{"title":"A Construction Method of QC-LDPC Codes without Short Cycles","authors":"Jianwu Zhang, Chengxia Li, J. Bao","doi":"10.1109/MINES.2012.14","DOIUrl":"https://doi.org/10.1109/MINES.2012.14","url":null,"abstract":"Low-density Parity-check (LDPC) coding is a class of advanced channel coding techniques. To improve the performance of LDPC codes, a simple and effective method to construct QC-LDPC codes without short cycles (cycles of length four and six) is proposed. The approach is especially effective when the parity-check matrix of QC-LDPC codes is composed of circulant permutation matrices. Firstly, we analyze the shapes of the cycles in the exponent matrix, to get the required conditions of no four-cycles and six-cycles. Then we show how to construct the parity-check matrix without four-cycles and six-cycles by filling rows of the exponent matrix with arithmetic sequences. Simulation results show that the proposed codes have better performance than array codes. Though the performance of the proposed codes is not as well as random codes at higher Eb/N0, they can be applied to practical communications because of being encoded in linear time with shift registers.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity-Based Detecting Protocol for Mobile Agent with Onion Itinerary","authors":"Wang Jing, Wu Shu-yue","doi":"10.1109/MINES.2012.123","DOIUrl":"https://doi.org/10.1109/MINES.2012.123","url":null,"abstract":"In this paper a new non-interaction mobile agent detecting protocol is proposed by combining with onion itinerary technology and identity-based. Lastly the security performance of the new protocol is analyzed.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121032126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Evaluation Method of Operational Performance of Emergency Response Plan","authors":"Qing-lan Han, Z. Huang, X. Fan","doi":"10.1109/MINES.2012.187","DOIUrl":"https://doi.org/10.1109/MINES.2012.187","url":null,"abstract":"Synthesize the methods of Delphi, AHP and FCE, and make the object of study which is not clear to be measurable, fuzz up the index and evaluate the emergency response plan effectively. A Case study proves that the method is scientific and operability.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121532496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceptually Deblocking Filtering Algorithm in Multiview Video Decoding","authors":"Yongfang Wang, Zhaoyang Zhang, P. An, Wei Zhang","doi":"10.1109/MINES.2012.155","DOIUrl":"https://doi.org/10.1109/MINES.2012.155","url":null,"abstract":"The deblocking filtering for multiview video coding plays a major role in improving the image visual quality, but it has high computation complexity. This paper proposes a perceptual deblocking filtering algorithm based on just noticeable distortion model. By properly considering of the human visual characteristic, a perceptual deblocking filtering decision is integrated into the deblocking process to decrease computational complexity of the deblocking filtering. Experimental results show that the proposed deblocking filtering algorithm can achieve decoding time saving significantly with negligible quality degradation.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127624739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RankFuzz: Fuzz Testing Based on Comprehensive Evaluation","authors":"Cheng Li, Qiang Wei, Qingxian Wang","doi":"10.1109/MINES.2012.161","DOIUrl":"https://doi.org/10.1109/MINES.2012.161","url":null,"abstract":"It has been proven successful that fuzz testing can successfully find security vulnerabilities in programs. However, traditional black box fuzz testing tools, which randomly mutate the input, are blind and ineffective. The white box fuzzing technology, known as the symbolic execution, is still facing the problem of low efficiency and path explosion. We present a new automated fuzzing technique based on comprehensive evaluation and a tool, Rank Fuzz, that implements this technique. By running dynamic taint analysis, we divide the input into several fields and make a rank to each of them according to the comprehensive evaluation results, in the hope that the potential vulnerability can be quickly found. We use several existing vulnerabilities to assess the reasonability of our evaluation system, finding that Rank Fuzz can effectively locate the bytes triggering the vulnerabilities and all of their ranks are on the top 30% of total fields. We also test two off-the-shelf applications within 8 hours and find 3 new vulnerabilities.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative Filtering with Improved Item Prediction Approach for Enhancing the Accuracy of Recommendation","authors":"Duan Long-zhen, Wang Gui-fen, Ren Yan","doi":"10.1109/MINES.2012.87","DOIUrl":"https://doi.org/10.1109/MINES.2012.87","url":null,"abstract":"Collaborative filtering (CF) is a widely-used technique for generating personalized recommendations. CF systems are typically based on the ratings given by users to items. There are many factors influencing user's rating, beside user's interest and rating scale, item objective character is also the important element. Considering these factors, the improved item prediction approaches present a more rational method to measure user's rating scale, take item objective character into consideration in the processing of prediction. CF with improved prediction approaches are empirically tested in recommendation and shown better recommendation accuracy than traditional CF.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128121174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on a New Kind of Speech Parameter Based on MFCC","authors":"Xiaoyan Wang","doi":"10.1109/MINES.2012.171","DOIUrl":"https://doi.org/10.1109/MINES.2012.171","url":null,"abstract":"Based on Anindya Roy's research, this paper suggests a new kind of speech signal feature: second-order weighted Mel Frequency Cepstrum Coefficients by introducing the method of weighted filter bank analysis. It also studies the weighted factor in the process of obtaining the Inverted Mel Frequency Cepstrum Coefficients and presents the optimal weighted factor. The result of the experiments shows that this new parameter is more robust, and can be applied to generic speech recognition system.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"599 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132656766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Topology Maintenance Algorithm Used for Wireless Sensor Networks","authors":"Deng Cheng, Gao-lei Fei, Zhao Li Fen","doi":"10.1109/MINES.2012.51","DOIUrl":"https://doi.org/10.1109/MINES.2012.51","url":null,"abstract":"Energy efficient is a critical issue in the research and applications of wireless sensor networks(WSN). The topology control scheme has been adopted as an useful measure to guaranty network connectivity and longer lifetime. In this paper, we proposed a topology maintenance algorithm to realize topology reconstruction when a cluster head being dead or a new cluster head elected. The algorithm design depends on the alive node's remain energy and the distance between cluster head and sink node. Analysis and simulation results shown that the algorithm could optimize network topology and achieve longer system lifetime.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"288 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131932855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Evaluation Method for Network Reliability in Ad-Hoc Networks","authors":"Fuhong Lin, Yueyun Chen, Jianwei An, Xianwei Zhou","doi":"10.1109/MINES.2012.63","DOIUrl":"https://doi.org/10.1109/MINES.2012.63","url":null,"abstract":"In this paper we consider reliability models for ad-hoc network which will establish multipath before routing. It is important to obtain the probability of successful communication, for it will affect the user' satisfaction. We first build a static model and there is not any recovery mechanism. Then we analyze four kinds of recovery methods. Lastly, we give some simulation, and found that recovery mechanism can greatly improve the successful communication rate compared to no-recovery mechanism. In recovery method, the best one is centralized failure, distributed recovery (CD).","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133906388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lijing Tong, Guoliang Zhan, Quanyao Peng, Yang Li, Yifan Li
{"title":"Warped Document Image Mosaicing Method Based on Inflection Point Detection and Registration","authors":"Lijing Tong, Guoliang Zhan, Quanyao Peng, Yang Li, Yifan Li","doi":"10.1109/MINES.2012.248","DOIUrl":"https://doi.org/10.1109/MINES.2012.248","url":null,"abstract":"With the popularity of digital camera and the application requirement of digitalized document images, using digital cameras to digitalize document images has become an irresistible trend. However, the warping of the document surface impacts on the quality of the OCR (Optical Character Recognition) recognition system seriously. This paper presents a warped document image mosaicing method based on inflection point detection and image registration. This method mosaics two warped images of the same document from different viewpoints. Firstly, one of the two document images is grizzled, binarized, dilated. Then text line extraction, characteristic sample point detection, curve fitting, and inflection point determining are performed. At last, image registration based on template matching, TRS transform, gray-level interpolation and image mosaicing are done for the two images. After mosaicing, the distortions are mostly removed and the OCR results are improved markedly. Experimental results show that the proposed method can resolve the issue of warped document image recognition more effectively.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117279286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}