{"title":"Analysis on Evolution of E-Business Ecosystem","authors":"Xiao Xue, L. Zhang, Shufang Wang","doi":"10.1109/IIKI.2016.13","DOIUrl":"https://doi.org/10.1109/IIKI.2016.13","url":null,"abstract":"As an important mechanism in the evolution process of E-business ecosystem, not only does the competition and cooperation among service agents affect the development of individual agent, but also influences stability of the whole ecosystem. However, the current researches mainly rely on data statistics and qualitative analysis due to time cost and cost constraints. This research status further results in difficulties in clearly identifying the links between micro actions of service agents and macro evolution process of E-business ecosystem and predicting some factors at macro level. In order to change such a situation, this paper proposes a model mapping-based computational experiment approach to analyze the evolution of E-business ecosystem, including model construction of real world, model mapping of computational system, and construction of experiment system. Then, several case studies are conducted to present the application of the proposed approach. The results demonstrate that our approach has a substantial promise.","PeriodicalId":265532,"journal":{"name":"International Conference on Identification, Information, and Knowledge in the Internet of Things","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122396313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Denoising Algorithm Using Regional Threshold by Wavelet-Based Contourlet Transform","authors":"Yajun Song, Chen Yang, Jinbao Yang","doi":"10.1109/IIKI.2016.72","DOIUrl":"https://doi.org/10.1109/IIKI.2016.72","url":null,"abstract":"Due to the good characteristics of multi-resolution and multi-direction for wavelet-based contourlet transform, a new threshold method is proposed, which considers the influence of decomposition level, energy distribution of different directional sub-band in the same level and property of regional coefficients in the same directional sub-band. The designed threshold function improves the problems of soft and hard threshold functions, and uses the feature of Gaussian noise. The simulation experiment results indicate that, compare to the related methods, the method proposed in this paper has better de-noising results for different degree and different type noise images.","PeriodicalId":265532,"journal":{"name":"International Conference on Identification, Information, and Knowledge in the Internet of Things","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114285426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenbo Zhang, Pengfei Yang, Zhenshan Bao, L. Duan, Jian Li
{"title":"A Fuzzy Operator-Attribute-Based Signcryption Scheme on Vehicular Clouds","authors":"Wenbo Zhang, Pengfei Yang, Zhenshan Bao, L. Duan, Jian Li","doi":"10.1109/IIKI.2014.42","DOIUrl":"https://doi.org/10.1109/IIKI.2014.42","url":null,"abstract":"Vehicular Computer Clouds (VCC) would be expected to play a major role in the Intelligent Transportation System (ITS) in the near future. While it is clear that the VCC concept raise exceptional security challenges. Generally speaking, most attacks come from operators. So it is important to design the novel VCC security scheme based on operator's attributes. In this paper, we develop the Fuzzy Operator-Attribute-Based Signcryption (FOABS), a novel security mechanism that makes relations between the vehicle operator's right and these operation. FOABS leverages fuzzy Attribute-Based encryption to enable data encryption, access control, and signature for vehicular control information in VCC. FOABS provides confidentiality, authenticity, undeniability, identity authentication, and collusion resistance.","PeriodicalId":265532,"journal":{"name":"International Conference on Identification, Information, and Knowledge in the Internet of Things","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123605108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting of Forex Time Series Data Based on Deep Learning","authors":"Lina Ni, Yujie Li, Xiao Wang, Jinquan Zhang, Jiguo Yu, Chengming Qi","doi":"10.1016/j.procs.2019.01.189","DOIUrl":"https://doi.org/10.1016/j.procs.2019.01.189","url":null,"abstract":"","PeriodicalId":265532,"journal":{"name":"International Conference on Identification, Information, and Knowledge in the Internet of Things","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127560099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximum delay anonymous clustering feature tree based privacy-preserving data publishing in social networks","authors":"Jinquan Zhang, Bowen Zhao, Guo-Jie Song, Lina Ni, Jiguo Yu","doi":"10.1016/j.procs.2019.01.190","DOIUrl":"https://doi.org/10.1016/j.procs.2019.01.190","url":null,"abstract":"","PeriodicalId":265532,"journal":{"name":"International Conference on Identification, Information, and Knowledge in the Internet of Things","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115064253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}