Author Login Editor-in-Chief Peer Review Editor Work Office Work

20 May 2012, Volume 38 Issue 10
    

  • Select all
    |
    Networks and Communications
  • XUE Xiao, LI Hui-Qin
    Computer Engineering. 2012, 38(10): 1-4. https://doi.org/10.3969/j.issn.1000-3428.2012.10.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The method of security assessment being used presently can not give accurate and objective result according to the practical situation of coal mine. Aiming at this problem, this paper puts forward a security assessment method of coal mine based on computational experiments. The experimental program is formulated by exploratory analysis, and the simulation environment is built by the technique of Agent modeling. The example uses parameters from a situation which is safe, and it simulates the process of the accident. Simulation result demonstrates that experts can make objective analysis and evaluation for the safety of coal mine.
  • GAO Wei-Wei, YI Hui-Ti, HU Yan-Jun, HU Hong-Lin
    Computer Engineering. 2012, 38(10): 5-8. https://doi.org/10.3969/j.issn.1000-3428.2012.10.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For Device-to-Device(D2D) links sharing the radio resources with the cellular links in cellular network, this paper proposes a resources allocation algorithm based on Signal to Noise Ratio(SNR). It establishes a convex optimization problem to maximize total system throughput on the basis of optimizing the received interference power and balancing SNR of all users. It solves the convex optimization problem using Lagrange multiplication method, and thus obtains the closed-form solution for this convex optimization problem. Simulation results illustrate that the algorithm can improve the SNR of the cellular links and increase the total system throughput effectively.
  • SONG Jian-Jun, HOU Zhi-Jiang, TU Wang-Cheng
    Computer Engineering. 2012, 38(10): 9-13. https://doi.org/10.3969/j.issn.1000-3428.2012.10.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To resolve the problem of marker extraction during the preprocessing of watershed algorithm, a gradient skeleton marker extraction method based on human visual characteristics is proposed in this paper. It marks all the valley point of gradient image to build up a connected skeleton. It chooses automatic threshold according to difference background in difference color space and picks out and abandons the saddle point whose gray value is larger than the saddle point threshold. After that, the skeleton is separated to some little discrete skeletons, each of them is a marker. Experimental results indicate that this algorithm can avoid the difficult of parameter initialization in traditional marker extraction algorithm and well suppress the over-segmentation to get a more satisfactory segmentation result.
  • ZHANG Qi, ZHANG Jin-Lin, RUI Ting, FANG Hu-Sheng
    Computer Engineering. 2012, 38(10): 14-17. https://doi.org/10.3969/j.issn.1000-3428.2012.10.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the case of illumination varies and shelter, the traditional algorithm can not track the targets fast and precisely. In order to solve the problem, a new method is proposed for target tracking, in which particle filtering is used to establish the target motion model and Scale Invariable Feature Transformation(SIFT) feature is introduced to create the target model. The possible position of the target in the current frame is predicted by particle filtering. The SIFT feature points of the possible area are calculated and the characteristics description vector is built to match the target. According to the matching result of the target model and the SIFT feature points of the target candidate region, the characterization vector is updated in the tracking process. Experimental results show that the proposed algorithm can improve the speed and accuracy of the target detection and tracking significantly.
  • WANG Xi, ZHANG Bin, YANG Yan, WANG Na
    Computer Engineering. 2012, 38(10): 18-21. https://doi.org/10.3969/j.issn.1000-3428.2012.10.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To resolve the problem that signature mechanisms based on Public Key Infrastructure(PKI) reduce the SOAP message transmission efficiency when protecting the Security Assertion Markup Language(SAML) assertion transport significantly in Web service authentication call process. This paper proposes Identity-based SAML Path Verification(IBSPV), which improves the transmission efficiency of the SOAP message by shortening the length of the signature value and the public key. Based on random oracle model, IBSPV can ensure the integrity of the SAML assertion and source unforgeability, protect the transmission path which can not be tampered with, and can prevent anti-replay attacks. By comparing the assertion length of IBSPV and PKI, it proves that IBSPV protocol improves the transmission efficiency.
  • XU Yong-Pan
    Computer Engineering. 2012, 38(10): 22-26. https://doi.org/10.3969/j.issn.1000-3428.2012.10.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Multi-RANSAC and RHT these methods are incapable to solve multi-models estimation effectually, and a multi-model estimation method with model-based clustering in conceptual space is proposed. Each data point is represented with a preference set of hypotheses models preferred by that point, and the Jaccard distance between two preference sets is described as a attribute of an data point, to perform a clustering operation using the improved Cobweb algorithm based on the attribute of the data points. Neither this method requires prior specification of the number of models, nor it necessitates parameters transformation, so that it can overcome missing detection and false detection of crossing models. Experimental results show the obvious effect and greater accuracy of the algorithm, thus can be used widely by vanishing point detection, self-calibration of camera, etc.
  • SONG Xue-Hua, LU Min, YUAN Yin-Nan, WANG Hong, ZHANG Yo-Hua
    Computer Engineering. 2012, 38(10): 27-30. https://doi.org/10.3969/j.issn.1000-3428.2012.10.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of efficiency and security, this paper proposes a design of steering-by-wire system based on FlexRay bus, presents the composition of system which is the steering wheel module, the actuator module, connecting by the communications network, and gives software and hardware implementation methods. With the help of the slave electronic control unit, the load of the main electronic control unit is reduced, which can achieve better control of the steering. Experimental results show that the design can realize the real-time control of the steering- by-wire system.
  • YAN Hua, WU Xiao-Yue
    Computer Engineering. 2012, 38(10): 31-33. https://doi.org/10.3969/j.issn.1000-3428.2012.10.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In the study of satellite data transmission schedule problem, schedule tasks are not adjusted after laying out the scheme. In practical, emergent conditions often appear. To solve this problem, the model for emergency task schedule is proposed. Satellite data transmission tasks are divided into regular task and emergency task. The model for emergency task is constructed. The scheduling algorithm is designed. It contains the determination of scheduling order, the adjusting strategy for initial scheme, and the scheduling process. Experimental results show that the algorithm can maximize the sum of the emergency tasks priority, and keep the initial scheme stable.
  • CENG Yi, DING Na, JU Meng
    Computer Engineering. 2012, 38(10): 34-37. https://doi.org/10.3969/j.issn.1000-3428.2012.10.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper researches the method for generating Unified Modeling Language(UML) activity diagram polymorphism test cases. It formally defines the activity diagram, and combines the Class Sets of Polymorphism Methods(CSPM) based on class diagram, Object Constraints Language(OCL) and Liskov replacement rules. It extends the nodes with polymorphic information in activity diagram, obtains the extended polymorphic activity diagram. Test cases are generated by traversing the obtained activity diagram which uses the proposed test path constructing method and coverage criterion. Experimental result shows that method can generate test cases with polymorphic information and improve the test coverage degree.
  • WANG Zheng-Feng, XIE Zhi-Feng, QIU Pei-Chao
    Computer Engineering. 2012, 38(10): 38-40. https://doi.org/10.3969/j.issn.1000-3428.2012.10.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper researches the influence of the data standardization for semantic relation similarity calculation. It extracts lexical pattern from huge text corpus, generates the word pair-lexical pattern matrix, employs three methods to standard the original data matrix, and uses law study method to calculate the similarity between relations. Experimental result shows that without any standardization, the classification task with a statistically significant average precision score is 0.87, z-score standardization is 0.89, interval standardization is 0.95, and weighted based on entropy is 0.96.
  • JIANG Li-Ping, ZHANG Zai-Ti
    Computer Engineering. 2012, 38(10): 41-44. https://doi.org/10.3969/j.issn.1000-3428.2012.10.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents social role ontology knowledge acquisition method, modeling methods and ontology representation method, including social group acquisition method, social role acquisition method, action acquisition method of social groups, relationship acquisition method of social role, axioms acquisition method of social role ontology. It is modeling of ontology by using the template technology, uses social role ontology representation with framework language, realizes axioms acquisition and automatic generation.
