2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015...

33
1 June 06-07, 2015 / Chengdu, China 2015 IEEE International Conference on Communication Software and Networks (IEEE ICCSN 2015) 2015 the 4th International Conference on Intelligent Information Processing (ICIIP 2015) 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015) Conference Schedule Venue: Tibet Hotel, Chengdu NO.1, North Renmin Road, Chengdu, Sichuan–China Phone: 86-28 -83183388-2588. Fax: 86 -28-83185678 http:// http://en.tibet-hotel.com/

Transcript of 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015...

Page 1: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

1

June 06-07, 2015 / Chengdu, China

2015 IEEE International Conference on Communication Software

and Networks (IEEE ICCSN 2015)

2015 the 4th International Conference on Intelligent Information

Processing (ICIIP 2015)

2015 the 4th International Conference on Wireless and Optical

Communications (ICWOC 2015)

Conference Schedule

Venue: Tibet Hotel, Chengdu

NO.1, North Renmin Road, Chengdu, Sichuan–China

Phone: 86-28 -83183388-2588.

Fax: 86 -28-83185678

http:// http://en.tibet-hotel.com/

Page 2: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

2

Take a look at some of what those Conferences have to offer you…

• 4 sessions, on topics as Communication Software and Networks, Intelligent Information Processing,

and Wireless and Optical Communications, and so on.

• Inspiring and thought-provoking keynote presentations: Prof. Yang Xiao, from The University of

Alabama, Tuscaloosa, USA; Prof. Maode Ma, from Nanyang Technological University, Singapore; Prof.

Gang Feng, from University of Electronic Science and Technology of China, China; Prof. Yan Zhu, from

Southwest Jiaotong University, China; Dr. Michael L. Werner, from University of Miami, USA and

Tsinghua University, China.

• Plenty of opportunities to network and forge connections with your fellow attendees from across the

globe, including Keynote Speech Session and Oral presentation Sessions.

Co-sponsored by

Indexed by

Welcome to Chengdu, China to attend 2015 IEEE International Conference on Communication Software and Networks (ICCSN 2015) during June 6-7, 2015, which sponsored by IEEE Beijing Section and hosted by Sichuan Institute of Electronics, in cooperation with UESTC (University of Electronic Science and Technology of China), CETC 54 (The 54th Research Institute of China Electronics Technology Group Corporation), Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory. With another two conferences: 2015 the 4th International Conference on Intelligent Information Processing (ICIIP 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015) normally. We’re confident that over the two days you’ll get theoretical grounding, practical knowledge, and personal contacts that will help you build long-term, profitable and sustainable communication among researchers and practitioners working in a wide variety of scientific areas with a common interest in Communication Software and Networks, Intelligent Information Processing and Wireless and Optical Communications. After several rounds review procedure, the program committee accepted 55 papers to be published in Journal and conference proceedings. We wish to express our sincere appreciation to all the individuals who have contributed to ICCSN 2015, ICIIP 2015 and ICWOC 2015 conference in various ways. Special thanks to IEEE, Sichuan Institue of Electronics, colleagues in conference chair, program committee, technical committees, and so on. One again, we would like to thank all the authors as well as the Program Committee members and reviewers. Their high competence, their enthusiasm, their time and expertise knowledge, enabled us to prepare the high-quality final program and helped to make the conference become a successful event.

Welcome Remarks

Page 3: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

3

Organizing Committee International Advisory Committees

Prof. Chao Lu, Hong Kong Polytechnic University, Hong Kong

Prof. Feng Gang, UESTC, China

Prof. Wu Wei, CETC54, China

Conference Chairs

Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA

Prof. Maode Ma, Nanyang Technological University, Singapore

Prof. Li Qiang, UESTC, China

Prof. Yantao Guo, Science and Technology on Information Transmission and Dissemination

in Communication Networks Laboratory, China

Program Chairs

Prof. Yuexian Zou, Peking University, Shenzhen Graduate School, China

Dr. Ka Wai Gary Wong, The Hong Kong Institute of Education, Hong Kong

Prof. Yuhui Deng, Jinan University, China

Prof. Yan Zhu, Southwest Jiaotong University, China

Technical Committee

Dr. Munienge Mbodila, University of Venda, South Africa

Assoc. Prof. Jinwen Zhu, Missouri Western State University, USA

Prof. Sung-Gi Min, Korea University, Seoul, Korea

Asso. Prof. Saad Mohamed Saad Darwish, Alexandria University, Egypt

Assis. Prof. Hamid Ali Abed AL-Asadi, Basra University, Basra, Iraq.

Prof. G. Anjan Babu, Sri Venkateswara Univeristy, India

Prof. Rahmat Budiarto, Universiti Utara Malaysia (UUM), Malaysia

Prof. Necmi TASPINAR, Erciyes University, Kayseri, Turkey

Dr. Masnida Hussin, University Putra Malaysia

Dr. Kai-Zhi Huang, Tsinghua University,China

Asso. Prof. Post Graduate and Research D.G.Vaishnav College, India

Dr. Chun-Ta Li,Tainan University of Technology, Taiwan

Page 4: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

4

Dr. Cheng-Chi Lee,Fu Jen Catholic University, Taiwan

Dr. Zhu Chen, Broadcom Corporation, USA

Prof. Sonal Chawla, Department of Computer Science and Applications, Panjab University,

India

Prof. Mohammed Abdullah Al Nuem, King Saud University, Kingdom of Saudi Arabia

Prof. Nurfadhlina Mohd Sharef, University of Putra, Malaysia

Prof. Dhavahelvan P, Pondicherry University, India

Prof. Mohammad Hameed Altaei, Head of Information Technology Department in Applied

Science College, Sohar, Oman

Prof. Ziyad Tariq Abdul-Mehdi, Department of Information Technology (IT), Sohar College of

Applied Science, Sultanate of Oman

Prof. David Llewellyn-Jones, Liverpool John Moores University, UK

Prof. Pooria Pasbakhsh, Monash University Sunway Campus, Bandar Sunway, Malaysia

Prof. Iwan Setyawan, Satya Wacana Christian University, Indonesia

Dr. Arjon Turnip, Indonesian Institute of Sciences, Indonesia

Dr. Brandon Bennett, University of Leeds, UK

Page 5: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

5

Items Pages

Welcome 2

General Conference Information 2

Organizing Committee 3-4

Instructions for Oral Workshop 5

Conference Keynote Speakers 6 – 10

Table of Contents 11

Time Table of the Keynote Speech 12-13

SESSION ONE 13 – 17

SESSION TWO 18 – 21

SESSION THREE 22– 25

SESSION FOUR and POSTER SESSION 26– 30

Hotel Information 31

Please you want to take any note 32 –33

Instructions for Oral Workshop *One best presentation will be selected from each session, the best one will be announced and award the certificate at the end of each session. *The Session Chair will have a signature on the certificate

Devices Provided by the Conference Organizer:

Laptops (with MS-Office & Adobe Reader)

Projectors & Screen

Laser Sticks

Materials Provided by the Presenters:

PowerPoint or PDF files

Duration of Each Presentation:

Regular Oral Session: about 15 Minutes of Presentation including Q&A.

Keynote Speech: 45 Minutes of Presentation including Q&A.

About Dress Code

All participants are required to dress formally, casual wear is unacceptable.

National formal dress is acceptable.

Table of Contents

Page 6: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

6

Prof. Yang Xiao,

The University of Alabama, Tuscaloosa, USA

Bio: Dr. Yang Xiao currently is a full professor of Department of

Computer Science at The University of Alabama. He was a voting

member of IEEE 802.11 Working Group from 2001 to 2004. He

served/serves as a panelist for the US National Science Foundation

(NSF), Canada Foundation for Innovation (CFI)'s Telecommunications

expert committee, and the American Institute of Biological Sciences (AIBS), as well as a

referee/reviewer for many national and international funding agencies. His research areas are

security and communications/networks. He has published more than 200 SCI-indexed journal

papers (including 50 IEEE/ACM transactions papers) and over 200 EI-indexed refereed

conference papers and book chapters related to these research areas. Dr. Xiao’s research has

been supported by the US National Science Foundation (NSF), U.S. Army Research, The

Global Environment for Network Innovations (GENI), Fleet Industrial Supply Center-San

Diego (FISCSD), FIATECH, and The University of Alabama's Research Grants Committee.

He currently serves as Editor-in-Chief for International Journal of Security and Networks

(IJSN) and International Journal of Sensor Networks (IJSNet) (SCI-index). Dr. Xiao delivered

15 keynote speeches for international conferences and gave more than 60 invited talks at

different international institutes. Dr. Xiao had directed 9 doctoral dissertations in the past and

is currently supervising 9 Ph.D. students/candidates in computer security and networking

areas. Dr. Xiao also supervised 19 M.S. graduates in the past

Speech Topic: Flow-Net Accountable Logging and Applications

Abstract: Accountability implies that any entity should be held responsible for its own specific action or

behavior so that the entity is part of larger chains of accountability. One of the goals of

accountability is that once an event has transpired, the events that took place are traceable so

that the causes can be determined afterward. The poor accountability provided by today’s

computers and networks wastes a great deal of money and effort. This is due to the simple fact

that today’s computing and network infrastructure was not built with accountability in mind.

In this talk we introduce our previous work: accountable logging methodology called flow-net.

We apply this methodology to many applications ranging from operating system design to

computer networks.

INVITED SPEAKERS

Page 7: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

7

Prof. Gang Feng,

University of Electronic Science and Technology of

China, China Bio: Dr. Gang Feng (M’01, SM’06) received his BEng. and MEng degrees in

Electronic Engineering from the University of Electronic Science and Technology of China

(UESTC), in 1986 and 1989, respectively, and the Ph.D. degrees in Information Engineering

from The Chinese University of Hong Kong in 1998. He joined the School of Electric and

Electronic Engineering, Nanyang Technological University in December 2000 as an assistant

professor and was promoted as an associate professor in October 2005. At present he is a

professor with the National Laboratory of Communications, University of Electronic Science

and Technology of China.

Dr. Feng has extensive research experience and has published widely in computer networking

and wireless networking research. His research interests include resource management in

wireless networks, wireless network coding, sensor networks, etc. Dr. Feng is a senor member

of IEEE.

Speech Topic: Research on Architecture and Resource Management for 5G

Mobile Networks

Abstract:

Mobile communication has been undergoing more than thirty years of explosive growth and

become an infrastructural information network connecting human society. Following the

large-scale commercialization of 4G, the fifth generation of mobile communications (5G),

expected to be commercialized towards year 2020 and beyond, has become a research &

development focus world-wide. In this talk we wil start from the technical scenarios and

challenges of 5G mobile systems, followed by some proposed architecture and key technologies.

Next, we will briefly present our research activities and progresses in the area of 5G

architecture and resource managment, including Software Defined Protocol (SDP), Virtual

Networks Embedding (VNE) for SDN based 5G Architecture, resource allocation for D2D

communications, resource scheduling for mobile multimedia services in hierarchical cloud

networks, and coupled and decoupled heterogeneous cellular networks.

Page 8: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

8

Prof. Yan Zhu,

Southwest Jiaotong University, China

Bio: Dr. Yan Zhu is a professor at the School of Information Science and

Technology (SIST) of Southwest Jiaotong University (SWJTU). She

received her Computer Science PhD degree from Darmstadt University of

Technology, Germany in 2004 and her BSc and MSc degree from the Southwest Jiaotong

University, PRC, both in Computer Science.

She was a research staff member at Department of Computer Science of Darmstadt University

of Technology (Germany) from 1998 to 2004. Before that time she had worked as a research

assistant at Department of Computer Science and Mathematics of Philipps University of

Marburg (Germany) for one year. She has joined the faculty of SWJTU since 2005 and is

leading the Software Engineering Group.

Her research interests span many aspects of Web data and source analysis and management.

She is an ACM and CCF member and serves as a TPC member of several international

conferences and workshops including DEXA2013,CMS2013,CSAE2013 and so on. She has

reviewed for several international journals, e.g. TLDKS and J.UCS. She has published a

number of works, including two books published by Shaker Verlag (Germany, 2004) and

SWJTU Press (China, 2011).

Speech Topic: Multi-degree Detection of Web Spam with Web Quality

Features

Abstract: Web spam refers to some tricks, which try to mislead search engines to increase the rank of some Web

pages than they deserved. Combating Web spam is a significant and urgent task.

In this talk, the taxonomy of Internet spamming and the state-of-art of spam detection are briefly

introduced. A graded detection approach will then be discussed. In this approach, we regard Web spam

as one of Web quality abnormalities and exploit quality features from Web source, content and usage

dimensions. Web spam detection is usually viewed as binomial classification. However, the grey spam

zone between abidance by rules and purely malicious must be ascertained. We investigate the

multinomial classification in terms of Web content risk levels due to different degrees of Web

spamming. The proposed multi-degree classification mechanism can discover Web spam at different

harmful degrees and can put well-directed detection into effect.

Page 9: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

9

Dr. Michael L. Werner,

University of Miami, USA

Visiting Professor, Tsinghua University, China

Bio: Dr. Michael Werner is the Director of Accounting Master’s Programs

at the University of Miami and a visiting professor in the Department of

Accounting at the School of Economics and Management at Tsinghua

University. He is a Certified Public Accountant holds a Master of Professional Accounting and

a PhD in Management Science and Engineering. Michael is a textbook author with

Pearson/Prentice Hall, Kendall Hunt Publishing, and Li Xin Accounting Publishing (Shanghai).

He is past president of the Florida Association of Accounting Educators and currently serves

on its Steering Committee. Michael has a diverse background in accounting, information

systems, management and strategy implementation and is often invited to speak at conferences

and universities in the United States and China.

Speech Topic: Using the Balanced Scorecard to Create Information Systems

that Help Enterprises Establish and Fully Execute Strategy

Abstract: It is increasingly important to develop information systems to motivate team members to fulfill

organizational goals and objectives in accordance with the organization’s strategy. Historically,

enterprise leaders and managers have focused on one or few facets of success, such as

businesses focusing solely on financial profits or academic and research institutions focusing

solely on teaching or research productivity. In today’s competitive global environment, for

organizations to excel, prosper, and maintain viability a more balanced approach is needed. An

adaptation of the balanced scorecard, a management and information system developed by

Harvard professor Robert Kaplan and consultant David Norton can provide a well-organized

backdrop to help formalize a shift from a narrow management focus to one that will help

develop and execute a more balanced strategy. Instead of focusing solely on one or few

perspectives, such as financial objectives, the balanced scorecard is an integrated set of

performance measures organized around four distinct perspectives – financial, customer,

internal, and innovation, learning, and growth. The use of an adaptation of the balanced

scorecard can help organization leaders create balanced strategies and help them manage their

enterprises to achieve full execution of their strategies through the use of objectives, measures,

targets, and initiatives. The presentation will begin with an introduction of an adaptation of the

balanced scorecard, followed by a basic example of its use, and will conclude with a listing of

available printed and online resources for further study and information.

Page 10: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

10

Prof. Maode Ma,

Nanyang Technological University, Singapore

Bio: Dr. Maode Ma received his Ph.D. degree in computer science from

Hong Kong University of Science and Technology in 1999. Now, Dr. Ma

is an Associate Professor in the School of Electrical and Electronic Engineering at Nanyang

Technological University in Singapore. He has extensive research interests including wireless

networking and network security. He has led and/or participated in 18 research projects

funded by government, industry, military and universities in various countries. He has been a

general chair, technical symposium chair, tutorial chair, publication chair, publicity chair and

session chair for more than 70 international conferences. He has been a member of the

technical program committees for more than 180 international conferences. Dr. Ma has more

than 270 international academic publications including more than 120 journal papers and over

150 conference papers. He currently serves as the Editor-in-Chief of International Journal of

Computer and Communication Engineering and International Journal of Electronic Transport.

He also serves as a Senior Editor for IEEE Communications Surveys and Tutorials, and an

Associate Editor for International Journal of Network and Computer Applications,

International Journal of Security and Communication Networks, International Journal of

Wireless Communications and Mobile Computing and International Journal of

Communication Systems. He had been an Associate Editor for IEEE Communications Letters

from 2003 to 2011. Dr. Ma is the Fellow of IET and a senior member of IEEE Communication

Society and IEEE Education Society. He is the Chair of the IEEE Education Society, Singapore

Chapter. He is serving as an IEEE Communication Society Distinguished Lecturer.

Speech Topic: Bandwidth Efficient Multicast in HetNets

Abstract: With the popularity of mobile multimedia applications, multicasting over heterogeneous

networks (HetNets) has become a hot research topic in the field of wireless communications.

Multicasting enables the multimedia applications (e.g., IPTV, video conferencing) to deliver the same

information to a group of users simultaneously via the naturally-broadcasting wireless medium, thereby,

improving the spectral efficiency. On the other hand, since the traditional homogeneous networks

cannot keep pace with the explosive growth of mobile data demands driven by the multimedia

applications, it’s believed that the only scalable way is the interworking of the HetNets.

Within a HetNet, the member stations of a multicast stream are distributed in multiple networks.

Meanwhile, the member stations covered by the same network may experience different channel

conditions and support different modulation and transmission bit-rates. Therefore, the issue of how to

select networks to serve the multicast stream and determine the transmission rate (i.e.,) in each selected

network arises naturally. In this talk, I will address the issue of efficient resource allocation or

bandwidth allocation. As a piece of our recent research work, a novel design of a joint network selection

and rate selection scheme for the multicasting in heterogeneous networks is proposed with an aim to

minimize the overall bandwidth resources consumed by the multicast stream.

Page 11: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

11

Simple Timing Map

Day 1, Saturday, June 06, 2015 Only Registration

(Venue: Lobby of Tibet Hotel )

10:00am - 12:00am

14:00pm - 17:00pm Onsite Registration

Day 2, Sunday, June 07, 2015 / Invited Speaker

(Venue: 17th floor. 唐古拉厅 (Tanggula Conference Room))

08:30am - 08:35am Opening Remark

08:35am - 09:20am Keynote Speech 1

09:20am - 10:05am Keynote Speech 2

10:05am - 10:20am Group Photo & Coffee Break

10:20am - 11:05am Keynote Speech 3

11:05am - 11:50am Keynote Speech 4

12:00pm - 13:30pm Lunch Time (Restaurant of Tibet Hotel)

< Afternoon > Invited Speaker and Break Session

13:30pm –14:15 pm Keynote Speech 5

(Venue: 17th floor.唐古拉厅 (Tanggula Conference Room) )

14:15pm –16:15 pm SESSION ONE

(Venue: 17th floor.唐古拉厅 (Tanggula Conference Room) )

14:15pm –16:15 pm SESSION TWO

(Venue: 17th floor. 红山厅 (Hongshan Conference Room) )

16:15pm – 16:30pm Coffee Break / Tea Time

16:30pm –18:30pm SESSION THREE

(Venue: 17th floor.唐古拉厅 (Tanggula Conference Room) )

16:30pm –18:30pm SESSION FOUR

(Venue: 17th floor. 红山厅 (Hongshan Conference Room) )

Starting at 18:30pm Dinner Time (Restaurant of Tibet Hotel)

Page 12: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

12

Day 1, Saturday, June 06, 2015

<Whole-day Registration>

10:00am - 12:00am

14:00pm - 17:00pm

Venue: Lobby of Tibet Hotel

Arrival, Registration and Conference materials collection

Day 2, Sunday, June 07, 2015

08:40 am - 08:45 am Opening Remark

08:45 am - 09:30 am Keynote Speech 1

Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA

09:30 am - 10:15 am Keynote Speech 2

Prof. Gang Feng, University of Electronic Science and Technology of China, China

10:15am - 10:30am Group Photo & Coffee Break

Page 13: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

13

10:30am - 11:15am Keynote Speech 3

Prof. Yan Zhu, Southwest Jiaotong University, China

11:15am - 12:00am Keynote Speech 4

Dr. Michael L. Werner, University of Miami, USA Visiting Professor, Tsinghua University, China

12:00pm - 13:30pm Lunch Time (Restaurant of Tibet Hotel)

13:30 pm - 14:15 pm Keynote Speech 5

Prof. Maode Ma, Nanyang Technological University, Singapore

Note: All of the keynote speech would be given at the 17th floor: 唐 古 拉 厅(Tanggula Conference Room)

Page 14: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

14

SESSION ONE

< Communication and information system >

14:15 pm -16:15 pm / Venue: the 17th floor, 唐古拉厅 (Tanggula

Conference Room

Session Chair: Prof. Maode Ma, Nanyang Technological University, Singapore

SN020

Analysis and Evaluation of MAI in Short-PRN Communication

System

Chenglong He, Baoguo Yu, Yao Wang

State Key Laboratory of Satellite Navigation and Positioning Engineering, China

< Afternoon > Break Session

14:15pm –16:15 pm

SESSION ONE

(Venue: 17th floor, 唐古拉厅 (Tanggula

Conference Room) )

14:15pm –16:15 pm

SESSION TWO

(Venue: 17th floor, 红山厅 (Hongshan Conference

Room) )

16:15pm – 16:30pm Coffee Break / Tea Time

16:30pm –18:30pm

SESSION THREE

(Venue: 17th floor, 唐古拉厅 (Tanggula

Conference Room) )

16:30pm –18:30pm

SESSION FOUR

(Venue: 17th floor, 红山厅 (Hongshan Conference

Room) )

Starting at 18:30pm Dinner Time (Restaurant of Tibet Hotel)

Page 15: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

15

Keywords: MAI; short-PRN; limited bandwidth; evaluation.

Abstract. How to transmit several links of high information capacity in limited

bandwidth is a key factor of high-speed communication system for the high-speed data

separates the PRN code into short ones, which lead the multiple-access interference

(MAI) serious prejudice the stability and effectiveness of system. Accurate evaluation

methods should be used in system designing while traditional evaluation method has a

large error on BER for the particularity of MAI in short-PRN system. The paper put

forward a analysis and evaluation method based on signal parameters included code

length, code phase, carrier phase, cross-correlation distribution estimated parameter and

so on. A test short-PRN communication system was established and the results prove

the effectiveness of the method.

SN026

The Application of Stochastic Resonance in Parameter Estimation

for PSK Signals

Yafeng Zhan, Chaowei Duan

Tsinghua University, China

Keywords: Stochastic Resonance; PSK; Parameter Estimation; Cramer-Rao Bound.

Abstract. Stochastic Resonance (SR) is a nonlinear phenomenon that the input

signal's signal-to-noise ratio (SNR) could be enhanced under special conditions. This

paper proposes a novel parameter estimation algorithm for PSK signals based on SR. By

introducing a nonlinear system into traditional estimation algorithms to enhance the

signal's SNR, this proposed algorithm can achieve higher accuracy with respect to the

traditional algorithm at the same SNR condition. Computer simulation shows the

efficiency of this new algorithm.

SN033

Types of Information Required for Online Disaster-aid

Management in Solo

Anton Subarno, Chatarina Muryani and Rosihan Ari Yuana

Sebelas Maret University, Surakarta, Indonesia

Keywords: online information, disaster aid, management.

Abstract. People living in vulnerable disasters area often lack of information about

aids for disaster victims. It happens because of limited facilities to communicate

between donors and disaster victims. The objective of this study is to find out the types

of information required for online disaster-aid management. The data of this study were

collected with questionnaires and analyzed by confirmatory factor analysis. This study

involved partners comprising six non-government organizations and Indonesian Red

Cross Organization in Solo. The result of this study shows that the types of information

required for online disaster-aids management consists of eight items, that are general

coordinator, the schedule of disaster rescue exercise, network, expert of disaster, rescue

team, disaster management agency, tools, and logistics center placement. The

information should be provided in website.

The Peak-to-Average Power Ratio (PAPR) reduction in Orthogonal Frequency

Division Multiplexing (OFDM) system has gained widespread attention during the last

Page 16: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

16

decade, leading to the development of several techniques for PAPR reduction. To

benefit from these techniques while overcoming their inherent shortcomings, more

recent work shows the use of hybrid variants of these techniques. In this paper, we

present a brief overview of the hybrid techniques adapted for PAPR reduction. We also

comment on the computational complexity and practicability of these approaches.

Furthermore the paper covers a variety of hybrid techniques combining simple schemes

e.g. clipping, companding and more complex schemes such as partial transmit sequence.

SN035

Improving PAPPR Reduction for OFDM using Hybrid Techniques

Kashif Sultan, Hazrat Ali, Zhongshan Zhang, Fakhar Abbas

University of Science and Technology Beijing, PR China

Keywords: Orthogonal frequency division multiplexing; peak-to-average power ratio;

hybrid technique.

Abstract. The Peak-to-Average Power Ratio (PAPR) reduction in Orthogonal

Frequency Division Multiplexing (OFDM) system has gained widespread attention

during the last decade, leading to the development of several techniques for PAPR

reduction. To benefit from these techniques while overcoming their inherent

shortcomings, more recent work shows the use of hybrid variants of these techniques. In

this paper, we present a brief overview of the hybrid techniques adapted for PAPR

reduction. We also comment on the computational complexity and practicability of

these approaches. Furthermore the paper covers a variety of hybrid techniques

combining simple schemes e.g. clipping, companding and more complex schemes such

as partial transmit sequence.

SN216

A MAI Cancellation Algorithm with Near ML Performance

Yachuan Bao. Baoguo Yu

State Key Laboratory of Satellite Navigation and Positioning Engineering, China

Keywords: Spread spectrum communication, multiple access interference, ML

Performance, low arithmetic complexity..

Abstract. Spread spectrum communication has been widely used in many

communication system because of its anti-interfere and anti-interception properties. The

existing multi access interference (MAI) restraint technology which could be classified

as associated determination and interfere cancellation cannot achieve the unification of

low arithmetic complexity and high determination performance. For instance, the usual

linear associated determination method has low arithmetic complexity but poor

performance, while the maximum likelihood (ML) method has the best performance but

no feasibility. In this article, the causation and the influence to the system performance

of MAI are analyzed systematically based on the theory of spectrum communication,

and the representative methods are described and summarized. Based on normal

interfere cancellation algorithm, a new dimensional reduced associated determination

algorithm with near ML performance is presented and proved to be with low complexity

and near the highest theoretical performance by theoretical calculation, complexity

analysis and simulation validation. This algorithm significantly improves the application

value and feasibility of associated determination technology and has significant

importance in solving the possible MAI problem in the spread spectrum communication

systems in the future.

Page 17: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

17

SN219

Optimal Routing and Wavelength Assignment for Augmented Cubes

in Linear Array Optical Networks

Jheng-Cheng Chen, Meng-Jou Chien, Chang-Hsiung Tsai

National Dong Hwa University, Department of Computer Science and

Information Engineering, Taiwan

Keywords: WDM, Optical network, Routing and wavelength assignment,

Congestion, Linear array, Augmented cube.

Abstract. The augmented cube is a class of communication patterns that are

employed by a number of typical parallel algorithms. It is one of the hypercube

variations, and retains all favorable properties of hypercube. This paper addresses the

routing and wavelength assignment for the augmented cube communication pattern in a

linear array WDM optical network. By using congestion estimation and giving a routing

and wavelength assignment strategy, we prove that the optimal number of wavelengths

is ⌊4(N-1)/├ 3⌋, where N denotes the size of the augmented cube.

SN305

A Method of Satellite Network Fault Synthetic Diagnosis Based on

C4.5 Algorithm and Expert Knowledge Database

Yusheng Lin, Shijie Ding, Yuqing Wang and Jizhao Geng

The 54th Research Institute of China Electronics Technology Group Corporation,

China

Keywords: atellite Network, Fault Diagnosis, C4.5 Algorithm, Expert Knowledge

Database.

Abstract. According to the actual need of fault location of satellite communication

system, a fault synthetic diagnosis method based on C4.5 algorithm and expert

knowledge database is proposed. The basic principle of C4.5 algorithm and expert

knowledge database is discoursed. The process of building C4.5 fault diagnosis model

and expert knowledge database is focused on and the implementation procedure of

diagnosis process is described in detail.

SN321

Communication Network for Smart Grid Interoperability

Jinwen Zhu

Missouri Western State University, USA

Keywords: communication network; smart grid; interoperability; electrical power

system.

Abstract. The promotion of modernized electric network (smart grid) that integrating

control, automation, communication, information, and power technologies to deliver

sustainable energy has been widely recognized. A smart grid system consists of many

different subsystems that might have over millions of consumers and devices, the

demand of its reliability is extremely critical. An interoperable communication network

is a key element for the success of the emerging smart grid to deliver efficiently quality

and reliable energy. In this paper, some of the key communications challenges for

realizing interoperable smart grid are presented. First, the background of smart grid

Page 18: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

18

system is introduced and the interoperability is addressed. Then, smart grid

interoperable reference model (SGIRM) is described, and finally communication

network for interoperability is presented. The aim of this paper is to offer a guideline of

communication network requirements for interoperable smart grid.

SESSION TW0

< Wireless communications and technology >

14:15 pm -16:15 pm / (Venue: 17th floor, 红山厅 (Hongshan

Conference Room) )

Session Chair: TBA

SN007

Micro Mobility Management For Dual Connectivity in LTE HetNets

Min-Soo Woo, Seong-Mun Kim, Seung-Eun Hong and Sung-Gi Min

Korea University, Republic of Korea

Keywords: LTE-A, HetNet, dual connectivity, mobility anchor

Abstract: A Dual Connectivity architecture has been proposed by 3GPP for

enhancement of small cells in long term evolution heterogeneous networks. A Master

eNodeB (MeNB) handles handovers on behalf of the Mobility Management Entity

(MME) and the Serving Gateway (SGW) for secondary eNodeBs (SeNB) located within

the coverage of MeNB. Workloads of the MME and the SGW are moved to the MeNB.

Small cells can be concentrated in crowded downtown or buildings in the heterogeneous

network environment. The number of handovers may be increased due to concentrated

small cells having small coverage, so the workload of the MeNB can be increased inside

the hot spot. We propose a micro mobility management scheme to offload the workload

of the MeNB to other components. The proposed scheme introduces a mobility anchor

(MA) which processes the handovers between SeNBs on behalf of MeNB. Simulation

results indicate the reduction of the workload of the MeNB due to the MA.

SN008

A Novel Robust Algorithm Attenuating Non-Line-of-Sight Errors in

Indoor Localization

Bo You; Xueen Li; Xudong Zhao; Yijun Gao

Institute of Automation, Chinese Academy of Sciences, China

Keywords: indoor localization; NLOS identification and mitigation; self-learning; LS

algorithm.

Abstract. In time of arrival (TOA) based indoor personnel positioning system, the

human body mounted with positioning devices could cause non-line-of-sight (NLOS)

propagation and further give rise to large ranging errors, thus reducing the accuracy of

localization. A novel NLOS identification and mitigation method based on UWB signal

Page 19: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

19

power is proposed in this paper, which solves the problem that the performance of

classical least squares (LS) algorithm severely degrades in NLOS environments. An

improved self-learning LS localization algorithm is also introduced, overcoming the

drawbacks of LS estimator that it requires at least three range estimates for an

unambiguous solution. Furthermore, we demonstrate the proposed approach

outperforms traditional LS algorithm with an increasing localization accuracy by 50% in

NLOS scenarios.

SN010

Physical Layer Security of Maximal Ratio Combining in Underlay

Cognitive Radio Unit over Rayleigh Fading Channels

Hui Zhao, Hequn Liu, Yaping Chqoqing Tang, Gaofeng Pan

Southwest University, China

Keywords: Secrecy outage probability, the probability of nonzero secrecy capacity,

single input multiple output, maximal ratio combining, underlay cognitive radio

networks, Rayleigh fading channels.

Abstract. In this paper, we investigate the secrecy outage performance of maximal

ratio combining (MRC) in cognitive radio networks (CRNs) over Rayleigh fading

channels. In a single input multiple output wiretap system, we consider a secondary user

SU-TX transmits confidential messages to another secondary user SU-RX equipped

with ( ) antennas while MRC technique is adopted to improve its received

signal-to-noise ratio. Meanwhile, an eavesdropper exists to overhear the information

between SU-TX and SU-RX. SU-TX adopts the underlay strategy to meet the quality of

service of the primary user without spectrum sensing. In this paper, we derive the

closed-form expressions for the secrecy outage probability and the probability of

nonzero secrecy capacity of MRC scheme in CRNs over Rayleigh fading channels.

Simulations are conducted to validate the accuracy of our proposed analytical models.

SN019

Research on Multimodal SBAS Technology Supporting Precision

Single Point Positioning

Xingli GAN, BaoGuo Yu

Laboratory of Satellite Navigation and Positioning Engineering, China

Keywords: satellite wide area augmentation system; Precision Point Positioning;

Multimodal.

Abstract. To make satellite navigation system have centimeter positioning accuracy,

the technique of combining precision point positioning (PPP) with multimodal space

based augmentation system (SBAS) was put forward in this paper, some key technology

and function of SBAS system was research. Firstly, by the way of analyzing

fundamental principle of PPP, some necessary conditions for the PPP were determined.

According to those conditions, preliminary design of the multimodal SBAS was

finished. Finally, summarizing usable navigation frequency of the multimodal SBAS,

and according to ITU rule, the frequency band of might carrying high precision orbit

and time correction data was determined.

Page 20: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

20

SN027

Contact Plan Design for Navigation Satellite Network Based on

Simulated Annealing

Hongcheng Yan, Qingjun Zhang, Yong Sun, Jian Guo

Institute of Spacecraft System Engineering, China Academy of Space

Technology, China

Keywords: global navigation satellite system; contact plan design; constraint

optimization; simulated annealing; communication delay; contact graph routing

Abstract. By introducing inter-satellite links (ISLs), global navigation satellite system

(GNSS) can achieve inter-satellite ranging, which can enable autonomous navigation,

and inter-satellite communication, which can enable the GNSS to form a global

network. Due to the resource constraints of satellite platforms, only limited number of

ISLs (e.g. only one ISL) can be equipped on one navigation satellite, which makes the

navigation satellite network a delay/disruption tolerant network (DTN). Generally, the

number of ISLs is less than the number of visible satellites; thus, only those visible

satellites which can together meet an overall goal shall be selected. Therefore, contact

plan, which comprises all future contacts among satellites, needs to be carefully

designed to accommodate the constraints of both inter-satellite ranging and

inter-satellite communication. In this paper, a topology handling scheme based on finite

state automaton is first presented as the orbiting of GNSS is periodic. Secondly, the

contact plan design problem is formulated as a constraint optimization problem with the

inter-satellite ranging as a constraint and inter-satellite communication delay as the

optimization object. Thirdly, a heuristic algorithm based on simulated annealing is

proposed to compute the contact plan. Simulation results show that the delay

performance of optimized contact plan is improved and the delay of contact graph

routing under optimized contact plan is also improved.

SN028

A New Reconfigurable Multi-band Monopole Antenna for Different

Wireless Applications

Abdelheq Boukarkar, Xian Qi Lin, Yuan Jiang

University of Electronic Science and Technology of China

Keywords: reconfigurable; monpole; antenna; wireless

Abstract. A new compact reconfigurable multi-band monopole antenna for different

wireless applications is proposed. The antenna can be reconfigurable using two switches

S1 and S2 modeled as perfect conductors when their states are on. The states of the

switches allow the antenna to have distinct resonant frequencies. The antenna is

fabricated and tested. Good agreement between simulated and measured return loss is

obtained. The antenna has a simple structure, small size, and can cover several

frequency bands by using just two switches; making it distinguishable and suitable for

some wireless applications.

SN032

Data Synchronization on Android Clients

Ashish Kedia, Anusha Prakash

National Institute of Technology Karnataka, Surathkal, India

Page 21: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

21

Keywords: Database, Synchronization, Android, Conflict Resolution.

Abstract. Past decade has witnessed meteoric advances in the field of mobile

computing owing to the development of affordable hardware technologies as well as

user-friendly software platforms. Android, the platform marketed by Google has

boomed in sales over the past few years making it one of the major mobile platforms in

the market. The steady growth of wireless information and communication technology

in convergence with rise in the penetration of Internet has led to the evolution of a wide

range of mobile applications like news, multi-player games, social networking,

messaging, etc. that need to access remote data. For the optimal functioning of all these

applications an efficient synchronization mechanism is vital. However smart-phones

have limited computational resources, power restrictions and intermittent Internet

connections which pose a challenge for smooth synchronization. This paper proposes a

two-way data synchronization mechanism between multiple Android clients and a

central server to address these challenges. We employ a batching logic to ensure

efficient data transfer in poor network environments and a server-side conflict resolution

mechanism to reduce overhead on the clients, which ensures optimal processing and

battery power consumption by the clients.

SN312

Implementation of Novel Vehicles’ Traffic Monitoring Using

Wireless Sensor Network in South Africa

Munienge Mbodila

Computer Science, Science Foundation Unit,University of Venda, Thohoyandou,

South Africa

Keywords: WSN, RFID, sensor networks, traffic control.

Abstract. The road transport profile in the highly developed urban areas in South

Africa (SA) is characterized by sizeable and total dependence on cars. For over the years

now, the amount of vehicles users on SA roads has increased enormously and is

becoming a major concern to transportation specialists and decision makers. At present

there is no automatic system available for vehicle traffic monitoring and congestion

avoidance in SA. The existing methods for traffic management, surveillance and control

are not adequately efficient in terms of performance, cost, maintenance, and support. In

this paper, we present the results of the implementation of our novel model for vehicles

traffic monitoring using wireless sensor network between two major cities in South

Africa namely Johannesburg and Pretoria. Our novel model uses a wireless sensor

network (WSN) as an instrument to control traffic signals along the roadsides, while the

RFID scanner is used to identify vehicles in the congestion areas so that the traffic

officer at the Traffic Monitoring Centre (TMC) can make use of Global Positioning

System (GPS) by establishing the position of the vehicle at any point on the roads and to

determine the appropriate roads for motorists.

16:15pm – 16:30pm Coffee Break / Tea Time

Page 22: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

22

SESSION THREE

< Computer and network security >

16:30 pm -18:30 pm / (Venue: 17th floor.唐古拉厅 (Tanggula

Conference Room) )

Session Chair: Dr. Kashif Sultan, University of Science and Technology Beijing, China

P202

Impact of Movie Streaming over Traditional DVD Movie

Rental—An Empirical Study

Chiang-nan Chao, Niall Hegarty, and Ingrid Fray

Management Department, Tobin College of Business, St. John’s University, USA

Keywords: e-commerce, movie stream, streaming, movie download, movie rental,

DVD rental.

Abstract. Traditional movie DVD rental model has been challenged by a new

business model of movie stream. Movie stream possesses convincing advantages over

the traditional DVD rental. E-commerce shows a trend in the movie industry that

consumers can stream comparable quality movies and TV shows directly from the

Internet instead of waiting for the DVDs in the mail. Thanks to global technology

advancement, movie stream has already prevailed. This study focuses on consumers’

preferences of decision making variables for streaming movie from the Internet and the

traditional DVD movie rental. The results indicate that consumers are shifting from

DVD movie rental to movie stream, while home entertainment industry needs to

improve both in technology and customer service. The consumers favor movie

streaming and make it better competing with other ways of watching movie. The quality

of movie stream and renting DVD disks may be less important for movie viewers.

Movie industry should make movie stream easy to watch.

SN015

A Novel Method of Data Correlation Analysis of the Big Data Based

on Network Clustering Algorithm

Yue Yang, Chunting Wang

Beijing Research and Development Center, The 54th Research Institute, China

Electronics Technology Group Corporation, China

Keywords: big data; data correlation; network clustering algorithm.

Abstract. Nowadays, with the development of information diversification and

complex relationship among the information data, heterogeneous and cyberization are

the main trends of the big data. Therefore, how to analyze and manage the data based on

network analysis is one of the most urgent problems. In this paper, we analyzed the

trends and networking characteristics of current information data development. With the

analysis of current information data and the dimension of the relationship, we mined the

Page 23: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

23

network characteristic of the information data. From the networking dimension of the

data, based on the heterogeneous network and social network, we studied the proposal

method of data correlation to solve the problems in clustering, personal query and social

network prediction.

SN036

An OpenFlow-based Collaborative Intrusion Prevention System for

Cloud Networking

Nen-Fu Huang, I-Ju Liao, Chia-Nan Kao, Chuang Wang, Che-Wei Lin

National Tsing Hua University, Taiwan

Keywords: Intrution Prevention System, Software-Defined Networking (SDN),

OpenFlow, Cloud Computing, Botnet Detection.

Abstract. Software-Defined Networking (SDN) is an emerging architecture that is

ideal for today’s high-bandwidth, dynamic network environments. In this architecture,

the control and data planes are decoupled from each other. Although much research has

been performed into how SDN can resolve some of the most-glaring security issues of

traditional networking, less research has addressed cloud security threats, and, in

particular, botnet/malware detection and in-cloud attacks. This work proposes an

intrusion prevention system for cloud networking with SDN solutions. To realize

collaborative defense, mechanisms of botnet/malware blocking, scan filtering and

honeypot are implemented. Malicious traffic is isolated because bot-infected VMs are

removed effectively and efficiently from the private cloud. The scanning behavior can

be filtered at a very early stage of prevention, making the VMs less exploitable. A

honeypot mechanism is also deployed to trap attackers. Experimental results show the

high detection rate, high prevention accuracy and low vulnerability of the proposed

system.

SN039

A Retargetable Multiple String Matching Code Generation for

Embedded Network Intrusion Detection Platforms

Chia-Nan Kao, Nen-Fu Huang, Yung-Cheng Chang, I-Ju Liao, Rong-Tai Liu,

Hsien-Wei Hung and Che-Wei Lin

National Tsing Hua University, Taiwan

Keywords: Code Generation, String Matching, Intrusion Detection System

Abstract. The common means of defense for network security systems is to block the

intrusions by matching the signatures. Intrusion-signature matching is the critical

operation. However, small and medium-sized enterprise (SME) or Small Office Home

Office (SOHO) network security systems may not have sufficient resources to maintain

good matching performance with full-set rules. Code generation is a technique used to

convert data structures or instruction to other forms to obtain greater benefits within

execution environments. This study analyzes intrusion detection system (IDS)

signatures and discovers character occurrence to be significantly uneven. Based on this

property, this study designs a method to generate a string matching source code

according to the state table of AC algorithm for embedded network intrusion detection

platforms. The generated source code requires less memory and relies not only on table

lookup, but also on the ability of processor. This method can upgrade the performance

by compiling optimization and contribute to the application of network processors and

DSP-like based platforms. From evaluation, this method requires use of only 20%

memory and can achieve 86% performance in clean traffic compared to the original

Page 24: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

24

Aho-Corasick algorithm (AC).

SN210

Privacy-preserving Public Auditing Scheme for Shared Data with

Supporting Multi-function

zhang jianhong, Zhao xubing

North China university of technology, China

Keywords: cloud storage, data sharing, privacy-preserving, data dynamic, active

attack, proxy signature, Lagrange interpolating polynomial.

Abstract. The most common concerns for users in cloud storage are data integrity,

confidentiality and availability, so various data integrity auditing schemes for cloud

storage have been proposed in the past few years, some of which achieve

privacy-preserving public auditing, data sharing and group dynamic, or support data

dynamic. However, as far as we know, until now yet there doesn’t exist a practical

auditing scheme which can simultaneously realize all the functions above; In addition,

in all the existing schemes, block authentication tag (BAT) is adopted by data owner to

achieve data integrity auditing, nevertheless, it’s a arduous task to compute BATs for

the resource-constrained data owner. In this paper, we propose a novel

privacy-preserving public auditing scheme for shared data in the cloud, which can also

support data dynamic operations and group dynamic. Our scheme has the following

advantages:(1) we introduce proxy signature into the existing auditing scheme to reduce

the cloud user’s computation burden; (2) by introducing a Lagrange interpolating

polynomial, our scheme realizes the identity’s privacy-preserving without increasing

computation cost and communication overhead, moreover it makes group dynamic

simple;(3) it can realize the practical and secure dynamic operations of shared data by

combining the Merkle Hash Tree and index-switch table which is built by us; (4) to

protect the data privacy and resist the active attack, the cloud storage server hides the

actual proof information by inserting its private key in producing proof information

process. Theoretical analysis demonstrates our scheme’s security.

