Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479467
Qin Ningning, Li Dong, Xue Baoguo
This paper designs a novel wireless surveillance system in greenhouse, in order to solve long-existing problems in traditional systems, such as high maintenance cost, low robustness and mobility, etc. We firstly introduce the system architecture, with hardware structure defined and carefully designed on sensor, then we proposed the wireless communication protocol including transmission and data format applicable in the greenhouse. Experiments showed sleep-wake mode increased lifetime of sensors quite efficiently. The introduction of WSN has remarkable meaning in the design of greenhouse surveillance systems, as it could not only simplify the design of communication circuitry so as to reduce the period of the whole system implementation; but also extend the function and performance of interfaces, then facilitate the maintenance and update of the system.
{"title":"The greenhouse surveillance system on wireless sensor networks","authors":"Qin Ningning, Li Dong, Xue Baoguo","doi":"10.1109/ICNDS.2010.5479467","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479467","url":null,"abstract":"This paper designs a novel wireless surveillance system in greenhouse, in order to solve long-existing problems in traditional systems, such as high maintenance cost, low robustness and mobility, etc. We firstly introduce the system architecture, with hardware structure defined and carefully designed on sensor, then we proposed the wireless communication protocol including transmission and data format applicable in the greenhouse. Experiments showed sleep-wake mode increased lifetime of sensors quite efficiently. The introduction of WSN has remarkable meaning in the design of greenhouse surveillance systems, as it could not only simplify the design of communication circuitry so as to reduce the period of the whole system implementation; but also extend the function and performance of interfaces, then facilitate the maintenance and update of the system.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123492766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479191
Wang Panqing, Lin Xiongwei, Li Zengliang
Information integration is a key way to solve the problem of the information isolated islands. In this paper, to deal with the problems in information integration in equipment domain, performance requests of the information integration framework in equipment domain are analyzed. An information integration framework at semantic level in equipment domain based on ontology is presented. The key techniques are studied. And the application example is also given. It is proved that the isolated information can be integrated effectively at semantic level through the presented information integration framework.
{"title":"The design and implementation of information integration framework on equipment domain based on ontology","authors":"Wang Panqing, Lin Xiongwei, Li Zengliang","doi":"10.1109/ICNDS.2010.5479191","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479191","url":null,"abstract":"Information integration is a key way to solve the problem of the information isolated islands. In this paper, to deal with the problems in information integration in equipment domain, performance requests of the information integration framework in equipment domain are analyzed. An information integration framework at semantic level in equipment domain based on ontology is presented. The key techniques are studied. And the application example is also given. It is proved that the isolated information can be integrated effectively at semantic level through the presented information integration framework.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479359
Yue Gao, Baoshan Ge
Based on network theory, this paper constructed the research framework between networking and business growth, through the analysis of 240 valid questionnaires from the software industry, this paper found that the network strength and network density have a significant role on the company's rapid growth. Then the research findings were discussed and finally presented the limitations of this research and possible future research direction.
{"title":"Empirical study on the relationship between networking and business growth","authors":"Yue Gao, Baoshan Ge","doi":"10.1109/ICNDS.2010.5479359","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479359","url":null,"abstract":"Based on network theory, this paper constructed the research framework between networking and business growth, through the analysis of 240 valid questionnaires from the software industry, this paper found that the network strength and network density have a significant role on the company's rapid growth. Then the research findings were discussed and finally presented the limitations of this research and possible future research direction.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121202753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479334
Zhihui Wu, Y. Qian
In order to integrate chemical process operation system effectively, a web service based system information integration approach is presented in this paper. The application technologies of web service are introduced for chemical process information integration. Besides, the reality steps of information integration are introduced according to the proposed approach functions. Compared to the traditional distributed integration technology, the advances and features of the approach are discussed. A case study of a mini chemical operation platform is used to verify the practicability and validity of proposed information integration approach.
