2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN...

31
2014 IACSIT Singapore Conferences 2 2014IACSIT Singapore Conferences 2014 the 6th International Conference on Communication Software and Networks (ICCSN 2014http://www.iccsn.org/) 2014 the 3rd International Conference on Wireless and Optical Communications (ICWOC 2014http://www.icwoc.org/) 2014 the 3rd International Conference on Intelligent Information Processing (ICIIP 2014http://www.iciip.net/) May24-26, 2014 Singapore Nanyang Executive Centre, Singapore 50 NANYANG AVENUESINGAPORE 639798 Sponsored by

Transcript of 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN...

Page 1: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

2

2014IACSIT Singapore Conferences

2014 the 6th International Conference on Communication Software and

Networks (ICCSN 2014http://www.iccsn.org/)

2014 the 3rd International Conference on Wireless and Optical Communications (ICWOC 2014http://www.icwoc.org/)

2014 the 3rd International Conference on Intelligent Information Processing

(ICIIP 2014http://www.iciip.net/)

May24-26, 2014 Singapore

Nanyang Executive Centre, Singapore

50 NANYANG AVENUESINGAPORE 639798

Sponsored by

Page 2: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

3

Welcome to IACSIT Conferences in Singapore during May 24-26, 2014

Dear Distinguished Delegates, Welcome to IACSIT Conferences in Singapore. We’re confident that over the two days you’ll get theoretical grounding, practical knowledge, and personal contacts that will help you build long-term, profitable and sustainable communication among researchers and practitioners working in a wide variety of scientific areas with a common interest in Wireless and Optical Communications, Communication Software and Networks, Intelligent Information Processing. After more than half a year’s preparation, we finally will have those conferences to be held in Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent papers were accepted and published finally. Congratulations for those papers. On behalf of IACSIT organization, I would like to thank all the authors as well as the Program Committee members and reviewers. Their high competence, their enthusiasm, their time and expertise knowledge, enabled us to prepare the high-quality final program and helped to make the conference become a successful event. Once again, thanks for coming to IACSIT conferences, we are dedicated to higher and better international conference experiences. We will sincerely listen to anysuggestion and comment; we are looking forward to meeting you next time.

Yours Sincerely, Ms. Sophie Tsang Director of Conference Department II, IACSIT

Page 3: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

4

ANNOUNCEMENT

*ICCSN 2014 conference papers were selected and published in the one of the following Journals, authors will get the journal onsite. Journal of Communications (JCM) (ISSN: 1796-2021; DOI: 10.12720/jcm) Journal of Advances in Computer Networks (JACN)(ISSN: 1793-8244) International Journal of Future Computer and Communication(IJFCC)(ISSN:

2010-3751) International Journal of Computer and Communication Engineering(IJCCE)(ISSN:

2010-3743) Lecture Notes on Software Engineering (LNSE)(ISSN: 2301-3559) International Journal of Signal Processing Systems (IJSPS)(ISSN: 2315-4535) *ICWOC 2014 conference papers were selected and published in the volume of International Journal of Computer and Communication Engineering (IJCCE)(ISSN: 2010-3743), authors will get the journal onsite. *ICIIP 2014conference paperswere selected and published in the volume of International Journal of Signal Processing Systems (IJSPS) (ISSN: 2315-4535),authors will get the journal onsite.

*One best presentation will be selected from each session, and the best one will be announced and award the certificate at the end of each session.

IACSIT Publication committee

Page 4: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

5

Instructions for Oral Workshop Devices Provided by the Conference Organizer:

Laptops (with MS-Office & Adobe Reader)

Projectors & Screen

Laser Sticks

Materials Provided by the Presenters:

PowerPoint or PDF files

Duration of each Presentation (Tentatively):

Regular Oral Session: about 15 Minutes of Presentationincluding Q&A.

Keynote Speech: 45 Minutes of Presentation including Q&A.

Author should copy his presentation file to conference laptop 10 minutes before

his session.

Page 5: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

6

Conference Schedule Day 1, Saturday, May 24, 2014–Onsite Registration Only

Registration: Hotel Lobby

10:00a.m.-12:00p.m. 14:00p.m.-17:00p.m

Arrival, Registration and Conference materials collection **Certificate for Participant can be collected at the registration counter**

Day 2, Sunday, May 25, 2014– Presentation Day

Simple Version:

Lecture Room 6 09:00a.m.-11:40a.m.

