A diverse child nodes hash tree method was proposed to make the digest structure more flexible, improving the data authenticity verification efficiency in regional health information network which has a great number of medical documents. The new hash tree method changes the former hash list from one-layer digest to a tree structure, using category search to enormously accelerate verification processes, and locating multi-“error file” at the same time. According to the current hardware, we designed experiments to obtain the curves of “hash tree computing time-child nodes” and “hash tree verification time-child nodes”. Based on the two curves, a weight analysis method was proposed to determine the number of child nodes, making the entire system more efficient. By increasing a small amount of data redundancy, the diverse child nodes hash tree method greatly enhances the verification efficiency.
{"title":"Development of data authenticity verification system in regional health information network","authors":"T. Zhou, Jing-song Li, Xiaoguang Zhang, Zhen Hu, Hai-Yan Yu, Huan Chen","doi":"10.1109/ITIME.2009.5236451","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236451","url":null,"abstract":"A diverse child nodes hash tree method was proposed to make the digest structure more flexible, improving the data authenticity verification efficiency in regional health information network which has a great number of medical documents. The new hash tree method changes the former hash list from one-layer digest to a tree structure, using category search to enormously accelerate verification processes, and locating multi-“error file” at the same time. According to the current hardware, we designed experiments to obtain the curves of “hash tree computing time-child nodes” and “hash tree verification time-child nodes”. Based on the two curves, a weight analysis method was proposed to determine the number of child nodes, making the entire system more efficient. By increasing a small amount of data redundancy, the diverse child nodes hash tree method greatly enhances the verification efficiency.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"1997 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114129928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236369
Chang Liu, Chi Yang
The factorization problem with knowledge of some bits of prime factor p of RSA modulo N is one of the earliest partial key exposure attacks on RSA. The result proposed by Coppersmith [8] is still the best, i.e., when some of p's higher bits is known as p̃assume the unknown part of p and q is and q0, respectively (say, p=p̃+p0, q=+q̃q0), if the upper bounds of them, say X and Y separately, satisfy XY = N0.5, then N can be factored in polynomial time. Our method shows improved bounds that when RSA private key d≪N0.483, knowing a smaller fraction of p is sufficient in yielding the factorization of N in polynomial time.
{"title":"Factoring RSA modulo N with high bits of p known revisited","authors":"Chang Liu, Chi Yang","doi":"10.1109/ITIME.2009.5236369","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236369","url":null,"abstract":"The factorization problem with knowledge of some bits of prime factor p of RSA modulo N is one of the earliest partial key exposure attacks on RSA. The result proposed by Coppersmith [8] is still the best, i.e., when some of p's higher bits is known as p̃assume the unknown part of p and q is and q<inf>0</inf>, respectively (say, p=p̃+p<inf>0</inf>, q=+q̃q<inf>0</inf>), if the upper bounds of them, say X and Y separately, satisfy XY = N<sup>0.5</sup>, then N can be factored in polynomial time. Our method shows improved bounds that when RSA private key d≪N<sup>0.483</sup>, knowing a smaller fraction of p is sufficient in yielding the factorization of N in polynomial time.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114247608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236323
Zhaohui Peng, Jun Zhang, Shan Wang, Chang-liang Wang, Li-zhen Cui
In Keyword Search Over Relational Databases (KSORD), retrieval of user's initial query is often unsatisfying. User has to reformulate his query and execute the new query, which costs much time and effort. In this paper, a method of automatically reformulating user queries by relevance feedback is introduced, which is named VSM-RF. Aimed at the results of KSORD systems, VSM-RF adopts a ranking method based on vector space model to rank KSORD results. After the first time of retrieval, using user feedback or pseudo feedback just as user like, VSM-RF computes expansion terms based on probability and reformulates the new query using query expansion. After KSORD systems executing the new query, more relevant results are produced by the new query in the result list and presented to user. Experimental results verify this method's effectiveness.
