To allow frequent key-updates without increasing the risk of helper key-exposure, Hanaoka et al. proposed parallel key-insulated mechanism where distinct helpers are independently used in key updates. In this paper, we propose a new identity-based parallel key-insulated signature scheme which is provably secure without resorting to the random oracle methodology. Compared with the known identity-based parallel key-insulated signature (IBPKIS) scheme secure in the standard model, our scheme enjoys more efficient verification.
{"title":"A New Identity-Based Parallel Key-Insulated Signature Scheme without Random Oracles","authors":"Zhongmei Wan","doi":"10.1109/ISCID.2011.108","DOIUrl":"https://doi.org/10.1109/ISCID.2011.108","url":null,"abstract":"To allow frequent key-updates without increasing the risk of helper key-exposure, Hanaoka et al. proposed parallel key-insulated mechanism where distinct helpers are independently used in key updates. In this paper, we propose a new identity-based parallel key-insulated signature scheme which is provably secure without resorting to the random oracle methodology. Compared with the known identity-based parallel key-insulated signature (IBPKIS) scheme secure in the standard model, our scheme enjoys more efficient verification.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133421428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article uses factor analysis to determine the weight, and then combines the TOPSIS method to construct the regional technological innovation ability evaluation system. And I will select 10 primitive original indexes in 11 urban areas of Zhejiang. At last, discusses the deficiency and corresponding solution based on this analysis. This following will introduce how to use this method to conduct a comprehensive evaluation of technological innovation, and explore its significance, reflecting the reasonable and applicable.
{"title":"Application on the Evaluation of Technology Innovation Ability System of Urban Areas in Zhejiang Based on Factor Analysis Combined TOPSIS Method","authors":"Li-ping Xia, Yi Qin, Jiao Hu, Tingting Wang","doi":"10.1109/ISCID.2011.143","DOIUrl":"https://doi.org/10.1109/ISCID.2011.143","url":null,"abstract":"This article uses factor analysis to determine the weight, and then combines the TOPSIS method to construct the regional technological innovation ability evaluation system. And I will select 10 primitive original indexes in 11 urban areas of Zhejiang. At last, discusses the deficiency and corresponding solution based on this analysis. This following will introduce how to use this method to conduct a comprehensive evaluation of technological innovation, and explore its significance, reflecting the reasonable and applicable.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Textile and garment industry is the livelihood industry in china, but the apparel industry has high foreign trade dependence degree, thus, it is very necessary to predict exports of clothing effectively. In this paper, GM (1,1) model is applied to predict the apparel export volume in the next 3-5 years, adopt the data from1999 to 2008 in order to verify the model, the results show that the prediction accuracy is better, the forecast shows that china's garment exports are still on the momentum of rapid growth from 2011 to 2013, the situation is more optimistic.
{"title":"Applying GM (1,1) Model in China's Apparel Export Forecasting","authors":"Xia Li, F. Kong, Yingchun Liu, Yingbo Qin","doi":"10.1109/ISCID.2011.163","DOIUrl":"https://doi.org/10.1109/ISCID.2011.163","url":null,"abstract":"Textile and garment industry is the livelihood industry in china, but the apparel industry has high foreign trade dependence degree, thus, it is very necessary to predict exports of clothing effectively. In this paper, GM (1,1) model is applied to predict the apparel export volume in the next 3-5 years, adopt the data from1999 to 2008 in order to verify the model, the results show that the prediction accuracy is better, the forecast shows that china's garment exports are still on the momentum of rapid growth from 2011 to 2013, the situation is more optimistic.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130351920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data fusion is an important technology in WSN, But with the expansion of the scope object sensor and complexity increase, the fusion function is more and more complex, Energy consumption of the fusion operation is required more and more. Therefore, the energy consumption of the data fusion and the data transmission has been can't ignored already. Using the compressive sensing theory in the WSN data fusion, It's using auto-adapted data fusion algorithm. Collect and fusion the correlation node sensation data in the route process, To keep the total cost of the transmission and integration of energy close to the minimum.
