2012 Fourth International Conference on Multimedia Information Networking and Security最新文献

筛选
英文 中文
An Evaluation Method for Network Reliability in Ad-Hoc Networks Ad-Hoc网络中网络可靠性的评估方法
Fuhong Lin, Yueyun Chen, Jianwei An, Xianwei Zhou
{"title":"An Evaluation Method for Network Reliability in Ad-Hoc Networks","authors":"Fuhong Lin, Yueyun Chen, Jianwei An, Xianwei Zhou","doi":"10.1109/MINES.2012.63","DOIUrl":"https://doi.org/10.1109/MINES.2012.63","url":null,"abstract":"In this paper we consider reliability models for ad-hoc network which will establish multipath before routing. It is important to obtain the probability of successful communication, for it will affect the user' satisfaction. We first build a static model and there is not any recovery mechanism. Then we analyze four kinds of recovery methods. Lastly, we give some simulation, and found that recovery mechanism can greatly improve the successful communication rate compared to no-recovery mechanism. In recovery method, the best one is centralized failure, distributed recovery (CD).","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133906388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New Strategic Management Business Models for New Technology-Based Firms 新技术企业的新战略管理商业模式
Zheng-yin Peng
{"title":"New Strategic Management Business Models for New Technology-Based Firms","authors":"Zheng-yin Peng","doi":"10.1109/MINES.2012.149","DOIUrl":"https://doi.org/10.1109/MINES.2012.149","url":null,"abstract":"New technology-based firms, particularly those that develop their business around a new technological platform, are likely to be impacted by globalization, in terms of both pace of innovation and pressure of competition. In practice strategic decisions concern each of these processes and address issues such as organizational boundaries, location of the operational activities, what activities to focus on and selection of value partners. The business model by which firms operate needs also to accommodate the spatial dimensions indicated by globalization; and the emergence of global technology markets. This paper presents a review of the business model literature from which a generic business model framework is derived, identifying and introducing the main elements of these processes as the firms' focus, modus and locus.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124003973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study on Countermeasures to Dairy Supply Chain Quality Security Control 乳品供应链质量安全控制对策研究
Congna Quan, Huifeng Zhao
{"title":"Study on Countermeasures to Dairy Supply Chain Quality Security Control","authors":"Congna Quan, Huifeng Zhao","doi":"10.1109/MINES.2012.208","DOIUrl":"https://doi.org/10.1109/MINES.2012.208","url":null,"abstract":"Quality security of dairy products is directly related to consumers' health and life security, so the primary objective of Dairy supply chain is to safeguard the security. Based on the basic idea of supply chain management, this article illustrated the characteristics of the dairy supply chain, analyzed the dairy supply chain management problems and put forward the countermeasures to dairy supply chain quality security control.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124105705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Agent Formal Model for Autonomous Decision-Making 自主决策的Agent形式化模型
Linjin Wu, Dongying Wu, Jiayong Chen, Wenxiong Li
{"title":"An Agent Formal Model for Autonomous Decision-Making","authors":"Linjin Wu, Dongying Wu, Jiayong Chen, Wenxiong Li","doi":"10.1109/MINES.2012.59","DOIUrl":"https://doi.org/10.1109/MINES.2012.59","url":null,"abstract":"With the development of artificial intelligence, agent is widely applied to the intelligent system. As the intelligent decision at a higher sense, autonomous decision-making directly affects the intelligent level of intelligent system. In order to improve autonomous decision-making ability of intelligent system, the paper aims to use formal method to research on the process of autonomous decision-making. Combining the feature of autonomous decision-making and agent formal method, the paper puts forward an agent model for autonomous decision-making, namely-ADAM(Autonomous Decision-making Agent Model). The model mainly includes five parts: data pretreatment, decision-making response, decision-making execution, decision-making evaluation and learning feedback. Then the paper gives the formal description of ADAM, which realizes formal analysis for the process of autonomous decision-making. Finally, the paper points out the realized critical point of the model and preliminary demonstrates validity of the model.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Face Database Development of Science and Technology Expects Based on Web Mining 基于Web挖掘的人脸数据库科技展望
Chunxia Yang, Yunyang Yan, Quanyin Zhu
{"title":"The Face Database Development of Science and Technology Expects Based on Web Mining","authors":"Chunxia Yang, Yunyang Yan, Quanyin Zhu","doi":"10.1109/MINES.2012.225","DOIUrl":"https://doi.org/10.1109/MINES.2012.225","url":null,"abstract":"For the Face database system by Web mining of science and technology experts, the Web mining data include the faces of science and technology experts, name, gender, title, schools and other properties. The Python programming language and the establishment of the Django framework are used in the proposed system. According to the Web extracting, the basic information of science and technology experts is extracted by the URL filtering. The face data of science and technology experts extracting is obtained by OpenCV libraries. As a result, it can detect face and cut them out. The extraction also adopts the semantic analysis method which uses predefined keywords segmented in the web page text to calculate the shortest distance. The face date of science and technical experts downloaded are deposited in local folder, and then the absolute path got by means of folder traversal is stored in the MySQL database system which can achieve the query and statistics of basic information of science and technical experts.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129038352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring the Operating Mode of Computational Stylistics: Taking Affective Computing as an Example 试论计算文体学的运作模式——以情感计算为例
C. Liu, Min Luo, Chunhua Jiang
{"title":"Exploring the Operating Mode of Computational Stylistics: Taking Affective Computing as an Example","authors":"C. Liu, Min Luo, Chunhua Jiang","doi":"10.1109/MINES.2012.110","DOIUrl":"https://doi.org/10.1109/MINES.2012.110","url":null,"abstract":"On the study of stylistic calculation cases, under the theoretical guidance of computational linguistics, corpus linguistics, and statistics., this paper explores the definition and operating mode of computational stylistics, taking affective computing in Mansfield as a case study put forward a common mode of operation. by using Term Connection Techniques, and prove the feasibility of this mode.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116648633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Apply Grey Prediction in the Agriculture Production Price 灰色预测在农业生产价格中的应用
Jiajun Zong, Quanyin Zhu
{"title":"Apply Grey Prediction in the Agriculture Production Price","authors":"Jiajun Zong, Quanyin Zhu","doi":"10.1109/MINES.2012.78","DOIUrl":"https://doi.org/10.1109/MINES.2012.78","url":null,"abstract":"In order to get the excellent accuracy for price forecast in the agriculture products market, the Grey Prediction method is utilized to forecast the price of the agriculture products in this paper. Ten agriculture products, which extracted from Agricultural Bank of China at January, 2011 to December 2011, are selected to forecast the price about four weeks and compare the Mean Absolute Percentage Errors (MAPE) by Grey Method (GM) and RBF Neural Network (NN). Experiments demonstrate that the GM(1, 1) is not good for forecasting the agriculture products price and is not stable too. While the RBF NN is better then the GM(1, 1). Experiment results prove that this verdict is meaningful and useful to analyze and to research the price forecast in the agriculture products market.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116798588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Security for Networks Virtual Access of Cloud Computing 云计算的网络虚拟访问安全
Qunying Sun, Zhiyuan Hu
{"title":"Security for Networks Virtual Access of Cloud Computing","authors":"Qunying Sun, Zhiyuan Hu","doi":"10.1109/MINES.2012.200","DOIUrl":"https://doi.org/10.1109/MINES.2012.200","url":null,"abstract":"The security level of networks virtual access is one of the key indexes to evaluate the IaaS capability in cloud computing. Due to the introduction of virtualization technology, the boundaries of physical security domain have been broken and thus the traditional network access security and management strategies are not applicable any longer. Therefore, the security management of convergence between virtualization server and network has attracted more and more attention. In this paper, the challenges of networks virtual access are analyzed, and then referring to the study of standardization organizations, an overview of the existing technical solutions is presented from three aspects: the virtual security domains, traffic protection and traffic management. In addition, several related products and solutions of IT enterprises are introduced. At last, this paper argues there is still much improvement space for existing technology and product solutions.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116299444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Matrix Embedding with Error Correction Capabilities 具有纠错能力的矩阵嵌入分析
Zhenxing Qian, Xinpeng Zhang
{"title":"Analysis of Matrix Embedding with Error Correction Capabilities","authors":"Zhenxing Qian, Xinpeng Zhang","doi":"10.1109/MINES.2012.75","DOIUrl":"https://doi.org/10.1109/MINES.2012.75","url":null,"abstract":"Matrix embedding with error correction capabilities is analyzed in this paper. We try to give an answer to the question, “matrix embedding (ME) first or error correction encoding (EC) first, which one is better?” To this end, two feasible frameworks are designed and theoretically analyzed. Bounds of embedding payloads and efficiencies are presented corresponding to different distortions and error correction capabilities. Results show that the framework of “matrix embedding first” has a better performance.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127311956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Particle Swarm Optimization Algorithm for Quadratic Assignment Problem 二次分配问题的改进粒子群优化算法
Congying Lv
{"title":"An Improved Particle Swarm Optimization Algorithm for Quadratic Assignment Problem","authors":"Congying Lv","doi":"10.1109/MINES.2012.68","DOIUrl":"https://doi.org/10.1109/MINES.2012.68","url":null,"abstract":"In this paper, we use an improved particle swarm optimization (via presenting the concept of swap operator and swap sequence) to solve the quadratic assignment problem. The results from the experiments on different quadratic assignment problem instances show that the improved particle swarm optimization algorithm can achieve good results.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125265239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信