2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN...
Transcript of 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN...
2014 IACSIT Singapore Conferences
2
2014IACSIT Singapore Conferences
2014 the 6th International Conference on Communication Software and
Networks (ICCSN 2014http://www.iccsn.org/)
2014 the 3rd International Conference on Wireless and Optical Communications (ICWOC 2014http://www.icwoc.org/)
2014 the 3rd International Conference on Intelligent Information Processing
(ICIIP 2014http://www.iciip.net/)
May24-26, 2014 Singapore
Nanyang Executive Centre, Singapore
50 NANYANG AVENUESINGAPORE 639798
Sponsored by
2014 IACSIT Singapore Conferences
3
Welcome to IACSIT Conferences in Singapore during May 24-26, 2014
Dear Distinguished Delegates, Welcome to IACSIT Conferences in Singapore. We’re confident that over the two days you’ll get theoretical grounding, practical knowledge, and personal contacts that will help you build long-term, profitable and sustainable communication among researchers and practitioners working in a wide variety of scientific areas with a common interest in Wireless and Optical Communications, Communication Software and Networks, Intelligent Information Processing. After more than half a year’s preparation, we finally will have those conferences to be held in Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent papers were accepted and published finally. Congratulations for those papers. On behalf of IACSIT organization, I would like to thank all the authors as well as the Program Committee members and reviewers. Their high competence, their enthusiasm, their time and expertise knowledge, enabled us to prepare the high-quality final program and helped to make the conference become a successful event. Once again, thanks for coming to IACSIT conferences, we are dedicated to higher and better international conference experiences. We will sincerely listen to anysuggestion and comment; we are looking forward to meeting you next time.
Yours Sincerely, Ms. Sophie Tsang Director of Conference Department II, IACSIT
2014 IACSIT Singapore Conferences
4
ANNOUNCEMENT
*ICCSN 2014 conference papers were selected and published in the one of the following Journals, authors will get the journal onsite. Journal of Communications (JCM) (ISSN: 1796-2021; DOI: 10.12720/jcm) Journal of Advances in Computer Networks (JACN)(ISSN: 1793-8244) International Journal of Future Computer and Communication(IJFCC)(ISSN:
2010-3751) International Journal of Computer and Communication Engineering(IJCCE)(ISSN:
2010-3743) Lecture Notes on Software Engineering (LNSE)(ISSN: 2301-3559) International Journal of Signal Processing Systems (IJSPS)(ISSN: 2315-4535) *ICWOC 2014 conference papers were selected and published in the volume of International Journal of Computer and Communication Engineering (IJCCE)(ISSN: 2010-3743), authors will get the journal onsite. *ICIIP 2014conference paperswere selected and published in the volume of International Journal of Signal Processing Systems (IJSPS) (ISSN: 2315-4535),authors will get the journal onsite.
*One best presentation will be selected from each session, and the best one will be announced and award the certificate at the end of each session.
IACSIT Publication committee
2014 IACSIT Singapore Conferences
5
Instructions for Oral Workshop Devices Provided by the Conference Organizer:
Laptops (with MS-Office & Adobe Reader)
Projectors & Screen
Laser Sticks
Materials Provided by the Presenters:
PowerPoint or PDF files
Duration of each Presentation (Tentatively):
Regular Oral Session: about 15 Minutes of Presentationincluding Q&A.
Keynote Speech: 45 Minutes of Presentation including Q&A.
Author should copy his presentation file to conference laptop 10 minutes before
his session.
2014 IACSIT Singapore Conferences
6
Conference Schedule Day 1, Saturday, May 24, 2014–Onsite Registration Only
Registration: Hotel Lobby
10:00a.m.-12:00p.m. 14:00p.m.-17:00p.m
Arrival, Registration and Conference materials collection **Certificate for Participant can be collected at the registration counter**
Day 2, Sunday, May 25, 2014– Presentation Day
Simple Version:
Lecture Room 6 09:00a.m.-11:40a.m.
Morning
09:00am-09:05am Opening Remarks
09:05am-09:50am
Keynote Speech I:
Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA
09:50am-10:05am Coffee Break
10:05am-10:50am
Keynote Speech II:
Dr. Maode Ma Nanyang Technological University, Singapore
10:50am-11:35am
Keynote Speech III:
Prof.Yulin Wang International School of Software, Wuhan University, China
11:35am-11:45am Plenary Photo
Lunch 12:00pm-13:30pm
2014 IACSIT Singapore Conferences
7
13:00pm-15:45pm
Seminar room 4 Seminar room 5
Session 1
Information Processing
Session 2
Computer Systems and Applications
15:45pm-16:00pm Coffee Break
16:00pm-18:45pm Session 3
Optical and Wireless Communications
Session 4
Security and Reliability
Dinner 18:30pm-20:00pm
Day 3, Monday, May 26, 2014 –Visiting Day
10:00am-12:00pm: Campus Visiting & Lab Tour.
Full Schedule:
Lecture room 6
Plenary Speech+ Plenary Photo 09:00am-11:40am
Morning
09:00am-09:05am Opening Remarks
09:05am-09:50am
Keynote Speech I:
Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA
09:50am-10:05am Coffee Break
10:05am-10:50am
Keynote Speech II:
Dr. Maode Ma Nanyang Technological University, Singapore
2014 IACSIT Singapore Conferences
8
10:50am-11:35am
Keynote Speech III:
Prof.Yulin Wang International School of Software, Wuhan University, China
11:35am-11:45am Plenary Photo
Lunch 12:00pm-13:30pm
Afternoon Session
13:00pm-15:45pm
Session 1(Seminar room 4)
Information Processing
Opening Speech (13:00pm-13:30pm) Compensation of Nonlinearities in ΣΔ Modulators Using Digital Assisted Analog Electronics Approach
By Dr.Rashad Ramzan, UAE University, UAE
Session Chair: TBA
IP0002
Composite Kernel Machines on Kernel Locally Consistent Concept Factorization
Space for Data Mining
Shian-Chang Huang, Lung-Fu Chang and Tung-Kuang Wu
National Changhua University of Education, Taiwan
Abstract—This paper proposes a novel approach to overcome the main problems in
high-dimensional data mining. We construct a composite kernel machine (CKM) on a
special space (the kernel locally consistent concept factorization (KLCCF) space) to
solve three problems in high-dimensional data mining: the curse of dimensionality,
data complexity and nonlinearity. CKM exploits multiple data sources with strong
capability to identify the relevant ones and their apposite kernel representation.
KLCCF finds a compact representation of data, which uncovers the hidden
information and simultaneously respects the intrinsic geometric structure of data
manifold. Our new system robustly overcomes the weakness of CKM, it outperforms
many traditional classification systems.
Index Terms—data mining, multiple kernel learning, kernel locally consistent
concept factorization, manifold learning, support vector machine
2014 IACSIT Singapore Conferences
9
IP0003
A Robust Decentralized Controller for Stand-alone Wind systems and Hybrid
Wind-Diesel systems Using Type-2 Fuzzy Approach
R.Vijaya Santhi, K.R.Sudha, and A. Chandra Sekhar
Andhra University, India
Abstract—In the present paper, a Non-Conventional source, wind system is
considered for Load Frequency Control (LFC) problem. Modeling of a stand-alone
wind system and a Hybrid wind-diesel system is done. In both the cases variable
power consumptions as well as the intermittent wind power may cause a large
fluctuation of system frequency. The system will lose stability, if the system
frequency is not controlled. In addition, variation of system parameters, unpredictable
power demands, fluctuating wind power etc., cause various uncertainties in the
system. Literature shows Fuzzy controllers including Super Magnetic Energy Storage
(SMES) units are suitable for highly chaotic systems. In the present paper, Fuzzy
controller, which is termed as Type-1 Fuzzy including SMES units, is designed based
on the analytical structure. Type-1 fuzzy can further be modified to Type-2 fuzzy by
giving grading to the membership functions. Based on the same analytical structure, a
robust decentralized control scheme is designed using Type-2 Fuzzy logic controlled
SMES Controller. In the present paper it is observed that dynamic response with
Type-2 Fuzzy controller for change in load and change in wind power is better when
compared with conventional SMES controller and Type-1 fuzzy logic SMES
controller.
