{"title":"The analysis of factors affecting the customers' satisfaction in BtoC E-commerce","authors":"Dai Zhuo","doi":"10.1109/ICNIDC.2010.5657837","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657837","url":null,"abstract":"This paper studies the factors of affecting consumers' satisfaction in BtoC E-commerce. The factor model of satisfaction is constructed on the basis of theoretical research and china's reality. And the model is tested by LISREL8.7. This paper also puts forward the suggestions of promoting the consumers' satisfaction.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An experimentation testbed for scalable video coding on IMS-based IPTV","authors":"Lipeng Du, I. Nugraha, H. Morita, Lin Zhang","doi":"10.1109/ICNIDC.2010.5657896","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657896","url":null,"abstract":"Due to the lack of quality guarantees, it's very difficult to deploy IPTV services in the current internet, especially in a NGN network, the core IMS framework interconnects different access networks which have differing amounts of bandwidth available and varying client terminals. The ETSI TISPAN standards allow adaptation multimedia content by transcoding, however, it is computationally intensive. This paper focuses on introducing scalable video coding into TISPAN IMS-based IPTV architecture, allowing cost-effective efficient solutions both for residential users and providers (e.g., flexible support of heterogeneous devices, adaptive video quality based on device and/or network capabilities).","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134441435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the relationship between involvement and the Internet Word-of-Mouth","authors":"Yaowen Zhang, Ting-jie Lv","doi":"10.1109/ICNIDC.2010.5657951","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657951","url":null,"abstract":"With the development of network technology and the increasing popularity of the network, the Internet Word-of-Mouth is gradually replacing its traditional counterpart. People increasingly prefer to collect product information using the network exchange in order to make consumption decisions. Involvement theory plays an important role in the theory of consumer behavior; it explains why people sometimes did not follow the rational model-information collection, screening, and assessment to do purchase decision. Researching the role of involvement to IWOM is significant to the development of marketing theory and effective marketing communications. This paper regards college students as survey subjects, focuses on the impact of variables of involvement to IWOM, and conducts the demonstration to get conclusions so as to recommend appropriate management recommendations to help the corporation better carry out the publicity and marketing of product.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blocking pornographic, illegal websites by internet host domain using FPGA and Bloom Filter","authors":"Hua Yu, Rong Cong, Luying Chen, Zhenming Lei","doi":"10.1109/ICNIDC.2010.5657855","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657855","url":null,"abstract":"For blocking pornographic, illegal websites by Intenet host domain, now the majority of solutions are based on the identification and blocking by software. Basing on the analysis of Bloom Filter algorithm and combining with the feature of FPGA chip, this paper proposes an efficient, high-speed hardware-based Implementation of the host domain blocking","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weidong Wang, Fan Li, Yang Yu, Yinghai Zhang, Yongtao Wang
{"title":"Spectrum assignment with spectrum hole classification in cognitive mobile telecommunication systems","authors":"Weidong Wang, Fan Li, Yang Yu, Yinghai Zhang, Yongtao Wang","doi":"10.1109/ICNIDC.2010.5657902","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657902","url":null,"abstract":"The frequency resource of mobile communication systems is intensive and it needs to combine with cognitive radio technology. The mobile telecommunication system subscribers are sensitive to interference, making the interference problem need prompt solution. This paper analyzes the inter-system and intra-system interference and proposes the approach of utilizing spectrum holes classification. The spectrum assignment algorithm with spectrum hole classification is come out with and the simulation results prove that the proposed algorithm can eliminate the inter-system interference, decrease the drop ratio of primary users and weaken the intra-system interference.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124138005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-path routing based on link lifetime in mobile Ad Hoc networks","authors":"Jiansong Miao, Muqing Wu, Feng Zheng, Heng Guo","doi":"10.1109/ICNIDC.2010.5657862","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657862","url":null,"abstract":"In mobile Ad Hoc networks the established path is often disconnected because of nodes mobility, which results in communication discontinuity and adverse effects on real-time services, and a new multi-path routing algorithm based on link lifetime is proposed. This algorithm tries to find more than on stable and independent path to transport packets based on link lifetime. Simulations prove that can effectively improve the network performances, such as the packet success rate and time jitter and so on.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115108549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinliang Wang, Fang Liu, Luying Chen, Zhenming Lei
