2014 BANGKOK CONFERENCES Bangkok, Thailand October 10-12, 2014 пЂє ICFIT 2014 2014 5th International Conference on Future Information Technology пЂє ICCSM 2014 2014 4th International Conference on Computer and Software Modeling пЂє ICCSP 2014 2014 International Conference on Communication and Signal Processing пЂє ICIEE 2014 2014 The 4th International Conference on Information and Electronics Engineering пЂє ICAIP 2014 2014 International Conference on Advances in Image Processing пЂє ICRAE 2014 2014 International Conference on Robotics and Automation Engineering Programme 2014 BANGKOK, CONFERENCES WELCOME LETTER 3 OVERVIEW 4 PUBLICATIONS 6 KEYNOTES 8 DETAILED SCHEDULE 11 SESSION 1: IMAGE AND SIGNAL PROCESSING 13 SESSION 2: NETWORK AND COMMUNICATION 17 SESSION 3: INTELLIGENT TECHNOLOGY AND CONTROL 22 SESSION 4: SOFTWARE ENGINEERING AND IT 25 ONE DAY TOUR 30 MAPS 31 CALL FOR PAPERS 32 FEEDBACK 35 2 2014 BANGKOK CONFERENCES Dear Participants, Welcome to 2014 Bangkok Conferences! We are confident that over the three days you will get the theoretical grounding, practical knowledge, and personal contacts that will help you build a long-term, profitable and sustainable communication among researchers and practitioners in a wide variety of scientific areas with a common interest. For the conferences, we had received more than 150 submissions, and around 45 excellent papers were accepted for presentation. Congratulations for these papers. We wish to thank our outstanding keynote speakers Prof. Maode Ma, Prof. S. Arumuga Perumal and Prof. Liyanage C De Silva for sharing their deep insights on future challenges and trends in Image and Signal Processing, Network and Communication, Intelligent Technology and Control, Software engineering and IT. Special thanks also go to all the researchers and students who participate in the conference with their work. Hope you enjoy the conference, the food, the hospitality, and the beautiful and charming environment of the city of Bangkok, Thailand! Organizing Committee 3 2014 BANGKOK, CONFERENCES Conference Agenda Overview Friday, Oct. 10, 2014 10 :00 am to 5:00 pm in front of Platinum Lounge ( 6th Flrпј‰ Arrival and Registration Saturday, Oct. 11, 2014 8:30am to 8:45am Opening Ceremonies Keynote Address: 8:45am to 9:35am Prof. Maode Ma Nanyang Technological University, Singapore 9:35am to 10:00am Group Photo & Coffee Break Sapphire II (7th Flr) Keynote Address: 10:00am to 10:50am Prof. S.Arumuga perumal, Head, Department of Computer Science and Research, S.T.Hindu College, India Keynote Address: Prof. Liyanage C De Silva 10:50am to 11:40am Deputy Dean, Faculty of Integrated Technologies (FIT), University of Brunei Darussalam, Brunei Darussalam 12:00am to 1:00pm Lunch Session 1: Image and Signal Processing——12 presentations 1:00pm to 3:35pm Session 2: Network and Communication——14 presentations 3:35pm to 3:50pm 3: Intelligent Technology and Control——11 Sapphire II (7th Flr) presentations Session 4: Software engineering and IT ——11 presentations 6: 30pm to 8:30pm Board room(7th Flr) Coffee Break Session 3:50pm to 6:20pm The Square restaurant (6th Flr) Sapphire II (7th Flr) Board room(7th Flr) The Square restaurant (6th Flr) Dinner 4 2014 BANGKOK CONFERENCES Sunday, Oct. 12, 2014 7 :00 am to 5:30 pm One Day Tour Instructions for Oral Presentations Devices Provided by the Conference Organizer: пѓ� Laptops (with MS-Office & Adobe Reader) пѓ� Projectors & Screen пѓ� Laser Sticks Materials Provided by the Presenters: пѓ� PowerPoint or PDF files пѓ� Duration of each Presentation (Tentatively): пѓ� Regular Oral Session: about 15 Minutes of Presentation including 2-3 Minutes of Q&A пѓ� Plenary Speech: 45 Minutes of Presentation, 5 Minutes of Q&A NOTICE: пѓ� *Certificate of Participation can be collected in front of the registration counter. пѓ� *The organizer will not provide accommodation, so we suggest you make an early reservation. пѓ� *One best presentation will be selected from each session. The best one will be announced when each session ends, and will be awarded by the session chair after each session in the meeting room. пѓ� *The attendee should provide the author’s authorization or attendee’s passport ID when the attendee is none of the authors. 5 2014 BANGKOK, CONFERENCES PUBLICATIONS пѓ� All accepted papers of ICFIT 2014 will be published in the Advanced Materials Research Journal (ISSN: 1022-6680) as a special issue. Journal of Industrial and Intelligent Information (JIII, ISSN: 2301-3745; DOI: 10.12720/jiii) Indexed by Ulrich’s Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library. Lecture Notes on Information Theory (LNIT, ISSN: 2301-3788; DOI: 10.12720/lnit) Indexed by Ulrich’s Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library. пѓ� All accepted papers of ICCSM 2014 will be recommended to be published into one of the journals below: Lecture Notes on Software Engineering (LNSE, ISSN: 2301-3559; DOI: 10.7763/LNSE) Indexed by DOAJ, Electronic Journals Library, Engineering & Technology Digital Library, EBSCO, Ulrich’s Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest and Google Scholar. International Journal of Modeling and Optimization (IJMO, ISSN: 2010-3697; 10.7763/IJMO) Indexed by Engineering & Technology Digital Library, ProQuest, Crossref, Electronic Journals Library,DOAJ, Google Scholar, EI (INSPEC, IET). пѓ� All accepted papers of ICCSP 2014 will be recommended to be published into one of the journals below: International Journal of Signal Processing Systems (IJSPS, ISSN: 2315-4535; DOI: 10.12720/ijsps) Indexed by Ulrich’s Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library Journal of Communications (JCM, ISSN: 1796-2021;DOI: 10.12720/jcm) Indexed by EI Compendex; SCOPUS; ULRICH’s Periodicals Directory; Google Scholar; INSPEC, etc. пѓ� Papers of ICIEE 2014 are published in International Journal of Information and Electronics Engineering (IJIEE, ISSN: 2010-3719) Abstracting/Indexing: Ei (INSPEC, IET), Google Scholar,EBSCO, Electronic Journals Library,Engineering & Technology Digital Library,Crossref and ProQuest, DOAJ, . пѓ� Papers of ICAIP2014 are published in Journal of Image and Graphics (JOIG, ISSN: 2301-3699, DOI:10.12720/joig) , Abstracting/Indexing: :Ulrich’s Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library пѓ� Papers of ICRAE 2014 are published into Journal of Automation and Control Engineering (JOACE, ISSN: 2301-3702,DOI: 10.12720/joace ) Abstracting/Indexing: Ulrich’s Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library 6 2014 BANGKOK CONFERENCES Cover Art: Sponsored by: 7 2014 BANGKOK, CONFERENCES Enhancement of Security Functionality for 4G LTE Wireless Networks Prof. Maode Ma Nanyang Technological University, Singapore Abstract: In this talk, an overview of the architecture of LTE wireless networks will be the presented followed by an introduction on the security framework in the LTE wireless networks specified by 3GPP. The major security mechanisms in the LTE wireless networks and their fundamental functionality will be presented. Furthermore, various possible malicious attacks to the LTE wireless networks and the vulnerabilities of the existing authentication schemes in the LTE wireless networks will be revealed. Moreover, a few potential open research issues and the current solutions on the security functionality of the LTE wireless networks will be explored to attract the attentions and interests from the research community and industry. At last, a solution to prevent denial-of-service attacks and enhance the security of the authentication process for the LTE wireless networks will be introduced to an example to motivate the academic research in this field. Biography: Dr. Maode Ma received his Ph.D. degree in computer science from Hong Kong University of Science and Technology in 1999. Now, Dr. Ma is an Associate Professor in the School of Electrical and Electronic Engineering at Nanyang Technological University in Singapore. He has extensive research interests including wireless networking and network security. He has led and/or participated in 18 research projects funded by government, industry, military and universities in various countries. He has been a member of the technical program committees for more than 150 international conferences. He has been a general chair, technical symposium chair, tutorial chair, publication chair, publicity chair and session chair for more than 50 international conferences. Dr. Ma has more than 250 international academic publications, including over 110 journal papers and more than 140 conference papers. He currently serves as the Editor-in-Chief of InternationalJournal of Electronic Transport.He also serves as a Senior Editor for IEEE Communications Surveys and Tutorials, and an Associate Editor for International Journal of Network and Computer Applications, International Journal of Security and Communication Networks,International 8 2014 BANGKOK CONFERENCES Journal of Wireless Communications and Mobile Computing and International Journal of Communication Systems.He had been an Associate Editor for IEEECommunications Letters from 2003 to 2011. Dr. Ma is the Fellow of IET and a senior member of IEEE Communication Society and IEEE Education Society. He is the Chair of the IEEE Education Society, Singapore Chapter. He is also serving as an IEEE Communication Society Distinguished Lecturer. Internet of Things Prof. S. Arumuga Perumal Head, Department of Computer Science and Research, S.T.Hindu