Home > Highlights of Sciencepaper Online > Current Issue

 
 
 
ISSN 1674-2850
CN 11-9150/N5
 
Current Issue
Previous Issue  |  Next Issue
April 30,2012
Volume 5,Issue 8
Pages -
Subject Area:Computer Information Management System,Computer Network,Data Security and Computer Security,Computer Applications
 
Title: Research on fuzzy uncertain Flow Shop scheduling problem with finite intermediate storage time based on co-evolutionary immune clone algorithm
Authors: GU Xingsheng, JIN Feihui
PP: 784-793
Abstract: This paper develops a co-evolutionary immune clone algorithm for the fuzzy uncertain flow shop scheduling problem with finite intermediate storage tank time. The clonal selection mechanism and immune system are combined together. A new idea of adaptive mutation probability and co-evolutionary is presented. Simulation results show that the speed of convergence of the algorithm is superior to immune algorithm and immune clone algorithm.
Keywords: flow shop scheduling; clonal selection; immune system; co-evolutionary; uncertain; fuzzy
 
Title: Stability of delayed systems with nonlinear perturbations
Authors: ZENG Hongbing, HE Yong, WU Min
PP: 777-783
Abstract: In this paper, the stability of delayed systems with nonlinear perturbations is addressed. Based on the idea of decomposing the delay, a novel complete delay-decomposing Lyapunov-Krasovskii function is established. By employing improved free-weighting matrix approach, new linear matrix inequality (LMI) based delay-dependent stability criteria are obtained, in which the relationship between the time-varying delay and its interval is full considered. Finally, a numeric example is given to show that the derived conditions are much less conservative than those given in the literature.
Keywords: robust control; stability; Lyapunov-Krasovskii function; free-weighting matrix; linear matrix inequality
 
Title: Hardware design of quadrotor based on ARM and AVR
Authors: DONG Dazhu, HE Junwang, XU Hongju, SUN Changyin
PP: 768-776
Abstract: This paper focuses on developing a control platform based on ARM controller, as well as AVR controller for controlling the under-actuated quadrotor effectively. Considering the quadrotor’s flight efficiency, the brushless direct current (BLDC) motor is used as the actuator, and also the electronic speed controller is designed for the BLDC motor. Attitude and position information are measured by using inertial measurement unit and position sensor as the quadrotor needs its attitude and position information to control itself. Finally, comprehensive experiments based on the established platform validate the feasibility and effectiveness of the proposed method. In addition, the quadrotor based on the designed PID controller can fly steadily.
Keywords: control theory and its application; quadrotor; ARM; electronic speed controller; proportion integration differentiation
 
Title: A novel algorithm for the robust community in complex networks
Authors: JIN Erhui, MA Xiaoke, GAO Lin
PP: 763-767
Abstract: In this paper, a Bayesian network based algorithm for robust community in complex network is developed. Through constructing Bayesian network for every common community, according to conditional probabilities table and prior probabilities for reasoning, the posterior probabilities of every node being in a robust community is obtained to extract robust communities. The experiment results verify the effectiveness of the algorithm in networks.
Keywords: patten recognition; complex network; community discovering; robust community; Bayesian network (BN)
 
Title: Study on PKI trust model based on Intranet
Authors: WANG Yuhai
PP: 757-762
Abstract: This paper analyzes public key infrastructure (PKI) basic trust mode and makes improvements on the common mix trust mode according to the characteristics of Intranet which can effectively reduce the complexity of verification of trust ways and shorten the length of certification path. All in all, this paper provides a feasible and practical mode plan for the spread of PKI in Intranet.
Keywords: computer application; public key infrastructure; Intranet; trust mode; certification path; certificate authority
 
Title: A method for implementing vector switch based on Ethernet
Authors: ZHANG Ruochen, LIANG Mangui
PP: 750-756
Abstract: In order to retain the Ethernet local area network (LAN) devices in Vector Network, and considering the methods which accomplish IP network over Ethernet, a method is proposed to accomplish Vector Network over Ethernet in this paper, it makes Ethernet LAN a component of vector network to realize the convergence between vector network and Ethernet. In this method, it encapsulate the Ethernet LAN as a vector switch (VS) in logic, which has the same functions as a real vector switch, like vector address resolution, vector exchange and QoS support.
Keywords: computer network; vector network; vector switch; vector exchange; QoS
 
Title: Analysis and optimization program for memory margin test
Authors: XUE Changying, FU Yuzhuo
PP: 742-749
Abstract: Based on careful analysis of the current memory margin test result, this paper presents a way that memory mapping is used to locate boundaries of memory as a target test area in memory margin test. In this way, memory margin test can prodigiously reduce the target test area size and focus on testing the boundary areas in process. Evaluation results show that the optimization using the boundary location can quickly and efficiently locate the failure areas and significantly reduce the test duration.
Keywords: computer technology; boundary location; memory mapping; memory margin test
 
