Click - 2014 International Conference on Communication and Signal

Bangkok, Thailand
October 10-12, 2014
пЂє ICFIT 2014
2014 5th International Conference on Future Information Technology
пЂє ICCSM 2014
2014 4th International Conference on Computer and Software Modeling
пЂє ICCSP 2014
2014 International Conference on Communication and Signal Processing
пЂє ICIEE 2014
2014 The 4th International Conference on Information and Electronics Engineering
пЂє ICAIP 2014
2014 International Conference on Advances in Image Processing
пЂє ICRAE 2014
2014 International Conference on Robotics and Automation Engineering
Dear Participants,
Welcome to 2014 Bangkok Conferences! We are confident that over the three days you will get the
theoretical grounding, practical knowledge, and personal contacts that will help you build a long-term,
profitable and sustainable communication among researchers and practitioners in a wide variety of scientific
areas with a common interest.
For the conferences, we had received more than 150 submissions, and around 45 excellent papers were
accepted for presentation. Congratulations for these papers.
We wish to thank our outstanding keynote speakers Prof. Maode Ma, Prof. S. Arumuga Perumal and
Prof. Liyanage C De Silva for sharing their deep insights on future challenges and trends in Image and Signal
Processing, Network and Communication, Intelligent Technology and Control, Software engineering and IT.
Special thanks also go to all the researchers and students who participate in the conference with their work.
Hope you enjoy the conference, the food, the hospitality, and the beautiful and charming environment of the
city of Bangkok, Thailand!
Organizing Committee
Conference Agenda Overview
Friday, Oct. 10, 2014
10 :00 am to 5:00 pm
in front of Platinum Lounge ( 6th Flrпј‰
Arrival and Registration
Saturday, Oct. 11, 2014
8:30am to 8:45am
Opening Ceremonies
Keynote Address:
8:45am to 9:35am
Prof. Maode Ma
Nanyang Technological University, Singapore
9:35am to 10:00am
Group Photo & Coffee Break
Sapphire II
(7th Flr)
Keynote Address:
10:00am to 10:50am
Prof. S.Arumuga perumal,
Head, Department of Computer Science and Research,
S.T.Hindu College, India
Keynote Address:
Prof. Liyanage C De Silva
10:50am to 11:40am
Deputy Dean, Faculty of Integrated Technologies (FIT),
University of Brunei Darussalam, Brunei Darussalam
12:00am to 1:00pm
Session 1: Image and Signal Processing——12 presentations
1:00pm to 3:35pm
Session 2: Network and Communication——14 presentations
3:35pm to 3:50pm
Sapphire II (7th Flr)
Session 4: Software engineering and IT ——11 presentations
6: 30pm to 8:30pm
Board room(7th Flr)
Coffee Break
3:50pm to 6:20pm
The Square restaurant
(6th Flr)
Sapphire II (7th Flr)
Board room(7th Flr)
The Square restaurant
(6th Flr)
Sunday, Oct. 12, 2014
7 :00 am to 5:30 pm
One Day Tour
Instructions for Oral Presentations
Devices Provided by the Conference Organizer:
пѓ� Laptops (with MS-Office & Adobe Reader)
пѓ� Projectors & Screen
пѓ� Laser Sticks
Materials Provided by the Presenters:
пѓ� PowerPoint or PDF files
пѓ� Duration of each Presentation (Tentatively):
пѓ� Regular Oral Session: about 15 Minutes of Presentation including 2-3
Minutes of Q&A
Plenary Speech: 45 Minutes of Presentation, 5 Minutes of Q&A
пѓ� *Certificate of Participation can be collected in front of the registration counter.
пѓ� *The organizer will not provide accommodation, so we suggest you make an early reservation.
пѓ� *One best presentation will be selected from each session. The best one will be announced when each
session ends, and will be awarded by the session chair after each session in the meeting room.
� *The attendee should provide the author’s authorization or attendee’s passport ID when the attendee is
none of the authors.
All accepted papers of ICFIT 2014 will be published in the Advanced Materials Research Journal (ISSN: 1022-6680)
as a special issue.
Journal of Industrial and Intelligent Information (JIII, ISSN: 2301-3745; DOI: 10.12720/jiii)
Indexed by Ulrich’s Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and
Electronic Journals Digital Library.
Lecture Notes on Information Theory (LNIT, ISSN: 2301-3788; DOI: 10.12720/lnit)
Indexed by Ulrich’s Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and
Electronic Journals Digital Library.
All accepted papers of ICCSM 2014 will be recommended to be published into one of the journals below:
Lecture Notes on Software Engineering (LNSE, ISSN: 2301-3559; DOI: 10.7763/LNSE)
Indexed by DOAJ, Electronic Journals Library, Engineering & Technology Digital Library, EBSCO, Ulrich’s Periodicals
Directory, International Computer Science Digital Library (ICSDL), ProQuest and Google Scholar.
International Journal of Modeling and Optimization (IJMO, ISSN: 2010-3697; 10.7763/IJMO)
Indexed by Engineering & Technology Digital Library, ProQuest, Crossref, Electronic Journals Library,DOAJ, Google
Scholar, EI (INSPEC, IET).
All accepted papers of ICCSP 2014 will be recommended to be published into one of the journals below:
International Journal of Signal Processing Systems (IJSPS, ISSN: 2315-4535; DOI: 10.12720/ijsps)
Indexed by Ulrich’s Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and
Electronic Journals Digital Library
Journal of Communications (JCM, ISSN: 1796-2021;DOI: 10.12720/jcm)
Indexed by EI Compendex; SCOPUS; ULRICH’s Periodicals Directory; Google Scholar; INSPEC, etc.
Papers of ICIEE 2014 are published in International Journal of Information and Electronics Engineering
(IJIEE, ISSN: 2010-3719)
Abstracting/Indexing: Ei (INSPEC, IET), Google Scholar,EBSCO, Electronic Journals Library,Engineering &
Technology Digital Library,Crossref and ProQuest, DOAJ, .
Papers of ICAIP2014 are published in Journal of Image and Graphics
(JOIG, ISSN: 2301-3699, DOI:10.12720/joig) ,
Abstracting/Indexing: :Ulrich’s Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital
Library and Electronic Journals Digital Library
Papers of ICRAE 2014 are published into Journal of Automation and Control Engineering
(JOACE, ISSN: 2301-3702,DOI: 10.12720/joace )
Abstracting/Indexing: Ulrich’s Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital
Library and Electronic Journals Digital Library
Cover Art:
Sponsored by:
Enhancement of Security Functionality for 4G LTE Wireless
Prof. Maode Ma
Nanyang Technological University, Singapore
In this talk, an overview of the architecture of LTE wireless networks will be the presented followed by an
introduction on the security framework in the LTE wireless networks specified by 3GPP. The major security
mechanisms in the LTE wireless networks and their fundamental functionality will be presented.
Furthermore, various possible malicious attacks to the LTE wireless networks and the vulnerabilities of the
existing authentication schemes in the LTE wireless networks will be revealed. Moreover, a few potential
open research issues and the current solutions on the security functionality of the LTE wireless networks
will be explored to attract the attentions and interests from the research community and industry. At last,
a solution to prevent denial-of-service attacks and enhance the security of the authentication process for
the LTE wireless networks will be introduced to an example to motivate the academic research in this field.