College, India Abstract: The fast development of ICT leads to the increase in number of electronic gadgets more and more every year. Electronic gadgets dominate a major part in our personal life. So the researchers are in a critical position to manage and control this growth while at the same time facing constrained budgets and increasing energy conservation. Integration of the existing technology leads to the development of Internet of Things (IoT) which in turn leads to the development of smart environment where the public used sensor/Non Sensor based objects and functioning services are smartly controlled. The entire objects and services in the environment will be connected to an internet through Wireless-Fidelity i.e., Internet of Things. Office, hotels, shopping malls, institutions etc. should be integrated through Wi Fi so that we can reduce time management in sharing data and managing objects effectively and efficiently with smart security system through smart management techniques in the environment to optimize the energy consumption and simultaneously they will regulate and manage the energy level. The development of IOT makes the world continuous to generate quintillion bytes of data daily leading to the processing needs for new effort in dealing with grand challenges to the technology and the organizations should come forward to, pave a way for the storage, retrieval, management, analysis and get insight about what has happened, What is happening and what is going to happen can be summarized via the popular five V’s viz., Volume, Velocity, Variety, Veracity and Value. IoT applications can offer good opportunities and are the best solution for this present and future problem. Thanks to the administration by digital technologies and information. Biography: Dr. S. Arumuga Perumal, Professor and Head of the Department of Computer Science and Research ,South Travancore Hindu College, Nagercoil, Tamilnadu, India received his M.S degree in Software Systems from BITS, Pilani , Ph.D. degree in computer science from Manonmaniam Sundaranar university and Chartered Engineer from Institution of Engineers(India) and Institution of Electronics and Telecommunication Engineers. He has extensive research interests including network security, Green computing and image processing. He has been a member of the technical program committee for more than 50 international conferences. He has been a technical track chair, tutorial chair, publication chair, and session chair for more than 50 international conferences. He has published more than 100 international academic research papers. He is a senior member of Computer society of India and senior member of IEEE. Charted Engineer 9 2014 BANGKOK, CONFERENCES and Fellow of IE, Fellow of IETE, Fellow of IACSIT. He is involved in various academic activities such as curriculum development and professional society activities. He got Best teacher award from Tamilnadu Government, IETE Award, CSI award for academic excellence, Asiriar Chemmal award, and Eminent Engineer award from IE(I)-Madurai. He has successfully guided number of Ph.D scholars under his guidance. Smart Homes – Energy Efficient and Safe Living with Ease Prof. Liyanage C De Silva Deputy Dean, Faculty of Integrated Technologies (FIT), University of Brunei Darussalam, Brunei Darussalam Abstract: In this talk I will present the state of the art of smart home technologies from several perspectives. The talk organizes the related researches as follows. Before going into specific application categories I will first look at different techniques used in smart homes namely; video based techniques, audio based techniques and multimodal techniques. Then I will outline video based techniques for human activity detection in smart environments followed by audio-based techniques. Subsequently I will investigate how to combine multiple sensory modalities to recognize actions and events that take place in a smart home. Thereafter I will look at specific applications of smart homes such as for eldercare and childcare followed by an investigation of smart home applications that make homes energy efficient. Biography: Professor Liyanage C De Silva has received BSc Eng(Hons) degree from the University of Moratuwa Sri Lanka in 1985, Mphil degree from The Open University of Sri Lanka in 1989, Meng and PhD degrees from the University of Tokyo, Japan in 1992 and 1995 respectively. He was with the University of Tokyo, Japan, from 1989 to 1995. From April 1995 to March 1997 he has pursued his postdoctoral research as a researcher at ATR (Advanced Telecommunication Research) Laboratories, Kyoto, Japan. In March 1997 he has joined The National University of Singapore as a Lecturer where he was an Assistant Professor till June 2003. He was with the Massey University, New Zealand from 2003 to 2007. Currently he is the Professor of Engineering and the Deputy Dean of the Faculty of Integrated Technologies http://fit.ubd.edu.bnat the University of Brunei Darussalam. Liyanage’s current research interests are Power System Analysis, Image and Speech Signal Processing (in particular multi modal emotion recognition and speech emotion analysis), Digital Communication (CDMA, OFDMA etc.), Information theory (source coding), Pattern recognition and understanding (biometric identification), Multimedia signal processing, and Smart Sensors (Smart environments for security, eldercare and energy efficiency). He has over 29 years of postgraduate experience in various levels in his career in the Asia Pacific region. Liyanage has published over 160 technical papers in these areas in international conferences, journals and Japanese national conventions and holds one Japanese national patent, which was successfully sold to 10 2014 BANGKOK CONFERENCES Sony Corporation Japan for commercial utilization, and 2 US and 4 Brunei patents. Liyanage’s works have been cited as one of the pioneering work in the bimodal (audio and video signal based) emotion recognition by many researchers. His papers so far have been cited by more than 1650 times (according to scholar.google.com) with an h-index of 18. Detailed Schedule Friday, October 10 Location in front of Platinum Lounge ( 6th Flr) Arrival and Registration 10пјљ00– 12пјљ00 13пјљ00 — 17пјљ00 Tips: After sign, you will collect your conference package, including: Original Receipt Journal (Only for Author Attendee) Representative / Pass Card with Tie Printed Program Lunch Coupon Dinner Coupon *Participation Certificate (collected from Session Chair after the presentation) Conference Souvenir Computer Bag Notice: пЃ¬ Please check on all these materials as soon as you get the package; if any of them is not included in the package, please let us know at once; If any of them gets lost after the registration, no additional one would be provided. Your understanding will be appreciated! пЃ¬ Each regular registration covers only one package. Additional package will be charged. пЃ¬ Some attendees may arrive on Oct. 11th, kindly be noted that you can register at the registration desk from 9 am onwards. 11 2014 BANGKOK, CONFERENCES Saturday Morning, October 11 Opening Ceremony Location Sapphire II (7th Flr) Opening Ceremonies 8:30am to 8:45am 8:45am to 9:35am Prof. S.Arumuga perumal Head, Department of Computer Science and Research, S.T.Hindu College, India Plenary Speech 1: Enhancement of Security Functionality for 4G LTE Wireless Networks Prof. Maode Ma Nanyang Technological University, Singapore 9:35am to 10:00am Group Photo & Coffee Break Plenary Speech 2: Internet of Things 10:00am to 10:50am Prof. S.Arumuga perumal Head, Department of Computer Science and Research, S.T.Hindu College, India Plenary Speech 3: Smart Homes – Energy Efficient and Safe Living with Ease 10:50am to 11:40am Prof. Liyanage C De Silva Deputy Dean, Faculty of Integrated Technologies (FIT), University of Brunei Darussalam, Brunei Darussalam 12:00pm——1:00pm Lunch Time Location The Square restaurant (6th Flr) Tips: пѓ� Please be noted that lunch coupon is necessary for entering the restaurant. 12 2014 BANGKOK CONFERENCES пѓ� Please arrive on time to the conference room by 1:00 pm. Thank you! Saturday Afternoon, October 11 -PAPER SESSIONSSession 1: Image and Signal Processing Chair: Prof. S. Arumuga perumal; Co-chair: Prof. Martin Dobrovolny 12 presentations Time: 1:00pm to 3:35pm th Venue: Sapphire II (7 Flr) SP0004 A Robust Image Encryption Method Based on Bit Plane Decomposition and Multiple Chaotic Maps Wipawadee Auyporn and Sartid Vongpradhip Chulalongkorn University Abstract—Multimedia security is very important for multimedia communications over open network. For some applications, the highly robust image encryption approach is needed. This project aims to design a high security image encryption method, since the conventional encryption methods such as DES, AES, and RSA do not suit for image data because there are high correlations and redundancy among pixels in natural images. By using two concepts; bit plane decomposition and multiple chaotic maps, the proposed encryption scheme offers more robust encryption method that is suitable for image data. In the confusion stage of the encryption, the image data is decomposed into eight bit planes, and then each bit plane is permuted separately based on different chaotic map. After that, eight bit planes are recomposed and performed XOR operation with a generated random bit matrix in order to alter all pixel values completely. In diffusion stage, the image is diffused based on a new generated sequence, and performed XOR operation again with another random bit matrix before iterating the diffusion process. The performance of the proposed method is evaluated by using statistical, key space, and key sensitivity analysis. The results show that the proposed image encryption method is very secure and robust against different attacks.пЂ SP0006 Speech Emotional Classification Using Texture Image Information Features Kun-Ching Wang Shih Chien University Abstract—Emotion recognition is one of the latest challenges for human-computer interaction (HCI). In general, a system approach for recognition of human emotional state is usually from two inputs: audio/speech and visual expressions. So, the emotional recognition system needs two audio-based and image-based kernels to process audio and visual modules. In order to cost down the requirement of the emotional recognition containing two-kernel two-module (TKTM) system, the speech-based kernel can be regarded as an image-based processing. In this paper, we present a novel speech emotional feature extraction based on visual signature extraction derived from time-frequency representation. First, we transform spectrogram as a recognizable image. Next, we use cubic curve to enhance the 13 2014 BANGKOK, CONFERENCES contrast of speech spectrogram image. Then, the texture image information (TII) derived from spectrogram image can be extracted by using LawsвЂ� masks to characterize emotional state. Finally, we use the support vector machine (SVM) to classify emotion. SP0008 The Obstacle Detection and Objects Tracking on the Railway Crossing Martin Dobrovolny and Zdenek Silar University of Pardubice, Czech Republic Abstract—This article deals with the obstacle detection and objects trackingon a railway crossing Clearance Detection. Detection is based on the optical flow estimation and classification of the flow vectors by K means clustering algorithm.The object tracking based on Template Matching and Sum of Absolute Differences was also implemented for better reliability to the system.For classification of passingvehicles is used optical flow direction determination. The optical flow estimation is based on a modified Lucas-Kanade method. SP0015 An Image Retrieval Method Using Homogeneous Region and Relevance Feedback Vu Van Hieu and Nguyen Huu Quynh Haiphong University Abstract—Relevance feedback and region based image retrieval are two effective ways to improve accuracy in content-based image retrieval. In this paper, we propose a content-based image retrieval method using relevance feedback and homogeneous region. By extracting a number of homogeneous color regions from the image and calculating the occurrence frequency of regions, we convert image feature vectors to weighted vectors. On the basis of the weighted vectors, we calculate the similarity between two weighted vectors and using relevant feedback technique. Our experimental results on a Wang database of over 10,000 images suggest that the technique results in which is close to userвЂ�s intention better than the CbsIR and CCH methods. F1009 Histogram to Sound Conversion: A Review HimadriNathMoulick, Moumita Ghosh, Dr. PoulomiDas,Dr. ChandanKoner and Alok Kumar Roy BankuraUnnayani Institute of Engineering,India Abstract—The main goal of a voice conversion system is to modify the voice of a source speaker, in order to be perceived as if it had been uttered by another specific speaker. Many approaches found in the literature convert only the features related to the vocal tract of the speaker. Our proposal is to not only convert those characteristics of the vocal tract, but also to process the signal passing through the vocal chords. Thus, the goal of this work is to obtain better scores in the voice conversion results. Also, this paper describes a method of compensating for nonlinear distortions in speech representation caused by noise. The method described here is based on the histogram equalization method often used in digital image processing. Histogram equalization is applied to each component of the feature vector in order to improve the robustness of speech recognition systems. The paper describes how the proposed method can be applied to robust speech recognition and it is compared with other compensation techniques. F1010 Robust Adaptive Control with the use of DACDM Algorithm – Impact of Settings on Tracking Quality WojciechGiernacki PoznaЕ„ University of Technology, Poland Abstract—In this paper a new, discrete, robust adaptive control algorithm (DACDM) and research results on tracking quality improvement and on the increase of control system robustness to parametric uncertainty were presented. The proposed control algorithm permits 14 2014 BANGKOK CONFERENCES to obtain the desired output signal courses at the apriori declared time regime with the save of control system stability in the presence of control signal constraint by the proper modification and integration of so far applied algorithms of continuous time control which makes possible the triple level monitoring of system robustness in discrete control – through the use of coefficient diagram, through the introduction of an additional filter to the control system (which parameters are by the J function reflected) as well as the use of the adaptive algorithm with parameters estimation of discrete model by recursive least squares (RLS) method. The influence of various settings of algorithm parameters on a tracking quality, was considered. Simulations results confirm the efficiency of DACDM algorithm in the context of considered classes of plants. пЂ T010 Enhanced Still 3D Integral Images Rendering Based on Multiprocessor Ray Tracing System M. G. Eljdid, A. Aggoun and O. H. Youssef Tripoli University, Libya Abstract—The main purpose of this paper is to introduce 3D integral imaging interpolation method, to overcome the 3D missing information problem occurred between cylindrical lenses (micro-images) due to occluded areas in the previous cylindrical lens, new cylindrical lens shows an area, to generate one single photo-realistic 3D integral imaging frame. The method is based on a Multiprocessor ray-tracer containing 3D integral imaging parser, 3D integral camera model, a 3D integral imaging renderer, spatial coherence and 3D scene transformations. Consequently, an increase in speed in the generation of still 3D integral image is achieved compared to fully ray tracing time of missing pixels. Experiments show that a significant reduction in execution time is achieved by using the 3D integral interpolation process. Savings up to (57%-66%) in the ray tracing time when compared to fully ray tracing the missing pixels depends on the complexity of the scene. T018 Detection of Architectural Distortion in Mammogram Rekha Lakshmanan, Shiji T P, Vinu Thomas, Suma M.Jacob and Thara Pratab Govt. Model Engineering College,India Abstract—Amethod for the detection of the most commonly missed breast cancer anomaly, Architectural distortion, is proposed here. The distorted abnormal structures associated with Architectural distortion in suspicious regions are extracted using geometrical properties of edge features based on an energy model. Contours obtained from a modified Single Univalue Segment Assimilating Nucleus filtered mammogram, are employed for this purpose. A Pectoral muscle delineation technique is incorporated in the proposed method to reduce false positive rate.A ranking value of these potential regions based on linear and converging properties is computed to identify the probable origins of architectural distortion. Experimental analysis is performed on 100 images obtained from Lakeshore Hospital, India. The results are verified by expert radiologists. The proposed algorithm is successful in 94 mammograms and the results are found to be promising. T017 A Hybrid Edge Detection Method for Cell Images Based on Fuzzy Entropy and the Canny Operator Yuexiang LI, Siu-Yeung CHO and John Crowe University of Nottingham, Ningbo, China Abstract—Since cell biologists need to use image processing techniques, such as edge detection, to analyze cell images the precision of these techniques is pivotal to their work. Due to the often low quality of cell images, existing edge detectors fail to routinely produce highly accurate results. In this paper, a novel hybrid method based on the canny 15 2014 BANGKOK, CONFERENCES operator and fuzzy entropy theory is proposed. The method calculates the fuzzy entropy of gradients from an image to decide the threshold for the canny operator. Application of the method to cell images has demonstrated its excellent performance in edge detection and robustness in the presence of noise. T006 Unsupervised Change Detection from Multitemporal SAR Images based on a Detail Preserving approach and a Robust Threshold Estimation Boulerbah Chabira, Takieddine Skanderi, Mohamed Tadj-Eddine Mahmoudi, Aichouche Belhadj aissa University of Technology and Sciences Houari Boumediene, Algeria Abstract—In environment monitoring and disaster management, Synthetic aperture radars (SARs) have shown their great efficiency due to the fact that they provide short revisit times and they can operate in day and/or night and their independence of weather conditions. Different applications have been addressed a lot in recent years, but the one that receives a lot of attention is the change detection of the observed earth surface