  • CHENG Xiang, SUN Ji-Yin, LI Lin-Lin, MEI Sheng, ZHANG Xin
    Computer Engineering. 2012, 38(10): 45-47. https://doi.org/10.3969/j.issn.1000-3428.2012.10.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    According to the characteristics of military grid applications and workflow, this paper proposes a scheduling algorithm based on grid workflow segmentation. The method of workflow modeling based on Directed Acyclic Graph(DAG) is used, and the related concept of grid workflow is defined formally. The compound relations between the basic workflow are determined, then scheduling the tasks in grid workflow. Example result shows that the algorithm can reduce the total time of the tasks execution in grid workflow, and it has good scheduling performance.
  • LI Jing, HAN Qi-Yun
    Computer Engineering. 2012, 38(10): 48-50. https://doi.org/10.3969/j.issn.1000-3428.2012.10.013
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the characteristic that virtual computing resources are distributed various, widely various and dynamic change, this paper proposes a resource cooperative discovery model based on topological-related groups. It uses prefix matching routing mechanism. The resources used in the tasks decomposed from a same application are related in terms of the underlying topology of the network. It ensures resource as far as adjacent to user node, and realizes cooperative resource discovery. Experimental result shows that the model can improve the efficiency of resource cooperative discovery.
  • ZHANG Li-Beng, LI Lin, LI Song, HAO Xiao-Gong
    Computer Engineering. 2012, 38(10): 51-53. https://doi.org/10.3969/j.issn.1000-3428.2012.10.014
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper researches the Simple Continues Near Neighbor Chain(SCNNC) query with predestination data chain size, based on Hilbert curve, the SCNNC_H_SS algorithm is proposed. The redundant data information can be duly deleted and the number of the effective data point is decreased with operation of the algorithm. The redundant computation is avoided. To maintenance and update the SCNNC, the SCNNC_H_CS algorithm is given. Theatrical analysis and experimental results show that when the scale of data set and the chain are great, the algorithm is superior to the methods based on the tree index structure.
  • WANG Jian-Feng, ZHANG Tian-Hong, HUANG Xiang-Hua
    Computer Engineering. 2012, 38(10): 54-56. https://doi.org/10.3969/j.issn.1000-3428.2012.10.015
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper introduces real-time operating system, proposes a software development of complex control system based on Matlab. It researches rapid development of control software for target platform, application of real-time code generated by Matlab/RTW, and solves key issues of code modification, extraction and migration. The integration development process from digital simulation to real-time hardware in loop simulation and the final product level embedded software for complicated control system are realized. Hardware in loop simulation of digital controller for a certain type of micro turbine engine shows that the software development method for control software is high reliability and efficiency.
  • ZHANG Yan
    Computer Engineering. 2012, 38(10): 57-59. https://doi.org/10.3969/j.issn.1000-3428.2012.10.016
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an evolutionary generation of multiple paths coverage test data based on metamorphic relation. Through metamorphic relations of the program under test, new test data can be derived from the already generated test data, and when the path traversed by the new test datum is one of the target ones which are traversed, its test datum is also generated accordingly, the efficiency of generating test data is improved. Application results of triangle classifier program validates the effectiveness of the method.
  • DIAO Lei, LV Chi-Yuan, DIAO Guo-Sheng
    Computer Engineering. 2012, 38(10): 60-62. https://doi.org/10.3969/j.issn.1000-3428.2012.10.017
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Software architecture describes high-level structure and behavior of system, and the dynamic description of software architecture is often used to guide analysis and testing. Based on this, a new test path coverage technique on architecture level is presented. Directed Acyclic Graph(DAG) is derived to express the dynamic characteristics of software architecture, from which described by chemical abstract machine. Test paths are generated based on the criteria, according to the defined basic path courage criteria and the algorithm to generate testing sequence. It regards C/S architecture as an example, and the technique on generating test paths of software architecture is shown valid and effective.
  • GAO Fei, ZHOU Hua-An, SUN Yan
    Computer Engineering. 2012, 38(10): 63-66. https://doi.org/10.3969/j.issn.1000-3428.2012.10.018
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the characteristic that topic classification lacks training samples and has similar topics, this paper proposes a topic feature extracting method based on association rule and rough set. The method uses associated rules mining to generate rules set and text topic, finds different particle levels of topic by regulating the minimum support and minimum confidence of subject matters, and reduces attributes by Vector Space Model(VSM) combined with rough set. Experimental result shows that the method can preferably mine the text topic, and prompt the precise rate in topic classification.
  • LIU Jin-Ling, LIU Dan, ZHOU Hong
    Computer Engineering. 2012, 38(10): 67-69. https://doi.org/10.3969/j.issn.1000-3428.2012.10.019
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Extraction Method of Chinese Short Message Text Lexical Chain Based on HowNet
  • BO Ling-Ling, ZHANG Yo-Beng, XU Chao
    Computer Engineering. 2012, 38(10): 70-73. https://doi.org/10.3969/j.issn.1000-3428.2012.10.020
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a kernel-based DBSCAN algorithm which is aiming at the complexity of the civil aviation passenger behavior. The algorithm uses the DBSCAN clustering technology, combines with the nuclear mapping mechanism, and realizes civil aviation customer segmentation. Experimental results show that the method can highlight the differences between samples, and also can reduce the confusion of the clustering results and the cluster purity is improved by nearly 30%.
  • WANG Jia-Sheng, TUN Xiao-Beng, LIAO Wei, CHEN Yong-Jiang
    Computer Engineering. 2012, 38(10): 74-76. https://doi.org/10.3969/j.issn.1000-3428.2012.10.021
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of node importance evaluation in weighted complex networks, this paper proposes an improved method based on agglomeration. Evaluation of edge importance is introduced considering the influence over node importance from the characteristics of node connection. By regulating the coefficient, it can adjust the influence of edge over node importance and the relative importance. Example result verifies the feasibility and validity of the improved method.
  • XIE Jing-Zhi, DIAO Ling, LUO Men-Feng
    Computer Engineering. 2012, 38(10): 77-79. https://doi.org/10.3969/j.issn.1000-3428.2012.10.022
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems of the network conflict and interference between the ultrasonic sensor caused by multi-target tracking, this paper builds a multi-target real time tracking and feedback control platform, and puts forward an effective negotiation sensor node task scheduling strategy. In view of the network’s asynchronous measurement problem, it studies the node Extended Kalman Filter(EKF) localization algorithm, fulfills the multi-target real time locating and tracking. Experimental result shows that the strategy avoids efficiently the ultrasonic sensor measurement interference and the network conflict caused by multi-target tracking, realizes the robot networked real time feedback control and multi-robot synergy control.
  • YAN Ai-Han, HAN Wen-Xian, CHEN Yan-Yan
    Computer Engineering. 2012, 38(10): 80-82. https://doi.org/10.3969/j.issn.1000-3428.2012.10.023
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In single carrier Wireless Mesh Network(WMN), congestion feedback is a key factor to system performance. This paper presents a Cross Layer Congestion Feedback(CLCF) algorithm. Congestion feedback is used to integrate various protocol layers into a unified framework to be optimized. Different layers carry out distributed computation using local information to achieve individual optimality, that is, to improve the performance of the whole system, congestion control, routing strategy, Media Access Control(MAC) scheduling and Adaptive Modulation Coding(AMC) mode are respectively optimized in transport layer, network layer, link layer and physical layer. Simulation results indicate that the throughput of the proposed algorithm is increased by 18% compared with IEEE802.11 TCP.
