Proceedings of the 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)

+ Advanced search
78 articles
Proceedings Article

A Neural Network Enhanced Stereo Vision Obstacle Detection and Avoidance System for Unmanned Ground Vehicle

Fanjun Liu, Binggang Cao
This paper presents a neural network enhanced stereo vision obstacle detection and avoidance system for unmanned ground vehicle. In this paper, we build a neural network to learn the mapping for the left image to the right image under the assumption of a flat road. Using the trained neural network we...
Proceedings Article

Statistical Properties of Chinese Near-synonyms Network

Jinze Li, Shuangwen Chen, Xiaoyue Luo, Feng Xiao, Jianyu Li, Hao Shen
We investigate Chinese near-synonyms (include synonyms and near-synonyms) based on complex network theory. In the study of near-synonyms network, scale-free effect and hierarchical structure features are found in this complex system. In particular, we find that n-node cliques exist widely in near-synonyms...
Proceedings Article

The Application of Chaos Immune Genetic Algorithm in Sequencing Problem of Sports Meeting

Ying Pan
The sequencing of sports meeting is quite complicated due to the huge number of people and events. A new immune genetic algorithm aiming at solving the sports meeting sequencing problem is proposed in this paper, namely the chaos immune genetic algorithm, which combines the immune algorithm, chaos algorithm...
Proceedings Article

RESTful Digital Web Services for Market Price Forecasting with RAn Application on Equity Markets Using Garch Models

Mihai Calciu, Christiana Tudor
Web services (WS) are originally and typically SOAP (Simple Object Access Protocol) based. SOAP based web services offer a powerful architecture and communication protocol that allows model based marketing decisions support (MMDS) to be integrated, served and get discovered over the Internet. Lately...
Proceedings Article

Clustering the Tropical Wood Species Using Kohonen Self-Organizing Map (KSOM)

Ahmad Azlin, Yusof Rubiyah
This paper discusses on how the Kohonen Self-Organizing Map (KSOM) is used as a tool to cluster and classify the tropical wood species. Wood features have been extracted through the use of two features extractors; Basic Grey Level Aura Matrix (BGLAM) and Statistical Properties of Pores Distribution (SPPD)...
Proceedings Article

IROTS: A Proposed COTS Evaluation & Selection Methodology for Component Based Software Engineering in Under-Development Countries

M. Shakeel Faridi, Zahig Javed, M. Haris Abid, Ahmed Mudassar, Asri Bin Ngadi
Component Based Software Engineering (CBSE) methodology deals with software systems by evaluation and selection of appropriate components. CBSE offers software developers a compact software development life cycle, reduce development times, cost effective and less strenuous efforts. In under development...
Proceedings Article

Longitudinal Data Based Research on Web User Interests Drift Modeling

Huimin Li, Liying Fang, Pu Wang, Jianzhuo Yan
User interests drift modeling is the fundamental and key technology of Personal Recommendation System (PRS), and is arising more and more attention by researcher from home and abroad. At present, web user interests drift model is in its original phase for the reason of many aspects, and there also exist...
Proceedings Article

Computer Implementation for Analysis of Complex Masonry Shell Structures

Jerzy Szolomicki, Piotr Berkowski
The increasing interest in historic architectural complex buildings and the need to understand the behavior of historical structures has led to development of computational methods used for analysis of the masonry vaults. The paper deals with some of the explicit and numerical methods used for modeling...
Proceedings Article

Knowledge-based Auto Repair Diagnosis System and Application

Xiaofen Fang, Kunli Fang
Auto repair is a process which solves the problem iteratively and constantly. It is required to establish the knowledge base model and the inference base model. Meanwhile, it develops the knowledge-based auto repair diagnostic system through the integration of the auto repair experience and the repair...
Proceedings Article