by exploiting the multitemporal SAR images. In this paper, we propose an unsupervised method for the change detection from multitemporal SAR images that does not require any speckle filtering. This method is based on: i) generating a multiresolution set of the single-channel log ratio image using stationary wavelet transform (SWT); ii) applying the T-point algorithm for all the images of the multiresolution sets; and iii) fusing the obtained images at the optimum reliable scale to generate the change map. The proposed method was experimentally validated using semisimulated and real SAR images acquired by RADARSAT-2 satellite in the region of Algiers. E020 A Novel Approach of Curvature based Heat Diffusion for shape based Object Recognition M. Radhika Mani, G.P.S. Varma, Dr. Potukuchidm, Dr. Ch. Satyanarayana Pragati Engineering College, India Abstract—Diffusion geometry plays a vital role in shape analysis and object recognition. It evokes from propagation of heat on the object surface. This derives the intrinsic or invariant features of the surface. The heat kernel signature (HKS) based on heat diffusion suffers with the problem of scale sensitivity. This is resolved by the scale invariant heat kernel signature (SIHSK). It involves the Fourier descriptors for providing scale invariance property. This method considers only orthogonal features. The present paper has extended this by considering the curvature properties to SIHSK viz., curvature heat diffusion method with SIHSK (CSIHSK). The proposed method adopted the Modified Euclidean distance for shape similarity measure and is experimented over three standard databases. The results prove the efficiency of the proposed method than that reported for other descriptor of concurrent interests. E023 Estrus Detection for Dairy Cow Using ZigBee-based Sensor Networks Chien-Hsing Chen and Hung-Ru Lin Information Technology Department, Meiho University, Taiwan Abstract—The reproductive performance of dairy cows is influenced primarily by estrus-detection accuracy. Effective estrus-detection systems are beneficial to increasing pregnancy rates, improving the reproductive performance of dairy cows. The most obvious external symptom of estrus in dairy cows is standing-heat behavior. The standing cows remain briefly motionless for several seconds when repeatedly mounted by mounting cow. Therefore, in this study, wireless sensor networks were used to develop a standing-heat signal detection and management system for dairy cows. This system detects the movement signals of mounting behavior by using a 3-axial accelerometer within a wireless sensor installed on the forefeet of cows. When signal of accelerometer exceed a threshold value, the ZigBee begins broadcasting signals to the surrounding sensor nodes. The received signal strength indicator (RSSI) between the broadcasting node and every sensor node is recorded. The ZigBee serial number and the RSSI for sensor nodes are then 16 2014 BANGKOK CONFERENCES sent to a terminal database system, which compares the RSSIs in the batch to determine the serial number with the strongest RSSI, achieving the goal of estrus detection. In addition, the results of estrus detection also can be inquired by a smartphone-base system. Session 2: Network and Communication Chair: Prof. Maode Ma 14 presentations Time: 1:00pm to 3:35pm th Venue: Board room(7 Flr) SP0002 High Gain Vivaldi Antenna for Radar and Microwave Imaging Applications Gaurav Kumar Pandey, Hari Shankar Singh, Pradutt Kumar Bharti, Amritanshu Pandey and Manoj Kumar Meshram Indian Institute of Technology (Banaras Hindu University),Varanasi, India Abstract—An Ultrawideband (UWB) high gain compact Vivaldi antenna with end fire radiation patterns is presented for radar and microwave imaging applications. The antenna is operating for 2.9 GHz to more than 11 GHz with -10Db impedance bandwidth and is designed on low cost FR4 substrate of thickness 0.8mm. While designing the proposed antenna, initially a compact exponential tapered slot Vivaldi antenna is presented for wide impedance bandwidth performances. Further, the Vivaldi antenna is modified by incorporating corrugations on the edges of exponential metallic flaring section and some periodic grating elements consists of small metallic strips on the slot area, which results in improvement in gain significantly along with increased directivity and lower frequency band coverage. The proposed antenna shows nearly stable end-fire radiation patterns throughout the frequency range. The surface current distributions and input impedance plots are presented to understand the antenna mechanism.пЂ SP0003 Design of an Ag Plasmonic Nanowire Waveguide with Long Propagation Distance Yuan-Fong Chau Chien-Hsin University Abstract—By coupling light to the charges at nanometal interfaces, surface lasmon (SP) enables researches to control photons in a way they have never done before: at the subwavelength level. Coupling of incident light through an air region into an Ag plasmonic nanowire waveguide (APNW) is a highly difficult challenge of light guiding on the surface of metal nanowire. Surface lasmon polaritons, the electromagnetic waves propagating on the interface between metal and dielectrics, have allowed the modal confinement below the diffraction limit. In this paper, we numerically analyze the coupling effect of an APNW which is covered by a dielectric medium using a finite element method. The coupling effect can be modulated by adjusting the Ag nanowire diameter, the covering dielectric medium width and the wavelength of incident light, the propagation length of SP coupling can be maximized. Simulation results reveal that the field confinement can be significantly improved and the majority of the electric field can be carried on the surface of an APNW. The effects of electric field transport along an APNW due to SP coupling which is investigated for different dimensions and lengths. Accordingly, long propagation lengths of about 41500 nm at an incident wavelength of 715 nm and longer propagation length can be achieved if the more sections of APNW are used. Simulation results offer an efficient method for optimizing SP coupling into an APNW and promote the realization of highly integrated plasmonic 17 2014 BANGKOK, CONFERENCES devices. SP0017 Bayesian Multiple Estimation in Flat Rician Fading MIMO Channels Hamid Nooralizadeh Department of Electrical Engineering, Islamshahr Branch, Islamic Azad University Abstract—In this paper, the performance of the single-estimation (SE) and multiple-estimation (ME) is investigated in multiple-input multiple-output (MIMO) Rician flat fading channels using the traditional least squares (LS) estimator and the Bayesian minimum mean square error (MMSE) estimator. The closed form equations are obtained for mean square error (MSE) of the estimators in SE and ME cases under optimal training. In ME case, the optimal weight coefficients are achieved for both estimators. Analytical and numerical results show that the LS estimator has lower error in the case of ME than SE. Moreover, it is seen that the performance of MMSE channel estimator in the ME case is better than SE particularly at high signal to noise ratios (SNRs). Furthermore, it is shown that this estimator is more appropriate for the channels with weak line of sight (LOS) propagation paths and/or the low correlations. SP2002 Secure and Efficient Intermediate Node Authentication in Wireless Sensor Networks Rajeshwari C. Choukimath and Vasudha V. Ayyannavar пЂ Visvesvaraya Technological University. Karnataka. India Abstract—Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial, when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. Thus the aim of the project is to implement a scalable authentication scheme based on elliptic curve cryptography (ECC).While enabling intermediate nodes authentication. The proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, the scheme can also provide message source privacy. F1012 Performance Enhancement in Smart Environment using IOT S.ArumugaPerumal and A.Venkat Subramanian National Engineering College, Kovilpatti, India Abstract—Considering today, the number of electronic gadgets are more and more every year. Gadgets dominate a major part in publicвЂ�s career as well as personal life. We have to manage with this growth while at the same time facing constrained budgets and increasing in energy conservation. Most of the solutions will rely on massive deployment of Information and Communication technologies (ICT) and in particular wireless ones. The fast development of information and communication technology leads to the development of Internet of things (IoT) which in turn leads to the development of smarter environment where the whole public used sensor/non sensor based objects and functioning services are smartly controlled through advanced communication technology throughout the environment. The entire objects and services in the environment will be connected to an internet through Wireless-Fidelity i.e., Internet of Things. Office, hotels, shopping malls, institutions etc. should be integrated through Wi Fi so that we can reduce time management in sharing data and managing objects effectively and efficiently with smart security system through smart management techniques in the environment to optimize the energy consumption and simultaneously they will regulate and manage the energy level. In this paper we have suggested some of the