{"title":"The Research on Fuzzy Bayesian Network Model for the Network Public Opinion Situation and Threat Assessment","authors":"J. Fang, Jianming Huang, Ming Liu","doi":"10.1109/ICNDC.2012.49","DOIUrl":"https://doi.org/10.1109/ICNDC.2012.49","url":null,"abstract":"In this paper, The project is based on the network information security research foundation, to the public opinion surveillance and early warning research as the breakthrough point, in view of the network public opinion situation change of complexity and diversity, especially the network information uncertainty and fuzziness, constructs a fuzzy Bayesian network model to solve the public opinion situation and threat assessment effectively. The research results can be a variety of network public opinion characteristics factors synthetically, the different time slice characteristic factors are modified, which can accurately track the network public opinion situation and threat of development and change, improve public opinion monitoring and early warning of quality.","PeriodicalId":151593,"journal":{"name":"2012 Third International Conference on Networking and Distributed Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127656441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Background Reconstruction Method for Video Objects Detection","authors":"Li Cao, Yi Jiang","doi":"10.1109/ICNDC.2012.46","DOIUrl":"https://doi.org/10.1109/ICNDC.2012.46","url":null,"abstract":"The background subtraction is an important method to detect the moving objects, and effective background reconstruction is the key for the background subtraction. Based on the idea that the pixel average appearing with high frequency in an image series is the background points, the pixel intensity classification (PIC) algorithm can reconstruct background accurately. In this paper, a new background estimation method based on the PIC algorithm is proposed. Through normalization, quantitative statistic, quantization range extension of the pixels of the chosen image sequence is used to reconstruct the background. Based on the background reconstructed by the improved PIC algorithm, we build a moving object detection system with OpenCV. The experiments results show that the method proposed in this paper can reconstruct the background image quickly and can extract the moving objects from the video sequence successfully.","PeriodicalId":151593,"journal":{"name":"2012 Third International Conference on Networking and Distributed Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121069340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Analysis of Automated Testing Framework Based on Robot","authors":"Liu Jian-ping, Liu Juan-juan, Wang Dong-Long","doi":"10.1109/ICNDC.2012.53","DOIUrl":"https://doi.org/10.1109/ICNDC.2012.53","url":null,"abstract":"In order to improve the quality and the efficiency of software testing, software automation test has been put to use widely during the software testing. This paper discusses the application of testing tools in software test automation, with the Robot Framework automation test analysis.","PeriodicalId":151593,"journal":{"name":"2012 Third International Conference on Networking and Distributed Computing","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128915429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithms for Finding Maximum Reliability Many-to-Many Multicast Routing under a Fixed Topology","authors":"Wei Ding, Xuerui Wei, Xuelin Nie, Ming Zhou","doi":"10.1109/ICNDC.2012.37","DOIUrl":"https://doi.org/10.1109/ICNDC.2012.37","url":null,"abstract":"As we all know, many-to-many multicast routing can be extensively used in computer or communication networks supporting various continuous multimedia applications. Here, we are concerned with the case where each user is both a sender and a receiver of messages in multicasting as well as a terminal. In this case, the multicast tree appears as a terminal Steiner tree (TeST). The problem of finding a TeST with a quality-of-service (QoS) optimization is typically NP-hard. By investigation, we discover that we can use an idea of under a fixed topology to find a good many-to-many multicast tree. In this paper, we propose the maximum reliability many-to-many multicast tree under a fixed topology problem (MRMP) in an unreliable network, distributed into two types, the centralized and decentralized. This paper devises a dynamic programming algorithm respectively for constructing an exact solution of the centralized and decentralized MRMP.","PeriodicalId":151593,"journal":{"name":"2012 Third International Conference on Networking and Distributed Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116137488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallelizing FIB Lookup in Content Centric Networking","authors":"Shuai Ding, Zhen Chen, Zhi Liu","doi":"10.1109/ICNDC.2012.10","DOIUrl":"https://doi.org/10.1109/ICNDC.2012.10","url":null,"abstract":"As a promising future Internet architecture, CCN(Content Centric Networking) is a pragmatic shift from host-to-host to named content model. Providing each piece of content with a specified name, CCN can either directly route a user's Interest for a specific piece of content to the content server, or simply pick the right piece of content from the in network cache and send it back to the user. The combination of content name and in-network cache makes CCN suitable for content distribution. Name based FIB (Forwarding Information Base) table lookup thus plays an important role in CCN routing, as FIB records the forwarding face set for different name prefixes. This paper leverages multi-core platform to accelerate the FIB lookup in CCN router. Based on TILEPro64 platform, which has 64 identical tiles, two parallel zed lookup algorithms, one is based on hash table