首页 > 最新文献

5th International Conference on Computer Sciences and Convergence Information Technology最新文献

英文 中文
Online banking authentication system using mobile-OTP with QR-code 网上银行认证系统使用移动otp与qr码
Young Sil Lee, N. Kim, Hyotaek Lim, HeungKuk Jo, Hoon-Jae Lee
As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking. Recently, the personal information has been leaked by a high-degree method such as Phishing or Pharming beyond snatching a user's ID and Password. Seeing that most of examples which happened in the domestic financial agencies were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new Online Banking Authentication system. This authentication system used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode.
随着高速互联网基础设施的发展和人们的信息化,金融工作也涉及到互联网领域。然而,现有的网上银行系统暴露在黑客攻击的危险之中。最近,除了获取用户的ID和密码外,还发生了网络钓鱼或网络诈骗等高度泄露个人信息的事件。鉴于国内金融机构发生的大多数事件都是由于盗用他人的ID或密码造成的,安全的用户确认系统就显得尤为重要。本文提出了一种新的网上银行认证系统。该认证系统采用移动OTP与qr码相结合的方式,qr码是二维条码的一种变体。
{"title":"Online banking authentication system using mobile-OTP with QR-code","authors":"Young Sil Lee, N. Kim, Hyotaek Lim, HeungKuk Jo, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711134","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711134","url":null,"abstract":"As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking. Recently, the personal information has been leaked by a high-degree method such as Phishing or Pharming beyond snatching a user's ID and Password. Seeing that most of examples which happened in the domestic financial agencies were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new Online Banking Authentication system. This authentication system used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Research on 29 DMUs rural infrastructure investment efficiency using Malmquist-DEA method 基于Malmquist-DEA方法的29个城市农村基础设施投资效率研究
Xu Shuhong
Analyzing investment efficiency of rural infrastructure is an important way to further exploit investment capacity and optimize resources distribution. On the basis of expounding basic principles of Malmquist-DEA, it chooses panel data in 1990–2007, and then measures and analysis the 29 DMUs' changes of TE, TP, PTE and SE, in order to improve investment efficiency of rural infrastructure in the east-central-west regions and further resolve the “Agriculture, Countryside and Farmer” issues.
分析农村基础设施投资效率是进一步开发投资能力、优化资源配置的重要途径。在阐述Malmquist-DEA基本原理的基础上,选取1990-2007年的面板数据,对29个dmu的TE、TP、PTE和SE的变化进行测度和分析,以期提高东中西部地区农村基础设施投资效率,进一步解决“三农”问题。
{"title":"Research on 29 DMUs rural infrastructure investment efficiency using Malmquist-DEA method","authors":"Xu Shuhong","doi":"10.1109/ICCIT.2010.5711162","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711162","url":null,"abstract":"Analyzing investment efficiency of rural infrastructure is an important way to further exploit investment capacity and optimize resources distribution. On the basis of expounding basic principles of Malmquist-DEA, it chooses panel data in 1990–2007, and then measures and analysis the 29 DMUs' changes of TE, TP, PTE and SE, in order to improve investment efficiency of rural infrastructure in the east-central-west regions and further resolve the “Agriculture, Countryside and Farmer” issues.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116971366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis towards a KVM-Based embedded real-time virtualization architecture 基于kvm的嵌入式实时虚拟化架构的性能分析
Jun Zhang, Kai Chen, Baojing Zuo, Ruhui Ma, Yaozu Dong, Haibing Guan
In Recent years embedded world has been undergoing a shift from traditional single-core processors to processors with multiple cores. However, this shift poses a challenge of adapting legacy uniprocessor-oriented real-time operating system (RTOS) to exploit the capability of multi-core processor. In addition, some embedded systems are inevitably going towards the direction of integrating real-time with off-the-shelf time-sharing system, as the combination of the two has the potential to provide not only timely and deterministic response but also a large application base. Virtualization technology, which ensures strong isolation between virtual machines, is therefore a promising solution to above mentioned issues. However, there remains a concern regarding the responsiveness of the RTOS running on top of a virtual machine. In this paper we propose an embedded real-time virtualization architecture based on Kernel-Based Virtual Machine (KVM), in which VxWorks and Linux are combined together. We then analyze and evaluate how KVM influences the interrupt-response times of VxWorks as a guest operating system. By applying several real-time performance tuning methods on the host Linux, we will show that sub-millisecond interrupt response latency can be achieved on the guest VxWorks.
