2007 Vol. 36, No. 3

Research of a Hybrid Spam Filtering Algorithm
QIN Zhi-guang, LUO Qin, ZHANG Feng-li
2007, 36(3): 485-488.
Abstract:
Bayes filtering has a dominant place in the area of spam filtering for its strong categorization and high precision. Artificial immune system has become a new embranchment in computing intelligence for its good self-learning, self-adaptability, and robusticity. This paper analyzes the basic principle of Bayes and artificial immune systems, proposes a hybrid spam filtering algorithm based on Bayes and artificial immune system, and then designs and develops the spam filtering system based on this algorithm. It is proved that this system is effective to filter spam in English and Chinese e-mail corpus.
An Algorithm of Scheduling Analysis for Distributed Real-Time Embedded Systems
ZHANG Hai-tao, AI Yun-feng
2007, 36(3): 489-492.
Abstract:
Aiming at the deficiencies of existing scheduling analysis algorithms, we present a scheduling analysis algorithm for distributed real-time embedded systems. The algorithm uses relative firing domain to decide whether the transitions of scheduling sequence are scheduled. The relative executing time of parallel transition is recorded by introducing parallel space. The correct results of scheduling analysis can be obtained by taking space as executing time of parallel transition.
Research of Security Mechanism RBAC-Based in P2P System
NIU Xin-zheng, SHE Kun, LU Gang, ZHOU Ming-tian
2007, 36(3): 493-495,499.
Abstract:
According to the security requirement of Peer-to-Peer (P2P) technology, this paper analyzes the disadvantages of current P2P access control strategy and proposes an efficient P2P clustering model. The model security mechanism based on Rule Based Access Control (RBAC) as well as Java Authentication and Authorization Service (JAAS) are discussed, and the filter technology is also considered. Project application results show that RBAC technology is efficient for access control in P2P systems.
A Distributed Certificate Revocation Scheme for Ad Hoc Networks
ZHONG Huan, XU Chun-xiang, QIN Zhi-guang
2007, 36(3): 496-499.
Abstract:
By analyzing the problem of certificate revocation scheme existing in Ad Hoc network, this paper presents a new distributed certificate revocation scheme. The algorithm and the whole process of revocation are included in this scheme. By introducing four factors, the algorithm of certificate revocation becomes more perfect. The monitoring ability and enthusiasm of each node are enhanced as well. Besides, the traffic load in the process of certificate revocation is effectively reduced after requiring that each node maintain and refresh its two tables.
Design and Principle of the Trusted Authentication Gateway
TAN Liang, LUO Xun, ZHOU Ming-tian
2007, 36(3): 500-502.
Abstract:
In this paper, the Trusted Authentication Gateway System (TAGS), based on Trusted Platform Model (TPM) of Trusted Computing Group (TCG), is presented, its design and principle are introduced, and deficiencies of TAGS are analyzed. Key and certification are resident in TPM on client platform, so verifier can decide that when a secure link between client and server could be established by TAGS.
An Assessment Method for Fuzzy Partial Ordering Relation-Based Software Testing Quality
YAO Yi, LIU Xiao-ming, HUANG Song
2007, 36(3): 503-505,509.
Abstract:
Software testing scheme has the important influence with reliability and efficiency of software testing. Testing scheme can be selected according to the assessment of software testing quality. This paper mainly discusses the feasibility of fuzzy theory on assessing software testing quality. The concept of software testing quality indicator system and a method for assessing software testing quality, namely assessment method based on fuzzy partial ordering relation are provided. The advantages and drawbacks of this method and its application conditions are analyzed. By the calculation results of actual examples, the availability of the method is verified on the aspect of assessing software testing quality.
Web Service Discovery Based on Domain Ontology
AI Wei-hua, SONG Zi-lin, WEI Lei, WU Liang
2007, 36(3): 506-509.
Abstract:
The important step towards Web service implement is the discovery of services. Traditional keywords-based Web service discovery mechanism, Universal Description, Discovery, and Integration(UDDI), lacks semantic descriptions and has low searching efficiency. We study the Web service discovery based on domain ontology. The advertisement services and requested services are described by (Ontology Web Language for Services, OWL-S OWL-S to support semantic searching. A new web services discovery algorithm based on graph matching is presented. The experiments show that the proposed algorithm can achieve better results than UDDI in precision and recall.