Index Terms—Load Frequency Control (LFC), Stand-alone wind system, Hybrid
Wind Diesel system, Type-2 Fuzzy Logic SMES Controller
IP0006
Illumination Analysis of Inactive Indoor Scenes with the Discrete Fourier Transform
of Structural Distortions
Weng Kin Lai, Li Li Lim & Tomas H. Maul
Tunku Abdul Rahman University College, Malaysia
Abstract—Light has always played a very important role in human economic
activities. Nevertheless, there are only a few popular sources of electric light. While
incandescent amps have been popular in the past, they are not energy efficient. In
recent years, fluorescent lamps are becoming popular as an alternative and this is
especially true for schools and businesses. Probably due to these developments,
there has been some significant interest in examining the consistency of the light
intensity from electric lamps. While some have looked at this as a means to quickly
identify the system components of fluorescent lamps, others have analyzed this to
help identify the liveness of the scene. High speed video cameras can easily detect
variations in the illumination levels from fluorescent lamps, but they can be quite
costly to operate. Moreover, most popular security video cameras can only operate
up to a maximum speed of 30 frames per second. This paper examines the use of
Structural Distortion as an image quality measure to detect flickering on video signals
from the video cameras at low frame rates. Future research is outlined at the end of
the paper.
Index Terms—Lighting systems, image quality metrics, illumination analysis,
incandescent lamps, fluorescent lamps.
IP0010 Contourlet Tranform Based Human Emotion Recognition System
R. Suresh, P. Elakkiya, and S. Audithan
2014 IACSIT Singapore Conferences
10
Prist University, India
Abstract—In this study, an automated human emotion recognition system based on
contourlet transform is presented. The various human emotional stats such as
surprise, sadness, disgust, anger, fear, happiness and neutral are analyzed. The
emotional states are identified by the motion of the muscles in the skin of the human
face. In order to classify the emotional state, the patterns generated by the muscles
motions should be represented efficiently. In the proposed approach, these patterns
are characterized by contourlet transform. The high dimensional contourlet
transformed face image is translated into low dimensional space in the feature
extraction stage. This can be achieved by taking the average of contourlet coefficients
in each sub-band and fed into the classifier. The number of features used for
classification depends on the level of decomposition used while transforming the face
image by contourlet transform. The emotional states are classified by nearest
neighbor classifier and the classifier performance is analyzed by various distance
measures; euclidean, city block, cosine and correlation efficiently. The results show
that the proposed approach based on contourlet transform produces over 80%
recognition accuracy on JApanese Female Facial Expression (JAFFE) database.
Index Terms—contourlet transform, nearest neighbour classifier, facial expressions,
emotion recogniton
IP0013
Boundary Detection of Altered Region by Differential Features on Camera Response
Function
Hirokazu KATO, Toshiyuki NAGAO, Hideaki FUJIWARA, and Katsuya KONDO
Kondo Lab., Dept. Information and Electronics, Tottori University, Japan
Abstract—An image splicing can be easily made by a skilled image editor, and
verification of authentic image has become important. In this paper, we propose a
detection method for splicing boundaries that uses uniformity on camera response
function (CRF) in an image. This uniformity is observed as differential features of
CRF. In altered image, the non-uniformity of CRF mostly appears on the edges of a
splicing region. The characteristics of CRF extracted from edges in an image differ
between an altered region and an authentic region. We analyze these characteristics
by using QR map. The QR map represents the relation between this features and
image intensity. An authentic boundary has the characteristics of a common CRF
within an image, but a splicing boundary is not so. We show the tendency of authentic
boundaries in QR map, and we argue about the method of estimating whether a target
boundary is spliced by evaluating the consistency of QR map.
Index Terms—Camera Response Function, Splicing Boundary, QR map, Digital
Forensics
IP0015
Realizations of Systems with Point Delays
M. De la Sen and R. Nistal
UPV, Spain
Abstract—Results on realization theory of dynamic linear systems with lags are
obtained through Laurent expansions. The results are related to controllability and
observability properties as well as to mismatching among a real transfer matrix and
its nominal counterpart.
2014 IACSIT Singapore Conferences
11
Index Terms—realization theory, minimal partial realizations, Hankel matrices, point
delays
IP0017
Adjustment of Observation Probabilities during the lifetime of Viterbi Algorithm in
Unstable Environments
Nader Rezazadeh and Omid SojodiShijani
Department of Computer, Science and Research Branch- Islamic Azad University
Qazvin, Iran
Abstract—Typically in learning and determining the parameters in various
applications of hidden Markov model, like the decoding problem solving in Viterbi
algorithm, statistics such as the average are used. In this context, to obtain the
average, the stable hypotheses for the data generation process are considered. While
in an unstable environment, model parameters such as the value of probability of
observing event parameter generated by the state, changes directly between the
successive events. For this purpose in this article an adjuster parameter of event
probability has been provided in order to adjust and change the parameters after each
event during the lifetime of Viterbi algorithm. Test results on the real data sets show
the superior performance of the proposed method in terms of accuracy than the other
methods.
Index Terms—Statistical Adjustment, Hidden Markov Model, Viterbi algorithm
IP1005
Literature Mining of Protein Phosphorylation Using Dependency Parse Trees
Minghui Wang
University of Science and Technology of China
Abstract—As one of the most common post-translational modifications (PTMs),
protein phosphorylation plays an important role in various biological processes, such
as signaling transduction, cellular metabolism, differentiation, growth, regulation and
apoptosis. Protein phosphorylation is of great value not only in illustrating the
underlying molecular mechanisms but also in treatment of diseases and design of new
drugs. Recently, there is an increasing interest in automatically extracting
phosphorylation information from biomedical literatures. However, it still remains a
challenging task due to the tremendous volume of literature and circuitous modes of
expression for protein phosphorylation. To address this issue, we propose a novel
text-mining method for efficiently retrieving and extracting protein phosphorylation
information from literature. By employing natural language processing (NLP)
technologies, this method transforms each sentence into dependency parse trees that
can precisely reflect the intrinsic relationship of phosphorylation-related key words,
from which detailed information of substrates, kinases and phosphorylation sites is
extracted based on syntactic patterns. Compared with other existing approaches, the
proposed method demonstrates significantly improved performance, suggesting it is a
powerful bioinformatics approach to retrieving phosphorylation information from a
large amount of literature. A web server for the proposed method is freely available at
http://bioinformatics.ustc.edu.cn/pptm/.
Index Terms—Phosphorylation, Dependency parse tree, Text mining, Systems
biology
IP1006
A novel CNA/LOH detection algorithm using normal-tumor SNP-array data
Ao Li
University of Science and Technology of China
2014 IACSIT Singapore Conferences
12
Abstract—Recently single nucleotide polymorphism (SNP) genotyping arrays
attracts lots of attentions, which can provide high resolution profiling chromosomal
rearrangements. It facilitates whole genome detection of two common aberrations:
copy number alteration (CNA) and loss of heterozygosity (LOH), which are
frequently found in cancer cells. At present, many computational approaches have
been introduced for this purpose, however, most of them fail to incorporate the
intrinsic genetic relationship between tumor and paired normal SNP-array data,
which may greatly improve the performance in identifying CNA and LOH in cancer
genome. To address this issue, we proposed a novel algorithm to handle paired
SNP-array data from both tumor and paired normal samples, which can make best use
of the genotype information to assist the detection. This algorithm employs the
statistical framework of HMM and EM method to precisely model the relationship
between normal and tumor SNP-array data. Results on public datasets show that our
method outperforms all other investigated algorithms with precise parameter
estimation and sensitive aberration identification.