  • YANG Chun-De, QIN Zong-Wei
    Computer Engineering. 2012, 38(10): 83-85. https://doi.org/10.3969/j.issn.1000-3428.2012.10.024
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem of DCMPH algorithm can not choose the connection path reasonably, an improved meeting delay-constrained multicast routing algorithm is proposed in this paper. In the algorithm, if the destination nodes can not use the least-cost path to join the multicast tree, it calculates the least-delay path to all the nodes in the multicast tree, and then selects the least-cost path which meets the delay constraint to add to the multicast tree. Experimental results show that the cost of the new algorithm in constructing multicast routing tree is superior to DCMPH algorithm.
  • CHEN Jin-Chao, DU Cheng-Lie, HUANG Dun-Jiang
    Computer Engineering. 2012, 38(10): 86-88. https://doi.org/10.3969/j.issn.1000-3428.2012.10.025
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper analyzes the requirements of the real time communication under Xenomai platform. It presents an Ethernet-based real time communication solution. It ports the Ethernet Network Interface Card(NIC) driver from the Linux kernel to the real time kernel. Time Divide Multiple Access(TDMA) based Media Access Control(MAC) supplies a definite period of time sending data frames for all nodes. It uses demultiplexing method to solve the priority inversions of threads and data packets, and also uses zero-copy technology to reduce the times when data packets cross the protocol stack. Experimental results show that this solution can realize the real time communication of inter task under Xenomai platform.
  • YANG Dong, YANG Xiao-Feng, CHEN Jiang
    Computer Engineering. 2012, 38(10): 89-91. https://doi.org/10.3969/j.issn.1000-3428.2012.10.026
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An optimization algorithm is proposed to restrain the co-site intermodulation interference. The interference can be effectively suppressed with reasonable frequency assignment. It uses genetic algorithm with a new fitness function to optimize the assignment process. Comparison and simulation analysis are done for different fitness function. Result indicates that using the minimum distance of intermodulation signal and working frequency for fitness function makes the assignment process quick and effective. The effect of intermodulation interference can be reduced.
  • SHU Bing-Lian, FEI Guang-Shu, ZHANG Lei, HE Zhi-Guang, LEI Hao
    Computer Engineering. 2012, 38(10): 92-94. https://doi.org/10.3969/j.issn.1000-3428.2012.10.027
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to improve the system throughput in cognitive radio and ensure the fairness of spectrum allocation, this paper proposes a spectrum allocation strategy based on Quality of Service(QoS) grading in cognitive radio. It constructs a comprehensive decision model which can discriminate the cognitive users’ QoS level according to their business types. It employs the spectrum allocation for cognitive customers combined with Collaborative Max Sum Bandwidth(CMSB) algorithm. Simulation experimental results demonstrate that the proposed spectrum allocation strategy can meet the QoS demands of cognitive users, and ensure the higher system throughput and access fairness.
  • CHEN Guang-Beng
    Computer Engineering. 2012, 38(10): 95-98. https://doi.org/10.3969/j.issn.1000-3428.2012.10.028
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A key problem in deploying large sensor networks is to obtain the most useful information from the network when subject to constraints on power, which requires the solution should be a online distributed optimization to select and activate right sensors on condition that the utility function is not known a priori. In order to address above challenges, this paper develops an efficient distributed online greedy algorithm, which can be applied to any setting where the utility function satisfies an intuitive diminishing return property of submodularity. The algorithm does not require the model to be specified in advance, and learns to optimize the objective function in an online distributed manner, requires only a small number of messages to be exchanged with high probability, which can scales well to large sensor deployments. Experimental results show the algorithm’s performance converges towards the performance of the common offline greedy algorithm and is effective on real-world sensing tasks.
  • RAO Hao, YUAN Jian
    Computer Engineering. 2012, 38(10): 99-101. https://doi.org/10.3969/j.issn.1000-3428.2012.10.029
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Because the lifetime of Wireless Sensor Network(WSN) is restricted by the energy of nodes, this paper presents an energy saving algorithm based on Node Survival Time(NST). According to the surplus energy after the node’s receiving, sending and processing data, the concept “wheel” of the energy saving algorithm is proposed. It improves on the basis of the existing threshold function and the cluster-head selection gets its best cluster head node by the improved threshold function so as to prolong the life time of the nodes and prolong the round cycle of the cluster nodes with lower energy consumption. Simulation results demonstrate that the algorithm is efficient for reducing dead speed of nodes and increasing the network lifetime.
  • LI Guang-Shi, MENG Xiang-Ru
    Computer Engineering. 2012, 38(10): 102-104. https://doi.org/10.3969/j.issn.1000-3428.2012.10.030
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to prevent unauthorized accessing the vector data stored in the Oracle Spatial, an independent encryption system is designed outside Oracle. It selects the field as encryption granularity and uses 3DES algorithm to encrypt spatial fields, ensuring the spatial data do not need additional storage space after encrypting. An R-tree encryption method based on DES is presented. It selects the node as encryption granularity, and adopts “overlap” way to encrypt spatial index, which ensures the integrity of encrypted R-tree, and reduces the amount of data required to decrypt for each query. Experimental results show that the encryption system realizes transparent encryption/decryption function for spatial data, suitable for various applications of Geographic Information System(GIS) based on Oracle, and provides flexible and efficient safety protection.
  • GUI Bing-Xiang, FENG Hong-Cai
    Computer Engineering. 2012, 38(10): 105-107. https://doi.org/10.3969/j.issn.1000-3428.2012.10.031
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The interconnection between the heterogeneous networks causes network security become more complex, and the isolated security strategy is no more valid. For the infective and epidemic external network attack, this paper presents an anomaly detection mechanism based on the principle of Human Immune System(HIS), which is applied in complex heterogeneous network and induces network entity to collaboratively work in order to effectively detect traffic anomaly from network attack. Simulation experimental results show that this anomaly detection approach can availably identify the prevalent network attack.
  • ZHENG Li-Xiong, LI Jing-Shan, LI Su-Ke, YUAN Chun-Yang
    Computer Engineering. 2012, 38(10): 108-110. https://doi.org/10.3969/j.issn.1000-3428.2012.10.032
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a phishing URL detection method. It uses edit distance to find the domain names similar to normal domain names. According to domain name information, domain word maximum match features, domain name segmentation features and URL segmentation features are extracted to train a classifier, which can detect whether the URL is a phishing URL. Experiments on the real data set show that the method can achieve a precision of 94%.
  • WANG Zheng-Xi, DIAO Dun-Ge
    Computer Engineering. 2012, 38(10): 111-113. https://doi.org/10.3969/j.issn.1000-3428.2012.10.033
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The algorithm able to resist power analysis attacks for elliptic curve cryptogram is always inefficient. Aiming at the problem, the method of equivalent consumption coding is applied to scalar multiplication of elliptic curve cryptogram, so that it is able to resist power analysis attacks by removing the power difference in scalar multiplication to cover the related key information. Theoretical analysis shows that the improved algorithm has higher efficiency comparing with binary representation power analysis attack algorithm and NAF window method of power analysis attack algorithm.
  • MA Dan-Dan, CHEN Qi, DANG Zheng-Qin, ZHANG Jin-Man
    Computer Engineering. 2012, 38(10): 114-116. https://doi.org/10.3969/j.issn.1000-3428.2012.10.034
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Ciphertext policy Attribute-based Encryption(ABE) mechanisms mostly use a single authority responsible for managing and distributing the keys of all users, which easily causes system bottlenecks, and the system requirements for a single authorization to be fully credible, which is difficult to meet the security needs of distributed applications. This paper proposes a multi-agency ciphertext policy ABE scheme. The authority can only issue the attribute keys that in his purview for users, and can not communicate with each other. And the program uses a central authority for the user to generate a random public key. Parameter randomization helps attribute authorities to calculate the key that solves the collusion attack. Theory analysis proves that the scheme not only can retain the easy expressive of access control features of CP-ABE, but also can reduce a single center’s burdens and risks.
