The 2013 International Conference on Information Science and Cloud Computing December 7-8, 2013, Guangzhou, China Conference Sponsor Co-Sponsor Program Supportors The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 会议日程安排表 Conference Program 12 月 6 日 6th December p.m. 周五 Friday p.m. 签到 12 月 7 日 7th December a.m. 周六 Saturday a.m. Registration 签到,领取会议材料 3 楼耀光厅 Register, Approach Yaoguang Hall on the 3rd floor 开幕式 3 楼耀光厅 Opening Ceremony Yaoguang Hall on the 3rd floor 大会嘉宾演讲 3 楼耀光厅 Keynote Speech Yaoguang Hall on the 3rd floor 茶歇 3 楼休息区 07:30—09:00 09:00—09:30 09:30—10:10 10:10—10:30 Tea Break resting area on the 3rd floor 大会嘉宾演讲 3 楼耀光厅 Keynote Speech Yaoguang Hall on the 3rd floor 大会嘉宾演讲 3 楼耀光厅 Keynote Speeches Yaoguang Hall on the 3rd floor 集体照 大门 Collective photography The door 10:30—11:10 11:10—11:50 11:50—12:00 午餐 12:00—13:30 Lunch 12 月 7 日 7th December p.m. 2 楼金桂轩酒家大厅 The lobby in Jinguixuan restaurant on the 2nd floor 周六 Saturday p.m. 分会场报告 3 楼会议室 Technical Sessions The meeting room on the 3rd floor 茶歇 3 楼休息区 Tea Break Resting area on the 3rd floor 分会场报告 3 楼会议室 Technical Sessions The meeting room on the 3rd floor 13:30—15:00 15:00—15:30 15:30—17:30 晚宴 17:30—20:00 Banquet 12 月 8 日 8th December a.m. 2 楼金桂轩酒家 39 号贵宾厅 No.39 VIP room in Jinguixuan restaurant on the 2nd floor 周日 Sunday a.m. The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 3 楼会议室 Technical Sessions The meeting room on the 3rd floor 茶歇 3 楼休息区 Tea Break Resting area on the 3rd floor 分会场报告 3 楼会议室 Technical Sessions The meeting room on the 3rd floor 08:00—10:00 10:00—10:30 10:30—12:00 午餐 12:00—13:30 Lunch 12 月 8 日 8th December p.m. 2 楼金桂轩酒家 15 号贵宾厅 No.15 VIP room in Jinguixuan restaurant on the 2nd floor 周日 Sunday p.m. 分会场报告 3 楼会议室 Technical Sessions The meeting room on the 3rd floor 茶歇 3 楼休息区 Tea Break Resting area on the 3rd floor 分会场报告 3 楼会议室 Technical Sessions The meeting room on the 3rd floor 13:30—15:00 15:00—15:30 15:30—17:30 晚宴 17:30—20:00 Banquet 2 楼金桂轩酒家 39 号贵宾厅 No.39 VIP room in Jinguixuan restaurant on the 2nd floor The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 大会嘉宾介绍 Keynote Speakers Resume Dr. Christian K. Hansen Eastern Washington University 2014 President of the IEEE Reliability Society E-mail: [email protected] Bio: Dr. Christian K. Hansen is Professor and Associate Dean of Computing and Engineering Sciences at Eastern Washington University (EWU) and 2014 President of the IEEE Reliability Society. He is been with EWU since 1993 and served a variety of academic and administrative leadership positions. Prior to his current leadership position, he served as department chair for eight years. He has been active in the reliability profession for over 25 years and published broadly on a variety of engineering applications, mostly related to reliability modeling and failure data analysis for complex electronic systems. Over the past two decades he has been active with the IEEE Reliability Society and has served in leadership positions that include vice-president of publications, treasurer and president elect. Dr. Hansen is a graduate of the Technical University of Denmark with degrees in Electrical Engineering (MS, 1988) and Statistics (PhD, 1991). Title: Big Data in the Big Picture – Challenges and Projections for the Future The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Prof. Hong Shen School of Computer Science, The University of Adelaide, North Terrace, Adelaide, Australia Bio: Hong Shen is Professor (Chair) of Computer Science in the University of Adelaide, Australia, and currently also a "Thousand Talents" professor in Sun Yat-Sen University, China. He received the B.Eng.degree from Beijing University of Science and Technology, M.Eng.degree from University of Science and Technology of China, Ph.Lic.and Ph.D. degrees from Abo Akademi University, Finland, all in Computer Science. He was Professor and Chair of the Computer Networks Laboratory in Japan Advanced Institute of Science and Technology(JAIST) during 2001-2006, and Professor (Chair) of Compute Science at Griffith University, Australia, where he taught 9 years since 1992.With main research interests in parallel and distributed computing,algorithms, data mining, privacy preserving computing, high performance networks and multimedia systems, he has published more than 300 papers including over 100 papers in international journals such as a variety of IEEE and ACM transactions. Prof. Shen received many honours/awards including China National Endowed Expert of "Thousand Talents", Chinese Academy of Sciences "Hundred Talents", National Education Commission Science and Technology Progress Award,and Chinese Academy of Sciences Natural Sciences Award. He served on the editorial board of numerous journals (incl.IEEE TC and IEEE TPDS) and chaired several conferences. Title: Smart Cloud Computing: Challenges and Opportunities The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Tatsuhiro Tsuchiya Graduate School of Information Science and Technology Osaka University, Japan Bio: Tatsuhiro Tsuchiya received his M.E. and Ph.D degrees in engineering from Osaka University in 1995 and 1998, respectively. He is currently a professor at the Graduate School of Information Science and Technology at Osaka University. His research interests are in the areas of dependable computing and verification and testing. He is a member of the program committees of 34th International Conference on Distributed Computing Systems (ICDCS 2014), 33rd International Symposium on Reliable Distributed Systems (SRDS 2014), and 7th International Conference on Software Testing, Verification and Validation (ICST 2014). Title: On Transfer of Distributed Computing Theory to Cloud Computing Practice The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 Technical Sessions 分会场报告 A1:信息理论(12月7日13:30--17:30) Technical Sessions A1: Information Theory (December 7th p.m. 13:30--17:30) Session A1 Presentation Topic Presenters Research on the Effect of the Adjustable Parameter Applied to Information Theoretic Criteria based Spectrum Sensing Method Tingting Liu P107 A Location Privacy-Preserving Protocol Based on Homomorphic Encryption and Key Agreement Xiaoling Zhu P181 The Anti-Phishing Technology Based on E-mail Extraction and Analysis Fu Xue P193 Mafeng Zhu P247 An Improvement of the Slotted CSMA/CA Algorithm with Multi-level Priority Strategy and Service Differentiation Mechanisms P255 The Security Testing Case Research of Protocol Implementation Lei Zhang P256 Efficient Identity-based Encryption from Lattice Dongmei Chen P268 Unambiguous Synchronization Technique for BOC Signals Jiamin Qi A Method of Computing Iceberg Cube Based on Non-antimonotonic Constraint Yuntian Feng P307 P333 Mining Spam Accounts with User Influence Kan Chen The Research and Simulation of the Satellite Network Routing Algorithm based on Game Theory Rongyan Qiao P100 Performance Simulation and Optimization of Agricultural Supply Chains Jing Chen P188 H-KD: a Novel Query Structure for Multi-dimensional Awareness Information Xiao Sun P244 Alexander S. Belenky P366 Games with Connected Player Strategies for Analyzing the Competitiveness of a Railroad Company in a Cargo Transportation Marketplace The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 B1:云科学(12月7日13:30--17:30) Technical Sessions B1: Cloud Science (December 7th p.m. 13:30--17:30) Session B1 Presentation Topic Presenters C132 The Attack on Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Zhongma Zhu C136 An Energy-Saving Virtual-machine Scheduling Algorithm of Cloud Computing System Ruo Du P133 A Parallel Domain Decomposition FDTD Algorithm Based on Cloud Computing Xiaohu Liu P141 Research on Multi-tenant PaaS Cloud Security on Java Platform Xiaoming Liu P142 New Features Acquisition of Text with Cloud-LDA Model Fanli He P197 Survey of Cloud Messaging Push Notification Service Na Li P262 Towards Real-time Federate Cloud for Large Group Company Lixin Du On the Availability of Replicated Data Managed by Yuuki Ueda P319 Hierarchical Voting P327 Cloud Model: Detect Unsupervised Communities in Social Tagging Networks Hongbo Gao P335 A Cloud-based Platform for Watching Same Content on Three-Screen TV Continuously in Smart Home Noel Crespi P109 Online Resource Monitoring Model in Cloud TV Chao Xu P187 Cloud Scenes Generation Based on the Improved Random Midpoint Displacement Method Dongsheng Yang P365 An Environment Recognition Algorithm Based on Weighted Cloud Classifier Yang Zhao The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 C1:嵌入式系统(12月7日13:30—17:30) Technical Sessions C1: Embedded Systems (December 7th p.m. 13:30—17:30) Session C1 Presentation Topic Presenters C107 The Design and Implementation of Sigma Delta ADC Digital Decimation Filter Jie Cao P081 The Design and Implementation of a Mobile Learning Platform Based on Android Wei Sonng P212 The Asymptotic Properties of Quasi-maximum Likelihood Estimator for Spatial Error Panel Data Model Lixia Wen P291 Intelligent Optimization on Power Values for Inverse Distance Weighting Zhanglin Li P199 The Speedup Model for Manycore Processor P245 A Case of Chip Multithreading Architecture with Resource Unit Manager Juan Fang P189 Partition Strategies for C Source Programs to Support CPU+GPU Coordination Computing Ding Yao P122 A Method for Star Extraction of the Air-borne Star Sensor during the Daytime Xiang Zhang P162 An Implementation of Montgomery Modular Multiplication on FPGAs Xinkai Yan P287 System Reliability-Aware Energy Optimization for Network-on-Chip with Voltage-Frequency Islands Jianxian Zhang P108 Study on Virtual-Measure Kalman Filter Algorithm in Radar Networking Wenbo Zhao P349 Research and Implementation of Data Collection Protocol for Wireless Sensor Networks Xiaohong Wang P314 C# blueprint Action Pattern Nan Ye Peng Gao The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 D1:系统分析(12月7日13:30--17:30) Technical Sessions D1: Systems Analysis (December 7th p.m. 13:30--17:30) Session D1 Presentation Topic Presenters C137 A Dynamics Model of Opinion Information System Jin Du The Design and Implementation of a Process-based Printing Order Management System Huiling Ma P177 Energy-Efficient Task Allocation for VFI-based Real-Time Multi-Core Systems Xiaodong Wu P288 P323 Educational Geographic Information System Based on WebGIS Mingyi Duan P350 Research and Design of the Clock Synchronization for the Bridge Health Monitoring System Based on Wireless Sensor Network Mingqiang Song C141 Implementation of Resource Management System Based on Open Source Computing Platform Eucalyptus Jianmin He P303 Analysis on the Impact of Cloud Computing for Management Information System Xiaojing Wang P305 Storage Space Reclaim Based on cluster Bitmap in the New Technology File System Chanying Qi P320 Research on Optimum Model for the Best Link of Expert System Chen Guo P132 An Energy-saving Algorithm in Networked Embedded System Based on Critical Tasks Served First Strategy Bing Xue P331 Study on Virtual Assembly System Based on Kinect Somatosensory Interaction Hongjian Liao P137 A New Model Language for Cyber Physical Systems Mingxing Liu P144 A College Teaching Building Lighting Control System Based On Power Line Carrier Haochen Wang The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 A2:数据挖掘(12月8日08:00--12:00) Technical Sessions A2: Data Mining (December 8th a.m. 08:00--12:00) Session A2 Presentation Topic Presenters P121 Operation Performance Evaluation and Optimization Based on SUPER-SBM DEA Model in Railway Industry in China Zhongdong Li P161 Hadoop Cellular Automata for Identifying Rumor in Social Networks Hui Zhang P168 A Method Based on Random Search Algorithm for Unequal Circle Packing Problem Ying Shang P226 Using Bidirectional Search to Compute Optimal Shortest Paths over Multi-Weight Graphs Hui Ma P273 Simulation Research on Diffusion of Agricultural Science and Technology for Peasant Li Ma P275 A Three-stage Clustering Framework based on Multiple Feature Combination for Chinese Person Name Disambiguation Fei Wang P286 Arc-length Constraint-Based Surface Deformation Using EnergyMinimum Optimization Huanyu Yang P302 A New Method of Optimization Based on Arc Search P316 Research on Digital Museum of Yunnan Ethnic Minorities’ Resources Based on Network Jun Wang Lei Wang P334 Factors Affecting Small and Medium-Sized Enterprise’s Information Technology Absorptive Capability: An Empirical Study of Jilin Province in China P357 Preserving Social Network Privacy Using Edge Vector Perturbation Lihui Lan P261 Effective Data Exchange in Parallel Computing P373 Study on E-commerce Service Supply Chain Coordination Based on Contract Theory Xin Pan Hui Ma Fatao Wang The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 B2:控制理论(12月8日08:00—12:00) Technical Sessions B2: Control Theory (December 8th a.m. 08:00—12:00) Session B2 C151 Presentation Topic A Instant-Based Qur’an Memorizer Application Interface Presenters Zameer Ahmed Adhoni P067 Attention Rate of Attribute Items: On the Combination of ABAC Rules Xinmao Gai P087 ASCMS: an Accurate Self-Modifying Code Cache Management Strategy in Binary Translation Wenqi Wang P172 The Model of Population Projection by Delay Differential Equation with Two Lags Liqiang Fan P176 Strategies for Improving Accuracy of Structural Variation Prediction using Read Pairs Jingyang Gao P239 A Weighted Association Rules Mining Algorithm with Fuzzy Quantitative Constraints Qibing Lu P251 Predicting the Subcellular Localization of Proteins with Multiple Sites Based on N-terminal Signals Xumi Qu P264 Solving Fuzzy Nonlinear Systems—A Class of Defuzzification in the Fuzzy Control Meizhen Jia P341 A Kind of Quadratic System Decoupling Method Based on Similar Transformation Solution Shujuan Wang P371 A Clustering-based QoS Prediction Approach for Web Service Sele ction Xuejie Zhang P342 Fuzzy Logic-based Fault Diagnosis of Simply Supported Bridge Using Modal Frequency as Input Variable Yubo Jiao P369 Topological Analysis of a Complex Trust Network Xiangling Kuang P071 Numerical Research of a Economic Model Based on Topological Horseshoes Theory Guangqun Chen C114 Study on Image Encryption Algorithm Based on Chaotic Theory Qiu Zhang The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 C2:结构设计(12月8日08:00—12:00) Technical Sessions C2: Architecture Design (December 8th a.m. 08:00—12:00) Session C2 Presentation Topic Presenters P018 Method of Architecture Core Data Optimization Design Based on DM2 Xiaoxue Zhang P276 CloudFlame: Cyberinfrastructure for Combustion Research Gokop L.Goteng P328 Image Zooming Method with Hierarchical Structure Lanfei Zhao P265 Multiple Feature Fusion Protein Tertiary Structure Prediction Wenzheng Bao P295 An Algorithm for Delay-Reliability in Communication Networks Based on Probabilistic User Equilibrium Model Zhao Liu Yue Cao P266 A Study on User Adoption of Cloud Storage Service in China: A Revised Unified Theory of Acceptance and Use of Technology Model P129 An Improved Collaborative Filtering Model Considering Item Similarity Yefei Zha P362 Bigraph-based Modeling and Tracing for the Food Chain System Xue Li P241 Design and Development of Air Traffic Management Safety Database Analysis System Lixin Wang P336 Design of the Multi-level Inventory Control Model and Solution algorithm for the Spare Parts Yu Cao Yi Liu P364 The Design and Implementation of Knowledge Processing and Decision-making Model Based on Multi-class in Agricultural Expert System P047 Musical Instrument Recognition Based on the Bionic Auditory Model Xiaoxue Zhang The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 D2:机器学习(12月8日08:00—12:00) Technical Sessions D2: Machine Learning (December 8th a.m. 08:00—12:00) Session D2 Presentation Topic Presenters P169 Neural Network Based Algorithm for Generalized Eigenvalue Problem Bo Yu P130 The Improved Particle Filter Algorithm Based on Weight Optimization Jun Zhu P196 Multi-resolution Image Fusion Algorithm Based on Gradient and Texture Features Junyong Ma P140 Recognition Methods of Housing Vacancy Based on Digital Image Processing Wei Yao P194 A New Face Recognition Method Based on the Energy Image of Facial Contour Fei Zhai P202 A Ship Recognition Method based on Affinity Propagation P201 A New Approach for Text Location Based on SUSAN and SVM P359 A New Approach of Face Identification in Line Drawings P206 An Improved Super-Resolution Reconstruction Algorithm Based on Regularization Shuang Wang P225 An Improved Forecasting Algorithm for Spare Parts of Short Life Cycle Products Based on EMD-SVM Yeliang Fan P026 Technology of Fuzzy Chinese-Geocoding Method P149 An Improved Genetic Algorithm based on Local Modularity for Community Detection in Complex Network Rui Li P289 Performance Comparisons of Evolutionary Algorithms for Walking Gait Optimization Hong Jiang Weiya Guo Chuan Wang Weikun Sun Zhen Sun The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 A3:模式识别(12月8日13:30—17:30) Technical Sessions A3: Pattern Recognition (December 8th p.m. 13:30—17:30) Session A3 Presentation Topic Presenters P051 Research on the Storage Method of Raster Image Based on File Directory Chao Wang P079 Zero-Watermark Scheme for 2D Vector Drawings Based on Mapping Hua Zhao P084 Markers Registration in Image-Guided Surgery P112 Research on Web Mapping of Vector Nautical Charts Based on HTML5 Mingyang Pan P120 Driver’s Seat Belt Detection in Crossroad Based on Gradient Orientation Cao Liu P209 Hand Tracking Algorithm Based on SuperPixels Feature Zhenhuan Zhou Zhiqin Zhang P146 A Multi-Level Grid Partition Method for Enterprises Distribution Data Zhang Zhang P171 Simulation of Fabric in 2D Virtual Scene Based on Mesh Model Xiaona Fan P278 A Median Filtering Algorithm Based on Selected Point in Digital Image Yan Liang P230 A Model of Visual Attention for Natural Image Retrieval Guanghai Liu P232 Research on Spatial Frequency Motivated Gray Level Image Fusion Based on Improved PCNN Nianyi Wang P293 A New Subpixel Imaging Method for Image Super Resolution P166 Bag of Visual Words for Cows’Basic Activity Recognition Jihong Wang Changji Wen The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 B3:人工智能(12月8日13:30--17:30) Technical Sessions B3: Artificial Intelligent (December 8th p.m. 13:30--17:30) Session B3 Presentation Topic Presenters P041 Fast Adaptive Bilateral Filtering with Fixed Parameters for Sharpness Enhancement and Noise Reduction Yuanzhong Shu P061 Revealing Research Themes and Their Evolutionary Trends Using Bibliometric Data Based on Strategic Diagrams Hongqi Han P138 Enhanced Film Grain Noise Removal for High Fidelity Video Coding Inseong Hwang P143 Establish Expert System of Transformer Fault Diagnosis Based on Dissolved Gas in Oil Wenjing Zhang P164 A Steered Molecular Dynamics Method for Receptor-ligand Unbinding Based on Genetic Algorithm Junfeng Gu P258 Research of Terrain 3D Visualization Method based on IDL and ArcEngine Bin Yang P292 Super-Resolution Employing an Efficient Nonlocal Prior Shuai Chen P321 Research on the Evidence Optimization Method Based on the Expert System Chen Guo P340 The universal approximation capabilities of 2pi-periodic approximate identity neural networks Saeed Panahian Fard P354 Research on XML Keyword Query Method Based on Semantic Shan Tian P363 A Process-oriented Ontology-based Knowledge Model Yanhong Zhao P351 Cluster Analysis on the Flow Velocity for the Sea Route Monitorin Yanling Zhang P046 Application of Unscented Kalman Filter for Flying Target Tracking Honglei Yan The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 C3:算法理论(12月8日13:30--17:30) Technical Sessions C3: Algorithm Theory (December 8th p.m. 13:30--17:30) Session C3 Presentation Topic Presenters C149 Analyzing on the Failure Mode of BFNNs’ learning and its Improving Algorithm Shuiming Zhong P089 Maize Embryo Image Acquisition and Variety Identification Based on OTSU and K-means Clustering Algorithm Wenjing Zhang P184 A Lifecycle Analysis of the Revision Behavior of Featured Articles on Wikipedia Xinyi Li P186 Collaborative Filtering Recommendation Algorithm Based on Users of Maximum Similar Clique Zhaoyang Zhou P205 NBA All-Star Lineup Prediction Based on Neural Networks Bigui Ji P238 Algorithm Research about Textual Case Retrieval Based on Topic Words Lei Tang Han Li P347 Research of Clustering Algorithm based on Information Entropy and Frequency Sensitive Discrepancy Metric in Anomaly Detection P008 A Motion Planning Algorithm Based on Uncertainty Prediction Tianyuan Gu P380 A Data Compression Algorithm for the Sea Route Monitoring with Wireless Sensor Network Wei Huangfu P159 Dividing for Combination: A Bootstrapping Sentiment Classification Framework for Micro-blogs Songxian Xie P035 Software Analysis of Internet Bots using a Model Checker Shin-ya Nishizaki P045 Multi-use Conditional Proxy Re-encryption Lequn Mo P217 The Credit Risk Prediction of the Small and Medium-Sized Enterprises based on GA-v-SVR Xiangdong Liu The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 分会场报告 D3:优化理论(12月8日13:30--17:30) Technical Sessions D3: Optimization Theory (December 8th p.m. 13:30--17:30) Session D3 Presentation Topic Presenters P096 Commodity Futures Price Prediction and Trading Strategies a Signal Noise difference Approach Jinhao Zheng P221 Application of FAHP Approach to Assess Service Quality Yong Li P260 Commercial Bank Stress Tests Based on Credit Risk Xue Zhang P263 Realization of Multi-port SDRAM Controller in LXI Data Acquisition System Yanqin Zhang P300 Quality Evaluation for Anxi Tieguanyin Tea Based on Electronic Nose and PCA-LDA Method Fufang Li P309 Improvement of the Data Mining Algorithm of Rough Set under the Framework of Map/Reduce Qiong Liu P352 Optimal Constellation Mapping for Pulse Amplitude Modulation Based Vertical Physical-Layer Network Coding Fengyue Gao P267 Present Situation and Prospect of Data Warehouse Architecture under the Background of Big Data Lihua Sun P277 Comprehensive Credit Evaluation Model of Electricity Customer Based on the Changing Trend of Credit Sitong Cao C121 An Improved Path Planning for Mobile Robots Feng Zhou P101 Optimal Web Service Composition Based on Context-awareness and Genetic Algorithm Yuan Yuan P088 Optimization for the Locations of Urban E-commerce Distribution Network Based on a Genetic Algorithm Aihua Xiang P009 An Improved Association Rules Mining Algorithm Based on Power Set and Hadoop Weibin Guo The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 会议地点及交通 Conference Location and Traffic 会议地点:广州大学学术交流中心 Conference Location: Academic Exchange Center Guangzhou University 地址:广州市白云区解放北桂花路 23 号 Address: No.23 Jie Fang Beilu, Baiyun District, Guangzhou 住宿地点:1、广州大学学术交流中心 2、广州流花宾馆 Hotel Location: 1, Academic Exchange Center Guangzhou University 2, Guangzhou Liuhua Hotel 用餐地点:广州市益高饮食有限公司金桂轩酒家 Dining Place: Guangzhou Jinguixuan Restaurant 交通方式 Traffic: 广州白云机场(30 公里):步行至白云机场 B 区国内到达厅站,乘坐机场快线 1 号线, 在中央 海航酒店站下车,步行至广州大学学术交流中心。出租车约 78 元。 Guangzhou Baiyun International Airport (30 kilometers): Walk to Baiyun Airport area B, domestic arrival hall station, take the airport express line 1, get off at the Central Hotel station, and walk to Academic Exchange Center Guangzhou University. It takes about 78 Yuan by taxi. 广州火车站(1 公里):步行约 15 分钟至广州大学学术交流中心。出租车约 10 元。 Guangzhou Railway Station (1 km) : Walk about 15 minutes to the Academic Exchange Center Guangzhou University. It takes about 10 Yuan by taxi. 广州火车东站(10 公里):步行至东站汽车客运站,乘坐 32 路(或 298 路, 60 路), 在广园客 运站下车,换乘 481 路, 在广州大学总站(桂花岗校区)站下车,步行至广州大学学术交流中心。 出租车约 27 元。 Guangzhou Railway East Station (10 km): Walk to Guangzhou East Coach terminal, take bus 32 (or 298 road, 60 road), get off at Guangyuan Coach Station and change to the 481 road, get off in the station of Guangzhou university (Guihuagang Campus), and walk to Academic Exchange Center Guangzhou University. It takes about 27 Yuan by taxi. 广州火车南站(21 公里):步行至广州南站,乘坐地铁 2 号线(嘉禾望岗方向), 在越秀公园站 下车(B2 口出),步行至广州大学学术交流中心。出租车约 70 元。 Guangzhou Railway South Station (21 km) : Walk to Guangzhou south station, take the subway line 2 (Jiahewanggang direction), get off at the Yuexiu Park station(B2 Exit), and walk to Academic Exchange Center Guangzhou University. It takes about 70 Yuan by taxi. The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 广州火车北站(30 公里):步行至花都客运站,乘坐广花东站线,在广园客运站下车,换乘 481 路, 在广州大学总站(桂花岗校区)站下车,步行至广州大学学术交流中心。出租车约 96 元。 Guangzhou Railway North Station (30 kilometers) : Walk to Guangzhou Huadu Coach Station, take Guanghua station line, get off at Guangyuan Coach Station and change to the 481 road, get off in the station of Guangzhou university (Guihuagang Campus), and walk to Academic Exchange Center Guangzhou University. It takes about 96 Yuan by taxi. 广州汽车站(2.5 公里):步行至站南路站,乘坐商务专线 3 路, 在桂花岗站下车,步行至广州 大学学术交流中心。出租车约 10 元。 Passenger Transport Station of Guangzhou (2.5 km) : Walk to Zhannan Road station, take bus business line 3, get off at Guihuagang station, and walk to Academic Exchange Center Guangzhou University. It takes about 10 Yuan by taxi. The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 附录 Appendix C107 The Design and Implementation of Sigma Delta ADC Digital Decimation Filter Authors: Cao Jie, Yujun Liu, Bingshu Jiang, Xiaozhi Liu Abstract. This paper presents a novel implementation of Sigma Delta digital decimation filter with low power and hardware efficient but high performance. The digital decimation filter consists of a modified Cascaded integrator-comb (CIC) decimation filter, one stage compensate filter and one stage half-band filter. The multi-stage signal processing, poly-phase technology and CSD code are used to design the filter. The decimation filter is designed and simulated by Simulink Matlab and modelsim6.5. The hardware realization of the decimation filter is obtained by FPGA Xilinx technology. Compared to the traditional digital decimation filter, the proposed method has a power reduction of 44% and a hardware saving of 65%. Keywords: Digital decimation filter; CIC filter; CSD code C108 The Research of Embedded Software Reliability Modeling Analysis Based on AADL Authors: Tian Chuan, Yujun Liu, Li Xin,Qingling Duan Abstract. This paper proposes an analysis method of embedded and distributed software reliability modeling based on AADL. By using the key information in AADL structural model, AADL fault model is established, to describe the fault behavior of computer distributed software. On this basis, the reliability analysis is carried through the sensitivity analysis method. We analyze the reliability of the system, which can help designers to find out the key modules that affect the reliability of the system in the early stages of development and provides a strategic decision foundation to enhance the system reliability. Keywords: Embedded simulation; AADL; Reliability Modeling C114 Research on Image Encryption Algorithm Based on Chaotic Theory Authors: Qiu Zhang Abstract. With the rapid development of high-tech such as cloud technology, information security has become more critical than before. So the cryptography has a very important significance as key technology in information security. In recently, some new cryptography theory has attracted more and more attention at the background of research on algorithm efficiency and security has become the current hot research field. Chaotic algorithm is very suitable for stream cipher encryption not only its sensitivity to initial conditions for time series generated but also its complex structure is difficult to analyze and forecast. At the same time, it can provide smart pseudo random sequence with excellent randomness, correlation and complexity. Therefore, this paper mainly studies about the image encryption algorithm based on chaotic theory. Keywords: information security; chaotic theory; image encryption C118 Application of SOA and Web Service in Implementing Heterogeneous System Integration Authors: Yilan Yang Abstract. Large enterprises tend to have heterogeneous systems, namely the formation of “islands of information”, that makes information interaction and interoperability very difficult. Application of integrated development based on service-oriented architecture, which does not change the underlying architecture of enterprise applications, is a good solution to the aforementioned problems. This paper proposes a scheme to integrate heterogeneous resources based on SOA and Web Service, builds The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 inter-departmental business systems to conduct feasibility analysis and to verity theoretical basis with interoperability, cross-industry interconnection and data sharing as benchmarks. Keywords: heterogeneous system; protocol conversion; SOA architecture layer C121 A Improved Path Planning For the Mobile Robots Authors: Zhou Feng Abstract. Path planning is one of the most important technologies in the navigation of the mobile robot, which should meet the optimization and real-time requests. A based on Rapidly-exploring Random Tree (RRT) and Particle Swarm Optimizer (PSO) for path planning of the robot is proposed. First the grid method is built to describe the working space of the mobile robot, then the Rapidly-exploring Random Tree algorithm is used to obtain the global navigation path, and the Particle Swarm Optimizer algorithm is adopted to get the better path. Computer experiment results demonstrate that this novel algorithm can plan an optimal path rapidly in a cluttered environment. The successful obstacle avoidance is achieved, and the model is robust and performs reliably. Keywords: robot, path planning, rapidly-exploring random tree, particle swarm optimizer C132 The Attack on Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Authors: Zhongma Zhu, Zemin Jiang, Rui Jiang Abstract. With the characters of low maintenance and little management cost, cloud computing provides an effective and economical approach for data sharing in the cloud among group members. However, since the cloud is untrustworthy, we must provide security guarantees for the sharing data. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue. Recently, Liu et al presented a secure multi-owner data sharing scheme, named Mona, which was claimed that any cloud user could anonymously share data with others through leveraging group signature and dynamic broadcast encryption techniques. Meanwhile, the scheme could achieve fine-grained access control, which means that not only the group members could use the sharing data resource at any time, but also the new users were able to use the sharing data immediately after their revocations and the revoked users will not be incapable of using the sharing data again once they are revoked. However, through our security analysis, the Mona scheme still has some security vulnerabilities. It will easily suffer from the collusion attack, which can lead to the revoked users getting the sharing data and disclosing other legitimate members’ secrets. In addition, there is another security shortage in the user registration phase, which is how to protect the private key when distributing it in the unsecure communication channels. This kind of attack can also lead to disclosing the user’s secret data. Keywords: access control; privacy-preserving; cloud computing; collusion attack C136 An Energy-Saving Virtual-machine Scheduling Algorithm of Cloud Computing System Authors: Wu Kehe, Du Ruo, Chen Long, Yan Su Abstract. Even virtual machines has been widely used as the unit to allocate the processor time or storage spaces by the providers of Cloud Computing systems, the energy consumption pattern of virtual machines in Cloud Computing system is not clear enough yet now. In this paper, we built an energy consumption model of the Cloud Computing system, by using statistical method we can estimate the energy consumption of a virtual machine in a small range of errors in 3%-6%. Then, based on the model, we proposed a virtual machine scheduling algorithm to improve the energy efficiency of the The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 system. First, we set a threshold value of energy consumption for each server in the system, and by analyzing these work plans submitted by each virtual machine, we tested whether the threshold will been exceeded or not. Then, by migrate one/several chosen virtual machines to other physical servers in the system we can reduce the energy consumption of the whole system. Our evaluation shows that the proposed scheduling algorithm can effectively implement energy-saving goals without significant decline of the Quality of Services. Keywords: component; cloud computing; energy consumption efficiency;energy consumption model; virtual machine scheduling; energy-saving. C137 A dynamics model of opinion information system Authors: Du Jin, Du Yanhui Abstract. With the rapid development of the Internet, BBS, instant messaging, twitter, micro-blog has become an important channel for people to express their will and exchange information. With the help of the free, open and efficient network platform, opinion information can more directly, more truly reflect public opinion in all aspect of life, also become real-time mapping barometer of the social public opinion. On the other sight, the online public opinion transmit information to form a system which can be affect by many factor as the government, the traditional media, the netizens and the network media. Therefore, by the use of advanced information technology to deal with the opinion information, we analysis the related factors of relationship between them by dynamic evolution rule, and make a reasonable experiment. All of these can lay the groundwork for future scientific research. Keywords: opinion information system; dynamic model; public opinion C141 Implementation of Resource Management System Based on Open Source Computing Platform Eucalyptus Authors: Jian-min He, Wei-jie Cao, Rui Min Abstract. In order to improve the efficiency and convenience of resource management in cloud computing, the mechanisms of virtual machine deployment and the model of resource management are discussed in this paper. By analyzing the architecture of IaaS cloud computing platform and the mechanisms of resource management in cloud computing, the authors develop a cloud computing resource management system (CCRMS) based on open source software Eucalyptus and Xen, to meet the needs of users to create three kinds of different system images: Linux virtual desktop image, Web service image and database service image. The created images are tested in the experimental environment and the testing results show that the CCRMS is able to effectively manage the resources and improve the efficiency of management in cloud computing. Keywords: cloud computing; resource management; IaaS; Xen; Eucalyptus; virtual machine C149 Analyzing on the failure mode of BFNNs’ learning and its improving algorithm Authors: Shuiming Zhong, Yinghua Lv Abstract. In order to improve the learning mechanism of BFNNs, the paper firstly analyzes the failure mode of BFNNs trained by SBALR, which takes the form of a local cycle. And then by mean of the sensitivity theory, a disturbance learning algorithm is developed to make the BFNNs that suffer from learning failure to escape the local cycle. The new algorithm aims to keep the existing learning performance as much as possible. Experimental results demonstrate the new algorithm’s effectiveness both on learning effect and learning efficiency. The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Keywords: Learning, binary feedforward neural networks, local cycle, sensitivity C151 A Instant-Based Qur’an Memorizer Application Interface Authors: Zameer Ahmed Adhoni, Husam Al Hamad Abstract. In this paper, we describe an Instant-Based Qur’an Memorizer Application Interface, which aims at providing a unifying framework for building Qur’an memorizer application. It includes all features for memorizing the Qur’an, and it is feasible to be used in latest handsets. Its unique feature of instant creation gives the user to memorize any Surah or Ayah from the Qur’an. We describe the core components and design patterns of the proposed memorizer with emphasis on key design criteria. These criteria aim at providing the necessary scalability and performance on the one hand, and quality assurance of the Qur’an text on the other. Keywords: Qur’an, Memorizer P5 The research of trusted technology under cloud environment Authors: Lou Ying-hong, Wang Wen-lin Abstract. In the current cloud environments, there are some problems of information in security and reliability. In order to establish more flexible and adaptable security mechanism, combining the cloud and credible is a major research direction in the field of security today. In this paper we studied some credible technology in cloud computing environment and a new reverse cloud generation algorithms is proposed. The expected value and hyper entropy of subjective cloud is used to evaluate the reputation of trust objects, and provide a basis for trust decisions online trading. Keywords: trusted cloud; subjective trust; cloud model; evaluate information security; cloud security P7 Multi-Objective TT&C Mission Planning Technique for On-Orbit Service Authors: LI Jing, GU Xiao-song, YE Gang-qian Abstract. The multi-objective TT&C (Tracking, Telemetry and Command) mission planning technique is researched based on the background of both ground-based and space-based TT&C mission to the OOS (On-Orbit Service) type of “one-station to multi-objective”. Firstly, the characteristics and constraint condition of OOS TT&C mission are analyzed. Secondly, the space-based and ground-based TT&C mission planning models are established. Finally, using typical OOS mission as an example, the method of TT&C resource planning is simulated for ground-based multi-objective and ISL (Inter-Satellite Link). The optimized design of TT&C events, optimization scheduling of TT&C resources and automatic implementation strategies of TT&C operations are included to the TT&C mission in this paper. The research results show: the ground-based TT&C resource can be saved by using of space-based TT&C resource. The technical reference can be provided for the implementation of future spacecraft OOS by the research results. Keywords: on-orbit service; multi-objective TT&C; mixed integer programming; mission planning; resources scheduling P8 A Motion Planning Algorithm Based on Uncertainty Prediction Authors: Gu Tianyuan, Song Kepu, Miao Changxiu Abstract. Considering the remarkable influence by uncertainty on a rapidly moving robot, a new motion planning algorithm is proposed. Firstly, an actual state-based trajectory uncertainty prediction method suitable for multiple blind areas is presented, which can effectively predict the deviation The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 between actual trajectories to come and the planned trajectory. On this basis, the rapidly-exploring random trees algorithm is introduced to implement the motion planning under uncertainty. Simulations demonstrated the feasibility of the algorithm. This motion planning algorithm can effectively solve the speed robot navigating through complex environment with multiple blind regions. Keywords: motion planning; uncertainty prediction; blind region; RRT P9 An Improved Association Rules Mining Algorithm Based on Power Set and Hadoop Authors: Weijun Mao, Weibin Guo Abstract. The association rules mining plays an important role in data mining. As the rapid growth of datasets, the computation time and required memory increase seriously. Cloud computing provides efficient and cheap solutions to analyze and implement the association rules mining algorithms in parallel. In this paper, we propose an improved association mining algorithm based on power set and MapReduce programming model, which can process massive datasets with a cluster of machines on Hadoop platform. The experimental results show that the proposed algorithm can achieve higher efficiency in the association rules mining. Keywords: Data mining; Association rules mining; Cloud computing; MapReduce; Power set P18 Method of architecture core data optimization design based on DM2 Authors: ZHANG Xiaoxue, LUO Aimin, LUO Xueshan Abstract. Based on the complexity in military information systems architecture design, we proposed the concepts of architecture optimization design. After analyzed application of logical data meta-model (DM2) in building architecture data and products, we built a framework of architecture optimization design. Combined with the building sequence and designing guidelines of architecture data and products, we proposed architecture core data optimization design process. After analyzing the main contents of taking architecture optimization design, the goals and the guidelines of building mathematical models of architecture core data optimization design are put forward. Finally, we took the optimization design of activity data as an example, built the corresponding mathematical model, and illustrated relative optimization method. Architecture core data optimization design method affords a realizable approach of making architecture design solutions more quantitatively, scientifically, and automatically. Keywords: Military information systems; architecture; data meta-model; optimization design P20 Entropy-based model for measuring risk of requirement changes Authors: YANG Yu, ZHOU Hua, LIU Jun-hui, FENG Yun Abstract. Software projects face a common problem is the requirement uncertainty and frequent requirement changes [1] . The risk of requirement changes is considerable risk in software project management. Information entropy can effectively measure subsystem’s degree of uniformity. This paper proposes a quantitative risk measurement model that could be used to measure risk posed by requirement changes. The more uniform requirement impact on software project, the smaller the risk, otherwise the key requirement changes will have a significant impact on the project. This paper discusses the rationality of the model and gives an instance of this model. The model requires data can be obtained from enterprise. Experiments show that the model is scientific and rational. It can serve as a reference for requirement management. Keywords: risk measure;information entropy;requirement change;software engineering The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 P26 Research on Technology of Fuzzy Chinese-Geocoding Method Authors: Sun Zhen, Qiu A-gen, Zhao Jie, Zhang Fu-hao, Zhao Yangyang, Wang Liang Abstract. Using fuzzy mathematics principle, this paper, introduced the concept of address elements, proposed a fuzzy Chinese-geocoding method. On the one hand, through the address elements identification mechanism, it improved the segmentation accuracy and solved the problem that address elements are not standard. On the other hand, by calculating the MI indicator it determined the best matching result. In addition through quality control module, it got the error results and re-matched them. Based on the theoretical research of fuzzy Chinese-geocoding method, this paper realized the fuzzy Chinese-geocoding system, and did experiment in Harbin, evaluating it both from matching rate and positional error. Keywords: address element; fuzzy Chinese-geocoding; matching rate P35 Software Analysis of Internet Bots using a Model Checker Authors: Eri Koike, Shin-ya Nishizaki Abstract. Internet bots are software agents which perform automated tasks. Recently, Twitter bots have become popular and are widely used. However, in order to reduce the load onthe Twitter server, one can only make alimited number of connections to the server. You therefore have to design a Twitter bot considering the total number of connections. Model Checking is a technique for verifying automatically whether a model satisfies a given specification. A number of model checkers have been developed, such as SPIN and UPPAAL. In this paper, we study how to apply model checking to analysis of load provided by a bot on the Twitter server. We give a model of a Twitter bot for the UPPAAL model checker. The bot is actually implemented on the Google App Engine. We analyze the dynamic features of the model with respect to restriction of communication with the Twitter server, using the UPPAAL model checker. Finally, we discuss the future direction of our work. Keywords: component; Software Analysis; Internet Bot; Model Checking P41 Fast Adaptive Bilateral Filtering with Fixed Parameters for Sharpness Enhancement and Noise Reduction Authors: Yuanzhong Shu, Ye Chen and Yannan Su Abstract. In this paper, based on Chaudhury’s fast O(1) bilateral filtering (FBF) and the shift-variant technique, we present a fast adaptive bilateral filtering (FABF) for sharpness enhancement and noise removal with good computational efficiency. FABF sharpens an image by increasing the slope of the edges without producing overshoot or undershoot. Compared with FBF, FABF-restored images are significantly sharper. Compared with adaptive bilateral filter (ABF), FABF shows a similar performance in terms of noise removal and sharpness enhancement, while the execution time of FABF is substantially shorter than that of ABF. Keywords: bilateral filter, raised cosine kernel, shift-variant technique, sharpness enhancement, noise removal P45 Multi-use Conditional Proxy Re-Encryption Authors: LeQun Mo, GuoXiang Yao Abstract. This paper presents the first multi-use conditional proxy re-encryption scheme based on ECC, which is motivated by the following scenario in mail systems: Alice can delegated her decryption The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 rights to Bob for the encrypted mails send to her, which contain a specific wordand satisfythe condition set on the proxy by Alice, and Bob also can delegated the right to others just like Alice through the proxy, as the condition set by him is satisfied, and so on if required. Furthermore, asanimportant part for fulfilling our main goal, a new method to obtain the partial re-encryption keys is proposed, and the security of our schemes is provensecure against chosen ciphertext attacks in the random oracle model. Keywords: liptic Curve; Contional Proxy Re-encryption; Multi-usability; Chosen Ciphertext Security P46 Application of Unscented Kalman Filter for Flying Target Tracking Authors: YAN Hong-lei, HUANG Geng-hua, WANG Hai-wei, SHU Rong Abstract. According to the nonlinear maneuvering characteristics of flying targets, unscented Kalman filter is used to achieve a two-dimensional trajectory tracking and predicting in the coordinate of camera view field. By calculating the target centroid position in the imaging focal plane, the third-order constant acceleration motion model of two-dimensional is established. Because of the nonlinear characteristics of flying targets, unscented transform sampling is used to update the states matrix. It`s not need to solve the complicated Jacobian matrix which cannot be avoided in the ordinary extended Kalman filtering. Unscented Kalman filter is used to update the target prediction matrix, and the next state of the target prediction matrix is used to be the trajectory prediction value. Model simulation and data processing results show that the algorithm brings a great convenience for real-time processing platform at the coordinate of camera view field. Keywords: Unscented Kalman Filter; nonlinear filtering; Target Tracking; simulation analyses P47 Musical instrument recognition based on the bionic auditory model Authors: Lin Zhang, Shan Wang, Lianming Wang, Yiyuan Zhang Abstract. We present a bionic auditory system for musical instrument recognition. This system is designed based on the physiological structures of the human auditory system that are essential to sound source recognition, such as the basilar membrane and inner hair cells in the cochlea of the inner ear, cochlear nucleus, and the auditory cortex. A large solo database consisting of 243 acoustic and synthetic solo tones over the full pitch ranges of seven different instruments (guitar, harp, horn, piano, saxophone, trumpet, and violin) is used to encompass different sound possibilities of each instrument. The gammatone model, the Meddis model, and posteroventral cochlear nucleus (PVCN) model are constructed to imitate the basilar membrane, the inner hair cells, and the cochlear nucleus, respectively. By using 33%/67% splits between training and test data, a self-organizing mapping neural network (SOMNN) based on the function of auditory cortex is established to classify the instruments. The instruments are recognized with an overall success rate of over 75%. This bionic auditory system indicates high efficiency and high accuracy in musical instrument recognition. Keywords: Bionic Auditory Model; Musical Instrument Recognition; Self- organizing Mapping Neural Network P51 Research on the Storage Method of Raster Image Based on File Directory Authors: WANG Chao, GUO Chang-guo, LIU Dong-hong, LIU Yu-jun Abstract. In order to increase the efficiency of raster image storage, a block file directory tree (BFDT) framework is introduced in this paper as a new index structure of raster blocks. Through changing the container of raster blocks from the database to the file system, and depends on the file system’s storage advantage of high efficiency, the BFDT framework improves the storage method used by GeoRaster. The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 The BFDT framework is designed to have a quad-tree structure,and implemented based on the open source database management system—Ingres. For verification, some comparative experiments of raster image storage are conducted. The experimental results prove that the performance of the BFDT framework is more efficient than GeoRaster. Therefore the BFDT framework can effectively solve the storage problem of massive raster image data. Keywords: raster image; file directory; block storage; GeoRaster; block file; BFDT framework; quad-tree; Ingres P59 Parameters Optimization of PID Based on Improved Particle-Swarm-Optimization Authors: Xinming Fan, Jianzhong Cao,Hongtao Yang,Xiaokun Dong, Chen Liu, Zhendong Gong, Qingquan Wu Abstract. Because the PID parameters settings obtained by classical method fail to achieve the best control performances, this paper we propose an improved particle swarm optimization (IPSO) algorithm with inertial weight changes non-linearly and border buffer. Unlikely the original PSO, firstly, the inertial weight changes non-linearly instead of linearly. Secondly, we provide a border buffer to the slopping-over particles, making them to fall in the explored space of optima to enhance the diversity of the particle swarm. The simulation experiments shows that the system whose parameters are optimized by IPSO has better performances, meanwhile, it proves the effectiveness of the improved particle swarm optimization. Keywords: Particle Swarm Optimization; PID controller ;parameters tuning;System simulation. P61 Revealing research themes and their evolutionary trends using bibliometric data based on strategic diagrams Authors:Hongqi HAN, Jie GUI, Shuo XU Abstract. The paper aims to use strategic diagram technique to detect research themes and reveal their evolutionary trends in a scientific field using bibliometric data under practical application. Keywords are selected not only from author-provided and machine-indexed keywords, but also extracted from the full text so as to eliminate the “indexer effect”. The keywords are then clustered to detect research themes, which are classified into four categories in a strategic diagram to reveal the research situations according to their strategic positions. Moreover, the strategic diagrams based on analysis of temporal dynamics are used to find out the thematic evolution through the similarity index to detect similar themes of adjacent phases, and the provenance and influence indexes to evaluate interactions of similar themes. Experimental results showed that the method is effective and useful in revealing research themes and their evolutionary trends in a scientific field. Keywords: Theme detection; Thematic evolution; Strategic diagram; Co-word analysis P67 Attention Rate of Attribute Items: On the Combination of ABAC Rules Authors: Xinmao Gai, Mingfei Wang, Mingyang Wang Abstract. In order to solve the problem with conflicts between two Attribute-based Access Control (ABAC) rules, a method for combining rules from different policies is proposed in this paper. By the definitions of attention rate of attribute items, which reveals the inherence of an access control rule/policy while the attention rate of attribute items of a policy can be obtained from those of the rules, and priority rate of an access request, which reflects the security goal of the system, the concepts of 𝛼 −applicable rule and 𝛼 −applicable policy are defined and the conflicts between rules are divided The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 into two categories: irrelevant rules conflict and relevant rules conflict. Finally, methods for eliminating both of the two types of conflicts are introduced. Keywords: attribute-based access control; attention rate; priority rate; rule conflict P71 Numerical Research of an Economic Model Based on Topological Horseshoes Theory Authors: Guangqun Chen, Xiaorong Hu, Lijuan Chen Abstract. Recently, research for complex dynamical behavior of financial or economic systems by means of nonlinear theory and method has become a new hot spot. In this paper, we firstly optimizing the parameter of system using method of Lyapunov Exponent, and then transform the model to the Poincaré map by choosing proper Poincaré plane, finally, finding two different types of topological horseshoe with expanding in one direction in the phase space of the corresponding the Poincare map. It is not only found strictly that the topological horseshoe exists widely in the economic model, but also verifies strictly the chaos in math to reveal the dynamical principle of chaos. Keywords: economic model; chaos; topological horseshoes; Poincaré map; numerical computation P79 Zero-Watermark Scheme for 2D Vector Drawings Based on Mapping Authors: Zhao Hua, Du Shoujian, Zhang Daozhen Abstract. This paper proposed a zero-watermark scheme for 2D vector drawings based on mapping which few researches have been conducted on till now. In our scheme, The watermark is not embedded into but built or picked up from the original vector drawings by mapping the most two important characters the length ratio and angle to a dot picture which can also be saved in a vector format. Experimental results demonstrate that the proposed scheme is lossless and robust enough against the ordinary attacks such as rotate, scale, transplant (RST) as well as their combinations, even cropping and adding attacks with higher accuracy and computation efficiency and moreover it has a distinctively visual effect. Generally it shows better performances than the previous