Please wait a minute...

Current Issue

    25 November 2008, Volume 29 Issue 11A
    Papers
    Time-bound dynamic secret sharing scheme
    Jia ZHAO,Ji-qiang LIU,Zhen HAN,Chang-xiang SHEN
    2008, 29(11A):  1-6.  doi:1000-436X(2008)11A-0001-06
    Asbtract ( 1 )   HTML ( 1)   PDF (1132KB) ( 6 )   Knowledge map   
    References | Related Articles | Metrics

    A time-bound dynamic secret sharing scheme based on the XTR public key system was proposed which can reduce three times on exponential operations at the same security.In the scheme,every participant can not share the secret out of the period of validity;the dealer delivers nothing when participants update the shadows;the process of updating shadow is forward secure and each participants share many secrets with other participants by holding only one shadow.The security of the scheme is based on the security of Shamir’s threshold scheme,the XTR discrete logarithm problem and the security of one-way hash function.

    Spam filtering based on classifiers ensemble
    Zhen YANG,Ke-feng FAN,Jian-jun LEI,Ying-xu LAI
    2008, 29(11A):  7-11.  doi:1000-436X(2008)11A-0007-05
    Asbtract ( 0 )   HTML ( 2)   PDF (774KB) ( 8 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Because the technology of classifiers ensemble can not only improve the performance of weak classifiers effectively but also can be added conveniently into existing text classification framework,it has been widely used in text classification and filtering field.After analysis of current technologies,the general framework of spam filtering was given.In addition,the technologies of spam filtering based on classifiers ensemble.Then an approach of classifiers ensemble based on corpus partition was proposed.Experimental results show that the approach can improve the accuracy of text classification.Besides,the resulting technology has been successfully implemented in the spam filtering system.

    Study on trust based P2P network security management
    Wu LIU,Hai-xin DUAN,Hong ZHANG,Jian-ping WU
    2008, 29(11A):  12-16.  doi:1000-436X(2008)11A-0012-05
    Asbtract ( 0 )   HTML ( 1)   PDF (972KB) ( 19 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The trust mechanism was introduced to dynamically evaluate user's behavior in P2P network,and bind user’s reputation with its access control privilege in the network.In addition,the trust based dynamic access control mechanism and key algorithm was proposed and implemented.With the trust based network security management system implemented based on the trust mechanism,a malicious user will be kicked out from the network system and refused from accessing resources of the network automatically when the user's reputation is lower than some threshold.

    Research on secure enhancement frame of general personal computer
    Wei-min TANG,Shuang-he PENG,Zhen HAN,Chang-xiang SHEN
    2008, 29(11A):  17-22.  doi:1000-436X(2008)11A-0017-06
    Asbtract ( 0 )   HTML ( 1)   PDF (1013KB) ( 120 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to enhance the security of computer terminal,a design of the removable trusted platform model (TPM) was presented which can achieve most of function designed in TCG standard apart form connected with computer by USB.A new architecture of trusted enhancement on general personal computer based on removable TPM and the design of its prototype was proposed.The architecture can accomplish trusted boot of computer system completely supported by removable TPM and broad the trusted mechanism to operating system and application.The architecture builds the trusted computing environment on general personal computer without modify hardware platform which has almost the same degree of security performance.It is an attempt to establish the new architecture for trusted computing which has more practicability compare to TPM.

    Digital watermarking scheme based on CAVLC for H.264/AVC video
    Li-hua TIAN,Ji-zhong ZHAO,Tao XU
    2008, 29(11A):  23-28.  doi:1000-436X(2008)11A-0023-06
    Asbtract ( 0 )   HTML ( 1)   PDF (531KB) ( 6 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the video coding capacities,a digital watermarking scheme based on CAVLC for H.264/AVC was proposed.Embed the robust watermark to H.264 in order to protect the video content.The watermark data were preprocessed before embedding to improve the security and anti-attack capability of the scheme.Experimental results showed that the proposed solution can embed the watermark fast and extracted it quickly,and the video distortion and rate change was very small.Additionally,it was robust against re-quantization attack.

    Authentication protocol of content protection for digital interface
    Ke-feng FAN,Zhao-feng MA,Yi-xian YANG,Xin-xin NIU
    2008, 29(11A):  29-33.  doi:1000-436X(2008)11A-0029-05
    Asbtract ( 70 )   HTML ( 1)   PDF (814KB) ( 133 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An authentication protocol of content protection for digital interface was proposed.Firstly,the framework of content protection was analyzed.The credibility model of digital certificate was secondly given.Finally,the authentication protocol for digital interface content was proposed,as well as the test method for digital certificate.The protocol was based on the management recognition unit.The transferred content has the characteristics of encryption and authentication,which can prevent the content leak.The digital certificate was used to ensure the security of the authentication process.Analysis and experiments show the proposed protocol is secure and practical.

