation and reception model, IP core architecture is presented which supports multiple various traffic model. It offers microprocessor interface, through configuration register parameter to produce a specific flow of data packets, and by reading the register to get throughput, packet delay and error statistics network performance indicator data. Based on CMOS technology SMIC 0.13 μm, the chip is designed and implemented. The frequency is up to 300 MHz, and it can meet different topologies network on-chip traffic requirements.
  • HUANG Yin-Fei, HUANG Dun-Jie, WANG Bo, WU Jian-Feng, BAI Shuo
    Computer Engineering. 2010, 36(24): 241-243. https://doi.org/10.3969/j.issn.1000-3428.2010.24.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper describes transaction modeling and transactional recovery mechanism in next generation trading system of Shanghai Stock Exchange. A transaction model for stock trading is defined by a formal language. Various situation of recovery is analyzed based on this model. A transactional audit model is proposed to support failover and restart scenarios of processes and hosts. Several technologies in practice for performance enhancement are introduced, which extend the transaction model. It enriches the applications of transactional information system model and provides reference for architecture designers on enterprise systems with intensive transactions.
  • JU Xun-Guang, ZHANG San-You, JIANG Yang-Zi, SONG Nong-Cun, XU De-Lan
    Computer Engineering. 2010, 36(24): 244-246. https://doi.org/10.3969/j.issn.1000-3428.2010.24.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The detection of food safety supervision and inspection department with a random sample of non-scientific basis and a mathematical model is difficult to be obtained for classification of data mining. Aiming at this problem, the model of drinking pure water which mines the quality risk classification is constructed by applying Analytic Hierarchy Process(AHP) and the quality of risk classification is mined. At the same time, model for each risk category is found by application of Gene Expression Programming(GEP), the result demonstrates that GEP has the high classification ability for mining model. Data processing results show that the detection resources and funds can be saved for the food inspection department, scientific and quantitative decision-making model can be provided for risk management and control.

  • FANG Yong, LIU Chu-Fen, BI Ting-Wei
    Computer Engineering. 2010, 36(24): 247-249. https://doi.org/10.3969/j.issn.1000-3428.2010.24.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to help the enterprises accelerate the pace of development Management Information System(MIS) and reduce their develop- ment costs, this paper designs and implements the customization workflow MIS platform based on model-driven. It introduces a platform for various customization modules and the general architecture. It presents with the example how to use the platform to customize a simple procurement MIS. Application result shows that the enterprises can use this platform to develop and customize the MIS which meets the needs of their real business.
  • GUO Dan, LIU Ke-Qi, LIN Han-He
    Computer Engineering. 2010, 36(24): 250-251. https://doi.org/10.3969/j.issn.1000-3428.2010.24.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to improve the tolerant disaster ability of database service, this paper designs and implements a tolerant disaster system of Oracle database service migration based on Web management. It provides an efficient and accurate failure detection method, which can adapt to network dynamically. It makes the service migration by IP packets redirection in the NDIS driver layer of the user’s machine. Experimental results show that the whole process of failure detection and service migration is fast and transparent to the user, which ensures the service’s continuity.

  • WANG Hao, DUAN Ming, LI Xi-Hou, YANG Gong-Yu
    Computer Engineering. 2010, 36(24): 252-255. https://doi.org/10.3969/j.issn.1000-3428.2010.24.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    A deferred render is incompatible with current hardware-assisted antialiasing. This paper proposes a fast antialiasing algorithm for deferred shading. It does edge detection by using the information in buffers, such as position and normal. The final deferred shading image is sampled by the blur factor for all pixels which returns true by edge detection. Simulation shows that, the antialiasing algorithm can effectively diminish objects jagged edges.

  • WANG Jing-Zhong, LI Xiao-Ke
    Computer Engineering. 2010, 36(24): 256-257. https://doi.org/10.3969/j.issn.1000-3428.2010.24.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    The paper proposes a digital protection scheme based on Basic Input Output System(BIOS) to resolve the copy rights of the digital content with the right permissions and the easy crack to the tradition digital rights protection system. The proposed scheme based on BIOS which creates the connection between the computer hardware and the OS (Operating System) software is analyzed, and the management in security is illuminated. Test for the system is done, and the result shows that the scheme is effective.

