Method for data conversion of heterogeneous DBMS's in the integrated network environment is introduced. The technical approach used can perform data conversion of heterogeneous databases located on different nodes...Method for data conversion of heterogeneous DBMS's in the integrated network environment is introduced. The technical approach used can perform data conversion of heterogeneous databases located on different nodes of the network, such as Oracle, Sybase, Informix, MS SQL Server, SQL Anywhere and Foxpro. The conversion system adopts the Client/Server architecture and provides visual integrated interface for users.展开更多
To improve I/O speed and system performance of network storage devices, a special storage server that is an iSCSI-based network-attached storage server (iSCSI-based network-attached storage server, for short iNAS) is ...To improve I/O speed and system performance of network storage devices, a special storage server that is an iSCSI-based network-attached storage server (iSCSI-based network-attached storage server, for short iNAS) is designed. The iNAS can provide both the file I/O and the block I/O services by an iSCSI module, and it converges with the NAS and the SAN (storage area network). The iNAS improves the I/O speed by the direct data access (zero copy) between the RAID (redundant array of inexpensive disks) controller and the user-level memory. The iNAS integrates the multi-RAID for a single storage pool by a multi-stage stripping device driver, and it implements the storage virtualization. In the experiments, the iNAS has ultra-high-throughput for both the file I/O requests and the block I/O requests.展开更多
This paper describes the RTSS simulation-based performance evaluation method during the upgrade of the HT-7 data processing system to a distributed environment. We present the main concepts and steps of the method. Qu...This paper describes the RTSS simulation-based performance evaluation method during the upgrade of the HT-7 data processing system to a distributed environment. We present the main concepts and steps of the method. Queueing modeling and steady-state operational analysis techniques are also used for analytic modeling. Both simulation and analysis studies on the HT-7 data processing system indicate that in comparison with conventional time-shared systems,a client/server system can significantly reduce the completion time of raw data display,real-time data processing and data transfer in the online system,raise the workload capacity and reduce the average waiting time of the off-line system.展开更多
A web service wrapping approach for command line programs,which are commonly used in scientific computing,is proposed.First,software architecture for a basic web service wrapper implementation is given and the functio...A web service wrapping approach for command line programs,which are commonly used in scientific computing,is proposed.First,software architecture for a basic web service wrapper implementation is given and the functions of the main components are explained.Then after a comprehensive analysis of data transmission and a job life cycle model,a novel proactive file transmission and job management mechanism is devised to enhance the software architecture,and the command line programs are wrapped into web services in such a way that they can efficiently transmit files,supply instant status feedback and automatically manage the jobs.Experiments show that the proposed approach achieves higher performance with less memory usage compared to the related work, and the usability is also improved.This work has already been put into use in a production system of scientific computing and the data processing efficiency of the system is greatly improved.展开更多
[Objective] This study aimed to establish a method for determining the content of Astragaloside IV in Yupingfeng oral solution.[Method] The HPLC-ELSD method was adopted.The chromatographic column was Venusil MP(4.6 m...[Objective] This study aimed to establish a method for determining the content of Astragaloside IV in Yupingfeng oral solution.[Method] The HPLC-ELSD method was adopted.The chromatographic column was Venusil MP(4.6 mm × 150 mm,5 μm).The mobile phase was acetonitrile-water(35∶65).The ELSD evaporator tube temperature was 65 ℃.N2 was used as the carrier gas(pressure,30 psi).[Result] When the content of Astragaloside IV ranged from 0.5 to 5.0 μg,the Astragaloside IV content showed a good linear relationship with peak area(r=0.999,n=6).The average recovery was 96.36%,and the RSD was 2.46%.[Conclusion] This method is accurate and reliable,and can be applied in the quality control of Yupingfeng oral solution.展开更多
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl...Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.展开更多
A hybrid distributed virtual environment (DVE) architecture is presented by importing a peer-to-peer (P2P) idea into the traditional client/server (C/S) architecture to improve the DVE system's scalability. The...A hybrid distributed virtual environment (DVE) architecture is presented by importing a peer-to-peer (P2P) idea into the traditional client/server (C/S) architecture to improve the DVE system's scalability. The mathematical model of the overload of the center server was built and a series of simulation experiments were performed to validate the conclusions. When the client number increases to a certain value, the hybrid architecture can reduce server overload with some special clients (temp servers) selected with a certain heuristic strategy. With this architecture, the DVE system can support more system clients with the same server hardware than the C/S architecture can. The server overload "pulse" phenomena causing by the exiting of the temp server can be resolved by adopting a more optimized temp server selecting strategy and by reducing the child client capability of the temp server. By combining the advantages of the C/S architecture and the P2P architecture, the hybrid DVE architecture can effectively improve the scalability of the DVE system. This is validated by theoretical analysis and simulation experiments.展开更多