  • SHU Jian
    Computer Engineering. 2012, 38(10): 117-119. https://doi.org/10.3969/j.issn.1000-3428.2012.10.035
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The key establishment protocol called LLH can not resist impersonation attack. Aiming at this problem, an improved protocol based on signcryption is proposed. It uses elliptic curve cryptosystem technology under the computational Diffie-Hellman assumption, combines authentication and session key and implements the functions of mutual authentication and key confirmation, so that the security is enhanced. Theoretical analysis results show that the proposed protocol has strong security features and can be resistant to impersonation attack.
  • ZHANG Yong, SHI Bao-Meng, HE Yuan-Xiang
    Computer Engineering. 2012, 38(10): 120-122. https://doi.org/10.3969/j.issn.1000-3428.2012.10.036
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new Identity-based and Key Encapsulation Mechanism(IB-KEM) encryption scheme. The symmetric encryption scheme is used to encryption and description for message, and the identity-based encryption scheme is used to manage the symmetric encryption key. The new scheme is a natural extension of the encryption scheme which is provably secure under chosen ciphertext attack in the standard model. The security of the new scheme is under Decisional Diffie-Hellman(DDH) assumption. The security analysis shows that the new scheme is indistinguishable under adaptive chosen ciphertext attack.
  • GE Rong-Liang, GAO De-Zhi, LIANG Jing-Ling, ZHANG Yun
    Computer Engineering. 2012, 38(10): 123-124. https://doi.org/10.3969/j.issn.1000-3428.2012.10.037
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the bilinear pairing and combining with the advantages of designated verifier signature and proxy signature, certificateless proxy signature with designated verifier is proposed. Certificateless signature schemes do not need the public key certificates and effectively solve the inherent key escrow problem in identity based signature schemes. The designated verifier signature can protect some sensitive information of the signer. The proxy signature allows the proxy signer sign the information instead of the original signer who can not do that. This scheme can satisfy the requirements of the certificateless designated verifier proxy signature and has high efficiency.
  • LI Feng, ZHOU Meng
    Computer Engineering. 2012, 38(10): 125-127. https://doi.org/lifeng@dhu.edu.cn
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Simple Object Access Protocol(SOAP) has security loophole if Time Stamp issuing Authority(TSA) frauds. In order to solve the problem, this paper proposes a Time stamp Protocol of SOAP based on Secondary digital signature(TPSS), which can regulate TSA’s behavior. It requires TSA to create undeniable evidence when issuing time stamp. Necessarily, other entities can verify the authenticity of timestamp. The protocol is adopted in Hulft 7 system, and the results show that the protocol can regulate TSA’s behavior and sender’s action effectively. And a more secure and more stable mechanism for network transporting can be established by the protocol.
  • XIU Cai-Jing, CHEN Hui
    Computer Engineering. 2012, 38(10): 128-130. https://doi.org/10.3969/j.issn.1000-3428.2012.10.039
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper designs path tracking controller based on preview control thought for autonomous vehicle that is non-linear controlled object. Controller includes two parts, preview control and compensation control, preview control previews ahead road by simulation for the process of driving, and generates control signal of steering angle according to the curvature of road, while the compensation control is the amendment for the interference encountered in the vehicle lane deviation from the original correction. Simulation experimental results show that the proposed control algorithm can ensure tracking reference path of autonomous vehicles accurately, and has good robustness.
  • ZHANG Chao, LIN Feng, DIAO Yu-Meng
    Computer Engineering. 2012, 38(10): 131-133. https://doi.org/10.3969/j.issn.1000-3428.2012.10.040
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In intelligent surveillance system, the result is seriously influenced by shadow on sunny days. This paper proposes an algorithm to remove the shadow from images. It detects shadow regions using physical features of shadow for an initial result with less shadow. Three properties of shadow, luminance, RGB and chrominance are taken into account, to get the primary result. And uses morphological methods to improve result. Using the similarity of gray density, texture value and the gradient value, a good result can be obtained. Experimental result shows that the general accuracy of this algorithm is increased from 68.47% to 89.17%.
  • YANG Yi, CAO Xiang-Yu, YANG Qun
    Computer Engineering. 2012, 38(10): 134-136. https://doi.org/10.3969/j.issn.1000-3428.2012.10.041
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a new variable step size Normalized Least Mean Square(NLMS) algorithm based on exponential function according to NLMS. A function relationship is established between signal error and step size μ, and the contradiction between convergence speed and maladjustment error is solved. Simulation experimental results show that the ameliorative LMS algorithm has faster convergence speed and smaller maladjustment error than the commonly LMS algorithm and a variable step size LMS algorithm based on hyperbolic tangent function.
  • DU Lei, LIU Qiang-Bin, ZHANG Xian-Kun, JIANG Wei
    Computer Engineering. 2012, 38(10): 137-140. https://doi.org/10.3969/j.issn.1000-3428.2012.10.042
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the problem of insufficiency of predictable capability in BDI Agent model, this paper presents a formalization of predictable element within BDI model and indicates the extended axiom, semantics and decision-making behavior. The soundness and the completeness of the BDIP model are proved. Corresponding the decision-making process and algorithm is given. The implemented BDIP Agent model is successfully adopted in a case of the emergency evacuation, and case shows that, compared with the BDI model, this model can provide a better basis for decision-making, and better formation of intentions.
  • LIU Wei-Feng, HE Xia
    Computer Engineering. 2012, 38(10): 141-143. https://doi.org/10.3969/j.issn.1000-3428.2012.10.043
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To solve the group decision making problems with the information about attribute weights incompletely known and fuzzy judgment matrices on attribute values, a two-step decision analysis method is proposed. According to deviation existed between sort vector of multiplicative fuzzy consistent judgment matrix and fuzzy judgment matrix, sort vector of fuzzy judgment matrix of each expert is obtained by building and solving a programming model. By minimizing the deviations between sort vectors of fuzzy judgment matrix of each expert and fuzzy judgment matrix of group experts, sort vector of group experts is obtained by building and solving a programming model. And a two-step method of group decision making based on fuzzy judgment matrices is obtained. Two examples are used to illustrate the feasibility and applicability of the proposed method.
  • LIN Lin, HUANG Na-Tian, GAO Xin-Quan
    Computer Engineering. 2012, 38(10): 144-147. https://doi.org/10.3969/j.issn.1000-3428.2012.10.044
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel Fourier Neural Network(FNN) based on DFP emendatory Quasi-Newton method in dealing with the problems of local minimum, slow learning rate and poor generalization ability of the FNN based on steepest descent method. The newly FNN has low computational complexity, good generalization ability and global optimization. Two numerical examples are utilized to validate the proposed learning algorithm by comparing with BP neural network and two kinds of FNNs. Numerical example results show that the computational complexity is 5% of the steepest descent method’s and 80% of the least squares method’s, and the new learning algorithm has good generalization capacity.
  • HU Yi-Fei, XIAO Dun, WU He-Lei
    Computer Engineering. 2012, 38(10): 148-150. https://doi.org/10.3969/j.issn.1000-3428.2012.10.045
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The conventional Block Principal Component Analysis(BPCA) method ignores the difference in quality between extracted local features, and it gives a weak performance under condition of occlusion. A recognition confidence based decision fusion algorithm for block PCA is proposed. The approach divides images into blocks, and each block is processed by PCA and nearest neighbor classifier independently. The recognition confidence is proposed to measure the confidence of individual results, and the final decision is made in favor of the individual result with respect to maximum recognition confidence. Experimental results based on the benchmark AR database indicate that the proposed method can achieve better recognition rates than the conventional PCA and BPCA methods.
  • LIU Yan-Yan, CAO Hui-Rong, WANG Jian-Guo, DIAO Yi-Bin
    Computer Engineering. 2012, 38(10): 151-153. https://doi.org/10.3969/j.issn.1000-3428.2012.10.046
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    An Enhanced Two-dimensional Canonical Correlation Analysis(E-2DCCA) method is presented to solve the problem that 2DCCA requires much storage space and runtime. By making use of the spectrum representation of images, a new class-membership matrix is constructed. A modified correlation criterion function is proposed from the angel of favoring classification. Two-dimensional Principal Component Analysis(2DPCA) method is used for further dimensional reduction. Experimental results on ORL and combined face databases show that the features have powerful ability of recognition.
