Home > Highlights of Sciencepaper Online > Current Issue

 
 
 
ISSN 1674-2850
CN 11-9150/N5
 
Current Issue
Previous Issue  |  Next Issue
October 30,2008
Volume 1,Issue 12
Pages 1315-1428
Subject Area:Basic Subject of Computer science and technology,Data Security and Computer Security,Computer Applications,Computer Information Management System,Computing Neural Network,Artificial intelligence Theory,Control Theory,Analysis on System Assessment and Feasibility
 
Title: The design of a thermal computer
Authors: CHEN Jin, WANG Huiling
PP: 1424~1428
Abstract: It was discovered in this paper that some basic heat circuit consisted of thermal source, heat switch and thermal load can operate by following the basic operation principle of pan-boolean algebra, when the investigation of the micro mechanism of heat transfer between solids at low temperature was done by way of the heat transfer experiment combinated with computer simulation. Consequently, several kinds of the thermal circuit model were designed, the discretization of heat circuit was proposed and the thermal switch algebra was suggested, which was used to describe the digital heat circuit. In the end, the basic principle of thermal/phonon computer was discussed as well. Because thermal compute and control device was a new thermal energy machine powered by heat energy, it is significant for the environmental protection and new discipline development.
Keywords: computer science and other subjects; thermal computer; cryogenic heat transfer; thermal switch; phonon computer
 
Title: A new fair non-repudiation protocol for e-mail
Authors: WANG Jie, WU Kaigui
PP: 1419~1423
Abstract: The non-repudiation and fairness of sender and receiver and the confidentiality and efficiency of information are very important in secure data transport protocol. It has been usually implemented by non-reputation protocol used during data transmission. Using data signature technology insures the non-repudiation and data integrality. In these years, this type of cipher protocol is actualized by data encrypt and sending which a trusted third part participates in. Therefore, reliability and security of the trusted third party are the bottleneck of system performance. In this paper, a new fair non-repudiation protocol is presented based on the correction of CMP1 protocol which has some flaws. The new protocol can achieve non-reputation, fairness and anti-replay attack and also can insure that messages can be known only by correspondence principals, which can be widely applied in e-mail, e-contract and other e-business.
Keywords: data security and computer security; non-repudiation; fairness; confidentiality; digital signature
 
Title: The reseach of elliptic curve mechanism and its algorithm
Authors: JIANG Zhixiang, LIN Zhiqing
PP: 1413~1418
Abstract: Elliptic curve cryptosystem has attracted wide concern from scholars of information security and cryptology. From the view of safety and effectiveness, this kind of password system has broad prospects for application. It is a password (signature) system replacing for the existent systems such as RSA, DSS in some fields recently, and now has gradually formed research and development hotspots. In this paper, encryption and decryption of elliptic curve cryptosystem over large prime fields and its application in digital signature introduced. In order to apply the elliptic curve cryptography in PC with small bits(32 b, 64 b) and mobile phones, the paper gives a faster algorithm to calculate the multiplication of large numbers. And the algorithm can be easyily used by chips. The replacement of RSA by elliptic curve cryptography, and its large-scale uses is already around the corner.
Keywords: computer application; elliptic curve cryptosystems; elliptic curve discrete logarithm; digital signature
 
Title: The Web application security research based on Ajax
Authors: YANG Jie, WANG Hong
PP: 1408~1412
Abstract: Ajax is a popular network technology emerges in Web 2.0 era, which also represents the coming of Web 2.0 era. The framework of the Ajax technology which was launched by Google and promoted by Apache, Microsoft and other organizations or companies since 2005 rapidly gained ground in sites both at home and abroad in 2006. Whether the commercial home page, E-mail services, or BLOG home page which is very popular currently, the pages and services built by Ajax framework can be easily seen. Ajax framework technology has greatly improved the dynamic interactivity of web pages, so that the response of internet application system is more agile. It also offers users the new operating experience which is better than traditional HTTP Web pages, makes users' experience richer and more varied. However, while bringing these operation and performance advantages, Ajax framework technology also introduced a number of security problems which are easy to be ignored. Some safety problems whose threat level was not so high in traditional Web application become more vulnerable due to the inherent characteristics of Ajax framework. This paper introduces the main technology and principles of Ajax, and then analyzes its advantages and existent security threat. As focused on the negative security impacts caused by scripting language, XML injection and XSS attack and the corresponding defense measures, it enabled the Web application security to be improved and enhanced.
Keywords: data security and computer security; Ajax; Web application; security; defense
 
