Proceedings of the 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)

+ Advanced search
78 articles

A Chinese Word Clustering Method Using Latent Dirichlet Allocation and K-means

Lin Qiu, Jungang Xu
Word clustering is a popular research issue in the field of natural language processing. In this paper, Latent Dirichlet Allocation algorithm is used to extract the topics from nouns in the text, and the highest probability noun of each topic is selected as the centroids of the k-means algorithm. Experimental...

Digital Riemannian Geometry and Its Application

Guohua Chen
The key characteristic of Riemannian geometry is Riemannian metric. The most important work for the discretion of Riemannian geometry is to seek a discret representation of Riemannian metric, which forms the foundation of digital Riemannian geometry. This paper initiated the conception of Digital Riemannian...

Does 4G Technology Trigger the S-commerce Era Coming Evidence from Taiwanese ICT Market

Ming-Yuan Hsieh, Chih-Cheng Huang, Kuang-Yu Huang, Hsiu-Wei Hsu
In reviewing of the generalization of wireless technology in the variously relative information and communication technology (ICT) industries, this research systematically explore the potential determinants of the fourth generation (4G) technology to cross-analyze the drivers of the smart-commerce (S-commerce)...

An Examination of the Concept of Smart School: An Innovation to Address Sustainability

Siavash Omidinia, Maslin Masrom, Harihodin Selamat
The smart school is a technology-based teaching-learning institution for preparing children for the Information Age. To achieve smarts schools educational objectives, these teaching and learning concepts should be covered: curricular, pedagogy, assessment and teaching-learning materials. Information...

Research on the Application of Information Technology in School Sports

Yunyun Du
The paper analyses the role of information technology in the P.E, training and management and analyzes the theoretical and practical basis for the application of information technology in the school sports.It also proposes measures to fully exert the function of information technology in the school sports.

A Neural Network Enhanced Stereo Vision Obstacle Detection and Avoidance System for Unmanned Ground Vehicle

Fanjun Liu, Binggang Cao
This paper presents a neural network enhanced stereo vision obstacle detection and avoidance system for unmanned ground vehicle. In this paper, we build a neural network to learn the mapping for the left image to the right image under the assumption of a flat road. Using the trained neural network we...

RESTful Digital Web Services for Market Price Forecasting with RAn Application on Equity Markets Using Garch Models

Mihai Calciu, Christiana Tudor
Web services (WS) are originally and typically SOAP (Simple Object Access Protocol) based. SOAP based web services offer a powerful architecture and communication protocol that allows model based marketing decisions support (MMDS) to be integrated, served and get discovered over the Internet. Lately...

Test and Computer Modeling of Steel Braces for Earthquake-Resistant Structures: Dual-Core Self-Centering Brace and Sandwiched Buckling-Restrained Brace

Chung-Che Chou, Ying-Chuan Chen, Sheng-Yang Chen
This work presents mechanics, tests, and finite element modeling results of a proposed steel dual-core self-centering brace (SCB) and a sandwiched buckling-restrained brace (BRB) for earthquake-resistant structures. The mechanics and cyclic behavior of these two braces are first explained, followed by...

An Energy-Efficient Data Placement Algorithm and Node Scheduling Strategies in Cloud Computing Systems

Yanwen Xiao, Jinbao Wang, Yaping Li, Hong Gao
With the rise of the cloud computing, saving energy consumed by cloud systems has become a tricky issue nowadays. How to place data efficiently and schedule the nodes effectively in a cloud platform are very important issues from the view of the energy-saving. However, the state-of-the-art node-scheduling...

Comparison of Modernization Approaches: With and Without the Knowledge Based Software Reuse Process

Jha Meena, Liam O'Brien
The ever increasing demand for improvements in software maintainability and modernization cannot be met through traditional techniques of software development and modernization. Most approaches to software development and modernization do not explicitly address software reuse however new approaches that...

Accelerometer-based Energy Expenditure Estimation Methods and Performance Comparison

Fang-Chen Chuang, Ya-Ting C. Yang, Jeen-Shing Wang
This paper presents two accelerometer-based metabolic equivalent (MET) estimation methods: 1) MET regression models estimation; and 2) a mono-exponential MET estimation equation. The MET estimation methods can predict MET for the following seven categories of activities: sitting, standing, walking upstairs,...

Task Level Parallelization of All Pair Shortest Path Algorithm in OpenMP 3.0

Eid Albalwi, Parimala Thulasiraman, Ruppa Thulasiram
OpenMP is a standard parallel programming lan-guage to develop parallel applications on shared memory ma-chines. OpenMP is very suitable for designing parallel algorithms for regular applications where the amount of work is known apriori and therefore, distribution of work among the threads can be done...