SN310

A Novel Algorithm for Circle Curve Fitting Based on the Least

Square Method by the points of the Newton’s rings

Chunlong Fan, Chang Liu

Shenyang Aerospace University, China

Keywords: Circle curve fitting; Newton’s rings; Least square method; Matlab.

Abstract. Circle curve fitting is always the one of the hot issues of the engineering

technology field, circle curve fitting is good or bad depends not only on the fitting

algorithm, also depends on the quality of the fitting data. Especially a certain number of

disturbed observation points with errors are often used to fit a circle, which will impact

the accuracy of least square fitting. This paper proposes an novel method, according to

the data of Newton’s rings special features. Using the software of Matlab automatically

extract the points from the Newton’s rings image, and making circular curve fitting by

least square method. The algorithm can not only effectively extract data on the circle of

the Newton’s rings image with noise, even on incomplete Newton’s rings image, and get

the fitting result with higher accuracy.

Page 25: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

25

SN317

A kind of community detecting algorithm based on modularized

label propagation

Fang Li, Wentao Zhao, Zhifeng Sun, Bin Dong

School of Computer, National University of Defense Technology, China

Keywords: component; label propagation; modularity; complex network; community

structure; greedy.

Abstract. the discovery of high-quality community is a hot spot in social network

analysis and many algorithms have been proposed to discover communities. To find

potential community structures, a community discovery algorithm based on label

propagation will propagate the label of nodes in social networks, but this method

contains uncertainty and randomness, and is very sensitive to the structure of social

networks, which causes the final result to be highly unstable and contains a huge

number of small and fragile societies. Therefore, a novel called

Modular-Label-Propagate-Based algorithm for community discovery is proposed. This

algorithm starts with the propagation of the network vertexes, and then binds the nodes

with compact structure. Label propagation of the vertexes is executed according to the

order of the degree. The thought of greedy method is applied, which works according to

the sequence of the neighbor node size of current vertexes, if the module value

increases, the sequence will be renewed. Experiments have been conducted on data sets

with different characteristics. The experimental results show that modular label

propagation algorithm can significantly improve the quality, effect and stability of the

found communities, and be close to a linear complexity.

SN323

DOA estimation approach using sparse representation for sparse

line array

Tang Bin, Wu Honggang, Peng Wei, Chen Kesong

Department of Electronic Engineering, Chengdu Aeronautic Polytechnic, China

Keywords: DOA estimation; sparse representation; sparse line array; mixed-norm.

Abstract. A new DOA estimation algorithm based on the sparse approximate

representation of the received signals is proposed. Compared with subspace algorithms,

the new algorithm with superresolution, needn’t a priori information of the number of

signals, therefore it can deal with coherent signals. In the novel method, mixed norm

combined 0-norm and 2-norm is used to aid sparse approximate representation, then the

number of signals and signals’ DOA estimation is obtained. The numeric results show

good agreement with the proposed theorem.

Page 26: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

26

SESSION FOUR

< Image Processing Technology >

16:30 pm -18:30 pm / (Venue: 17th floor, 红山厅 (Hongshan

Conference Room) )

Session Chair: Dr. Anton Subarno, Sebelas Maret University, Surakarta, Indonesia

SN013

Second Order Derivative Sampling and Its Application into Image

Scaling

Yong Li

National Defense Science and Technology Key Laboratory, The 54th Research

Institute of China Electronics Technology Group Corporation, China

Keywords: Derivative sampling; FRFT filters; image scaling; SDS formula.

Abstract. In this paper, based on the derivative sampling in the fractional Fourier

transform (FRFT) domain, we present a novel image scaling algorithm. The proposed

algorithm uses the second order derivative sampling (SDS) formula we derived in the

paper, and employs the FRFT filters for the first time. Besides, we have exploited two

evaluation criteria of different image scaling algorithms, the standard deviation for

evaluation of the blur and the average curvature for evaluation of the aliasing.

Experimental results show that our proposed algorithm has fine-edge characteristic, less

blur and aliasing than some classical image scaling algorithms. Moreover, our algorithm

is competitive for quality with the Papoulis algorithm.

SN030

RGB-D Geometric Features Extraction and Edge-based

Scene-SIRFS

Bingjie Yang, Wenjuan Bai, Enqing Chen, Shouyi Yang

Zhengzhou University, china

Keywords: component; RGB-D; geometric features extraction; intrinsic scene

properties recovery.

Abstract. In this paper, we propose a geometric features extraction approach for

RGB-D image and its application in intrinsic scene properties recovery. Our approach

extracts geometric features, and make use of both 3D shape information from depth map

and edge information from RGB image. Geometric features are categorized as occlusion

edges and fold edges. The proposed method can not only extract the edge information

from the RGB–D image accurately and efficiently, but also classify the edge

information effectively. Moreover, our algorithm is close to the real time processing.

Besides, we present an application of these geometric features as edge-based intrinsic

scene properties recovery. Experimental results demonstrate that our proposed of

geometric features extraction and edge-based intrinsic scene properties recovery

Page 27: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

27

outperforms Scene-SIRSF algorithms.

SN105

Application of Residue Number System (RNS) to Image processing

Using Orthogonal Transformation

Emmanuel Ahene and Gabriel Kofi Armah

University of Electronics Science and Technology of China, China

Keywords: RNS; Orthogonal transformation; Walsh Hadamard transform; Fast

Walsh Hadamard transform; Transformation matrix.

Abstract. Several techniques for image encryption have been proposed over the years

with significant consideration of basic cryptographic goals such as authentication,

integrity and confidentiality. Recently, another method for encrypting image data using

an Orthogonal transform namely Walsh Hadamard transform on residual number system

have been proposed. In this paper, we basically analyse this approach and propose an

efficient method for this type of encryption scheme. We modify the transform algorithm

of the previous technique by implementing the Fast Walsh Hadamard transform

algorithm. The fast Walsh Hadamard transform algorithm has been proved to be the

efficient algorithm to compute the Walsh Hadamard transform with computational

complexity of O(N log N). We emphasise that the naive implementation of the Walsh

Hadamard transform yields a computational complexity of O(N2). In this paper we

demonstrate the efficiency of our approach using 32 chosen eigenvalues in the key

generation algorithm. The eigenvalues are derived from a reference image. Throughout

the processes on the image data, we use modular arithmetic to ensure that computations

with the resulting RNS become very efficient. Moreover, the approach considers image

in a divided matrix domain and finally combines all independent cryptographic

operations as encryption is a one-to-one mapping. This deals with the possibility of

having any pixel value ill-stored or wrongly received at the receiver end, without

affecting the decryption process. However, the final recovered image will differ by a

negligible amount.

P07

Personalized Recommendation of Coupon Deals by Keywords

Association Rules

Yi Huang

SAP Asia Pte Ltd, Singapore

Keyword: association rules, coupon deals, keywords, personalized recommendation

system, repeated buying pattern

Abstract: In this paper we focus on personalized recommendation algorithm for

coupon deals, which face “cold start” problem at all times because they only have short

time validity. As our dataset is from a private source, we first analyzed deal

characteristics and found that deals under category “dining”, “wellness” and “activities”

have a high probability of having the same keywords in the deal names, which suggests

a repeated buying pattern. Then we computed the keyword associations from the dataset

and found meaningful patterns. Based on the keyword association rules, we proposed a

new recommendation algorithm which combines baseline algorithm and keyword

association, resulting in significant improvement in percentage of hits, average rank and

Page 28: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

28

mean reciprocal rank.

P104

Vehicle Detection in Satellite Images by Incorporating Objectness

and Convolutional Neural Network

Shenquan Qu, Ying Wang, Gaofeng Meng, Chunhong Pan

Institute of Automation, Chinese Academy of Sciences, China

Keywords: vehicle detection, binary normed gradients (BING), convolutional neural

network (CNN), Objectness.

Abstract Automatic vehicle detection from high-resolution remote sensing images

plays a fundamental role in a wide range of applications. Various approaches have been

proposed to address this issue in decades, however a fast and robust approach has not

yet been found. It is still a very challenging task, due to the complex background,

diverse colors and occlusions caused by buildings and trees. Traditional methods suffer

from either high time complexity or low accuracy rate. To overcome the above

shortcomings and consider the aforementioned difficulties, in this paper, we propose a

simple and efficient approach to detect vehicles automatically. The proposed model lays

emphasis on both speed and accuracy of vehicle detection, thus our proposed model

consists of two stages: (1) To speed up localization, we apply the newly proposed binary

normed gradients (BING) to extract region proposals. (2) To enhance the robustness and

improve the accuracy rate, we use convolutional neural network (CNN), which

combines feature extraction and classification. Therefore we modify the BING and

design our own architecture of CNN to solve our problem. By comparing with

start-of-the-art methods in extensive experiments, we demonstrate the effectiveness of

the proposed approach in both speed and accuracy. Specifically, our method is more

than 10 times faster than traditional methods, and our average accuracy is higher than

state-of-the-art methods.

W003

Group Switch-and-Stay Combining with Branch Partition for Space

Diversity

Yawgeng A. Chau and Mostafa Al-Harbawi.

Yuan Ze University, Taiwan

Keywords: group switch-and-stay combining; space diversity; switch-and-stay

combining; selection combining; optimal switch threshold

Abstract. Group switch-and-stay combining (GSSC) with branch partitions is

proposed for a low-complexity multi-antenna selection in a receiver diversity system.

The GSSC can enhance the performance of conventional switch-and-stay combining

(SSC), and also has a lower complexity than maximal-ratio combining (MRC) or

selection combining (SC). With the GSSC scheme, multiple antenna branches are

divided into non-overlapped groups. In each group, the branch with the maximum

signal-to-noise ratio (SNR) is used for threshold-based group switch. With particular

grouping and threshold choosing, both SC and SSC schemes become different special

cases of the GSSC scheme. For performance illustration, BPSK signaling on

independent and identically distributed (i.i.d.) flat Rayleigh fading channels is

considered, and the corresponding bit error probability (BEP) and outage probability are

derived and manipulated into closed-forms. To minimize the BEP, locally optimal

switch thresholds (STs) are defined and derived. For grouping with the same number of

branches and an identical switch threshold (ST), the locally optimal ST becomes

globally optimal. Numerical results are presented for the performance illustration and

Page 29: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

29

comparison.

W203

Hysteresis Margin and Load Balancing for Handover in

Heterogeneous Network

Ranada Prasad Ray and Lun Tang

Chongqing University of Posts and Telecommunications, China

Keywords: LTE Heterogeneous network, Hysteresis margin, Cell individual offset,

Load balancing.

Abstract. Long Term Evolution (LTE) heterogeneous network can represent

improvement of cell coverage and network capacity by adopting advanced physical

layer techniques. In heterogeneous network, one of the major challenges is the handover

decision between different eNBs. The utilization of the picocells results to use more

network resources and handover procedure. In this paper, we investigate the hysteresis

margin and load balancing problem in a 3GPP LTE heterogeneous network. Firstly, we

consider A3 event, Hysteresis Margin (HM) and Cell Individual Offset (CIO) objectives

are not fixed for every cells. Then we analyze the complexity of the problem and

propose a practical algorithm which calculate adaptive hysteresis margin and load

balancing in heterogeneous network. The results show that our algorithm can lead to

significantly better performances, such as redundant handovers reduction and

improvement of the network performance.

Poster Session

14:15 pm -18:30 pm / (Venue: 17th floor, 红山厅 (Hongshan

Conference Room) )

SN212

An optimized Interference Alignment Algorithm based on

Max-SINR Criterion for MIMO System

Yun Liu, Lijun Zhai

Science and Technology on Transmission and Dissemination in Communication

Networks Laboratory, The 54th Research Institute, China Electronics Technology

Group Corporation, China

Keywords: Green Communications, Multiple-Input Multiple-Output, Interference

Alignment, Precoding, Massive Multiple-Input Multiple-Output.

Abstract. Interference alignment (IA) is one of the promising technologies to solve

the co-channel interference in wireless communication systems. It can effectively

improve system capacity and reliability. Based on consideration of engineering

applications, the realization of interference alignment for three-cell MIMO cooperative

Page 30: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

30

communication system is studied and then a precoding matrices group selection method

based on the maximum of total system signal interference noise ratio (Max-SINR)

criterion was proposed in this paper. Firstly, all the transformation matrices in

cooperative communication system are calculated, and the precoding basis is selected

according to the Max-SINR criterion. Secondly, the precoding matrices and interference

suppression matrices are designed and optimized based on the singular value

decomposition of channel and the maximum chord distance of matrix. Simulation

results show that, the proposed optimized algorithm outperforms other known

interference alignment algorithms in terms of throughput and the energy efficiency.

Further, the optimized algorithm also has advantage in spatial-correlated channel and

has better engineering applicability than other algorithms.

-----------------------------------------End-------------------------------------------

Starting at 18:30 PM

Dinner Time / Venue: Restaurant of Tibet Hotel

(Please Do Bring Your Dinner Coupon To The Restaurant)

Page 31: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

31

Venue: Tibet Hotel, Chengdu North Renmin Road, Chengdu, Sichuan – China(四川省成都市金牛区人民北路1段

10号)

Phone: 86-28 -83183388-2588. Fax: 86 -28-83185678

http:// http://en.tibet-hotel.com/

The Theme hotel of Tibet Culture, it locates in the downtown of Chengdu, which is exactly the window of snowy plateau. May you be happy and healthy at the blessing of auspicious canon! Just a 15-minute walk from Chengdu North Train Station, Chengdu Tibet Hotel features a Tibetan theme with a hint of modern art decor. The luxurious 5-star property offers 4 dining options, a fitness center and a spa. Free parking on site and rooms with free wired internet are provided. Guest rooms are fitted with a personal safe, tea/coffee making facilities and a flat-screen TV with cable channels. The en suite bathroom comes with free toiletries and a bathtub. The hotel has a shop on site selling a variety of Tibetan products. Laundry and dry cleaning services are offered. Red Palace Restaurant and Mingzhu Restaurant both serve a range of Chinese dishes. Guests can enjoy a selection of drinks at the lobby bar. Tibet Hotel Chengdu is a 2-minute walk from North Renmin Road Station Line 1, a 5-minute walk from Wanda Plaza and a 15-minute walk from Wenshu Yuan Monastery. It is a 15-minute drive from Chunxi Road, Kuan Zhai Alley or Jinli Ancient Street. Chengdu Research Base of Giant Panda Breeding is a 25-minute drive away. Chengdu Shuangliu Airport is a 40-minute drive away. Warm Note:

(1) If you miss the June 6’s registration, you can also collect the conference material at the counter any time during June 06-07, 2015

(2) The organizer won't provide accommodation, and we suggest you make an early reservation.

(3) Please bring the printed registration form or notification letter of your paper to register.

(4) If you have any special requirements, please tell the conference staff freely.

Page 32: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

32

Note

Page 33: 2015 IEEE International Conference on Communication ...iciip.org/history/15prog.pdf · 2015), 2015 the 4th International Conference on Wireless and Optical Communications (ICWOC 2015)

33