Author Login Editor-in-Chief Peer Review Editor Work Office Work

05 February 2012, Volume 38 Issue 3
    

  • Select all
    |
    Networks and Communications
  • HUANG Ti-Feng, ZHONG Er-Shun
    Computer Engineering. 2012, 38(3): 1-3. https://doi.org/10.3969/j.issn.1000-3428.2012.03.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A multi-thread parallel Single-source Shortest Path(SSSP) algorithm is proposed in multi-cores platform. It employs buckets to sort and uses the similar parallel strategy of Δ-Stepping algorithm. It does edge relaxations of the same bucket in parallel by slave threads, and searches all buckets in sequence by master thread. Experimental results show that this algorithm performs 4 seconds in the USA road network, achieving a higher speedup compared with serial parallel algorithm using same code.
  • MA Xiao-Dong, LI Zhong-Sheng, QI Feng-Bin, WEI Gong-Mei
    Computer Engineering. 2012, 38(3): 4-6. https://doi.org/10.3969/j.issn.1000-3428.2012.03.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For the purpose of making the compiler more adaptive and dealing with complex architecture, a compiler framework is proposed which combines iterative compilation and instance-based learning. On one hand, the compiler can search the optimization space and save the best compiler options into the knowledge library; on the other hand, the compiler can learn from the library to get the best compiler options for the current program. The incremental algorithm can make full use of the accumulated data of the compilation. The algorithms are proposed which can keep the redundant instance out of the knowledge library and filter the noise from the library.
  • XU Bao-Shu, SHI Ze-Lin
    Computer Engineering. 2012, 38(3): 7-8,11. https://doi.org/10.3969/j.issn.1000-3428.2012.03.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a performance prediction method of photoelectric imaging detection system. It designes the detection system model including the sensor and processor. Likelihood ration test detector is designed under minimum error probability which is based on signal detection theory. Analytical expression of false probability is derived based on central limit theorem. Experimental results show that detection error rate drops with the quantitative digits improving, and calculation error rates and simulation error rates are basically the same.
  • JIANG Li-Jiang, JIANG Hong-Fu
    Computer Engineering. 2012, 38(3): 9-11. https://doi.org/10.3969/j.issn.1000-3428.2012.03.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In base vector randomly selection, the convergence speed of Differential Evolution(DE) algorithm is low. In order to solve this problem, a Modified DE(MDE) algorithm is proposed. Some good individuals are chosen to form the base vector group. Base vector is chosen from the base vector group when mutation is operated. Test functions are used to prove the new algorithm. Results show that the modified algorithm can reduce the selecting range of base vector and the iteration times for convergence.
  • LI Guang, WANG E-Dong, SU Xiao-Gong
    Computer Engineering. 2012, 38(3): 12-13,18. https://doi.org/10.3969/j.issn.1000-3428.2012.03.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the existed privacy-preserving classification mining methods based on data perturbation, the privacy data is not protected perfectly because the perturbed data and the original data have been related. The classification algorithm and the data perturbation algorithm have high coupling It is not easy to use these methods in practice. To solve these problems, it proposes a privacy-preserving classification mining algorithm based on probability theory. The perturbed data is independent from the original data and they have the same distribution. This proposed method overcomes the shortcomings of others. The perturbed data is no relation with the original data and the classification methods can be used on the perturbed data directly.
  • XU Song, SUN Xiu-Xia, DONG Wen-Han
    Computer Engineering. 2012, 38(3): 14-18. https://doi.org/10.3969/j.issn.1000-3428.2012.03.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A method of real-time simulation system is discussed based on synthesizing the benefits of the Simulink/Real-time Workshop(RTW) and the Real-time eXtension(RTX) for Windows. Rapid modeling and encapsulating is implemented by high-powered software and self-defining VC project respectively, which depends on building a Real-time Dynamic Linkable Library(RtDll) composed of model codes generated by RTW. A simulation engine is designed that can load/unload models dynamically and give attention to both decoupling and real-time intercommunication between the model and the engine, which settles for the requirements of transmission model’s input/output information in time and parameter-tuning online. Experiments indicate that the system improves the real-time performance of simulation and gets the identical results as running on Simulink.
  • SHU Sui-Jiang, LIU Bao-Xu, LIU , YU , JIANG Zheng-Wei
    Computer Engineering. 2012, 38(3): 19-21,30. https://doi.org/10.3969/j.issn.1000-3428.2012.03.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The calculation of risk probability in the attack graph lacks cycles nodes processing. In order to sovle this problem, this paper proposes a nodes risk probability algorithm in attack graph with cycles. It gives examples of the attack graph with cycles, and introduces the risk probability calculating method with cycles or no cycles. It gives the not retrospective hypothesis to make sure the cycle path, and breaks the cycles through removing the export edge of the nodes in the cycles, and unreachable nodes. Experimental results show that this algorithm can obtain accurate calculation results, and its time complexity is low.
  • CUI Jie, ZHONG Gong
    Computer Engineering. 2012, 38(3): 22-24,33. https://doi.org/10.3969/j.issn.1000-3428.2012.03.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a decimal system encryption algorithm based on Feistel network. Aiming at the characteristics of decimal system operations, four operations are defined in encryption algorithm, two operations are defined in key expansion algorithm and decryption algorithm, and the new decimal system substitution table is designed. The new encryption algorithm is applied to the short-block encryption simulation system, simulation results show that the proposed algorithm has excellent cryptographic properties, all diffusion rate targets reach desired impact, and the diffusion rate of key to ciphertext after 6-round encryption reaches full diffusion. The encryption algorithm can be applied to all areas of decimal system encryption.
  • FANG Yuan, DU Chu-Beng, ZHOU Gong-Ye
    Computer Engineering. 2012, 38(3): 25-27. https://doi.org/10.3969/j.issn.1000-3428.2012.03.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of the research of previous object storage metadata management strategies, this paper puts forward a new kind of metadata management strategy. The method is to divide namespace directory into neutron trees, and compute with hash function using the combination of the root directory name and file name. Metadata Server(MDS) determines its storage path according to the hash value. Experimental result shows that this new kind of metadata management tactics can avoid the massive metadata migration problems and network overhead problems in dealing with metadata rename operation and modify filename.
  • LIU Jia-Xin, YAN Shu-Ting, LIN Jia-Dong
    Computer Engineering. 2012, 38(3): 28-30. https://doi.org/10.3969/j.issn.1000-3428.2012.03.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an incremental sequential patterns updating algorithm based on frequent sequence tree, called IUFST, in order to solve the problem that when the database is updated, the existed incremental mining algorithms of sequential patterns only mention two kinds of database updates, insert and append rather than the delete operation. When the database is updated and the support is changed, IUFST is divided into four kinds of situations to update the frequent sequence tree. It reduces the size of the projected database and improves the efficiency. Experimental results show that IUFST outperforms PrefixSpan and IncSpan in time cost.
  • QIN Li-Jun, LUO Xiong-Fei
    Computer Engineering. 2012, 38(3): 31-33. https://doi.org/10.3969/j.issn.1000-3428.2012.03.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The existing weighted frequent itemset mining algorithms which are based on Apriori require multiple dataset scans. This paper proposes a weighted frequent itemset algorithm weighted frequent itemset mining based on dynamic itemset counting which uses the structure of weighted trie tree and the method of dynamic itemset counting. This algorithm satisfies the downward closure property and dynamically generates candidate frequent itemsets, thereby reduces the number of scanning datasets and improves the performance. Experimental results show that the proposed algorithm not only generates the weighted frequent itemsets, but also has high efficiency and time performance.
