Current Issue |
|
|||
October 30,2008 Volume 1,Issue 12 Pages 1315-1428 Subject Area:Basic Subject of Computer science and technology,Data Security and Computer Security,Computer Applications,Computer Information Management System,Computing Neural Network,Artificial intelligence Theory,Control Theory,Analysis on System Assessment and Feasibility |
||||
Title: The design of a thermal computer | ||||
Authors: CHEN Jin, WANG Huiling PP: 1424~1428 Abstract: It was discovered in this paper that some basic heat circuit consisted of thermal source, heat switch and thermal load can operate by following the basic operation principle of pan-boolean algebra, when the investigation of the micro mechanism of heat transfer between solids at low temperature was done by way of the heat transfer experiment combinated with computer simulation. Consequently, several kinds of the thermal circuit model were designed, the discretization of heat circuit was proposed and the thermal switch algebra was suggested, which was used to describe the digital heat circuit. In the end, the basic principle of thermal/phonon computer was discussed as well. Because thermal compute and control device was a new thermal energy machine powered by heat energy, it is significant for the environmental protection and new discipline development. Keywords: computer science and other subjects; thermal computer; cryogenic heat transfer; thermal switch; phonon computer |
||||
Title: A new fair non-repudiation protocol for e-mail | ||||
Authors: WANG Jie, WU Kaigui PP: 1419~1423 Abstract: The non-repudiation and fairness of sender and receiver and the confidentiality and efficiency of information are very important in secure data transport protocol. It has been usually implemented by non-reputation protocol used during data transmission. Using data signature technology insures the non-repudiation and data integrality. In these years, this type of cipher protocol is actualized by data encrypt and sending which a trusted third part participates in. Therefore, reliability and security of the trusted third party are the bottleneck of system performance. In this paper, a new fair non-repudiation protocol is presented based on the correction of CMP1 protocol which has some flaws. The new protocol can achieve non-reputation, fairness and anti-replay attack and also can insure that messages can be known only by correspondence principals, which can be widely applied in e-mail, e-contract and other e-business. Keywords: data security and computer security; non-repudiation; fairness; confidentiality; digital signature |
||||
Title: The reseach of elliptic curve mechanism and its algorithm | ||||
Authors: JIANG Zhixiang, LIN Zhiqing PP: 1413~1418 Abstract: Elliptic curve cryptosystem has attracted wide concern from scholars of information security and cryptology. From the view of safety and effectiveness, this kind of password system has broad prospects for application. It is a password (signature) system replacing for the existent systems such as RSA, DSS in some fields recently, and now has gradually formed research and development hotspots. In this paper, encryption and decryption of elliptic curve cryptosystem over large prime fields and its application in digital signature introduced. In order to apply the elliptic curve cryptography in PC with small bits(32 b, 64 b) and mobile phones, the paper gives a faster algorithm to calculate the multiplication of large numbers. And the algorithm can be easyily used by chips. The replacement of RSA by elliptic curve cryptography, and its large-scale uses is already around the corner. Keywords: computer application; elliptic curve cryptosystems; elliptic curve discrete logarithm; digital signature |
||||
Title: The Web application security research based on Ajax | ||||
Authors: YANG Jie, WANG Hong PP: 1408~1412 Abstract: Ajax is a popular network technology emerges in Web 2.0 era, which also represents the coming of Web 2.0 era. The framework of the Ajax technology which was launched by Google and promoted by Apache, Microsoft and other organizations or companies since 2005 rapidly gained ground in sites both at home and abroad in 2006. Whether the commercial home page, E-mail services, or BLOG home page which is very popular currently, the pages and services built by Ajax framework can be easily seen. Ajax framework technology has greatly improved the dynamic interactivity of web pages, so that the response of internet application system is more agile. It also offers users the new operating experience which is better than traditional HTTP Web pages, makes users' experience richer and more varied. However, while bringing these operation and performance advantages, Ajax framework technology also introduced a number of security problems which are easy to be ignored. Some safety problems whose threat level was not so high in traditional Web application become more vulnerable due to the inherent characteristics of Ajax framework. This paper introduces the main technology and principles of Ajax, and then analyzes its advantages and existent security threat. As focused on the negative security impacts caused by scripting language, XML injection and XSS attack and the corresponding defense measures, it enabled the Web application security to be improved and enhanced. Keywords: data security and computer security; Ajax; Web application; security; defense |