Title: The applied research of VPN remote access system solutions in the digital library under Linux environment
Authors: HU Dongyan, FENG Hongqi
PP: 1402~1407
Abstract: The virtual private network constructed on the public network can not only realize the demand for safe and fast transmission of information, but also save the massive expenditures. This paper uses iptables based on the Linux system to suggest that using net address translation(NAT) to control the user’s visit effectively. It uses Apache to establish a FREERAIDUS certification system for Web services, and on the basis of this, uses popular Internet language PHP and database system MYSQL to design VPN users’ remote access system, which realizes the function of remote access to library and information streaming. The VPN remote access system solutions not only enable the users outside to access to the school library, but also make users of mobile office to access to their units’security network.
Keywords: computer application; virtual private network; iptables; network address translation; remote authentication dial in user service(RADIUS); tunneling
 
Title: Construct small database systems with Excel VBA
Authors: CHEN Yudan, WANG Wei, ZHENG Jinghong
PP: 1396~1401
Abstract: The database technology is popularly used along with the software developments in every field. The traditional developing process of database often takes a long time, needs a high level of technology and makes the laypeople face a great difficulty. This paper presents a new design method, which can construct small database systems with Excel and VBA. This kind of design takes less time, and reduces the level of difficulty by transcribing the corresponding codes with the Micro Record to complete the same tasks that can be realized with Excel. At last, the paper designs and then realizes a rear database-dealing system for the monitoring of power quality, offering some key codes and methods of design.
Keywords: computer application; Excel VBA; database; power quality
 
Title: Building an embedded Linux system based on DOC
Authors: LIU Xiaofei, YANG Fengping
PP: 1390~1395
Abstract: The advantage of lower price and larger capacity of the disk on chip, which is based on NAND Flash technology, fulfills the growing requirements of embedded storage. Comparing to the NOR Flash systems, the booting process of the embedded systems based on DOC is more complex. This paper introduces how to build an embedded Linux system based on DOC according to the development of vacuum circuit breaker’s mechanical detector. Beginning with the description of the kernel cutting and compiling of embedded Linux system, the paper describes the building of file system and customization of bootloader. In the end, the paper introduces how to boot the embedded Linux system based on DOC2000.
Keywords: embedded Linux; bootloader; file system; disk on chip(DOC)
 
Title: System of psychological test based on norm repair method
Authors: YUAN Songsong, JIANG Kezeng
PP: 1382~1389
Abstract: Various psychological test systems are broadly applied at present. But test methods based on single norm sometimes result in serious distortion of test results. This paper sets forth a test method based on norm repair, by which a psychological test system based on norm repair is established to solve the problem of result deviation caused by norm incompatibility in the existing psychological test methods. In the test examples, test result of norm repair method and that of single “Chinese Norm” method are contrastively analyzed. The analysis result shows that the new test method significantly improved the situation of result distortion from “Chinese Norm” aging or incompatibility of norms.
Keywords: computer application; system of psychological test; norm repair; SCL-90
 
Title: Research and application of Chinese document similarity detection technique
Authors: HUANG Lingli, WU Guoxin
PP: 1377~1381
Abstract: Based on researching algorithms of document similarity, Chinese participle and other related techniques, this paper proposes a new method for Chinese document plagiarism detection. The main idea is to introduce a thesaurus library to standardize the words of the documents, and then compare those documents in different layers. With the normal words obtained by applying thesaurus library on the original documents, the document similarity algorithm can be simplified. More detailed document plagiarism detection information can be gotten with the similarity degree of different layers. In the end, this paper gives an application of the algorithm.
Keywords: computer application; document similarity; participle; thesaurus; document plagiarism
 
