International Marketplaces - ThinkGlobal Retail 2015 Conference
2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015...
Transcript of 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015...
1
June 06-07, 2015 / Chengdu, China
2015 IEEE International Conference on Communication Software
and Networks (IEEE ICCSN 2015)
2015 the 4th International Conference on Intelligent Information
Processing (ICIIP 2015)
2015 the 4th International Conference on Wireless and Optical
Communications (ICWOC 2015)
Conference Schedule
Venue: Tibet Hotel, Chengdu
NO.1, North Renmin Road, Chengdu, Sichuan–China
Phone: 86-28 -83183388-2588.
Fax: 86 -28-83185678
http:// http://en.tibet-hotel.com/
2
Take a look at some of what those Conferences have to offer you…
• 4 sessions, on topics as Communication Software and Networks, Intelligent Information Processing,
and Wireless and Optical Communications, and so on.
• Inspiring and thought-provoking keynote presentations: Prof. Yang Xiao, from The University of
Alabama, Tuscaloosa, USA; Prof. Maode Ma, from Nanyang Technological University, Singapore; Prof.
Gang Feng, from University of Electronic Science and Technology of China, China; Prof. Yan Zhu, from
Southwest Jiaotong University, China; Dr. Michael L. Werner, from University of Miami, USA and
Tsinghua University, China.
• Plenty of opportunities to network and forge connections with your fellow attendees from across the
globe, including Keynote Speech Session and Oral presentation Sessions.
Co-sponsored by
Indexed by
Welcome to Chengdu, China to attend 2015 IEEE International Conference on Communication Software and Networks (ICCSN 2015) during June 6-7, 2015, which sponsored by IEEE Beijing Section and hosted by Sichuan Institute of Electronics, in cooperation with UESTC (University of Electronic Science and Technology of China), CETC 54 (The 54th Research Institute of China Electronics Technology Group Corporation), Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory. With another two conferences: 2015 the 4th International Conference on Intelligent Information Processing (ICIIP 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015) normally. We’re confident that over the two days you’ll get theoretical grounding, practical knowledge, and personal contacts that will help you build long-term, profitable and sustainable communication among researchers and practitioners working in a wide variety of scientific areas with a common interest in Communication Software and Networks, Intelligent Information Processing and Wireless and Optical Communications. After several rounds review procedure, the program committee accepted 55 papers to be published in Journal and conference proceedings. We wish to express our sincere appreciation to all the individuals who have contributed to ICCSN 2015, ICIIP 2015 and ICWOC 2015 conference in various ways. Special thanks to IEEE, Sichuan Institue of Electronics, colleagues in conference chair, program committee, technical committees, and so on. One again, we would like to thank all the authors as well as the Program Committee members and reviewers. Their high competence, their enthusiasm, their time and expertise knowledge, enabled us to prepare the high-quality final program and helped to make the conference become a successful event.
Welcome Remarks
3
Organizing Committee International Advisory Committees
Prof. Chao Lu, Hong Kong Polytechnic University, Hong Kong
Prof. Feng Gang, UESTC, China
Prof. Wu Wei, CETC54, China
Conference Chairs
Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA
Prof. Maode Ma, Nanyang Technological University, Singapore
Prof. Li Qiang, UESTC, China
Prof. Yantao Guo, Science and Technology on Information Transmission and Dissemination
in Communication Networks Laboratory, China
Program Chairs
Prof. Yuexian Zou, Peking University, Shenzhen Graduate School, China
Dr. Ka Wai Gary Wong, The Hong Kong Institute of Education, Hong Kong
Prof. Yuhui Deng, Jinan University, China
Prof. Yan Zhu, Southwest Jiaotong University, China
Technical Committee
Dr. Munienge Mbodila, University of Venda, South Africa
Assoc. Prof. Jinwen Zhu, Missouri Western State University, USA
Prof. Sung-Gi Min, Korea University, Seoul, Korea
Asso. Prof. Saad Mohamed Saad Darwish, Alexandria University, Egypt
Assis. Prof. Hamid Ali Abed AL-Asadi, Basra University, Basra, Iraq.
Prof. G. Anjan Babu, Sri Venkateswara Univeristy, India
Prof. Rahmat Budiarto, Universiti Utara Malaysia (UUM), Malaysia
Prof. Necmi TASPINAR, Erciyes University, Kayseri, Turkey
Dr. Masnida Hussin, University Putra Malaysia
Dr. Kai-Zhi Huang, Tsinghua University,China
Asso. Prof. Post Graduate and Research D.G.Vaishnav College, India
Dr. Chun-Ta Li,Tainan University of Technology, Taiwan
4
Dr. Cheng-Chi Lee,Fu Jen Catholic University, Taiwan
Dr. Zhu Chen, Broadcom Corporation, USA
Prof. Sonal Chawla, Department of Computer Science and Applications, Panjab University,
India
Prof. Mohammed Abdullah Al Nuem, King Saud University, Kingdom of Saudi Arabia
Prof. Nurfadhlina Mohd Sharef, University of Putra, Malaysia
Prof. Dhavahelvan P, Pondicherry University, India
Prof. Mohammad Hameed Altaei, Head of Information Technology Department in Applied
Science College, Sohar, Oman
Prof. Ziyad Tariq Abdul-Mehdi, Department of Information Technology (IT), Sohar College of
Applied Science, Sultanate of Oman
Prof. David Llewellyn-Jones, Liverpool John Moores University, UK
Prof. Pooria Pasbakhsh, Monash University Sunway Campus, Bandar Sunway, Malaysia
Prof. Iwan Setyawan, Satya Wacana Christian University, Indonesia
Dr. Arjon Turnip, Indonesian Institute of Sciences, Indonesia
Dr. Brandon Bennett, University of Leeds, UK
5
Items Pages
Welcome 2
General Conference Information 2
Organizing Committee 3-4
Instructions for Oral Workshop 5
Conference Keynote Speakers 6 – 10
Table of Contents 11
Time Table of the Keynote Speech 12-13
SESSION ONE 13 – 17
SESSION TWO 18 – 21
SESSION THREE 22– 25
SESSION FOUR and POSTER SESSION 26– 30
Hotel Information 31
Please you want to take any note 32 –33
Instructions for Oral Workshop *One best presentation will be selected from each session, the best one will be announced and award the certificate at the end of each session. *The Session Chair will have a signature on the certificate
Devices Provided by the Conference Organizer:
Laptops (with MS-Office & Adobe Reader)
Projectors & Screen
Laser Sticks
Materials Provided by the Presenters:
PowerPoint or PDF files
Duration of Each Presentation:
Regular Oral Session: about 15 Minutes of Presentation including Q&A.
Keynote Speech: 45 Minutes of Presentation including Q&A.
About Dress Code
All participants are required to dress formally, casual wear is unacceptable.
National formal dress is acceptable.
Table of Contents
6
Prof. Yang Xiao,
The University of Alabama, Tuscaloosa, USA
Bio: Dr. Yang Xiao currently is a full professor of Department of
Computer Science at The University of Alabama. He was a voting
member of IEEE 802.11 Working Group from 2001 to 2004. He
served/serves as a panelist for the US National Science Foundation
(NSF), Canada Foundation for Innovation (CFI)'s Telecommunications
expert committee, and the American Institute of Biological Sciences (AIBS), as well as a
referee/reviewer for many national and international funding agencies. His research areas are
security and communications/networks. He has published more than 200 SCI-indexed journal
papers (including 50 IEEE/ACM transactions papers) and over 200 EI-indexed refereed
conference papers and book chapters related to these research areas. Dr. Xiao’s research has
been supported by the US National Science Foundation (NSF), U.S. Army Research, The
Global Environment for Network Innovations (GENI), Fleet Industrial Supply Center-San
Diego (FISCSD), FIATECH, and The University of Alabama's Research Grants Committee.
He currently serves as Editor-in-Chief for International Journal of Security and Networks
(IJSN) and International Journal of Sensor Networks (IJSNet) (SCI-index). Dr. Xiao delivered
15 keynote speeches for international conferences and gave more than 60 invited talks at
different international institutes. Dr. Xiao had directed 9 doctoral dissertations in the past and
is currently supervising 9 Ph.D. students/candidates in computer security and networking
areas. Dr. Xiao also supervised 19 M.S. graduates in the past
Speech Topic: Flow-Net Accountable Logging and Applications
Abstract: Accountability implies that any entity should be held responsible for its own specific action or
behavior so that the entity is part of larger chains of accountability. One of the goals of
accountability is that once an event has transpired, the events that took place are traceable so
that the causes can be determined afterward. The poor accountability provided by today’s
computers and networks wastes a great deal of money and effort. This is due to the simple fact
that today’s computing and network infrastructure was not built with accountability in mind.
In this talk we introduce our previous work: accountable logging methodology called flow-net.
We apply this methodology to many applications ranging from operating system design to
computer networks.
INVITED SPEAKERS
7
Prof. Gang Feng,
University of Electronic Science and Technology of
China, China Bio: Dr. Gang Feng (M’01, SM’06) received his BEng. and MEng degrees in
Electronic Engineering from the University of Electronic Science and Technology of China
(UESTC), in 1986 and 1989, respectively, and the Ph.D. degrees in Information Engineering
from The Chinese University of Hong Kong in 1998. He joined the School of Electric and
Electronic Engineering, Nanyang Technological University in December 2000 as an assistant
professor and was promoted as an associate professor in October 2005. At present he is a
professor with the National Laboratory of Communications, University of Electronic Science
and Technology of China.
Dr. Feng has extensive research experience and has published widely in computer networking
and wireless networking research. His research interests include resource management in
wireless networks, wireless network coding, sensor networks, etc. Dr. Feng is a senor member
of IEEE.
Speech Topic: Research on Architecture and Resource Management for 5G
Mobile Networks
Abstract:
Mobile communication has been undergoing more than thirty years of explosive growth and
become an infrastructural information network connecting human society. Following the
large-scale commercialization of 4G, the fifth generation of mobile communications (5G),
expected to be commercialized towards year 2020 and beyond, has become a research &
development focus world-wide. In this talk we wil start from the technical scenarios and
challenges of 5G mobile systems, followed by some proposed architecture and key technologies.
Next, we will briefly present our research activities and progresses in the area of 5G
architecture and resource managment, including Software Defined Protocol (SDP), Virtual
Networks Embedding (VNE) for SDN based 5G Architecture, resource allocation for D2D
communications, resource scheduling for mobile multimedia services in hierarchical cloud
networks, and coupled and decoupled heterogeneous cellular networks.
8
Prof. Yan Zhu,
Southwest Jiaotong University, China
Bio: Dr. Yan Zhu is a professor at the School of Information Science and
Technology (SIST) of Southwest Jiaotong University (SWJTU). She
received her Computer Science PhD degree from Darmstadt University of
Technology, Germany in 2004 and her BSc and MSc degree from the Southwest Jiaotong
University, PRC, both in Computer Science.
She was a research staff member at Department of Computer Science of Darmstadt University
of Technology (Germany) from 1998 to 2004. Before that time she had worked as a research
assistant at Department of Computer Science and Mathematics of Philipps University of
Marburg (Germany) for one year. She has joined the faculty of SWJTU since 2005 and is
leading the Software Engineering Group.
Her research interests span many aspects of Web data and source analysis and management.
She is an ACM and CCF member and serves as a TPC member of several international
conferences and workshops including DEXA2013,CMS2013,CSAE2013 and so on. She has
reviewed for several international journals, e.g. TLDKS and J.UCS. She has published a
number of works, including two books published by Shaker Verlag (Germany, 2004) and
SWJTU Press (China, 2011).
Speech Topic: Multi-degree Detection of Web Spam with Web Quality
Features
Abstract: Web spam refers to some tricks, which try to mislead search engines to increase the rank of some Web
pages than they deserved. Combating Web spam is a significant and urgent task.
In this talk, the taxonomy of Internet spamming and the state-of-art of spam detection are briefly
introduced. A graded detection approach will then be discussed. In this approach, we regard Web spam
as one of Web quality abnormalities and exploit quality features from Web source, content and usage
dimensions. Web spam detection is usually viewed as binomial classification. However, the grey spam
zone between abidance by rules and purely malicious must be ascertained. We investigate the
multinomial classification in terms of Web content risk levels due to different degrees of Web
spamming. The proposed multi-degree classification mechanism can discover Web spam at different
harmful degrees and can put well-directed detection into effect.
9
Dr. Michael L. Werner,
University of Miami, USA
Visiting Professor, Tsinghua University, China
Bio: Dr. Michael Werner is the Director of Accounting Master’s Programs
at the University of Miami and a visiting professor in the Department of
Accounting at the School of Economics and Management at Tsinghua
University. He is a Certified Public Accountant holds a Master of Professional Accounting and
a PhD in Management Science and Engineering. Michael is a textbook author with
Pearson/Prentice Hall, Kendall Hunt Publishing, and Li Xin Accounting Publishing (Shanghai).
He is past president of the Florida Association of Accounting Educators and currently serves
on its Steering Committee. Michael has a diverse background in accounting, information
systems, management and strategy implementation and is often invited to speak at conferences
and universities in the United States and China.
Speech Topic: Using the Balanced Scorecard to Create Information Systems
that Help Enterprises Establish and Fully Execute Strategy
Abstract: It is increasingly important to develop information systems to motivate team members to fulfill
organizational goals and objectives in accordance with the organization’s strategy. Historically,
enterprise leaders and managers have focused on one or few facets of success, such as
businesses focusing solely on financial profits or academic and research institutions focusing
solely on teaching or research productivity. In today’s competitive global environment, for
organizations to excel, prosper, and maintain viability a more balanced approach is needed. An
adaptation of the balanced scorecard, a management and information system developed by
Harvard professor Robert Kaplan and consultant David Norton can provide a well-organized
backdrop to help formalize a shift from a narrow management focus to one that will help
develop and execute a more balanced strategy. Instead of focusing solely on one or few
perspectives, such as financial objectives, the balanced scorecard is an integrated set of
performance measures organized around four distinct perspectives – financial, customer,
internal, and innovation, learning, and growth. The use of an adaptation of the balanced
scorecard can help organization leaders create balanced strategies and help them manage their
enterprises to achieve full execution of their strategies through the use of objectives, measures,
targets, and initiatives. The presentation will begin with an introduction of an adaptation of the
balanced scorecard, followed by a basic example of its use, and will conclude with a listing of
available printed and online resources for further study and information.
10
Prof. Maode Ma,
Nanyang Technological University, Singapore
Bio: Dr. Maode Ma received his Ph.D. degree in computer science from
Hong Kong University of Science and Technology in 1999. Now, Dr. Ma
is an Associate Professor in the School of Electrical and Electronic Engineering at Nanyang
Technological University in Singapore. He has extensive research interests including wireless
networking and network security. He has led and/or participated in 18 research projects
funded by government, industry, military and universities in various countries. He has been a
general chair, technical symposium chair, tutorial chair, publication chair, publicity chair and
session chair for more than 70 international conferences. He has been a member of the
technical program committees for more than 180 international conferences. Dr. Ma has more
than 270 international academic publications including more than 120 journal papers and over
150 conference papers. He currently serves as the Editor-in-Chief of International Journal of
Computer and Communication Engineering and International Journal of Electronic Transport.
He also serves as a Senior Editor for IEEE Communications Surveys and Tutorials, and an
Associate Editor for International Journal of Network and Computer Applications,
International Journal of Security and Communication Networks, International Journal of
Wireless Communications and Mobile Computing and International Journal of
Communication Systems. He had been an Associate Editor for IEEE Communications Letters
from 2003 to 2011. Dr. Ma is the Fellow of IET and a senior member of IEEE Communication
Society and IEEE Education Society. He is the Chair of the IEEE Education Society, Singapore
Chapter. He is serving as an IEEE Communication Society Distinguished Lecturer.
Speech Topic: Bandwidth Efficient Multicast in HetNets
Abstract: With the popularity of mobile multimedia applications, multicasting over heterogeneous
networks (HetNets) has become a hot research topic in the field of wireless communications.
Multicasting enables the multimedia applications (e.g., IPTV, video conferencing) to deliver the same
information to a group of users simultaneously via the naturally-broadcasting wireless medium, thereby,
improving the spectral efficiency. On the other hand, since the traditional homogeneous networks
cannot keep pace with the explosive growth of mobile data demands driven by the multimedia
applications, it’s believed that the only scalable way is the interworking of the HetNets.
Within a HetNet, the member stations of a multicast stream are distributed in multiple networks.
Meanwhile, the member stations covered by the same network may experience different channel
conditions and support different modulation and transmission bit-rates. Therefore, the issue of how to
select networks to serve the multicast stream and determine the transmission rate (i.e.,) in each selected
network arises naturally. In this talk, I will address the issue of efficient resource allocation or
bandwidth allocation. As a piece of our recent research work, a novel design of a joint network selection
and rate selection scheme for the multicasting in heterogeneous networks is proposed with an aim to
minimize the overall bandwidth resources consumed by the multicast stream.
11
Simple Timing Map
Day 1, Saturday, June 06, 2015 Only Registration
(Venue: Lobby of Tibet Hotel )
10:00am - 12:00am
14:00pm - 17:00pm Onsite Registration
Day 2, Sunday, June 07, 2015 / Invited Speaker
(Venue: 17th floor. 唐古拉厅 (Tanggula Conference Room))
08:30am - 08:35am Opening Remark
08:35am - 09:20am Keynote Speech 1
09:20am - 10:05am Keynote Speech 2
10:05am - 10:20am Group Photo & Coffee Break
10:20am - 11:05am Keynote Speech 3
11:05am - 11:50am Keynote Speech 4
12:00pm - 13:30pm Lunch Time (Restaurant of Tibet Hotel)
< Afternoon > Invited Speaker and Break Session
13:30pm –14:15 pm Keynote Speech 5
(Venue: 17th floor.唐古拉厅 (Tanggula Conference Room) )
14:15pm –16:15 pm SESSION ONE
(Venue: 17th floor.唐古拉厅 (Tanggula Conference Room) )
14:15pm –16:15 pm SESSION TWO
(Venue: 17th floor. 红山厅 (Hongshan Conference Room) )
16:15pm – 16:30pm Coffee Break / Tea Time
16:30pm –18:30pm SESSION THREE
(Venue: 17th floor.唐古拉厅 (Tanggula Conference Room) )
16:30pm –18:30pm SESSION FOUR
(Venue: 17th floor. 红山厅 (Hongshan Conference Room) )
Starting at 18:30pm Dinner Time (Restaurant of Tibet Hotel)
12
Day 1, Saturday, June 06, 2015
<Whole-day Registration>
10:00am - 12:00am
14:00pm - 17:00pm
Venue: Lobby of Tibet Hotel
Arrival, Registration and Conference materials collection
Day 2, Sunday, June 07, 2015
08:40 am - 08:45 am Opening Remark
08:45 am - 09:30 am Keynote Speech 1
Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA
09:30 am - 10:15 am Keynote Speech 2
Prof. Gang Feng, University of Electronic Science and Technology of China, China
10:15am - 10:30am Group Photo & Coffee Break
13
10:30am - 11:15am Keynote Speech 3
Prof. Yan Zhu, Southwest Jiaotong University, China
11:15am - 12:00am Keynote Speech 4
Dr. Michael L. Werner, University of Miami, USA Visiting Professor, Tsinghua University, China
12:00pm - 13:30pm Lunch Time (Restaurant of Tibet Hotel)
13:30 pm - 14:15 pm Keynote Speech 5
Prof. Maode Ma, Nanyang Technological University, Singapore
Note: All of the keynote speech would be given at the 17th floor: 唐 古 拉 厅(Tanggula Conference Room)
14
SESSION ONE
< Communication and information system >
14:15 pm -16:15 pm / Venue: the 17th floor, 唐古拉厅 (Tanggula
Conference Room
Session Chair: Prof. Maode Ma, Nanyang Technological University, Singapore
SN020
Analysis and Evaluation of MAI in Short-PRN Communication
System
Chenglong He, Baoguo Yu, Yao Wang
State Key Laboratory of Satellite Navigation and Positioning Engineering, China
< Afternoon > Break Session
14:15pm –16:15 pm
SESSION ONE
(Venue: 17th floor, 唐古拉厅 (Tanggula
Conference Room) )
14:15pm –16:15 pm
SESSION TWO
(Venue: 17th floor, 红山厅 (Hongshan Conference
Room) )
16:15pm – 16:30pm Coffee Break / Tea Time
16:30pm –18:30pm
SESSION THREE
(Venue: 17th floor, 唐古拉厅 (Tanggula
Conference Room) )
16:30pm –18:30pm
SESSION FOUR
(Venue: 17th floor, 红山厅 (Hongshan Conference
Room) )
Starting at 18:30pm Dinner Time (Restaurant of Tibet Hotel)
15
Keywords: MAI; short-PRN; limited bandwidth; evaluation.
Abstract. How to transmit several links of high information capacity in limited
bandwidth is a key factor of high-speed communication system for the high-speed data
separates the PRN code into short ones, which lead the multiple-access interference
(MAI) serious prejudice the stability and effectiveness of system. Accurate evaluation
methods should be used in system designing while traditional evaluation method has a
large error on BER for the particularity of MAI in short-PRN system. The paper put
forward a analysis and evaluation method based on signal parameters included code
length, code phase, carrier phase, cross-correlation distribution estimated parameter and
so on. A test short-PRN communication system was established and the results prove
the effectiveness of the method.
SN026
The Application of Stochastic Resonance in Parameter Estimation
for PSK Signals
Yafeng Zhan, Chaowei Duan
Tsinghua University, China
Keywords: Stochastic Resonance; PSK; Parameter Estimation; Cramer-Rao Bound.
Abstract. Stochastic Resonance (SR) is a nonlinear phenomenon that the input
signal's signal-to-noise ratio (SNR) could be enhanced under special conditions. This
paper proposes a novel parameter estimation algorithm for PSK signals based on SR. By
introducing a nonlinear system into traditional estimation algorithms to enhance the
signal's SNR, this proposed algorithm can achieve higher accuracy with respect to the
traditional algorithm at the same SNR condition. Computer simulation shows the
efficiency of this new algorithm.
SN033
Types of Information Required for Online Disaster-aid
Management in Solo
Anton Subarno, Chatarina Muryani and Rosihan Ari Yuana
Sebelas Maret University, Surakarta, Indonesia
Keywords: online information, disaster aid, management.
Abstract. People living in vulnerable disasters area often lack of information about
aids for disaster victims. It happens because of limited facilities to communicate
between donors and disaster victims. The objective of this study is to find out the types
of information required for online disaster-aid management. The data of this study were
collected with questionnaires and analyzed by confirmatory factor analysis. This study
involved partners comprising six non-government organizations and Indonesian Red
Cross Organization in Solo. The result of this study shows that the types of information
required for online disaster-aids management consists of eight items, that are general
coordinator, the schedule of disaster rescue exercise, network, expert of disaster, rescue
team, disaster management agency, tools, and logistics center placement. The
information should be provided in website.
The Peak-to-Average Power Ratio (PAPR) reduction in Orthogonal Frequency
Division Multiplexing (OFDM) system has gained widespread attention during the last
16
decade, leading to the development of several techniques for PAPR reduction. To
benefit from these techniques while overcoming their inherent shortcomings, more
recent work shows the use of hybrid variants of these techniques. In this paper, we
present a brief overview of the hybrid techniques adapted for PAPR reduction. We also
comment on the computational complexity and practicability of these approaches.
Furthermore the paper covers a variety of hybrid techniques combining simple schemes
e.g. clipping, companding and more complex schemes such as partial transmit sequence.
SN035
Improving PAPPR Reduction for OFDM using Hybrid Techniques
Kashif Sultan, Hazrat Ali, Zhongshan Zhang, Fakhar Abbas
University of Science and Technology Beijing, PR China
Keywords: Orthogonal frequency division multiplexing; peak-to-average power ratio;
hybrid technique.
Abstract. The Peak-to-Average Power Ratio (PAPR) reduction in Orthogonal
Frequency Division Multiplexing (OFDM) system has gained widespread attention
during the last decade, leading to the development of several techniques for PAPR
reduction. To benefit from these techniques while overcoming their inherent
shortcomings, more recent work shows the use of hybrid variants of these techniques. In
this paper, we present a brief overview of the hybrid techniques adapted for PAPR
reduction. We also comment on the computational complexity and practicability of
these approaches. Furthermore the paper covers a variety of hybrid techniques
combining simple schemes e.g. clipping, companding and more complex schemes such
as partial transmit sequence.
SN216
A MAI Cancellation Algorithm with Near ML Performance
Yachuan Bao. Baoguo Yu
State Key Laboratory of Satellite Navigation and Positioning Engineering, China
Keywords: Spread spectrum communication, multiple access interference, ML
Performance, low arithmetic complexity..
Abstract. Spread spectrum communication has been widely used in many
communication system because of its anti-interfere and anti-interception properties. The
existing multi access interference (MAI) restraint technology which could be classified
as associated determination and interfere cancellation cannot achieve the unification of
low arithmetic complexity and high determination performance. For instance, the usual
linear associated determination method has low arithmetic complexity but poor
performance, while the maximum likelihood (ML) method has the best performance but
no feasibility. In this article, the causation and the influence to the system performance
of MAI are analyzed systematically based on the theory of spectrum communication,
and the representative methods are described and summarized. Based on normal
interfere cancellation algorithm, a new dimensional reduced associated determination
algorithm with near ML performance is presented and proved to be with low complexity
and near the highest theoretical performance by theoretical calculation, complexity
analysis and simulation validation. This algorithm significantly improves the application
value and feasibility of associated determination technology and has significant
importance in solving the possible MAI problem in the spread spectrum communication
systems in the future.
17
SN219
Optimal Routing and Wavelength Assignment for Augmented Cubes
in Linear Array Optical Networks
Jheng-Cheng Chen, Meng-Jou Chien, Chang-Hsiung Tsai
National Dong Hwa University, Department of Computer Science and
Information Engineering, Taiwan
Keywords: WDM, Optical network, Routing and wavelength assignment,
Congestion, Linear array, Augmented cube.
Abstract. The augmented cube is a class of communication patterns that are
employed by a number of typical parallel algorithms. It is one of the hypercube
variations, and retains all favorable properties of hypercube. This paper addresses the
routing and wavelength assignment for the augmented cube communication pattern in a
linear array WDM optical network. By using congestion estimation and giving a routing
and wavelength assignment strategy, we prove that the optimal number of wavelengths
is ⌊4(N-1)/├ 3⌋, where N denotes the size of the augmented cube.
SN305
A Method of Satellite Network Fault Synthetic Diagnosis Based on
C4.5 Algorithm and Expert Knowledge Database
Yusheng Lin, Shijie Ding, Yuqing Wang and Jizhao Geng
The 54th Research Institute of China Electronics Technology Group Corporation,
China
Keywords: atellite Network, Fault Diagnosis, C4.5 Algorithm, Expert Knowledge
Database.
Abstract. According to the actual need of fault location of satellite communication
system, a fault synthetic diagnosis method based on C4.5 algorithm and expert
knowledge database is proposed. The basic principle of C4.5 algorithm and expert
knowledge database is discoursed. The process of building C4.5 fault diagnosis model
and expert knowledge database is focused on and the implementation procedure of
diagnosis process is described in detail.
SN321
Communication Network for Smart Grid Interoperability
Jinwen Zhu
Missouri Western State University, USA
Keywords: communication network; smart grid; interoperability; electrical power
system.
Abstract. The promotion of modernized electric network (smart grid) that integrating
control, automation, communication, information, and power technologies to deliver
sustainable energy has been widely recognized. A smart grid system consists of many
different subsystems that might have over millions of consumers and devices, the
demand of its reliability is extremely critical. An interoperable communication network
is a key element for the success of the emerging smart grid to deliver efficiently quality
and reliable energy. In this paper, some of the key communications challenges for
realizing interoperable smart grid are presented. First, the background of smart grid
18
system is introduced and the interoperability is addressed. Then, smart grid
interoperable reference model (SGIRM) is described, and finally communication
network for interoperability is presented. The aim of this paper is to offer a guideline of
communication network requirements for interoperable smart grid.
SESSION TW0
< Wireless communications and technology >
14:15 pm -16:15 pm / (Venue: 17th floor, 红山厅 (Hongshan
Conference Room) )
Session Chair: TBA
SN007
Micro Mobility Management For Dual Connectivity in LTE HetNets
Min-Soo Woo, Seong-Mun Kim, Seung-Eun Hong and Sung-Gi Min
Korea University, Republic of Korea
Keywords: LTE-A, HetNet, dual connectivity, mobility anchor
Abstract: A Dual Connectivity architecture has been proposed by 3GPP for
enhancement of small cells in long term evolution heterogeneous networks. A Master
eNodeB (MeNB) handles handovers on behalf of the Mobility Management Entity
(MME) and the Serving Gateway (SGW) for secondary eNodeBs (SeNB) located within
the coverage of MeNB. Workloads of the MME and the SGW are moved to the MeNB.
Small cells can be concentrated in crowded downtown or buildings in the heterogeneous
network environment. The number of handovers may be increased due to concentrated
small cells having small coverage, so the workload of the MeNB can be increased inside
the hot spot. We propose a micro mobility management scheme to offload the workload
of the MeNB to other components. The proposed scheme introduces a mobility anchor
(MA) which processes the handovers between SeNBs on behalf of MeNB. Simulation
results indicate the reduction of the workload of the MeNB due to the MA.
SN008
A Novel Robust Algorithm Attenuating Non-Line-of-Sight Errors in
Indoor Localization
Bo You; Xueen Li; Xudong Zhao; Yijun Gao
Institute of Automation, Chinese Academy of Sciences, China
Keywords: indoor localization; NLOS identification and mitigation; self-learning; LS
algorithm.
Abstract. In time of arrival (TOA) based indoor personnel positioning system, the
human body mounted with positioning devices could cause non-line-of-sight (NLOS)
propagation and further give rise to large ranging errors, thus reducing the accuracy of
localization. A novel NLOS identification and mitigation method based on UWB signal
19
power is proposed in this paper, which solves the problem that the performance of
classical least squares (LS) algorithm severely degrades in NLOS environments. An
improved self-learning LS localization algorithm is also introduced, overcoming the
drawbacks of LS estimator that it requires at least three range estimates for an
unambiguous solution. Furthermore, we demonstrate the proposed approach
outperforms traditional LS algorithm with an increasing localization accuracy by 50% in
NLOS scenarios.
SN010
Physical Layer Security of Maximal Ratio Combining in Underlay
Cognitive Radio Unit over Rayleigh Fading Channels
Hui Zhao, Hequn Liu, Yaping Chqoqing Tang, Gaofeng Pan
Southwest University, China
Keywords: Secrecy outage probability, the probability of nonzero secrecy capacity,
single input multiple output, maximal ratio combining, underlay cognitive radio
networks, Rayleigh fading channels.
Abstract. In this paper, we investigate the secrecy outage performance of maximal
ratio combining (MRC) in cognitive radio networks (CRNs) over Rayleigh fading
channels. In a single input multiple output wiretap system, we consider a secondary user
SU-TX transmits confidential messages to another secondary user SU-RX equipped
with ( ) antennas while MRC technique is adopted to improve its received
signal-to-noise ratio. Meanwhile, an eavesdropper exists to overhear the information
between SU-TX and SU-RX. SU-TX adopts the underlay strategy to meet the quality of
service of the primary user without spectrum sensing. In this paper, we derive the
closed-form expressions for the secrecy outage probability and the probability of
nonzero secrecy capacity of MRC scheme in CRNs over Rayleigh fading channels.
Simulations are conducted to validate the accuracy of our proposed analytical models.
SN019
Research on Multimodal SBAS Technology Supporting Precision
Single Point Positioning
Xingli GAN, BaoGuo Yu
Laboratory of Satellite Navigation and Positioning Engineering, China
Keywords: satellite wide area augmentation system; Precision Point Positioning;
Multimodal.
Abstract. To make satellite navigation system have centimeter positioning accuracy,
the technique of combining precision point positioning (PPP) with multimodal space
based augmentation system (SBAS) was put forward in this paper, some key technology
and function of SBAS system was research. Firstly, by the way of analyzing
fundamental principle of PPP, some necessary conditions for the PPP were determined.
According to those conditions, preliminary design of the multimodal SBAS was
finished. Finally, summarizing usable navigation frequency of the multimodal SBAS,
and according to ITU rule, the frequency band of might carrying high precision orbit
and time correction data was determined.
20
SN027
Contact Plan Design for Navigation Satellite Network Based on
Simulated Annealing
Hongcheng Yan, Qingjun Zhang, Yong Sun, Jian Guo
Institute of Spacecraft System Engineering, China Academy of Space
Technology, China
Keywords: global navigation satellite system; contact plan design; constraint
optimization; simulated annealing; communication delay; contact graph routing
Abstract. By introducing inter-satellite links (ISLs), global navigation satellite system
(GNSS) can achieve inter-satellite ranging, which can enable autonomous navigation,
and inter-satellite communication, which can enable the GNSS to form a global
network. Due to the resource constraints of satellite platforms, only limited number of
ISLs (e.g. only one ISL) can be equipped on one navigation satellite, which makes the
navigation satellite network a delay/disruption tolerant network (DTN). Generally, the
number of ISLs is less than the number of visible satellites; thus, only those visible
satellites which can together meet an overall goal shall be selected. Therefore, contact
plan, which comprises all future contacts among satellites, needs to be carefully
designed to accommodate the constraints of both inter-satellite ranging and
inter-satellite communication. In this paper, a topology handling scheme based on finite
state automaton is first presented as the orbiting of GNSS is periodic. Secondly, the
contact plan design problem is formulated as a constraint optimization problem with the
inter-satellite ranging as a constraint and inter-satellite communication delay as the
optimization object. Thirdly, a heuristic algorithm based on simulated annealing is
proposed to compute the contact plan. Simulation results show that the delay
performance of optimized contact plan is improved and the delay of contact graph
routing under optimized contact plan is also improved.
SN028
A New Reconfigurable Multi-band Monopole Antenna for Different
Wireless Applications
Abdelheq Boukarkar, Xian Qi Lin, Yuan Jiang
University of Electronic Science and Technology of China
Keywords: reconfigurable; monpole; antenna; wireless
Abstract. A new compact reconfigurable multi-band monopole antenna for different
wireless applications is proposed. The antenna can be reconfigurable using two switches
S1 and S2 modeled as perfect conductors when their states are on. The states of the
switches allow the antenna to have distinct resonant frequencies. The antenna is
fabricated and tested. Good agreement between simulated and measured return loss is
obtained. The antenna has a simple structure, small size, and can cover several
frequency bands by using just two switches; making it distinguishable and suitable for
some wireless applications.
SN032
Data Synchronization on Android Clients
Ashish Kedia, Anusha Prakash
National Institute of Technology Karnataka, Surathkal, India
21
Keywords: Database, Synchronization, Android, Conflict Resolution.
Abstract. Past decade has witnessed meteoric advances in the field of mobile
computing owing to the development of affordable hardware technologies as well as
user-friendly software platforms. Android, the platform marketed by Google has
boomed in sales over the past few years making it one of the major mobile platforms in
the market. The steady growth of wireless information and communication technology
in convergence with rise in the penetration of Internet has led to the evolution of a wide
range of mobile applications like news, multi-player games, social networking,
messaging, etc. that need to access remote data. For the optimal functioning of all these
applications an efficient synchronization mechanism is vital. However smart-phones
have limited computational resources, power restrictions and intermittent Internet
connections which pose a challenge for smooth synchronization. This paper proposes a
two-way data synchronization mechanism between multiple Android clients and a
central server to address these challenges. We employ a batching logic to ensure
efficient data transfer in poor network environments and a server-side conflict resolution
mechanism to reduce overhead on the clients, which ensures optimal processing and
battery power consumption by the clients.
SN312
Implementation of Novel Vehicles’ Traffic Monitoring Using
Wireless Sensor Network in South Africa
Munienge Mbodila
Computer Science, Science Foundation Unit,University of Venda, Thohoyandou,
South Africa
Keywords: WSN, RFID, sensor networks, traffic control.
Abstract. The road transport profile in the highly developed urban areas in South
Africa (SA) is characterized by sizeable and total dependence on cars. For over the years
now, the amount of vehicles users on SA roads has increased enormously and is
becoming a major concern to transportation specialists and decision makers. At present
there is no automatic system available for vehicle traffic monitoring and congestion
avoidance in SA. The existing methods for traffic management, surveillance and control
are not adequately efficient in terms of performance, cost, maintenance, and support. In
this paper, we present the results of the implementation of our novel model for vehicles
traffic monitoring using wireless sensor network between two major cities in South
Africa namely Johannesburg and Pretoria. Our novel model uses a wireless sensor
network (WSN) as an instrument to control traffic signals along the roadsides, while the
RFID scanner is used to identify vehicles in the congestion areas so that the traffic
officer at the Traffic Monitoring Centre (TMC) can make use of Global Positioning
System (GPS) by establishing the position of the vehicle at any point on the roads and to
determine the appropriate roads for motorists.
16:15pm – 16:30pm Coffee Break / Tea Time
22
SESSION THREE
< Computer and network security >
16:30 pm -18:30 pm / (Venue: 17th floor.唐古拉厅 (Tanggula
Conference Room) )
Session Chair: Dr. Kashif Sultan, University of Science and Technology Beijing, China
P202
Impact of Movie Streaming over Traditional DVD Movie
Rental—An Empirical Study
Chiang-nan Chao, Niall Hegarty, and Ingrid Fray
Management Department, Tobin College of Business, St. John’s University, USA
Keywords: e-commerce, movie stream, streaming, movie download, movie rental,
DVD rental.
Abstract. Traditional movie DVD rental model has been challenged by a new
business model of movie stream. Movie stream possesses convincing advantages over
the traditional DVD rental. E-commerce shows a trend in the movie industry that
consumers can stream comparable quality movies and TV shows directly from the
Internet instead of waiting for the DVDs in the mail. Thanks to global technology
advancement, movie stream has already prevailed. This study focuses on consumers’
preferences of decision making variables for streaming movie from the Internet and the
traditional DVD movie rental. The results indicate that consumers are shifting from
DVD movie rental to movie stream, while home entertainment industry needs to
improve both in technology and customer service. The consumers favor movie
streaming and make it better competing with other ways of watching movie. The quality
of movie stream and renting DVD disks may be less important for movie viewers.
Movie industry should make movie stream easy to watch.
SN015
A Novel Method of Data Correlation Analysis of the Big Data Based
on Network Clustering Algorithm
Yue Yang, Chunting Wang
Beijing Research and Development Center, The 54th Research Institute, China
Electronics Technology Group Corporation, China
Keywords: big data; data correlation; network clustering algorithm.
Abstract. Nowadays, with the development of information diversification and
complex relationship among the information data, heterogeneous and cyberization are
the main trends of the big data. Therefore, how to analyze and manage the data based on
network analysis is one of the most urgent problems. In this paper, we analyzed the
trends and networking characteristics of current information data development. With the
analysis of current information data and the dimension of the relationship, we mined the
23
network characteristic of the information data. From the networking dimension of the
data, based on the heterogeneous network and social network, we studied the proposal
method of data correlation to solve the problems in clustering, personal query and social
network prediction.
SN036
An OpenFlow-based Collaborative Intrusion Prevention System for
Cloud Networking
Nen-Fu Huang, I-Ju Liao, Chia-Nan Kao, Chuang Wang, Che-Wei Lin
National Tsing Hua University, Taiwan
Keywords: Intrution Prevention System, Software-Defined Networking (SDN),
OpenFlow, Cloud Computing, Botnet Detection.
Abstract. Software-Defined Networking (SDN) is an emerging architecture that is
ideal for today’s high-bandwidth, dynamic network environments. In this architecture,
the control and data planes are decoupled from each other. Although much research has
been performed into how SDN can resolve some of the most-glaring security issues of
traditional networking, less research has addressed cloud security threats, and, in
particular, botnet/malware detection and in-cloud attacks. This work proposes an
intrusion prevention system for cloud networking with SDN solutions. To realize
collaborative defense, mechanisms of botnet/malware blocking, scan filtering and
honeypot are implemented. Malicious traffic is isolated because bot-infected VMs are
removed effectively and efficiently from the private cloud. The scanning behavior can
be filtered at a very early stage of prevention, making the VMs less exploitable. A
honeypot mechanism is also deployed to trap attackers. Experimental results show the
high detection rate, high prevention accuracy and low vulnerability of the proposed
system.
SN039
A Retargetable Multiple String Matching Code Generation for
Embedded Network Intrusion Detection Platforms
Chia-Nan Kao, Nen-Fu Huang, Yung-Cheng Chang, I-Ju Liao, Rong-Tai Liu,
Hsien-Wei Hung and Che-Wei Lin
National Tsing Hua University, Taiwan
Keywords: Code Generation, String Matching, Intrusion Detection System
Abstract. The common means of defense for network security systems is to block the
intrusions by matching the signatures. Intrusion-signature matching is the critical
operation. However, small and medium-sized enterprise (SME) or Small Office Home
Office (SOHO) network security systems may not have sufficient resources to maintain
good matching performance with full-set rules. Code generation is a technique used to
convert data structures or instruction to other forms to obtain greater benefits within
execution environments. This study analyzes intrusion detection system (IDS)
signatures and discovers character occurrence to be significantly uneven. Based on this
property, this study designs a method to generate a string matching source code
according to the state table of AC algorithm for embedded network intrusion detection
platforms. The generated source code requires less memory and relies not only on table
lookup, but also on the ability of processor. This method can upgrade the performance
by compiling optimization and contribute to the application of network processors and
DSP-like based platforms. From evaluation, this method requires use of only 20%
memory and can achieve 86% performance in clean traffic compared to the original
24
Aho-Corasick algorithm (AC).
SN210
Privacy-preserving Public Auditing Scheme for Shared Data with
Supporting Multi-function
zhang jianhong, Zhao xubing
North China university of technology, China
Keywords: cloud storage, data sharing, privacy-preserving, data dynamic, active
attack, proxy signature, Lagrange interpolating polynomial.
Abstract. The most common concerns for users in cloud storage are data integrity,
confidentiality and availability, so various data integrity auditing schemes for cloud
storage have been proposed in the past few years, some of which achieve
privacy-preserving public auditing, data sharing and group dynamic, or support data
dynamic. However, as far as we know, until now yet there doesn’t exist a practical
auditing scheme which can simultaneously realize all the functions above; In addition,
in all the existing schemes, block authentication tag (BAT) is adopted by data owner to
achieve data integrity auditing, nevertheless, it’s a arduous task to compute BATs for
the resource-constrained data owner. In this paper, we propose a novel
privacy-preserving public auditing scheme for shared data in the cloud, which can also
support data dynamic operations and group dynamic. Our scheme has the following
advantages:(1) we introduce proxy signature into the existing auditing scheme to reduce
the cloud user’s computation burden; (2) by introducing a Lagrange interpolating
polynomial, our scheme realizes the identity’s privacy-preserving without increasing
computation cost and communication overhead, moreover it makes group dynamic
simple;(3) it can realize the practical and secure dynamic operations of shared data by
combining the Merkle Hash Tree and index-switch table which is built by us; (4) to
protect the data privacy and resist the active attack, the cloud storage server hides the
actual proof information by inserting its private key in producing proof information
process. Theoretical analysis demonstrates our scheme’s security.
SN310
A Novel Algorithm for Circle Curve Fitting Based on the Least
Square Method by the points of the Newton’s rings
Chunlong Fan, Chang Liu
Shenyang Aerospace University, China
Keywords: Circle curve fitting; Newton’s rings; Least square method; Matlab.
Abstract. Circle curve fitting is always the one of the hot issues of the engineering
technology field, circle curve fitting is good or bad depends not only on the fitting
algorithm, also depends on the quality of the fitting data. Especially a certain number of
disturbed observation points with errors are often used to fit a circle, which will impact
the accuracy of least square fitting. This paper proposes an novel method, according to
the data of Newton’s rings special features. Using the software of Matlab automatically
extract the points from the Newton’s rings image, and making circular curve fitting by
least square method. The algorithm can not only effectively extract data on the circle of
the Newton’s rings image with noise, even on incomplete Newton’s rings image, and get
the fitting result with higher accuracy.
25
SN317
A kind of community detecting algorithm based on modularized
label propagation
Fang Li, Wentao Zhao, Zhifeng Sun, Bin Dong
School of Computer, National University of Defense Technology, China
Keywords: component; label propagation; modularity; complex network; community
structure; greedy.
Abstract. the discovery of high-quality community is a hot spot in social network
analysis and many algorithms have been proposed to discover communities. To find
potential community structures, a community discovery algorithm based on label
propagation will propagate the label of nodes in social networks, but this method
contains uncertainty and randomness, and is very sensitive to the structure of social
networks, which causes the final result to be highly unstable and contains a huge
number of small and fragile societies. Therefore, a novel called
Modular-Label-Propagate-Based algorithm for community discovery is proposed. This
algorithm starts with the propagation of the network vertexes, and then binds the nodes
with compact structure. Label propagation of the vertexes is executed according to the
order of the degree. The thought of greedy method is applied, which works according to
the sequence of the neighbor node size of current vertexes, if the module value
increases, the sequence will be renewed. Experiments have been conducted on data sets
with different characteristics. The experimental results show that modular label
propagation algorithm can significantly improve the quality, effect and stability of the
found communities, and be close to a linear complexity.
SN323
DOA estimation approach using sparse representation for sparse
line array
Tang Bin, Wu Honggang, Peng Wei, Chen Kesong
Department of Electronic Engineering, Chengdu Aeronautic Polytechnic, China
Keywords: DOA estimation; sparse representation; sparse line array; mixed-norm.
Abstract. A new DOA estimation algorithm based on the sparse approximate
representation of the received signals is proposed. Compared with subspace algorithms,
the new algorithm with superresolution, needn’t a priori information of the number of
signals, therefore it can deal with coherent signals. In the novel method, mixed norm
combined 0-norm and 2-norm is used to aid sparse approximate representation, then the
number of signals and signals’ DOA estimation is obtained. The numeric results show
good agreement with the proposed theorem.
26
SESSION FOUR
< Image Processing Technology >
16:30 pm -18:30 pm / (Venue: 17th floor, 红山厅 (Hongshan
Conference Room) )
Session Chair: Dr. Anton Subarno, Sebelas Maret University, Surakarta, Indonesia
SN013
Second Order Derivative Sampling and Its Application into Image
Scaling
Yong Li
National Defense Science and Technology Key Laboratory, The 54th Research
Institute of China Electronics Technology Group Corporation, China
Keywords: Derivative sampling; FRFT filters; image scaling; SDS formula.
Abstract. In this paper, based on the derivative sampling in the fractional Fourier
transform (FRFT) domain, we present a novel image scaling algorithm. The proposed
algorithm uses the second order derivative sampling (SDS) formula we derived in the
paper, and employs the FRFT filters for the first time. Besides, we have exploited two
evaluation criteria of different image scaling algorithms, the standard deviation for
evaluation of the blur and the average curvature for evaluation of the aliasing.
Experimental results show that our proposed algorithm has fine-edge characteristic, less
blur and aliasing than some classical image scaling algorithms. Moreover, our algorithm
is competitive for quality with the Papoulis algorithm.
SN030
RGB-D Geometric Features Extraction and Edge-based
Scene-SIRFS
Bingjie Yang, Wenjuan Bai, Enqing Chen, Shouyi Yang
Zhengzhou University, china
Keywords: component; RGB-D; geometric features extraction; intrinsic scene
properties recovery.
Abstract. In this paper, we propose a geometric features extraction approach for
RGB-D image and its application in intrinsic scene properties recovery. Our approach
extracts geometric features, and make use of both 3D shape information from depth map
and edge information from RGB image. Geometric features are categorized as occlusion
edges and fold edges. The proposed method can not only extract the edge information
from the RGB–D image accurately and efficiently, but also classify the edge
information effectively. Moreover, our algorithm is close to the real time processing.
Besides, we present an application of these geometric features as edge-based intrinsic
scene properties recovery. Experimental results demonstrate that our proposed of
geometric features extraction and edge-based intrinsic scene properties recovery
27
outperforms Scene-SIRSF algorithms.
SN105
Application of Residue Number System (RNS) to Image processing
Using Orthogonal Transformation
Emmanuel Ahene and Gabriel Kofi Armah
University of Electronics Science and Technology of China, China
Keywords: RNS; Orthogonal transformation; Walsh Hadamard transform; Fast
Walsh Hadamard transform; Transformation matrix.
Abstract. Several techniques for image encryption have been proposed over the years
with significant consideration of basic cryptographic goals such as authentication,
integrity and confidentiality. Recently, another method for encrypting image data using
an Orthogonal transform namely Walsh Hadamard transform on residual number system
have been proposed. In this paper, we basically analyse this approach and propose an
efficient method for this type of encryption scheme. We modify the transform algorithm
of the previous technique by implementing the Fast Walsh Hadamard transform
algorithm. The fast Walsh Hadamard transform algorithm has been proved to be the
efficient algorithm to compute the Walsh Hadamard transform with computational
complexity of O(N log N). We emphasise that the naive implementation of the Walsh
Hadamard transform yields a computational complexity of O(N2). In this paper we
demonstrate the efficiency of our approach using 32 chosen eigenvalues in the key
generation algorithm. The eigenvalues are derived from a reference image. Throughout
the processes on the image data, we use modular arithmetic to ensure that computations
with the resulting RNS become very efficient. Moreover, the approach considers image
in a divided matrix domain and finally combines all independent cryptographic
operations as encryption is a one-to-one mapping. This deals with the possibility of
having any pixel value ill-stored or wrongly received at the receiver end, without
affecting the decryption process. However, the final recovered image will differ by a
negligible amount.
P07
Personalized Recommendation of Coupon Deals by Keywords
Association Rules
Yi Huang
SAP Asia Pte Ltd, Singapore
Keyword: association rules, coupon deals, keywords, personalized recommendation
system, repeated buying pattern
Abstract: In this paper we focus on personalized recommendation algorithm for
coupon deals, which face “cold start” problem at all times because they only have short
time validity. As our dataset is from a private source, we first analyzed deal
characteristics and found that deals under category “dining”, “wellness” and “activities”
have a high probability of having the same keywords in the deal names, which suggests
a repeated buying pattern. Then we computed the keyword associations from the dataset
and found meaningful patterns. Based on the keyword association rules, we proposed a
new recommendation algorithm which combines baseline algorithm and keyword
association, resulting in significant improvement in percentage of hits, average rank and
28
mean reciprocal rank.
P104
Vehicle Detection in Satellite Images by Incorporating Objectness
and Convolutional Neural Network
Shenquan Qu, Ying Wang, Gaofeng Meng, Chunhong Pan
Institute of Automation, Chinese Academy of Sciences, China
Keywords: vehicle detection, binary normed gradients (BING), convolutional neural
network (CNN), Objectness.
Abstract Automatic vehicle detection from high-resolution remote sensing images
plays a fundamental role in a wide range of applications. Various approaches have been
proposed to address this issue in decades, however a fast and robust approach has not
yet been found. It is still a very challenging task, due to the complex background,
diverse colors and occlusions caused by buildings and trees. Traditional methods suffer
from either high time complexity or low accuracy rate. To overcome the above
shortcomings and consider the aforementioned difficulties, in this paper, we propose a
simple and efficient approach to detect vehicles automatically. The proposed model lays
emphasis on both speed and accuracy of vehicle detection, thus our proposed model
consists of two stages: (1) To speed up localization, we apply the newly proposed binary
normed gradients (BING) to extract region proposals. (2) To enhance the robustness and
improve the accuracy rate, we use convolutional neural network (CNN), which
combines feature extraction and classification. Therefore we modify the BING and
design our own architecture of CNN to solve our problem. By comparing with
start-of-the-art methods in extensive experiments, we demonstrate the effectiveness of
the proposed approach in both speed and accuracy. Specifically, our method is more
than 10 times faster than traditional methods, and our average accuracy is higher than
state-of-the-art methods.
W003
Group Switch-and-Stay Combining with Branch Partition for Space
Diversity
Yawgeng A. Chau and Mostafa Al-Harbawi.
Yuan Ze University, Taiwan
Keywords: group switch-and-stay combining; space diversity; switch-and-stay
combining; selection combining; optimal switch threshold
Abstract. Group switch-and-stay combining (GSSC) with branch partitions is
proposed for a low-complexity multi-antenna selection in a receiver diversity system.
The GSSC can enhance the performance of conventional switch-and-stay combining
(SSC), and also has a lower complexity than maximal-ratio combining (MRC) or
selection combining (SC). With the GSSC scheme, multiple antenna branches are
divided into non-overlapped groups. In each group, the branch with the maximum
signal-to-noise ratio (SNR) is used for threshold-based group switch. With particular
grouping and threshold choosing, both SC and SSC schemes become different special
cases of the GSSC scheme. For performance illustration, BPSK signaling on
independent and identically distributed (i.i.d.) flat Rayleigh fading channels is
considered, and the corresponding bit error probability (BEP) and outage probability are
derived and manipulated into closed-forms. To minimize the BEP, locally optimal
switch thresholds (STs) are defined and derived. For grouping with the same number of
branches and an identical switch threshold (ST), the locally optimal ST becomes
globally optimal. Numerical results are presented for the performance illustration and
29
comparison.
W203
Hysteresis Margin and Load Balancing for Handover in
Heterogeneous Network
Ranada Prasad Ray and Lun Tang
Chongqing University of Posts and Telecommunications, China
Keywords: LTE Heterogeneous network, Hysteresis margin, Cell individual offset,
Load balancing.
Abstract. Long Term Evolution (LTE) heterogeneous network can represent
improvement of cell coverage and network capacity by adopting advanced physical
layer techniques. In heterogeneous network, one of the major challenges is the handover
decision between different eNBs. The utilization of the picocells results to use more
network resources and handover procedure. In this paper, we investigate the hysteresis
margin and load balancing problem in a 3GPP LTE heterogeneous network. Firstly, we
consider A3 event, Hysteresis Margin (HM) and Cell Individual Offset (CIO) objectives
are not fixed for every cells. Then we analyze the complexity of the problem and
propose a practical algorithm which calculate adaptive hysteresis margin and load
balancing in heterogeneous network. The results show that our algorithm can lead to
significantly better performances, such as redundant handovers reduction and
improvement of the network performance.
Poster Session
14:15 pm -18:30 pm / (Venue: 17th floor, 红山厅 (Hongshan
Conference Room) )
SN212
An optimized Interference Alignment Algorithm based on
Max-SINR Criterion for MIMO System
Yun Liu, Lijun Zhai
Science and Technology on Transmission and Dissemination in Communication
Networks Laboratory, The 54th Research Institute, China Electronics Technology
Group Corporation, China
Keywords: Green Communications, Multiple-Input Multiple-Output, Interference
Alignment, Precoding, Massive Multiple-Input Multiple-Output.
Abstract. Interference alignment (IA) is one of the promising technologies to solve
the co-channel interference in wireless communication systems. It can effectively
improve system capacity and reliability. Based on consideration of engineering
applications, the realization of interference alignment for three-cell MIMO cooperative
30
communication system is studied and then a precoding matrices group selection method
based on the maximum of total system signal interference noise ratio (Max-SINR)
criterion was proposed in this paper. Firstly, all the transformation matrices in
cooperative communication system are calculated, and the precoding basis is selected
according to the Max-SINR criterion. Secondly, the precoding matrices and interference
suppression matrices are designed and optimized based on the singular value
decomposition of channel and the maximum chord distance of matrix. Simulation
results show that, the proposed optimized algorithm outperforms other known
interference alignment algorithms in terms of throughput and the energy efficiency.
Further, the optimized algorithm also has advantage in spatial-correlated channel and
has better engineering applicability than other algorithms.
-----------------------------------------End-------------------------------------------
Starting at 18:30 PM
Dinner Time / Venue: Restaurant of Tibet Hotel
(Please Do Bring Your Dinner Coupon To The Restaurant)
31
Venue: Tibet Hotel, Chengdu North Renmin Road, Chengdu, Sichuan – China(四川省成都市金牛区人民北路1段
10号)
Phone: 86-28 -83183388-2588. Fax: 86 -28-83185678
http:// http://en.tibet-hotel.com/
The Theme hotel of Tibet Culture, it locates in the downtown of Chengdu, which is exactly the window of snowy plateau. May you be happy and healthy at the blessing of auspicious canon! Just a 15-minute walk from Chengdu North Train Station, Chengdu Tibet Hotel features a Tibetan theme with a hint of modern art decor. The luxurious 5-star property offers 4 dining options, a fitness center and a spa. Free parking on site and rooms with free wired internet are provided. Guest rooms are fitted with a personal safe, tea/coffee making facilities and a flat-screen TV with cable channels. The en suite bathroom comes with free toiletries and a bathtub. The hotel has a shop on site selling a variety of Tibetan products. Laundry and dry cleaning services are offered. Red Palace Restaurant and Mingzhu Restaurant both serve a range of Chinese dishes. Guests can enjoy a selection of drinks at the lobby bar. Tibet Hotel Chengdu is a 2-minute walk from North Renmin Road Station Line 1, a 5-minute walk from Wanda Plaza and a 15-minute walk from Wenshu Yuan Monastery. It is a 15-minute drive from Chunxi Road, Kuan Zhai Alley or Jinli Ancient Street. Chengdu Research Base of Giant Panda Breeding is a 25-minute drive away. Chengdu Shuangliu Airport is a 40-minute drive away. Warm Note:
(1) If you miss the June 6’s registration, you can also collect the conference material at the counter any time during June 06-07, 2015
(2) The organizer won't provide accommodation, and we suggest you make an early reservation.
(3) Please bring the printed registration form or notification letter of your paper to register.
(4) If you have any special requirements, please tell the conference staff freely.
32
Note
33