Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269453
Di haolin, Jiao liuyan
In this paper, the author subdivides the evaluation factors of subscriber's behavior loyalty under the guidance of the precise marketing, puts forward subscriber's behavior of 3G loyalty model, and according to the correlation analysis about all of data of 3G subscriber from a regional operator in 2010 August with SAS software, features of behavior loyalty in deep subscriber . It is a foundation to make a reasonable marketing strategy.
{"title":"The research on the behavior loyalty model of 3G subscriber based on data mining","authors":"Di haolin, Jiao liuyan","doi":"10.1109/ICSESS.2012.6269453","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269453","url":null,"abstract":"In this paper, the author subdivides the evaluation factors of subscriber's behavior loyalty under the guidance of the precise marketing, puts forward subscriber's behavior of 3G loyalty model, and according to the correlation analysis about all of data of 3G subscriber from a regional operator in 2010 August with SAS software, features of behavior loyalty in deep subscriber . It is a foundation to make a reasonable marketing strategy.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130673789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269452
Liu Ming, Wanglin Yan
The development and expansion of Internet of Things need to solve a series of geographical questions such as space organization and industrial spatial distribution. Based on the integration of massive data between realistic space and virtual space, Internet of Things will affect the scale and means of Geographical research. Thus, this paper attempts to explore such new phenomenon of Human Geography, especially the change from Internet era to Internet of Things era, and try to construct the framework of Internet of Things Geography.
{"title":"The study on geography under Internet of Things","authors":"Liu Ming, Wanglin Yan","doi":"10.1109/ICSESS.2012.6269452","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269452","url":null,"abstract":"The development and expansion of Internet of Things need to solve a series of geographical questions such as space organization and industrial spatial distribution. Based on the integration of massive data between realistic space and virtual space, Internet of Things will affect the scale and means of Geographical research. Thus, this paper attempts to explore such new phenomenon of Human Geography, especially the change from Internet era to Internet of Things era, and try to construct the framework of Internet of Things Geography.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123829848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269411
Bai Xuefu, Yang Ming
With the Internet quickly development, Instant Message System (IMS) has been applied popularly in daily communication, collaboration OA, E-commerce and Enterprise Customer Service. However, the public Instant Message System can not be easily integrated into the existing enterprise system due to the limitation of different messaging protocols and system customer database. In this paper, by analyzing XMPP core protocol and requirement of enterprise-class IMS (EIMS), we design an implementation framework for EIMS by developing Openfire server and integrating custom database. The provided solution based on XMPP has a better security, openness and supports cross-platform, thus it allows enterprises to create their own EIMS that are flexible and scalable and encourage good system architecture since it can integrate web-based IMS into the other company's internal applications and services with minimum effort.
{"title":"Design and implementation of web Instant Message System based on XMPP","authors":"Bai Xuefu, Yang Ming","doi":"10.1109/ICSESS.2012.6269411","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269411","url":null,"abstract":"With the Internet quickly development, Instant Message System (IMS) has been applied popularly in daily communication, collaboration OA, E-commerce and Enterprise Customer Service. However, the public Instant Message System can not be easily integrated into the existing enterprise system due to the limitation of different messaging protocols and system customer database. In this paper, by analyzing XMPP core protocol and requirement of enterprise-class IMS (EIMS), we design an implementation framework for EIMS by developing Openfire server and integrating custom database. The provided solution based on XMPP has a better security, openness and supports cross-platform, thus it allows enterprises to create their own EIMS that are flexible and scalable and encourage good system architecture since it can integrate web-based IMS into the other company's internal applications and services with minimum effort.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123907900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269422
Hui Zhang, Xiang-feng Guan
In iris recognition, as a large amount of experiments show, the inner edge of iris is not a standard circle, thus edges may cause the error of accurate recognition. If we use traditional localization method of round template, it can cause the problem of iris legacy, the loss of iris textures and longer time as well. To improve the accuracy of iris location, reduce the recognition time, this paper develops a new iris recognition algorithm. Firstly, the lights pot within the pupil is filled in the original image, then the image is unfolded into a rectangle and the circle detection is substituted by the point and line detection in the rectangle image to find the inner and outer edge, secondly, texture features are extracted by EMD. Thirdly, the K nearest neighbors (KNN) of each test sample are found based on distance of Mahalanibis. Lastly, recognition results are decided by majority voting method. The recognition accuracy of simulation experiments based on CASIA iris image database amounts to 99% and has the less running time. The results show that compared to circle template, Rectangle Conversion has more accurate location of the iris, thus effectively raising the recognition accuracy.
