Loading...
  • 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Current Issue

    • 论文
      State of Art Analysis and Perspectives of 2012 China HPC
      ZHANG Yunquan1,SUN Jiachang1,YUAN Guoxing2,ZHANG Linbo3
      2012, 34(12): 1-8. doi:
      Abstract ( 188 )   PDF (1631KB) ( 367 )     

      In this paper, we first introduce the background of SAMSS China HPC TOP100 rank list. Then we give the total performance trend of China HPC TOP100 and TOP10 of 2012. Followed with this, the performance, manufacturer, and application area of 2012 China HPC TOP100 are analyzed in detail. We found out that the average Linpack performance gap between China TOP100 and TOP500 has increased from half year to one year around. Based on public available historical data and TOP100 supercomputers peak performance data from 1993 to 2012 in China mainland, we predict the future performance trend of China HPC TOP100. We found out that supercomputer with 10Petaflops peak performance will appear between 2012 and 2013, total Linpack performance of China HPC TOP100 rank list will be over 100Petaflops between 2013 and 2014, supercomputer with 100Petaflops peak performance will appear between 2014 and 2015 and supercomputer with Exaflops peak performance will appear between 2017 and 2018.

      Residual Lifetime Based Link Stability Routing Protocol in Mobile Ad Hoc Network
      LIU Rong,WANG Dong,LI Xiaohong
      2012, 34(12): 9-15. doi:
      Abstract ( 148 )   PDF (946KB) ( 252 )     

      Link stability guarantees the network performance in mobile ad hoc network. In this paper, we propose a residual lifetime based link stability routing protocol (RLTLSRP). In this protocol, the relative motion trend between nodes is distinguished according to the changes of the packets received power when a node detects that the packets received power is below a certain threshold value. Combing with the dynamic nature of the nodes and the triangle geometry theorem, the longest residual lifetime path is selected to forward data. The routing repair mechanism is invoked before the link broke up. Simulation results show that our RLTLSRP protocol can effectively reduce the number of routing failures, enhance the routing stability and prolong the network lifetime.

      Scheduling Algorithms for Barrier Coverage to Maximize Network Life Time
      BAN Dongsong1,YANG Wei2,SONG Lei3,JIANG Jie3,DOU Wenhua3
      2012, 34(12): 16-21. doi:
      Abstract ( 145 )   PDF (1641KB) ( 272 )     

      arrier coverage has attracted much attention in wireless sensor network recently,and it is a very important problem that how to prolong the network life time.We devise two scheduling algorithms to maximize the network life time for barrier coverage:Greedy algorithm and DBCS (Distributed Barrier Coverage Scheduling) algorithm.Comprehensive simulation demonstrates that: (1) the two algorithms can prolong the network lifetime effectively;(2) the performance of DBCS is close to that of Greedy when the network is sparse,and (3) the DBCS is applicable for large scale sensor networks.

      Improvement and Model Checking of Micro-Payment Protocol Millicent
      ZHOU Xuan,WANG Xueming
      2012, 34(12): 22-26. doi:
      Abstract ( 162 )   PDF (838KB) ( 199 )     

      To solve the defect of the potential security risk caused by emphasizing the efficiency in the traditional mobile micropayment protocol, according to the security that the mobile electronic business should have, the paper studies the mobile micropayment protocol Millicent and discovers that it cheats customers. For the sake of the shortage, increasing the confirmation process between Vendor and Custom makes the protocol nonrepudiate. Finally, the improved mobile micropayment protocol Millicent is modeled and is analyzed with the model checking tool SMV. The analysis results show that the improved protocol owns nonrepudiation and fairness besides possessing private and authenticating of the former, so it is better.

      Design and Implementation of  Mobile Peer-to-Peer Platform MOBIPEER
      ZUO Ke,WU Quanyuan,HU Dongmin
      2012, 34(12): 27-33. doi:
      Abstract ( 133 )   PDF (1852KB) ( 179 )     

      The support platform is an infrastructure of core mechanisms for software development, operation and management.In the research area of mobile peertopeer networks,the implementation of support platform is considered as the key technology.This paper presents the design and implementation of a mobile peertopeer platformMOBIPEER.We first introduce and categorize the main functions of the support platform,secondly focus on several key technologies in the implementation process, finally develop an instant messaging application based on this platform.The results show that the MOBIPEER can provide a good foundation of practice research of mobile peertopeer networks.