{"title":"Research of Compressed Sensing Theory in WSN Data Fusion","authors":"Li Li, Jian Li","doi":"10.1109/ISCID.2011.133","DOIUrl":"https://doi.org/10.1109/ISCID.2011.133","url":null,"abstract":"Data fusion is an important technology in WSN, But with the expansion of the scope object sensor and complexity increase, the fusion function is more and more complex, Energy consumption of the fusion operation is required more and more. Therefore, the energy consumption of the data fusion and the data transmission has been can't ignored already. Using the compressive sensing theory in the WSN data fusion, It's using auto-adapted data fusion algorithm. Collect and fusion the correlation node sensation data in the route process, To keep the total cost of the transmission and integration of energy close to the minimum.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124374039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Effective porosity is one of the most important parameters in reservoir predication, especially in the carbonate karst reservoirs. In contrast to the calculated results by conventional statistical models, the BP neural network model can predict the porosity of reservoir more accurately because of its high nonlinear mapping ability and very strong abilities of self-adaptation and self-study. In this article, the author unified the different sampling interval of seismic and well logging responses by the mathematical method. Then discussed the correlation of them by the multiple linear regression. On that basis, the authors established the BP neural network model to predict the effective porosity of the reservoirs. The results shows that the porosity and the developed zone of fracture can be predicted in combination of three attributes of seismic and well logging data, moreover, the result is comparatively consistent well with the actually measured porosity and the well performance in study area.
{"title":"An Application of the BP Neural Network to Carbonate Karst Reservoirs Prediction","authors":"Yixin Yu, Jinchuan Zhang, Zhijun Jin","doi":"10.1109/ISCID.2011.135","DOIUrl":"https://doi.org/10.1109/ISCID.2011.135","url":null,"abstract":"Effective porosity is one of the most important parameters in reservoir predication, especially in the carbonate karst reservoirs. In contrast to the calculated results by conventional statistical models, the BP neural network model can predict the porosity of reservoir more accurately because of its high nonlinear mapping ability and very strong abilities of self-adaptation and self-study. In this article, the author unified the different sampling interval of seismic and well logging responses by the mathematical method. Then discussed the correlation of them by the multiple linear regression. On that basis, the authors established the BP neural network model to predict the effective porosity of the reservoirs. The results shows that the porosity and the developed zone of fracture can be predicted in combination of three attributes of seismic and well logging data, moreover, the result is comparatively consistent well with the actually measured porosity and the well performance in study area.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131729228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper applies chaotic encryption to information document, and designed a simple and fast encryption algorithm based on Sine Square Mapping. This kind of mapping can be chaotic in a wide parameter range and the sequences generated possess larger Lyapunov exponent and excellent dynamical properties. The keys of system's parameters, initial value and iterations are selected in order to let the chaotic encryption algorithm has a higher security and increase the key space. The simulation results show that the encryption algorithm of this paper can effectively resist the common assault of chaotic systems--statistical attack and brute-force attack.
{"title":"An Encryption Algorithm of Chaos Based on Sine Square Mapping","authors":"Yongyi Mao, Xiang Chen","doi":"10.1109/ISCID.2011.41","DOIUrl":"https://doi.org/10.1109/ISCID.2011.41","url":null,"abstract":"The paper applies chaotic encryption to information document, and designed a simple and fast encryption algorithm based on Sine Square Mapping. This kind of mapping can be chaotic in a wide parameter range and the sequences generated possess larger Lyapunov exponent and excellent dynamical properties. The keys of system's parameters, initial value and iterations are selected in order to let the chaotic encryption algorithm has a higher security and increase the key space. The simulation results show that the encryption algorithm of this paper can effectively resist the common assault of chaotic systems--statistical attack and brute-force attack.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116295933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile location service of dynamic geographic information space application that supported school teachers and students is a currently a research hotspot for universities. The applications of classroom navigation, teacher-student tracking monitoring, registration management, etc. it will meet the school management which offers convenience for personal position information retrieval, recommend services and individualized maps constructed. How to use mobile network to organically integrate LBS and WebGIS, and to construct a new generation of mobile information services platform and system environment based on the campus network location perception, this paper presents several key technologies of system framework and implementation.