{"title":"Web service based information integration approach for chemical process system","authors":"Zhihui Wu, Y. Qian","doi":"10.1109/ICNDS.2010.5479334","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479334","url":null,"abstract":"In order to integrate chemical process operation system effectively, a web service based system information integration approach is presented in this paper. The application technologies of web service are introduced for chemical process information integration. Besides, the reality steps of information integration are introduced according to the proposed approach functions. Compared to the traditional distributed integration technology, the advances and features of the approach are discussed. A case study of a mini chemical operation platform is used to verify the practicability and validity of proposed information integration approach.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128618042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479344
Peng Jian-fen, Zhou Yajian, Wang Cong, Yang Yixian
Expression of blind message in the optimal-type blind signature scheme was modified so that it can combine with threshold signature, which leads to an effective threshold blind signature scheme based on elliptic curve cryptography, it has the following securities: strong verifiability, nonrepudiation, unforgeability, blindness and robustness, and also takes advantage of characteristics of elliptic curve such as higher security and shorter key, as well as lower computational complexity compared with the previous schemes.
{"title":"An application of modified optimal-type elliptic curve blind signature scheme to threshold signature","authors":"Peng Jian-fen, Zhou Yajian, Wang Cong, Yang Yixian","doi":"10.1109/ICNDS.2010.5479344","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479344","url":null,"abstract":"Expression of blind message in the optimal-type blind signature scheme was modified so that it can combine with threshold signature, which leads to an effective threshold blind signature scheme based on elliptic curve cryptography, it has the following securities: strong verifiability, nonrepudiation, unforgeability, blindness and robustness, and also takes advantage of characteristics of elliptic curve such as higher security and shorter key, as well as lower computational complexity compared with the previous schemes.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128481001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479592
Xiaoyu Li, Dexi Zhang
A multiparty quantum determined key distribution protocol using GHZ(Greenberger-Horne-Zeilinger) states is presented in this paper. Three parties can build a key with the help of GHZ states. The key can be a determined string in our protocol while the key is a random string built in the process of key distribution in previous protocols. We prove that our protocol is guaranteed to be unconditionally secure by the laws of quantum mechanics.
{"title":"Multiparty quantum determined key distribution protocol using GHZ states","authors":"Xiaoyu Li, Dexi Zhang","doi":"10.1109/ICNDS.2010.5479592","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479592","url":null,"abstract":"A multiparty quantum determined key distribution protocol using GHZ(Greenberger-Horne-Zeilinger) states is presented in this paper. Three parties can build a key with the help of GHZ states. The key can be a determined string in our protocol while the key is a random string built in the process of key distribution in previous protocols. We prove that our protocol is guaranteed to be unconditionally secure by the laws of quantum mechanics.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115850127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479412
Zhongyang Li, Weimin Du, Shouming Chen
The faster development of science and technology is, the more obviously Digital Art shows us its special art form. Digital art, as the emerging form of Mass Art, depends on the development of digital media and the Internet to spread. Because it's no question that the art works which displayed in front of audiences are more influential than that not. Meanwhile, Digital Art differs from other arts in the elements of instruction. Such as words in language art, colors and kinds of stone in formative art, and body in performance art. There are in-depth, internal link between the Digital Art and science technology. Although Digital Art benefits from scientific and technological progress, it is incorrect that technology is overemphasized while regardless of culture in the form of Digital Art.
{"title":"Analysis on the two aspects of Digital Art","authors":"Zhongyang Li, Weimin Du, Shouming Chen","doi":"10.1109/ICNDS.2010.5479412","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479412","url":null,"abstract":"The faster development of science and technology is, the more obviously Digital Art shows us its special art form. Digital art, as the emerging form of Mass Art, depends on the development of digital media and the Internet to spread. Because it's no question that the art works which displayed in front of audiences are more influential than that not. Meanwhile, Digital Art differs from other arts in the elements of instruction. Such as words in language art, colors and kinds of stone in formative art, and body in performance art. There are in-depth, internal link between the Digital Art and science technology. Although Digital Art benefits from scientific and technological progress, it is incorrect that technology is overemphasized while regardless of culture in the form of Digital Art.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117006226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479394
Yunyang Ye, Wenming Chen, Huang Junda, Wenbin Zou
the License plate automatic recognition has been extensive applied in the intellectual traffic system and public transit security system. In this paper, a kind of location method based on the specific texture character of license plate is presented, using wavelet analysis for License Plate location. Then we do one-dimensional scale decomposition to the license plate image after coarse positioning through the wavelet, extracting the horizontal and vertical details of the license plate images, and binarization of the license plate image. Then we project the horizontal and vertical details of the images in horizontal and vertical direction respectively, finally we can find the specific location of license plates through the projection drawing. We have carried out a series of experiments under different conditions, the experiment results show that the location method presented in this paper is effect and successful.
