Proceedings of the 2016 International Conference on Communications, Information Management and Network Security
Session: Information Management and Network Security
30 articles
Proceedings Article
A Study of Behavior Intention of Runners' Virtual Community - The Case of Marathon's World Website
Hsin-Ke Lu, Peng-Chun Lin, Chi-An Li
According to the World Health Organization (2015) statistics, the population of today's global obesity has already doubled since 1980, the number nearly doubled. World Health Organization also estimates that depression, along with cancer and AIDS, will be the three major diseases in the world. It can...
Proceedings Article
Discussion on Safety Planning of Information Campus
Wei Li, Jianfeng Xiong
Aiming factors that affect the information technology campus safety, we design and plan the campus security information application, from the host system security, data security, application level security, application classification system permissions and other aspects, in order to achieve information...
Proceedings Article
A Novel Situation Assessment Model Based on Connection Potential
Yan Wang
Situation assessment is important for the prediction of a complicated problem involving numerous fuzziness and uncertainty factors. A novel assessment model using connection probability and connection potential of set pair was introduced here to predict the transformation tendency and assess the individual...
Proceedings Article
Verification and Detection of a Wireless-Leakage Hardware Trojan Horse with Covert Channels
Yancang Chen, Ying Zhou, Pei Wei, Sai Sui, Yaxin Zhao, Minlei Zhang, Lunguo Xie
Hardware Trojan horses have become a troublesome challenge for security-sensitive integrated circuits. As one important categorization, the carrier of wireless-leakage hardware Trojan horse is radio wave, bypassed protective isolation equipment, such as traditional firewall. Even if no networking, it...
Proceedings Article
Security Middleware Framework of Classified Application System
Yizheng Tao, Xinglan Li, Shan Gao, Gongliang Li
For classified applications need to quickly adapt to the business and security policy change, using middleware technology and framework, abstract classified application system security common public features, put forward the classified application business logic and security logic separation of security...
Proceedings Article
Design and Implementation of a High Performance Network Scanning System for Vxworks Hosts
Minlei Zhang, Yancang Chen, Huan Chen, Yaxin Zhao, Pei Wei, Sai Sui
Host scanning is an important technique for vulnerability mining and penetration testing, which is crucial to analyzing the safety of information system. Through the research into developed scanning systems both at home and abroad, such as Shodan, Zoomeye etc., this essay proposes a design model of a...
Proceedings Article
Design of Bicman Speed Based on C51 Microcontroller
Yang Zhan
This paper designed and produced adevice based on c51 MCU. This device recorded the number of cycles of a Bicman tire in a certain timethough theHall sensor, and then calculated the mileage and speed of the Bicman by the number of cycles. Finally it could display the mileage and speedwith a digital tube....
Proceedings Article
The Study of College English Teaching in Internet Plus Era
Wencao Sun
Internet plus has brought new opportunities and has posed challenges to college English teaching. This paper analyzes the influence of Internet on college English, and introduces new modes of college English teaching and learning in Internet plus era.
Proceedings Article
Smart Tourism via Smart Phone
Pu Liu, Yuan Liu
Smart tourism of Chinese cities try to provide tourists with all services and businesses via smart phones. This article analyzes the relationship between the smart tourism and smart city; explores the architecture of a smart tourism system, the technology application and supporting platform; focuses...
Proceedings Article
Nakagami-K Composite Channel Model in Urban-Rural Conjunction Areas
Xin Hu, Qing Luo, Weinong Wu, Wenjiang Feng
With the speeding construction process of urbanization in china, the areas with the characteristic of typical urban-rural conjunction gradually increase. Since residential areas, factory areas, farmlands are scattered randomly, varied and complex wireless communication environment is formed. Considering...
Proceedings Article
Vulnerability Analysis for Complex Networks under the Shortest Path-Attack Strategies
Yaohui Hao, Jihong Han, Qinghua Cheng, Yongjin Hu
We proposed three shortest path-attack strategies and investigated the vulnerability of three complex model networks under these path-attack strategies. The experimental results indicate that the robustness of random network is the weakest, but small-world network is the strongest under the shortest...
Proceedings Article
Trajectory Prediction Based on the Notion of Time and the Influence of Location of Historical Time Step
Fangxin Liu, Ming He, Yong Liu, Huan Zhou, Qiuli Chen
The development of wireless communication technology, sensor technology and so on, the spatial-temporal data record objects' movement that provide massive information about the activity regularity, due to the close relation between the mobile terminal and human. In this paper, we present a model of predicting...
Proceedings Article
Three-Dimensional Modeling Technology of Virtual Plant in Digital Landscape
Pu Liu, Yuan Liu, Xiaosheng Xu
Three-dimensional modeling is the foundation of graphic expression and virtual reality of digital landscape. This article explores key technologies, methods and applications of three-dimensional modeling of virtual plant in digital landscape; and classifies into manual modeling technology, program generation...
Proceedings Article
Three-Dimensional Target Tracking Based on Velocity Pursuit
Shulin Feng, Bo Yin
This paper deals with a method for pursuer to track a moving target in the three-dimensional space. The method is based on the use of the geometrical rules combined with the kinematics equations of the pursuer and the target. The maneuvers of the target are not a priori known to the pursuer. In this...
Proceedings Article
Doctoral Innovation Ability and Innovation Performance Evaluation Model
Caiyun Sun, Xiaojiang Yang, Jianjun Zhai
"Doctoral Innovation Ability" and "Innovation Performance Evaluation" are two concepts which are closely related but completely different. The research on the nature of the innovation ability and the innovation performance shall be born in mind to establish their evaluation model respectively. The evaluation...