An Efficient Algorithm of Convex Hull for Very Large Planar Point Set

Guangquan Fan, Liping Ma, Bingru Yang
In the paper, we present and prove Castle Theorem of Convex Hull, design and realize the Fast Rampart Searching Algorithm. The algorithm can be treated as the preprocess of Convex Hull calculation of very large planar point set. When calculating the Convex Hull of a very large planar point set, we can...
Proceedings Article

Service Oriented Cost AccountingUtilization-based Accounting and Charging of IT Service Costs

Christopher Schwarz, S. Schmidt, A. Sellner, E. Zinser
Due to the immanent complexity of Information Technology Outsourcing (ITO) partnerships and their underlying service technology, a sustainable management proofs to be highly challenging and inefficient. Being confronted with multidimensional business relations and complex services meshes, the accounting...
Proceedings Article

Structural Relaxation Solutions Formetallic Amorphous Condensed Lattice with Activation Energy Spectrum Model Applied Computational Physics

Kazu Yamada
Development of amorphous-material devices and specimen modification methods is closely related with the obviousness of high thermal stability and stability of relaxation, additionally general ground characteristic investigations of glass, transformation of the liquid-system to glass one is an enormous...
Proceedings Article

Test and Computer Modeling of Steel Braces for Earthquake-Resistant Structures: Dual-Core Self-Centering Brace and Sandwiched Buckling-Restrained Brace

Chung-Che Chou, Ying-Chuan Chen, Sheng-Yang Chen
This work presents mechanics, tests, and finite element modeling results of a proposed steel dual-core self-centering brace (SCB) and a sandwiched buckling-restrained brace (BRB) for earthquake-resistant structures. The mechanics and cyclic behavior of these two braces are first explained, followed by...
Proceedings Article

High Resolution DOA Estimation Algorithm based on Nonuniform L-shaped Array

Lanmei Wang, Zhihai Chen, Guibao Wang
A parameter estimation algorithm of direction of arrival (DOA), based on a nonuniform L-shaped array, is presented for plane-wave signals. According to relation of the two x-axis and y-axis subarrays, a set of rough but unambiguous direction cosines estimates in x and y direction are obtained. By disambiguating...
Proceedings Article

An Energy-Efficient Data Placement Algorithm and Node Scheduling Strategies in Cloud Computing Systems

Yanwen Xiao, Jinbao Wang, Yaping Li, Hong Gao
With the rise of the cloud computing, saving energy consumed by cloud systems has become a tricky issue nowadays. How to place data efficiently and schedule the nodes effectively in a cloud platform are very important issues from the view of the energy-saving. However, the state-of-the-art node-scheduling...
Proceedings Article

An Efficient Biogeography Based Face Recognition Algorithm

Daya Gupta, Lavika Goel, Abhishek Abhishek
Extracting the optimal features from images is always required in face recognition algorithm to achieve high accuracy. In this paper we have presented an efficient face recognition algorithm based on Biogeography Based Optimization (BBO). First we extract the features using the principal Component Analysis...
Proceedings Article

Comparison of Modernization Approaches: With and Without the Knowledge Based Software Reuse Process

Jha Meena, Liam O'Brien
The ever increasing demand for improvements in software maintainability and modernization cannot be met through traditional techniques of software development and modernization. Most approaches to software development and modernization do not explicitly address software reuse however new approaches that...
Proceedings Article

A Dynamic Quality-Based Harmony Search Algorithm for Solving Constrained Engineering Optimization Problems

Ali Kattan
Meta-heuristic algorithms overcome the computational drawbacks of the existing numerical methods where they are commonly used to solve constrained engineering problems and find an optimum solution. Solving this kind of problems is considered of high value in many engineering and manufacturing processes....
Proceedings Article

Malicious Website Detection Based on Honeypot Systems

Tung-Ming Koo, Hung-Chang Chang, Ya-Ting Hsu, Huey-Yeh Lin
In the Internet age, every computer user is likely to inadvertently encounter highly contagious viruses. Over the past several years, a new type of web attack has spread across the web, that is, when a client connects to a malicious remote server, the server responds to the request while simultaneously...
Proceedings Article