Title: The architecture design of WebGIS cluster system based on LVS
Authors: SHANG Hongjie, MA Yizhong, GAO Yan
PP: 1372~1376
Abstract: Along with the rapid growth of geographic information system(GIS) and Internet, WebGIS becomes the inevitable trend of GIS development. The load of WebGIS service is so heavy that the single device can not undertake the burden. This paper takes the WebGIS cluster as a study object, and makes a deep research on Linux virtual server(LVS) and dynamic load balancing algorithm. Then it designs the architecture of WebGIS system on Linux cluster, using LVS, dynamic load balancing algorithm and MapServer. By the realization, it is proved that the WebGIS service can be achieved using LVS, dynamic load balancing algorithm and MapServer.
Keywords: computer application; WebGIS; Linux virtual server; dynamic load balancing algorithm; MapServer
 
Title: Analysis of Asterisk system and its application
Authors: TANG Xiujuan, BAI Zhongying
PP: 1365~1371
Abstract: Asterisk is an open source software-PBX developed by company Digium. Asterisk system supports not only the traditional phone service but also the call conference, voicemail, faxes and other new services. It has high universality and scalability, and its hardware cost is low. Therefore, it has attracted a large number of users and developer. This paper systematically introduces the features of Asterisk, its internal architecture and the functions of its dynamically-loaded API modules. In addition, the grammar of dial-plan is introduced and a simple example of dial-plan is given. Furthermore, the initialization process, call process of Asterisk system, scenario of incoming call and outbound call, and the control process when processing calls are analyzed in detail. At last, a VoIP solution based on Asterisk system is introduced.
Keywords: computer application; VoIP; Asterisk; private branch exchange(PBX)
 
Title: The architecture to connect wireless sensor networks with IPv6 network
Authors: LUO Juan, LIU Dexiang, LI Renfa
PP: 1359~1364
Abstract: How to connect wireless sensor networks(WSN) with Internet is one of the key research issues of establish wireless Mesh network. The paper proposed an architecture of connecting WSN to Internet under IPv6 protocol. The architecture includes a new method of IPv6 address allocation in WSN based on location of node, and a distributed arithmetic about how to locate WSN sensor position based on its IPv6 address. Comparing with present methods, this architecture has the advantages of corresponding with the available network protocols, is transparent for users, and can visit any sensor via IPv6 address and convenient for data transferring. It solves the problem of connecting WSN with Internet effectively.
Keywords: computer application; wireless sensor networks; internet protocol version 6(IPv6); address allocation; distribute computing
 
Title: The design of a new fast multi-pattern matching algorithm
Authors: WANG Yongge, LI Shengcai
PP: 1354~1358
Abstract: The string matching speed is one of the central issues of keywords detection and filtering system. Based on the AC algorithm for finite state automation, a fast algorithm to perform multi-pattern matching in a string is proposed which combines jump idea of boyer-moore(BM) algorithm and the advantages of an improved quick search(QS) algorithm. The algorithm makes full use of the successful results and failure ones in each matching and skips as more characters as possible. Hence, it can perform fast searching under least comparison times and without retrospect to each character in the target text. Experimental results show that the algorithm improves the matching ability of the keywords detection and filtering system for both cases of very long and very short patterns.
Keywords: algorithm theory; multi-pattern matching; automata theory; keywords detection and filtering; matching
 
Title: The futures price forecast based on grey PSO neural network
Authors: WANG Haijun, BAI Mei, JIA Zhaoli, Qin Liping, LI Nie
PP: 1348~1353
Abstract: There are some problems existed in the price forecast by BP neural network of Chinese futures’ market. This paper optimized the model of BP neural network from the input and parameters of network. First, in order to identify important factor in the network’s input, it used grey correlation analysis to filtrate input variables. Then the particle swarm optimization algorithm was used to optimize the parameters of BP neural network, and after the network was optimized, the model was used to forecast futures price. The simulation results showed that optimized BP neural network model was superior to simple BP neural network model in the running speed and accuracy of forecasts.
Keywords: artificial intelligence; neural network computing; futures; grey correlation analysis; particle swarm optimization algorithms; BP neural networks
 