  • YANG Zhi-Wei, YANG Ke-Wei, MAO Jie, TAN Ti-Jin
    Computer Engineering. 2012, 38(3): 34-36. https://doi.org/10.3969/j.issn.1000-3428.2012.03.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a capability knowledge management in equipment system based on XML. It holds the knowledge obtained in the structured XML document, and manages the knowledge of mission and capability requirement using Native-XML to realize knowledge extraction and management. Experinmental results show this system can improve the whole efficiency of equipment system by using large mount of experience before.
  • BO Xin, DAN Chuan
    Computer Engineering. 2012, 38(3): 37-38,42. https://doi.org/10.3969/j.issn.1000-3428.2012.03.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the recursion problems involving several functions, this paper proposes a systematic recursion-removal method. It cuts the calls among different functions through artificial stack and replaces the recursions inside each function with iteration. It also researches on the relation between recursion-removal depth and the programs’ time efficiency. Experiments prove that it can successfully remove the recursion of dominating tree and double the time efficiency before recursion-removal.
  • JIE Lang, YANG Xie
    Computer Engineering. 2012, 38(3): 39-42. https://doi.org/10.3969/j.issn.1000-3428.2012.03.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a method to assess the uncertainty of using COCOMO81 model. It uses the variance of model’s output to assess the uncertainty of model’s output. And uses both the data’s variance and the model’s output to assess the uncertainty of the distance between estimated effort and its real value. Based on the uncertainty, it proposes the prediction interval. It proposes the Mean Relative Variance (MRV) and shooting ration as the measurement to assess the uncertainty. In the experiment, re-Sampling method is employed to get N pairs of train set and test set. The average value of SR and MRV for different confidence level is calculated. After that, the scatter plot of SR and MRV is used to compare the different intervals that generated by different methods of assessing uncertainty. Experimental result shows that the measurement for uncertainty can generate narrower interval at the context of the same shooting ratio.
  • ZHANG Dun-Feng, FENG Qiao-Juan, ZHANG Xiao-Li
    Computer Engineering. 2012, 38(3): 43-45,48. https://doi.org/10.3969/j.issn.1000-3428.2012.03.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Now the statistical analysis for the massive logs not only is time-consuming, but also requires higher hard configuration. For these questions, a method based on the file software strategy and SMCS algorithm is proposed in this paper. By the software strategy, the log file indexing and the association between the log file and log time are adopted in this method, so as to quicken the log extraction. In order to analyze the massive logs statistically and control the memory loss, hash tables, file merging and heap operation are used in the SMCS algorithm. By experiment of the real software, results indicate that the proposed method is faster than that of traditional statistical analysis by four times.
  • GU Hui, LIU Lian-Qi
    Computer Engineering. 2012, 38(3): 46-48. https://doi.org/10.3969/j.issn.1000-3428.2012.03.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    It is difficult to be understood that some complicated declarations in C language. In order to solve this problem, an algorithm of program comprehension which auto charts and describes the declaration of C language is proposed. The concept of chart and description are proposed in this algorithm. They are the key of the algorithm and also used in other researches of program understanding. Experimental results show that the chart and description of C declaration can be understood.
  • CHEN Dong-Lin, LV Qiu-Yun, MA Meng-Meng
    Computer Engineering. 2012, 38(3): 49-50,53. https://doi.org/10.3969/j.issn.1000-3428.2012.03.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper studies the Quality of Service(QoS) evaluation criteria of Web service and the computing model for composite service, meanwhile establishes the evaluation system of customer perspective-oriented quality offline, including reasonable degree of cost, conformity of service and satisfaction of service. It proposes the model of customer perspective-oriented Web service integration and optimization with the constraint condition of service cost. Analysis result shows that, compared with the model of QoS-based composite service selection, this model considers the attributes of service quality, in essence, quality of service(goods) offline which are cared by end users.
  • YANG Chun-Hui, XIONG Jing, LI Dong
    Computer Engineering. 2012, 38(3): 51-53. https://doi.org/10.3969/j.issn.1000-3428.2012.03.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a software reliability model to resolve the software reliability growth problem in the distributed development environment. It does experiment on practical software reliability data set to demonstrate the model through the use of adaptive measures and AIC criterion. Experiments show that this model can capture a large number of reliability growth curves, has strong flexibility and adaptability, and a distributed development environment described by this model can be more realistic.
  • SHU Jin-Song, GAO Jian-Hua
    Computer Engineering. 2012, 38(3): 54-56,66. https://doi.org/10.3969/j.issn.1000-3428.2012.03.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For the limitations of unit and system tests, this paper presents a Capture/Replay(C/R)-based differential unit tests. Differential unit tests capture variables that may influence the behavior of target unit during the system tests and executes the unit tests through these input variables so that they can detect faults by comparing the output variables between multiple versions. Simulation results show that C/R-based differential unit tests can get lower test costs and higher coverage rate of faults detection.
  • HAO Xiao-Gong, LI Song, ZHANG Li-Beng
    Computer Engineering. 2012, 38(3): 57-59. https://doi.org/10.3969/j.issn.1000-3428.2012.03.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To remedy the deficiency of the existing methods about the 3D direction relations, a new relation representation model called 3DR44-4d model is presented. The space is divided 158 orientation-space and the 2128 spatial orientation relations can be represented and disqueced. in the 3DR44-4d model. The dynamic adjacent relations of the 3DR44-4d are studied. The massive complex dynamic orientation relations can be checked. Application results show that the model can enhance the ability to represent the 3D orientation relation of the spatial database.
  • YUAN Zheng-Wu, YANG Jing-Hong, MU Wei
    Computer Engineering. 2012, 38(3): 60-62. https://doi.org/10.3969/j.issn.1000-3428.2012.03.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to get accurate predictions in the complex environment, for the image method is usually only used in simple communication environment, a new ray tracking method is obtained by analyzing the characteristics of test ray and image ray method. Test ray method is effectively and succinctly used to find out a rough path from the source to the scene point. The path is corrected by image ray method. This method has high accuracy and can be used in complex environments.
  • CHENG Pei, WENG Yan-Ban, WANG Guo-Jun
    Computer Engineering. 2012, 38(3): 63-66. https://doi.org/10.3969/j.issn.1000-3428.2012.03.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to satisfy the requirement of data freshness in Wireless Sensor Network(WSN), by combining network data transportation and mobile element transportation, this paper proposes an efficient carrying routing algorithm. It calculates the optimal node positions for mobile elements to transmit data, and plans the paths of mobile elements, so that the energy consumption of sensor nodes is reduced and the network performance is improved. Simulation results show that the proposed algorithm can reduce network energy consumption under the premise of guaranteeing data freshness.
  • WANG Lin, SHANG Chao
    Computer Engineering. 2012, 38(3): 67-70. https://doi.org/10.3969/j.issn.1000-3428.2012.03.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The link prediction problem in scale free networks is studied. Based on the man-made and real social network, the general processes of static and dynamic prediction are given respectively. The accuracy of several similarity methods is verified, and therefore, the method of using similarity to predict links is proved to be feasible. The pridiction algorithms are recommendied according to the effectiveness of pridiction results.
  • ZHANG Yong-Mei, YANG Chong, MA Li, WANG Kai-Feng
    Computer Engineering. 2012, 38(3): 71-73. https://doi.org/10.3969/j.issn.1000-3428.2012.03.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a design of low power consumption Wireless Sensor Network(WSN) node. It uses low power consumption energy-saving chip CC2530, and the self-organizing of WSN and the automatic collection of monitoring data are realized based on ZigBee technique. It gives the whole block diagram, the hardware design module and software design process. Taking the temperature acquisition system as an example, the experimental results prove the nodes designed by this method have low power consumption and high accuracy.
