Current Issue |
|
|||
April 30,2012 Volume 5,Issue 8 Pages - Subject Area:Computer Information Management System,Computer Network,Data Security and Computer Security,Computer Applications |
||||
Title: Research on fuzzy uncertain Flow Shop scheduling problem with finite intermediate storage time based on co-evolutionary immune clone algorithm | ||||
Authors: GU Xingsheng, JIN Feihui PP: 784-793 Abstract: This paper develops a co-evolutionary immune clone algorithm for the fuzzy uncertain flow shop scheduling problem with finite intermediate storage tank time. The clonal selection mechanism and immune system are combined together. A new idea of adaptive mutation probability and co-evolutionary is presented. Simulation results show that the speed of convergence of the algorithm is superior to immune algorithm and immune clone algorithm. Keywords: flow shop scheduling; clonal selection; immune system; co-evolutionary; uncertain; fuzzy |
||||
Title: Stability of delayed systems with nonlinear perturbations | ||||
Authors: ZENG Hongbing, HE Yong, WU Min PP: 777-783 Abstract: In this paper, the stability of delayed systems with nonlinear perturbations is addressed. Based on the idea of decomposing the delay, a novel complete delay-decomposing Lyapunov-Krasovskii function is established. By employing improved free-weighting matrix approach, new linear matrix inequality (LMI) based delay-dependent stability criteria are obtained, in which the relationship between the time-varying delay and its interval is full considered. Finally, a numeric example is given to show that the derived conditions are much less conservative than those given in the literature. Keywords: robust control; stability; Lyapunov-Krasovskii function; free-weighting matrix; linear matrix inequality |
||||
Title: Hardware design of quadrotor based on ARM and AVR | ||||
Authors: DONG Dazhu, HE Junwang, XU Hongju, SUN Changyin PP: 768-776 Abstract: This paper focuses on developing a control platform based on ARM controller, as well as AVR controller for controlling the under-actuated quadrotor effectively. Considering the quadrotor’s flight efficiency, the brushless direct current (BLDC) motor is used as the actuator, and also the electronic speed controller is designed for the BLDC motor. Attitude and position information are measured by using inertial measurement unit and position sensor as the quadrotor needs its attitude and position information to control itself. Finally, comprehensive experiments based on the established platform validate the feasibility and effectiveness of the proposed method. In addition, the quadrotor based on the designed PID controller can fly steadily. Keywords: control theory and its application; quadrotor; ARM; electronic speed controller; proportion integration differentiation |
||||
Title: A novel algorithm for the robust community in complex networks | ||||
Authors: JIN Erhui, MA Xiaoke, GAO Lin PP: 763-767 Abstract: In this paper, a Bayesian network based algorithm for robust community in complex network is developed. Through constructing Bayesian network for every common community, according to conditional probabilities table and prior probabilities for reasoning, the posterior probabilities of every node being in a robust community is obtained to extract robust communities. The experiment results verify the effectiveness of the algorithm in networks. Keywords: patten recognition; complex network; community discovering; robust community; Bayesian network (BN) |
||||
Title: Study on PKI trust model based on Intranet | ||||
Authors: WANG Yuhai PP: 757-762 Abstract: This paper analyzes public key infrastructure (PKI) basic trust mode and makes improvements on the common mix trust mode according to the characteristics of Intranet which can effectively reduce the complexity of verification of trust ways and shorten the length of certification path. All in all, this paper provides a feasible and practical mode plan for the spread of PKI in Intranet. Keywords: computer application; public key infrastructure; Intranet; trust mode; certification path; certificate authority |
||||
Title: A method for implementing vector switch based on Ethernet | ||||
Authors: ZHANG Ruochen, LIANG Mangui PP: 750-756 Abstract: In order to retain the Ethernet local area network (LAN) devices in Vector Network, and considering the methods which accomplish IP network over Ethernet, a method is proposed to accomplish Vector Network over Ethernet in this paper, it makes Ethernet LAN a component of vector network to realize the convergence between vector network and Ethernet. In this method, it encapsulate the Ethernet LAN as a vector switch (VS) in logic, which has the same functions as a real vector switch, like vector address resolution, vector exchange and QoS support. Keywords: computer network; vector network; vector switch; vector exchange; QoS |
||||
Title: Analysis and optimization program for memory margin test | ||||
Authors: XUE Changying, FU Yuzhuo PP: 742-749 Abstract: Based on careful analysis of the current memory margin test result, this paper presents a way that memory mapping is used to locate boundaries of memory as a target test area in memory margin test. In this way, memory margin test can prodigiously reduce the target test area size and focus on testing the boundary areas in process. Evaluation results show that the optimization using the boundary location can quickly and efficiently locate the failure areas and significantly reduce the test duration. Keywords: computer technology; boundary location; memory mapping; memory margin test |
||||
Title: Equivalent key recovery attack on H2-MAC instantiated with MD5 | ||||
Authors: WANG Wei PP: 736-741 Abstract: H2-MAC which is similar with keyed-hash message authentication code (HMAC) except that the outer key is omitted, and gets rid of the disadvantage of the key management. This paper for the first time presents the equivalent key recovery attack on H2-MAC-MD5, which conduces to a selective forgery attack directly, while there only is a distinguishing attack for HMAC-MD5. Based on the distinguisher of HMAC-MD5, a pair of intermediate chaining variables, i.e., the equivalent keys, is detected which fulfills the specific conditions on the initial variables of the pseudo-collision. Then the inner key recovery attack on HMAC-MD5 is adopted to recover the equivalent key. Consequently, the adversary can process the selective forgery attack by computing the valid MAC value of M0‖M* effortlessly, where M0 is a fixed one-block message, and M* can be any bit strings. The complexity of the attack is about 297 queries, which is much lower than the ideal complexity of the selective forgery attack. Keywords: information security; cryptanalysis; H2-MAC-MD5; equivalent key recovery attack; selective forgery |
