Loading...
Welcome to Journal of University of Chinese Academy of Sciences,Today is

Current Issue

2009, Vol.26, No.5 Previous Issue    Next Issue
Review Article
Survey on the candidate algorithms of SHA-3 Hash function family
XUE Yu, WU Wen-Ling, WANG Zhang-Yi
2009, 26 (5): 577-586.  DOI: 10.7523/j.issn.2095-6134.2009.5.001
Abstract ( 1415 ) PDF (KB) ( 2 )

In order to develop the new Secure Hash Standard(SHA-3), NIST has announced request for candidate algorithms. Now the 51 first-round candidates are under evaluation worldwide. These algorithms represent the newest design ideas of cryptographic hash function, and SHA-3 will be another milestone like AES. In order to make domestic researchers know these new algorithms and join the work of evaluation, we briefly introduce these secure algorithms and classify them according to the structure. Meanwhile we sum up the design of security and efficiency on these algorithms.

Research Articles
Weighted L-boundedness of multilinear oscillatory singular integral with generalized Calderón-Zygmund kernel
CHEN Jia-Hong, WANG Rui, YAN Dun-Yan
2009, 26 (5): 587-598.  DOI: 10.7523/j.issn.2095-6134.2009.5.002
Abstract ( 895 ) PDF (KB) ( 4 )

In this paper, weighted Lp-boundedness is obtained for a class of multilinear oscillatory singular integral with generalized Calderón-Zygmund kernel.

Improved classification model via MPEC
DING Fei, YIN Hong-Xia
2009, 26 (5): 599-608.  DOI: 10.7523/j.issn.2095-6134.2009.5.003
Abstract ( 1399 ) PDF (KB) ( 4 )

In this paper, we provide an improved form of MPEC model for data classification first proposed in Ref.[1]. We use β likelihood estimation instead of maximum likelihood estimation to estimate the parameters of data's probability distribution function (modeled by Gaussian mixture models). Our new model can avoid the contingent of unboundedness of the maximum likelihood function and excessive sensitivity of the maximum likelihood estimator to outliers, showing more robustness. Then we use filterSQP method to solve our β likelihood MPEC model as nonlinear program. Efficiency of the model is shown by primal numerical tests.

Recursive dynamics of under-actuated free flying multibody systems
SHAO Bing, WU Hong-Tao, CHENG Shi-Li
2009, 26 (5): 609-614.  DOI: 10.7523/j.issn.2095-6134.2009.5.004
Abstract ( 1079 ) PDF (KB) ( 2 )

Lie group and Lie algebra are used to research the dynamics of under-actuated free flying multibody systems. The under-actuated joints are decomposed into component active and passive joints. The Newton-Euler inverse dynamics is promoted to contain the active and passive joints. At the same time, the dynamical modeling method of space systems with active and passive joints is built. This method can be used to model chain and tree topology space systems. It can also be used to model beam-like flexible multibody systems which are established by finite segment method with high efficiency. Results show that the dynamics described with Lie group and Lie algebra are helpful in highly efficient dynamics modeling. The dynamical expressions are concise and clear.

First-principle calculations of electronic structure and optical properties of Zinc blende CdTe
LIU Qi-Jun, LIU Zheng-Tang, FENG Li-Ping, XU Bing
2009, 26 (5): 615-620.  DOI: 10.7523/j.issn.2095-6134.2009.5.005
Abstract ( 1651 ) PDF (KB) ( 2 )

Band structure, density of states, and optical properties of Zinc blende CdTe have been investigated using the plane-wave ultrasoft pseudopotential technique based on density functional theory (DFT). The calculated results show that Zinc blende CdTe is direct semiconductor with the band gap of 0.671eV. The complex refractivity index, complex dielectric function, absorption coefficient, complex conductivity function, energy-loss function, and optical reflectivity have been calculated and analyzed. The results show that the refractivity index is 2.69 and the static dielectric constant is 7.23. The results are in agreement with the previous work and offer a theoretical basis for the application of Zinc blende CdTe.

Effect of different types of sulphur fertilizer on oilseed rape and railway beggarticks herb uptake of lead and cadmium in lead-cadmium contaminated soil
LI Yuan, CUI Yan-Shan, CHEN Xiao-Chen, HU Dong-Sheng
2009, 26 (5): 621-626.  DOI: 10.7523/j.issn.2095-6134.2009.5.006
Abstract ( 1327 ) PDF (KB) ( 4 )

A pot experiment was conducted to study the influence of S, (NH4)2SO4, CaSO4, and K2SO4 on soil Pb and Cd uptake by oilseed rape (Brassica napus L. cv. Wuyueman) and railway beggarticks herb (Bidens pilosa.L) in lead and cadmium combined contaminated soil. The results showed that the S and (NH4)2SO4 significantly increased the total lead and cadmium uptake in the shoot of Brassica napus, respectively. (NH4)2SO4 and CaSO4 significantly decreased the total lead uptake in the shoot of Bidens pilosa. Elemental sulphur and (NH4)2SO4 are the effective agricultural practices to enhance uptake of lead and cadmium by Brassica napus in lead and cadmium combined contaminated soil, respectively.

