Applied Mechanics and Materials Vols. 347-350

Paper Title Page

Abstract: Most of the existing ring signature schemes are based on traditional cryptography, such as RSA and discrete logarithm. Unfortunately these schemes would be broken if quantum computers emerge. The MQ-problem based Public-Key Cryptosystem (MPKC) is an important alternative to traditional PKCs for its potential to resist future attacks of quantum computers. In this paper, we proposed a new ring signature scheme based on MPKC, which has the properties of consistent, unforgery, signer-anonymity.
2688
Abstract: The increasing popularity of cloud service is leading people to concentrate more on cloud storage than traditional storage. However, cloud storage confronts many challenges, especially, the security of the out-sourced data (the data that is not stored/retrieved from the tenants own servers). Security not only can keep the data from attacking but also can recover the original data after attack efficiently. Thus, to address the security issue, we proposed a new distributed and data fragmentation model of cloud storage named DDFM (Distributed and Data Fragmentation Model). DDFM aims to provide tenants a secured and integrated cloud storage service with layer-to-layer protection strategy. The layer-to-layer protection strategy of our model includes three main algorithms: the Authentication and Authorization Management Algorithm based on OpenID and OAuth, the Data Fragment Algorithm based on Granular Computing and the Haystack File Storage Algorithm. Considering tenants' security requirement our model DDFM based on these algorithms provided a better decision of cloud storage architecture for our tenants. Furthermore, DDFM can defense most of the network threats and provide a secured way for the third-party applications to access sensitive information that stored on the cloud storage.
2693
Abstract: Regression analysis, as an important branch of statistics, is an effective tool for scientific prediction. Genetic algorithm is an optimization search algorithm in computational mathematics. In this paper, a new regression model named quasi-linear regression model is established. Further, its implementation method is introduced in detail. Then by taking the population development of Hebei province as an example, we conduct the fitting problem and short-term prediction. Moreover, we compare the fitting effect and the prediction results of two models.
2700
Abstract: Hashing algorithms are commonly used to convert passwords into hashes which theoretically cannot be deciphered. This paper analyses the security risks of the hashing algorithm MD5 in password storage and discusses different solutions, such as salts and iterative hashing. We propose a new approach to using MD5 in password storage by using external information, a calculated salt and a random key to encrypt the password before the MD5 calculation. We suggest using key stretching to make the hash calculation slower and using XOR cipher to make the final hash value impossible to find in any standard rainbow table.
2706
Abstract: According to the features of Palm bio-impedance spectroscopy (BIS) data, this paper suggests a kind of effective feature model of palm BIS data elliptical model. The model combines immune clone algorithm and least squares method, establishes a palm BIS feature selection algorithm, and uses the algorithm to obtain the optimal feature subset that can completely represent the palm BIS data, and then use several classification algorithms for classification and comparison. The experimental results show that accuracy of the feature subset obtained through the algorithm in SVM classification algorithm test can reach 93.2, thereby verifying the algorithm is a valid and reliable palm BIS feature selection algorithm.
2712
Abstract: t is difficult to build a perfect security system due to passive protection methods or isolative security devices. Principles of several interactive models are analyzed at first. And then a policy-driven interactive security model, which implements an integrated security system between many devices by the interactive policy, is proposed. At last, some application patterns of the model are discussed in a typical network.
2717
Abstract: At present military activities have been influenced deeply by the information revolution, in the same way the equipment support activities are confronted with tremendous challenge and many problems appeared. The equipment support ability is not satisfied with its target in the traditional method along with in-depth research, so needed to quest for a new research angle of view. Through the investigation of electric-particles' movement in physics field, a field-theory point of view from the comparability between the electric-particles and the equipment support elements is introduced which based on spatial distributing of equipment support elements around battlefield and characteristic of support activities. Moreover, the theory and method of the field-theory in the transfer of the support element and energy in support activity is described as the basic for the next application research. The appropriate combination between the natural science and military science has the important meaning for enrichment and development of equipment support theory.
2721
Abstract: In this paper, taking into account the shortcomings of wireless sensor networks, LEACH algorithm, the algorithm has been improved on this basis. The design of the E-LEACH algorithm, which extend the network lifetime, improve node energy utilization, and the effectiveness of this algorithm through simulation experiments.
2725
Abstract: We selected cervical cross section image from CVH-F1 (Chinese Visible Human Female, No.1) database. After labeling the relative structures, we made 3D reconstruction of brachial plexus and surrounding tissue by computer reconstruction technique. In cervical cross section image, tissues like vertebrae, disc, spinal dura mater, spinal cord, vertebral artery, nerve root and muscles can be recognized, which ensure the ideal effect of 3-D reconstruction. In conclusion, we can make 3-D reconstruction of brachial plexus through computer technique which may serve for anatomical study of brachial plexus compression. After that we made vertical section on the nerve and calculate the ratio between area of nerve and its gap. In result, it is suggested that the nerve passage for root and strand is comparatively narrower.
2728
Abstract: The social security information management system based on three-tier model and the client-server framework is built, which in close connection with social security archives information. At the same time, the amount of data, namely the underlying architecture code design, system architecture design, and resolve client desktop three levels to form. The social security system has the formation of the window, which informs retrieval of data management applications for comprehensive
2734

Showing 541 to 550 of 805 Paper Titles