Proceedings of the 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)
78 articles
Proceedings Article
A Neural Network Enhanced Stereo Vision Obstacle Detection and Avoidance System for Unmanned Ground Vehicle
Fanjun Liu, Binggang Cao
This paper presents a neural network enhanced stereo vision obstacle detection and avoidance system for unmanned ground vehicle. In this paper, we build a neural network to learn the mapping for the left image to the right image under the assumption of a flat road. Using the trained neural network we...
Proceedings Article
Statistical Properties of Chinese Near-synonyms Network
Jinze Li, Shuangwen Chen, Xiaoyue Luo, Feng Xiao, Jianyu Li, Hao Shen
We investigate Chinese near-synonyms (include synonyms and near-synonyms) based on complex network theory. In the study of near-synonyms network, scale-free effect and hierarchical structure features are found in this complex system. In particular, we find that n-node cliques exist widely in near-synonyms...
Proceedings Article
The Application of Chaos Immune Genetic Algorithm in Sequencing Problem of Sports Meeting
Ying Pan
The sequencing of sports meeting is quite complicated due to the huge number of people and events. A new immune genetic algorithm aiming at solving the sports meeting sequencing problem is proposed in this paper, namely the chaos immune genetic algorithm, which combines the immune algorithm, chaos algorithm...
Proceedings Article
RESTful Digital Web Services for Market Price Forecasting with RAn Application on Equity Markets Using Garch Models
Mihai Calciu, Christiana Tudor
Web services (WS) are originally and typically SOAP (Simple Object Access Protocol) based. SOAP based web services offer a powerful architecture and communication protocol that allows model based marketing decisions support (MMDS) to be integrated, served and get discovered over the Internet. Lately...
Proceedings Article
Clustering the Tropical Wood Species Using Kohonen Self-Organizing Map (KSOM)
Ahmad Azlin, Yusof Rubiyah
This paper discusses on how the Kohonen Self-Organizing Map (KSOM) is used as a tool to cluster and classify the tropical wood species. Wood features have been extracted through the use of two features extractors; Basic Grey Level Aura Matrix (BGLAM) and Statistical Properties of Pores Distribution (SPPD)...
Proceedings Article
IROTS: A Proposed COTS Evaluation & Selection Methodology for Component Based Software Engineering in Under-Development Countries
M. Shakeel Faridi, Zahig Javed, M. Haris Abid, Ahmed Mudassar, Asri Bin Ngadi
Component Based Software Engineering (CBSE) methodology deals with software systems by evaluation and selection of appropriate components. CBSE offers software developers a compact software development life cycle, reduce development times, cost effective and less strenuous efforts. In under development...
Proceedings Article
Longitudinal Data Based Research on Web User Interests Drift Modeling
Huimin Li, Liying Fang, Pu Wang, Jianzhuo Yan
User interests drift modeling is the fundamental and key technology of Personal Recommendation System (PRS), and is arising more and more attention by researcher from home and abroad. At present, web user interests drift model is in its original phase for the reason of many aspects, and there also exist...
Proceedings Article
Computer Implementation for Analysis of Complex Masonry Shell Structures
Jerzy Szolomicki, Piotr Berkowski
The increasing interest in historic architectural complex buildings and the need to understand the behavior of historical structures has led to development of computational methods used for analysis of the masonry vaults. The paper deals with some of the explicit and numerical methods used for modeling...
Proceedings Article
Knowledge-based Auto Repair Diagnosis System and Application
Xiaofen Fang, Kunli Fang
Auto repair is a process which solves the problem iteratively and constantly. It is required to establish the knowledge base model and the inference base model. Meanwhile, it develops the knowledge-based auto repair diagnostic system through the integration of the auto repair experience and the repair...