  • GONG Wen-Tian, FAN Lei, SHI Xiao-Qiu
    Computer Engineering. 2012, 38(3): 74-76,79. https://doi.org/10.3969/j.issn.1000-3428.2012.03.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve the lifetime of Wireless Sensor Network(WSN), this paper proposes a clustering algorithm for WSN based on minimum energy path. It evaluates the ratio of residual energy of a particular node to the average energy of the network, and uses the ratio to determine whether the node would become a cluster head. It uses the minimum energy paths between the cluster heads to achieve balanced energy consumption of the network. Simulation results show that the proposed algorithm can improve the network lifetime, energy consumption and data throughput.
  • YANG Yan-Mei, HONG Yu-Mei
    Computer Engineering. 2012, 38(3): 77-79. https://doi.org/10.3969/j.issn.1000-3428.2012.03.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To improve the stability of Networked Control System(NCS) of Mobile Ad Hoc Network(MANET), this paper proposes a MANET based on overlay technology. As different types of data require different Quality of Service(QoS) in NCS, like delay, loss rate, basing on service weight, a queue schedule mechanism for overlay-based MANET is proposed. Experimental results show that the mechanism is flexible and can guarantee different QoS requirements to a certain extent.
  • LI Chao-Liang, GENG Xiao-Fei, LIU Ti-Hua
    Computer Engineering. 2012, 38(3): 80-81,84. https://doi.org/10.3969/j.issn.1000-3428.2012.03.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the network coverage problem of random deployment node in Wireless Sensor Network(WSN), this paper proposes a square region based probability coverage model. According to the coverage expectation and the impact of network boundary, it gives the number of nodes that need to be deployed. Simulation experimental results show that the model can cover the region by using least nodes without the information of these nodes.
  • ZHANG Xiao-Chu, YANG Rui-Jun, TUN Wei-Hang, HU Shen-Meng, CHEN Bing
    Computer Engineering. 2012, 38(3): 82-84. https://doi.org/10.3969/j.issn.1000-3428.2012.03.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve the raw Internet data collection, Internet data redistribution, traffic identification and protocol analysis in complex network environment, by using virtual tunnel, multicast, traffic collection and protocol analysis technology, this paper designs and implements a cater to IP network data collection, redistribution and analysis system. Application results show that the system can identify more than 90% protocols of Internet, and can identify more than 2 000 types of protocols.
  • CHANG Tie-Yuan, WANG Tong, SHU Gui-Feng
    Computer Engineering. 2012, 38(3): 85-87,90. https://doi.org/10.3969/j.issn.1000-3428.2012.03.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the limitations of LEACH and PEGASIS, an improved cluster head chaining routing protocol is proposed. The core idea is all of sensor nodes in the network are divided by area, sink goes down through all the nodes within the region to establish a number of cluster head chaining. By calculating the packet loss rate, a final cluster-head-chain which is able to concatenate the whole network is reached. Simulation result shows that the improved routing protocol has good reliability and real-time of data transmission.
  • LIAO Meng-Hua, ZHANG Hua, XIE Jian-Quan
    Computer Engineering. 2012, 38(3): 88-90. https://doi.org/10.3969/j.issn.1000-3428.2012.03.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The energy of cluster-heads is consumed rapidly because all cluster-heads directly sent data to sink in LEACH protocol. Aiming at this problem, this paper proposes a Wireless Sensor Network(WSN) routing protocol based on Ant Colony Algorithm(ACA) with energy forecast. As the ant colony algorithm, cluster-head sent data to sink by multiple hops transmission, the new algorithm predicts energy consumption of nodes when it calculates probability of next-hop. Simulation results show that the new algorithm can avoid route over-concentration, reduce cluster-heads energy consumption, and prolong the network lifetime.
  • GUO Jia-Bei, ZHANG Jian-Wu
    Computer Engineering. 2012, 38(3): 91-92,96. https://doi.org/10.3969/j.issn.1000-3428.2012.03.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In cooperative frequency spectrum sensing, signal detection for single user will influence united detection performance a lot because of different environment. Aiming at the problem, according to the Signal-to-noise Ratio(SNR) of cognitive node, this paper proposes a new cooperative sensing method, which can dynamically adjust threshold. Simulation results illustrate that in the same false alarm probability, the method can significantly improve the united detection probability and reliability of frequency spectrum detection.
  • CHEN Jian-Bin, SHU Lei, DIAO Ying, CHEN Pan-De, GAO Li-Fei
    Computer Engineering. 2012, 38(3): 93-96. https://doi.org/10.3969/j.issn.1000-3428.2012.03.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to reduce the interference caused by Cognitive User(CU) to Primary User(PU) while guaranteeing the Quality of Service(QoS) demands for all services, this paper proposes a packet schedule algorithm based on interference control. It is suitable for the Cognitive Radio Network(CRN) with spectrum underlay sharing. The algorithm improves the Modify Largest Weighted Delay First with Interference Mitigation (MLWDF-IM) algorithm, defines the Interference Control Factor(ICF) and Service Urgency Function(SUF) to design schedule strategy. Simulation results show that the proposed algorithm can improve the QoS for all services with only a limited decline in the interference performance.
  • HU Xin-Lin, ZHENG Jin, WANG Guo-Jun
    Computer Engineering. 2012, 38(3): 97-99. https://doi.org/10.3969/j.issn.1000-3428.2012.03.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Existing scheduling algorithms have the problems of large energy consumption and high latency for data collection. So this paper proposes an energy-efficient algorithm called Contiguous Node Data Aggregation Scheduling(CNDAS), which generates a collision-free schedule by computing nodes’ competitor sets. It assigns sibling nodes consecutive time slots to reduce the frequency of state transitions and to reduce the energy consumption of sensor nodes. Simulation results show that CNDAS outperforms SCHDL algorithm when the network scale is large.
  • LV Jun-Ling, GUO Ai-Huang
    Computer Engineering. 2012, 38(3): 100-103,115. https://doi.org/10.3969/j.issn.1000-3428.2012.03.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on correlation matrix method, Multiple-input and Multiple-output(MIMO) channel coefficient matrix can be obtained by calculating the correlation coefficient between two antennas and MIMO correlation matrix. The steering vector and beam-forming vector of Smart Antenna(SA) are added to the MIMO channel coefficient matrix to form MIMO/SA channel matrix, so that MIMO/SA multi-antenna space-time channel is modeled. A channel simulation platform is established to simulate and analyze MIMO/SA channel in time domain, frequency domain and space domain. Simulation results show that the model has a good channel directivity gain and the channel properties in space, time and frequency meet the demands of 3GPP TR 25.996, and it is useful for designing and optimizing MIMO/SA multi-antenna system and the analysis of channel capacity.
  • CHEN Jie-Jue, OU Yang-Ye-Long
    Computer Engineering. 2012, 38(3): 104-106,118. https://doi.org/10.3969/j.issn.1000-3428.2012.03.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For the problem of load balance in Wireless Sensor Network(WSN), based on the Geographic Adaptive Fidelity of Hierarchical Structure(GAFH) algorithm, the Geographic Adaptive Fidelity of Hierarchical Honeycomb structure(GAFHH) algorithm is proposed for WSN. The nodes belong to several adjacent honeycomb grids construct a cluster in GAFHH, and each grid is unified numbered according to its position in the cluster. Selecting a middle grid as an active grid in each cluster, and adopting the principle of maximum residual energy to select a node as a cluster head in each active grid. And all cluster heads construct the backbone network of wireless sensor network is using of communicating. At the beginning of the next round, re-selecting the active grid, and moving the boundaries of each cluster to make the active grid is always in the center of the cluster. Simulation results show that the load balance and throughput of GAFHH is superior to the GAFH.