||||
Title: The applied research of VPN remote access system solutions in the digital library under Linux environment | ||||
Authors: HU Dongyan, FENG Hongqi PP: 1402~1407 Abstract: The virtual private network constructed on the public network can not only realize the demand for safe and fast transmission of information, but also save the massive expenditures. This paper uses iptables based on the Linux system to suggest that using net address translation(NAT) to control the user’s visit effectively. It uses Apache to establish a FREERAIDUS certification system for Web services, and on the basis of this, uses popular Internet language PHP and database system MYSQL to design VPN users’ remote access system, which realizes the function of remote access to library and information streaming. The VPN remote access system solutions not only enable the users outside to access to the school library, but also make users of mobile office to access to their units’security network. Keywords: computer application; virtual private network; iptables; network address translation; remote authentication dial in user service(RADIUS); tunneling |
||||
Title: Construct small database systems with Excel VBA | ||||
Authors: CHEN Yudan, WANG Wei, ZHENG Jinghong PP: 1396~1401 Abstract: The database technology is popularly used along with the software developments in every field. The traditional developing process of database often takes a long time, needs a high level of technology and makes the laypeople face a great difficulty. This paper presents a new design method, which can construct small database systems with Excel and VBA. This kind of design takes less time, and reduces the level of difficulty by transcribing the corresponding codes with the Micro Record to complete the same tasks that can be realized with Excel. At last, the paper designs and then realizes a rear database-dealing system for the monitoring of power quality, offering some key codes and methods of design. Keywords: computer application; Excel VBA; database; power quality |
||||
Title: Building an embedded Linux system based on DOC | ||||
Authors: LIU Xiaofei, YANG Fengping PP: 1390~1395 Abstract: The advantage of lower price and larger capacity of the disk on chip, which is based on NAND Flash technology, fulfills the growing requirements of embedded storage. Comparing to the NOR Flash systems, the booting process of the embedded systems based on DOC is more complex. This paper introduces how to build an embedded Linux system based on DOC according to the development of vacuum circuit breaker’s mechanical detector. Beginning with the description of the kernel cutting and compiling of embedded Linux system, the paper describes the building of file system and customization of bootloader. In the end, the paper introduces how to boot the embedded Linux system based on DOC2000. Keywords: embedded Linux; bootloader; file system; disk on chip(DOC) |
||||
Title: System of psychological test based on norm repair method | ||||
Authors: YUAN Songsong, JIANG Kezeng PP: 1382~1389 Abstract: Various psychological test systems are broadly applied at present. But test methods based on single norm sometimes result in serious distortion of test results. This paper sets forth a test method based on norm repair, by which a psychological test system based on norm repair is established to solve the problem of result deviation caused by norm incompatibility in the existing psychological test methods. In the test examples, test result of norm repair method and that of single “Chinese Norm” method are contrastively analyzed. The analysis result shows that the new test method significantly improved the situation of result distortion from “Chinese Norm” aging or incompatibility of norms. Keywords: computer application; system of psychological test; norm repair; SCL-90 |
||||
Title: Research and application of Chinese document similarity detection technique | ||||
Authors: HUANG Lingli, WU Guoxin PP: 1377~1381 Abstract: Based on researching algorithms of document similarity, Chinese participle and other related techniques, this paper proposes a new method for Chinese document plagiarism detection. The main idea is to introduce a thesaurus library to standardize the words of the documents, and then compare those documents in different layers. With the normal words obtained by applying thesaurus library on the original documents, the document similarity algorithm can be simplified. More detailed document plagiarism detection information can be gotten with the similarity degree of different layers. In the end, this paper gives an application of the algorithm. Keywords: computer application; document similarity; participle; thesaurus; document plagiarism |
||||
Title: The architecture design of WebGIS cluster system based on LVS | ||||