Effectiveness Evaluation of Software Protection based on SAMMPN

Huaijun Wang, Dingyi Fang, Ni Wang, Yuanxiang Gu
Evaluate the effectiveness of software protection technologies is still an unsolved problem. This paper presents a new evaluation method considering attack cost as the metric to evaluate the effectiveness of software protection under the circumstances of fulfilling assumptions that all software can be...
Proceedings Article

Stability of the Forest Evolution System with growth functions

Huihui Bai, Dingjiang Wang
This paper discusses the dynamical model of the Forest Evolution System, and the Existence and Uniqueness of the equation are have been proved by applying the theory of integral equation. Furthermore, we discussed the stability of the solution by applying the stability theory of Lyapunov.
Proceedings Article

Path Planning of a Mobile Robot Using Real-coded Genetic Algorithm Based Simultaneous Exploration

Chih-Jer Lin, Yen-Lin Chen, Cheng-Hsin Liu, Shenkai Yu
In mobile robot researches, path planning and obstacle avoidance plays a very important role and has been a very challenging research topic. For path planning, it should produce continuous path from the starting point to the destination without colliding obstacles. Therefore, we proposes a genetic algorithm...
Proceedings Article

Analysis of the Selected Aspects of a Crash between Two Vehicles

Kisilowski Jerzy, Zalewski Jaroslaw
In the article a computer simulation of vehicle collision was prepared using the PC-Crash 8.0 software. The results of this simulation were compared to analytical calculations by Routh method with the use of the coefficient of restitution for deformations or velocities. The equations of motion during...
Proceedings Article

Accelerometer-based Energy Expenditure Estimation Methods and Performance Comparison

Fang-Chen Chuang, Ya-Ting C. Yang, Jeen-Shing Wang
This paper presents two accelerometer-based metabolic equivalent (MET) estimation methods: 1) MET regression models estimation; and 2) a mono-exponential MET estimation equation. The MET estimation methods can predict MET for the following seven categories of activities: sitting, standing, walking upstairs,...
Proceedings Article

Integrated Scientific Cloud Computing WorkflowsSC2IT: A Toolkit to Bring Novel Computational Science to Non-specialists

K. Jorissen, W. Johnson, J.J. Rehr
Scientific Cloud Computing (SCC) applies the advantages of Clouds to computational science. We present the SC2IT Scientific Cloud Computing tools that abstract complex computational workflows and allow state-of-the-art scientific high-performance computing software to be distributed in a user-friendly...
Proceedings Article

Task Level Parallelization of All Pair Shortest Path Algorithm in OpenMP 3.0

Eid Albalwi, Parimala Thulasiraman, Ruppa Thulasiram
OpenMP is a standard parallel programming lan-guage to develop parallel applications on shared memory ma-chines. OpenMP is very suitable for designing parallel algorithms for regular applications where the amount of work is known apriori and therefore, distribution of work among the threads can be done...
Proceedings Article

A Venture Capital Assessment Model based on the Genetic Neural Network

Tieying Liu, Yuting Fan, Xinzhu Xu
With the rapid development of economy, there are greater challenges in Venture Capital. In the face of the venture project selecting, scientific evaluation of investment venture has been an important issue in venture investment, and it directly influences the success or failure of investment. In this...
Proceedings Article

Nonlinear Cointegration Analysis Based on Support Vector Machines and Its Application to the Connection between Financial Markets

Chuanhe Shen, Zhongwen Liu, Ying Li
With the purpose of analyzing non-stationary time series, this paper introduced a novel nonlinear cointegration discriminate analysis by employing support vector machines to overcome existing limitations of two methods, that is, the statistical approach and the neural network used by the nonlinear cointegration...
Proceedings Article

