Haider Abbas, Christer Magnusson, L. Yngström, A. Hemani
Organizations relying on Information Technology for their business processes have to employ various Security Mechanisms (Authentication, Authorization, Hashing, Encryption etc) to achieve their organizational security objectives of data confidentiality, integrity and availability. These security mechanisms except from their intended role of increased security level for this organization may also affect other systems outside the organization in a positive or negative manner called externalities. Externalities emerge in several ways i. e. direct cost, direct benefit, indirect cost and indirect benefit. Organizations barely consider positive externalities although they can be beneficial and the negative externalities that could create vulnerabilities are simply ignored. In this paper, we will present an infrastructure to streamline information security externalities that appear dynamically for an organization.
{"title":"A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms","authors":"Haider Abbas, Christer Magnusson, L. Yngström, A. Hemani","doi":"10.1109/ETCS.2010.493","DOIUrl":"https://doi.org/10.1109/ETCS.2010.493","url":null,"abstract":"Organizations relying on Information Technology for their business processes have to employ various Security Mechanisms (Authentication, Authorization, Hashing, Encryption etc) to achieve their organizational security objectives of data confidentiality, integrity and availability. These security mechanisms except from their intended role of increased security level for this organization may also affect other systems outside the organization in a positive or negative manner called externalities. Externalities emerge in several ways i. e. direct cost, direct benefit, indirect cost and indirect benefit. Organizations barely consider positive externalities although they can be beneficial and the negative externalities that could create vulnerabilities are simply ignored. In this paper, we will present an infrastructure to streamline information security externalities that appear dynamically for an organization.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122147526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Task-based language teaching, as a learner-centered and humanistic way of teaching, involves the learners in performing tasks. Learners' needs analysis, which acts as the principal part in language teaching, will influence the curriculum design, teaching process, teaching methodology and teaching outcomes and elicit relative pedagogical implications.
{"title":"Notice of RetractionLearners' Needs Analysis in Task-Based Language Teaching","authors":"Xin-ming Lin","doi":"10.1109/ETCS.2010.495","DOIUrl":"https://doi.org/10.1109/ETCS.2010.495","url":null,"abstract":"Task-based language teaching, as a learner-centered and humanistic way of teaching, involves the learners in performing tasks. Learners' needs analysis, which acts as the principal part in language teaching, will influence the curriculum design, teaching process, teaching methodology and teaching outcomes and elicit relative pedagogical implications.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122151357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wu Liangcai, Wei Zhiming, Liu Xiangtong, Z. Shuyuan
According to the deformation trend of the plasmodium, the paper utilizes the concept of equal dimension and new information in grey theory to train BP network, sets up equal-dimension and new information model that can fully reflect the law of deformation, and carries on real deformation prediction with this model. Meanwhile, the text utilizes GM (1,1) model of grey theory to predict the plasmodium. By comparing the prediction of the two methods, it draws the conclusion: the equal dimension and new information model is suitable for long data prediction of array and the precision of GM(1,1) model is relatively high.
{"title":"Application of Grey-Equal Dimension and New Information Neural Network Model to Deformation Prediction","authors":"Wu Liangcai, Wei Zhiming, Liu Xiangtong, Z. Shuyuan","doi":"10.1109/ETCS.2010.191","DOIUrl":"https://doi.org/10.1109/ETCS.2010.191","url":null,"abstract":"According to the deformation trend of the plasmodium, the paper utilizes the concept of equal dimension and new information in grey theory to train BP network, sets up equal-dimension and new information model that can fully reflect the law of deformation, and carries on real deformation prediction with this model. Meanwhile, the text utilizes GM (1,1) model of grey theory to predict the plasmodium. By comparing the prediction of the two methods, it draws the conclusion: the equal dimension and new information model is suitable for long data prediction of array and the precision of GM(1,1) model is relatively high.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122151402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An Authenticated key agreement protocols, which is against the attack of quantum computer, is proposed. The strength of the proposed protocol is based on the problem of searching for an isogeny between elliptic curves. The time complexity for solving this problem is exponential, and the problem seems to be hard for solving with a quantum computer. The proposed protocol can provide the security properties known session key security, forward security, resistance to key-compromise impersonation attack and to unknown key-share attack, key control.