ones and is faithful enough for the authentication. Keywords: 2D Vector Drawings; Zero-Watermark; Mapping P81 The design and implementation of a mobile learning platform Based on Android Authors: Song Wei Abstract. In order to solve the problem of mobile learning, the design and implementation of a mobile learning system based on Android operating system is introduced in this paper. Mobile learning brings us to new impressions of whenever and wherever there is a possible study through effective combination of digital learning and mobile computing technology. Mobile learning is regarded as a kind of indispensable learning tool in the future. There are many functions on the platform such as user management, course selection, course download, online tutorials and online test functions and so on. The learner can, whenever and wherever possible, learn by intelligent mobile phone, panel computers or other portable devices. Anyone can open course resources and use them in a convenient way. The platform has good operability and a very optimistic future business-wise, and it provides us a better solution for easy mobile learning. Keywords: Android; 3G; Internet of things; mobile learning P84 Comparison and Assessment of Different Image Registration Algorithms Based on ITK Authors: Zhou Zhenhuan Abstract. A lot of image registration algorithms are proposed in recent year, among these algorithms, which one is better or faster than the other can be only validated by experiments. In this paper, ITK(Insight Segmentation and Registration Toolkit) is used for verifying different algorithms as a framework. ITK framework requires the following components: a fixed image, a moving image, a transform, a metric, an interpolator and an optimizer. Dozens of classical algorithms are tested under The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 the same conditions and their experimental results are demonstrated with different metrics, interpolators or optimizers. By comparison of registration time and accuracy, those practical and useful algorithms are selected for developing software in image analysis. These kinds of experiments are very valuable for software engineering, they can shorten the cycle of software development and greatly reduce the development costs. Keywords: image registration; ITK; algorithms comparison; registration framework P87 ASCMS: an Accurate Self-Modifying Code Cache Management Strategy in Binary Translation Authors: Anzhan Liu, Wenqi Wang Abstract. Self-modifying code poses potential problems in binary translation. When the original source code had written by itself, the translated code block from source code must be retranslated. Self-modifying code must be accurately emulated by the runtime. To improve the translation efficiency of self-modifying code, this paper design and realize a new policy named ASCMS for self-modifying code cache management. The ASCMS provides a precise positioning to a translated block, not to a trace or the whole code cache. Through the simulation experiments, The ASCMS has 3.95 times increase to self-modifying code in binary translation. Keywords: self-modify code; binary translation; code cache management; ASCMS P88 Optimization for the locations of urban e-commerce distribution network based on a genetic algorithm Authors: Aihua Xiang, Dong Wang Abstract. A mathematical model and a genetic algorithm are proposed to solve a logistics network optimization problem. Combined with the characteristics of urban logistics and e-commerce, the sum of transportation costs, construction costs and maintenance costs are considered in the model to describe the total logistics cost in the network. Since the model is a NP problem, the genetic algorithm is used to solve it. At last, an example is applied for the model validation. From the analysis of the result, it is clear that the mathematical model can effectively solve the logistics network optimization problem and the genetic algorithm is appropriate integer programming algorithm. Keywords: logistics network optimization; urban e-commerce distribution; genetic algorithm P89 The Maize Embryo Image Acquisition and Variety Identification Based on OTSU and K-means Clustering Algorithm Authors: Donglai Ma, Hong Cheng, Wenjing Zhang Abstract. In order to evaluate the feasibility of maize variety identification with the embryo characteristics, the paper selected four maize varieties, and scanned 70 images of each variety. It first used OSTU algorithm to segment the embryo images from the whole maize grain image. Then, it extracted six characteristic parameters of embryo from the embryo image, with connected component labeling and multi-object contour extraction algorithm. Finally, it identified the maize varieties with the six kinds of embryo’s characteristic parameters, using the k-means clustering algorithm. With these methods, the variety identification rates of the four maize varieties, including 280 test samples, are all more than 94.12%. The experimental results demonstrate the effectiveness of maize variety identification based on embryo morphology characteristics. Keywords: variety identification; embryo characteristic; k-means cluster; maize P96 Commodity Futures Price Prediction and Trading Strategies-- a Signal Noise difference Approach The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Authors: Zheng Jinhao, Peng Shoukang Abstract. This paper introduces the signal noise difference method and applies this method into the commodity futures price prediction. Based on the prediction rules mined from the data of 25 potential prediction indicators of SHFE CU, a corresponding transaction strategy is established. And we use the market data from 2009 to 2013 to test our transaction strategy, which obtains a result of 147.85% annual yield. In addition, several improvements are discussed to optimize this model. Keywords: data mining; signal noise difference; price prediction; SHFE CU P98 Model Driven Programming in Data Preprocessor Design Authors: Dangwei Liang, Feiyue Ye, Hao Shi, Dong Xiao Abstract. As business data’s complexity and diversity in software systems, data pre-processor has become an indispensable part of software. However the common data preprocessor has some shortcomings: poor structure flexibility, difficult of extension and maintenance, poor data processing ability, long development cycle and other shortcomings. To solve these problems, this paper proposes a general data pre-processor design method based on model driven architecture. Using the ideas of model driven architecture, with the aid of modeling tools and modeling language, preprocessor demand model is established firstly, and then based on this model, establish the preprocessor platform independent model, and finally translate into preprocessor code. The method applied to the design of the data preprocessor in the billing system, verify its validity and it can be easily applied to the design of other kinds of data preprocessor. Keywords: Data Preprocessor; Model Driven Architecture; Platform Independent Model; Software Modeling P100 The Research and Simulation of the Satellite Network Routing Algorithm based on Game Theory Authors: Rongyan Qiao, Xinguo Zhao Abstract. According to the characteristics of the finite energy of the satellite network nodes, in order to solve the problem of some nodes losing lots of energies because of uneven network flow, this paper proposes a game model of routing algorithm based on ‘the mechanism of price’, and the model of Bayesian-Nash equilibrium strategy is resolved. The results of the simulation verified illustrates that the algorithm have a certain role in reducing network transmission ‘hot spots’ and improving the use rate of nodes and fairly using the network resources, etc. Keywords: Satellite network; Game theory; Bayesian-Nash equilibrium strategy P101 Optimal Web Service Composition Based on Context-awareness and Genetic Algorithm Authors: Yuan Yuan, Xiuguo Zhang, Wenxi Sun Abstract. This paper presents a Web service composition method which supports the associations of services in order to improve the success rate of Web service composition and the quality of the composite service. Firstly, a context-aware web service composition model is built and this paper introduces the concept of service-correlation matrix which means presenting the context of service components in the form of matrix and dynamically updating the matrix with context-awareness technology. Secondly, this paper introduces genetic algorithm into web service composition. Experimental results indicate that the method in this paper effectively reduces the deviation between the theoretical value and the practical value of the context properties of the composite web services which are significantly associated with others. The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Keywords: Context-aware; Service-correlation; Service Composition; Genetic Algorithm P107 Research on the Effect of the Adjustable Parameter Applied to Information Theoretic Criteria based Spectrum Sensing Method Authors: Tingting Liu, Jian Zhang, Zhiming Wang Abstract. Cognitive radio is now emerging as a popular technology to end the spectrum scarcity. Cognitive radio includes some essential components such as spectrum sensing, power allocation, interference controlling and dynamic spectrum access in which spectrum sensing is the foremost. Blind sensing method attracts much attention for its easiness to implement and the few requirements for prior knowledge. The Information Theoretic Criteria (ITC) based spectrum sensing method is a promising blind sensing technology that can reliably sense the activity of primary user with few prior information. However, it cannot agilely set the false alarm probability which is usually required in communication systems. In this paper, a research on the effect of the adjustable parameter is carried out. The validity of this method is established by simulation in several scenarios with different numbers of sampling samples and receiving antennas. The simulation results show that the adjustable parameter can change the false alarm probability according to the requirement of the system and also the sensing method with an adjustable parameter can overcome the noise uncertainty. Keywords: Spectrum Sensing; Energy detection; Information Theoretic Criteria P108 Study on Virtual-Measure Kalman Filter Algorithm in Radar Networking Authors: ZHAO Wen-bo, DING Hai-long Abstract. Using Kalman filter algorithm (KFA) in tracking target in radar networking system (RNS), measure-value of target in networked radar (NR) polar coordinate system has the nonlinear relation with state-value of target in fusion center rectangular coordinate system of RNS. The nonlinear relation does not satisfy linear requirement of KFA application. So this paper virtualizes fusion center rectangular coordinate system as the measure coordinate system of KFA. Through this way, original nonlinear relation is simplified as a linear form. By means of modeling noise of virtual measure coordinates, and constructing the initialization strategy, KFA can be used to solve the problem of state estimation in RNS. The simulating verification shows that virtual-measure KFA proposed in this paper is more precise than extended KFA (EKFA) used for state estimation in RNS. Keywords: Radar Network; Kalman Filter; statistical characteristic; initialization strategy P109 Online Resource Monitoring Model in Cloud TV Authors: Chao Xu, Xuewen Zeng, Zhichuan Guo Abstract. In order to solve the problem of the user experience degradation caused by the resource competition among the applications in cloud TV, we present an approach of online resource monitoring model (ORMM), which is applied in the television service engine (TVSE) framework. Firstly, specific to the shared resource and the exclusive resource, an appropriate resource usage sampling method using system calls and service arbiter is introduced, which simultaneously monitors all types of the system resources. Secondly, to support the most important interactive video application, a Hidden Markov Model based application anomaly detection algorithm using the slide window is designed in consideration of the state transition of the interactive video application. Finally, based on the testing in Android cloud TV, a performance evaluation illustrates the parameters selection of the model, and the The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 detection precision of our algorithm is superior to other popular anomaly detection algorithms about 20%. Keywords: Cloud TV; resource monitoring; anomaly detection; Hidden Markov Model P112 Research on Web Mapping of Vector Nautical Charts Based on HTML5 Authors: PAN Mingyang, PANG Bobo ,LI Chao, WANG Deqiang, MIN Donglong, ZHAO Depeng Abstract. According to the issues encountered by traditional web chart technologies, the paper, following the boom of HTML5, did a research into web mapping of vector nautical charts based on HTML5. The research mainly includes: 1) System architecture for the HTML5 based web chart application, in which HTML5, CSS and Javascript are used to build and style the client Web chart pages, and Node.js is used to construct the server-side to provide both HTTP and WebSocket services; 2) Organization of vector chart data to obtain more efficiency of data network transmission and data procession, for which original S-57 charts are converted into Shapefiles and a Javascript framework is designed to read and parse the Shapefiles for the client; 3) Vector nautical charts display on Web page, for which a Javascript display framework and rendering functions for chart points, lines and areas symbols are designed based on HTML5 Canvas. An application of web chart based vessel tracking is tested further to verify the proposed methods. The results showed that HTML5 is suitable to develop web vector chart applications, although there are several problems waiting to be solved such as can’t comply with S-52 display standard completely. Keywords: HTML5 Canvas; Web mapping; Vector nautical charts; Shapefile; S-57; S-52 P114 Research on runoff predicting based on wavelet neural network conjunction model Authors: Fanping Zhang, Huichao Dai, Deshan Tang, Yixiang Sun, Abstract. A new hybrid model that combines wavelet and artificial neural network(ANN) called the wavelet wavelet neural network(WNN) model is proposed and applied for runoff time series prediction. In this paper, BP network is selected as the neural network, the Morlet wavelet is chosen as the hidden excitation function of precipitation model, the MATLAB is used to write WNN prediction program and the the model is trained and tested by the year runoff time series of Tangnaihai Station located in Yellow River upper stream from 1956 to 2008. The hybrid model (WNN) was compared with the back propagation artificial neural network (BPANN) model. The performance of forecasting accuracy of the WNN model is relatively high comparing the traditional approach. The hybrid model (WNN) is a reliable and practical method for runoff prediction. Keywords: runoff prediction; time series; wavelet analysis; Morlet wavelet; artificial neural network P120 Driver’s Seat Belt Detection in Crossroad Based on Gradient Orientation Authors: Dian Yu, Hong Zheng, Cao Liu Abstract. Seat belt detection is one of an important detecting function and is widely needed in the field of intelligent transportation system. However, research for which is still limited in terms of the increasing requirements at present. In this paper, one algorithm for detecting vehicle seat belts on road is proposed. And a type of feature based on gradient orientation is employed to describe and detect seat belts, according to the method discussed in this paper. After the image pre-processing, the front window location and the human face detecting, this feature is finally extracted in the selected region and the conclusion is given by counting the seat belt feature in the area that close to the right side of the detected human face area. Another approach is also designed in case that the human face detection The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 fails. Tests on high-definition vehicle images show that proposed algorithm is capable of extracting belt-feature under difference circumstances and it is also effective to tell whether the driver has fastened its seat belt. Keywords: Seat Belt Detection; Pixel Gradient Orientation; Human Face Detection P121 On Operation Performance Evaluation and Optimization Based on SUPER-SBM DEA Model in Railway Industry in China Authors: Li Zhongdong Abstract. Taking railway industry in China for example, SUPER-SBM DEA model of existing uncontrollable factors are adopted to analyze and evaluate the operation performance in 30 provinces in China. Based on detailed analysis of railway industry operation features, Optimization of related slack variables is analyzed. Suggestions are put forward as follows: current railway transportation capacity should be reasonably used; input factors should be reasonably collocated; input capital should be accumulated through various channels. Keywords:SUPER-SBM model; Railway operation performance; Uncontrollable factors P122 A Method for Star Extraction of the Air-borne Star Sensor during the Daytime Authors: ZHANG Xiang, CHEN Pu, LU Zhidong Abstract. This paper proposes a new approach to star image denoising, recognizing and centroiding for the airborne application, especially during the daytime. To extend attitude determination of aircraft to daytime, one prerequisite is to precisely obtain the centroid of the target star. To date, there has not been an adequate analytical model and experimental method to solve this problem effectively. Generally, three main problems of degraded images lie in the low signal-to-noise ratio, high intensity of the background and distorted star shape. To clearly validate the given method on star recognition, we focused on the static environment, without the severe distortion and motion blur. To demonstrate the proposed approach, an experiment was conducted with a camera and host computer. Specifically, it consisted of the star image acquisition, image processing and star recognition. Due to the denoising process, the noise component was eliminated effectively. Besides, by the connected region analysis and minimal area screening, the star pattern can be completely isolated. On top of that, the percentage of recognition amounted to 86.7% and the centroid precision was within 1/10 pixel. The experimental results demonstrate the potential of the proposed approach to the star recognition and extraction, during the daytime for airborne application. Keywords: star sensor; star extraction; wavelet de-noising P128 Study on Prediction System for Disaster of Water-inrush From Coal Floor Authors: Demin Liu, Huiqing Lian, Fei Li ,Linshen Gao Abstract. Mine hydrogeology conditions are very complex in china, especially in North China type coal mine. When the coal is being mined, it is seriously threatened by Ordovician karst water with high pressure. Water inrush accidents often happen in North China type coal mine which has become an important factor affecting the safety in production of coal mine. Taking Dong Shan coal mine as an example, the paper has analyzed principle of water-inrush from coal floor of the mine by Summary of mine water inrush in the coal mine. Early-warning indexes of water inrush which include water temperature, water pressure, stress and strain were built. Structure of prediction system for water-inrush disaster was designed, and the hardware and software of the system were developed. The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Industrial test for the prediction system was done in 51523 face. Practice shows that the prediction system could monitor Early-warning indexes of water inrush in real time, and according to the early warning indexes to distinguish the mine water inrush risk which can provide the foresight of the information for preventing water inrush disaster. Keywords: Northern China Coalfield; water inrush from coal floor; early warning system; remote monitoring and control P129 An improved Collaborative Filtering Model Considering Item Similarity Authors: Yeifei Zha, Yuqing Zhai Abstract. Because of its simplicity and effectiveness, collaborative filtering (CF) became one of the most successful recommendation algorithms. User-based CF is one classic method of CF algorithms. In order to solve the problem that common rating items are often too few to be used to effectively calculate the similarity of two users in user-based CF, we proposed an improved collaborative filtering model with item similarity called ISCF in this paper. In ISCF model, the similarity of items was considered in user-based collaborative filtering, which contributes to alleviate the problem of data sparsity and therefore calculate the similarity of user. Experimental results illustrate that our approach ISCF outperforms the average method and user-based CF. Compared with user-based CF, the average improvement in the percentage of ISCF at MAE and RMSE are 21.9% and 17.7%, respectively. In addition, our approach ISCF can predict more items than user-based CF, and the average improvement in the percentage of ISCF at prediction diversity is 33.86%. Keywords: collaborative filtering; recommender system; user-based CF; item similarity P130 The Improved Particle Filter Algorithm Based on Weight Optimization Authors: Jun Zhu, Xiaolong Wang, Qiansheng Fang Abstract. Particle filter algorithm is to achieve recursive Bayesian filter through the simulation method of non-parameter Monte Carlo, It based on sequential importance sampling ,and can not avoid particle degeneration problem, a way to overcome the particle degradation is re-sampling, However sample impoverishment will appear in the process of re-sampling, This paper proposes an improved particle filter method based on optimized weight, the method solves the particle impoverishment problem to a certain extent; The simulation results show that, the improved particle filter algorithm proposed in the paper can effectively improve the estimation precision of particle filter algorithm. Keywords: Particle filter; re-sampling; particle impoverishment; weights optimization P132 An Energy-saving Algorithm in Networked Embedded System Based on Critical Tasks Served First Strategy Authors: Xue Bing Zhao Zhigang Wang Lu, Zhu Xiaoli Abstract. Lots of collaborative applications that contain a number of dependent tasks run in networked embedded system, such as wireless sensor network, Cyber-Physical-System and so on. For the reasons that deadlines of some collaborative applications are not so hard usually and lifetime of whole system depends on energy dissipation, it is meaningful to figure out a good strategy for balancing delay with system energy dissipation. Considering this issue, our research focuses on trying to minimize total system energy dissipation for extending lifetime of whole system, on the premise that delay of finish time is acceptable. In this paper, we point out which tasks are critical among independent tasks from the perspective of energy-saving and propose BESF (Biggest Energy Span First) algorithm thatfirst The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 allocates the task with biggest energy span. Actually, BESF algorithm references BEATA algorithm, however, BESF could not only further decrease energy-consumption of whole system comparing with existing related algorithms, like BEATA, GEATA,but also still ensure that the finish time is tolerable. Experimental results show that in most situations, BESF algorithm is able to save more energy comparing with existing algorithms. Keywords: heterogeneousnetworkedembedded system; BEATA algorithm; energy consumption; task allocation P133 A Parallel Domain Decomposition FDTD Algorithm Based on Cloud Computing Authors: Haiming Lin, Xiaohu Liu, Kangyu Jia, Wei Fu Abstract. This paper presents a parallel domain decomposition finite difference time domain (DD-FDTD) algorithm based on MapReduce architectural pattern in a Hadoop cloud computing cluster. The algorithm is implemented on a 6-nodes Hadoop laboratory test cloud computing cluster to compute the electromagnetic fields of lightning in the downtown area in Shanghai city, PR China. The speedup ratio under different numbers of computational subdomains is evaluated. It shows that the maximum speedup ratio of the algorithm implemented on our Hadoop cluster is about 2.4, which will increase with the scale of the mesh model and the nodes of the Hadoop cluster. Keywords: Cloud computing; MapReduce; Hadoop; FDTD method; Domain Decomposition method; Electromagnetic Fields of Lightning P134 A Simple Way For The Detail Component Design of Aircraft Wings Authors: Liu Guochun, Zhou Tao Abstract. Due to the lack of the wings detail design progress and the limitation of ordinary detail design ways for the complicated design of wings, while a new wing detail design process was proposed based on traditional wing structural design approach. The process involves taking loads on initial proofing structure, structural design, FEM (Finite Element Methods) analysis, etc. According to the wing structural characteristics, it makes the reaction forces as the input loads for the detail design. The detail components are designed based on the new design process which meets to all the design requirements. It shows that the new design process is feasible and available. Keywords: wing structure; FEM analysis; detail design; component design P137 A New Model Language for Cyber Physical Systems Authors: Liu Mingxing, Ma Wubin, Dengsu, Huang Hongbin Abstract. Cyber Physical Systems are an emerging discipline that integrates computation and physical processes. With the computation field developed maturely, the major challenges of the implementation of CPSs are the informational abstraction of physical processes and the feedback control on physical processes. The aim of this paper is to provide a description methodology of the physical entity control part, which we named CPSs Hyper Control Markup Language (CPSsHCML). Through the analysis of TV control part, which is an important physical entity in smart home that is a typical CPSs, the classification of CPSs Hyper Control is obtained in following four aspects: Function Switch (FS), Discrete Enumerative (DE), Continuous Interval (CI) and Angle Direction (AD). Our work focuses on the definition and description of the attribute fields of global properties and the four CPSs Hyper Controls. In addition, an application of CPSsHCML, which we mentioned above, Sony KLV-40F300A TV in smart home, is provided to show that the prospects of CPSsHCML are promising. Furthermore, The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 some important research challenges and suggestions in future are outlined in brief. Keywords: Cyber Physical Systems; Hyper Control Markup Language; Smart Home P138 Enhanced Film Grain Noise Removal for High Fidelity Video Coding Authors: Inseong Hwang, Jinwoo Jeong, Jangwon Choi, YoonsikChoe Abstract. In this paper, we propose a novel technique for film grain noise removal, which can be adopted in high fidelity video coding. Film grain noise enhances the natural appearance of high fidelity video, therefore it is should be preserved. However, film grain noise is a