2012 Fourth International Conference on Multimedia Information Networking and Security最新文献

筛选
英文 中文
Reaserch on Correlation between Audit Quality and Efiiciency of Anti-poverty Fund: Evidence from the National Poverty Counties 扶贫基金审计质量与效率的相关性研究——以全国贫困县为例
Wang Shanping, Xie Miao
{"title":"Reaserch on Correlation between Audit Quality and Efiiciency of Anti-poverty Fund: Evidence from the National Poverty Counties","authors":"Wang Shanping, Xie Miao","doi":"10.1109/MINES.2012.165","DOIUrl":"https://doi.org/10.1109/MINES.2012.165","url":null,"abstract":"This paper takes historical data from national poverty counties to analyze the correlation between the audit quality of anti-poverty fund and its efficiency. The study finds: there is a significant positive correlation between illegal amount found, information submitted and poverty alleviation efficiency, yet that with cases transferred to the relevant departments is not notable. Therefore, this article suggests, responsibility-seeking system of audit should be established.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Study on Constructing Institutional Repository of University 高校机构知识库建设研究
Li Naiwen, Zhao Xin
{"title":"The Study on Constructing Institutional Repository of University","authors":"Li Naiwen, Zhao Xin","doi":"10.1109/MINES.2012.237","DOIUrl":"https://doi.org/10.1109/MINES.2012.237","url":null,"abstract":"By the study of the early development and actual situation of the institutional repository as while as the specific situation in our country's universities, the article comes up with the significances of constructing the institutional repository, including academic information can be stored for a long, expand the scope of the impact of university research and promotion of university research and teaching development. What's more, there have some problems which exist and need to be considered during the process of constructing. Aiming at these problems which include data collection, choice of the constructing platform, it provides some solutions, introduces several well-known software and the basic method of constructing the institutional repository from analysis to design and finally to achieve the system.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128332717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Shannon's Theory of Wisdom Internet 香农的智慧理论
Fuhong Lin, Yueyun Chen, Jianwei An, Xianwei Zhou
{"title":"A Shannon's Theory of Wisdom Internet","authors":"Fuhong Lin, Yueyun Chen, Jianwei An, Xianwei Zhou","doi":"10.1109/MINES.2012.45","DOIUrl":"https://doi.org/10.1109/MINES.2012.45","url":null,"abstract":"Internet is so popular that nearly everybody using it every day. Current Internet shows some characteristics of intelligent. For example, it can help people find the proper resources using semantic search. So this paper focuses on the wisdom of Internet. Firstly, the definition and relationship among information, knowledge and wisdom are introduced. Then, the definition of Internet information, Internet knowledge and Internet wisdom is proposed. Internet information follows the Shannon's theory on information. Internet knowledge is the set of Internet abilities, such as reliability, security, mobility. Internet wisdom is the overall performance of Internet for a certain event. Lastly, using the Shannon's on information entropy, the quantification process is brought out to quantify the three elements that we have defined.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130333608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Web Design Mode for Browsers to CSS Compatibility Issues 浏览器的网页设计模式与CSS兼容性问题
Zheng Hao, Huang Hua, Zhu Limiao
{"title":"A Web Design Mode for Browsers to CSS Compatibility Issues","authors":"Zheng Hao, Huang Hua, Zhu Limiao","doi":"10.1109/MINES.2012.53","DOIUrl":"https://doi.org/10.1109/MINES.2012.53","url":null,"abstract":"Either team or individual develops a site, it is inevitably needed to use different browsers to have a test. Along with the popularity of web technology, the design of web pages' layout has become an important indicator to measure the quality of the page. The technology of DIV + CSS is one of popular web design technologies. However, the browsers, especially the major browsers Internet Explorer and Fire fox have compatibility issues with a page in different browsers showing different manifestations because of core differences. This article promote a mode that \"overall design framework, local adjust interface element, refined differences\" to design web page. In consideration of the browser compatibility, based on that way to write CSS files can realize the reasonable layout of web page design.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133877069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Business Semantic-Oriented Workflow Description Method 面向业务语义的工作流描述方法
Fei Yang, Jian-dong Liu, Hong-mei Wang, Lin-lin Li
{"title":"A Business Semantic-Oriented Workflow Description Method","authors":"Fei Yang, Jian-dong Liu, Hong-mei Wang, Lin-lin Li","doi":"10.1109/MINES.2012.12","DOIUrl":"https://doi.org/10.1109/MINES.2012.12","url":null,"abstract":"The main object of workflow description is to map business requirements quickly and accurately mapped to business process. An approach of business semantic-oriented workflow description method is proposed aiming at the current workflow description method lack of resource allocation means oriented business staff. It provides a description way that business staff familiar with through which business elements can be polymerized in business-level. The approach reflects the of business staff as the core of business description with the features of simple, convenient plug and highly abstract. Experiments show that it can effectively reduce the required workflow description time.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134413439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Information Security Policy's Deployment for Smart Grid 智能电网信息安全策略部署研究
Yonghong Ma, Baohui Lu, Ning Wei