  • SHU Bing-Lian, FEI Guang-Shu, ZHANG Lei, BANG Xiao-Qin
    Computer Engineering. 2012, 38(3): 107-109. https://doi.org/10.3969/j.issn.1000-3428.2012.03.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Genetic Algorithm(GA) and adaptive GA often trap into local optimum when they are used in optimizing the system utility of Cognitive Radio(CR) network. By introducing the Euclidean distance reflecting characteristics of genes, this paper improves GA, and proposes a spectrum allocation scheme with system utility maximization. Experimental results prove that compared with traditional GA and adaptive GA, the scheme proposed has better performance.
  • CAO Su-Zhen, WANG Cai-Fen, CHEN Xiao-Yun, LV Gao-Yin
    Computer Engineering. 2012, 38(3): 110-112. https://doi.org/10.3969/j.issn.1000-3428.2012.03.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For the existing content extraction signature scheme, because calculated bilinear pairings caused the problem of low efficiency, based on certificateless thinking, this paper proposes an efficient content extraction signature scheme without pairings. Scheme of binding techniques, use hash functions will the public key binding to the partial private key generates and signature algorithms, reduce the possibility of public key substitution attack, and in the random oracle model proved scheme is existentially unforgeable under adaptive chosen-message attacks assuming. Compared with known solutions, the efficiency is higher.
  • XU Chao, LEI Jian-Wei
    Computer Engineering. 2012, 38(3): 113-115. https://doi.org/10.3969/j.issn.1000-3428.2012.03.038
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For improving the transparency of embedding watermark into 3D mesh model, an adaptive watermark intensity adjusting algorithm based on local geometric features of mesh model is proposed. Mesh model is partitioned into some local area first, and embedding intensity is adjusted according to fluctuation of local geometric features. Evaluation of geometric error and evaluation of visual distortion are both adapted to test the performance of the algorithm. Experimental results show that, compared with the non-adaptive technique, the proposed adaptive technique can improve transparency of watermark effectively both in object evaluation and in subject evaluation.
  • JIANG Qiong-Xi, ZHOU Na-Run
    Computer Engineering. 2012, 38(3): 116-118. https://doi.org/10.3969/j.issn.1000-3428.2012.03.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An improved polynomial key predistribution scheme is proposed for clustered sensor networks. The communication keys among cluster head nodes are obtained according to the symmetric property of two-parameter 4th-order polynomial, which solves the threshold security problem and makes the node overheads lower. The communication keys between the cluster head node and its common nodes are built with little communication after all the nodes are deployed, the authentication mechanism guarantees the security during communication keys establishment. It indicates that the scheme appears to be connective and secure, simultaneously makes the overheads of nodes low. It is shown that addition and revocation of the nodes are feasible in the scheme.
  • CAO Yuan, YANG Lin, FU Zong-Bei, YU Bei, XU Xiao-Jing
    Computer Engineering. 2012, 38(3): 119-120,123. https://doi.org/10.3969/j.issn.1000-3428.2012.03.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming to satisfy identity management function requirements such as federal cross domain access, trust delegation and privacy protection, and the requirements of integration among different identity management systems, it proposes a general identity model in this paper. These models consist of global identifier, local identifier, temp identifier, access information set, credential set, attribute set and trusted domain set. Then the construction process of this model which includes two stages is shown, the collection of attributes and credentials, the update of trusted domains and access information is finished during these two stages. Application result shows that this model provides good support for current identity management systems to implement integration and identity protection.
  • HAO Yao-Hui, GUO Yuan-Bo, LUO Ting, YAN Ju-Wei
    Computer Engineering. 2012, 38(3): 121-123. https://doi.org/10.3969/j.issn.1000-3428.2012.03.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on Hoare logic and ANSI/ISO C Specification Language(ACSL) specification, this paper presents a formal verification system for cryptographic software, which is composed of program specification, inference rules, reliability strategy and verification module. It takes the software realization of RC4 algorithm in OpenSSL as an example, the functional correctness, safety properties and information flow security are tested and verified. Results show that this system can reduce the complexity of formal verification method and has a high level of automation.
  • HAN Xiu-Wei, TENG Jian-Fu, BAI Yu
    Computer Engineering. 2012, 38(3): 124-125,129. https://doi.org/10.3969/j.issn.1000-3428.2012.03.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the scheme proposed by Chen et al and presents an improved protocol based on quadratic residue and Hash function. In the improved protocol, random numbers are generated both by reader and tags. The transmitted information is encrypted by quadratic residue and Hash function. Analysis result demonstrates that the improved protocol not only can resist various attacks and ensure privacy, but also needs less computation and storage in the tags and server compared to other improved scheme.
  • GU E-Ru, LIU Xiang-Yang, LIU Qing-Li
    Computer Engineering. 2012, 38(3): 126-129. https://doi.org/10.3969/j.issn.1000-3428.2012.03.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes the decentralized secure distributed storage system. The privacy of data is fulfilled by the combination of public key system and symmetric key system. Symmetric key for data from different sources are different, hence encryptions can be implemented in a distributed way. The employment of decentralized erasure code, together with the distributed encryptions, makes possible the decentralization of the system. RS codes are used to store the encryption of symmetric keys, and the list decoding of RS codes ensures the robust. Analysis result shows that the computing efficiency of this system is higher.
  • ZHANG Zhi-Yong, MA Jian-Qiang, ZHANG Shi-Yong
    Computer Engineering. 2012, 38(3): 130-133,136. https://doi.org/10.3969/j.issn.1000-3428.2012.03.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To meet the requirement of short communication time and real-time in Vehicular Ad Hoc Network(VANET), this paper designs a mechanism using compressed Bloom Filter mechanism, and realizes pseudonym-based malicious node detection in VANET. The mechanism can effectively reduce the data size of pseudonym set of malicious nodes and the exchanging information content in data updating process with lower false positive. Analysis results show that this method can reduce data transmission and correspondence expenses, and improve real-time of communication.
  • JIANG Hua, GU Yong-Xin, HONG Liang-Chen, YANG Qiang-Dui
    Computer Engineering. 2012, 38(3): 134-136. https://doi.org/10.3969/j.issn.1000-3428.2012.03.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to fit with the Peer to Peer Session Initiation Protocol(P2PSIP) security issues and its distributed characteristics, this paper proposes an authenticable key agreement scheme for P2PSIP by using identity-based cryptography, and analyzes its security, efficiency and key escrow problem. This scheme provides mutual-authentication and key agreement in the process of P2PSIP call, ensuring the security of P2PSIP communication, and avoiding the disadvantage of Public Key Infrastructure(PKI).
  • ZHANG Shao-Yuan, LEI Jian-Shu
    Computer Engineering. 2012, 38(3): 137-138. https://doi.org/10.3969/j.issn.1000-3428.2012.03.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An efficient biometrics-based mutual authentication scheme is proposed, which is based on personal biometrics, one-way Hash function and smart card. For enhancing the system security, a one-time key is generated by using the timestamp. In the scheme, the authentication process can resist all known attacks including replay attacks and the DoS attacks, and needs only twice online message transmissions. Analysis shows that the scheme is secure and effective.
  • LI Fang-Wei, MO Li, YAN Shao-Jun
    Computer Engineering. 2012, 38(3): 139-140,144. https://doi.org/10.3969/j.issn.1000-3428.2012.03.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the contradiction that current signature schemes can not protect the benefits of proxy signer and message owner at the same time, a blind proxy blind signature scheme without trusted party base on elliptic curve is presented. It hides both the identity of the proxy signer and the message to be signed. The property analysis shows that the proposed scheme satisfies the security properties of proxy blind signature and blind proxy signature scheme. It can effectively protect the proxy signer and user’s identity privacy and prevents abusing signature. It also has a higher safety and efficiency compared with other schemes.
