2015 International Conference on Control, Automation and Robotics (ICCAR 2015) 2015 The 7th International Conference on Future Computer and Communication (ICFCC 2015) 2015 The 2nd International Conference on Industrial Engineering and Applications (ICIEA 2015) *ICCAR 2015 conference papers will be published in conference proceeding, which will not be available on conference site, and will be delivered to authors’ address after conference. *ICIEA 2015 conference papers are selected to be published in several journals, due to the publication schedule, only a few papers will be published before the conference, most paper are scheduled to be published after the conference, we wil post your journal to your address when it published. *ICFCC 2015 conference papers are selected to be published in several journals, according to the publication schedule, which will not be available on conference site, and will be delivered to authors’ address after conference. -2- We are pleased to welcome you to the 2015 SCIEI Singapore conferecnes, which will takes place at Nanyang Technological University from May 20-22, 2015. After several rounds review procedure, the program committee accepted those papers to be published in Journals and conference proceedings. We wish to express our sincere appreciation to all the individulas who have contribute to ICCAR 2015, ICIEA 2015 and ICFCC 2015 conference in various ways. Special thanks are extended to our colleagues in program committee for their thorough review of all the submissions, which is vital to the success of the conference, and also to the members in the organizing committee and the volunteers who had delicated their time and efforts in planning, promoting, organizing and helping the conference. Last but not least, our speacial thanks goes to invited keynote speakers as well as all the authors for contributing their latest research to the conference. This conference program is highlighed by three keynote speakers: Prof. Maode Ma, from Nanyang Technological University, Singapore; Prof. Yang Xiao, from The University of Alabama, Tuscaloosa, USA and Dr. Girija Chetty, from University of Canberra, Canberra, Australia. One best presentation will be selected from each session, evaluated from: Originality; Applicability; Technical Merit; PPT; English. The best one will be announced at the end of each Session, and awarded the certificate after each session. The winners’ photos will be updated on SCIEI official website: www.sciei.org. Singapore, officially the Republic of Singapore, is an island country with beautiful landscape and multi-cutural lifes. We hope that your stay in Singapore will be enriching and memorable! The technical program will send you back home motivated, enthusiastic, and full of innovative ideas. We wish you a success conference and enjoyable visit in Singapore. Alice Wu Science and Engineering Institute -3- International Advisory Committee Prof. Alexander Rotshtein, Dept. of Industrial Engineering & Management, Jerusalem College of Technology, Jerusalem, Israel Conference Chair Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA Prof. Girija.Chetty, University of Canberra, Australia Prof. Maode Ma, Nanyang Technological University, Singapore Program Chair Prof.Soumaya Yacout, Department of Mathematics and Industrial Engineering, École Polytechnique de Montréal, Canada. (Workshop Chair of ICIEA) Prof. Thumrongrat Amornraksa, King Mongkut’s University of Technology Thonburi, Thailand Assoc. Prof.S. H. Choi, University of Hong Kong Associate Professor Fernando Moreira da Silva/Faculty o fArchitecture of the Technical University of Lisbon/Portugal Prof. Pyung Hoi Koo/Pukyong National University, Korea Prof.An-Chen Lee, National Chiao Tung University, Taiwan Technical Committee Assoc.Prof. Muhammad Abaidullah Anwar/Al Ghurair University Dubai, UAE Prof. S. Mohammad Bagher Malaek/ Sharif University of Technology in Tehran – Iran Prof.King-Chu Hung, National Kaohsiung First University of Science and Technology, Taiwan Prof.Mozammel Huq Azad Khan, East West University, Bangladesh Dr.Amirhossein Sajadi, Electrical Engineering and Computer Science Department of Case Western Reserve University, OH, USA Dr. Sutep Tongngam, National Institute of Development Administration (NIDA), Thailand Dr. P.SIVAPRAKASH, Department of Mechanical Engineering, A.S.L.Pauls College of Engineering& Technology, Coimbatore, India. Assistant Prof.Pankaj Bhambri, Guru Nanak Dev Engineering College, India, Assistant. Prof., Sureshkumar M.S, Sri Ramakrishna Engineering College, India. Prof. Dr Bora I Kumova, İzmir Institute of Technology, Turkey Prof. Amala V. Rajan, Higher Colleges of Technology – Dubai Women’s College, UAE Prof. Javad Dodangeh, University of Technology Sydney, Australia Prof. Heonchang Yu, Department of Computer Science Education, Korea University Yong Mao, MD Anderson Cancer Center, Houston, USA Shudong Fang, University of Auckland, New Zealand Prof. Bandit Suksawat, King Mongkut's University of Technology North Bangkok. Thailand prof. Hiroshi Takami, Shibaura Institute of Technology, Department of Electrical Engineering, Japan. -4- Nanyang Executive Centre 50 Nanyang Avenue, Singapore, 639798 Tel. +65 6794 7860 or email to [email protected] http://www.ntu.edu.sg/NEC/Pages/default.aspx GMT/UTC +8 Get on at Changi Airport (CG2)transfer at Tanah Merah (EW4) take the train all the way to Boon Lay (EW27) or Pioneer station(EW28) NTU (journey time 1h30m) Notice: NTU shuttle bus service: Campus Rider is a free shuttle bus service to and from Pioneer MRT station. From Boon Lay station, Services 179 & 199 will take you in to NTU. From Pioneer station, hop on the Campus Rider which stops in front of Blk 649A. For more, please click: http://www.streetdirectory.com/travel/ http://www.ntu.edu.sg/has/Transportation/Pages/GettingToNTU.aspx By Taxi: Total Time: 32 min, Approx Fare $35.40. There are various taxi companies operating in Singapore. Comprehensive information on Singapore taxis is available at www.taxisingapore.com. Singapore is hot and humid all year-round, with temperatures usually reaching over 30°C. You should be prepared for rain at any time, which can be torrential but usually brief. The currency for the Singapore dollar (SGD), 1 Yuan is equal to 100 points. The paper money face value has 2 Yuan, 5 Yuan, 10 Yuan, 50 Yuan, 100 Yuan, 500 Yuan, 1000 Yuan, 10000 Yuan; The coin has 5 point, 10 point, 20 point, 50 point, 1 Yuan. -5- You are not allowed to smoke in all air-conditioned places, such as malls and eateries. There are designated smoking areas in some entertainment outlets and open-air eateries. You can drink water straight from the tap as the water in Singapore passes World Health Organization standards. You can also buy bottled water easily. Know more, please click: http://www.yoursingapore.com/en.html. Emergency (police, fire, ambulance) : 999/995/995 Weather report: 0065-65427788 Tourist Complaint Hotline: 18007363366 Voltage : 220-240 volts AC (50 cycles) -6- Oral Presentations Timing: a maximum of 15 minutes total, including speaking time and discussion. Please make sure your presentation is well timed. Please keep in mind that the program is full and that the speaker after you would like their allocated time available to them. You can use CD or USB flash drive (memory stick), and make sure you scanned viruses in your own computer. Each speaker is required to meet her/his session chair in the corresponding session rooms 10 minutes before the session starts and copy the slide file(PPT or PDF) to the computer, It is suggested that you email a copy of your presentation to your personal inbox as a backup. If for some reason the files can’t be accessed from your flash drive, you will be able to download them to the computer from your email. Please note that each session room will be equipped with a LCD projector, screen, point device, microphone, and a laptop with general presentation software such as Microsoft PowerPoint and Adobe Reader. Please make sure that your files are compatible and readable with our operation system by using commonly used fronts and symbols. If you plan to use your own computer, please try the connection and make sure it works before your presentation. Movies: If your PowerPoint files contain movies please make sure that they are well formatted and connected to the main files. Poster Presentations Maximum poster size is 36 inches wide by 48 inches high (3 ft. x 4 ft.) Posters are required to be condensed and attractive. The characters should be large enough so that they are visible from 1 meter apart. Please note that during your poster session, the author should stay by your poster paper to explain and discuss your paper with visiting delegates. Dress code Please wearing formal clothes or national characteristics of clothing -7- “Security Enhancements for Communication Networks in Smart Grid” Abstract: The ever growing demand of energy all over the world has compelled a shift from the traditional power distribution system to a more sustainable and efficient system incorporating the advances of Information technology and communication and networking technologies. This new energy infrastructure is envisioned not only to provide more optimal energy consumption and better real-time power requirement assessment but also to incorporate renewable energy generation sources at both consumer and provider sides for environment friendly power generation. In this talk, we investigate the security aspects of the home area networks (HANs) and neighborhood area networks (NANs) to support the operation of the smart grid in detail. We explore the vulnerabilities of the HANs and NANs under various malicious attacks and review current major solutions to protect the networks from those attacks. We further present an example to show the possible security enhancement over the NANs. About Prof. Maode Ma: Dr. Maode Ma received his Ph.D. degree in computer science from Hong Kong University of Science and Technology in 1999. Now, Dr. Ma is an Associate Professor in the School of Electrical and Electronic Engineering at Nanyang Technological University in Singapore. He has extensive research interests including wireless networking and network security. He has led and/or participated in 18 research projects funded by government, industry, military and universities in various countries. He has been a general chair, technical symposium chair, tutorial chair, publication chair, publicity chair and session chair for more than 70 international conferences. He has been a member of the technical program committees for more than 180 international conferences. Dr. Ma has more than 260 international academic publications including more than 110 journal papers and 150 conference papers. He currently serves as the Editor-in-Chief of International Journal of Computer and Communication Engineering and International Journal of Electronic Transport. He also serves as a Senior Editor for IEEE Communications Surveys and Tutorials, and an Associate Editor for International Journal of Network and Computer Applications, International Journal of Security and Communication Networks, International Journal of Wireless Communications and Mobile Computing and International Journal of Communication Systems. He had been an Associate Editor for IEEE Communications Letters from 2003 to 2011. Dr. Ma is the Fellow of IET and a senior member of IEEE Communication Society and IEEE Education Society. He is the Chair of the IEEE Education Society, Singapore Chapter. He is serving as an IEEE Communication Society Distinguished Lecturer. -8- “Flow-Net Accountable Logging and Applications” Abstract: Accountability implies that any entity should be held responsible for its own specific action or behavior so that the entity is part of larger chains of accountability. One of the goals of accountability is that once an event has transpired, the events that took place are traceable so that the causes can be determined afterward. The poor accountability provided by today’s computers and networks wastes a great deal of money and effort. This is due to the simple fact that today’s computing and network infrastructure was not built with accountability in mind. In this talk we introduce our previous work: accountable logging methodology called flow-net. We apply this methodology to many applications ranging from operating system design to computer networks. About Prof. Yang Xiao: Dr. Yang Xiao is a full Professor of Department of Computer Science at the University of Alabama, Tuscaloosa, AL, USA. His current research interests include communications/networks and computer/network security. He has published over 200 SCI-indexed journal papers and over 200 EI indexed refereed conference papers and book chapters related to these research areas. Dr. Xiao’s papers have more than 12000 citations and his h-index is 56, based on Google scholar on Aug. 1 2014. Dr. Xiao was listed among 800 computer science researchers with h-index larger than or equal to 40. His research has been supported by the U.S. NSF, U.S. Army Research, GENI, Fleet Industrial Supply Center-San Diego, FIATECH, and The University of Alabama’s Research Grants Committee. Dr. Xiao was a Voting Member of IEEE 802.11 Working Group from 2001 to 2004, involving IEEE 802.11 (WIFI) standardization work. He is a Fellow of IET (FIET). He served/serves as a Panelist for the U.S. National Science Foundation (NSF), The Global Environment for Network Innovations (GENI), Canada Foundation for Innovation’s Telecommunications expert committee, and the American Institute of Biological Sciences, as well as a Referee/Reviewer for many national and international funding agencies. He currently serves as Editor-in-Chief for International Journal of Security and Networks and International Journal of Sensor Networks. He had (s) been an Editorial Board or Associate Editor for 15 international journals, including IEEE Transactions on Systems, Man, and Cybernetics: Systems, during 2014 to 2015, IEEE Transactions on Vehicular Technology, during 2007 to 2009, and IEEE Communications Survey and Tutorials, during 2007 to 2014. He served (s) as a Guest Editor for over 20 times for different international journals, including IEEE Network , IEEE Wireless Communications , and ACM/Springer Mobile Networks and Applications (MONET). Dr. Xiao has delivered over 20 keynote speeches at international conferences around the world and gave more than 60 invited talks at different international institutes. -9- “” Abstract: About Dr. Girija Chetty: Dr. Girija Chetty has a Bachelors and Masters degree in Electrical Engineering and Computer Science, and PhD in Information Sciences and Engineering from Australia. She has more than 25 years of experience in Industry, Research and Teaching from Universities and Research and Development Companies from India and Australia, and has held several leadership positions including Head of Software Engineering and Computer Science, and Course Director for Master of Computing