and the other is based on Bloom filter, are implemented and evaluated. To better evaluate the performance, the size of FIB is estimated and the statistics of URLs are measured to simulate the generation of practical Interests packet traffic. Through theoretical evaluation and experiment, it shows that the parallelization can improve the FIB lookup performance efficiently.","PeriodicalId":151593,"journal":{"name":"2012 Third International Conference on Networking and Distributed Computing","volume":"14 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131879969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Broken-point Continuingly-transferring Based on C#.NET","authors":"J. Fang, Ming Liu, Jianhua Wang","doi":"10.1109/ICNDC.2012.34","DOIUrl":"https://doi.org/10.1109/ICNDC.2012.34","url":null,"abstract":"In this paper, Discusses Implementation of Broken-point Continuingly-transferring Based on C#.NET. At the first, introduce C# Network Programming, while introduce the basic elements, basic principles of Broken-point Continuingly-transferring, and in-depth analysis of Implementation of the function of Broken-point Continuingly-transferring in C#.NET.","PeriodicalId":151593,"journal":{"name":"2012 Third International Conference on Networking and Distributed Computing","volume":"45 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132970079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling Distributed Computing Systems with ElopTM","authors":"Junwei Cao, Shuo Chen, Yuxin Wan, Wei Chen","doi":"10.1109/ICNDC.2012.20","DOIUrl":"https://doi.org/10.1109/ICNDC.2012.20","url":null,"abstract":"In the era of Internet, one of the most ultimate goals is that users can seamlessly access to any computing application or service at anywhere anytime. Computing infrastructuralization is the path to gradually address the challenge. In this work, elop computing is proposed that encapsulates and integrates various computing elements as services, benefiting from existing advanced computing technology, e.g. virtualization and SaaS. Higher levels of services are also provided, e.g. metadata management, resource management and scheduling, security and authorization, which can be utilized to build distributed computing systems in a scalable way. In this paper, the architecture of elop computing is illustrated and corresponding middleware implementation is introduced in details. A typical scenario is given to demonstrate the potential of enabling distributed computing systems with elopTM.","PeriodicalId":151593,"journal":{"name":"2012 Third International Conference on Networking and Distributed Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Automatic Digital Multimeter Interface Technology Based on UART","authors":"Huang Jing, Qiao Leling, Zhang Hanbo","doi":"10.1109/ICNDC.2012.33","DOIUrl":"https://doi.org/10.1109/ICNDC.2012.33","url":null,"abstract":"Because Automatic Digital Multimeter is huge and not compatible, automatic digital multimeter provide a serial communication interface to avoid the trouble of moving the instrument. This paper uses the method of serial communication based on UART, through the UART interface design, solving the problems of automatic digital multimeter serial communication. The results of the study show that using UART serial communication, users can quickly and efficiently measure the data of voltage, current online, etc. It is convenient and easy.","PeriodicalId":151593,"journal":{"name":"2012 Third International Conference on Networking and Distributed Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Influence of SNS Network Environment on University Students and the Probe of its Strategies","authors":"Yan Chen, Ji-Le Wu","doi":"10.1109/ICNDC.2012.38","DOIUrl":"https://doi.org/10.1109/ICNDC.2012.38","url":null,"abstract":"With the development of modern science and technology, SNS attracts many university students by its unique style and typical interpersonal approach. This paper proceeds with the basic information of university students' use of SNS and then analyzes the profound influence of SNS network environment on contemporary university students in positive and negative aspects. This paper puts forward strategies including strengthening the quality-oriented education of web intermediaries, constructing the new type of network relations between students and teachers, manufacturing high-grade campus network culture and realizing the combination of educational force online and offline and so on, in order to promote the harmonious development of university students.","PeriodicalId":151593,"journal":{"name":"2012 Third International Conference on Networking and Distributed Computing","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie Hu, Huaxiong Zhang, Jie Feng, Hai Huang, Hanjie Ma
{"title":"A scale adaptive Kalman filter method based on quaternion correlation in object tracking","authors":"Jie Hu, Huaxiong Zhang, Jie Feng, Hai Huang, Hanjie Ma","doi":"10.1109/ICNDC.2012.48","DOIUrl":"https://doi.org/10.1109/ICNDC.2012.48","url":null,"abstract":"We proposed a scale adaptive Kalman filter algorithm based on quaternion correlation of color image. Kalman filter is used to predict the object motion direction and define the searching window. In the searching window, the correlation of object and the image is calculated to get the accurate position of the object. Scale adaptive method is efficient to the situation of object size changing. Experiments results showed that the algorithm can detect the object correctly even the size of the object changed.","PeriodicalId":151593,"journal":{"name":"2012 Third International Conference on Networking and Distributed Computing","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133283628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}