{"title":"VSM-RF: A method of relevance feedback in Keyword Search over Relational Databases","authors":"Zhaohui Peng, Jun Zhang, Shan Wang, Chang-liang Wang, Li-zhen Cui","doi":"10.1109/ITIME.2009.5236323","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236323","url":null,"abstract":"In Keyword Search Over Relational Databases (KSORD), retrieval of user's initial query is often unsatisfying. User has to reformulate his query and execute the new query, which costs much time and effort. In this paper, a method of automatically reformulating user queries by relevance feedback is introduced, which is named VSM-RF. Aimed at the results of KSORD systems, VSM-RF adopts a ranking method based on vector space model to rank KSORD results. After the first time of retrieval, using user feedback or pseudo feedback just as user like, VSM-RF computes expansion terms based on probability and reformulates the new query using query expansion. After KSORD systems executing the new query, more relevant results are produced by the new query in the result list and presented to user. Experimental results verify this method's effectiveness.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116073469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236454
Yinlin Li, Zhonghua Huang
Body Area Network (BAN) can be used in wirelessly interconnection of the small and intelligent (bio) medic sensors attached to or implanted into the human body for medical healthcare. This paper modified the conventional model of the channel of BAN and addressed the issues for the hardware system implementation. Based on the equivalent circuit model, the influences of all equivalent capacitors are analyzed. Experiments are conducted to simulate the changes of equivalent capacitors. The relationship of channel gain and the changes of equivalent capacitors are determined. The conclusion is, in the system design of body area communication based on quasi-electrostatic field, enlarging the size of transceiver electrodes, reducing the distance between electrodes and human body, grounding the transceiver, reducing the capacitors between human body and earth could increase the receiver signal amplitude.
{"title":"Modeling of Body Area Network in medical healthcare applications","authors":"Yinlin Li, Zhonghua Huang","doi":"10.1109/ITIME.2009.5236454","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236454","url":null,"abstract":"Body Area Network (BAN) can be used in wirelessly interconnection of the small and intelligent (bio) medic sensors attached to or implanted into the human body for medical healthcare. This paper modified the conventional model of the channel of BAN and addressed the issues for the hardware system implementation. Based on the equivalent circuit model, the influences of all equivalent capacitors are analyzed. Experiments are conducted to simulate the changes of equivalent capacitors. The relationship of channel gain and the changes of equivalent capacitors are determined. The conclusion is, in the system design of body area communication based on quasi-electrostatic field, enlarging the size of transceiver electrodes, reducing the distance between electrodes and human body, grounding the transceiver, reducing the capacitors between human body and earth could increase the receiver signal amplitude.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122642396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236388
Xiaoqi Zhang, Song Meina, Xu Ke, Song Junde
Mashup combines multiple data sources to form some kind of new services. Using Mashup, services creation becomes more convenient, effctive and low-cost with user's participation. It is more frequently used in education service systems. With the development of mobile internet, mobile Mashup become more and more popular in mobile software by assembling applications and sources both from Internet and mobile communication network. However, the architecture of traditional wired network Mashup system is not suitable for the mobile environment for limited device capabilities or bandwith. Based on our research on many mature Mashup systems, we propose an improved architecture on P2P technology which can help to resovle the bottle neck problems come from the central architecture and facilitate the mobile application. We also developed a prototype system and demo application to practice the architecture.
{"title":"Mobile Mashup based on P2P: Architecture, design and realization","authors":"Xiaoqi Zhang, Song Meina, Xu Ke, Song Junde","doi":"10.1109/ITIME.2009.5236388","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236388","url":null,"abstract":"Mashup combines multiple data sources to form some kind of new services. Using Mashup, services creation becomes more convenient, effctive and low-cost with user's participation. It is more frequently used in education service systems. With the development of mobile internet, mobile Mashup become more and more popular in mobile software by assembling applications and sources both from Internet and mobile communication network. However, the architecture of traditional wired network Mashup system is not suitable for the mobile environment for limited device capabilities or bandwith. Based on our research on many mature Mashup systems, we propose an improved architecture on P2P technology which can help to resovle the bottle neck problems come from the central architecture and facilitate the mobile application. We also developed a prototype system and demo application to practice the architecture.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128007296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236426
Kui Che, Ling-Ling Li, Xiao-tai Niu, Shu-tao Xing
Along with uninterrupted progress of computer network technology, the application of Internet is increasingly abroad. Due to the variety of Internet environment, the corresponding software systems are more complex, and present many new characteristics. The development of complex software systems has not applied the development mode of object-oriented and component-oriented. Therefore people bring forward Agent-oriented software engineering (AOSE) and software development methodology based on self-adaptive multi-Agent systems. AOSE adopts the software engineering mechanism and method, including high level abstract, natural modeling, system organization and problem decompounding, etc. It can manage and control the complexity of software system, and is a kind of novel software development pattern. The paper discusses the self-adaptive mechanism of self-adaptive multi-Agent systems, the software development process of self-adaptive multi-Agent systems, the modeling method of self-adaptive Agent modeling language and Agent UML. Taking “International Conference Management System” as a case, and describes the development process of self-adaptive multi-Agent systems.