  • WANG Zhong-Fei, WANG Biao
    Computer Engineering. 2010, 36(24): 258-260. https://doi.org/10.3969/j.issn.1000-3428.2010.24.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes PageRank algorithm, which is the key technology of search engine Google. Three issues and the existing improvements are pointed out. An improved PageRank algorithm combined with anchor texts similarity is proposed, and traditional PageRank algorithm and the improved algorithm are compared by Nutch. Experimental results show that the improved PageRank algorithm improves the precision of the search results, which help to reduce topic-drift phenomenon.
  • FAN Min, DAN Wei-Ren
    Computer Engineering. 2010, 36(24): 261-263. https://doi.org/10.3969/j.issn.1000-3428.2010.24.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    From knowledge discovering of information, this paper proposes a water eutrophication risk analysis modeling method based on Probabilistic Relational Model(PRM). This modeling method uses storage structure and content of multi-relational data to learn and mine, then builds a network topology model based on PRM. Example analysis results show that PRM model can easily explain and analyze the correlations among all effects, the modeling method can discover the talent risk of water eutrophication by analyzing the historic data, to some extent it can support decision-making for water environment management and water pollution control.

  • NIE Na, WANG Bing-Zheng, XU Li-Ping, LI Ji-Guang
    Computer Engineering. 2010, 36(24): 264-266. https://doi.org/10.3969/j.issn.1000-3428.2010.24.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    On the basis of traditional fault injection approach, this paper proposes a fault injection approach of weighted combination towards component by combining mutational test. Introducing the weighted factor for injection of component environment, it builds the integration test system towards COM component and the XML monitoring log files and creates reports. Experimental result shows that the approach can detect component fault from high-risk to low-risk level based on different software environments by component.

  • LI Chao
    Computer Engineering. 2010, 36(24): 267-268. https://doi.org/10.3969/j.issn.1000-3428.2010.24.096
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A weighted network model is constructed as the keywords for objects study, by theoretical analyzing and simulation results validating, the degree distribution and strength distribution of the network model obey paw-law distribution. At the same time, the network has big cluster coefficient and distinct community structure. To prove its efficiency, it makes statistics and analysis on keywords of research papers published in "Journal of Software" from January 2004 to October 2008, and comparison with the simulation model. The results show that the theoretical results of the analysis are consistent with the empirical data.
  • XUE Juan, LI Xu-Yong
    Computer Engineering. 2010, 36(24): 269-271. https://doi.org/10.3969/j.issn.1000-3428.2010.24.097
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper proposes a development method of OpenGL graphic interface based on VxWorks graphic solutions of OpenGL and the principle of displaying Chinese character is studied to realize the Chinese graphic interface based on VxWorks. The dot matrix that describes the Chinese character is picked out to create raster font, and the vector font is created by using the solution of FreeType. Through drawing the font on the graphic based on OpenGL, the Chinese graphic interface is realized. Application result shows the feasibility and availability of this method.

  • WANG Jie, YU Li-Juan, ZHANG Hui, HUANG Hua-Yong
    Computer Engineering. 2010, 36(24): 272-274. https://doi.org/10.3969/j.issn.1000-3428.2010.24.098
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    This paper improves C4.5 decision tree algorithm based on mean value and information gain, builds the match decision tree model of foreign home and abroad men, and applies it to diagnosis, evaluation and decision support in table tennis match. Experimental results show that the accuracy of building tree algorithm is high, the diagnosis results conform to reality fairly, the algorithm can make a distinction between two players technique and tactic assessment reasonably. Compared with the expert experiences, the rules that the decision tree produced is simple and concise, and it can support more accuracy match decision support.

  • YANG Yue-Xiang, SU Guo-Rong, DENG Jin-Sheng
    Computer Engineering. 2010, 36(24): 275-277. https://doi.org/10.3969/j.issn.1000-3428.2010.24.099
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to improve the precision ratio of campus network search engine, this paper proposes a new campus network search engine ranking method. This method calculates the new page relevance score based on users’ behavior features such as user queries, user browsing time, page hits, and improves the search engine ranking results, which provides users with more accurate inquiry services. Experimental results show that the precision rate of ranking method is markedly improved.