近年来,嵌入式世界正经历着从传统的单核处理器向多核处理器的转变。然而,这种转变带来了一个挑战,即如何使传统的面向单处理器的实时操作系统(RTOS)适应多核处理器的能力。此外,一些嵌入式系统不可避免地会朝着实时与现成的分时系统集成的方向发展,因为两者的结合不仅有可能提供及时和确定的响应,而且还可能提供庞大的应用程序基础。因此,虚拟化技术可以确保虚拟机之间的强隔离,是解决上述问题的一个很有希望的解决方案。然而,仍然存在一个关于运行在虚拟机上的RTOS的响应性的问题。本文提出了一种基于内核虚拟机(Kernel-Based Virtual Machine, KVM)的嵌入式实时虚拟化架构,将VxWorks与Linux相结合。然后,我们分析和评估KVM如何影响作为客户机操作系统的VxWorks的中断响应时间。通过在主机Linux上应用几种实时性能调优方法,我们将展示在来宾VxWorks上可以实现亚毫秒级的中断响应延迟。
{"title":"Performance analysis towards a KVM-Based embedded real-time virtualization architecture","authors":"Jun Zhang, Kai Chen, Baojing Zuo, Ruhui Ma, Yaozu Dong, Haibing Guan","doi":"10.1109/ICCIT.2010.5711095","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711095","url":null,"abstract":"In Recent years embedded world has been undergoing a shift from traditional single-core processors to processors with multiple cores. However, this shift poses a challenge of adapting legacy uniprocessor-oriented real-time operating system (RTOS) to exploit the capability of multi-core processor. In addition, some embedded systems are inevitably going towards the direction of integrating real-time with off-the-shelf time-sharing system, as the combination of the two has the potential to provide not only timely and deterministic response but also a large application base. Virtualization technology, which ensures strong isolation between virtual machines, is therefore a promising solution to above mentioned issues. However, there remains a concern regarding the responsiveness of the RTOS running on top of a virtual machine. In this paper we propose an embedded real-time virtualization architecture based on Kernel-Based Virtual Machine (KVM), in which VxWorks and Linux are combined together. We then analyze and evaluate how KVM influences the interrupt-response times of VxWorks as a guest operating system. By applying several real-time performance tuning methods on the host Linux, we will show that sub-millisecond interrupt response latency can be achieved on the guest VxWorks.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116987915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Energy environmental education that supports sustainable town development 支持城镇可持续发展的能源环境教育
K. Takemata, A. Minamide, A. Minamide, Y. Kawata
This study is related to the development of teaching materials for energy environmental education. It is focused on the thermal environment issues of the earth. In order to understand the thermal environment of the earth, it is necessary to learn regional thermal environments in local area first. We have developed an educational program for grasping the current situation of land coverage in each region while considering a community bus, which is one of public transportation means. In addition, we have produced teaching contents for stirring students' interests in the thermal environment, based on the air temperature observation data.