Research on Virtual Interactive Sand Table for Showing of Energy Conservation Data

Rong Fan, Hongjiang Liu
With the rapid development of interaction technology, the digital sand table has gradually replaced the traditional sand table. In such fields as the real estate exhibition, the city planning exhibition, the tourist attractions showcase , the military training, the water conservancy and hydropower ,...

Determination on the Demand Level of Rural Resident’s Basic Pension Based on the Extended Linear Expenditure System Model

Wenxian Cao
By using extended linear expenditure model this paper calculates per capita basic living demand expenditure of China's rural residents from 2004 to 2011 and forecasts the moderate demand level of rural basic pension from 2012 to 2020 on this basis. The conclusion thinks that the addition of both the...

Cbufferless: A Novel Congestion Control for Bufferless Networks On-Chip

Jili Yan, Xiaola Lin, Guoming Lai
In this paper, we propose a novel distributed source-throttling congestion control mechanism for bufferless NoC, called Cbufferless. Our strategy uses a novel congestion detection and control model, computing deflection rate of routing flit and throttling message injection. The congestion information...

The Research on Attack Threat Sensing based on "Software Security Sensor"

Yuan Zhao, Qiangbo Liu, Dingyi Fang, Huaijun Wang, Cong Zhang
Aim at the different attack threats the running software faced with during reversing, a method of sensing attack threats based on "software security sensor "is proposed in this paper. And the instance has demonstrated that the method is effective and feasible. Drawing lessons from the thought of physical...

S-wane Model Designed to Improve Security Association Negotiation Process in IPv6

Khadidiatou Wane Keïta, Alex Corenthin, Claude Lishou, Sidi Mouhamed Farssi
Network security is a major concern as well as a very active research field today. Internet Protocol version 6 has been developed as a result. For a matter of fact, this new IP protocol is based on a number of mechanisms designed to handle specific security services. The main security services supported...

Automatic Panorama Recognition and Stitching Based on Graph Structure

Yi-Li Zhao, Yan Xia
An automatic panorama recognition and stitching method based on graph structure was proposed to solve the multiple images recognition and matching problem. With multiple unordered images of user input, the method can automatically finding overlapping portion between images, and stitch them. First, the...

Analysis of the Difficulties of the Earth Integrated Information Network

Ying Ding, Hai-yang Yu, Hui-lin Jiang, Yuan Hu, Yi-feng Zhu, Li-gang Cong
Due to the progress of the satellite communication system, the demands of earth integrated information network become rapid development. In this paper, we researched on the developing history and trend of the space network, and enumerated some important characteristics and difference between the space...

Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability

Chunyang Yuan, Jiaxin Li, Ru Zhang, Jianyi Liu
Disaster recovery is the key approach to ensure the security of information system and business continuity. Nowadays, it's very urgent to explore a way to evaluate the disaster recovery ability objectively, comprehensively and scientifically before disaster occurs. Initially, our proposal constructs...

The Research on NSC Key Service Mechanism in Mobile Network

Chenhe Zhu, Zhiyi Fang, Ying Wang, Qian Xu, Borui Jin
Mobile Network Security Center (NSC) and its key service mechanism is an important part of the mobile network security management. In this paper, based on the analysis of the security requirements of the mobile network, put forward a key service mechanism for mobile networks (NSC), including the management...

Study on Chebyshev FIR Filters in Airborne Gravity Data Processing

Wei Zhou, Tijing Cai, Zeyang Xu
In order to pick up the low-frequency gravity anomaly from airborne gravity data, a finite impulse response (FIR) low-pass digital filter with the Chebyshev approximation theorem was designed, and the filtering effects of three design parameters were studied. Results show that the filter order may amplify...

Sequential QoS Mapping Model for Multi-layerVideo Delivery in 802.11e Wireless Networks

Lamia Romdhani, Abr Mohamed
Multi-layer video transmission over wireless networks poses numerous challenges due to symantec nature of the encoded video and the intrinsic dependency between the video layers, which, if not considered, may cause severe quality degradation. In this paper, we present a new analytical model leveraging...

Online Handwriting Recognition Using an Accelerometer-Based Pen Device

Wang Jeen-Shing, Hsu Yu-Liang, Chu Cheng-Ling
This paper presents an accelerometer-based pen device for online handwriting recognition applications. The accelerometer-based pen device consists of a triaxial accelerometer, a microcontroller, and an RF wireless transmission module. Users can hold the pen device to write numerals in air without space...

Design of a Control System of Single-Head Pneumatic Hinging Machine Based on STC90C58

Yu Xie
The spectacle frame and earpiece of plate glasses frame are connected by a hinge. The hinge is welded into the plastic spectacle frame or temple tip by using microcomputer control, but the hinging equipment is very expensive. So STC90C58 is chosen as the control core. We have designed a low-cost control...