{"title":"Research of software development methodology based on self-adaptive multi-agent systems","authors":"Kui Che, Ling-Ling Li, Xiao-tai Niu, Shu-tao Xing","doi":"10.1109/ITIME.2009.5236426","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236426","url":null,"abstract":"Along with uninterrupted progress of computer network technology, the application of Internet is increasingly abroad. Due to the variety of Internet environment, the corresponding software systems are more complex, and present many new characteristics. The development of complex software systems has not applied the development mode of object-oriented and component-oriented. Therefore people bring forward Agent-oriented software engineering (AOSE) and software development methodology based on self-adaptive multi-Agent systems. AOSE adopts the software engineering mechanism and method, including high level abstract, natural modeling, system organization and problem decompounding, etc. It can manage and control the complexity of software system, and is a kind of novel software development pattern. The paper discusses the self-adaptive mechanism of self-adaptive multi-Agent systems, the software development process of self-adaptive multi-Agent systems, the modeling method of self-adaptive Agent modeling language and Agent UML. Taking “International Conference Management System” as a case, and describes the development process of self-adaptive multi-Agent systems.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128047697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236346
Yan Chen
Educators have proposed the perspective of collaborative learning for a long time ①. However, the philosophy of collaborative learning needs the technical support. Web2.0 tools are such Technical support which may meet needs of collaborative learning. The paper mainly discusses how to implement collaborative learning from the practice level in the era of Web2.0. Take three applications for example, which are online office suites, smartphone, social tagging. There includes definition, characteristics analyze, evaluation toward tools and most importantly, the learning activities design or teaching strategy. “In human societies the individuals who are most likely to survive are those who are best enabled to do so by their group” Ashley Montagu, British-American anthropologist and humanist. (Ashley Montagu, 1965)
{"title":"How to implement collaborative learning in Web2.0: Take three applications for example","authors":"Yan Chen","doi":"10.1109/ITIME.2009.5236346","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236346","url":null,"abstract":"Educators have proposed the perspective of collaborative learning for a long time ①. However, the philosophy of collaborative learning needs the technical support. Web2.0 tools are such Technical support which may meet needs of collaborative learning. The paper mainly discusses how to implement collaborative learning from the practice level in the era of Web2.0. Take three applications for example, which are online office suites, smartphone, social tagging. There includes definition, characteristics analyze, evaluation toward tools and most importantly, the learning activities design or teaching strategy. “In human societies the individuals who are most likely to survive are those who are best enabled to do so by their group” Ashley Montagu, British-American anthropologist and humanist. (Ashley Montagu, 1965)","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131891567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236380
Juan Li, Bin Chen
Streaming media technology with huge potential for education makes it crucial in teaching and learning. Basing on the introduction of structure, transport protocols, and playing mode of streaming media serving system, educational applications of streaming media for e-learning, real time learning, virtual workshop, resource sharing, and cooperative learning are described. Then, a practical example for network curriculum system according to teaching requirement of a certain university is elaborated to explain how streaming media technology used effectively to improve interactive learning, and make content easier to understand. Within multimedia educational environments, self-centered, autonomous learning is promoted, thus the development of lifelong learning skills is contributed.