  • ZHENG Xiu-Lin, LIAN Die-Chu, LU Yan-Rong, YUAN Zheng
    Computer Engineering. 2012, 38(3): 141-144. https://doi.org/10.3969/j.issn.1000-3428.2012.03.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an impossible differential cryptanalysis of 13-round CLEFIA-128 no whitening key, which use the 9-round impossible differential. In the process of cryptanalysis, it guesses each key and filter the data pairs using the output and input differences of S-box. It utilizes the keys relations to reduce the number of guessed keys, and introduces the early abort technique to reduce the time complexity. Computing result shows that the complexity of the cryptanalysis is about 2120 data and 2125.5 encryptions
  • FU He-Gang, CENG Kai
    Computer Engineering. 2012, 38(3): 145-147,162. https://doi.org/10.3969/j.issn.1000-3428.2012.03.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper focuses on the protection problem of private information in data mining, and proposes multi-dimensional sensitive k-anonymity privacy protection model. Sensitive attribute leakage problems are divided into general leakage similar leakage, multi-dimensional independent leakage, cross leakage and multi-dimensional mixed data leakage. On the basis of k-anonymity, the similarities of multi-dimensional sensitive attribute are marked by clustering features. The model searches for anonymous records, computes the similarities between the remained records and grouped records, and generalizes the dataset satisfied to the anonymous model. The dataset is released. Experimental results show that the model is appropriate for the multi-dimensional sensitive data, and can prevent privacy leaking and have good data availability.
  • JU Hui, WANG Jian-Dong, SONG Chao
    Computer Engineering. 2012, 38(3): 148-149,165. https://doi.org/10.3969/j.issn.1000-3428.2012.03.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the available weighted secret sharing scheme, only one secret can be shared in one sharing session. A weighted threshold multi-secret sharing scheme is proposed. By using the Chinese remainder theorem, many secrets mapping to one parameter is presented, when the sum of weights of the participants is as big as or bigger than the threshold value, they can recover the secret. Analysis shows that the proposed scheme is secure and has advantages of less communication.
  • DIAO Ba-Ting, ZHUO Xiu-Ran, ZHENG Chao-Yu
    Computer Engineering. 2012, 38(3): 150-152,168. https://doi.org/10.3969/j.issn.1000-3428.2012.03.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes the research of the security situational awareness system, aiming at solving the risk existed in the LAN and the bottleneck problem of United Threat Management(UTM). For the first time, it brings forward security situational awareness system architecture in the LAN combining UTM. The main security index is acquired through the DEMATEL method and the situational measurement model is built by adopting the fuzzy comprehensive evaluation algorithm. The threat measurement model is constructed to compute the threat degree in the LAN based on the security index and situational measurement model. The result proves that the system can analyze the security situation accurately and make the UTM strengthen the network security.
  • DING Qing, SHU Min, YAN Er-Hui
    Computer Engineering. 2012, 38(3): 153-155. https://doi.org/10.3969/j.issn.1000-3428.2012.03.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a safety and high-efficiency improved strategy for WAPI. It introduces the WAI access identify mechanism and its formalization description. According to RSA algorithm and public key authentication framework, it improves the key authentication system, discusses the certificate authentication and key agreementconsultation process, and analyzes the security and efficiency of improved WAPI. Analysis results show that this strategy can realize authentication and key agreement process organic union, and resist the replay attack.
  • LI Qun-Hui, ZHOU Meng-Quan, GENG Guo-Hua
    Computer Engineering. 2012, 38(3): 156-158. https://doi.org/10.3969/j.issn.1000-3428.2012.03.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a fracture surface matching algorithm based on integral invariants. Through comparing feature point’s multi-scale volume integral invariants, it obtains initial matching point pairs and discard outliers. According to the similarity of surface patches based on compatibility constraint, it gets small and efficient matching point pairs. It calculates every 3D space transformation set which makes the normal vectors to the same one. A two level voting scheme based geometric hash is employed to find out optimal transformation. Experimental results show this algorithm can realize full and partial matching of fracture surface.
  • WANG Fu-Chao, GU Xiao-Dong, CHEN Xiao-Min
    Computer Engineering. 2012, 38(3): 159-162. https://doi.org/10.3969/j.issn.1000-3428.2012.03.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the application of planetary rover vision system, this paper proposes a stereo matching algorithm. It uses Census transformation to get a group of binary code flow, gets through the colour weight and distance weight to complete weight calculating, and uses the method of double channel to accumulate the matching the price. Experimental results show that this algorithm can process 23 frames stereo images per second at 100 MHz, and the average error rate is lower than 6%.
  • LIU Jian-Wei, LI Shuang-Cheng, LUO Xiong-Lin
    Computer Engineering. 2012, 38(3): 166-168. https://doi.org/10.3969/j.issn.1000-3428.2012.03.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes the classification algorithm of fast iterative reweighted q-norm regularization Least Squares Support Vector Machine(LS SVM). The proposed algorithm can select q value via cross-validation, where 0
  • CHEN Li-Juan, ZHANG Heng, DONG Xin-Hua, TU Er-Hong-?Wu-Ci-Man, ZHOU Dun-Lin
    Computer Engineering. 2012, 38(3): 169-171,175. https://doi.org/10.3969/j.issn.1000-3428.2012.03.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Chinese and Uyghur are very different in terms of morphological typology and word order, which leads to many unknown words and confusion word order in Uyghur when translate from Chinese to Uyghur using statistical method. On the basis of the word order of Chinese and Uyghur, a Chinese syntactic reordering method is proposed, and an analysis on Uyghur morphological information is made to resolve the difficulties. Experimental results on the factor-based SMT show that the approach achieves a substantial improvement in translation quality over the baseline phrase-based system, and the BLEU score is improved from 15.72 to 19.17.
  • NIE Zhi-Liang, ZHANG Xin-Meng, YANG Tian-Xi, ZHANG Li
    Computer Engineering. 2012, 38(3): 172-175. https://doi.org/10.3969/j.issn.1000-3428.2012.03.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the area of language identification, the system recognition performance is affected by the speaker variability in the test utterance. In this paper, the anchor model which can realize speaker-independent is studied in the language identification. Based on its application principle, the algorithm of training language discriminative anchor model which combines the fast discriminative training algorithm is proposed. Experimental results indicate that the anchor model can improve the performance of the system and the language discriminative anchor model can further reduce the error of the system.
  • CHANG Li, HUAI Wen-Jun, DU Ji-Xiang
    Computer Engineering. 2012, 38(3): 176-177,179. https://doi.org/10.3969/j.issn.1000-3428.2012.03.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of the standard Non-negative Sparse Coding(NNSC), the Fisher Linear Discriminant(FLD) constraint is introduced and a new modified NNSC model is proposed. This model can promote the spatial separability of sparse coefficients and benefits to enforce the classification capability. Using palmprint images to test, the image features extracted by this model have orientation, spatiality and selectivity. The image reconstruction work can be implemented successfully by using these features extracted. Utilizing the distance classifier to test image features, test results show that the model can improve the feature recognition efficiency. Simulation results show that the model is efficient in the visual neuron modeling, image feature extraction and pattern classification.
  • XUE Li-Min, XIAO Bin
    Computer Engineering. 2012, 38(3): 178-179. https://doi.org/10.3969/j.issn.1000-3428.2012.03.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the discrimination for Chinese sentence sentiment orientation, this paper puts forward a quintuple model, including a definition of discrimination for sentence sentiment orientation based on the model and its main task. It adopts labeling word characteristic, enacting sentence sentiment orientation estimation rules for several representative sentences. Experimental result proves these rules make the discrimination for sentence more comprehensive and objective.