Proceedings Article
An Efficient Algorithm of Convex Hull for Very Large Planar Point Set
Guangquan Fan, Liping Ma, Bingru Yang
In the paper, we present and prove Castle Theorem of Convex Hull, design and realize the Fast Rampart Searching Algorithm. The algorithm can be treated as the preprocess of Convex Hull calculation of very large planar point set. When calculating the Convex Hull of a very large planar point set, we can...
Proceedings Article
Service Oriented Cost AccountingUtilization-based Accounting and Charging of IT Service Costs
Christopher Schwarz, S. Schmidt, A. Sellner, E. Zinser
Due to the immanent complexity of Information Technology Outsourcing (ITO) partnerships and their underlying service technology, a sustainable management proofs to be highly challenging and inefficient. Being confronted with multidimensional business relations and complex services meshes, the accounting...
Proceedings Article
Structural Relaxation Solutions Formetallic Amorphous Condensed Lattice with Activation Energy Spectrum Model Applied Computational Physics
Kazu Yamada
Development of amorphous-material devices and specimen modification methods is closely related with the obviousness of high thermal stability and stability of relaxation, additionally general ground characteristic investigations of glass, transformation of the liquid-system to glass one is an enormous...
Proceedings Article
Test and Computer Modeling of Steel Braces for Earthquake-Resistant Structures: Dual-Core Self-Centering Brace and Sandwiched Buckling-Restrained Brace
Chung-Che Chou, Ying-Chuan Chen, Sheng-Yang Chen
This work presents mechanics, tests, and finite element modeling results of a proposed steel dual-core self-centering brace (SCB) and a sandwiched buckling-restrained brace (BRB) for earthquake-resistant structures. The mechanics and cyclic behavior of these two braces are first explained, followed by...
Proceedings Article
High Resolution DOA Estimation Algorithm based on Nonuniform L-shaped Array
Lanmei Wang, Zhihai Chen, Guibao Wang
A parameter estimation algorithm of direction of arrival (DOA), based on a nonuniform L-shaped array, is presented for plane-wave signals. According to relation of the two x-axis and y-axis subarrays, a set of rough but unambiguous direction cosines estimates in x and y direction are obtained. By disambiguating...
Proceedings Article
An Energy-Efficient Data Placement Algorithm and Node Scheduling Strategies in Cloud Computing Systems
Yanwen Xiao, Jinbao Wang, Yaping Li, Hong Gao
With the rise of the cloud computing, saving energy consumed by cloud systems has become a tricky issue nowadays. How to place data efficiently and schedule the nodes effectively in a cloud platform are very important issues from the view of the energy-saving. However, the state-of-the-art node-scheduling...
Proceedings Article
An Efficient Biogeography Based Face Recognition Algorithm
Daya Gupta, Lavika Goel, Abhishek Abhishek
Extracting the optimal features from images is always required in face recognition algorithm to achieve high accuracy. In this paper we have presented an efficient face recognition algorithm based on Biogeography Based Optimization (BBO). First we extract the features using the principal Component Analysis...
Proceedings Article
Comparison of Modernization Approaches: With and Without the Knowledge Based Software Reuse Process
Jha Meena, Liam O'Brien
The ever increasing demand for improvements in software maintainability and modernization cannot be met through traditional techniques of software development and modernization. Most approaches to software development and modernization do not explicitly address software reuse however new approaches that...
Proceedings Article
A Dynamic Quality-Based Harmony Search Algorithm for Solving Constrained Engineering Optimization Problems
Ali Kattan
Meta-heuristic algorithms overcome the computational drawbacks of the existing numerical methods where they are commonly used to solve constrained engineering problems and find an optimum solution. Solving this kind of problems is considered of high value in many engineering and manufacturing processes....
Proceedings Article
Malicious Website Detection Based on Honeypot Systems
Tung-Ming Koo, Hung-Chang Chang, Ya-Ting Hsu, Huey-Yeh Lin
In the Internet age, every computer user is likely to inadvertently encounter highly contagious viruses. Over the past several years, a new type of web attack has spread across the web, that is, when a client connects to a malicious remote server, the server responds to the request while simultaneously...