{"title":"Iris recognition based on grouping KNN and Rectangle Conversion","authors":"Hui Zhang, Xiang-feng Guan","doi":"10.1109/ICSESS.2012.6269422","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269422","url":null,"abstract":"In iris recognition, as a large amount of experiments show, the inner edge of iris is not a standard circle, thus edges may cause the error of accurate recognition. If we use traditional localization method of round template, it can cause the problem of iris legacy, the loss of iris textures and longer time as well. To improve the accuracy of iris location, reduce the recognition time, this paper develops a new iris recognition algorithm. Firstly, the lights pot within the pupil is filled in the original image, then the image is unfolded into a rectangle and the circle detection is substituted by the point and line detection in the rectangle image to find the inner and outer edge, secondly, texture features are extracted by EMD. Thirdly, the K nearest neighbors (KNN) of each test sample are found based on distance of Mahalanibis. Lastly, recognition results are decided by majority voting method. The recognition accuracy of simulation experiments based on CASIA iris image database amounts to 99% and has the less running time. The results show that compared to circle template, Rectangle Conversion has more accurate location of the iris, thus effectively raising the recognition accuracy.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121706678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269574
Gefei Sun, K. Yajima, J. Miura, Kai Shi, Y. Goto, Jingde Cheng
To acquire the certification according to ISO/IEC 15408 for a target system, it is necessary to create a security target (ST) which specifies security facilities of the system. Creating STs is not an easy task for developers because they do not know how to create STs well, even if they know the security facilities. Meanwhile, STs should be maintained continuously to keep a target system secure. Maintaining STs is not easy as same as creating STs. However, there is no tool to support developers and maintainers to create and maintain STs so far. This paper presents a supporting tool according to ISO/IEC 15408, named ST-Editor. ST-Editor tells users what should be described and how they should be described in STs and provides a helpful and secure editing and maintaining environment of STs.
{"title":"A supporting tool for creating and maintaining security targets according to ISO/IEC 15408","authors":"Gefei Sun, K. Yajima, J. Miura, Kai Shi, Y. Goto, Jingde Cheng","doi":"10.1109/ICSESS.2012.6269574","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269574","url":null,"abstract":"To acquire the certification according to ISO/IEC 15408 for a target system, it is necessary to create a security target (ST) which specifies security facilities of the system. Creating STs is not an easy task for developers because they do not know how to create STs well, even if they know the security facilities. Meanwhile, STs should be maintained continuously to keep a target system secure. Maintaining STs is not easy as same as creating STs. However, there is no tool to support developers and maintainers to create and maintain STs so far. This paper presents a supporting tool according to ISO/IEC 15408, named ST-Editor. ST-Editor tells users what should be described and how they should be described in STs and provides a helpful and secure editing and maintaining environment of STs.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127701499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269475
Yan Shi
Evaluation of campus network security is a complicated systematic project. The paper analyzes the reasons of the questions, obtains the solving method, and at last builds the M(1,2,3) model without the interference of redundant data, which is different from )M(g+) and is a nonlinear model. The paper will apply the new algorithm in the fuzzy evaluation on campus network security.
{"title":"The study on campus network security evaluation based on fuzzy membership","authors":"Yan Shi","doi":"10.1109/ICSESS.2012.6269475","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269475","url":null,"abstract":"Evaluation of campus network security is a complicated systematic project. The paper analyzes the reasons of the questions, obtains the solving method, and at last builds the M(1,2,3) model without the interference of redundant data, which is different from )M(g+) and is a nonlinear model. The paper will apply the new algorithm in the fuzzy evaluation on campus network security.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122249004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269441
Wang Pingping, Qian Xiaoyao, Zhu Jiang
As the development of science and technology, intelligent electrical appliances are increasing, gradually introducing the embedded microprocessor software to replace hardware to complete the functional and safe control has become an inevitable trend. As the electrical use is directly related to the safety of persons and property, so the safety testing and reliability testing of software are especially important. Compared with ordinary embedded software, embedded software of appliances has their own characteristics. Combination with general-purpose embedded software testing process improved V model and Butterfly model, this paper proposes the test process model for embedded software of electrical products based on their own software characteristics and further a study for classification of the test methods.
