The paper analyses the actuality of agriculture from the perspective of the supply chain, concluded the mode and the deficiency of current agriculture supply chain, then constructs one kind of new supply chain mode based on information sharing which fits China's agricultural development, and analysis the new mode from the perspective of value chain, finally provides a case of Gannan navel orange industry to invest the practicability of this mode.
{"title":"The Reconstruction of Agriculture Supply Chain Based on Information Sharing","authors":"Qi Ming, Xie Jingxu","doi":"10.1109/CCCM.2008.282","DOIUrl":"https://doi.org/10.1109/CCCM.2008.282","url":null,"abstract":"The paper analyses the actuality of agriculture from the perspective of the supply chain, concluded the mode and the deficiency of current agriculture supply chain, then constructs one kind of new supply chain mode based on information sharing which fits China's agricultural development, and analysis the new mode from the perspective of value chain, finally provides a case of Gannan navel orange industry to invest the practicability of this mode.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128165840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Independent studies have shown that mobile commerce (m-commerce) can have an important influence on business and society in the future. Hence, network designers, service providers, vendors and application developers must carefully take the needs and considerations of various users into account to provide better services and attract them to m-commerce. Consequently, maximizing the m-commerce user requirements and their significance becomes an essential and crucial process for the standardization and improvement of associated systems. On this line, the objective of this paper is to propose a multi-objective optimization model of location based services(LBS) network. The process of modeling focuses on customer satisfaction to provide practitioners a more effective and efficient model for enhancing m-commerce service level and prioritizing m-commerce requirements.
{"title":"A Multiobjective Optimization of Location Based Services Network in Mobile Commerce Based on Customer Satisfaction","authors":"Min Zhang, Weiwei Yan","doi":"10.1109/CCCM.2008.309","DOIUrl":"https://doi.org/10.1109/CCCM.2008.309","url":null,"abstract":"Independent studies have shown that mobile commerce (m-commerce) can have an important influence on business and society in the future. Hence, network designers, service providers, vendors and application developers must carefully take the needs and considerations of various users into account to provide better services and attract them to m-commerce. Consequently, maximizing the m-commerce user requirements and their significance becomes an essential and crucial process for the standardization and improvement of associated systems. On this line, the objective of this paper is to propose a multi-objective optimization model of location based services(LBS) network. The process of modeling focuses on customer satisfaction to provide practitioners a more effective and efficient model for enhancing m-commerce service level and prioritizing m-commerce requirements.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128250915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. Chan-Cheng, Shen-Lin-Hwang and then Chang-Hwang pointed out some attacks on Hwang-Li's scheme. Shen-Lin-Hwang also proposed a modified scheme. In 2003, Leung et al showed that the modified scheme is still vulnerable to some previous attacks. In 2004, Kumar proposed a new scheme to solve these problems. In this paper, we find out that some weaknesses still exist in Kumar's scheme and present a modified remote user authentication and key agreement scheme using smart cards to conquer them. The proposed scheme also generates a common session key.
{"title":"A Modified Remote User Authentication and Key Agreement Scheme Using Smart Cards","authors":"Lijiang Zhang, Puwen Wei","doi":"10.1109/CCCM.2008.67","DOIUrl":"https://doi.org/10.1109/CCCM.2008.67","url":null,"abstract":"In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. Chan-Cheng, Shen-Lin-Hwang and then Chang-Hwang pointed out some attacks on Hwang-Li's scheme. Shen-Lin-Hwang also proposed a modified scheme. In 2003, Leung et al showed that the modified scheme is still vulnerable to some previous attacks. In 2004, Kumar proposed a new scheme to solve these problems. In this paper, we find out that some weaknesses still exist in Kumar's scheme and present a modified remote user authentication and key agreement scheme using smart cards to conquer them. The proposed scheme also generates a common session key.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128590504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anan Fang, Xiaoli Ye, An Chen, Xiaoling Xu, Rong Yu
It was commonly modified a thermocouple transducer artificially and piecewise through the presupposed values in order to compensate its nonlinearity effects on the temperature measurement. In doing so, although it can solve some errors in measurement, the parameters appear to be divergent from one to another for the same group of thermocouple transducers, and hence compensations must be executed for each of them. The work is heavy, the efficiency is low and the effect is poor. Just for those reasons, the designers have been obsessed with such sort of issues, which are sticky ones in front of them as well. Is there a better way to help them out of the present predicament? Yes, The author has found out the relationship among the external temperature, the measured temperature and the thermoelectric potential generated through the thermocouple transducer by comparing a great deal of thermocouple transducers, that is,there is a certain linear relationship existing in a high-order power series function. So we have used high-speed operational amplifiers to compute the high-order power series function and compensate the circuit in order to realize the real-time compensation for thermocouple transducers, which has not only realized the linearity optimization of them, but also got the instantaneous time of temperature measurement. In the end the accuracy of the controlled temperature has greatly increased. The results are satisfying according to the application of temperature-controlled furnaces.