Course. Currently, she is the Head of Multimodal Systems and Information Fusion Group in University of Canberra, Australia, and leads a research group with several PhD students, Post Docs, research assistants and regular International and National visiting researchers. She is a Senior Member of IEEE, USA, and senior member of Australian Computer Society, and her research interests are in the area of multimodal systems, computer vision, pattern recognition and image processing. She has published extensively with more than 120 fully refereed publications in several invited book chapters, edited books, high quality conference and journals, and she is in the editorial boards, technical review committees and regular reviewer for several IEEE, Elsevier and IET journals in Computer Vision, Pattern Recognition and Image Processing. - 10 - May 20th| Wednesday| Morning Registration (Lobby) & PPT copy Add&Tel: Nanyang Executive Centre, 50 Nanyang Avenue, Singapore, 639798, Tel. +65 6794 7860 Notes: 10:00am-17:00pm *Collecting conference materials *Delegates will get the certificate at the registration desk. *The organizer won't provide accommodation, and we suggest you make an early reservation. May 20th| Wednesday| Afternoon Room A Opening Remarks: Prof. Maode Ma, Nanyang Technological University, Singapore Keynote Speech 1: Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA Keynote Speech 2: Dr. Girija Chetty, University of Canberra, Canberra, Australia COFFEE BREAK & GROUP PHOTO Prof. Maode Ma, Nanyang Technological University, Singapore 14:30pm-14:35pm 14:35pm-15:15pm 15:15pm-15:55pm 15:55pm-16:35pm 16:35pm-17:15pm May 21st| Thursday| Morning Room B Session 1A: Electronics and Information Technology-6 COFFEE BREAK Session 1B: Electronics and Information Technology-6 9:00am-10:30am 10:30am-10:45am 10:45am-12:15am Room C Session 2A: Machinery Manufacturing and Industrial Engineering 9:00am-10:30am COFFEE BREAK 10:30am-10:45am Session 2B: Machinery Manufacturing and Industrial Engineering 10:45am-12:15am Lunch at Fusion Spoon 12:15am-13:00pm May 21st| Thursday| Afternoon Room B Session 3: Communication and Information System-10 COFFEE BREAK 15:30pm-15:45pm Session 4: Robot and Control System-16 15:45pm-19:30pm Room C Session 5: Image and Video Processing Technology-10 COFFEE BREAK Session 6: Computer and Information Technology-16 Dinner at Fusion Spoon May 22nd 13:00pm-15:30pm Half-day Visit to NTU 13:00pm-15:30pm 15:30pm-15:45pm 15:45pm-19:30pm 19:30pm-20:30pm 9:30am-12:00am - 11 - Venue: Room A Chair: Prof. Maode Ma, Nanyang Technological University, Singapore Time: 14:30pm-17:15pm 14:30pm-14:35pm 14:35pm-15:15pm 15:15pm-15:55pm Opening Remarks Prof. Maode Ma, Nanyang Technological University, Singapore Keynote Speech I Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA “Flow-Net Accountable Logging and Applications” Keynote Speech II Dr. Girija Chetty, University of Canberra, Canberra, Australia “” 15:55pm-16:35pm Coffee Break & Group Photo 16:35pm-17:15pm Keynote Speech III Prof. Maode Ma, Nanyang Technological University, Singapore “Security Enhancements for Communication Networks in Smart Grid” *The Group Photo will be updated on the conference webpage and SCIEI official website: www.sciei.org **One best presentation will be selected from each session, the best one will be announced and awarded the certificate after each session, and the winners’ photos will be updated on SCIEI official website: www.sciei.org. ***Best Presentation will be evaluated from: Originality; Applicability; Technical Merit; PPT; English. **** Please arrive at the conference room 10 minutes earlier before the session starts, copy your PPT to the laptop. - 12 - Venue: Room B Chair: Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA Time: 9:00am-10:30am One-Class Classification by Local Target Selection Mr. Younghoon Kim, Seoung Bum Kim Korea University, Republic of Korea One-class classification plays an important role in outlier and novelty detection. Traditional one-class classification algorithms determine a decision boundary that identifies the property of the target data. In this work, we propose a novel algorithm for one-class classification based on the mixed integer quadratic programming method. The proposed method minimizes the radius of a spherically shaped boundary subject to the number of target data being equal to a constant value specified by users. By modifying this constant value, users can exactly control the proportion of target data described by the spherically shaped boundary. Moreover, analogous to Support Vector Classifier, the boundary can be made flexible by using some kernel functions. The usefulness of the proposed method was demonstrated through experiments with simulated data. A Research Paper Recommendation based on Citation Networks Ms. Jieun Son, SeoungBum Kim Korea University, Republic of Korea Recommendations have attracted growing attentions from both academia and industry. Compared to other applications such as books, movies, and music, relatively few studies have been conducted on the recommendation for research papers. Typically, researchers filter the huge mass of existing research papers to find out relevant publications associated with their research. However, this filtering process is generally time consuming because the number of research paper published is exponentially growing. To address these problems, past studies have focused on finding better recommendations for searching research papers. Citation analysis, content analysis, and social networks have been utilized for better paper recommendations. Of these, algorithms based on citation analysis have been widely used. However, citation analysis-based techniques have some drawbacks. Their analysis depends solely on co-citation and bibliographic coupling. These techniques count the number of links that directly cite or are cited at single-level networks. Therefore, recently published papers do not tend to be recommended because of their fewer citations. In this paper, we propose a recommendation algorithm for research papers by combining citation and networks analyses. The proposed algorithm uses the distance and weight of links in a multiple-level simultaneous citation networks to measure the relationship among the papers. The multiple-level citation network can simultaneously consider mutual relationships among the papers which are connected indirectly. Further, the proposed algorithm takes into account various measures that characterize the network (e.g., degree centrality, closeness centrality, betweenness centrality) to determine the core papers. The comparison results based on real data showed that proposed algorithm outperformed the existing ones from ‘Google Scholar’ - 14 - and ‘SCOPUS’. Group-wise Variable Selection for Virtual Metrology Modeling of Process Signals Mr. Chanhee Park, Seoung Bum Kim Korea University,Republic of Korea Lot to lot process control is widely implemented in semiconductor manufacturing processes and it is being replaced with wafer to wafer control to achieve tighter process control. Virtual methodology (VM) has been developed to perform wafer to wafer control economically. VM model can be constructed based upon not only traditional process variables, but also advanced spectroscopic signal data. Analysis of spectroscopic signals involves combinations of multiple samples collected over time, each with a large number of features (wavelengths). This leads to a huge number of data points and a situation that challenges analytical and computational capabilities. Furthermore, the spectroscopic signals include several groups of features which are highly correlated with each other. To simplify such a complexity in spectroscopic signals while taking into account their correlation structure, appropriate data reduction techniques are required. In this study, we propose to use regularized regression methods including group lasso and sparse group lasso that have desired effect of group-wise variable selection for virtual modeling of spectroscopic signals. Experiments on data from real semiconductor manufacturing processes demonstrated the usefulness and applicability of the group lasso and sparse group lasso models. A Hybrid Monitoring Method for Robust Multivariate Process Control Mr. Sung Ho Park and Seoung Bum Kim Korea University, Republic of Korea Control chart, the most representative statistical process control technique, can be considered to share a common goal with classification algorithms in that both of them aim at estimating the decision boundaries that classify the observations into either in-control or the out-of-control classes. The main limitation that conventional control chart cannot take advantage of using out-of-control information can be eased by integrating classification algorithms with existing monitoring techniques. In the present study, we proposed a hybrid scheme that combines T2 control chart and binary class classification algorithms by eliciting the nature of class distributions. Simulation and real case studies demonstrated that the proposed method can be effectively used for monitoring multivariate processes when their distributions are nonnormally distributed or unknown. Ethics Responsibilities of Undergraduate students at INU Dr. Khader Musbah Titi Irbid National University, Jordan The world is changing in all our life aspects, new information technologies are effective software tools in helping individuals and organization. However, the power of these technologies such as the Internet can be used for bad as well as for good. Software engineers make decisions about when a product is free of errors and safe and thus ready to be released and used by individuals or companies. People make decisions about access to and use of private information. People make - 15 - decision either to buy an original copy or just a copied version of a book or a CD. These decisions have to be fair and honest. The main aim of this research is to conduct a survey to study some ethical issues related to actions and decisions of students at Irbid National University in Jordan. Modified Delphi-AHP Method Based on Minimum-Cost Consensus Model and Vague Set Theory for Road Junction Control Method Evaluation Criteria Selection Mr. P. K. Kwok and Henry Y.K. Lau The University of Hong Kong, Hong Kong Group decision making is an important symbol of a democratic society. It helps to explore problems from wider angles and the results generated will usually be widely accepted by the public. Yet, there are drawbacks of group decision making. It usually takes more time and resources than individual decision making and also sometimes the one with a louder voice will dominate the discussion. In this paper, a group decision making framework derived that are based on the modified Delphi-AHP method based on minimum-cost consensus model (MCCM) and vague set theory is proposed to gather different experts’ opinions on the evaluation criteria and their relative importance for choosing a suitable road junction control method in a multi-objectives environment. It is believed that the proposed framework can help to strengthen the advantages and to solve the above drawbacks of group decision making. A numerical case study is proposed to demonstrate the use of this framework. Study of a Three-Phase Bridgeless Flyback PFC Mr. Boyang Chen, Lei Li, and Xinran Zhang Nanjing University of Science and Technology, China Traditional power factor correction (PFC) circuit, which limits the power density is often passive components. With the development of power electronics technology, high-frequency, modular, miniaturization is the inevitable trend of development. In pursuit of efficiency and the use of bridgeless topology brought about more complex control method compared with the conventional topology. In this paper a three-phase bridgeless Flyback PFC topology is studied, the use of three-phase input, which greatly reduce the storage capacity of the capacitor, working in discontinuous current mode (DCM), using fixed duty cycle control to achieve unity power factor, with a simple and efficient, simple control advantages .The simulation results from a 250W universal input prototype are given to verify the effectiveness of the analysis. A Novel Half-Bridge Converter for Battery Charging-Discharging Mr.Yifan Zhou, Zhixiang Liu, Lei Li, Peiyao Wu Nanjing University of Science and Technology, China Charging-discharging converter for battery cells is widely used in modern industry to measure the performance of the battery. With the rapid development of the technology of switching power supply today, converters with high efficiency and small size are becoming more and more important. This paper proposes a novel half-bridge converter for battery charging-discharging based on Thevenin equivalent model with high efficiency and simplified structure. The control - 16 - circuit and detecting circuit are also analyzed in the main system. The simulation results from two series of 28V, 800Ah lead-acid battery cells are given to verify the stability and reliability of the converter. - 17 - Venue: Room B Chair: Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA Time: 10:45am-12:15am Online Identification and Internal Model Control for Regulating Hemodynamic Variables in Congestive Heart Failure Patient Ms. Arpita Bhattacharjee, Ashoke Sutradhar Indian Institute of Engineering Science and Technology, Shibpur, India This paper deals with one of the most challenging task of simultaneous control of two hemodynamic variables by the infusion of sensitive cardiac drugs in congestive heart failure (CHF) patients. A nonparametric internal model control (IMC) algorithm along with an integral control action has been proposed in this work for regulating two hemodynamic variables, the mean arterial pressure (MAP) and the cardiac output (CO) by simultaneous administration of two drugs – sodium nitroprusside (SNP) and dopamine (DPM). The two-input two-output physiological model of CHF patient is identified online by solving Volterra kernels from the input-output data of the physiological process. FFTs are taken on respective time domain kernels to obtain the Volterra transfer function (VTF) of the multivariable system. The internal model control algorithm is developed using this VTF. The integral control action has been combined with IMC for set-point tracking. Using this closed loop control algorithm MAP and CO reaches the steady state value within a very short time with the minimum infusion of highly sensitive cardiac drugs in presence of actuator and sensor noises. Recommendation of Personalized Surveillance Interval of Colonoscopy via Survival Analysis Ms. Jayeon Gu, Eun Sun Kim, Seoung Bum Kim Korea University,Republic of Korea A colonoscopy is important because it detects the presence of polyps in the colon that can lead to colon cancer. How often one needs to repeat a colonoscopy may depend on various factors. The main purpose of this study is to determine personalized surveillance