{"title":"An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves","authors":"Weiwei Han, D. He","doi":"10.1109/ETCS.2010.22","DOIUrl":"https://doi.org/10.1109/ETCS.2010.22","url":null,"abstract":"All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An Authenticated key agreement protocols, which is against the attack of quantum computer, is proposed. The strength of the proposed protocol is based on the problem of searching for an isogeny between elliptic curves. The time complexity for solving this problem is exponential, and the problem seems to be hard for solving with a quantum computer. The proposed protocol can provide the security properties known session key security, forward security, resistance to key-compromise impersonation attack and to unknown key-share attack, key control.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129809072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu-bao Cui, Yan Cui, Z. Hou, Ya-nan Kang, Qiang Fu
DiffServ model is a main model that guarantees QoS in modern-Large-scale network., On the basis of RIO-C, the paper introduces an Active Queue Management algorithm -- PFRIO that is suitable for DiffServ model. The algorithm increases the fair for bandwidth allocation and the network’s capacity to hand of sudden data flow, and improves the overall performance of DiffServ model effectively.
{"title":"An Active Queue Management Algorithm Based on DiffServ Model","authors":"Yu-bao Cui, Yan Cui, Z. Hou, Ya-nan Kang, Qiang Fu","doi":"10.1109/ETCS.2010.447","DOIUrl":"https://doi.org/10.1109/ETCS.2010.447","url":null,"abstract":"DiffServ model is a main model that guarantees QoS in modern-Large-scale network., On the basis of RIO-C, the paper introduces an Active Queue Management algorithm -- PFRIO that is suitable for DiffServ model. The algorithm increases the fair for bandwidth allocation and the network’s capacity to hand of sudden data flow, and improves the overall performance of DiffServ model effectively.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"26 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129856616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CEEU (computer elementary education in university) is to develop students adapt to the new era, to master new technical means of education, whose main goal is to foster a high level, complex, multi-skilled and innovative professional talented persons. The current characteristics of CEEU are analyzed and the reform on modularization of teaching contents is realized. Also, the digital teaching system is established after the research on the teaching pattern of CEEU. What's more, a training system for talented persons is established after the investigation to the problems in the process of CEEU. In addition, a reasonable mechanism of the examinations is proposed for the request of the selection of qualified personnel in modern education system. In comparison with the teaching effects of CEEU, the solution of the reform of CEEU offers a certain reference value to the education reform on other disciplines.
{"title":"Notice of RetractionResearch on Reform of Computer Elementary Education in University","authors":"Ming Xiao, Guan Hu","doi":"10.1109/ETCS.2010.405","DOIUrl":"https://doi.org/10.1109/ETCS.2010.405","url":null,"abstract":"CEEU (computer elementary education in university) is to develop students adapt to the new era, to master new technical means of education, whose main goal is to foster a high level, complex, multi-skilled and innovative professional talented persons. The current characteristics of CEEU are analyzed and the reform on modularization of teaching contents is realized. Also, the digital teaching system is established after the research on the teaching pattern of CEEU. What's more, a training system for talented persons is established after the investigation to the problems in the process of CEEU. In addition, a reasonable mechanism of the examinations is proposed for the request of the selection of qualified personnel in modern education system. In comparison with the teaching effects of CEEU, the solution of the reform of CEEU offers a certain reference value to the education reform on other disciplines.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128525629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
First, the meaning of data mining from EMR with a view to discover valuable knowledge, as well as current problems is introduced. Then, several possible storage methods for EMR are deeply analyzed and studied. On this basis, the solution of storage XML EMR with DB2/9.5 hybrid database is presented. The XQ-Apriori algorithm based on classic Apriori algorithm and XML query language XQuery, as well as an application case for association rules mining directly from XML EMR and other kinds of XML documents is introduced in detail. It is proved the association between diseases can be discovered in effect by using this algorithm. Finally, the application circs and the application scope of the algorithm are summarized and illuminated, and further developed research work by author are recommended.
{"title":"Diseases Association Discovery Based on XML EMR","authors":"Xu Yabin, Peng Hongyu","doi":"10.1109/ETCS.2010.501","DOIUrl":"https://doi.org/10.1109/ETCS.2010.501","url":null,"abstract":"First, the meaning of data mining from EMR with a view to discover valuable knowledge, as well as current problems is introduced. Then, several possible storage methods for EMR are deeply analyzed and studied. On this basis, the solution of storage XML EMR with DB2/9.5 hybrid database is presented. The XQ-Apriori algorithm based on classic Apriori algorithm and XML query language XQuery, as well as an application case for association rules mining directly from XML EMR and other kinds of XML documents is introduced in detail. It is proved the association between diseases can be discovered in effect by using this algorithm. Finally, the application circs and the application scope of the algorithm are summarized and illuminated, and further developed research work by author are recommended.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128672422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
De-hua Wu, Song-ling Chen, Wen-Yu Liu, Jiang-long Liu
The prototyping is to realize an original model quickly according to the communication between users and developers to improve the model quality and decrease the faults. According to analyzing the basic characteristics of the mining recycling economy, a spatial decision support system (SDSS) development strategy by using the prototyping is proposed to integrate the technologies of the rapid prototyping, ComGIS skills and DSS. A SDSS of mining recycling economy in Qiandongnan is designed as an example using prototyping as its main method, the basic frame has been finished, and the design of its function models and model base also defined.