Proceedings Article
Effectiveness Evaluation of Software Protection based on SAMMPN
Huaijun Wang, Dingyi Fang, Ni Wang, Yuanxiang Gu
Evaluate the effectiveness of software protection technologies is still an unsolved problem. This paper presents a new evaluation method considering attack cost as the metric to evaluate the effectiveness of software protection under the circumstances of fulfilling assumptions that all software can be...
Proceedings Article
Stability of the Forest Evolution System with growth functions
Huihui Bai, Dingjiang Wang
This paper discusses the dynamical model of the Forest Evolution System, and the Existence and Uniqueness of the equation are have been proved by applying the theory of integral equation. Furthermore, we discussed the stability of the solution by applying the stability theory of Lyapunov.
Proceedings Article
Path Planning of a Mobile Robot Using Real-coded Genetic Algorithm Based Simultaneous Exploration
Chih-Jer Lin, Yen-Lin Chen, Cheng-Hsin Liu, Shenkai Yu
In mobile robot researches, path planning and obstacle avoidance plays a very important role and has been a very challenging research topic. For path planning, it should produce continuous path from the starting point to the destination without colliding obstacles. Therefore, we proposes a genetic algorithm...
Proceedings Article
Analysis of the Selected Aspects of a Crash between Two Vehicles
Kisilowski Jerzy, Zalewski Jaroslaw
In the article a computer simulation of vehicle collision was prepared using the PC-Crash 8.0 software. The results of this simulation were compared to analytical calculations by Routh method with the use of the coefficient of restitution for deformations or velocities. The equations of motion during...
Proceedings Article
Accelerometer-based Energy Expenditure Estimation Methods and Performance Comparison
Fang-Chen Chuang, Ya-Ting C. Yang, Jeen-Shing Wang
This paper presents two accelerometer-based metabolic equivalent (MET) estimation methods: 1) MET regression models estimation; and 2) a mono-exponential MET estimation equation. The MET estimation methods can predict MET for the following seven categories of activities: sitting, standing, walking upstairs,...
Proceedings Article
Integrated Scientific Cloud Computing WorkflowsSC2IT: A Toolkit to Bring Novel Computational Science to Non-specialists
K. Jorissen, W. Johnson, J.J. Rehr
Scientific Cloud Computing (SCC) applies the advantages of Clouds to computational science. We present the SC2IT Scientific Cloud Computing tools that abstract complex computational workflows and allow state-of-the-art scientific high-performance computing software to be distributed in a user-friendly...
Proceedings Article
Task Level Parallelization of All Pair Shortest Path Algorithm in OpenMP 3.0
Eid Albalwi, Parimala Thulasiraman, Ruppa Thulasiram
OpenMP is a standard parallel programming lan-guage to develop parallel applications on shared memory ma-chines. OpenMP is very suitable for designing parallel algorithms for regular applications where the amount of work is known apriori and therefore, distribution of work among the threads can be done...
Proceedings Article
A Venture Capital Assessment Model based on the Genetic Neural Network
Tieying Liu, Yuting Fan, Xinzhu Xu
With the rapid development of economy, there are greater challenges in Venture Capital. In the face of the venture project selecting, scientific evaluation of investment venture has been an important issue in venture investment, and it directly influences the success or failure of investment. In this...
Proceedings Article
Nonlinear Cointegration Analysis Based on Support Vector Machines and Its Application to the Connection between Financial Markets
Chuanhe Shen, Zhongwen Liu, Ying Li
With the purpose of analyzing non-stationary time series, this paper introduced a novel nonlinear cointegration discriminate analysis by employing support vector machines to overcome existing limitations of two methods, that is, the statistical approach and the neural network used by the nonlinear cointegration...
Proceedings Article
A Novel User Pairing Algorithm for Lte Femtocell Uplink
Jie Wang, Chen Xu
This paper considers the user pairing algorithm for LTE (Long Term Evolution) femtocell uplink V-MIMO (Virtual Multiple Input Multiple Output) Systems, and propose a new simulated annealing based bit error rate pairing scheduling (SA-BPS) algorithm. The SA-BPS uses Round Robin (RR) criterion to decide...
Proceedings Article
A Service Selection Conflict Avoidance Algorithm Based on Multilevel Backtracking
Huaizhou Yang, Xuelong Wang
When there are a lot of candidate component services in Web services composition, the suitable component services need to be selected. The service selection conflicts often occur due to the functional dependency relationships between component services. Therefore, a service selection conflict avoidance...
Proceedings Article
The Design and Implementation of Cloud Storage SystemBased on Hiphop-php
Chenhe Zhu, Zhiyi Fang, Yao Sun, Fang Zheng, Fanfan Zhang, Jiliang Wang
With the rapid development of Internet technology, the data of the users’ information have raised up largely, so internet storage became more and more important in today’s life. In this paper, a cloud storage system has been designed and implemented. By using Hiphop-php technology, the performance of...
Proceedings Article
Research on Virtual Interactive Sand Table for Showing of Energy Conservation Data
Rong Fan, Hongjiang Liu
With the rapid development of interaction technology, the digital sand table has gradually replaced the traditional sand table. In such fields as the real estate exhibition, the city planning exhibition, the tourist attractions showcase , the military training, the water conservancy and hydropower ,...
Proceedings Article
Determination on the Demand Level of Rural Resident’s Basic Pension Based on the Extended Linear Expenditure System Model
Wenxian Cao
By using extended linear expenditure model this paper calculates per capita basic living demand expenditure of China's rural residents from 2004 to 2011 and forecasts the moderate demand level of rural basic pension from 2012 to 2020 on this basis. The conclusion thinks that the addition of both the...
Proceedings Article
The Analysis of Curriculum Teaching Methods of VB Programming
De-chuan Kong, Ying-ying Gao
As a public basic course of non computer, VB Programming has a strong theory and practicality and teaching difficulty. According to the actual situation in the course teaching and the features of this course, combining it with the teaching practices, this article emphasized on how to improve teaching...
Proceedings Article
Various New Methods of Implementing AVK
T. Bhunai
Researchers have proposed many data encryption techniques / standards to protect data from various types of attacks like brute force attack, frequency attack and differential frequency attack. Shannon [1-2] documented the theory of perfect secrecy with time variant key. An idea of time variant key namely...
Proceedings Article
Cbufferless: A Novel Congestion Control for Bufferless Networks On-Chip
Jili Yan, Xiaola Lin, Guoming Lai
In this paper, we propose a novel distributed source-throttling congestion control mechanism for bufferless NoC, called Cbufferless. Our strategy uses a novel congestion detection and control model, computing deflection rate of routing flit and throttling message injection. The congestion information...
Proceedings Article
Power Quality Improvement by Shunt Active Performance Filters Emulated by Artificial Intelligence Techniques
Radek Martinek, Jakub Manas, Jan Zidek, Petr Bilik
This article is focused on progressive strategies of shunt active performance filters with intension to compensate higher harmonic currents of non-linear load. The authors of this article deal with usage of a combination of fuzzy system techniques and artificial intelligence, which is also known as Adaptive...
Proceedings Article
Fractional Order Modeling and Control of Depth System of AUV A Case Study
Sneha D. Joshu, B.D. Talange
In this paper Fractional Order Proportional Integral Derivative Controller (FOPID) is designed for Depth system of Autonomous Underwater Vehicle (AUV). For real time and actual implementation fractional order PID Controller is approximated. Numerous simulation comparisons are mentioned in this paper....
Proceedings Article
Tracking Object Using Particle Filter and DCT features
Cong Lin, Chi-Man Pun
In this paper, we proposed an object tracking method for video stream based on conventional particle filter. Feature vectors are extracted from coefficient matrices of Discrete Cosine Transform (DCT). The feature, as experiment showed, is very robust to occlusion and rotation and it is not sensitive...
Proceedings Article
The Research on Attack Threat Sensing based on "Software Security Sensor"
Yuan Zhao, Qiangbo Liu, Dingyi Fang, Huaijun Wang, Cong Zhang
Aim at the different attack threats the running software faced with during reversing, a method of sensing attack threats based on "software security sensor "is proposed in this paper. And the instance has demonstrated that the method is effective and feasible. Drawing lessons from the thought of physical...
Proceedings Article
Shortening of the Automata Cycle of Industrial Communication System Nodes
Marcin Sidzina, Andrzej Kwiecie, Jacek Stój
The distributed computer systems applied in industry are usually of the real-time type. In those systems the maximal system response time has to be always well known in order to ensure the functional as well as the safety parameters of the system. However, the system response time may be subject to change...
Proceedings Article
Study on Chebyshev FIR Filters in Airborne Gravity Data Processing
Wei Zhou, Tijing Cai, Zeyang Xu
In order to pick up the low-frequency gravity anomaly from airborne gravity data, a finite impulse response (FIR) low-pass digital filter with the Chebyshev approximation theorem was designed, and the filtering effects of three design parameters were studied. Results show that the filter order may amplify...
Proceedings Article
Sequential QoS Mapping Model for Multi-layerVideo Delivery in 802.11e Wireless Networks
Lamia Romdhani, Abr Mohamed
Multi-layer video transmission over wireless networks poses numerous challenges due to symantec nature of the encoded video and the intrinsic dependency between the video layers, which, if not considered, may cause severe quality degradation. In this paper, we present a new analytical model leveraging...
Proceedings Article
Low Voltage Ride through Capability Improvement of DFIG using Feed Forward Current Regulator
D.S. Bankar, D.B. Talange
Doubly fed induction generator have become the most common type of wind turbine generators. These wind plants are required to have grid ride through capabilities. [1] However, this type of generator is susceptible to grid-side low voltage and short circuits due to existence of a power electronics converter...
Proceedings Article
Using Fuzzy Inference System to Develop an Optimal Tube Voltage and Tube Current Chart for Radiation Reduction in Pediatric CT Examinations
Ying Bai, Gupta Sunil, Xue Bai, Dali Wang
Many different techniques and researches on reducing the radiation dose for computed tomography (CT) examinations have been reported and developed in recent 30 years. However, most those technologies are not practical enough to enable them to be directly and easily implemented in clinic real applications...
Proceedings Article
BTS-SRP: An Energy-Efficient Concurrency Control Protocol for Embedded Real-Time Systems
Jun Wu, Jun-Xing Wu
In this paper, we explored the scheduling problem of dependent real-time tasks that may access multiunit resources on a non-ideal dynamic voltage scaling (DVS) processor. Based on the stack resource policy (SRP) protocol and the earliest deadline first (EDF) algorithm, we propose an approach, called...
Proceedings Article
S-wane Model Designed to Improve Security Association Negotiation Process in IPv6
Khadidiatou Wane Keïta, Alex Corenthin, Claude Lishou, Sidi Mouhamed Farssi
Network security is a major concern as well as a very active research field today. Internet Protocol version 6 has been developed as a result. For a matter of fact, this new IP protocol is based on a number of mechanisms designed to handle specific security services. The main security services supported...
Proceedings Article
Survivability-Oriented APT Penetration Analysis
Pengfei Wang, Wentao Zhao, Fan Zhang
This article foremost introduces the survivability theory into the analysis of APT penetration, proposes the concept of penetration survivability and addresses it from the basic attributes of concealment, recoverability, self-adaptability and evolutionary. Proposed a survivability-oriented APT penetration...