burden to typical video compression systems because it has relatively large energy level in the high frequency region. In order to improve the coding performance while preserving film grain noise, the noise removal and synthesis process is used. We propose a film grain noise removal technology in the pre-processing step. In pre-processing step, film grain noise is removed by using temporal, spatial and inter-color correlation. Specially, color image denoisng using inter color prediction provides good denoising performance in noise concentrated B plane because film grain noise has inter-color correlation in the RGB domain. The results show that the coding gain of denoised video is higher than for previous works,while the visual quality of the final reconstructed video is well preserved. Keywords: Film grain noise; video denoising; inter-color correlation;bilateral filter; high fidelity video coding P140 Study on Recognition methods of housing vacancy based on digital image processing Authors: Wei Yao, Guifa Teng, Hui Li Abstract. At present, China real estate industry for several years has undergone the tremendous changes, accompanying the various rumors on haunted house are often mentioned. Housing vacancy rate statistics community is complicated. Because it is not the same like the census to census operations and can only use the indirect method of investigation, which makes findings unreasonable. For example, someone has multiple housing and has a live recording; the use of water, point still does not reflect the real vacancy rate. Therefore, whether it is water, electricity meters, gas and other methods are incorrect. Due to the lack of sophisticated statistical techniques, the number of vacant housing so far is still an open question. Studies of housing vacancy rate based on digital image processing are a new subject. This paper presents a kind of the image threshold segmentation by image correction, the relationship between the mass center coordinate of windows, finally get the black light rate method, using matlab and VC joint programming to achieve statistical black light rate and finally obtain the housing vacancy rate system. Simultaneously compared with the common methods of the water meter and electric meter checking of statistical vacancy rate, verified the validity of the method. Keywords: image recognition; housing vacancy rate; image correction P141 Research on Multi-tenant PaaS Cloud Security on Java Platform Authors: Jia Chang-yun, Zhu Min, Liu Xiao-ming Abstract. This paper focuses on the potential security risk embedded in the model of multi-tenant sharing virtual machine service. Also the characteristics of current Java virtual machine standard model and the typical problems that may be encountered under the multi-tenant circumstances will be further discussed. Additionally, major solutions to the above problems of Java application server, including MVM, I-JVM and improved OSGI model, will be deeply analyzed in this paper. Through introduction The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 to the GAE of commercial multi-tenant PaaS platform, this paper presents a clear and precise discussion and clarification to the solutions of security problems on the platform of multi-tenant PaaS. Keywords: Java; PaaS cloud; security; Multi-tenant P142 New Features Acquisition of Text with Cloud-LDA Model Authors: Maoyuan Zhang, Fanli He, Shuiyin Chen Abstract. This paper probes into how to improve Information Retrieval by changing the feature distribution of the text. It introduces Cloud Model theory into Latent Dirichlet Allocation (LDA) Model and build a new feature selection system. LDA Model is used to mine the underlying topical structure. Each topic is associated with a multinomial distribution over words which are semantic related. But there is doubt that themes are relevant with each other in the light of semantics. Based on LDA model presented probability distribution of vocabulary in text, the new system with Cloud Model theory can automatically simulate feature set whose contribution degree is high in the text. Results show this feature set has less features but higher classification accuracy, thus obviously better than currently popular feature selection methods. If the query is matched to words with high contribution degree, the more these words are, the more relevant the article searched out is with the query. NTCIR-5 (the 5th NII Test Collection for IR Systems) collections of Experiment on SLIR (Single Language IR) show that this method achieves an obvious improvement compared with some other methods in IR. Keywords: Information Retrieval, feature, Cloud Model, LDA model P143 Establish expert system of transformer fault diagnosis based on dissolved gas in oil Authors: Donglai Ma, Wenjing Zhang, Wei Yao Abstract. In order to avoid economic loss caused by transformer fault, it needs to monitor the transformer status in real-time, discovery and handle the transformer fault timely. Using association rule analysis method to mine fault information of transformer, analyze the reliability between the transformer fault and characteristics, revealing the correlation degree of them. Based on the analysis of transformer fault, it put forwards to represent knowledge with production method based on rules, build knowledge database using decision rules, and construct the basic expert system model, which lays the foundation for intelligent diagnosis of transformer. The model uses dissolved gas in oil, electrical parameters etc. as fault judgment, evaluate transformer condition, and enrich the knowledge base of expert system with the evaluation results. Keywords: Dissolved Gases Analysis, transformer; knowledge base; Expert system, Association rules P144 A College Teaching Building Lighting Control System Based On Power Line Carrier Authors: Yanming Huo, Haochen Wang, Xiaoying Zuo, Zhimin Cui Abstract. With the university enrolment increasing, the registered students are becoming more and more. Almost all the universities are in the state of saturation. This leads to a big trial for the strength of the building. In the process of using the teaching buildings, lights are used more frequently and massively. Meanwhile because of the poor management and the students’ lack of saving up electricity, a lot of energy is wasted, at the same time resulting in the pollution for the environment. In order to keep pace with the idea of a low-carbon life, and to provide convenience for the students’ study, this essay introduces a new light-control system with artificial intelligence. This system can control all the lights by knowing the distribution of the students, the light intensity, the total number of the students, even the number in each classroom. Each sensor connects with each other by Power Line Carrier. This can The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 greatly reduce the waste of the energy and the cost of building this system. Keywords: The teaching building; Power line carrier; SCM STC89C52 P146 A Multi-Level Grid Partition Method for Enterprises Distribution Data Authors: Zhang Zhang, Yang Yang Zhao, Li Juan Duan, A Gen Qiu, Fu Hao Zhang, Kun Wang Tao Abstract. In order to use enterprises distribution data effectively and maximize their social and economic value, a multi-level grid partition method for enterprise distribution data is proposed which divides the voluminous data into reasonable size. This method uses the provinces or municipalities of nationwide as coarsest division, then a quad-tree is constructed to partition the points of enterprises according to their location. Each node in the quad-tree has a limit of points, when the number of points in a node beyond the limit, the node is divided into four nodes with roughly the same number of points in each quadrant. This process proceeds recursively until no node contain points more than the limit. Enterprise distribution data of Harbin is used in experiments to test the feasibility and effectiveness of this method, the results of the experiments show that enterprises distribution data were divided rapidly and accurately to the grid, which improve the applicability of the data and the convenience of data integration. Keywords: mutil-grid; the national organization code;spatial information; quad-tree; grid divition P149 An Improved Genetic Algorithm based on Local Modularity for Community Detection in Complex Network Authors: Yang Xinwu, Li Rui Abstract. Community detection has been an issue in complex network research. In the paper, according to the definition of weak community, we firstly propose a local modularity and then design a new more efficient mutation operator based on local modularity. The mutation operator selects the neighbor node that can best embody the definition of weak community structures as mutated result, which makes the mutated candidate solution closer to the optimal solution. Furthermore, to accelerate the emergence of the optimal solution, the roulette selection is integrated into a uniform crossover operator. On the basis of above works, an improved Genetic Algorithm based on the local modularity (IGALM) is presented for Community detection.The proposed algorithm is tested and compared to other algorithms on both computer-generated network and real-world networks. The comparative experimental results reflect that the new algorithm is feasible and effective in small and large scale complex networks. Keywords: complex network; community detecting; genetic algorithm; local modularity P159 Dividing for Combination: A Bootstrapping Sentiment Classification Framework for Micro-blogs Authors: Songxian Xie, Ting Wang Abstract. There are many challenges for sentiment classification of user-generated content (UGC) on social media platforms such as micro-blogs. Context dependence, which has been the most challenging problem, is focused on in this paper, and a novel semi-supervised framework is proposed to address the problem. By dividing the feature space of sentiment classification into two parts including the general features and the context features, a general classifier and a context classifier are learned separately in the two partial feature spaces, and a semi-supervised framework is developed to combine the general classifier and context classifier into a bootstrapping classifier. Experimental results show that both the general classifier and context classifier outperform traditional lexicon-based classifier, and the The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 combined bootstrapping classifier outperforms supervised classifier upper bound. The proposed semi-supervised framework is flexible and effective in solving the context dependent problem of sentiment classification for micro-blogs without the need of labeled data. Keywords: sentiment classification; idioms; context dependence; classifier; social media P161 Hadoop Cellular Automata for Identifying Rumor in Social Networks Authors: Hui Zhang, Ji Li, Yueliang Xiao, Hui Zhang, Ji Li, Yueliang Xiao Abstract. Rumors are unavoidable in social networks and spreading through social networks. In this paper, we introduce three roles, which are rumor maker, accomplice and innocent, into social networks. Rumor makers are people who distribute rumors in social networks. In order to propagate rumor as more people as possible, rumor maker cannot achieve this goal without others’ help. So that accomplices are people who help rumor maker spread rumors. Innocent are people who do not share help for rumors spreading. We introduce an extended cellular automata algorithm, i.e. Hadoop Cellular Automata (HCA), to simulate people’s tweeting activity in social networks. We deploy our experiments on an open source platform, Hadoop. Our result shows that Hadoop Cellular Automata is a liner algorithm. Also HCA can simulate people’s tweeting activity very well and can pick out rumors easily in social networks. Keywords: social networks; cellular automata; rumor spreading P162 An Implementation of Montgomery Modular Multiplication on FPGAs Authors: Xinkai Yan, Guiming Wu, Dong Wu, Fang Zheng, Xianghui Xie Abstract. Modular multiplication is one of the most important operations in the public key cryptographic algorithms. In order to design a high-performance modular multiplier, we present a novel hybrid Montgomery modular multiplier over GF(p) on FPGAs, which employs Karatsuba and Knuth multiplication algorithms in different levels to implement large integer multiplication. A 9-stage pipeline full-word multiplier is proposed for the 256-bit multiplication with 4-level recursion. The performance of our modular multiplier is improved through optimizing the pipeline and reducing carry-chain latency of the modular adder. On the average, our modular multiplier can perform one 256-bit modular multiplication in 3 cycles. We can integrate 13 modular multipliers on a Xilinx Virtex-6 V6VSX475T FPGA. The experimental results show that the throughput of 856.9 million modular multiplications per second can be achieved and the hybrid Montgomery modular multiplier has an outstanding performance in the situations which need plenty of continuous multiplications. Keywords: Hybrid; Montgomery modular multiplication; Elliptic curve cryptography (ECC) P164 A steered molecular dynamics method for receptor-ligand unbinding based on genetic algorithm Authors: Junfeng Gu, Xicheng Wang, Yingying Yang Abstract. Steered molecular dynamics (SMD) method provides a new tool to investigate the structure-activity relationship, but its application is restricted severely when the real dissociation pathway is tortuous. In this paper, a self-adaptive SMD method is designed for protein-ligand and protein-protein unbinding. During the unbinding process, the pulling direction varies automatically with a specified genetic algorithm to find the pathway which can be passed through with minimum force, so the rupture force of the unbinding process can be minimized and a rational dissociation pathway can be found for the receptor-ligand complex. For evaluating the efficiency of the proposed method, several representative protein-ligand complexes and protein-protein complexes are simulated The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 to pull the ligands away from the receptors. Compared with the conventional SMD, the new SMD scheme gains different dissociation pathways, and these new pathways generally have smaller rupture force and lower energy barrier. Keywords: Genetic algorithm; Steered molecular dynamics; Receptor-ligand; Dissociation pathway; Optimization P166 Bag of Visual Words for Cows’Basic Activity Recognition Authors: Wen Changji,Zhao Xin,Zhou Cuijuan,Chen Xueying,Guo Qing Abstract. The manual intervention before the birth dates is very important to reduce the dystocia rate and enhance the survival rate of calves effectively. Information acquisition of the cows’ basic sowactivity modes and regulars is one of judgments of manual intervention critical points. Now, the mainstream way has limitations that external sensors are used to obtain information by attaching to the specific positions. So, we proposed a method for recognizing the cows’ basic sow-activities by using bag of visual words under the video monitoring in this paper. Firstly, this method detected the remarkable areas of the cow activities in the videos by using spatial-temporal interest points. Secondly, it clustered the quantitative features into visual words and then constructed the visual dictionary for describing the activities. Finally, it used the nearest neighbor classification for the activity classification and recognition. This method was tested in different experimental setting for recognizing the typical basic sow-activities such as walking, lying and look-backing. One was tested on 90 groups of videos under given visual angles and the other on 30 groups of videos under the random perspective. The experiment results show that the method proposed in this paper achieve satisfactory accuracy of cows’ basic sow-activity recognition. Keywords: Basic activity recognition; Bag of Visual words; Spatial-temporal interest point; Cows P168 A Method Based on Random Search Algorithm for Unequal Circle Packing Problem Authors: Shang Ying, Chu Jizheng Abstract. We propose a random search algorithm to resolve the problem of packing circles into a rectangular container. With our method, all the circles are put into a large space randomly; and then by introducing the bow shift area, the searching space can be reduced and the local optimal solution can be list. By moving, turning and other disturbance methods, it will achieve the global optimization in the whole area. We designed exactly software to verify our algorithm. With our approach, the best optimal layout is irrelevant with the initial layout and the position of the biggest circle. Keywords: Circle cutting and packing, NPC, Optimization Algorithm, SA Packing Problem, Random Search. P169 Neural Network Based Algorithm for Generalized Eigenvalue Problem Authors: Hang Tan, Guoren Yang, Bo Yu, Xuesong Liang, Ying Tang Abstract. The present paper introduces a neural network based on approach for the generalized eigenvalue problem Ax Bx , where n-by-n matrices A and B are real-valued, B is non-singular, and B 1 A is an orthogonal matrix whose determinant is equal to 1. The generalized eigenvalues that have the largest or smallest absolute value of principal argument, as well as the corresponding eigenvectors that may be n-dimensional complex vectors, i.e., 2n-dimensional real vectors, can be extracted by using our proposed algorithm that is essentially based on an ordinary differential equation of order n. Experimental results demonstrated the effectiveness of the proposed algorithm. The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Keywords: Special orthogonal matrix; Generalized eigenvalue; Generalized eigenvector; Neural network P171 Simulation of Fabric in 2D Virtual Scene Based on Mesh Model Authors: Xiaona Fan, Senlin Zhang, Zhen Fan, Zhaoqi Chen Abstract. A fabric simulation system of 2D virtual scene is researched and implemented in this paper. The system not only simulates the folds and transformations of the scene realistically but also allows replacement and modification of fabric. The finite element mesh algorithm is used to model the virtual scene. In order to avert deformations of texture mapping, the cubic polynomial interpolation algorithm is proposed in this paper. It can overcome the low-pass characteristic of the bilinear interpolation algorithm by eliminating the jags generated from texture mapping. To make the scene simulation more stereo, this paper utilizes the intensity based fusion algorithm, which retains the original scene’s intensity. The experimental results show that the two-dimensional fabric scene simulation system is accurate and realistic, and has rapid time response. Keywords: Bilinear interpolation; Texture mapping; Cubic polynomial interpolation; Intensity fusion; Scene simulation P172 The Model of Population Projection by Delay Differential Equation with Two Lags Authors: Liqiang Fan Abstract. In order to give the more reasonable models of population projections, delay differential equations with two lags were considered. By analysing the relative growth rate of population, the growth function of population which determined by the maximum age and minimum age of new mothers might be more suitable. Because of the model does not have analytic solution, numerical method gives the result of the delay differential equation, and the population of America and population in the world test the rationality of the model. The result of the model agrees with the actual when give the appropriate parameters and some reasonable assumptions. Keywords: logistic equation; lag; relative growth rate; fitting; numerical method P174 The reliability analysis of embedded systems Authors: Zhongzheng You Abstract. This article starts with the introduction of the essence of the reliability of embedded system. By introducing some characteristics of embedded system such as failure rate, reliability and mean time to failure to analyze the reliability of embedded system, and set up the model of a single system, series system and parallel system. The models founded were simulated with Simulink software. Finally, the results of the simulation and the example validations indicate that series-parallel hybrid structure is very necessary in order to improve the reliability of embedded system and make the system has a long service life. Keywords: Embedded system; Reliability; Mean time to failure; Failure rate; Model; The reliability function; Structure P176 Strategies for Improving Accuracy of Structural Variation Prediction using Read Pairs Authors: Jingyang Gao, Rui Guan, Fei Qi Abstract. A substantial number of sequencing-based methods for discovering structural variation have recently sprung up, among which technologies utilizing read pairs have made significant progress in The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 providing high accuracy. Based on in-depth analysis of the state-of-the-art computational methods for identifying structural variation with read pairs, strategies for improving accuracy of structural variation prediction are summarized and classified into several categories, such as conservative mapping, clustering, distribution-based strategies and so on. Specific elaboration and concrete comparison of the strategies are carried on. It should be a future trend to develop an approach that is organic combination of multi-class strategies for structural variation detection. Keywords: structural variation; genome sequencing; read pairs; computational methods P177 The Design and Implementation of a Process-based Printing Order Management System Authors: Ma Huiling, Zhang Yongbin Abstract. In order to solve the problem of isolated order information among production processes, which leads to the information cannot be transferred timely and shared effectively, a system of information tracking is presented in this paper. The BPMN (Business Process Model and Notation) specification is adopted to establish order process model. The model can be used to describe the company's core business and the order information transmission process with the process-oriented thinking. Then Web standard-JSF (JavaServer Faces) is introduced to develop the system. The operation results show that order information can be transferred timely, fast, accurately, which avoids the delays or inaccuracies caused by manual operation. Meanwhile the managers can follow the tracks of the order progress at all times and provide clients with advice. The process-based order management system improved the information management ability of the printing enterprise and laid foundation for the realization of informatization enterprise-wide. Keywords: Order management; Printing process; BPMN; informatization P181 A Location Privacy-Preserving Protocol Based on Homomorphic Encryption and Key Agreement Authors: Xiaoling Zhu, Yang Lu, Xiaojuan Zhu, Shuwei Qiu Abstract. Location-based services (LBS) bring so much convenience to our daily life. However they have incurred serious location privacy problems. k-anonymity is the one of most popular privacy-preserving methods. The method relying on a trusted third party (TTP) might cause the TTP to become a performance bottleneck. So TTP-free protocols are proposed. But existing TTP-free protocols cannot resist attacks from multiple users colluding with a LBS provider. To solve the problems, this paper proposes a novel location privacy-preserving protocol. The protocol uses key agreement to construct the perturbations which can be removed on the whole. The perturbations are used to disguise real locations; meanwhile, they do not affect LBS service quality. With the help of homomorphic encryption, the LBS provider can compute the centroid of a companion set while it does not know the locations of the members in the set. The analysis shows that the protocol can resist location privacy attacks from insiders and outsiders, especially from multiple users colluding with the LBS provider. The protocol achieves high service quality while providing strong location privacy protection for LBS. Keywords: location-based services; location privacy; k-anonymity; homomorphic encryption; key agreement P184 A Lifecycle Analysis of the Revision Behavior of Featured Articles on Wikipedia Authors: Xinyi Li, Zhunchen Luo, Kunyuan Pang, Ting Wang Abstract. Wikipedia is the largest online encyclopedia. Its openness allows anyone to edit an article, The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 making articles vary greatly in quality. As only a small proportion of articles are assessed manually, the automatic evaluation of quality has become a highly active research field. Among the factors that affect quality, revision action is the direct factor. In this paper, we conduct a lifecycle analysis of the revision action of featured articles—the best work on Wikipedia, to find out the revision behavior patterns. Using a fine-grained approach, we parse revision actions into insert, delete and replace actions to study their performance in different phases of the lifecycle. Our results reveal that featured articles have distinct revision behavior over different phases. The contribution of the research is to show the correlation between revision behavior and the evolution of quality, which can help us understand what is behind the evolution of articles and can be used to assist quality evaluation. Keywords: Wikipedia; featured article; revision behavior; lifecycle analysis P186 Collaborative Filtering Recommendation Algorithm Based on Users of Maximum Similar Clique Authors: Zhou Zhaoyang, He Yanju Abstract. In order to improve the performance of Collaborative filtering (CF), a new method of producing the nearest neighbor for active user is proposed in this paper. Inspired by the conformist of E-commerce consumers, we build the user model of maximum similar clique and we use it to improve the method of producing the nearest neighbors for target users. A collaborative filtering recommendation algorithm MCQ-CF based on user model is present. The experiment results show that the algorithm MCQ-CF has good performance for accuracy and stability. Keywords: collaborative filtering; conformist; similar clique; recommendation system P187 Cloud Scenes Generation Based on the Improved Random Midpoint Displacement Method Authors: Yang Dongsheng, Yang Kaipei Abstract. In order to generate more rational and more diversity natural cloud scene, the improved random midpoint displacement method is proposed in this paper. We found that the cloud scenes generated by the traditional random midpoint displacement method were simple and similar through simulation analysis. The limitation of traditional random midpoint displacement method was caused by unreasonable method of generating random numbers. So the improved random midpoint displacement method uses a new method to generate random numbers. In improved method, the normalized function was used and the difference between average value and maximum and minimum value was taken into account. According to a large number of simulations, the law of that parameters of improved method influence the cloud scenes was given and the qualification about parameters of improved method was presented. Simulation results show that the