{"title":"Research on Mining Recycling Economy Spatial Decision Support System Based on Prototyping","authors":"De-hua Wu, Song-ling Chen, Wen-Yu Liu, Jiang-long Liu","doi":"10.1109/ETCS.2010.313","DOIUrl":"https://doi.org/10.1109/ETCS.2010.313","url":null,"abstract":"The prototyping is to realize an original model quickly according to the communication between users and developers to improve the model quality and decrease the faults. According to analyzing the basic characteristics of the mining recycling economy, a spatial decision support system (SDSS) development strategy by using the prototyping is proposed to integrate the technologies of the rapid prototyping, ComGIS skills and DSS. A SDSS of mining recycling economy in Qiandongnan is designed as an example using prototyping as its main method, the basic frame has been finished, and the design of its function models and model base also defined.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129427850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Personalized recommendation in an e-learning system can actively introduce useful learning resources for learners. It is a “push” mechanism in contrast to the “pull” way like Web searching. At the same time it is also a very efficient way especially when users can not describe their needs exactly. This paper put forward an approach to recommend right learning resources for users with different learning needs by hybrid filtering method. Learning resources are organized by learning topics through text analysis. Users with similar learning interests are found out to form different common interest groups by user behavior tracing and recording. Then, two-level user profiles are built based on common interest group detection and text analysis. At last, learning resources are introduced to users according to user profiles by collaborative filtering and content-based filtering respectively. A time factor is also introduced into the building of user profiles, which makes user profiles adapt to user’s interest shifting.
{"title":"Hybrid Filtering Recommendation in E-Learning Environment","authors":"Lianhong Ding, Bingwu Liu, Qi Tao","doi":"10.1109/ETCS.2010.378","DOIUrl":"https://doi.org/10.1109/ETCS.2010.378","url":null,"abstract":"Personalized recommendation in an e-learning system can actively introduce useful learning resources for learners. It is a “push” mechanism in contrast to the “pull” way like Web searching. At the same time it is also a very efficient way especially when users can not describe their needs exactly. This paper put forward an approach to recommend right learning resources for users with different learning needs by hybrid filtering method. Learning resources are organized by learning topics through text analysis. Users with similar learning interests are found out to form different common interest groups by user behavior tracing and recording. Then, two-level user profiles are built based on common interest group detection and text analysis. At last, learning resources are introduced to users according to user profiles by collaborative filtering and content-based filtering respectively. A time factor is also introduced into the building of user profiles, which makes user profiles adapt to user’s interest shifting.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chromosome segmentation affects the performance of the chromosome automatic analysis systems. Watershed algorithm is a widely used segmentation method. Applying it to segment chromosome images can overcome the difficulty caused by overlapping chromosomes. But the vice of the algorithm is its over-segmentation results. An algorithm based on watershed was presented in this paper. The overlapping chromosome images were obtained by a series of pretreatments. Then the distance transform was used to treat these images. The results of the transformation were used as input images for the watershed algorithm. The experiment proved that this algorithm can segment the overlapping chromosomes successfully.
{"title":"A Watershed Based Segmentation Method for Overlapping Chromosome Images","authors":"Yan Wenzhong, Feng Xiaohui","doi":"10.1109/ETCS.2010.107","DOIUrl":"https://doi.org/10.1109/ETCS.2010.107","url":null,"abstract":"Chromosome segmentation affects the performance of the chromosome automatic analysis systems. Watershed algorithm is a widely used segmentation method. Applying it to segment chromosome images can overcome the difficulty caused by overlapping chromosomes. But the vice of the algorithm is its over-segmentation results. An algorithm based on watershed was presented in this paper. The overlapping chromosome images were obtained by a series of pretreatments. Then the distance transform was used to treat these images. The results of the transformation were used as input images for the watershed algorithm. The experiment proved that this algorithm can segment the overlapping chromosomes successfully.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129447484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}