XML-Based User Interface Customization and Dynamical Modification of the Embedded Linux System
JIN Jing, SANG Nan, LIU Yi
2007, 36(3): 510-513.
Abstract:
Since the demand of the embedded Linux GUI system can be customized, an approach to customize and modify UI dynamically with XML is presented based on analyzing most of the embedded GUI productions. This approach provides a function to modify UI for the final user with a customizing modular, by which the data of UI design is separated from application logical modular. The information of the modification stored in the XML document will be used to display the new UI. This approach has been achieved in the embedded Linux system based on MiniGUI.
Research and Design of Monitoring Technology of Auto-Electronic in ITS
ZHAO Hong-zhi, LUO Ke-lu, JIANG Wei
2007, 36(3): 514-516.
Abstract:
In allusion to the complexity of transportation system, an on-board monitoring scheme on automobile driving state is put forward in this paper. The scheme attemps to monitor the abnormal state of the running automobile. The basic monitoring model of this system is developed based on component thinking. Different components can be assembled together easily and the system is convenient to implement, maintain and manage.
Design and Development of Multi-Agent Systems Based on Petri Nets
YU Zhen-hua, JIA Jun-xiu, CAI Yuan-li
2007, 36(3): 517-520.
Abstract:
A Multi-Agent Systems Model (MASM) is presented from the point of view of software architecture, in which Object-Oriented Petri Nets (OPN) are adopted as formal theory bases. The OPN are used to visualize architecture and system behaviors. Based on MASM, a practical toolbox for MAS (MASDT) is designed and developed, which can effectively and efficiently support the development of complicate applications. Finally, MASM is used to model and analyze the intelligent gas station, and the prototype is developed with the help of MASDT. This work has enriched the design and development theory for multi-agent systems.
Dynamic Power Management Based on Markov Process
CHU Yi, ZHAO Min
2007, 36(3): 521-523.
Abstract:
The stochastic optimization algorithm is studied and the model of the power management system is presented. IN the situation of system's response-delay, Markov decision method is applied to optimize the power management plan and the best power management strategy is educed. The analysis of the comparison demonstrates that despite efficient energy reduction in some dynamic power management there is considerable negative influence on the system's performance. The stochastic optimization algorithm can get favorable equilibrium between the energy consumption and the reliability of performance in the system.
Analysis of a Real-Time Scheduling Algorithm with Fault-Tolerance
LEI Hang, WANG Liang
2007, 36(3): 524-527.
Abstract:
The paper presents a kind of real-time scheduling algorithm with fault-tolerance for scheduling various tasks. the scheduling scheme of the algorithm is analyzed in detail. The performance simulation and analysis of the scheduling algorithm are given. The experiment results show that the algorithm performance is related with system load, failure probability, and computation time of tasks.
Inference Control of Databases Based on Rough Set Theory
ZHANG Zeng-jun, LI Xiang-yang, XIAO Jun-mo
2007, 36(3): 528-530,537.
Abstract:
This paper describes an approach to controlling inference disclosure of secure relation databases based on Rough Set Theory (RST). We analyze and discover all the relation between non-sensitive and sensitive data with RST. Then according to the importance of these relations and attributes, data of database queried by generic users are modified dynamically and most parsimoniously with preventing sensitive data being inferred from non-sensitive data. Experimental result shows that the approach is scalable and preserves high availability of data while improving security of inference control.
Research of JAVA Security Reforms and Validation
XIAO Jun-mo, LIU Jun, YU Ling
2007, 36(3): 531-533,537.
Abstract:
In this paper,the security reforming problems of OO language are discussed,the principles multi-information flow security control principles are presented based on extended military security model.JAVA is transformed into a security program language (sJAVA) depending upon the EMSM.the security execution conditions of main executable sentences in sJAVA are discussed.A validation by an example of sJAVA program is given.
Forward-Secure Identity-Based Encryption Scheme
YANG Hao-miao, SUN Shi-xin, LI Hong-wei
2007, 36(3): 534-537.