    Random incremental ISN algorithm of protocol steganography against statistical steganalysis
    Zhi-dan YANG,Ke-sheng LIU,Yu CHEN,Jian-xiong CHEN
    2008, 29(11A):  34-40.  doi:1000-436X(2008)11A-0034-07
    Asbtract ( 81 )   HTML ( 1)   PDF (1505KB) ( 68 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to enhance the network covert channel’s ability of detection-resistant,the invisibility for protocol steganography was studied.The ISN generation model of Windows 2000 was established through initial sequence number (ISN) sampling experiments of the operation system.With the basis of this model,a steganography named random incremental ISN algorithm was proposed.It could simulate ISN generation algorithm of the platform realistically,and its distribution of ISN was very close to the normal system’s distribution in visual and statistical features.The results of experimental were evaluated objectively with similarity index.And the evaluation results show that the steganography sequences are similar to the sequences which come from least squares fitting method in approximation.So the algorithm is transparent to the existing statistics steganalysis.

    ID-based designated multi verifier proxy signature scheme
    Zhao-xia TANG,Qiu-liang XU,Jian-dong ZHU
    2008, 29(11A):  41-45.  doi:1000-436X(2008)11A-0041-05
    Asbtract ( 70 )   HTML ( 1)   PDF (813KB) ( 108 )   Knowledge map   
    References | Related Articles | Metrics

    Introduced the concept of ID-based signature,extended the designated verifier proxy signature,a ID-based designated multi verifier proxy signature scheme was proposed.In the proposed scheme,the proxy signer designate several verifiers,and only when the designated verifiers coorperate,they can check the validity of the proxy signatures.By analyzing the proposed scheme.It proved that the scheme is a strong designated verifier proxy signature scheme,and has many properties i.e.unforeability.

    Research in dynamic source routing protocol based on link stability arithmetic
    Li-min MENG,Wan-xia WU
    2008, 29(11A):  46-50.  doi:1000-436X(2008)11A-0046-05
    Asbtract ( 58 )   HTML ( 1)   PDF (511KB) ( 71 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By integrating the principle of the least hop number and the link stability arithmetic in route discovery,it proposed an improved routing protocol called link stability dynamic source routing protocol (simply called LS-DSR).This protocol chooses route with high link stability,and decreases the number of route interrupted,which results in lower packet loss rate and improves the whole performance of the network.All messages needed to control this arithmetic can be obtained from packets transmitted between nodes.From the simulation,LS-DSR is a simple and high efficient routing protocol.

    Generating attack pattern automatically based on decision classification tree in storage-based IDS
    Jing-feng XUE,Jian LI,Yuan-da CAO,Gang SHU
    2008, 29(11A):  51-55.  doi:1000-436X(2008)11A-0051-05
    Asbtract ( 61 )   HTML ( 1)   PDF (626KB) ( 143 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To obtain reusable attack pattern for storage-based intrusion detection system,the theory of attack model was applied to build attack model,the attack tree model was extended and the algorithm of decision classification tree was proposed.The algorithm was applied in storage-based intrusion detection system to describe attack efficiency and attack pattern could be generated automatically.In the experiment,four kinds of type attack data and normal data in storage operation flow were collected and corresponding attack pattern were generated.In the training dataset,The detection rate can reach 95.72% and the false alarm rate is only 24.25%.The experimental results show that efficient attack pattern for storage-based intrusion detection can be generated automatically by the algorithm.

    Research on energy efficient scheduling strategy in wireless sensor networks
    Xiao-mao MAO,Pei-liang QIU
    2008, 29(11A):  56-61.  doi:1000-436X(2008)11A-0056-06
    Asbtract ( 81 )   HTML ( 1)   PDF (1300KB) ( 69 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    System model of energy efficient transmission problem in periodically collecting wireless sensor network was established.Through the analysis of the structure similarity between the polymatroid of multiple access channel capacity region and multiprocessor scheduling service region,the celebrated shorter task faster in multiprocessor scheduling was applied to transmission scheduling in multiple access channel.Simulation results show that,compared with the fixed rate allocation and the random rate allocation,the shorter task faster based scheduling enhances the system robustness and promotes the system performance substantially.It decreases the average packet completion time,thus saves the energy of sensor nodes and prolongs the network lifetime.