A Novel User Pairing Algorithm for Lte Femtocell Uplink

Jie Wang, Chen Xu
This paper considers the user pairing algorithm for LTE (Long Term Evolution) femtocell uplink V-MIMO (Virtual Multiple Input Multiple Output) Systems, and propose a new simulated annealing based bit error rate pairing scheduling (SA-BPS) algorithm. The SA-BPS uses Round Robin (RR) criterion to decide...
Proceedings Article

A Service Selection Conflict Avoidance Algorithm Based on Multilevel Backtracking

Huaizhou Yang, Xuelong Wang
When there are a lot of candidate component services in Web services composition, the suitable component services need to be selected. The service selection conflicts often occur due to the functional dependency relationships between component services. Therefore, a service selection conflict avoidance...
Proceedings Article

The Design and Implementation of Cloud Storage SystemBased on Hiphop-php

Chenhe Zhu, Zhiyi Fang, Yao Sun, Fang Zheng, Fanfan Zhang, Jiliang Wang
With the rapid development of Internet technology, the data of the users’ information have raised up largely, so internet storage became more and more important in today’s life. In this paper, a cloud storage system has been designed and implemented. By using Hiphop-php technology, the performance of...
Proceedings Article

Research on Virtual Interactive Sand Table for Showing of Energy Conservation Data

Rong Fan, Hongjiang Liu
With the rapid development of interaction technology, the digital sand table has gradually replaced the traditional sand table. In such fields as the real estate exhibition, the city planning exhibition, the tourist attractions showcase , the military training, the water conservancy and hydropower ,...
Proceedings Article

Determination on the Demand Level of Rural Resident’s Basic Pension Based on the Extended Linear Expenditure System Model

Wenxian Cao
By using extended linear expenditure model this paper calculates per capita basic living demand expenditure of China's rural residents from 2004 to 2011 and forecasts the moderate demand level of rural basic pension from 2012 to 2020 on this basis. The conclusion thinks that the addition of both the...
Proceedings Article

The Analysis of Curriculum Teaching Methods of VB Programming

De-chuan Kong, Ying-ying Gao
As a public basic course of non computer, VB Programming has a strong theory and practicality and teaching difficulty. According to the actual situation in the course teaching and the features of this course, combining it with the teaching practices, this article emphasized on how to improve teaching...
Proceedings Article

Various New Methods of Implementing AVK

T. Bhunai
Researchers have proposed many data encryption techniques / standards to protect data from various types of attacks like brute force attack, frequency attack and differential frequency attack. Shannon [1-2] documented the theory of perfect secrecy with time variant key. An idea of time variant key namely...
Proceedings Article

Cbufferless: A Novel Congestion Control for Bufferless Networks On-Chip

Jili Yan, Xiaola Lin, Guoming Lai
In this paper, we propose a novel distributed source-throttling congestion control mechanism for bufferless NoC, called Cbufferless. Our strategy uses a novel congestion detection and control model, computing deflection rate of routing flit and throttling message injection. The congestion information...
Proceedings Article

Power Quality Improvement by Shunt Active Performance Filters Emulated by Artificial Intelligence Techniques

Radek Martinek, Jakub Manas, Jan Zidek, Petr Bilik
This article is focused on progressive strategies of shunt active performance filters with intension to compensate higher harmonic currents of non-linear load. The authors of this article deal with usage of a combination of fuzzy system techniques and artificial intelligence, which is also known as Adaptive...
Proceedings Article

Fractional Order Modeling and Control of Depth System of AUV A Case Study

Sneha D. Joshu, B.D. Talange
In this paper Fractional Order Proportional Integral Derivative Controller (FOPID) is designed for Depth system of Autonomous Underwater Vehicle (AUV). For real time and actual implementation fractional order PID Controller is approximated. Numerous simulation comparisons are mentioned in this paper....
Proceedings Article

Tracking Object Using Particle Filter and DCT features

Cong Lin, Chi-Man Pun
In this paper, we proposed an object tracking method for video stream based on conventional particle filter. Feature vectors are extracted from coefficient matrices of Discrete Cosine Transform (DCT). The feature, as experiment showed, is very robust to occlusion and rotation and it is not sensitive...
Proceedings Article