Dr. Maode Ma received his Ph.D. degree in computer science from Hong Kong University of Science and
Technology in 1999. Now, Dr. Ma is an Associate Professor in the School of Electrical and Electronic
Engineering at Nanyang Technological University in Singapore. He has extensive research interests
including wireless networking and network security. He has led and/or participated in 18 research projects
funded by government, industry, military and universities in various countries. He has been a member of
the technical program committees for more than 150 international conferences. He has been a general
chair, technical symposium chair, tutorial chair, publication chair, publicity chair and session chair for more
than 50 international conferences. Dr. Ma has more than 250 international academic publications,
including over 110 journal papers and more than 140 conference papers. He currently serves as the
Editor-in-Chief of InternationalJournal of Electronic Transport.He also serves as a Senior Editor for IEEE
Communications Surveys and Tutorials, and an Associate Editor for International Journal of Network and
Computer Applications, International Journal of Security and Communication Networks,International
Journal of Wireless Communications and Mobile Computing and International Journal of Communication
Systems.He had been an Associate Editor for IEEECommunications Letters from 2003 to 2011. Dr. Ma is
the Fellow of IET and a senior member of IEEE Communication Society and IEEE Education Society. He is
the Chair of the IEEE Education Society, Singapore Chapter. He is also serving as an IEEE Communication
Society Distinguished Lecturer.
Internet of Things
Prof. S. Arumuga Perumal
Head, Department of Computer Science and Research,
S.T.Hindu College, India
The fast development of ICT leads to the increase in number of electronic gadgets more and more every
Electronic gadgets dominate a major part in our personal life. So the researchers are in a critical
position to manage and control this growth while at the same time facing constrained budgets and
increasing energy conservation.
Integration of the existing technology leads to the development of
Internet of Things (IoT) which in turn leads to the development of smart environment where the public
used sensor/Non Sensor based objects and functioning services are smartly controlled. The entire objects
and services in the environment will be connected to an internet through Wireless-Fidelity i.e., Internet of
Things. Office, hotels, shopping malls, institutions etc. should be integrated through Wi Fi so that we can
reduce time management in sharing data and managing objects effectively and efficiently with smart
security system through smart management techniques in the environment to optimize the energy
consumption and simultaneously they will regulate and manage the energy level. The development of IOT
makes the world continuous to generate quintillion bytes of data daily leading to the processing needs for
new effort in dealing with grand challenges to the technology and the organizations should come forward
to, pave a way for the storage, retrieval, management, analysis and get insight about what has happened,
What is happening and what is going to happen can be summarized via the popular five V’s viz., Volume,
Velocity, Variety, Veracity and Value. IoT applications can offer good opportunities and are the best solution
for this present and future problem. Thanks to the administration by digital technologies and information.
Dr. S. Arumuga Perumal, Professor and Head of the Department of Computer Science and Research ,South
Travancore Hindu College, Nagercoil, Tamilnadu, India received his M.S degree in Software Systems from
BITS, Pilani , Ph.D. degree in computer science from Manonmaniam Sundaranar university and Chartered
Engineer from Institution of Engineers(India) and Institution of Electronics and Telecommunication
Engineers. He has extensive research interests including network security, Green computing and image
processing. He has been a member of the technical program committee for more than 50 international
conferences. He has been a technical track chair, tutorial chair, publication chair, and session chair for more
than 50 international conferences. He has published more than 100 international academic research
papers. He is a senior member of Computer society of India and senior member of IEEE. Charted Engineer
and Fellow of IE, Fellow of IETE, Fellow of IACSIT. He is involved in various academic activities such as
curriculum development and professional society activities. He got Best teacher award from Tamilnadu
Government, IETE Award, CSI award for academic excellence, Asiriar Chemmal award, and Eminent
Engineer award from IE(I)-Madurai. He has successfully guided number of Ph.D scholars under his
Smart Homes – Energy Efficient and Safe Living with Ease
Prof. Liyanage C De Silva
Deputy Dean, Faculty of Integrated Technologies (FIT), University of
Brunei Darussalam, Brunei Darussalam
In this talk I will present the state of the art of smart home technologies from several perspectives. The
talk organizes the related researches as follows. Before going into specific application categories I will first
look at different techniques used in smart homes namely; video based techniques, audio based techniques
and multimodal techniques. Then I will outline video based techniques for human activity detection in
smart environments followed by audio-based techniques. Subsequently I will investigate how to combine
multiple sensory modalities to recognize actions and events that take place in a smart home. Thereafter I
will look at specific applications of smart homes such as for eldercare and childcare followed by an
investigation of smart home applications that make homes energy efficient.
Professor Liyanage C De Silva has received BSc Eng(Hons) degree from the University of Moratuwa Sri
Lanka in 1985, Mphil degree from The Open University of Sri Lanka in 1989, Meng and PhD degrees from
the University of Tokyo, Japan in 1992 and 1995 respectively. He was with the University of Tokyo, Japan,
from 1989 to 1995. From April 1995 to March 1997 he has pursued his postdoctoral research as a
researcher at ATR (Advanced Telecommunication Research) Laboratories, Kyoto, Japan. In March 1997 he
has joined The National University of Singapore as a Lecturer where he was an Assistant Professor till June
2003. He was with the Massey University, New Zealand from 2003 to 2007. Currently he is the Professor
of Engineering and the Deputy Dean of the Faculty of Integrated Technologies the
University of Brunei Darussalam.
Liyanage’s current research interests are Power System Analysis, Image and Speech Signal Processing (in
particular multi modal emotion recognition and speech emotion analysis), Digital Communication (CDMA,
OFDMA etc.), Information theory (source coding), Pattern recognition and understanding (biometric
identification), Multimedia signal processing, and Smart Sensors (Smart environments for security,
eldercare and energy efficiency). He has over 29 years of postgraduate experience in various levels in his
career in the Asia Pacific region.
Liyanage has published over 160 technical papers in these areas in international conferences, journals and
Japanese national conventions and holds one Japanese national patent, which was successfully sold to
Sony Corporation Japan for commercial utilization, and 2 US and 4 Brunei patents. Liyanage’s works have
been cited as one of the pioneering work in the bimodal (audio and video signal based) emotion
recognition by many researchers. His papers so far have been cited by more than 1650 times (according
to with an h-index of 18.
Detailed Schedule
Friday, October 10
in front of Platinum Lounge ( 6th Flr)
Arrival and Registration
10:00– 12:00
13:00 — 17:00
After sign, you will collect your conference package, including:
Original Receipt
Journal (Only for Author Attendee)
Representative / Pass Card with Tie
Printed Program
Lunch Coupon
Dinner Coupon
*Participation Certificate (collected from Session Chair after the presentation)
Conference Souvenir
Computer Bag
Please check on all these materials as soon as you get the package; if any of them is not included in the
package, please let us know at once; If any of them gets lost after the registration, no additional one
would be provided. Your understanding will be appreciated!
Each regular registration covers only one package. Additional package will be charged.
Some attendees may arrive on Oct. 11th, kindly be noted that you can register at the registration desk
from 9 am onwards.
Saturday Morning, October 11
Opening Ceremony
Sapphire II (7th Flr)
Opening Ceremonies
8:30am to 8:45am
8:45am to 9:35am
Prof. S.Arumuga perumal
Head, Department of Computer Science and Research, S.T.Hindu College, India
Plenary Speech 1:
Enhancement of Security Functionality for 4G LTE Wireless Networks
Prof. Maode Ma
Nanyang Technological University, Singapore
9:35am to 10:00am
Group Photo & Coffee Break
Plenary Speech 2:
Internet of Things
10:00am to 10:50am
Prof. S.Arumuga perumal
Head, Department of Computer Science and Research, S.T.Hindu College, India
Plenary Speech 3:
Smart Homes – Energy Efficient and Safe Living with Ease
10:50am to 11:40am
Prof. Liyanage C De Silva
Deputy Dean, Faculty of Integrated Technologies (FIT), University of Brunei
Darussalam, Brunei Darussalam
12:00pm——1:00pm Lunch Time
The Square restaurant (6th Flr)
пѓ� Please be noted that lunch coupon is necessary for entering the restaurant.
пѓ� Please arrive on time to the conference room by 1:00 pm. Thank you!