Abstract:
To deal with the threat of key exposure, an identity-based encryption scheme with non-interactive key update is proposed. The non-interactive property is obtained by forward-security (a typical key evolving paradigm). First the definition and security definition of Identity-Based Encryption with Non-Interactive Key Update scheme (IBE-NIKU) are given. Then identity-based binary tree encryption scheme is constructed. As a result, a concrete IBE-NIKU is given. The security and efficiency of these schemes are also analyzed.
An Improved Secure Two-Party Bargaining Protocol
ZHAO Yang, LIU Yong, WANG Jia-hao, QIN Zhi-guang
2007, 36(3): 538-540,558.
Abstract:
In this paper a secure two-party bargaining protocol is proposed which is based on Pallier homomorphic public key cryptosystem. The participant can make a bargain with another one by implementing the protocol. During the protocol, the privacy of input and the correctness of output should be preserved. The third party will participate in working out the final price only under the condition of success agreement. Through the analysis of complexity and security, this protocol holds higher implementing efficiency and security characters, and therefore has application value in the e-commerce.
End-to-End Performance Guarantee for Distributed Real-Time Embedded Systems
LIAO Yong, XIONG Guang-ze, CHEN Xu-dong, SANG Nan, ZHU Qing-xin
2007, 36(3): 541-544.
Abstract:
This paper proposes an Integrated Control Algorithm (ICA) for the Distributed Real-Time Embedded Systems (DRES) that employs the end-to-end aperiodic task model. ICA features a distributed feedback loop that relates the per-task metric to the aggregate metric. It is able to dynamically determine the QoS (Quality of Service) of incoming tasks and guarantee the end-to-end deadlines of accepted tasks, at the same time enforce the desired utilization bound on multiple processors. Finally, experiments demonstrate that ICA is capable of providing better performance guarantees for DRES that employs the end-to-end aperiodic task model.
Dynamic Scheduling Algorithm Based on Limited Number of Priority
HE Fu-gui, WANG Jia-li
2007, 36(3): 545-547.
Abstract:
Real-time tasks scheduling is key problem in real-time system, real-time dynamic scheduling is main aspect of real-time scheduling. When real-time scheduling is used in practical system it may just use limited number of priority level. When real-time scheduling theory carry out theoretic analysis, all of them assume that there are unlimited number of priority level. The paper present the algorithm of dynamic real-time scheduling in the condition of limited priority level, and presents the minimum number of priority level that the tasks system schedules dynamically. Finally, the algorithm complexity is analyzed.
A Design Method for Buffer of Aperiodic Soft Real-Time System
CHEN Xu-dong, ZHU Qing-xin, LIAO Yong, KUANG Ping, XIONG Guang-ze
2007, 36(3): 548-550.
Abstract:
In this paper we research the aperiodic soft real-time system in which the arrival time and the execution time of tasks are uncertain.According to the queuing theory,a aperiodic soft real-time system is a typical stochastic discrete event dynamic system and is usually considered as an M/M/1/H mixed queuing system.After a discussion of three performance metrics including rejection ratio,deadline miss ratio,and average deadline excess amount,we propose a design method for optimal buffer capacity based on these metrics.Lastly,the performance analysis shows that our method can improve the system's performance.
A GSPN Battery Model for Embedded System Energy Optimization
WU Qi, XIONG Guang-ze
2007, 36(3): 551-554.
Abstract:
Energy is the main constraint of embedded system design. In this paper, the General Stochastic Petri Net (GSPN) is used to describe the processes of electrochemical polarization and active substances diffusion in Li-ion batteries. A abstract high-level non-real battery model is presented which accurately characterized the rate-dependent and recovery feature of Li-ion batteries. The model simply adopts four easy-obtained parameters. Constant current discharge and pulse discharge experiment demonstrate that the lifetime of chemical battery could be fast and accurately estimated with this battery model.
A Recombination-Delaying Buddy Mechanism for Embedded System Memory Management
GUO Zhen-yu, SANG Nan, YANG Xia
2007, 36(3): 555-558.
Abstract:
In order to improve the runtime efficiency of dynamic storage management for embedded system and to bound the time spending, a method of recombination-delay is presented based on the classic buddy system, fragmentation collection, and bitmap mechanism. Simulation experiments show that this new mechanism has better runtime efficiency.
