{"title":"Trust Evaluation Model and Algorithm Based on Fuzzy Theory for E-commerce","authors":"Yingying Han, Wenbao Jiang","doi":"10.1109/MINES.2012.243","DOIUrl":"https://doi.org/10.1109/MINES.2012.243","url":null,"abstract":"Trust has become an important factor to restrict transactions between the network entities in e-commerce. How to judge the relationship of trust and measure the trust between the trading entities has become a serious problem. This article proposes a trust evaluation model based on fuzzy theory for the e-commerce, which solve the uncertainty and subjectivity of e-commerce entity during the processing of trust evaluation. And on this basis, we also improve the algorithm of trust, analyze and design the algorithm of comprehensive trust use fuzzy theory. The experiment and analysis results reveal that this model is both efficiency and objectivity.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126705288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Image Watermarking against Brightness and Contrast Change","authors":"Gong Daofu, L. Fenlin, L. Xiangyang, Wang Ping","doi":"10.1109/MINES.2012.252","DOIUrl":"https://doi.org/10.1109/MINES.2012.252","url":null,"abstract":"The brightness and contrast changes are common image processing, so a robust watermarking algorithm against them is presented based on image edge detection in this article. Firstly Prewitt operator is used for image edge detection. Secondly watermark is embedded into the gradient amplitude and direction of the edge point. The invisibility of our algorithm is better for the masking effect of human vision. And the robustness is also better for the stability of the edge.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127384200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Carbon Finance Business Models of China Commercial Banks: Towards a Context of China Pilot Carbon Trading Scheme","authors":"Dechun Yan","doi":"10.1109/MINES.2012.83","DOIUrl":"https://doi.org/10.1109/MINES.2012.83","url":null,"abstract":"Banking institutions play an important role in the field of carbon finance. The early carbon finance business models of China banks are based on the Clean Development Mechanism under Kyoto Protocol framework. Now China pilot carbon trading scheme provides opportunities for domestic commercial banks to reconstruct their carbon finance business models under the specific China context. This article put forward policy suggestions of developing carbon finance business models for domestic banks through series procedures including making judgment the types, discriminating the strategic focus, and analyzing the institutional environments of carbon finance business models.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124819018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mixed Message Distribution Inter-domain Signaling Protocol","authors":"Jianping Wang, Zhen He, Liangjie Tang, Xianyu Du","doi":"10.1109/MINES.2012.29","DOIUrl":"https://doi.org/10.1109/MINES.2012.29","url":null,"abstract":"REVP-TE is the signaling protocol of GMPLS, which is widely applied in ASON. When it is used to set up a connection, the distribution of messages usually adopts the serial or the parallel mode as well as several new proposed methods. Considering the drawbacks in both of the methods, and the lack of a fast message sending method suitable for inter-domain optical network, we propose a novel inter-domain signaling protocol MDSP based on the topology aggregation of inter-domain and new added new message types for RSVP-TE. MDSP introduces a mixed message distribution method serial distribution in intra-domain and parallel distribution in inter-domain. Through mathematical analysis and network simulation, it's proved to be an efficient signaling protocol, achieving a less connection setup time and blocking probability in multi-domain.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124311045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution and Tendency to \"Double-Qualified\" Teacher Competency: A Literature Review on Chinese Higher Vocational Education","authors":"Zhang Nan, Zhangjie Yuan","doi":"10.1109/MINES.2012.109","DOIUrl":"https://doi.org/10.1109/MINES.2012.109","url":null,"abstract":"Research on competency of \"double-qualified\" teacher now is catching the attention of the educational and managerial fields in China. The paper focuses on Chinese higher vocational education, evolution of current researches on \"double-qualified\" teacher competency is summarized using a \"best evidence\" approach. According to the foreign researches on teacher competency, research tendency to \"double-qualified\" teacher competency of Chinese higher vocational education is put forward.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-agent System Based on Receding Horizon for Radar Coordination Control","authors":"Jing Cui, Qing Cheng, Cheng Zhu, Jiang-feng Luo, Jincai Huang","doi":"10.1109/MINES.2012.143","DOIUrl":"https://doi.org/10.1109/MINES.2012.143","url":null,"abstract":"The coordinated control method for radar network is an important approach to extend radar detection area and improve the defensive ability of radar. The existing methods of coordinated control for radar network do not consider the case of event trigger which is disadvantage to precisely detect targets. This paper proposes a multi-agent coordinated control method based on receding horizon to adjust the detection time gap, which is adapted to the alteration degree of target state and coordinately control radars, resolute conflicts, obtain precise target track.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124793974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fast Image Copy-Move Forgery Detection Method Using Phase Correlation","authors":"Bo Xu, Guangjie Liu, Yue-wei Dai","doi":"10.1109/MINES.2012.18","DOIUrl":"https://doi.org/10.1109/MINES.2012.18","url":null,"abstract":"Copy-move is a common used forgeries in digital image tampering. In this paper, a non block-matching based fast method to detect image copy-move forgery is proposed exploiting phase correlation. Results of experiments indicate that the proposed method is valid in detecting the image region duplication and quite robust to additive noise and blurring.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125034424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Precoding Matrix Index Estimation Algorithm in LTE-A System","authors":"Fengrui Yang, Minhua Lv, Xiaotao Liang","doi":"10.1109/MINES.2012.159","DOIUrl":"https://doi.org/10.1109/MINES.2012.159","url":null,"abstract":"Conduct research on precoding select algorithm. A precoding matrix index estimate algorithm based on cell reference signal (CRS) was proposed. Simulation had been conducted in a comparable manner. This algorithm can distinguish the MIMO space characteristic effectively and solved the limitation that CRS not to pass through the precoding could not reflect the channel feedback information. Results show that the proposed algorithm performance is closer to ideal precoding feedback scheme.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122176862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Spatio-temporal Data Compression Algorithm","authors":"Lei Wang, Yiming Guo, Chen Chen, Yaowei Yan","doi":"10.1109/MINES.2012.47","DOIUrl":"https://doi.org/10.1109/MINES.2012.47","url":null,"abstract":"This paper introduces a new line-simplification algorithm to compress spatio-temporal data. Line-simplification is an effective method, which is generally applied in compressing linear features data by throwing away some redundant spatiotemporal points to preserve the shape of original line. We evaluate our algorithm's performance by comparing with some other line-simplification algorithms. By comprehensive analysis of experiments data, we find that our algorithm get a good result in compression ratio. Also, this algorithm costs less compression time and attains an excellent reconstruction in some situations.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123296571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganalysis on JPEG Decompressed Bitmaps Revisited","authors":"Weiquan Cao, Jiesi Han","doi":"10.1109/MINES.2012.205","DOIUrl":"https://doi.org/10.1109/MINES.2012.205","url":null,"abstract":"It's well known that the spatial ±1 steganography on JPEG decompressed images is relatively easier to detect than those never compressed ones. Though some targeted methods that are special for JPEG decompressed carriers are designed, there are still some drawbacks among them. First, most methods are not perfect or even don't work for embedding rate as low as 0.0003 bits per pixel, or even lower. Second, few methods are able to estimate embedding rate for LSB matching. Finally, many methods require estimation of the JPEG quality factor, which makes the methods slow and not so robust for big JPEG quality factors. This paper revisited a color based method raised by Westfeld ten years ago, unearthed the reason why it's so reliable and also extended it to a practical non-parameter quantitative steganalyzer for JPEG decompressed carriers. Error rates of our new method was evaluated in this paper.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131282105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}