2012 Fourth International Conference on Multimedia Information Networking and Security最新文献

筛选
英文 中文
Trusted Virtual Private Datacenter: A Model toward Secure IaaS Cloud 可信虚拟私有数据中心:面向安全IaaS云的模型
Xin Wan, Zhiting Xiao, Yi Ren
{"title":"Trusted Virtual Private Datacenter: A Model toward Secure IaaS Cloud","authors":"Xin Wan, Zhiting Xiao, Yi Ren","doi":"10.1109/MINES.2012.244","DOIUrl":"https://doi.org/10.1109/MINES.2012.244","url":null,"abstract":"Cloud computing enables organizations to realize the commercial benefits while facing the new security issues. In this paper, we presents a security model for called the Trusted Private Virtual Data center (TVPDc) that offering centralized security management of the computing and storage resources distributed in different locations and physical machines within an IaaS cloud. The TVPDc model can satisfy the need of the organizations for privacy protection and data integrity guarantees and enhances the system management capabilities in virtualized environments.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115294970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Data Mining Algorithm Analysis for Personalized Service 个性化服务的数据挖掘算法分析
Liwu Zou, Guangwei Ren
{"title":"The Data Mining Algorithm Analysis for Personalized Service","authors":"Liwu Zou, Guangwei Ren","doi":"10.1109/MINES.2012.220","DOIUrl":"https://doi.org/10.1109/MINES.2012.220","url":null,"abstract":"In recent years, the library service has become more and more to meet the requirements of customers personalized service. With the rapid development of computer technology, the use of data mining technology can effectively achieve the goal. in using data mining technology, realization of the algorithm is the key, there are some problems to realize the personalized service in the use of the classical algorithm - Apriorio algorithm. Therefore, I will improve the classical algorithm in this article so that the improved algorithm can realise the individualized service of the library more efficient. The main content of this paper is: Chapter 1: to introduce the library personalized service and understand their requirements. Chapter 2: to introduce the data mining and know it to understand why it can be used to realize the individualized service of the library. Chapter 3: to introduce Data Mining Algorithm for personalized service. To introduce the classical association rules algorithm - Apriori algorithm, through improving its insufficiency, we can use the improved algorithm to realise the personalized service more efficient.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115452607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Ecological Tourism Resources Digitization Mode of Gansu Province 甘肃省生态旅游资源数字化模式分析
Chun-li Wang
{"title":"Analysis of Ecological Tourism Resources Digitization Mode of Gansu Province","authors":"Chun-li Wang","doi":"10.1109/MINES.2012.74","DOIUrl":"https://doi.org/10.1109/MINES.2012.74","url":null,"abstract":"This paper discuss the significance of ecological tourism resources digitization, expound the necessity of ecological tourism resources digitization from resource sharing, network propaganda and protection, analyze the present situation and insufficiency of ecological tourism in Gansu province, propose some countermeasures and suggestions for ecological tourism resources digital of Gansu province from management, technology and application.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116960426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis for Combustion Characteristics of Large-Scale Pool Fire with Wind 有风的大型池火燃烧特性分析
Zhen Chen, W. Song, L. Lv
{"title":"Analysis for Combustion Characteristics of Large-Scale Pool Fire with Wind","authors":"Zhen Chen, W. Song, L. Lv","doi":"10.1109/MINES.2012.73","DOIUrl":"https://doi.org/10.1109/MINES.2012.73","url":null,"abstract":"The pool fire with characteristics of high temperature and high radiation intensity, is serious accident in chemical companies, but the research for pool fire of large tank area is relatively scarce. Taking a large crude oil storage tank area for an instance, this paper focuses on large-scale pool fire, and the flame height and heat flux was calculated and analyzed considering the influence of wind speed. Based on the theory of the pool fire, the fire characteristics under different wind speed (V = 0 ~ 20m / s) are simulated and calculated with simulation software FDS. Analyzing and contrasting the calculation, it shows that: Hotfijzer model and Pritchard-Binding model is applicable to the calculation for flame angle and height of large-scale hydrocarbon pool fire, when the wind speed is 20m/s, the radius of death, serious injury and minor injury is respectively 63.8m, 73.4m, 93.4m at down wind, and the adjacent tanks and fire dike will soon be ruined completely by the thermal radiation, when the wind speed is faster than 4m/s, the pumping station will be damaged in the long period of heat radiation, and the metering plant and office, the adjacent road and power lines outside the storage house will have only a slight effect.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125380515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research of Avoid the Selfish Behavior in Mobile Ad Hoc Networks Based on Repeated Game 基于重复博弈的移动自组网自利行为避免研究
Tao Lei, Ming-Sen Xiang
{"title":"Research of Avoid the Selfish Behavior in Mobile Ad Hoc Networks Based on Repeated Game","authors":"Tao Lei, Ming-Sen Xiang","doi":"10.1109/MINES.2012.166","DOIUrl":"https://doi.org/10.1109/MINES.2012.166","url":null,"abstract":"In a mobile ad hoc network (MANET), each node communicated with other nodes has relied on the intermediate nodes. But selfish nodes which aimed to get the greatest benefits from the MANET, like battery life and bandwidth. In this paper, we defined a half selfish node which is not selfish always but sometimes. Then we used the repeated game in MANET to avoid the half selfish nodes. Lastly, we have a simulation with NS-2 to test our scheme weather successful or not. Through the simulation, we proved our scheme is successful.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116116844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Failure Recovery Framework for Job Management Services 作业管理服务的故障恢复框架
