In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities o...In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities of WAI' were found out. The improvement of WAI' was made and a new protocol called WAI' - E was proposed. The WAI' -E was combined with the key exchange mechanism of Diffie-HeUman based on el- liptic curve cryptography. Moreover, by using CK mode, it is the fact that WAI'-E was SK-secure with PFS and was nrovided with inde^nendant sacuritv ,f cartifient~ mlthentientinn wn~ nravgd展开更多
This paper analyzes conflict features in architecture pipe routing,and builds a pipe routing design conflict model by taking into account of discrete nominal internal diameter selection of pipes,material costs,and con...This paper analyzes conflict features in architecture pipe routing,and builds a pipe routing design conflict model by taking into account of discrete nominal internal diameter selection of pipes,material costs,and conflict solution sequence.Considering pipe routing as an assembling process,a conflict detection approach for pipe routing in collaborative architectural design is proposed based on an aforementioned model.Constraint network is used to describe the relationship among pipe routing design parameters and constraints;design conflicts are detected by matching designers' input and constraint network;and detected design conflicts are reordered according to the number of pipe parameters in conflicts.In order to support the collaborative requirement of pipe routing design,a prototype system using browser/server architecture is developed.An illustrative example of water pipe routing in a room is used to show the effectiveness and efficiency of the approach.展开更多
Introduced a Web-based real-time network monitoring and control system design methods, the 3-D VR was applied in a remote monitor system based on browser/server structure, and a VRML and Java based 3-D remote monitor ...Introduced a Web-based real-time network monitoring and control system design methods, the 3-D VR was applied in a remote monitor system based on browser/server structure, and a VRML and Java based 3-D remote monitor system was realized. Meanwhile, give possible solutions of the real-time data transmission and the stability of the system.展开更多
PACS can be applied in the network architecture of Client/Server (C/S) and Browser/Server (B/S) in current application of hospital information system. PACS Viewer of B/S model is realized by means of the browser commo...PACS can be applied in the network architecture of Client/Server (C/S) and Browser/Server (B/S) in current application of hospital information system. PACS Viewer of B/S model is realized by means of the browser commonly, but web browser does not support DICOM standard. In this article, how to use Java Applet to realize the display and operations of DICOM images will be discussed. The lightweight method to view DICOM images is very fit for telemedical treatment, and the situations not require strong ability in image operations展开更多
This paper mainly studies the method of dynamic embedded Web server technology and its realization. Taking S3C2440 processor as the core hardware platform, constructed the software system of based on Linux operating s...This paper mainly studies the method of dynamic embedded Web server technology and its realization. Taking S3C2440 processor as the core hardware platform, constructed the software system of based on Linux operating system on the hardware platform; Analysis the key technology of web server, select Boa as the embedded web server, Boa server and CGIC database successfully transplanted and run the static Webpage: The paper detailed analysis of the CGI technology and using C language to compile the CGI program to realize dynamic Web server, realize the use of the Web browser to the remote Web server access control function.展开更多
文摘In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities of WAI' were found out. The improvement of WAI' was made and a new protocol called WAI' - E was proposed. The WAI' -E was combined with the key exchange mechanism of Diffie-HeUman based on el- liptic curve cryptography. Moreover, by using CK mode, it is the fact that WAI'-E was SK-secure with PFS and was nrovided with inde^nendant sacuritv ,f cartifient~ mlthentientinn wn~ nravgd
基金Supported by the National High Technology Research and Development Programme of China(No.2006AA04Z112)the National Natural Science Foundation of China(No.51175287)the National S&T Major Program(No.2009ZX02001-003)
文摘This paper analyzes conflict features in architecture pipe routing,and builds a pipe routing design conflict model by taking into account of discrete nominal internal diameter selection of pipes,material costs,and conflict solution sequence.Considering pipe routing as an assembling process,a conflict detection approach for pipe routing in collaborative architectural design is proposed based on an aforementioned model.Constraint network is used to describe the relationship among pipe routing design parameters and constraints;design conflicts are detected by matching designers' input and constraint network;and detected design conflicts are reordered according to the number of pipe parameters in conflicts.In order to support the collaborative requirement of pipe routing design,a prototype system using browser/server architecture is developed.An illustrative example of water pipe routing in a room is used to show the effectiveness and efficiency of the approach.
文摘Introduced a Web-based real-time network monitoring and control system design methods, the 3-D VR was applied in a remote monitor system based on browser/server structure, and a VRML and Java based 3-D remote monitor system was realized. Meanwhile, give possible solutions of the real-time data transmission and the stability of the system.
文摘PACS can be applied in the network architecture of Client/Server (C/S) and Browser/Server (B/S) in current application of hospital information system. PACS Viewer of B/S model is realized by means of the browser commonly, but web browser does not support DICOM standard. In this article, how to use Java Applet to realize the display and operations of DICOM images will be discussed. The lightweight method to view DICOM images is very fit for telemedical treatment, and the situations not require strong ability in image operations
文摘This paper mainly studies the method of dynamic embedded Web server technology and its realization. Taking S3C2440 processor as the core hardware platform, constructed the software system of based on Linux operating system on the hardware platform; Analysis the key technology of web server, select Boa as the embedded web server, Boa server and CGIC database successfully transplanted and run the static Webpage: The paper detailed analysis of the CGI technology and using C language to compile the CGI program to realize dynamic Web server, realize the use of the Web browser to the remote Web server access control function.