{"title":"Using Operational Amplifiers to Realize the Compensation of Thermocouples","authors":"Anan Fang, Xiaoli Ye, An Chen, Xiaoling Xu, Rong Yu","doi":"10.1109/CCCM.2008.388","DOIUrl":"https://doi.org/10.1109/CCCM.2008.388","url":null,"abstract":"It was commonly modified a thermocouple transducer artificially and piecewise through the presupposed values in order to compensate its nonlinearity effects on the temperature measurement. In doing so, although it can solve some errors in measurement, the parameters appear to be divergent from one to another for the same group of thermocouple transducers, and hence compensations must be executed for each of them. The work is heavy, the efficiency is low and the effect is poor. Just for those reasons, the designers have been obsessed with such sort of issues, which are sticky ones in front of them as well. Is there a better way to help them out of the present predicament? Yes, The author has found out the relationship among the external temperature, the measured temperature and the thermoelectric potential generated through the thermocouple transducer by comparing a great deal of thermocouple transducers, that is,there is a certain linear relationship existing in a high-order power series function. So we have used high-speed operational amplifiers to compute the high-order power series function and compensate the circuit in order to realize the real-time compensation for thermocouple transducers, which has not only realized the linearity optimization of them, but also got the instantaneous time of temperature measurement. In the end the accuracy of the controlled temperature has greatly increased. The results are satisfying according to the application of temperature-controlled furnaces.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128613850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To improve performance of product in early concept design stage, a digital integrated design and analysis system is proposed which integrated CAD and CAE in the same environment. The system creates a characteristic information center including a set of features parameters and assembly constraints based on analysis of the parameters and assembly relationships of product assembly model. The coherence and reusability of the information expression of product are concentrated on in design stage. The CAD modeling and CAE modeling of product are shared same characteristic information center. So if any of them is changed, the other will be updated in the same time. An example is given to illustrate the benefits of integrated assembly modeling technology.
{"title":"The Digital Integrated Research of Product Design Based on Assembly Model","authors":"Xiaoxia Chen, Shuzhong Lin, J. Xing","doi":"10.1109/CCCM.2008.192","DOIUrl":"https://doi.org/10.1109/CCCM.2008.192","url":null,"abstract":"To improve performance of product in early concept design stage, a digital integrated design and analysis system is proposed which integrated CAD and CAE in the same environment. The system creates a characteristic information center including a set of features parameters and assembly constraints based on analysis of the parameters and assembly relationships of product assembly model. The coherence and reusability of the information expression of product are concentrated on in design stage. The CAD modeling and CAE modeling of product are shared same characteristic information center. So if any of them is changed, the other will be updated in the same time. An example is given to illustrate the benefits of integrated assembly modeling technology.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129344785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An efficient interleaving algorithm is applied to reduce the loss of ciphered MELP encoding information when a cipher system transmits over a wireless HF fading channel environment. As such, a new scheme for deciding the interleaving depth over a wireless environment is described. Simulations confirm that the proposed efficient algorithm with a variable interleaving depth produces a better performance over a HF fading channel than a static depth with a fixed interleaving depth. Experimental results showed that the BER performance of the proposed efficient interleaving scheme is higher than that of the fixed interleaving depth scheme. Of particular note is that the dynamic allocation algorithm (DAA) reduces degraded error bits by up to 25%, compared with static allocation algorithm (SAA) of depth 48 in HF channel.
