Sie sind auf Seite 1von 5

Second International Workshop on Knowledge Discovery and Data Mining

A Practical VCR Technique of Preventing Computer Viruses’ Creeping in Networks

YE Qiu-Sun

Dept. of Computer Science & Engineering Wuyi University, 354300 Wuyishan, China

qsye2005@yahoo.com.cn

AbstractIn information system of Computer Networks, there are many computer viruses can do fatal damage to some individual computer systems; the ability to damage is basically decided by their mechanisms of regenerating, not decided by the longer computer viruses’ program or the shorter ones. Today, many of mechanisms and much of computer viruses’ ability to damage that, quite an initial knowledge of people’s for new computer viruses are still to take much time to research and solve. So all anti-viruses software already existed are too difficult to kill a variety of computer viruses. This paper will introduce a new practice technique of preventing a variety of computer viruses’ creeping in networks based on AI-Properties of VCR (Variable Carrying Rules). It is also called technique of that, while in Rome, do as the Romans do; or technique of interrogating & kidnapping.

KeywordsInformation System; Computer Viruses; AI- Properties of VCR; Cipher Book/Table.

. PREFACE

Recently, there are many computer information systems happened to be damaged from computer viruses constantly, especially, the problem of networks’ security. The computer viruses can do fatal damage to your information system. So the important problem of computer networks’ security is urgent need of dispelling computer viruses. We know Computer viruses are some hidden micro- programs of which are harmful to computer system security. They often hide in some program files or data files, usually; they own three very much important properties of that: Contagiousness/Infectiousness; Potentiality/Concealment; Excitability/Mutability. Computer viruses’ ability to damage is basically decided by their mechanisms of regenerating, not decided by the longer computer viruses’ program or the shorter ones. Today, many of mechanisms and much of computer viruses’ ability to damage that, quite an initial knowledge of people’s for new computer viruses’ are still to take much time to research and solve. Therefore, now it is not excessive that, someone regards computer viruses as the Cancer or Aids in computer systems. In living beings, there are many kinds of Cancer, Aids, etc., they are very difficult to be ascertained, so we cannot control them. All kinds of Cancer, Aids, etc., are some

viruses of which are harmful to health of living beings. Not sufficient development of Medicine, i.e. the mechanisms of these viruses’ reproducing & their creeping are still unknown, we cannot chose but make great efforts that: to find them as soon as possible, to excise them in time. To do surgical operations of Excising for living beings, it will do harm to health of living beings more or less. So the work to find viruses as soon as possible is very important. We cannot research all mechanisms of computer viruses’ program, and make out relevant anti-viruses’ program to keep our securities of computer systems or networks. Similarly, it is OK that, we can find the computer viruses as soon as possible, and excise them off our systems. Like that, how to finish the work to find computer viruses as soon as possible? Some computer anti-viruses’ soft wares of diagnoses have been published for many years. For example, the computer viruses’ Doctor Version 1.10 made by Shanghai Special-Shaped Steel Factory, it can diagnoses and kill the BALL virus and STONE virus of which were the most prevalent in the nineties of the 20 th century, in China. Besides, it can also deal with the BRAIN virus from Pakistan. The computer viruses’ Doctor V1.10 can diagnose viruses quickly, when the BRAIN virus, the STONE virus or the BALL virus are diagnosed in your disk, Doctor V1.10 will ask a question whether you want to detoxify your disk or not. If you want to detoxify your viruses’ disk, the relevant detoxifying program will be in motion, in the meantime, vaccine of the BALL virus will be poured into your disk. Henceforth, your disk will never happen to be damaged by the BALL virus again. Peking University Press of China has published another example, the software tools for computer viruses’ checking, dispelling and immunity for many years. It can check, dispel and be immune from 5 kinds of computer viruses as follows BALL virus(A Type) 684 virus(B Type) Marijinuna virus(C Type) Boot virus(D Type) dBase virus(E Type). Besides, there are many computer viruses reports about their methods of kill computer viruses, they are too numerous to mention individually. Obviously, we know, there are still many kinds of computer viruses in the world; even the new viruses we don’t find will make vast computer users be impossible to defend effectively. An outstanding expert who has rich experiences in computer viruses, it is not so easy for him to

