Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479362
Xueqiong Dai, Lingjiang Yao
Microblogging is one of the latest Web 2.0 technologies with the most important impact in the recent months, with applications in many domains, including education. This paper describes the microblogging and its service platform. Then based on analyzing characteristics of microblogging, this paper discusses microblogging application of interactive teaching and collaborative learning for the purpose of propelling vigorous development of Web-based Education.
{"title":"The research on microblogging application at the Web-based Education","authors":"Xueqiong Dai, Lingjiang Yao","doi":"10.1109/ICNDS.2010.5479362","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479362","url":null,"abstract":"Microblogging is one of the latest Web 2.0 technologies with the most important impact in the recent months, with applications in many domains, including education. This paper describes the microblogging and its service platform. Then based on analyzing characteristics of microblogging, this paper discusses microblogging application of interactive teaching and collaborative learning for the purpose of propelling vigorous development of Web-based Education.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132165279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479312
Zhenxiang Sun, Qingsen Chen
With the continuous advancement of network and digit technology, we could produce, transmit and search digital video online easily. The article analyzes online educational video which could be seen as the “long tail phenomenon” of educational television based on the long tail theory. From a technical point of view we evaluate and validate the feasibility which we could consider online educational video as a huge resource library of educational television in order to provide a new perspective of the educational television research in net times.
{"title":"Online educational video: Why it could be a huge resource library of educational television in the web 2.0 era","authors":"Zhenxiang Sun, Qingsen Chen","doi":"10.1109/ICNDS.2010.5479312","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479312","url":null,"abstract":"With the continuous advancement of network and digit technology, we could produce, transmit and search digital video online easily. The article analyzes online educational video which could be seen as the “long tail phenomenon” of educational television based on the long tail theory. From a technical point of view we evaluate and validate the feasibility which we could consider online educational video as a huge resource library of educational television in order to provide a new perspective of the educational television research in net times.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132179779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479359
Yue Gao, Baoshan Ge
Based on network theory, this paper constructed the research framework between networking and business growth, through the analysis of 240 valid questionnaires from the software industry, this paper found that the network strength and network density have a significant role on the company's rapid growth. Then the research findings were discussed and finally presented the limitations of this research and possible future research direction.
{"title":"Empirical study on the relationship between networking and business growth","authors":"Yue Gao, Baoshan Ge","doi":"10.1109/ICNDS.2010.5479359","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479359","url":null,"abstract":"Based on network theory, this paper constructed the research framework between networking and business growth, through the analysis of 240 valid questionnaires from the software industry, this paper found that the network strength and network density have a significant role on the company's rapid growth. Then the research findings were discussed and finally presented the limitations of this research and possible future research direction.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121202753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479334
Zhihui Wu, Y. Qian
In order to integrate chemical process operation system effectively, a web service based system information integration approach is presented in this paper. The application technologies of web service are introduced for chemical process information integration. Besides, the reality steps of information integration are introduced according to the proposed approach functions. Compared to the traditional distributed integration technology, the advances and features of the approach are discussed. A case study of a mini chemical operation platform is used to verify the practicability and validity of proposed information integration approach.
{"title":"Web service based information integration approach for chemical process system","authors":"Zhihui Wu, Y. Qian","doi":"10.1109/ICNDS.2010.5479334","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479334","url":null,"abstract":"In order to integrate chemical process operation system effectively, a web service based system information integration approach is presented in this paper. The application technologies of web service are introduced for chemical process information integration. Besides, the reality steps of information integration are introduced according to the proposed approach functions. Compared to the traditional distributed integration technology, the advances and features of the approach are discussed. A case study of a mini chemical operation platform is used to verify the practicability and validity of proposed information integration approach.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128618042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479344
Peng Jian-fen, Zhou Yajian, Wang Cong, Yang Yixian
Expression of blind message in the optimal-type blind signature scheme was modified so that it can combine with threshold signature, which leads to an effective threshold blind signature scheme based on elliptic curve cryptography, it has the following securities: strong verifiability, nonrepudiation, unforgeability, blindness and robustness, and also takes advantage of characteristics of elliptic curve such as higher security and shorter key, as well as lower computational complexity compared with the previous schemes.
{"title":"An application of modified optimal-type elliptic curve blind signature scheme to threshold signature","authors":"Peng Jian-fen, Zhou Yajian, Wang Cong, Yang Yixian","doi":"10.1109/ICNDS.2010.5479344","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479344","url":null,"abstract":"Expression of blind message in the optimal-type blind signature scheme was modified so that it can combine with threshold signature, which leads to an effective threshold blind signature scheme based on elliptic curve cryptography, it has the following securities: strong verifiability, nonrepudiation, unforgeability, blindness and robustness, and also takes advantage of characteristics of elliptic curve such as higher security and shorter key, as well as lower computational complexity compared with the previous schemes.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128481001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479592
Xiaoyu Li, Dexi Zhang
A multiparty quantum determined key distribution protocol using GHZ(Greenberger-Horne-Zeilinger) states is presented in this paper. Three parties can build a key with the help of GHZ states. The key can be a determined string in our protocol while the key is a random string built in the process of key distribution in previous protocols. We prove that our protocol is guaranteed to be unconditionally secure by the laws of quantum mechanics.
{"title":"Multiparty quantum determined key distribution protocol using GHZ states","authors":"Xiaoyu Li, Dexi Zhang","doi":"10.1109/ICNDS.2010.5479592","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479592","url":null,"abstract":"A multiparty quantum determined key distribution protocol using GHZ(Greenberger-Horne-Zeilinger) states is presented in this paper. Three parties can build a key with the help of GHZ states. The key can be a determined string in our protocol while the key is a random string built in the process of key distribution in previous protocols. We prove that our protocol is guaranteed to be unconditionally secure by the laws of quantum mechanics.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115850127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479412
Zhongyang Li, Weimin Du, Shouming Chen
The faster development of science and technology is, the more obviously Digital Art shows us its special art form. Digital art, as the emerging form of Mass Art, depends on the development of digital media and the Internet to spread. Because it's no question that the art works which displayed in front of audiences are more influential than that not. Meanwhile, Digital Art differs from other arts in the elements of instruction. Such as words in language art, colors and kinds of stone in formative art, and body in performance art. There are in-depth, internal link between the Digital Art and science technology. Although Digital Art benefits from scientific and technological progress, it is incorrect that technology is overemphasized while regardless of culture in the form of Digital Art.
{"title":"Analysis on the two aspects of Digital Art","authors":"Zhongyang Li, Weimin Du, Shouming Chen","doi":"10.1109/ICNDS.2010.5479412","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479412","url":null,"abstract":"The faster development of science and technology is, the more obviously Digital Art shows us its special art form. Digital art, as the emerging form of Mass Art, depends on the development of digital media and the Internet to spread. Because it's no question that the art works which displayed in front of audiences are more influential than that not. Meanwhile, Digital Art differs from other arts in the elements of instruction. Such as words in language art, colors and kinds of stone in formative art, and body in performance art. There are in-depth, internal link between the Digital Art and science technology. Although Digital Art benefits from scientific and technological progress, it is incorrect that technology is overemphasized while regardless of culture in the form of Digital Art.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117006226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479394
Yunyang Ye, Wenming Chen, Huang Junda, Wenbin Zou
the License plate automatic recognition has been extensive applied in the intellectual traffic system and public transit security system. In this paper, a kind of location method based on the specific texture character of license plate is presented, using wavelet analysis for License Plate location. Then we do one-dimensional scale decomposition to the license plate image after coarse positioning through the wavelet, extracting the horizontal and vertical details of the license plate images, and binarization of the license plate image. Then we project the horizontal and vertical details of the images in horizontal and vertical direction respectively, finally we can find the specific location of license plates through the projection drawing. We have carried out a series of experiments under different conditions, the experiment results show that the location method presented in this paper is effect and successful.
{"title":"Research on localization method of vehicle license plate based on wavelet analysis","authors":"Yunyang Ye, Wenming Chen, Huang Junda, Wenbin Zou","doi":"10.1109/ICNDS.2010.5479394","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479394","url":null,"abstract":"the License plate automatic recognition has been extensive applied in the intellectual traffic system and public transit security system. In this paper, a kind of location method based on the specific texture character of license plate is presented, using wavelet analysis for License Plate location. Then we do one-dimensional scale decomposition to the license plate image after coarse positioning through the wavelet, extracting the horizontal and vertical details of the license plate images, and binarization of the license plate image. Then we project the horizontal and vertical details of the images in horizontal and vertical direction respectively, finally we can find the specific location of license plates through the projection drawing. We have carried out a series of experiments under different conditions, the experiment results show that the location method presented in this paper is effect and successful.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479283
Xiangyang Xu
S-boxes block cipher is the only non-linear components, and its password strength decides the security of the entire block cipher strength. It is very difficult and complex to use the traditional methods of mathematical to construct the S-boxes with good performance. This thesis will put on a new construction of the s-boxes method based on the particle swarm optimization (PSO). This algorithm defines the location of the two particles “addition” operator, replacement of the original speed equation in order to achieve the exchange of information between particles, and the addition of a mutation operator to maintain the population diversity to prevent premature convergence. The experimental results show that it is plausible to use POS to get a group of S-boxes with high non-linearity and low evenness in difference. This structure can effectively reduce the redundant computation to accelerate the convergence speed.
s -box分组密码是唯一的非线性组件,其密码强度决定了整个分组密码强度的安全性。用传统的数学方法构造性能良好的s盒是非常困难和复杂的。本文提出了一种基于粒子群优化(PSO)的s-box方法。该算法定义了两个粒子位置的“加法”算子,替换原有的速度方程以实现粒子间的信息交换,并加入一个突变算子以保持种群的多样性,防止过早收敛。实验结果表明,利用POS算法可以得到一组高非线性、差值均匀度低的s盒。这种结构可以有效地减少冗余计算,加快收敛速度。
{"title":"The block cipher for construction of S-boxes based on particle swarm optimization","authors":"Xiangyang Xu","doi":"10.1109/ICNDS.2010.5479283","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479283","url":null,"abstract":"S-boxes block cipher is the only non-linear components, and its password strength decides the security of the entire block cipher strength. It is very difficult and complex to use the traditional methods of mathematical to construct the S-boxes with good performance. This thesis will put on a new construction of the s-boxes method based on the particle swarm optimization (PSO). This algorithm defines the location of the two particles “addition” operator, replacement of the original speed equation in order to achieve the exchange of information between particles, and the addition of a mutation operator to maintain the population diversity to prevent premature convergence. The experimental results show that it is plausible to use POS to get a group of S-boxes with high non-linearity and low evenness in difference. This structure can effectively reduce the redundant computation to accelerate the convergence speed.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117151979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479391
Qi Hui-fang
With the arrival of the network and digital age, the library's holdings of resources has undergone a drastic change in which the proportion of digital resources occupy an instantly increase. The digital resources are easy to share and retrieve. This article discusses the need for integration of university library's digital resources, the principles and contents of integration. several integrated model of digital resources which are suitable for university libraries are proposed. Utilization of resource will be improved significantly by the one-stop inquiries of digital resources which is achieved by integration of resources.
{"title":"Research of digital resources integration of university library under network environment","authors":"Qi Hui-fang","doi":"10.1109/ICNDS.2010.5479391","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479391","url":null,"abstract":"With the arrival of the network and digital age, the library's holdings of resources has undergone a drastic change in which the proportion of digital resources occupy an instantly increase. The digital resources are easy to share and retrieve. This article discusses the need for integration of university library's digital resources, the principles and contents of integration. several integrated model of digital resources which are suitable for university libraries are proposed. Utilization of resource will be improved significantly by the one-stop inquiries of digital resources which is achieved by integration of resources.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114273237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}