Embedded Operating System Customizing with Software Reusing
LI Xiang-wei, SANG Nan, XIONG Guang-ze
2007, 36(3): 559-562.
Abstract:
The customization of embedded system as well as its resources constraint requires that the embedded operating system must be configurable. The design of reusable modularized software is the base of operating system tailoring and configuration. Based on abstract relation among different components, this paper proposes an uniform customizable procedure model in order to reduce the difficulty of configuration. With the help of this model, a configure-tailor on embedded Linux is realized.
An Image Digital Watermarking Algorithm Based on Bit-Plane-Decomposition and Multi-Resolution-Decomposition
YANG Jun, SHE Kun, ZHONG Shou-ming
2007, 36(3): 563-565,572.
Abstract:
Based on bit-decomposition technique and multiresolution-decomposition technique,a digital image watermarking algorithm is proposed in this paper. By multiresolution-decomposition technique, the decomposed watermarks of different resolution are embedded into the corresponding resolution of the decomposed original image, which makes the watermark be adapted to the original image. The chaotic Arnold map is utilized to generate the watermarking-embedding-position in order to enhance the security of watermarking. The watermarking can be extracted without the original image because the embedding procedure is based on the quantized method. Experimental results show that the proposed algorithm is robust to some image processing operations.
A Brief Analysis on Detection Standard of Digital Watermark
PENG Jing
2007, 36(3): 566-568.
Abstract:
The correlation coefficient is researched in digital watermark algorithm.The relaticon between the correlation coefficient and the bit error rates of watermark detection is found.The detection threshold and wrong probability can be calculated out directly by the relation.Furthermore,a method to calculate detection coefficient is proposed.This method can increase the threshold of detection while keeping the probability of the false detection not to change and can enable the detection to strengthen the responses of the correct watermark data.
Realization of 3-D Facial Animation Based on MPEG-4
JIANG Xiu-feng, PU Xiao-rong, ZHANG Yi
2007, 36(3): 569-572.
Abstract:
The technique of realistic three-dimensional human facial animation is an important research direction in computer graphics. How to simulate the motions of human faces on 3D facial models in real-time to generate realistic facial expressions is still a challenge problem. Based on the theory of facial animation in MPEG-4, a new method for realizing 3-D facial animation is proposed in this paper. This method is proper for any topological face model. With the drive of Facial Animation Parameter (FAP) frame, the proposed method can realize realistic facial animation.
Dirichlet Free-Form Deformation in Three-Dimensional Space
GUO Ji-xiang, PU Xiao-rong, ZHANG Yi
2007, 36(3): 573-575,586.
Abstract:
Free Form Deformations (FFDs) have been extensively applied in computer animation and geometric modeling. FFD is an important branch of deformation methods which independent of object representation. Dirichlet Free-Form Deformation (DFFD) belongs to one of the FFDs. Comparing with other FFDs, it gives deformation more flexibility and has the ability to place control points arbitrarily. DFFD has been extensively applied in two-dimensional space, but seldom in three-dimensional space. This paper studies the application of DFFD in three-dimensional space. Good deformation results have been obtained by applying DFFD to 3D head-deformation.
Texture Mapping Based 3D-Reconstruction of Medical Images
HE Xiao-qian, CHEN Lei-ting, FANG Chun-lan
2007, 36(3): 576-578,586.
Abstract:
A new method of volume rendering based on texture mapping is presented. The technique significantly improves both performance and image quality of the 3D reconstruction. The method realizes 3D reconstruction for 2D medical images sequence. On commodity PC, can be obtained by the proposed method, high image quality at a rate near realtime. For visual artifacts in texture mapping, two improved methods are presented. Considering the processes of making texture and resampling, the method of interactive incise for 3D image is realized
A Method for Extracting the Synchro Characters in the Video Information Leaked by a Computer System
XUN Jing-jing, WANG Hou-jun, XIANG Chang-bo, SONG Jian-zhong
2007, 36(3): 579-582.
