UPCOMING CONFERENCES

UPCOMING CONFERENCES
Guilin, China, February 28-March 2, 2015
Conference Name
2015 2nd International Conference on
Electronics Engineering and Power
Engineering
(CEEPE-II 2015)
2015 International Conference on Smart
Manufacturing
(ICOSM 2015)
2015 International Conference on Information
Management
(ICIM 2015)
Conference Website
Submission Deadline & Email
www.ceepe.net
December 15, 2014
[email protected]
www.icosm.org
December 15, 2014
[email protected]
www.icim.org
December 20, 2014
[email protected]
Conference Website
Submission Deadline & Email
www.ceeit.net
January 5, 2015
[email protected]
www.icbcb.org
January 5, 2015
www.icmai.org
January 5, 2015
[email protected]
Conference Website
Submission Deadline & Email
www.icsis.org
February 15, 2015
[email protected]
www.icoee.org
February 15, 2015
www.icrai.org
February 28, 2015
[email protected]
Hong Kong, China, March 12-13, 2015
Conference Name
2015 2nd International Conference on
Electrical Engineering and Information
Technology
(CEEIT 2015)
2015 3rd International Conference on
Bioinformatics and Computational Biology
(ICBCB 2015)
2015 International Conference on
Measurement, Automation and Instrumentation
(ICMAI 2015)
[email protected]
Las Vegas, USA, May 09-10, 2015
Conference Name
2015 International Conference on Software and
Information Systems
(ICSIS 2015)
2015 International Conference on Electronics
Engineering
(ICOEE 2015)
2015 International Conference on Robotics and
Artificial Intelligence
(ICRAI 2015)
[email protected]
2014 International Conference on Computer Engineering (ICOCE 2014)
Contents
Contents ············································································································1
Welcome Page ·····································································································2
Conference Venue·································································································3
Simple Version of Conference Schedule ······································································4
Introduction to Keynote Speakers ··············································································5
Schedule of Sessions ·····························································································7
Poster Session ····································································································20
Call for Papers····································································································26
1
2014 International Conference on Computer Engineering (ICOCE 2014)
Welcome to ICOCE 2014 in Shenzhen, China
Welcome to 2014 International Conference on Computer Engineering (ICOCE 2014). ICOCE 2014 has 2
workshops, they are ICNT 2014 (2014 International Conference on Network Technologies) and ICAAI 2014
(2014 International Conference on Advances in Artificial Intelligence). The aim of ICOCE 2014 and its
workshops is to present the latest research and results of scientists related to computer engineering, network
technologies, and artificial intelligence. This conference provides opportunities for delegates from different
areas to exchange new ideas and application experiences face to face, to establish business or research
relations and to find global partners for future collaboration. We hope that the conference can make
significant contribution to these up-to-date scientific fields. And wish all respected authors and listeners a
nice trip in Shenzhen, China.
Warm Tips:
All papers of ICOCE 2014 and ICNT 2014, both invited and contributed, have been reviewed by two or three experts
from the PC. After a careful reviewing process, all registered and presented paper will be published in WIT
Transactions on Information and Communication Technologies (ISSN: 1743-3517), which will be indexed by EI
Compendex, Scopus and ISI.
All accepted and registered papers of ICAAI 2014 will be published together with ISCBI, and will be submitted to be
reviewed by the IEEE Xplore and Computer Society Digital Library (CSDL).
 Get your presentation PPT prepared and print out the notification letter before you leave for Shenzhen,
China.
 Pick up the conference materials at the reception desk of ICOCE 2014 in the lobby of Lushan Hotel on
November 09, 2014.
 Please attend the conference and arrive the Conference Room before 9:00 a.m. in formal attire on
November 10, 2014
 There will be a group photo and coffee break between 10:45-11:00, November 10; every attendee will
be invited to come to the platform to take group photo.
 Copy your PPT to the conference computer before your session begins. One best presentation will be
selected from each session, and the best one of each session will be announced and awarded the
certificate at the end of each session.
 If you didn’t put a formal photo in your registration from, please bring a one-inch formal photo to the
venue.
2
2014 International Conference on Computer Engineering (ICOCE 2014)
Conference Venue(会议地点)
Lushan Hotel, Shenzhen
Shenzhen, China
(深圳庐山酒店,深圳,中国)
Website(网址): www.shenzhenlushanhotel.com
Address: No. 3019, Chunfeng Road, Luohu District, Shenzhen, China
地址:中国广东省深圳市罗湖区春风路 3019 号
电话(TEL):(86)0755-82338888 80308031
3
2014 International Conference on Computer Engineering (ICOCE 2014)
Simple Version of Conference Schedule
Dates
November 09, 2014(Sunday )
Venue
Items
In the lobby of Lushan hotel
Participants Registration and Conference kits
(庐山酒店大堂)
Collection
10:00AM-12:00AM
13:30PM-16:00PM
th
November 10, 2014 (Monday)
Jiujiang Conference Room, 5 floor
(9:00AM-10:45AM)
(5 楼九江厅)
Opening Ceremony and Keynote Speeches
Keynote Speech I: Prof. Dr. Thomas Fang Zheng
Keynote Speech II: Prof. Chin-Chen Chang
th
November 10, 2014 (Monday)
Jiujiang Conference Room, 5 floor
(10:45AM-11:00AM)
(5 楼九江厅)
November 10, 2014 (Monday)
Jiujiang Conference Room, 5 floor
Paper Presentation Session I (6 papers)
(11:00AM-12:15AM)
(5 楼九江厅)
Session Chair: Prof. Wenyu Zhang
November 10, 2014 (Monday)
Fangting Restaurant, 2nd floor of Lushan
(12:15AM-13:30PM)
Hotel(2 楼芳庭餐厅)
November 10, 2014 (Monday)
Jiujiang Conference Room, 5 floor
Paper Presentation Session II (9 papers)
(13:30PM -15:20PM)
(5 楼九江厅)
Session Chair: Prof. Vania Joloboff
November 10, 2014 (Monday)
Jiujiang Conference Room, 5 floor
(15:20PM -15:35PM)
(5 楼九江厅)
November 10, 2014 (Monday)
Jiujiang Conference Room, 5 floor
Paper Presentation Session III (9 Papers)
(15:35PM -17:25PM)
(5 楼九江厅)
Session Chair: TBA
November 10, 2014 (Monday)
Fangting Restaurant, 2nd floor of Lushan
(17:30PM -19:00PM)
Hotel(2 楼芳庭餐厅)
Coffee Break and Group Photo
th
Lunch
th
th
Coffee Break
th
4
Dinner Banquet
2014 International Conference on Computer Engineering (ICOCE 2014)
Introduction to Keynote Speakers
Prof. Chin-Chen Chang (张真诚教授)
Feng Chia University, Taiwan (逢甲大学)
Biography: Professor Chin-Chen Chang obtained his Ph.D. degree in computer engineering from National
Chiao Tung University. His first degree is Bachelor of Science in Applied Mathematics and master degree is
Master of Science in computer and decision sciences. Both were awarded in National Tsing Hua University. Dr.
Chang served in National Chung Cheng University from 1989 to 2005. His current title is Chair Professor in
Department of Information Engineering and Computer Science, Feng Chia University, from Feb. 2005.