implementation practices and advantages to 18 2014 BANGKOK CONFERENCES develop smart systems and services to improve the performance with engineering advancement in development of smart environment including objects in it along with ecofriendly and cost effective approach. X0021 Route Optimization Method for Unmanned Air Vehicle Launched from a Carrier Halil Savuran and Murat Karakaya Department of Computer Eng., Atilim University, Turkey Abstract—In this paper, we propose a route optimization method for a carrier-launched Unmanned Air Vehicle (UAV). In a real life use case, the carrier keeps on moving on its own route as the UAV executes its own mission of visiting the targets dispersed on a geographical area. Due to carrier mobility, determining the UAV take-off and land-on locations with a route which minimizes the total tour length is a crucial research question and a practical challenge. In order to resolve this problem, we have designed a solution based on the Genetic Algorithm (GA). We have observed the performance of the proposed approach on some well-known TSP problems by comparing its results against the results of the Nearest Neighbor (NN) heuristic. SP2004 QoS Analysis in Mobile Ad-hoc Networks Using Bandwidth Utilization Technique Nagendra Sah, Neelam Rup Prakash, and Deepak Bagai PEC University of Technology, Chandigarh, India Abstract—It is proposed to analyze the usefulness of Bandwidth Reservation Protocol (BRP) for mobile ad-hoc networks in improving the quality of service (QoS). There are two types of bandwidth reservation protocols namely, priority based and scheduling based. In this simulation the priority based bandwidth reservation protocols are used. These are Fair End-to-end Bandwidth Allocation (FEBA) and Priority based Bandwidth Reservation Protocol (PBRP) algorithms. PBRP protocol consists of two phases namely Bandwidth Request phase and Bandwidth Reply phase. In the former Phase, a Bandwidth Request (BREQ) message is forwarded from the node that requests the admission of a new traffic flow to its destination. In the later Phase, a Bandwidth Reply (BREP) message proceeds backwards, hop-by-hop, from the destination node to the node that originated the request along the path laid down by the corresponding BREQ message. The destination node precedes the reply according to the priority of traffic classes and reserves the bandwidth on the reply path. By simulation results, it is found that the use of these protocols achieve high bandwidth utilization and throughput with reduced delay. The simulation is done on mesh based On Demand Multicast Routing Protocol (ODMRP) by using QUALNET 5.0. SP2005 Analysis of Multicast Routing Protocols Using Quality of Service Nagendra Sah, Neelam Rup Prakash, and Deepak Bagai PEC University of Technology, Chandigarh, India Abstract—Multicasting is kind of subset of broadcasting in which we have to send data to the selected number of receivers present in the group. The group is called as multicasting group. The routing protocols are being for the sending of packets and managing of nodes. The objective of this paper is to research the current state of the art of existing multicast routing protocols for MANETs, and compare different approaches. There are three main classes of routing protocols for MANETs: reactive, proactive and hybrid. By studying advantages and disadvantages of each one, a new hybrid routing protocol is proposed. The new scheme of protocol, considers utilizing merits of both ODMRP and MAODV protocols, and implements them as a hybrid approach. It allows that a mobile node flexibly runs either a mesh or a tree routing protocol with its velocity and its traffic. The study is done by performance analysis of two well-known multicast routing protocols which are MAODV and 19 2014 BANGKOK, CONFERENCES ODMRP. Some of the perspective is being studied and an outer diagram is being proposed of new routing protocol. The two routing protocols are being compared on the basis of different parameters. SP3001 Analysis of OOK Upstream Signal Remodulation for Different Data Rates in WDM PON Network Amit Kumar Garg and Vijay Janyani Department of Electronics and Communication Engineering, Malaviya National Institute of Technology, India Abstract—A bidirectional wavelength division multiplexed passive optical network has been proposed in which downstream DPSK signal is used for upstream OOK signal remodulation. 10 Gbps DPSK signal is used for 1.25, 2.5 and 5 Gbps OOK signal remodulation. Error free operation is achieved for 20 km fiber without any dispersion compensation with low power penalty for downstream and negligible for upstream. Impact of different- different data rates for OOK upstream signal remodulation has been analyzed in terms of bit error rate and Q factor for received power penalty. X0012 An Analysis and Improvement of Probe-Based Algorithm for Distributed Deadlock Detection Kunal Chakma, Anupam Jamatia, and Tribid Debbarma National Institute of Technology Agartala, India Abstract— In this paper we propose an improved probe based deadlock detection algorithm for distributed systems. The algorithm proposed in this paper is an extension of previous works with an introduction of an identity set S in the probe initiation. The rate of dependency table clearance is determined by our algorithm, and how over-killing of processes can be avoided by using one additional data-structure is also shown by our algorithm. The algorithm shows how this data-structure should be updated with probe-messages with the identity set, and how it helps in determining which process should be selected as victim for resolving the deadlock, and which entries should be cleared in the dependency table after successful detection of a deadlock. The study indicates that in this algorithm, rate of probe initiation is a dominant factor in determining system performance and rules need to be framed for determining best value of it. пЂ X0013 XMPP Based Applications Under Low Bandwidth and High Latency Conditions Oral GГјrel and Mehmet Ulas Cakir Savunma Teknolojileri MГјhendislik A.Ећ., Turkey Abstract—This paper discusses use of Extensible Messaging and Presence Protocol (XMPP) based applications under Low Bandwidth and High Latency conditions. Such conditions usually occur during communication between air-to-air or air-to-distant sea platforms. Considering the type of subject conditions XMPP applications discussed in this paper is mostly applicable to military and defense industry. In terms of XMPP applications IM, chat, message broadcasting, Customizable Forms (CF), archiving and database functionalities can be considered. Conditions of Low Bandwidth and High Latency require existing XMPP and data exchange mechanism to be revised or simplified. Otherwise XMPP communication is delayed or gets interrupted and the purpose of XMPP application is not properly met. This study discusses the use of compression algorithms to tackle this problem. Although quantitative facts are provided and referenced this paper is based on empirical approach and includes qualitative results. X0015 Performance Analysis of Hierarchical and Flat Network Routing Protocols in Wireless Sensor Network using ns-2 Anupam Jamatia, Kunal Chakma, Nirmalya Kar, Dwijen Rudrapal, Swapan Debbarma National Institute of Technology Agartala, India 20 2014 BANGKOK CONFERENCES Abstract— In the era of technological advancement wireless communication using different advance technology and sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments like defense service specially Military service, Medical service, disaster management, wildlife monitoring and precision agriculture to habitat monitoring and logistics applications etc. Sensor networks have the characteristics of fault tolerance and rapid development make them very promising in the above mentioned field. The main objective of this paper is to analyze the performance of two categories routing protocols i.e. Hierarchical and Flat network routing protocols in Wireless Sensor Networks (WSN). For simulation purpose we have taken mainly Temporally-Ordered Routing Algorithm (TORA), Low Energy Adaptive Clustering Hierarchy (LEACH), and Intrusion-tolerant routing protocol for wireless Sensor NetworkS (INSENS) protocols. Segmented Buffer for NOC Router Biman Debbarma and Sambhu Pradhan National Institute of Technology, India Abstract—As the number of transistors in a single chip is increasing day by day, SoC is a very popular choice among the X0017 developers as it gives more speed and functionality. The IPs in the SoCs can be from different vendors and may be used for a third party for manufacturing a chip. For effective communication among the IPs or more commonly Cores, an in built network structure called Network on Chip (NOC) has been developed over the years and different versions of NOCs are available in the present day. This paper proposes a segmented buffer structure for NOC router for effective utilization of the NOC buffers. An Authenticated Key Exchange with Perfect Forward Secrecy for two Message Diffie-Hellman type Protocols Tribid Debbarma, Anupam Jamatia and Kunal Chakma National Institute of Technology Agartala, India AbstractпЂ вЂ” Security protocols are predefined set of rules, where sequence of message exchange takes place. It is a distributed program that might be executed on a network where the adversary may have control and access of the systems. Even in such a setting, the