IJWMT Vol. 1, No. 1, Feb. 2011
Cover page and Table of Contents: PDF (size: 116KB)
REGULAR PAPERS
This paper analyzes and researches the theories of the encryption communications and identities authentication over the Internet banking based on the PKI technology. Combined with the specific Internet banking system, this research tries to design Internet banking system communication encryption and identities verification and the workflow and main functions. Implementing application to enhance confidentiality of the information transferred by the network communication, this research solves the problems of encrypting Internet banking data and verifying the identities of users and Internet banking. Finally, this paper explores the key technology more in-depth in the designing.
[...] Read more.Digital simulation design is one of the mechanical product modern design methods. We have introduced the concept and meaning of digital mockup technology in mechanical design and its architecture, design cycle, which are concerned multi-domain UML, multi-body dynamics and multidisciplinary design. We also have analyzed the automobile digital simulation design method and digital mockup technology.
[...] Read more.Remote exploit attacks are the most serious threats in network security area. Polymorphism is a kind of code-modifying technique used to evade detection. A novel approach using static analysis methods is proposed to discover the polymorphic exploit codes hiding in network data flows. The idea of abstract execution is firstly adopted to construct control flow graph, then both symbolic execution and taint analysis are used to detect exploit payloads, at last predefined length of NOOP instruction sequence is recognized to help detection. Experimental results show that the approach is capable of correctly distinguishing the exploit codes from regular network flows.
[...] Read more.This paper introduces the structure of linear motor in mines. Analyze the power relation of power-AC -linear motor – vibrant machine, based on this, count the power factor; and make mechanical analysis to the vibrancy, get the power factor, which should be: in the precondition of without collision for the top and bottom magnet, do best to decrease the δ_0 to close to ΔΧ_m (ΔΧ_m depends on the technique of the vibrant load), make Κ_δ close to 1 and λ_e close to critical maximum λ_(em) . It is significantly useful to design linear motor.
[...] Read more.A group-oriented access control scheme is proposed for P2P (peer to peer) networks. In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks. Moreover, the proposed scheme can simply and efficient establish share key between two members without interactions, therefore it can perform secure communications with them. The analysis of security and performance shows that the proposed scheme not only can realize authentication and secure communication, but also can easily and efficiently add new group members and revoke malicious group members. Therefore, it is more efficient, and more practical protocol for P2P networks.
[...] Read more.On the basis of the flywheel energy converter’s structure in wind power turbine, we have used permanent-magnet synchronism motor as energy converter and built mathematical model. We have studied and realized control method of wind power turbine’s constant output power. By analyzing the mathematical model, we have concluded that the needed time of stored energy is three times longer than constant torque control time, and the needed motor power is one second of constant torque control. When flywheel starts from zero speed to basic speed ([(ω_max)/5]), the constant torque control method will be acquired. When flywheel speeds up between [(ω_max)/5] and ω_max , the amplitude power control will be acquired. What we have studied is very important to realize constant output power.
[...] Read more.An effective replica management method can save bandwidth, reduce latency, balance load, and improve system reliability. A comprehensive scheme is introduced to manage replica for the grid environment. The schemes of replica creation and placement based on the frequency of visits and storage space, replica replacement based on the replica value, and replica selection based on comprehensive performance are proposed. Our scheme can achieve optimization of data distribution and replication, improve the efficiency of data visits in the grid environment.
[...] Read more.NAND FLASH is a commonly large capacity memory, which used in embedded systems .It often used to store the operating system kernel and file system. NAND FLASH memory has a limited number of block erase feature. Built file system in NAND FLASH, loss of balance method should be adopted. A balanced system of block erase operation, can extend the life of NAND FLASH and improve overall system reliability. The paper analyzes the characteristics of NAND FLASH work .presents a loss of balance algorithm which used in NAND FLASH memory , and given out the implementation of the algorithm design method.
[...] Read more.How to solve the thickness of general graph is an unsolved problem and one of many difficult problems in graph theory. This paper studies the method for calculating the thickness of undigraph and proposes formula and concrete method for calculating the thickness of undigraph G. Meanwhile, method is proposed for testing whether division of side-derived subgraphs is correct. Some instances presented in this paper aims at illustrating the actual application and correctness of calculation of this method for reference.
[...] Read more.Considering that cold-chain involves lots of complicated operations which suffer from various uncertain factors during the process of implementing, it is inevitable to establish a sound and detailed risk assessment principle or means to guarantee the safety of cold-chain. HACCP, Hazard Analysis and Critical Control Point, is chosen to be a useful tool to analyze the processes of cold-chain, assess the potential risks for each operation link, and then identify the critical control points and give the appropriate risk weights, so as to ensure the safety, quality and reliability of the cold-chain.
[...] Read more.