Luo Wen-jun, Tong Ling, Fu Zu-feng, Peng Chang-gen
Based on Zhang’s short signature scheme without random oracles and k+1-square roots assumption, a new fair contract signing protocol with the off-line semi-Trusted Third Party is given because the disadvantages of existed fair contract signing protocol. The off-line semi-TTP intervenes into the protocol in cases where one party attempts to cheat or simply crashes to make the fair exchange optimistic. The off-line TTP need not be completely trusted, since the TTP can get neither exchanged signature when dispute is mediated. Because this protocol is based on short signature, which needs low storage and little communication, it can be used in low-bandwidth communication and low-storage environments.
{"title":"Fair Contract Signing Protocol Based on Short Signature","authors":"Luo Wen-jun, Tong Ling, Fu Zu-feng, Peng Chang-gen","doi":"10.1109/ITCS.2010.69","DOIUrl":"https://doi.org/10.1109/ITCS.2010.69","url":null,"abstract":"Based on Zhang’s short signature scheme without random oracles and k+1-square roots assumption, a new fair contract signing protocol with the off-line semi-Trusted Third Party is given because the disadvantages of existed fair contract signing protocol. The off-line semi-TTP intervenes into the protocol in cases where one party attempts to cheat or simply crashes to make the fair exchange optimistic. The off-line TTP need not be completely trusted, since the TTP can get neither exchanged signature when dispute is mediated. Because this protocol is based on short signature, which needs low storage and little communication, it can be used in low-bandwidth communication and low-storage environments.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
China’s stock market is systematically politicized by the government to promote its political agendas. The mantra of “socialism” has turned the stock market into a mere fund-raising vehicle for failing SOEs. The legislation and enforcement of securities-related laws are subject to the will and wishes of the government. Such a systemic politicization of stock market has caused some serious consequences for China’s stock market and economic growth.
{"title":"The Politicization of China's Stock Market and Its Consequences","authors":"L. Guoping","doi":"10.1109/ITCS.2010.27","DOIUrl":"https://doi.org/10.1109/ITCS.2010.27","url":null,"abstract":"China’s stock market is systematically politicized by the government to promote its political agendas. The mantra of “socialism” has turned the stock market into a mere fund-raising vehicle for failing SOEs. The legislation and enforcement of securities-related laws are subject to the will and wishes of the government. Such a systemic politicization of stock market has caused some serious consequences for China’s stock market and economic growth.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131351900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to obtain accurate, specific and timely weather forecasting image information, meteorological department want to issue weather forecast using WebGIS. With ArcGIS, the paper finished image display of the NetCDF(Network Common Data Format) data that WRF (Weather Research and Forecasting) output; combined NetCDF with ArcGIS electronic map; achieved a merger of weather forecasting information and geographic information. Finally, it designed the weather forecasting information system by WebGIS to improve the sharing, visualizing and enriching of weather forecast information. It is beneficial to predict the effects on geographical factors by weather factors.
为了获得准确、具体、及时的天气预报图像信息,气象部门希望利用WebGIS发布天气预报。利用ArcGIS软件,完成了WRF (Weather Research and Forecasting)输出的NetCDF(Network Common Data Format)数据的图像显示;结合NetCDF与ArcGIS电子地图;实现了天气预报信息与地理信息的合并。最后,利用WebGIS技术设计了天气预报信息系统,提高了天气预报信息的共享、可视化和丰富性。利用天气因子来预测地理因子的影响是有益的。
{"title":"Notice of RetractionStudy of Image Display with NetCDF Data on WebGIS","authors":"Xiong Cong-cong, Wan Li-ying","doi":"10.1109/ITCS.2010.96","DOIUrl":"https://doi.org/10.1109/ITCS.2010.96","url":null,"abstract":"In order to obtain accurate, specific and timely weather forecasting image information, meteorological department want to issue weather forecast using WebGIS. With ArcGIS, the paper finished image display of the NetCDF(Network Common Data Format) data that WRF (Weather Research and Forecasting) output; combined NetCDF with ArcGIS electronic map; achieved a merger of weather forecasting information and geographic information. Finally, it designed the weather forecasting information system by WebGIS to improve the sharing, visualizing and enriching of weather forecast information. It is beneficial to predict the effects on geographical factors by weather factors.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120945323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
for web content extraction task, researchers have proposed many different methods, such as wrapper-based method, DOM tree rule-based method, machine learning-based method and so on. To some extent, all these methods ignore the layout information of the webpage, although the layout information such as the spatial and visual cues often plays a very important role in the process of locating the main content of the webpage when browsing. As a consequence, these methods often throw part of the main content away when extracting content from the webpage. In this paper, we present a method which combines webpage layout analysis with DOM tree rule-base method, it can make full use of the advantages of the two methods. It uses the layout information to guide the extraction work with a global view and can gain a better performance than the traditional methods.