Morning

09:00am-09:05am Opening Remarks

09:05am-09:50am

Keynote Speech I:

Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA

09:50am-10:05am Coffee Break

10:05am-10:50am

Keynote Speech II:

Dr. Maode Ma Nanyang Technological University, Singapore

10:50am-11:35am

Keynote Speech III:

Prof.Yulin Wang International School of Software, Wuhan University, China

11:35am-11:45am Plenary Photo

Lunch 12:00pm-13:30pm

Page 6: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

7

13:00pm-15:45pm

Seminar room 4 Seminar room 5

Session 1

Information Processing

Session 2

Computer Systems and Applications

15:45pm-16:00pm Coffee Break

16:00pm-18:45pm Session 3

Optical and Wireless Communications

Session 4

Security and Reliability

Dinner 18:30pm-20:00pm

Day 3, Monday, May 26, 2014 –Visiting Day

10:00am-12:00pm: Campus Visiting & Lab Tour.

Full Schedule:

Lecture room 6

Plenary Speech+ Plenary Photo 09:00am-11:40am

Morning

09:00am-09:05am Opening Remarks

09:05am-09:50am

Keynote Speech I:

Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA

09:50am-10:05am Coffee Break

10:05am-10:50am

Keynote Speech II:

Dr. Maode Ma Nanyang Technological University, Singapore

Page 7: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

8

10:50am-11:35am

Keynote Speech III:

Prof.Yulin Wang International School of Software, Wuhan University, China

11:35am-11:45am Plenary Photo

Lunch 12:00pm-13:30pm

Afternoon Session

13:00pm-15:45pm

Session 1(Seminar room 4)

Information Processing

Opening Speech (13:00pm-13:30pm) Compensation of Nonlinearities in ΣΔ Modulators Using Digital Assisted Analog Electronics Approach

By Dr.Rashad Ramzan, UAE University, UAE

Session Chair: TBA

IP0002

Composite Kernel Machines on Kernel Locally Consistent Concept Factorization

Space for Data Mining

Shian-Chang Huang, Lung-Fu Chang and Tung-Kuang Wu

National Changhua University of Education, Taiwan

Abstract—This paper proposes a novel approach to overcome the main problems in

high-dimensional data mining. We construct a composite kernel machine (CKM) on a

special space (the kernel locally consistent concept factorization (KLCCF) space) to

solve three problems in high-dimensional data mining: the curse of dimensionality,

data complexity and nonlinearity. CKM exploits multiple data sources with strong

capability to identify the relevant ones and their apposite kernel representation.

KLCCF finds a compact representation of data, which uncovers the hidden

information and simultaneously respects the intrinsic geometric structure of data

manifold. Our new system robustly overcomes the weakness of CKM, it outperforms

many traditional classification systems.

Index Terms—data mining, multiple kernel learning, kernel locally consistent

concept factorization, manifold learning, support vector machine

Page 8: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

9

IP0003

A Robust Decentralized Controller for Stand-alone Wind systems and Hybrid

Wind-Diesel systems Using Type-2 Fuzzy Approach

R.Vijaya Santhi, K.R.Sudha, and A. Chandra Sekhar

Andhra University, India

Abstract—In the present paper, a Non-Conventional source, wind system is

considered for Load Frequency Control (LFC) problem. Modeling of a stand-alone

wind system and a Hybrid wind-diesel system is done. In both the cases variable

power consumptions as well as the intermittent wind power may cause a large

fluctuation of system frequency. The system will lose stability, if the system

frequency is not controlled. In addition, variation of system parameters, unpredictable

power demands, fluctuating wind power etc., cause various uncertainties in the

system. Literature shows Fuzzy controllers including Super Magnetic Energy Storage

(SMES) units are suitable for highly chaotic systems. In the present paper, Fuzzy

controller, which is termed as Type-1 Fuzzy including SMES units, is designed based

on the analytical structure. Type-1 fuzzy can further be modified to Type-2 fuzzy by

giving grading to the membership functions. Based on the same analytical structure, a

robust decentralized control scheme is designed using Type-2 Fuzzy logic controlled

SMES Controller. In the present paper it is observed that dynamic response with

Type-2 Fuzzy controller for change in load and change in wind power is better when

compared with conventional SMES controller and Type-1 fuzzy logic SMES

controller.