protocol should satisfy the desired security property. Since it is hard to consider all possible executions when designing a protocol, formal methods are often used to ensure the correctness of a protocol X0018 with respect to a model of the protocol and the adversary. Many such formal models use a symbolic abstraction of cryptographic operators by terms in a term algebra. The properties of these operators can then be modeled by equations. We show that it is possible to achieve perfect forward secrecy in two-message key exchange(KE) protocols that satisfy even stronger security properties than provided by the extended Canetti-Krawczyk (eCK) security model. In particular, we consider perfect forward secrecy in the presence of adversaries that can reveal the long-term secret keys of the actor of a session and reveal ephemeral secret keys. We propose a new security models for KE protocols. We formalize a slightly different version of the eCK security model that we call eCKw, which produce the stronger than the eCK model. Than we convert it into even stronger model by transforming it, which produce eCK PFS model. Given a two-message Diffie-Hellman type protocol secure in eCKw our conversion produce a two-message protocol that is secure in eCK PFS. 21 2014 BANGKOK, CONFERENCES 3:35 pm——3:50pm; Location Foyer -PAPER SESSIONSSession 3: Intelligent Technology and Control Chair: Prof. Liyanage C De Silva Co-chair: Assoc. Prof. Agne Paulauskaite-Taraseviciene 10 presentations Time: 3:50pm to 6:20pm Venue: Sapphire II (7th Flr) SP0020 Power and Area Efficient Hardware Architecture for WiMAX Interleaving Zuber M. Patel S.V. National Institute of Technology, Surat City, INDIA. Abstract—In this paper, area and power efficient design of interleaver/deinterleaver for IEEE 802.16 (WiMAX) networks is presented. Interleaving plays an important role in wireless networks in combating burst errors. It spreads burst error among multiple code words, thus reduces erroneous bits per code word symbol which can be corrected by forward error correction (FEC) decoder. The paper proposes an efficient hardware design that avoids look-up table (LUT) ROM and complex address generator logic. It uses only simple linear address generator circuit and multiplexer (MUX) based efficient intra-column permutation logic. The design supports all modulation schemes and sub-channelization. ASIC implementation results reveal that total number of gate count for interleaver is 25.9k and for deinterleaver is 26.1k. The combined system takes core chip area of 1.11mm2 and consumes power of 0.586mW at 5MHz frequency. SP2003 MFCC Based Text-Dependent Speaker Identification Using BPNN Swathi S. Wali, Sanjeevakumar. M. Hatture and Dr. Suvarna Nandyal Visvesvaraya Technological University. Karnataka, India Abstract—Speech processing has emerged as one of the important application area of digital signalprocessing. Various fields for research in speech processing are speech recognition, speaker recognition, speech synthesis, speech coding etc. Speaker recognition is one of the most useful and popular biometricrecognition techniques in the world especially related to areas in which security is a major concern. Thispaper presents an automatic Speaker Recognition model which is Text-Dependent where the speaker is allowed to speak only fixed text. Automatic speaker recognition is the use of a machine to recognize a person 22 2014 BANGKOK CONFERENCES from a spoken phrase, based on individual information (characteristics of voice) included in speech waves. Recognizer block employs MFCC (Mel Frequency Cepstrum Co-efficients) technique to get hybrid features for speaker identification/verification system. These features are used to train the ANN classifier in the training phase. Later in the testing phase the speaker is recognised based on the ANN classifier. The accuracy of 92% is achieved. SP0013 A Study on LBS Technique Make for CRETA LBS Platform Service Yongwon (Conrad) Cho and Sunwhie Hwang Researcher Engineer (Virtual Builders Co., Ltd. Digital Space Lab.) Abstract—Indoor & Outdoor spatial information technology closer to reality 3D space. So spatial information services market is growing now. A variety of information services and web-based content, to provide information services through the space. In addition, consumers make to direct spatial information service more than just a service provider. That means satisfy the needs of the consumer now. We have a lot of high quality smart devices. So, we will available to upload or share web. This study is outdoor & indoor map building based on the 3D data. And we will make to management for LBS service. We have to platform project name is ‗CRETAвЂ� LBS. SP0023 Design and Implementation of Power Efficient Micro pipelined GALS based 2-D FFT Processor core Yasha Jyothi M Shirur BNMIT, Bangalore, India Abstract—TodayвЂ�s complex VLSI SOC solutions demand low power processors. Synchronous processors which consume more than 40 % of power in clock circuitry are being conveniently replaced by low power delay-insensitive (DI) asynchronous logic. In this paper, a Micro- pipelined GALS based 2D Fast Fourier Transform [FFT] Processor is designed and implemented to perform power, area and timing analysis. The implemented design has given power advantage of 78.22% and timing advantage of 39.99% when compared with similar synchronous 2D FFT processor. The design is a synthesizable core which can be extended to be part Complex DSP architecture and hence is a right choice for any MPSOC design. X0019 Maximizing UAV target coverage under flight range and target service time constraints Ender SevinГ§and Murat Karakaya Department of Computer Eng., Atilim University, Turkey Abstract— Using Unmanned Aerial Vehicles (UAVs) for reconnaissance purposes requires considering many different criteria such as limited UAV flight range, specified target service time, etc. Furthermore, it is desired that UAV should service more targets as many as possible. Thus, route planning is required to be optimal to cover maximum number of the targets while respecting all the given constraints. This article proposes a genetic algorithm (GA) to creating an optimized route for visiting maximum number of targets under the flight range and target service time constraints. In order to evaluate the success of the proposed GA method, we also developed an alternative approach, based on the Nearest Neighbor (NN) heuristic. To compare the success of these two methods we executed extensive simulation tests. The results indicate the success of the proposed GA method by increasing the number of covered targets compared to the solution based on the NN heuristic. X005 Task Scheduling in the Cloud Computing based on the Cuckoo Search Algorithm Nima Jafari Navimipour Islamic Azad University, Tabriz, Iran Abstract—Cloud computing is the latest emerging trend in distributed computing, where shared resources are provided to end-users in an on demand fashion that brings many advantages, including data ubiquity, flexibility of access, high availability of resources, and flexibility. The task scheduling problem in Cloud computing is an NP-hard problem. Therefore, many 23 2014 BANGKOK, CONFERENCES heuristics have been proposed, from low level execution of tasks in multiple processors to high level execution of tasks. In this paper, a new evolutionary algorithm is proposed which named CSA to schedule the tasks in Cloud computing. CSA algorithm is based on the obligate brood parasitic behavior of some cuckoo species in combination with the LГ©vy flight behavior of some birds and fruit flies. The simulation results demonstrated that when the value of Pa is low, the speed and coverage of the algorithm become very high. X007 Keyword-based service matching in a cloud environment using nature-inspired swarm intelligence Carsten Mueller & Niklas Kiehne ITG Research, Germany Abstract— In Services Computing, service discovery is an important activity to search the pertinent service to the client's requirement. With increasing keywords the search space grows above average and brute force is an inappropriate approach. A cloud service provider requires a flexible and an easy to use application. This practical research presented in this paper combines an intelligent solution based on nature-inspired swarm intelligence for keyword-based service matching with an innovative and user-friendly graphical user interface. Finding optimum parameter settings is a time-consuming and difficult task. Objective of the integrated Parameter Recommender is the determination of optimum values for the applied heuristic. Tracking Method of Adaptive For Inserting an Artificial Lens Kyung-Pyo Kim Kyungpook National University, Korea Abstract—We marked with a pen directly to the incision for insertion into the patient's eye of the intraocular lens insertion in cataract surgery, and insertion point. However, it can delete or blur the display due to such factors as foreign material coming out of the eye during surgery.Therefore, in recent years, a method of tracking the image processing by receiving the camera X008 images in real time display method such extended. There are many ways to estimate the object in the video in, but in the method has been applied widely used typically have optical flow and template matching. The template matching, while indicating the tracking performance with excellent background simple from complex background, its