2012 Fourth International Conference on Multimedia Information Networking and Security最新文献

筛选
英文 中文
Trust Evaluation Model and Algorithm Based on Fuzzy Theory for E-commerce 基于模糊理论的电子商务信任评价模型及算法
Yingying Han, Wenbao Jiang
{"title":"Trust Evaluation Model and Algorithm Based on Fuzzy Theory for E-commerce","authors":"Yingying Han, Wenbao Jiang","doi":"10.1109/MINES.2012.243","DOIUrl":"https://doi.org/10.1109/MINES.2012.243","url":null,"abstract":"Trust has become an important factor to restrict transactions between the network entities in e-commerce. How to judge the relationship of trust and measure the trust between the trading entities has become a serious problem. This article proposes a trust evaluation model based on fuzzy theory for the e-commerce, which solve the uncertainty and subjectivity of e-commerce entity during the processing of trust evaluation. And on this basis, we also improve the algorithm of trust, analyze and design the algorithm of comprehensive trust use fuzzy theory. The experiment and analysis results reveal that this model is both efficiency and objectivity.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126705288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robust Image Watermarking against Brightness and Contrast Change 抗亮度和对比度变化的鲁棒图像水印
Gong Daofu, L. Fenlin, L. Xiangyang, Wang Ping
{"title":"Robust Image Watermarking against Brightness and Contrast Change","authors":"Gong Daofu, L. Fenlin, L. Xiangyang, Wang Ping","doi":"10.1109/MINES.2012.252","DOIUrl":"https://doi.org/10.1109/MINES.2012.252","url":null,"abstract":"The brightness and contrast changes are common image processing, so a robust watermarking algorithm against them is presented based on image edge detection in this article. Firstly Prewitt operator is used for image edge detection. Secondly watermark is embedded into the gradient amplitude and direction of the edge point. The invisibility of our algorithm is better for the masking effect of human vision. And the robustness is also better for the stability of the edge.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127384200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Carbon Finance Business Models of China Commercial Banks: Towards a Context of China Pilot Carbon Trading Scheme 中国商业银行碳金融业务模式:基于中国碳交易试点的视角
Dechun Yan
{"title":"Carbon Finance Business Models of China Commercial Banks: Towards a Context of China Pilot Carbon Trading Scheme","authors":"Dechun Yan","doi":"10.1109/MINES.2012.83","DOIUrl":"https://doi.org/10.1109/MINES.2012.83","url":null,"abstract":"Banking institutions play an important role in the field of carbon finance. The early carbon finance business models of China banks are based on the Clean Development Mechanism under Kyoto Protocol framework. Now China pilot carbon trading scheme provides opportunities for domestic commercial banks to reconstruct their carbon finance business models under the specific China context. This article put forward policy suggestions of developing carbon finance business models for domestic banks through series procedures including making judgment the types, discriminating the strategic focus, and analyzing the institutional environments of carbon finance business models.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124819018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Mixed Message Distribution Inter-domain Signaling Protocol 混合消息分布域间信令协议
Jianping Wang, Zhen He, Liangjie Tang, Xianyu Du
{"title":"A Mixed Message Distribution Inter-domain Signaling Protocol","authors":"Jianping Wang, Zhen He, Liangjie Tang, Xianyu Du","doi":"10.1109/MINES.2012.29","DOIUrl":"https://doi.org/10.1109/MINES.2012.29","url":null,"abstract":"REVP-TE is the signaling protocol of GMPLS, which is widely applied in ASON. When it is used to set up a connection, the distribution of messages usually adopts the serial or the parallel mode as well as several new proposed methods. Considering the drawbacks in both of the methods, and the lack of a fast message sending method suitable for inter-domain optical network, we propose a novel inter-domain signaling protocol MDSP based on the topology aggregation of inter-domain and new added new message types for RSVP-TE. MDSP introduces a mixed message distribution method serial distribution in intra-domain and parallel distribution in inter-domain. Through mathematical analysis and network simulation, it's proved to be an efficient signaling protocol, achieving a less connection setup time and blocking probability in multi-domain.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124311045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evolution and Tendency to "Double-Qualified" Teacher Competency: A Literature Review on Chinese Higher Vocational Education “双师型”教师胜任力的演变与趋势:中国高等职业教育的文献综述
Zhang Nan, Zhangjie Yuan
{"title":"Evolution and Tendency to \"Double-Qualified\" Teacher Competency: A Literature Review on Chinese Higher Vocational Education","authors":"Zhang Nan, Zhangjie Yuan","doi":"10.1109/MINES.2012.109","DOIUrl":"https://doi.org/10.1109/MINES.2012.109","url":null,"abstract":"Research on competency of \"double-qualified\" teacher now is catching the attention of the educational and managerial fields in China. The paper focuses on Chinese higher vocational education, evolution of current researches on \"double-qualified\" teacher competency is summarized using a \"best evidence\" approach. According to the foreign researches on teacher competency, research tendency to \"double-qualified\" teacher competency of Chinese higher vocational education is put forward.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-agent System Based on Receding Horizon for Radar Coordination Control 基于后退地平线的雷达协调控制多智能体系统
