Applied Mechanics and Materials Vols. 513-517

Paper Title Page

Abstract: In this paper, we investigate the S-box structure of matrix power functions; discuss the equations nature of this S-box in the low-dimensional. We give the specific form of S-box in GF(4). we discuss the equation describing the ciphers input/output variables and the round key of S-box and the number of equations and find out We find the max number and the min number of the S-box equation. We also find the number of the equations of the matrix power S-box describing the ciphers input/output variables and the round key and the distributing of the order of the equations.
1963
Abstract: During our daily management of server cluster, different administrators use the same account (usually root) and password to log on from different remote clients. So logs on servers couldnt trace specific operator once encountering security incident, for only administrator root was recorded. Therefore, its of great practical significance to discuss some new server access methods with multiple administration accounts. Considering the UNIX server cluster management of large enterprises, this paper provides a feasible solution of account management system based on Openldap and SUDO. This system establishes a strict behavior-monitoring framework of each servers operation commands and maintenance process.
1967
Abstract: Certificate-based encryption is a new paradigm which was introduced by Gentry to address the complex public key revocation problem in traditional public key cryptosystems. It represents an interesting and potentially useful balance between traditional public-key encryption and identity-based encryption. In this paper, we introduce the notion of hierarchical certificate-based encryption that preserves the advantages of certificate-based encryption such as implicit certificate and key-escrow free while inheriting the properties of hierarchical identity-based encryption. We formalize the definition of hierarchical certificate-based encryption and also propose a concrete hierarchical certificate-based encryption scheme that is chosen-ciphertext secure under the hardness of bilinear Diffie-Hellman problem in the random oracle model.
1971
Abstract: In order to realize video capture based on the S3C2440 processor on the platform of embedded Linux, the paper adopts the V4L2 as the driver model and explains in detail the implementation progress of V4L2 driver model on the Linux platform. On the basis of the existing V4L2 model and interface standard, using direct memory access mode, design the driver program of S3C2440 camera interface, the drivers are tested through the LCD display and the single frame capture, the results show that the design meets the practical need.
1975
Abstract: The paper presents an algorithm for digital watermarking in colored image, which combined with singular value decomposition and discrete wavelet transform, it selects R-vector of colored image to do discrete wavelet decomposition, and extracts the low-frequency coefficients to finish singular value decomposition and generate watermark template, then reconstructs image after embed watermarking, completes the process of embedding watermarking. The algorithm makes full use of the excellent properties of the wavelet and singular value decomposition, which makes good performance for watermarking system. To this algorithm, the paper studied from two aspects of the image perceptual quality and robustness, and analyze the influence of the parameters in the performance of watermarking algorithm, a number of experiments and data show that these values may bring essential influence to the performance of digital watermarking system, also explains the importance of value selection in the algorithm. The conclusion of the paper is typical and universal, has certain reference significance to research and design the watermarking algorithm.
1980
Abstract: For the traditional RAID technology, the single controller controls all the disks, once it fails, and it can easily lead to paralysis of the entire storage system, this paper proposes an approach which is the information dispersed storage system architecture model based on the RAIC. The RAIC storage system uses the scattered information and the cloud storage technology, thus it increases the overall storage system reliability, availability and security.
1984
Abstract: The distributed computing framework of MapReduce has been widely used in big companies as a powerful tool for processing large scale of data. This paper will introduce the existing algorithms about MapReduce job scheduling and analyze the major two ones. It points out the defects of multi-task scheduling application on processing massive jobs and proposes a kind of multi-task cluster schedule algorithm MSBACO which is based on the ant colony optimization. The results of the experiments have proved its effectiveness and stability in heterogeneous environment.
1989
Abstract: Many existing automatic summarization methods often process a text based on the paragraphs. These methods ignore the correlation degree among paragraphs, which lead to the inaccuracy of the extracted summary. To solve the problem, we present a method based on mutual information. Firstly, we divide the whole text into several smaller blocks which relevant to each topic by measuring the degree of association among words, sentences and paragraphs. Then we compute the weight of the sentences by using the improved formula which aims to evaluate the importance of one sentence to a topic. Finally, the summary can be generated by combining the sentences selected from the different topics. The experiment result shows the validity of the method.
1994
Abstract: The coordination modeling language Paradigm addresses collaboration between components in terms of dynamic constraints. The consistency rule is a key notion in Paradigm. However, the original process of visualization modeling is without consistency rule, leading to complex. For this reason, by analyzing the theory of modeling in Paradigm and getting the relation between consistency rule and visualization modeling, the paper provides a method for visualization modeling with consistency rule. The method gets the input at first, and then creates state items, by checking states and action in the rule. Besides, getting the mouse events, it creates corresponding phase and traps to model. As the experiment, the method implements the process as design. The method brought in is valid for simplifying the process of creating visualization model.
1998
Abstract: In this paper we use the SVG technology to the field of Web GIS and set up the Traffic Accident Scene Management System (TASMS). Using text format characteristics of SVG, combined with ASP.NET technology and the scripting language JavaScript, we achieved dynamically load geographic information image, quick query and some user interaction functions.
2004

Showing 431 to 440 of 1031 Paper Titles