performance is reduced, while indicating the tracking excellent performance in a complex background, simple background, optical flow, the performance fall. In this paper, there is provided amethodadaptive tracking donвЂ�t give a significant effect on the change in the background template region. Therefore, by using to suit the circumstances the optical flow indicating the tracking excellent performance in a complex background template matching showing a tracking superior performance with a simple background, when inserting an intraocular lens in cataract surgery, and a knife in it was possible to improve the accuracy of tracking a region of the incision. AE005 Development of Sensors and Microcontrollers for Small Temperature Controller Systems Ali Jebelli and Mustapha C.E. Yagoub University of Ottawa, School of Electrical Engineering and Computer Science, Ottawa, Canada Abstract—In this paper, a microcontroller-based fuzzy logic controller is introduced to stabilize at the desired temperature, while sudden changes in temperature can be severe. This approach is applied to one onboard microcontroller which is on small board and the control system is able to meet the required respond quickly. The significance of this work is because of using a microcontroller with a fuzzy PI controller as the supervisor, and evaluated through experiments. It is shown that the characteristics of the fuzzy logic, such as flexibility of the I/O selection and saturation of the outputs, provide favorable performance to the control system for temperature system. AE013 Closed Loop Speed Control of Miniature Brushless DC Motors H. L. Chan and K. T. Woo Hong Kong University of Science and Technology, Hong Kong, China 24 2014 BANGKOK CONFERENCES Abstract—Three-phase miniature brushless DC (BLDC) motors are very popular on small Unmanned Aerial Vehicles (UAVs). Due to the shape and size limitation, it is hard to install devices like optical encoders for implementing a closed loop speed control. It is important to have speed control of motors on UAVs since the system dynamics are related to the rotation speed of the motors. This paper presents a sensorless phase voltage detection scheme to measure the rotation speed. A PID controller is implemented to ensure the performance of the motors. A mathematical model of Delta-Connected BLDC motors is built for analyzing the relationship between phase voltage and rotation speed. The experimental results demonstrate a fast response time and accurate results. X0014 Agent-based System Architecture for Intelligent Lighting Control based on ResidentвЂ�s Behavior Agne Paulauskaite-Taraseviciene, Nerijus Morkevicius, Vaidas Jukavicius, Laura Kizauskiene and Egidijus Kazanavicius Kaunas University of Technology, Lithuania Abstract—Learning from the behavior of the resident is essential in order to adapt the system to provide intelligent lighting control. Technologies to assure two aspects, coordinated system control and intelligent decision making, are required for such system implementation. In this paper an agent-based system architecture that aims to provide intelligent lighting control according to residentвЂ�s habits is proposed. The multi-agent technology has been integrated with intelligent decision making algorithms seeking to provide fast, adaptive and accurate lighting control. To explore capabilities of the proposed lighting control system, the experiments including residentвЂ�s changing habits and unpredictable behavior have been performed, evaluating accuracy and speed of control. Session 4: Software engineering and IT Chair: Prof. Yanzhen Qu 11 presentations Time: 3:50pm to 6:20pm Venue: Board room(7th Flr) F1013 A Study on Using AHP Technique for Best Location Select Experiments Yongwon (Conrad) Cho andJinwon (Frank) Choi Virtual Builders Co., Ltd. Digital Space Lab., South of Korea Abstract— Many Peoples make online content while many showing of the traditional boundaries, production and consumption are unraveling. The evolution of online access to information technology facilitates comparable to professional and amateur engineers are born, focusing on common interests among people formed community is growing together. Recently, based on these wide range of public companies can take advantage of collective intelligence to effectively 'Crowd sourcing' has attend to attracted. This study, the best location for AHP techniques and subsequent analysis based on Crowd sourcing, so spatial information for crowd mapping in the field of development of the concept proposed. пЂ SP0014 Future Trends in Spatial Information Management: Suggestion to New Generation (Internet of Free-open) Yongwon (Conrad) Cho and Sunwhie Hwang 25 2014 BANGKOK, CONFERENCES Researcher Engineer (Virtual Builders Co., Ltd. Digital Space Lab.) Abstract—The use of spatial information is increasing rapidly. There is a growing recognition amongst both governments and the private sector that an understanding of location and place is a vital component of effective decision making. Citizens with no recognized expertise in spatial information and who are unlikely to even be familiar with the term, are also increasingly using and interacting with spatial information; indeed in some cases they are contributing to its collection – often in an involuntary way. пЂ Based on the contributions received, trends have been broken down into broad themes covering major aspects of the spatial information. They are as follows: trends in technology and the future direction of data creation, maintenance and management in spatial data provision and management. X0016 On XML based Automated Function Point Analysis: An Effective Method to Assess Developer Productivity Jeffrey S. Lent and Yanzhen Qu Colorado Technical University, USA Abstract— this article proposes a novel approach to objectively measure developer productivity and individual contribution to development projects using automated function point analysis (integrated with source control system (SCS) and continuous integration (CI)). Automated function point analysis is a central tenant required in this approach. The method proposed herein relies on pattern matching to identify and group fields in to internal logical files, external inputs, external outputs, and external query objects which can be used to identify the objective size of software. Unlike earlier automated functional sizing algorithms, the method proposed is applicable to any application source code that expresses its user interface in well-formed extensible markup language (XML). This study shows that a prototype implementation of the proposed automated counting method is capable of providing a reliable and consistent relative size of existing software (accurate to +/-6.65% and 5000 times faster), and goes on to explain how this method can be integrated with existing requirements engineering tools, source control systems and continuous integration tooling in order to produce an objective measure of software developer output compared to estimates established during requirements gathering and planning that exceeds the common, subjective means that are in use in many organizations today. X0022 An Approach to Handling Software Process Deviations Rui Zhu, Fei Dai, Qi Mo, Yong Yu, Leilei Lin, and Tong Li Yunnan University, China Abstract—Since software processes are permanently dynamic evolving during software process enactment, the problems on software process deviation are increasingly received more attention. In Process-centered Software Engineering Environments (PSEE), the enacted software process model is always inconsistence with the observed process obtained by PSEE. In order to address this problem, this paper presents a framework which structures the field of process deviation analysis and identities, a Process Behavior Space Expression based on process algebra and judgment rules to decide whether handle the deviation or not. This approach can effectively find and handle the prevalent deviation problems in the software process implementation, through dealing with the deviation so as to improve the software process, and ultimately promote the quality of software products. F1000 Students' Data-driven Decision Making in HEI: The Explicit Knowledge Involved Semiu A. Akanmu and ZulikhaJamaludin Universiti Utara Malaysia Abstract—Due to increase in the volume of studentsвЂ� data, higher education institutions (HEIs) are experiencing constrained decision making process. To attend to this, Information Visualization (InfoVis) is suggested as a befitting tool. However, since 26 2014 BANGKOK CONFERENCES InfoVis design must be premised on a pre-design stage that outlines the explicit knowledge to be discovered by the HEIs, so as to actualize a functional and befitting InfoVis framework, this study investigates the explicit knowledge through survey questionnaires administered to 32 HEI decision makers. The result shows that relationship between the studentsвЂ� performance and their program of study is the most prioritized explicit knowledge among others. Based on the findings, this study elicits a comprehensive data dimensions (attributes) expected of each data instance in the HEI studentsвЂ� datasets to achieve an appropriate InfoVis framework that will support the discovery of the explicit knowledge. T009 Age Estimation using Support Vector Machine – Sequential Minimal Optimization Julianson Berueco, Kim Lopena, Arby Moay, Mehdi Salemiseresht, Chuchi Montenegro