Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479288
Xu Jian, Ma Bin
Safety and genuineness protection of the documents while traveling over the internet is very crucial. In this paper, a novel watermarking scheme for electronic seal based on discrete wavelet transform (DWT) is proposed. The theory of digital watermark based on DWT for electronic seal is discussed. The watermark signals are considered as a binary sequence embedded to the high (HL and HH) frequency band of the document in DWT domain. The algorithm of how to embed and extract the watermark is shown in the paper. The experimental results demonstrate the efficiency of the proposed scheme, which fulfills the strict requirements of electronic seal and is practicality perfect by means of good balance between transparency and robustness.
{"title":"Document electronic seal system based on digital watermark and DWT technology","authors":"Xu Jian, Ma Bin","doi":"10.1109/ICNDS.2010.5479288","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479288","url":null,"abstract":"Safety and genuineness protection of the documents while traveling over the internet is very crucial. In this paper, a novel watermarking scheme for electronic seal based on discrete wavelet transform (DWT) is proposed. The theory of digital watermark based on DWT for electronic seal is discussed. The watermark signals are considered as a binary sequence embedded to the high (HL and HH) frequency band of the document in DWT domain. The algorithm of how to embed and extract the watermark is shown in the paper. The experimental results demonstrate the efficiency of the proposed scheme, which fulfills the strict requirements of electronic seal and is practicality perfect by means of good balance between transparency and robustness.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131534173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479218
C. Yuchao, Jia Hu
M-1earning is a practice to promote learning by using mobile technology. It is also a new stage in informatization learning. Nowadays, the learning contents and learning methods of M-learning are paid no attention, and the mode of M-learning cannot be studied either. On the base of the discussion of the characteristics and normal operation schemes of M-learning, the feasibility of its application in modern education is analyzed in the paper. Meanwhile, M-learning mode in the whole process supervision of location, independent, exploration and mutual aid mobile learning is constructed. In the mode, M-learning can be supervise in the whole process to promote the information technology to develop its good effects for learning. The goal to propose the M-learning mode is to provide guidance for learners. It operates simply and has some guiding significance.
{"title":"Study on M-learning mode in the whole process supervision of location, independent, exploration and mutual aid","authors":"C. Yuchao, Jia Hu","doi":"10.1109/ICNDS.2010.5479218","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479218","url":null,"abstract":"M-1earning is a practice to promote learning by using mobile technology. It is also a new stage in informatization learning. Nowadays, the learning contents and learning methods of M-learning are paid no attention, and the mode of M-learning cannot be studied either. On the base of the discussion of the characteristics and normal operation schemes of M-learning, the feasibility of its application in modern education is analyzed in the paper. Meanwhile, M-learning mode in the whole process supervision of location, independent, exploration and mutual aid mobile learning is constructed. In the mode, M-learning can be supervise in the whole process to promote the information technology to develop its good effects for learning. The goal to propose the M-learning mode is to provide guidance for learners. It operates simply and has some guiding significance.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121767558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479403
Yazhong Wang, Ke Wei
Inter prediction creates a prediction model from one or more previously encoded video frames or fields using block-based motion compensation. In this paper, we briefly analyze the inter prediction tools available in the Baseline profile of the h.264 coding standard. Important differences from earlier standards include the support for a range of block sizes (from 16×16 down to 4×4) and fine sub-sample motion vectors (quarter-sample resolution in the luma component).
{"title":"Brief analysis of inter prediction in video coding","authors":"Yazhong Wang, Ke Wei","doi":"10.1109/ICNDS.2010.5479403","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479403","url":null,"abstract":"Inter prediction creates a prediction model from one or more previously encoded video frames or fields using block-based motion compensation. In this paper, we briefly analyze the inter prediction tools available in the Baseline profile of the h.264 coding standard. Important differences from earlier standards include the support for a range of block sizes (from 16×16 down to 4×4) and fine sub-sample motion vectors (quarter-sample resolution in the luma component).","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128018920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479147
Recent explosion of the Internet and the emergence of the concept of e-Government endeavor to improve the delivery of public services. E-Government could well become a driver of the innovation process in public sector. The opportunities are still clouded by a lack of clear visions and of generic reference models of electronic service delivery. Over the past decade, many countries are working to provide “citizen-centric” electronic services as the theme of the development of e-government. From there a reference model for electronic services is sketched.