Fog Computing is a new platform that can serve mobile devices in the local area. In Fog Computing, the resources need to be shared or cached in the widely deployed Fog clusters. In this paper, we propose a Steiner tre...Fog Computing is a new platform that can serve mobile devices in the local area. In Fog Computing, the resources need to be shared or cached in the widely deployed Fog clusters. In this paper, we propose a Steiner tree based caching scheme, in which the Fog servers, when caching resources, first produce a Steiner tree to minimize the total path weight(or cost) such that the cost of resource caching using this tree could be minimized. Then we give a running illustration to show how the Fog Computing works and we compare the traditional shortest path scheme with the proposed one. The outcome shows that the Steiner tree based scheme could work more efficiently.展开更多
Quality of Service (QoS) is a key factor in Web service advertising, choosing and runtime monitoring. Web service QoS is multi-faceted, fuzzy and dynamic. Current researches focus on implementation level performance a...Quality of Service (QoS) is a key factor in Web service advertising, choosing and runtime monitoring. Web service QoS is multi-faceted, fuzzy and dynamic. Current researches focus on implementation level performance assurance, ignoring domain specific or application level metrics which are also very important to service users. Industry Web service standards lack QoS expression. The support for QoS based service choice-making is very limited. We proposed an extended Web service QoS model based on configurable fuzzy synthetic evaluation system. Web service QoS is evaluated dynamically according to the service context. A QoS requirement description model is also given for service QoS requirement definition. An interactive Web service choice-making process is described, which takes QoS as a key factor when choosing from functionally equivalent services.展开更多
We present a method of 3D image mosaicing for real 3D representation of roadside buildings, and implement a Web-based interactive visualization environment for the 3D video mosaics created by 3D image mosaicing. The 3...We present a method of 3D image mosaicing for real 3D representation of roadside buildings, and implement a Web-based interactive visualization environment for the 3D video mosaics created by 3D image mosaicing. The 3D image mo- saicing technique developed in our previous work is a very powerful method for creating textured 3D-GIS data without excessive data processing like the laser or stereo system. For the Web-based open access to the 3D video mosaics, we build an interactive visualization environment using X3D, the emerging standard of Web 3D. We conduct the data preprocessing for 3D video mosaics and the X3D modeling for textured 3D data. The data preprocessing includes the conversion of each frame of 3D video mosaics into concatenated image files that can be hyperlinked on the Web. The X3D modeling handles the representation of concatenated images using necessary X3D nodes. By employing X3D as the data format for 3D image mosaics, the real 3D representation of roadside buildings is extended to the Web and mobile service systems.展开更多
A general method of constructing proxy blind signature is proposed based on multilinear transform. Based on this method, the four proxy blind signature schemes are correspondently generated with four different signatu...A general method of constructing proxy blind signature is proposed based on multilinear transform. Based on this method, the four proxy blind signature schemes are correspondently generated with four different signature equations, and each of them has four forms of variations of signs. Hence there are sixteen signatures in all, and all of them are proxy stronglyblind signature schemes. Furthermore, the two degenerated situations of multi-linear transform are discussed. Their corresponding proxy blind signature schemes are shown, too. But some schemes come from one of these degenerate situations are proxy weakly-blind signature scheme.The security for proposed scheme is analyzed in details. The results indicate that these signature schemes have many good properties such as unforgeability, distinguish-ability of proxy signature,non-repudiation and extensive value of application etc.展开更多
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa...The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.展开更多
In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities o...In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities of WAI' were found out. The improvement of WAI' was made and a new protocol called WAI' - E was proposed. The WAI' -E was combined with the key exchange mechanism of Diffie-HeUman based on el- liptic curve cryptography. Moreover, by using CK mode, it is the fact that WAI'-E was SK-secure with PFS and was nrovided with inde^nendant sacuritv ,f cartifient~ mlthentientinn wn~ nravgd展开更多
Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. How...Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed.展开更多
文摘Method for data conversion of heterogeneous DBMS's in the integrated network environment is introduced. The technical approach used can perform data conversion of heterogeneous databases located on different nodes of the network, such as Oracle, Sybase, Informix, MS SQL Server, SQL Anywhere and Foxpro. The conversion system adopts the Client/Server architecture and provides visual integrated interface for users.