Prior to joining Feng Chia University, Professor Chang was an associate professor in Chiao Tung University,
professor in National Chung Hsing University, chair professor in National Chung Cheng University. He had also
been Visiting Researcher and Visiting Scientist to Tokyo University and Kyoto University, Japan. During his
service in Chung Cheng, Professor Chang served as Chairman of the Institute of Computer Science and
Information Engineering, Dean of College of Engineering, Provost and then Acting President of Chung Cheng
University and Director of Advisory Office in Ministry of Education, Taiwan.
Professor Chang's specialties include, but not limited to, data engineering, database systems, computer
cryptography and information security. A researcher of acclaimed and distinguished services and contributions to
his country and advancing human knowledge in the field of information science, Professor Chang has won many
research awards and honorary positions by and in prestigious organizations both nationally and internationally.
He is currently a Fellow of IEEE and a Fellow of IEE, UK. And since his early years of career development, he
consecutively won Institute of Information & Computing Machinery Medal of Honor, Outstanding Youth Award of
Taiwan, Outstanding Talent in Information Sciences of Taiwan, AceR Dragon Award of the Ten Most Outstanding
Talents, Outstanding Scholar Award of Taiwan, Outstanding Engineering Professor Award of Taiwan, Chung-Shan
Academic Publication Awards, Distinguished Research Awards of National Science Council of Taiwan,
Outstanding Scholarly Contribution Award of the International Institute for Advanced Studies in Systems
Research and Cybernetics, Top Fifteen Scholars in Systems and Software Engineering of the Journal of Systems
and Software, Top Cited Paper Award of Pattern Recognition Letters, and so on. On numerous occasions, he was
invited to serve as Visiting Professor, Chair Professor, Honorary Professor, Honorary Director, Honorary
Chairman, Distinguished Alumnus, Distinguished Researcher, Research Fellow by universities and research
institutes. He also published over serval hundred papers in Information Sciences. In the meantime, he
participates actively in international academic organizations and performs advisory work to government agencies
and academic organizations.
Prof. Dr. Thomas Fang Zheng (郑方教授)
Tsinghua University, China (清华大学)
Biography: Dr. Thomas Fang Zheng is a full research professor and Vice Dean of the Research Institute of
Information Technology (RIIT), Tsinghua University (THU), and Director of the Center for Speech and Language
Technologies (CSLT), RIIT, THU.
Since 1988, he has been working on speech and language processing. He has been in charge of, or undertaking
as a key participant, the R&D of more than 30 national key projects and international cooperation projects, and
received awards for more than 10 times from the State Ministry (Commission) of Education, the State Ministry
(Commission) of Science and Technology, the Beijing City, and others. So far, he has published over 200 journal
and conference papers, 11 (3 for first author) of which were titled the Excellent Papers, and 11 books (refer to
http://cslt.riit.tsinghua.edu.cn/~fzheng for details).
5
2014 International Conference on Computer Engineering (ICOCE 2014)
He has been serving in many conferences, journals, and organizations. He is an IEEE Senior member, a CCF
(China Computer Federation) Senior Member, an Oriental COCOSDA (Committee for the international
Coordination and Standardization of speech Databases and input/output Assessment methods) key member, an
ISCA member, an APSIPA (Asia-Pacific Signal and Information Processing Association) member, a council
member of Chinese Information Processing Society of China, a council member of the Acoustical Society of
China, a member of the Phonetic Association of China, and so on.
He serves as Council Chair of Chinese Corpus Consortium (CCC), a Steering Committee member and a BoG
(Board of Governors) member of APSIPA, Vice President – Institutional Relations and Education Program (Term
2013-2014) of APSIPA, Chair and Secretary General of the Steering Committee of the National Conference on
Man-Machine Speech Communication (NCMMSC) of China, head of the Voiceprint Recognition (VPR) special
topic group of the Chinese Speech Interactive Technology Standard Group, Vice Director of Subcommittee 2 on
Human Biometrics Application of Technical Committee 100 on Security Protection Alarm Systems of
Standardization Administration of China (SAC/TC100/SC2), a member of the Artificial Intelligence and Pattern
Recognition Committee of CCF.
He is an associate editor of IEEE Transactions on Audio, Speech, and Language Processing, a member of
editorial board of Speech Communication, a member of editorial board of APSIPA Transactions on Signal and
Information Processing, an associate editor of International Journal of Asian Language Processing, a series editor
of SpringerBriefs in Signal Processing, and a member of editorial committee of the Journal of Chinese Information
Processing.
He ever served as co-chair of Program Committee of International Symposium on Chinese Spoken Language
Processing (ISCSLP) 2000, member of Technical Committee of ISCSLP 2000, member of Organization
Committee of Oriental COCOSDA 2000, member of Program Committee of NCMMSC 2001, member of Scientific
Committee of ISCA Tutorial and Research Workshop on Pronunciation Modeling and Lexicon Adaptation for
Spoken Language Technology 2002, member of Organization Committee and international advisor of Joint
International Conference of SNLP-O-COCOSDA 2002, General Chair of Oriental COCOSDA 2003, member of
Scientific Committee of International Symposium on Tonal Aspects of Languages (TAL) 2004, member of
Scientific Committee and Session Chair of ISCSLP 2004, chair of Special Session on Speaker Recognition in
ISCSLP 2006, Program Committee Chair of NCMMSC 2007, Program Committee Chair of NCMMSC 2009,
Tutorial Co-Chair of APSIPA ASC 2009, Program Committee Chair of NCMMSC 2011, general co-chair of APSIPA
ASC 2011, and APSIPA Distinguished Lecturer (2012-2013).
He has been also working on the construction of "Study-Research-Product" channel, devoted himself in
transferring speech and language technologies into industries, including language learning, embedded speech
recognition, speaker recognition for public security and telephone banking, location-centered intelligent
information retrieval service, and so on. Now he holds over 10 patents in various aspects of speech and language
technologies.
He has been supervising tens of doctoral and master students, several of who were awarded, and therefore he
was entitled Excellent Graduate Supervisor. Recently, he received 1997 Beijing City Patriotic and Contributing
Model Certificate, 1999 National College Young Teacher (Teaching) Award issued by the Fok Ying Tung
Education Foundation of the Ministry of Education (MOE), 2000 1st Prize of Beijing City College Teaching
Achievement Award, 2001 2nd Prize Beijing City Scientific and Technical Progress Award, 2007 3rd Prize of
Science and Technology Award of the Ministry of Public Security, and 2009 China "Industry-University-Research
Institute" Collaboration Innovation Award.
6
2014 International Conference on Computer Engineering (ICOCE 2014)
Schedule of Sessions
November 10, Morning
Venue: Jiujiang Conference Room, 5th floor(5 楼九江厅)
Time: 9:00 a.m.-12:15 a.m.
9:00a.m.-9:05a.m.
9:05a.m.-9:55a.m.
Opening Remarks
Prof. Chin-Chen Chang
Keynote Speech I
Prof. Dr. Thomas Fang Zheng (郑方教授)
Tsinghua University, China (清华大学)
Topic of Keynote Speech: Time-Varying Robustness for Speaker Recognition
Abstract: Speaker recognition applications are becoming more and more popular.
However, in practical applications many factors may affect the performance of
systems.
In this talk, a general introduction to speaker recognition will be presented, including
definition, applications, category, and key issues in terms of research and
application. Robust speaker recognition technologies that are useful to speaker
recognition applications will be briefed, including cross channel, multiple speaker,
background noise, emotions, short utterance, and time-varying (or aging). Recent
research on time-varying robust speaker recognition will be detailed.