{"title":"Web Content Extraction based on Webpage Layout Analysis","authors":"Lei Fu, Yao Meng, Yingju Xia, Hao Yu","doi":"10.1109/ITCS.2010.16","DOIUrl":"https://doi.org/10.1109/ITCS.2010.16","url":null,"abstract":"for web content extraction task, researchers have proposed many different methods, such as wrapper-based method, DOM tree rule-based method, machine learning-based method and so on. To some extent, all these methods ignore the layout information of the webpage, although the layout information such as the spatial and visual cues often plays a very important role in the process of locating the main content of the webpage when browsing. As a consequence, these methods often throw part of the main content away when extracting content from the webpage. In this paper, we present a method which combines webpage layout analysis with DOM tree rule-base method, it can make full use of the advantages of the two methods. It uses the layout information to guide the extraction work with a global view and can gain a better performance than the traditional methods.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128756696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of rough set theory and it’s strengths and weaknesses in the recognition field, the rule and recognition fusing method of noisy-robust rough set (NRRS) are proposed based on full normalized deposal, the non-uniform companding and simple dynamic clustering coding. The robustness of NRRS is improved by weighted reliability during training and recognition to dispose the accidental samples and conflict samples. At the same time, this paper gives the quick recognition and relative minimum distances between classes filtering assisted recognition algorithm based on NRRS. The recognition simulation shows that the method has a good anti-noise performance, processing efficiency and recognition effect.
{"title":"Quick Recognition and Relative Minimum Distances Filtering Assisted Recognition Based on Noisy-robust Rough Set","authors":"Lin Yingchun, Zhu Shibing, Yang Sheng","doi":"10.1109/ITCS.2010.24","DOIUrl":"https://doi.org/10.1109/ITCS.2010.24","url":null,"abstract":"With the development of rough set theory and it’s strengths and weaknesses in the recognition field, the rule and recognition fusing method of noisy-robust rough set (NRRS) are proposed based on full normalized deposal, the non-uniform companding and simple dynamic clustering coding. The robustness of NRRS is improved by weighted reliability during training and recognition to dispose the accidental samples and conflict samples. At the same time, this paper gives the quick recognition and relative minimum distances between classes filtering assisted recognition algorithm based on NRRS. The recognition simulation shows that the method has a good anti-noise performance, processing efficiency and recognition effect.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fu Xiang-ling, Song Mao-qiang, Yu Ya’nan, Chen Mian
An integration management is a guideline in the process of informationization as improving the overall performance of informationization. Using grounded theory research, a framework of integration management in an enterprise has been proposed in this paper, which comprised of three layers, that is the integration of information systems, the integration of business process and organization, and the integration of information services. The main content and key issues in each layer are elaborated from the general perspective and based on the status quo of informationization in Chinese companies.
{"title":"Integration Management View of Information Systems in an Enterprise","authors":"Fu Xiang-ling, Song Mao-qiang, Yu Ya’nan, Chen Mian","doi":"10.1109/ITCS.2010.84","DOIUrl":"https://doi.org/10.1109/ITCS.2010.84","url":null,"abstract":"An integration management is a guideline in the process of informationization as improving the overall performance of informationization. Using grounded theory research, a framework of integration management in an enterprise has been proposed in this paper, which comprised of three layers, that is the integration of information systems, the integration of business process and organization, and the integration of information services. The main content and key issues in each layer are elaborated from the general perspective and based on the status quo of informationization in Chinese companies.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130999047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current examination arrangement algorithm takes little attention to the examination arrangement for invigilator, the paper proposes a improved algorithm to achieve automatic examination arrangement for invigilator based on greedy method, the algorithm can support the priorities better, set maximum frequency of invigilating and satisfy other personalization examination arrangement requirements, and also it can configure resources reasonable and solve various software and hardware condition restrict to get the satisfactory solution. The practical application shows that the algorithm is highly efficient, low-cost, and can be widely used in various colleges and universities.