{"title":"Research on Information Security Policy's Deployment for Smart Grid","authors":"Yonghong Ma, Baohui Lu, Ning Wei","doi":"10.1109/MINES.2012.173","DOIUrl":"https://doi.org/10.1109/MINES.2012.173","url":null,"abstract":"The construction of smart grid will make the future power system more and more automatic, intelligent, interactive and transparent. To acquire the steady running state, the functionalities of operation, protection, self-restoration in the power grid must be supported by more effective and reliable communication technology and system. This paper analyzes the security risks and special security requirements in the smart grid environment, and then suggests some security policies, and finally proposes a revised PKI security scheme to satisfy the information security requirements of smart grid.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132731226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hybrid Additive Multi-watermarking Decoder 混合加性多重水印解码器
Jinwei Wang, Xingming Sun, Yuhui Zheng, Jin Han, Zhihua Xia
{"title":"Hybrid Additive Multi-watermarking Decoder","authors":"Jinwei Wang, Xingming Sun, Yuhui Zheng, Jin Han, Zhihua Xia","doi":"10.1109/MINES.2012.120","DOIUrl":"https://doi.org/10.1109/MINES.2012.120","url":null,"abstract":"With the development of the cloud environment, the multi-copyright protection of the works should be further developing. The multi-watermarking is becoming a possible solution. In this paper, firstly, one novel hybrid multi-watermarking rule is proposed, and is used to embed the watermark into DWT domain. Secondly, corresponding to the hybrid embedding rule, the novel optimum hybrid additive multi-watermarking decoder is proposed, which is based on the minimum Bayesian risk criterion, and simultaneously the performance of the hybrid decoder is theoretically analyzed. The DWT coefficients are modeled as the generalized Gaussian distribution. Finally, the theoretical and empirical experimental results prove the theoretical analysis validity.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133223991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Research on Detection Algorithm of Failure-Type Hardware Trojan 失效型硬件木马检测算法研究
D. Xia, Yue-fei Zhu
{"title":"A Research on Detection Algorithm of Failure-Type Hardware Trojan","authors":"D. Xia, Yue-fei Zhu","doi":"10.1109/MINES.2012.42","DOIUrl":"https://doi.org/10.1109/MINES.2012.42","url":null,"abstract":"To solve the problem that it is difficult to detect the failure-type hardware Trojan, this paper selects the failure-type hardware Trojan as the research subjects, putting forward the detection principles of failure-type hardware Trojan based on state transition diagram. It also designs and realizes the detection algorithm as well as provides the relative demonstrations of its correctness. The experiment testing shows that the proposed detection algorithm can effectively check out the hardware Trojan in the combinational logic and timing logic hardware chips, with a detection accuracy of 100% ideally, actual success rate of 92.8% and false retrieval rate of 7.14%.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132574402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the Determining Weight Method about the Comprehensive Assessment on Transformer State Based on Trapezoidal Fuzzy Number 基于梯形模糊数的变压器状态综合评价权重确定方法研究
Zhang Cui-ling, Wang Da-zhi, Jiang Xue-chen, Liu Qin
{"title":"Research on the Determining Weight Method about the Comprehensive Assessment on Transformer State Based on Trapezoidal Fuzzy Number","authors":"Zhang Cui-ling, Wang Da-zhi, Jiang Xue-chen, Liu Qin","doi":"10.1109/MINES.2012.185","DOIUrl":"https://doi.org/10.1109/MINES.2012.185","url":null,"abstract":"Transformer is important power equipment in power system, of which the operation condition relates to the security and reliability of electric power system. The effective evaluation for transformer condition usually involves the information of multilayer, multivariable, and multi-target system, among which there are a lot of uncertainty factors, and only fully consider these uncertainty factors can get a fair result. Comprehensive evaluation method had been used more and more in the application of evaluation about the transformer's running condition. In order to solve the comprehensive evaluation problem of the evaluation weights that are difficult to determine and include uncertainty factors with fuzzy characteristics, this paper used the analysis hierarchy process of fuzzy theory, put forward a method to determine the weight of the index system about the running condition of transformer by using trapezoidal fuzzy number, and has comparatively strong practicality in engineering.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130241027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Project Design of Tourism E-commerce System for Sanqing Mountain Based on Customer Relationship Management 基于客户关系管理的三清山旅游电子商务系统方案设计
Dapeng Zhang
{"title":"Project Design of Tourism E-commerce System for Sanqing Mountain Based on Customer Relationship Management","authors":"Dapeng Zhang","doi":"10.1109/MINES.2012.160","DOIUrl":"https://doi.org/10.1109/MINES.2012.160","url":null,"abstract":"The establishment and improvement of effective e-commerce system is necessary to the tourism development in Sanqing mountain. Through analyzing the shortage of current tourism e-commerce websites of Sanqing mountain and according to the different tourist demands, the tourism e-business system for Sanqing mountain based on customer relationship management(CRM) was presented, which contains information subsystem, e-commerce booking subsystem, three-dimensional simulation visit subsystem and third party management platform such as BBS and blog. The background CRM tourists data analysis system and call center provide integrated services for each subsystem. The main function modules were described in details, including e-business website, CRM data analysis system of tourists and call center. This project design has effectively promoted the service level of tourism e-business of Sanqing mountain scenic spot, as well as provided tourism value-added features.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132699802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信