2012 Fourth International Conference on Multimedia Information Networking and Security最新文献

筛选
英文 中文
A Construction Method of QC-LDPC Codes without Short Cycles 一种无短周期QC-LDPC码的构建方法
Jianwu Zhang, Chengxia Li, J. Bao
{"title":"A Construction Method of QC-LDPC Codes without Short Cycles","authors":"Jianwu Zhang, Chengxia Li, J. Bao","doi":"10.1109/MINES.2012.14","DOIUrl":"https://doi.org/10.1109/MINES.2012.14","url":null,"abstract":"Low-density Parity-check (LDPC) coding is a class of advanced channel coding techniques. To improve the performance of LDPC codes, a simple and effective method to construct QC-LDPC codes without short cycles (cycles of length four and six) is proposed. The approach is especially effective when the parity-check matrix of QC-LDPC codes is composed of circulant permutation matrices. Firstly, we analyze the shapes of the cycles in the exponent matrix, to get the required conditions of no four-cycles and six-cycles. Then we show how to construct the parity-check matrix without four-cycles and six-cycles by filling rows of the exponent matrix with arithmetic sequences. Simulation results show that the proposed codes have better performance than array codes. Though the performance of the proposed codes is not as well as random codes at higher Eb/N0, they can be applied to practical communications because of being encoded in linear time with shift registers.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identity-Based Detecting Protocol for Mobile Agent with Onion Itinerary 基于身份的洋葱行程移动代理检测协议
Wang Jing, Wu Shu-yue
{"title":"Identity-Based Detecting Protocol for Mobile Agent with Onion Itinerary","authors":"Wang Jing, Wu Shu-yue","doi":"10.1109/MINES.2012.123","DOIUrl":"https://doi.org/10.1109/MINES.2012.123","url":null,"abstract":"In this paper a new non-interaction mobile agent detecting protocol is proposed by combining with onion itinerary technology and identity-based. Lastly the security performance of the new protocol is analyzed.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121032126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the Evaluation Method of Operational Performance of Emergency Response Plan 应急预案运行绩效评价方法研究
Qing-lan Han, Z. Huang, X. Fan
{"title":"Research on the Evaluation Method of Operational Performance of Emergency Response Plan","authors":"Qing-lan Han, Z. Huang, X. Fan","doi":"10.1109/MINES.2012.187","DOIUrl":"https://doi.org/10.1109/MINES.2012.187","url":null,"abstract":"Synthesize the methods of Delphi, AHP and FCE, and make the object of study which is not clear to be measurable, fuzz up the index and evaluate the emergency response plan effectively. A Case study proves that the method is scientific and operability.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121532496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Perceptually Deblocking Filtering Algorithm in Multiview Video Decoding 多视点视频解码中的感知去块滤波算法
Yongfang Wang, Zhaoyang Zhang, P. An, Wei Zhang
{"title":"Perceptually Deblocking Filtering Algorithm in Multiview Video Decoding","authors":"Yongfang Wang, Zhaoyang Zhang, P. An, Wei Zhang","doi":"10.1109/MINES.2012.155","DOIUrl":"https://doi.org/10.1109/MINES.2012.155","url":null,"abstract":"The deblocking filtering for multiview video coding plays a major role in improving the image visual quality, but it has high computation complexity. This paper proposes a perceptual deblocking filtering algorithm based on just noticeable distortion model. By properly considering of the human visual characteristic, a perceptual deblocking filtering decision is integrated into the deblocking process to decrease computational complexity of the deblocking filtering. Experimental results show that the proposed deblocking filtering algorithm can achieve decoding time saving significantly with negligible quality degradation.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127624739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RankFuzz: Fuzz Testing Based on Comprehensive Evaluation RankFuzz:基于综合评价的模糊测试
Cheng Li, Qiang Wei, Qingxian Wang
{"title":"RankFuzz: Fuzz Testing Based on Comprehensive Evaluation","authors":"Cheng Li, Qiang Wei, Qingxian Wang","doi":"10.1109/MINES.2012.161","DOIUrl":"https://doi.org/10.1109/MINES.2012.161","url":null,"abstract":"It has been proven successful that fuzz testing can successfully find security vulnerabilities in programs. However, traditional black box fuzz testing tools, which randomly mutate the input, are blind and ineffective. The white box fuzzing technology, known as the symbolic execution, is still facing the problem of low efficiency and path explosion. We present a new automated fuzzing technique based on comprehensive evaluation and a tool, Rank Fuzz, that implements this technique. By running dynamic taint analysis, we divide the input into several fields and make a rank to each of them according to the comprehensive evaluation results, in the hope that the potential vulnerability can be quickly found. We use several existing vulnerabilities to assess the reasonability of our evaluation system, finding that Rank Fuzz can effectively locate the bytes triggering the vulnerabilities and all of their ranks are on the top 30% of total fields. We also test two off-the-shelf applications within 8 hours and find 3 new vulnerabilities.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collaborative Filtering with Improved Item Prediction Approach for Enhancing the Accuracy of Recommendation 协同过滤与改进的项目预测方法提高推荐的准确性
Duan Long-zhen, Wang Gui-fen, Ren Yan
{"title":"Collaborative Filtering with Improved Item Prediction Approach for Enhancing the Accuracy of Recommendation","authors":"Duan Long-zhen, Wang Gui-fen, Ren Yan","doi":"10.1109/MINES.2012.87","DOIUrl":"https://doi.org/10.1109/MINES.2012.87","url":null,"abstract":"Collaborative filtering (CF) is a widely-used technique for generating personalized recommendations. CF systems are typically based on the ratings given by users to items. There are many factors influencing user's rating, beside user's interest and rating scale, item objective character is also the important element. Considering these factors, the improved item prediction approaches present a more rational method to measure user's rating scale, take item objective character into consideration in the processing of prediction. CF with improved prediction approaches are empirically tested in recommendation and shown better recommendation accuracy than traditional CF.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128121174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on a New Kind of Speech Parameter Based on MFCC 一种基于MFCC的新型语音参数研究
Xiaoyan Wang
{"title":"Research on a New Kind of Speech Parameter Based on MFCC","authors":"Xiaoyan Wang","doi":"10.1109/MINES.2012.171","DOIUrl":"https://doi.org/10.1109/MINES.2012.171","url":null,"abstract":"Based on Anindya Roy's research, this paper suggests a new kind of speech signal feature: second-order weighted Mel Frequency Cepstrum Coefficients by introducing the method of weighted filter bank analysis. It also studies the weighted factor in the process of obtaining the Inverted Mel Frequency Cepstrum Coefficients and presents the optimal weighted factor. The result of the experiments shows that this new parameter is more robust, and can be applied to generic speech recognition system.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"599 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132656766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Topology Maintenance Algorithm Used for Wireless Sensor Networks 一种用于无线传感器网络的拓扑维护算法
Deng Cheng, Gao-lei Fei, Zhao Li Fen
{"title":"A Topology Maintenance Algorithm Used for Wireless Sensor Networks","authors":"Deng Cheng, Gao-lei Fei, Zhao Li Fen","doi":"10.1109/MINES.2012.51","DOIUrl":"https://doi.org/10.1109/MINES.2012.51","url":null,"abstract":"Energy efficient is a critical issue in the research and applications of wireless sensor networks(WSN). The topology control scheme has been adopted as an useful measure to guaranty network connectivity and longer lifetime. In this paper, we proposed a topology maintenance algorithm to realize topology reconstruction when a cluster head being dead or a new cluster head elected. The algorithm design depends on the alive node's remain energy and the distance between cluster head and sink node. Analysis and simulation results shown that the algorithm could optimize network topology and achieve longer system lifetime.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"288 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131932855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Study of Prognostic Method for Distributive Patterns of Summer Rainfall Based on Fuzzy Support Vector Machine 基于模糊支持向量机的夏季降水分布模式预测方法研究
Desheng Fu, L. Xu
{"title":"Study of Prognostic Method for Distributive Patterns of Summer Rainfall Based on Fuzzy Support Vector Machine","authors":"Desheng Fu, L. Xu","doi":"10.1109/MINES.2012.206","DOIUrl":"https://doi.org/10.1109/MINES.2012.206","url":null,"abstract":"Business practices over the years show that three types of rainfall patterns basically reflect the characteristics of summer rainfall in eastern China, and have great practical value for business forecasting. Therefore, in this paper, on the basis of one-versus-one support vector machine multi-classification algorithm, combining with the fuzzy support vector machine, a new model is put forward, and we apply it to the prognosis of summer rainfall pattern. The experiments show that the model has better results than the ordinary one-versus-one SVM multi-classification method and the traditional statistical method on the prognosis experiments of summer rainfall pattern.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114777646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multimedia Mashup Markup Language 多媒体混搭标记语言
Lai-Tee Cheok, Sung-ryeul Rhyu, Jaeyeon Song
{"title":"Multimedia Mashup Markup Language","authors":"Lai-Tee Cheok, Sung-ryeul Rhyu, Jaeyeon Song","doi":"10.1109/MINES.2012.144","DOIUrl":"https://doi.org/10.1109/MINES.2012.144","url":null,"abstract":"Mashups refer to integrating content from disparate sources to create new data for supporting new functionality. By hybridization of information, reusing and remixing available content through associations and recombination, new services can be provided to the users. Although data mashups are not new, mashups of multimedia content is still in its infancy. We propose a new language - Multimedia Mash up Markup Language (M3L) - that enables flexible access and easy combination of multimedia content. We first describe state-of-the-art in mashups before presenting our proposed language, while emphasizing its distinct features compared with state-of-the-art. We also propose extending Synchronized Multimedia Integration Language (SMIL) to support logic for data manipulation necessary for handling result set processing.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114757715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信