{"title":"A Construction Method of QC-LDPC Codes without Short Cycles","authors":"Jianwu Zhang, Chengxia Li, J. Bao","doi":"10.1109/MINES.2012.14","DOIUrl":"https://doi.org/10.1109/MINES.2012.14","url":null,"abstract":"Low-density Parity-check (LDPC) coding is a class of advanced channel coding techniques. To improve the performance of LDPC codes, a simple and effective method to construct QC-LDPC codes without short cycles (cycles of length four and six) is proposed. The approach is especially effective when the parity-check matrix of QC-LDPC codes is composed of circulant permutation matrices. Firstly, we analyze the shapes of the cycles in the exponent matrix, to get the required conditions of no four-cycles and six-cycles. Then we show how to construct the parity-check matrix without four-cycles and six-cycles by filling rows of the exponent matrix with arithmetic sequences. Simulation results show that the proposed codes have better performance than array codes. Though the performance of the proposed codes is not as well as random codes at higher Eb/N0, they can be applied to practical communications because of being encoded in linear time with shift registers.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity-Based Detecting Protocol for Mobile Agent with Onion Itinerary","authors":"Wang Jing, Wu Shu-yue","doi":"10.1109/MINES.2012.123","DOIUrl":"https://doi.org/10.1109/MINES.2012.123","url":null,"abstract":"In this paper a new non-interaction mobile agent detecting protocol is proposed by combining with onion itinerary technology and identity-based. Lastly the security performance of the new protocol is analyzed.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121032126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Evaluation Method of Operational Performance of Emergency Response Plan","authors":"Qing-lan Han, Z. Huang, X. Fan","doi":"10.1109/MINES.2012.187","DOIUrl":"https://doi.org/10.1109/MINES.2012.187","url":null,"abstract":"Synthesize the methods of Delphi, AHP and FCE, and make the object of study which is not clear to be measurable, fuzz up the index and evaluate the emergency response plan effectively. A Case study proves that the method is scientific and operability.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121532496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceptually Deblocking Filtering Algorithm in Multiview Video Decoding","authors":"Yongfang Wang, Zhaoyang Zhang, P. An, Wei Zhang","doi":"10.1109/MINES.2012.155","DOIUrl":"https://doi.org/10.1109/MINES.2012.155","url":null,"abstract":"The deblocking filtering for multiview video coding plays a major role in improving the image visual quality, but it has high computation complexity. This paper proposes a perceptual deblocking filtering algorithm based on just noticeable distortion model. By properly considering of the human visual characteristic, a perceptual deblocking filtering decision is integrated into the deblocking process to decrease computational complexity of the deblocking filtering. Experimental results show that the proposed deblocking filtering algorithm can achieve decoding time saving significantly with negligible quality degradation.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127624739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RankFuzz: Fuzz Testing Based on Comprehensive Evaluation","authors":"Cheng Li, Qiang Wei, Qingxian Wang","doi":"10.1109/MINES.2012.161","DOIUrl":"https://doi.org/10.1109/MINES.2012.161","url":null,"abstract":"It has been proven successful that fuzz testing can successfully find security vulnerabilities in programs. However, traditional black box fuzz testing tools, which randomly mutate the input, are blind and ineffective. The white box fuzzing technology, known as the symbolic execution, is still facing the problem of low efficiency and path explosion. We present a new automated fuzzing technique based on comprehensive evaluation and a tool, Rank Fuzz, that implements this technique. By running dynamic taint analysis, we divide the input into several fields and make a rank to each of them according to the comprehensive evaluation results, in the hope that the potential vulnerability can be quickly found. We use several existing vulnerabilities to assess the reasonability of our evaluation system, finding that Rank Fuzz can effectively locate the bytes triggering the vulnerabilities and all of their ranks are on the top 30% of total fields. We also test two off-the-shelf applications within 8 hours and find 3 new vulnerabilities.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative Filtering with Improved Item Prediction Approach for Enhancing the Accuracy of Recommendation","authors":"Duan Long-zhen, Wang Gui-fen, Ren Yan","doi":"10.1109/MINES.2012.87","DOIUrl":"https://doi.org/10.1109/MINES.2012.87","url":null,"abstract":"Collaborative filtering (CF) is a widely-used technique for generating personalized recommendations. CF systems are typically based on the ratings given by users to items. There are many factors influencing user's rating, beside user's interest and rating scale, item objective character is also the important element. Considering these factors, the improved item prediction approaches present a more rational method to measure user's rating scale, take item objective character into consideration in the processing of prediction. CF with improved prediction approaches are empirically tested in recommendation and shown better recommendation accuracy than traditional CF.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128121174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on a New Kind of Speech Parameter Based on MFCC","authors":"Xiaoyan Wang","doi":"10.1109/MINES.2012.171","DOIUrl":"https://doi.org/10.1109/MINES.2012.171","url":null,"abstract":"Based on Anindya Roy's research, this paper suggests a new kind of speech signal feature: second-order weighted Mel Frequency Cepstrum Coefficients by introducing the method of weighted filter bank analysis. It also studies the weighted factor in the process of obtaining the Inverted Mel Frequency Cepstrum Coefficients and presents the optimal weighted factor. The result of the experiments shows that this new parameter is more robust, and can be applied to generic speech recognition system.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"599 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132656766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Topology Maintenance Algorithm Used for Wireless Sensor Networks","authors":"Deng Cheng, Gao-lei Fei, Zhao Li Fen","doi":"10.1109/MINES.2012.51","DOIUrl":"https://doi.org/10.1109/MINES.2012.51","url":null,"abstract":"Energy efficient is a critical issue in the research and applications of wireless sensor networks(WSN). The topology control scheme has been adopted as an useful measure to guaranty network connectivity and longer lifetime. In this paper, we proposed a topology maintenance algorithm to realize topology reconstruction when a cluster head being dead or a new cluster head elected. The algorithm design depends on the alive node's remain energy and the distance between cluster head and sink node. Analysis and simulation results shown that the algorithm could optimize network topology and achieve longer system lifetime.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"288 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131932855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Prognostic Method for Distributive Patterns of Summer Rainfall Based on Fuzzy Support Vector Machine","authors":"Desheng Fu, L. Xu","doi":"10.1109/MINES.2012.206","DOIUrl":"https://doi.org/10.1109/MINES.2012.206","url":null,"abstract":"Business practices over the years show that three types of rainfall patterns basically reflect the characteristics of summer rainfall in eastern China, and have great practical value for business forecasting. Therefore, in this paper, on the basis of one-versus-one support vector machine multi-classification algorithm, combining with the fuzzy support vector machine, a new model is put forward, and we apply it to the prognosis of summer rainfall pattern. The experiments show that the model has better results than the ordinary one-versus-one SVM multi-classification method and the traditional statistical method on the prognosis experiments of summer rainfall pattern.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114777646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimedia Mashup Markup Language","authors":"Lai-Tee Cheok, Sung-ryeul Rhyu, Jaeyeon Song","doi":"10.1109/MINES.2012.144","DOIUrl":"https://doi.org/10.1109/MINES.2012.144","url":null,"abstract":"Mashups refer to integrating content from disparate sources to create new data for supporting new functionality. By hybridization of information, reusing and remixing available content through associations and recombination, new services can be provided to the users. Although data mashups are not new, mashups of multimedia content is still in its infancy. We propose a new language - Multimedia Mash up Markup Language (M3L) - that enables flexible access and easy combination of multimedia content. We first describe state-of-the-art in mashups before presenting our proposed language, while emphasizing its distinct features compared with state-of-the-art. We also propose extending Synchronized Multimedia Integration Language (SMIL) to support logic for data manipulation necessary for handling result set processing.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114757715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}