Proceedings Article
Energy Aware Battery Powered Electric Vehicles:A Predictive Model Driven Approach
Dennis Babu, Anirudh Kumar, Joydeb Roychowdhury
Active energy management for power optimization is essential for successful commercialization of battery powered electric vehicles. In this paper we propose and implement an energy aware electric vehicle using an efficient battery management system, EffBMS which estimates the remaining charge of the...
Proceedings Article
Lightweight Model Driven Process to Ensure Model Traceability and a Case for SYSMOD
Saulius Pavalkis, Lina Nemuraite
When various software and systems development methodologies may be used in an organization, a problem becomes the process how to ensure project traceability independently from a chosen development method. Current state of traceability implementations in CASE tools lack flexibility, customizability and...
Proceedings Article
Application of parallel-hierarchical transformations for rapid recognition of dynamic images based on GPU technology
Leonid Timchenko, Nataliya Kokriatskaia, Andriy Yarovyy, Igor Ivasyuk, Alyona Denysova
The paper presents a method of parallel-hierarchical transformations for rapid recognition of dynamic images using GPU technology. Direct parallel-hierarchical transformations based on cluster CPU-and GPU-oriented hardware platform. Mathematic models of training of the parallel hierarchical (PH) network...
Proceedings Article
Online Handwriting Recognition Using an Accelerometer-Based Pen Device
Wang Jeen-Shing, Hsu Yu-Liang, Chu Cheng-Ling
This paper presents an accelerometer-based pen device for online handwriting recognition applications. The accelerometer-based pen device consists of a triaxial accelerometer, a microcontroller, and an RF wireless transmission module. Users can hold the pen device to write numerals in air without space...
Proceedings Article
A Novel Causal Model Based Distributed Fault Detection Method For Locomotive Electric Traction System
Shu Cheng, Te-fang Chen, Wei Li, Rong-jun Ding
Aimed on the massive computation burden, lack of precise fault mathematic model and uncertainty of analysis method on subsystem parasitic parameters, a novel distributed fault diagnosis Method based on causal Model has been proposed. By the way of splitting entire system into several causal independent...
Proceedings Article
Design of a Control System of Single-Head Pneumatic Hinging Machine Based on STC90C58
Yu Xie
The spectacle frame and earpiece of plate glasses frame are connected by a hinge. The hinge is welded into the plastic spectacle frame or temple tip by using microcomputer control, but the hinging equipment is very expensive. So STC90C58 is chosen as the control core. We have designed a low-cost control...
Proceedings Article
Reducing Falsely Detected JPEG’s Fragmentation Point Using Unique Hex Patterns (UHP)
Abdullah Nurul Azma, Ibrahim Rosziati, Mohamad Kamaruddin Malik, Hamid Norhamreeza Abdul
To increase number of evidence obtained in an effort to fight cyber perpetrator, many studies have been conducted in addressing problem of fragmented JPEG images. However, thumbnail/s is/are always been mistaken as fragmentation point of fragmented JPEG images. This paper discusses on how thumbnail can...
Proceedings Article
Research on LBS-based Optimizing Personal Recommendation System
Enhui Li, Xin Chen, Taiyan Hao, Xiangling Fu
In recent years, more and more internet companies trend to fuse their products with personal recommendation functions which based on a popular technology called LBS (location based service).Although the idea of this business model satisfies the characteristic of Internet industry felicitously, scientists...
Proceedings Article
The Analysis and Test for the Steering Process of Tracked Vehicles on the Hard Road
Hong-yan Wang, Hao-zhan Li, Tao Wang, Qiang Rui, Guang-ming Zhou, Yi Yuan
Steering performances of tracked vehicle considering the skid of tracks-contact-ground has been studied. Models of traction force, brake force, turning resistance moment, turning radius and turning angular speed were established under the conditions of uniform pressure distribution and concentrated ground-contact-load...
Proceedings Article
Automatic Panorama Recognition and Stitching Based on Graph Structure
Yi-Li Zhao, Yan Xia
An automatic panorama recognition and stitching method based on graph structure was proposed to solve the multiple images recognition and matching problem. With multiple unordered images of user input, the method can automatically finding overlapping portion between images, and stitch them. First, the...