The Analysis and Test for the Steering Process of Tracked Vehicles on the Hard Road

Hong-yan Wang, Hao-zhan Li, Tao Wang, Qiang Rui, Guang-ming Zhou, Yi Yuan
Steering performances of tracked vehicle considering the skid of tracks-contact-ground has been studied. Models of traction force, brake force, turning resistance moment, turning radius and turning angular speed were established under the conditions of uniform pressure distribution and concentrated ground-contact-load...

Using of Polar Codes in Steganography

Idy Diop, Birahime Diouf, Sidi Mohamed Farssi, K. Tall, P.A. Fall, A.K. Diop, K. Sylla
In this paper, we propose a new steganographic scheme based on the polar codes. The scheme works according to two steps. The first offers a stego vector from given cover vector and message. The stego vector provided by the first method can be the optimal; in this case, the insertion is successful with...

Malicious Website Detection Based on Honeypot Systems

Tung-Ming Koo, Hung-Chang Chang, Ya-Ting Hsu, Huey-Yeh Lin
In the Internet age, every computer user is likely to inadvertently encounter highly contagious viruses. Over the past several years, a new type of web attack has spread across the web, that is, when a client connects to a malicious remote server, the server responds to the request while simultaneously...

Stability of the Forest Evolution System with growth functions

Huihui Bai, Dingjiang Wang
This paper discusses the dynamical model of the Forest Evolution System, and the Existence and Uniqueness of the equation are have been proved by applying the theory of integral equation. Furthermore, we discussed the stability of the solution by applying the stability theory of Lyapunov.

Path Planning of a Mobile Robot Using Real-coded Genetic Algorithm Based Simultaneous Exploration

Chih-Jer Lin, Yen-Lin Chen, Cheng-Hsin Liu, Shenkai Yu
In mobile robot researches, path planning and obstacle avoidance plays a very important role and has been a very challenging research topic. For path planning, it should produce continuous path from the starting point to the destination without colliding obstacles. Therefore, we proposes a genetic algorithm...

Integrated Scientific Cloud Computing WorkflowsSC2IT: A Toolkit to Bring Novel Computational Science to Non-specialists

K. Jorissen, W. Johnson, J.J. Rehr
Scientific Cloud Computing (SCC) applies the advantages of Clouds to computational science. We present the SC2IT Scientific Cloud Computing tools that abstract complex computational workflows and allow state-of-the-art scientific high-performance computing software to be distributed in a user-friendly...

A Venture Capital Assessment Model based on the Genetic Neural Network

Tieying Liu, Yuting Fan, Xinzhu Xu
With the rapid development of economy, there are greater challenges in Venture Capital. In the face of the venture project selecting, scientific evaluation of investment venture has been an important issue in venture investment, and it directly influences the success or failure of investment. In this...

Power Quality Improvement by Shunt Active Performance Filters Emulated by Artificial Intelligence Techniques

Radek Martinek, Jakub Manas, Jan Zidek, Petr Bilik
This article is focused on progressive strategies of shunt active performance filters with intension to compensate higher harmonic currents of non-linear load. The authors of this article deal with usage of a combination of fuzzy system techniques and artificial intelligence, which is also known as Adaptive...

Tracking Object Using Particle Filter and DCT features

Cong Lin, Chi-Man Pun
In this paper, we proposed an object tracking method for video stream based on conventional particle filter. Feature vectors are extracted from coefficient matrices of Discrete Cosine Transform (DCT). The feature, as experiment showed, is very robust to occlusion and rotation and it is not sensitive...

Energy Aware Battery Powered Electric Vehicles:A Predictive Model Driven Approach

Dennis Babu, Anirudh Kumar, Joydeb Roychowdhury
Active energy management for power optimization is essential for successful commercialization of battery powered electric vehicles. In this paper we propose and implement an energy aware electric vehicle using an efficient battery management system, EffBMS which estimates the remaining charge of the...

Lightweight Model Driven Process to Ensure Model Traceability and a Case for SYSMOD

Saulius Pavalkis, Lina Nemuraite
When various software and systems development methodologies may be used in an organization, a problem becomes the process how to ensure project traceability independently from a chosen development method. Current state of traceability implementations in CASE tools lack flexibility, customizability and...

Reducing Falsely Detected JPEG’s Fragmentation Point Using Unique Hex Patterns (UHP)

Abdullah Nurul Azma, Ibrahim Rosziati, Mohamad Kamaruddin Malik, Hamid Norhamreeza Abdul
To increase number of evidence obtained in an effort to fight cyber perpetrator, many studies have been conducted in addressing problem of fragmented JPEG images. However, thumbnail/s is/are always been mistaken as fragmentation point of fragmented JPEG images. This paper discusses on how thumbnail can...