{"title":"The Crypto Transmission in HF Wireless Environment","authors":"Jinkeun Hong, Kunhee Han","doi":"10.1109/CCCM.2008.315","DOIUrl":"https://doi.org/10.1109/CCCM.2008.315","url":null,"abstract":"An efficient interleaving algorithm is applied to reduce the loss of ciphered MELP encoding information when a cipher system transmits over a wireless HF fading channel environment. As such, a new scheme for deciding the interleaving depth over a wireless environment is described. Simulations confirm that the proposed efficient algorithm with a variable interleaving depth produces a better performance over a HF fading channel than a static depth with a fixed interleaving depth. Experimental results showed that the BER performance of the proposed efficient interleaving scheme is higher than that of the fixed interleaving depth scheme. Of particular note is that the dynamic allocation algorithm (DAA) reduces degraded error bits by up to 25%, compared with static allocation algorithm (SAA) of depth 48 in HF channel.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129928661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increasing acceptance of digital certificates, how to find and revoke digital certificate which has been stopped has been become more and more important, which can avoid huge economic losses to end-user. At present the most popular choice is the use of lightweight directory access protocol (LDAP) directory server to issue the certificate revocation list (CRL). Based on the analysis of the certificate storage and publish in LDAP server, a new and more efficient certificate revocation mechanism is proposed in this paper. The new mechanism integrates Delta and over-issued CRL and windowed certificate revocation mechanism, which satisfies the scalability and flexibility requirements of certificate revocation mechanism, at the same time, and can provide near real-time certificate status when required. The design and performance of the new mechanism are analyzed in detail. CRL is organized in the form of binary sort tree structure in LDAP, which satisfies the query of the revocation of certificates rapidly in LDAP.
{"title":"An Improved Delta and Over-issued Certificate Revocation Mechanism","authors":"Shaomin Zhang, Haijiao Wang","doi":"10.1109/CCCM.2008.364","DOIUrl":"https://doi.org/10.1109/CCCM.2008.364","url":null,"abstract":"With the increasing acceptance of digital certificates, how to find and revoke digital certificate which has been stopped has been become more and more important, which can avoid huge economic losses to end-user. At present the most popular choice is the use of lightweight directory access protocol (LDAP) directory server to issue the certificate revocation list (CRL). Based on the analysis of the certificate storage and publish in LDAP server, a new and more efficient certificate revocation mechanism is proposed in this paper. The new mechanism integrates Delta and over-issued CRL and windowed certificate revocation mechanism, which satisfies the scalability and flexibility requirements of certificate revocation mechanism, at the same time, and can provide near real-time certificate status when required. The design and performance of the new mechanism are analyzed in detail. CRL is organized in the form of binary sort tree structure in LDAP, which satisfies the query of the revocation of certificates rapidly in LDAP.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130079604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Denial of service (DoS) attack can be easily launched for the simple service discovery Protocol (SSDP) on Universal Plug and Play (UPnP). This paper proposes a novel DoS defense scheme on UPnP. The connection between UPnP devices and attack nodes will be limited, and the useless descriptions received by the UPnP control points will be filtered through setting packet-filter with traffic anomaly detection on the active nodes and rule-based XML firewall on the UPnP control points. Finally, the paper analyzes the performance of this scheme, which shows its particular advantages.