Index Terms—Load Frequency Control (LFC), Stand-alone wind system, Hybrid

Wind Diesel system, Type-2 Fuzzy Logic SMES Controller

IP0006

Illumination Analysis of Inactive Indoor Scenes with the Discrete Fourier Transform

of Structural Distortions

Weng Kin Lai, Li Li Lim & Tomas H. Maul

Tunku Abdul Rahman University College, Malaysia

Abstract—Light has always played a very important role in human economic

activities. Nevertheless, there are only a few popular sources of electric light. While

incandescent amps have been popular in the past, they are not energy efficient. In

recent years, fluorescent lamps are becoming popular as an alternative and this is

especially true for schools and businesses. Probably due to these developments,

there has been some significant interest in examining the consistency of the light

intensity from electric lamps. While some have looked at this as a means to quickly

identify the system components of fluorescent lamps, others have analyzed this to

help identify the liveness of the scene. High speed video cameras can easily detect

variations in the illumination levels from fluorescent lamps, but they can be quite

costly to operate. Moreover, most popular security video cameras can only operate

up to a maximum speed of 30 frames per second. This paper examines the use of

Structural Distortion as an image quality measure to detect flickering on video signals

from the video cameras at low frame rates. Future research is outlined at the end of

the paper.

Index Terms—Lighting systems, image quality metrics, illumination analysis,

incandescent lamps, fluorescent lamps.

IP0010 Contourlet Tranform Based Human Emotion Recognition System

R. Suresh, P. Elakkiya, and S. Audithan

Page 9: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

10

Prist University, India

Abstract—In this study, an automated human emotion recognition system based on

contourlet transform is presented. The various human emotional stats such as

surprise, sadness, disgust, anger, fear, happiness and neutral are analyzed. The

emotional states are identified by the motion of the muscles in the skin of the human

face. In order to classify the emotional state, the patterns generated by the muscles

motions should be represented efficiently. In the proposed approach, these patterns

are characterized by contourlet transform. The high dimensional contourlet

transformed face image is translated into low dimensional space in the feature

extraction stage. This can be achieved by taking the average of contourlet coefficients

in each sub-band and fed into the classifier. The number of features used for

classification depends on the level of decomposition used while transforming the face

image by contourlet transform. The emotional states are classified by nearest

neighbor classifier and the classifier performance is analyzed by various distance

measures; euclidean, city block, cosine and correlation efficiently. The results show

that the proposed approach based on contourlet transform produces over 80%

recognition accuracy on JApanese Female Facial Expression (JAFFE) database.

Index Terms—contourlet transform, nearest neighbour classifier, facial expressions,

emotion recogniton

IP0013

Boundary Detection of Altered Region by Differential Features on Camera Response

Function

Hirokazu KATO, Toshiyuki NAGAO, Hideaki FUJIWARA, and Katsuya KONDO

Kondo Lab., Dept. Information and Electronics, Tottori University, Japan

Abstract—An image splicing can be easily made by a skilled image editor, and

verification of authentic image has become important. In this paper, we propose a

detection method for splicing boundaries that uses uniformity on camera response

function (CRF) in an image. This uniformity is observed as differential features of

CRF. In altered image, the non-uniformity of CRF mostly appears on the edges of a

splicing region. The characteristics of CRF extracted from edges in an image differ

between an altered region and an authentic region. We analyze these characteristics

by using QR map. The QR map represents the relation between this features and

image intensity. An authentic boundary has the characteristics of a common CRF

within an image, but a splicing boundary is not so. We show the tendency of authentic

boundaries in QR map, and we argue about the method of estimating whether a target

boundary is spliced by evaluating the consistency of QR map.

Index Terms—Camera Response Function, Splicing Boundary, QR map, Digital

Forensics

IP0015

Realizations of Systems with Point Delays

M. De la Sen and R. Nistal

UPV, Spain

Abstract—Results on realization theory of dynamic linear systems with lags are

obtained through Laurent expansions. The results are related to controllability and

observability properties as well as to mismatching among a real transfer matrix and

its nominal counterpart.

Page 10: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

11

Index Terms—realization theory, minimal partial realizations, Hankel matrices, point

delays

IP0017

Adjustment of Observation Probabilities during the lifetime of Viterbi Algorithm in

Unstable Environments

Nader Rezazadeh and Omid SojodiShijani

Department of Computer, Science and Research Branch- Islamic Azad University

Qazvin, Iran

Abstract—Typically in learning and determining the parameters in various

applications of hidden Markov model, like the decoding problem solving in Viterbi

algorithm, statistics such as the average are used. In this context, to obtain the

average, the stable hypotheses for the data generation process are considered. While

in an unstable environment, model parameters such as the value of probability of

observing event parameter generated by the state, changes directly between the

successive events. For this purpose in this article an adjuster parameter of event

probability has been provided in order to adjust and change the parameters after each

event during the lifetime of Viterbi algorithm. Test results on the real data sets show

the superior performance of the proposed method in terms of accuracy than the other

methods.

