{"title":"An Evaluation Method for Network Reliability in Ad-Hoc Networks","authors":"Fuhong Lin, Yueyun Chen, Jianwei An, Xianwei Zhou","doi":"10.1109/MINES.2012.63","DOIUrl":"https://doi.org/10.1109/MINES.2012.63","url":null,"abstract":"In this paper we consider reliability models for ad-hoc network which will establish multipath before routing. It is important to obtain the probability of successful communication, for it will affect the user' satisfaction. We first build a static model and there is not any recovery mechanism. Then we analyze four kinds of recovery methods. Lastly, we give some simulation, and found that recovery mechanism can greatly improve the successful communication rate compared to no-recovery mechanism. In recovery method, the best one is centralized failure, distributed recovery (CD).","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133906388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Strategic Management Business Models for New Technology-Based Firms","authors":"Zheng-yin Peng","doi":"10.1109/MINES.2012.149","DOIUrl":"https://doi.org/10.1109/MINES.2012.149","url":null,"abstract":"New technology-based firms, particularly those that develop their business around a new technological platform, are likely to be impacted by globalization, in terms of both pace of innovation and pressure of competition. In practice strategic decisions concern each of these processes and address issues such as organizational boundaries, location of the operational activities, what activities to focus on and selection of value partners. The business model by which firms operate needs also to accommodate the spatial dimensions indicated by globalization; and the emergence of global technology markets. This paper presents a review of the business model literature from which a generic business model framework is derived, identifying and introducing the main elements of these processes as the firms' focus, modus and locus.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124003973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Countermeasures to Dairy Supply Chain Quality Security Control","authors":"Congna Quan, Huifeng Zhao","doi":"10.1109/MINES.2012.208","DOIUrl":"https://doi.org/10.1109/MINES.2012.208","url":null,"abstract":"Quality security of dairy products is directly related to consumers' health and life security, so the primary objective of Dairy supply chain is to safeguard the security. Based on the basic idea of supply chain management, this article illustrated the characteristics of the dairy supply chain, analyzed the dairy supply chain management problems and put forward the countermeasures to dairy supply chain quality security control.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124105705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Agent Formal Model for Autonomous Decision-Making","authors":"Linjin Wu, Dongying Wu, Jiayong Chen, Wenxiong Li","doi":"10.1109/MINES.2012.59","DOIUrl":"https://doi.org/10.1109/MINES.2012.59","url":null,"abstract":"With the development of artificial intelligence, agent is widely applied to the intelligent system. As the intelligent decision at a higher sense, autonomous decision-making directly affects the intelligent level of intelligent system. In order to improve autonomous decision-making ability of intelligent system, the paper aims to use formal method to research on the process of autonomous decision-making. Combining the feature of autonomous decision-making and agent formal method, the paper puts forward an agent model for autonomous decision-making, namely-ADAM(Autonomous Decision-making Agent Model). The model mainly includes five parts: data pretreatment, decision-making response, decision-making execution, decision-making evaluation and learning feedback. Then the paper gives the formal description of ADAM, which realizes formal analysis for the process of autonomous decision-making. Finally, the paper points out the realized critical point of the model and preliminary demonstrates validity of the model.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Face Database Development of Science and Technology Expects Based on Web Mining","authors":"Chunxia Yang, Yunyang Yan, Quanyin Zhu","doi":"10.1109/MINES.2012.225","DOIUrl":"https://doi.org/10.1109/MINES.2012.225","url":null,"abstract":"For the Face database system by Web mining of science and technology experts, the Web mining data include the faces of science and technology experts, name, gender, title, schools and other properties. The Python programming language and the establishment of the Django framework are used in the proposed system. According to the Web extracting, the basic information of science and technology experts is extracted by the URL filtering. The face data of science and technology experts extracting is obtained by OpenCV libraries. As a result, it can detect face and cut them out. The extraction also adopts the semantic analysis method which uses predefined keywords segmented in the web page text to calculate the shortest distance. The face date of science and technical experts downloaded are deposited in local folder, and then the absolute path got by means of folder traversal is stored in the MySQL database system which can achieve the query and statistics of basic information of science and technical experts.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129038352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Operating Mode of Computational Stylistics: Taking Affective Computing as an Example","authors":"C. Liu, Min Luo, Chunhua Jiang","doi":"10.1109/MINES.2012.110","DOIUrl":"https://doi.org/10.1109/MINES.2012.110","url":null,"abstract":"On the study of stylistic calculation cases, under the theoretical guidance of computational linguistics, corpus linguistics, and statistics., this paper explores the definition and operating mode of computational stylistics, taking affective computing in Mansfield as a case study put forward a common mode of operation. by using Term Connection Techniques, and prove the feasibility of this mode.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116648633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Apply Grey Prediction in the Agriculture Production Price","authors":"Jiajun Zong, Quanyin Zhu","doi":"10.1109/MINES.2012.78","DOIUrl":"https://doi.org/10.1109/MINES.2012.78","url":null,"abstract":"In order to get the excellent accuracy for price forecast in the agriculture products market, the Grey Prediction method is utilized to forecast the price of the agriculture products in this paper. Ten agriculture products, which extracted from Agricultural Bank of China at January, 2011 to December 2011, are selected to forecast the price about four weeks and compare the Mean Absolute Percentage Errors (MAPE) by Grey Method (GM) and RBF Neural Network (NN). Experiments demonstrate that the GM(1, 1) is not good for forecasting the agriculture products price and is not stable too. While the RBF NN is better then the GM(1, 1). Experiment results prove that this verdict is meaningful and useful to analyze and to research the price forecast in the agriculture products market.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116798588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security for Networks Virtual Access of Cloud Computing","authors":"Qunying Sun, Zhiyuan Hu","doi":"10.1109/MINES.2012.200","DOIUrl":"https://doi.org/10.1109/MINES.2012.200","url":null,"abstract":"The security level of networks virtual access is one of the key indexes to evaluate the IaaS capability in cloud computing. Due to the introduction of virtualization technology, the boundaries of physical security domain have been broken and thus the traditional network access security and management strategies are not applicable any longer. Therefore, the security management of convergence between virtualization server and network has attracted more and more attention. In this paper, the challenges of networks virtual access are analyzed, and then referring to the study of standardization organizations, an overview of the existing technical solutions is presented from three aspects: the virtual security domains, traffic protection and traffic management. In addition, several related products and solutions of IT enterprises are introduced. At last, this paper argues there is still much improvement space for existing technology and product solutions.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116299444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Matrix Embedding with Error Correction Capabilities","authors":"Zhenxing Qian, Xinpeng Zhang","doi":"10.1109/MINES.2012.75","DOIUrl":"https://doi.org/10.1109/MINES.2012.75","url":null,"abstract":"Matrix embedding with error correction capabilities is analyzed in this paper. We try to give an answer to the question, “matrix embedding (ME) first or error correction encoding (EC) first, which one is better?” To this end, two feasible frameworks are designed and theoretically analyzed. Bounds of embedding payloads and efficiencies are presented corresponding to different distortions and error correction capabilities. Results show that the framework of “matrix embedding first” has a better performance.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127311956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Particle Swarm Optimization Algorithm for Quadratic Assignment Problem","authors":"Congying Lv","doi":"10.1109/MINES.2012.68","DOIUrl":"https://doi.org/10.1109/MINES.2012.68","url":null,"abstract":"In this paper, we use an improved particle swarm optimization (via presenting the concept of swap operator and swap sequence) to solve the quadratic assignment problem. The results from the experiments on different quadratic assignment problem instances show that the improved particle swarm optimization algorithm can achieve good results.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125265239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}