文摘To improve I/O speed and system performance of network storage devices, a special storage server that is an iSCSI-based network-attached storage server (iSCSI-based network-attached storage server, for short iNAS) is designed. The iNAS can provide both the file I/O and the block I/O services by an iSCSI module, and it converges with the NAS and the SAN (storage area network). The iNAS improves the I/O speed by the direct data access (zero copy) between the RAID (redundant array of inexpensive disks) controller and the user-level memory. The iNAS integrates the multi-RAID for a single storage pool by a multi-stage stripping device driver, and it implements the storage virtualization. In the experiments, the iNAS has ultra-high-throughput for both the file I/O requests and the block I/O requests.
文摘This paper describes the RTSS simulation-based performance evaluation method during the upgrade of the HT-7 data processing system to a distributed environment. We present the main concepts and steps of the method. Queueing modeling and steady-state operational analysis techniques are also used for analytic modeling. Both simulation and analysis studies on the HT-7 data processing system indicate that in comparison with conventional time-shared systems,a client/server system can significantly reduce the completion time of raw data display,real-time data processing and data transfer in the online system,raise the workload capacity and reduce the average waiting time of the off-line system.
基金The National Natural Science Foundation of China(No.60573117)the National Basic Research Program of China(973 Program)(No.2007CB310805)
文摘A web service wrapping approach for command line programs,which are commonly used in scientific computing,is proposed.First,software architecture for a basic web service wrapper implementation is given and the functions of the main components are explained.Then after a comprehensive analysis of data transmission and a job life cycle model,a novel proactive file transmission and job management mechanism is devised to enhance the software architecture,and the command line programs are wrapped into web services in such a way that they can efficiently transmit files,supply instant status feedback and automatically manage the jobs.Experiments show that the proposed approach achieves higher performance with less memory usage compared to the related work, and the usability is also improved.This work has already been put into use in a production system of scientific computing and the data processing efficiency of the system is greatly improved.
基金Supported by General Program of Science and Technology Plan of Beijing Municipal Commission of Educational(KM201410020007)~~
文摘[Objective] This study aimed to establish a method for determining the content of Astragaloside IV in Yupingfeng oral solution.[Method] The HPLC-ELSD method was adopted.The chromatographic column was Venusil MP(4.6 mm × 150 mm,5 μm).The mobile phase was acetonitrile-water(35∶65).The ELSD evaporator tube temperature was 65 ℃.N2 was used as the carrier gas(pressure,30 psi).[Result] When the content of Astragaloside IV ranged from 0.5 to 5.0 μg,the Astragaloside IV content showed a good linear relationship with peak area(r=0.999,n=6).The average recovery was 96.36%,and the RSD was 2.46%.[Conclusion] This method is accurate and reliable,and can be applied in the quality control of Yupingfeng oral solution.
文摘Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.
文摘A hybrid distributed virtual environment (DVE) architecture is presented by importing a peer-to-peer (P2P) idea into the traditional client/server (C/S) architecture to improve the DVE system's scalability. The mathematical model of the overload of the center server was built and a series of simulation experiments were performed to validate the conclusions. When the client number increases to a certain value, the hybrid architecture can reduce server overload with some special clients (temp servers) selected with a certain heuristic strategy. With this architecture, the DVE system can support more system clients with the same server hardware than the C/S architecture can. The server overload "pulse" phenomena causing by the exiting of the temp server can be resolved by adopting a more optimized temp server selecting strategy and by reducing the child client capability of the temp server. By combining the advantages of the C/S architecture and the P2P architecture, the hybrid DVE architecture can effectively improve the scalability of the DVE system. This is validated by theoretical analysis and simulation experiments.