Research of Web Information Quality Control Based on Informatics Theory Applied in Water Resource Search Engine

Yimin Gao, Feng Ye
With the fast growth of network information, it is urgent to control network information quality and to grasp the information efficiently. Webpage control research can be classified in to two stages: before-search quality control and in-search quality control. Before-search stage includes website quality...

Design and Implementation of a High-Speed Data Transmission System Based on PCI-Express Protocol

Yang Xing, Qiong-zhi Wu, Xin-ran Yang, Fu-shun Su
In order to meet the demand of high-speed digital data processing and achieve high-speed communication between digital front-ends and computer, we design and implement a transmission system based on FMC and PCI-Express protocol. This paper describes the basic hardware structure of the interface system,...

A Novel GPS/DR Integrated Navigation System for Electronic Road Pricing

Zhenhua Yu, Guangwen Yan
A novel vehicle navigation system is designed for electronic road pricing(ERP),which can charge by the distance of the route according to the traffic status. The method of elimination of outliers of the Global Positioning System(GPS) signal is presented. The combination of GPS and Dead Reckoning(DR)...

Rough Terrain Perception Through Geometric Entities for Robot Navigation

Roberto Valencia-Murillo, Nancy Arana-Daniel, Carlos López-Franco, Alma Y. Alanís
This paper presents the implementation of a non-linear geometric cost function to be used with a learning to search algorithm (LEARCH) to robot navigation in rough terrains. The non-linear function introduced is a neural network trained with geometric entities as inputs (points, lines, spheres, planes)....

Gossip-Pull System-based Dissemination Protocol Satisfying Message Causality Condition

Jinho Ahn, Cha-Young Kim
This paper introduces a group communication protocol ensuring message causality condition based on gossippull systems. The message causality condition can be satisfied by making all multicast messages transferred to group recipients through redundant message sending by sensor brokers, especially based...

Study on Information Service Push Strategy based on Networked Manufacture

Xiu-zhen Feng, Chao Su
Based on exploring the characteristics of networked manufacture, we first analyzed the relationships on the networked manufacture. Then, we constructed architecture of information push service for networked manufacture, which is based on the detailed discussion with the related data structure. Furthermore,...

The Application of Chaos Immune Genetic Algorithm in Sequencing Problem of Sports Meeting

Ying Pan
The sequencing of sports meeting is quite complicated due to the huge number of people and events. A new immune genetic algorithm aiming at solving the sports meeting sequencing problem is proposed in this paper, namely the chaos immune genetic algorithm, which combines the immune algorithm, chaos algorithm...

Clustering the Tropical Wood Species Using Kohonen Self-Organizing Map (KSOM)

Ahmad Azlin, Yusof Rubiyah
This paper discusses on how the Kohonen Self-Organizing Map (KSOM) is used as a tool to cluster and classify the tropical wood species. Wood features have been extracted through the use of two features extractors; Basic Grey Level Aura Matrix (BGLAM) and Statistical Properties of Pores Distribution (SPPD)...

IROTS: A Proposed COTS Evaluation & Selection Methodology for Component Based Software Engineering in Under-Development Countries

M. Shakeel Faridi, Zahig Javed, M. Haris Abid, Ahmed Mudassar, Asri Bin Ngadi
Component Based Software Engineering (CBSE) methodology deals with software systems by evaluation and selection of appropriate components. CBSE offers software developers a compact software development life cycle, reduce development times, cost effective and less strenuous efforts. In under development...

Knowledge-based Auto Repair Diagnosis System and Application

Xiaofen Fang, Kunli Fang
Auto repair is a process which solves the problem iteratively and constantly. It is required to establish the knowledge base model and the inference base model. Meanwhile, it develops the knowledge-based auto repair diagnostic system through the integration of the auto repair experience and the repair...

Structural Relaxation Solutions Formetallic Amorphous Condensed Lattice with Activation Energy Spectrum Model Applied Computational Physics

Kazu Yamada
Development of amorphous-material devices and specimen modification methods is closely related with the obviousness of high thermal stability and stability of relaxation, additionally general ground characteristic investigations of glass, transformation of the liquid-system to glass one is an enormous...

High Resolution DOA Estimation Algorithm based on Nonuniform L-shaped Array

Lanmei Wang, Zhihai Chen, Guibao Wang
A parameter estimation algorithm of direction of arrival (DOA), based on a nonuniform L-shaped array, is presented for plane-wave signals. According to relation of the two x-axis and y-axis subarrays, a set of rough but unambiguous direction cosines estimates in x and y direction are obtained. By disambiguating...

An Efficient Biogeography Based Face Recognition Algorithm

Daya Gupta, Lavika Goel, Abhishek Abhishek
Extracting the optimal features from images is always required in face recognition algorithm to achieve high accuracy. In this paper we have presented an efficient face recognition algorithm based on Biogeography Based Optimization (BBO). First we extract the features using the principal Component Analysis...