Digitized urban management is a new mode of urban management today, is also an important application field of M-commerce technology. This paper attempts to probe into the application of M-commerce in digitized urban management, beginning with the development of M-commerce technology and the requirement of digitized urban management. With the case of Shenzhen ldquoChengGuanTongrdquo mobile information system, it analyzes the background of the system demand and the system structure. It introduces many system functions such as GIS map, short number cluster network, call restrictions, MPS base station orientation, GPS orientation, SMS information system, IP voice special line in call center, group CRBT, etc.. The paper finally analyzes the implementation effect of the system.
{"title":"Application Analysis of M-commerce in Digitized Urban Management","authors":"Guoling Lao, Xinwang Wang","doi":"10.1109/ISECS.2008.127","DOIUrl":"https://doi.org/10.1109/ISECS.2008.127","url":null,"abstract":"Digitized urban management is a new mode of urban management today, is also an important application field of M-commerce technology. This paper attempts to probe into the application of M-commerce in digitized urban management, beginning with the development of M-commerce technology and the requirement of digitized urban management. With the case of Shenzhen ldquoChengGuanTongrdquo mobile information system, it analyzes the background of the system demand and the system structure. It introduces many system functions such as GIS map, short number cluster network, call restrictions, MPS base station orientation, GPS orientation, SMS information system, IP voice special line in call center, group CRBT, etc.. The paper finally analyzes the implementation effect of the system.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129330841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since China entered WTO, the policy restrictions in many industries have been gradually loosened or eliminated. The foreign companies have obtained sufficient understanding on China's markets through the long-term grope, as a result, many foreign enterprises begin to step towards sole proprietorship and they gradually expedited their speed. Influences from such a change and trend upon China's economy are presenting themselves gradually. This article is to analyze the evolution of the phenomenon, the features and the unfavorable impacts upon Chinapsilas economy in order to find out the countermeasures.
{"title":"Analysis on Features and Countermeasures of Foreign-founded Enterprises' Sole Proprietorship in China","authors":"Peizhi Wang, Xinying Liu, Wenbo Li","doi":"10.1109/ISECS.2008.41","DOIUrl":"https://doi.org/10.1109/ISECS.2008.41","url":null,"abstract":"Since China entered WTO, the policy restrictions in many industries have been gradually loosened or eliminated. The foreign companies have obtained sufficient understanding on China's markets through the long-term grope, as a result, many foreign enterprises begin to step towards sole proprietorship and they gradually expedited their speed. Influences from such a change and trend upon China's economy are presenting themselves gradually. This article is to analyze the evolution of the phenomenon, the features and the unfavorable impacts upon Chinapsilas economy in order to find out the countermeasures.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129058718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
How to efficiently use the vast amounts of information on the Web to make the information processing intelligent, personalized and automatic is the most important applications of the current data mining technology. In this paper, Web data mining process is introduced from the view of function, an intelligent mining system of network information is built with combining the data mining and artificial intelligence technologies and the functions of the various subsystems of it are also introduced.
{"title":"Information Intelligent System based on Web Data Mining","authors":"Shaobo Zhong","doi":"10.1109/ISECS.2008.192","DOIUrl":"https://doi.org/10.1109/ISECS.2008.192","url":null,"abstract":"How to efficiently use the vast amounts of information on the Web to make the information processing intelligent, personalized and automatic is the most important applications of the current data mining technology. In this paper, Web data mining process is introduced from the view of function, an intelligent mining system of network information is built with combining the data mining and artificial intelligence technologies and the functions of the various subsystems of it are also introduced.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130613648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For improving the usability of the anonymous result, it is important to comply with the hierarchical structure when generalizing quasi-identifying attributes with hierarchical characteristics. We propose an unrestricted multi-dimensional anonymization model which combines global recoding and local recoding methods. The bottom-up anonymization algorithm with the minimal coverage subgraph constraint and the anonymization metric are proposed. The experiment results justify the effectiveness and scalability of this model.