基金supported by the National High-Tech R&D Program(863Program)No.2015AA01A705the National Natural Science Foundation of China under Grant No.61202079+1 种基金the China Postdoctoral Science Foundation under Grant No.2014T70031the Fundamental Research Funds for the Central Universities of China No.2015JBM111
文摘Fog Computing is a new platform that can serve mobile devices in the local area. In Fog Computing, the resources need to be shared or cached in the widely deployed Fog clusters. In this paper, we propose a Steiner tree based caching scheme, in which the Fog servers, when caching resources, first produce a Steiner tree to minimize the total path weight(or cost) such that the cost of resource caching using this tree could be minimized. Then we give a running illustration to show how the Fog Computing works and we compare the traditional shortest path scheme with the proposed one. The outcome shows that the Steiner tree based scheme could work more efficiently.
基金Project supported by the National Natural Science Foundation of China (No. 60503041), the Hi-Tech Research and DevelopmentProgram (863) of China (No. 2004AA104340), the Chinese SemanticGrid Project, and the Science and Technology Commission ofShanghai Municipality (No. 03dz15027), China
文摘Quality of Service (QoS) is a key factor in Web service advertising, choosing and runtime monitoring. Web service QoS is multi-faceted, fuzzy and dynamic. Current researches focus on implementation level performance assurance, ignoring domain specific or application level metrics which are also very important to service users. Industry Web service standards lack QoS expression. The support for QoS based service choice-making is very limited. We proposed an extended Web service QoS model based on configurable fuzzy synthetic evaluation system. Web service QoS is evaluated dynamically according to the service context. A QoS requirement description model is also given for service QoS requirement definition. An interactive Web service choice-making process is described, which takes QoS as a key factor when choosing from functionally equivalent services.
文摘We present a method of 3D image mosaicing for real 3D representation of roadside buildings, and implement a Web-based interactive visualization environment for the 3D video mosaics created by 3D image mosaicing. The 3D image mo- saicing technique developed in our previous work is a very powerful method for creating textured 3D-GIS data without excessive data processing like the laser or stereo system. For the Web-based open access to the 3D video mosaics, we build an interactive visualization environment using X3D, the emerging standard of Web 3D. We conduct the data preprocessing for 3D video mosaics and the X3D modeling for textured 3D data. The data preprocessing includes the conversion of each frame of 3D video mosaics into concatenated image files that can be hyperlinked on the Web. The X3D modeling handles the representation of concatenated images using necessary X3D nodes. By employing X3D as the data format for 3D image mosaics, the real 3D representation of roadside buildings is extended to the Web and mobile service systems.
基金Supported by the Fundamental Research Program of Commission of Science Technology and Industry for National Defence (No.J1300D004)
文摘A general method of constructing proxy blind signature is proposed based on multilinear transform. Based on this method, the four proxy blind signature schemes are correspondently generated with four different signature equations, and each of them has four forms of variations of signs. Hence there are sixteen signatures in all, and all of them are proxy stronglyblind signature schemes. Furthermore, the two degenerated situations of multi-linear transform are discussed. Their corresponding proxy blind signature schemes are shown, too. But some schemes come from one of these degenerate situations are proxy weakly-blind signature scheme.The security for proposed scheme is analyzed in details. The results indicate that these signature schemes have many good properties such as unforgeability, distinguish-ability of proxy signature,non-repudiation and extensive value of application etc.
基金The National Natural Science Foundation of China (No. 60273049, 60303026, 60473020)
文摘The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.
文摘In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities of WAI' were found out. The improvement of WAI' was made and a new protocol called WAI' - E was proposed. The WAI' -E was combined with the key exchange mechanism of Diffie-HeUman based on el- liptic curve cryptography. Moreover, by using CK mode, it is the fact that WAI'-E was SK-secure with PFS and was nrovided with inde^nendant sacuritv ,f cartifient~ mlthentientinn wn~ nravgd
基金Supported by the National Natural Science Foundation of China (No.60503005)the Natural Science Foundation of Hunan Province (No.07JJ6110)
文摘Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed.