2012 Fourth International Conference on Multimedia Information Networking and Security最新文献

筛选
英文 中文
Text Encryption Algorithm Based on Natural Language Processing 基于自然语言处理的文本加密算法
Xianghe Jing, Yu Hao, Huaping Fei, Zhijun Li
{"title":"Text Encryption Algorithm Based on Natural Language Processing","authors":"Xianghe Jing, Yu Hao, Huaping Fei, Zhijun Li","doi":"10.1109/MINES.2012.216","DOIUrl":"https://doi.org/10.1109/MINES.2012.216","url":null,"abstract":"Text encryption technique is one of effective means of information security. On the basis of analyzing the parallels between text watermarking and text encryption, a text encryption algorithm based on natural language processing is proposed. Three linguistic transformations in natural language processing are introduced. Finally, the requirements and the process of the text encryption algorithm are provided.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114770535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Sunspot Time Sequences Prediction Based on Process Neural Network and Quantum Particle Swarm 基于过程神经网络和量子粒子群的太阳黑子时间序列预测
Zhi-gang Liu, Juan Du
{"title":"Sunspot Time Sequences Prediction Based on Process Neural Network and Quantum Particle Swarm","authors":"Zhi-gang Liu, Juan Du","doi":"10.1109/MINES.2012.212","DOIUrl":"https://doi.org/10.1109/MINES.2012.212","url":null,"abstract":"Aiming at the problem that difficulty of expression of the temporal accumulation in the time series prediction using artificial neural network, a prediction method which uses the process neural network is presented. The algorithm of quantum particle swarm is designed which has double chain structure and is used to train the process neural network. The algorithm used quantum bits to construct chromosomes. For the given model of process neural network, the number of genes on a chromosome is determined by the number of weight parameters and population coding is completed. Individuals in the population are updated by new quantum rotation gate and mutated by quantum non-gate. In the algorithm, each chromosome carries double chains of genes. This method can improve the possibility of optimums, expand the traverse of solution space and accelerate optimization process for process neural network. The effectiveness of the method and training algorithm are proved by the Mackey-Glass time series prediction. The simulation result shows that the method has not only high precision and fast convergence.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116671903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Use Habit, Continue Use and WOM for SST: Based on E-banking SST的使用习惯、持续使用和口碑:基于电子银行
Wang Xinhao, Dong Dahai
{"title":"Use Habit, Continue Use and WOM for SST: Based on E-banking","authors":"Wang Xinhao, Dong Dahai","doi":"10.1109/MINES.2012.246","DOIUrl":"https://doi.org/10.1109/MINES.2012.246","url":null,"abstract":"Self-service is a kind of technology which permits customers getting service without employee's anticipation. More and more enterprises adopt self-service technology. However, researchers consider technology as background in researches of influencing factors of adoption and continuing use. Previous researches didn't consider enterprise's competition, that is, customer loyalty. As a new behavior style, customer loyalty for self-service technology is different from customer loyalty for traditional products. The thesis adopts using rabbit to construct of loyalty, and discusses influence of satisfaction and switching cost for rabbit, WOM and willingness of premium payment. The research proves by data from e-banking customers that customer satisfaction positively influences using rabbit and WOM and switching cost positively influencing premium payment. The research expands traditional researches in traditional loyalty field. At the same time, the research guides enterprises to employ self-service technology.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117122861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Warped Document Image Mosaicing Method Based on Inflection Point Detection and Registration 基于拐点检测与配准的扭曲文档图像拼接方法
Lijing Tong, Guoliang Zhan, Quanyao Peng, Yang Li, Yifan Li
{"title":"Warped Document Image Mosaicing Method Based on Inflection Point Detection and Registration","authors":"Lijing Tong, Guoliang Zhan, Quanyao Peng, Yang Li, Yifan Li","doi":"10.1109/MINES.2012.248","DOIUrl":"https://doi.org/10.1109/MINES.2012.248","url":null,"abstract":"With the popularity of digital camera and the application requirement of digitalized document images, using digital cameras to digitalize document images has become an irresistible trend. However, the warping of the document surface impacts on the quality of the OCR (Optical Character Recognition) recognition system seriously. This paper presents a warped document image mosaicing method based on inflection point detection and image registration. This method mosaics two warped images of the same document from different viewpoints. Firstly, one of the two document images is grizzled, binarized, dilated. Then text line extraction, characteristic sample point detection, curve fitting, and inflection point determining are performed. At last, image registration based on template matching, TRS transform, gray-level interpolation and image mosaicing are done for the two images. After mosaicing, the distortions are mostly removed and the OCR results are improved markedly. Experimental results show that the proposed method can resolve the issue of warped document image recognition more effectively.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117279286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Multi-objective Genetic Algorithm Based on Simulated Annealing 基于模拟退火的多目标遗传算法
Tang Xin-Hua, Chang Xu, Fang Zhifeng
{"title":"A Multi-objective Genetic Algorithm Based on Simulated Annealing","authors":"Tang Xin-Hua, Chang Xu, Fang Zhifeng","doi":"10.1109/MINES.2012.34","DOIUrl":"https://doi.org/10.1109/MINES.2012.34","url":null,"abstract":"Combined the characteristic of simulated annealing, we propose a multi-objective genetic algorithm based on simulated annealing. We take the advantage of simulated annealing, improve the traditional multi-objective genetic algorithm, and avoid the premature convergence of the algorithm. Experimental results show that the improved algorithm improve the solution efficiency of the traditional multi-objective genetic algorithm, and avoid the premature convergence of the algorithm effectively.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123259449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on the Evaluation for Intention of the Insured of New Rural Pension Insurance Program 新型农村养老保险参保意愿评价研究
Ying Guo
{"title":"Research on the Evaluation for Intention of the Insured of New Rural Pension Insurance Program","authors":"Ying Guo","doi":"10.1109/MINES.2012.186","DOIUrl":"https://doi.org/10.1109/MINES.2012.186","url":null,"abstract":"Along with the implementation of the new rural pension insurance program, it faces a challenge. It is also seems to be very important and meaningful to research and evaluation the intention of farmers. According to the characteristics of the new rural pension insurance program, the intention of the Insured index system is established. And the fuzzy comprehensive evaluation method combining with analytical hierarchy process (AHP) is adopted to evaluate insured wishes index system. The results show that the model and method has been proved useful and effective by actual example.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123981120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Customer Value Creation Capacity System and Its Enhance Mechanism 顾客价值创造能力体系及其提升机制
Chunhua Xin, Yutong Zhu, Fang Xin
{"title":"Customer Value Creation Capacity System and Its Enhance Mechanism","authors":"Chunhua Xin, Yutong Zhu, Fang Xin","doi":"10.1109/MINES.2012.91","DOIUrl":"https://doi.org/10.1109/MINES.2012.91","url":null,"abstract":"Due to outstanding performance deriving from superior value offered for customers, enterprise should focus on constantly nurturing and enhancing the capabilities of customer value creation. Firstly, the paper defined implication and structure of customer value creation capability system. Secondly, the mechanism model and integration framework of customer value creation capacity promotion were proposed. It was argued that enterprise customer value creation capability was a capability system consisted of various correlative elements, and its enhancement need improve each capability element level and achieve coordinated development of all capability elements.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128427639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Threat Behavior Detection and Trend Analysis Based on the Collaborative Model 基于协同模型的网络威胁行为检测与趋势分析
Dong Ma, Yongjun Wang
{"title":"Network Threat Behavior Detection and Trend Analysis Based on the Collaborative Model","authors":"Dong Ma, Yongjun Wang","doi":"10.1109/MINES.2012.148","DOIUrl":"https://doi.org/10.1109/MINES.2012.148","url":null,"abstract":"In this paper, we present a network detection method based on collaborative model of network threat attacks, as well as trend analysis of network structure. First of all, the collaborative model is given a specific framework, build process and collaborative mechanisms. Then ripe for pattern matching algorithm and behavioral sequence template for a simple introduction to this approach, and explains how to use the collaborative model structure. Finally, the security situation of the entire network is analyzed by a quantitative situation evaluating model, The experiment results shows that, during its running in an intranet security guard system of a large enterprise, the next-step attack can be predicted by our algorithm, and the security situation of the entire network can be accurately evaluated as well.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128559885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Turbo Coded Wireless Link for SISO, SIMO, MISO and MIMO System SISO、SIMO、MISO和MIMO系统中Turbo编码无线链路的性能
M. Kamruzzaman
{"title":"Performance of Turbo Coded Wireless Link for SISO, SIMO, MISO and MIMO System","authors":"M. Kamruzzaman","doi":"10.1109/MINES.2012.158","DOIUrl":"https://doi.org/10.1109/MINES.2012.158","url":null,"abstract":"This paper compares the performance of a Turbo coded wireless link for SISO, SIMO, MISO and MIMO system with uncoded wireless link for SISO, SIMO, MISO and MIMO system in the presence of ray Leigh fading. Turbo encoder encodes the input information bits and sends to 64 QAM modulator. Modulated symbols are mapped by STBC. Outputs of STBC split into n streams which are simultaneously transmitted using single transmit antennas for Turbo-SIMO system and n transmit antennas for Turbo-MISO and Turbo-MIMO system. The Rayleigh fading effected received signal at receive antenna is a linear superposition of the transmitted signals. It is observed that the Turbo-SISO system provides 45 dB coding gain, Turbo-SIMO system provides 27,20 and 17 dB coding gain for 2, 3 and 4 receive antenna respectively, Turbo-MISO system provides 26, 19 and 15 dB coding gain for 2, 3 and 4 transmit antenna respectively, Turbo-MIMO system provides 12 to 17 dB coding gain for different combination of transmit and receive antennas at a BER of 10-6 compared to uncoded SISO, SIMO, MISO and MIMO system.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130886774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Routing Attack in the ND and SEND Mixed Environment ND和SEND混合环境下的路由攻击
Hou Yi, Wang Zhen-xing, Wang Yu, Zhang Lian-cheng
{"title":"Routing Attack in the ND and SEND Mixed Environment","authors":"Hou Yi, Wang Zhen-xing, Wang Yu, Zhang Lian-cheng","doi":"10.1109/MINES.2012.196","DOIUrl":"https://doi.org/10.1109/MINES.2012.196","url":null,"abstract":"With the deployment of IPv6 and the rising threat of ND security issues, SEND is desiderated to be deployed in subnets. SEND binds the node's identifier to IP address and adds the digital signature to its message to resist hijacking and man-in-the-middle attacks. However, during the stage of transition, the coexistence of ND and SEND may cause security issues. This paper analyzes the specific security vulnerabilities in the mixed environment of SEND and ND, and proposes a method of routing attack in the coexistence environment, which takes advantages of the source address selection algorithm to induce the host to send packets through the unsecure addresses and routers, in order to bypass the protection of router advertisement and the authentication of router identity by SEND option. The research of this paper will help the wide deployment of SEND mechanism and provide protection for the IPv6 subnets.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129908355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信