Saturday Afternoon, October 11
-PAPER SESSIONSSession 1: Image and Signal Processing
Chair: Prof. S. Arumuga perumal; Co-chair: Prof. Martin Dobrovolny
12 presentations
Time: 1:00pm to 3:35pm
Venue: Sapphire II (7 Flr)
A Robust Image Encryption Method Based on Bit Plane Decomposition and Multiple Chaotic Maps
Wipawadee Auyporn and Sartid Vongpradhip
Chulalongkorn University
Abstract—Multimedia security is very important for multimedia communications over open network. For some
applications, the highly robust image encryption approach is needed. This project aims to design a high security image
encryption method, since the conventional encryption methods such as DES, AES, and RSA do not suit for image data
because there are high correlations and redundancy among pixels in natural images. By using two concepts; bit plane
decomposition and multiple chaotic maps, the proposed encryption scheme offers more robust encryption method that is
suitable for image data. In the confusion stage of the encryption, the image data is decomposed into eight bit planes, and
then each bit plane is permuted separately based on different chaotic map. After that, eight bit planes are recomposed and
performed XOR operation with a generated random bit matrix in order to alter all pixel values completely. In diffusion
stage, the image is diffused based on a new generated sequence, and performed XOR operation again with another
random bit matrix before iterating the diffusion process. The performance of the proposed method is evaluated by using
statistical, key space, and key sensitivity analysis. The results show that the proposed image encryption method is very
secure and robust against different attacks.пЂ SP0006
Speech Emotional Classification Using Texture Image Information Features
Kun-Ching Wang
Shih Chien University
Abstract—Emotion recognition is one of the latest challenges for human-computer interaction (HCI). In general, a
system approach for recognition of human emotional state is usually from two inputs: audio/speech and visual
expressions. So, the emotional recognition system needs two audio-based and image-based kernels to process audio and
visual modules. In order to cost down the requirement of the emotional recognition containing two-kernel two-module
(TKTM) system, the speech-based kernel can be regarded as an image-based processing. In this paper, we present a
novel speech emotional feature extraction based on visual signature extraction derived from time-frequency
representation. First, we transform spectrogram as a recognizable image. Next, we use cubic curve to enhance the
contrast of speech spectrogram image. Then, the texture image information (TII) derived from spectrogram image can be
extracted by using Laws� masks to characterize emotional state. Finally, we use the support vector machine (SVM) to
classify emotion.
The Obstacle Detection and Objects Tracking on the Railway Crossing
Martin Dobrovolny and Zdenek Silar
University of Pardubice, Czech Republic
Abstract—This article deals with the obstacle detection and objects trackingon a railway crossing
Detection. Detection is based on the optical flow estimation and classification of the flow vectors by K means clustering
algorithm.The object tracking based on Template Matching and Sum of Absolute Differences was also implemented for
better reliability to the system.For classification of passingvehicles is used optical flow direction determination. The
optical flow estimation is based on a modified Lucas-Kanade method.
An Image Retrieval Method Using Homogeneous Region and Relevance Feedback
Vu Van Hieu and Nguyen Huu Quynh
Haiphong University
Abstract—Relevance feedback and region based image retrieval are two effective ways to improve accuracy in
content-based image retrieval. In this paper, we propose a content-based image retrieval method using relevance
feedback and homogeneous region. By extracting a number of homogeneous color regions from the image and
calculating the occurrence frequency of regions, we convert image feature vectors to weighted vectors. On the basis of
the weighted vectors, we calculate the similarity between two weighted vectors and using relevant feedback technique.
Our experimental results on a Wang database of over 10,000 images suggest that the technique results in which is close
to user�s intention better than the CbsIR and CCH methods.
Histogram to Sound Conversion: A Review
HimadriNathMoulick, Moumita Ghosh, Dr. PoulomiDas,Dr. ChandanKoner and Alok Kumar Roy
BankuraUnnayani Institute of Engineering,India
Abstract—The main goal of a voice conversion system is to modify the voice of a source speaker, in order to be
perceived as if it had been uttered by another specific speaker. Many approaches found in the literature convert only the
features related to the vocal tract of the speaker. Our proposal is to not only convert those characteristics of the vocal
tract, but also to process the signal passing through the vocal chords. Thus, the goal of this work is to obtain better scores
in the voice conversion results. Also, this paper describes a method of compensating for nonlinear distortions in speech
representation caused by noise. The method described here is based on the histogram equalization method often used in
digital image processing. Histogram equalization is applied to each component of the feature vector in order to improve
the robustness of speech recognition systems. The paper describes how the proposed method can be applied to robust
speech recognition and it is compared with other compensation techniques.
Robust Adaptive Control with the use of DACDM Algorithm – Impact of Settings on Tracking Quality
PoznaЕ„ University of Technology, Poland
Abstract—In this paper a new, discrete, robust adaptive control algorithm (DACDM) and research results on tracking
quality improvement and on the increase of control system robustness to parametric uncertainty were presented. The
proposed control algorithm permits
to obtain the desired output signal courses at the apriori declared time regime with the save of control system stability in
the presence of control signal constraint by the proper modification and integration of so far applied algorithms of
continuous time control which makes possible the triple level monitoring of system robustness in discrete control –
through the use of coefficient diagram, through the introduction of an additional filter to the control system (which
parameters are by the J function reflected) as well as the use of the adaptive algorithm with parameters estimation of
discrete model by recursive least squares (RLS) method. The influence of various settings of algorithm parameters on a
tracking quality, was considered. Simulations results confirm the efficiency of DACDM algorithm in the context of
considered classes of plants. пЂ T010
Enhanced Still 3D Integral Images Rendering Based on Multiprocessor Ray Tracing System
M. G. Eljdid, A. Aggoun and O. H. Youssef
Tripoli University, Libya
Abstract—The main purpose of this paper is to introduce 3D integral imaging interpolation method, to overcome the 3D
missing information problem occurred between cylindrical lenses (micro-images) due to occluded areas in the previous
cylindrical lens, new cylindrical lens shows an area, to generate one single photo-realistic 3D integral imaging frame.
The method is based on a Multiprocessor ray-tracer containing 3D integral imaging parser, 3D integral camera model, a
3D integral imaging renderer, spatial coherence and 3D scene transformations. Consequently, an increase in speed in the
generation of still 3D integral image is achieved compared to fully ray tracing time of missing pixels. Experiments show
that a significant reduction in execution time is achieved by using the 3D integral interpolation process. Savings up to
(57%-66%) in the ray tracing time when compared to fully ray tracing the missing pixels depends on the complexity of
the scene.
Detection of Architectural Distortion in Mammogram
Rekha Lakshmanan, Shiji T P, Vinu Thomas, Suma M.Jacob and Thara Pratab
Govt. Model Engineering College,India
Abstract—Amethod for the detection of the most commonly missed breast cancer anomaly, Architectural distortion, is
proposed here. The distorted abnormal structures associated with Architectural distortion in suspicious regions are
extracted using geometrical properties of edge features based on an energy model. Contours obtained from a modified
Single Univalue Segment Assimilating Nucleus filtered mammogram, are employed for this purpose. A Pectoral muscle
delineation technique is incorporated in the proposed method to reduce false positive rate.A ranking value of these
potential regions based on linear and converging properties is computed to identify the probable origins of architectural
distortion. Experimental analysis is performed on 100 images obtained from Lakeshore Hospital, India. The results are
verified by expert radiologists. The proposed algorithm is successful in 94 mammograms and the results are found to be
A Hybrid Edge Detection Method for Cell Images Based on Fuzzy Entropy and the Canny Operator
Yuexiang LI, Siu-Yeung CHO and John Crowe
University of Nottingham, Ningbo, China
Abstract—Since cell biologists need to use image processing techniques, such as edge detection, to analyze cell images
the precision of these techniques is pivotal to their work. Due to the often low quality of cell images, existing edge
detectors fail to routinely produce highly accurate results. In this paper, a novel hybrid method based on the canny
operator and fuzzy entropy theory is proposed. The method calculates the fuzzy entropy of gradients from an image to
decide the threshold for the canny operator. Application of the method to cell images has demonstrated its excellent
performance in edge detection and robustness in the presence of noise.