    Adaptive coded cooperative communication based on superposition modulation
    Yue SUN,Ying LI,Xin-mei WANG
    2008, 29(11A):  62-65.  doi:1000-436X(2008)11A-0062-04
    Asbtract ( 50 )   HTML ( 1)   PDF (929KB) ( 91 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new coded cooperative diversity scheme based on adaptive superposition modulation was presented.Each user superposed the relay and the local signals adaptively on the basis of the limited feedback of the destination.Multiuser detection was adopted at the destination before decoding.Compared with traditional cooperative scheme,the power could be allocated between the relay and local signals effectively.Simulation results show that the performance can be improved high on the block Rayleigh fading channel in the same system bandwidth and transmitting power.Furthermore,the effect of superposition coefficient on the system performance was analyzed.

    Technical Reports
    Research on DRM system design and real-time content protection in IPTV
    Jian-jun GUO,Ming CHEN,Jian-yin ZHANG,Zhi-chao ZHAO
    2008, 29(11A):  66-71.  doi:1000-436X(2008)11A-0066-06
    Asbtract ( 50 )   HTML ( 1)   PDF (465KB) ( 117 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A framework of IPTV DRM (digital right management) system was proposed which aims at the copyright protection of the multimedia in IPTV system.The framework consisted of the DRMSS (digital right management service system) and the DRMC (digital right management client) .Based on the characteristic of the multimedia stream transmission in IPTV,the encryption was completed by encrypting every TS/RTP (transport stream/real-time transport protocol) data packet and employ the efficient AES algorithm.Experimental results show that the framework meets the requirement of real-time stream transmission,and takes charge of user authorization,user identity authentication,user information management,media encryption and key management.The proposed framework is in accord with the development trend of the content protection in IPTV and has theoretical and guiding significance for the development of IPTV DRM techniques.

    MLE-based accurate positioning determination of OFDM signals
    Ye-jun HE,Mu HE,Guang-xi ZHU,De-ming LIU
    2008, 29(11A):  72-76.  doi:1000-436X(2008)11A-0072-05
    Asbtract ( 63 )   HTML ( 1)   PDF (696KB) ( 185 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the maximum likelihood estimation(MLE),an accurate position determination (APD) MLE algorithm to determinate the positioning of OFDM signals was presenred.It solves the localization problem using the data collected at all sensors at all base stations together.APD MLE algorithm with conventional AOA algorithm and APD-Giunta algorithm by means of simulation were compared.The simulation results show that APD-MLE algorithm outperforms conventional AOA algorithm,APD-Giunta algorithm in terms of accuracy.It is also shown that APD-MLE algorithm lowers SNR threshold.

    2D analytical model of surface electric field distributions of SOI LDMOS with arbitrary lateral doping profiles
    Yu-feng GUO,Zhi-gong WANG
    2008, 29(11A):  77-81.  doi:1000-436X(2008)11A-0077-05
    Asbtract ( 56 )   HTML ( 1)   PDF (1051KB) ( 122 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on solving two dimensional Poisson equations,an analytical model was proposed to calculate the surface electrostatic potentials and electric fields of SOI LDMOS with arbitrary lateral doping profiles in drift regions.The model was employed to investigate the surface potentials and electric fields distributions of the drift region with uniform,step,square root,and linear drift doping profiles.The availability of the model was verified by the good agreements between the analytical and numerical results.A general RESURF criterion was derived for optimizing the arbitrary drift doping profiles.The optimal analytical expressions of the mentioned doping profiles were also carried out to maximize the breakdown voltage.Finally,it was proved theoretically that the linear doping profile leads to an ideal electric field and a maximal breakdown voltage by comparison of the breakdown limitations of the device with various drift doping profiles.

    Adaptive coded-modulation schemes based on CT-TCM
    Lin ZHOU,Bao-ming BAI,Jing WANG
    2008, 29(11A):  82-86.  doi:1000-436X(2008)11A-0082-05
    Asbtract ( 55 )   HTML ( 1)   PDF (1274KB) ( 369 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An ACM system based on concatenated two-state trellis-coded modulation (CT-TCM),which can achieve improved spectral efficiency at a given target bit-error-rate (BER) was proposed.A fixed-power variable-rate CT-TCM scheme was developed with an adaptive algorithm;moreover,a kind of LMS algorithm for channel estimation was presented based on the MAP decoding of CT-TCM.Simulation results show that,when RSN>8dB,with the target RBE<10?3,gains of 1.5dB,2.6dB,4.6dB than TTCM、BICM-ID、BICM and a spectral efficiency as high as 2~4bit/s/Hz were obtained.