本研究涉及能源环境教育教材的开发。它主要研究地球的热环境问题。要了解地球的热环境,首先要了解局部区域的热环境。我们制定了一个教育计划,在考虑公共交通工具之一的社区巴士的同时,掌握每个地区的土地覆盖现状。此外,我们还根据气温观测数据制作了激发学生热环境兴趣的教学内容。
{"title":"Energy environmental education that supports sustainable town development","authors":"K. Takemata, A. Minamide, A. Minamide, Y. Kawata","doi":"10.4156/ijact.vol3.issue3.2","DOIUrl":"https://doi.org/10.4156/ijact.vol3.issue3.2","url":null,"abstract":"This study is related to the development of teaching materials for energy environmental education. It is focused on the thermal environment issues of the earth. In order to understand the thermal environment of the earth, it is necessary to learn regional thermal environments in local area first. We have developed an educational program for grasping the current situation of land coverage in each region while considering a community bus, which is one of public transportation means. In addition, we have produced teaching contents for stirring students' interests in the thermal environment, based on the air temperature observation data.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On a Digital-Right-Management system using One-Time-Password 基于一次性密码的数字版权管理系统研究
Beum-Su Park, Shirley Lee, Hoon-Jae Lee
Recently, due to the development of internet and digital media technology, the usage of illegal copy and distribution of digital media contents is increasing as well. Digital Right Management (DRM) was introduced to control the usage of the illegal and distribution of digital media. However, there are still some limitations in current DRM system. In this paper, we analyze the problem of existing DRM system by using One-Time Password (OTP) based on PINGPONG 128. In addition, we used partial descryption during the streaming progress to increase the security of the scheme.
近年来,由于互联网和数字媒体技术的发展,非法复制和传播数字媒体内容的行为也越来越多。数字版权管理(DRM)的引入是为了控制数字媒体的非法使用和传播。但是,目前的DRM制度还存在一定的局限性。本文分析了现有基于乒乓128的一次性密码(OTP) DRM系统存在的问题。此外,我们在流传输过程中使用了部分描述来提高方案的安全性。
{"title":"On a Digital-Right-Management system using One-Time-Password","authors":"Beum-Su Park, Shirley Lee, Hoon-Jae Lee","doi":"10.1109/ICCIT.2010.5711214","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711214","url":null,"abstract":"Recently, due to the development of internet and digital media technology, the usage of illegal copy and distribution of digital media contents is increasing as well. Digital Right Management (DRM) was introduced to control the usage of the illegal and distribution of digital media. However, there are still some limitations in current DRM system. In this paper, we analyze the problem of existing DRM system by using One-Time Password (OTP) based on PINGPONG 128. In addition, we used partial descryption during the streaming progress to increase the security of the scheme.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Visual data hiding in dot diffusion images 隐藏在点扩散图像中的可视数据
Xiaotian Wu, Wei Sun
In this paper, a novel visual data hiding method is proposed to conceal a binary visual pattern into a dot diffused halftone image. The visual pattern is revealed by copying the halftone image, shifting the copy and superimposing the shifted copy and original halftone image together. The self-decrypt property of the proposed method make it more robust against geometry distortion, while other existing visual data hiding approaches are not. Experimental results illustrate the advantages and effectiveness of the proposed method as well.
本文提出了一种新的视觉数据隐藏方法,将二值视觉模式隐藏到点扩散半色调图像中。通过复制半色调图像,移动副本,并将移动的副本与原始半色调图像叠加在一起,显示视觉图案。该方法的自解密特性使其对几何变形具有更强的鲁棒性,而现有的可视化数据隐藏方法则没有。实验结果也证明了该方法的优越性和有效性。
{"title":"Visual data hiding in dot diffusion images","authors":"Xiaotian Wu, Wei Sun","doi":"10.1109/ICCIT.2010.5711123","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711123","url":null,"abstract":"In this paper, a novel visual data hiding method is proposed to conceal a binary visual pattern into a dot diffused halftone image. The visual pattern is revealed by copying the halftone image, shifting the copy and superimposing the shifted copy and original halftone image together. The self-decrypt property of the proposed method make it more robust against geometry distortion, while other existing visual data hiding approaches are not. Experimental results illustrate the advantages and effectiveness of the proposed method as well.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Change Detection by Level (CDL): An efficient algorithm to detect change on XML documents 按级别更改检测(CDL):一种检测XML文档更改的有效算法
Claudio Gutiérrez-Soto, Alejandro Barra, Andres Landaeta, Angélica Urrutia
Nowadays XML have reached a great interest, because it is possible to share information through the Web. Moreover, the Web can be conceived as a huge Database. Therefore, like DBMS traditional, the Web needs efficient algorithms to detect changes on the Database. In this paper we present an efficient algorithm to detect change in XML documents. Algorithm efficiency resides in the efficient application of Hash function and how this information is used. The theoretical complexity of algorithm is O(nlogn+ eG), where n is the number of vertices and eG is the cost to check all edges. The proposed algorithm was compared with X-Diff algorithm in order to show the new algorithm performance. Experimental results show a much better performance of CDL algorithm.
