{"title":"Research of HTTP Hyperlinks Reconstruction and Hot Topic Auto-Discovery","authors":"Qing Liu, Dan Wang, Rongjie Qin, Haijun Wang","doi":"10.1109/MINES.2012.168","DOIUrl":"https://doi.org/10.1109/MINES.2012.168","url":null,"abstract":"Internet security is facing a growing challenge, and many security monitoring systems based on packet inspection have been unable to fully meet the requirements of high-level security monitoring. In this paper, based on full web hyperlinks reconstruction and the hot topic of automatic discovery mechanism, a network security monitoring system is proposed, which is able to achieve the real-time monitoring, to reproduce the complete content of the WEB browser, to cluster and discovery the hot topic automatically, and to monitor web content intelligently.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114608147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Identification Research of Unstructured P2P Multicast Video Streaming","authors":"Chaobin Liu, Jie He, Qiang Guo","doi":"10.1109/MINES.2012.164","DOIUrl":"https://doi.org/10.1109/MINES.2012.164","url":null,"abstract":"Many potential safety problems result from the rapid development of P2P IPTV business, and the foundation for effectively managing the business is to accurately identify unstructured P2P multicast video streaming. In this paper, an identification method is proposed which is based on support vector machines. The network traffic is successively separated by flow features and behavior features, and finally the applications of unstructured P2P multicast video streaming could be identified. The method not only could adapt to the continuous changes of network, but also could identify the known and unknown flow of unstructured P2P multicast video streaming online. The experiments show that the average identification accuracy of the method is 90.9%, and the identification time is about 5 minutes.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125813419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Reconfigurable Intrusion Detection System","authors":"Zhao Liang, Zhang Xiao-hui","doi":"10.1109/MINES.2012.180","DOIUrl":"https://doi.org/10.1109/MINES.2012.180","url":null,"abstract":"DIDS (Distributed Intrusion Detection System) is the best project for detecting distributed intrusion. On account of complicated architecture, difficulty for deployment and no condition for testing, DIDS has not been emploied. This paper analyzes the existing architecture of DIDS, and proposes the idear of designing a RIDS (Reconfigurable Intrusion Detection System), and proposes the construction principle of component and analysis for reconfiguration. In addition, this paper formally describe the RIDS, and present two measurement for reconfiguration based on the different object.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129465424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design for the Network Node of Oilfield Monitoring System Based on ZigBee Technology","authors":"Kaiyuan Meng, Peng Yang, Qingnian Cao","doi":"10.1109/MINES.2012.98","DOIUrl":"https://doi.org/10.1109/MINES.2012.98","url":null,"abstract":"By analyzing the Oilfield wireless monitoring system, the paper puts forward a sensor networks system framework based on ZigBee wireless communication protocols. Hardware of the coordinator and router nodes is designed in this system, achieving self-networking function and reliable data transmission. Finally, low power consumption of the router and terminal device is studied.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128546806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Approach for Salient Motion in Dynamic Scenes","authors":"Min Liu, Weizhong Liu, Daoli Zhang, Zhuoming Feng","doi":"10.1109/MINES.2012.58","DOIUrl":"https://doi.org/10.1109/MINES.2012.58","url":null,"abstract":"We propose an adaptive approach for salient motion in dynamic scenes, which models each video clip of τ frames with the dynamic texture(DT) model in a holistic manner. The order of the DT model is chosen adaptively by evaluating the increment of singular entropy. A simple and computationally efficient formula is proposed to measure observability. The formula is related to time-domain eigenvalues and eigenvectors, but the eigenvalue decomposition operation is not needed. The foreground-background segmentation can be obtained by thresholding the observability value of each pixel location. Our proposed method is tested on a various sequences set. Its computational efficiency outperforms the state-of-the-art methods and its equal error rate (EER) is lower than most current methods.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ontology Term Extracting Method Based on Latent Dirichlet Allocation","authors":"Y. Jing, Wang Junli, Zhao Xiaodong","doi":"10.1109/MINES.2012.71","DOIUrl":"https://doi.org/10.1109/MINES.2012.71","url":null,"abstract":"Ontology plays an important part on Semantic Web, Information Retrieval, and Intelligent Information Integration etc. Ontology learning gets widely studied due to many problems in totally manual ontology construction. Term extraction influences many respects of ontology learning as it's the basis of ontology learning hierarchical structure. This paper mines topics of the corpus based on Latent Dirichlet Allocation (LDA) which uses Variational Inference and Expectation-Maximization (EM) Algorithm to estimate model parameters. With the help of irrelevant vocabulary, the paper provides better experimental results which show that the distribution of topics on terms reveals latent semantic features of the corpus and relevance among words.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129594867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Morphological Study of the Water Source Area Ecological and Economic Sustainable Perspective","authors":"Huang Hehong","doi":"10.1109/MINES.2012.141","DOIUrl":"https://doi.org/10.1109/MINES.2012.141","url":null,"abstract":"What kind of strategy Water Economic patterns should be taken to promote the health and stability of the system, but also to ensure their own survival and development? Scholars believe that this depends on the positioning of the economic patterns in the ecosystem. Economic patterns in the system generally served three roles: First, the backbone of the economy form, occupy the central position in the system, provision of shared assets for system members to find effective methods to create value, and shared values.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127544417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research and Implementation of Technology of Generating Test Paper Based on Genetic Algorithm","authors":"Shao Ming-zhu, Li Wei-feng, Du Jing-Yi","doi":"10.1109/MINES.2012.232","DOIUrl":"https://doi.org/10.1109/MINES.2012.232","url":null,"abstract":"Automatic test paper generation is an important part of examination system. How to improve the test paper generating algorithm and the quality of test paper generating has become an important issue at present. Based on the researches on code tactic, adaptive function, controlling parameters, an improved genetic algorithm is used in the paper. Experiment shows that the improved genetic algorithm could compose test paper more efficiently than traditional algorithms.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127022482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise Marketing Strategies Transformation Enabled by Information Technology","authors":"Sifan Huang, Jiawei Li, Li Li","doi":"10.1109/MINES.2012.107","DOIUrl":"https://doi.org/10.1109/MINES.2012.107","url":null,"abstract":"In the information technology era, many enterprises have to change their marketing strategies. The paper is to discuss how enterprises' marketing strategies have been changed to adapt to the current business trend, and to realize their business value and competitive advantages. We analyzed the transformation of marketing in E-Commerce era, covering marketing concepts, marketing medium, and marketing model. At the end of the paper, a prediction of future development of Electronic Marketing is given.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Analysis on Economic Development and Urban-Rural Income Gap of China","authors":"Ying Zhang","doi":"10.1109/MINES.2012.217","DOIUrl":"https://doi.org/10.1109/MINES.2012.217","url":null,"abstract":"This paper discussed the resource of the urban-rural income gap from the aspect of the productivity difference, and we reach the conclusion that the urban-rural income gap mainly resource from the difference in the total factor productivity, the speed of labor transfer, and the capital stock. From the data analysis, we can see the increase of the total factor productivity will help narrow the urban-rural income gap, and the distortions in capital allocation had the negative effect on narrowing the urban-rural income gap, and the transfer of rural surplus labor to urban significantly increased farmer's income.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121621792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}