    Bilateral multi-issue negotiation protocol based on agent learning
    Jian LI,Lan-lan HU,Bo JING
    2008, 29(11A):  87-90.  doi:1000-436X(2008)11A-0087-04
    Asbtract ( 64 )   HTML ( 1)   PDF (643KB) ( 66 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In agent based e-commerce systems,because of incomplete information agents have,the efficiency of agent negotiation is rather low.To overcome the problem,an agent bilateral multi-issue alternate bidding negotiation protocol based on agent learning is present.The learning mechanism is used to learn the issue weight of the agent’s opponent.After 1 000 times of experiments for the two kinds of agents to gain the satisfying result,the agent with no the learning protocol averagely needs 1 083 times of negotiation,while the agent with learning protocol averagely only needs 303 times of negotiation.The experimental results prove that the learning protocol can help agent to negotiate more efficiently.

    Wavelet based data reduction and compression scheme for high volume scientific data
    Guo-qing WU,Hong CHEN
    2008, 29(11A):  91-95.  doi:1000-436X(2008)11A-0091-05
    Asbtract ( 49 )   HTML ( 1)   PDF (703KB) ( 88 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To handle high volume numerical data from simulations,a data reduction and compression scheme based on discrete wavelet transform was presented.By discrete wavelet transform,most energy of scientific data is concentrated into a smaller region.Wavelet coefficients can be selected by thresholded and still retain high percentage of energy of the original data.To optimize the threshold,objection function is constructed to balance model accuracy and data reduction.Reduced coefficients are then quantized and finally entropy encoded.Signal noise ratio and relative energy error are used to evaluate precision loss of data in the whole process.To show applicability of scheme,results obtained with plasma simulation data is presented.Extension of the work leads to efficient analysis and understanding of the GB or TB volume scientific data.

    Efficient packet-injection resistant data source authentication protocol for group communication
    Hong TANG,Li-huang ZHU,Jian LI,Rui-qiang CAO
    2008, 29(11A):  96-100.  doi:1000-436X(2008)11A-0096-05
    Asbtract ( 55 )   HTML ( 2)   PDF (637KB) ( 67 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to resolve of the problem that SAIDA and eSAIDA cannot resistant packet injection and PRABS’s communication cost is too large,an efficient packet-injection resistant multicast source authentication protocol (EPJRSA) was proposed.Using merkle hash tree,EPJRSA can find packets injected by attacker before verifying erasure codes and signature.EPJRSA’s communication cost is about 7%~9% of PRABS.The cost of computing and verifying authentication information in EPJRSA is also less than in PRABS.The result shows that EPJRSA has better performance than PRABS and can resistant packet injection.

    Digital rights management technology based on multi-policy for Flash media content protection
    Dong-hao MA,Li WU,Hu QIN,Jun-wen YANG,Jian-ye DONG
    2008, 29(11A):  101-107.  doi:1000-436X(2008)11A-0101-07
    Asbtract ( 53 )   HTML ( 1)   PDF (666KB) ( 278 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at current problems of Flash media DRM technologies,a new DRM method on Flash media protection was proposed for online and offline licensing management,in which trusted model,security policy,authorization,license management were studied in detail.In this method trusted model was applied to ensure application level security,and through content encryption to protect the content itself,while via time,times and usage space to support multi-level policy,and finally,authorization protocol and license status management was discussed.Analysis manifested the proposed method is feasible for online and offline license management,and is secure in application-level and system-level,which is effective for flash content protection.

    Concise Papers
    Simulation and analysis on gimbaled inertial navigation system aiding using Doppler velocity measurements
    Jing ZHAO,Qing-fu LAI,Huan-yao DAI,Wen-ming ZHANG
    2008, 29(11A):  108-113.  doi:1000-436X(2008)11A-0108-06
    Asbtract ( 68 )   HTML ( 1)   PDF (1415KB) ( 178 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By analysis of velocity-measuring and error model of ARS,combined with the GINS error equation,the combined system’s dynamic and observation equations in discrete form were proposed,the flow diagram was designed whereafter designed the flow diagram for combined system navigation simulation using square root Kalman filter in the presence of reasonable setting for trajectory and characteristic of inertial measurement units (IMU),as well as the initialization of state vector.The simulation results show that the combined system acquired a relative high and steady navigation capability,error of IMU declined,while the high velocity resolution contributed to navigation-performance-enhancing.Furthermore,this novel approach has practicability due to its passable performance without adding of extra instruments.