Unsupervised Change Detection from Multitemporal SAR Images based on a Detail Preserving
approach and a Robust Threshold Estimation
Boulerbah Chabira, Takieddine Skanderi, Mohamed Tadj-Eddine Mahmoudi, Aichouche Belhadj aissa
University of Technology and Sciences Houari Boumediene, Algeria
Abstract—In environment monitoring and disaster management, Synthetic aperture radars (SARs) have shown their
great efficiency due to the fact that they provide short revisit times and they can operate in day and/or night and their
independence of weather conditions. Different applications have been addressed a lot in recent years, but the one that
receives a lot of attention is the change detection of the observed earth surface by exploiting the multitemporal SAR
images. In this paper, we propose an unsupervised method for the change detection from multitemporal SAR images that
does not require any speckle filtering. This method is based on: i) generating a multiresolution set of the single-channel
log ratio image using stationary wavelet transform (SWT); ii) applying the T-point algorithm for all the images of the
multiresolution sets; and iii) fusing the obtained images at the optimum reliable scale to generate the change map. The
proposed method was experimentally validated using semisimulated and real SAR images acquired by RADARSAT-2
satellite in the region of Algiers.
A Novel Approach of Curvature based Heat Diffusion for shape based Object Recognition
M. Radhika Mani, G.P.S. Varma, Dr. Potukuchidm, Dr. Ch. Satyanarayana
Pragati Engineering College, India
Abstract—Diffusion geometry plays a vital role in shape analysis and object recognition. It evokes from propagation of
heat on the object surface. This derives the intrinsic or invariant features of the surface. The heat kernel signature (HKS)
based on heat diffusion suffers with the problem of scale sensitivity. This is resolved by the scale invariant heat kernel
signature (SIHSK). It involves the Fourier descriptors for providing scale invariance property. This method considers
only orthogonal features. The present paper has extended this by considering the curvature properties to SIHSK viz.,
curvature heat diffusion method with SIHSK (CSIHSK). The proposed method adopted the Modified Euclidean distance
for shape similarity measure and is experimented over three standard databases. The results prove the efficiency of the
proposed method than that reported for other descriptor of concurrent interests.
Estrus Detection for Dairy Cow Using ZigBee-based Sensor Networks
Chien-Hsing Chen and Hung-Ru Lin
Information Technology Department, Meiho University, Taiwan
Abstract—The reproductive performance of dairy cows is influenced primarily by estrus-detection accuracy. Effective
estrus-detection systems are beneficial to increasing pregnancy rates, improving the reproductive performance of dairy
cows. The most obvious external symptom of estrus in dairy cows is standing-heat behavior. The standing cows remain
briefly motionless for several seconds when repeatedly mounted by mounting cow. Therefore, in this study, wireless
sensor networks were used to develop a standing-heat signal detection and management system for dairy cows. This
system detects the movement signals of mounting behavior by using a 3-axial accelerometer within a wireless sensor
installed on the forefeet of cows. When signal of accelerometer exceed a threshold value, the ZigBee begins
broadcasting signals to the surrounding sensor nodes. The received signal strength indicator (RSSI) between the
broadcasting node and every sensor node is recorded. The ZigBee serial number and the RSSI for sensor nodes are then
sent to a terminal database system, which compares the RSSIs in the batch to determine the serial number with the
strongest RSSI, achieving the goal of estrus detection. In addition, the results of estrus detection also can be inquired by
a smartphone-base system.
Session 2: Network and Communication
Chair: Prof. Maode Ma
14 presentations
Time: 1:00pm to 3:35pm
Venue: Board room(7 Flr)
High Gain Vivaldi Antenna for Radar and Microwave Imaging Applications
Gaurav Kumar Pandey, Hari Shankar Singh, Pradutt Kumar Bharti, Amritanshu Pandey and Manoj
Kumar Meshram
Indian Institute of Technology (Banaras Hindu University),Varanasi, India
Abstract—An Ultrawideband (UWB) high gain compact Vivaldi antenna with end fire radiation patterns is presented for
radar and microwave imaging applications. The antenna is operating for 2.9 GHz to more than 11 GHz with -10Db
impedance bandwidth and is designed on low cost FR4 substrate of thickness 0.8mm. While designing the proposed
antenna, initially a compact exponential tapered slot Vivaldi antenna is presented for wide impedance bandwidth
performances. Further, the Vivaldi antenna is modified by incorporating corrugations on the edges of exponential
metallic flaring section and some periodic grating elements consists of small metallic strips on the slot area, which
results in improvement in gain significantly along with increased directivity and lower frequency band coverage. The
proposed antenna shows nearly stable end-fire radiation patterns throughout the frequency range. The surface current
distributions and input impedance plots are presented to understand the antenna mechanism.пЂ SP0003
Design of an Ag Plasmonic Nanowire Waveguide with Long Propagation Distance
Yuan-Fong Chau
Chien-Hsin University
Abstract—By coupling light to the charges at nanometal interfaces, surface
lasmon (SP) enables researches to control
photons in a way they have never done before: at the subwavelength level. Coupling of incident light through an air
region into an Ag plasmonic nanowire waveguide (APNW) is a highly difficult challenge of light guiding on the surface
of metal nanowire. Surface
lasmon polaritons, the electromagnetic waves propagating on the interface between metal
and dielectrics, have allowed the modal confinement below the diffraction limit. In this paper, we numerically analyze
the coupling effect of an APNW which is covered by a dielectric medium using a finite element method. The coupling
effect can be modulated by adjusting the Ag nanowire diameter, the covering dielectric medium width and the
wavelength of incident light, the propagation length of SP coupling can be maximized. Simulation results reveal that the
field confinement can be significantly improved and the majority of the electric field can be carried on the surface of an
APNW. The effects of electric field transport along an APNW due to SP coupling which is investigated for different
dimensions and lengths. Accordingly, long propagation lengths of about 41500 nm at an incident wavelength of 715 nm
and longer propagation length can be achieved if the more sections of APNW are used. Simulation results offer an
efficient method for optimizing SP coupling into an APNW and promote the realization of highly integrated plasmonic
Bayesian Multiple Estimation in Flat Rician Fading MIMO Channels
Hamid Nooralizadeh
Department of Electrical Engineering, Islamshahr Branch, Islamic Azad University
Abstract—In this paper, the performance of the single-estimation (SE) and multiple-estimation (ME) is investigated in
multiple-input multiple-output (MIMO) Rician flat fading channels using the traditional least squares (LS) estimator and
the Bayesian minimum mean square error (MMSE) estimator. The closed form equations are obtained for mean square
error (MSE) of the estimators in SE and ME cases under optimal training. In ME case, the optimal weight coefficients
are achieved for both estimators. Analytical and numerical results show that the LS estimator has lower error in the case
of ME than SE. Moreover, it is seen that the performance of MMSE channel estimator in the ME case is better than SE
particularly at high signal to noise ratios (SNRs). Furthermore, it is shown that this estimator is more appropriate for the
channels with weak line of sight (LOS) propagation paths and/or the low correlations.
Secure and Efficient Intermediate Node Authentication in Wireless Sensor Networks
Rajeshwari C. Choukimath and Vasudha V. Ayyannavar пЂ Visvesvaraya Technological University. Karnataka. India
Abstract—Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from
being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been
developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the
limitations of high computational and communication overhead in addition to lack of scalability and resilience to node
compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme
and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial, when the
number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. Thus the
aim of the project is to implement a scalable authentication scheme based on elliptic curve cryptography (ECC).While
enabling intermediate nodes authentication. The proposed scheme allows any node to transmit an unlimited number of
messages without suffering the threshold problem. In addition, the scheme can also provide message source privacy.
Performance Enhancement in Smart Environment using IOT
S.ArumugaPerumal and A.Venkat Subramanian
National Engineering College, Kovilpatti, India
Abstract—Considering today, the number of electronic gadgets are more and more every year. Gadgets dominate a
major part in public�s career as well as personal life. We have to manage with this growth while at the same time facing
constrained budgets and increasing in energy conservation. Most of the solutions will rely on massive deployment of
Information and Communication technologies (ICT) and in particular wireless ones. The fast development of
information and communication technology leads to the development of Internet of things (IoT) which in turn leads to
the development of smarter environment where the whole public used sensor/non sensor based objects and functioning
services are smartly controlled through advanced communication technology throughout the environment. The entire
objects and services in the environment will be connected to an internet through Wireless-Fidelity i.e., Internet of
Things. Office, hotels, shopping malls, institutions etc. should be integrated through Wi Fi so that we can reduce time
management in sharing data and managing objects effectively and efficiently with smart security system through smart
management techniques in the environment to optimize the energy consumption and simultaneously they will regulate
and manage the energy level. In this paper we have suggested some of the implementation practices and advantages to
develop smart systems and services to improve the performance with engineering advancement in development of smart
environment including objects in it along with ecofriendly and cost effective approach.
Route Optimization Method for Unmanned Air Vehicle Launched from a Carrier
Halil Savuran and Murat Karakaya
Department of Computer Eng., Atilim University, Turkey
Abstract—In this paper, we propose a route optimization method for a carrier-launched Unmanned Air Vehicle (UAV). In
a real life use case, the carrier keeps on moving on its own route as the UAV executes its own mission of visiting the
targets dispersed on a geographical area. Due to carrier mobility, determining the UAV take-off and land-on locations
with a route which minimizes the total tour length is a crucial research question and a practical challenge. In order to
resolve this problem, we have designed a solution based on the Genetic Algorithm (GA). We have observed the
performance of the proposed approach on some well-known TSP problems by comparing its results against the results of
the Nearest Neighbor (NN) heuristic.
QoS Analysis in Mobile Ad-hoc Networks Using Bandwidth Utilization Technique
Nagendra Sah, Neelam Rup Prakash, and Deepak Bagai
PEC University of Technology, Chandigarh, India
Abstract—It is proposed to analyze the usefulness of Bandwidth Reservation Protocol (BRP) for mobile ad-hoc networks
in improving the quality of service (QoS). There are two types of bandwidth reservation protocols namely, priority based
and scheduling based. In this simulation the priority based bandwidth reservation protocols are used. These are Fair
End-to-end Bandwidth Allocation (FEBA) and Priority based Bandwidth Reservation Protocol (PBRP) algorithms.
PBRP protocol consists of two phases namely Bandwidth Request phase and Bandwidth Reply phase. In the former
Phase, a Bandwidth Request (BREQ) message is forwarded from the node that requests the admission of a new traffic
flow to its destination. In the later Phase, a Bandwidth Reply (BREP) message proceeds backwards, hop-by-hop, from
the destination node to the node that originated the request along the path laid down by the corresponding BREQ
message. The destination node precedes the reply according to the priority of traffic classes and reserves the bandwidth
on the reply path. By simulation results, it is found that the use of these protocols achieve high bandwidth utilization and
throughput with reduced delay. The simulation is done on mesh based On Demand Multicast Routing Protocol
(ODMRP) by using QUALNET 5.0.
Analysis of Multicast Routing Protocols Using Quality of Service
Nagendra Sah, Neelam Rup Prakash, and Deepak Bagai
PEC University of Technology, Chandigarh, India
Abstract—Multicasting is kind of subset of broadcasting in which we have to send data to the selected number of
receivers present in the group. The group is called as multicasting group. The routing protocols are being for the sending
of packets and managing of nodes.
The objective of this paper is to research the current state of the art of existing multicast routing protocols for MANETs,
and compare different approaches. There are three main classes of routing protocols for MANETs: reactive, proactive
and hybrid. By studying advantages and disadvantages of each one, a new hybrid routing protocol is proposed. The new
scheme of protocol, considers utilizing merits of both ODMRP and MAODV protocols, and implements them as a
hybrid approach. It allows that a mobile node flexibly runs either a mesh or a tree routing protocol with its velocity and
its traffic.
The study is done by performance analysis of two well-known multicast routing protocols which are MAODV and
ODMRP. Some of the perspective is being studied and an outer diagram is being proposed of new routing protocol. The
two routing protocols are being compared on the basis of different parameters.
Analysis of OOK Upstream Signal Remodulation for Different Data Rates in WDM PON Network
Amit Kumar Garg and Vijay Janyani
Department of Electronics and Communication Engineering, Malaviya National Institute of
Technology, India
Abstract—A bidirectional wavelength division multiplexed passive optical network has been proposed in which
downstream DPSK signal is used for upstream OOK signal remodulation. 10 Gbps DPSK signal is used for 1.25, 2.5 and
5 Gbps OOK signal remodulation. Error free operation is achieved for 20 km fiber without any dispersion compensation
with low power penalty for downstream and negligible for upstream. Impact of different- different data rates for OOK
upstream signal remodulation has been analyzed in terms of bit error rate and Q factor for received power penalty.
An Analysis and Improvement of Probe-Based Algorithm for Distributed Deadlock Detection
Kunal Chakma, Anupam Jamatia, and Tribid Debbarma
National Institute of Technology Agartala, India
Abstract— In this paper we propose an improved probe based deadlock detection algorithm for distributed systems. The
algorithm proposed in this paper is an extension of previous works with an introduction of an identity set S in the probe
initiation. The rate of dependency table clearance is determined by our algorithm, and how over-killing of processes can
be avoided by using one additional data-structure is also shown by our algorithm. The algorithm shows how this
data-structure should be updated with probe-messages with the identity set, and how it helps in determining which
process should be selected as victim for resolving the deadlock, and which entries should be cleared in the dependency
table after successful detection of a deadlock. The study indicates that in this algorithm, rate of probe initiation is a
dominant factor in determining system performance and rules need to be framed for determining best value of it. пЂ X0013
XMPP Based Applications Under Low Bandwidth and High Latency Conditions
Oral GГјrel and Mehmet Ulas Cakir
Savunma Teknolojileri MГјhendislik A.Ећ., Turkey
Abstract—This paper discusses use of Extensible Messaging and Presence Protocol (XMPP) based applications under
Low Bandwidth and High Latency conditions. Such conditions usually occur during communication between air-to-air
or air-to-distant sea platforms. Considering the type of subject conditions XMPP applications discussed in this paper is
mostly applicable to military and defense industry. In terms of XMPP applications IM, chat, message broadcasting,
Customizable Forms (CF), archiving and database functionalities can be considered. Conditions of Low Bandwidth and
High Latency require existing XMPP and data exchange mechanism to be revised or simplified. Otherwise XMPP
communication is delayed or gets interrupted and the purpose of XMPP application is not properly met. This study
discusses the use of compression algorithms to tackle this problem. Although quantitative facts are provided and
referenced this paper is based on empirical approach and includes qualitative results.
Performance Analysis of Hierarchical and Flat Network Routing Protocols in Wireless Sensor Network
using ns-2
Anupam Jamatia, Kunal Chakma, Nirmalya Kar, Dwijen Rudrapal, Swapan Debbarma
National Institute of Technology Agartala, India
Abstract— In the era of technological advancement wireless communication using different advance technology and
sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments like
defense service specially Military service, Medical service, disaster management, wildlife monitoring and precision
agriculture to habitat monitoring and logistics applications etc. Sensor networks have the characteristics of fault
tolerance and rapid development make them very promising in the above mentioned field. The main objective of this
paper is to analyze the performance of two categories routing protocols i.e. Hierarchical and Flat network routing
protocols in Wireless Sensor Networks (WSN). For simulation purpose we have taken mainly Temporally-Ordered
Routing Algorithm (TORA), Low Energy Adaptive Clustering Hierarchy (LEACH), and Intrusion-tolerant routing
protocol for wireless Sensor NetworkS (INSENS) protocols.