针对UPnP (Universal Plug and Play)上的简单服务发现协议SSDP (simple service discovery Protocol),容易发起DoS (Denial of service)攻击。提出了一种新的基于UPnP的DoS防御方案。UPnP设备与攻击节点之间的连接将受到限制,UPnP控制点接收到的无用描述将通过在主节点上设置流量异常检测包过滤和在UPnP控制点上设置基于规则的XML防火墙进行过滤。最后对该方案的性能进行了分析,显示了其独特的优点。
{"title":"Scheme to Prevent Denial of Service Attacks on UPnP","authors":"Jiahui Wang, Liang He, Zili Zhou","doi":"10.1109/CCCM.2008.162","DOIUrl":"https://doi.org/10.1109/CCCM.2008.162","url":null,"abstract":"Denial of service (DoS) attack can be easily launched for the simple service discovery Protocol (SSDP) on Universal Plug and Play (UPnP). This paper proposes a novel DoS defense scheme on UPnP. The connection between UPnP devices and attack nodes will be limited, and the useless descriptions received by the UPnP control points will be filtered through setting packet-filter with traffic anomaly detection on the active nodes and rule-based XML firewall on the UPnP control points. Finally, the paper analyzes the performance of this scheme, which shows its particular advantages.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130719315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Packet retransmissions due to packet losses reduce transmission performance in wireless networks obviously. Multi-hop wireless networks suffer from packet losses more than one-hop wireless networks. High bit-error rate of wireless channel and frequent channel collision due to shared channel are the most important ingredients of packet loss in multi-hop wireless networks. When bit error rate is between 10-3~10-4, fragment size control is efficient to enhance transmission performance. After analyzing the packet loss reason in wireless mesh networks, a prediction-based link-layer dynamic frame fragmentation and aggregation scheme called PDFA is proposed for 802.11-based wireless mesh networks. The size of sending fragment is optimized based on the prediction of channel BER. Simulation experiments validate that PDFA enhances transmission performance in wireless mesh networks efficiently.
{"title":"Prediction-Based Link-Layer Dynamic Fragmentation and Aggregation for Wireless Mesh Networks","authors":"Lei Zhang, Shoubao Yang, Gaofeng Wang, Wanli Dong","doi":"10.1109/CCCM.2008.279","DOIUrl":"https://doi.org/10.1109/CCCM.2008.279","url":null,"abstract":"Packet retransmissions due to packet losses reduce transmission performance in wireless networks obviously. Multi-hop wireless networks suffer from packet losses more than one-hop wireless networks. High bit-error rate of wireless channel and frequent channel collision due to shared channel are the most important ingredients of packet loss in multi-hop wireless networks. When bit error rate is between 10-3~10-4, fragment size control is efficient to enhance transmission performance. After analyzing the packet loss reason in wireless mesh networks, a prediction-based link-layer dynamic frame fragmentation and aggregation scheme called PDFA is proposed for 802.11-based wireless mesh networks. The size of sending fragment is optimized based on the prediction of channel BER. Simulation experiments validate that PDFA enhances transmission performance in wireless mesh networks efficiently.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130230726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The popularization of the Internet/Intranet applications and the development of Web technology provide a perfect foundation for the realization of the Web-based workflow management systems, It has been primary characteristic of new-style workflow management system that the Web technology is adopted. Demanded to work normally in general status, the system furthermore must have capability in handling all kinds of exceptions flexibly. The unexpected exceptions should be altered to a expected exception so that to be handled conveniently for the workflowpsilas finishing in normal ways although with exceptions. In order to enhance the performance of exception handling algorithm in workflow, a searching algorithm of exception handling in workflow with low time complexity and low space complexity is designed. The algorithm can add new handling rule into exception handing base and filter old rule to discard in rule base so that the performance and efficiency of exception handing can be enhanced.
{"title":"Design of an Exception Handing Algorithm of Workflow","authors":"Shaofei Wu, Bin Guo","doi":"10.1109/CCCM.2008.116","DOIUrl":"https://doi.org/10.1109/CCCM.2008.116","url":null,"abstract":"The popularization of the Internet/Intranet applications and the development of Web technology provide a perfect foundation for the realization of the Web-based workflow management systems, It has been primary characteristic of new-style workflow management system that the Web technology is adopted. Demanded to work normally in general status, the system furthermore must have capability in handling all kinds of exceptions flexibly. The unexpected exceptions should be altered to a expected exception so that to be handled conveniently for the workflowpsilas finishing in normal ways although with exceptions. In order to enhance the performance of exception handling algorithm in workflow, a searching algorithm of exception handling in workflow with low time complexity and low space complexity is designed. The algorithm can add new handling rule into exception handing base and filter old rule to discard in rule base so that the performance and efficiency of exception handing can be enhanced.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131658653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}