现在XML已经引起了极大的兴趣,因为它可以通过Web共享信息。此外,Web可以被看作是一个巨大的数据库。因此,像传统的DBMS一样,Web需要有效的算法来检测数据库上的变化。本文提出了一种检测XML文档变化的有效算法。算法的效率取决于哈希函数的有效应用以及如何使用这些信息。算法的理论复杂度为O(nlogn+ eG),其中n为顶点数,eG为检查所有边的代价。将该算法与X-Diff算法进行了比较,验证了新算法的性能。实验结果表明,CDL算法具有较好的性能。
{"title":"Change Detection by Level (CDL): An efficient algorithm to detect change on XML documents","authors":"Claudio Gutiérrez-Soto, Alejandro Barra, Andres Landaeta, Angélica Urrutia","doi":"10.1109/ICCIT.2010.5711019","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711019","url":null,"abstract":"Nowadays XML have reached a great interest, because it is possible to share information through the Web. Moreover, the Web can be conceived as a huge Database. Therefore, like DBMS traditional, the Web needs efficient algorithms to detect changes on the Database. In this paper we present an efficient algorithm to detect change in XML documents. Algorithm efficiency resides in the efficient application of Hash function and how this information is used. The theoretical complexity of algorithm is O(nlogn+ eG), where n is the number of vertices and eG is the cost to check all edges. The proposed algorithm was compared with X-Diff algorithm in order to show the new algorithm performance. Experimental results show a much better performance of CDL algorithm.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128618106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Realistic woven fabric rendering using deformed microfacet distribution function 利用变形微面分布函数绘制真实感机织织物
Sung-Soo Kim, Young-Min Kang, Jongho Won
We present a new procedural method for photorealistic rendering of woven fabric material. The goal of our research is to provide a new procedural method that renders photorealistic woven fabric without any measured data. The proposed method models the reflectance properties of woven fabric with alternating anisotropy and yarn-level surface normal manipulation. The proposed method models the reflectance properties of woven fabric with alternating anisotropy and deformed microfacet distribution function (MDF). The deformed MDF effectively represents the perturbed reflectance caused by bumps on the woven fabric surface. The experimental results show the proposed method can be successfully applied to photorealistic rendering of diverse woven fabric materials.
提出了一种新的机织材料真实感渲染程序方法。我们的研究目标是提供一种新的程序方法,在没有任何测量数据的情况下呈现逼真的机织织物。该方法采用各向异性交替和纱级表面法向操作对机织物的反射特性进行建模。该方法采用交替各向异性和变形微面分布函数(MDF)对机织物的反射特性进行建模。变形的中密度纤维板有效地代表了机织织物表面凸起引起的扰动反射。实验结果表明,该方法可以成功地应用于各种机织材料的真实感渲染。
{"title":"Realistic woven fabric rendering using deformed microfacet distribution function","authors":"Sung-Soo Kim, Young-Min Kang, Jongho Won","doi":"10.1109/ICCIT.2010.5711186","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711186","url":null,"abstract":"We present a new procedural method for photorealistic rendering of woven fabric material. The goal of our research is to provide a new procedural method that renders photorealistic woven fabric without any measured data. The proposed method models the reflectance properties of woven fabric with alternating anisotropy and yarn-level surface normal manipulation. The proposed method models the reflectance properties of woven fabric with alternating anisotropy and deformed microfacet distribution function (MDF). The deformed MDF effectively represents the perturbed reflectance caused by bumps on the woven fabric surface. The experimental results show the proposed method can be successfully applied to photorealistic rendering of diverse woven fabric materials.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127309937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault attack for the iterative operation of AES S-Box AES S-Box迭代操作的故障攻击
JeaHoon Park, S. Moon, Dooho Choi, Yousung Kang, JaeCheol Ha
This paper presents a practical Differential Fault Analysis (DFA) method for the iterative operation on the SubBytes transformation AES. To inject a fault to the iterative operation, we conduct an experiment using a laser injection tool. And, then to deduce the last round key, we analyze the relationship between the input of S-Box and the output of S-Box. Based on a computer analysis, our proposal fault attack retrieves the AES 128-bit secret key with about 211 complexity in average using one pair of correct and faulty ciphertext.