Abstract:
Some common characters in the video information leaked by a computers system are the texture characteristics which are composed of moving black areas of a reconstructed image from the leaked video information. The texture characteristics are quite different with the varying of synchronal frequency. The moving speed of the texture increases when the synchronal error becomes larger. And the moving direction is decided by the sign of the error. According to these features, a similar Harr Wavelet method is used to extract the synchronal characters in the video information leaked by a computer system. Based on these synchronal characters, the angles tilted by the synchronal error are used to adjust the frequency of the synchronal pulses until the synchronal accuracy is enough for steady display.
Iris Recognition Method Based on Independent Component Analysis and Support Vector Machine
WANG Yong, XU Lu-ping
2007, 36(3): 583-586.
Abstract:
In order to improve the performance of iris recognition, a novel iris recognition method is presented. In this method the independent component analysis is used to obtain iris high order statistic information and mapped the input mode space into the corresponding independent component space. Then the maximal hyperplane is constructed in the independent component space using the generalization of the support vector machine. Numerical simulation based on the CASIA iris database shows that the proposed method can reduce the dimension of the feature space and has higher correct classification rate. Especially, though using Gauss kernel, the rate of correct recognition reaches 98.61% which is increased 6.48% and 4.54% respectively comparing with dissimilarity functions and the nearest feature line method, while improving robustness and flexibility of iris recognition.
Research on Bayesian Classification Network for Spam Based on Kernel Method
LIU Zhen, ZHOU Ming-tian
2007, 36(3): 587-589,593.
Abstract:
A kernel function based Bayesian parameter estimation approach is proposed in this paper which is able to make the algorithm more applicable. Combined with the both sides of email content and format, a Bayesian network for spam classification is well constructed. The testing results by on-line learning for different email testing sets prove that the new model can ensure the classification and filtering efficiently by applying the kernel function based Bayesian parameter estimation approach into the classification network.
Modeling Analysis of Network Worm Propagation
XING Chang-you, YANG Li, CHEN Ming
2007, 36(3): 590-593.
Abstract:
In this paper,some existing models about the propagation of worms are briefly introduced,and then a concrete analysis about the effect of Network Address Translator (NAT) on worm propagation is given.To overcome the weakness of traditional models in describing the propagation of worms,a two-phase worm propagation model based on analytical active worm propagation model is proposed.Comparison between the predicted result made by this model and the real propagation data of Red Code v2 measured by CAIDA in 2001 shows that the improved model gives a better description of worm's propagation.
Research on the Application of 0-1 Algorithm in HW/SW Partition
JIANG Kai-zhong, Lü Zhao, SUN Shu-feng
2007, 36(3): 594-597.
Abstract:
This paper proposes an innovative 0-1 partitioning algorithm (named 0-1 algorithm) over IP cores which can efficiently partition an expected system into hardware or software parts. The correctness of the 0-1 algorithm is verified. It is illustrated that the result of optimization using the algorithm is better than using genetic algorithm, with similar convergence speed. In addition, this algorithm has the advantage that its convergence is quicker than the Integer Linear Programming (ILP) approach.
Cost Modulus Research in Multi-Airport Ground-Holding Problem
YU Jing, FU Qiang, WU Kun
2007, 36(3): 598-600.
Abstract:
According to the total coast of airlines and passengers, we define the cost unit as a function of the departure time of a aircraft in the multi-airport ground-holding model. This definition will reflect the GDP's cost degree more availably and emphasize the delay time's accumulative effect on all costs. By adjusting the value of parameters to suit the percentage of the cost factors, this modulus can apply to different kinds of applications.
Resistance Against Power Analysis Attacks on Width-w NAF Method
ZHOU Wen-jin, LU Xiao-jun, ZHU Da-yong, FAN Ming-yu, ZHANG Tao
2007, 36(3): 601-603.
Abstract:
For the advantages of security and computation, elliptic curve cryptography is widely used in smart cards. Width-w NAF method with small space and high speed, is favored by elliptic curve cryptography. The present of power analysis attacks give us a new way to examine the security of smart-card. This paper presents an improved algorithm based on width-w NAF method to resistant power analysis attacks, including simple power analysis attacks, differential power analysis attacks, refined power analysis attacks and zero-value point attacks, without increase any computation of main loop.
Design and Implementation of Network Confrontation Training Simulation System
GAN Gang, CHEN Yun, LI Fei
2007, 36(3): 604-607.