{"title":"Testing process model and classification of test methods for embedded software of electrical products","authors":"Wang Pingping, Qian Xiaoyao, Zhu Jiang","doi":"10.1109/ICSESS.2012.6269441","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269441","url":null,"abstract":"As the development of science and technology, intelligent electrical appliances are increasing, gradually introducing the embedded microprocessor software to replace hardware to complete the functional and safe control has become an inevitable trend. As the electrical use is directly related to the safety of persons and property, so the safety testing and reliability testing of software are especially important. Compared with ordinary embedded software, embedded software of appliances has their own characteristics. Combination with general-purpose embedded software testing process improved V model and Butterfly model, this paper proposes the test process model for embedded software of electrical products based on their own software characteristics and further a study for classification of the test methods.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122282985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269569
Bo Qu, Zhong-xue Yang
This paper describes the technical details of design and implementation of an embedded secure CGI daemon, which not only is a CGI program residing permanently in memory but also integrates a CGI based secure HTTP server which is dedicated to support CGI specification. The content of the pager consists mainly of two parts, of which the first is designing of CGI based secure HTTP server, including SSL and HTTP programming, and generating and downloading of self-signed certificate, while the second is designing of CGI daemon including CGI programming and the mainly used techniques, such as secure login, CAPTCHA, password getting back, etc. A practical embedded application system is provided as demo example to show the usage and effects of the secure CGI daemon.
{"title":"Design of embedded secure CGI daemon","authors":"Bo Qu, Zhong-xue Yang","doi":"10.1109/ICSESS.2012.6269569","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269569","url":null,"abstract":"This paper describes the technical details of design and implementation of an embedded secure CGI daemon, which not only is a CGI program residing permanently in memory but also integrates a CGI based secure HTTP server which is dedicated to support CGI specification. The content of the pager consists mainly of two parts, of which the first is designing of CGI based secure HTTP server, including SSL and HTTP programming, and generating and downloading of self-signed certificate, while the second is designing of CGI daemon including CGI programming and the mainly used techniques, such as secure login, CAPTCHA, password getting back, etc. A practical embedded application system is provided as demo example to show the usage and effects of the secure CGI daemon.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129973939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269510
C. Wang, Sujing Xue
The quality of the general commodities can be measured by three indicators: whether commodity production enterprises have the authenticated production capacity; whether the goods could be tested as qualified by the trusted party according to special standards; whether the goods are in the marked period of validity. By using the anti-counterfeiting code which includes the information of commodity quality and identification, the commodity quality authentication protocol can help users authenticate the platform, distinguish the forged and fake commodities, and provide the information of the production enterprises and the quality inspection institution, as well as the commodity circulation. With the above information, consumers can maintain their rights and interests to the largest degree.
{"title":"Commodity quality authentication protocol on the good faith cloud platform","authors":"C. Wang, Sujing Xue","doi":"10.1109/ICSESS.2012.6269510","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269510","url":null,"abstract":"The quality of the general commodities can be measured by three indicators: whether commodity production enterprises have the authenticated production capacity; whether the goods could be tested as qualified by the trusted party according to special standards; whether the goods are in the marked period of validity. By using the anti-counterfeiting code which includes the information of commodity quality and identification, the commodity quality authentication protocol can help users authenticate the platform, distinguish the forged and fake commodities, and provide the information of the production enterprises and the quality inspection institution, as well as the commodity circulation. With the above information, consumers can maintain their rights and interests to the largest degree.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"155 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134012802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-22DOI: 10.1109/ICSESS.2012.6269402
Bowei He, Yuehua Yang, Junping Du
This paper presents a ontology-based semantic query expansion method. This method takes the food safety domain as a background and combines concepts similarity computation model. Firstly, the ontology-based representation method for food safety domain knowledge is proposed. Then, the expansion of queries is realized by the semantic relationships in food safety ontology and the expansion of the lexicon for words segmentation. Finally, concepts similarity computation model is applied to set the expansion range of domain concepts. Experimental results show that this method can not only obtain the search results consistent with the search conditions in the grammatical form, but also obtain the results semantically consistent with the search conditions. Besides, the retrieval results have been sorted according to the relevance.
{"title":"Semantic query expansion method for food safety domain","authors":"Bowei He, Yuehua Yang, Junping Du","doi":"10.1109/ICSESS.2012.6269402","DOIUrl":"https://doi.org/10.1109/ICSESS.2012.6269402","url":null,"abstract":"This paper presents a ontology-based semantic query expansion method. This method takes the food safety domain as a background and combines concepts similarity computation model. Firstly, the ontology-based representation method for food safety domain knowledge is proposed. Then, the expansion of queries is realized by the semantic relationships in food safety ontology and the expansion of the lexicon for words segmentation. Finally, concepts similarity computation model is applied to set the expansion range of domain concepts. Experimental results show that this method can not only obtain the search results consistent with the search conditions in the grammatical form, but also obtain the results semantically consistent with the search conditions. Besides, the retrieval results have been sorted according to the relevance.","PeriodicalId":205738,"journal":{"name":"2012 IEEE International Conference on Computer Science and Automation Engineering","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133870975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}