  • YUAN Bao-Hua, WANG Huan, LIN Meng-Wu
    Computer Engineering. 2012, 38(10): 154-156. https://doi.org/10.3969/j.issn.1000-3428.2012.10.047
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a face recognition method based on Local Ternary Pattern(LTP) and Fisherfaces. LTP operator is used to extract the LTP Histogram Sequence(LTPHS) from block grey-level face images. Fisherfaces based on feature selection method is applied to extract feature subspace. Face recognition is realized based on the nearest neighbor principle. The proposed method can effectively extract the face texture, and can greatly reduce the amount of training data, and the dimension of the amount of data has nothing to do with the original image size. Simulation experimental results illustrate that the proposed method obtains better recognition rate on both ORL and YALE face database comparing with classical methods.
  • HE Zong-Yao, HAO Wei
    Computer Engineering. 2012, 38(10): 157-160. https://doi.org/10.3969/j.issn.1000-3428.2012.10.048
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Two novel Opposition Self-adaptive Harmony Search(OSHS) algorithms are proposed to solve multi-dimensional function optimization problems. OSHS is based on Self-adaptive Harmony Search(SHS) algorithm. In order to enhance the quality of the initialized harmony memory, the opposition initialization is introduced in OSHS. An opposition self-adaptive mechanism is designed to enhance the exploration of OSHS. Two different ways are designed for setting the parameter. Meanwhile, the two ways’ impact on the convergence speed of OSHS is discussed. The simulation results for four benchmarks show that compared with the traditional search algorithms, the two new algorithms performe better in solution quality and convergence rate.
  • TUN Lin-Bei, XIAO Hua-Yong, YANG Zong-Ze
    Computer Engineering. 2012, 38(10): 161-163. https://doi.org/10.3969/j.issn.1000-3428.2012.10.049
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper gives a few filling and deleting rules to imitate artificial intelligence to solve Sudoku under the candidate mode, and based on the proposed artificial intelligence rules, it constructs the difficulty scale and the algorithm of artificial intelligence solving. Validating the scale with a sample of 500 Dr.Sudoku puzzles rated externally into five gradations of difficulty. Goodman-Kruskal r coefficient is 0.82, indicating significant correlation the two scales. It gives an algorithm that can generate five different levels of Sudoku puzzles randomly.
  • DING Dong, SHU Yun-1, KU Chao, WANG Liang
    Computer Engineering. 2012, 38(10): 164-167. https://doi.org/10.3969/j.issn.1000-3428.2012.10.050
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the characteristic that traffic flow of different nodes influences each other in complex traffic network, this paper presents a novel short-term traffic flow forecasting method based on influence model. Based on the analysis of the difficulties of the traffic flow forecasting problem, this method introduces the theory of influence model to model. As the traffic flow of each node is considered as a hidden Markov process, the whole traffic network is composed of many interactive hidden Markov processes. This method uses the EM algorithm to learn parameters in the forecasting model. Experimental results show that the method not only has higher prediction accuracy, but also presents the interactive influence and dynamic evolution of the traffic flow of different nodes in traffic network.
  • SHU Jia, YAN Dong-Sheng, ZHANG Jian-Meng
    Computer Engineering. 2012, 38(10): 168-170. https://doi.org/10.3969/j.issn.1000-3428.2012.10.051
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    On account of the problem that noise points are various and the background is difficult to be extracted in the videos, the lane extraction method based on average vehicle trajectory is proposed. Vehicle positions are acquired in each frame by tracking and the center points of these positions is fit into an average trajectory. One suitable frame is selected from video frames as background and morphologic processing is done so as to eliminate the influential noise points such as the sky or scenery on both sides, and the binary background is obtained by further processing. The lane is extracted by matching the average trajectory with the binary background. Experimental results show that this method can apply to varieties of roads, and it has high success rate and great flexibility and adaptability.
  • JIAN Chu-Ju, WU Hui-Gong
    Computer Engineering. 2012, 38(10): 171-174. https://doi.org/10.3969/j.issn.1000-3428.2012.10.052
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Dynamic multi-objective immune optimization algorithm(DMOAIS), which is based on the function of biological immune system , is proposed to solve dynamic multi-objective problems. The affinity of antibody is designed by the strength and crowding distance of antibody. The environment memory pool that is used to saving enlist antibodies is designed for strengthening the diversity of population. Memory cells are participated in the evolution of the similar or the same environment initial population. DMOAIS is compared against other algorithms to solve dynamic multi-objective problems. Numerical experiments illustrate that DMOAIS is promising and competitive to the compared algorithms in solving dynamic multi-objective optimization problems, tracking rapidly dynamic Pareto surface, and showing a powerful exploitation capacity for real-word dynamic multi-objective optimization problems.
  • ZHANG Xiang-Qing, WANG Lei, BO Feng
    Computer Engineering. 2012, 38(10): 175-177. https://doi.org/10.3969/j.issn.1000-3428.2012.10.053
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Original Least Square Support Vector Machine(LSSVM) algorithm can not reach desired precision in multi-scale regression. To solve the problem, a multi-scale wavelet LSSVM algorithm is proposed by using a wavelet kernel. Mexican-hat wavelet function is used as the support vector kernel function, and the Least Square Wavelet Support Vector Machine(LS-WSVM) algorithm is presented. On this basis, the global optimum of the multi-scale regression modeling problem can be obtained by solving a quadratic programming problem. As a result, the regression model can effectively approximate multi-scale signals. Simulation results show that LS-WSVM is an efficient modeling method, and has high precision.
  • CHANG Diao-Wei, LI Jian-Wei, ZHANG Ta-Beng, AI Shi-Ka-Er-?Ai-Mu-Dou-La
    Computer Engineering. 2012, 38(10): 178-181. https://doi.org/10.3969/j.issn.1000-3428.2012.10.054
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Due to the great impact on stable feature extraction in global texture analysis for feature extraction by text or character combinations, and existing local feature extraction methods’ shortages, this paper presents a text-independent writer identification method for Uyghur handwritings based on local structure segmentation and Codebook construction. The proposed method extracts representative contours from handwriting samples according to pixel values, generates a Codebook of specified writer to depict writer’s writing style and uses Codebook to measure the similarity of different writers to achieve writer identification. Experimental results demonstrate that the presented method is a feasible and applicable writer identification method with favorable performance.
  • LI Jing, YANG Xiao-Fan, SUN Qi-An
    Computer Engineering. 2012, 38(10): 182-184. https://doi.org/10.3969/j.issn.1000-3428.2012.10.055
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a novel Virtual Kernel(VK) text categorization algorithm. It obtains a virtual kernel for each categorize through evaluating the contribution of each feature term. When an unlabeled text comes, the algorithm can give the categorize it belongs to through evaluating the attraction which is from every virtual kernel. Experimental results show that compared with the k Nearest Neighbor(kNN) and na?ve Bayes algorithms, the proposed algorithm is remarkably superior to them in terms of classification efficiency and time cost.
  • WU Xiao-Long, GUO Bing, CHEN Yan
    Computer Engineering. 2012, 38(10): 185-187. https://doi.org/10.3969/j.issn.1000-3428.2012.10.056
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a modeling of energy consumption in embedded software architecture level based on the software characteristic. It contains the idea that there is non-linear relationship between software characteristic and software energy consumption. And it presents a new BP neural network algorithm based on improved genetic algorithm to train and simulate the function. This algorithm takes three aspects into consideration to improve the genetic algorithm in order to enhance the simulation effect. Experimental results show that the deviation between the predictive value of energy consumption model based on this algorithm and the actual energy consumption value is smaller.