Title: A new reduction algorithm based on rough set theory
Authors: XIAO Houguo, LI Lan, GONG Yue
PP: 1343~1347
Abstract: Rough set theory is a tool to deal with vague and uncertain data, and it becomes an important frame in data mining. Attribute reduction is one of the key topics of rough set theory. Reducted data are more valuable and capable of obtaining accurate knowledge. Search for minimum reduction has been proved to be a NP-hard problem. As the definition of attribution reduction based on primary discernibility matrix is not the same as the definition of attribution reduction based on positive region, a new rough set reduction algorithm based on immune genetic algorithm is proposed in this paper. With a new type of discernibility matrix adopted, the algorithm exhibits excellent capabilities in attribute reduction of inconsistent decision table. Simple discernibility matrix is improved so that the computing complexity of indiscernibility relation is cut down. By simplifying binary discernibility matrix and correspondence, the core algorithm is computed and the computing speed is improved efficiently. Finally, the validity and feasibility of the algorithm is demonstrated by classical databases.
Keywords: applied mathematics; rough set; immune genetic algorithm; discernibility matirx; attribute reduction
 
Title: Adaptive pole placement control for multivariable systems without controllability
Authors: LI Junmin, MA Jiaqing, LI Jing
PP: 1337~1342
Abstract: The necessary and sufficient condition for stabilizing of multivariable adaptive pole-placement systems is given without controllability. Extending the methods of CHEN, the condition is constructively proved, by means of non-iterative and iterative modification strategies of estimated parameters. The main contributions include that the concept of stabilizing multivariable adaptive pole placement control and the related necessary and sufficient condition are presented. The possible singularity in the systems is completely avoided. The priori knowledge required by the strategy is only the observable indices, which is much less than the presented algorithms.
Keywords: operation research and cybernetics; adaptive pole placement; controllability; parameter estimated modification strategy; extended Sylvester matrix
 
Title: A kind of new models for grey incidence analysis
Authors: LIU Sifeng, XIE Naiming, Jeffrey FORREST
PP: 1328~1336
Abstract: Based on the definition of absolute degree of grey incidence, which was put forward by the author in 1992, a kind of new models for grey incidence analysis are given in this paper. The interrelations and influence can be measured by the new models with different visual angle of similarity and/or nearness respectively. And a simplified method to calculate the similitude degree of grey incidence and the close degree of grey incidence are put forward and proved. The properties of the new models for grey incidence analysis are studied. Compared with the original definition, the new models have many advantages and are easy for practical applications. It is used mainly to measure the similitude degree of the geometric patterns of sequence curves with the similitude degree of grey incidence; the close degree of grey incidence is used mainly to measure the nearness of the sequence curves in space. It is necessary to point out that the close degree of grey incidence is used only at the case which the sequence curves with the same meaning and the same dimension. It is meaningless to measure the close degree of grey incidence as the sequence curves with different meaning or different dimension.
Keywords: grey systems theory; grey incidence analysis; the similitude degree of grey incidence; the close degree of grey incidence; the absolute degree of grey incidence
 
Title: Traffic assessment and plan referring for major emergent events
Authors: YANG Fan, XIAO Deyun, LI Zhiheng
PP: 1322~1327
Abstract: In very large cities, it has become an essential problem to enhance the traffic disposal ability in an emergency. Aiming at traffic dispatching in major emergency events, the disposal process, driven by emergency plan and fed back by assessment, is presented. And then the functions of four stages are analyzed, which are event detection, event assessment, plan referring and postmortem assessment. Risk assessment method used in event assessment and analytical hierarchy process used in postmortem assessment are introduced in detail. In the end, an oil leak accident on the road is taken as an example to analyze the process of event assessment and plan execution.
Keywords: system engineering; risk assessment; traffic emergency management; major emergent event; emergency plan
 
Title: Biological hazard diffusion dynamic research based on SIQR model under a planned pulse vaccination strategy
Authors: DAI Dongfu, ZHAO Lindu
PP: 1315~1321
Abstract: In dealing with the biological terrorism raid, if the hazard diffusion regime is well known, the risk made by the hazard diffusion can be eluded or reduced. In this paper, the relationship between pulse vaccination period and rate of controlling the hazard diffusion is got through analyzing the hazard diffusion by using SIQR model under a planned pulse vaccination, and an arithmetic is proposed which can find the minimal vaccination rate to eradicate the hazard under a certain pulse vaccination period. By analyzing the data of measles outbreak in Guizhou Province in 2004, the conclusions can be dotained that the hazard diffusion can be controlled under a low planned pulse vaccination rate and that it is more effective than using the one-off vaccination method.
Keywords: system engineering; pulse vaccination; SIQR model; diffusion dynamics; biological hazard diffusion; biological terrorism