interval of colonoscopy based on characteristics of patients including their clinical information. The clustering analysis using a partitioning around medoids algorithm was conducted on 626 patients who had a medical examination at Korea University Anam Hospital and found several subgroups of patients. For each cluster, we then performed survival analysis that provides the probability of having polyps according to the number of days until next visit. The results of survival analysis indicated that different survival distributions exist among different patients’ groups. We believe that the procedure proposed in this study can provide the patients with personalized medical information about how often they need to repeat a colonoscopy. A Disease Diagnostic Assistant System using DTI and Extreme Learning Machine Dr. Wang shuqiang, Shen Yanyan, Hu Jinxing, Zeng Dewei Institute of Advanced Computing and Digital Engineering, Shenzhen Institute of Advanced - 18 - Technology, Chinese Academy of Science, China There is a growing interest in applying diffusion tensor imaging (DTI) to the evaluation of brain and spinal cord related disease. In the present study, the DTI data and extreme learning machine were employed to identify the levels with cervical spondylotic myelopathy (CSM) in spinal cord. In this work, there are 40 volunteers including 20 healthy people and 20 patients with CSM ranging from 24 to 81 years old. Experiment results show that the extreme learning machine based classifier performs well in detecting the patients with CSM (accuracy 93.6%, sensitivity: 91.2%, specificity 94.7%). The current work reveals the potential of using diffusion tensor imaging in conjunction with extreme learning machine to automate the classification of healthy subjects and subjects with brain and spinal cord related disease. Regularized Classification for Discrimination of Mass Spectra from Bacterial Strains Mr. Jaehong Yu, Seoung Bum Kim Korea University,Republic of Korea Mass spectrometry is widely used in biomedical fields for diagnosing diseases or monitoring pathogenic activities. Analyzing mass spectra usually involves combinations of multiple samples, each with a large number of features. Dimensionality reduction is important in coping with this complexity. Dimensionality reduction can generally be achieved by feature extraction or feature selection techniques. Feature extraction methods transform the original features to extract new features. In general, the first few features from feature extraction methods are sufficient to account for the original data. However, these transformed features do not provide any clear interpretations with respect to the original features because they are linear combinations of a large number of original features. Feature selection methods directly identify a subset of features that are most predictive of a given response feature. However, most of traditional feature selection methods do not take into account the correlation structure of the features. Some feature selection methods consider the relationships among the features but they tend to only eliminate the redundant features not irrelevant ones. In this study, we propose to use a logistic lasso algorithm as an effective feature selection algorithm in high-dimensional mass spectra. A logistic lasso algorithm automatically selects significant features while taking into account the correlation structure of the features and uses them to construct classification models. The usefulness and accuracy of the logistic lasso model were demonstrated by the mass spectra from bacteria in which the purpose of this analysis is to identify the important features that differentiate between different strains of bacteria. Implementation of Wireless Electrocardiogram Monitoring System Thanapong Chaichana, Yutthana Pititeeraphab, Manas Sangworasil, Takenobu Masuura, Ms.Nutchanat Kitsongsang Rangsit University, Thailand We describe the design and development of wireless electrocardiogram monitoring system to meet the biomedical needs. Our system is able to acquire, display and record the patient’s real time electrocardiogram (ECG) data. Patient data received from this system can be further used for analysis of abnormal heart rate and new clinical applications. System hardware comprises of an electrode as part of signal input, signal conditioning components for manipulating signal, the 8051 microcontroller unit to perform signal processing and wireless communication module. Software was developed in Visual Basic 6 to record and visualise ECG signal in real time. Therefore, we implemented ECG report system, and this can be used to advanced ECG study. - 19 - These instructions give you basic guidelines for preparing camera-ready papers. Implementation of Electric Wheelchair with Microcontroller Yutthana Pititeeraphab, Thanapong Chaichana, Nuntachai Thongpance, Ms. Pimchanok Rungrueng Rangsit University, Thailand This paper presents the design of electric wheelchair. We build machine that is capable to attach with any traditional wheelchair, and to control its movement semi-automatically. This helps handicapped person who has difficult body-movement to be able to travel simply. The machine comprises of power-driven system including a metal tube frame, wheels, motor, brake and accelerator, and electronic control department based H-bridge circuit and programmable microcontroller with the ATmega168. Software was developed in C++ for programming microcontroller. Running test was on flat straight and slope courses. Results showed that it achieved a maximum load is 100 kilograms with a top speed of 8.42 kilometres per hour, and the average of battery lifetime is up to 1 hour and 30 minutes. Thus, we build a cost effective machine to provide an opportunity to translate conventional wheelchair to be an electric wheelchair. A Novel Control Sheme To Reduce Storage Capacitor Of Flyback PFC Converter Mr. Boyang Chen, Lei Li, Xinran Zhang Nanjing University of Science and Technology, China DCM Flyback PFC converter is mainly used in medium and low power applications, having such advantages as zero-current turning on of switch, no reverse recovery of diode and high PF. At the time power electronics widely used today, passive components volume limits the improvement of power density. This paper derives the expressions of the switching turn-on time and the input current of DCM Flyback PFC converter, and based on which, a variable duty control is proposed so as to make the energy storage capacitor reduce to the original 65.6% at the same voltage ripple level while PF is not less than 0.9.The simulation results from a 200W universal input prototype are given to verify the effectiveness of the analysis. Equalization Chargers Using Parallel- or Series-Parallel-Resonant Inverter for Series-Connected Supercapacitors Mr. Yifan Zhou and Lei Li Nanjing University of Science and Technology, China A equalization charger using parallel-or series-parallel-resonant inverter for series-connected supercapacitors is proposed in this paper, according to low voltage characteristic of supercapacitor. This topology reduces a large number switches and only has resonant structure including some diodes and a single transformer. In addition, because of the characteristic of parallel resonant inverter, the equalization charging current can be limited in the numerical value. So the topology can work steadily without feedback control. The control circuit is greatly simplified. The simulation results from a 200W universal input prototype are given to verify the effectiveness of the analysis and the merits and demerits of this topology also are introduced. - 20 - Venue: Room C Chair: Time: 9:00am-10:30am Dynamic Buffer Management for Raw Material Supply in the Footwear Industry Prof. John Reyes, Kevin Alvarez, Rosa Vazquez Universidad Técnica de Ambato, Ecuador In this paper, the application of inventory buffers is proposed as a management tool for the supply of raw material in the footwear industry. This allows to increase competitiveness and a significant decrease in investment in materials stored in the warehouses. This technique based on the holistic view will achieve the global optimum of the system giving importance to factors that prevent success of companies. In this sense, it is identified that the market demand is the system´s constraint for the development of the master production schedule. Considering this, it is necessary to concentrate all the materials in the central warehouse to establish an optimum inventory levels or buffers. Using a technique of colors materials ordering program is regularly reviewed through dynamic buffer management. As a result, the model improves the way how inventory of materials in the footwear industries is managed for resupply. Giving a priority to the materials low in stock. This generates 18,7 % of annual saving in inventory costs. Application of AHP in the Analysis of Flexible Manufacturing System Assoc. Prof. Sandeep Singhal, Rajveer Singh, and Parveen Sharma National Institute of Technology, India In recent years, the area of manufacturing has become more intensive and competitive. Now-a-days all the service fields are attempting to find ways to improve their flexibility by changing their manufacturing strategy. The main aim of Flexible Manufacturing is to adopt effective and efficient strategies to fulfill the demands of consumers. In this highly competitive global market the industries are forced to focus more on increasing productivity and quality coupled with decreasing cost by right selection of efficient manufacturing system. Present study highlights a logical procedure to select the effective flexible manufacturing process in terms of various aspects as quality improvement, faster delivery, profitability, etc. by using Analytical Hierarchy Process (AHP) method. The AHP is used in flexible manufacturing as a potential decision making tool. The primary requirement of AHP is to make a matrix of the variables for their paired comparison. There are a lot of AHP processes, but here only the two of them i.e. Additive Normalization Method and Geometric Mean Method are being used by analyzing the flexible manufacturing with respect to micro and macro variables. A Novel Multifunctional Energy Storage System in Industrial Distribution Network Mr. Tong Wu, George You Zhou, Jianna Niu National Institute of Clean and Low Carbon Energy, Beijing, China In order to meet the increasing safety demands from coal industry and mining company, a lead - 21 - acid and lithium iron phosphate(LFP) battery energy storage based megawatt level multifunctional emergency power station is designed and developed for a famous coal mine in Inner Mongolia, China. The major function of system is: when the local power grid works normally, the developed system will play the reactive power compensation function instead of traditional static capacitor; when the local grid occurs failure, the energy storage based emergency power station will provides stable power to the extremely critical loads of coal mine for at least 30min. Besides, the proposed energy storage system also can play the ‘peak shaving’ and distributed new energy generation smoothing according to the customer requirement. The This paper firstly describes the system integration design and major functions; secondly introduce the power conversion system design and NI software/hardware based central control unit; thirdly analyzes the solutions for increasing system lifetime including novel harmonics control for charging & discharging and battery regular online maintenance strategy; finally provides the simulation and test results which demonstrate the correctness of system design, software/hardware development and integration. The business value evaluation shows the high market potential of the proposed system in China and worldwide. Adjustable Robust Planning for Multi-Period Production and Distribution Systems Assit. Prof. Byung Do Chung, Jae Sang Lee Sungkyunkwan Univsersity, Republic of Korea For many companies, the uncertainty is one of the challenging issues and the consideration of uncertain demand is critically important, especially when demand history is not available. This paper aims to develop a robust planning model to solve a multi-period production and distribution problem under demand uncertainty. In this paper, no probability distribution is presumed and a box-type uncertainty set is assumed. In other words, we only need a range of uncertain demand at each time period, which is different from the traditional stochastic programming approach. First, we develop a deterministic linear programming model and introduce a set of uncertain parameters. The problem is reformulated as a tractable robust counterpart (RC). Next, the robust counterpart is extended to the affinly adjustable robust counterpart (AARC) by assuming a specific form of linear decision rules. The AARC is also a linear programming model and easily solved with a commercial solver. Finally, a simulation experiments are conducted in order to compare the performance of the deterministic model, RC and AARC. The results show that the AARC solution outperforms the others in terms of mean, standard deviation and worst-case cost. A Novel Embedded Energy Storage System for Diesel Engine Test Platform Ms. Jianna Niu, George You Zhou, Tong Wu National Institute of Clean and Low Carbon Energy, Beijing, China As is known to all, components of locomotive will be abraded, deformed or damaged after a period of running. In order to ensure the locomotive running stably and extend its lifetime, periodic maintenance and testing must be performed. At present, as a means of load test, water resistance test has been widely used in locomotive diesel engine test field. According to conservative estimates, the static continuous test will accounts 15 ~ 30% of the energy production through the whole engine life. It will not only cause great waste of energy, but also cause severe corrosion of metal plate. This paper proposes a novel embedded energy storage system used in an energy harvesting demonstration project which is implemented to storage the energy produced during diesel engine test process. This paper also describes the project overall design and the function of key equipment. System simulation and experiment results show that - 22 - this system is stable and reliable during energy harvesting. Importance of Product Life Cycle Management in Design and Development of a Product Dr. R. Henry Xavier, H.Donna Xavier Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, India. Product life cycle management (PLM) is a process of managing the entire life cycle of a product from its conception through design and manufacture to service and disposal. PLM integrates people, data, processes and business systems. In this paper, a full fledge knowledge about product life cycle management is given. The history of PLM, Benefits of PLM, Phases of PLM, Importance of PLM, in design and development