978-0-7695-3543-2/09 $25.00 © 2009 IEEE DOI 10.1109/WKDD.2009.173

676

in computer viruses, it is not so easy for him to 978-0-7695-3543-2/09 $25.00 © 2009 IEEE
in computer viruses, it is not so easy for him to 978-0-7695-3543-2/09 $25.00 © 2009 IEEE
in computer viruses, it is not so easy for him to 978-0-7695-3543-2/09 $25.00 © 2009 IEEE

master each working mechanism of the viruses suddenly appearing. Therefore, to find computer viruses as soon as possible, we had better find another way of diagnosing viruses. In 1995, a novel VCR theory & technology was firstly created by YE Qiu-Sun in the 3 rd Conference on Fuzzy Mathematics & System Science in middle-south area of China, and the IEEE International Conference On Neural Networks & Signal Processing[1]. In everyday life, the Fixed Carrying Numbers(FCN) of which we encounter are all varying according to a SAME rule we call it FCR(Fixed Carrying Rules). For example, Decimal numbers, Binary numbers, Octonal numbers, Hexadecimal numbers, etc. But sometimes, the CN of which we encounter is not all is varying according to a SAME rule. For example, in variations of years, there are 12 months in a year, sometimes, there are 13 months in a year, an appending month we call it leap month (in the lunar calendar of China); in variations of months, there are 30 days in a month; but sometimes, there are 31days, 29days or 28days (such as February of the none leap year in China) in a month; time of seconds, minutes, hours and days, variations from seconds to minutes and to hours, are all varying according to a SAME rule of 60- carrying numbers. Hence the numbers of which express how long the time such as days, months and years are, essentially, a kind of VCN (Variable Carrying Numbers) its rule of variation we call it VCR(Variable Carrying Rules). The VCN was a novel broad concept of numbers, there would be indeed too much potential science value of researches & applications on VCN. The world famous Mathematician, Mr. Went-Sun Wu and Professor Xu-Yan TU (AI Expert, the Advisory Committee Chairman of CAAI, the Pre-President of CAAI, the Honor President of CAAI) thought that, to research the VCN & its applications, and create Mathematics Theory & Methods of the VCN, it owns very important meanings of academy and very wide value of applications, it may be used not only in Cyphering Science, Communication and Safety of Information, but also in all kinds of variable constructions, variable parameters, constructing models of complex systems and analysis & synthesis, researching & development of new theory or methods & new technology in AI. This paper will introduce a new practical technique of preventing computer viruses’ creeping in networks based on AI-Properties of VCR, it is also called technique of that:

While in Rome, Do as the Romans do; or technique of interrogating and kidnapping.

. THE CORE FRAILTIES OF COMPUTER SYSTEM We can describe the core frailties of computer system in nature as follows Computer is a very well behaved child, he is the suffer injured of a computer virus as well as accomplices of the computer virus, in other words, he is a piece of lamb in a wolf mouth as well as the wolf teeth of biting off the piece of lamb. Because of it, in the final

analysis, computer viruses are a series of micro-programs owning many commands to be able to execute, it is also called soft ware, its damage must depend on that, computer can execute command. If computer is not so obedient to words of all commands of computer viruses micro-programs, then, even viruses’ micro-programs enter your computer system, at most, some RAM will be occupied, but it is too difficult to damage your system. The core frailties’ origin of computer system is heart of computer, we call it CPU(Central Processing Unit). Different computers with different CPU and different system of instructions, and the core frailties of whole computer system are decided by the relevant instructions’ frailty of CPU. Now, we can make an analysis of frailty on Z80cpu system(word size is only equal to 8Bits) of instructions as follows: we know that, there is a common arithmetic instruction of DAA in Z80cpu system. The DAA can finish a work of adjusting data into Decimal numbers in Accumulator, but DAA must be only used in case as follows:

1)An outcome of operating data must be in Accumulator; 2)After instructions of affecting the carrying bit CY, half carrying bit H and plus/minus Flag bit N in Flag Register F, such as the ADD, ADC, SUB, SUBC, etc

1 E (H)

1 F (H)

+ 0 6 (H)

+ 0 6 (H)

affect CY(once)

2

4 (H)

2 5 (H)

+ 0 6 (H)

 

+0 6 (H)

affect H (once)

2

A(H)

2 B (H)

Fig.2 DAA’s Adjusting Data in Accumlator

DAA adjusting program may be compiled as follows:

ORG 2000H Start:LD HL, 2040H LD A, (HL) D3: SRL A SRL A SRL A SRL A JR Z, D0 LD B, A LD A, (HL) D1: ADD 06H DAA

DJNZ D1 LD (HL), A HALT D0: LD A, (HL) SUB 0AH JP P, D2 HALT D2: LD A, (HL) ADD 06H DAA LD (HL), A HALT

The functions of DAA ought to be very powerful, the great majority of programs used to use it. Because it only occupies one Byte of RAM, one Machine time of fetching instruction, four periods time of clock(namely, t=4T, T is time of computer system clock, T=0.5ns). In the whole Z80cpu system of instructions, merits of DAA are very obvious, but seldom or never find its demerits that:

adjusting data into Decimal number is only once, as of this adjusting data, perhaps the carrying bit CY or the hail carrying bit H will be affected again, but DAA won’t adjusting the data again. For example, the following

677

program(Org2000H) will change the hexadecimals(0~63H)

in address RAM of 2040H into the relevant Decimal numbers(0~99H). The change of adjusting data is as Fig.2.

In the above-mentioned program, the changing of the data

1E(H) and 1F(H) are not success for the demerits of DAA as Fig.2. To solve this problem, the two special data of 1E(H)

and 1F(H) must be dealt with adding a few instructions. If you don’t modify the above- mentioned program, the program has not much influence upon itself, but it may be big snake in the grass!

We know, in the whole Z80cpu system of instructions, there are 8 instructions containing directly commands’ Byte code of 2A or 2B There are 35 instructions containing the later half of Byte code in shape of “*A” There are 322 instructions containing the later half of Byte code in shape of “*B”. A brilliant master of computer viruses micro-programs’ making, if he can make a virus’ micro-program requiring a condition that, 3 instructions to be selected separately from one of above-mentioned 8 instructions, 35 instructions and 322 instructions. In that way, he will get 90160 techniques of activating his computer viruses’ micro-programs. Namely, the activation techniques M may be calculated as follows

M

C

1

8

C

1

35

C

1

322

90160(

kinds

)

In the above-mentioned program, there is a little demerit

of existing through “JP P, D2” instruction, i.e., when the data in Register is equal to zero, this program will also jump to address D2. So the original instruction “SUB 09H” before instruction “JP P, D2” cannot chose but be modified into

“SUB 0AH”. To sum up the core frailties of computer system are a set assembly of instructions from the heart of computer, we often call it CPU.

. A PRACTICAL VCR TECHNIQUE OF PREVENTING COMPUTER VIRUSES’ CREEPING IN NETWORKS

A. VCN & its properties

The VCN are some CN where all variation of numerical value between their neighbor figures won’t be eternal according to a SAME rule in same CN. For example, 1hour 35 minutes 40 seconds, 1994 years 2 months 31 days, 1995 years 3 months 28 days, 16 Jins 15 Liangs(a Chinese weight of an old steelyard), etc., all of these are typical

examples of VCN.

1) Properties of an optional n-figures integer numbers in VCN a. Extensibility/Compressibility

A certain number of being varied from lower carrying

number to higher carrying number, the expression of the number will be compressed very much, so that a lots of RAM which of storing data in computer will be saved. So an expression data of VCN are both extensive [2] and

compressible, and its overflowing property of numbers is variable, it is called VCO (Variable Capacities of Overflowing). When the characters of that A,B,C, ,X, Y, Z, etc. are in orderly used extensively as the numbers of that 10,11,12, ,33,34,35,etc., it can get an optional integer number of VCN/FCN selecting Figures’ Modules from 2 to 36. For example, the decimal 255 can be varied as follows:

11111111B 377Q 255D FFH (17F) 10,8,16

(1771) 2,8,8,2 (73) 36

(43) 63 (30) 85 (10) 255

b. Fuzziness/Properties of keeping a secret

In an optional integer carrying numbers, an optional figure’s power value is equal to the multiage of rolling all its lower neighbor Figures’ Modules. For the all neighbor Figures’ Modules are different, or not completely same. The

value of integer carrying numbers are both fuzzy [1] very much and unknown clearly. Because of the fuzziness in data of VCN, it can be used in ciphering technology.

c. Intellectuality/Properties of making a secret

In an optional n-figures integer carrying numbers, the all neighbor Figures’ Modules may be designed by artificial intelligence [3~8], so both the data of VCN are intelligent and their value are known clearly.

of an optional n-figures integer

numbers in VCN

2)

Computing

a. Computing of an optional n-figures integer VCN

According to the concept and definition of VCN, suppose that: the F n F n-1 F 1 is an optional integer numbers of VCN for n-Figures, F n R n ,F n-1 R n-1 , F 1 R 1 r n N,r n-1