      Analysis and Improvement of an Efficient  ID-Based Proxy Blind Signature Scheme
      HU Xiaoming,WANG Jian,YANG Yinchun
      2012, 34(12): 34-38. doi:
      Abstract ( 169 )   PDF (403KB) ( 273 )     

      The paper analyzes the security of the identitybased proxy blind signature scheme with untrusted Private Key Generation (PKG) proposed by the scholar Nongqiang and points out that the scheme does not satisfy the property of unforgeability and there exist some security drawbacks such as proxy signer stealing the private of original signer and common user forging signature. Aiming at the existing problems of the scheme, a novel proxy blind signature scheme with untrusted PKG is proposed, and its correctness and security are analyzed

      Improvement and Analysis of Binary Exponential Backoff Algorithm for IEEE 802.11 Based Wireless Area Networks
      PENG Jing1,ZHU Yihua2
      2012, 34(12): 39-44. doi:
      Abstract ( 248 )   PDF (800KB) ( 281 )     

      Binary Exponential Backoff (BEB) algorithm is introduced in the IEEE 802.11 standard in order to reduce probability of packet collision.Twostep BEB (TBEB) algorithm overcomes the oscillation in contention window size arising from the BEB so that the throughput is improved.The closedform expressions of the TBEB and the BEB are derived and then validated by simulation.In addition, an optimization problem that minimizes the backoff time is presented to find the best size for resetting contention window.The proposed outcomes are applicable in evaluating the performance of the BEB.

      P2P-BAPay : A New P2P MicroPayment Protocol
      SUN Junjie,WANG Qinglian,WU Guodong,WU Xianfu
      2012, 34(12): 45-50. doi:
      Abstract ( 168 )   PDF (613KB) ( 254 )     

      With the quick development of Network,Ecommerce is more and more frequent.The technology of Electronic Payment is more and more thorough in research and development.This Paper is for the problem of broker's overweight work burden when businesses are not online in the P2P-NetPay micropayment protocol.by adding Broker Assistant,the paper proposes a new P2P micropayment protocol,named P2PBAPay. In the new protocol,the BA tests the authenticity of the consumer's electronic currency and reduces the payment network load and work burden of broker in the process of transaction.At the same time,the new protocol can find out the repeated consumption behavior of consumers and businesses by payment chain. The node of protocol use anonymous identity.To some extent,it protects the privacy of the nodes effectively.

      Research for the Risk Assessment of University Network Security Based on Simulated Attack
      SHI Jiaoli
      2012, 34(12): 51-55. doi:
      Abstract ( 171 )   PDF (542KB) ( 309 )     

      For the existing network security risks, this paper provides a novel network security risk assessment model based on simulated attack, which comprehensively considers the vulnerabilities of single computer and network attack menace. Firstly, the model uses the assessment value based on the vulnerabilities of single computer to simulate the intrusion process of attacker using the network weakness initially and produce the attack state chart. Secondly, the model identifies the attack behaviors, the possible attack line, the change of security state and the location of potential threat according to the attack state chart and the initial assessment value. Finally, the paper gives the quantitative analysis on the new assessment value by the new method, and provides a more accurate basis for the implement on risk control decision pointedly. The experimental results show that this model is correct, and can find out about more 50% security risk than the existing risk assessment models averagely. It means that the assessment results estimated by the model designed in this paper are more accurate than the traditional methods.

      MultiProxy Blind MultiSignature Scheme
      WANG Linjie1,HAN Chunxia1,ZHANG Bingru2
      2012, 34(12): 56-59. doi:
      Abstract ( 147 )   PDF (998KB) ( 244 )     

      Multiproxy blind multisignature satisfies the security properties of both the multiproxy multisignature and blind signature. It permits that a group of original signers authorize a group of proxy signers who have no idea about the concrete content of the message. Based on DLP, a new broadcasting multiproxy blind multisignature and a new sequential multiproxy blind multisignature are proposed. Security of the new schemes is analyzed. Both of them satisfy the security requirement of the multiproxy multisignature scheme and the unforgeability and blindness for the blind signature.

      Design and Research on Data Encryption Algorithm of Identity Authentication System Based on CAS
      ZHU Xiaolu,YANG Qing,LIU Gefei
      2012, 34(12): 60-65. doi:
      Abstract ( 162 )   PDF (488KB) ( 304 )     

      With the increasing management information systems, a security identity authentication system is urgently needed to realize single signon. The paper does some research on the mechanism of CAS by analyzing different identity authentication technologies and then analyses the working principle of CAS and its security. For the existing security problems, a mixed dynamic encryption algorithm which combined with a variety of encryption algorithms is proposed. In addition, the random number and time stamp are used in the algorithm to enhance the security of the system.