Index Terms—SNP-array, tumor, chromosomal aberration, bioinformatics, HMM
Afternoon Session 13:00pm-15:45pm
Session 2(Seminar room 5)
Security and Reliability
Opening Speech (13:00pm-13:30pm)
Session Chair:Dr. Masnida Hussin,UNIVERSITY PUTRAMALAYSIA
IP0018
Analysis of Operation Errors for Fault Injection Attack
Masaya Yoshikawa and Hikaru Goto
Meijo University, Japan
Abstract—Although the encryption standards are theoretically safe, it has been recently
reported that confidential information could be illegally revealed when the encryption
standards are embedded in the electronic devices. In particular, the menace posed by
fault injection attacks has become extremely serious. To guarantee the safety of
electronic devices in the future, into which cryptographic circuits have been
incorporated, fault injection attacks must be thoroughly studied. This study elucidates
the tendency of fault injection.
Index Terms—fault injection attack, tendency of an operation error, glitch generation,
2014 IACSIT Singapore Conferences
13
tamper resistance, advanced encryption standard
OC0003
Sequence Number Alteration by Logical Transformation (SALT): A Novel Method for
Defending Session Hijacking Attack in Mobile Ad hoc Network.
N. Nishanth and Dr. S. Suresh Babu
TKM College of Engineering(KERALA UNIVERSITY), India
Abstract—TCP attacks are the major problem faced by Mobile Ad hoc Networks
(MANETs) due to its limited network and host resources. Although the session hijack
attack is not in the forefront of everyone’s mind, it still remains a commonly used
attack in MANET. Session hijack attacks are defined as taking over an active TCP/IP
communication session without their permission or knowledge. When implemented
successfully, attackers assume the identity of the compromised user, enjoying the same
access to resources as the compromised user. Network protocols like FTP, Telnet, and
rlogin are especially attractive to the attacker, because of the session oriented nature of
their connections, and lack of implementation of any security during logon,
authentication, or data transmission. This paper introduces a novel method for
defending session hijacking attack in MANET: Sequence number Alteration by
Logical Transformation (SALT). Based on the comprehensive evaluation based on
experiments, it is showed that SALT can successfully defend session hijacking attack
under diverse mobile multi-hop network environment with low communication,
computation, and memory overhead.
Index Terms—TCP attacks, Mobile Ad hoc Networks, Session hijacking, Sequence
number, logical transformation.
OC0008
Imposter Detection in Mobile Wireless Sensor Networks
Ebrahim A. Alrashed and Mehmet Hakan Karaata
Kuwait University, Kuwait
Abstract—Mobile wireless sensor networks (MWSNs) are wirelessnetworks of small
sensors moving around in a specified coveragearea, conveying their readings and data
to static or mobile basestations. In contrast to a static wireless sensor network where
thefixed node position can be used to authenticate a sensor node, thechanging position
of a node in a MWSN cannot be used in theauthentication process. This can lead to
imposters posing aslegitimate nodes anywhere in the network. An imposter can use
theidentity of a legitimate node to communicate within the network andeavesdrop on
confidential communication or to send falseinformation. In this paper, we propose a
novel scheme whichemploys nonce-values and blackout-time mechanisms to
detectimposters in the network. The proposed scheme employs aquarantining
mechanism to quarantine the detected imposters, and anode-restoration mechanism to
appropriately authenticate and
restore quarantined nodes into the network.
Index Terms—imposter detection, mobile sensor networks, wirelessnetwork security,
wireless networks
OC0028
Outage Analysis of Relay-Assisted BPSK-SIM BasedFSO Systems over Strong
Atmospheric Turbulence with Pointing Errors
Prabu Krishnan, Sriram Kumar
National Institute of Technology, India
2014 IACSIT Singapore Conferences
14
Abstract—Natural turbulence and scintillation are the major challenges in practical
deployment of free space optical (FSO) communication systems. In this paper, a
parallel relay assisted FSO system is considered to deal with these challenges. This
paper investigates the end-to-end performance of the multihop parallel relay assisted
FSO system over a strong atmospheric turbulence channel with misalignment fading.
The analysis is carried out for system employing decode-and-forward (DF) relays and
for strong turbulence channel which can be modeled by the gamma-gamma
distribution. A novel closed-form expression for the outage probability is derived. The
results are compared with the direct transmission system.
Index Terms—Binary phase shift keying subcarrier intensity modulation, free space
optics, outage probability, parallel relay, strong atmospheric turbulence.
OC3006
Carrier class Availability Prediction for Hybrid FSO/RF System in Heavy Rainfall
Regions based on ITU-R Models
Ahmed Basahel and Wajdi Al-Khateeb
INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA, Malaysia
Abstract—Availability is considered as the main parameter of evaluating a Hybrid
FSO/RF link quality. An accurate carrier class availability prediction of Hybrid
FSO/RF is needed. In tropical regions, among different weather influences, rain plays a
major role. Precipitation decrees are available for frequencies above 10 GHz. In this
paper we will analyze the effect of rain on Hybrid FSO/RF to find the optimum
operating frequency to back-up the FSO link besides tradeoff between speed of RF and
link availability of FSO in tropical environment; we will also provide better prediction
of link availability. ITU-R specific rain attenuation of FSO and RF models has been
used for the analysis. From the results, a 30 GHz and below are suggested to be used as
a back-up of FSO link to achieve carrier grade availability under the impact of rain.
Index Terms—Carrier grade availability, heavy rain attenuation hybrid FSO/RF, ITU-R
specific rain attenuation models.
SN005
Cooperative Interference based on Evolutionary Game in Wire-tap Channel
Kaizhi Huang, Ying Hong, Wenyu Luo, Shengbin Lin
National Digital Switching System Engineering & Technological Research
Center,China
Abstract—In wireless network, when using classical game theory to study physical
layer security, the energy-limited transmission nodes tend to choose non-cooperative
strategy in order to maximize their own secrecy rate, resulting in reduced network
secrecy rate. To solve this problem, the paper proposes a cooperative interference
method for physical layer security based on evolutionary game. First, it defines the
strategies (sending artificial noise or signal) and benefits (secrecy rate under different
strategy combination) according to the evolutionary game. Then, the transmission
nodes adjust strategy to maximize benefits based on current network state and
difference between cooperation benefit and average expected benefit; Finally, the
conditions that the transmitting nodes can cooperate with each othercould achieve, and
the network is evolution from an unstable state to a stable cooperative state to improve
the secrecy rate of the system. Simulation and analysis results show that under the
Gaussian channel, compared to the traditional game method, the network secrecy rate
of the proposed method can be improved 1bit/s/Hz.
Index Terms—secrecy rate; evolutionary game; cooperative interference; eavesdropper
2014 IACSIT Singapore Conferences
15
SN007
Availability Enhancement Model for Virtual Machines over Hypervisor Attacks
Chandrasekaran Subramaniam and Arthi Ravishankar
SRM University
Abstract—The objective of the research work is to propose an enhanced availability
model for the virtual machines over hypervisor attacks. In recent years, virtualization
has turned out to be a most promising area in the field of Information Technology.
However, there is always security threats existing in all domains and virtualization is
not new to it. Among the various components that lie in virtual environment,
hypervisors have always been an ideal target for attack as they provide a single entry
point into the virtual environment. Designing a model that could stand these security
threats has always been a challenge. The proposed work focuses on the architecture of
the virtual environment, the limitations of the various physical resources to be
virtualized and addresses various security related issues. It analyses various attack
vectors in a quantitative manner individually and integrates all the recovery actions to
enhance the overall availability of the virtual machines.
Index Terms—Hypervisor, Hypervisor Attack, Security, Virtual Machines,
Virtualization
SN008
Performance of MIMO-OFDM for LTE under Jamming
Jesada Sivaraks, Noppadol Tiamnara, Yodsapon Thamachareon and Nattakit
Suriyakrai
National Broadcasting and Telecommunications Commission, Thailand
Abstract—Multple Input Multiple Output (MIMO) is a major innovation and attractive
solution in LTE systems and if used in combination with Orthogonal Frequency
Division Multiplexing (OFDM), provides better signal performance or higher data
throughput achieving higher Quality of Service (QoS) and spectral efficiency.
However, any digital communication network that requires synchronization is
vulnerable to jamming. Jamming is intentionally transmitting continuous high power
noise across entire bandwidth near transmitting and receiving nodes which disturb
network communications resulting in performance degradation. Especially in the case
of military digital communication systems which must be robust under hostile
jamming. This paper provides a procedure for evaluating the performance of STBC
MIMO-OFDM operating in the presence of partial band noise jamming. By MATLAB
simulations, we consider Alamouti’s 𝟐 × 𝟐 MIMO systems between Signal to Noise
Ratio (SNR) and Symbol Error Rate (SER) for BPSK modulation under several
partial-band jamming factors 𝛒. It has been found that the performance of the systems
is severely deteriorated in the presence of jamming power.
Index Terms—Alamouti Space Time Block (STB) code, MIMO-OFDM, LTE,
Jamming.
SN015
Analysis on Extraction of Modulated signal using Adaptive filtering algorithms against
ambient noises in underwater communication
Sakthivel Murugan S, Natrajan V, Prethivika Srinivasan,
SSN College of Engineering/Department of ECE, Chennai, India
Abstract—Acoustic signals on transmission in underwater channels are often prone to
corruption by ambient noises, wind interference and other random sources of
2014 IACSIT Singapore Conferences
16
disturbance. Adaptive filters can be used to extenuate the effects of ambient noise in
acoustic signals. An effective technique for denoising the degraded acoustic signals
using adaptive filters has been proposed. Adaptive techniques, such as Least Mean
Square (LMS), Normalized Least Mean Square (NLMS), and Kalman Least Mean
Square (KLMS) have been analyzed based on their performance, with the help of
characteristics like Signal to Noise Ratio (SNR) and Mean Square Error (MSE) for
various wind speeds ranging from 2m/s to 6m/s. An exhaustive set of data, collected
using a custom made fixture containing two hydrophones, from shallow water regions
in Bay of Bengal, have been used to verify the efficacy of this method. According to
the adaptive filter technique, the filter equations and weight update equations are
processed continuously till the error signal approaches zero and the desired signal is
extracted. Based on the adaptive technique used, the filter equations and the weight
update equations vary accordingly. Simulation results show that Kalman Least Mean
Square (KLMS) technique produces notable results compared to Normalized Least
Mean Square (NLMS) and Least Mean Square (LMS) techniques even if the Signal to
Noise Ratio (SNR) value is remarkably low. From the simulation, it is observed that
the output of the Kalman Least Mean Square (KLMS) filter converges to the desired
useful signal faster than the other adaptive filter techniques. This result is further
supported by the fast converging Mean Square Error (MSE) signal of Kalman Least
Mean Square (KLMS) compared to the other adaptive filter techniques discussed. Thus
adaptive filtering eliminates all the undesired noise signals and reconstructs the desired
useful signal against all sources of ambient noise.
Index terms -- Adaptive filters, Mean Square Error, Signal to Noise Ratio, Underwater
acoustic signal.
SN304
Formal Analysis of a Ranked Neighbour MANET Protocol Suite
Shamim H Ripon, Syed Fahin Ahmed, Afroza Yasmin, Yaminar Rashid and K. M.
Imtiaz-UD-Din
East West University, Bangladesh
Abstract—Formal verification plays an important role in development and application
of safety critical systems. Formalized verification techniques to analyze the security
and the safety properties of communication protocols increase and confirm the protocol
confidence The advancement of mobile and wireless communication technologies in
recent years introduced various adaptive protocols to adapt the need for secured
communications. Security is a crucial success factor for any communication protocols,
especially in mobile environment due to its ad hoc behavior. SPIN is a powerful model
checker that verifies the correctness of distributed communication models in a rigorous
and automated fashion. This paper presents a SPIN based formal verification approach
of a security adaptive protocol suite. The protocol suite includes a neighbor discovery
mechanism and routing protocol. The protocol suite is encoded into SPIN and is
exhaustively checked for various temporal properties ensuring the applicability of the
protocol suite in real-life applications.
Index Terms—Ranked neighbor, SPIN, model checking, loop freedom.
2014 IACSIT Singapore Conferences
17
Coffee Break 15:45pm-16:00pm
Afternoon Session 16:00pm-18:45pm
Session 3(Seminar room 4 )
Computer Systems and Applications
Opening Speech (16:00pm-16:30pm) Performance Evaluation of Social Relation Opportunistic Routing (SROR) in Dynamic Social Networks
By Dr. Ka Wai Gary Wong, The Hong Kong Institute of Education, Hong Kong
Session Chair:Prof. Weng Kin Lai,Tunku Abdul Rahman
University College, Malaysia
IP0005
The Implementation of Simplified Universal Assembler in Forth Assembly Language
Gang-Jeng Huang, Shiuh-Ku Weng and Jyi-Jinn Chang
Chung Cheng Institute of Technology, National Defense University, Taiwan
Abstract—In this paper, SDK (Software Development Kits) and IDE (Integrated
Development Environment) of forth assembly language is designed. It can be assembled
to different machine codes and would replace the traditional assembly languages, such as
x86, ARM, MIPS and so on. The forth language is a kind of algebra language that is
easier to code and to debug the programs. Therefore, it is a good tool language to be
taught in the courses of computer organization and architecture for the students learning
the low-level language easily and quickly.
Index Terms—Forth, Assembly Language, Machine Code, Assembler
IP0019
Short-Term Traffic Prediction Using Rainfall
Haiyun Lu
SAP Research & Innovation, Singapore
Abstract—We propose an approach to predict short-term travel time for expressways
using rainfall data. The rainfall rate is quantitatively related to the travel time and is used
to perform the prediction. The proposed approach is experimented on real data collected
in Singapore. Results show that it performs better compared to three baseline
2014 IACSIT Singapore Conferences
18
approaches. It is also shown that the proposed approach is applicable and effective in
Singapore.
Index Terms—intelligent transportation systems, traffic prediction, travel time
prediction, weather correlation, impulse response.
IP0023
A Comparative Performance of Various Analysis-synthesis Techniques
Ankita N. Chadha, Jagannath H. Nirmal, and Pramod Kachare
UNIVERSITY OF MUMBAI, INDIA
Abstract—In this paper, we present a comparative performance of the various
analysis-synthesis techniques which separate the acoustic parameters and allow the
reconstruction of the speech signal, which is very close to original speech. The
analysis-synthesis of speech signal is used for speech enhancement, speech coding,
speech synthesis, speech modification and voice conversion. Our comparative study
includes Linear Predictive Coder, Cepstral Coder, Harmonic Noise Model based coder
and Mel-Cepstrum Envelope with Mel Log Spectral Approximation. The comparative
performance of these vocoders is evaluated using different objective measures namely
line spectral distortion, Mel cepstral distortion and signal to noise ratio. Along with
objective measures, subjective measure, mean opinion score is also considered to
evaluate the quality and naturalness of the resynthesized speech in term of original
speech.
Index Terms—acoustic parameters, complex cepstrum, harmonic noise model, linear
predictive coefficients, mel-cepstrum envelope, mel log spectral approximation, vocoder
IP0024
Non-Invasive Monitoring of People with Disabilities via Motion Detection
Lau Bee Theng, Ong Chin Ann and Fernando Anddie Putra
SWINBURNE UNIVERSITY OF TECHNOLOGY SARAWAK, Malaysia
Abstract—This research developed a prototype to recognize the activities of people with
social interaction and communication impairments using two commercial grade infrared
motion sensing input devices. The model uses skeletal joints in the form of (x,y,z)
coordinates to perform computationally inexpensive and efficient real time indoor
monitoring. The prototype works well for a room with the size of 15 ft. by 15 ft. where it
can detect two human subjects simultaneously. The prototype promotes non-invasive
monitoring, no wearable sensor is required on the person under monitoring and no
identifiable face images are stored. The evaluation shows that it is able to recognize the
accident-critical activities, self-injurious activities and inactivity with satisfactory
recognition and false alarm rates.
Index Terms—activity recognition, human body joints, gesture, accident-critical,
self-injurious, inactivity, fall detection, people with disabilities, motion sensor.
IP1003
Tour Pinoy Recognition
Clarence C. Robas, James Michael A. Adoremos, Kimberly S. Morales, Joanna C. Unida
and Raymond S. Macatangga, DIT
Our Lady of Fatima University, Philippines
Abstract—Tourism business faces many challenges brought by modern technology (i.e.
Internet). As online reservation and booking are growing into a more convenient tool for
tourists, we consider developing an image recognition application which helps in
2014 IACSIT Singapore Conferences
19
promoting the local tourism in the Philippines. While several of these image recognition
applications are being implemented, our system introduces another way of delivering
tourism facts focusing on the selected tourist destinations by just uploading a photo. The
system responds useful information needed by the tourists. The Tour Pinoy covers the
top five (5) tourist destinations in the Philippines provided by the Haranah Tours
Corporation, a duly licensed tourist transport operator accredited by the Department of
Tourism Philippines. Based on the criteria used by the proponents and the
implementations suggested, the proponents found out that Tour Pinoy helps in promoting
local tourism in the Philippines.
Index Terms—Tourism Promotion, Artificial Intelligence, Computer Vision, Image
Recognition
IP3001
Matlab Based Design of Adaptive Filters using least Pth norm : FIR vs IIR
Srishtee Chaudhary
Government Polytechnic College for Girls, Patiala, Punjab, India
Abstract—Adaptive filters are considered nonlinear systems; therefore their behavior
analysis is more complicated than for fixed filters. As adaptive filters are self designing
filters, their design can be considered less involved than in the case of digital filters with
fixed coefficients. The paper discusses adaptive filters, adaptive filtering with various
approaches, optimization methods, algorithms for a filter, IIR and FIR filter designs, in
order to improve a prescribed performance criterion. Further least Pth norm approach is
compared for both FIR and IIR filter. Since no specifications are available, the adaptive
algorithm that determines the updating of the filter coefficients requires extra
information that is usually given in the form of a signal. This signal is in general called a
desired or reference signal, whose choice depends on the application.
Index Terms—Adaptive filters, FIR, IIR, least pth
SN307
Semantic Concepts Classification on Outdoor Scene Images Based on Region-Based Approach
Kyawt Kyawt Htay
University of Computer Studies Mandalay (UCSM), Myanmar
Abstract—Outdoor scene analysis is a complex problem for both image processing and
pattern recognition domains. There are two methods of segmenting images to look for
objects in an image. One is block based and one is region based. Region-based method
can provide some useful information about objects even though segmentation may not be
perfect. In this paper, propose a method for semantic concepts classification on outdoor
scene images based on region-based approach. The basic idea of this approach is to
classify local image regions into semantic concept classes such as tree, sky and road etc.
There are three phases in this approach: segmentation phase, features extraction phase
and classification phase. In segmentation phase, Modified Marker-Control Watershed
algorithm (MCWS) is used. Second, texture feature vectors are extracted from
segmented regions by Gray-Level Co-occurrence Matrix (GLCM). Finally, classification
is performed by 3-layers Artificial Neural Network (ANN). The propose method is
applied on real scene images dataset.
Index Terms—Marker-Controlled Watershed, Outdoor Scene Analysis, Texture
SN021 The Challenges of Management Information System in Academic Work by Cloud
Computing Technology
Thassanee Rodmunkong, Panita Wannapiroon and Prachyanun Nilsook
2014 IACSIT Singapore Conferences
20
King Mongkut’s University of Technology North Bangkok (KMUTNB), Thailand.
Abstract— The objectives of this research were 1) to synthesize the features of cloud
computing management information system in academic work, 2) to synthesize the
elements of cloud computing management information system in academic work, 3) to
develop models of cloud computing management information system in academic work,
4) to evaluate the models of cloud computing management information system in
academic work.
The research findings were as follows: 1) the models of management information system
in academic work by cloud computing technology comprised of 6 elements: Cloud
Computing Technology, Curriculum, Center, Connectivity, Client and Consumer, which
are called C6. It is a very popular technology in the present time to be used for
administration in academic work of Thailand’s Universities. It is the integration and
sharing common resources of computer technology including software, hardware and
database, 2) the results evaluated by 5 experts showed that the model of cloud computing
management information system in academic work had appropriateness at a high level.
Index Terms— Cloud Computing, Management Information System, Academic
SN024
Efficient Feature Extraction for Bathroom Activities
Identification Based on Sound
Chaw Su, Moe Moe Aye
Department of InformationTechnology Engineering, Mandalay Technological
University,Myanmars
Abstract— Audio feature extraction plays an important role inanalyzing and
characterizing audio content. Moreover, theextracted feature should be robust to various
distortions andhave a good reliability property for a good classification system. This
paper describes efficient feature extraction for anautomated bathroom activities
identification system based onsound. To obtain a useful feature extraction in this system,
discrete wavelet entropy features are used. The popularity ofWavelet Transform is
growing because of its ability to reducedistortion in the reconstructed signal while
retaining all thesignificant features present in the signal. In this paper, thepersonal
hygiene activities such as showering, brushing of teeth, washing hands, flushing and
urination are studied and modeled. Then, the system is designed with the Sparse
RepresentationClassifier (SRC) for the efficient classification. SRC havereceived a great
deal of attention in recent years. SRC algorithmwas developed and successfully used for
classification. The mainidea of SRC is to represent a given test sample as a sparse
linearcombination of all training samples, then classifies the testsample by evaluating
which class leads to the minimum residual.
According to the experimental results, the proposed methodconfirms the good
performance of bathroom activitiesidentification with 81.43%.
Index Terms— audio feature extraction, classification, discretewavelet entropy, Sparse
Representation, SRC.
SN303
Bee Colony Optimization Solution to Single Machine Just In Time Scheduling Problem
V.C.Mahavishnu, A.N.Senthilvel, Dr.S.Umamaheswari.
Coimbatore institute of technology, India
Abstract— Objective of this paper is to create optimized Schedule for a set of jobs on a
single machine which minimize the total early and tardy penalty. No preemption of jobs
2014 IACSIT Singapore Conferences
21
is allowed while scheduling. During the process of scheduling, no machine idle time is
allowed and the jobs are assumed to be continuously available. This problem of reducing
the machine idle time is an NP class problem. The proposed bee schedule algorithm uses
the swarm intelligence approach to solve the single machine early/tardy scheduling
problem. The solution obtained using the proposed algorithm contains a local selective
search procedure to further improve the schedule. This helps to fine tune and achieve
more optimal solution to this scheduling problem. The pairwise interchange procedure is
also implemented on the schedule obtained in several passes till the range value is
obtained, thus attaining the best solution to the problem. The proposed algorithm is
tested and found that it outperforms the existing algorithms like dynamic programming
and genetic algorithms. Experimental analysis proves that the proposed algorithm is
suitable for similar problems also.
Index Terms— Bee Schedule algorithm, Early/Tardy Scheduling, NP Class Problem,
Single machine scheduling.