Performance degradation with time varying is a generally acknowledged
phenomenon in speaker recognition and it is widely assumed that speaker models
should be updated from time to time to maintain representativeness. However, it is
costly, user-unfriendly, and sometimes, perhaps unrealistic, which hinders the
technology from practical applications. From a pattern recognition point of view, the
time-varying issue in speaker recognition requires such features that are
speaker-specific, and as stable as possible across time-varying sessions. Therefore,
after searching and analyzing the most stable parts of feature space, a
Discrimination-emphasized Mel-frequency-warping method is proposed. In
implementation, each frequency band is assigned with a discrimination score, which
takes into account both speaker and session information, and Melfrequency-warping is done in feature extraction to emphasize bands with higher
scores.
Experimental results show that in the time-varying voiceprint database, this method
can not only improve speaker recognition performance with an EER reduction of
19.1%, but also alleviate performance degradation brought by time varying with a
reduction of 8.9%. This conclusion applies to some other databases where no
recording time information is transcribed.
Keynote Speech II
9:55a.m.-10:45a.m
Prof. Chin-Chen Chang (张真诚教授)
Feng Chia University, Taiwan (逢甲大学)
Topic of Keynote Speech: Hiding Information in a Digital Image
Abstract: Information Hiding is the science of secret message delivery using cover
7
2014 International Conference on Computer Engineering (ICOCE 2014)
media. A digital image is a flexible medium used to carry a secret message because
the slight modification of a cover image is hard to distinguish by human eyes.
In this talk, I will introduce three methods: Kim et al.'s method, Zhang and Wang’s
method and Sudoku solutions. A selected Sudoku solution is used to guide cover
pixels’ modification in order to imply secret data. Because the number of possible
Sudoku solutions is very large, the proposed method is more secure than Kim et al.'s
method and Zhang and Wang’s method. From the experimental results, the visual
quality of stego images produced by the Sudoku method is higher than 44 dB in
average, which is slightly less than that of related works; however, the embedding
capacity of the proposed method is 1.5 bit per pixel, which is greater than that of the
related works.
Coffee Break and Group Photo
10:45a.m.-11:00a.m.
Session I- Pattern Recognition and Multimedia Technology
(6 papers, 12 minutes for each paper, including Q&A)
Venue: Jiujiang Conference Room, 5th floor(5 楼九江厅)
Time: 11:00a.m.-12:15a.m.
Session Chair: Prof. Wenyu Zhang
Presenter: Jie ZHANG
From: Nagoya University, Japan
E-118E
11:00-11:12
Title: Detecting Reused Elements in Presentation Slides
Authors: Jie ZHANG and Chuan XIAO
Abstract: Slide presentations have become a ubiquitous tool for business and
educational purposes. Instead of starting from scratch, slide composers tend to make
new presentation slides by browsing existing slides and reusing materials from them.
In this paper, we investigate the problem of reused element detection in presentation
slides. We develop respective techniques to identify both textual and visual elements
that have been reused across multiple presentation files. Experiments are performed
to evaluate the effectiveness of the proposed methods.
8
2014 International Conference on Computer Engineering (ICOCE 2014)
Presenter: Ran Shao
From: Queen’s University Belfast, Northern Ireland
E-212E
11:12-11:24
Title: Optimizations of the GPU-based Three-Dimensional FDTD Program with
CPML boundary condition on Kepler Architecture GPU
Authors: Ran Shao, David Linton, Ivor Spence, Ning Zheng
Abstract: An effective way to accelerate the Finite-difference time-domain (FDTD)
method is the use of a Graphic Processing Unit (GPU). This paper describes an
implementation of the three dimensional FDTD method with CPML boundary
condition on a Kepler (GK110) architecture GPU. We optimize the FDTD domain
decomposition method on Kepler GPU. And then, several Kepler-based optimizations
are studied and applied to the FDTD program. The optimized program achieved up to
270.9 times speedup compared to the CPU sequential version. The experiments show
that 22.2% of the simulation time is saved compared to the GPU version without
optimizations. The solution is also faster than previous works.
Presenter: Haoting Zhang
From: Guanghua International School of Shanghai, China
Title: Predicting the Treatment Effect in Diabetes Patients Using Classification
Models
Authors: Haoting Zhang, Lingyun Shao, Chengyu Xi
E-213E
11:24-11:36
E-216E
11:36-11:48
Abstract: The objective of this study is to explore the prediction of treatment effect
in diabetes patients using classification models, especially Decision Tree. The data of
the diabetic patients are from the Health Facts database of the United States. Models
(mainly Decision Tree, and also Rule Induction and Naïve Bayes) are constructed
using RapidMiner 5.3, so that the predictors will be searched and used to predict
whether the diabetic patients will be readmitted within 30 days. In this way, every
individual patient can be assessed according to their different characteristics, and
their treatment can be personalized accordingly to decrease the chances of
readmitting within 30 days. Another finding is that, medical management, which isn’t
directly related to the disease itself, can actually make a big difference in therapeutic
effect. In conclusion, using classification models such as Decision Tree is an effective
way to predict and personalize treatment effect of patients.
Presenter: Sang-Min Song
From: Tongmyong University,Korea
Title: GPU-based Parallel Processing for Real-time Skinning for Massive Crowd
Animation
Authors: Sang-Min Song and Soo-Yol Ok
9
2014 International Conference on Computer Engineering (ICOCE 2014)
Abstract: In this paper, we propose a keyframe animation for 3-D characters based
on skeleton data. GPU shader has been generally employed for efficient character
skinning [1]. The most expensive computation for animating characters with
skeletons is required for bone update and skinning. The previous shader-based
approaches exploited the GPU parallelism only for skinning. However, the
computation for updating the bone structure has not been efficiently optimized with
the GPU parallelism. The method proposed in this paper, however, utilized
general-purpose parallel programming technologies with GPU to optimize both the
skinning and bone computation.
Presenter: Alice J. Lin
From: Marshall University, USA
Title: Automatic Placement/Arrangement of Underneath Bone Structures for 3D
Facial Expressions and Animations
E-326E
11:48-12:00
Authors: Alice J. Lin and Fuhua (Frank) Cheng
Abstract: This paper presents a new method for automatically setting the bones in a
facial/head model to speed up the rigging process of a human face. To accomplish
this, vertices of the face/head are grouped. The average distance between pairs of
vertices is used to place the head bones. To set the bones for a face with
multi-density, the mean value of the vertices in a group is measured. The method
works on any particular person’s face/head model quickly and effectively, and
provides a powerful means for generating facial expressions and animations. The
time saved with the method is significant. Although we focus on human faces in this
work, the concepts presented here are flexible enough to be used on non-human
characters as well.
Presenter: Chattrakul Sombattheera
From: Mahasarakham University, Thailand
Title: A Load Balancing in Task Allocation of a Multiagent System
Authors: Chattrakul Sombattheera
ICA2014-1-005
12:00-12:12
Abstract: Task allocation is an important area of research in multiagent systems
because it can efficiently solve complexity in real world problem, such as power grid
systems, where a power plant (source) can be considered as an agent. Agents’ task is
to provide consistent supply to consumers, whose needs vary over the time. They
need to jointly plan in order to find appropriate schedules which associate each agent
to customers over the course of time such that consistent supplies are provided to
customers. This research formulates a new task allocation problem which can be
solved with two phases: i) find a (near) optimal plan, and i) verify whether the plan is
stable. These provide extra benefit to the solution that a stable plan is also (near)
optimal in terms of efficiency.
10
2014 International Conference on Computer Engineering (ICOCE 2014)
Lunch Time
12:15 a.m.-13:30 p.m.