Segmented Buffer for NOC Router
Biman Debbarma and Sambhu Pradhan
National Institute of Technology, India
Abstract—As the number of transistors in a single chip is increasing day by day, SoC is a very popular choice among the
developers as it gives more speed and functionality. The IPs in the SoCs can be from different vendors and may be used
for a third party for manufacturing a chip. For effective communication among the IPs or more commonly Cores, an in
built network structure called Network on Chip (NOC) has been developed over the years and different versions of
NOCs are available in the present day. This paper proposes a segmented buffer structure for NOC router for effective
utilization of the NOC buffers.
An Authenticated Key Exchange with Perfect Forward Secrecy for two Message Diffie-Hellman type
Tribid Debbarma, Anupam Jamatia and Kunal Chakma
National Institute of Technology Agartala, India
AbstractпЂ вЂ” Security protocols are predefined set of rules, where sequence of message exchange takes place. It is a
distributed program that might be executed on a network where the adversary may have control and access of the
systems. Even in such a setting, the protocol should satisfy the desired security property. Since it is hard to consider all
possible executions when designing a protocol, formal methods are often used to ensure the correctness of a protocol
with respect to a model of the protocol and the adversary.
Many such formal models use a symbolic abstraction of cryptographic operators by terms in a term algebra. The
properties of these operators can then be modeled by equations. We show that it is possible to achieve perfect forward
secrecy in two-message key exchange(KE) protocols that satisfy even stronger security properties than provided by the
extended Canetti-Krawczyk (eCK) security model. In particular, we consider perfect forward secrecy in the presence of
adversaries that can reveal the long-term secret keys of the actor of a session and reveal ephemeral secret keys. We
propose a new security models for KE protocols. We formalize a slightly different version of the eCK security model
that we call eCKw, which produce the stronger than the eCK model. Than we convert it into even stronger model by
transforming it, which produce eCK PFS model. Given a two-message Diffie-Hellman type protocol secure in eCKw our
conversion produce a two-message protocol that is secure in eCK PFS.
3:35 pm——3:50pm;
-PAPER SESSIONSSession 3: Intelligent Technology and Control
Chair: Prof. Liyanage C De Silva
Co-chair: Assoc. Prof. Agne Paulauskaite-Taraseviciene
10 presentations
Time: 3:50pm to 6:20pm
Venue: Sapphire II (7th Flr)
Power and Area Efficient Hardware Architecture for WiMAX Interleaving
Zuber M. Patel
S.V. National Institute of Technology, Surat City, INDIA.
Abstract—In this paper, area and power efficient design of interleaver/deinterleaver for IEEE 802.16 (WiMAX) networks is
presented. Interleaving plays an important role in wireless networks in combating burst errors. It spreads burst error among
multiple code words, thus reduces erroneous bits per code word symbol which can be corrected by forward error correction
(FEC) decoder. The paper proposes an efficient hardware design that avoids look-up table (LUT) ROM and complex address
generator logic. It uses only simple linear address generator circuit and multiplexer (MUX) based efficient intra-column
permutation logic. The design supports all modulation schemes and sub-channelization. ASIC implementation results reveal that
total number of gate count for interleaver is 25.9k and for deinterleaver is 26.1k. The combined system takes core chip area of
1.11mm2 and consumes power of 0.586mW at 5MHz frequency.
MFCC Based Text-Dependent Speaker Identification Using BPNN
Swathi S. Wali, Sanjeevakumar. M. Hatture and Dr. Suvarna Nandyal
Visvesvaraya Technological University. Karnataka, India
Abstract—Speech processing has emerged as one of the important application area of digital signalprocessing. Various fields for
research in speech processing are speech recognition, speaker recognition, speech synthesis, speech coding etc. Speaker
recognition is one of the most useful and popular biometricrecognition techniques in the world especially related to areas in
which security is a major concern. Thispaper presents an automatic Speaker Recognition model which is Text-Dependent where
the speaker is allowed to speak only fixed text. Automatic speaker recognition is the use of a machine to recognize a person
from a spoken phrase, based on individual information (characteristics of voice) included in speech waves. Recognizer block
employs MFCC (Mel Frequency Cepstrum Co-efficients) technique to get hybrid features for speaker identification/verification
system. These features are used to train the ANN classifier in the training phase. Later in the testing phase the speaker is
recognised based on the ANN classifier. The accuracy of 92% is achieved.
A Study on LBS Technique Make for CRETA LBS Platform Service
Yongwon (Conrad) Cho and Sunwhie Hwang
Researcher Engineer (Virtual Builders Co., Ltd. Digital Space Lab.)
Abstract—Indoor & Outdoor spatial information technology closer to reality 3D space. So spatial information services market is
growing now. A variety of information services and web-based content, to provide information services through the space. In
addition, consumers make to direct spatial information service more than just a service provider. That means satisfy the needs of
the consumer now. We have a lot of high quality smart devices. So, we will available to upload or share web.
This study is outdoor & indoor map building based on the 3D data. And we will make to management for LBS service. We have
to platform project name is ‗CRETA� LBS.
Design and Implementation of Power Efficient Micro pipelined GALS based 2-D FFT Processor core
Yasha Jyothi M Shirur
BNMIT, Bangalore, India
Abstract—Today�s complex VLSI SOC solutions demand low power processors. Synchronous processors which consume more
than 40 % of power in clock circuitry are being conveniently replaced by low power delay-insensitive (DI) asynchronous logic.
In this paper, a Micro- pipelined GALS based 2D Fast Fourier Transform [FFT] Processor is designed and implemented to
perform power, area and timing analysis. The implemented design has given power advantage of 78.22% and timing advantage
of 39.99% when compared with similar synchronous 2D FFT processor. The design is a synthesizable core which can be
extended to be part Complex DSP architecture and hence is a right choice for any MPSOC design.
Maximizing UAV target coverage under flight range and target service time constraints
Ender Sevinçand Murat Karakaya
Department of Computer Eng., Atilim University, Turkey
Abstract— Using Unmanned Aerial Vehicles (UAVs) for reconnaissance purposes requires considering many different criteria
such as limited UAV flight range, specified target service time, etc. Furthermore, it is desired that UAV should service more
targets as many as possible. Thus, route planning is required to be optimal to cover maximum number of the targets while
respecting all the given constraints. This article proposes a genetic algorithm (GA) to creating an optimized route for visiting
maximum number of targets under the flight range and target service time constraints. In order to evaluate the success of the
proposed GA method, we also developed an alternative approach, based on the Nearest Neighbor (NN) heuristic. To compare
the success of these two methods we executed extensive simulation tests. The results indicate the success of the proposed GA
method by increasing the number of covered targets compared to the solution based on the NN heuristic.
Task Scheduling in the Cloud Computing based on the Cuckoo Search Algorithm
Nima Jafari Navimipour
Islamic Azad University, Tabriz, Iran
Abstract—Cloud computing is the latest emerging trend in distributed computing, where shared resources are provided to
end-users in an on demand fashion that brings many advantages, including data ubiquity, flexibility of access, high availability
of resources, and flexibility. The task scheduling problem in Cloud computing is an NP-hard problem. Therefore, many
heuristics have been proposed, from low level execution of tasks in multiple processors to high level execution of tasks. In this
paper, a new evolutionary algorithm is proposed which named CSA to schedule the tasks in Cloud computing. CSA algorithm is
based on the obligate brood parasitic behavior of some cuckoo species in combination with the LГ©vy flight behavior of some
birds and fruit flies. The simulation results demonstrated that when the value of Pa is low, the speed and coverage of the
algorithm become very high.
Keyword-based service matching in a cloud environment using nature-inspired swarm intelligence
Carsten Mueller & Niklas Kiehne
ITG Research, Germany
Abstract— In Services Computing, service discovery is an important activity to search the pertinent service to the client's
requirement. With increasing keywords the search space grows above average and brute force is an inappropriate approach.
cloud service provider requires a flexible and an easy to use application. This practical research presented in this paper combines
an intelligent solution based on nature-inspired swarm intelligence for keyword-based service matching with an innovative and
user-friendly graphical user interface. Finding optimum parameter settings is a time-consuming and difficult task. Objective of
the integrated Parameter Recommender is the determination of optimum values for the applied heuristic.
Tracking Method of Adaptive For Inserting an Artificial Lens
Kyung-Pyo Kim
Kyungpook National University, Korea
Abstract—We marked with a pen directly to the incision for insertion into the patient's eye of the intraocular lens insertion in
cataract surgery, and insertion point. However, it can delete or blur the display due to such factors as foreign material coming
out of the eye during surgery.Therefore, in recent years, a method of tracking the image processing by receiving the camera
images in real time display method such extended. There are many ways to estimate the object in the video in, but in the method
has been applied widely used typically have optical flow and template matching. The template matching, while indicating the
tracking performance with excellent background simple from complex background, its performance is reduced, while indicating
the tracking excellent performance in a complex background, simple background, optical flow, the performance fall. In this
paper, there is provided amethodadaptive tracking don�t give a significant effect on the change in the background template
region. Therefore, by using to suit the circumstances the optical flow indicating the tracking excellent performance in a complex
background template matching showing a tracking superior performance with a simple background, when inserting an
intraocular lens in cataract surgery, and a knife in it was possible to improve the accuracy of tracking a region of the incision.
Development of Sensors and Microcontrollers for Small Temperature Controller Systems
Ali Jebelli and Mustapha C.E. Yagoub
University of Ottawa, School of Electrical Engineering and Computer Science, Ottawa, Canada
Abstract—In this paper, a microcontroller-based fuzzy logic controller is introduced to stabilize at the desired temperature,
while sudden changes in temperature can be severe. This approach is applied to one onboard microcontroller which is on small
board and the control system is able to meet the required respond quickly. The significance of this work is because of using a
microcontroller with a fuzzy PI controller as the supervisor, and evaluated through experiments. It is shown that the
characteristics of the fuzzy logic, such as flexibility of the I/O selection and saturation of the outputs, provide favorable
performance to the control system for temperature system.
Closed Loop Speed Control of Miniature Brushless DC Motors
H. L. Chan and K. T. Woo
Hong Kong University of Science and Technology, Hong Kong, China
Abstract—Three-phase miniature brushless DC (BLDC) motors are very popular on small Unmanned Aerial Vehicles (UAVs).
Due to the shape and size limitation, it is hard to install devices like optical encoders for implementing a closed loop speed
control. It is important to have speed control of motors on UAVs since the system dynamics are related to the rotation speed of
the motors. This paper presents a sensorless phase voltage detection scheme to measure the rotation speed. A PID controller is
implemented to ensure the performance of the motors. A mathematical model of Delta-Connected BLDC motors is built for
analyzing the relationship between phase voltage and rotation speed. The experimental results demonstrate a fast response time
and accurate results.
Agent-based System Architecture for Intelligent Lighting Control based on Resident�s Behavior
Agne Paulauskaite-Taraseviciene, Nerijus Morkevicius, Vaidas Jukavicius, Laura Kizauskiene and Egidijus
Kaunas University of Technology, Lithuania
Abstract—Learning from the behavior of the resident is essential in order to adapt the system to provide intelligent lighting
control. Technologies to assure two aspects, coordinated system control and intelligent decision making, are required for such
system implementation. In this paper an agent-based system architecture that aims to provide intelligent lighting control
according to resident�s habits is proposed. The multi-agent technology has been integrated with intelligent decision making
algorithms seeking to provide fast, adaptive and accurate lighting control. To explore capabilities of the proposed lighting
control system, the experiments including resident�s changing habits and unpredictable behavior have been performed,
evaluating accuracy and speed of control.
Session 4: Software engineering and IT
Chair: Prof. Yanzhen Qu
11 presentations
Time: 3:50pm to 6:20pm
Venue: Board room(7th Flr)
A Study on Using AHP Technique for Best Location Select Experiments
Yongwon (Conrad) Cho andJinwon (Frank) Choi
Virtual Builders Co., Ltd. Digital Space Lab., South of Korea
Abstract— Many Peoples make online content while many showing of the traditional boundaries, production and consumption
are unraveling. The evolution of online access to information technology facilitates comparable to professional and amateur
engineers are born, focusing on common interests among people formed community is growing together.
Recently, based on
these wide range of public companies can take advantage of collective intelligence to effectively 'Crowd sourcing' has attend to
attracted. This study, the best location for AHP techniques and subsequent analysis based on Crowd sourcing, so spatial
information for crowd mapping in the field of development of the concept proposed. пЂ SP0014
Future Trends in Spatial Information Management: Suggestion to New Generation (Internet of Free-open)
Yongwon (Conrad) Cho and Sunwhie Hwang
Researcher Engineer (Virtual Builders Co., Ltd. Digital Space Lab.)
Abstract—The use of spatial information is increasing rapidly. There is a growing recognition amongst both governments and
the private sector that an understanding of location and place is a vital component of effective decision making. Citizens with no
recognized expertise in spatial information and who are unlikely to even be familiar with the term, are also increasingly using
and interacting with spatial information; indeed in some cases they are contributing to its collection – often in an involuntary
way. пЂ Based on the contributions received, trends have been broken down into broad themes covering major aspects of the spatial
information. They are as follows: trends in technology and the future direction of data creation, maintenance and management in
spatial data provision and management.
On XML based Automated Function Point Analysis: An Effective Method to Assess Developer Productivity
Jeffrey S. Lent and Yanzhen Qu
Colorado Technical University, USA
Abstract— this article proposes a novel approach to objectively measure developer productivity and individual contribution to
development projects using automated function point analysis (integrated with source control system (SCS) and continuous
integration (CI)).
Automated function point analysis is a central tenant required in this approach.
The method proposed
herein relies on pattern matching to identify and group fields in to internal logical files, external inputs, external outputs, and
external query objects which can be used to identify the objective size of software.
Unlike earlier automated functional sizing
algorithms, the method proposed is applicable to any application source code that expresses its user interface in well-formed
extensible markup language (XML). This study shows that a prototype implementation of the proposed automated counting
method is capable of providing a reliable and consistent relative size of existing software (accurate to +/-6.65% and 5000 times
faster), and goes on to explain how this method can be integrated with existing requirements engineering tools, source control
systems and continuous integration tooling in order to produce an objective measure of software developer output compared to
estimates established during requirements gathering and planning that exceeds the common, subjective means that are in use in
many organizations today.
An Approach to Handling Software Process Deviations
Rui Zhu, Fei Dai, Qi Mo, Yong Yu, Leilei Lin, and Tong Li
Yunnan University, China
Abstract—Since software processes are permanently dynamic evolving during software process enactment, the problems on
software process deviation are increasingly received more attention. In Process-centered Software Engineering Environments
(PSEE), the enacted software process model is always inconsistence with the observed process obtained by PSEE. In order to
address this problem, this paper presents a framework which structures the field of process deviation analysis and identities, a
Process Behavior Space Expression based on process algebra and judgment rules to decide whether handle the deviation or not.
This approach can effectively find and handle the prevalent deviation problems in the software process implementation, through
dealing with the deviation so as to improve the software process, and ultimately promote the quality of software products.
Students' Data-driven Decision Making in HEI: The Explicit Knowledge Involved
Semiu A. Akanmu and ZulikhaJamaludin
Universiti Utara Malaysia
Abstract—Due to increase in the volume of students� data, higher education institutions (HEIs) are experiencing constrained
decision making process. To attend to this, Information Visualization (InfoVis) is suggested as a befitting tool. However, since
InfoVis design must be premised on a pre-design stage that outlines the explicit knowledge to be discovered by the HEIs, so as
to actualize a functional and befitting InfoVis framework, this study investigates the explicit knowledge through survey
questionnaires administered to 32 HEI decision makers. The result shows that relationship between the students� performance
and their program of study is the most prioritized explicit knowledge among others. Based on the findings, this study elicits a
comprehensive data dimensions (attributes) expected of each data instance in the HEI students� datasets to achieve an
appropriate InfoVis framework that will support the discovery of the explicit knowledge.