  • LIU Rui-Juan, HE Chuan-Jiang, YUAN Shu
    Computer Engineering. 2012, 38(10): 188-190. https://doi.org/10.3969/j.issn.1000-3428.2012.10.057
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The SLGS model can not deal with intensity inhomogeneity, while the RSF model is sensitive to initialization. Incorporating the local information defined by the RSF model into the SLGS model, this paper proposes a novel active contour model in a partial differential equation formulation. A signed pressure force function is defined by a linear combination of the global fitting values defined by the SLGS model and the local fitting values defined by the RSF model. By choosing appropriately the parameter that controls the influence of the global and local fitting values, the proposed model can efficiently deal with intensity inhomogeneity and allows for the flexible initialization. Experimental results show that the proposed model is more accurate than the SLGS model.
  • TANG Ting
    Computer Engineering. 2012, 38(10): 191-193. https://doi.org/10.3969/j.issn.1000-3428.2012.10.058
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    To overcome the problem of low retrieval rate for scaled and rotated texture image, this paper proposes an effective Rotation and Scale(RS) invariant features extraction method based on quaternion wavelet and Log-polar. It uses Log-polar transformation to make the rotated and scaled image shift along horizontal and vertical directions. Quaternion Wavelet Transform(QWT) is employed to decompose the image transformed by Log-polar and the RS invariant feature of the image is obtained. The proposed method computes Rayleigh distribution as the invariant feature based on the coefficients of QWT high frequency subbands and uses Kullback-Leibler Distance(KLD) as the similarity measure of features. Experimental results show that the proposed method can improve the retrieval accuracy of image.
  • LIU Yi, SUN Fu-Jiang, JIA De-Shen
    Computer Engineering. 2012, 38(10): 194-196. https://doi.org/10.3969/j.issn.1000-3428.2012.10.059
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    GrabCut algorithm based on graph cuts is less efficient because it uses the whole pixels to estimate Gaussian Mixture Model(GMM) parameters by iteration. Aiming at this problem, this paper proposes a fast JPEG image segmentation algorithm based on graph cuts. On the basis of GrabCut algorithm, the Direct Current(DC) coefficients of JPEG image that constitute the low-frequency image are used to iteratively estimate the GMM parameters, which greatly reduce the number of training samples. Experimental results show that this algorithm can shorten the segmentation time of high-resolution JPEG image while preserving the segmentation accuracy.
  • DIAO Rui-Bin, ZHANG Yan-Ling, WANG Ji-Dong, YANG Bin
    Computer Engineering. 2012, 38(10): 197-199. https://doi.org/10.3969/j.issn.1000-3428.2012.10.060
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to model 3D realistic virtual outdoor scenes, a terrain texture synthesis algorithm is proposed based on multi-sample in this paper. By using terrain Digital Elevation Model(DEM) data and texture sources image, and synthesis rules defined according to elevation and slope, the algorithm synthesizes appropriate terrain texture image automatically. Experimental results indicate that terrain texture synthesized by this algorithm can better reflect true ground characteristic of natural terrain, and enhance visual effect of 3D terrain.
  • BO Lian-Bin, DIAO Hai-Feng, SUN De-Di, LUO Bin
    Computer Engineering. 2012, 38(10): 200-202. https://doi.org/10.3969/j.issn.1000-3428.2012.10.061
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes an algorithm for medical image registration fused with gradient information. It extracts the complementary scale space feature points from images and calculates the gradient information around the feature points, sets the Rényi mutual information as the object function, and uses the generalized nearest-neighbor graph to estimate the Rényi entropy. Experimental results show that the proposed algorithm has better performance of speed, precision and robustness.
  • DIAO Dun-Gong, KANG Wen-Xiong
    Computer Engineering. 2012, 38(10): 203-205. https://doi.org/10.3969/j.issn.1000-3428.2012.10.062
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aimming at the defects of Posucue algorithm which is time-consuming in finding copy-paste forgery in image tampering, a new algorithm based on Principal Components Analysis(PCA) of projection features is put forward. A tampered image is divided into many overlapped small image blocks. The horizontal projection and vertical projection of each image block are gained to build up a matrix. Dimensionality reduction of this matrix is completed by PCA. Then Lexicographic Sorting is applied. With a threshold distance of each neighborhood block in the dimen- sionality reduced matrix, the copy-paste area can be found. Experimental result shows that this new algorithm can find the exact copy-paste areas and be more rapid than Posucue algorithm.
  • XUE Cui-Gong, XU Meng, XU Xiang, GU Chao, YAN Gang
    Computer Engineering. 2012, 38(10): 206-208. https://doi.org/10.3969/j.issn.1000-3428.2012.10.063
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new learning-based super-resolution algorithm is presented. Pyramid is used to extract the facial gradient distribution features, the standard face training database is established for the study model, these features are combined with pyramid-like parent structure to predict the best prior. And through the Bayesian Maximum A Posterior(MAP) frame, the high resolution face image is captured. Experimental results show that the proposed algorithm synthesizes high-resolution faces and eliminates the noise with better visual effect, and the average of peak signal-to-noise ratios is improved about 1.19 dB to 2.4 dB compared with some existing face super-resolution algorithms.
  • LIU Ji-Gong, GU Zhen-Gong, QIN Ti-Zhong, YANG Jie, HU Yang-Jie
    Computer Engineering. 2012, 38(10): 209-211. https://doi.org/10.3969/j.issn.1000-3428.2012.10.064
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A Nonsubsampled Contourlet Transform(NSCT) image denoising method based on Linear decreasing Weight Particle Swarm Optimization(LinWPSO) is proposed in this paper. This method acquires the optimal threshold of Generalized Cross Validation(GCV) risk function by using LinWPSO in the NSCT domain, and removes the noise through soft threshold function, which does not need the prior information of noise variance. Experimental results show that the proposed method can more effectively reduce Gauss noise in remote sensing image and improve the Peak Signal to Noise Ratio(PSNR) of the image.
  • WU Tie-Bin, SHU Gong-Qiu, SUN Bei, LI Yong-Gang, ZHANG Bin
    Computer Engineering. 2012, 38(10): 212-214. https://doi.org/10.3969/j.issn.1000-3428.2012.10.065
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    There are some problems in the zinc purification such as slow variation in parameters, noise in field data, and multiple correlation between variables, which lead to the difficulty of cobalt ion prediction. Partial Least Squares(PLS) is used to eliminate the noisy of data, lower the multiple correlation and reduce the dimensions of the input samples. And to demonstrate the contribution of the parameters for the system, a weighting method is introduced in the Least Squares Support Vector Machine(LSSVM). The parameters of LSSVM model are optimized by improved Particle Swarm Optimization(PSO) algorithm to escape from the blindness of man-made choice. The experimental verification analysis is performed using the industrial production data from purification process. Simulation result shows that the proposed algorithm satisfies the requirements of cobalt ion concentration prediction in industrial field, and it has higher accuracy compared with Partial Least Squares Regression (PLSR) and LSSVM.
  • YUAN Ji-De, HUANG Wen-Jun, LIU Wei-Jun
    Computer Engineering. 2012, 38(10): 215-217. https://doi.org/10.3969/j.issn.1000-3428.2012.10.066
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A design of the main controller applicable to Distributed Control System(DCS) is presented. The hardware platform of the main controller centers on the high-performance processor is based on PowerPC architecture, and the software platform is based on μC/OS-Ⅱ operating system. Dual parallel processing CPU unit is employed to improve the computing efficiency of main controller. The redundant topology of working and backup controller is used to attain higher reliability. PCI-Express communication interface is employed to assure the high-speed redundant communication between working and backup controller. Test results prove that the main controller has high reliability and excellent computing performance.