Fangting Restaurant, 2nd floor of Lushan Hotel (2 楼芳庭餐厅)
Schedule of the Sessions
November 10, Afternoon
Session Chair
Session II (13:30 p.m.-15:20 p.m.)
Prof. Vania Joloboff
Coffee Break (15:20 p.m.-15:35 p.m.)
TBA
Session III (15:35 p.m.-17:25 p.m.)
Session II- Pattern Recognition and Distributed Systems
(9 Papers, 12 minutes for each paper, including Q&A)
Venue: Jiujiang Conference Room, 5th floor(5 楼九江厅)
Time: 13:30 p.m.-15:20 p.m.
Session Chair: Prof. Vania Joloboff
E-117E
13:30-13:42
Presenter: Payungsak Kasemsumran
From: Chiang Mai University, Chiang Mai, Thailand
Title: Face Recognition Using String Grammar Nearest Neighbor Technique
Authors: Payungsak Kasemsumran, Sansanee Auephanwiriyakul, and Nipon
Theera-Umpon
Abstract: Face recognition has become one of the important biometrics in many
applications. However, there is a problem of collecting more than one image per
person in the training data set, the so-called “one sample per person problem”.
11
2014 International Conference on Computer Engineering (ICOCE 2014)
Hence in this paper, we develop a face recognition system with a string grammar
nearest neighbor (sgNN) to cope with the problem. We implement our system in
three data sets, i.e., ORL, MIT-CBCL, and Georgia Tech databases. The recognition
rates of the test data set from three databases are 88.25%, 87.50%, and 70.71%,
respectively..
Presenter: Vania Joloboff
From: East China Normal University, China and INRIA, France
Title: Automated Generation of Instruction Set Simulator from Specification
E-209E
13:42-13:54
Authors: Shenpeng Liu, Vania Joloboff, Fei He
Abstract: We present here an architecture compiler, namely a software that takes as
input the description of a processor architecture as it is available from the vendors
on their web site, and generates an instruction set simulator for that processor,
which can be readily integrated into a simulation framework. This architecture
compiler extracts relevant information from the .pdf file, translated into an XML
specification. After further XML transformations, the C++ code of the simulator is
finally generated. The paper details the approach and the results for the ARM
Version 7 processor, that is suitable for other architectures as well.
Presenter: Semin Kang
From: Tongmyong University, Korea
Title: An Improved Sequential Constructive Crossover for Evolutionary Approach
to Travelling Salesman Problem
E-215E
13:54-14:06
E-217E
14:06-14:18
Authors: Semin Kang, Sung-Soo Kim, Young-Min Kang
Abstract: In this paper, we proposed an improved crossover method for genetic
approach to travelling salesman problem (TSP). Since the valid solution of TSP is
an ordered permutation, traditional crossover methods do not guarantee the valid
off-springs and fast convergence. Therefore, researchers have proposed special
crossover, and it is known that SCX is superior to other methods in the aspect of
convergence speed and fitness of the genes. In this paper, we extend the SCX to
have bidirectional and circular search properties in the off-spring construction. The
proposed BCSCX shows the better convergence speed and even better solution that
those of SCX in the empirical experiments.
Presenter: Tae-Hyeong Kim
From: Tongmyoung University, Korea
Title: An Efficient Simulation of Massive Crowd with Navigation and Affordance
Fields
Authors: Tae-Hyeong Kim, Young-Min Kang, Soo-Yol Ok
12
2014 International Conference on Computer Engineering (ICOCE 2014)
Abstract: In this paper, we propose a simulation method for massive crowd
behavior. The movement of each agent is determined by scalar energy fields, and the
fields are expressed as images in order to improve the computational efficiency. The
energy fields in our method are composed of navigation fields and affordance fields.
The navigation fields are applied to all agents, and each agent has its own
affordance field. The image-based approach can exploit the GPU functionalities to
manipulate the fields, and the affordance field model makes it possible to transform
the collision handling problem into a simple navigation field generation. The
image-based navigation field can resolve the collision without globally considering
the relations between agents. The efficient collision handling enables the proposed
method to simulate massively large amount of agents in real-time
Presenter: Dong-Min Woo
From: Myongji University, Korea
Title: Clustering of Optical Flow Using Centroid Neural Network for Motion
Tracking of Moving Vehicles
E-310E
14:18-14:30
Authors: Dong-Min Woo, Seung Soo Ha, and Wonha Kim
Abstract: Motion tracking is one of the most practical applications of computer
vision in real life. In this paper, we highlight a new application for tracking motion
and estimating the velocity of the moving vehicle in terms of clustering of optical
flows. A centroid neural network with a metric utilizing optical flow is employed to
group pixels of moving vehicles from traffic images, and to generate blobs of
moving vehicles. To verify the best optical flow, we utilize RANSAC (RANdom
SAample Consensus) by determining the best model that optimally fits the flows.
Experiments are performed with various traffic images. The results show that the
proposed method can efficiently segment moving vehicles out of background and
accurately estimate the velocity of moving vehicle.
Presenter: Yanbo J. Wang
From: China Minsheng Bank, China
Title: Application of Text Mining for Customer Evaluations in Commercial
Banking
E-312E
14:30-14:42
Authors: Jing Tan,Xiaojiang Du, Pengpeng Hao,and Yanbo J. Wang
Abstract: Nowadays customer attrition is increasingly serious in commercial banks.
To combat this problem roundly, mining customer evaluation texts is as important as
mining customer structured data. In order to extract hidden information from
customer evaluations, Textual Feature Selection, Classification and Association Rule
Mining are necessary techniques. This paper presents all three techniques by using
Chinese Word Segmentation, C5.0 and Apriori, and a set of experiments were run
based on a collection of real textual data that includes 823 customer evaluations
taken from a Chinese commercial bank. Results, consequent solutions, some advice
for the commercial bank are given in this paper.
13
2014 International Conference on Computer Engineering (ICOCE 2014)
Presenter: Najla Sassi
From: SOIE Laboratory, Tunisia
Title: Using Multi-Agent System to solve Distributed Constraint Optimization
Problems
ICA2014-1-002
14:42-14:54
Authors: Najla Sassi;Khaled Ghédira; Kais Ben Salah
Abstract: Many problems in multi-agent systems can be described as Distributed
Constraint Satisfaction Problems (D CSPs), where the goal is to find a set of
assignments to variables that satisfies all constraints among agents. However, when
real-life application problems are formalized as DCSPs, they are often
over-constrained and have no solution that satisfies all constraints. Moreover, the
globalization of the economy and democratization of the Internet, boosted by the
huge growth in information and communication technologies, have largely
contributed to the expansion of numerous distributed architectures. Thus this paper
provides a new distributed management and decision support system suitable to
these interdependencies and these complex environments. We present a Distributed
Optimization under Constraints Basic Relax (DOC-BRelax) as a new framework for
dealing with over-constrained situations. We also present a version of this
framework called DOC-MaxRelax and a new algorithm for solving Distributed
Maximal Constraint Satisfaction Problems (DMCSPs).
Presenter: Qingzhuang Zhao
From: Shenzhen Graduate School, Peking University, China
Title: IPTV Video Surveillance Based on Network Coding Distributed File System
ICNT2014-2-211
14:54-15:06
Authors: Qingzhuang Zhao, Kun Li, Hui Li, Yunmin Wang and Haipeng You
Abstract: Video Surveillance is taking an important role in daily life and the social
development,as the popular and application of high definition video the storge
problem of video with so large scale is more and more serious.We proposed an
approach of video surveillance NCIVS based on Network Coding Distributed File
System(NCDFS),a system that Self-repair Code Redundancy Theory, the most
advanced theory of cloud storge area , is applied.And Converged Network Video
Broadcast and Control System for IPTV is used in the system ,as a result ,video
would be played via Internet on different operating system .The experimental result
demonstrate that NCIVS greatly saved storge space and improved the user
experience.
E-313E
15:06-15:18
Presenter: Yanbo J. Wang
From: China Minsheng Bank, China
Title: Research on Micro-blog Character Analysis based on Naïve Bayes
14
2014 International Conference on Computer Engineering (ICOCE 2014)
Authors: Yun Liu,Tong Liu,and Yanbo J. Wang
Abstract: With the development of Information Technology, people have entered
the era of Big Data, and the demand for intelligent information is more intense. How
to make computer provide more personalized and efficient service for all walks of
life, is something worth exploring. In this paper, we aim to predict user’s character
by analyzing the textual content of his/her micro-blog, which is the foundation of
Personalized Service. Our study describes the method of creating a prediction model
about user’s character by using Bayesian algorithms. Experimental results show that
the Naïve Bayes approach is a valid and promoted analytic method in micro-blog
character analysis.
Coffee Break
15:20 p.m.-15:35 p.m.
Session III- Computer Networking and Communications
(9 papers, 12 minutes for each paper, including Q&A)
Venue: Jiujiang Conference Room, 5th floor(5 楼九江厅)
Time: 15:35 p.m.-17:25 p.m.
Session Chair: TBA
Presenter: Yan Gao
From: Zhengzhou Information Science and Technology Institution, China
Title: A Security Routing Model Based on Trust for Medical Sensor Networks
E-106E
15:35-15:47
Authors: Yan Gao and Wenfen Liu
Abstract: With the development of medical sensor networks, the security has
becomes an important issue. In this paper, a security routing model based on trust is
proposed for medical sensor networks. To measure the credibility of each path from
the source master node to the base station, a calculation method with Tsallis entropy
is put forward on the basis of trust values of intermediate master nodes in the path.
With the properties of Tsallis entropy, path Tsallis entropy can comprehensively
reflect the uncertainty of all the intermediate nodes in each path. Based on this, the
trust value of each path is obtained. Therefore the path with the maximum trust
value is selected to transfer the data from the multiple paths. Simulation
experiments show that the proposed model enables the transfer to effectively avoid
15
2014 International Conference on Computer Engineering (ICOCE 2014)
such paths containing the low-trust nodes, so that the packet successful delivery rate
has a great improvement and the ability against malicious attacks is also enhanced.
Presenter: Supeng Huang
From: Beijing University of Posts and Telecommunications(BUPT),China
Title: A Novel Resource Allocation Scheme based on Resource Efficiency for
LTE-A System
Authors: Supeng Huang, Xibo Wang, Chaowei Wang,Weidong Wang, Yinghai
Zhang
E-301E
15:47-15:59
Abstract: Resource allocation in Orthogonal Frequency Division Multiple (OFDM)
system is implemented by assigning subcarriers and power to all users in order to
achieve large throughput and high energy efficiency. The base station acts as
scheduler, which aims at scheduling active users as many as possible and
maximizes the system throughput. Conventional schemes allocate resource to user
mainly based on Quality of Service (QoS), spectral efficiency or maximum
throughput without considering the resource efficiency. These schemes achieve
compromise between maximized throughput and user fairness. However, there is
excessive resource occupied. In this paper, a novel resource allocation algorithm
based on proportional fairness (PF) algorithm is proposed. This novel algorithm
mainly promotes the resource efficiency for LTE or LTE-A system during resource
allocation. Meanwhile, the scheme takes user fairness and QoS into consideration
and approaches the global optimal solution. According to simulation, the proposed
algorithm achieves higher resource utilities efficiency and schedule more active
users with the limit resource.
Presenter: Pengfei Shi
From: Beijing Institute of Technology, China
E-302D
15:59-16:11
Title: Robustness of fractional order for FRFT-OFDM systems
Authors: Pengfei Shi, Dongjie Qi, Miao Li and Hao Huan
Abstract: Fractional Fourier transform (FRFT) has been widely used in orthogonal
frequency division (OFDM) systems to combat the doubly dispersive channels. The
sensitivity of the fractional order is a serious problem. In this paper, we derive
closed form of the variable order and its optimal value based on the mathematical
expression in the FRFT-OFDM systems. The theoretical results show that the
optimal fractional order for the FRFT-OFDM system is 0.5. Simulation results
verify the robustness of fractional order 0.5 in the FRFT-OFDM systems.
E-309E
16:11-16:23
Presenter: Min Xiao
From: Xiamen University of Technology, China
Title: Design of Finite-Length Rate-Compatible LDPC Codes
16
2014 International Conference on Computer Engineering (ICOCE 2014)
Authors: Min Xiao
Abstract: This paper considers rate-compatible puncturing for finite-length low-density
parity-check (LDPC) codes. Among the existing systematic puncturing methods, the
grouping and sorting algorithm (GSA) stands out for its good performance and easy
implementation, but as is proven in this paper, there exists a limit on the amount of
puncturing that can be done, which restricts the range of the achievable code rates as well
as the choice of the mother code. A new puncturing algorithm with better flexibility is
developed. The new algorithm can be generally applied to an arbitrary irregular or regular
LDPC code to obtain a code rate arbitrarily close to 1, and at the same time to achieve
performance that is superior to the GSA.
Presenter: Di Liu
From: Beijing University Of Posts and Telecommunications(BUPT), China
Title: Adaptive Power Allocation Scheme for Land Mobile Satellite Cooperative
Communication Systems Under a SNR Threshold Constraint
E-316
16:23-16:35
Authors: Di Liu, Lixi Fu, Yizhou He, Gaofeng Cui, Weidong Wang
Abstract: Power resource is one of the extremely limited resources of user
terminals. This paper proposes an adaptive power allocation scheme aiming at
minimizing total transmit power consumption for land mobile satellite (LMS)
cooperative communication systems through amplify-and-forward (AF) protocol. In
LMS uplink, the cooperative opportunity, which is defined as the selection between
direct transmission and the cooperative transmission, is introduced into this scheme.
With the variation values of the fading degree, the transmit power of user terminals
can be allocated adaptively subject to a signal to noise ratio (SNR) threshold
constraint. Numerical results are given in order to illustrate a significant advantage
of total transmit power consumption based on adaptive power allocation scheme
over conventional cooperative power allocation scheme and direct transmission.
Presenter: Nattawut Wichit
From: Prince of Songkla University, Thailand
Title: Multi-sensor Data Fusion Model Based Kalman filter Using Fuzzy Logic For
Human Activity Detection
E-323E
16:35-16:47
Authors: Nattawut Wichit and Anant Choksuriwong
Abstract: The performances of the systems that fuse multiple data coming from
different sources are deemed to benefit from the heterogeneity and the diversity of
the information involved. In this work a novel Multi-Sensor Data Fusion (MSDF)
architecture is presented. The estimation accuracy of the system states is reduced
dramatically. Therefore, applying Kalman filter to generate the importance density
function has been introduced to improve the performance with slightly increasing
the computational complexity. In this paper we propose a new Multisensor based
activity recognition approach which fuzzy logic fusion sensors to recognize Human
Behaviour. This approach aims to provide accuracy and robustness to the activity
recognition system. In the proposed approach, we choose to perform fusion at the
Feature-level.
17
2014 International Conference on Computer Engineering (ICOCE 2014)
Presenter: Abdullah Adnan
From: Kuwait University, Kuwait
Title: An Election Algorithm for Improved Leader Longevity in Heterogeneous
Mobile Ad-hoc Networks
Authors: Mohammad H. Al Shayeji, Abdullah Adnan and M.D. Samrajesh
ICNT2014-1-103
16:47-16:59
Abstract: Mobile Ad-hoc networks (MANET) differ from traditional distributed
systems, due to their dynamic and self-organizing characteristics. MANET requires
a leader to organize and manage various tasks such as key distribution, routing
coordination, sensor coordination and much more. One of the challenges in
MANET is having the right election algorithm that chooses the best leader based on
the various dynamic factors. In this paper, we propose a new leader election
algorithm for heterogeneous mobile Ad-hoc network considering specific factors of
MANET. The algorithm selects a leader from a list of candidates based on a number
of factors such as node’s residual energy, signal strength and crash history. The
proposed algorithm considers network partitions and network merging. Our
evaluation and discussions shows that the proposed algorithm is effective in
selecting a leader with the best longevity, thus reducing the number of elections and
reducing the fraction of time without a leader.
Presenter: Somayya Madakam
From: IT Applications Group, NITIE, Mumbai (India)
Title: Internet of Things: Smart Things
Authors: Somayya Madakam
ICNT2014-2-203
16:59-17:11
ICNT2014-2-212
17:11-17:23
Abstract: Research study on the Internet of Things and Smart Things has been
going on for more than a decade and reaches back to Mark Weiser’s original dream
of ubiquitous computing. Bruce Sterling recently popularized the idea of Smart
Objects and the IoT. Smart Things is another paradigm shift in IT world. Smart
Things are the things that are having embedding smartness or intelligence,
identification, automation, monitoring and controlling calibre. Smart Things are
assisting human life a lot, nowadays without their applications life is becoming
cumbersome. This paper exhibits systematically on Internet, Things, and then
explores on Internet of Things and finally Smart Things from researchers’, and
corporate’s perspective. Moreover, this article focuses on the state of Smart Things
and its applications. This in turn would help the new researchers, who want to do
research in this IoT domain.
Presenter: Ali Abbas Alsabbagh
From: Florida Institute of Technology, Florida, USA
Title: A Survey of Routing Protocols for Ad Hoc Networks Based on Update
Mechanism
Authors: Ruaa A.S.Alsabah , Ali Abbas Alsabbagh and Hisham Alzorghani
18
2014 International Conference on Computer Engineering (ICOCE 2014)
Abstract: An essential matter for ad hoc networks is routing protocol design which
is a major technical challenge due to the mobility of the nodes. Routing problem
becomes more complex and challengeable, and it probably is the most addressed
and studied problem in ad hoc networks. There are several classifications of
Routing protocols are used to perform routing the information from source to
destination. Classification methods help researchers and designers to understand
distinct characteristics of a routing protocol and find its relationship with others.
The main aim of this paper is to explore and to compare the concept of all routing
protocol based on update mechanism. This classification divided into Table-Driven
(Proactive), On-demand (Reactive), Hybrid routing protocols. Also, the comparison
is provided based on the routing mechanism and information used to make routing
decisions. Also this paper presents an overview of routing issues in different cases
as well as a detailed discussion of and their relative performance. To compare and
analyze an ad hoc network routing protocols, appropriate classification methods are
important.
19
2014 International Conference on Computer Engineering (ICOCE 2014)
Poster Session (21 Papers)
Venue: Jiujiang Conference Room, 5th floor(5 楼九江厅)
Time: 9:00 a.m.-17:30 p.m.
Title: Continuous Speech Recognition based on Convolutional Neural Network
Authors: Qing-qing Zhang, Yong Liu, Jie-lin Pan, Yong-hong Yan
E-104E
Abstract: Convolutional Neural Networks (CNNs), which showed success in
achieving translation invariance for many image processing tasks, are investigated
for continuous speech recognitions in the paper. Compared to Deep Neural Networks
(DNNs), which have been proven to be successful in many speech recognition tasks
nowadays, CNNs can reduce the NN model sizes significantly, and at the same time
achieve even better recognition accuracies. Experiments on standard speech corpus
TIMIT showed that CNNs outperformed DNNs in the term of the accuracy when
CNNs had even smaller model size.
Title: Video Copy Detection Based on Improved Affinity Propagation
Authors: Peng Li, Shengxiang Gao, Chengqiu Xiao, Zhe Xu, and Junguang Zhu
E-110E
Abstract: To solve the problems in the traditional BoVW (bag of visual words)
method based on the K-means clustering algorithm such as bad searching precision
and low time efficiency. An improved BoVW making method based on Affinity
Propagation (AP) and applying for large scale dataset is proposed. E2LSH is used to
match the similar video frame and vote to completing the video copy detection, and
an LAP method is introduced to make the BoVW scalable. Experimental results
show that the accuracy of the proposed method is substantially improved compared
to the traditional methods. Besides, it also adapts large scale datasets well.
Title: Research on Garment Wrinkle Synthetic Method Based on Mass-Spring
Model
Authors: Yuanwei Chen, Bing He, and Xuefu Yu
E-111E
Abstract: The manifestation and details of garments are mainly represented by
wrinkles. Through physical simulation of garment model, generated folding and
wrinkles can be seen, The more mass points of garment mesh model are, the more
realistic the effect are, but the longer the time will spend. On the contrary, the less
mass points of garment mesh model are, the faster the calculation is, but the rougher
the effect is. In order to give a balance to both simulation time and effect, this paper
will show a enhanced wrinkle algorithm to conduct local-regional mesh refinement
and simulation again providing a more detailed and realistic result for the
simulation result of rough mesh.
Title: Improving Ontology Matching with Propagation Strategy and User Feedback
Authors: Chunhua Li, Zhiming Cui, Pengpeng Zhao, Jian Wu, Jie xin, Tianxu He
E-113E
Abstract: Markov logic networks which unify probabilistic graphical model and
first-order logic provide an excellent framework for ontology matching. The
existing approach requires a threshold to produce matching candidates and use a
small set of constraints acting as filter to select the final alignments. We introduce
novel match propagation strategy to model the influences between potential entity
mappings across ontologies, which can help to identify the correct correspondences
and produce missed correspondences. The estimation of appropriate threshold is a
difficult task. We propose an interactive method for threshold selection through
which we obtain an additional measurable improvement. Running experiments on a
public dataset has demonstrated the effectiveness of proposed approach in terms of
the quality of result alignment.
20
2014 International Conference on Computer Engineering (ICOCE 2014)
Title: Construct the Cloud Services Platform of Educational Resources to Achieve
Regional Sharing of Educational Resources
Authors: Zhijun Liu, Pengxi Li, Ling Lu, Lie Han, and Guili Zhang
E-115E
Abstract: In recent years, with the rapid development and popularity of the
Internet, some emerging network technologies bring a profound impact to
information construction in higher education. The traditional teacher-centred
instructional mode has been unable to meet the needs of modern education.
Through construction of excellent course and open course, many colleges and
universities have accumulated a large number of high-quality online educational
resources, to build the cloud platform of educational resources that can support
regional sharing. If using of appropriate sharing mode, it can improve the utilization
of educational resources and accelerate the pace of universities education
information.
