{"title":"Evaluation of Integrated Logistics Information System Based on Perception","authors":"Jing Zhang, Xiaoping Liu","doi":"10.1145/3230348.3230419","DOIUrl":"https://doi.org/10.1145/3230348.3230419","url":null,"abstract":"With booming of distribution requirements from e-commerce in China, logistics information systems in enterprises tend to be more integrated. Information of various types of terminals from Internet of Things, Mobile Internet, GIS, GPS needs to be handled quickly in the system. It is not accidental for major express enterprises to plan their transformation to integrated logistics information system. But how to evaluate the effect of the system? This study constructs the evaluation model for integrated logistics information system of logistic enterprises and test it. The results show that the evaluation model is effective to evaluate the efficiency of the information system.","PeriodicalId":188878,"journal":{"name":"Proceedings of the 2018 1st International Conference on Internet and e-Business","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133631531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of SSH Applications Based on Convolutional Neural Network","authors":"Liuyong He, Yijie Shi","doi":"10.1145/3230348.3230458","DOIUrl":"https://doi.org/10.1145/3230348.3230458","url":null,"abstract":"SSH is an encrypted communication protocol. SSH tunnel may encapsulate some other unknown applications, which has a certain potential impact on network security, so it is necessary to identify these applications accurately. This paper uses Convolutional neural network to identify applications, which has the characteristic of automatic feature learning. Therefore, traffic classification algorithm based on deep learning is used to identify these encapsulated applications in SSH traffic such as payload. Experimental methods and results are described in this paper and indicate that classification accuracy of applications (such as Nmap, Baidu Network, Netease cloud music, Netease cloud notes and etc.) in SSH tunnel is up to 95%.","PeriodicalId":188878,"journal":{"name":"Proceedings of the 2018 1st International Conference on Internet and e-Business","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131088721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Status Analysis and Strategy research of E-Commerce Logistics of Henan Agricultural Products","authors":"Zheng Li","doi":"10.1145/3230348.3230408","DOIUrl":"https://doi.org/10.1145/3230348.3230408","url":null,"abstract":"According to the specific circumstances of Henan Province agricultural products logistics, research and analysis of the existing agricultural products in Henan Province logistics problems, put forward some suggestions and Countermeasures on the development of e-commerce logistics of agricultural products in Henan province.","PeriodicalId":188878,"journal":{"name":"Proceedings of the 2018 1st International Conference on Internet and e-Business","volume":"122 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129484688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Standardization of Space Information in Coal Mine","authors":"Yu Zheng-hao, Song Lei","doi":"10.1145/3230348.3230379","DOIUrl":"https://doi.org/10.1145/3230348.3230379","url":null,"abstract":"The standardization of spatial information is the basis of spatial database. The spatial data of the coal mine belong to the underground space data. The mining of coal mine is a process of movement, so the standardization of the spatial information of the coal mine is difficult. The paper enumerates the progress of the standardization of space information in various countries. Based on ISO19100 standards and China national standards, the principles of coal mine spatial information classification and coding is put forward. A set of classification and coding system for spatial information of coal mine is put forward. The system uses Hybrid Classification method. Classification and coding of coal mine spatial information are carried out by using classification code and identification code. The results of classification and coding are suitable for the actual situation.","PeriodicalId":188878,"journal":{"name":"Proceedings of the 2018 1st International Conference on Internet and e-Business","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125980671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Coupling Analysis for Components of a Consumer Product Use Scenario Based on N-K Model","authors":"Wu Qian, Liu Xia, L. Xiaowei","doi":"10.1145/3230348.3230365","DOIUrl":"https://doi.org/10.1145/3230348.3230365","url":null,"abstract":"This paper innovatively applies N-K model to assessment of consumer product safety risks. Based on a good understanding of how to build a risk coupling model for components of a consumer product use scenario, the paper analyzes characteristics of each component, builds an N-K model-based risk coupling model for such components and calculates the coupling measure of the model. Compared with the traditional correlation analysis, the quantitative model algorithm established in this paper is more feasible and scientific.","PeriodicalId":188878,"journal":{"name":"Proceedings of the 2018 1st International Conference on Internet and e-Business","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125417631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Concept of Total Innovation Management as a Mechanism to Enhance the Competitiveness of the National Innovation System","authors":"I. Rudskaia, Dmitrii G. Rodionov","doi":"10.1145/3230348.3230349","DOIUrl":"https://doi.org/10.1145/3230348.3230349","url":null,"abstract":"With the increasing percentage of innovative economy in the global world, the question of competitiveness is becoming more and more relevant. A rise in competitiveness means economic changes as a result of new technologies and new methods of production being introduced, as well as new skills being developed. Innovation is fundamental to this process. The structure of success factors is changing, shifting more and more from the material prerequisites towards the importance of human capital. The knowledge gained in new technologies and processes has led to a growth of competitiveness. The development of a knowledge-based society requires an adequate level of investments in research, development, education, and the creation of favorable conditions for innovation. Thus, the high importance of innovations in ensuring the competitiveness of any economic agent, as well as the multifaceted side of innovations and the high risks relating to them, necessitate the development of special mechanisms for