{"title":"Research for scan detection algorithm of high-speed links based on honeypot","authors":"Xinliang Wang, Fang Liu, Luying Chen, Zhenming Lei","doi":"10.1109/ICNIDC.2010.5657900","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657900","url":null,"abstract":"In order to effectively detect the scan attack on high-speed links, this paper improves the commonly used scan detection algorithm TRW (Threshold Random Walk) based on honeypot, and makes a detailed analysis on its performance. The analysis shows that the improved algorithm has better performance on the speed of identifying the scan source and can finish the real-time detection of high-speed link scan. Meanwhile, on the basis of selective system sample, this paper focuses on the analysis of the anomaly detection accuracy of three scan detection algorithms: Snort, TRW, TRWHP (Threshold Random Walk Based on Honeypot). The experimental results show that, at the same sampling ratio, the false positive rates of TRWHP and TRW algorithm are almost the same, however, the false negative rate of TRWHP algorithm can make a remarkable improvement and obtain the better detection performance.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128485588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haixia Jiang, Xiaojun Jing, Bo Zhang, Songlin Sun, Hai Huang
{"title":"Fingerprint reference point location based on multi-scale analysis of wavelet","authors":"Haixia Jiang, Xiaojun Jing, Bo Zhang, Songlin Sun, Hai Huang","doi":"10.1109/ICNIDC.2010.5657780","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657780","url":null,"abstract":"It is still difficult to locate reference point for low-quality fingerprints in fingerprint recognition. In this paper, a novel algorithm based on quadratic B-spline wavelet is proposed to deal with this problem. The main idea of the paper is to make a progressive analysis on the gradient-changing of the orientation field and combine the gradient information at different scales together. Due to multi-scale analysis and the adaptive process of improved A'trous algorithm, this method naturally possesses high location rate and simple operation, especially for low-quality fingerprints. The experimental results on the FVC2004 show the high effectiveness and practicability of the approach.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"68 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and porting of HBA driver on embedded Linux","authors":"Dongxia Wang, Qi-Hu Li, Guo-qiang Ren","doi":"10.1109/ICNIDC.2010.5657804","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657804","url":null,"abstract":"PCI Express will serve as a general purpose I/O interconnect for a wide variety of future computing and communications platforms. While, SCSI(Small Computer Systems Interface) has emerged as a popular protocol in the storage world and like Linux, it is open source. Since the SCSI controller based on PCI Express bus has become increasingly important storage device today, the HBA(Host Bus Adapter) driver on Linux, especially embedded Linux, will be attached more and more importance to. This paper gives an introduction to the architecture of PCI Express and the Linux SCSI subsystem. It also analyses the driver porting of sata raid controller, a kind of SCSI HBA, based on embedded Linux, shows the actual steps that how to configure the card BIOS and how to compile the Linux kernel and combining with the result of porting and analysis, advances the aspects to be optimized of the SCSI HBA driver.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129540025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic identification method based on on-line density based spatial clustering algorithm","authors":"Jian Zhang, Zongjue Qian, Guochu Shou, Yihong Hu","doi":"10.1109/ICNIDC.2010.5657786","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657786","url":null,"abstract":"Recently traffic identification based on Machine Learning (ML) techniques has attracted a great deal of interest. Two challenging issues for these methods are how to deal with encrypted flows and cope with the rapid growing number of new application types correctly and early. We propose a hybrid traffic identification method and a novel unsupervised clustering algorithm, On-Line Density Based Spatial Clustering (OLDBSC) algorithm, in which flows are automatically clustered based on sub-flow statistical features instead of full flows. We select Best-first features algorithm to find an optimal feature-sets, and then map the clusters to application types based on maximum probabilities applications in the clusters. The experiment results demonstrate that the proposed hybrid traffic identification method and OLDBSC algorithm is capable of identifying encrypted flows and potential new application types.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126996047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}