{"title":"E-Government: Innovation in public sector","authors":"","doi":"10.1109/ICNDS.2010.5479147","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479147","url":null,"abstract":"Recent explosion of the Internet and the emergence of the concept of e-Government endeavor to improve the delivery of public services. E-Government could well become a driver of the innovation process in public sector. The opportunities are still clouded by a lack of clear visions and of generic reference models of electronic service delivery. Over the past decade, many countries are working to provide “citizen-centric” electronic services as the theme of the development of e-government. From there a reference model for electronic services is sketched.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479405
Shuping Xin
In this paper, we briefly introduce the AVS-M, show the SATD function definition and the role of it. And then, we optimize the SATD function in AVS-M in four parts: expand cycle, use macro definition to the absolute value calculation, use the C library function instead of macro definition, merger the final step of Hadamard_Transform. Through optimization, coding speed increased from 1.15 frame/sec to 1.32 frame/sec.
{"title":"Optimization of the SATD function in AVS-M","authors":"Shuping Xin","doi":"10.1109/ICNDS.2010.5479405","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479405","url":null,"abstract":"In this paper, we briefly introduce the AVS-M, show the SATD function definition and the role of it. And then, we optimize the SATD function in AVS-M in four parts: expand cycle, use macro definition to the absolute value calculation, use the C library function instead of macro definition, merger the final step of Hadamard_Transform. Through optimization, coding speed increased from 1.15 frame/sec to 1.32 frame/sec.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132565107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479246
Q. Zhao, Mali Ye
There is a static authentication of “username + password” in the distance education system currently. The various kinds of drawbacks of this approach to evaluate the effect of distance education make its credibility is not high. The certification methods of face recognition adopted in this paper, which is based on two-dimensional hidden Markov model (P2D-HMM), enable distance education secure and reliable so as to enhance the teaching effectiveness and promote the development of distance education.
{"title":"The application and implementation of face recognition in authentication system for distance education","authors":"Q. Zhao, Mali Ye","doi":"10.1109/ICNDS.2010.5479246","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479246","url":null,"abstract":"There is a static authentication of “username + password” in the distance education system currently. The various kinds of drawbacks of this approach to evaluate the effect of distance education make its credibility is not high. The certification methods of face recognition adopted in this paper, which is based on two-dimensional hidden Markov model (P2D-HMM), enable distance education secure and reliable so as to enhance the teaching effectiveness and promote the development of distance education.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"265 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479446
Zhihui Wu, Y. Qian
for meeting the demands of dynamic characteristics and product quality control for chemical batch process, an approach of computer aided process system integration was proposed. The technology of process state monitoring and product quality control were carried out on a kilogram scale laboratory chemical process, micro-plant based on the construction of apparatus hardware and software for integration. The proposed approach and technology were then applied to synthesis process of ethyl p-hydroxyl benzoate. The results prove that the proposed approach and technology are feasible and can be practical in chemical batch process monitoring and product quality controlling.
{"title":"A study on computer aided process integration system design for chemical batch process development","authors":"Zhihui Wu, Y. Qian","doi":"10.1109/ICNDS.2010.5479446","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479446","url":null,"abstract":"for meeting the demands of dynamic characteristics and product quality control for chemical batch process, an approach of computer aided process system integration was proposed. The technology of process state monitoring and product quality control were carried out on a kilogram scale laboratory chemical process, micro-plant based on the construction of apparatus hardware and software for integration. The proposed approach and technology were then applied to synthesis process of ethyl p-hydroxyl benzoate. The results prove that the proposed approach and technology are feasible and can be practical in chemical batch process monitoring and product quality controlling.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114183675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479205
Xiaodong Zheng
In the information age, e-government has become an indispensable tool for good governance, and an information-oriented government has become a key factor for all countries or regions to improve their global competitiveness. E-government construction is a complex project that costs substantial investments and involves multiplex fields, thus it need for sound planning as a basis. On the basis of expatiation on the concept and significances of e-government planning, this paper analyses the main problems and their causes in China's e-government planning, and then propose solutions to these problems. This research may redound to all levels of government in China on developing sound scientific e-government planning.