{"title":"A Multi-Dimensional K-Anonymity Model for Hierarchical Data","authors":"Xiaojun Ye, Lei Jin, Bin Li","doi":"10.1109/ISECS.2008.113","DOIUrl":"https://doi.org/10.1109/ISECS.2008.113","url":null,"abstract":"For improving the usability of the anonymous result, it is important to comply with the hierarchical structure when generalizing quasi-identifying attributes with hierarchical characteristics. We propose an unrestricted multi-dimensional anonymization model which combines global recoding and local recoding methods. The bottom-up anonymization algorithm with the minimal coverage subgraph constraint and the anonymization metric are proposed. The experiment results justify the effectiveness and scalability of this model.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125434242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a new type of data processing tool, data mining technology plays an important role in dealing with massive data, transforming data into valuable information, assisting enterprises in effective CRM decision-making and other aspects. On the basis of detailed analysis of the existing CRM structure, a new design scheme of customer relationship management systems based on data mining is presented and the design details of which are illustrated in detail.
{"title":"Design of Customer Relationship Management Systems Based on Data Mining","authors":"Jianhong Zhou, Xie Yi","doi":"10.1109/ISECS.2008.206","DOIUrl":"https://doi.org/10.1109/ISECS.2008.206","url":null,"abstract":"As a new type of data processing tool, data mining technology plays an important role in dealing with massive data, transforming data into valuable information, assisting enterprises in effective CRM decision-making and other aspects. On the basis of detailed analysis of the existing CRM structure, a new design scheme of customer relationship management systems based on data mining is presented and the design details of which are illustrated in detail.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To stay competitive, enterprises face the problem to evolve the legacy applications which their core business activities are relying on. Besides, they are expecting an enterprise business intelligent system which help them have more comprehensive knowledge of the factors affecting their business and enable them make better decision-making. This paper introduces a seamless integration solution for the evolving. It may minimize the involved risk of new development, the cost of new application development and related training, and potential risk of losing marketing chance due to some problems in the new deployment.
{"title":"A Framework for Seamless Integration of Legacy Business Applications into Enterprise Business Intelligent System","authors":"Jun Yu, Bin Xu","doi":"10.1109/ISECS.2008.190","DOIUrl":"https://doi.org/10.1109/ISECS.2008.190","url":null,"abstract":"To stay competitive, enterprises face the problem to evolve the legacy applications which their core business activities are relying on. Besides, they are expecting an enterprise business intelligent system which help them have more comprehensive knowledge of the factors affecting their business and enable them make better decision-making. This paper introduces a seamless integration solution for the evolving. It may minimize the involved risk of new development, the cost of new application development and related training, and potential risk of losing marketing chance due to some problems in the new deployment.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121560428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The definition of e-commerce and classification, the distinction between traditional business and e-commerce and the effect of e-commerce on the society and economics are illustrated and discussed. The developing process and status of e-commerce are stated, which makes the rapid developing e-commerce face new challenges. The demand for network security, mechanisms, business needs, risk and technical measures are analyzed in detail. On the basis of chaotic theory, how the chaotic control of encryption for e-commerce is studied and a comprehensive chaotic encryption algorithm is provided. The algorithm can be used to encrypt and decrypt to the transmission of data effectively. Moreover, a discrete chaotic system is simulated and the results show the confidentiality of the encryption method well.
{"title":"Application of Parameter Modulation in E-Commerce Security Based on Chaotic Encryption","authors":"Zhiming Qu, Tongbin Ma, Yunlong Zhang","doi":"10.1109/ISECS.2008.38","DOIUrl":"https://doi.org/10.1109/ISECS.2008.38","url":null,"abstract":"The definition of e-commerce and classification, the distinction between traditional business and e-commerce and the effect of e-commerce on the society and economics are illustrated and discussed. The developing process and status of e-commerce are stated, which makes the rapid developing e-commerce face new challenges. The demand for network security, mechanisms, business needs, risk and technical measures are analyzed in detail. On the basis of chaotic theory, how the chaotic control of encryption for e-commerce is studied and a comprehensive chaotic encryption algorithm is provided. The algorithm can be used to encrypt and decrypt to the transmission of data effectively. Moreover, a discrete chaotic system is simulated and the results show the confidentiality of the encryption method well.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114078926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The distance education has tended to cyberization, and how learners study in a collaborative way becomes a key issue. This paper presented a learning communities algorithm based on interest similarity, which can cluster learners with similar interests into the same community and help then collaborative learn. The experiments show that this mechanism can improve efficiency and scalability.
