{"title":"Design and Implementation of Current Distribution Monitoring Program in Aluminum Reduction Cell","authors":"Zhifang Zhang, Rentao Zhao, J. Tie","doi":"10.1109/NCIS.2011.169","DOIUrl":"https://doi.org/10.1109/NCIS.2011.169","url":null,"abstract":"Anode and cathode current distribution is an important technology parameter in the process of aluminum production, but the currently used simple methods of analysis and detection can not meet the needs for current distribution online monitoring. The development of current distribution online monitoring system achieves the online monitoring and real-time analysis of current distribution in aluminum reduction cell. The system changes the operation mode of parameter measurement, data storage and analysis in the current electrolytic aluminum industry, provides a tool for further study of aluminum electrolysis process and the electrolyzer operational conditions, improves the production-line workers' data measurement efficiency, eliminates the data errors in the process of traditional data entry, and improves efficiency of data use. Actual operating results prove that the system has a good promotional value.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo Zhong, Weiyue Liu, Chong Li, Z. Jiang, Yanlin Tang, Yang Liu, Bin Yang, Xiaofang Hu, Qi Shen, Chenzhi Peng
{"title":"Qubit Extraction for Free-Space Quantum Key Distribution","authors":"Bo Zhong, Weiyue Liu, Chong Li, Z. Jiang, Yanlin Tang, Yang Liu, Bin Yang, Xiaofang Hu, Qi Shen, Chenzhi Peng","doi":"10.1109/NCIS.2011.55","DOIUrl":"https://doi.org/10.1109/NCIS.2011.55","url":null,"abstract":"Qubit extraction is used in quantum key distribution systems to recover qubit sequences from quantum signals. This paper introduces the principle of quantum key distribution based on BB84 protocol and the realization of qubits extraction for free space quantum cryptography system.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123135543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Digital Content Nested Protection in the Research of Digital Content Lifecycle Protection","authors":"Mei Xue, Deren Yang","doi":"10.1109/NCIS.2011.16","DOIUrl":"https://doi.org/10.1109/NCIS.2011.16","url":null,"abstract":"Content Lifecycle Protection (CLP) employs 'Box' to wrap content into BCO so that Box can supervise and protect inside content during each phase of lifecycle. BCO is the core of CLP. In this paper, based on the CLP concept, we analyze the content nested protection and present the BCO physical coupling structures after the nested protection. At the end of this paper, the application experiment is implemented and shows how the BCO works in the content twice-nested protection.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cost-Effective IP Trace Publishing Using Data Sketch","authors":"Lihua Miao, W. Ding, Haiting Zhu, Qin Xia","doi":"10.1109/NCIS.2011.44","DOIUrl":"https://doi.org/10.1109/NCIS.2011.44","url":null,"abstract":"IP Traces are sets of IP packets (or packet headers) captured at the measuring point. Their publishing, which is most challenged by massive size concern, is crucial for network research. In this paper, we propose a new scheme for IP Trace publishing which offers much smaller transportation quantity than the traditional methods. Based on Cisco's Net flow technique, the data provider first summarizes an original IP Trace to a sketch. During the summarizing process, extra statistics of certain fields in the original IP Trace are obtained. The sketch and the statistics, which are much smaller in size, are then published instead of the original IP Trace. Based on the Monte Carlo simulation technique, the data down loader can generate a synthetic IP Trace from the sketch and the statistics which preserves most of the statistical properties of the original IP Trace. According to our experiments, the transportation quantity of our scheme is only 3% of that in the traditional methods and meanwhile privacy is better protected. In the end, the utility of the synthetic IP Trace and that of the original IP Trace are compared using two network performance metrics (throughput and RTT). The result shows that this scheme is feasible.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127278581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"XBRL Metadata Repository and Continuous Data Mining","authors":"Ding Pan, Yunshan Pan","doi":"10.1109/NCIS.2011.41","DOIUrl":"https://doi.org/10.1109/NCIS.2011.41","url":null,"abstract":"XBRL uses internationally accepted network financial reporting standards to create a taxonomy which is allowed an exchangeable and extraction of data across all software and technologies. It make enterprise metadata repository involving XBRL metadata became one of the important research issues. The requirements of metadata management for XBRL documents and continuous data mining are described. Then a meta-model and architecture for a metadata repository and data mining are proposed, that are capable of storing and managing a cohesive enterprise view of metadata, maintaining integrity based on XBRL semantics, and integrating XBRL metadata to support continuous data mining process.