N, r 1 N N={1,2,3,4,5, } R n ={0,1,2,3,

r n },R n-1 ={0,1,2,3, r n-1 }, ,R 1 ={0,1,2,3, r 1 }; r n =Max(F n ), r n-1 =Max(F n-1 ), r 1 =Max(F 1 ). Then, an optional integer numbers of VCN for n-Figures may be computed as the following formula [10 ]:

F n F n-1 F 1 F n (r n-1 +1)(r n-2 +1) (r 1 +1) (n-Figures) +F n-1 (r n-2 +1)(r n-3 +1) (r 1 +1)

F

n

n

1

i

1

(

r

i

1)

n

k

1

K

Fr

i

(

k

2

i

1

+F

n

1)

1

+ +F 1 (r 1 +1) 0

n

2

i

1

(

r

i

1)

+ +F 1 (r 1 +1)

0

F

1

(3.2a)

b. Computing of the biggest n-figures integer VCN

Obviously, the biggest integer number of VCN for n- Figures in (r+1)-carrying numbers may be computed as the

following formula:

r n r n-1 r 1 1000000 0 1

(n-Figures)

(n-Zeros) r n (r n-1 +1)(r n-2 +1) (r 1 +1)

+r n-1 (r n-2 +1)(r n-3 +1) (r 1 +1)

+ +r 1 (r 1 +1) 0

678

n

1

n

2

Expressions of the BASIC program file in 2-Figures
0

VCN

H2A2O1Q0Q2S1S0A2B1N0a2c2X2c0A2e1b0d0c0A2b1

W1c1c1d2b0c0X1D1G1F0I0X0Y2W1c0W1X0c2X2c0c1D

2J1B1J2Q2T0

G1G0A2S0R1T2K1G1

G1H2A2O1N1A2M1O1Q2O0N0R1K1Q2T0A2S0O0N0

Q0A2N2Q1R2S1M0A2P2L2O1Q0F1M0L2R2

G2G0A2

O1Q0Q2S1S0A2B1T0c0b0a2Y1A2

b1W1c1c1d2b0c0X1E2A2N0a2c2X2c0A2Z0c2A2W1Y1

W1Z0a2J1B1J2Q2T0

G2H2A2 S0R1T2K1 S0R1T2E1G1 H0G0A2O1N1A2 S0R1T2K1H0A2S0O0N0Q0A2H1G0

H0H2A2N2Q1S0Q1A2G2G0

H1G0A2Q2R1O1Q0S0A2B1T2b0d0A2X0W1a2W0c2A

2d0c1X2A2c2Y2X2A2c1e1c1c2X2a1B0A2N2b0b0X1W2

e1X2B0B1

H1H2A2N0Q0M2

Example ASCII data file as follows[9] A great deal of researches on numbers has been shown recently in International Mathematics & Computer Science, much of the attraction of such a FCN (Fixed Carrying Numbers) of n-figures is that it offers an alternative to the growing problems of regularity & movement in calculating for the more. Expressions of the ASCII data file in 2-Figures VCN