Index Terms—Statistical Adjustment, Hidden Markov Model, Viterbi algorithm

IP1005

Literature Mining of Protein Phosphorylation Using Dependency Parse Trees

Minghui Wang

University of Science and Technology of China

Abstract—As one of the most common post-translational modifications (PTMs),

protein phosphorylation plays an important role in various biological processes, such

as signaling transduction, cellular metabolism, differentiation, growth, regulation and

apoptosis. Protein phosphorylation is of great value not only in illustrating the

underlying molecular mechanisms but also in treatment of diseases and design of new

drugs. Recently, there is an increasing interest in automatically extracting

phosphorylation information from biomedical literatures. However, it still remains a

challenging task due to the tremendous volume of literature and circuitous modes of

expression for protein phosphorylation. To address this issue, we propose a novel

text-mining method for efficiently retrieving and extracting protein phosphorylation

information from literature. By employing natural language processing (NLP)

technologies, this method transforms each sentence into dependency parse trees that

can precisely reflect the intrinsic relationship of phosphorylation-related key words,

from which detailed information of substrates, kinases and phosphorylation sites is

extracted based on syntactic patterns. Compared with other existing approaches, the

proposed method demonstrates significantly improved performance, suggesting it is a

powerful bioinformatics approach to retrieving phosphorylation information from a

large amount of literature. A web server for the proposed method is freely available at

http://bioinformatics.ustc.edu.cn/pptm/.

Index Terms—Phosphorylation, Dependency parse tree, Text mining, Systems

biology

IP1006

A novel CNA/LOH detection algorithm using normal-tumor SNP-array data

Ao Li

University of Science and Technology of China

Page 11: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

12

Abstract—Recently single nucleotide polymorphism (SNP) genotyping arrays

attracts lots of attentions, which can provide high resolution profiling chromosomal

rearrangements. It facilitates whole genome detection of two common aberrations:

copy number alteration (CNA) and loss of heterozygosity (LOH), which are

frequently found in cancer cells. At present, many computational approaches have

been introduced for this purpose, however, most of them fail to incorporate the

intrinsic genetic relationship between tumor and paired normal SNP-array data,

which may greatly improve the performance in identifying CNA and LOH in cancer

genome. To address this issue, we proposed a novel algorithm to handle paired

SNP-array data from both tumor and paired normal samples, which can make best use

of the genotype information to assist the detection. This algorithm employs the

statistical framework of HMM and EM method to precisely model the relationship

between normal and tumor SNP-array data. Results on public datasets show that our

method outperforms all other investigated algorithms with precise parameter

estimation and sensitive aberration identification.

Index Terms—SNP-array, tumor, chromosomal aberration, bioinformatics, HMM

Afternoon Session 13:00pm-15:45pm

Session 2(Seminar room 5)

Security and Reliability

Opening Speech (13:00pm-13:30pm)

Session Chair:Dr. Masnida Hussin,UNIVERSITY PUTRAMALAYSIA

IP0018

Analysis of Operation Errors for Fault Injection Attack

Masaya Yoshikawa and Hikaru Goto

Meijo University, Japan

Abstract—Although the encryption standards are theoretically safe, it has been recently

reported that confidential information could be illegally revealed when the encryption

standards are embedded in the electronic devices. In particular, the menace posed by

fault injection attacks has become extremely serious. To guarantee the safety of

electronic devices in the future, into which cryptographic circuits have been

incorporated, fault injection attacks must be thoroughly studied. This study elucidates

the tendency of fault injection.

Index Terms—fault injection attack, tendency of an operation error, glitch generation,

Page 12: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

13

tamper resistance, advanced encryption standard

OC0003

Sequence Number Alteration by Logical Transformation (SALT): A Novel Method for

Defending Session Hijacking Attack in Mobile Ad hoc Network.