The Research on Attack Threat Sensing based on "Software Security Sensor"

Yuan Zhao, Qiangbo Liu, Dingyi Fang, Huaijun Wang, Cong Zhang
Aim at the different attack threats the running software faced with during reversing, a method of sensing attack threats based on "software security sensor "is proposed in this paper. And the instance has demonstrated that the method is effective and feasible. Drawing lessons from the thought of physical...
Proceedings Article

Shortening of the Automata Cycle of Industrial Communication System Nodes

Marcin Sidzina, Andrzej Kwiecie, Jacek Stój
The distributed computer systems applied in industry are usually of the real-time type. In those systems the maximal system response time has to be always well known in order to ensure the functional as well as the safety parameters of the system. However, the system response time may be subject to change...
Proceedings Article

Study on Chebyshev FIR Filters in Airborne Gravity Data Processing

Wei Zhou, Tijing Cai, Zeyang Xu
In order to pick up the low-frequency gravity anomaly from airborne gravity data, a finite impulse response (FIR) low-pass digital filter with the Chebyshev approximation theorem was designed, and the filtering effects of three design parameters were studied. Results show that the filter order may amplify...
Proceedings Article

Sequential QoS Mapping Model for Multi-layerVideo Delivery in 802.11e Wireless Networks

Lamia Romdhani, Abr Mohamed
Multi-layer video transmission over wireless networks poses numerous challenges due to symantec nature of the encoded video and the intrinsic dependency between the video layers, which, if not considered, may cause severe quality degradation. In this paper, we present a new analytical model leveraging...
Proceedings Article

Low Voltage Ride through Capability Improvement of DFIG using Feed Forward Current Regulator

D.S. Bankar, D.B. Talange
Doubly fed induction generator have become the most common type of wind turbine generators. These wind plants are required to have grid ride through capabilities. [1] However, this type of generator is susceptible to grid-side low voltage and short circuits due to existence of a power electronics converter...
Proceedings Article

Using Fuzzy Inference System to Develop an Optimal Tube Voltage and Tube Current Chart for Radiation Reduction in Pediatric CT Examinations

Ying Bai, Gupta Sunil, Xue Bai, Dali Wang
Many different techniques and researches on reducing the radiation dose for computed tomography (CT) examinations have been reported and developed in recent 30 years. However, most those technologies are not practical enough to enable them to be directly and easily implemented in clinic real applications...
Proceedings Article

BTS-SRP: An Energy-Efficient Concurrency Control Protocol for Embedded Real-Time Systems

Jun Wu, Jun-Xing Wu
In this paper, we explored the scheduling problem of dependent real-time tasks that may access multiunit resources on a non-ideal dynamic voltage scaling (DVS) processor. Based on the stack resource policy (SRP) protocol and the earliest deadline first (EDF) algorithm, we propose an approach, called...
Proceedings Article

S-wane Model Designed to Improve Security Association Negotiation Process in IPv6

Khadidiatou Wane Keïta, Alex Corenthin, Claude Lishou, Sidi Mouhamed Farssi
Network security is a major concern as well as a very active research field today. Internet Protocol version 6 has been developed as a result. For a matter of fact, this new IP protocol is based on a number of mechanisms designed to handle specific security services. The main security services supported...
Proceedings Article

Survivability-Oriented APT Penetration Analysis

Pengfei Wang, Wentao Zhao, Fan Zhang
This article foremost introduces the survivability theory into the analysis of APT penetration, proposes the concept of penetration survivability and addresses it from the basic attributes of concealment, recoverability, self-adaptability and evolutionary. Proposed a survivability-oriented APT penetration...
Proceedings Article

Energy Aware Battery Powered Electric Vehicles:A Predictive Model Driven Approach