{"title":"On the predicament of China's e-government planning and its prescription","authors":"Xiaodong Zheng","doi":"10.1109/ICNDS.2010.5479205","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479205","url":null,"abstract":"In the information age, e-government has become an indispensable tool for good governance, and an information-oriented government has become a key factor for all countries or regions to improve their global competitiveness. E-government construction is a complex project that costs substantial investments and involves multiplex fields, thus it need for sound planning as a basis. On the basis of expatiation on the concept and significances of e-government planning, this paper analyses the main problems and their causes in China's e-government planning, and then propose solutions to these problems. This research may redound to all levels of government in China on developing sound scientific e-government planning.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479314
Xiaofeng Li, Xiaoxia Gao, Xuedong Li, H. Gou
To increase the agility of the chain store operation with the information technology, the communication system is proposed with the mobile networks to link the headquarters with the chain stores distributed widely. In the store, the mobile is attached to POS with USB, and the data exchanging service is developed on the mobile to report the sale data and to download the updated data. At the headquarters, a communication server is established to provide the data service for the mobiles with the customized web service methods. In this way, the sale data of all the chain stores can be gathered in time, which is the groundwork for the business intelligence system.
{"title":"Mobile communication system for chain store operation","authors":"Xiaofeng Li, Xiaoxia Gao, Xuedong Li, H. Gou","doi":"10.1109/ICNDS.2010.5479314","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479314","url":null,"abstract":"To increase the agility of the chain store operation with the information technology, the communication system is proposed with the mobile networks to link the headquarters with the chain stores distributed widely. In the store, the mobile is attached to POS with USB, and the data exchanging service is developed on the mobile to report the sale data and to download the updated data. At the headquarters, a communication server is established to provide the data service for the mobiles with the customized web service methods. In this way, the sale data of all the chain stores can be gathered in time, which is the groundwork for the business intelligence system.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115756993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-05-30DOI: 10.1109/ICNDS.2010.5479131
Xun Duan, Guangqian Kong, Hongmei Wu
Lack of testing platform puzzled the research on overlay network. Recent research has shown that researcher can use Distributed Hash Tables (DHTs) to build certain applications, such as scalable, robust and efficient. Unfortunately, even though those applications have been implemented successfully, researcher is also hard to deploy large-scale distributed systems, nor are DHTs. Some worldwide platforms provide publicly accessible DHT service. Those kinds of platforms can issue at least put and get operations to any DHT node, which processes the operations on their behalf in contrast to the usual DHT model. This paper introduces overlay test-platform by an example of testing about resource location and concentrates on how to do the network testing based on it.
{"title":"Overlay network testing","authors":"Xun Duan, Guangqian Kong, Hongmei Wu","doi":"10.1109/ICNDS.2010.5479131","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479131","url":null,"abstract":"Lack of testing platform puzzled the research on overlay network. Recent research has shown that researcher can use Distributed Hash Tables (DHTs) to build certain applications, such as scalable, robust and efficient. Unfortunately, even though those applications have been implemented successfully, researcher is also hard to deploy large-scale distributed systems, nor are DHTs. Some worldwide platforms provide publicly accessible DHT service. Those kinds of platforms can issue at least put and get operations to any DHT node, which processes the operations on their behalf in contrast to the usual DHT model. This paper introduces overlay test-platform by an example of testing about resource location and concentrates on how to do the network testing based on it.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}