Afternoon Session 16:00pm-18:45pm
Session 4(Seminar room 5)
Optical and Wireless Communications
Opening Speech (16:00pm-16:30pm) Simplified Overlay Architecture for CognitiveWireless Systems
By Prof. Mohamed El-Tarhuni, American University of Sharjah,UAE
Session Chair:Asst.N. Nishanth, TKM College
ofEngineering(KERALA UNIVERSITY), India
OC0009
Performance Limitations of 40-Gb/s RZ-DPSK DWDM Systems Due to Nonlinear
Effects and their Mitigation
M. Arafat Rahman Khan, Tahsin Faruque and Mohammad Faisal
Bangladesh University of Engineering and Technology, Bangladesh
Abstract—Performance of 40-Gb/s return-to-zero differential phase-shift keying
(RZ-DPSK) dense wavelength division multiplexed (DWDM) systems is evaluated
numerically. The quality factor Q is measured at the receiving end of the
dispersion-managed (DM) transmission line. The performance margin due to fiber
nonlinear effects like cross-phase modulation and four-wave mixing has been
2014 IACSIT Singapore Conferences
22
investigated. The mitigation technique for these nonlinear effects has also been
explored with satisfactory results.
Index Terms—cross-phase modulation (XPM), dispersion management, DWDM,
four-wave mixing (FWM), RZ-DPSK
OC0015
Performance Analysis of Two Dimensional Wavelength/Time Encoding System for
Optical CDMA Networks
Awab Fakih,Shraddha Panbude,Santosh Jagtap
Mumbai University, India
Abstract—Optical code-division multiple access (OCDMA)combines the large
bandwidth of the fiber medium with theflexibility of the CDMA technique to achieve
the high-speedconnectivity. OCDMA has the potential to supportasynchronous, bursty
communications. The establishment ofOCDMA needs to overcome the cardinality
problem of 1-Dcodes. In order to increase the number of users, unipolar codeswith
larger capacity need to be designed. In this paper we haveanalyzed the performance of
an incoherent OCDMA schemebased on wavelength/time codes. This paper shows
that 2-Dcodes have better spectrum efficiency than 1-D OCDMA codesof the same
cardinality
Index Terms—Code-Division Multiple Access (CDMA),unipolar codes, wavelength
hopping/ time spreading (W/T),encoding, cardinality, Multiple Access Interference
(MAI).
OC0018
Performance Analysis of MIMO-OFDM Systems on Coexistence Environment in
FDD-LTE Networks
S. Malisuwan, J. Sivaraks, N. Tiamnara, and Y. Thamachareon
National Broadcasting and Telecommunications Commission, Thailand
Abstract—The explosive growth of Multiple Input Multiple Output (MIMO) systems
has recently drawn wide interests due to their capability of high data rate and wide
variety of applications. Recent advances in Long Term Evolution (LTE)
communication systems have contributed to the design of multi-user scenarios with
MIMO communication. This paper addresses the effect of coexistence of FDD-LTE
networks in 2.6GHz frequency band employing MIMO-OFDM antenna systems in
Rayleigh channel. The performance results of 𝟐 × 𝟐 MIMO-OFDM systems on the
coexistence of FDD-LTE Networks is evaluated by using simulations on MATLAB.
Index Terms—MIMO-OFDM, Performance, Coexistence, FDD-LTE.
OC0020
Enhancing Energy Efficiency in Wireless Sensor Networks using Optimal Gradient
Routing Protocol
K.Nattar Kannan , Dr.B.Paramasivan,
Manonmaniam Sundaranar University, India
Abstract—In recent day, Wireless Sensor Networks (WSNs) adequately needs
effective mechanisms for data forwarding to enhance the energy efficiency in
networks. Energy efficiency and is the critical parameters for routing in WSNs.
Routing protocols play a major role in WSNs for maintaining routes to ensure reliable
communication. In this paper, on demand acquisitions of neighborhood information is
used to find the optimal routing paths that reduce the message exchange overhead. It
optimizes the number of hops for packet forwarding to the sink node which gives a
better solution for energy consumption and delay. The proposed protocol combining
2014 IACSIT Singapore Conferences
23
on demand Multi hop information based multipath routing (OMLRP) and a gradient
based network for achieving optimal path and reduces energy consumption. The
network lifetime is prolonged up to 82% when adopting both OMLRP and gradient
based network. OMLRP provides the least routing overhead which is most suitable to
real time data delivery.
Index Terms—Wireless sensor Networks, Gradient network, energy efficiency,
optimal routing, routing overhead
OC0024
Q- Switched ultrafast TDFL using MWCNTs-SA at 2 µm region
M .T. Ahmad, A. A. Latiff , Z. Zakaria, and S. W. Harun
Universiti Teknikal Malaysia Melaka (UTeM), Malaysia.
Abstract—We demonstrate an ultrafast TDFL Q-switched pulse in 2 µm wavelength
using multi-walled carbon nanotubes (MWCNTs) as passive saturable absorber (SA).
MWCNTs film is sandwiched between two fibre connectors or patch cords after
deposited with index matching gel on the fibre ferrules. Thulium-doped fibre was
pumped using 1552 nm source in the ring cavity. The repetition rate for the pulses can
be tuned from 13.33 kHz to 21.07 kHz by varying the pump power from 307.5 mW to
371.4 mW. At the maximum power, the pulse generated energy of 87.34 nJ with
full-width at half maximum (FHWM) of 8.21 µs.
Index Terms—Multi-walled carbon nanotubes, passive saturabe absorber,
Q-switching.
SN006
A SVD-based Optical MIMO Precoding Scheme in Indoor Visible Light
Communication
Qingfeng Liu, Shuaifang Xiao, Kaizhi Huang, Zhou Zhong
NDSC,China
Abstract—A novel optical precodingscheme based on singular value decomposition
(SVD) is proposed to solve the problem that strong channel correlation causes low
spatial multiplexing gain in indoor visible light MIMO communication. This scheme
first ensures a nonnegative signal after precoding through mapping the transmit bits
into a specific symbol constellation.Then it eliminates the inter-channel interference
by decomposing the MIMO channel through SVD. Finally, it reduces the BER by
optimally allocating power among the sub-channels with the object to make the
condition of each sub-channel equal. The simulation results show that SVD-based
optical precoding scheme can significantly reduce the BER compared to ZF algorithm.
And with the enhancement of channel correlation, the BER performance remains in a
relatively low level, so it can obtain high spatial multiplexing gain under the strong
correlation channel.
Index Terms—indoor visible light communication,optical MIMO, precoding,SVD,
power allocation
SN016
Agent-based Pricing Determination for Cloud Services in Multitenant Environment.
Masnida Hussin, Azizol Abdullah, Rohaya Latip
UNIVERSITY PUTRA MALAYSIA
Abstract—Cloud computing acts as a resource sharing pool that provides services to
multiple customers, which are called tenants through the Internet. One of the big
challenges in Cloud is providing a price for leasing the services while adapting with
budget limit of the tenants. In order to meet the rapidly growing and dynamic
2014 IACSIT Singapore Conferences
24
demands of tenants, this paper proposes a pricing determination scheme for Cloud
services using mathematical analysis. It aims to balance satisfaction between tenants
and service provider in terms of budget and profit. Specifically, our pricing
determination procedure aggregated the budget constraint of tenants and service cost
to calculate the potential price of service. Service Level Agreement (SLA) is handled
by an agent for determining minimum and maximum prices that represent in a range.
Hence, the service cost that charged by the provider is identified within the price range
in order to meet tenants’ requests. The results from our simulation demonstrate that
the proposed pricing determination scheme provides better tenant satisfaction while
sustaining provider profitability.
Index Terms—Cloud computing, multitenant, pricing determination scheme, Service
Level Agreement.