Authors: SHANG Hongjie, MA Yizhong, GAO Yan PP: 1372~1376 Abstract: Along with the rapid growth of geographic information system(GIS) and Internet, WebGIS becomes the inevitable trend of GIS development. The load of WebGIS service is so heavy that the single device can not undertake the burden. This paper takes the WebGIS cluster as a study object, and makes a deep research on Linux virtual server(LVS) and dynamic load balancing algorithm. Then it designs the architecture of WebGIS system on Linux cluster, using LVS, dynamic load balancing algorithm and MapServer. By the realization, it is proved that the WebGIS service can be achieved using LVS, dynamic load balancing algorithm and MapServer. Keywords: computer application; WebGIS; Linux virtual server; dynamic load balancing algorithm; MapServer |
||||
Title: Analysis of Asterisk system and its application | ||||
Authors: TANG Xiujuan, BAI Zhongying PP: 1365~1371 Abstract: Asterisk is an open source software-PBX developed by company Digium. Asterisk system supports not only the traditional phone service but also the call conference, voicemail, faxes and other new services. It has high universality and scalability, and its hardware cost is low. Therefore, it has attracted a large number of users and developer. This paper systematically introduces the features of Asterisk, its internal architecture and the functions of its dynamically-loaded API modules. In addition, the grammar of dial-plan is introduced and a simple example of dial-plan is given. Furthermore, the initialization process, call process of Asterisk system, scenario of incoming call and outbound call, and the control process when processing calls are analyzed in detail. At last, a VoIP solution based on Asterisk system is introduced. Keywords: computer application; VoIP; Asterisk; private branch exchange(PBX) |
||||
Title: The architecture to connect wireless sensor networks with IPv6 network | ||||
Authors: LUO Juan, LIU Dexiang, LI Renfa PP: 1359~1364 Abstract: How to connect wireless sensor networks(WSN) with Internet is one of the key research issues of establish wireless Mesh network. The paper proposed an architecture of connecting WSN to Internet under IPv6 protocol. The architecture includes a new method of IPv6 address allocation in WSN based on location of node, and a distributed arithmetic about how to locate WSN sensor position based on its IPv6 address. Comparing with present methods, this architecture has the advantages of corresponding with the available network protocols, is transparent for users, and can visit any sensor via IPv6 address and convenient for data transferring. It solves the problem of connecting WSN with Internet effectively. Keywords: computer application; wireless sensor networks; internet protocol version 6(IPv6); address allocation; distribute computing |
||||
Title: The design of a new fast multi-pattern matching algorithm | ||||
Authors: WANG Yongge, LI Shengcai PP: 1354~1358 Abstract: The string matching speed is one of the central issues of keywords detection and filtering system. Based on the AC algorithm for finite state automation, a fast algorithm to perform multi-pattern matching in a string is proposed which combines jump idea of boyer-moore(BM) algorithm and the advantages of an improved quick search(QS) algorithm. The algorithm makes full use of the successful results and failure ones in each matching and skips as more characters as possible. Hence, it can perform fast searching under least comparison times and without retrospect to each character in the target text. Experimental results show that the algorithm improves the matching ability of the keywords detection and filtering system for both cases of very long and very short patterns. Keywords: algorithm theory; multi-pattern matching; automata theory; keywords detection and filtering; matching |
||||
Title: The futures price forecast based on grey PSO neural network | ||||
Authors: WANG Haijun, BAI Mei, JIA Zhaoli, Qin Liping, LI Nie PP: 1348~1353 Abstract: There are some problems existed in the price forecast by BP neural network of Chinese futures’ market. This paper optimized the model of BP neural network from the input and parameters of network. First, in order to identify important factor in the network’s input, it used grey correlation analysis to filtrate input variables. Then the particle swarm optimization algorithm was used to optimize the parameters of BP neural network, and after the network was optimized, the model was used to forecast futures price. The simulation results showed that optimized BP neural network model was superior to simple BP neural network model in the running speed and accuracy of forecasts. Keywords: artificial intelligence; neural network computing; futures; grey correlation analysis; particle swarm optimization algorithms; BP neural networks |
||||
Title: A new reduction algorithm based on rough set theory | ||||