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124743432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cluster Header Election Scheme Based on Auction Mechanism for Intrusion Detection in MANET","authors":"Yanqing Zeng, Zhide Chen, Cheng Qiao, Li Xu","doi":"10.1109/NCIS.2011.184","DOIUrl":"https://doi.org/10.1109/NCIS.2011.184","url":null,"abstract":"In this paper, we study the cluster head nodes election mechanism for cluster based intrusion detection in the presence of selfish nodes in Mobile Ad Hoc Networks (MANETs). To prolong the lifetime of all nodes, each cluster should elect a node with the most remaining energy as its cluster head. But, the selfish nodes may behave selfishly by lying about their remaining energy and avoiding being elected. We represent the existence of selfish nodes really has a bad effect on the lifetime of the networks and propose a solution based on auction mechanism. More specifically, we design a mechanism with the following attributes: First, the mechanism can always elect the most energy remaining nodes as cluster heads. Second, the mechanism can encourage the selfish nodes behave honestly by providing incentives. Simulation results show that our mechanism can effectively prolong the overall lifetime of Intrusion Detection System (IDS) in MANET.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124810683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Proxy Signature for Designated Verifier","authors":"Zhang Xinjing, Huang Shoujia, Xin Xiangjun","doi":"10.1109/NCIS.2011.52","DOIUrl":"https://doi.org/10.1109/NCIS.2011.52","url":null,"abstract":"To overcome the disadvantages of designated-verifier signature schemes proposed by Dai and Wang, based on the Schnorr signature scheme, an improved designated-verifier signature scheme is proposed. The proposed scheme overcomes weakness of the schemes proposed by Dai and Wang. According to the security analysis, it is found that the new scheme is secure under the hardness assumption of discrete logarithm. On the other hand, the new scheme is more efficient than Wang's scheme due to its fewer exchanges than Wang's.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114525411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Current-Mode Nth-Order Multifunction Filter Using Minimum Number of DVCCs","authors":"Ping-hua Zhang, Xi-feng Zhou, Shan Xiao","doi":"10.1109/NCIS.2011.160","DOIUrl":"https://doi.org/10.1109/NCIS.2011.160","url":null,"abstract":"In this paper, a nth-order current-mode universal filter based on differential voltage current conveyors (DVCCs) is proposed. Using minimum number of passive Components, The filter obtained from the proposed structure can simultaneously realize low-pass, band-pass, all-pass, high-pass and band-reject responses by choosing appropriate input branches without changing the passive elements. The obtained nth-order filter is only composed by n DVCCs and n capacitors and n resistors. All capacitors and resistors are grounded, which is integrated conveniently and is compatible with VLSI technology. The proposed filter requires no active and passive element matching conditions and/or cancellation constraints. Additionally, a universal biquadratic filter as an example is introduced. The second-order filter has low active and passive element sensitivities, and offers orthogonal control of the angular resonance frequency (?o) and quality factor (Q). HSPICE simulations are performed employing 0.18μm CMOS process and the performance simulation results are tested by comparing with the theoretical results of the filter.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116190745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant Algorithm Inspired Immune Intrusion Detector Generation Algorithm","authors":"Xiaowei Wang, Li-na Sun","doi":"10.1109/NCIS.2011.124","DOIUrl":"https://doi.org/10.1109/NCIS.2011.124","url":null,"abstract":"In this paper, we propose a novel generative method for immune intrusion detectors inspired by principle of ant algorithm. In detector generation stage, we use the characteristics of distributed processing of ant algorithm, which can quickly generate high quality detectors. In the stage of labeling the detectors, the label of the detectors is decided according to prior knowledge. The algorithm is simple, which do not need to undertake initial categories of division. Simulation experiments show that this algorithm performs as well as the state-of-the-art detector algorithms when recognizing known attacks, but is significantly more effective on identifying unknown attacks.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126398292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shedding New Light on Reason for Conflict between Evidences","authors":"LiFang Hu, Jia-qi Liu, Xin Guan, Wei-jia Liu, Ting-ting Zhou","doi":"10.1109/NCIS.2011.180","DOIUrl":"https://doi.org/10.1109/NCIS.2011.180","url":null,"abstract":"The Dempster-Shafer evidence theory (DST) is widely used in many fields of information fusion. However, counter-intuitive results may be obtained by the classical Dempster combination rule (DRC) when collected evidences conflict highly with each other. However, Haenni gave confutation based on Zadeh's criticism of DRC, reasons for conflict between evidences concluded by him were not comprehensive. So, reasons for conflict between evidences are analyzed and summarized in this paper, that is, sensor reliability, incompleteness of the frame of discernment which is also called imprecise definition of GBBA model, and integration results of the above two reasons are the material reasons for conflict.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"11 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131513501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}