      Component-Based Web System Back-Propagation Neural Network Reliability Model
      NIE Peng1,2,GENG Ji1,QIN Zhiguang1
      2012, 34(12): 66-73. doi:
      Abstract ( 152 )   PDF (1087KB) ( 205 )     

      The statedbased and pathbased software reliability evaluation models suffer from the high computational complexity and the absence of robustness for the componentbased Web system evaluation with high complex structures. A Componentbased BackPropagation neural network Reliability Model (CBPRM) with a low computational complexity and robustness is proposed. The CBPRM employs the component reliabilities as the backpropagation neural network inputs. Based on the component reliability sensitivities, the neurons are optimized dynamically and the backpropagation neural network outputs the final Web system reliability evaluation. The theory analysis and experiment results present that the computational complexity of the CBPRM is evidently lower than the contrast models and the reliability evaluating accuracy is assured for the componentbased Web system with high complex structures.

      Component Substitutability Analysis Based on Behavior Protocols
      REN Hongmin,LIU Jin
      2012, 34(12): 74-80. doi:
      Abstract ( 147 )   PDF (581KB) ( 184 )     

      Component’s plugandplay and substitution is the primary means to implement assembly development and support customization and evolution in CBSD. Component behavioral substitutability analysis and verification is the core research subject of CBSD. Based on Finite Automata and characteristics of serviceoriented software components, the component behavior automata is proposed to describe component behavior protocols formally, a conceptual hierarchy of component behavioral substitutability is defined formally to increase component reuse, and related verification algorithms are developed to analyze component behavioral substitutability automatically.

      Web Service QoS Grey Evaluation Mode
      FENG Jianxiang,WU Xueyuan
      2012, 34(12): 81-86. doi:
      Abstract ( 146 )   PDF (649KB) ( 221 )     

      Summarizes the achievement and drawbacks of the Web Quantities of Service(QoS) evaluation methods, proposes a new mode of  Web service QoS quantitative evaluation basedon grey system theory. The mode selects Web service QoS evaluation factors, and determines the weight set of quality factors, and computes grey relevance degree between quality factors and perfect reference datum. By a real application, we obtain the Web service QoS about weather information from 6 weather institutes in the QWS dataset, compute out the real evaluation results of 7 Web service QoS, compare the results with other evaluation methods, and propose the future work. The resultsshows that the mode fits the application characters of grey system theory and the development direction of Web service. As the tool of Web QoS quantitative evaluation, our model becomes the foundation of Web service trustworthy application and electronic commerce.

      Survey of Research on Image Halftone Algorithm
      XU Guoliang,TAN Qingping
      2012, 34(12): 87-97. doi:
      Abstract ( 258 )   PDF (746KB) ( 411 )     

      The halftone algorithm is one of the key technologies for image printing. Introduced a series of halftone algorithms such as the thresholding value comparing algorithm,halftone algorithm with random thresholding values, error diffusion algorithm, dot diffusion algorithm, ordered dithering and dithering algorithm. Commercial raster image processor usually uses dithering algorithm for halftone speed. The quality of halftone image produced by dithering algorithm depends on dithering matrix. The geometry based method to design dithering matrix can optimize the halftone image quality while maintain the constraint of stack. The halftone algorithm with random thresholding values can eliminate the moiré of image. The foundation of random halftone algorithms is to distribute a number of points in a square area randomly and uniformly. Asano proposed a proposition that problem of distributing random points and circle packing in a square area are equal. This paper gives a basic proof to this proposition. Finally, a few topics regarding the tobeinvestigated image halftone are proposed.

      Intelligent Surveillance System Based on Comprehensive Background Extraction and Shadow Suppression
      SHI Hongbo1,HUANG Shan1,2,ZHANG Hongbin2,TIAN Kun3
      2012, 34(12): 98-104. doi:
      Abstract ( 119 )   PDF (1004KB) ( 269 )     

      To achieve effective object detection in the intelligent surveillance, a comprehensive dynamic background difference and shadow removal method is proposed. Multilevel information is adopted to update the Gaussian Mixed Model to acquire color background image with high quality. Shadow is removed by a progressive pixel classification with proper RBG, Hue and Saturation information while extracting the foreground. Based on these results, object tracking and abnormal behavior detection are realized in an intelligent surveillance system. The experimental results with different scenes show that our method could satisfy the demand of practical applications with good performance.