{"title":"Research on localization method of vehicle license plate based on wavelet analysis","authors":"Yunyang Ye, Wenming Chen, Huang Junda, Wenbin Zou","doi":"10.1109/ICNDS.2010.5479394","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479394","url":null,"abstract":"the License plate automatic recognition has been extensive applied in the intellectual traffic system and public transit security system. In this paper, a kind of location method based on the specific texture character of license plate is presented, using wavelet analysis for License Plate location. Then we do one-dimensional scale decomposition to the license plate image after coarse positioning through the wavelet, extracting the horizontal and vertical details of the license plate images, and binarization of the license plate image. Then we project the horizontal and vertical details of the images in horizontal and vertical direction respectively, finally we can find the specific location of license plates through the projection drawing. We have carried out a series of experiments under different conditions, the experiment results show that the location method presented in this paper is effect and successful.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479283
Xiangyang Xu
S-boxes block cipher is the only non-linear components, and its password strength decides the security of the entire block cipher strength. It is very difficult and complex to use the traditional methods of mathematical to construct the S-boxes with good performance. This thesis will put on a new construction of the s-boxes method based on the particle swarm optimization (PSO). This algorithm defines the location of the two particles “addition” operator, replacement of the original speed equation in order to achieve the exchange of information between particles, and the addition of a mutation operator to maintain the population diversity to prevent premature convergence. The experimental results show that it is plausible to use POS to get a group of S-boxes with high non-linearity and low evenness in difference. This structure can effectively reduce the redundant computation to accelerate the convergence speed.
s -box分组密码是唯一的非线性组件,其密码强度决定了整个分组密码强度的安全性。用传统的数学方法构造性能良好的s盒是非常困难和复杂的。本文提出了一种基于粒子群优化(PSO)的s-box方法。该算法定义了两个粒子位置的“加法”算子,替换原有的速度方程以实现粒子间的信息交换,并加入一个突变算子以保持种群的多样性,防止过早收敛。实验结果表明,利用POS算法可以得到一组高非线性、差值均匀度低的s盒。这种结构可以有效地减少冗余计算,加快收敛速度。
{"title":"The block cipher for construction of S-boxes based on particle swarm optimization","authors":"Xiangyang Xu","doi":"10.1109/ICNDS.2010.5479283","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479283","url":null,"abstract":"S-boxes block cipher is the only non-linear components, and its password strength decides the security of the entire block cipher strength. It is very difficult and complex to use the traditional methods of mathematical to construct the S-boxes with good performance. This thesis will put on a new construction of the s-boxes method based on the particle swarm optimization (PSO). This algorithm defines the location of the two particles “addition” operator, replacement of the original speed equation in order to achieve the exchange of information between particles, and the addition of a mutation operator to maintain the population diversity to prevent premature convergence. The experimental results show that it is plausible to use POS to get a group of S-boxes with high non-linearity and low evenness in difference. This structure can effectively reduce the redundant computation to accelerate the convergence speed.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117151979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479391
Qi Hui-fang
With the arrival of the network and digital age, the library's holdings of resources has undergone a drastic change in which the proportion of digital resources occupy an instantly increase. The digital resources are easy to share and retrieve. This article discusses the need for integration of university library's digital resources, the principles and contents of integration. several integrated model of digital resources which are suitable for university libraries are proposed. Utilization of resource will be improved significantly by the one-stop inquiries of digital resources which is achieved by integration of resources.
{"title":"Research of digital resources integration of university library under network environment","authors":"Qi Hui-fang","doi":"10.1109/ICNDS.2010.5479391","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479391","url":null,"abstract":"With the arrival of the network and digital age, the library's holdings of resources has undergone a drastic change in which the proportion of digital resources occupy an instantly increase. The digital resources are easy to share and retrieve. This article discusses the need for integration of university library's digital resources, the principles and contents of integration. several integrated model of digital resources which are suitable for university libraries are proposed. Utilization of resource will be improved significantly by the one-stop inquiries of digital resources which is achieved by integration of resources.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114273237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}