of a product, Various modern software and tools used in design and development of a product however complex has been discussed. Also various applications with a special reference to aircraft industry have been discussed. AHP Based Methodology for Selecting Section of Subway Construction in Thailand Mr. Phikid Vayophad and Warapoj Meethom Department of Industrial Engineering, King Mongkut's University of Technology North Bangkok, Thailand Safe workplace in the subway construction make a major contribution to personnel safety. Safety of the section in the subway construction is often guaranteed or enhanced by work complexity, machine and equipment, accident statistic, accident severity, work environment, and number of workers for these projects. The choice of a sector safety risk in the subway construction involves multiple criteria decision making and ranking of alternatives according to often contrasting performance measures. In this paper, a systematic methodology for selecting a type of sector of subway construction at risk possible to accidents aimed at reducing physical environmental hazards of type of sector in subway construction is presented. The method at first includes a classification of type of sector in the subway construction, then introduces an exhaustive list of 6 factors useful to judge the suitability of selecting a type of sector in the subway construction for comparison purposes. A comparison of relative importance between the rating criteria is then carried out in the framework of the Analytic Hierarchy Process (AHP) decision making approach, based on expert opinion, allowing unambiguous prioritization of the above decision making factors. Limitation and future work of this study are also discussed. The Deteriorations of Productivity Output During Unforeseen Disruption Mr. John M. Ikome, MG. Kanakana, S.P Ayodeji and M.E Ikome Tshwane University of Technology/Department of Industrial Engineering, Pretoria, South Africa. In most real-world environments, production scheduling is an ongoing process where the presence of a variety of unforeseen disruptions is usually inevitable, and continually forces reconsideration and revision of pre-established schedules. Many of the approaches developed to solve the problem of production scheduling are often unfeasible in real-world environments, and the near-optimal schedules with respect to the estimated data may become obsolete when they are released to the production lines or shop floor. This paper outlines the impact of unforeseen - 23 - disruptions that affect manufacturing systems during production and being able to cope or react to this determines a company’s out-put and profitability. The theory of multifactor productivity and line balancing are employed to determine how disruption affect productivity out-put. The result reveals that, when disruption occurs continuously with time, the total productivity out-put decreases and on the other hand, requiring more resources to meet up with the planned capacity demand. Two stage supply chain enterprises’ production and reduction decision-making mechanism research considering emission trading Mr. Jianan Sun, Zhongdong Xiao, Guanghui Zhou Xi’an Jiaotong University, China Economic activities should reflect scarce and efficient allocation of environmental resources after carbon emission quota has become a kind of resource. These low-carbon economy characteristics profoundly change the cost structure, profit model and market risk compared with the traditional supply chain. This paper puts forward the topic ‘the research of two stage supply chain enterprises’ production and reduction decision-making mechanism considering emission trading’. The paper compares performance of the different decision modes in supply chain on carbon emission. Analyze the members profit and the whole supply chain profit by different two modes. Through investigating how upstream and downstream enterprises in the supply chain choose cooperation reduction strategy while they are facing environmental regulation, we can get their profits and reduction efficiencies in two different decision-making models. It can be obtained that in the centralized decision-making case, both their profit and reduction efficiency are optimal. The result shows that in the process of low carbonization of manufacturing enterprises, government should aim at the enterprises which emit larger carbon emission and grab from the source of supply chain firstly. And also enterprises must reduce their optimal output in order to reduce their total carbon emissions. - 24 - Venue: Room C Chair: Time: 10:45am-12:15am Defective Reduction from Solder-Paste Strains on a Flexible Printed Circuit Mr. Chantach Luxnanan, Oran Kittithreerapronchai Department of Industrial Engineering, Chulalongkorn University, Bangkok, Thailand During the last decades, consumer electronic devices have been integrated with our everyday activities. One component that helps these devices to achieve with their small sizes and versatile functions is a flexible printed circuit (FPC). Each FPC consists of various electronic components on a flexible conducted surface using a special assembling process, called surface mount technology (SMT). Within the SMT process, the most significant defective is the solder-paste strain on pads of a FPC, which accounts for 0.28% of total products manufactured. Such defective products cannot be reworked. Small group techniques revealed that the cleaning routine of a solder printing machine is one of the root causes. Followed the six-sigma approach, the defective rate is selected as the main response for hypothesis tests and design of experiment. Determining of the optimal parameters in the cleaning routine using two-level full factorial design with two replications suggest same direction and 80 cm per second cleaning speed without vacuum as optimal setting. The result after one month of implementation showed that the defective rate was reduced to 0.04%. A Responsive Framework for Optimal Advertising Policy in the Digital Music Market Ms. Tobey H. Ko and Henry Y.K. Lau The University of Hong Kong,Hong Kong This paper proposes a novel responsive framework to help the record label in making profit maximizing advertising decisions in the product pre-release phase. We describe a market of potential consumers where the consumer behaviors are backed by an interactive Markov Chain, in which the periodic advertising activities carried out by the record label varies the population frequencies of the potential consumer market. We demonstrate the working of the proposed framework through an illustrative numerical example, results of the study show the proposed framework's superiority both in terms of reach to potential consumers and the net profit it brings. Thermal and Fluid Characteristics of an Oval Finned-Tube Heat Exchanger for Large Diameters Mr. Kyungjin Bae, Dongan Cha, Ohkyung Kwon Korea Institute of Industrial Technology, Korea The objectives of this paper are to investigate heat transfer and pressure drop for oval finned-tube heat exchanger with large diameters used in a textile machine dryer. Numerical tests using ANSYS CFX are performed for four different parameters; tube size, fin pitch, transverse - 25 - tube pitch and longitudinal tube pitch. It was found that the Nusselt number linearly increased with increasing Reynolds number, but friction factor slightly decreased with increasing Reynolds number. It was also found that the variation of longitudinal tube pitch made a little effect on the Nusselt number and friction factor than other parameters below 2.0 and 2.5%, respectively. Nonparametric Multivariate Control Chart Based on Statistical Learning Algorithms Ms. Seulki Lee, Seoung Bum Kim Korea University,Republic of Korea Statistical process control techniques have been widely used in many industries to improve process capabilities by reducing variations and diagnosing processes. In modern manufacturing systems containing the complexity and variability of processes, appropriate control chart techniques that can efficiently handle the nonnormal processes are required. Furthermore, in real manufacturing fields, process changes occur frequently because of various factors such as product and set-point changes, seasonal variations and sensor drifting. However, traditional control chart schemes cannot accommodate all possible future condition of the process because they are formulated based on the information of the early process stage. In recent years, several attempts have been made to convert a support vector data description (SVDD) algorithm into control charts for monitoring a nonnormally-distributed processes. . In the present paper, we propose a novel control chart based on an incremental SVDD and a bootstrap method that can handle not only nonnormal in-control observations, but also time-varying processes. Incremental SVDD is used to update the SVDD boundary and a bootstrap technique is used to establish the control limits. Time-varying process monitoring charts should accommodate the normal gradual changes but detect real process faults. The proposed control chart allows efficient model updates and the detection of out-of-control signals simultaneously. The effectiveness and applicability of the proposed chart was demonstrated through experiments with simulated data and real data from a TFT-LCD manufacturing process. Forecasting Construction Equipment Demand using Regularized Regression Mr. Hyung Rok Do, Jae Hong Yu, Jieun Son, Kye Hyun Choi, Jong Hyung Lim, Seoung Bum Kim Korea University,Republic of Korea Successful implementation of demand forecasting in construction equipment market enables corporations to cope with uncertainty in the business environments. The information from forecasting can be used in various fields including production planning, research and development, inventory control, and sales management. In this study, we propose to use regularized regression models to predict the demand for construction machinery based upon its sales and operational information. Lasso and L1-norm support vector regression were used as predictive models to forecast the demand and to identify the significant variables for prediction. The usefulness and applicability of two regularized regression models were demonstrated by real operational data and sales data from one of the leading construction equipment companies in South Korea. - 26 - Work Wearing Protective Clothing in Hot Environments: Lessons Learned from the Development of Firefighter Personal Protective Clothing Standard Test Assoc. Prof. Ilham Bakri and Yutaka Tochihara Hasanuddin University, Indonesia Some inconsistencies within the existing test standards for firefighter’s personal protective clothing (PPE) are still remain. For that reason, and to response the need for an easier and reliable PPE standard, a new firefighter PPE standard test was developed in our laboratory. The aim of this paper is to describe some valuable lessons found in related to the men working using PPE in hot environment. Firstly, there is still more space to reduce the burden on firefighters by improving the SCBA and its harness design. Secondly, a PPE should be tested in hot environment to have a better understanding about the physiological impact of the PPE in a similar condition that it will be used. And lastly, although the tympanic temperature was more reactive, the tympanic temperature profiles were in a similar tendency to the rectal temperature profile so that the tympanic temperature measurement is acceptable in a PPE standard test. Differential Evolutionary Algorithms with Novel Mutation Operator for Solving the Permutation Flowshop Scheduling Problem Ms. Chi-Hua Tien, Meng-Hui Chen, Chia-Yu Hsu, Pei-Chann Chang Department of Information Management, Yuan Ze University, R.O.C Taiwan Differential evolutionary (DE) algorithm is an effective algorithm to solve combinational optimization problems, such as scheduling problems. This paper aims to propose an improved differential evolutionary algorithm for the permutation flow-shop scheduling problem (PFSP) by considering the minimum makespan, where the new mutation mechanism is used to enable an appropriate sequencing for each job. For the reason, the main idea in this paper is to find out the key scheme from the better solution and making the assimilation operator in mutation procedure adopts the strategy based on the sequence. To evaluate the performance of the proposed approach, eight benchmark tests by Taillard’s instance is used. The results demonstrate that the proposed improved differential evolutionary algorithm outperform than the conventional differential evolution algorithm. Job Shop Scheduling with Flexible Routings based on Analytical Target Cascading Yanguang Li, Prof. Guanghui Zhou, Zhongdong Xiao Xi’an Jiaotong University, China For solving the large-scale job shop scheduling problems considering flexible routings with the characteristics of process planning and scheduling optimization, a hierarchical coordination optimization model based on analytical target cascading is proposed in this paper, which is divided into three sub-layers. The process planning layer is for optimal processing routes of all jobs, and multiple manufacturing units is formed by clustering all machines based on factor analysis method in the unit planning layer, and then the optimal scheduling solutions of jobs in each unit is obtained by adopting the improved genetic algorithm respectively in the job scheduling layer, which then gives feedback to the upper layer and repeatedly coordinates to obtain the global optimal solution. Finally, a typical computational experiment comparatively demonstrates the validity of the proposed model and algorithm, showing its efficient advantage in solving the large-scale job shop scheduling problems with flexible routings. - 27 - Technology Development for Fully-controlled Artificial Light-type Plant Factory Prof. Masashi Sugano Osaka Prefecture University, Japan Plant factories are cultivation facilities that, through advanced and precise control of the environment by monitoring the cultivation conditions and growth of plants, enable year-round production of vegetables and other produce. In Osaka Prefecture University, the R&D Center for the plant factory has been established as a cutting-edge R&D base specializing in a fully artificial light-type facility. This plant factory is the maximum scale among the Japanese universities and has the ability to produce 5000 lettuce in every day. In this talk, I will explain some technologies such as energy conservation and automation applied to this plant factory. - 28 - Venue: Room B Chair: Prof. Maode Ma, Nanyang Technological University, Singapore Time: 13:00pm-15:30pm Mutual Authentication Protocol for RFID Security Using NFSR Mr. T. Suresh and M.Ramakrishnan Tagore Engineering College, Chennai, India. Radio-Frequency Identification (RFID) is an automated identification procedure, relying on storing and remotely