cloudy scenes by improved method are more rational and more diversity. Keywords: cloud; scene generation; midpoint displacement method; improved P188 Performance Simulation and Optimization of Agricultural Supply Chains Authors: Jing Chen, Haihong Yu Abstract. Agricultural supply chains management is getting increasing focused in recent years, among academics as well as practitioners. In this paper, we present a supply chain simulation study for a real case, with the agricultural manufacture and distribution systems of cooperative-centered in concern. We evaluated the key performance indicator of the whole supply chains by building and simulating 3 present models of agricultural distribution systems. The design alternatives differed in terms of the level of integration and synchronisation between supply chain stages. By adjusting the combination of The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 parameters we specifically optimized the models quantitatively. This article provides a flexible simulation technique which could be widely used in the management system of agricultural circulation and efficiency improving of Chinese agricultural supply chains. Keywords: supply chains of agriculture; simulation; performance evaluation;model optimization. P189 Partition Strategies for C Source Programs to Support CPU+GPU Coordination Computing Authors: Yao Ding, Zeng Guo-sun, Ding Chun-ling Abstract. GPGPU technology provides a new effective way for achieving high performance heterogeneous computing. However, how to restructure traditional programs is the key to use GPGPU technology under CPU+GPU heterogeneous environment. This paper studies the partition strategies for C source programs to support CPU+GPU coordination computing. By analyzing characteristics of c source programs in memory access, arithmetic density, control flow structure and data parallelism, while considering the difference between CPU and GPU hardware, some strategies and algorithms for partitioning the target programs are presented. Finally, some experiments are conducted by using some typical programs to verify the effectiveness of proposed strategies and algorithms. Keywords: GPGPU; coordination computing; C source programs; partition strategies P193 Research of the Anti-Phishing Technology based on E-mail Extraction and Analysis Authors: Yanhui Du, Fu Xue Abstract. In this paper, an anti-phishing technique based on e-mail extraction and analysis is proposed. The technique approached with phishing email, the channel phishing attack transmits, distinguish phishing emails and extract the suspicious URL from the e-mail for further analysis. Upon arrival, a protected list is build according to those third parties most vulnerable to phishers in order to filter those confusing advertising spam in China and a neural network based model is proposed in order to detecting phishing messages from an e-mail stream. In this anti-phishing technique, email stream captured by our honey pot subsystem from the Internet is parsed into a MIME email firstly; various feathers are extracted from the email and outputted into feather vectors. The feature vectors will be self-organized by ART2 neural network one by one and classified into corresponding categories. Link URLs in the suspected emails’ messages will be extracted for further detection in phishing site subsystem. Experiment using collected emails shows a good performance aiming at detecting phishing emails in China while foreign method performs badly in distinguishing phishing emails from spam. Keywords: ART2 Neural Networks, E-mail Extraction, Anti-phishing P194 A new face recognition method based on the energy image of facial contour Authors: Yang Xinwu, Zhai Fei, Ma Zhuang Abstract. In order to further improve the effectiveness and enhance practicability of face recognition under guaranteeing the recognition accuracy, this paper proposes a new method of face recognition based on the energy image of facial contour. First, image binaryzation and edge detection method are used to extract the facial contour, then the energy image of facial contour of training samples are obtained; second, matrix logic "and" operation is adopted to calculate the similarity between a test sample and the energy image of facial contour of each class; finally, the test sample is classified according to the similarity criteria. The method is based on a kind of similarity match, so it can make good use of two-dimensional structure information of face images; moreover, it adopts matrix logic The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 "and" operation in classification instead of solving the eigenvalue problem and calculating the Euclidean distance of traditional classification algorithm, which can reduces the computational complexity dramatically. Finally, the contrast experiment with principal component analysis and sparsity preserving projections shows that the proposed method is more effective and stable on the Yale face database. Keywords: face recognition; similarity; faceial contour extraction; energy image of facial contour P196 Multi-resolution Image Fusion Algorithm Based on Gradient and Texture Features Authors: Junyong Ma, Shengwei Zhang, Caibing Yue, Abstract. A multi-resolution image fusion algorithm based on gradient and texture features is proposed. After each level of Gaussian Pyramid being separately filtered by texture-extracting filters and edge gradient filters, a series of texture and edge images including the texture information of original image are generated. This provides more comprehensive information measurement for further fusion. Infrared and visible images are fused utilizing the proposed image fusion method, and the fusion results are compared with several traditional fusion method. Experiment results and image fusion quality assessment show that the proposed fusion method demonstrates more superiority. Keywords: Image Fusion; Texture Feature; Gradient Feature P197 Survey of Cloud Messaging Push Notification Service Authors: Na Li, Yanhui Du, Guangxuan Chen Abstract. Cloud messaging push notification services are key features of pervasive mobile applications where invocations occur asynchronously and it is important that the mobile users are notified in a timely fashion of the available services. This article summarizes Push technology evolution including key techniques, features and architectures. It presents four kinds of push notifications such as Google Cloud Messaging, Apple Push Notification service, Microsoft Push Notification service and Blackberry Push service. It also analyses these four push notification approaches. In addition, it proposes a QESM to evaluate and select the most appropriate push mechanisms. Keywords: push notification services; cloud computing; survey P199 The Speedup Model for Manycore Processor Authors: Nan Ye, Ziyu Hao, Xianghui Xie Abstract. Integrating a large number of simple cores on thechip to provide the desired performance and throughput, microprocessor has entered the manycore era. In order to fully extract the ability of the manycore processor, we propose speedup models for manycore architecture in this paper. Under the assumption of Hill-Marty model, we deduce our formulas based on Gustafson’s Law and Sun-Ni’s Law. Then, compared with the Hill-Marty model, wetheoretically analyse the best allocation under the given resources. Furthermore, we apply the conclusions of our models to evaluate current manycore processors and predict future architecture. Our results show that manycore architecture can be capable of extensive scalability and be beneficial to promote the performance, especially heterogeneous one. By using simple analytical models, we provide a better understanding of architecture design and our work complement existing studies. Keywords:speedup model, manycore architecure, Gustafson’s Law, Sun-Ni’s Law P201 A New Approach for Text Location Based on SUSAN and SVM The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Authors: Wang Chuan, Zhou Yi-min Abstract. In order to extract text parts from images, this paper proposes a new approach that combines edge detection, heuristic knowledge and SVM. Firstly, SUSAN algorithm with an adaptive threshold is used to extract the edge information from gray images, and the binary edge images are obtained; Secondly, the heuristic knowledge is used to filter the text candidate areas obtained by edge dilation, and the positions of the text candidate areas in the binary image apply to the gray image; Finally use statistics of gray level co-occurrence matrix as SVM’s inputs to construct SVM which is used to verify the text areas further. The experimental results show that the proposed approach can effectively locate the text areas with high accurate and extraction ratios. Keywords: text location; edge detection; SUSAN operator; SVM P202 A Ship Recognition Method based on Affinity Propagation Authors: Weiya Guo, Xuezhi Xia Abstract. Accurate target classification is the keystone of sea battlefield’s ship targets recognition. Aiming at the deficiencies of supervised and unsupervised classified methods, we present a novel scheme called semi-supervised ship target recognition based on affinity propagation (AP). In order to circumvent the problem of choosing initial points, the method introduces affinity propagation clustering to construct classification model simply and effectively. Based on the idea of semi-supervised learning, a few restrictions of labelled flows and priori manifold distribution of sampled space are abstracted. Also, manifold similarity is defined. Henceforth, the semi-supervised method can not only largely reduce the complexity of marking sampled flows, but also nicely improve the performance of the classified. Theoretical analysis and experimental results show that that the proposed method is robust and can get better than KNN or SVM or HDR method. With the acquirement of high recognition rate in the battlefield’s ship targets on the sea, undoubtedly, this approach is a feasible and efficient method. Keywords: ship recognition; semi-supervised learning; affinity propagation (AP) clustering; manifold similarity P205 NBA All-Star Lineup Prediction Based on Neural Networks Authors: Bigui Ji, Ji Li Abstract. In this paper we examined the use of Neural Networks as a tool to predict the starting and reserve lineup of All-Star game, in the National Basketball Association, from all the candidates. Statistics of data from season 2008-09 to 2012-13 were collected and used to train a verity of Neural Networks such as feed-forward, radial basis and generalized regression Neural Networks. Fusion of the neural networks was also examined by using AdaBoost ensemble learning algorithm. Further, we have explored which features set input to the neural network was the most useful ones for prediction. And an excellent prediction scheme was proposed to improve the forecast accuracy. By using AdaBoost and the proposed scheme, the accuracy of our prediction of the starting lineup is up to 91.7%, the reserve lineup 73.3%. Keywords: All-Star prediction; Neural Networks; AdaBoost P206 An Improved Super-Resolution Reconstruction Algorithm Based on Regularization Authors: Shuang Wang, Bingliang Hu, Xiaokun Dong ,Xingtao Yan The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Abstract. The traditional regularized super-resolution (SR) algorithms can reconstruct the high-resolution (HR) image to some extent. But the high frequency information of the image will lose seriously and the edges and details will become blurred. This paper presents an improved regularized SR algorithm. Firstly, a new interpolation algorithm is used to obtain the initial value of the HR image. Secondly, the trilateral filter is adopted as the regularization term to preserve the edge and details. Finally, the steepest descent method is taken as the iterative algorithm to gain the optimum solution. Simulated experiments are presented including the comparison with some existing reconstruction algorithms. Those results show that the proposed algorithm performs better than others. Furthermore, the edges and details of the image are well preserved. Keywords: super-resolution reconstruction; regularization; trilateral filter; steepest descent method. P209 Hand Tracking Algorithm Based on SuperPixels Feature Authors: Zhang Zhiqin, Huang Fei Abstract. There have been considerable research efforts to use the hand as an input device for HCI in recent years. Hand tracking is the most important procedure for HCI, it is essential of tracking stability and efficiency for hand manipulation. This paper proposed a novel hand tracking algorithm which can track a hand stable and is real time, and the proposed algorithm can work on normal CCD cameral. Our algorithm is based on mean-shift and we improved it to fit for robust hand tracking by using super pixel cluster, integrated GIH and skin color mask, the skin color mask was extracted using online learning. The proposed improved algorithm can track hand reliably even in clutter environments comparing to the existing traditional algorithms. Keywords: HCI, super pixels, hand tracking, online learning, monocular, mean shift P210 Granular Based Dijkstra algorithm For Solving Uncertain Shortest Path Problem Authors: Assem Ahmed Alsawy, Hesham Ahmed Hefny Abstract. shortest path problem got a lot of attention from many researchers; the distances between the nodes can be represented by different types of uncertain numbers such as: interval numbers, fuzzy numbers, rough numbers and also some of them can be classical real numbers. These heterogeneous types of numbers are forming a challenge in calculation the shortest path. This paper proposes a Unified Granular Number (UGN) that we call, G- Number to act as a general form for any uncertain granular number. G- Number represents higher level of abstract that hold only common properties of different types of uncertain granular numbers while ignoring some particular properties which are not necessary to be considered in such higher abstract level. The main benefit of using such a proposed Gnumber is the ability to represent all types of granular numbers using unified formality that greatly simplifies arithmetic operations. P212 The Asymptotic Properties of Quasi-maximum Likelihood Estimator for Spatial Error Panel Data Model Authors: Chunhong Li,Lixia Wen Abstract. The spatial panel data model is commonly used in practice. In order to explore the property of the parameter estimator for the spatial error panel data model with fixed effects, the quasi-maximum likelihood estimator for the model is provided in this paper. And two theorems on the asymptotic properties of the estimator are proposed and proved. For illustration, the associated simulation is employed to verify the effectiveness of the proposed strategies. Empirical results show that when the The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 number of the spatial units is large and the number of the time series is finite, the estimator is consistent and asymptotically normal. In conclusion, it is an estimator with good performance. Keywords: spatial error panel data model; quasi-maximum likelihood estimator; consistency asymptotic normality; simulation studies. P217 The Credit Risk Prediction of the Small and Medium-Sized Enterprises based on GA-v-SVR Authors: Wei Wang, Xiangdong Liu, Si Chen Abstract. Making the science assessment and prediction of the credit risk of the small and medium-sized enterprises (SME) is a significant part of risk management of commercial bank. This paper first integrates Genetic Algorithm (GA) with v-SVR model, creates the credit prediction model, GA-v-SVR, and then builds the SME credit risk indicator system. Using principal component analysis method screens out the major factors of credit risk, it then considers those factors as the input indexes, and chooses credit default as the output indicator. The model is employed to train the first group sample, and the rules of credit risk recognition are obtained. Finally, we utilize these rules to predict the credit of the second group sample, and acquire a rather accurate result so that can prove the feasibility and validity of the model established by this paper. Keywords: support vector machine; genetic algorithm; credit risk; small and medium-sized enterprises P221 Application of FAHP Approach to Assess Service Quality Authors: Yong Li, Zhi-Kun Zhang Abstract. Service quality has become an important topic because of its apparent relationship to customer loyalty, reduced cost and retention, and it is widely taken as a driver of firm marketing and financial performance. In order to remain competitive in developing markets, improving the service quality is a key strategy for firms. As service satisfaction of dealers directly impacts production sales, firms are especially concerned with increasing and maintaining the service quality, as well as identifying why service satisfaction decline. This paper proposed an approach within the Fuzzy Analytic Hierarchy Process (FAHP) framework with specific service quality elements based on SERVQUAL for tackling the imprecision and uncertainty of service satisfaction assessments during service process, where the decision-makers’ comparison judgments are represented as fuzzy triangular numbers. Finally, results of the study demonstrate the feasibility of the proposed FAHP-based algorithm in effectively selecting the assessment outcomes. So, through collect data to judge the result by FAHP, considerable value for the firms to improve its’ service quality could be obtained. Keywords: Service quality; Service satisfaction; SERVQUAL; Fuzzy linguistic scale; Fuzzy analytic hierarchy process (FAHP) P225 An Improved Forecasting Algorithm for Spare Parts of Short Life Cycle Products Based on EMD-SVM Authors: Jie Li, Yeliang Fan, Yong Xu, Huiran Feng Abstract. Demand of spare parts of short life cycle products has great random fluctuation and short life cycle. Traditional forecasting methods have low forecasting accuracy which leads to understock or overstock of spare parts. Considering such situation an improved forecasting method based on Empirical Mode Decomposition and Support Vector Machine (IEMD-SVM) is proposed. By replacing the Cubic Spline Interpolation in the standard EMD with Piecewise Cubic Hermite Interpolation, the overshoots and undershoots problems caused by great volatility of data are solved. Experiments with The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 459 real data sets show that the IEMD-SVM forecasting method has a better forecasting result than traditional forecasting methods which provides better decision supports for enterprise inventory management. Keywords: component; short life cycle products, spare parts demand, forecasting, Empirical Mode Decomposition, Support Vector Machine P226 Using Bidirectional Search to Compute Optimal Shortest Paths over Multi-Weight Graphs Authors: Hui Ma, Ruishi Liang Abstract. Computing the shortest path between two vertices in a given graph finds out vast applications. Currently most state-of-the-art research studies the shortest path computation problem in single-weight graphs, i.e., each edge in the graph has only one weight. In some applications, there are multiple weights on an edge, and those weights need to be considered when computing the shortest path. However, the sub-path property that any sub-path on a shortest path is also a shortest path, is violated in multi-weight graphs, and hence those state-of-the-arts could not be directly applied. This paper proposes a Bidirectional Best-First Search (BBFS) method with heuristic optimizations to find an optimal shortest path in multi-weight graphs. Experiments show that compared to the single search Best-First Search (BFS), BBFS has higher performance. Meanwhile, BBFS has high accuracy especially for long paths search. Keywords: shortest path; multi-weight graph; long path; bidirectional search P229 Application of 3D Sampling Trajectory in EVDRS Algorithm Authors: Zhongyuan Mou, Jie Yang, Jieru Chi Abstract. In order to solve the reconstructed image problem with poor image quality and long data scan time, 3D-EVDRS algorithm is proposed in this paper. By using 3D sampling trajectory in EVDRS algorithm, 3D-EVDRS algorithm can rationally solve the reconstructed image problem with poor image quality and long data scan time. For illustration, the medical diagnosis spine data is utilized to show the feasibility of the 3D-EVDRS algorithm in solving the reconstructed image problem with poor image quality and long data scan time. Experiments show that 3D-EVDRS algorithm will be used as an efficient algorithm in solving the reconstructed image problem with poor image quality and long data scan time. 3D-EVDRS algorithm can effectively solve the problem with image quality and imaging speed and thus a class of the reconstructed image problem with poor image quality and long data scan time are solved. Keywords: 3D sampling trajectory; EVDRS algorithm; MRI; image reconstruction; 3D-EVDRS technique P230 A model of visual attention for natural image retrieval Authors: Guang-Hai Liu, Deng-Ping Fan Abstract. in this paper, we propose a simple, yet very powerful visual attention model to encode color, orientation and saliency information and spatial layout as natural image features for content-based image retrieval, where the image representation is so called saliency textons histogram. Experimental results indicate that the performances of our algorithm are better than that of multi-texton histogram and Gabor filter method significantly. The saliency textons histogram has the good discrimination power of color, edge features and spatial layout. Furthermore, the proposed visual attention model can simulate the human visual mechanism to some extent. The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Keywords: Visual attention; Saliency model; Saliency textons histogram. P232 Research on Spatial Frequency Motivated Gray Level Image Fusion Based on Improved PCNN Authors: Nianyi Wang, Yide Ma, Weilan Wang Abstract. SCM is an improved PCNN model compared to traditional PCNN model. It decreased computation complexity and is much less time consuming than PCNN. It accords with Weber–Fechner law and possesses the advantages of both PCNN and ICM. In this paper, we proposed a SCM based image fusion method. Firstly, spatial frequency is considered as the gradient features of images to motivate SCM networks. And then we provided a new method to select pixels from source images and generate the final fused image. In order to verify the effectiveness of the proposed method, we compared it with other five methods under four image fusion effect evaluation indices. The experimental results show that the proposed approach is an effective fusion method. Robustness test experiments verify that our method can be used in noisy image processing field. Keywords: image fusion; spiking cortical model (SCM); spatial frequency; robustness test; pulse coupled neural network (PCNN) P235 A Hybrid Artificial Bee Colony Algorithm Combined With Simulated Annealing Algorithm for Traveling Salesman Problem Authors: Shi Pei, Jia Su-ling Abstract. In order to solve travelling salesman problem (TSP), a hybrid artificial bee colony algorithm combined with simulated annealing algorithm (HABC-SA) is presented for TSP. This algorithm gives a discrete coding method for food source position. Crossover and mutation operators in genetic algorithm are introduced into the new algorithm to do local search. Simulated annealing idea is applied in this hybrid artificial bee colony algorithm to increase the diversity of food sources. The proposed algorithm is tested on benchmark problems, and results show that this algorithm can avoid pre-maturity and advance constringency for TSP. Keywords: artificial bee colony algorithm (ABC); travelling salesman problem (TSP); simulated annealing idea. P238 Study on Textual Case Retrieval Algorithm Based on Topic Words Authors: Lei Tang, Ying Wang, Yi Zhu, Kunwang Tao, Yong Feng, Ying Guan Abstract. Several shortages of Boolean retrieval, ignoring the semantic relations between words and unable to rank the retrieval results in order of importance, are found by analyzing the essence of traditional text retrieval, in view of which an improvement of algorithm optimization based on topic words is proposed. Through enriching topic words to structure keywords library, the semantic distance and similarity of keywords are calculated on the basis of semantic retrieval framework. The improved algorithm is applied in the disaster case retrieval system at last, which retrieval results are then analyzed to detect performance. It is observed that the improved algorithm has a better improvement in retrieval both precision rate and recall rate. Keywords: Boolean retrieval; topic words; semantic distance; improved algorithm; precision rate; recall rate P239 A Weighted Association Rules Mining Algorithm with Fuzzy Quantitative Constraints Authors: LU Qi-bing, SHENG Bu-yun The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Abstract. Along with production process automation and development of new products, manufacturing information in large quantity, contains more dimensions, in order to mine useful information from the manufacturing database, monitor and control manufacturing process effectively. A weighted association rules mining algorithm with fuzzy quantitative constraints (FQC-wed Apriori algorithm) is proposed in this paper. First, find association rules after database mining. Then, mine fuzzy association rules with fuzzy query. Last, find frequent itemsets with the improved weighted association rules algorithm. Manufacturing process information can be mined and effectiveness of the mining algorithm can be evaluated. The algorithm is applied to manufacturing process information mining in discrete manufacturing industry. Keywords: data mining, association rules algorithm, weighted support, fuzzy association P241 Design and Development of Air Traffic Management Safety Database Analysis System Authors: Wang Lixin, Liu Yi Abstract. With the rapid development of civil aviation, air traffic management system plays a more important role in ensuring aviation safety, and hence there is an urgent need to use information technology to improve analysis level and efficiency of aviation safety information. In this paper, an air traffic management safety database analysis system is developed. It can not only store basic information of safety events by entering data directly or acquiring data from other sources, but also quantify and classify the incidents according to human factor analysis, defense failure analysis and organization factor analysis of SHELL model so as to achieve in-depth analysis of the safety information. In the development of the system, B/S mode, MySQL database, Java language and Struts 2 + Spring + Hibernate framework are adopted. Via flexible user role and permission mechanism it could ensure a safe and ordered access to safety data. Moreover, considering importance and complexity of data acquisition, this module is deployed on cloud computing platform as a service, which could improve data acquiring efficiency and also lay a foundation for follow-up data mining of ATC safety data. The system could provide a quantitative decision support for ATC safety information management. Keywords: air traffic management; database; cloud computing; civil aviation safety P244 H-KD: a novel query structure for multi-dimensional awareness information Authors: Hong Tang, Xiao Sun, Guofeng Zhao Abstract. With the development of Internet, network applications based on awareness information appear increasingly in future Internet, such as context-based routing, content delivery and personalized content recommendation. The full use of awareness information to support those applications makes the fast query of information to be a critical issue. This paper adopts the strategy of “divide-conquer” to propose an effective two-layer data structure named H-KD to search diverse, multi-attribute and massive awareness information. As the first layer structure, Hash Tree organizes the service ID that identifies the type of awareness while the second layer is composed of KD Trees to deal with the specific instances of information. The results of simulation with the real data sets show that H-KD is more efficient and scalable than KD Tree especially when used in the partial query and the range query. Keywords: future Internet; awareness information query; KD Tree; Hash Tree P245 A Case of Chip Multithreading Architecture with Resource Unit Manager The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Authors: Juan Fang, Zhenxi Pan, Lu Yu, Sitong Liu Abstract. In order to improve the overall throughput of processors, to increase thread-level parallelism (TLP) and instruction-level parallelism (ILP) intra and inter cores, and ensure the scalability of multi-core systems, can a novel mechanism chip multithreading with resource unit manager (RUM-CMT) be used, which is presented in this paper. By introducing the efficiency difference of resource utilization among threads, such as, the condition of dynamically resource allocation to CMT architecture and add an absorption barrier for all threads to make their reserved resources far away from hidden hunger. For verify the applicability of RUM-CMT, a 4 cores with 2 threads processor and a 4 cores with 4 threads processor are simulated based on GEMS & simics simulator. And this limited study shows RUM-CMT can increase performance by 29.79%, and an improve success committed instructions per squash instructions by 31.15% and fairness attains 6.25% improvements over static partition on 4 cores with 4 threads processor. The 4 cores with 2 threads also attains passable enhance. So RUM-CMT can accurately and concise reallocate resource according to phase turning in the running of applications, improve resource utilization, mining the ILP and TLP in applications. In other words, RUM-CMT improves the controllability of threads, reduces invalid losses and improves system efficiency, and it is a suitable solution for multicore, multithreaded architecture. Keywords: Dynamic partition; Register Unit Manager; simultaneous multithreading P247 An Improvement of the Slotted CSMA/CA Algorithm with Multi-level Priority Strategy and Service Differentiation Mechanisms Authors: Lin ZHOU, Mafeng ZHU, Kaixia PAN, Liping LEI, Congbin ZHUO Abstract. It is the fact that IEEE 802.15.4 protocol does not support any service of priority scheduling mechanism and there are some shortages existing in the slotted CSMA/CA algorithm. In view of the different types of priority and the defects of the original CSMA/CA algorithm, a kind of CSMA/CA algorithm with multi-level priority strategy and service differentiation mechanisms is proposed in this paper. What’s more, different BE and CW are used to provide multilevel differentiated service for devices in sensor network. Four types of priority are assumed, there are high, medium, low and normal priority and they are assigned depend on current state of the network by CSMA/CA algorithm. In the end, it is proved that the proposed algorithm performs better than the original one in the aspects of the throughput, network delay and the probability of successfully access to channel using network simulator OPNET. Keywords: the Slotted CSMA/CA; multi-level priority strategy; service differentiation mechanism; OPNET P251 Predicting the Subcellular Localization of Proteins with Multiple Sites Based on N-terminal Signals Authors: Xumi Qu, Yuehui Chen, Shanping Qiao, Abstract. Subcellular localization of proteins is an important attribute in molecular cell biology and proteomics, and closely related to its functions, signal transduction and biological process. In recent years, great progress has been made in the research field of protein subcellular localization prediction. However, some shortcomings still exist in the prediction methods. Such as the extracted features information is not complete enough to achieve a higher prediction accuracy rate, some important protein information and the correlation of the amino acid sequence are usually ignored and so on. Some proteins can simultaneously exist or move between two or more different subcellular locations, but The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 were considered to have only one location. In this study, we divide a protein sequence into two parts according to its N-terminal sorting signals and extract their pseudo amino acid composition features respectively. And then we use the multi-label KNN, abbreviated as ML-KNN to deal with the proteins which have both single location and multiple locations. The results are satisfied by Jack Knife test. Keywords: subcellular localization; pseudo amino acid composition; N-terminal sorting signals; ML-KNN P253 A graph-based method for Detecting Text in natural scene images Authors: Li Rong Abstract. Detecting texts in camera-captured images is a challenging task. In this paper we present a graph based method for detecting texts in camera captured images. We first extract connected components by an adaptive method. Then we construct a graph whose vertices correspond to connected components. There also have two special vertices called terminals: source s (text) and sink t (non-text). We find four nearest neighbor CCs of a CC, and add edges in the graph between the corresponding vertex of the CC and vertex of its neighboring CC. Energy function of the graph is defined so that its minimum is corresponding to an optimized partition of vertices into source and sink. Parameters of the energy function are determined by trial. Maximum flow/minimum cut method is used to minimize energy function and get an optimized partition of the connected components into source(text) and sink(non-text). Experiment results show that the method can diminish many false alarms which in the result of output of SVM classifier alone and attains very high precision. Keywords: text detection; graph cut; camera captured images; natural scene images; conditional random field P255 The Security Testing Case Research of Protocol Implementation Authors: Lei Zhang, Jing An, Chunlan You, Guangxuan Chen• Abstract. As the underlying design of security protection technology, security protocol played an indispensable role in the protection of data storage and transmission of the network and information system. This paper analyzed the existing method for generating test cases based on the security testing research of protocol implementation according to the three key steps, formal description of the protocol model, the generation of test sequence and the description of test cases. This paper also provides reference for the research of new method to generate test cases. Keywords: protocol implementation; security testing; test cases P256 Efficient Identity-based Encryption from Lattice Authors: Chen Huiyan, Chen Dongmei, Zhang Yanshuo Abstract. At present, most of identity based encryption (IBE) schemes from lattice originate from the results of Gentry et.al.[11], and regard each identity as a bit string with equal length and then assign a matrix to each bit of identity string. Consequently, they are considerably less efficient. In this paper, we present an efficient IBE from standard learning with errors problem and process identities as one chunk for performance. This paper gives a proof that our IBE is IND-sID-CCA secure in the standard model. Meanwhile, we also show that our IBE construction is also IND-ID-CCA secure by the technique i.e., imposing additional restrictions on the identities, presented by D. Boneh and X. Boyen in [3]. Keyword: lattice, identity based encryption, learning with errors (LWE) problem, selective-identity The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 P258 Research of terrain 3D visualization method based on IDL and ArcEngine Authors: Bin YANG, Jin-sheng WANG, Xiu-mei GU, De-zheng GAO Abstract. It is a very hot research topic in GIS, virtual reality, computer graphics, digital photogrammetry and other fields which should be researched on 3D terrain visualization. There is also an important part of the digital earth strategy in many fields in order to resolve some comprehensive problems. Trying to take advantage of IDL data processing and graphic display function and ArcEngine spatial analysis function, in the Visual C # 2005 under the environment of hybrid programming mechanism, using of component design and development of integrated development technologies analysis of terrain visualization application operating environment. It should realize the 3D digital terrain expression and spatial analysis function. The results show that the IDL and ArcEngine integrated development method applied to the 3D terrain visualization analysis software platform developed operability and extension force with strong, both in terms of space efficiency and image data analysis , development costs advantages. Keywords: 3D visualization; formatting; Digital terrain; IDL; ArcEngine; Integrated development. P260 Commercial Bank Stress Tests Based on Credit Risk Authors: Weiqing Wang, Xue Zhang, Xiangdong Liu Abstract. Based on the History-Based Stressed PD model which is derived from Merton theory and IRB model which is derived from Basel New Capital Accord, this paper selects six commercial banks to conduct the empirical research of credit risk stress testing. The result indicates that the value-at-risk calculated by IRM model is much higher than History-Based Stressed PD model, because the former is completely based on the theoretical model while the latter takes into consideration of the historical and realistic significance. In practice, this paper suggests to comprehensively consider the measuring results of two models to formulate risk control measures. Keywords: stressing test; credit exposure; History-Based Stressed PD model; IRM model P261 Effective Data Exchange in Parallel Computing Authors: Hui Ma, Yongqi Li Abstract. How to efficiently transfer data among parallel threads is a research hotspot. A common data structure of transferring data among parallel threads is queue. Some writer threads write data into one side of the queue, and reader threads read data from the other side of the queue. Run in parallel environments, some sources, such as shared variables, are critical resources, which require atomic operation. One naive way to guarantee the correctness is to impose a lock on critical resources. However, lock is a heavy system mechanism, and is of low efficiency. In this paper, a highly effective single-in-single-out lock-free queue is devised by utilizing some important hardware properties and techniques, such as thread-local variables, fast modulo operations and cache-line padding, etc. A single-in-multi-out lock-free queue and a multi-in-multi-out lock-free queue are also proposed. Experimental results in the end show the effectiveness of our methods. Keywords: data exchange; parallel computing P262 Towards Real-time Federate Cloud for Large Group Company Authors: Lixin Du, Wei He Abstract. How to improve the utilization of IT facilities is a major problem for enterprises which have many real-time control systems. We think that improving or rebuilding legacy applications using cloud The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 computing ideology is more suitable than building new cloud platform for these traditional real-time companies. In this paper, we propose a federate cloud (FC) architecture for large group company having many subsidiaries with similar real-time applications based on centric model. In the FC architecture, a sub cloud is constructed for applications in each subsidiary and all the sub clouds are connected together by cloud bus. We discuss the detailed mechanism for the FC architecture, including construction of the FC component, the real-time cloud storage strategies and cloud service scheduling algorithm. Experiment results show that our method can improve the utilization of IT facilities effectively. Keywords: cloud computing; real-time storage; service scheduling; federate cloud P263 Realization of Multi-port SDRAM Controller in LXI Data Acquisition System Authors: Jianmin Wang, Yanqin Zhang, Jinhu Zhou, Peng Jia, Xunjun He Abstract. Currently, the LXI data acquisition system often requires high speed, large capacity memory, but the internal storage resource of FPGA is not sufficient to meet the requirements. In order to solve above problems, a SDRAM controller is proposed in this paper, where the Multiple FIFO based on the on-chip resources of FPGA serves as the read and write cache to realize the multiple functional modules performing the read/write operation in LXI acquisition system by the design of priority algorithm and reasonable controlling the access of SDRAM from external device. At the same time, the SDRAM can still communicate at high frequency by the suitable time limitation. The simulation results show that the proposed SDRAM controller can not only realize reading and writing data, and but also its operating frequency is able to meet the requirements of functional modules. Keywords: SDRAM; muli-port; arbitration; FPGA P264 Solving Fuzzy Nonlinear Systems—A Class of Defuzzification in the Fuzzy Control Authors: Jia Meizhen, Peng Xiaohua Abstract. In order to achieve defuzzification, converts fuzzy quantity to accurate quantity in fuzzy control, researching about solving fuzzy nonlinear systems. Parameters transform method combines with homotopy method are introduced in this paper. The parameters transform method transforms a class of general fuzzy nonlinear systems and full fuzzy nonlinear systems into numerical nonlinear systems. Then, one can get solutions of the numerical nonlinear systems based on the homotopy method. It is feasible to choose any appropriate initial value when using homotopy method, avoiding the hard work of selecting appropriate initial values. The numerical experiments approve this method is a useful defuzzification at last. It is easer to accomplish defuzzification by solving the two fuzzy nonlinear systems. In this way, a class of fuzzy control can be established based on the defuzzification. Keywords: defuzzification; fuzzy control; fuzzy nonlinear systems; parameters transform method; the homotopy method P265 Multiple Feature Fusion Protein Tertiary Structure Prediction Authors: Wenzheng Bao, Yuehui Chen, Yiming Chen Abstract. Predicting protein tertiary structure from its primary amino acid sequence is a challenging mission for bioinformatics. In this paper we put forward a novel approach for predicting the tertiary structure of protein and construct an Error Correcting Output Codes(ECOC) classification model on the basis of Particle swarm optimization(PSO) and neural network(NN).Three feature extraction methods, which are Amino Acid Composition, Amino Acid Frequency and Hydrophobic Amino Acid The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Combination, respectively, are employed to extract the features of protein sequences. To evaluate the efficiency of the proposed method we choose a benchmark protein sequence dataset (640 dataset) as the test data set. The final results show that our method is efficient for protein structure prediction. Keywords:Tertiary structure of protein; ECOC classification models; Particle swarm optimization; neural network P266 A Study on User Adoption of Cloud Storage Service in China: A Revised Unified Theory of Acceptance and Use of Technology Model Authors: Yue Cao, Xinhua Bi, Lei Wang Abstract. Cloud services have been basically popularized in Europe and US, but in China especially in enterprise market the promotion of cloud services is quite difficult, it is necessary to explore the factors influencing the adoption of cloud services. Based on the revised Unified Theory of Acceptance and Use of Technology (UTAUT) model, we described a theoretical framework that incorporates the unique characteristics of cloud storage service to evaluating the adoption of cloud storage service in China. Results of empirical study showed that perceived risk, personal innovativeness, performance expectancy, effort expectancy and social influence had significant effects on adoption intention, and adoption intention and facilitating conditions had significant effects on adoption behavior. Keywords: cloud storage service; user adoption; unified theory of acceptance and use of technology (UTAUT) P267 Present Situation and Prospect of Data Warehouse Architecture under the Background of Big Data Authors: Sun Lihua, Hu Mu, Ren Kaiyin, Ren Mingming Abstract. Compared with the traditional data warehouse applications, the big data analysis is characterized by its large data size and complex query analysis. In order to design the data warehouse architecture suitable for the big data analysis, this paper analyzes and summarizes the current mainstream implementation platform-parallel database, MapReduce and the hybrid architecture based on the above-mentioned two architectures. Moreover, it presents respectively their advantages and disadvantages and describes various researches of and the author’s efforts on the big data analysis to make prospects for the future study. Keywords: big data; data warehouse; large scale; MapReduce; parallel database; deep analysis P268 Unambiguous Synchronization Technique for BOC signals Authors: Jiamin Qi, Zhenbo Li, Jiapin Chen, Ling Mao Abstract. In order to deal with the tracking ambiguity for binary offset carrier (BOC) modulated signals, a new tracking technique is proposed. The idea of the proposed new tracking loop is to combine a single peak correlation function. Through subtracting two cross-correlation, a single positive peak correlation function could be obtained. For different BOC signals, the new proposed method adopts symmetrical equivalent pulse width modulated symbols of the auxiliary signal. The theoretical formulas of the proposed acquisition technique is computed and simulated. The performance results show that the proposed new technique could solve the ambiguity completely, although there is some degradation in acquisition. Keywords: GNSS; BOC modulation; unambiguous acquisition; detection The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 P273 Simulation research on diffusion of agricultural science and technology for peasant Authors: MA Li, CHU Xia-ling, HUANG Xiu-jie, XIONG Rui-quan, LI Huan-huan, LIN Qun Abstract. [Purpose] In order to solve problems like Chinese farmers’ weak economic strength, low ability for receiving technology, and low efficiency of agricultural science and technology diffusion, the diffusion of agricultural science and technology among farmers is simulated and analyzed. [Method] By using complex network theory and Netlogo software, the spread of agricultural science and technology is simulated. [Results] Results show that the higher the “network-density” and “disseminator” are, the faster the agricultural science and technology diffuses; the more the “explorer” and “intensity” are, the faster the agricultural science and technology diffuses, but when the number of “explorer” and “intensity” reaches a certain level, agricultural science and technology diffusion enters a platform stage; the bigger the “cost” is, the smaller the “revenue” is, the larger the technical potential difference is, the more the time full coverage of agricultural science and technology consumes; “environment” factor is not sensitive to the technology diffusion. [Conclusions] Agricultural science and technology diffusion model and simulation established by using the theory and method of complex network, can provide a reference for the improvement of agricultural technology diffusion system and diffusion method. Keywords: peasant; own characteristics; Netlogo; agricultural science and technology; simulation P275 A Three-stage Clustering Framework based on Multiple Feature Combination for Chinese Person Name Disambiguation Authors: Fei Wang, Yi Yang, Zhaocai Ma, Lian Li Abstract. To solve name ambiguity problems and improve the performance of person name disambiguation, we propose a three-stage clustering algorithm in the paper. In the first stage, organizations and locations (OLs)are used to cluster documents about the same person,therefore some texts with more resemblance will be assigned to one category. This stage is simply document clustering based on the similarity of OLs. In the second stage, the clustered documents are used as a new data source from which some novel features (like co-author names) are extracted. We used these new extracted features to make additional clustering between documents. Meanwhile, a method was proposed to solve name ambiguity problems by using social networks construction based on the relationships among co-authors. In the third stage, webpages are further clusteredusing content-based hierarchical agglomerative clustering (HAC) algorithm, then analyzing the useful content including title and abstract and keywords (TAKs) to disambiguate the ambiguous names. Experimental results show that our three-stage clustering algorithm can availably enhance the performance of person name disambiguation. Keywords: personnamedisambiguation;social networks;hierarchical agglomerative clustering P276 CloudFlame: Cyberinfrastructure for Combustion Research Authors: Gokop L. Goteng, Naveena Nettyam, S. Mani Sarathy Abstract. Combustion experiments and chemical kinetics simulations generate huge data that is computationally and data intensive. A cloud-based cyberinfrastructure known as CloudFlame is implemented to improve the computational efficiency, scalability and availability of data for combustion research. The architecture consists of an application layer, a communication layer and distributed cloud servers running in a mix environment of Windows, Macintosh and Linux systems. The application layer runs software such as CHEMKIN modeling application. The communication The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 layer provides secure transfer/archive of kinetic, thermodynamic, transport and gas surface data using private/public keys between clients and cloud servers. A robust XML schema based on the Process Informatics Model (PrIMe) combined with a workflow methodology for digitizing; verifying and uploading data from scientific graphs/tables to PrIMe is implemented for chemical molecular structures of compounds. The outcome of using this system by combustion researchers at King Abdullah University of Science and Technology (KAUST) Clean Combustion Research Center and its collaborating partners indicated a significant improvement in efficiency in terms of speed of chemical kinetics and accuracy in searching for the right chemical kinetic data. Keywords: CloudFlame, cyberinfrastructure, simulation, modeling, database, kinetics, combustion. P277 Comprehensive Credit Evaluation Model of Electricity Customer Based on the Changing Trend of Credit Authors: Wenyong Du, Cheng Zhou, Bin Zheng, Chao Gao, Weiwei Kong, Sitong Cao Abstract. In order to solve the credit quantification and scoring problem, this paper did some research on credit evaluation model of electricity customers. The credit was divided into 5 first-grade indicators and 15 second-grade indicators. The paper quantified these indicators and evaluated their weights by utilizing Analytic Hierarchy Process model. The indicators were scored by utilizing exponential scoring. According to the weight and scores of each indicator, we calculated the month credit values of the last 12 months. Through these month credit values and their changing trend, the comprehensive credit was calculated. We used a customer sample data to verify and analyze the model. The experimental result shows that the model can evaluate credit indicators reasonably and effectively. Thus, the credit quantification and scoring problem is solved. Keywords: credit evaluation; credit scoring; Analytic Hierarchy Process; exponential scoring; changing trend of credit P278 A Median Filtering Algorithm Based on Selected Point in Digital Image Authors: Yan Liang, Yan Gao Abstract. In this paper an algorithm of median filtering based on selected point is introduced, and it improved the obscured phenomenon of the median filtering image. The algorithm based on the notion of pixel tags, find the contaminated pixels in the sub-image area. And median filter the pixels only. Experimental results show that the effect of the filtered image is ideal, and it has the advantages of faster processing and little damage on the image. Keywords: median filtering; Selected Point; Image Process P286 Arc-length Constraint-Based Surface Deformation Using Energy- Minimum Optimization Authors: Huanyu YANG, Kuangrong HAO, Yongsheng DING Abstract. Deformation of 3D objects is an important problem in many application domains, such as geometric modeling, computer graphics and computer-aided design. In this paper, we propose a method for deformation of 3D objects with arc-length constraints. We convert the curve into the polyline. Then we build the energy function of the polyline. Based on the minimum energy curve method, the curve on the mesh is deformed with arc-length constraints and multi-points constraints. The test results show that the proposed method has good performance. Compared to the other method, shape preserving of the curve is better. Finally, we use this method for the deformation of the 3D mannequin model. The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Keywords: component; Arc-length constraints, Deformation of 3D objects, Energy-Minimum Optimization P287 System Reliability-Aware Energy Optimization for Network-on-Chip with Voltage-Frequency Islands Authors: Jianxian Zhang,Duan Zhou, Yintang Yang Abstract. In this paper, a novel energy optimization algorithm for Network-on-Chip (NoC) based on voltage-frequency islands (VFIs) is proposed under the system reliability constraints. The proposed algorithm mainly includes the three processes of VFI partitioning, assignment and task mapping to reduce the energy consumption. A system reliability-aware mapping algorithm is proposed which employs a hybrid algorithm based on quantum-behaved particle swarm optimization and multi-neighborhood simulated annealing strategy. The optimum particles upon QPSO are further optimized by annealing operation mentioned above. Besides, the catastrophic operation is executed to enlarge the search scope and avoid getting into the local optimum. It minimizes the communication energy consumption of NoC system on the condition of meeting system reliability constraints. Experimental results show that the proposed algorithm is quite effective in optimizing energy consumption of NoC with voltage-frequency