{"title":"Interactive Mobile Campus Based on Position Perception","authors":"Wenzhi Liu, Zhaobin Liu, Yan Zhang","doi":"10.1109/ISCID.2011.45","DOIUrl":"https://doi.org/10.1109/ISCID.2011.45","url":null,"abstract":"Mobile location service of dynamic geographic information space application that supported school teachers and students is a currently a research hotspot for universities. The applications of classroom navigation, teacher-student tracking monitoring, registration management, etc. it will meet the school management which offers convenience for personal position information retrieval, recommend services and individualized maps constructed. How to use mobile network to organically integrate LBS and WebGIS, and to construct a new generation of mobile information services platform and system environment based on the campus network location perception, this paper presents several key technologies of system framework and implementation.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multi-sensors system is designed for realizing autonomous mobile of outdoor robot. GPS, two laser range finders, encode, electronics compass and camera are used to obtain the feeling information for outdoor autonomous mobile robot. Based on multithread technology, the data acquisition program of outdoor autonomous mobile robot is developed. This method can improve data synchronism and real time from sensors. The data acquisition methods of every sensor are introduced. The key technology of realization method is given. The experimental results show that multisensory data acquisition method is effective.
{"title":"Multi-sensor Data Acquisition for an Autonomous Mobile Outdoor Robot","authors":"Miaolei Zhou, Wei Gao","doi":"10.1109/ISCID.2011.190","DOIUrl":"https://doi.org/10.1109/ISCID.2011.190","url":null,"abstract":"Multi-sensors system is designed for realizing autonomous mobile of outdoor robot. GPS, two laser range finders, encode, electronics compass and camera are used to obtain the feeling information for outdoor autonomous mobile robot. Based on multithread technology, the data acquisition program of outdoor autonomous mobile robot is developed. This method can improve data synchronism and real time from sensors. The data acquisition methods of every sensor are introduced. The key technology of realization method is given. The experimental results show that multisensory data acquisition method is effective.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The article analyzed the situation of elevator and the elevator industry in China. This paper proposes an idea that programmable logic controller (PLC) control the hand elevator, and discusses the specific structure of the system and the method of implementation. Meanwhile, this paper analyzed hardware and software of the elevator system, used reasonable hardware and software together to achieve the objective that move with the elevator automation and simplified the control circuit, and the method greatly improved the reliability and stability of the elevator.
{"title":"A Control System Design for Hand Elevator Based on PLC","authors":"Peng Wang","doi":"10.1109/ISCID.2011.27","DOIUrl":"https://doi.org/10.1109/ISCID.2011.27","url":null,"abstract":"The article analyzed the situation of elevator and the elevator industry in China. This paper proposes an idea that programmable logic controller (PLC) control the hand elevator, and discusses the specific structure of the system and the method of implementation. Meanwhile, this paper analyzed hardware and software of the elevator system, used reasonable hardware and software together to achieve the objective that move with the elevator automation and simplified the control circuit, and the method greatly improved the reliability and stability of the elevator.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114590097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computing all minimal hitting sets (MHSs) is a key step of model-based diagnosis. A novel method to compute all MHSs called Binary-label HSSE is put forward, which combines HSSE-tree and binary label. In the method, binary digits is used to mark the real elements of the nodes, and effective pruning and expanding strategies are used to avoid the main problem of HSSE-tree, the explosive growth of the expanded nodes and supersets of MHSs along with the dimension of the problems. Additionally, computing between binary digits can avoid the traverse of every element in a node when judging whether the node is a MHS, which also contributes to the significant decrease of the run time. At last, the data structure of Binary-label HSSE is changed to dynamic array from dynamic linked list, which further decreases the run time of the method. Simulation results show that Binary-label HSSE method costs much less space and time than HSSE-tree method.
{"title":"A Method of Combining HSSE-tree and Binary Label to Compute All Minimal Hitting Sets","authors":"W. Feng, Min Du, Qi Zhao, Dong Wang","doi":"10.1109/ISCID.2011.107","DOIUrl":"https://doi.org/10.1109/ISCID.2011.107","url":null,"abstract":"Computing all minimal hitting sets (MHSs) is a key step of model-based diagnosis. A novel method to compute all MHSs called Binary-label HSSE is put forward, which combines HSSE-tree and binary label. In the method, binary digits is used to mark the real elements of the nodes, and effective pruning and expanding strategies are used to avoid the main problem of HSSE-tree, the explosive growth of the expanded nodes and supersets of MHSs along with the dimension of the problems. Additionally, computing between binary digits can avoid the traverse of every element in a node when judging whether the node is a MHS, which also contributes to the significant decrease of the run time. At last, the data structure of Binary-label HSSE is changed to dynamic array from dynamic linked list, which further decreases the run time of the method. Simulation results show that Binary-label HSSE method costs much less space and time than HSSE-tree method.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128265920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}