recovering information using devices called RFID tag. RFID tags contain an electronic product code (EPC) that may uniquely determine every tagged item. The RFID tag stores its distinctive EPC with related product information within the tag’s memory and sends this information whenever the reader requests them. Researchers have proven that the Electronic Product Code (EPC) Class-1 Generation-2 (C1G2) specification has critical security problems. In this paper, we proposed a new ultra lightweight mutual authentication scheme to overcome weakness in an EPC C1G2 Protocol. We only use XOR operation and appropriate Non- Linear Feedback Shift Register (NFSR) to accomplish high security. Security analysis demonstrates that our protocol will offer numerous privacy properties and avoid suffering from different kinds of attacks, including tag anonymity, reader privacy, transfer secrecy, tag, location protection and mutual authentication, replay attack etc. The proposed scheme was simulated using the ISE simulator and synthesized using Xilinx synthesis technology. The proposed method was implemented on FPGA. Contribution-enabled Congestion-aware Scheme for P2P Real-time Multimedia Streaming Systems Mr. Cheng-Yun Ho, Ming-Hsiang Huang, and Chien-Chao Tseng Department of Computer Science, National Chiao Tung University, Taiwan In this article, a contribution-enabled congestion-aware (CECA) scheme is proposed to enhance the fairness and efficiency of content distribution, and improve the entire bandwidth utility for mesh peer-to-peer (P2P) real-time multimedia streaming systems. This is because the mesh P2P streaming system outperforms others in many aspects, but most content distribution mechanisms use only one of upload bandwidth and link latency as a factor that malfunctions the reward and punishment scheme. Besides, their congestion controls partially or mostly rely on the transport layer protocol such as transmission control protocol (TCP). Hence, the CECA dynamically adjusts a receiver peer’s content window size (CWS) based on the contribution and packet loss rate of the receiver peer. Furthermore, the CECA is implemented in NS2 and experimental results show that the CECA could at the most shorten the receiving time about 20.78%, 32.26%, 30.74%, and 26.18%, and improve the entire performance about 11.42%, 18.87%, 14.55%, and 14.19% at the most, when it compares with the BLACE, the Coolstreaming, the Coolstreaming with bandwidth preference, and the Coolstreaming with latency preference, respectively. - 29 - A Hybrid Two-Stage Sweep Algorithm for Capacitated Vehicle Routing Problem Meng-Hui Chen, Ching-Ying Chiu, Pei-Chann Chang, Sivachandra Prabhu Annadurai Yuan Ze University, Taiwan Capacitated Vehicle Routing Problem (CVRP) is a variant of Vehicle Routing Problem (VRP), where CVRP is only considered the capacity restrictions, and the object is to minimize the cost of the vehicles serve all customers. In this study, we proposed an approach which is hybrid two-phase sweep algorithm (SA) and greedy search for solving CVRP. At the first stage of SA, all customers are clustered by SA and define each cluster as a block. The second stage is to reconstruct each neighbour clusters based on the first stage. Then the greedy search is applied to minimize the cost of each vehicle. Finally, the computational result on standard instances show the proposed approach is effective. A Hybrid Edge Recombination Approach to solve Price Collecting Vehicle Routing Problem Anurag Tiwari, Dr. Gouthaman Elangovan, Sivachandra Prabhu Annadurai , Pei-Chann Chang Yuan Ze University, Taiwan In this paper, we consider a Prize Colleting Vehicle Routing Problem (PCVRP). Prize collecting Vehicle Routing Problem is a Variant of Vehicle routing Problem. One of the major concerns of the Prize collecting Vehicle routing problem is that all customers need not to be visited compulsory, but prize must be collected from each customer visited and a penalty has to be paid for every unvisited customer. To guarantee good customer satisfaction, the demand of all visited customers should reach a pre specified value. The objective of this paper is minimization of total distance and total cost of schedule by maximizing the total prize collected by each customer. We have proposed a Hybrid edge recombination approach to solve the PCVRP. To avoid the bias we compare the result with other well know evolutionary algorithm. Computational result shows that the proposed methodology has the promising result. Method and Simulation for Spacecraft Clock Correction Based on X-ray Pulsars Signal Mr. Sun Chen, Assoc. Prof. Gui Xianzhou,and Huang Senlin College of Aerospace Science and Engineering, National University of Defense Technology X-ray pulsar-based spacecraft navigation comes to be a new kind of autonomous navigation technology with high potential, for the advantages of high reliability, good autonomy, high precision and wide applicability. Timing, determination of position and attitude are main prospects of using X-ray pulsars [1, 2]. To realize the pulse signal timing, in this paper, a Phase-Locked Loop circuit for tracking pulsar signal frequency is designed; PLL is built in the Simulink environment and tested by using simple pulse signal to get circuit parameters with good track effect. The Crab Nebula pulse profile, which is used as the simulation signal source, is modelled by using the mathematical method [3]. The simulation results show that the PLL circuit designed in the paper can track the frequency of pulse signal precisely and can be used for spacecraft clock correction. - 30 - A Steady Tracking Technology Adopted to Fast FHBPSK Signal Under Satellite Channel Prof. Guo SuLi ,Wang XiDuo, Xia Shuangzhi The 54th Research Institute of China Electronics Technology Group Corporation, Shijiazhuang, HeBei, 050081, China In order to survive under the conditions with great jamming and interference, fast frequency hopped signal are employed in satellite communication system. This paper discusses the nonlinear phases induced by the equipment and atmosphere, and their influence on the FFH/BPSK tracking loop. Two methods are developed including compensating phase which is based on channel estimation and compensating Doppler frequency based on velocity normalization. Simulation results for a real circuit with proper parameters shows that the degradation due to the demodulation of frequency-hopped is only a fraction of one dB in an AWGN environment under satellite channel. A Community-based Data Dissemination Scheme in Opportunistic Networks Chun-Chih Lo, I-Hsun Chuang, Pey-Wen Lai, Mr. Bing-Jie Guo and Yau-Hwang Kuo Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan In opportunistic networks, data are often delivered by dissemination-based routing approaches using the store-carry-and-forward concept. However, the heavy overheads incurred by these approaches lead to inefficient data delivery. Generally, users in an area usually demand similar data, called “locality of demand”, and this area is referred to as a community. Based on such property, this paper presents a community-based data dissemination (ComD) scheme to improve the data delivery efficiency in the opportunistic network. By delivering data to appropriate communities, users can obtain what they are actually interested in. Moreover, the ComD also uses the cooperative caching technique to reduce transmission redundancy. To optimize system utility, the proposed delivery model is formulated as a multiple knapsack problem to determine which data should be carried, and a greedy-based method is adopted to reduce the computational complexity. Simulation results show ComD can significantly improves the system utility and delivery rate under various situations. An Integrated Secure Inter-mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks Ms. Amutha J and Albert Rabara S Joseph College, India Next Generation Networks (NGN), the heterogeneous all-IP model with inherent capacity of providing next generation services as Always Best Connected (ABC), Anytime Anywhere with seamless mobility meriting the motto ‘All over IP and IP over All’ is effectively realized in IPv6 to supersede the current IPv4 protocol. Several initiatives have been made by researchers to integrate secure, inter-mobility and translation architecture together. But, not much progress has been reported in recent past. Hence, in this research, an Integrated Secure Inter-Mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks has been proposed to achieve secure communication, inter-mobility between IPv4 and IPv6 networks and IP address - 31 - translation with an IPv4/IPv6 Enabled Gateway Translator (IP46EGT). Network performance is evaluated and the generated results are tabulated and graphically presented. AS-aware Relay Selection Mechanism for Multiparty Streaming Service in Overlay Network Mr. Cheng-Yun Ho, Jyun-Chen Huang, Li-Hsing Yen, and Chien-Chao Tseng Department of Computer Science, National Chiao Tung University, Taiwan It has been shown that relay nodes can improve the quality of streaming data delivery in an overlay network. Therefore, many researchers have proposed methods for relay node selection. However, existing methods have some issues, such as scalability, long service start-up time, and not on multiparty service. In this paper, we propose an AS-aware relay selection (ASRS) mechanism to enhance the efficiency of multiparty streaming service in overlay networks. We verified and evaluated ASRS using ns2 network simulator. The experimental results show that ASRS has a short relay selection time. It can also reduce the bandwidth need of multipoint control unit (MCU) effectively so as to supports more users. Role of Body Area Sensor Networks in Smart Health Care Debasis Das and Ms. Neelanjana Basu Roy NIIT University, India The term “computer” or “PC” has never yielded another term “personal”. It is just regarded as a machine with inputs from human beings giving required outputs. However the term or the budding field of Body Area Networks gives new meaning or leverage now to the term “personal” in PCs. In short, this wireless technology leverages wireless communications protocols allowing low-powered sensors to communicate with one another and transmit data to a local base station and to remote places like hospitals. This paper on Wireless Body Area Networks will present a detailed discussion on the various applications of WBANs in smart healthcare systems, its history of development, advantages, disadvantages and the future prospect and scenario of this system. We will also highlight project performed earlier that helped WBANs to provide long-term healthcare monitoring. Our main aim in this paper, is to understand one of the major applications of Body Area Sensor Networks, termed as “Amplifier Ear” which helps people suffering from auditory problems to function properly. - 32 - Venue: Room B Chair: Time: 15:45pm-19:30pm Optimal Tuning of Scaling Factors and Membership functions for Mamdani Type PID Fuzzy Controllers Ana Sebastião, Catarina Lucena, Luí s Palma, Alberto Cardoso and Senior Prof. Paulo Gil Coimbra University, Portugal This study addresses the problem of tuning Mamdani-type fuzzy Proportional-Integral-Derivative controllers by solving a constrained nonlinear optimisation problem. Two different schemes are discussed. One considers merely the scaling factors optimisation, while assuming the membership functions width unchanged. In second methodology both scaling factors and membership functions width adjusted. The cost function under minimisation is chosen as the closed loop performance index, with the system dynamics described by a nonlinear model. In addition, a set of constraints to the optimisation problem are taken into account, namely bounds on scaling factors, control actions and also on the system outputs. For the second approach, extra constraints on membership functions width are also included in problem formulation. Experimental results carried out on a Multi-Input Multi-Output benchmark system shows the out-performance of considering the optimising of both scaling factors and membership function widths. Flexible Development Environment for Educational Robotics Mr. Christoph Krofitsch, Wilfried Lepuschitz, Markus Klein, Gottfried Koppensteiner Practical Robotics Institute Austria Robotics is considered to be a powerful tool for teaching STEM especially when employing white-box platforms to build and program robots. In this context, programming environments should be simple and understandable for increasing the learning success and for easing the entry for teachers with non-informatics background. Furthermore, many robotics applications can also benefit from flexibility in the program deployment in contrast to the usual code-compile-download paradigm. To address these issues, this paper presents a flexible programming environment based on a layered robot control architecture, which involves the usage of mobile devices. Source code created on a smartphone or tablet can be downloaded to the robot controller, which organizes the programs having on-board compilation and execution environments. Besides, a versioning system adds to the comfort. The presented approach enables students to intuitively handle their robots, but can also be applied in more sophisticated scenarios where module-based flexible programming is required. Touching an Android Robot: Would You Do It and How? Dr. Kerstin Sophie Haring, Katsumi Watanabe, David Silvera-Tawil, Mari Velonaki and Yoshio Matsumoto The University of Tokyo, Japan - 33 - As the presence of robots in everyday life becomes more common, it is expected that interactions between humans and robots will include the modality of touch. To date, however, little research has been conducted on tactile interactions between humans and anthropomorphic robots. This study investigates human induced tactile interaction with an android robot. To facilitate data analysis, existing touch dictionaries were revised and adapted for the specifics of human-android interaction. By measuring the participants' personality traits and their perception of the robot, it was found that some tactile gestures are related to participants’ personality traits, such as neuroticism and extroversion, and others to robot attributes such as anthropomorphism and animacy. To the best of our knowledge this is the first study to report on how people touch an android robot, and the correlation that exists between the tactile gestures used and the participants' personality traits. Possible implications are discussed. A Decentralized Interactive Architecture for Aerial and Ground Mobile Robots Cooperation Dr. El Houssein Chouaib Harik, François Guerin, Frederic Guinand, Jean-François Brethe, Herve Pelvillain University of Le Havre, France This paper presents a novel decentralized interactive architecture for aerial and ground mobile robots cooperation. The aerial mobile robot is used to provide a global coverage during an area inspection, while