islands under system reliability constraints. Keywords: Network-on-Chip; Voltage-frequency Islands; System Reliability; Mapping P288 Energy-Efficient Task Allocation for VFI-based Real-Time Multi-Core Systems Authors: Xiaodong Wu, Jian-jun Han Abstract. Chip Multiprocessor (CMP) has become computing engine for a wide spectrum of applications due to its higher throughput and better energy efficiency. The problem of optimal task-to-core allocation with the minimum energy consumption has been proven to be NP-hard. In order to solve the energy-efficient real-time task mapping in the voltage-frequency islands (VFI) based multicore system, we propose a heuristics EEGA (Energy-Efficient and Genetic Algorithm) to address the problem. During the iteration process of the algorithm, the energy consumption of the processor can be gradually optimized by the selection, crossover and mutation operators. Experimental results show that when compared with other energy-efficient mapping algorithms, our proposed approach can gain better performance with regard to the energy efficiency and schedulability ratio. Keywords: energy-efficient; multi-core, voltage-frequency island; real-time system; task allocation; dynamic voltage and frequency scaling P289 Performance Comparisons of Evolutionary Algorithms for Walking Gait Optimization Authors: Chaohong CAI, Hong JIANG Abstract. To investigate the performance of different evolutionary algorithms on walking gait optimization, we designed an optimization framework. There are four bio-inspired methods in the framework, which include Genetic Algorithm (GA), Covariance Matrix Adaption Evolution Strategy (CMA-ES), Particle Swarm Optimization (PSO) and Differential Evolution (DE). In the learning process of each method, we employed three learning tasks to optimize the walking gait, which are aiming at generating a gait with higher speed, stability and flexibility respectively. We analysed the gaits optimized by each four method separately. According to the comparison of these results, it indicates that DE performs better than the other three algorithms. The comparison also shows that the gaits learned by CMA-ES and PSO are acceptable, but there exist drawbacks compared to DE. And The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 among these methods, GA presents weak performance on gait optimization. Keywords: CMA-ES, PSO, DE, Humanoid Robotics, Gait Optimization P291 Intelligent optimization on power values for inverse distance weighting Authors: LI Zhang-lin, GAO Jian-ying Abstract. As a typical spatial interpolation method in geoscience and geographic data processing, inverse distance weighting (IDW) method has a long-time standing problem which is how to choose the best power value while calculating. For the issue, this text proposes an alternative way based on enumeration and cross validation. By orderly analyzing and estimating the effectiveness of every possible power value through cross-validation, this method can intelligently find the proper power value. Additionally, a practical application procedure with a real dataset by the proposed method is carried out as a typical case study, from which the calculation result is obviously superior to conventional method. Thus, it is not difficult to conclude that both theoretical analysis and practical application can show the validity and practicability of the proposed method. Keywords: Inverse distance weighting; Power value; Spatial interpolation; Reserve estimation P292 Super-Resolution Employing an Efficient Nonlocal Prior Authors: Shuai Chen, Bin Chen, Yide He Abstract. In this paper, we propose a novel approach for multiframe super-resolution reconstruction by incorporating non-local prior in the maximum a posteriori (MAP) formulation. This prior expresses that recovered images tend to exhibit repetitive structures. Due to the enormous amount of weight calculations, the original non-local prior algorithm has a high computational cost. Techniques of weight symmetry, moving averaging filter, limited search window are adopted to speed up non-local filter. Meanwhile, Non-Linear Conjugated Gradient (NLCG) method is used to solve simultaneously the high-resolution (HR) image of optimization process and non-local prior adapted to the HR image. Experimental results on extensive synthetic and realistic images demonstrate the superiority of the proposed algorithm to representative algorithms both quantitatively and qualitatively. Keywords: non-local prior; non-local means; moving average filter; non-linear conjugated gradient; MAP; super-resolution P293 A new subpixel imaging method for image super resolution Authors: Jihong Wang, Zuofeng Zhou, Jian Zhang, Jianzhong Cao, Qingquan Wu, Xinming Fan, Zhendong Gong, Bing Zhao Abstract. The subpixel imaging technique for image super resolution can get a higher resolution image from two low resolution images which are observed from two linear array CCDs staggered half pixel both along the flight direction and perpendicular direction. In this paper, an adaptive weight interpolation method which considers the Euclidean distance information from two low resolution images for different size interpolation window is proposed. Compared with the traditional interpolation method, the experiment results show the effectiveness of the proposed method. Keywords: subpixel imaging, weighted interpolation, super resolution P295 An algorithm for Delay-Reliability in communication networks based on probabilistic user equilibrium model Authors: Zhao Liu, Ning Huang, Dongpeng Li The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Abstract. In order to make a better performance analysis and reliability evaluation of communication networks, a new definition of Delay-Reliability in communication networks, an algorithm to calculate approximate solutions of the Delay-Reliability in communication networks, and a delay failure model in communication networks are presented in this paper. Inspired by the road resistance function in transportation networks, we analyze similarities and differences between communication networks and transportation networks, and use OPNET simulation to build a new delay failure model in communication networks. Based on probabilistic user equilibrium model and our delay failure model, in stochastic-flow networks, we use discrete random variables to characterize delay in a single link and the link’s degraded conditions to propose a new definition of Delay-Reliability in communication networks and its corresponding approximate algorithm. The approximate algorithm is especially useful and practical in large scale backbone network engineering due to its major computational advantage. For illustration, an example is given to show that our definition, algorithm and delay failure model can make a reasonable performance analysis and reliability evaluation of communication networks. Keywords: delay; reliability; performance analysis; stochastic-flow network; probabilistic user equilibrium; OPNET P300 Quality Evaluation for Anxi Tieguanyin Tea Based on Electronic Nose and PCA-LDA Method Authors: Hongxiu Liu, Dehan Luo, Fufang Li, Guowen Xie Abstract. Tea is conventionally tested by human sensory panel called Tea Tasters, who assign quality scores to different tea samples. This paper reports a method of the reliable measurement and correct classification of Anxi Tieguanyin tea in Fujian province based on a kind of electronic nose (E-nose):PEN3(Portable Electronic Nose Version 3.0). With the help of the E-nose, we analyze various grades of different kinds of tea samples by using the popular method of separation, like PCA and LDA. Experiments show that the method proposed in this paper has outstanding performance and high efficiency. Keywords: Electronic Nose; Tieguanyin Tea; Tea Quality Evaluation; PCA; LDA P302 A new method of optimization based on arc search Authors: Xin Pan, Weikun Sun Abstract. In order to efficiently solve the unconstrained optimization problem in which the objective function is very nonlinear, an innovative framework of optimization which is different from line search framework is proposed in this paper. This new method determines the step-length first with nonmonotone line search technique, and generates a two dimensional subspace spanned by the steepest-descent direction and an auxiliary vector. In this subspace, a circle with the current point as its center and with step-length as it radius is constructed. On this circle, the minimizer of the objective function as the next iterative point can be calculated with arc search, and the search direction can be generated with the minimizer and the current point. The variation of gradient of the objective function in the search direction is used for determining the step-length of the next step. The global convergence of this new algorithm is proved in this paper under some mild assumptions. Numerical tests illustrate that this new algorithm is more efficient than conjugate gradient direction. The arc search improves the efficiency of the iterative process. This new algorithm requires only the storage of three vectors such that it is suitable for large scale problems. Keywords: optimization; large scale problems; nonmonotone line search; arc search The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 P303 Analysis on the Impact of Cloud Computing for Management Information System Authors: Xiaojing Wang Abstract. First of all, the concept of cloud computing and the present situation of management information system are to be introduced. This is followed by an analysis of the impact of cloud computing on MIS from the MIS development, operation and maintenance, as well as data security aspects. The conclusion was that MIS development mode comprised of mashup, development methodology oriented workflow, operation and maintenance is simple, service-oriented with on-demand billing, resource cost minimalised, data security constrained. This paper can guide enterprises to carry out MIS strategy planning and construction in the cloud, improving the efficiency of MIS development and the probability of success, so as to enhance the core competitiveness of enterprises. Keywords: Management Information System, Cloud Computing, Mashup, Oriented Workflow, Data Security P305 Storage Space Reclaim Based on cluster Bitmap in the New Technology File System Authors: Chanying Qi, Zhanhuai Li, Xiao Zhang, Huifeng Wang Abstract. Thin provisioning is widely used to improve the utilization ratio of storage space in the storage area network (SAN) environment. However, most of file systems only use the logical volume offered by iSCSI protocol and does not support automatic reclaiming the space of thin provisioning. The most major problem is that block-level storage device is difficult to perceive the release behavior of the host application storage space. In order to solve the problem, we implement thin provisioning iSCSI storage service system (ThinPro iSCSI Server) to reclaim the space in the NTFS file system. By analyzing the chart structure about cluster bitmap, the prototype can identify the released space in the NTFS file system automatically and efficiently. It uses flexible reclaim strategy to improve the performing in the reclaim process, which can alleviate the influence of extra I/Os. By confirming the data consistency before reclaiming the free space, it can avoid the data inconsistent problem and make the method practically and robustly. Empirical results show that the method can delay the time of the capacity warning and reclaim free space effectively. Moreover, it can improve the utilization rate of storage greatly. Keywords: thin-provisioning; SAN; reclaiming storage; NTFS file system; coherence P307 A Method of Computing Iceberg Cube Based on Non-antimonotonic Constraint Authors: Yuntian Feng, Hongjun Zhang ,Wenning Hao, Gang Chen Abstract. To compute iceberg cube based on non-antimonotonic constraint, we propose a modified Star-Cubing method by means of converting constraint by top-k. It uses a method of top-k to convert a constraint to an antimonotonic constraint and carries out the star-reduction in the base cuboid table, thus reduces the cost of the shared dimension pruning in Star-Cubing. Experimental results show that the method could compute iceberg cube based on non-antimonotonic constraint availably and improve the efficiency of computation method at the same time. Keywords: top-k; Star-Cubing; star-reduction; shared dimension pruning P309 Improvement of the data mining algorithm of Rough set under the framework of Map/Reduce Authors: Wang Ying, Liu Ji-qing, Liu Qiong The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Abstract. In order to solve the problem that there is shortage of space and computing power of the traditional spatial data mining algorithm during the processing for massive spatial data information, a combination of Rough set and distributed framework is used in the processing of spatial data mining. In this paper, parallel improvement is taken to the algorithm of traditional Rough set for spatial data mining based on the basic theory of rough set and the Map/Reduce framework, which is efficient and cheap. Then, a spatial data example is utilized to show the feasibility of the improved parallel algorithm. Empirical results show that the improved parallel algorithm of Rough set for spatial data mining can not only effectively improve the efficiency of the algorithm but also meet the need of people to deal with massive spatial data which is hardly to the algorithm of traditional Rough set. Improved Rough set parallel algorithm for spatial data mining can effectively solve the problem of shortage for massive spatial data storage and computing power mining. Keywords: Spatial data mining;Rough Set;Map/Reduce;Parallelization P314 C# blueprint Action Pattern Authors: Peng Gao, Jianbin Liu Abstract. Software pattern is the solution of some fixed issues in software development. And it improves the development efficiency. This paper raised the concept of C# blueprint pattern based on a wealth of program model examples. And the formalized definition framework of C# blueprint action pattern is summed up. The framework defines the rules of structure, semantics and so on. At last, examples are raised to explain the C# blueprint action pattern. The raise of C# blueprint provides rapid solutions to C# program modeling and improves the development and maintains efficiency of C# program. Keywords: C# blueprint; action mode; abstract syntax; MDA; formal framework P316 Research on Digital Museum of Yunnan ethnic minorities’ resources based on Network Authors: Jun Wang, Rong-kan Fan, Jian-hou Gan Abstract. [Purpose] In order to solve the problem that Yunnan ethnic minorities’ resources don’t obtain good publicity because of some restrictions such as time and geographical region. [Method] This paper puts forward an efficient technique of comprehensive application of current three kinds of main development technology to establish digital museum of Yunnan ethnic minorities’ resources, including multimedia database, website, 3D object display system and virtual showroom.[Results] We established multimedia database of Yunnan ethnic minorities’ resources, digital museum website of Yunnan ethnic minorities’ resources, and 3D object display prototype system of Yunnan ethnic minorities’ resources. It is especially significant to establish Digital Museum of Yunnan ethnic minorities’ resources based on network for the protection and wide spread of Yunnan ethnic minorities’ resources. Keywords: component; network; ethnic minorities’ resources; digital museum P319 On the Availability of Replicated Data Managed by Hierarchical Voting Authors: Yuuki Ueda, Hideharu Kojima, Tatsuhiro Tsuchiya Abstract. Cloud services often depend on a mechanism that provides a reliable data storage that is resilient to failures. Majority voting and hierarchical voting, an extension of majority voting, are both used to implement such a mechanism in an unreliable network. For example, Apache ZooKeeper adopts both of the two methods. This work considers the question whether or not hierarchical voting The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 with two levels indeed improves data availability compared to majority voting. The simulation results obtained so far suggest that hierarchical voting is unlikely to increase data availability. Keywords: replication; majority voting; hierarchical voting; split-brain problem P320 Research on Optimum Model for the Best Link of Expert System Authors: Chen Guo, Jia-man Ma, Yue-fan Liu Abstract. According to the observation of known facts, researcher finds all performances which are conform to the observation of cognitive to associate with form knowledge base, and then build an initial network model. Based on this model, we complete the mutual uncertainty constraint by using the new achieve probability and effect probability between evidences and adjacent nodes. And on this basis, using the drive method which satisfied competition threshold, keeping reasoning to the high level, until find an object conclusion meets the expectation. The confirming result makes the best assuming evidence become the centre of focus from competition. It decides the orientation of evidence which is priority to be chosen, and give a high efficiency solution for choosing deterministic target by rapid positioning and accurate selection. Keywords: expert system; uncertainty; the best link P321 Research on the Evidence Optimization Method Based on the Expert System Authors: Chen Guo, Ming Huang, Xu Liang Abstract. The research purpose of this paper is hope to quick select the evidence center, which satisfied the object conclusion, from many uncertain observational evidences, effective position and rapid inference. So in the process of first sampling, need to establish the sample center. This paper established 4 collections of records, using the threshold algorithm based on competition to reason and refine layer by layer, exclude the uncertainty disturbances, and find the optimal link existed in optimal state. The optimal link determined the selection center of evidence reasoning object, provided the core of evidence for subsequent optimization, achieved the objective of rapid position and accurate inference. Keywords: expert system; evidence optimization; uncertainty; optimized link P322 Differential Evolution with Clustering Cooperative Coevolution for high-dimensional problems Authors: Shuzhen Wan Abstract. Evolutionary algorithms has been applied successfully to many optimization problems in recent years. However, their performance will deteriorate when applied to complex high-dimensional problems. A clustering-cooperative coevolution scheme was introduced into DE algorithm to tackle the high-dimensional problems. In the scheme, the clustering method has been employed to decompose the problem, which works well with the cooperative coevolution. The proposed algorithm is evaluated by MPB and CEC09 benchmark functions with expanded dimension. The results show clearly that our proposed algorithm is effective and efficient for dynamic high-dimensional optimization problems. Keywords: Differential Evolution; clustering cooperative coevolution; high-dimensional optimization problem P323 Educational Geographic Information System Based on WebGIS Authors: Mingyi Duan, Yajun Yang, Haibo Yang, Fang Zhao The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Abstract. Educational GIS (EDUGIS) based on Web is an important part of educational modernization construction. In order to visually display and dynamically query the educational geographic information, and give statistical analysis for educational spatial information and educational resource, in this paper, the framework and functional structure of EDUGIS is designed based on MapServer, an open source WebGIS platform. After the analysis of the organization structure of Ajax technology, by combining the framework of open source platform MapServer and open-source database PostGIS/PostgreSQL software, EDUGIS based on Web is realized. The research results show that the EDUGIS is effective and useful for providing a timely, scientific and effective decision-making support for educational body and education sector. Keywords: WebGIS; Educational Geographic Information System; Ajax P327 Cloud Model: Detect Unsupervised Communities in Social Tagging Networks Authors: Hongbo Gao, Jing Jiang, Li Zhang, Deyi Li Abstract. In the big data era, detecting unsupervised communities in a given dataset, analyzing the evolution of the unsupervised communities, tracing the interests of users is very important. For instance, we can capture user’s interest and provide him the personalized information. In order to detect unsupervised communities in social tagging networks, this paper use similarity cloud properties of cloud model to solve the different community analysis, classification, and describe the evolutions of unsupervised communities quantitatively and users’ dynamic interests in unsupervised communities problems. Cloud model is used in this paper. By introducing similarity cloud properties of cloud model, cloud model can detect the unsupervised unsupervised communities, describe the evolutions of unsupervised communities quantitatively, and users’ dynamic interests in unsupervised communities. For illustration, the proposed model is applied to Del.icio.us dataset to detect unsupervised communities and one month is used as time slice to study the evolutions of the unsupervised communities. Empirical results show that unsupervised community in social tagging in network, using Similarity cloud properties of cloud model can effectively detect different unsupervised communities, and describe the evolutions of unsupervised communities quantitatively. Similarity cloud properties based cloud model can effectively detect unsupervised community in social tagging network, and quantitatively describe the evolutions of the community and community user’ dynamic interest. Hence, CBUCD model is an efficient solution for detecting unsupervised community and analyzing evolutions. Keywords: Cloud Model; Social Tagging; Unsupervised Community; Social Network. P328 Image Zooming Method with Hierarchical Structure Authors: Xiao Yi-han, Pang Yong-jie, Zhao Lan-fei Abstract. Since the enlarged images which were calculated by traditional linear interpolation and nonlinear algorithms are disturbed by blur and fuzzy edge, this paper proposes a new image zooming algorithm with hierarchical structure. It employed the retinex model to decompose image into low frequency layer and high frequency layer. The mirror signals which were introduced by up-sampling course were filtered by low pass filter to reconstruct the low frequency layer. The heat equation was adopted to reconstruct the high frequency layer with edge-preserving ability. The zooming images were obtained by merging layers at last. Experimental results show that this algorithm improves the defects of linear interpolation and nonlinear algorithms, the generated images via our algorithm possess preferable visual effect. Keywords: image zooming; linear interpolation; retinex; the heat equation The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 P331 Study on Virtual Assembly System Based on Kinect Somatosensory Interaction Authors: Hongjian Liao, XiaoLi Long Abstract. To improve the efficiency of interaction and user experience in desktop-based Virtual Assembly System (VAS), this paper proposed to establish low-cost but strong immerse virtual assembly experiment system using Kinect and Unity3D engine. For the purpose of employing body motion, gesture and voice to accomplish interaction tasks, establishing assembly model data, hand gesture recognition and changing virtual assembly scene view by body motion were three key issues, so “treelike hierarchy modeling”, “gesture semantics extension” and “multidimensional head tracking” methods were proposed accordingly, and the implementation process was discussed. A Speed Reducer Virtual Assembly System (SRVAS) was designed and realized by these methods, and practical results show that the method of gesture recognition has a good accuracy and robustness, and is almost unaffected by light and complex background. Kinect somatosensory interaction can improve interaction efficiency and enhance user immersion with low-cost in 3D virtual system. Keywords: somatosensory interaction; Kinect; virtual assembly system; gesture recognition; user experience P333 Mining Spam Accounts with User Influence Authors: Kan Chen, Peidong Zhu, Yueshan Xiong Abstract. As the increasing development of online social networks (OSNs), spammers’ attentions have been attracted from the traditional email field. Nowadays, advertisements, deception messages, illegal contents are prevalent in all kinds of ONSs. They’re propagated from one to another arbitrarily, polluting the Internet environment, and what’s more, resulting in a great many of security problems. Some previous works have been proposed to detect spammers according to user properties. The problem is that in order to prevent from being detected, spammers are likely to pretend to be normal, and what’s more, some normal users also engage into spam spreading for financial benefits, making detection more difficult. In this paper, we solve the detection problem from the view of user influence. The basic of our work is that since spammers pretend to be normal, their influences should keep step with their normal behaviors. But when a spam campaign is launched, usually in order to influent others, a great many of spammers engaged into propagation, the original poster’s influence would get a sudden increase, making him outstanding from the others. In this way, we can distinguish the original spammers and supervise from the root of the propagation tree. Our work is experimented on real data gathered from Weibo and shows inspiring results. Keywords: spam detection; user influence; online social network P334 Factors Affecting Small and Medium-Sized Enterprise’s Information Technology Absorptive Capability: An Empirical Study of Jilin Province in China Authors: Lei Wang, Xinhua Bi, Yue Cao, Meiling Gu Abstract. [Purpose] In order to find out the key factors affecting the Information Technology (IT) absorptive capability of Small and Medium-sized Enterprises (SMEs), an empirical study is conducted in this paper. [Method] Based on the three-dimensional structure and the influence model of IT absorptive capability proposed by Cuiling Yu, and combined with the characteristics of SMEs, this paper proposes a new model of influence factors, and meanwhile makes an empirical study on the SMEs in Jilin province. [Results] Empirical results shows that IT consulting, IT infrastructure and The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 government support have significantly impacts on the three-dimension of SMEs’ IT absorptive capability. [Conclusions] On the one hand, the paper reveals how the regions and industries as control variables influence the IT absorptive capacity of SMEs; on the other hand, the paper reveals that IT consulting has a special effect on IT absorptive capacity of SMEs. Keywords: information technolgoy; big data; absorptive capability; small and medium-sized enterprise; influential factors P335 A Cloud-based Platform for Watching Same Content on Three-Screen TV Continuously