Proceedings of the 2016 International Conference on Communications, Information Management and Network Security

Session: Information Management and Network Security

30 articles
Proceedings Article

A Study of Behavior Intention of Runners' Virtual Community - The Case of Marathon's World Website

Hsin-Ke Lu, Peng-Chun Lin, Chi-An Li
According to the World Health Organization (2015) statistics, the population of today's global obesity has already doubled since 1980, the number nearly doubled. World Health Organization also estimates that depression, along with cancer and AIDS, will be the three major diseases in the world. It can...
Proceedings Article

Discussion on Safety Planning of Information Campus

Wei Li, Jianfeng Xiong
Aiming factors that affect the information technology campus safety, we design and plan the campus security information application, from the host system security, data security, application level security, application classification system permissions and other aspects, in order to achieve information...
Proceedings Article

A Novel Situation Assessment Model Based on Connection Potential

Yan Wang
Situation assessment is important for the prediction of a complicated problem involving numerous fuzziness and uncertainty factors. A novel assessment model using connection probability and connection potential of set pair was introduced here to predict the transformation tendency and assess the individual...
Proceedings Article

Verification and Detection of a Wireless-Leakage Hardware Trojan Horse with Covert Channels

Yancang Chen, Ying Zhou, Pei Wei, Sai Sui, Yaxin Zhao, Minlei Zhang, Lunguo Xie
Hardware Trojan horses have become a troublesome challenge for security-sensitive integrated circuits. As one important categorization, the carrier of wireless-leakage hardware Trojan horse is radio wave, bypassed protective isolation equipment, such as traditional firewall. Even if no networking, it...
Proceedings Article

Security Middleware Framework of Classified Application System

Yizheng Tao, Xinglan Li, Shan Gao, Gongliang Li
For classified applications need to quickly adapt to the business and security policy change, using middleware technology and framework, abstract classified application system security common public features, put forward the classified application business logic and security logic separation of security...
Proceedings Article

Design and Implementation of a High Performance Network Scanning System for Vxworks Hosts

Minlei Zhang, Yancang Chen, Huan Chen, Yaxin Zhao, Pei Wei, Sai Sui
Host scanning is an important technique for vulnerability mining and penetration testing, which is crucial to analyzing the safety of information system. Through the research into developed scanning systems both at home and abroad, such as Shodan, Zoomeye etc., this essay proposes a design model of a...
Proceedings Article

Design of Bicman Speed Based on C51 Microcontroller

Yang Zhan
This paper designed and produced adevice based on c51 MCU. This device recorded the number of cycles of a Bicman tire in a certain timethough theHall sensor, and then calculated the mileage and speed of the Bicman by the number of cycles. Finally it could display the mileage and speedwith a digital tube....
Proceedings Article

The Study of College English Teaching in Internet Plus Era

Wencao Sun
Internet plus has brought new opportunities and has posed challenges to college English teaching. This paper analyzes the influence of Internet on college English, and introduces new modes of college English teaching and learning in Internet plus era.
Proceedings Article

Smart Tourism via Smart Phone

Pu Liu, Yuan Liu
Smart tourism of Chinese cities try to provide tourists with all services and businesses via smart phones. This article analyzes the relationship between the smart tourism and smart city; explores the architecture of a smart tourism system, the technology application and supporting platform; focuses...
Proceedings Article

Nakagami-K Composite Channel Model in Urban-Rural Conjunction Areas

Xin Hu, Qing Luo, Weinong Wu, Wenjiang Feng
With the speeding construction process of urbanization in china, the areas with the characteristic of typical urban-rural conjunction gradually increase. Since residential areas, factory areas, farmlands are scattered randomly, varied and complex wireless communication environment is formed. Considering...
Proceedings Article

Vulnerability Analysis for Complex Networks under the Shortest Path-Attack Strategies

Yaohui Hao, Jihong Han, Qinghua Cheng, Yongjin Hu
We proposed three shortest path-attack strategies and investigated the vulnerability of three complex model networks under these path-attack strategies. The experimental results indicate that the robustness of random network is the weakest, but small-world network is the strongest under the shortest...
Proceedings Article

Trajectory Prediction Based on the Notion of Time and the Influence of Location of Historical Time Step

Fangxin Liu, Ming He, Yong Liu, Huan Zhou, Qiuli Chen
The development of wireless communication technology, sensor technology and so on, the spatial-temporal data record objects' movement that provide massive information about the activity regularity, due to the close relation between the mobile terminal and human. In this paper, we present a model of predicting...
Proceedings Article

Three-Dimensional Modeling Technology of Virtual Plant in Digital Landscape

Pu Liu, Yuan Liu, Xiaosheng Xu
Three-dimensional modeling is the foundation of graphic expression and virtual reality of digital landscape. This article explores key technologies, methods and applications of three-dimensional modeling of virtual plant in digital landscape; and classifies into manual modeling technology, program generation...
Proceedings Article

Three-Dimensional Target Tracking Based on Velocity Pursuit

Shulin Feng, Bo Yin
This paper deals with a method for pursuer to track a moving target in the three-dimensional space. The method is based on the use of the geometrical rules combined with the kinematics equations of the pursuer and the target. The maneuvers of the target are not a priori known to the pursuer. In this...
Proceedings Article

Doctoral Innovation Ability and Innovation Performance Evaluation Model

Caiyun Sun, Xiaojiang Yang, Jianjun Zhai
"Doctoral Innovation Ability" and "Innovation Performance Evaluation" are two concepts which are closely related but completely different. The research on the nature of the innovation ability and the innovation performance shall be born in mind to establish their evaluation model respectively. The evaluation...
Proceedings Article