    Estimation of emotion intensity based on double-mode information extraction and Gaussian process
    Xiao-ning PENG,Bei-ji ZOU,Chun-ling LI,Xun LUO
    2008, 29(11A):  114-121.  doi:1000-436X(2008)11A-0114-08
    Asbtract ( 66 )   HTML ( 1)   PDF (1004KB) ( 150 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A solution was proposed for the estimation of impatience intensity as follows:a mathematical modeling was advanced for impatience to build a double-mode feature model,expressing impatience with both facial and action’s expression.Then,emotion intensity was estimated by gaussian mixture hidden Markov model (MHMM) and Gaussian process.The experiment results indicate that it is a simple and effective algorithm of intensity estimation and the accuracy is heightened by 24.7% to 85.1% compared with the method based on facial expression.

    Image classification method of distinguishing LSB replacement from matching steganography
    Xiang-yang LUO,Fen-lin LIU,Dao-shun WANG
    2008, 29(11A):  122-128.  doi:1000-436X(2008)11A-0122-07
    Asbtract ( 125 )   HTML ( 5)   PDF (829KB) ( 260 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For distinguish the LSB replacement steganographic image from LSB matching steganographic image,which are two uppermost embedding methods of image spatial domain and have been applied widely,a classification method based on the two-levels classification structure was presented.Firstly,the classification system framework was described,and then a more concise algorithm was given to implement the framework.The first level classification distinguishes the stego images (with message embedded by LSB steganography) from original images.The second level classification only deals with those stego images,some features with different sensitivity to LSB replacement and matching steganography should be selected and extracted,and an appropriate classifier should be chosen and designed.Thus,the set of stego images conld be divided into two kinds:LSB replacement stego images and LSB matching stego images.Results of experiments show that the proposed method can distinguish the LSB replacement stego images from LSB matching stego images reliably.

    Group key agree management scheme for MANET
    Zhi-feng ZHAO,Xi-bin ZHAO
    2008, 29(11A):  129-132.  doi:1000-436X(2008)11A-0129-04
    Asbtract ( 77 )   HTML ( 1)   PDF (733KB) ( 79 )   Knowledge map   
    References | Related Articles | Metrics

    Group key agree management model and security model for the MANET was proposed.And group key agree management scheme was also provided.This scheme was much suitable for MANET which was improved from GKDS.What’s more,the scheme had the characteristic of self-initialization,closedness,completeness and small data reserves.

    Robust blind shallow water channel equalizer based on fractional lowes order impulsivenoise model
    Dai-feng ZHA,Tong SHU,Ding CHEN,Tian-shuang QIU
    2008, 29(11A):  133-138.  doi:1000-436X(2008)11A-0133-06
    Asbtract ( 61 )   HTML ( 4)   PDF (805KB) ( 182 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The statistical properties of the noise in shallow water channels was investigated.It was found that the noise was non-Gaussian distributed and companied by considerable impulsiveness.Alpha-stable distribution was introduced as a statistical model to the noise.A robust decision-feedback equalizer (DFE) using constant modulus (CM) criterion based on fractional lower-order statistics (FLOS) theory was presented to recover transmitted signals in such shallow water channels.Data analysis results demonstrate the good performance of this algorithm.

    Novel extraction method for defect outline
    Jun-ping WANG,Shuai-jun DONG,Chun-li REN,Yu ZHANG
    2008, 29(11A):  139-143.  doi:1000-436X(2008)11A-0139-05
    Asbtract ( 33 )   HTML ( 1)   PDF (1536KB) ( 81 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new method including Otsu threshold processing,morphology filtering and extraction of edge is proposed to extract the boundary of defects.To evaluate the performance of our method,a group of results using traditional edge detection operator (Roberts operator,Canny operator,Prewitt operator,log operator,Sobel operator) are given.Compared with the traditional edge detection operators,the experimental results show that the boundary by the method is smoother,which not only can embody the characteristic of original image and get a better edge detection result,but also can meet the real-time requirements,and change morphology scale to better overcome the noise impact on the basis of edge detection.All the results above are of significant for the yield improvement in the IC’s manufacturing.

    Using Duffing equation chaotic phase change to detect digital watermarking
    Quan WEN,Shu-xun WANG,Gang GUO,Yu-fei WNAG
    2008, 29(11A):  144-148.  doi:1000-436X(2008)11A-0144-05
    Asbtract ( 60 )   HTML ( 1)   PDF (759KB) ( 78 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Theory of chaotic was combined in the resumption module and contrast module of watermarking system.For this purpose,according to Duffing chaotic equation detection principle,the embedded watermark was designed as a sinusoidal signal with the same frequency as periodic driving force,at the same time,chaotic phase changing detection system was designed against the features of watermarking system.Simulation results show that the presented watermarking algorithm have good robustness which can resist some attack,such as compress attack,filter attack.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: