Proceedings of the 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)

Session: Information Technology

24 articles
Proceedings Article

Reducing Falsely Detected JPEG’s Fragmentation Point Using Unique Hex Patterns (UHP)

Abdullah Nurul Azma, Ibrahim Rosziati, Mohamad Kamaruddin Malik, Hamid Norhamreeza Abdul
To increase number of evidence obtained in an effort to fight cyber perpetrator, many studies have been conducted in addressing problem of fragmented JPEG images. However, thumbnail/s is/are always been mistaken as fragmentation point of fragmented JPEG images. This paper discusses on how thumbnail can...
Proceedings Article

Research on LBS-based Optimizing Personal Recommendation System

Enhui Li, Xin Chen, Taiyan Hao, Xiangling Fu
In recent years, more and more internet companies trend to fuse their products with personal recommendation functions which based on a popular technology called LBS (location based service).Although the idea of this business model satisfies the characteristic of Internet industry felicitously, scientists...
Proceedings Article

The Analysis and Test for the Steering Process of Tracked Vehicles on the Hard Road

Hong-yan Wang, Hao-zhan Li, Tao Wang, Qiang Rui, Guang-ming Zhou, Yi Yuan
Steering performances of tracked vehicle considering the skid of tracks-contact-ground has been studied. Models of traction force, brake force, turning resistance moment, turning radius and turning angular speed were established under the conditions of uniform pressure distribution and concentrated ground-contact-load...
Proceedings Article

Automatic Panorama Recognition and Stitching Based on Graph Structure

Yi-Li Zhao, Yan Xia
An automatic panorama recognition and stitching method based on graph structure was proposed to solve the multiple images recognition and matching problem. With multiple unordered images of user input, the method can automatically finding overlapping portion between images, and stitch them. First, the...
Proceedings Article

Using of Polar Codes in Steganography

Idy Diop, Birahime Diouf, Sidi Mohamed Farssi, K. Tall, P.A. Fall, A.K. Diop, K. Sylla
In this paper, we propose a new steganographic scheme based on the polar codes. The scheme works according to two steps. The first offers a stego vector from given cover vector and message. The stego vector provided by the first method can be the optimal; in this case, the insertion is successful with...
Proceedings Article

A Chinese Word Clustering Method Using Latent Dirichlet Allocation and K-means

Lin Qiu, Jungang Xu
Word clustering is a popular research issue in the field of natural language processing. In this paper, Latent Dirichlet Allocation algorithm is used to extract the topics from nouns in the text, and the highest probability noun of each topic is selected as the centroids of the k-means algorithm. Experimental...
Proceedings Article

Research of Web Information Quality Control Based on Informatics Theory Applied in Water Resource Search Engine

Yimin Gao, Feng Ye
With the fast growth of network information, it is urgent to control network information quality and to grasp the information efficiently. Webpage control research can be classified in to two stages: before-search quality control and in-search quality control. Before-search stage includes website quality...
Proceedings Article

Design and Implementation of a High-Speed Data Transmission System Based on PCI-Express Protocol

Yang Xing, Qiong-zhi Wu, Xin-ran Yang, Fu-shun Su
In order to meet the demand of high-speed digital data processing and achieve high-speed communication between digital front-ends and computer, we design and implement a transmission system based on FMC and PCI-Express protocol. This paper describes the basic hardware structure of the interface system,...
Proceedings Article

Digital Riemannian Geometry and Its Application

Guohua Chen
The key characteristic of Riemannian geometry is Riemannian metric. The most important work for the discretion of Riemannian geometry is to seek a discret representation of Riemannian metric, which forms the foundation of digital Riemannian geometry. This paper initiated the conception of Digital Riemannian...
Proceedings Article

Generating Power-Efficient Query Execution Plan

Xiaowei Liu, Jinbao Wang, Haijie Wang, Hong Gao
As more and more power is consumed in servers, growing attention has been paid to power management. However, little work has been dated on the power-efficiency of query execution plans generated by the DBMS. Traditional optimal query execution plan does not take power-efficiency into account. This paper...
Proceedings Article

Analysis of the Difficulties of the Earth Integrated Information Network

Ying Ding, Hai-yang Yu, Hui-lin Jiang, Yuan Hu, Yi-feng Zhu, Li-gang Cong
Due to the progress of the satellite communication system, the demands of earth integrated information network become rapid development. In this paper, we researched on the developing history and trend of the space network, and enumerated some important characteristics and difference between the space...
Proceedings Article

A Novel GPS/DR Integrated Navigation System for Electronic Road Pricing

Zhenhua Yu, Guangwen Yan
A novel vehicle navigation system is designed for electronic road pricing(ERP),which can charge by the distance of the route according to the traffic status. The method of elimination of outliers of the Global Positioning System(GPS) signal is presented. The combination of GPS and Dead Reckoning(DR)...
Proceedings Article

Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability

Chunyang Yuan, Jiaxin Li, Ru Zhang, Jianyi Liu
Disaster recovery is the key approach to ensure the security of information system and business continuity. Nowadays, it's very urgent to explore a way to evaluate the disaster recovery ability objectively, comprehensively and scientifically before disaster occurs. Initially, our proposal constructs...
Proceedings Article

Low Complexity Frequency Offset Estimation for FMCW Radar

Jinyong Lee, Jingu Lee, Youngseh Kim, Kanghoon Kim, Younglok Kim
The FMCW radar estimates the relative speed and the distance of moving targets from the frequency spectrum of received beat signal. The radar systems based on the Doppler processing measure the appropriate information from discrete frequency spectrum, and hence the accuracy depends on the sampling rate...
Proceedings Article

Rough Terrain Perception Through Geometric Entities for Robot Navigation

Roberto Valencia-Murillo, Nancy Arana-Daniel, Carlos López-Franco, Alma Y. Alanís
This paper presents the implementation of a non-linear geometric cost function to be used with a learning to search algorithm (LEARCH) to robot navigation in rough terrains. The non-linear function introduced is a neural network trained with geometric entities as inputs (points, lines, spheres, planes)....
Proceedings Article

Improving Performance of Classifiers using Rotational Feature Selection Scheme

Shib Sankar Bhowmick, Indrajit Saha, Luis Rato, Debotosh Bhattacharjee
The crucial points in machine learning research are that how to develop new classification methods with strong mathematic background and/or to improve the performance of existing methods. Over the past few decades, researches have been working on these issues. Here, we emphasis the second point by improving...
Proceedings Article

Does 4G Technology Trigger the S-commerce Era Coming Evidence from Taiwanese ICT Market

Ming-Yuan Hsieh, Chih-Cheng Huang, Kuang-Yu Huang, Hsiu-Wei Hsu
In reviewing of the generalization of wireless technology in the variously relative information and communication technology (ICT) industries, this research systematically explore the potential determinants of the fourth generation (4G) technology to cross-analyze the drivers of the smart-commerce (S-commerce)...
Proceedings Article

Gossip-Pull System-based Dissemination Protocol Satisfying Message Causality Condition

Jinho Ahn, Cha-Young Kim
This paper introduces a group communication protocol ensuring message causality condition based on gossippull systems. The message causality condition can be satisfied by making all multicast messages transferred to group recipients through redundant message sending by sensor brokers, especially based...
Proceedings Article

An Examination of the Concept of Smart School: An Innovation to Address Sustainability

Siavash Omidinia, Maslin Masrom, Harihodin Selamat
The smart school is a technology-based teaching-learning institution for preparing children for the Information Age. To achieve smarts schools educational objectives, these teaching and learning concepts should be covered: curricular, pedagogy, assessment and teaching-learning materials. Information...
Proceedings Article

Relationship between Capital Structure and Performance Evidence based on Information Technology Industry

Chunhua Wang, Meiyan Song
In recent years, capital structure and business performance is researched by many domestic and foreign scholars in-depth. Information technology industry is as a pillar industry and a highly growing industry with a huge potential market supported by our government; research of capital and performance...
Proceedings Article

A New Call Admission Control Strategyfor LTE Femtocell Networks

Jie Wang, Yangfan Qiu
This paper introduces a call admission control (CAC) strategy for LTE femtocell networks supporting multimedia services with different classes of traffic and diverse bandwidth requirements. In this work, the multi-service CAC strategy composes of two parts: subscriber authentication and queuing admission...
Proceedings Article

The Research on NSC Key Service Mechanism in Mobile Network

Chenhe Zhu, Zhiyi Fang, Ying Wang, Qian Xu, Borui Jin
Mobile Network Security Center (NSC) and its key service mechanism is an important part of the mobile network security management. In this paper, based on the analysis of the security requirements of the mobile network, put forward a key service mechanism for mobile networks (NSC), including the management...
Proceedings Article

Study on Information Service Push Strategy based on Networked Manufacture

Xiu-zhen Feng, Chao Su
Based on exploring the characteristics of networked manufacture, we first analyzed the relationships on the networked manufacture. Then, we constructed architecture of information push service for networked manufacture, which is based on the detailed discussion with the related data structure. Furthermore,...
Proceedings Article

Research on the Application of Information Technology in School Sports

Yunyun Du
The paper analyses the role of information technology in the P.E, training and management and analyzes the theoretical and practical basis for the application of information technology in the school sports.It also proposes measures to fully exert the function of information technology in the school sports.