Age Estimation using Support Vector Machine – Sequential Minimal Optimization
Julianson Berueco, Kim Lopena, Arby Moay, Mehdi Salemiseresht, Chuchi Montenegro
Department of Computer Science, College of Computer Studies, Silliman University, Dumaguete City,
Abstract—This paper investigates the use of SVM-SMO algorithms in estimating the age of a person through the evaluation of
its facial features on both front and side-view face orientation. Stephen-Harris algorithm, SURF, and Minimum Eigenvalue
Feature Detection algorithms were also used for feature extraction. During experiments, training sets composed on 44 front view
images and 44 side view images were used to train the network. Testing was performed to 140 front view images and 44 side
view images. Result of the experiment shows age recognition of 53.85% for front view images and 14.3% for side view images.
Estimating Biological Function Distribution of Yeast Using Gene Expression Data
Julie Ann A. Salido and Stephanie S. Pimentel
Aklan State University, College of Industrial Technology, Kalibo, Aklan, Philippines
Abstract—Microarray technologies that monitor the level of expression of a large number of genes have emerged. And given
the technology in deoxyribonucleic acid (DNA) - microarray data for a set of cells characterized by a phenotype an important
problem is to identify ―patterns‖ of gene expression that can be used to predict cell phenotype. The potential number of such
patterns is exponential in the number of genes. Detection of genes biological function in silico which has not yet been
discovered through other means aside from wet laboratories is of practical significance. In this research, biological function
distribution of budding yeast cell Saccharomyces cerevisiae, using 170 classified gene expression data of yeast is used for
visualization and analysis, and evaluated with the reference time distribution using FACS and budding index analysis. We define
the criteria using edit distances, a good scientific visualization with 83.78% prediction on time series distribution on the first
peak and 86.49% on the second peak. пЂ T001
2-D Phase Unwrapping Algorithm Based on Pseudocorrelation Quality Map
Samir. Aguemoune, Faiza. Hocine, Aichouche. Belhadj Aissa and Abdelhakim. Ayadi
University of Sciences and Technology Houari Boumediene (USTHB)/ Centre de Recherche en Astronomie
Astrophysique et GГ©ophysique(CRAAG)/Division de Sismologie, AlgГ©rie, Alger
Abstract—Phase unwrapping is the mathematical problem-solving that appears in several research areas such as:
Interferometric Synthetic Aperture Radar (InSAR), optical interferometry and adaptive optics. Phase unwrapping is an essential
and critical step in interferometric processing. It consists in retrieving the absolute phase from modulo-2ПЂ phase. In this paper,
we propose a 2-D phase unwrapping algorithm based on a contextual pseudocorrelation quality map and non-continuous path
unwrapping. It measures the variability of the phase relative to the discontinuities and the transitions of the fringes in the
interferogram. The proposed method has been tested using synthetic and real interferograms.
Towards Making A Road Map for Using GIS in Oman
Ayoub Salim Albadwi
Dept. of Information Technology, Colleges of Applied Sciences, Ibri, Sultanate of Oman
Abstract—A geographic information system (GIS) is viewed as the science of geographical or spatial information which
possesses its own set of research questions. In the other hand, GIS is viewed very much as a technological tool which helps the
analyst to use his/her knowledge and insight to study substantive issues. GIS is particularly important for Oman because of its
convergence towards knowledge economy, smart location, harsh geographical nature, and scarcity of population. This paper will
discuss opportunities of GIS in Oman. More specifically, we will discuss key application domains such oil resources, water
resources, community development, car and urban planning.
This research seeks to create a road map for using GIS in Oman. This map will help both government and private sector to
achieve their existing and future goals and strategies in an effective way.
Mammographic Masses Segmentation using Implicit Deformable Models: The LCV Model in Comparison
with the Osher-Sethian Model
Fouzia Boutaouche and NacГ©ra Benamrane
Department of Informatics, faculty of Mathematics and Informatics, USTO-MB, Oran, Algeria.
Abstract—Breast cancer is one of the leading causes of cancer death among women. As such, the role of digital mammographic
screening is to detect cancerous lesions, at an early stage, and to provide high accuracy in the analysis of the size, shape, and
location of abnormalities. Segmentation is arguably one of the most important aspects of a computer aided detection system,
particularly for masses. This paper attempt to introduce two level set segmentation models for mass detection on digitized
mammograms. The first in an edge-based level set algorithm, proposed by Osher and Sethian. The second is a region-based
level set algorithm called the local Shan-Vese model. A comparative study will be given, in which we will assess the
performance of the second approach in terms of efficiency.
On Image Based Fast Feedback Systems for Academic Evaluation
Evgeny Gershikov and Samuel Kosolapov
Ort Braude, Carmiel, Israel
Abstract—In this research image based Fast Feedback (FF) systems are presented, that use image processing and computer
vision techniques. The goal of this work is to provide tools for automatic checking and grading of multiple choice questions in
quizzes and exams for academic evaluation of students. These tools can be also used to monitor the level of students�
understanding of the material and to receive feedback from them about the quality of the lessons during courses in academic
institutions. First possible FF setups and processing methods for multiple choice questions are discussed. Then results of
experiments with this type of questions are presented.
п‚І Tips:
The best paper will be chosen after each session and the certificate will be awarded by
the chair. Good Luck!
Saturday Evening, October 11
6:30 pm to 8:30 pm--Dinner
The Square restaurant (6th Flr)
п‚І Tips: The Dinner will start at 6:30pm. Please kindly attend on time with bringing the Dinner Coupon.
Sunday, October 12
One Day Tour
The conference organizer has provided the one day tour in Bangkok for all the registered authors, listeners, and
presenters after the conference for free
Bangkok - Floating Market and Thai Village Cultural Show Tour At Sampran Riverside
You will have the opportunity of witnessing the unique and unforgettable experience of the
world-renowned Thai Village Cultural Show. Daily, over 150 performers vividly portray a fascinating cross
section of Thailand's culture, heritage and way of life; dances, ceremonies, rituals, sports and pastimes.
07.00 AM. Pick up from various hote. Departure from Bangkok. On the way, you will see the salt field both
side. Get to the sugar factory to observe the process of sugar refinery from coconut fluid. Arrive at the
ferry-boat pier and take a long-tailed boat to the main part of the floating market. Departure from
Damnoen saduak market to The Thai Village Cultural show at Sampran Riverside.
12.20 PM. Thai lunch is served at restaurant. Exciting displays of Thai martial arts, Thaiboxing and sword
fighting, combat skills which date back over 600 years. Romantic and joyful rituals of the traditional Thai
wedding ceremony. Rich pageantry of Buat Naag-the ceremony of ordination into the Buddhist Monkhood.
Lively tribal dancers; the graceful Fingernail Dance from the North, the rhythmic Bamboo Dance, The Kala
Dance from the south and the joyful Yoey Dance from the Central plains. Popular spot of takraw. Elephants
at work as the still do today in the teak forests of northern Thailand. (You will enjoyriding on them.)
Arrive in Bangkok 17.30 PM.
Please identify the one day tour when you register for the conference, if you are interested in it.
Please contact the conference secretary if you have any questions.
Conference Venue
Hotel Novotel Bangkok Platinum Pratunam
Please take a few moments to provide us some important feedback about your professional development
of Chengdu conferences.
Conference Feedback
Use the key below
Very Goodв–Ў
Use the ranking key above as appropriate to answer the questions below on the blank spaces provided at
the end of each questions
How was the overall organization of the conference
How do you rate the registration area
How do you rate the presenter(s)
Did you gain any helpful skills
How was the format of the meeting in terms of
lunch, coffee breaks?
Overall, how were the conference facilities
How was the reception you received at the
How was the venue
List other locations where you think future meeting
should be held
Why did you choose that venue?
Generally, how was the whole experience at the
meeting, and given another chance would you attend
or recommend next year's conference?
Comments and Suggestions