  • HUANG Shen, LI De-Wen, HUANG Wen-Jun, HUI Ke, JIN Jian-Xiang
    Computer Engineering. 2012, 38(10): 218-220. https://doi.org/10.3969/j.issn.1000-3428.2012.10.067
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a network middleware named SCNet with object-oriented and hierarchical structure, which is suitable for large-scale industrial control system. By encapsulating operating system, cross-platform ability is improved. It provides safe and easy object-oriented interfaces, which can be systematic reused by event demultiplexing, and transport framework. Except above, requirements of industrial application are considered. Therefore, data sorting, session redundancy and fault diagnosis are designed and TCP flow rebuild problem is solved, fault tolerance and availability of the network are improved. Experimental results show that SCNet not only has good reusability and expansibility, but also meets high performance and reliability requirements of industrial control system.
  • TU Xin-Chao, DONG Rong-Qing, SUN Dong-Dong, SHAO Mei
    Computer Engineering. 2012, 38(10): 221-223. https://doi.org/10.3969/j.issn.1000-3428.2012.10.068
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to enhance the efficiency of automatic turnout control system, this paper introduces the theory of time game automata, builds the networks of time games automata models of train, controller, turnout, fault detector, gives the winning condition specified by TCTL formula, outputs the winning strategy synthesized by tool Uppaal-Tiga and generates the control code. Simulation results indicate that the control strategy enhances the efficiency of trains.
  • LIU Cen, DIAO Yi-Jiang, SHI E-Feng, YAN Xin-Wen
    Computer Engineering. 2012, 38(10): 224-226. https://doi.org/10.3969/j.issn.1000-3428.2012.10.069
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper presents a System on Chip(SoC) used for non-magnetic flux meter, which can be used to detect various types of rotations. The focuses of the design are the architecture of SoC, the non-magnetic digital algorithm module and the connection between the microprocessor and external devices. By applying unified addressing techniques in the system, the microprocessor can directly control external devices. The chip is fabricated using standard 0.35 μm CMOS technology. Test result shows that the digital module of the SoC chip works properly.
  • ZHANG Liang-Xin, GENG Dao-Ai, ZHANG Shi-Yun, WANG Xiao-Lin
    Computer Engineering. 2012, 38(10): 227-229. https://doi.org/10.3969/j.issn.1000-3428.2012.10.070
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to solve nonlinear problems in trajectory tracking, the sliding-mode method is presented in tracking control of surface vessels. The intelligent sliding-mode controller is designed by combination of cloud model and exponential reaching law so as to alleviate the chattering. With reasoning method of cloud model, the reaching speed of the intelligent sliding-mode controller can be adjusted dynamically. Simulation results indicate that the control performance of dynamic tracking is good, the chattering is effectively weakened, and the method can accurately track trajectory.
  • GUO Li-Pu, WEI Rui-Han, HOU Hai-Beng, ZHANG Li-Feng
    Computer Engineering. 2012, 38(10): 230-233. https://doi.org/10.3969/j.issn.1000-3428.2012.10.071
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problems that the real Unmanned Aerial Vehicle(UAV) formation flying will raise experimental risk and cost, and other scene tapping facilities such as OpenGL have weak code portability and low executing efficiency, a virtual validating platform based on Vega is proposed. The demand of UAV formation flying scene simulation system is analyzed. Using the technical method which combines the 3D model drivers of Vega and the agility control of MFC, the formation flying simulation techniques such as cooperating mechanism of multi-UAV flying simulated data communication and real-time control, display, recording and redisplay on formation flying are studied. Simulation results prove that the system has high fidelity, well real-time capability, strong portability and reliability of data transfer.
  • JU Zheng-Quan, MAN Meng-Hua, CHU Jie, CHANG Xiao-Long
    Computer Engineering. 2012, 38(10): 234-236. https://doi.org/10.3969/j.issn.1000-3428.2012.10.072
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the Evolvable Hardware(EHW) technique, a bio-inspired fault-tolerance system is design and constructed, and the evolvable repairing ability is researched under the different fault modes and quantities. This paper obtains some relations between the faults and the evolvable repairing ability through analyzing the measured data. And there are two most valuable results: (1)With the increase of the quantity of faults, the main influence factors of the evolvable repairing ability are shift from the efficiency of evolution strategy to the probability of the fault avoided; (2)The evolvable repairing ability and the fault quantity are in accord with the exponential decay law.
  • BANG Yu-Xu, YANG Yan-Gong
    Computer Engineering. 2012, 38(10): 237-240. https://doi.org/10.3969/j.issn.1000-3428.2012.10.073
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to increase the positioning accuracy of indoor positioning system based on Received Signal Strength Indicator(RSSI), a Bayesian indoor location algorithm based on RSSI is proposed. The algorithm preprocesses the RSSI signal by Gaussian filtering, uses the triangle centroid algorithm to calculate the unknown node’s initial coordinates, and handles it through Bayesian filtering to get the coordinates that is more accurate. Experimental results show that the precision of proposed algorithm can reach 98%, which reduces the positioning error.
  • WANG Gang, DING Tian-Bao, RONG Jian, SHI Guo-Qing
    Computer Engineering. 2012, 38(10): 241-243. https://doi.org/10.3969/j.issn.1000-3428.2012.10.074
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the presented network parameter optimization model by previous literature, an approximate analytical method is proposed to determine the Dynamic Segment(DS) length in a FlexRay network. By introducing an exponential function to analogize the Worst Case Response Time(WCRT) of the dynamic frames in the network, the original optimization model is transformed to an extreme-value problem of a continuous function. A detailed approach to obtain the parameters in the introduced exponential function is presented, and an analytical expression of the optimal dynamic segment length is derived as well. Through practical example it is concluded that the approximate analytical method is fast and efficient to acquire the dynamic segment duration in a FlexRay network to certain degree of accuracy.
  • HU Zhi-Gang, YAN Chao-Kun, LIU Chang-Geng
    Computer Engineering. 2012, 38(10): 244-246. https://doi.org/ckyango@yahoo.com.cn
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at high Rejection Ratio(RR) of traditional reservation mechanism and negative impact on local tasks, a relaxed reservation mechanism based on Mean Waiting Time(MWT) constraint is proposed in the paper. A MWT threshold is set for each grid resource to ensure the WMT of queuing tasks in scheduling queue can be kept in a reasonable duration. Specifically, a resource reservation admission algorithm is proposed. Experimental results show that the proposed reservation algorithm outperforms traditional reservation strategy in terms of resource utilization rate, average waiting time of local tasks and RR of reservation requests.
  • DI Liang-Liang, WANG Chong-Tian, YANG Jian, LIU Huo
    Computer Engineering. 2012, 38(10): 247-249. https://doi.org/10.3969/j.issn.1000-3428.2012.10.076
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In this paper, a novel Mobile Augmented Reality(MAR) system based on improved two-dimensional code is presented, which uses C/S framework to keep the update of model. It isolates the identification and rendering process in the client, and analyses the existing tracing registration method of Quick Response Code(QRcode). According to the existing problem of it, such as small tracking range, unstable tracking, this paper gives the solution. Experimental results show that compared with the system using Artoolkit marker or nature feature, this system is flexible, efficient, and cell phone barcode is easy to deal with that can obtain more information.
  • ZHENG Yu-Ting, ZHANG Wen-Dun, HAN Biao
    Computer Engineering. 2012, 38(10): 250-252. https://doi.org/10.3969/j.issn.1000-3428.2012.10.077
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A pitch based Spectral Flux(SF) algorithm is proposed for detecting the onset times of musical notes in humming signals. By using sliding window average filtering, SF algorithm and the feature of pitch change, the proposed algorithm can effectively filter the interference of redundant spectral energy, greatly reduce segmentation errors and achieve good detection improvement for those consecutively singing words. Experimental results show that the detection accuracy rate reaches 80%, better than other well used detection algorithms.