Proceedings Article
Using of Polar Codes in Steganography
Idy Diop, Birahime Diouf, Sidi Mohamed Farssi, K. Tall, P.A. Fall, A.K. Diop, K. Sylla
In this paper, we propose a new steganographic scheme based on the polar codes. The scheme works according to two steps. The first offers a stego vector from given cover vector and message. The stego vector provided by the first method can be the optimal; in this case, the insertion is successful with...
Proceedings Article
A Chinese Word Clustering Method Using Latent Dirichlet Allocation and K-means
Lin Qiu, Jungang Xu
Word clustering is a popular research issue in the field of natural language processing. In this paper, Latent Dirichlet Allocation algorithm is used to extract the topics from nouns in the text, and the highest probability noun of each topic is selected as the centroids of the k-means algorithm. Experimental...
Proceedings Article
Research of Web Information Quality Control Based on Informatics Theory Applied in Water Resource Search Engine
Yimin Gao, Feng Ye
With the fast growth of network information, it is urgent to control network information quality and to grasp the information efficiently. Webpage control research can be classified in to two stages: before-search quality control and in-search quality control. Before-search stage includes website quality...
Proceedings Article
Design and Implementation of a High-Speed Data Transmission System Based on PCI-Express Protocol
Yang Xing, Qiong-zhi Wu, Xin-ran Yang, Fu-shun Su
In order to meet the demand of high-speed digital data processing and achieve high-speed communication between digital front-ends and computer, we design and implement a transmission system based on FMC and PCI-Express protocol. This paper describes the basic hardware structure of the interface system,...
Proceedings Article
Digital Riemannian Geometry and Its Application
Guohua Chen
The key characteristic of Riemannian geometry is Riemannian metric. The most important work for the discretion of Riemannian geometry is to seek a discret representation of Riemannian metric, which forms the foundation of digital Riemannian geometry. This paper initiated the conception of Digital Riemannian...
Proceedings Article
Generating Power-Efficient Query Execution Plan
Xiaowei Liu, Jinbao Wang, Haijie Wang, Hong Gao
As more and more power is consumed in servers, growing attention has been paid to power management. However, little work has been dated on the power-efficiency of query execution plans generated by the DBMS. Traditional optimal query execution plan does not take power-efficiency into account. This paper...
Proceedings Article
Analysis of the Difficulties of the Earth Integrated Information Network
Ying Ding, Hai-yang Yu, Hui-lin Jiang, Yuan Hu, Yi-feng Zhu, Li-gang Cong
Due to the progress of the satellite communication system, the demands of earth integrated information network become rapid development. In this paper, we researched on the developing history and trend of the space network, and enumerated some important characteristics and difference between the space...
Proceedings Article
A Novel GPS/DR Integrated Navigation System for Electronic Road Pricing
Zhenhua Yu, Guangwen Yan
A novel vehicle navigation system is designed for electronic road pricing(ERP),which can charge by the distance of the route according to the traffic status. The method of elimination of outliers of the Global Positioning System(GPS) signal is presented. The combination of GPS and Dead Reckoning(DR)...
Proceedings Article
Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability
Chunyang Yuan, Jiaxin Li, Ru Zhang, Jianyi Liu
Disaster recovery is the key approach to ensure the security of information system and business continuity. Nowadays, it's very urgent to explore a way to evaluate the disaster recovery ability objectively, comprehensively and scientifically before disaster occurs. Initially, our proposal constructs...
Proceedings Article
Low Complexity Frequency Offset Estimation for FMCW Radar
Jinyong Lee, Jingu Lee, Youngseh Kim, Kanghoon Kim, Younglok Kim
The FMCW radar estimates the relative speed and the distance of moving targets from the frequency spectrum of received beat signal. The radar systems based on the Doppler processing measure the appropriate information from discrete frequency spectrum, and hence the accuracy depends on the sampling rate...