the ground mobile robot is used to provide a local coverage of ground features. We include a human-in-the-loop to provide waypoints for the ground mobile robot to progress safely in the inspected area. The aerial mobile robot follows continuously the ground mobile robot in order to always keep it in its coverage view. Method for Vectorial Robot Movement Determination Enabling Accuracy Improvements Mr. Arnd Buschhaus, Nicky Apel and Joerg Franke Institute for Factory Automation and Production Systems, Germany Promising approaches for robot accuracy improvements belong to the visual servoing methods. These methods comprise closed-loop control systems, which utilize sensors to guide the robot relative to visible features of a work-piece. However, the known methods show limitations regarding their usability for highly accurate applications or tasks without a predetermined process pathway. To overcome this problem, at FAPS a system for high-speed monitoring of the work-piece’s movement is investigated. The system enables a closed-loop control of the robots motion, if a deviation between actual and planned movement is determined. For the actual movement determination, a highly efficient and accurate image data processing system, based on a vectorial movement determination of fiducial markers is developed. In this context, a highly efficient and geometrical accurate actual state determination constitutes a significant challenge. Experiments show, that the system allows a position determination in an area of ten microns at a frequency faster than 500 Hz, thus enabling a reactive robot control and accuracy improvement. A New Approach to Inverse Kinematic Solution for a Partially Decoupled Robot Assoc. Prof. Lei Zhang, JunQin Zuo, Xinguo Zhang, Xingtian Yao, Liguo Shuai Nantong University, China - 34 - Conventional D-H model based inverse kinematic solution algorithms have to hypothesize that d6 0 at the end of the robot hand, or the joint variables of D-H based kinematic equations can hardly be isolated to be solved. In practical application, d6 0 usually occurs, hence it is required for supplemental transformation between the last frame of the D-H models and real operation frame, which decreases the efficiency. In this paper, a new inverse kinematic solution without the hypothesis of d6 0 is proposed. We found that the joint variables of the partially decoupled robot can be separated without great difficulty even though d6 0 . The new approach uses a new multiplication sequence of the inverse matrix for solving the variables of the kinematic equation of the robot. The inverse solution process is straightforward and computationally cheap. Last, some exemplifications are given to valid the accuracy of the proposed approach. Sensors Fault Diagnosis in Autonomous Mobile Robots Using Observer - Based Technique Assit.Prof.Dr.George K. Fourlas, George C. Karras, Kostas J. Kyriakopoulos Department of Computer Engineering, Technological Educational Institute (T. E. I.) of Central Greece, Lamia, Greece This research investigates a sensors fault diagnosis in autonomous mobile robot. Through this study we use the observer – Kalman filter identification technique. According to this observer based method, the experimental input-output data are being exploited for system identification. The motive is to design observers exclusively for each sensor of the system that allows generating residuals. The research goal is to provide early sensors fault diagnosis. In order to prove the efficacy of the proposed method, we investigated different type of faults and an experimental procedure was carried out using a Pioneer 3AT mobile robot. Improving IMC Method for BLDC Speed Control by Using Steady-state DC Model Hoang-Hon Trinh and Mr. Duc-Thinh Le Ho Chi Minh city University of Technology, Vietnam This paper describes an improved method for controlling speed of brushless DC motor (BLDC). Internal model control (IMC) method is used to achieve the good characteristics such as robustness, easiness, flexibility and stability. Here, this novel idea uses the steady-state DC model instead of BLDC’s or general DC’s to reduce large amount of calculation but it still achieves positive features of IMC method. To challenge the robustness, the proposed method is performed with not only nominal parameters but also large change of plant’s parameters. On MatLAB Simulink, the obtained results show that the output signals well respond the referred signals. To be more objective, our results are compared with 2 previous approaches. Applicability of Stereo High Speed Camera Systems for Robot Dynamics Analysis Mr. Kai Wu, Jan Brueninghaus, Benjamin Johnen and Bernd Kuhlenkoetter Institute of Production system, TU-Dortmund, Germany Industrial robots are widely used in industrial area. Requirements for more accuracy and stable performance are raised in the applications. Especially when the robot executes machining task, the dynamic performance in the machining process has influence on the work piece quality. This - 35 - article utilizes a high speed camera measuring system to analyze the robot motion for the sake of process improvement. Linear paths with different accelerations are programmed. The position distributions in 3D space are presented and the path linearity is discussed. In addition, the path velocity and acceleration are obtained. The differences of the running velocity to programmed velocity are given. Changes of the accelerations are also described. According to this application, Characteristics of the measuring system are introduced. Evaluation is made based on the experiment results. Two Channels SEMG Controller Unit for Electric Hand Gripper: Amputee Hand Training Device Chanchai Supakitamonphan, Nutchanat Kitsongsang, Praetana Poohrungrueang, Thanapong Chaichana, Ms. Praetana Poohrungrueang Rangsit University, Thailand This research aims to the design and construct of two channels SEMG controller unit of an electric gripper hand for amputee hand training device to use before prosthetic hand. This project has adopted the principles of physiology, biomedical electronics and microcontroller. The designed and constructed the prototype consists of three main parts; 1) detector and signal conditioner part, 2) signal control and processing part using microcontroller ATMEL 328 on board (Adriano Pro Mini 328) and 3) electric gripper hand drives with DC servo motor. The results of functional testing by was done by picking up objects, which to performing success of correction and precision grasps of cuboidal and cylinder, rotate a wrist hand in 30 times found that the percentage accuracy was 90% and 83% respectively. The production cost of design and construct the prototype was 7,850 baht. Versatile Climbing Robot for Vessels Inspection Mr. Mohamed Gouda Ramadan Alkalla, Mohamed A. Fanni, Abdel-Fatah Mohamed Egypt-Japan University for Science and Technology, Egypt. This work focuses on proposing and designing a new climbing robot to explore the interiors of industrial vessels and enables a human outside the vessels to implement required regular inspection tasks efficiently. There are two main adhesion systems in the literature: magnetic and air suction systems. The magnetic system climbs surfaces made of ferromagnetic materials only, while air suction system cannot handle irregular surfaces due to possible seals damage. Opposite to previous climbing robots, the proposed robot here can climb and navigate vessels made from different materials besides handling possible irregular surfaces during inspection. Its main task is visual inspection of welds and any critical spots inside these vessels. The novelty of this robot comes from utilizing a hybrid actuation system. This hybrid actuation system consists of upturned propellers fixed on mobile robot and motorized wheels of the mobile robot. The pressure generated from the upturned propellers increase the friction force between the wheels of the mobile robot and the wall. The wheels’ motors generate the required torque either to fix the robot in any position or to move it to any place. Since the motion of the robot comes mainly from the motorized wheel, the stability of the system during navigation is guaranteed. Size and topology optimizations are carried out to achieve optimum design of the proposed robot. Simulation results of the designed robot using ADAMS software prove its feasibility. - 36 - Prototyping a Simple Small Smart Robotic Arm – Manipulator Dr. Meteb Altaf, Dr. Eball Ahmad, Abdulmohsin Jarwali, Faisal Al-Ateeq, Faisal Alturki King Abdulaziz City for Science and Technology (KACST),UAE In many experiments, it is frequently necessary to be able to perform several types of applications using simple manipulators for pick and place as in the case of sample preparation for different types of experiments. This paper describes a simple small and smart manipulator prototype using 3D printer which overcomes the need for small manipulations and handling applications. This manipulator will use pizo electric materials to perform the required operation. This manipulator will have only two links with small gripper and limited motion. The design will describe the motion and the required parts to get this small simple smart manipulator working. Mobile Robot Path Planning for Circular Shaped Obstacles Using Simulated Annealing Mr. Sikandar Hayat, Zareena Kausar Air University, Islamabad, Pakistan Many heuristic methods are used for path planning by researchers in the past and contemporary work but due to easy implementation, convergence properties, capability of escaping local optima and the use of hill-climbing moves have made simulated annealing (SA) a good choice for path planning. In this research the simulated annealing algorithm is used to obtain a collision-free optimal path among fixed circular shaped obstacles for a mobile robot. A feasible path is computed by series of points in cells generated between start to goal point. The effectiveness of the proposed algorithm in different environments is shown through simulation results. Mobile Robot Path Planning in Environments Cluttered with Non-Convex Obstacles using Particle Swarm Optimization Mr. Muhammad Shahab Alam, Muhammad Usman Rafique Air University, Pakistan Generally workspaces of mobile robots are cluttered with obstacles of different sizes and shapes. Majority of the path planning algorithms get stuck in non-convex obstacles pertaining to local minima. Particle Swarm Optimization (PSO) is by comparison simple and readily intelligible yet a very powerful optimization technique which makes it an apt choice for path finding problems in complex environments. This paper presents a particle swarm optimization based path planning algorithm developed for finding a shortest collision-free path for a mobile robot in an environment strewed with non-convex obstacles. The proposed method uses random sampling and finds the optimal path while avoiding non-convex obstacles without exhaustive search. Detailed simulation results show the functionality and effectiveness of the proposed algorithm in different scenarios. - 37 - An Investigation on the Application of Fuzzy and PID Algorithm in the Two Wheeled Robot with Self Balancing System Using Microcontroller Mr. Adik Susilo Wardoyo, Hendi S, Darwin Sebayang, Imam Hidayat, Andi Adriansyah Universitas Mercubuana, Indonesia The Fuzzy logic combined with PID control is designed to implement the effect of a disturbance force varying in magnitude, position, and duration to optimize the two wheeled and self-balancing robot. Matlab software was used to obtain Simulink-simulation of the experiment process. The simulation results shows that PID parameters that obtained from the use of auto-tuning is Kp = 16.60, Ki = 8.47, and Kd = 8.90. The simulation results of Fuzzy and PID combination shows that the error can be reduce approximately around 60 %. It is indicated that the Fuzzy logic with PID was better to reduce error in Two Wheeled and Self Balancing Robot than using Fuzzy logic. Kinematics of Parallel Mechanism Based Robot Manipulator with Passive Joints Variables Assoc. Prof. J.M.Prajapati The M S University of Baroda, India. Because of potential benefits like, structural rigidity, good dynamic performance and positioning accuracy, parallel mechanism based robot manipulators became more popular over the serial mechanism based robot manipulators. The forward kinematics of parallel mechanism is complex in comparison to the serial mechanism. This paper presents the forward instantaneous kinematics of a six degree of freedom parallel robot manipulator. Three non linear points are considered on the end effector. The presented method is based on the velocities of these points. A numerical example is solved to demonstrate the solution process. - 38 - Venue: Room C Chair: Time: 13:00pm-15:30pm Anthropometric Proportions Estimation Using recCAL in Multi-Camera Environment Mr. O. Kainz, D. Cymbalák, and F. Jakab Technical University of Košice, Slovakia In this paper, a new technique for anthropometric proportions estimation using multi-camera environment is presented. We refer to this system as a recCAL. System is represented in a form of a 3D model and as well real-world physical model, both used as a reference model/object in the size estimation process. Further anthropometric proportions of human body and face are utilized to provide an estimate of real size from series of images as captured by multi-camera system. recCAL has potential applications in variety of areas where anthropometric proportions or size of other objects may be useful. Real-Time Automatic Selection of the Best Shot on Object in 4K Video Stream Based on Tracking Methods in Virtual Cropped Views Mr. D. Cymbalák, O. Kainz, and F. Jakab Technical University of Košice, Slovakia In this paper, a novel approach for real-time automatic object tracking from multiple cropped views using 4K video capturing device is presented. System itself is based on TLD object tracking algorithm. As a first ultra-high definition video and selected object tracking method is analyzed. Subsections of 4K video output from capturing device are utilized to create new, so called “virtual copped views”. The developed model was rudimentary implemented and tested in the laboratory conditions and it is expected to be used in the real conditions. Video based in-space orientation model for artificial intelligence systems Dr. Jaroslav Lamer and Frantisek Jakab Technical University of Kosice, Slovakia Many of the currently solved problems aim to map the real world into the virtual space. In this article we discuss a new model, which may be used as basis for in space orientation in artificial intelligence systems, such as robots, control mechanisms, vehicles, autonomous devices etc. Experimental results of human orientation in workspace experiments are introduced. Another part of article presents practical evaluation and precision tests of experimental prototype implementation. Comparison of real