Title: Vertical Handover in Optical Wireless Heterogeneous Networks
Authors: Huanmin Han, Lei He,Qiang Li,Shuangyin Ren
E-202E
Abstract: Heterogeneous networks are now widely deployed to improve the
coverage rate for large area and increase the communication capacity in small area
coverage. Indoor optical wireless or Li-Fi satisfies high capacity demand in density
scenario, without any interference to existing radio frequency communication. It
brought new challenges to deal with handover for heterogeneous networks when
optical wireless access attachment points existed. In this article, we introduced
vertical handover and designed a vertical handover algorithm for a typical optical
wireless scenario.
Title: The Trigonometric Interpolation Spline Surface and Its Application in Image
Zooming
Authors: Juncheng Li and Lian Yang
E-210E
Abstract: The trigonometric polynomial spline surface generated over the space {1,
sint, cost, sin2t, cos2t} is presented in this work. The proposed surface can
automatically interpolate all the given data points and satisfy C2 continuous without
solving equation systems. Then, image zooming making use of the proposed surface
is investigated. Experimental results show that the proposed surface is effective for
dealing with image zooming problems.
Title: Factors influencing Adoption of Knowledge Management Systems in India
from a Micro, Small and Medium Enterprise’s Perspective
Authors: G. P. Girish, Dennis Joseph, Souvik Roy, and G. Amar Raju
E-211E
Abstract: In this study we investigate factors influencing successful adoption of
Knowledge Management Systems (KMS) in India from a Micro, Small and
Medium Enterprise’s (MSME’s) Perspective. MSME sector in India contributes
approximately 8% of India’s GDP accounting for nearly 45% of the manufacturing
output and 40% of the exports of India. In our study we review MSME sector in
India, literature pertaining to developing Knowledge Management Systems and
propose a conceptual model having traits of Technology Acceptance Model, Theory
of Reasoned Action and Social Cognitive Theory. The preliminary findings of the
study based on literature aids us in laying out factors influencing successful
adoption of KMS in a developing country like India from a MSME’s Perspective.
Empirical investigation of the developed model would have practical implication
and will help MSMEs (which are major contributors to development of the
economy) in successful adoption of Knowledge Management Systems and reap the
potential benefits.
21
2014 International Conference on Computer Engineering (ICOCE 2014)
Title: Behavior-based Mamdani Fuzzy Controller for Mobile Robot Wall-following
Authors: Xiao Li and Dan Wang
E-307E
Abstract: In literatures, most of the researches on mobile robot wall-following
problem are focused on straight or continuous smooth wall-following cases. This
paper proposes a behavior-based fuzzy controller for multi-type-wall following. The
fuzzy controller provides an information fusion mechanism for combining sensor
data from all laser range finder sensors. The behavior-based approach is
implemented as a coordinator to manage the switching among various behaviors to
solve the multi-type-wall following problem. The simulation results demonstrate
that the mobile robot can follow the wall with convex corner and concave corner.
Title: Weighted Bilateral Filtering Using Relative Difference Between Pixels
Authors: Li Ma, Yu-qi Zhang, Bin-bin Hu, Ming-yang Zheng
E-308E
Abstract: The similarity measurement of the bilateral filtering can’t indicate the
difference between pixels accurately in the dense texture region. It causes the
smoothing effect seriously, thereby reducing the edge preserving properties of the
bilateral filtering. This paper presents a new weighted function of the bilateral
filtering. It involves an additional range kernel using the relative difference between
pixels. The range kernel operates differently by acting on the pixel gray intensities
or colors. And it uses the reciprocal kernel for the approximation of the standard
Gaussian weight value. Experimental results suggest that it significantly preserves
more details than the classical bilateral filtering on edge or dense texture regions.
Title: Power Consumption Based Cloud Scheduler
Authors: Wu Li
E-311E
Abstract: After years of development and trial usage, cloud computing has finally
entered into mainstream and wide spread commercial use. Among the various cost
elements in operating a cloud computing infrastructure, power usage stands out
prominently. In fact, how to reduce the power consumption of cloud computing
platforms has received considerable attention of the cloud service provider as well
as academic researchers. This paper proposes a Power Awareness Scheduler (PAS)
system to manage the resource scheduling based on power usage patterns in the
cloud. By obtaining and analyzing the power consumption-load curve, PAS is able
to make power-efficient virtual machine deployment for the cloud. Our
implementation of the proposed PAS on OpenStack [1] shows that PAS can reduce
total power consumption by up to 17%.
Title: Multiple Confusion Network Application in MT System Combination
Authors: Yupeng Liu, Chunguang ma, Lemao Liu, Shui Liu, Shilei Zhao
E-314
E-317E
Abstract: System combination has emerged as a powerful method for machine
translation (MT).In the construction of word level confusion network (CN), the
alignment and skeleton selection are two key issues of system combination. The
paper introduces multi-CN for solving skeleton selection. We fail to yield the better
performance through using simple prior score as CN-based feature, so we introduce
more sophisticated CN-based and consensus-decoding-based features into
combination framework to test multi-CN’s validity. The approaches of multi-CN
are shown to be superior to single-CN in the setting of the Chinese-to-English track
of the 2008 NIST Open MT evaluation.
Title: Rethink Scalable M:N Threading on Modern Operating Systems
22
2014 International Conference on Computer Engineering (ICOCE 2014)
Authors: Lu Gong, Zhanqiang Li, Tao Dong, Youkai Sun
Abstract: We propose a highly scalable user-level threading library, μThread,
which enables programmer to write threaded code in a heavily concurrent
environment without losing performance. Our library achieves an M:N threading
model, which schedules M user-level threads on top of N kernel-level threads. The
user-level threads are directly scheduled by the asynchronous I/O and the library
can be adapted to modern operating systems without kernel modification.
We also provide a proof-of-concept implementation of a web server application.
According to our experiments, μThread provides good performance and great
scalability. The web server based on μThread becomes the best performance
user-mode web server under Windows.
Title: Random Neighbour-based Fault Localization
E-318E
Authors: Xinyu Zhu and XuePing He
Abstract: In the large-scale network, the router acts an increasingly important role
but the malicious behaviours including packets dropping and corruption of the
malicious routers harm the performance of the network. Actually, many work has
been proposed to locate the potential failure nodes but they all suffer from some
issues of performance and scalability, which are not practical for the network
environment. To deal with these problems, we introduce random neighbour-based
fault localization (RNFL). It utilizes neighbourhood nodes and message
authentication code (MAC) to check the integrity of packets so that RNFL can
detect the malicious nodes. Besides, it supports dynamic routing and the experiment
shows that it only puts small extra computing burden (less than 10%) on the
network routers.
Title: BMA: Bandwidth Allocation Management for Distributed Systems under
Cloud Gaming
E-319E
Authors: Runze Wang, Mochi Xue, Kai Chen, Zhanqiang Li, Tao Dong, Youkai
Sun
Abstract: Cloud gaming is becoming a popular IT business among cloud services.
In order to host a variety of network services, modern clouds provide great
computing power by equipping with multi-core CPUs and parallel-core GPUs. In
our previous work, we propose VGASA [1], a virtualized GPU resource adaptive
scheduling policy in cloud gaming, solving the poor default mechanisms of GPU
resource sharing. However, with the number of game player for cloud gaming
rising, the user experience is inevitably limited by the network bandwidth and
communication quality, due to the poor default mechanism of network resources
management. To address this network limitation, we propose BAM, which
combines distributed architecture and virtualized GPU resource adaptive policy in
cloud gaming based on our prior work. The key module of BAM maintains a
real-time monitoring of the virtual machine (VM) running status to manage the
allocation of network resources, guaranteeing the better running of VMs.
Title: UIIM: A User-Item Interest Model based on Bipartite Network for Top-N
Recommender System
E-320E
Authors: Zhixiong Jiang, Chunyang Lu, Siyuan Zheng, and Juan Yang
Abstract: Recently, a sparse linear method (SLIM) is developed for top-N
recommender systems, which can produce high-quality recommendations for sparse
data sets. SLIM provides a better performance than other existing methods. In this
paper, we provide a novel user-item interest method (UIIM) based on bipartite
network to improve the performance of SLIM. UIIM generates top-N
recommendations by building the user-item interest matrix R with the bipartite
23
2014 International Conference on Computer Engineering (ICOCE 2014)
network of users and items, calculating the item-item similarity matrix W with
SLIM and predicting users’ ratings on items as a dot product of matrix R and W.
And we also provide a parallel algorithm based on Spark to learn W. Our results
indicate that UIIM provides better performance and recommendation quality than
other existing methods and parallel algorithm of learning W outperforms serial
algorithm on large-scale data sets
Title: Classification of oilfield and nuclear power plants’ equipment states applying
methods of linear algebra
E-321E
Authors: A.I. Kalyaev, V.V. Korobkin, I.S. Korovin, M.V. Khisamutdinov, V.I.
Shmoylov, and Povarov V.P.
Abstract: A possible approach to solve the problem of the oilfield and nuclear
power plants’ equipment states classification is proposed in the paper. This
approach is based on the building of large dimension linear algebraic equations
systems. A fundamentally new algorithm for solving linear algebraic equations
systems (SLAE) using the so-called corresponding continued fractions, which are
often referred to as proper C-fractions. The proposed algorithm for SLAE solution,
although based on classical iterative algorithms of Jacobi and Seidel belongs to the
category of exact algorithms, providing systems solution by discrete number of
operations. It is shown that the developed algorithm allows to solve ill-conditioned
systems, and systems with random matrices. A comparison of SLAE solving
algorithm with the simple iteration, Seidel and Gauss algorithms has been carried
out.
Title: A Method of Generating Test Task Based on Analyzing Code Change
E-322E
Authors: CHENG Gao-Fei and ZHANG Mao-Lin
Abstract: The change of software code has a great effect on software function and
its test. When a new version of software is developed, the software need regression
test to ensure that the new version also meets the requirements designed. This paper
proposes a method that insert special format mark which is actually comment in
code to instruct the function of the code block. We also develop a tool for
automatically analyzing the change in code and software functions related to the
changed code between two different versions of code, then the tool could select test
cases related to the function difference to generate test tasks.
Title: An Approach of Conformance Verification between Design Models and Code
Based on Abstract Syntax Tree
E-324E
ICNT2014-1-102
Authors: Liu Zhao, Tian Yang, and Yan Haihua
Abstract: Design models and code are products of different stages in the software
development process. The conformance of design models and code plays an
important role in software development process, also is a key principle to improve
the maintainability of the software. Currently, the conformance on different level of
abstraction is verified mostly by manual inspection. In order to avoid the errors and
omissions, we propose a conformance verification approach between design models
and code based on abstract syntax tree. The approach verifies the conformance by
comparing the class diagram, sequence diagram with the code from the aspects of
static structure information and dynamic behaviour information. Firstly, we discuss
how to extract and recover model information from the abstract syntax tree, then
give the conformance verification approach between class diagram, sequence
diagram and code, finally implement a semi-automatic verification tool based on the
approach.
Title: Topology Control for Free-space Optical Networks
Authors: Tong Ning, Hun JieXu, Zhang Xue and Wang Chunshuang
24
2014 International Conference on Computer Engineering (ICOCE 2014)
Abstract: We consider the problem of designing a topology control algorithm for
free-space optical networks. The problem is to create a topology with strong
connectivity. A hierarchical topology control approach is present, named VTC. The
approach
applies
three-level
management
architecture
(Manager-Clusterhead-Member) and constructs a backbone network by Voronoi
diagram and Delaunay triangulation. VTC autonomously deploys Clusterheads and
enables the network to reconfigure itself; hence, the area covered by the network
can be enlarged. To avoid a mass of control messages being disseminated
periodically, we use a maintenance algorithm based on level. Through an example
using this algorithm, we show that the performance of the topology control
algorithm we derive works well.
Title: Hierarchical ZRP’s Performance vs ZRP’s Performance in MANET
Authors: Zhang Xijie, Xu Chunxiu and Xu Jiaqi
ICNT2014-1-104
Abstract: The mobile ad hoc network ( MANET ) has a dynamic nature that makes
the network topology change frequently. As a consequence, routing protocol plays
an important role in MANET. Zone Routing Protocol (ZRP) is a typical hybrid
routing protocol in MANET. It combines proactive with reactive techniques. It
applies a proactive technique in the zone and a reactive technique out of the zone. In
this paper we propose a hierarchical routing protocol H-ZRP based on ZRP to
avoid redundant or duplicate route requests. We demonstrate the performance of
H-ZRP with various performance metrics. We compare the performance of
H-ZRP and ZRP in End-to-End Delay , overhead, route discovery time and packet
delivery ratio.
Dinner Banquet
17:30 p.m.-19:00 p.m.
Fangting Restaurant, 2nd floor of Lushan Hotel(2 楼芳庭餐厅)
25
2014 International Conference on Computer Engineering (ICOCE 2014)
Call for Papers
www.ceepe.net
All papers, both invited and contributed, will be reviewed by two or three experts from the PC. After a careful reviewing
process, all accepted paper will be published in international journal “Applied Mechanics and Materials”
[ISSN:1660-9336, Trans Tech Publications] “Applied Mechanics and Materials” is indexed by Elsevier. Scopus and Ei
Compendex (CPX), Cambridge Scientific Abstracts (CSA) , Chemical Abstracts (CA) , Google and Google Scholar, ISI
(ISTP) , Institution of Electrical Engineers(IEE), etc.(For index information, please refer to AMM official website:
http://www.ttp.net/1660-9336.html). The full text is online available via platform www.scientific.net. Trans Tech
Publications will provide online camera-ready paper submission system.
Submission Methods: (Deadline: December 15, 2014)
1. Easy Chair System (pdf)
2. Email: [email protected]
www.ceeit.net
The topics of CEEIT 2015 will cover all areas encompassing Electrical Engineering and Information Technology. All papers
will be reviewed by two or three experts from the IPC. After a careful reviewing process, all accepted papers after proper
registration and presentation, will be published in WIT Transactions on Information and Communication Technologies
(ISSN: 1743-3517), which will be indexed by EI Compendex, Scopus and ISI.
Submission Methods: (Deadline: January 5, 2015)
1. Easy Chair System (pdf)
2. Email: [email protected]
www.icsis.org
This conference will feature world-class plenary speakers, major technical symposia, industry and academic panels, tutorials
and workshops. The technical program chairs invite the submission of original papers to following symposia for
presentation and publication in the conference proceedings. Accepted and presented papers will be submitted to WIT
Transactions on Information and Communication Technologies (ISSN: 1743-3517), which will be indexed by EI
Compendex, Scopus and ISI.
Submission Methods: (Deadline: February 15, 2015)
3. Easy Chair System (pdf)
4. Email: [email protected]
26
2014 International Conference on Computer Engineering (ICOCE 2014)
Note
27
2014 International Conference on Computer Engineering (ICOCE 2014)
Note
28