{"title":"Trusted Virtual Private Datacenter: A Model toward Secure IaaS Cloud","authors":"Xin Wan, Zhiting Xiao, Yi Ren","doi":"10.1109/MINES.2012.244","DOIUrl":"https://doi.org/10.1109/MINES.2012.244","url":null,"abstract":"Cloud computing enables organizations to realize the commercial benefits while facing the new security issues. In this paper, we presents a security model for called the Trusted Private Virtual Data center (TVPDc) that offering centralized security management of the computing and storage resources distributed in different locations and physical machines within an IaaS cloud. The TVPDc model can satisfy the need of the organizations for privacy protection and data integrity guarantees and enhances the system management capabilities in virtualized environments.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115294970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Data Mining Algorithm Analysis for Personalized Service","authors":"Liwu Zou, Guangwei Ren","doi":"10.1109/MINES.2012.220","DOIUrl":"https://doi.org/10.1109/MINES.2012.220","url":null,"abstract":"In recent years, the library service has become more and more to meet the requirements of customers personalized service. With the rapid development of computer technology, the use of data mining technology can effectively achieve the goal. in using data mining technology, realization of the algorithm is the key, there are some problems to realize the personalized service in the use of the classical algorithm - Apriorio algorithm. Therefore, I will improve the classical algorithm in this article so that the improved algorithm can realise the individualized service of the library more efficient. The main content of this paper is: Chapter 1: to introduce the library personalized service and understand their requirements. Chapter 2: to introduce the data mining and know it to understand why it can be used to realize the individualized service of the library. Chapter 3: to introduce Data Mining Algorithm for personalized service. To introduce the classical association rules algorithm - Apriori algorithm, through improving its insufficiency, we can use the improved algorithm to realise the personalized service more efficient.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115452607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Ecological Tourism Resources Digitization Mode of Gansu Province","authors":"Chun-li Wang","doi":"10.1109/MINES.2012.74","DOIUrl":"https://doi.org/10.1109/MINES.2012.74","url":null,"abstract":"This paper discuss the significance of ecological tourism resources digitization, expound the necessity of ecological tourism resources digitization from resource sharing, network propaganda and protection, analyze the present situation and insufficiency of ecological tourism in Gansu province, propose some countermeasures and suggestions for ecological tourism resources digital of Gansu province from management, technology and application.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116960426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis for Combustion Characteristics of Large-Scale Pool Fire with Wind","authors":"Zhen Chen, W. Song, L. Lv","doi":"10.1109/MINES.2012.73","DOIUrl":"https://doi.org/10.1109/MINES.2012.73","url":null,"abstract":"The pool fire with characteristics of high temperature and high radiation intensity, is serious accident in chemical companies, but the research for pool fire of large tank area is relatively scarce. Taking a large crude oil storage tank area for an instance, this paper focuses on large-scale pool fire, and the flame height and heat flux was calculated and analyzed considering the influence of wind speed. Based on the theory of the pool fire, the fire characteristics under different wind speed (V = 0 ~ 20m / s) are simulated and calculated with simulation software FDS. Analyzing and contrasting the calculation, it shows that: Hotfijzer model and Pritchard-Binding model is applicable to the calculation for flame angle and height of large-scale hydrocarbon pool fire, when the wind speed is 20m/s, the radius of death, serious injury and minor injury is respectively 63.8m, 73.4m, 93.4m at down wind, and the adjacent tanks and fire dike will soon be ruined completely by the thermal radiation, when the wind speed is faster than 4m/s, the pumping station will be damaged in the long period of heat radiation, and the metering plant and office, the adjacent road and power lines outside the storage house will have only a slight effect.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125380515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Avoid the Selfish Behavior in Mobile Ad Hoc Networks Based on Repeated Game","authors":"Tao Lei, Ming-Sen Xiang","doi":"10.1109/MINES.2012.166","DOIUrl":"https://doi.org/10.1109/MINES.2012.166","url":null,"abstract":"In a mobile ad hoc network (MANET), each node communicated with other nodes has relied on the intermediate nodes. But selfish nodes which aimed to get the greatest benefits from the MANET, like battery life and bandwidth. In this paper, we defined a half selfish node which is not selfish always but sometimes. Then we used the repeated game in MANET to avoid the half selfish nodes. Lastly, we have a simulation with NS-2 to test our scheme weather successful or not. Through the simulation, we proved our scheme is successful.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116116844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Failure Recovery Framework for Job Management Services","authors":"Mingjing Lan, L. An","doi":"10.1109/MINES.2012.17","DOIUrl":"https://doi.org/10.1109/MINES.2012.17","url":null,"abstract":"To solve the problem of service failure for job management services, a new failure recovery Framework named J-FRF is given. During the life cycle of service and job, states are monitored and contexts are saved. When service failure occurs, the framework takes advantage of the persistent contexts to realize rapid recovery of service and job. The experiments show that J-FRF has a high recovery success rate and lower recovery time, and can be able to better handle the failure of job management services.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method of Part of Speech Based on the Algorithm of C4.5 for Polyphone","authors":"Peng Fuming, He Xin, S. Yingchun","doi":"10.1109/MINES.2012.28","DOIUrl":"https://doi.org/10.1109/MINES.2012.28","url":null,"abstract":"Chinese is one of graceful languages, not only it's hieroglyphic writing, but also one of flexible languages, which can describe a thing or sensation of people visually. This is because of polyphone, which exists in Chinese. But it's also because of polyphone, there are some difficult in Chinese speech synthesis, especially in the conversion between character and pronunciation. Polyphone is a large proportion in Chinese, so the problem of polyphone is the key in the module of character-pronunciation conversion. In this paper, the part of speech rules is presented to solve the problem of polyphone, which is based on the algorithm of C4.5. And experiment results presented to prove the effectiveness of this method.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Web Application Framework Based on S2SH","authors":"Wang Yun, Xiao-xia Liu","doi":"10.1109/MINES.2012.97","DOIUrl":"https://doi.org/10.1109/MINES.2012.97","url":null,"abstract":"A single framework has some problems in building enterprise application, such as low efficiency of system development, poor expansibility, high coupling between layers and complex structure, etc. Aiming at these problems, a web application framework based on Strut2, Spring and Hibernate (S2SH) is put forward. By making use of the completeness of Struts2 in the presentation layer, the flexibility of Spring in business management and the maturity of Hibernate in the persistence layer, it really achieves loose coupling between layers and easy maintenance, simultaneously reduces the difficulty of development among the three parts and applies the framework to the development of army funds management system.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122208567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technological Progress, Technical Efficiency & Productivity Growth of Modern Service Industry: An Comparative Study on Yangtze River Delta and Pearl River Delta","authors":"Jianyun Cao","doi":"10.1109/MINES.2012.215","DOIUrl":"https://doi.org/10.1109/MINES.2012.215","url":null,"abstract":"Using Malmquist index, this paper measures total factor productivity (TFP) of modern service industry in Yangtze River Delta and Pearl River Delta during 2000-2008, analyzes the sources and trends of TFP growth. Conclusions are made as follows: TFP of modern service industry grew rapidly and had a downward trend in the two zones, and the source of economic growth has shifted from technical efficiency to technological progress. Modern service industry in Pearl River Delta was less dependent on investment and had higher TFP index and smaller internal differences than that in Yangtze River Delta. TFP differences between the two zones were mainly due to the differences in technological progress, which was higher in Pearl River Delta than in Yangtze River Delta.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123935723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-granularity Reputation Management Model Suitable for P2P MMOG","authors":"Liu Fang, Xiangbin Shi, Dai Qin, Hong-Ping Yang","doi":"10.1109/MINES.2012.33","DOIUrl":"https://doi.org/10.1109/MINES.2012.33","url":null,"abstract":"In order to solve the problem of the lack of fairness and poor security in online games, this paper presents a multi-granularity reputation management model for P2P MMOG. In order to accurately evaluate the reputation of the different roles of the games players, the model assesses the reputation of different roles taken by players respectively and calculates the player's reputation by fuzzy theory. This paper also gives the algorithm of reputation evaluation. In addition, this paper introduces the incentive mechanism to encourage players to take the initiative to carry out evaluation on the quality of coordinator service and act as a coordinator. The experimental results show that the multi-granularity reputation can provide a more appropriate credit support in related fields and provide a fair and credible gaming environment for the multi-player games.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116487286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}