Architecture for Personalized Service System of Logistics Business Information

Qi Zhang, Faheng Wu, Xiaogen Su, Jianxin Deng
Logistics business information plays an important role in data-driven logistics operation and optimization. However, with the increase of the collected logistics business information, the cost and time taken to search interested and right information also increase. To address this problem, this paper...
Proceedings Article

A Method of Constructing Virtual Network Based on NFV

Xiaomei Tao, Ming Chen, Xiulei Wang, Guomin Zhang, Qiao Yan
Relying too much on dedicated hardware equipment, resulting in poor flexibility and extensibility of existing communications network, while the new technology application cycle is long, seriously affect the communication operators' interest in deploying. In order to solve these problems, the new network...
Proceedings Article

Research on the Development Technology of Cross Platform Hybrid Mobile Application Based on HTML5

Qiao Yan, Guyu Hu, Guiqiang Ni, Jinsong Jiang, Junxian Long
Because there are many differences in the different operating systems of intelligent equipment, application software adaptation workload will be multiplied. Based on HTML5 cross platform development framework, such as PhoneGap, Sencha Touch, Titanium and AppCan and so on, can easily solve the cross platform...
Proceedings Article

Modeling the Steady State Throughput of SCPS-TP

Feng Liu, Shilong Liu
Space Communication Protocol Specification(SCPS)- Transport Protocol(SCPS-TP) is proposed for space environment, in which TCP/IP protocols do not work very well. In this paper we develop a simple model to analyze the steady state throughput of TP protocol. The throughput model is achieved with an approximate...
Proceedings Article

An Optimized Scheme to Resist Primary User Emulation Attacks

Jie Xiao, Yuebin Chen, Chuanxi Xing, Jiangfeng Yang, Zhenling Yang
The problem of cognitive radio (CR) network security has become an important problem in cognitive radio technology. One of the most common attacks is primary user emulation attacks (PUEA), where some malicious users simulate CR users to prevent them from accessing the vacant frequency. Here, a cooperative...
Proceedings Article

Improved Reputation of Soft Fusion Based on Cooperative Spectrum Sensing Defence SSDF Attacks

Zhenling Yang, Yuebin Chen, Chuanxi Xing, Jiangfeng Yang, Ting Zheng
Aiming at the uncertain factors about behavior of cooperative spectrum sensing technologies, the data fusion center(DFC) receives sensing information from the cognitive user(CU) indiscriminately and make spectrum sensing data falsification(SSDF) attack of a malicious user(MU) using do harm to cooperative...
Proceedings Article

Research on Incremental Updating

Guiqiang Ni, Yingzi Yan, Jinsong Jiang, Jianmin Mei, Zhilong Chen, Junxian Long
Compression and differential technology make the storage and transmission of files more efficient, and has an important role in the field of storage and synchronization. This paper introduces the development of incremental updating technology and the current major incremental updating algorithm. Dividing...
Proceedings Article

Research on Teaching Evaluation Model of Public Security Information Management Course

Liang Hu
Public security information management courses teaching quality monitoring system based on network proposed teaching network management state of mind, realizes the analysis of the data in the classroom teaching activities, formed a "evaluation, evaluation of teaching and evaluation" three assessment...
Proceedings Article

Dynamic Trust Relationship Quantization Model Based on Multiple Attribute Decision

Minsheng Tan, Miao Guo, Ting Xiang, Hui Zhao, Chencheng Wang
Dynamic trust relationship making quantization model based on multiple attribute decision has been researched in this paper. Considering the problem that all information from nodes feedback would be not true or reliable, this paper improves a new rule to calculate the feedback trust and proposes a new...
Proceedings Article

Mobile Game Design Based on Classic Cartoon

Yingfang Zhang, Siyang Lu, Yinglu Tang
Mobile electronic games with the hand-phone as the carrier have gradually become a necessary product for people's leisure and entertainment in twenty-first Century. They have become a new way to inherit the excellent traditional culture of various countries, so the design and development of the game...
Proceedings Article

Application of IOT in the Supply Chain of the Fresh Agricultural Products

Liheng Zhang
With the development of IOT and economic progress, consumers demand has great changes for fresh agricultural products. But traditional agricultural supply chain model exist problems. To achieve Information management fresh produce supply chain, To achieve intelligent production cultivate fresh produce,...
Proceedings Article

Effective Scheme for Global Abnormal Event Detection for Surveillance Video

Fangxu Dong, Dong Hu
An effective algorithm for global abnormal detection from surveillance video is proposed in this paper. The algorithm is based on sparse representation. To deal with the illumination change in video scenes, specific feature extract methods are designed for corresponding illumination conditions. In the...
Proceedings Article

The Space-Time Evolution Rules of Plastic Failure Zone in Surrounding Rock of Stope Roof with Variable Length

Xinfeng Wang, Longqin Li, Jiaqing Wu
In order to study the forming process, development trend and failure pattern of plastic zone in surrounding rock of stope roof with variable length, the analytical formula of the radius plastic zone, tangential stress and radial stress of surrounding rock were derived by using the limit equilibrium theory...
Proceedings Article

Translation Studies in the Frame of Blending

Chunmei Tong
The thesis focuses on the structure and its translation in the frame of conceptual integration, which suggests that the analysis of the ST means de-integrate the schematic structures; translation process is a bi-lateral integration of the ST and TT, both syntactically and schematically.
Proceedings Article

Adjective Roles in Estimating a Product Rating in a Product Review

Patrawadee Tanawongsuwan
This research work explores consumers' sentiments through written product reviews. Given a piece of product review, a person likely can tell how much the reviewer likes or dislikes the associated product. This likeness can translate into a numeric scale. For example, reading a product review, one can...