  • GAO Lin, CAO Bao-Xiang, MA Zhao-Feng, YANG Xi-Xian
    Computer Engineering. 2012, 38(10): 253-256. https://doi.org/10.3969/j.issn.1000-3428.2012.10.078
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    A new security model of Digital Rights Management(DRM) for Set-top Box(STB) is proposed, in which content object and rights object are separated respectively, and the content object is encrypted by Content Encryption Key(CEK), while rights object is encapsulated by user’s device related key. Mutual authentication is realized for users’ and server’s trust management. Experimental results show that the technologies of cryptography, digital signature and authority management are developed for controlling the use of high definition contents, MTV, TV media magazines.
  • MA Wei-Jun, FENG Jing, CHEN Ye, XU Si-Lin
    Computer Engineering. 2012, 38(10): 257-259. https://doi.org/10.3969/j.issn.1000-3428.2012.10.079
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to construct the effective and high reliable fault detection mechanism in distributed storage system, a piggyback adaptive fault detection algorithm based on mixed status is presented, named MSP-AFD. A new fault detection framework for the distributed storage system is presented. It computes the detection delay based on the method of load prediction, and tunes the timeout parameters adaptively. Experimental results show that the fault detection performance of MSP-AFD is good.
  • XU Hong-Chao, GAO Li-Qun, LI Li-Xia
    Computer Engineering. 2012, 38(10): 260-262. https://doi.org/10.3969/j.issn.1000-3428.2012.10.080
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the difficult problem of making transmission lines maintenance scheduling, a model based on time restrains Travelling Salesman Problem(TSP) for transmission lines maintenance scheduling is presented. Taking account of importance of lines, and all line’s maintenance time is in the range of its maintenance time-choice during the search, the target in searching for the best maintenance scheduling is the minimal economic loss that bases on failure rate. The scheduling is made by a novel improved ant colony algorithm, which can improve the ability of escaping from local optimal solution. Results show that the model and the algorithm are suitable for solving transmission lines maintenance problem.
  • DIAO Li-Yong, LI Ai-Min
    Computer Engineering. 2012, 38(10): 263-265. https://doi.org/10.3969/j.issn.1000-3428.2012.10.081
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    As topic dynamically change over time, it is difficult to stand for all related story with feature of the first several stories. A dynamic model of topic case knowledge base is proposed in order to solve this problem. The model adopts Resource Description Framework(RDF) to represent case knowledge base, and then realizes dynamically updating of topic feature by merging case based on Hierarchical Semantic Tree(HST). In addition, it solves the problem of topic drift cased by the model with maximum enduring optimization strategy. Experimental results show that the model can greatly increase accuracy of topic detection through enhancing completeness and cohesiveness of case knowledge.
  • JIAN Dun-Lin, TU Jian-Qiao
    Computer Engineering. 2012, 38(10): 266-268. https://doi.org/10.3969/j.issn.1000-3428.2012.10.082
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    This paper proposes a modified feature extraction and classification method to classify the electronic house property archives and extract the key information. It makes paragraph features combining up with the local relative pixel distributions. With the template in training, it makes Support Vector Machine(SVM) classifier to automatic storage house property archives image. Experimental results show that this method has better classification effect and stability.
  • LIU Ban, ZHANG Ren-Jin
    Computer Engineering. 2012, 38(10): 269-272. https://doi.org/10.3969/j.issn.1000-3428.2012.10.083
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In order to fairly evaluate the trust of a new Web service, in this paper, a dynamic trust starting model of Web service community is proposed. The secured trust value is gained from QoS value registered in the Web services’ registration center, and the experience trust value is acquired from own transaction records or other’s transaction records, which are willing to be shared. The actual trust value is the dynamic linear combination of two kinds of trust values. The weight of secured trust value is reduced dynamically with the increase of transaction times. Experimental results show that this model makes a new Web service competed with other Web services which exist long time and the users can be far away from fraud.
  • TIAN Dun-Feng, BANG Hu, DENG An-Yuan-
    Computer Engineering. 2012, 38(10): 273-276. https://doi.org/10.3969/j.issn.1000-3428.2012.10.084
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Based on the intelligent early-warning, as self-recovered storage system is proposed to improve the reliability of Redundant Arrays of Inexpensive Disks(RAID) storage. This system takes advantage of machine learning methods to predict disk failures by collecting real-time Self-monitoring, Analysis and Reporting Technology(S.M.A.R.T) information on disks. A data-centric protection strategy using auto data migration is also implemented in the system to protect disks which predicts failure-prone. Analysis results show that this system can highly enhance the reliability of RAID storage, achieve access transparency for users and improve the availability of the system.
  • XU Dong-Mei, HAN Xiao-Xin, LI Ding, JIA Min
    Computer Engineering. 2012, 38(10): 277-279. https://doi.org/10.3969/j.issn.1000-3428.2012.10.085
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The computable model of emotional interaction is proposed in this paper, based on emotion interaction can be done by its carried(such as a person or Agent). For researching this model, emotional units are defined in this paper. The interaction results of emotional units are acquired because Q-learning arithmetic is adopted. All of the results are depended on the feature that the interaction of emotional units is the one of emotional Agent. Interaction model of emotional units are established through homogeneous Markov chain, and the model has calculability. Emotional polytrope and complexity are inspected and verified by experiments.
  • GENG Chen-Yao, TAO Dan-E, ZHANG Ying-Ying, ZHANG Xiu, CHANG Gang
    Computer Engineering. 2012, 38(10): 280-283. https://doi.org/10.3969/j.issn.1000-3428.2012.10.086
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Most advanced video incident detection algorithms are hard to apply in real-time systems because of its complexity. A distribute video processing platform based on Map Reduce is presented to solve the computation bottleneck, through which video processing algorithm is paralleled on time domain. A distributed video processing architecture is implemented with general-purpose computer. Test experiment proves the flexibility of system’s computation ability.
  • TUN Yong-Min, ZHOU Wei-Di
    Computer Engineering. 2012, 38(10): 284-287. https://doi.org/10.3969/j.issn.1000-3428.2012.10.087
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    For the problem of high coupling existing in Massively Multiplayer Online Game(MMOG) system, this paper proposes three kinds of distributed system models for MMOG respectively, including services-coordinated model which is to decouple large-grained logic from game business, logics-synchronized model which is to separate the high computational logic from related business, and objects-communicated model which is to interact among self-governed entity objects through message. It provides four measurement standards including computational complexity, habit change, business transform and distributed capability, which evaluate advantages and disadvantages of three kinds of models. Analysis results show that the services-coordinated model has good distribution and code portability, logics-synchronized model only has partial distribution, objects-communicated model has perfect and full distribution.
  • ZHANG Zhi-Wu, LOU Jian-An, CHANG Xiao-Long, LI Chuan-Chao
    Computer Engineering. 2012, 38(10): 288-290. https://doi.org/10.3969/j.issn.1000-3428.2012.10.088
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    The design of circuit evolution is one of the main research directions in Evolvable Hardware(EHW). And since there are feedback connects, the time series circuit evolution has always been the key problem in the research of digital circuits’ evolution. In this paper, the design method of time series circuit evolution is improved. The virtual reconfigurable platform is put forward for the evolution of time series circuit, and it discusses the method of sequential circuits’ evolution in the platform. Based on information theory designed fitness evaluation function, it improves the convergence of the algorithm. Experimental results show that this method has better stability and global optimization ability.
  • SHU Yu, TUN Dun-Min, SHU Xiao-Dong, HUANG Jing, DIAO Xiao-Yu
    Computer Engineering. 2012, 38(10): 291-292. https://doi.org/10.3969/j.issn.1000-3428.2012.10.089
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    Aiming at the problem that the performance overhead of virtualization is very obvious for the I/O access emphasis on the application of multi-core architecture, this paper proposes a virtualization solution based on driver-domain, which encapsulates Internet device with hardware queues of independent interrupt, reduces the interference of the Virtual Machine Monitor(VMM) and improves the virtualization performance efficiently. Experimental result shows that latency on virtual interface is 10% higher than that on no-virtualization platform when message length is 1 024 Byte.