  • LUO Zhi-Ceng, CA Xin-Bei
    Computer Engineering. 2012, 38(3): 180-182,186. https://doi.org/10.3969/j.issn.1000-3428.2012.03.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to high order cumulant and Independent Component Analysis(ICA), this paper proposes a method of removing artifacts from Electroencephalogram(EEG) based on CuBICA. The Electroencephalogram which mixing with EOG and EKG signals are denoised by wavelet package analysis, after centering and whitening, the EEG signals which still containing EOG and EKG is separated by CuBICA algorithm. The cross correlation coefficient of the separated signals is analyzed, result shows that CuBICA algorithm can efficiently separate EOG and EKG from EEG, and get pure EEG.
  • JIANG Xiao-Yu
    Computer Engineering. 2012, 38(3): 183-186. https://doi.org/10.3969/j.issn.1000-3428.2012.03.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to over the shortcoming of the incomprehensive of summarization, a new lexical chain-based keywords extraction and automatic summarization algorithm from Chinese texts based on the unknown word recognition using co-occurrence of neighbor words is proposed, and an algorithm for constructing lexical chain based on Hownet knowledge database is given in the method, lexical chain is constructed by calculating the semantic similarity between terms, keywords are extracted and the importance of each sentence is calculated according to the intensity of lexical chain, the entropy of terms and position. Experimental results show that the summarization generated by the improved algorithm gets better performance than other methods both in recall and precision.
  • YANG Cheng, KANG Li, JING Xiao-Rong
    Computer Engineering. 2012, 38(3): 189-192. https://doi.org/10.3969/j.issn.1000-3428.2012.03.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Secretary Problem(SP) is a kind of probabilistic optimization problem. The best theoretical solution is lack of operability in practice, and heuristic strategies only concern the threshold, without quantitative analysis of the relationship between the threshold and the benchmark. This paper deduces the optimal combination of threshold and benchmark in cutoff rule, and puts forward a simply and practical strategy——trichotomy, which taking the first one-third of the applicants as the sample set with a benchmark of the first to the third one to search the rest of the applicants. Based on Multi-Agent System(MAS) modeling, discusses which position among applicants queue is best for every grade to maximize his probability of being employed. Application result shows that the strategy is simple and easy to operation, its performance reaches 95% of the optimization resolution.
  • HE Nian, DAN Yong-Zhao, CHENG Ke-Yang
    Computer Engineering. 2012, 38(3): 193-195,199. https://doi.org/10.3969/j.issn.1000-3428.2012.03.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    There is a disadvantage of the feature reduction based on granular computing. It is not suitable for the accurate data. This paper presents a method to avoid this disadvantage that is using arithmetic average. The time complexity of this method is polynomial. It uses Support Vector Machine(SVM) to do pattern identification in every character. Then try to compare every recognition rate with the average recognition rate. When the decision table becomes simplified, it can be reduced in granular computing. Comparing the result with the original features, experiment shows that this method can remove redundancy, and it is not effected by adding noise.
  • HUA Xiu-Xiu, MA Chi
    Computer Engineering. 2012, 38(3): 196-199. https://doi.org/10.3969/j.issn.1000-3428.2012.03.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A virtual contour model of surface inhomogeneity is proposed in the paper aiming at measuring surface inhomogeneity of skin tumors. In addition, a novel feature cluster, including irregular and asymmetric descriptors of virtual contour, is constructed for measuring surface unevenness. The 2D surface unevenness of intensity distributions is converted to the irregularity of the virtual contour. Then features with irregularity and asymmetry are extracted. Furthermore, the features are selected and fused on Hausdorff distance metrics to implement the classification of skin tumors for the surface inhomogeneity using the irregularities and asymmetry of the virtual contours. Experimental results show that the model not only can achieve the dimension reduction, but also can improve the classifier performance.
  • XIE Jun
    Computer Engineering. 2012, 38(3): 200-202. https://doi.org/10.3969/j.issn.1000-3428.2012.03.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve the ability of the parts-based representations of the Nonnegative Matrix Factorization(NMF) algorithm, this paper proposes a NMF based on projected gradient and underapproximation method——Projected Gradient Nonnegative Matrix Underapproximation (PGNMU). By adding the upper bound constraint, it applies the important features of the basis matrixs that are extracted by using the alternating iterative method based on the projected gradient methods to the experiments. Compared with previously published methods on the CBCL and ORL database, results show that the method has the better sparseness and better recognition rate than the others.
  • YANG Jing-Jing, CHEN Geng-Sheng, YIN Wen-Bei
    Computer Engineering. 2012, 38(3): 203-205. https://doi.org/10.3969/j.issn.1000-3428.2012.03.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to efficiently correct the fisheye image with radial distortion, an algorithm based on geometric properties is proposed. This paper calculates the slope of distortion lines by adopting projection invariance principle and geometric properties of radial distortion. The parameters of polynomial correction model are got by solving linear equations. Experimental result shows this algorithm can get high precision correction with lower complexity. Compared with straight line fitting method using iteration, the overall quality of the correct image is significantly improved when using the algorithm.
  • ZHONG Shun-Gong, HE Jian-Nong
    Computer Engineering. 2012, 38(3): 206-208,211. https://doi.org/10.3969/j.issn.1000-3428.2012.03.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The traditional SUSAN edge detection algorithm is lack of detecting fine edge. Adaptively dual-threshold algorithm using Otsu’s method is selected to replace the traditional manual single threshold. And multi-direction local non-maxima suppression method is proposed to improve the SUSAN edge detection algorithm. The new algorithm is applied to remote sensing image. Experimental results show the new algorithm effectively improves the accuracy and reduce the missing rate, and the edge is more detailed and continuous.
  • WU Zong-Qian, WANG Feng, DING Tian-Fu
    Computer Engineering. 2012, 38(3): 209-211. https://doi.org/10.3969/j.issn.1000-3428.2012.03.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A novel counting method based on active contour model is proposed to solve the difficulty in overlapped algae counting. A series of preprocessing methods are applied to obtain a binary image. The active contour model algorithm is used in edge detection after extracting each connected component region in the original image. The counting result comes out according to edge analysis. Compared to watershed algorithm, this method improves counting accuracy of overlapped algae cells by eliminating the error caused by overlapped particles segmentation. Experimental result shows this algorithm has good performance in overlapped algae counting with accuracy over 90%.
  • XIAO Feng, ZHOU Meng-Quan, GENG Guo-Hua
    Computer Engineering. 2012, 38(3): 212-214,217. https://doi.org/10.3969/j.issn.1000-3428.2012.03.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a multi-scale relative moment retrieval method for ancient-coin image. It takes the feature template of multi-scale wavelet to get the boundary images and extracts boundary image feature based on multi-scale relative moments. It normalizes the feature vector and measures the similarity of it. Experimental results show that the method can win better retrieval effect and also apply to car image retrieval and has good universality and robustness.
  • LONG Lu-Lu, LI Cong-Li, LUO Jun
    Computer Engineering. 2012, 38(3): 215-217. https://doi.org/10.3969/j.issn.1000-3428.2012.03.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an image quality assessment method based on Total Variation(TV) model and Structural Similarity(SSIM). It adds noises to distorted image to quantitatively determine, and gets the degraded image. It uses the self-adaptive TV denoising model and gets denoising image, then uses the SSIM method to make reference evaluation between the distorted image and denoising image. The results is the no reference evaluating indicator. It uses the standard testing images and the degraded images from the LIVE database to make evaluate experiment, the results show that the method can judge the quality of images without explicit knowledge of the reference images, and it is highly consistent to the result of human visual.