  • SHAO Zhen, CA Gong-Xing, XU Chun-Feng
    Computer Engineering. 2010, 36(24): 278-280. https://doi.org/10.3969/j.issn.1000-3428.2010.24.100
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Using Graphics Processing Units(GPU) as main computational core, the Finite Difference Time Domain(FDTD) is presented for solving electromagnetic Maxwell’s equations. The FDTD simulation algorithm is developed by analyzing the direct time-domain solution like FDTD Maxwell’s curl equations. It is analyzed and compared with GPU that how GPU can be used to greatly speed up FDTD simulations. So enormous computation problem in FDTD simulations is resolved. Using GPU processing power in FDTD calculations, it implements much longer pulse lengths and larger models, and completes expensive simulations computation in reasonable time. According to the comparing of actual computation results in CPUs and FDTD, It is proved that FDTD simulations based on GPU is accurate and efficient.

  • LI Jing-Wen, XU Zi-Jiang
    Computer Engineering. 2010, 36(24): 281-283. https://doi.org/10.3969/j.issn.1000-3428.2010.24.101
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper builds a curriculum time-table model according to the cube coloring idea. It makes reasonable use of teaching resources if teachers, courses and students are known. It introduces relating-lock principle. It translates time-table restrain condition into cube dots and boxes relation, enhances the convergence of time-table model to solve the time-table problem preferably. Analysis results show that this model can give the minimum of teaching resource consumption, and reach the purpose of reasonable using teaching resource.
  • CHEN Zhi-Hui, ZHOU Hua-Gong, WANG Ling-Li
    Computer Engineering. 2010, 36(24): 284-286. https://doi.org/10.3969/j.issn.1000-3428.2010.24.102
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    In order to fast get the optimal placement result in the global scope, this paper presents a placement algorithm based on quantum model. Combined with the traditional simulated annealing algorithm, it can make Field Programmable Gate Array(FPGA) placement significantly faster. Test results show that the placement operation speed of this algorithm improves average 2 or more times than the VPR placement algorithm on average, while improving the timing performance by 2%. With the increasing scale of FPGA devices and the circuits, the algorithm can effectively improve the FPGA software operating efficiency.

  • LIANG Hua, TANG Yuan-Sheng
    Computer Engineering. 2010, 36(24): 287-288. https://doi.org/10.3969/j.issn.1000-3428.2010.24.103
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Let R be a finite chain ring, the Gray map from Rn to is defined, and a property of the Gray map is given. Based on the property of Gray map, the Gray image of a cyclic code of arbitrary length over R is studied. It is proved that a code of length n over R is a cyclic code if and only if its Gray image is a quasi-cyclic code over Fp of index pe-1 and of length npe-1.

  • LI Wu-Ge, GUO Sai-Qiu, YIN Yan
    Computer Engineering. 2010, 36(24): 289-封三. https://doi.org/10.3969/j.issn.1000-3428.2010.24.104
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Existing named entity relation extraction algorithm does not consider the pattern difference of relation characteristic sequence. Aiming at this shortage, this paper proposes an improved entity relation extraction algorithm. It identifies all of the named entity in the corpus, extracts entity relation characteristic based on the shortest path dependence and the words closely related to the entities, and computes the similarity of the relation feature sequences based on kernel function. Experimental result shows that the improved algorithm has good recall and precision, and its harmonic mean is up to 78%.

  • LIU Wei, GUO Ying, MENG Da-Zhi
    Computer Engineering. 2010, 36(24): 291-292. https://doi.org/10.3969/j.issn.1000-3428.2010.24.105
    Abstract ( ) Download PDF ( )   Knowledge map   Save

    Existing DNA value computation model is based on the binary, and its universal is not strong. Aiming at this problem, this paper proposes a DNA parallel addition and multiplication model based on N band. Based on the Labean model, addition model reduces the time complexity of algorithm to O(1), and the space complexity to O(n) for DNA algorithm by improving the means of encoding. After solving the problem of a digit even adding, the multiplication model is turned into addition model to compute. Experimental results show that the model has the features of encoding simple, and has low time and space complexity.