Jing Cui, Qing Cheng, Cheng Zhu, Jiang-feng Luo, Jincai Huang
{"title":"Multi-agent System Based on Receding Horizon for Radar Coordination Control","authors":"Jing Cui, Qing Cheng, Cheng Zhu, Jiang-feng Luo, Jincai Huang","doi":"10.1109/MINES.2012.143","DOIUrl":"https://doi.org/10.1109/MINES.2012.143","url":null,"abstract":"The coordinated control method for radar network is an important approach to extend radar detection area and improve the defensive ability of radar. The existing methods of coordinated control for radar network do not consider the case of event trigger which is disadvantage to precisely detect targets. This paper proposes a multi-agent coordinated control method based on receding horizon to adjust the detection time gap, which is adapted to the alteration degree of target state and coordinately control radars, resolute conflicts, obtain precise target track.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124793974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast Image Copy-Move Forgery Detection Method Using Phase Correlation 一种基于相位相关的图像复制移动伪造快速检测方法
Bo Xu, Guangjie Liu, Yue-wei Dai
{"title":"A Fast Image Copy-Move Forgery Detection Method Using Phase Correlation","authors":"Bo Xu, Guangjie Liu, Yue-wei Dai","doi":"10.1109/MINES.2012.18","DOIUrl":"https://doi.org/10.1109/MINES.2012.18","url":null,"abstract":"Copy-move is a common used forgeries in digital image tampering. In this paper, a non block-matching based fast method to detect image copy-move forgery is proposed exploiting phase correlation. Results of experiments indicate that the proposed method is valid in detecting the image region duplication and quite robust to additive noise and blurring.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125034424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Precoding Matrix Index Estimation Algorithm in LTE-A System LTE-A系统中预编码矩阵索引估计算法
Fengrui Yang, Minhua Lv, Xiaotao Liang
{"title":"Precoding Matrix Index Estimation Algorithm in LTE-A System","authors":"Fengrui Yang, Minhua Lv, Xiaotao Liang","doi":"10.1109/MINES.2012.159","DOIUrl":"https://doi.org/10.1109/MINES.2012.159","url":null,"abstract":"Conduct research on precoding select algorithm. A precoding matrix index estimate algorithm based on cell reference signal (CRS) was proposed. Simulation had been conducted in a comparable manner. This algorithm can distinguish the MIMO space characteristic effectively and solved the limitation that CRS not to pass through the precoding could not reflect the channel feedback information. Results show that the proposed algorithm performance is closer to ideal precoding feedback scheme.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122176862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Spatio-temporal Data Compression Algorithm 一种时空数据压缩算法
Lei Wang, Yiming Guo, Chen Chen, Yaowei Yan
{"title":"A Spatio-temporal Data Compression Algorithm","authors":"Lei Wang, Yiming Guo, Chen Chen, Yaowei Yan","doi":"10.1109/MINES.2012.47","DOIUrl":"https://doi.org/10.1109/MINES.2012.47","url":null,"abstract":"This paper introduces a new line-simplification algorithm to compress spatio-temporal data. Line-simplification is an effective method, which is generally applied in compressing linear features data by throwing away some redundant spatiotemporal points to preserve the shape of original line. We evaluate our algorithm's performance by comparing with some other line-simplification algorithms. By comprehensive analysis of experiments data, we find that our algorithm get a good result in compression ratio. Also, this algorithm costs less compression time and attains an excellent reconstruction in some situations.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123296571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Steganalysis on JPEG Decompressed Bitmaps Revisited JPEG解压缩位图的隐写分析
Weiquan Cao, Jiesi Han
{"title":"Steganalysis on JPEG Decompressed Bitmaps Revisited","authors":"Weiquan Cao, Jiesi Han","doi":"10.1109/MINES.2012.205","DOIUrl":"https://doi.org/10.1109/MINES.2012.205","url":null,"abstract":"It's well known that the spatial ±1 steganography on JPEG decompressed images is relatively easier to detect than those never compressed ones. Though some targeted methods that are special for JPEG decompressed carriers are designed, there are still some drawbacks among them. First, most methods are not perfect or even don't work for embedding rate as low as 0.0003 bits per pixel, or even lower. Second, few methods are able to estimate embedding rate for LSB matching. Finally, many methods require estimation of the JPEG quality factor, which makes the methods slow and not so robust for big JPEG quality factors. This paper revisited a color based method raised by Westfeld ten years ago, unearthed the reason why it's so reliable and also extended it to a practical non-parameter quantitative steganalyzer for JPEG decompressed carriers. Error rates of our new method was evaluated in this paper.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131282105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信