Dennis Babu, Anirudh Kumar, Joydeb Roychowdhury
Active energy management for power optimization is essential for successful commercialization of battery powered electric vehicles. In this paper we propose and implement an energy aware electric vehicle using an efficient battery management system, EffBMS which estimates the remaining charge of the...
Proceedings Article

Lightweight Model Driven Process to Ensure Model Traceability and a Case for SYSMOD

Saulius Pavalkis, Lina Nemuraite
When various software and systems development methodologies may be used in an organization, a problem becomes the process how to ensure project traceability independently from a chosen development method. Current state of traceability implementations in CASE tools lack flexibility, customizability and...
Proceedings Article

Application of parallel-hierarchical transformations for rapid recognition of dynamic images based on GPU technology

Leonid Timchenko, Nataliya Kokriatskaia, Andriy Yarovyy, Igor Ivasyuk, Alyona Denysova
The paper presents a method of parallel-hierarchical transformations for rapid recognition of dynamic images using GPU technology. Direct parallel-hierarchical transformations based on cluster CPU-and GPU-oriented hardware platform. Mathematic models of training of the parallel hierarchical (PH) network...
Proceedings Article

Online Handwriting Recognition Using an Accelerometer-Based Pen Device

Wang Jeen-Shing, Hsu Yu-Liang, Chu Cheng-Ling
This paper presents an accelerometer-based pen device for online handwriting recognition applications. The accelerometer-based pen device consists of a triaxial accelerometer, a microcontroller, and an RF wireless transmission module. Users can hold the pen device to write numerals in air without space...
Proceedings Article

A Novel Causal Model Based Distributed Fault Detection Method For Locomotive Electric Traction System

Shu Cheng, Te-fang Chen, Wei Li, Rong-jun Ding
Aimed on the massive computation burden, lack of precise fault mathematic model and uncertainty of analysis method on subsystem parasitic parameters, a novel distributed fault diagnosis Method based on causal Model has been proposed. By the way of splitting entire system into several causal independent...
Proceedings Article

Design of a Control System of Single-Head Pneumatic Hinging Machine Based on STC90C58

Yu Xie
The spectacle frame and earpiece of plate glasses frame are connected by a hinge. The hinge is welded into the plastic spectacle frame or temple tip by using microcomputer control, but the hinging equipment is very expensive. So STC90C58 is chosen as the control core. We have designed a low-cost control...
Proceedings Article

Reducing Falsely Detected JPEG’s Fragmentation Point Using Unique Hex Patterns (UHP)

Abdullah Nurul Azma, Ibrahim Rosziati, Mohamad Kamaruddin Malik, Hamid Norhamreeza Abdul
To increase number of evidence obtained in an effort to fight cyber perpetrator, many studies have been conducted in addressing problem of fragmented JPEG images. However, thumbnail/s is/are always been mistaken as fragmentation point of fragmented JPEG images. This paper discusses on how thumbnail can...
Proceedings Article

Research on LBS-based Optimizing Personal Recommendation System

Enhui Li, Xin Chen, Taiyan Hao, Xiangling Fu
In recent years, more and more internet companies trend to fuse their products with personal recommendation functions which based on a popular technology called LBS (location based service).Although the idea of this business model satisfies the characteristic of Internet industry felicitously, scientists...
Proceedings Article

The Analysis and Test for the Steering Process of Tracked Vehicles on the Hard Road

Hong-yan Wang, Hao-zhan Li, Tao Wang, Qiang Rui, Guang-ming Zhou, Yi Yuan
Steering performances of tracked vehicle considering the skid of tracks-contact-ground has been studied. Models of traction force, brake force, turning resistance moment, turning radius and turning angular speed were established under the conditions of uniform pressure distribution and concentrated ground-contact-load...
Proceedings Article