Proceedings Article
Architecture for Personalized Service System of Logistics Business Information
Qi Zhang, Faheng Wu, Xiaogen Su, Jianxin Deng
Logistics business information plays an important role in data-driven logistics operation and optimization. However, with the increase of the collected logistics business information, the cost and time taken to search interested and right information also increase. To address this problem, this paper...
Proceedings Article
A Method of Constructing Virtual Network Based on NFV
Xiaomei Tao, Ming Chen, Xiulei Wang, Guomin Zhang, Qiao Yan
Relying too much on dedicated hardware equipment, resulting in poor flexibility and extensibility of existing communications network, while the new technology application cycle is long, seriously affect the communication operators' interest in deploying. In order to solve these problems, the new network...
Proceedings Article
Research on the Development Technology of Cross Platform Hybrid Mobile Application Based on HTML5
Qiao Yan, Guyu Hu, Guiqiang Ni, Jinsong Jiang, Junxian Long
Because there are many differences in the different operating systems of intelligent equipment, application software adaptation workload will be multiplied. Based on HTML5 cross platform development framework, such as PhoneGap, Sencha Touch, Titanium and AppCan and so on, can easily solve the cross platform...
Proceedings Article
Modeling the Steady State Throughput of SCPS-TP
Feng Liu, Shilong Liu
Space Communication Protocol Specification(SCPS)- Transport Protocol(SCPS-TP) is proposed for space environment, in which TCP/IP protocols do not work very well. In this paper we develop a simple model to analyze the steady state throughput of TP protocol. The throughput model is achieved with an approximate...
Proceedings Article
An Optimized Scheme to Resist Primary User Emulation Attacks
Jie Xiao, Yuebin Chen, Chuanxi Xing, Jiangfeng Yang, Zhenling Yang
The problem of cognitive radio (CR) network security has become an important problem in cognitive radio technology. One of the most common attacks is primary user emulation attacks (PUEA), where some malicious users simulate CR users to prevent them from accessing the vacant frequency. Here, a cooperative...
Proceedings Article
Improved Reputation of Soft Fusion Based on Cooperative Spectrum Sensing Defence SSDF Attacks
Zhenling Yang, Yuebin Chen, Chuanxi Xing, Jiangfeng Yang, Ting Zheng
Aiming at the uncertain factors about behavior of cooperative spectrum sensing technologies, the data fusion center(DFC) receives sensing information from the cognitive user(CU) indiscriminately and make spectrum sensing data falsification(SSDF) attack of a malicious user(MU) using do harm to cooperative...
Proceedings Article
Research on Incremental Updating
Guiqiang Ni, Yingzi Yan, Jinsong Jiang, Jianmin Mei, Zhilong Chen, Junxian Long
Compression and differential technology make the storage and transmission of files more efficient, and has an important role in the field of storage and synchronization. This paper introduces the development of incremental updating technology and the current major incremental updating algorithm. Dividing...
Proceedings Article
Research on Teaching Evaluation Model of Public Security Information Management Course
Liang Hu
Public security information management courses teaching quality monitoring system based on network proposed teaching network management state of mind, realizes the analysis of the data in the classroom teaching activities, formed a "evaluation, evaluation of teaching and evaluation" three assessment...
Proceedings Article
Dynamic Trust Relationship Quantization Model Based on Multiple Attribute Decision
Minsheng Tan, Miao Guo, Ting Xiang, Hui Zhao, Chencheng Wang
Dynamic trust relationship making quantization model based on multiple attribute decision has been researched in this paper. Considering the problem that all information from nodes feedback would be not true or reliable, this paper improves a new rule to calculate the feedback trust and proposes a new...
Proceedings Article
Mobile Game Design Based on Classic Cartoon
Yingfang Zhang, Siyang Lu, Yinglu Tang
Mobile electronic games with the hand-phone as the carrier have gradually become a necessary product for people's leisure and entertainment in twenty-first Century. They have become a new way to inherit the excellent traditional culture of various countries, so the design and development of the game...
Proceedings Article
Application of IOT in the Supply Chain of the Fresh Agricultural Products
Liheng Zhang
With the development of IOT and economic progress, consumers demand has great changes for fresh agricultural products. But traditional agricultural supply chain model exist problems. To achieve Information management fresh produce supply chain, To achieve intelligent production cultivate fresh produce,...
Proceedings Article
Effective Scheme for Global Abnormal Event Detection for Surveillance Video
Fangxu Dong, Dong Hu
An effective algorithm for global abnormal detection from surveillance video is proposed in this paper. The algorithm is based on sparse representation. To deal with the illumination change in video scenes, specific feature extract methods are designed for corresponding illumination conditions. In the...
Proceedings Article
The Space-Time Evolution Rules of Plastic Failure Zone in Surrounding Rock of Stope Roof with Variable Length
Xinfeng Wang, Longqin Li, Jiaqing Wu
In order to study the forming process, development trend and failure pattern of plastic zone in surrounding rock of stope roof with variable length, the analytical formula of the radius plastic zone, tangential stress and radial stress of surrounding rock were derived by using the limit equilibrium theory...
Proceedings Article
Translation Studies in the Frame of Blending
Chunmei Tong
The thesis focuses on the structure and its translation in the frame of conceptual integration, which suggests that the analysis of the ST means de-integrate the schematic structures; translation process is a bi-lateral integration of the ST and TT, both syntactically and schematically.
Proceedings Article
Adjective Roles in Estimating a Product Rating in a Product Review
Patrawadee Tanawongsuwan
This research work explores consumers' sentiments through written product reviews. Given a piece of product review, a person likely can tell how much the reviewer likes or dislikes the associated product. This likeness can translate into a numeric scale. For example, reading a product review, one can...