Qing Wu, Wen Ding, Weihua Hu, B. Zhou, Tianzhou Chen
{"title":"Computer Ability Assisted Assessment System for Large-Scale Heterogeneous Distributed Environments","authors":"Qing Wu, Wen Ding, Weihua Hu, B. Zhou, Tianzhou Chen","doi":"10.1109/ICYCS.2008.480","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.480","url":null,"abstract":"Network-based computer aided assessment system has played an important role for computer education reform. In this paper, we firstly analyze the problems caused by computer aided assessment system in large-scale heterogeneous distributed environments. Then we give a short introduction of Zhejiang computer grade examination. Next, we mainly present the system of Zhejiang computer grade examination, highlighting the system architecture and design. In addition, the system's key technologies consisting of are presented in detail in the paper, which consists of online realtime monitoring, intelligent examination evaluation, distributed concurrent processing, supporting heterogeneous environments, and reliable CAA middleware model. Finally we draw a conclusion and present the future work.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122722642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Thought and Tentative Idea of Reform in Formative Assessment","authors":"Jian Xiang, Lv Ye","doi":"10.1109/ICYCS.2008.309","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.309","url":null,"abstract":"Formative assessment reform is an important measure that can bring about a fundamental change in the traditional education system. It is beyond question that this measure will set new scientific objectives in education. Given this probable advantage, formative assessment is a necessary step that will align our methods with international practice. It is all the more crucial in light of the international character of computer science as a discipline; hence, it has substantial practical applications. Consequently, in order to meet international standards, we should remedy the existing serious limitation in the traditional means of assessment. With this as a backdrop, this paper delves into the dynamics of the current practice of computer technology education. Thereafter, the paper will argue for the need to initiate a reform in formative assessment. The aim of both discussions is to arouse experts' interest in this field and promote the much-needed reform in teaching.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131118372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of a Chaos-based Stream Cipher","authors":"Bin Zhang, Chenhui Jin","doi":"10.1109/ICYCS.2008.136","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.136","url":null,"abstract":"In 2007, Fu Chong et al. proposed an improved chaos-based stream cipher. The secret key of Fu's cipher with 2158 key space size composes of 3 independent chaos initial states. In this paper, the security of Fu's chaotic cipher is investigated and the information leak of chaos map that we call preimage compressibility is discovered. We guess one chaos initial state and obtain two sampling quantified sequences which are generated by other two chaos initial states. Then based on the preimage compressibility of chaos map, an inversion and compression attack is proposed to recover the chaos initial state from sampling quantified sequence. The success probability of the whole attack is 1 and the computational complexity is just about 260.7. The memory complexity and data complexity can be negligible.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120832038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of One-Dimensional Coded Modulations Using Chaotic Maps","authors":"Heng Song, Jingbo Guo","doi":"10.1109/ICYCS.2008.258","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.258","url":null,"abstract":"In order to improve the bit error rate performance of one-dimensional coded modulations using chaotic maps, an optimization process is performed in this paper. Based on the designing methods of conventional trellis coded modulation the minimum free Euclidean distance between signal sequences of chaos-based coded modulations is maximized. Computer search method is then used to find the coded modulations with better minimum distance properties. Finally, bit error rate simulations are given to confirm our optimization results.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125336897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Networking Laboratory Design and Training","authors":"Fei Hong, Yu Bai","doi":"10.1109/ICYCS.2008.382","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.382","url":null,"abstract":"Networking technology is one of the most rapidly growing disciplines and is experiencing unprecedented market growth. It is thus crucial that students be exposed to contemporary networking equipment in a realistic setting, in order to connect theoretical material taught in lecture courses with the realities of physical hardware. To this end, a large computer networking laboratory has been set up to provide a realistic environment for teaching internetworking concepts. This laboratory provides university-level students with a testbed to experiment with fundamental issues of internetworking in a way that cannot be provided by simulators or virtual labs. We describe the motivations for setting up the laboratory, its network structure and equipment, and the type of experiments students conduct. Many of the problems we faced in setting up our equipment are common in other universities. Our experiences are thus likely to be of value to those who are contemplating setting up experimental laboratory.