针对子字节变换AES的迭代运算,提出了一种实用的差分故障分析(DFA)方法。为了在迭代操作中注入故障,我们使用激光注入工具进行了实验。然后,通过分析S-Box输入和S-Box输出之间的关系,推导出最后一轮密钥。在计算机分析的基础上,我们提出的故障攻击利用一对正确和错误的密文检索AES 128位密钥,平均复杂度约为211。
{"title":"Fault attack for the iterative operation of AES S-Box","authors":"JeaHoon Park, S. Moon, Dooho Choi, Yousung Kang, JaeCheol Ha","doi":"10.1109/ICCIT.2010.5711116","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711116","url":null,"abstract":"This paper presents a practical Differential Fault Analysis (DFA) method for the iterative operation on the SubBytes transformation AES. To inject a fault to the iterative operation, we conduct an experiment using a laser injection tool. And, then to deduce the last round key, we analyze the relationship between the input of S-Box and the output of S-Box. Based on a computer analysis, our proposal fault attack retrieves the AES 128-bit secret key with about 211 complexity in average using one pair of correct and faulty ciphertext.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128958790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The empirical study on fractal characteristics of real estate market 房地产市场分形特征的实证研究
Yao Feng-ge, Han Jing
The traditional real estate market theories are studied within the frame of neoclassical economics. As the core of neoclassical economics, Efficient Market Hypothesis (EMH) is the foundation of real estate market theory. But the traditional linear paradigm is facing a serious challenge from non-linear paradigm. Using R/S analysis method, which is the classical algorithm of Hurst index based on fractal characteristics, this paper did simulated experiment in the real estate market of china. The result shows that there exists a complex interaction among the factors, which could affect real estate market in China. It also reveals that Efficient Market Hypothesis (EMH) is not quite in line with the realities of the real estate market, and the psychology of individual and group investors has significant influence on the real estate market. The characters of fluctuations of real estate revenue in China are non-linear, non-equilibrium, fractal and chaotic. The fluctuation is in line with Fractional Brownian motion.
传统的房地产市场理论是在新古典经济学的框架内进行研究的。有效市场假说作为新古典经济学的核心,是房地产市场理论的基础。但传统的线性范式正面临着非线性范式的严峻挑战。本文采用基于分形特征的Hurst指数经典算法R/S分析法,对中国房地产市场进行了模拟实验。结果表明,影响中国房地产市场的因素之间存在复杂的相互作用。这也揭示了有效市场假说(EMH)并不完全符合房地产市场的实际情况,个人和群体投资者的心理对房地产市场的影响是显著的。中国房地产收入波动具有非线性、非均衡、分形和混沌的特征。涨落符合分数阶布朗运动。
{"title":"The empirical study on fractal characteristics of real estate market","authors":"Yao Feng-ge, Han Jing","doi":"10.1109/ICCIT.2010.5711159","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711159","url":null,"abstract":"The traditional real estate market theories are studied within the frame of neoclassical economics. As the core of neoclassical economics, Efficient Market Hypothesis (EMH) is the foundation of real estate market theory. But the traditional linear paradigm is facing a serious challenge from non-linear paradigm. Using R/S analysis method, which is the classical algorithm of Hurst index based on fractal characteristics, this paper did simulated experiment in the real estate market of china. The result shows that there exists a complex interaction among the factors, which could affect real estate market in China. It also reveals that Efficient Market Hypothesis (EMH) is not quite in line with the realities of the real estate market, and the psychology of individual and group investors has significant influence on the real estate market. The characters of fluctuations of real estate revenue in China are non-linear, non-equilibrium, fractal and chaotic. The fluctuation is in line with Fractional Brownian motion.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
5th International Conference on Computer Sciences and Convergence Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1