Department of Computer Science, College of Computer Studies, Silliman University, Dumaguete City, Philippines Abstract—This paper investigates the use of SVM-SMO algorithms in estimating the age of a person through the evaluation of its facial features on both front and side-view face orientation. Stephen-Harris algorithm, SURF, and Minimum Eigenvalue Feature Detection algorithms were also used for feature extraction. During experiments, training sets composed on 44 front view images and 44 side view images were used to train the network. Testing was performed to 140 front view images and 44 side view images. Result of the experiment shows age recognition of 53.85% for front view images and 14.3% for side view images. T003 Estimating Biological Function Distribution of Yeast Using Gene Expression Data Julie Ann A. Salido and Stephanie S. Pimentel Aklan State University, College of Industrial Technology, Kalibo, Aklan, Philippines Abstract—Microarray technologies that monitor the level of expression of a large number of genes have emerged. And given the technology in deoxyribonucleic acid (DNA) - microarray data for a set of cells characterized by a phenotype an important problem is to identify ―patterns‖ of gene expression that can be used to predict cell phenotype. The potential number of such patterns is exponential in the number of genes. Detection of genes biological function in silico which has not yet been discovered through other means aside from wet laboratories is of practical significance. In this research, biological function distribution of budding yeast cell Saccharomyces cerevisiae, using 170 classified gene expression data of yeast is used for visualization and analysis, and evaluated with the reference time distribution using FACS and budding index analysis. We define the criteria using edit distances, a good scientific visualization with 83.78% prediction on time series distribution on the first peak and 86.49% on the second peak. пЂ T001 2-D Phase Unwrapping Algorithm Based on Pseudocorrelation Quality Map Samir. Aguemoune, Faiza. Hocine, Aichouche. Belhadj Aissa and Abdelhakim. Ayadi University of Sciences and Technology Houari Boumediene (USTHB)/ Centre de Recherche en Astronomie Astrophysique et GГ©ophysique(CRAAG)/Division de Sismologie, AlgГ©rie, Alger Abstract—Phase unwrapping is the mathematical problem-solving that appears in several research areas such as: Interferometric Synthetic Aperture Radar (InSAR), optical interferometry and adaptive optics. Phase unwrapping is an essential and critical step in interferometric processing. It consists in retrieving the absolute phase from modulo-2ПЂ phase. In this paper, we propose a 2-D phase unwrapping algorithm based on a contextual pseudocorrelation quality map and non-continuous path unwrapping. It measures the variability of the phase relative to the discontinuities and the transitions of the fringes in the interferogram. The proposed method has been tested using synthetic and real interferograms. T011 Towards Making A Road Map for Using GIS in Oman Ayoub Salim Albadwi Dept. of Information Technology, Colleges of Applied Sciences, Ibri, Sultanate of Oman 27 2014 BANGKOK, CONFERENCES Abstract—A geographic information system (GIS) is viewed as the science of geographical or spatial information which possesses its own set of research questions. In the other hand, GIS is viewed very much as a technological tool which helps the analyst to use his/her knowledge and insight to study substantive issues. GIS is particularly important for Oman because of its convergence towards knowledge economy, smart location, harsh geographical nature, and scarcity of population. This paper will discuss opportunities of GIS in Oman. More specifically, we will discuss key application domains such oil resources, water resources, community development, car and urban planning. This research seeks to create a road map for using GIS in Oman. This map will help both government and private sector to achieve their existing and future goals and strategies in an effective way. T002 Mammographic Masses Segmentation using Implicit Deformable Models: The LCV Model in Comparison with the Osher-Sethian Model Fouzia Boutaouche and NacГ©ra Benamrane Department of Informatics, faculty of Mathematics and Informatics, USTO-MB, Oran, Algeria. Abstract—Breast cancer is one of the leading causes of cancer death among women. As such, the role of digital mammographic screening is to detect cancerous lesions, at an early stage, and to provide high accuracy in the analysis of the size, shape, and location of abnormalities. Segmentation is arguably one of the most important aspects of a computer aided detection system, particularly for masses. This paper attempt to introduce two level set segmentation models for mass detection on digitized mammograms. The first in an edge-based level set algorithm, proposed by Osher and Sethian. The second is a region-based level set algorithm called the local Shan-Vese model. A comparative study will be given, in which we will assess the performance of the second approach in terms of efficiency. SP3002 On Image Based Fast Feedback Systems for Academic Evaluation Evgeny Gershikov and Samuel Kosolapov Ort Braude, Carmiel, Israel Abstract—In this research image based Fast Feedback (FF) systems are presented, that use image processing and computer vision techniques. The goal of this work is to provide tools for automatic checking and grading of multiple choice questions in quizzes and exams for academic evaluation of students. These tools can be also used to monitor the level of studentsвЂ� understanding of the material and to receive feedback from them about the quality of the lessons during courses in academic institutions. First possible FF setups and processing methods for multiple choice questions are discussed. Then results of experiments with this type of questions are presented. п‚І Tips: The best paper will be chosen after each session and the certificate will be awarded by the chair. Good Luck! 28 2014 BANGKOK CONFERENCES Saturday Evening, October 11 6:30 pm to 8:30 pm--Dinner Location The Square restaurant (6th Flr) п‚І Tips: The Dinner will start at 6:30pm. Please kindly attend on time with bringing the Dinner Coupon. 29 2014 BANGKOK, CONFERENCES Sunday, October 12 One Day Tour The conference organizer has provided the one day tour in Bangkok for all the registered authors, listeners, and presenters after the conference for free Bangkok - Floating Market and Thai Village Cultural Show Tour At Sampran Riverside You will have the opportunity of witnessing the unique and unforgettable experience of the world-renowned Thai Village Cultural Show. Daily, over 150 performers vividly portray a fascinating cross section of Thailand's culture, heritage and way of life; dances, ceremonies, rituals, sports and pastimes. 07.00 AM. Pick up from various hote. Departure from Bangkok. On the way, you will see the salt field both side. Get to the sugar factory to observe the process of sugar refinery from coconut fluid. Arrive at the ferry-boat pier and take a long-tailed boat to the main part of the floating market. Departure from Damnoen saduak market to The Thai Village Cultural show at Sampran Riverside. 12.20 PM. Thai lunch is served at restaurant. Exciting displays of Thai martial arts, Thaiboxing and sword fighting, combat skills which date back over 600 years. Romantic and joyful rituals of the traditional Thai wedding ceremony. Rich pageantry of Buat Naag-the ceremony of ordination into the Buddhist Monkhood. Lively tribal dancers; the graceful Fingernail Dance from the North, the rhythmic Bamboo Dance, The Kala Dance from the south and the joyful Yoey Dance from the Central plains. Popular spot of takraw. Elephants at work as the still do today in the teak forests of northern Thailand. (You will enjoyriding on them.) Arrive in Bangkok 17.30 PM. Please identify the one day tour when you register for the conference, if you are interested in it. Please contact the conference secretary if you have any questions. 30 2014 BANGKOK CONFERENCES Conference Venue Hotel Novotel Bangkok Platinum Pratunam http://www.novotel.com/gb/hotel-7272-novotel-bangkok-platinum-pratunam/index.shtml 31 2014 BANGKOK, CONFERENCES 32 2014 BANGKOK CONFERENCES 33 2014 BANGKOK, CONFERENCES 34 2014 BANGKOK CONFERENCES Please take a few moments to provide us some important feedback about your professional development of Chengdu conferences. -------------------------------------------------------------------------------------------------------------------------пЂўпЂўпЂўпЂў Conference Feedback Use the key below Very Goodв–Ў Goodв–Ў Poorв–Ў Use the ranking key above as appropriate to answer the questions below on the blank spaces provided at the end of each questions How was the overall organization of the conference How do you rate the registration area How do you rate the presenter(s) Did you gain any helpful skills How was the format of the meeting in terms of lunch, coffee breaks? Overall, how were the conference facilities How was the reception you received at the conference How was the venue List other locations where you think future meeting should be held Why did you choose that venue? Generally, how was the whole experience at the meeting, and given another chance would you attend or recommend next year's conference? Comments and Suggestions 35 2014 BANGKOK, CONFERENCES 36
© Copyright 2024 Paperzz