Scientific Journals and Yearbooks Published at SAS

Article List

Computing and Informatics


Volume 24, 2005, No. 2

Content:


  Development of Threat Evaluation Tool for Distributed Network Environment
Keun- Hee HAN, Il- Gon KIM, Kang-Won LEE, Jin-Young CHOI, Sang-Hun JEON

ESM (Enterprise Security Management), SIM (Security Information Management), SIA (Security Information Alert), IDS (Intrusion Detection System)

Current information protection systems only detect and warn against individual intrusion, and are not able to provide a collective and synthesized alert message. In this paper, we propose a new Meta-IDS system which is called ``SIA System''. The SIA system can filter redundant alert messages, analyze mixed attacks using correlation alert messages from each sensor and respond to security threats quickly, after classifying them into one of four different statuses. Then we implement the SIA system and test the efficiency of it in the managed networks. Thus we confirm that the SIA system enables security managers to deal with security threats efficiently.

Computing and Informatics. Volume 24, 2005, No. 2: 109-121.

 
  Efficient Graph Coloring with Parallel Genetic Algorithms
Zbigniew KOKOSINSKI, Krysztof KWARCIANY, Marcin KOLODZIEJ

Graph coloring, parallel genetic algorithm, migration model, CEX crossover, SPPX crossover

In this paper a new parallel genetic algorithm for coloring graph vertices is presented. In the algorithm we apply a migration model of parallelism and define two new recombination operators SPPX and CEX. For comparison two problem-oriented crossover operators UISX and GPX are selected. The performance of the algorithm is verified by computer experiments on a set of standard graph coloring instances.

Computing and Informatics. Volume 24, 2005, No. 2: 123-147.

 
  Design Quality of Security Service Negotiation Protocol
ZhengYou XIA, Jian WANG, YiChuan JIANG

Quality of security service, SSRSVP, security service negotiation, negotiation style, multicast security

With future network equipment the security service becomes a critical and serious problem. Especially in the network, users do not want to expose their message to others or to be forged by others. They make extensive use of cryptography and integrity algorithms to achieve security. The sender can achieve the high quality of security service (high security level), only if the receivers and routers along path to receivers can support or satisfy the quality of security service requested by the sender. Therefore, this paper proposes a protocol to provide the needed mechanism for quality of security service, to dynamically negotiate the quality of security service among the senders and receivers of multicasts in the network. It provides different quality of security service resolutions to different receiver nodes with different security service needs and includes six different negotiation styles.

Computing and Informatics. Volume 24, 2005, No. 2: 149-165.

 
  MVNC: A Multiview Network Computer Architecture
Hongliang YU, Meiming SHEN, Weimin ZHENG

Network computer, thin client, server based computing

In this paper, MVNC, a multiview network computer system for a high usability thin-client computing environment, is introduced. MVNC uses a revised SBC model to offer a new framework for thin client computing. MVNC can be used as a full functional Windows machine, or used as a Linux workstation, or a~graphic terminal. Its multiview work style is achieved by the attempts on GUI seamless integration technology, device integration technology and local video playback support. MVNC is implemented in an embedded Linux environment using a MIPS-4KC microprocessor. Test results on video application show that MVNC system uses its client hardware more efficiently and the load of MVNC server is lightened.

Computing and Informatics. Volume 24, 2005, No. 2: 167-181.

 
  Invariant Object Recognition Using Radon-based Transform
Tomasz ARODZ

Invariant object recognition, Radon transform, face recognition, mammography

The properties of the Radon transform are used to derive the transformation invariant to translation, rotation and scaling. The invariant transformation involves translation compensation, angle representation and 1-D Fourier transform. The new object recognition method is studied experimentally in two domains, mammogram labels recognition and face recognition. For mammogram labels, the recognition accuracy is 97 %, while in case of faces it reaches 96 %.

Computing and Informatics. Volume 24, 2005, No. 2: 183-199.

 
  An Agent Approach to Spatial Information Grid Architecture Design
Yingwei LUO, Xiaolin WANG, Zhuoqun XU

Spatial information grid, geo-agents, framework, spatial metadata, collaboration, parallel, load

Spatial information grid (SIG) is a spatial information infrastructure that has the capability of providing services on-demand. SIG is a distributed network environment, which links spatial data resources, computing resources, storage resources, software, tools and users. SIG can integrate massive distributed heterogeneous spatial information resources, provides uniform management and process, and, furthermore, coordinate different resources to complete large-scale and complex spatial tasks and applications. In this paper, agent technology is adopted to construct a SIG framework, which contains three layers: users/applications layer, agent services layer and information layer. Different applications can get their spatial information via agent services, and agent services make the procedure of navigating and accessing spatial information transparent to users. Also, the implementation issues of the framework are discussed in detail, including Geo-Agents, an agent-based distributed GIS system, spatial information management, collaboration and parallel mechanism, load control strategy, and a sample.

Computing and Informatics. Volume 24, 2005, No. 2: 201-222.