Adsorption performance of CMC polymer for heavy metal ions
LIU Zuo-Xin, QU Wei, MIAO Yong-Gang, WANG Zhen-Ying, YIN Guang-Hua, ZHANG Fa-Sheng
2009, 26 (5): 627-632.  DOI: 10.7523/j.issn.2095-6134.2009.5.007
Abstract ( 1971 ) PDF (KB) ( 3 )

The optimum technological conditions to prepare CMC polymer were determined by orthogonal experiments, in which the weight ratio of AA to CMC was 10, while the amounts of initiator and the cross-linker were 0.0014 and 0.0015 times as much as that of the monomer, respectively. After imbibition balance, the CMC polymer was digested when it had been completely ashed for 16h at 400~450℃, and then the flame atomic adsorption spectroscopy method was used to determine the polymer's adsorbability of Zn2+, Cu2+, Pb2+, Cd2+, Cr2+, Ni2+, and Mn2+. The results showed that the CMC polymer could adsorb heavy metal ions, while the adsorption capacity increased with the increment of pH and concentration of heavy metal ions. It reached the maximum when the pH value was 9, and the adsorption quantities of Pb2+ and Cu2+ were higher than those of the other 5 mental ions.

Modified study of ecological footprint model ——A case of mining cities in central Liaoning
GU Kang-Kang, LIU Jing-Shuang, WANG Yang
2009, 26 (5): 633-639.  DOI: 10.7523/j.issn.2095-6134.2009.5.008
Abstract ( 1341 ) PDF (KB) ( 3 )

In order to improve the veracity of the ecological footprint model, the emergy analysis and social-economy system development index were introduced into the model, and the mining cities in central Liaoning were taken as cases. Results showed that, based on the modified model of ecological footprint, the EF was 6.95hm2, the EC was 1.72hm2, and the per capita ecological deficit was 5.23hm2 in 2005, so the overloading degree of EF of mining cities in central Liaoning was serious. The proportion of energy ecological footprint was the highest (55%). The test results indicated that, the analysis of the modified model could be more exact.

Optical properties of CDOM in Shitoukoumen Reservoir, Changchun
JIANG Guang-Jia, LIU Dian-Wei, SONG Kai-Shan, XU Jing-Ping, ZHANG Bai, WANG Zong-Ming
2009, 26 (5): 640-646.  DOI: 10.7523/j.issn.2095-6134.2009.5.009
Abstract ( 1560 ) PDF (KB) ( 4 )

Two experiments were carried out in Shitoukoumen Reservoir on June 13th, 2008 and September 23rd, 2008 separately and some important parameters of water were measured. CDOM mainly comes from the terrestrial source in June, while the degeneration of phytoplankton in September. There is a steady inverse relationship between S and absorption of CDOM at 355nm. The ratio of CDOM absorption varies with season.

Spatial agglomeration and its determinants in China's manufacturing industries
LI Na, SHI Min-Jun
2009, 26 (5): 647-656.  DOI: 10.7523/j.issn.2095-6134.2009.5.010
Abstract ( 1224 ) PDF (KB) ( 4 )

This paper focuses on spatial contiguity of numbers of enterprises in a region, measures spatial agglomeration degrees, and analyzes the determinants that influence the difference in spatial agglomeration degree among manufacturing sectors in China. Most of agglomerated manufacturing sectors are mainly textiles, seafood manufacturing, machinery and equipment manufacturing, and electrical machinery and equipment. Spatial heterogeneity, including technological differentiation, inhomogenous agricultural resources and demand distribution due to exportation, are primary determinants of spatial agglomeration in China's manufacturing industries. The external economy of scale, including forward-backward linkages and technological spillover, has no significant effect on spatial agglomeration in manufacturing industries.

Edge and local energy NSCT based remote sensing image fusion
WANG Jie-Xiong, QI Xiang-Yang, LI Xin-Wei
2009, 26 (5): 657-662.  DOI: 10.7523/j.issn.2095-6134.2009.5.011
Abstract ( 1168 ) PDF (KB) ( 4 )

Edge-based image fusion algorithm can not preserve energy structure which is important in indicating the reflection feature of the observed objects. This paper proposed an enhanced algorithm considering both edge and energy structures. Nonsubsampled contourlet transform is firstly deployed to analyze input image in both multi-scale and multi-direction sub-bands. Low frequency band is then divided into contour and smooth regions by edge energy. Edge energy is used as a fusion judgment for the contour region while local energy and correlation are selected as judgments for the smooth region. Local variance and correlation are chosen to merge the coefficients of high frequency sub-bands. Inverse NSCT transform is finally used to get the fused image. Experimental results show that the new algorithm is an effective method that introduces more detailed information while preserves power structure.