SN017
6in4 Tunnel based IPv6 Transition Solution for IPv4 MobileTerminals
Jingwen Gao, Qin Zhao
Institute of Network Technology, Beijing University of Posts and
Telecommunications,China
Abstract—Along with the commercialization of IPv6 in global scale, the whole IPv6
industry chain will mature gradually. However, even after a real world deployment of
IPv6, a huge amount of legacy IPv4 devices and applications won’t disappear just
overnight. Despite the solutions and tools developed to help ease the IPv4/IPv6
transition, few of them is focused on dealing with the situation of mobile terminals
which may move among different WIFI and 3G networks. This paper documents a
novel 6in4 tunnel based transition solution for IPv4 mobile terminals to access to IPv6
resources, together with the prototype implementation and evaluation. The aim of this
paper is to provide solution for IPv4 mobile terminals, which grow in quantity
dramatically day by day, to peacefully migrate to IPv6.
Index Terms—ISATAP, mobile terminal, transition, tunnel
SN020
Monitoring Parking Space Availability via Zigbee Technology
Hee Chien Yee and Yusnita Rahayu
Universiti Malaysia Pahang, Malaysia
Abstract— With the rapid growth of vehicle availability and usage on the road in
recent years, finding a vacant car parking space is becoming more and more difficult
which resulting in a number of conflicts such as traffic problems. In this paper, a
prototype of Monitoring Parking Space Vacancy System is introduced using wireless
technologies to alleviate the traffic problems. The system includes two modules,
parking lot vacancy monitoring module, and master module. Parking lot vacancy
monitoring module consists of digital infrared sensor, liquid crystal display (LCD),
and Zigbee module which are interfaced with PIC microcontroller. Master modules
include laptop GUI display, and Zigbee modules. The user can get the status of
parking lot vacancy through the LCD of monitoring parking vacancy module. The
Zigbee transceiver on monitoring parking vacancy module which interfaced with
microcontroller is to transmit the infrared sensor data when the
digital infrared sensor detects the presence of vehicle in the parking areas and thus
provide the status of the parking lot to be displayed in master module
with Graphical User interface (GUI).
Index Terms— Parking Monitoring, Zigbee, Graphical User interface (GUI).
2014 IACSIT Singapore Conferences
25
Dinner 18:30pm-20:00pm
Day 3, Monday, May 26, 2014 –Visiting Day
The END
Conference Venue
Nanyang Executive Centre Add: 50 NANYANG AVENUESINGAPORE 639798
http://www.ntu.edu.sg/NEC/Pages/default.aspx
About Keynote Speakers
Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA
Dr. Yang Xiao currently is a full professor of Department of Computer Science at The University of Alabama. He was a voting member of IEEE 802.11 Working Group from 2001 to 2004. He served/serves as a panelist for the US National Science Foundation (NSF), Canada Foundation for Innovation (CFI)'s Telecommunications expert committee, and the American Institute of Biological Sciences (AIBS), as well as a referee/reviewer for many national and international funding agencies. His research areas are security and communications/networks. He has published more than 200 SCI-indexed journal papers (including 50 IEEE/ACM transactions papers) and over 200 EI-indexed refereed
conference papers and book chapters related to these research areas. Dr. Xiao’s research has been supported by the US National Science Foundation (NSF), U.S. Army Research, The Global Environment for Network Innovations (GENI), Fleet Industrial Supply Center-San Diego (FISCSD), FIATECH, and The University of Alabama's Research Grants Committee. He currently serves as Editor-in-Chief for International Journal of Security and Networks (IJSN) and International Journal of Sensor Networks (IJSNet) (SCI-index). Dr. Xiao delivered 15 keynote speeches for international conferences and gave more than 60 invited talks at different international institutes. Dr. Xiao had directed 9 doctoral dissertations in the past and is currently supervising 9 Ph.D. students/candidates in computer security and networking areas. Dr. Xiao also supervised 19 M.S. graduates in the past.
2014 IACSIT Singapore Conferences
26
Dr. Maode Ma Nanyang Technological University, Singapore
Dr. Maode Ma received his Ph.D. degree in computer science from Hong Kong University of Science and Technology in 1999. Dr. Ma is an Associate Professor in the School of Electrical and Electronic Engineering at Nanyang Technological University in Singapore. He has extensive research interests including wireless networking and wireless network security. He has been a member of the technical program committees for more than 150 international conferences. He has been a general chair, technical symposium chair, tutorial chair, publication chair, publicity chair and session chair for more than 50 international conferences. Dr. Ma has more than 250
international academic publications including over 100 journal papers and more than 130 conference papers. He currently serves as the Editor-in-Chief of International Journal of Electronic Transport. He serves as a Senior Editor for IEEE Communications Surveys and Tutorials, and an Associate Editor for other 4 International academic Journals. Dr. Ma is a senior member of IEEE Communication Society and IEEE Education Society. He is a Fellow of IET. He is the Vice Chair of IEEE Education Society, Singapore Chapter. He is also a Distinguished Lecturer of IEEE Communication Society.
Prof.Yulin Wang International School of Software, Wuhan University, China
Prof. Yulin Wang is a full professor and PhD supervisor in International School of Software, Wuhan University, China. He got PhD degree in 2005 in Queen Mary, University of London, UK. Before that, he has worked in high-tech industry for more than ten years. He has involved many key projects, and hold 8 patents. He got his master and bachelor degree in 1990 and 1987 respectively from Xi-Dian University, and
Huazhong University of Science and Technology(HUST), both in China. His research interests include digital rights management, digital watermarking, multimedia and network security, and signal processing. In recently 10 years, Prof. Wang has published as first author 3 books, 40 conference papers and 45 journal
papers, including in IEEE Transactions and IEE proceedings and Elsevier Journals. Prof. Wang served as editor-in-chief for International Journal of Advances in Multimedia in 2010. He served as reviewer for many journals, including IEEE Transactions on Image Processing, IEEE Signal Processing Letters, Elsevier Journal of Information Sciences. He served as reviewer for many research funds, including National
High Technology Research and Development Program of China ( ‘863’ project). Prof. Wang was the external PhD adviser of Dublin City University, Ireland during 2008-2010. He was the
keynote speakers in many international conferences. He bas been listed in Marcus ‘who’s who in the world’ since 2008.
2014 IACSIT Singapore Conferences
27
Welcome to the Upcoming Conferences:
DATE NAME PAPER WILL BE PUBLISHED BY
July 6-7,2014 Nottingham, UK
ICSIA 2014
2014 the 4th International
Conference on Signal, Image
Processing and Applications http://www.icsia.us/
International Journal of Information and Electronics Engineering at http://www.ijiee.org/ (ISSN: 2010-3719) indexed by Google Scholar, EBSCO, Electronic Journals Library, Engineering & Technology Digital Library, Crossref and ProQuest, DOAJ, Ei (INSPEC, IET).
ICROM 2014
2014 International
Conference on Robotics and
Mechatronics http://www.icrom.org/
International Journal of Materials Science and Engineering(IJMSE)(ISSN: 2315-4527) included in Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library.
ICCSS 2014
2014 4th International
Conference on Circuits,
System and Simulation http://www.iccss.org/
International Journal of Computer and Electrical Engineering(IJCEE)(ISSN: 1793-8163) included in Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library, Crossref, ProQuest, EI (INSPEC, IET), DOAJ, and Electronic Journals Library
July 28-29, 2014 Hong Kong
ICAME 2014
2014 the 3rd International
Conference on Advances in
Mechanics Engineering http://www.icame.org/
Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.
ICCCD 2014
2014 the 4th International
Conference on Computer and
Communication Devices http://www.icccd.org/
International Journal of Computer Theory and Engineering (IJCTE) included in the Electronic Journals Library, EBSCO, Engineering & Technology Digital Library, Google Scholar, INSPEC, Ulrich's Periodicals Directory, Crossref, ProQuest, WorldCat, and EI (INSPEC, IET).