managing the innovations. Innovation management is a complicated task for leadership and is aimed at a system process of change in all strategic and operational approaches. This field of knowledge and practice has gained the name \"innovation management\" and has gone through several stages in its development. In this research we analyze the innovation management systems in the context of market globalization, digital revolution, and dynamic development of technology, products, and services. The paper discusses the concept of total innovation management as a tool to enhance the competitiveness of the national innovation system. A study of the national innovation system of Russia is also presented in this paper, taking into account its position in the world from an innovation standpoint.","PeriodicalId":188878,"journal":{"name":"Proceedings of the 2018 1st International Conference on Internet and e-Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122066090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Coordinated Development of Cross Border E-Commerce and Cross Border Logistics","authors":"Sun Jiangsheng","doi":"10.1145/3230348.3230407","DOIUrl":"https://doi.org/10.1145/3230348.3230407","url":null,"abstract":"In recent years, our country business enterprise development, business and docking problem of cross-border e-commerce and cross-border logistics gradually displayed, expounds the cross-border business enterprise and cross-border logistics enterprises encountered in industry docking problems, the logistics system of existing research theory, put forward in line with China's cross-border e-commerce and cross-border the collaborative logistics strategic plan development, through the construction of a harmonious and steady business platform and strict market supervision and other means to explore the coordination for business docking between China's cross-border business enterprise and cross-border logistics enterprise relationship.","PeriodicalId":188878,"journal":{"name":"Proceedings of the 2018 1st International Conference on Internet and e-Business","volume":"63 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117283613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Influence of Mental State on Vocal Music Learning","authors":"Rui Wang","doi":"10.1145/3230348.3230440","DOIUrl":"https://doi.org/10.1145/3230348.3230440","url":null,"abstract":"The art of vocal music is from physiology, psychology and other disciplines of physics and art disciplines combination and become, in the process of vocal music learning and singing, the singing of psychological factors play a decisive role. The study of vocal music is different from other disciplines. The common adverse psychological state of vocal learning and singing psychology, singing psychology, role relationship and good mental state training these aspects, is a very good guide for the common psychological problems of learning vocal music in our daily, while the vocal music is also of great significance. In order to cultivate good singing psychology, we should strengthen our skills practice in vocal music learning, take part in the stage practice, exercise, and improve their artistic accomplishment. In the process of singing, play their own subjective initiative, adjust their singing status, conscious of their psychological training. Through their own efforts, step by step learning, so that their high efficiency, high quality to complete the task of learning.","PeriodicalId":188878,"journal":{"name":"Proceedings of the 2018 1st International Conference on Internet and e-Business","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116055753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Studying the Antivirus Behavior on Kernel Activities","authors":"Mohammed I. Al-Saleh, Hanan M. Hamdan","doi":"10.1145/3230348.3230376","DOIUrl":"https://doi.org/10.1145/3230348.3230376","url":null,"abstract":"Security is of concern of any computing system. Intruders break into machines to steal private data, important credentials, or credit cards. Causing damage, denying services, spaming, and defrauding are among intruders' goals. Security engineers strive to secure systems against many kinds of attacks. Different security controls are deployed at variety of perimeters to fight attacks. Firewalls, intrusion detection systems, intrusion prevention systems, encryption techniques, spam filters, and anti-adware are among such security controls. As a last line of defense, the Antivirus (AV) is of an important concern to the end-users community. Mainly, the AV achieves security by scanning data against its database of virus signatures. In addition, the AV tries to reach a pleasant balance between security and performance because end-users are not willing to deploy a performance-killing AV. When to scan data is an important design factor an Antivirus has to make. In this study, we test two AV aspects. First, we want to know how aggressive the AV is against kernel-level activities compared with user-level activities. In order to do that, we implemented a kernel-level device driver that reads malware with the present of the AV. Second, because AVs are equipped with on-access scanners that are triggered based on file access, we want to know how the AV is achieving that and how that could affect the overall performance.","PeriodicalId":188878,"journal":{"name":"Proceedings of the 2018 1st International Conference on Internet and e-Business","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121596090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Does Spread Really Reflect the Crisis?: The Empirical Evidence from China Bond Market","authors":"Yun Xie, Yixiang Tian","doi":"10.1145/3230348.3234643","DOIUrl":"https://doi.org/10.1145/3230348.3234643","url":null,"abstract":"The co-movement of Treasury bond and corporate bond yields are crucial to risk management of bond investment. In this paper, we build a copula model with regime switching to accommodate the potential non-linear and asymmetric dependence structure between Treasury bond and corporate bond yields in China debt market. The empirical results show that there exists great symmetric tail dependence between two markets, and dependence structure changes with the implicit switching regimes. After the global financial crisis at 2008, the correlation between government bonds and corporate bonds has largely weakened, but still over 0.5.","PeriodicalId":188878,"journal":{"name":"Proceedings of the 2018 1st International Conference on Internet and e-Business","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132609035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}