Joint source-channel coding/decoding based on unequal error protection in space communication
LIU Xiao-Min, TU Guo-Fang
2009, 26 (5): 663-669.  DOI: 10.7523/j.issn.2095-6134.2009.5.012
Abstract ( 1031 ) PDF (KB) ( 3 )

In this paper we proposed a joint source-channel coding/decoding approach based on unequal error protection in space communication since the DC coefficients are especially significant for image quality in CCSDS IDC. A reversible coding/decoding scheme was adopted for the DC coefficients for special protection, in which the output bit stream of the DC coefficients was encoded by using alternating run-length encoding and then the run-lengths were encoded by reversible variable length codes (RVLC). Meanwhile, variable length coding/decoding scheme was adopted for the AC coefficients. The experiment showed that this approach could greatly alleviate error propagation and improve the error-resilient performance of the DC coefficients,and the approach thereby could improve transmitted image quality.

Space network measurement and visualization technique of measurement results
LI Dong, CHEN De-Yuan, TU Guo-Fang
2009, 26 (5): 670-680.  DOI: 10.7523/j.issn.2095-6134.2009.5.013
Abstract ( 1962 ) PDF (KB) ( 5 )

The network measurement is of great importance to the QoS of space communication network. A new space path capacity measurement method and a novel visualization technique of measurement results called "dynamic radar graphic" are proposed in this paper. The accuracy and efficiency of the methods are proved in the simulated space network platform.

Virtual user identification based on cross-layer design in wireless Ad Hoc networks
TIAN Shanl, ZHANG Can
2009, 26 (5): 681-687.  DOI: 10.7523/j.issn.2095-6134.2009.5.014
Abstract ( 1745 ) PDF (KB) ( 3 )

A new virtual user identification method in synchronized DS-CDMA wireless Ad Hoc networks is proposed, which uses the schedule information in SEEDEX protocol in MAC layer according to cross-layer design. The receiver detects whether there are virtual users. The virtual users will be identified by the spreading code of all the nodes which are possibly transmitting packets at the time slot if there are virtual users. Otherwise the data frame will be dropped. By using this method the calculation amount is reduced, the energy of the receiver is saved, and the error rate of the receiver is reduced.

Software protection method based on self-modification mechanism
WANG Xiang-Gen, SI Duan-Feng, FENG Deng-Guo, SU Pu-Rui
2009, 26 (5): 688-694.  DOI: 10.7523/j.issn.2095-6134.2009.5.015
Abstract ( 1583 ) PDF (KB) ( 1 )

In this paper, we present a new method based on self-modification mechanism to protect softwares against illegal acts of hacking. The key idea is to converse key codes into data in the original program so as to make programs harder to analyze correctly. Then, we translate data to executable codes by enabling the virtual memory page which stores the hidden code to be executable at run-time. Our experiments demonstrate that the method is practical and efficient.

Cryptosystem based on elliptic curve over local ring Z/pZ
LI Ming, WANG Kun-Peng
2009, 26 (5): 695-702.  DOI: 10.7523/j.issn.2095-6134.2009.5.016
Abstract ( 1283 ) PDF (KB) ( 5 )

We introduce the addition formula on E(R) where R denotes a ring,complete the theory of elliptic curve cryptography over local ring Z/pnZ,and propose a role-based cryptosystem on E(Z/pnZ).We analyze the structure of ring Z/pnZ.On the basis of the relation between Z/pnZ and Fp,we simplify the complete system of addition laws on E(Z/pnZ),which makes addition much more efficient than before.We present a method to select generators of the cryptographic groups.We prove that the security level of the ECC over local ring Z/pnZ is equal to that over finite field Fp.A role-based cryptosystem is proposed.

Fast dictionary mechanism for Chinese word segmentation
WU Jing-Jing, JING Ji-Wu, NIE Xiao-Feng, Wang Ping-Jian
2009, 26 (5): 703-711.  DOI: 10.7523/j.issn.2095-6134.2009.5.017
Abstract ( 1120 ) PDF (KB) ( 8 )

With the development of global networking through Internet, the amount of articles in Chinese or other native languages is increasing rapidly. As the lack of explicit separator, word segmentation is a precondition for the processing of these character-based languages and thus it affects the whole system in performance. In this paper, we propose a new solution for Chinese word segmentation problem based on Lexicon named double-character-and-long-word-hash-indexing (DCLWHI).Compared with traditional lexicon mechanism, DCLWHI improves the speed and efficiency of word segmentation without extra memory spending and gains the same accuracy.

Electronic cash based on trusted computing platform
SHEN Li-Hong, XU Zhen
2009, 26 (5): 712-719.  DOI: 10.7523/j.issn.2095-6134.2009.5.018
Abstract ( 1445 ) PDF (KB) ( 20 )

In this paper, a new off-line electronic cash scheme based on trusted computing platform is proposed. In our scheme, electronic cash, user identity,and platform identity are efficiently bound together. With the attestation technology and storage protection on trusted computing platform, the security of electronic cash is enhanced significantly. In addition it also has properties such as payment source nonrepudiation, finite circulation period, etc. The backup of electronic cash, missing and stealing of electronic cash, those are all well protected in our scheme. The detailed security analysis is given in the final part of this paper.