Automatic Panorama Recognition and Stitching Based on Graph Structure

Yi-Li Zhao, Yan Xia
An automatic panorama recognition and stitching method based on graph structure was proposed to solve the multiple images recognition and matching problem. With multiple unordered images of user input, the method can automatically finding overlapping portion between images, and stitch them. First, the...
Proceedings Article

Using of Polar Codes in Steganography

Idy Diop, Birahime Diouf, Sidi Mohamed Farssi, K. Tall, P.A. Fall, A.K. Diop, K. Sylla
In this paper, we propose a new steganographic scheme based on the polar codes. The scheme works according to two steps. The first offers a stego vector from given cover vector and message. The stego vector provided by the first method can be the optimal; in this case, the insertion is successful with...
Proceedings Article

A Chinese Word Clustering Method Using Latent Dirichlet Allocation and K-means

Lin Qiu, Jungang Xu
Word clustering is a popular research issue in the field of natural language processing. In this paper, Latent Dirichlet Allocation algorithm is used to extract the topics from nouns in the text, and the highest probability noun of each topic is selected as the centroids of the k-means algorithm. Experimental...
Proceedings Article

Research of Web Information Quality Control Based on Informatics Theory Applied in Water Resource Search Engine

Yimin Gao, Feng Ye
With the fast growth of network information, it is urgent to control network information quality and to grasp the information efficiently. Webpage control research can be classified in to two stages: before-search quality control and in-search quality control. Before-search stage includes website quality...
Proceedings Article

Design and Implementation of a High-Speed Data Transmission System Based on PCI-Express Protocol

Yang Xing, Qiong-zhi Wu, Xin-ran Yang, Fu-shun Su
In order to meet the demand of high-speed digital data processing and achieve high-speed communication between digital front-ends and computer, we design and implement a transmission system based on FMC and PCI-Express protocol. This paper describes the basic hardware structure of the interface system,...
Proceedings Article

Digital Riemannian Geometry and Its Application

Guohua Chen
The key characteristic of Riemannian geometry is Riemannian metric. The most important work for the discretion of Riemannian geometry is to seek a discret representation of Riemannian metric, which forms the foundation of digital Riemannian geometry. This paper initiated the conception of Digital Riemannian...
Proceedings Article

Generating Power-Efficient Query Execution Plan

Xiaowei Liu, Jinbao Wang, Haijie Wang, Hong Gao
As more and more power is consumed in servers, growing attention has been paid to power management. However, little work has been dated on the power-efficiency of query execution plans generated by the DBMS. Traditional optimal query execution plan does not take power-efficiency into account. This paper...
Proceedings Article

Analysis of the Difficulties of the Earth Integrated Information Network

Ying Ding, Hai-yang Yu, Hui-lin Jiang, Yuan Hu, Yi-feng Zhu, Li-gang Cong
Due to the progress of the satellite communication system, the demands of earth integrated information network become rapid development. In this paper, we researched on the developing history and trend of the space network, and enumerated some important characteristics and difference between the space...
Proceedings Article

A Novel GPS/DR Integrated Navigation System for Electronic Road Pricing

Zhenhua Yu, Guangwen Yan
A novel vehicle navigation system is designed for electronic road pricing(ERP),which can charge by the distance of the route according to the traffic status. The method of elimination of outliers of the Global Positioning System(GPS) signal is presented. The combination of GPS and Dead Reckoning(DR)...
Proceedings Article

Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability

Chunyang Yuan, Jiaxin Li, Ru Zhang, Jianyi Liu
Disaster recovery is the key approach to ensure the security of information system and business continuity. Nowadays, it's very urgent to explore a way to evaluate the disaster recovery ability objectively, comprehensively and scientifically before disaster occurs. Initially, our proposal constructs...
Proceedings Article

Low Complexity Frequency Offset Estimation for FMCW Radar

Jinyong Lee, Jingu Lee, Youngseh Kim, Kanghoon Kim, Younglok Kim
The FMCW radar estimates the relative speed and the distance of moving targets from the frequency spectrum of received beat signal. The radar systems based on the Doppler processing measure the appropriate information from discrete frequency spectrum, and hence the accuracy depends on the sampling rate...
Proceedings Article