ICIAE 2014
2014 International
Conference on Industrial and
Applied Electronics http://www.iciae.org/
International Journal of Computer and Electrical Engineering (IJCEE) (ISSN: 1793-8163 ) included in the Ulrich's Periodicals Directory,
Google ,, EBSCO, Engineering & Technology Digital
Library, Crossref, ProQuest, EI (INSPEC, IET), DOAJ, and Electronic Journals Library .
2014 IACSIT Singapore Conferences
28
July30-Aug1, 2014
Campinas City, Brazil
ICCEA 2014
2014 the 3rd International
Conference on Civil
Engineering and Architecture http://www.iccea.org/
International Journal of Engineering and Technology (IJET) (ISSN: 1793-8244 (Online Version); 1793-8236 (Print Version)) included in the Chemical Abstracts Services (CAS), DOAJ, Engineering & Technology Digital Library, Google Scholar, Ulrich Periodicals Directory, Crossref, ProQuest, Electronic Journals Library.
August 15-17,2014
Lijiang, China
ICSCT 2014
2014 5th International
Conference on Software and
Computing Technology http://www.icsct.org/
WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) indexed by EI Compendex, Scopus and ISI
ICINT 2014
2014 3rd International
Conference on Information
and Network Technology http://www.icint.org/
WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) indexed by EI Compendex, Scopus and ISI
ICMCT 2014
2014 International
Conference on Multimedia
and Communication
Technologies http://www.icmct.org/
WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) indexed by EI Compendex, Scopus and ISI
Sep17-18, 2014 Paris, France
ICITM 2014
2014 the 4th International
Conference on Industrial
Technology and Management http://www.icitm.org/
Accepted papers will be published in the one of the following Journals with ISSN. Journal of Industrial and Intelligent Information( JIII ) (ISSN: 2301-3745) Indexed by Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library Journal of Advanced Management Science(JAMS) (ISSN: 2168-0787) Editor-in-Chief: Prof. Rajive Mohan Pant Indexed byUlrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library
ICIVC 2014
2014 the 3rd International
Conference on Image, Vision
and Computing http://www.icivc.org/
The Proceedings of this conference will be published, and will be included in the SPIE Digital Library, andindexed by Ei Compendex and Thomson ISI.
ICSTE 2014
2014 6th International
Conference on Software
Technology and Engineering http://www.icste.org/
Lecture Notes on Software Engineering (LNSE) (ISSN: 2301-3559) included in the DOAJ, Electronic Journals Library, Engineering & Technology Digital Library, EBSCO, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest and Google Scholar.
2014 IACSIT Singapore Conferences
29
Oct 5-7, 2014 Asheville, North Carolina, U.S.A.
ICMCE 2014
2014 the 3rd International
Conference on Mechanics
and Control Engineering http://www.icmce.org/
Applied Mechanics and Materials Journal (ISSN: 1660-9336). indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org/. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.
Oct 24-26, 2014 Beijing, China
ICGIP 2014
The 2014 6th International
Conference on Graphic and
Image Processing http://www.icgip.org/
SPIE Digital Library included in the SPIE Digital Library, and indexed by Ei Compendex and Thomson ISI.I.
ICNIS 2014
2014 International
conference on Networks and
Information Security http://www.icnis.org/
Journal of Advances in Computer Networks (JACN; ISSN: 1793-8244) included in Engineering & Technology Digital Library, EBSCO, DOAJ, Electronic Journals Library, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest, and Google Scholar.
ICRCV 2014
2014 International
Conference on Robotics and
Computer Vision http://www.icrcv.org/
Accepted papers will be published in one of the following Journals with ISSN. International Journal of Computer Theory and Engineering (IJCTE, ISSN: 1793-8201) Abstracting/Indexing: Index Copernicus, Electronic Journals Library, EBSCO, Engineering & Technology Digital Library, Google Scholar, INSPEC, Ulrich's Periodicals Directory, Crossref, ProQuest, WorldCat, and EI (INSPEC, IET). Journal of Automation and Control Engineering(ISSN: 2301-3702) Abstracting/Indexing: Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library.
2014 IACSIT Singapore Conferences
30
Nov 21-23, 2014 Singapore
ICNIT 2014
2014 5th International
Conference on Networking
and Information Technology http://www.icnit.org/
Accepted papers will be published in the one of the following Journals with ISSN. International Journal of Computer and Communication Engineering (IJCCE, ISSN: 2010-3743) Abstracting/ Indexing: EI (INSPEC, IET), Google Scholar, Engineering & Technology Digital Library, ProQuest, and Crossref, DOAJ, Electronic Journals Library Journal of Advances in Computer Networks (JACN, ISSN: 1793-8244) Abstracting/ Indexing: EI (INSPEC, IET), Engineering & Technology Digital Library, DOAJ, Electronic Journals Library, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest, and Google Scholar. Journal of Communications(ISSN: 1796-2021) Abstracting/Indexing: EI Compendex; SCOPUS; ULRICH's Periodicals Directory; Google Scholar; INSPEC; etc.
ICPES 2014
2014 the 4th International
Conference on Power and
Energy Systems http://www.icpes.org/
Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.
ICMMC 2014
International Conference on
Mechanical Manufacturing
and Control http://www.icmmc.org/
Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.
Dec 18-20, 2014 Barcelona,
Spain ICPSE 2014
2014 3rd International
Conference on Power Science
and Engineering http://www.icpse.org/
Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.
2014 IACSIT Singapore Conferences
31
ICNB 2014
2014 5th International
Conference on
Nanotechnology and
Biosensors http://www.icnb.org/
Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.
ICMPM 2014
2014 International
Conference on Mechanical
Properties of
Materials(ICMPM 2014) http://www.icmpm.org/
Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.
Dec 22-24, 2014 Barcelona,
Spain
ICCNE 2014
2014 International
Conference on
Communications and
Network
Engineering(ICCNE 2014) http://www.iccne.org/
All accepted papers will be published in one of the indexed Journals after being selected. Journal of Computers (JCP, ISSN: 1796-203X, 20 Papers) Journal of Software (JSW, ISSN: 1796-217X, 20 Papers) International Journal of Future Computer and Communication (IJFCC, ISSN: 2010-3751, 30 Papers) International Journal of Computer and Communication Engineering (IJCCE, ISSN: 2010-3743, 30 Papers) Journal of Advances in Computer Networks (JACN, ISSN: 1793-8244, 20 Papers)
ICOAI2014
2014 International
Conference on Artificial
Intelligence http://www.icoai.org/
International Journal of Machine Learning and Computing (IJMLCISSN: 2010-3700) Abstracting/ Indexing: Engineering & Technology Digital Library, Google Scholar, Crossref, ProQuest, Electronic Journals Library, DOAJ and EI (INSPEC, IET).
2014 IACSIT Singapore Conferences
32
ICCSIT 2014
2014 7th International
Conference on Computer
Science and Information
Technology http://www.iccsit.org/
All accepted papers will be published in one of the indexed Journals after being selected. Journal of Computers (JCP, ISSN: 1796-203X, 20 Papers) Journal of Software (JSW, ISSN: 1796-217X, 20 Papers) Journal of Communications (JCM, ISSN: ISSN: 1796-2021, 20 papers) International Journal of Future Computer and Communication (IJFCC, ISSN: 2010-3751, 30 Papers) International Journal of Computer Theory and Engineering (IJCTE, ISSN: 1793-8201, 30 Papers) International Journal of Computer and Electrical Engineering (IJCEE, ISSN: 1793-8163, 30 Papers) International Journal of Information and Electronics Engineering (IJIEE, ISSN: 2010-3719, 20 Papers) International Journal of Information and Education Technology (IJIET, ISSN: 2010-3689, 20 Papers) Journal of Advances in Computer Networks (JACN, ISSN: 1793-8244, 20 Papers) Lecture Notes on Software Engineering (LNSE, ISSN: 2301-3559, Papers)