  • SHI Ting-Ting- , LIU Wei-Hua, WU Chun-Hui
    Computer Engineering. 2012, 38(3): 218-220. https://doi.org/10.3969/j.issn.1000-3428.2012.03.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel approach for image spatial feature extraction. It uses CCVAE algorithm based on color vector angle and Euclid distance to detect original image color edge. For the edge pixels, the Edge Histogram Descriptor(EHD) is built. For the non-edge pixels, the Spatial Chromatic Histogram(SCH) is built. Experimental results show that the approach has high precision rate and recall rate.
  • WANG Hai-Jun, LIU Meng
    Computer Engineering. 2012, 38(3): 221-223. https://doi.org/10.3969/j.issn.1000-3428.2012.03.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Chan-Vese(CV) model and Local Binary Fitting(LBF) model always have local optimal solutions when they are used in image segmentation, and they are very computationally expensive and segmentation speed is slow. This paper introduces a variable to become dual variable by means of known variable and uses local statistic information to establish the dual model of active contour model, so that the segmentation precision and speed are improved. Experiments are made on synthetic images, multi-target object images and medical images with intensity inhomogeneity, whose results prove that the proposed model can automatically handle topological changes and get precise segmentation results.
  • SHU Xiao-Dong, FAN Chong-Dun, YANG Jian-Zheng
    Computer Engineering. 2012, 38(3): 224-227. https://doi.org/10.3969/j.issn.1000-3428.2012.03.075
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Considering the problem that information construction of outside region management develops slowly than the airport operation center and the terminal operation center, data mining technologies are applied into airport outside region management information systems. The airport region management oriented business intelligence is presented. An airport region data mining system is designed and each model is analyzed. The airport outside region management validates the efficiency of the system.
  • XIE Xiao-Min, WANG Kan-Wen, CHEN Jia-Lin, ZHOU Hua-Gong, WANG Ling-Li
    Computer Engineering. 2012, 38(3): 228-233. https://doi.org/10.3969/j.issn.1000-3428.2012.03.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of the Multiplier of a fixed-point input by multiple sets of fixed-point constants in linear transformation, this paper proposes Reconfigurable Multiple-constant Multiplier(RMCM) algorithm making use of adders/subtractors, shifters and multiplexers. It generates RMCM in two strategies, which are local optimization and global optimization, and selects the best Directed Acyclic Graph(DAG) with the smallest areas as the output. Experimental result shows that the Multiplier generated by the proposed algorithm has less area costs and can be applied in linear transformation with several different sets of coefficients.
  • SHI Jia-Tie, XU Ning, LIU Wen-Qing, DU Li-Xia
    Computer Engineering. 2012, 38(3): 234-236. https://doi.org/10.3969/j.issn.1000-3428.2012.03.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the desktop application of open-source virtualization system, a intra-domain handoff method Xen-based is proposed. It uses Xen to virtually support the hardware of Intel VT-x. It uses Remote Frame Buffer(RFB) protocol. According to the configuration file, it links to the VNC Server end, hence show the virtualization desktop. It makes use of encrypt instruction to complete the information authentication, and intra-domain handoff. Experimental results show that the method can implement the desktop handoff between Windows domain and Linux domain.
  • SHEN Xing, HAN Bei, LI Beng, YUN Zhao-Ji
    Computer Engineering. 2012, 38(3): 237-239. https://doi.org/10.3969/j.issn.1000-3428.2012.03.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    With the premise of improving the performance of unmanned helicopter, this paper designs a constant rotating speed control system for engine based on embedded microchip MC9S08, which works in the complex environment with fast state change of flight mode. By constructing engine model, the cascade control system is composed of collective feedforward block and speed feedback block. Experimental results prove that the system has advantages of high accuracy, security and excellent properties of fast response.
  • TAO Dan-Dan, WANG Yi-Fu, TAN Bi-Yun
    Computer Engineering. 2012, 38(3): 240-242,254. https://doi.org/10.3969/j.issn.1000-3428.2012.03.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On the basis of analyzing the methods of monitoring, energy saving modes of street lamps, this paper designs a novel energy saving control system. This system framework is divided into three layers, including terminal layer, middle layer and server layer. In the terminal layer, in order to control a single street lamp, it puts a things communication module into the lamp as core control unit. In the middle layer, it uses the chip of 32 bit CodeFire series MCF52223 as a control unit, with the chip of MC13211, completing the transmission of data. In the server layer, street managers can control all of the city lights intelligently through visiting the Website. On this basis, the paper proposes a novel software control scheme of Web. Application results show that the system deploys into operation stably for a long time and obvious power consumption is achieved.
  • SHU Lei, XIONG Yong, YANG Xiu-Mei
    Computer Engineering. 2012, 38(3): 243-245,257. https://doi.org/10.3969/j.issn.1000-3428.2012.03.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a signal detection algorithm for the downlink of the Long Term Evolution(LTE) system. In this algorithm, a uniform structure of detector for different transmission scheme is derived to simplify the implementation of the receiver for the downlink of LTE system. The algorithm can carry out the functions of Maximum Ratio Combining(MRC), Zero Forcing(ZF) and Minimum Mean Square Error(MMSE) detectors. This design saves the hardware implementation of the receiver and simplifies the software control modules. Simulation results show the algorithm can achieve better performance than the conventional MRC, ZF and MMSE detectors.
  • ZHANG Yuan-Ling, XU Zhong-Wei, MO Yong-Bing, JIA Zhi-Xiang
    Computer Engineering. 2012, 38(3): 246-248. https://doi.org/10.3969/j.issn.1000-3428.2012.03.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To improve Message Authentication Code(MAC) algorithm of ER in Railway Signal Safety Communication Protocol II(RSSP-II), an improved MAC algorithm using Advanced Encryption Standard(AES) as core algorithm and Cipher Block Chaining(CBC) as encryption and decryption method is put forward. The proposed method will be applied to RSSP-II simulation test in TSRS test platform of CTCS-3, whose results show that the improved algorithm conquers such safety problems as weak key and semi weak key, thus having more advantage in safety and real-time compared.
  • WANG Jiang, XIE Jian-Jun, LI Hua-Biao, NA Kai
    Computer Engineering. 2012, 38(3): 249-251. https://doi.org/10.3969/j.issn.1000-3428.2012.03.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Wiki based collaboration platforms are used broadly, which brings a great of flexibility and effectiveness. However the lack of navigation supporting in Wiki makes it hard for user to find target page. By using collaboration filtering technical, this paper implements a page recommendation system to build the connection of pages. The absence of explicit rating in Wiki is solved by using implicit rating extracting from user history behavior. For the relation of users is time related, a new similarity function is proposed. Application result shows that the page recommendation system enhances the user browsing experience in Wiki, and helps user find target page effectively.
  • DENG Jian-Hua
    Computer Engineering. 2012, 38(3): 252-254. https://doi.org/10.3969/j.issn.1000-3428.2012.03.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at correcting the deviation by simulating a bicycle Cellular Automata(CA) model with fix cellular size, a calibration process of the cellular size based on field video detecting data is elaborated here. And by analyzing the relationship of headspace, horizontal space with speed, it puts forward a function of dynamical amending cellular length. Through the comparison of the three macro parameters obtained from the model by corrected or not, it shows that this method can effectively express the relationship following distance with speed, overcome the inappropriate area density and flow rates value with the fixed cellular length.
  • XIE Ji-Xiang, BAI Yi-Zhe, TIAN Sha-Sha
    Computer Engineering. 2012, 38(3): 255-257. https://doi.org/10.3969/j.issn.1000-3428.2012.03.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An updating method called Histogram Comparison Gaussian Mixture Model(HCGMM) is proposed to reduce the affection of target detection in the presence of large illumination changes and background variations. To begin with, the method constructs the intensity histograms for each frame in the time window, and then, calculates the values of comparison between the two intensity histograms of images in the time window. Using the values just calculated, it updates the parameters of the Gaussian Mixture Models(GMM). Experimental result shows that the method can reconstruct background accurately and extract the target integrally in the presence of large illumination changes and background variations.