{"title":"A Novel Constructing Algorithm of E-learning Community","authors":"Yi Jiang, Qingling Yue, Zhaogui Qin","doi":"10.1109/ISECS.2008.202","DOIUrl":"https://doi.org/10.1109/ISECS.2008.202","url":null,"abstract":"The distance education has tended to cyberization, and how learners study in a collaborative way becomes a key issue. This paper presented a learning communities algorithm based on interest similarity, which can cluster learners with similar interests into the same community and help then collaborative learn. The experiments show that this mechanism can improve efficiency and scalability.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116146449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new and universal steganalysis scheme for JPEG images was proposed. Moments in frequency domain of wavelet sub-bandpsilas histogram was extracted to analyze the difference of histogram between cover image and stego image, at the same time, used high-pass filter to strengthen the image in order to make the discontinuity among blocks become more obvious, so the extracted block characteristic will be more sensitive to the steganographic action. Then Support Vector Machine (SVM) was used to classify the extracted 40 dimensional feature vectors. The experimental results of 3 popular JPEG steganographic schemes (F5, Outguess and MB1) demonstrate that the proposed scheme has the advantage in detection rate and speed.
{"title":"A New Steganalysis Method Using High-pass Filter for JPEG Image","authors":"Han-ling Zhang, Shu-yi Wang","doi":"10.1109/ISECS.2008.120","DOIUrl":"https://doi.org/10.1109/ISECS.2008.120","url":null,"abstract":"A new and universal steganalysis scheme for JPEG images was proposed. Moments in frequency domain of wavelet sub-bandpsilas histogram was extracted to analyze the difference of histogram between cover image and stego image, at the same time, used high-pass filter to strengthen the image in order to make the discontinuity among blocks become more obvious, so the extracted block characteristic will be more sensitive to the steganographic action. Then Support Vector Machine (SVM) was used to classify the extracted 40 dimensional feature vectors. The experimental results of 3 popular JPEG steganographic schemes (F5, Outguess and MB1) demonstrate that the proposed scheme has the advantage in detection rate and speed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115864977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wu Deng, Xinhua Yang, Huimin Zhao, Dan Lei, Hua Li
With the advent of Web services and SOA (service-oriented architecture), it seems to be feasible to realize EAI (enterprise application integration) and automatic inter-enterprise interactions. This paper combines SOA and Web service technology which simplify the application integration into the development and using of services, solve the connectivity of the isomerous platform, security, and the loose coupling between systems, as well as the refactoring and optimization of the processes. It integrates the isomerous enterprise systems, applications, and business processes and composing application environment of the data sources as a whole system. In addition, the technique standards, such as SOAP, WSDL, BPEL, WDDI, etc., are studied. The various key components of SOA are integrated and implemented. By studying the service-oriented software analyzing and development characteristics, an EAI system with great interoperability, reusability, flexibility is to be realized.
{"title":"Study on EAI Based on Web Services and SOA","authors":"Wu Deng, Xinhua Yang, Huimin Zhao, Dan Lei, Hua Li","doi":"10.1109/ISECS.2008.121","DOIUrl":"https://doi.org/10.1109/ISECS.2008.121","url":null,"abstract":"With the advent of Web services and SOA (service-oriented architecture), it seems to be feasible to realize EAI (enterprise application integration) and automatic inter-enterprise interactions. This paper combines SOA and Web service technology which simplify the application integration into the development and using of services, solve the connectivity of the isomerous platform, security, and the loose coupling between systems, as well as the refactoring and optimization of the processes. It integrates the isomerous enterprise systems, applications, and business processes and composing application environment of the data sources as a whole system. In addition, the technique standards, such as SOAP, WSDL, BPEL, WDDI, etc., are studied. The various key components of SOA are integrated and implemented. By studying the service-oriented software analyzing and development characteristics, an EAI system with great interoperability, reusability, flexibility is to be realized.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"146 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114058783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}