Abstract:
To study and develop the confrontation capability of computer network is necessary to gain information superiority and network domination.Network confrontation training simulation system helps cultivate confrontation persons with ability and increase confrontation standards.This paper presents a network confrontation training simulation system,and discusses the related subsystems including interactive confrontation training simulation system,support software system,evaluation system,and information data base.The system can provide a favorable environment for confrontation theory research and confrontation training.It is of great significance and benefits in practice.
An IPv4 over IPv6 Tunnel Solution Based on UDP
SHEN Qing-wei, YANG Shou-bao, SUN Wei-feng
2007, 36(3): 608-610,624.
Abstract:
The problem of interconnecting and communicating between IPv4 network and IPv6 network in need to be solved while transiting from IPv4 to IPv6. To connect IPv4 islands through IPv6 network, an IPv4 over IPv6 tunnel solution based on User Datagram Protocol (UDP) called BoIP is proposed. BoIP uses high bandwidth of IPv6 and runs simply and low-costly. Working processes and implementation are described. Experiment results on the test-bed show that BoIP can transparently connect two IPv4 networks through IPv6 network.
A New Fault Model for Testing Signal Integrity in SoCs
ZHANG Jin-lin, SHEN Xu-bang, CHEN Chao-yang
2007, 36(3): 611-613,631.
Abstract:
Based on the in-depth research of the property of crosstalk fault, we presented a more efficiency Half Transition (HT) model to detecting signal integrity fault in System-on-Chip (SoC) interconnects between IP cores. In comparison with Maximal Aggressor Fault (MAF) model and Multiple Transition (MT) model, this HT model can achieve 100% faults coverage and need less test pattern. The result of theoretic analyses shows the HT model's excellence in comparison with MAF model in fault coverage and with to MT model in test pattern's efficiency.
Research on DDoS Attack and IP Congestion Control
WU Guo-gang
2007, 36(3): 614-616,655.
Abstract:
Traffic control based on IP network is normally used to realize congestion control through avoiding conditions of congestion. This paper discusses primary methods of congestion control in existence. The analysis and comparison of these methods when they are used to defend attacks from the distributed denial of serve(DDoS). The results show that these methods could be used to control DDoS attacks after improved.
Unified Modeling of the Intruder's Attack Ability Based on the Protocols
ZHANG Jing
2007, 36(3): 617-620.
Abstract:
Protocols oracle model is an open model,which provides a unified framework to describe the intruder's attack ability precisely.Therefore,This article presents a protocols oracle model which makes a formalized description of the intruder's attack ability on the protocols.This model can also follow the tracks of the intruder's attack on the protocols through the protocols spanning tree.
A Methodology to Detect Malware Based on Registry Hive Files
REN Yun-tao, LI Yi-chao, CAO Yue
2007, 36(3): 621-624.
Abstract:
Based on the research on the current developing trends of malicious programs, comparing systematically the various technologies and methodologies with respect to the hiding and detection of registry. analyzing comprehensively their deficiencies existing, we provide a brand-new hiding and detection method based on hive files of registry, which makes the detection especially on malicious programs more integrated and reliable. The experiment indicates that this method can detect all the current malicious programs which hide registry.
A Bluetooth Network Data Transmission Algorithm Based on BER Model
MO Bei-jian, SANG Nan, TIE Bing
2007, 36(3): 625-627,635.
Abstract:
The paper analyses the bluetooth network's performance of data transmission in various BER model and presents a new kind of bluetooth network adaptive data transmission algorithm, based on BER model of physical link layer. According to the data transmission experiments based on the bluetooth network ACL packet in difference BER model, it is proved that the algorithm improves the efficiency of bluetooth network data transmission.
Optimization Algorithm of Multi-Level Discrete Fuzzy Neural Networks for Solving Global Stability
CUI Meng-tian, FU Li-xia, ZHAO Hai-jun, ZHONG Yong
2007, 36(3): 628-631.