{"title":"Research on Automatic Examination Arrangement Algorithms for Invigilator","authors":"Y. Ouyang, Hong Li","doi":"10.1109/ITCS.2010.134","DOIUrl":"https://doi.org/10.1109/ITCS.2010.134","url":null,"abstract":"The current examination arrangement algorithm takes little attention to the examination arrangement for invigilator, the paper proposes a improved algorithm to achieve automatic examination arrangement for invigilator based on greedy method, the algorithm can support the priorities better, set maximum frequency of invigilating and satisfy other personalization examination arrangement requirements, and also it can configure resources reasonable and solve various software and hardware condition restrict to get the satisfactory solution. The practical application shows that the algorithm is highly efficient, low-cost, and can be widely used in various colleges and universities.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132565209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Cisco® MWR 1941-DC Mobile Wireless Edge Router is a cell-site access platform specifically designed to optimize, aggregate and transport mixed-generation Radio Access Network (RAN) traffic. It is used at a cell site as part of an IP-RAN or Cell Site DCN solution. It generates revenue from new cell-site IP-based services. In this paper, we introduce an IP RAN solution in which the MWR 1941-DC extends IP connectivity to the cell site and Base Transceiver Station (BTS), through a Fast Ethernet interface to the BTS, the router provides bandwidth-efficient IP transport of voice and data bearer traffic, as well as maintenance, control and signaling traffic over the IP using traditional circuits.
{"title":"The Study and Application of Cisco Mobile Wireless Router in CDMA Network","authors":"Qingxia Dong, Chunmiao Yuan","doi":"10.1109/ITCS.2010.108","DOIUrl":"https://doi.org/10.1109/ITCS.2010.108","url":null,"abstract":"The Cisco® MWR 1941-DC Mobile Wireless Edge Router is a cell-site access platform specifically designed to optimize, aggregate and transport mixed-generation Radio Access Network (RAN) traffic. It is used at a cell site as part of an IP-RAN or Cell Site DCN solution. It generates revenue from new cell-site IP-based services. In this paper, we introduce an IP RAN solution in which the MWR 1941-DC extends IP connectivity to the cell site and Base Transceiver Station (BTS), through a Fast Ethernet interface to the BTS, the router provides bandwidth-efficient IP transport of voice and data bearer traffic, as well as maintenance, control and signaling traffic over the IP using traditional circuits.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is a rapid developing technology which spreads the computer power in to different computers locates different physical position. This outcome can lead to the enormous performance of dealing with large computing requirements, includes nuclear simulation, image processing or data analyzing. But, since cloud computing largely depend on the network performance, it is possible to consider the security issues in several areas. This paper addresses the potential threats and provides the areas which need to be carefully audited.
{"title":"Understanding the Approach for Auditing of Cloud Computing System","authors":"Jian Chen, Wenrong Jiang, Jihong Yan","doi":"10.1109/ITCS.2010.149","DOIUrl":"https://doi.org/10.1109/ITCS.2010.149","url":null,"abstract":"Cloud computing is a rapid developing technology which spreads the computer power in to different computers locates different physical position. This outcome can lead to the enormous performance of dealing with large computing requirements, includes nuclear simulation, image processing or data analyzing. But, since cloud computing largely depend on the network performance, it is possible to consider the security issues in several areas. This paper addresses the potential threats and provides the areas which need to be carefully audited.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133824235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
this paper discusses and builds the information planning program in the process of training management using CSF method of information planning, in the basic principles of management science. It proposes the software planning idea for the feasible implementation of training management information system.
{"title":"Planning Program for CSF-based Training Management Informationization","authors":"Wang Jianhang, S. Qian","doi":"10.1109/ITCS.2010.105","DOIUrl":"https://doi.org/10.1109/ITCS.2010.105","url":null,"abstract":"this paper discusses and builds the information planning program in the process of training management using CSF method of information planning, in the basic principles of management science. It proposes the software planning idea for the feasible implementation of training management information system.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}