{"title":"Application of streaming media technology for modern education","authors":"Juan Li, Bin Chen","doi":"10.1109/ITIME.2009.5236380","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236380","url":null,"abstract":"Streaming media technology with huge potential for education makes it crucial in teaching and learning. Basing on the introduction of structure, transport protocols, and playing mode of streaming media serving system, educational applications of streaming media for e-learning, real time learning, virtual workshop, resource sharing, and cooperative learning are described. Then, a practical example for network curriculum system according to teaching requirement of a certain university is elaborated to explain how streaming media technology used effectively to improve interactive learning, and make content easier to understand. Within multimedia educational environments, self-centered, autonomous learning is promoted, thus the development of lifelong learning skills is contributed.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133177679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236255
Lin Sun, Jian Wang, Ke-fa Gao, ChangWei Hu
Objective: To study the relationship between expression of IL-8 mRNA in peripheral blood and women with endometriosis and its clinical significance. Methods: The women with endometriosis were treated with Danazol and the level of IL-8 mRNA in their peripheral blood was detected by Real-time PCR. Results: The level of IL-8 mRNA in peripheral blood of women with endometriosis was 1.1339−0.1428. It was high significance between in endometriosis and without endometriosis (P≪0.01). However, the level of IL-8 mRNA in endometriosis in stage of I≈II and in stage of III were 1.1023−0.1371 and 1.1866−0.1543, few significance difference in two subgroups (P≫0.05). After treatment of Danazol for six months, the expression of IL-8 mRNA in peripheral blood was 1.0547−0.1299, without significantly difference between in endometriosis and controls (P≫0.05). Conclusion: IL-8 mRNA is over expressed in peripheral blood of women with endometriosis and play key role in course of disease. The over expression of endometrium and local inflammatory reaction caused by IL-8 can be inhibited by Danazol therapy.
{"title":"Relationship between expression of IL-8 mRNA in peripheral blood and women with endometriosis","authors":"Lin Sun, Jian Wang, Ke-fa Gao, ChangWei Hu","doi":"10.1109/ITIME.2009.5236255","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236255","url":null,"abstract":"Objective: To study the relationship between expression of IL-8 mRNA in peripheral blood and women with endometriosis and its clinical significance. Methods: The women with endometriosis were treated with Danazol and the level of IL-8 mRNA in their peripheral blood was detected by Real-time PCR. Results: The level of IL-8 mRNA in peripheral blood of women with endometriosis was 1.1339−0.1428. It was high significance between in endometriosis and without endometriosis (P≪0.01). However, the level of IL-8 mRNA in endometriosis in stage of I≈II and in stage of III were 1.1023−0.1371 and 1.1866−0.1543, few significance difference in two subgroups (P≫0.05). After treatment of Danazol for six months, the expression of IL-8 mRNA in peripheral blood was 1.0547−0.1299, without significantly difference between in endometriosis and controls (P≫0.05). Conclusion: IL-8 mRNA is over expressed in peripheral blood of women with endometriosis and play key role in course of disease. The over expression of endometrium and local inflammatory reaction caused by IL-8 can be inhibited by Danazol therapy.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114432255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-09-15DOI: 10.1109/ITIME.2009.5236284
Yan Wang, Yan-yan Wang
Enterprise Resource Planning (ERP) is a process attempting to consolidate all the department and function units in an enterprise into a single computer system, which is thereafter able to serve specific needs for each unit. On the basis of ERP implementation, the traditional operation flow of the enterprise needs to be reorganized and improved to adapt to the new system. In this study, we established a novel purchase and payment flow fitting the ERP environment. In addition, we evaluated the potential risks in this flow and proposed the corresponding internal control measures.
{"title":"The research of purchase and payment flow for ERP enterprises","authors":"Yan Wang, Yan-yan Wang","doi":"10.1109/ITIME.2009.5236284","DOIUrl":"https://doi.org/10.1109/ITIME.2009.5236284","url":null,"abstract":"Enterprise Resource Planning (ERP) is a process attempting to consolidate all the department and function units in an enterprise into a single computer system, which is thereafter able to serve specific needs for each unit. On the basis of ERP implementation, the traditional operation flow of the enterprise needs to be reorganized and improved to adapt to the new system. In this study, we established a novel purchase and payment flow fitting the ERP environment. In addition, we evaluated the potential risks in this flow and proposed the corresponding internal control measures.","PeriodicalId":398477,"journal":{"name":"2009 IEEE International Symposium on IT in Medicine & Education","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123319380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}