  • ZHANG Jin-Gou, WANG Kai-Yong, WANG Yun-Feng
    Computer Engineering. 2012, 38(3): 258-260,264. https://doi.org/10.3969/j.issn.1000-3428.2012.03.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the analysis to the characteristics of socio-economic data, referring to the information expressing method in Geographic Information System(GIS), this paper designs a visualization analysis system to the socio-economic data with attribute, graphics and charts associated style based on Flash technology. According to the requirement, administrative unit spatial graphics database, socio-economic database are designed and the chart component library and model library are constructed. Analysis result shows that the system can improve the efficiency in socio-economic and other relevant data analysis.
  • LI Qiang-Cheng, ZHANG An-Zhan, GONG Xiao-Li, ZHANG Jin
    Computer Engineering. 2012, 38(3): 261-264. https://doi.org/10.3969/j.issn.1000-3428.2012.03.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the problem of proper display of online book in the E-paper reader, an online book reading system is designed. The system is based on embedded system. The content of the online book are filtered, to arrange the data displayed perfectly in the E-paper screen, and the content is cached and pre-fetched to solve the problem of network latency. Experimental results show that the system can make full use of E-paper screen for the online reading, providing users with localized reading experience and it is an effective solution to the E-paper reader questions for online reading of the layout.
  • LEI Feng-Li, GU Chun-Xu, CHEN Mo-Li
    Computer Engineering. 2012, 38(3): 265-266,269. https://doi.org/10.3969/j.issn.1000-3428.2012.03.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Some of the modeling methods are not very suitable to establish the model of public transport network of Lanzhou for the reason that the real parameters of the network cannot be got or the method is with high self-complexity. A model based on bipartite graph is proposed, in which, the bus number as the “top set”, the station as the “bottom set”, public transport network model of Lanzhou is built. A lot of data are computed and analyzed, which indicates that this network fits with small-world and scale-free network, and analyzes the performance and connectivity with the maximum value of connected subgraph and Laplacian spectrum. Result proves that the use of bipartite graph to express, analyze and calculate the complex network not only guarantees the calculation result when the storage space drops relatively, but also seems direct-viewing and simple when optimizing the complex network on the bipartite graph.
  • HAN Teng-Jiao, KANG Zhi-Wei
    Computer Engineering. 2012, 38(3): 267-269. https://doi.org/10.3969/j.issn.1000-3428.2012.03.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the advantage of segmentation speed in the compressed domain, this paper proposes a method of video object segmentation based on H.264. It eliminates the noise, median filter, correction and accumulation to processing initial motion vectors and uses fuzzy C-means clustering algorithm to process motion vectors and segments the moving objects. Experimental results show that the method can get the moving object fast and accuracy.
  • XU Xin-Xing, WANG Yong
    Computer Engineering. 2012, 38(3): 270-272,275. https://doi.org/10.3969/j.issn.1000-3428.2012.03.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents an Online Kernel Clustering with Parameters Adaptation(OKCPA), and applies it to the unknown radar emitter signal sorting. OKCPA algorithm which is based on Support Vector Machine(SVM), uses the kernel trick to map the dates into the high-dimensional linear space, and uses stochastic gradient descent to update the boundary function, the step size and penalization parameter is updated with the dates coming, which accelerates the speed of clustering sorting. Simulation results show that this method has higher clustering sorting speed and higher sorting accuracy.
  • CHEN Zhuo, LI Pan
    Computer Engineering. 2012, 38(3): 273-275. https://doi.org/10.3969/j.issn.1000-3428.2012.03.090
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Online short video sharing is reshaping the way people watching videos, so this paper presents sharing policies mainly adopts the Client/Server architecture, which can result huge bandwidth pressure at streaming server. A P2P based online short video sharing System IShare is proposed, which combines viewing interests of users and social network characteristic of short videos, which can share short videos between users. IShare mainly includes interest based peers clustering and streaming source peers searching. Experimental results show IShare has a high efficient streaming source peers searching ability and can greatly reduce the bandwith consumption of streaming server.
  • LIU Jie, TUN Jiang, DIAO Quan-Wei
    Computer Engineering. 2012, 38(3): 276-279,283. https://doi.org/10.3969/j.issn.1000-3428.2012.03.091
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to reduce the impact of the configuration time to the performance of reconfigurable computing, this paper proposes a module mapping algorithm based on dynamic partial reconfigurable technology for sequential applications. It deals with the mapping of multi-modules. It utilizes the high effectiveness and flexibility of dynamic reconfiguration to hide the configuration time, so that the program execution time can be reduced and the system performance is improved. Experiment based on JPEG encoding example shows that the algorithm achieves 3.31 and 2.59 speedups compared to implementation methods of pure software and pure hardware respectively.
  • LI Quan
    Computer Engineering. 2012, 38(3): 280-283. https://doi.org/10.3969/j.issn.1000-3428.2012.03.092
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to effectively identify an electronic tag in Radio Frequency Identification(RFID) system, a bit-by-bit binary anti-collision algorithm based on improved backtrackingthe is proposed. This algorithm takes advantage of unique feature of tag identification, and makes the reader identify a tag accurately by only parts of bits of tag identification. The experiment fully considers two important performance index of bits transferred between the reader and the tags, and the search number of reader. The analysis on simulation result indicates that the improved algorithm performs significantly better than the other binary tree algorithms. It can not only greatly reduce the bits transferred between the reader and the tags, but also reduce the search number of reader. The speed of identifying tags can be enhanced greatly. Therefore the application has good prospect.
  • LIU Fang-Zheng, QI Jian-Qing
    Computer Engineering. 2012, 38(3): 284-286,289. https://doi.org/10.3969/j.issn.1000-3428.2012.03.093
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at generic model of location precision is applied to only a sort of location system, its universal model of location precision is educed based on the class of location system(non-redundant system and redundant system). The location precision of non-redundant system is analyzed based on the error is separable. Aiming at the characteristic of redundant system, its universal models of the analysis of location precision in three-dimension space are educed according to the condition of Markov estimator. The two universal models is adapt to the analysis of location precision of different location systems. At last the veracities of the two universal models are validated through simulation and the contrast of data.
  • CHU Jing, LIU Bin-
    Computer Engineering. 2012, 38(3): 287-289. https://doi.org/10.3969/j.issn.1000-3428.2012.03.094
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a method of multispectral image fusion based on HSV and red-black wavelet transform. The multispectral image is transformed by HSV transform, multi-resolution red-black non-separable wavelet decomposition of the value component of multispectral image and panchromatic image is performed. Different fusion algorithms are used to the high-frequency parts and the low-frequency part. The fusion result image is obtained by red-black reconstruction and inverse HSV transform. The fusion performance is evaluated using objective index. Experimental results show that this method has good fusion effective for the multispectral image and high spatial resolution image.
  • XU Miao, LI Yuan, GUI Cheng-Lin, LUO Lei
    Computer Engineering. 2012, 38(3): 290-292. https://doi.org/10.3969/j.issn.1000-3428.2012.03.095
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to verify the schedulability property of the task set in embedded real-time system, this paper designs and implements a schedulability analysis tool. It abstracts general task model in the first place and defines the logical mapping of task models in system to states of two types of timed automata. Based on model checking theory, this tool determines whether this system can be scheduled by timed automata reachability method, and finally tests the accuracy of that method through two simulation examples.