Title: Equivalent key recovery attack on H2-MAC instantiated with MD5
Authors: WANG Wei
PP: 736-741
Abstract: H2-MAC which is similar with keyed-hash message authentication code (HMAC) except that the outer key is omitted, and gets rid of the disadvantage of the key management. This paper for the first time presents the equivalent key recovery attack on H2-MAC-MD5, which conduces to a selective forgery attack directly, while there only is a distinguishing attack for HMAC-MD5. Based on the distinguisher of HMAC-MD5, a pair of intermediate chaining variables, i.e., the equivalent keys, is detected which fulfills the specific conditions on the initial variables of the pseudo-collision. Then the inner key recovery attack on HMAC-MD5 is adopted to recover the equivalent key. Consequently, the adversary can process the selective forgery attack by computing the valid MAC value of M0‖M* effortlessly, where M0 is a fixed one-block message, and M* can be any bit strings. The complexity of the attack is about 297 queries, which is much lower than the ideal complexity of the selective forgery attack.
Keywords: information security; cryptanalysis; H2-MAC-MD5; equivalent key recovery attack; selective forgery
 
Title: Computation of linear complexity of 2n- and u2v-periodic sequence on CUDA
Authors: YANG Yunpeng, SU Ming, LIU Xiaoguang, WANG Gang
PP: 730-735
Abstract: This paper applied the algorithms to some parallel platforms because some parts of calculation can be parallelized, and transformed the computation of the linear complexity into bytes XORs. With several groups of serial, cluster, and compute unified device architecture (CUDA) implementations, the results showed that the CUDA implementation was more efficient compared with others.
Keywords: data security and computer security; stream cipher; periodic sequence; linear complexity; Games-Chan algorithm; compute unified device architecture
 
Title: Agent-based trusted Web page system
Authors: GAO Qian, CHANG Xiaolin, XING Bin
PP: 726-729
Abstract: This paper proposes an agent-based system for trusted Web page, which has high system expandability. It’s transoarent to Web server software and client browser software.. This system includes three components: time-proof generator at the webpage server side, page-proof prover at the client side and page-proof generator at the time server side. These three components cooperate and then a client can verify whether the page is trusted while browsing the page.
Keywords: information security; trusted platform module; trusted computing; Web
 
Title: Attack on EC ElGamal cryptosystem on elliptic curve
Authors: FENG Xiaobo, WANG Mingqiang
PP: 721-725
Abstract: This paper provides a method to attack ElGamal cryptosystem. If the cyclic group G which the cryptosystem is based on satisfying of some conditions, the private key can be gotten by applying one-time decryption oracle. By applying the attack method, the partial information of the private key with high probability can be gotten at success probability of 99.4%. At last, the paper presents the measurements to avoid this kind of attack.
Keywords: data security and computer security; elliptic curve; discrete logarithm problem; Pohlig-Hellman algorithm; chosen-ciphertext attack
 
Title: Research and realization of a self-organizing neural network based background subtraction algorithm
Authors: WU Jing, LIU Liang
PP: 714-720
Abstract: This paper emphasizes on analysis and disadvantages of self-organizing neural network based background subtraction (SOBS) in the special scenes, and propose some algorithms to improve it. 1) This paper proposes an algorithm to automatically and quickly empty the background modeling algorithm, which makes up the fault in SOBS and improve its usability. 2) This paper studies the physical properties, characteristics of probability and statistics of the shadow, as well as the level of knowledge on the experience of the shadow, and uses these characteristics to improve the weaknesses of shadow detection algorithm in SOBS. 3) This paper uses simple YCbCr color space instead of HSV color space for improving efficiency. Finally, a large number of experimental results show the improvement made by the algorithm is effective.
Keywords: computer application technology; background subtraction; self-organized neural network; Gauss mixture model; background reconstruction; shadow detection
 
Title: Personalized literature retrieval based on user historical behavior
Authors: DONG Xingliang, WANG Yuan, LIU Tianbi, LIU Jie, HUANG Yalou
PP: 707-713
Abstract: Considering the actual needs of personalized retrieval service in the website, this paper proposes a personalized retrieval model based on user behavior by analyzing and using the information of user behavior to facilitate searching scientific papers which users have interests in. Finally, this paper uses language model as a comparison to experiment on personalized retrieval model, and ultimately verifies the superiority of the personalized retrieval model.
Keywords: computer application; information retrieval; user behavior; personalized
 
Title: Multiple attribute target coverage algorithm in WSN with adjustable sensing ranges
Authors: HUANG Ruiling, ZHANG Wei
PP: 701-706
Abstract: This paper puts forward a problem that targets have multiple attributes in wireless sensor network (WSN) with adjustable sensing ranges, according to the existed target coverage problem. In order to resolve this problem, it gives an efficient distributed algorithm based on contribution preference and energy balance. Through considering the two indices comprehensively, which are the contribution value of unit energy consumption and energy balance, this algorithm can find a cover set that meets the requirements with lower time complexity. The result of simulation experiment shows that the consideration of adjustable sensing range makes energy more efficient and the distributed algorithm can get the optimal solution acquired by the integer linear programming (ILP) model of this problem approximately. As a consequence, it maximizes the network lifetime
Keywords: computer application; wireless sensor network; energy balance; rotation dormancy; AR&MAT-SC problem; contribution value
 
Title: Graph Boolean operations for analog IC mask and its application
Authors: ZHANG Long, CAI Yici
PP: 694-700
Abstract: This paper aims at designing and implementing the Boolean operations for large number of graphics in an analog IC layout. The paper uses the edge-based method which is derived from plane sweep algorithm. It defines a scanbeam to help finishing the polygon Boolean operation. This method can increase the speed of the graphics operation sharply and greatly speed up its processing power.
Keywords: computer application; analog integrated circuitry; parasitic device extraction; polygon Boolean operations; plane sweep technique; scanbeam