L2A2W1a0V2U1a2A2V1V2U1Y0A2Z0W0A2a0V2a1V2

U1a0V0W2V2a1A2Z0Y2A2Y2b0Y1U2V2a0a1A2W2U1a1

A2U2V2V2Y2A2a1W2Z0b2Y2A2a0V2V0V2Y2a2Y0c1A2

X0Y2A2O1Y2a2V2a0Y2U1a2X0Z0Y2U1Y0P2U1a2W2V2

Y1U1a2X0V0a1A2C2A2M1Z0Y1Z1b0a2V2a0A2R2V0X0

V2Y2V0V2E2A2Y1b0V0W2A2Z0W0A2a2W2V2A2U1a2

a2a0U1V0a2X0Z0Y2A2Z0W0A2a1b0V0W2A2U1A2N1M

1Q0A2D1N1X0c0V2V1A2M1U1a0a0c1X0Y2W1Q0b0Y1

U2V2a0a1D2A2Z0W0A2Y2E2W0X0W1b0a0V2a1A2X0a1

A2a2W2U1a2A2X0a2A2Z0W0W0V2a0a1A2U1Y2A2U1Y

0a2V2a0Y2U1a2X0b1V2A2a2Z0A2a2W2V2A2W1a0Z0b2

X0Y2W1A2Z1a0Z0U2Y0V2Y1a1A2Z0W0a0V2W1b0Y0U

1a0X0a2c1A2C2A2Y1Z0b1V2Y1V2Y2a2A2X0Y2A2V0U

1Y0V0b0Y0U1a2X0Y2W1A2W0Z0a0A2a2W2V2A2Y1Z0

a0V2F1

. CHANGING EXPRESSIONS FOR INFORMATION IN THE COMPUTER SYSTEM

Nowadays, to avoid computer viruses’ existing completely, functional demerits of CPU must be rooted out, but it is impossible. The best method is to let computer system accept nothing from the computer viruses micro- programs, so the CPU of computer system will do nothing for the computer viruses programs. Because computer viruses’ damage is in nature that, a well-behaved child believes some words of a computer virus’ micro-program, and acts as an accomplice of virus’ program, the well- behaved child is the CPU of computer itself, an instigator to say the words is the computer virus’ program. So long as the CPU of computer turns a deaf ear to the instigator’s words, damage incident isn’t occurred in your computer system.

n

n 1

(

r

i

1 )

+

i

1

n

2

k

r

k

k

1

i

1

(

r

i

1)

r

1

i

1

(

n

r

i

(

1

)

r

i

i

1

1)

1

+ + 1 (r 1 +1)

(3.2b)

B. FCN & Its Expressions of Information in Computer

System Now all computers system in the world, all information data in them would be in an expression of FCN. For example, they may be 2-carrying numbers(Binary numbers), 8-carrying numbers(Octonal numbers), 10-carrying numbers(Decimal numbers), 16-carrying numbers(Hexadecimal numbers), etc. But binary numbers are mainly expression in all of corners in computers, including all program files and document files.

C. Mathematics Variations of FCN & VCN When we make number value of a FCN be equal to that of

a VCN, the VCN is the FCN, it is called Mathematics

Variation of FCN & VCN. Mathematician is sure that, a FCN may be optional expressions of VCN, a VCN may be optional expressions of FCN. For example, 11111111B=377Q=255D=FFH=(17F) 10,8,16 =(1771) 2,8,8,2 =

(73) 36 =(43) 63 =(30) 85 =(10) 255 =

D. VCN & Its Expressions of Information in Computer

System Now all computers system in the world, all information data in them would be in an expression of VCN. For example, if they may be 4-Figures VCN(its FM 1 =2, FM 2 =FM 3 =8, FM 4 =2), and makes it be all expression in all of corners in computers, including all program files and

document files, then, it is impossible to run all program files

in your computers! Of course, it is impossible for sharing all

document files in your computers! Before you want to run the program files, and share the document files, you must make a Mathematics Variation of which from 4-Figures VCN to 8-Figures FCN(its FM 1 =FM 2 = =FM 8 =2). We supposed that A=10 B=11 C=12 Y=34 Z=35 a=36 b=37 c=38 y=60 z=61 =62 =63 When each character of information data file to be a substitution of 2-Figures VCN(FM 1 =3,FM 2 =64) which is equal to their value of ASCII. Then, the BASIC program file and the data file of ASCII will be changed separately as follows.

Example BASIC program file as follows

5 INPUT “Enter your password(1-6characters) PW

10

TRY=1

15

IF CIPHER=PW THEN GOSUB MAIN.BAS

20

INPUT “Wrong password Enter it again PW

25

TRY=TRY+1

30

IF TRY=3 THEN 40

35

GOTO 20

40

PRINT “You can’t use the system! Goodbye!”

45

END

679

In the light of this thinking, so long as the main monitor program of local computer is inserted some instructions to treat with that: as soon as some information files enter local computer system, the main monitor program jumps to an interrupting service program of ZDF. Here, ZDF program must be used with an Artificial Intelligence problem-solving method of pure breadth-first search. The method in details, please refer to another paper [7] of this paper’s author. The ZDF programs’ function is as follows: let all information files, no matter program files or data files, so long as they are from networks or disks, and there are some instructions(even if there is only one command!) can be executed in files, all of them will be replaced with relevant instructions ciphers, all of ciphers will be a fixed length of VCN, and VCR in the VCN will be artificial intelligent selection as you like, finally, return to the monitor program. Of course, we cannot refuse all files of which are from networks or disks, otherwise, we shall miss very important aims and significances which of linking local computer system to networks. To get information files in security, we can copy the files having been out of shapes to another(or other compatible computer with the same CPU) computer without linking to networks, and then we can have a check up the files. Before checking up the files, data codes of the files must return to the past, namely, the relevant instruction codes must be replaced with the before ones. There is something of the taste like that: while in Rome, do as the Romans do. If the invaders (computer viruses’ programs) don’t know some customs (getting the instructions’ cipher book/table), they cannot be alive in the locality. There is another point of view that, the information files from networks or disks are out of original shapes, and are planted into anther relatively independent computer for checking up, the tastes of kidnapping and interrogating stronger, so sometimes we may call it the method of kidnapping and interrogating, too. Are there any information files from networks or disks to be kidnapped and interrogated? There is a Chinese common sayings that:

No doing harm to the others, No being harmed by the others! If this method is handled very skillfully, we can avoid a variety of computer viruses’ creeping and damage in networks once for all. Those brilliant master of computer viruses’ making will be certain to cease to make any troubles again, but the technical personnel level of competences must be very high: namely, they must be masters of CPU instructions’ codes in the local computer system. Otherwise, while making a replacement instructions cipher book/table, some new factors of computer viruses’ mechanism may be hidden in it.

. CONCLUSIONS

This method of that, while in Romans, do as the Romans do; or kidnapping and interrogating, its application & popularization will bring the development of computer networks’ technique of securities to a bright future. Large quantities of computer users, specially, the users of that,

techniques of securities are very weak on preventing computer viruses micro-programs’ invading, they will be bound to join the networks bravely one after another. The demerits of this method are that: 1)It is necessary that you must gain another same computer(or the compatible computers with a same CPU) to be taken as interrogating Room in secret; 2)The interrogating Room of secret is always working off networks; 3)The replacement instructions cipher Book/Table in a ROM must be replaced at regular intervals. Otherwise, as soon as the cipher Book/Table has been stolen by a brilliant master of computer viruses’ making, the new demerits hidden in the cipher Book/Table will be used again, so the cipher Book/Table must be keep in secret; 4)The technical personnel of making the cipher Book/Table must know of the local computer CPU instructions’ codes very well. However, we cannot chose but say that, increasing some expenses for gaining another same computer is very economic and worthwhile, because it can bring a security of your computer system.

ACKNOWLEDGMENT

This work is supported by the Natural Science Foundation of Fujian Province of China (No. A0640015) and University Natural Science Foundation for Education Dept. of Fujian Province of China (No. JA08246)

REFERENCES

YE Qiu-Sun, VCN & Its Role of Engineering in Human Society[J], Engineering Sciences(Chinese Academy of Engineering/English Edition/Quarterly), Vol.6 No.1, Mar. 2008: pp.23-31. CAI Wen, Yang Chun-Yan, LIN Wei-Chu: Extension Method of Engineering[M],Science Press of China,1997(10). Kingsun Fu,Zhi-xing Cai,Guang-you Xu: Artificial Intelligence & Its Applications[M], YE Qiu-Sun Research & Application of Breadth-first Search and Depth-first Search[A], Proc. of the 3rd Pacific Rim International (IFIP TC12/IEEE CS/CCF) Conference On Artificial Intelligence, International Academic Publishers (IAP) [C], SHI Zhong-Zhi Editor-in- Chief of PRICAI’94, Vol.1, pp.142-147, Aug.15-18, 1994, Beijing, China. WU Went-Sun Mechanization of Mental Work & Modernization of Science and Technology in Times of Computer[R], the special invited paper in Proceedings of CAAI-10, Nov.18-23, 2003,Guangzhou, China. TU Xu-Yan Artificial Emotion[R], the special invited paper in Proceedings of CAAI-10, pp.27-32, Nov.18-23, 2003,Guangzhou,China. YE Qiu-Sun Z80 Single Chip Microcomputer’s Application In The Dynamic Measuring of Industry[A], The Fourth IFIP Conference On Computer Applications In Production And Engineering[C] CAPE’91 Aug., 1991, Bordeaux, France; New Process & New Technology [J], No.4, 1992, pp.24-26, Beijing, China. Zhong Yi-Xin, Intelligence Science A Unified Theory of Information, Knowledge, Strategy and Its Execution[R], the special invited paper in Proceedings of CAAI-10, pp.64-71, Nov.18-23, 2003, Guangzhou, China. [9] YE Qiu-Sun, Research & Application of IFN in Cypher Science[J], Engineering Sciences(Chinese Academy of Engineering/Chinese Edition/Monthly), Vol.10 No.5, May. 2008: pp51-58

680