||||
Title: Computation of linear complexity of 2n- and u2v-periodic sequence on CUDA | ||||
Authors: YANG Yunpeng, SU Ming, LIU Xiaoguang, WANG Gang PP: 730-735 Abstract: This paper applied the algorithms to some parallel platforms because some parts of calculation can be parallelized, and transformed the computation of the linear complexity into bytes XORs. With several groups of serial, cluster, and compute unified device architecture (CUDA) implementations, the results showed that the CUDA implementation was more efficient compared with others. Keywords: data security and computer security; stream cipher; periodic sequence; linear complexity; Games-Chan algorithm; compute unified device architecture |
||||
Title: Agent-based trusted Web page system | ||||
Authors: GAO Qian, CHANG Xiaolin, XING Bin PP: 726-729 Abstract: This paper proposes an agent-based system for trusted Web page, which has high system expandability. It’s transoarent to Web server software and client browser software.. This system includes three components: time-proof generator at the webpage server side, page-proof prover at the client side and page-proof generator at the time server side. These three components cooperate and then a client can verify whether the page is trusted while browsing the page. Keywords: information security; trusted platform module; trusted computing; Web |
||||
Title: Attack on EC ElGamal cryptosystem on elliptic curve | ||||
Authors: FENG Xiaobo, WANG Mingqiang PP: 721-725 Abstract: This paper provides a method to attack ElGamal cryptosystem. If the cyclic group G which the cryptosystem is based on satisfying of some conditions, the private key can be gotten by applying one-time decryption oracle. By applying the attack method, the partial information of the private key with high probability can be gotten at success probability of 99.4%. At last, the paper presents the measurements to avoid this kind of attack. Keywords: data security and computer security; elliptic curve; discrete logarithm problem; Pohlig-Hellman algorithm; chosen-ciphertext attack |
||||
Title: Research and realization of a self-organizing neural network based background subtraction algorithm | ||||
Authors: WU Jing, LIU Liang PP: 714-720 Abstract: This paper emphasizes on analysis and disadvantages of self-organizing neural network based background subtraction (SOBS) in the special scenes, and propose some algorithms to improve it. 1) This paper proposes an algorithm to automatically and quickly empty the background modeling algorithm, which makes up the fault in SOBS and improve its usability. 2) This paper studies the physical properties, characteristics of probability and statistics of the shadow, as well as the level of knowledge on the experience of the shadow, and uses these characteristics to improve the weaknesses of shadow detection algorithm in SOBS. 3) This paper uses simple YCbCr color space instead of HSV color space for improving efficiency. Finally, a large number of experimental results show the improvement made by the algorithm is effective. Keywords: computer application technology; background subtraction; self-organized neural network; Gauss mixture model; background reconstruction; shadow detection |
||||
Title: Personalized literature retrieval based on user historical behavior | ||||
Authors: DONG Xingliang, WANG Yuan, LIU Tianbi, LIU Jie, HUANG Yalou PP: 707-713 Abstract: Considering the actual needs of personalized retrieval service in the website, this paper proposes a personalized retrieval model based on user behavior by analyzing and using the information of user behavior to facilitate searching scientific papers which users have interests in. Finally, this paper uses language model as a comparison to experiment on personalized retrieval model, and ultimately verifies the superiority of the personalized retrieval model. Keywords: computer application; information retrieval; user behavior; personalized |
||||
Title: Multiple attribute target coverage algorithm in WSN with adjustable sensing ranges | ||||
Authors: HUANG Ruiling, ZHANG Wei PP: 701-706 Abstract: This paper puts forward a problem that targets have multiple attributes in wireless sensor network (WSN) with adjustable sensing ranges, according to the existed target coverage problem. In order to resolve this problem, it gives an efficient distributed algorithm based on contribution preference and energy balance. Through considering the two indices comprehensively, which are the contribution value of unit energy consumption and energy balance, this algorithm can find a cover set that meets the requirements with lower time complexity. The result of simulation experiment shows that the consideration of adjustable sensing range makes energy more efficient and the distributed algorithm can get the optimal solution acquired by the integer linear programming (ILP) model of this problem approximately. As a consequence, it maximizes the network lifetime Keywords: computer application; wireless sensor network; energy balance; rotation dormancy; AR&MAT-SC problem; contribution value |
||||
Title: Graph Boolean operations for analog IC mask and its application | ||||
Authors: ZHANG Long, CAI Yici PP: 694-700 Abstract: This paper aims at designing and implementing the Boolean operations for large number of graphics in an analog IC layout. The paper uses the edge-based method which is derived from plane sweep algorithm. It defines a scanbeam to help finishing the polygon Boolean operation. This method can increase the speed of the graphics operation sharply and greatly speed up its processing power. Keywords: computer application; analog integrated circuitry; parasitic device extraction; polygon Boolean operations; plane sweep technique; scanbeam |
||||