Abstract:
To solve the problems of low adaptability for mutative external environment existed in the theory of fuzzy sets and the disadvantage of failing to obtain eventual relationship among the fuzzy sets existed in the model of neural networks, this paper proposes a multi-level discrete fuzzy neural networks model which has the "if-then" rule of fuzzy inference system. The essential stability conditon of the model is analyzed.The model uses Hard C-Means (HCM) clustering to obtain fuzzy neural networks' eventual relationship among the fuzzy sets and applies evolutionary algorithm to optimize the model. The simulation results show the effectiveness of the proposed model.
Modeling and Performance Evaluation of Time-Triggered CAN Bus
LIU Lu-yuan, WANG Xiao-xin, MA Jin-yan
2007, 36(3): 632-635.
Abstract:
Time-triggered mechanisms improve the ability of Controller Area Network (CAN) bus to deal with the time-critical periodic messages. However, the non-periodic messages have the burst and unpredictable characteristics with complex types. Therefore, it's difficult to analyze their transfer performance. To resolve this problem, a multi-nodes model of time-triggered CAN system is proposed, which is based on deterministic and stochastic Petri net. Through the simulation of the non-periodic messages in asynchronous part, relative performances including the throughput, the average packet delay and the quantitative laws are obtained. These performance are very useful to the analysis and design of the time-triggered CAN systems.
A MDL-Based Unique Word Detection Method
TANG Gang, FENG Zhang-wei, ZHU Zhong-liang
2007, 36(3): 636-639.
Abstract:
This paper deduces a unique word detection method by using the characteristic of signal detection based on minimum description length criterion after introducing the test statistic, and setting the best decision threshold. Comparing with the usual unique word detection technique, this method treats directly with the modulated data with the frequency offset. Analysis and simulation demonstrate the effect of the algorithm.
A New Fetal Electrocardiogram Extraction Algorithm
MENG Hai-tao, ZHANG Zhi-lin
2007, 36(3): 640-641,645.
Abstract:
This paper proposes an algorithm for Fetal Electrocardiogram (FECG) extraction, which is based on joint maximization of kurtosis and autocorrelation. It fully exploits the FECG's special temporal property and its independence on other sources (such as some noise, the maternal electrocardiogram); therefore it is able to extract clearer FECGs, compared with existing algorithms. Extensive experiments show that the proposed algorithm can rapidly and efficiently extract FECGs and greatly reduce lots of noise.
A Mixed Algorithm for Network Congestion Control
WANG Man-xi, HU Xiang-hui, MA Yi-fei
2007, 36(3): 642-645.
Abstract:
Some End-to-end congestion control algorithms are researched and inproved. Incorporating with network layer congestion control algorithms, this paper presents a mixed algorithm for network congestion control named TCP-M, which unites the algorithms of network layer and transmit layer into one. After the simulation by NS2 software, it is verified that TCP-M is more effective than single congestion control algorithms.
A Spliting Files Transmission System Based on MQ
WU Cheng-bin, ZHU Bin
2007, 36(3): 646-648.
Abstract:
A spliting files transmission system based on Message Queue (MQ) is integrated with the technologies of middleware, zlib, and symmetric key cryptography. Such a system can achive secure file exchange in heterogeneous environment. This paper introduces the major components of the system, The sending and receiving subsystems are discussed in detail. The spliting and recovering, encryption, and decryption of the algorithm are invesgated.
A Key Delay Design on Block Cipher Algorithm
LUO Lan, QU Ze-hui, ZHOU Shi-jie, ZHANG Feng-li, QIN Zhi-guang, WEI Zheng-yao
2007, 36(3): 649-651.
Abstract:
A key delay design on block cipher is proposed and is demonstrated based on provable security with information theory. Furthermore, we evaluate the result of key delay module. For the published block cipher, the key delay technology can enforce the cryptography system and decrease the information leak from key distribution through internet. Especially, this model can prevent the only cipher-text attack by middle attack.
Study of Software Quality Evaluation Based on Fuzzy Sets Theory
LU Xin, LIAO Jian-ming
2007, 36(3): 652-655.
Abstract:
This paper presents a scheme for evaluating software quality using fuzzy sets theory. The objective of the work is make the evaluation of software quality more scientific and reasonable than traditional methods. The fundament based on fuzzy sets theory for resolving fuzzy characters in realistic world is presented. The design of multi-factorial evaluation model for software quality is also provided. An example is given to demonstrate how to evaluate software quality.