coordinates and model calculations are represented in graphical form. - 39 - Deep Learning for Reducing Dimensionality of Graph Data Mr. Young Joon Park, Seoung Bum Kim Korea University,Republic of Korea Analysis of graph data has become an important research topic recently because of its numerous applications in social networking, metabolic networks in biology, community detection, and computer networks. However, learning from graphs is very difficult because of their complex structure with high dimensionality, resulting in high-level abstractions in data. Therefore, dimensionality reduction is critical in graph data. In this study, we propose to use a deep learning algorithm that has the capability of dealing with high-level abstractions for dimensionality reduction of vertex-multi-labeled graph data. Experiments on simulated datasets were conducted to compare the performance of deep learning with that of principal component analysis and locally linear embedding, which are existing unsupervised feature extraction methods. The experimental results showed that the deep learning outperformed its competitors in terms of reduced dimensionality and robustness. Analysis Electromyography on Computer Interaction Devices to the Riska of Carpal Tunnel Syndrome Dr. Hartomo Soewardi, Ms. Annisa Riska Anugraheni, Nella Shabrina Islamic University of Indonesia, Indonesia Use of interaction devices on human-computer system may cause muscolusceletal disorders on hands and wrists. The paper presents an Electromyography study to evaluate the hand muscle activities when it is interacted with the computer using mouse, keyboard and joystick. These muscles investigated are flexor pollicis brevis, flexor digitorium superficiallis and abductor pollicis brevis. Average of Root Mean Square (mRMS) signal was used as parameter measurement. Experimental study was conducted in ergonomic laboratory where 8 females and 7 males student university were participated in this study to complete virtual task for 15 minutes. Virtual manufacturing robots system was used as case study. Non parametric statistical method was conducted to test the hypothesis. The result of electromyography shows that the strongest muscle contraction of mRMS signal on m.flexor pollicis brevis is 275.4 mV that it was found in the joystick devices, while 72 mV mRMS was found in the keyboard and 53.4 mV in the mouse. In the second muscle, m.flexor digitorium superficiallis, the strongest muscle contraction of mRMS signal 53.13 mV was found in the keyboard, then 48.9 mV was found in the joystick and the weakest is 34.86 mV was found in the mouse. For the third muscle m.abductor pollicis brevis, the strongest muscle contraction of mRMS signal was found in the joystick it is 252.67 mV then in the keyboard is 130.47 mV and weakest is 60 mV in the mouse. Statistical test shows that there were significant differences in muscle contraction of flexor pollicis brevis muscle (p = 0.000) and abductor pollicis brevis muscle (p = 0.002). But in muscle contraction of flexor digitorium superficiallis does not indicate a significant difference (p = 0.184). It concluded that the highest risk of carpal tunnel syndrome was found in the joystick on flexor pollicis brevis muscle and abductor pollicis brevis muscle. Meanwhile on flexor digitorium superficiallis muscle contraction showed that the highest risk of carpal tunnel syndrome was found in the keyboard devices. - 40 - Performance Comparison of Feature Selection Methods Ms. Thu Zar Phyu and Nyein Nyein Oo Yangon Technological University (YTU),Republic of the Union of Myanmar Feature Subset Selection is an essential pre-processing task in Data Mining. Feature selection process refers to choosing subset of attributes from the set of original attributes. This technique attempts to identify and remove as much irrelevant and redundant information as possible. In this paper, a new feature subset selection algorithm based on conditional mutual information approach is proposed to select the effective feature subset. The effectiveness of the proposed algorithm is evaluated by comparing with the other well-known existing feature selection algorithms using standard datasets from UC Iravine and WEKA (Waikato Environment for Knowledge Analysis). The performance of the proposed algorithm is evaluated by multi-criteria that take into account not only the classification accuracy but also number of selected features. Mobile Based Palmprint Recognition System Prof. Li fang and Neera Nanyang Technological University, Singapore Personal identification and verification are playing more and more important role in the society. Traditional authentication method such as password and smart card, often cannot meet today’s security as they can be easily forgotten, lost or stolen. Biometric technology has appeared as a new solution to these problem. Among all the variable biometric technologies, automatic palmprint verification is an important complement to biometric authentication. This paper describes the adopted mobile based palmprint recognition system. Pineapple Quality Grading Using Image Processing and Fuzzy Logic Based on Thai Agriculture Standards Assit.Prof.Dr.Bandit Suksawat and Preecha Komkum King Mongkut’s University of Technology North Bangkok, Thailand This research aimed to create a tool for pineapples quality grading according to the standard weight and size of Thai Agricultural Commodity Food Standard. The standard weights of pineapple are divided into 10 levels (A-J) and the standard sizes of pineapple are categorized into two classes (class I and class II). The developed tool consists of hardware components and a grading software program. The control light source box was constructed for camera and load cell installation to capture pineapple image and measure pineapple weight, respectively. The obtained image was sent to software program to change colors of the image into gray scale and to reduce noises in the image. The clearly edges of the image were employed to compute size of a pineapple and the data were transferred to fuzzy system. The inputs of fuzzy system determined the size and weight of pineapple which used to establish twenty fuzzy rules. The experiments performed by random selection size and weight of three pineapple kinds including Nanglae, Sriracha, Phuket. The experimental results reveal that classification of pineapple by the created tool exhibited high accuracy of size and weight detection equaled 87.5%. The average relative error performed 2.30% and 5.24% of size and weight, respectively. - 41 - Ultrasonic Sensor based Approach for Identifying the Camera ROI Mr. Pradeep S., Shashi Kumar M.S., Avinash.N Wittybot Technologies/Jain University, India Image segmentation and classification is a tough when there are partial occlusion, reflection, and shadows in the image which increase false alarms. This paper describes the method for defining regions of interest in an image using ultrasonic sensors data which will be further used for image segmentation and classification. Sensors mounted in the view of the camera are calibrated for their position with respect to the camera to the relative distance between the human and robot. Depending on these calibration parameters, the image is divided into number of regions that is equivalent to number of sensors. An Implementation and Pragmatic Analysis of the Digital Image Forgery Detection Schemes Dr. Hansoo Kim and Joong Lee National Forensic Service, The Republic of Korea We select the most effective and remarkable schemes among the state-of-the-art digital forgery detection schemes and implement a system based on these schemes. With that, we compare the advantages and limitations of each scheme by experimental analysis. As a result, the detection rate of the schemes is dependent of the parameters of the schemes and the forgery method of the image, although the schemes succeed to detect most of the forged images. Also, a number of forged images are not detected which are off the detection points of the schemes. Building Detection in Terrestrial Images Mr. Teerapat Chaloeivoot and Suebskul Phiphobmongkol Department of Computer Engineering, Faculty of Engineering, Chulalongkorn University, Bangkok, Thailand This paper presents a method to detect buildings in terrestrial images. High resolution terrestrial images are normally taken from land survey vehicles. These images and other surveyed data along roads are needed by many agencies that require new data as time passes by. Land use in rural area is an example that needs information about buildings and can benefit from terrestrial images. The proposed method was aimed to detect buildings in terrestrial images to benefit the above needs. The method consists of two stages. The first stage removes unwanted objects, performs image segmentation, and finds regions of interest. Image processing techniques such as greenness extraction, sky detection, color segmentation, color detection, shape detection are used. The second stage performs building detection. It includes the possible building parts detection, projection profiles finding, and the building determination. The method can identify a partial building if the whole building is not shown in an image. The proposed method was tested on 936 images (332 images with buildings and 604 images without buildings). The images were from Google Street View. The accuracy was determined by human inspection. The method gave promising results with an average accuracy of 82.5%. Positive faults were 4.7% average. - 42 - Venue: Room C Chair: Dr. Girija Chetty University of Canberra, Canberra, Australia Time: 15:45pm-19:30pm Fast Range-based Localization of Targets using Particle Swarm Optimization Ms. Vidya Viswanathan, Soumya Jana, Shanti Swarup Indian Institute of Technology Hyderabad, India Target localization is an active area of research which has several applications in the fields of robotics, defense and geology. In this paper, our goal is to localize a target based on range measurements obtained using a network of sensors scattered in the 3D continuum. To this end, we make use of the biologically inspired particle swarm optimization (PSO) algorithm. In this context, we propose a novel modification of PSO algorithm that leads to faster convergence, and eliminates the flip ambiguity encountered by coplanar sensors. Our initial results over several simulation runs highlight the accuracy and speed of the proposed approach. This paper also proposes a statistical approach to optimally place a given set of sensors such that the localization error is minimized over certain trajectories of the target. The optimal locations of the sensors are estimated using the Cramer-Rao lower bound (CRLB) as the cost function. Memory Allocation Vulnerability Analysis and Analysis Optimization for C Programs based on Formal Methods Dr. Hui Deng, Hui Liu, Ying Guo and Baofeng Zhang China Information Technology Security Evaluation Center, China The information security problems caused by the software vulnerabilities have become more and more complex. Among these vulnerabilities, the ones existing in memory allocations appear to be difficult to diagnose due to the absence of an appropriate method. In order to solve this problem, we introduce a methodology including four novel frameworks in this paper. The formalization for a program called algebraic transition system is proposed first. It aims to transform the data exchange process and its security attribute of a program into algebraic systems which are able to be considered as objection functions and constraint conditions, respectively. Based on the systems, the behavior and structure of formalization are optimized with bisimulation to reduce the computing cost in the subsequent processes. The determination of bisimulation is implemented by numerical and symbolic computation. Finally, the specific detection of the memory allocation vulnerability in the C program can be changed into a constraints solving problem called Max function which is able to be resolved with the filled function method. The experiment results represent that our approach is feasible. High Dimensional Data Mining Systems by Kernel Orthonormalized Partial Least Square Analysis Prof. Shian-Chang Huang, Nan-Yu Wang, and Tung-Kuang Wu National Changhua University of Education, Taiwan - 43 - Mining high-dimensional business data is a popular and important problem. However, there are two challenges for mining such data, including (1) the curse of dimensionality and (2) the meaningfulness of the similarity measure in the high dimension space. This paper proposes a novel approach to overcome the problems, which builds a generalized multiple kernel machine (GMKM) on a special subspace created by the kernel orthonormalized partial least square (KOPLS). GMKM takes products of kernels-corresponding to a tensor product of feature spaces. This leads to a richer and much higher dimensional feature representation. Therefore, GMKM is powerful in identifying relevant features and their apposite kernel representation. KOPLS finds a low dimensional representation of data, which uncovers the hidden information and simultaneously respects the intrinsic geometry of data manifold. Our new system robustly overcomes the weakness of traditional multiple kernel machines, and outperforms traditional classification systems. Analysis of Two Different Sequences of Old Arena Viruses by Decision Tree, Apriori Algorithm, and Shannon Entropy Ms. Yuree Chung, Yujin Moon and Taeseon Yoon HAFS, The Republic of Korea LASV (Lassa virus) and LCMV (Lymphocytic Choriomeningitis virus), which show the different mortality in spite of same symptoms and origin, are introduced into the human population by rodents which shed the virus in urine and droppings. Direct contact with these materials, touching virus-infected objects, eating contaminated food, or exposure to open cuts or sores develop infection. In this paper, we analyzed 4 different proteins of LASV and LCMV: glycoprotein, Z protein, nucleoprotein, and L protein. Also, we investigated the similarities between them based on the frequency of amino acids by decision tree. Furthermore, we look for one amino acid’s frequency of relating rates to another amino acid to find the difference between two viruses by Apriori algorithm. A NoSQL Geo-data Solution for the Consumption of Services on the Web Mr. P. Cau, S. Manca, R. Demontis, D. Muroni, C. Soru, L. Muscas, E. Lorrai and P. A. Marras Center for Advanced Studies, Research and development in Sardinia (CRS4). Polaris, Pula Web applications and portals are strategic gateways to deliver tools, data, computational infrastructures and services over the Internet. Software and data interoperability is the key factor to enable the integration of knowledge and share common objectives. Web applications are using ever more big spatial data ecosystems that usually involve cross-border data flows and rely on open Internet. Demand of web GIS based applications, in particular, shows