Proceedings Article
Rough Terrain Perception Through Geometric Entities for Robot Navigation
Roberto Valencia-Murillo, Nancy Arana-Daniel, Carlos López-Franco, Alma Y. Alanís
This paper presents the implementation of a non-linear geometric cost function to be used with a learning to search algorithm (LEARCH) to robot navigation in rough terrains. The non-linear function introduced is a neural network trained with geometric entities as inputs (points, lines, spheres, planes)....
Proceedings Article
Improving Performance of Classifiers using Rotational Feature Selection Scheme
Shib Sankar Bhowmick, Indrajit Saha, Luis Rato, Debotosh Bhattacharjee
The crucial points in machine learning research are that how to develop new classification methods with strong mathematic background and/or to improve the performance of existing methods. Over the past few decades, researches have been working on these issues. Here, we emphasis the second point by improving...
Proceedings Article
Does 4G Technology Trigger the S-commerce Era Coming Evidence from Taiwanese ICT Market
Ming-Yuan Hsieh, Chih-Cheng Huang, Kuang-Yu Huang, Hsiu-Wei Hsu
In reviewing of the generalization of wireless technology in the variously relative information and communication technology (ICT) industries, this research systematically explore the potential determinants of the fourth generation (4G) technology to cross-analyze the drivers of the smart-commerce (S-commerce)...
Proceedings Article
Gossip-Pull System-based Dissemination Protocol Satisfying Message Causality Condition
Jinho Ahn, Cha-Young Kim
This paper introduces a group communication protocol ensuring message causality condition based on gossippull systems. The message causality condition can be satisfied by making all multicast messages transferred to group recipients through redundant message sending by sensor brokers, especially based...
Proceedings Article
An Examination of the Concept of Smart School: An Innovation to Address Sustainability
Siavash Omidinia, Maslin Masrom, Harihodin Selamat
The smart school is a technology-based teaching-learning institution for preparing children for the Information Age. To achieve smarts schools educational objectives, these teaching and learning concepts should be covered: curricular, pedagogy, assessment and teaching-learning materials. Information...
Proceedings Article
Relationship between Capital Structure and Performance Evidence based on Information Technology Industry
Chunhua Wang, Meiyan Song
In recent years, capital structure and business performance is researched by many domestic and foreign scholars in-depth. Information technology industry is as a pillar industry and a highly growing industry with a huge potential market supported by our government; research of capital and performance...
Proceedings Article
A New Call Admission Control Strategyfor LTE Femtocell Networks
Jie Wang, Yangfan Qiu
This paper introduces a call admission control (CAC) strategy for LTE femtocell networks supporting multimedia services with different classes of traffic and diverse bandwidth requirements. In this work, the multi-service CAC strategy composes of two parts: subscriber authentication and queuing admission...
Proceedings Article
The Research on NSC Key Service Mechanism in Mobile Network
Chenhe Zhu, Zhiyi Fang, Ying Wang, Qian Xu, Borui Jin
Mobile Network Security Center (NSC) and its key service mechanism is an important part of the mobile network security management. In this paper, based on the analysis of the security requirements of the mobile network, put forward a key service mechanism for mobile networks (NSC), including the management...
Proceedings Article
Study on Information Service Push Strategy based on Networked Manufacture
Xiu-zhen Feng, Chao Su
Based on exploring the characteristics of networked manufacture, we first analyzed the relationships on the networked manufacture. Then, we constructed architecture of information push service for networked manufacture, which is based on the detailed discussion with the related data structure. Furthermore,...
Proceedings Article
Research on the Application of Information Technology in School Sports
Yunyun Du
The paper analyses the role of information technology in the P.E, training and management and analyzes the theoretical and practical basis for the application of information technology in the school sports.It also proposes measures to fully exert the function of information technology in the school sports.