Rough Terrain Perception Through Geometric Entities for Robot Navigation

Roberto Valencia-Murillo, Nancy Arana-Daniel, Carlos López-Franco, Alma Y. Alanís
This paper presents the implementation of a non-linear geometric cost function to be used with a learning to search algorithm (LEARCH) to robot navigation in rough terrains. The non-linear function introduced is a neural network trained with geometric entities as inputs (points, lines, spheres, planes)....
Proceedings Article

Improving Performance of Classifiers using Rotational Feature Selection Scheme

Shib Sankar Bhowmick, Indrajit Saha, Luis Rato, Debotosh Bhattacharjee
The crucial points in machine learning research are that how to develop new classification methods with strong mathematic background and/or to improve the performance of existing methods. Over the past few decades, researches have been working on these issues. Here, we emphasis the second point by improving...
Proceedings Article

Does 4G Technology Trigger the S-commerce Era Coming Evidence from Taiwanese ICT Market

Ming-Yuan Hsieh, Chih-Cheng Huang, Kuang-Yu Huang, Hsiu-Wei Hsu
In reviewing of the generalization of wireless technology in the variously relative information and communication technology (ICT) industries, this research systematically explore the potential determinants of the fourth generation (4G) technology to cross-analyze the drivers of the smart-commerce (S-commerce)...
Proceedings Article

Gossip-Pull System-based Dissemination Protocol Satisfying Message Causality Condition

Jinho Ahn, Cha-Young Kim
This paper introduces a group communication protocol ensuring message causality condition based on gossippull systems. The message causality condition can be satisfied by making all multicast messages transferred to group recipients through redundant message sending by sensor brokers, especially based...
Proceedings Article

An Examination of the Concept of Smart School: An Innovation to Address Sustainability

Siavash Omidinia, Maslin Masrom, Harihodin Selamat
The smart school is a technology-based teaching-learning institution for preparing children for the Information Age. To achieve smarts schools educational objectives, these teaching and learning concepts should be covered: curricular, pedagogy, assessment and teaching-learning materials. Information...
Proceedings Article

Relationship between Capital Structure and Performance Evidence based on Information Technology Industry

Chunhua Wang, Meiyan Song
In recent years, capital structure and business performance is researched by many domestic and foreign scholars in-depth. Information technology industry is as a pillar industry and a highly growing industry with a huge potential market supported by our government; research of capital and performance...
Proceedings Article

A New Call Admission Control Strategyfor LTE Femtocell Networks

Jie Wang, Yangfan Qiu
This paper introduces a call admission control (CAC) strategy for LTE femtocell networks supporting multimedia services with different classes of traffic and diverse bandwidth requirements. In this work, the multi-service CAC strategy composes of two parts: subscriber authentication and queuing admission...
Proceedings Article

The Research on NSC Key Service Mechanism in Mobile Network

Chenhe Zhu, Zhiyi Fang, Ying Wang, Qian Xu, Borui Jin
Mobile Network Security Center (NSC) and its key service mechanism is an important part of the mobile network security management. In this paper, based on the analysis of the security requirements of the mobile network, put forward a key service mechanism for mobile networks (NSC), including the management...
Proceedings Article

Study on Information Service Push Strategy based on Networked Manufacture

Xiu-zhen Feng, Chao Su
Based on exploring the characteristics of networked manufacture, we first analyzed the relationships on the networked manufacture. Then, we constructed architecture of information push service for networked manufacture, which is based on the detailed discussion with the related data structure. Furthermore,...
Proceedings Article

Research on the Application of Information Technology in School Sports

Yunyun Du
The paper analyses the role of information technology in the P.E, training and management and analyzes the theoretical and practical basis for the application of information technology in the school sports.It also proposes measures to fully exert the function of information technology in the school sports.