Mingjing Lan, L. An
{"title":"A Failure Recovery Framework for Job Management Services","authors":"Mingjing Lan, L. An","doi":"10.1109/MINES.2012.17","DOIUrl":"https://doi.org/10.1109/MINES.2012.17","url":null,"abstract":"To solve the problem of service failure for job management services, a new failure recovery Framework named J-FRF is given. During the life cycle of service and job, states are monitored and contexts are saved. When service failure occurs, the framework takes advantage of the persistent contexts to realize rapid recovery of service and job. The experiments show that J-FRF has a high recovery success rate and lower recovery time, and can be able to better handle the failure of job management services.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of Part of Speech Based on the Algorithm of C4.5 for Polyphone 基于C4.5算法的多音素词性提取方法
Peng Fuming, He Xin, S. Yingchun
{"title":"A Method of Part of Speech Based on the Algorithm of C4.5 for Polyphone","authors":"Peng Fuming, He Xin, S. Yingchun","doi":"10.1109/MINES.2012.28","DOIUrl":"https://doi.org/10.1109/MINES.2012.28","url":null,"abstract":"Chinese is one of graceful languages, not only it's hieroglyphic writing, but also one of flexible languages, which can describe a thing or sensation of people visually. This is because of polyphone, which exists in Chinese. But it's also because of polyphone, there are some difficult in Chinese speech synthesis, especially in the conversion between character and pronunciation. Polyphone is a large proportion in Chinese, so the problem of polyphone is the key in the module of character-pronunciation conversion. In this paper, the part of speech rules is presented to solve the problem of polyphone, which is based on the algorithm of C4.5. And experiment results presented to prove the effectiveness of this method.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Web Application Framework Based on S2SH 基于S2SH的Web应用框架的设计与实现
Wang Yun, Xiao-xia Liu
{"title":"Design and Implementation of Web Application Framework Based on S2SH","authors":"Wang Yun, Xiao-xia Liu","doi":"10.1109/MINES.2012.97","DOIUrl":"https://doi.org/10.1109/MINES.2012.97","url":null,"abstract":"A single framework has some problems in building enterprise application, such as low efficiency of system development, poor expansibility, high coupling between layers and complex structure, etc. Aiming at these problems, a web application framework based on Strut2, Spring and Hibernate (S2SH) is put forward. By making use of the completeness of Struts2 in the presentation layer, the flexibility of Spring in business management and the maturity of Hibernate in the persistence layer, it really achieves loose coupling between layers and easy maintenance, simultaneously reduces the difficulty of development among the three parts and applies the framework to the development of army funds management system.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122208567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Technological Progress, Technical Efficiency & Productivity Growth of Modern Service Industry: An Comparative Study on Yangtze River Delta and Pearl River Delta 技术进步、技术效率;现代服务业生产率增长:基于长三角与珠三角的比较研究
Jianyun Cao
{"title":"Technological Progress, Technical Efficiency & Productivity Growth of Modern Service Industry: An Comparative Study on Yangtze River Delta and Pearl River Delta","authors":"Jianyun Cao","doi":"10.1109/MINES.2012.215","DOIUrl":"https://doi.org/10.1109/MINES.2012.215","url":null,"abstract":"Using Malmquist index, this paper measures total factor productivity (TFP) of modern service industry in Yangtze River Delta and Pearl River Delta during 2000-2008, analyzes the sources and trends of TFP growth. Conclusions are made as follows: TFP of modern service industry grew rapidly and had a downward trend in the two zones, and the source of economic growth has shifted from technical efficiency to technological progress. Modern service industry in Pearl River Delta was less dependent on investment and had higher TFP index and smaller internal differences than that in Yangtze River Delta. TFP differences between the two zones were mainly due to the differences in technological progress, which was higher in Pearl River Delta than in Yangtze River Delta.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123935723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-granularity Reputation Management Model Suitable for P2P MMOG 一种适合P2P MMOG的多粒度信誉管理模型
Liu Fang, Xiangbin Shi, Dai Qin, Hong-Ping Yang
{"title":"A Multi-granularity Reputation Management Model Suitable for P2P MMOG","authors":"Liu Fang, Xiangbin Shi, Dai Qin, Hong-Ping Yang","doi":"10.1109/MINES.2012.33","DOIUrl":"https://doi.org/10.1109/MINES.2012.33","url":null,"abstract":"In order to solve the problem of the lack of fairness and poor security in online games, this paper presents a multi-granularity reputation management model for P2P MMOG. In order to accurately evaluate the reputation of the different roles of the games players, the model assesses the reputation of different roles taken by players respectively and calculates the player's reputation by fuzzy theory. This paper also gives the algorithm of reputation evaluation. In addition, this paper introduces the incentive mechanism to encourage players to take the initiative to carry out evaluation on the quality of coordinator service and act as a coordinator. The experimental results show that the multi-granularity reputation can provide a more appropriate credit support in related fields and provide a fair and credible gaming environment for the multi-player games.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116487286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信