in Smart Home Authors: Ehsan Ahvar, Gyu Myoung Lee and Noel Crespi Abstract. Watching Same Content on Three-Screen TV Continuously (WSC3STVC) has been considered as one of the representative services in smart homes recently. This service offers content mobility among multiple kinds of screens based on user position in home. Quality of Experience (QoE) and service implementation cost are two important challenges for supporting WSC3STVC service. To the best of our knowledge, there is no visible attempt to design a comprehensive platform for supporting this service in smart homes. Benefiting from cloud computing, peer-to-peer (P2P) network, clustering and H.264 SVC transcoding, this paper proposes a QoE-aware and cost-effective platform for supporting WSC3STVC service in smart home. The strong points of the proposed platform are transcoding in cloud instead of Home GateWay (HGW) for decreasing HGW cost, content switching inside HGW for reducing service delay, using a cloud-managed P2P network for improving bandwidth between cloud and homes and also clustering homes for reducing transfer delay between homes. Keywords: cloud-based; smart home; three screen TV P336 Design of the Multi-level Inventory Control Model and Solution algorithm for the Spare Parts Authors: CAO Yu, WANG Tiening, XU Shengliang, ZHU Yu Abstract. The inventory control model based on the multi-objective programming of the spare parts is set up. The algorithm of particle swarm optimization (PSO) is designed and improved to solve the inventory control multi-objective programming model. Aiming at the question of the particle deviates from the solution space and the prematurity problem in the searching course, the regain mechanism and interference mechanism are build up to improve the classical PSO, and the switching mechanism from the Cartesian space to the discrete space of inventory control model is established, and then the optimized solution algorithm based on the improved PSO is presented. At last, the simulation experiments of inventory control are made to validate the multi-objective programming model. It lays the foundation for design and realization of simulation and optimization of the spare parts inventory control. Keywords: inventory control; the spare part; Multi-objective Programming; Particle Swarm Optimization P338 A research of massive distributed high voltage electrical online monitoring data management platform based on cloud storage Authors: Du Wenzhao, Zhao Linan Abstract. High voltage electrical online monitoring can make us easily to get operating data of the high-voltage electrical equipment in real time. And it is important to analyze these monitoring data, because the result of the analysis can help us to know the healthy status of these devices, especially The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 prompt us to concern the possible failures. Thus it is necessary to manage these monitoring data in a proper way. In this research the authors analyzed the characteristic of the monitoring data and needs of the monitoring data management. Based on the analysis the authors proposed to achieve the efficient management of the massive distributed line monitoring data through the cloud storage platform. And the cloud store platform is a three-tier architecture, the bottom is the substation level which is used to storge the data of the substation, and the middle is the regional level which is used to storage the data of all the region, the top is the grid level, which is used to manage all monitoring data. Keywords: component; high-voltage electrical; online monitoring data; cloud storage P340 The universal approximation capabilities of 2pi-periodic approximate identity neural networks Authors: Saeed Panahian Fard, Zarita Zainuddin Abstract. A fundamental theoretical aspect of artificial neural networks is related to the investigation of the universal approximation capability of a new type of a three-layer feedforward neural networks. In this study, we present four theorems concerning the universal approximation capabilities of a three-layer feedforward 2pi-periodic approximate identity neural networks. Using 2pi-periodic approximate identity, we prove two theorems which show the universal approximation capability of a threelayer feedforward 2pi-periodic approximate identity neural networks in the space of continuous 2pi-periodic functions. The proofs of these theorems are based on the convolution linear operators and the theory of _-net. Using 2pi-periodic approximate identity again, we also prove another two theorems which show the universal approximation capability of these networks in the space of pth-order Lebesgue integrable 2pi-periodic functions. Keywords: 2pi-periodic approximate identity, 2pi-periodic approximate identity neural networks, continuous 2pi-periodic functions, pth-order Lebesgue integrable 2pi-periodic functions, Universal approximation, Generalized Minkowski inequality. P341 A Kind of Quadratic System Decoupling Method Based on Similar Transformation Solution Authors: Wang Shujuan, Shen Jihong, Zhou Ying, Wang Chen Abstract. The structure preserving decoupling method for quadratic system is proposed based on similar transformation in this paper. Firstly, the problem to find two decoupling transformation is converted to the problem to find one similar transformation. Secondly, the coefficient matrices of decoupled system are identified according to the spectral information of original system. At last, based on theoretical derivation the similar transformations are given by solving linear singular equation numerically. The numerical experiments show feasibility of the method, and this paper shows a new point for quadratic system decoupling researches. Keywords: quadratic system; Lancaster structure; structure preserving; system decoupling; Kronecker product P342 Fuzzy logic-based fault diagnosis of simply supported bridge using modal frequency as input variable Authors: Yongchun Cheng, Hongbin Guo, Xianqiang Wang, Yubo Jiao Abstract. Fault diagnosis of bridge is critical to guarantee the safe operation of structure. A fuzzy logic-based damage detection method is proposed in this paper to identify the single and multiple damages of bridge. Modal frequency is adopted as input parameter, while the damage severity is output one. Gauss and Bell functions are used as membership functions for input and output parameters, The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 respectively. The fuzzy rule base is established according to suitable acquisition method. Numerical simulation for a simply supported bridge is used to verify the feasibility of the proposed method. The results reveal that the established fuzzy system possesses favorable memory, inference and anti-noise abilities. Its antinoise level is favorable. The fuzzy logic method is feasible for fault diagnosis of bridge structure with single and multiple damaged locations under noise effect. Keywords: simply supported bridge; fault diagnosis; fuzzy logic; numerical simulation P347 Research of Clustering Algorithm based on Information Entropy and Frequency Sensitive Discrepancy Metric in Anomaly Detection Authors: LI Han, WU Qiuxin Abstract. Anomaly detection is a method to detect intrusion behaviors including system or users’ non-normal behavior and unauthorized use of computer resources. Clustering analysis is an unsupervised method to group data set into multiple clusters. Using clustering algorithm to detect anomaly behavior has good scalability and adaptability. This paper mainly focuses on improving k-means clustering algorithm, and uses it to detect the abnormal records. Our goal is to increase the DR value and decrease the FAR value in anomaly detection by calculating appropriate value of parameters and improving the clustering algorithm. In our IE&FSDM algorithm, the initial cluster centers can be calculated by the minimum standard information entropy of records. In testing phase, discrepancy metric is introduced to help calculate exact number of clusters in testing data set. Using the results of initial cluster centers calculated in the pre-phase, IE&FSDM compute the actual clusters by converging cluster centers and obtains the actual cluster centers according to the frequency sensitive discrepancy metric. Then comply with the improved k-means algorithm, iterative calculate until divide all network records into different clusters, and then the normal and abnormal behaviors are classified. Experiment based on KDD CUP1999 dataset is implemented to test the performance of IE&FSDM algorithm. Results show that IE&FSDM has a higher detection rate and a lower false alarm rate, and achieves the expectant goal. Keywords: k-menas; Clustering Analysis; Anomaly Detection; Information Entropy; Discrepancy Metric P349 Research and Implementation of data collection protocol for wireless sensor networks Authors: Xongke Xu, Xiaohong Wang, Mingqiang Song, Teng Feng, Liang Dai, Xiangjun He Abstract: Wireless Sensor Network is a new self-organization and multi-hop network which deploys a lot of nodes communicating with each other wirelessly, so the design of a appropriate routing protocol for wireless sensor networks is essential. In this script, the performances of many classical route strategies are introduced and analyzed. In order to test the LEACH and LEACH-C algorithm’s performance, the NS2 (Network Simulator Version 2) is used to realize the simulation of the LEACH and LEACH-C algorithm in three different scenarios and analyze the results from three angles. The result shows that, in condition that the SINK node is not far from the deployed sensors, no matter the nodes are randomly deployed or deployed in linear, LEACH-C performs much better than LEACH. In the opposite condition, LEACH will perform better than LEACH-C except in the data throughput. Keywords: wireless sensor network; routing protocol; LEACH; LEACH-C; NS2 P350 Research and design of the clock synchronization for the bridge health monitoring system based on Wireless Sensor Network The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Authors: Hongke Xu, Mingqiang Song, Xiaohong Wang , JiaYu Yang, Enmao Quan Abstract. This paper constructs a bridge health monitoring system based on Wireless Sensor Network. In order to detect and obtain the bridge’s status information, we have studied the clock synchronization problem between the sensor nodes in wireless sensor network of the bridge health monitoring system. The clock synchronization simulation verifies the design of asymmetrical clock synchronization algorithm in the wireless sensor of the bridge health monitoring system is valid and reliable. The simulation results show that this clock synchronization algorithm can realize the clock synchronization and be able to monitor real-time bridge conditions. Keywords: bridge health monitoring system;wireless sensor network (WSN);asymmetric type of adaptive algorithm; the clock synchronization algorithm P351 Cluster Analysis on the Flow Velocity for the Sea Route Monitoring Authors: Yanling Zhang , Shujuan Wang, Xiaodong Peng , Zhiqiang He, Chunjiang Zhang, Wei Huangfu Abstract. Due to the importance of the marine resources, the limited sea routes are valuable to the marine transportation. With sensors deployed under the sea, the data of flow velocity are obtained via wireless communications. Based on the real historical data collected from Qinhuangdao port, which is one of the most important ports in the North China, the rules is attempted to be revealed with the data mining methods. By cluster analysis on the historical data, we classifies the days into P-days and F-days. In different kinds of days, the characteristics of the flow velocity under the water are different. It is a novel analysis of the data for the sea route monitoring. Although it is only a preliminary exploration in this field, the results is helpful to the safety and efficiently scheduling of the sea routes. Keywords: flow velocity, cluster analysis, change rules, voyagers’ sailing P352 Optimal Constellation Mapping for Pulse Amplitude Modulation Based Vertical Physical-Layer Network Coding Authors: Youyun Xu, Fengyue Gao, Kui Xu, Jianfeng Zhang Abstract. This paper discusses the denoise-and-forward (DNF) problem in two-way relay channel (TWRC). A pulse amplitude modulation (PAM) based vertical physical-layer network coding (VPNC) scheme is proposed and the optimal constellation mapping is studied to minimize the bit error rate (BER) and symbol error rate (SER) performance. Compared with the existing PNC scheme in which the relay superimposes two users’ signals of the same constellation, two users in the proposed VPNC scheme transmit PAM signals with vertical constellation and the relay superimposes two signals of vertical constellation. The closedform BER and SER expressions of the proposed VPNC scheme are also derived in this paper. Simulation results agree well with the theoretical analyses. Meanwhile, simulation results show that the proposed VPNC scheme outperforms the conventional PNC scheme on the SER and BER performance and optimal constellation mapping can obtain a about 1dB performance gain. Keyword: Physical-layer network coding; denoise-andforward; two-way relay channel; vertical constellation mapping. P354 Research on XML keyword query method based on semantic Authors: Guofeng Zhao, Shan Tian The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 Abstract. In this paper, we study the problem of effective keyword search over XML documents, Keyword search for smallest lowest common ancestor(SLCA) in XML data has recently been proposed as a meaningful way to identify interesting data nodes in XML data where their subtrees contain an input set of keywords. XML retrieval technology has been concerned widely by information retrieval researchers. XML data contains rich semantic information, but most of query methods can’t make full use of the semantic information. There will be missed case if there is no enough semantic information. This paper proposed a new XML keyword query algorithm based on semantic(SKSA) to solve the question above. The algorithm takes full use of the node semantic information based on structural semantic. The same or similar results will be returned to users if there is no the keyword in XML document, which avoids the missed case. The test experiment result on the real XML data sets shows that SKSA has higher recall rate, and can match the user’s query intention better. Keywords: XML; keyword search; semantic; synonyms; WordNet P357 Preserving Social Network Privacy Using Edge Vector Perturbation Authors: Lihui LAN, Lijun TIAN Abstract. Social network applications have become popular. The researchers can benefit through social network analysis, but it raises serious privacy concerns for the individual involved in social network. Some techniques have been proposed for protecting personal privacy. However, the existing methods tend to focus on un-weighted social network for anonymizing nodes and structure information or weighted social networks for annoymizing edge weight. We propose an edge vector perturbation method to preserve structural properties and edge weights for weighted social networks. First, we construct edge vector or edge space of the original weighted social network. Second, we calculate edge betweenness and assign weights to elements in edge vector. Third, we construct release candidate set by the weighted Euclidean distance. We leverage the notions of edge vector and edge space in S weighted social network. Given a social network G , we adopt two methods to build original edge vector E _ Vec (G ) . Select from some edge vectors from ( K n ) as publication candidate set of S S E _ Vec (G ) . To ensure effectiveness of the released dataset, we use Euclidean distance between the vectors as metrics of the similarity. We execute experiments on datasets to study publication utility and quality. Our method can be applied to a typical perturbation algorithm to achieve better preservation of the utility of its output. Keywords: social network; privacy preservation; edge vector; candidate set; Euclidean distance P359 A New Approach of Face Identification in Line Drawings Authors: Weikun Sun, Xin Pan Abstract: Face identification is the key step for reconstruction of a three dimensional object from a single two-dimensional line drawing depicting it. Many methods have been presented to solve this problem, and none of them considered the convexity of cycle polygon. In this paper we propose a new approach of face identification in line drawings, which combines together graph theory and convex property of polygons. With considering the convexity, we can overcome the difficulty of non-convex cycle polygons and our algorithm can deal with 3D solids of over 10,000 potential faces with efficiency. A couple of examples are provided in the end to show that our approach can handle some complex 3D reconstructions. Keywords: face identification; line drawing; graph theory; convexity The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 P362 Bigraph-based Modeling and Tracing for the Food Chain System Authors: Xue Li , Xiaoyuan Liu, Ying Zhao, Xiaodong Peng, Wei Huangfu, Zhongshan Zhang Abstract. Food chain is one of the most complex, dynamic and essential systems in the world. It is fundamental to reveal the characteristics and build the behavior model of such a huge system in order to keep the food chain safe, secure and efficient. A novel bigraph-based food chain model is introduced to express the various one-to-one, one-to-many and many-to-many relations in the food chains, which also offers a traceable capacity to seek both the mid procedures and the roots for food safety issues. The modeling and tracing for the food chain system are discussed then verified with an implementation including database storage and web service, which is implicational for the future applications in the traceable food chain systems. Keywords: food chain; bigraph; traceability; modeling; traceable food chain system. P363 A process-oriented ontology-based knowledge model Authors: Yanhong Zhao, Hongqi Li, Liping Zhu, Fengqi Tan and Ying Wang Abstract. With the rapid growth of knowledge resources, the production departments in the field of oil and gas exploration and development produce daily a great volume of result documents. Meanwhile, a large part of knowledge is stored in the experts’ brain as experience. How to spend less effort finding knowledge meeting users' need and how to make effective use of the expertise to avoid knowledge loss become more and more important. This paper adopts a knowledge model which is composed by process model and ontology model in the subject of Well Site Deployment. In this knowledge model, the process model provides the detailed operation flow and data flow, the ontology model provides the evaluating standards and the operating standards. We build a web-based knowledge service platform based on this knowledge model, through which knowledge can be shared between experts and non-experts. Furthermore, users can reuse the knowledge and trace the existing work results of well site deployment and development by the platform. All of these can help the final users to improve the efficiency of decision making. Keywords: Knowledge service; Process model; Ontology; Knowledge model P364 The design and implementation of Knowledge Processing and Decision-making Model Based on Multi-class in Agricultural Expert System Authors: LIU Yi, XU Ke, SONG Junde, Xin Liao, ZHAO Yuwen Abstract. This paper introduces the current status of the knowledge processing and decision-making of expert system, and proposes a knowledge processing and decision-making model based on class-frames-production rules and case base in order to solve the problem of large quantity and many types of knowledge in agricultural expert system. We design the knowledge processing process and reasoning and decision-making process of the model. And finally we take the pests problem of Lu-cotton 11th as an example, introduce the work steps of the model, and verify the feasibility of the model. Keywords: knowledge processing;decision-making;agricultural expert system P365 An Environment Recognition Algorithm Based on Weighted Cloud Classifier Authors: Zhao Yang, Liu Hongya Abstract. Environment recognition is a necessary prerequisite for behavioral decision and intelligent The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 control of intelligent vehicle. In order to improve the surrounding environment recognition ability of intelligent vehicles, a weighted cloud classifier is constructed to recognize the content of image captured by vehicle camera. By researching the image texture characters, several cloud classifiers are trained based on first and second order statistical characteristics of texture to identify image content preliminarily. Then cloud models are combined with adaboost algorithm to construct a weighted cloud classifier. Experiment results show that through weight optimization, the weighted classifier can realize multi-target recognition, and achieve good results in the recognition of vehicle, road, lane line and other targets. The weighted cloud classifier will play an important role in improving the environment recognition and behavioral decision capacity of intelligent vehicle. Keywords: Recognition; Cloud model; Classifier; Weighted optimization P366 Games with connected player strategies for analyzing the competitiveness of a railroad company in a cargo transportation marketplace Authors: Alexander S. Belenky, Alexandra I. Yunusova Abstract. The competitiveness of a railroad company in a marketplace of cargo transportation in a region of a country is analyzed with the use of two mathematical models in the form of two-person games in which all the feasible player strategies are connected, i.e., cannot be chosen by the players independently, and the set of these connected strategies is a polyhedron described by a system of compatible linear inequalities. The first model is used to analyze the case in which the railroad company competes with all the other cargo carriers that offer their services in the region, for instance, with tracking companies, whereas the second model helps find potential profitable coalitions of the company with some of these carriers in an attempt to enlarge the company’s fair share of the market as much as possible on account of providing a “door-to-door” service for clients that need to move high volumes of cargo over long distances. Keywords: Coalitions, competitiveness, equilibrium, games, polyhedron, quadratic optimization problems, railroad company, transportation tariffs P369 Topological Analysis of a Complex Trust Network Authors: KUANG Xiangling, HUANG Guangqiu Abstract. In view of the problem that the current trust models only are simulated in a simple network or a small-scale network, ignoring the macroscopic properties of trusted network, a complex trust network is built by using complex network approach and some important topological properties of the network are quantitative analyzed from macrospector perspective. First a trust model is built with complex network approach, and then several topological properties, such as node degree, cumulative degree distribution, k- core, network clustering coefficient, network average path length, and betweenness are analyzed by using the actual large-scale network data. These properties indicate that the complex trust network is a small-world network with scale-free characteristic. At last the practical value of these indicators is analyzed. Keywords: complex network; trust network; topological properties P371 A Clustering-based QoS Prediction Approach for Web Service Selection Authors: Zhang Xuejie, Wang Zhijian, Lv Xin, Qi Rongzhi Abstract. With the increasing number of Web services, recommendation and selection of the optimal Web services has become one of the most important challenges in the service computing field. The The 2013 International Conference on Information Science and Cloud Computing 第三届信息科学与云计算国际学术会议 goal of consumers is to discover and use services which lead to them experiencing the highest quality. Existing approaches to quality evaluation mostly assume a consumer's primary goal as being optimization of performance, so that consumers are unable to effectively identify and engage with providers who deliver services that will best meet their needs. In order to solve this problem, we propose a clustering-based QoS prediction framework for Web services. In our framework, we employ the k-means clustering algorithm. We determinate the similarity between consumers based on their expectations. In terms of the relationship between their expectations and the rating of the services, we predict the rating of a service used to select desirable services. At last, the experiment shows that the approach achieves better prediction. Keywords: web service; QoS prediction; clustering; expectation P373 Study on e-commerce service supply chain coordination based on contract theory Authors: Fatao WANG Abstract. In order to solve e-tailing service integrator's go-ods and logistics service coordination problem, this paper designs a supply chain model which consists of a product supplier, an e-retailer and a logistics service provider. The purpose of this model is to analyze the effectiveness of three types of supply chain contracts within the e-commerce logistics service supply chain. This article will analyze wholesale price contracts, revenue sharing contracts and quantity flexibility contracts. The models under three types of contracts are constructed to analyze the optimal decisions. In addition, the article will explain why managers in the e-commerce industry should adopt these supply chain contract approaches to increase revenues. The models described in the study could be seamlessly utilized by e-retailers and logistics service providers to maximize their revenues and profits. The results show that this model can coordinate the e-commerce logistics service supply chain by adjusting contract parameters and improve the profits of the members. Keywords: service supply chain; e-commerce; modeling; coordination P380 A Data Compression Algorithm for the Sea Route Monitoring with Wireless Sensor Network Authors: Yang Li, Shanni Xi, Chunjiang Zhang, Wei Huangfu, Zhongshan Zhang Abstract. The wireless sensor network plays a significant role in monitoring the environment near the harbour in order to inform the ships nearby out of dangers and optimize the utilization of limited sea routes. Based on the historical data collected by the buoys with sensing capacities, a novel data compression algorithm named PCVQ is introduced to lower the budget of wireless communication subject to the constrains of data precision. The principal components of the sensing data are analysed. With such principal components and statistical of historical data, the optimal codebook is acquired by the technology of vector quantization. The on-line data are decomposed with the historical principal component coefficients, and then compressed according to the optimal codebook. The PCVQ algorithm is verified with the practical data in Qinhuangdao Port of China, which is a novel exploration in the sea route monitoring. Keywords: wireless sensor network, sea route monitoring, data compression, principal component analysis
© Copyright 2026 Paperzz