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128164580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Scroll Control of a New Chaotic System","authors":"Chunbiao Li, Hankang Wang","doi":"10.1109/ICYCS.2008.202","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.202","url":null,"abstract":"Based on a new 2-scroll chaotic system, an effectual scroll controller is proposed. The attractor can be controlled to be lopsided, till to be 1-scroll and periodic according to the variety of the scroll controller. Phase portrait, bifurcation diagram and Lyapunov exponent spectrum also verify the scroll transformation property. Some basic dynamical properties and chaotic behavior of this scroll-controlled attractor are investigated briefly.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126371882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Targets Assignment for Cooperative Multi-UAVs Based on Chaos Optimization Algorithm","authors":"Wei Ou, Feng-xing Zou, Xiaohong Xu, Gao Zheng","doi":"10.1109/ICYCS.2008.512","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.512","url":null,"abstract":"Targets assignment is one of crucial problem for multi-UAVs cooperative campaign. By taking furthest campaign benefit and survival probability of UAVs as objective function, the mathematics model of targets assignment is formulated in this paper, and an approach solving targets assignment problem based on chaos optimization is proposed, whereas a new encoding method is introduced, chaos search queues is mapped to solution space of targets assignment problem effectively by defining exchange, shift and insertion operators, and an correcting method is applied to keep the validity of solutions. Finally, the efficiency of the proposed algorithm is demonstrated by computer simulations.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123666158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Investigation on Impulsive Synchronization of Chaotic PN Sequences Based on FPGA","authors":"Xulei Bao, Guangyi Wang, Cuiping Wang, Wei Feng","doi":"10.1109/ICYCS.2008.126","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.126","url":null,"abstract":"This paper studies impulsive synchronization of digital chaotic PN (Psudo-noise) sequences. A new continuous chaotic system which is constructed based on Sprott system, is used to generate the PN sequences via FPGA (Field Programmable Gate Array). Moreover, FPGA technology is also applied to realize the impulsive synchronization between two PN sequences by the chips of Altera Cyclone II EP2C35F484C8. Experimental results are given in section 4. And it proves that the chaos sequence can be used in secret communication in practice.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128349622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Golden Section in 3D Plants IFS Reconstruction","authors":"Yan Wang, Lanling Zeng, Yanxiang Qi","doi":"10.1109/ICYCS.2008.142","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.142","url":null,"abstract":"Plants are the important part in the sense of reality of the nature. Plants reconstruction are generally based on two-dimension, use points draw the graph. This paper presents a new method of drawing 3D Plants, the observation indicates the plants like golden section, bifurcate angles of plants such as herbage, pear etc are around 34.4deg, poplarpsilas are around 55.6deg, they are the golden section of 90deg, and the ratio of point of bifurcate to the hole branch is golden section. Combine plant morphology, computer graphics and fractal render 3D plants. Based on the definition of affine change and compress theorem proved plant's compress gene less than 1, so the IFS (Iterated Function System) have attractors. According to the results of experiments, present the codes of IFS of some plants. People can skim them in real-time and different point.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Teaching Reform of Computer Basic Courses in Technology Universities","authors":"Xuming Han, Limin Wang, Wanli Zuo, Hongzhi Wang, Guojun Chen","doi":"10.1109/ICYCS.2008.502","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.502","url":null,"abstract":"By investigating and researching for the present state of computer basic courses teaching in domestic and foreign technology universities, some problems on computer basic courses teaching are summarized and analyzed in this paper. Update education ideas and teaching methods, reference to the advanced teaching and practice experience of computer basic courses from foreign countries and years of teaching experience, a feasible and effective teaching reform plan and implementing project are proposed in this paper. It could help to increase the interest of students in learning computer knowledge and train them to have the ability of solving practical problem by using programming ideas actively, which can provide a new approach to stimulate the studentspsila creativity and innovative ability.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"178 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134127914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}