a steady growth over the last few years, indicative of a scenario where spatial-data infrastructures will be ever more consumed by mobile and web applications. Management and analysis of large and growing volumes of geo-data is challenging the scientific community without clear long term solutions. Empowering Enterprise Storage of Future Datacenter – Hybrid Disk Drive Storage System Development Dr. Yonghong Wilson Wang, Chun Teck Lim, Kyawt Kyawt Khaing and Khai Leong Yong Data Storage Institute, Singapore - 44 - A hybrid disk drive consists of a small amount of non-volatile NAND flash memory as fast storage media to complement the rotational magnetic recording disk, normally considered slow but with large storage capacity. In this paper, we present the design and development work of enterprise hybrid drive storage system for future datacentre. We also design a new type of dynamic cache algorithms that can simplify and enhance conventional cache management architecture. Evaluation with enterprise storage workloads shows that the average IOPS (I/O per second) can be increased up to 300% and can outperform the IOPS of high speed enterprise SAS (Serial Attached SCSI) drive for certain workloads. Another advantage of hybrid drive is power saving, for which the power consumption can be reduced by more than 50%, compared with the enterprise hard disk drive. We envision that hybrid disk drives can be a cost-effective replacement for conventional high speed disk drive in enterprise storage systems that empower datacenters with large storage capacities, higher performance and lower energy consumption. Investigation into Interoperability in Cloud Computing: An Architectural Model Ms. Susan Sutherland and Girija Chetty University of Canberra, ACT, 2616 This paper presents an architectural model that enables the convergence of the interoperability of Enterprise Architecture (EA), Service Oriented Architecture (SOA) and Cloud Services. As per the reviewed literature by the authors, there is a lack of research in this space of cloud computing. Hence the authors' research developed an innovative solution to provide a ‘plug and play’ architectural model to seamlessly connect the enterprise systems to cloud within the governance standards of enterprise architecture. The rest of the paper discusses the identified research problem and articulates the developed model while validating the model with a few use cases, and concluding that the research community could further validate the model with their respective application use cases. Adaptation of Distributed File System to VDI Storage by Client-Side Cache Mr. Cheiyol Kim, Sangmin Lee, Youngkyun Kim, Daewha Seo Electronics and Telecommunications Research Institute, The Republic of Korea Distributed File system was widely used as a cloud computing backend storage with high scalability, low cost, and reasonable sequential I/O performance. VDI I/O workload is mostly composed of small random I/O and distributed file system does not have enough performance for this I/O pattern. Compensating for this gap, we applied a cache using memory and SSD (Solid State Drive) to distributed file system. This cache was implemented in the file system’s client side. It uses memory as write cache and SSD as read cache with write-back policy for minimizing the I/O response time. Based distributed file system was implemented on user-level using Fuse (File system in User space) framework. When the client-side cache was used, the file server which previously could not support even 1024 users was improved enough to support more than 3000 users. By applying the client-side cache, it is possible to solve the performance drawback of the distributed file system used for VDI storage. - 45 - Comparative Analysis of Technical Methods for Detecting Software Thefts Prof. Hyun-il Lim Kyungnam University, Republic of Korea Software plays an important role in current computing environments, and it is protected as intellectual property of its author. However, the cases of software thefts are increasing every year. To deal with the problem, there have been researches on detecting software thefts. In this paper, we introduce technical methods for detecting software thefts, and compare characteristics of the methods according to several performance evaluation criteria. NVMFS: NVM-accelerated File System for Future Data Centre Mr. Qingsong Wei, Cheng Chen, Jun Yang, Chundong Wang, Mingdi Xue Data Storage Institute, Singapore File system performance is dominated by metadata access. In this paper, an NVM-accelerated file system (referred to as NVMFS) is proposed to optimize metadata access by exploiting the persistency and byte-addressability of Non-volatile Memory (NVM). The NVMFS decouples data and metadata access path, putting data on disk and metadata in byte-addressable NVM at runtime. Thus, data is accessed in block from I/O bus and metadata is accessed in byte-addressable manner from memory bus. Metadata access is accelerated and metadata I/O is eliminated because metadata in NVM is not flushed back to disk anymore. A consistency mechanism combining copy-on-write and transaction is introduced in the NVMFS. The NVMFS is implemented in kernel on real NVDIMM platform. Evaluation results show that the NVMFS is up to 9X faster than existing file systems. Homomorphic Exclusive-Or Operation for Secure Deduplication Dr. Yibin Ng, Shu Qin Ren and Khin Mi Mi Aung Data Storage Institute, Singapore Deduplication has been widely recognized as an essential method to save storage costs for cloud-based storage providers such as Dropbox and Google Drive. To enable deduplication, deterministic encryption schemes are used where the same ciphertext is always generated for the same plaintext. This has the drawback of leaking information on equality of the underlying plaintexts. Also, an attacker is also able to gain knowledge of the access patterns of other users asking for the same file. As such, although data is stored securely in the cloud, information is still leaked during the data upload and retrieval process. In this work, we propose the homomorphic exclusive-or (XOR) encryption scheme to secure the data against plaintext equality and access pattern leakage. All encrypted data is randomized by a XOR operation with a random bit-string. This effectively protects data-in-transit against passive attack such as ciphertext analysis due to the randomization. - 46 - Large Scale Hybrid Storage System Dr. Haixiang Shi, Kyawt Kyawt Khaing, Donghong Wang Data Storage Institute, A*STAR, Singapore In order to tackle the big data storage problem, a petabyte storage system is proposed which consists of multiple storage tiers. The proposed large scale hybrid storage system uses hybrid storage including Non-volatile Memory (NVM), Solid State Device (SSD), Hybrid Drive disks and conventional hard disks. Data placement, dynamic caching and metadata management algorithms are proposed for this system. Furthermore, the proposed hybrid storage system is used as a test bed to integrate with other research works including NVM File System (NVMFS), Data Security and Encryption, and Hybrid File System (HybridFS), to show the performance of the fully integrated storages system. Distributed Metadata Search in the Cloud Yang Yu, Dr. Yongqing Zhu, and Juniarto Samsudin Data Storage Institute, A*STAR, Singapore The excessively large amounts of data stored in clouds lead to a big challenge for users to access and manage the data. And the corresponding metadata access likely becomes a severe performance bottleneck. In this paper, we propose a distributed metadata search system for the cloud. This system provides efficient index and search for multi-dimensional metadata. Our system achieves optimized performance by improving K-D-B tree based index/search and utilizing index partitioning techniques. Experiment results show that our system can perform well in terms of memory utilization, search speed and scalability. Secure Large Scale Shared Storage System Mr. Rodel Miguel, Sivaraman Sundaram, Khin Mi Mi Aung Data Storage Institute, Singapore The integration of next generation NVM into storage network architecture requires redesigning the current storage security infrastructure, to fully realize the performance potential of future storage systems. As a minimum, the following three layers of security control architecture need to be modified: credential management at application layer, access controls at system layer, and secured ultra-bandwidth peripheral communication at hardware layer. The main purpose of this paper is to redesign and develop storage security infrastructure to support the future storage network architecture that is based on NVM technologies. Regenerating-Local Reconstruction Codes for Distributed Storage Systems Mr. Quanqing Xu, Hong Wai Ng, Weiya Xi and Chao Jin Data Storage Institute, A*STAR, Singapore In this paper, we propose Regenerating-Local Reconstruction Codes (R-LRC) and describe their - 47 - encoding and decoding techniques. After that, their repair bandwidths are investigated for different failure patterns. We also explore an alternative of R-LRC, which gives R-LRC lower repair bandwidth. Since R-LRC are extended version of Pyramid codes, optimization of repair bandwidth of a single failure will also apply to R-LRC. Compared with Pyramid Codes, Regenerating-Local Reconstruction Codes have two benefits. Firstly, in average, they use around 2:8 blocks in repairing 2 failures, while the Pyramid codes use about 3:7 blocks. Therefore, they have lower IOs than Pyramid Codes. Secondly, when 2 failures occur at common block group and special block group, they re-quire only Mk _(k2 + 1), which is lower compared with Mk _(k2 + k2 )= M in Pyramid codes when k _ 2. SELDAC: Software-defined storage based efficient load distribution and auto scaling in Cloud Data Centers Dr. Renuga Kanagavelu and Khin Mi Mi Aung A*STAR, Data Storage Institute, Singapore Cloud computing allows the cloud users to access the shared pool of configurable resources such as compute, network and storage on-demand basis from the cloud Data Centers. Cloud storage provides the storage resources to the cloud users over the network. The massive growth of cloud data due to the applications such as video streaming, big data processing, social networking, banking and scientific applications fueled the storage demand. An increase in storage demand resulted in the expansion of the cloud storage with additional storage nodes. The expansion of the cloud storage necessitates the migration of data across the storage nodes to keep them balanced. Efficient management and migration of tera bytes or peta bytes of such cloud data depends not only on the storage availability but also on the networking cost which is proportional to the distance and the bandwidth requirement. In this scenario, software defined environment opens up the new opportunities to orchestrate the network and storage resources control strategies to provide an effective solution. In this paper, we present the software-defined orchestration framework for efficient load distribution and auto scaling mechanism and shows that it improves the overall efficiency in terms of latency and retrieval cost. We demonstrate the effectiveness and the efficiency of the proposed mechanism using simulations. - 48 - Mr. Wei Gong 4399 Network Co., Ltd, China Mr. Haigui Wu 4399 Network Co., Ltd, China Mr. Zhaolu Xiao 4399 Network Co., Ltd, China Mr. Bin Yang 4399 Network Co., Ltd, China Mr. Govinda Ram PANERU Ministry of Education, Kathmandu, NEPAL Mr. Subhash PRAJAPATI Ministry of Education, Kathmandu, NEPAL Mr. Debasis Das NIIT University, India Prof. SeoungBum Kim Korea University, Republic of Korea Mr. Ji Soo Kim Laboratory - Dependable Embedded Control Systems,Graduate School of Electronics Engineering,Kyungpook National University(KNU),Korea Mr. Lim Eng Chye Roy Panasonic Industrial Devices Singapore, Singapore - 49 - Name Adik Susilo Wardoyo Amutha J Annisa Riska Anugraheni Arnd Buschhaus Arpita Bhattacharjee Bandit Suksawat Bing-Jie Guo Boyang Chen Boyang Chen ID N3007 F076 Session S4 S3 Page 38 31 EA3020 S5 40 N0025 N2007 N0029 F077 EA3005 EA3004 S4 S1B S5 S3 S1B S1A 34 18 41 31 20 16 Byung Do Chung Chanhee Park Chantach Luxnanan Cheiyol Kim Cheng-Yun Ho Cheng-Yun Ho Chi-Hua Tien Christoph Krofitsch D. Cymbalak Duc-Thinh Le El Houssein Chouaib Harik George K. Fourlas Gouthaman Elangovan Guanghui Zhou Gui Xianzhou Guo SuLi Haixiang Shi Hansoo Kim Hartomo Soewardi Hui Deng Hyung Rok Do Hyun-il Lim Ilham Bakri J.M.Prajapati Jaehong Yu Jaroslav Lamer Jayeon Gu Jianan Sun Jianna Niu Jieun Son John M. Ikome John Reyes Kai Wu Kerstin Sophie Haring EA3008 EA3011 EA009 F088 F053 F054 N3010 N0005 F020 N0035 S2A S1A S2B S6 S3 S3 S2B S4 S5 S4 22 15 25 45 29 32 27 33 39 35 N0028 S4 34 N0034 S4 35 N3013 S3 30 N0015 F1012 F1011 F070 F068 EA3020 F006 EA3018 F091 EA011 N0021 EA3014 F050 EA3017 N2008 EA2004 EA3019 EA007 EA004 N0030 S2B S3 S3 S6 S5 S5 S6 S2B S6 S2B S4 S1B S5 S1B S2A S2A S1A S2A S2A S4 27 30 31 47 42 40 43 26 46 27 38 19 39 18 24 22 14 23 21 35 N0007 S4 33 - 50 - Khader Musbah Titi Kyungjin Bae Lei Zhang Li fang Masashi Sugano Meteb Altaf Mohamed Gouda Ramadan Alkalla Muhammad Shahab Alam Neelanjana Basu Roy Nutchanat Kitsongsang O. Kainz P. K. Kwok N2005 EA012 N2011 N3009 N3040 N3006 S1A S2B S4 S5 S2B S4 15 25 34 41 28 37 N0024 S4 36 N0026 S4 37 F093 S3 32 N0042 S1B 19 F019 EA3022 S5 S1A 39 16 Paulo Gil Phikid Vayophad Pimchanok Rungrueng Pradeep S. Praetana Poohrungrueang Qingsong Wei Quanqing Xu R. Henry Xavier Renuga Kanagavelu Rodel Miguel Sandeep Singhal Seulki Lee Shian-Chang Huang Sikandar Hayat Sivachandra Prabhu Annadurai Sun Chen Sung Ho Park Susan Sutherland T. Suresh Teerapat Chaloeivoot Thu Zar Phyu Tobey H. Ko Tong Wu Vidya Viswanathan Wang shuqiang Yibin Ng Yifan Zhou Yifan Zhou Yonghong Wilson Wang N0008 EA005 S4 S2A 33 23 N0044 S1B 20 N0033 S5 42 N0043 S4 36 F080 F072 EA3009 F081 F083 EA2005 EA3007 F067 N3008 S6 S6 S2A S6 S6 S2A S2B S6 S4 46 47 23 48 47 21 26 43 37 N3012 S3 30 F1012 EA3010 F3003 N0012 F3001 N2009 EA008 EA2003 N0014 F1009 F069 EA3016 EA3021 S3 S1A S6 S3 S5 S5 S2B S2A S6 S1B S6 S1A S1B 30 15 45 29 42 41 25 21 43 18 46 16 20 F078 S6 44 Yongqing Zhu Young Joon Park Younghoon Kim F085 EA3012 EA3006 S6 S5 S1A 47 40 14 Yuree Chung - 51 - F010 S6 44 Route: 1st Notice: 1. Please be noted that this is totally free of charge visit to one of the advanced labors in Nanyang Technological University. During this time period, please follow the guidance and behave properly. 2. On the way to labor, please carefully follow our staff, and feel free to call us if you have any question. 3. There may be some minor changes of the time due to the practical situation. 4. If you don’t want to join the half-day visit, you are free to arrange your own discovery tourism in Singapore. - 52 - Memo ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ ______________________________________________________________________ - 53 -
© Copyright 2025