      A Data Hiding Scheme for Medical Images Based on Prediction Error Modification
      JIAN Peng1,CHEN Zhigang1,DENG Xiaohong1,2,LIANG Diqing1,HUANG Weiqi1
      2012, 34(12): 105-109. doi:
      Abstract ( 166 )   PDF (559KB) ( 194 )     

      Due to the characteristics of high quality, high capacity, authentication, frequent insertions and reversibility of the medical images reversible data hiding, a reversible data hiding scheme for medical images based on prediction error modification is proposed. The proposed method uses a nonblockbased approach and obtains the prediction images by using a weighted linear predictor. In the prediction error histogram, it uses four peak points to embed the private data, and the method solves the overflow problem well, which appears in medical images. It increases the embedding capacity while keeping the distortion. The theoretical analysis and the experimental results demonstrate the superior performance of the proposed method.

      A Tomography Image ReRegistration Algorithm Based on Frame and Gray Information
      LIU Jun1,2,WU Helei3
      2012, 34(12): 110-114. doi:
      Abstract ( 182 )   PDF (636KB) ( 279 )     

      In this paper, a new reregistration method that based on shape information and gray information is introduced into the procedure of the CTMRI registration. Firstly, the frames of the two images to be registered are explained by the principle of mechanics decomposition, then we coarsely register the two images by their frames and as a result the error of the registration is constrained in a small region. Secondly, we reregister the two images that have been coarsely registered by means of the maximum mutual information (MMI), and finally an accurate registration result is obtained. The simulation result shows that, as this method combines the efficiency of the framebased registration method and the accuracy of the MMIbased registration method, this method is less time consuming and on the other side the registration accuracy is also guaranteed in comparison with other methods. Finally we successfully apply the present method to register the CT images and MRI images in a patient undergoing neurosurgery.

      Design and Implementation of Embedded Video Capture System Based on ADV7180 and S3C6410
      WU Junqin,SONG Jian,LIU Hao
      2012, 34(12): 115-119. doi:
      Abstract ( 198 )   PDF (616KB) ( 230 )     

      Highend video capture applications need not only a flexible and convenient interface but also a powerful data processing capacity. Both should be integrated properly to create conditions for a wide range of video acquisition and processing. Embedded image capture should be realtime and reliable. According to these characteristics, using the decoder chip ADV7180 and the highsensitive and antijamming CCD camera, a new image capture and storage system is designed where the S3C6410 is used as the main chip. We develop the ADV7180 drivers under the Linux platform, and mainly describe how to configure the ADV7180 registers through the I2C bus correctly and how to write video data into the SDRAM through the DMA channel. The paper details the method how to extract YCbCr4:2:2 format data. Converted video data is written into frame buffer of LCD for show. Test results show that video capture interface is effective and easy to use, and the collected images are clear, smooth and high realtime.

      A Strategy of Spectra Factorization Dimensional Reduction on Fuzzy Supervised Locality Preserving Projection
      FAN Wei
      2012, 34(12): 120-125. doi:
      Abstract ( 176 )   PDF (456KB) ( 245 )     

      Classification of nonlinear highdimensional data is usually not amenable to standard pattern recognition techniques because of an underlying small sample size conditions. To address the problem, a novel Supervised Locality Preserving Projection (SLPP) learning algorithm combined with a fuzzy feature extraction strategy and spectra factorization is developed in this paper. First, according to the problem that SLPP has the overlearning problem and does not preserve the diversity information of data which is also useful for data recognition, a concise transformation of feature extraction criterion is raised by minimizing the local scatter, which efficiently preserves the local structure and simultaneously maximize the diversity scatter, however, an equivalent form of linear discriminant analysis is obtained. Secondly, a reformative fuzzy algorithm based on the fuzzy knearest neighbor (FKNN) is implemented to achieve the distribution information of each original sample represented with fuzzy membership degree and is incorporated into the redefinition of the scatter matrices of SLPP. Thirdly, a matrix decomposition is proposed on the basis of matrix analysis theory in this paper, under the SLPP criterion, the technology of spectra factorization is utilized in order to reduce the dimension of samples. Experimental results conducts on the ORL and NUST603 face database demonstrate the effectiveness of the proposed method.