Authors: XIAO Houguo, LI Lan, GONG Yue PP: 1343~1347 Abstract: Rough set theory is a tool to deal with vague and uncertain data, and it becomes an important frame in data mining. Attribute reduction is one of the key topics of rough set theory. Reducted data are more valuable and capable of obtaining accurate knowledge. Search for minimum reduction has been proved to be a NP-hard problem. As the definition of attribution reduction based on primary discernibility matrix is not the same as the definition of attribution reduction based on positive region, a new rough set reduction algorithm based on immune genetic algorithm is proposed in this paper. With a new type of discernibility matrix adopted, the algorithm exhibits excellent capabilities in attribute reduction of inconsistent decision table. Simple discernibility matrix is improved so that the computing complexity of indiscernibility relation is cut down. By simplifying binary discernibility matrix and correspondence, the core algorithm is computed and the computing speed is improved efficiently. Finally, the validity and feasibility of the algorithm is demonstrated by classical databases. Keywords: applied mathematics; rough set; immune genetic algorithm; discernibility matirx; attribute reduction |
||||
Title: Adaptive pole placement control for multivariable systems without controllability | ||||
Authors: LI Junmin, MA Jiaqing, LI Jing PP: 1337~1342 Abstract: The necessary and sufficient condition for stabilizing of multivariable adaptive pole-placement systems is given without controllability. Extending the methods of CHEN, the condition is constructively proved, by means of non-iterative and iterative modification strategies of estimated parameters. The main contributions include that the concept of stabilizing multivariable adaptive pole placement control and the related necessary and sufficient condition are presented. The possible singularity in the systems is completely avoided. The priori knowledge required by the strategy is only the observable indices, which is much less than the presented algorithms. Keywords: operation research and cybernetics; adaptive pole placement; controllability; parameter estimated modification strategy; extended Sylvester matrix |
||||
Title: A kind of new models for grey incidence analysis | ||||
Authors: LIU Sifeng, XIE Naiming, Jeffrey FORREST PP: 1328~1336 Abstract: Based on the definition of absolute degree of grey incidence, which was put forward by the author in 1992, a kind of new models for grey incidence analysis are given in this paper. The interrelations and influence can be measured by the new models with different visual angle of similarity and/or nearness respectively. And a simplified method to calculate the similitude degree of grey incidence and the close degree of grey incidence are put forward and proved. The properties of the new models for grey incidence analysis are studied. Compared with the original definition, the new models have many advantages and are easy for practical applications. It is used mainly to measure the similitude degree of the geometric patterns of sequence curves with the similitude degree of grey incidence; the close degree of grey incidence is used mainly to measure the nearness of the sequence curves in space. It is necessary to point out that the close degree of grey incidence is used only at the case which the sequence curves with the same meaning and the same dimension. It is meaningless to measure the close degree of grey incidence as the sequence curves with different meaning or different dimension. Keywords: grey systems theory; grey incidence analysis; the similitude degree of grey incidence; the close degree of grey incidence; the absolute degree of grey incidence |
||||
Title: Traffic assessment and plan referring for major emergent events | ||||
Authors: YANG Fan, XIAO Deyun, LI Zhiheng PP: 1322~1327 Abstract: In very large cities, it has become an essential problem to enhance the traffic disposal ability in an emergency. Aiming at traffic dispatching in major emergency events, the disposal process, driven by emergency plan and fed back by assessment, is presented. And then the functions of four stages are analyzed, which are event detection, event assessment, plan referring and postmortem assessment. Risk assessment method used in event assessment and analytical hierarchy process used in postmortem assessment are introduced in detail. In the end, an oil leak accident on the road is taken as an example to analyze the process of event assessment and plan execution. Keywords: system engineering; risk assessment; traffic emergency management; major emergent event; emergency plan |
||||
Title: Biological hazard diffusion dynamic research based on SIQR model under a planned pulse vaccination strategy | ||||
Authors: DAI Dongfu, ZHAO Lindu PP: 1315~1321 Abstract: In dealing with the biological terrorism raid, if the hazard diffusion regime is well known, the risk made by the hazard diffusion can be eluded or reduced. In this paper, the relationship between pulse vaccination period and rate of controlling the hazard diffusion is got through analyzing the hazard diffusion by using SIQR model under a planned pulse vaccination, and an arithmetic is proposed which can find the minimal vaccination rate to eradicate the hazard under a certain pulse vaccination period. By analyzing the data of measles outbreak in Guizhou Province in 2004, the conclusions can be dotained that the hazard diffusion can be controlled under a low planned pulse vaccination rate and that it is more effective than using the one-off vaccination method. Keywords: system engineering; pulse vaccination; SIQR model; diffusion dynamics; biological hazard diffusion; biological terrorism |
||||