N. Nishanth and Dr. S. Suresh Babu

TKM College of Engineering(KERALA UNIVERSITY), India

Abstract—TCP attacks are the major problem faced by Mobile Ad hoc Networks

(MANETs) due to its limited network and host resources. Although the session hijack

attack is not in the forefront of everyone’s mind, it still remains a commonly used

attack in MANET. Session hijack attacks are defined as taking over an active TCP/IP

communication session without their permission or knowledge. When implemented

successfully, attackers assume the identity of the compromised user, enjoying the same

access to resources as the compromised user. Network protocols like FTP, Telnet, and

rlogin are especially attractive to the attacker, because of the session oriented nature of

their connections, and lack of implementation of any security during logon,

authentication, or data transmission. This paper introduces a novel method for

defending session hijacking attack in MANET: Sequence number Alteration by

Logical Transformation (SALT). Based on the comprehensive evaluation based on

experiments, it is showed that SALT can successfully defend session hijacking attack

under diverse mobile multi-hop network environment with low communication,

computation, and memory overhead.

Index Terms—TCP attacks, Mobile Ad hoc Networks, Session hijacking, Sequence

number, logical transformation.

OC0008

Imposter Detection in Mobile Wireless Sensor Networks

Ebrahim A. Alrashed and Mehmet Hakan Karaata

Kuwait University, Kuwait

Abstract—Mobile wireless sensor networks (MWSNs) are wirelessnetworks of small

sensors moving around in a specified coveragearea, conveying their readings and data

to static or mobile basestations. In contrast to a static wireless sensor network where

thefixed node position can be used to authenticate a sensor node, thechanging position

of a node in a MWSN cannot be used in theauthentication process. This can lead to

imposters posing aslegitimate nodes anywhere in the network. An imposter can use

theidentity of a legitimate node to communicate within the network andeavesdrop on

confidential communication or to send falseinformation. In this paper, we propose a

novel scheme whichemploys nonce-values and blackout-time mechanisms to

detectimposters in the network. The proposed scheme employs aquarantining

mechanism to quarantine the detected imposters, and anode-restoration mechanism to

appropriately authenticate and

restore quarantined nodes into the network.

Index Terms—imposter detection, mobile sensor networks, wirelessnetwork security,

wireless networks

OC0028

Outage Analysis of Relay-Assisted BPSK-SIM BasedFSO Systems over Strong

Atmospheric Turbulence with Pointing Errors

Prabu Krishnan, Sriram Kumar

National Institute of Technology, India

Page 13: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

14

Abstract—Natural turbulence and scintillation are the major challenges in practical

deployment of free space optical (FSO) communication systems. In this paper, a

parallel relay assisted FSO system is considered to deal with these challenges. This

paper investigates the end-to-end performance of the multihop parallel relay assisted

FSO system over a strong atmospheric turbulence channel with misalignment fading.

The analysis is carried out for system employing decode-and-forward (DF) relays and

for strong turbulence channel which can be modeled by the gamma-gamma

distribution. A novel closed-form expression for the outage probability is derived. The

results are compared with the direct transmission system.

Index Terms—Binary phase shift keying subcarrier intensity modulation, free space

optics, outage probability, parallel relay, strong atmospheric turbulence.

OC3006

Carrier class Availability Prediction for Hybrid FSO/RF System in Heavy Rainfall

Regions based on ITU-R Models

Ahmed Basahel and Wajdi Al-Khateeb

INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA, Malaysia

Abstract—Availability is considered as the main parameter of evaluating a Hybrid

FSO/RF link quality. An accurate carrier class availability prediction of Hybrid

FSO/RF is needed. In tropical regions, among different weather influences, rain plays a

major role. Precipitation decrees are available for frequencies above 10 GHz. In this

paper we will analyze the effect of rain on Hybrid FSO/RF to find the optimum

operating frequency to back-up the FSO link besides tradeoff between speed of RF and

link availability of FSO in tropical environment; we will also provide better prediction

of link availability. ITU-R specific rain attenuation of FSO and RF models has been

used for the analysis. From the results, a 30 GHz and below are suggested to be used as

a back-up of FSO link to achieve carrier grade availability under the impact of rain.

Index Terms—Carrier grade availability, heavy rain attenuation hybrid FSO/RF, ITU-R

specific rain attenuation models.

SN005

Cooperative Interference based on Evolutionary Game in Wire-tap Channel

Kaizhi Huang, Ying Hong, Wenyu Luo, Shengbin Lin

National Digital Switching System Engineering & Technological Research

Center,China

Abstract—In wireless network, when using classical game theory to study physical

layer security, the energy-limited transmission nodes tend to choose non-cooperative

strategy in order to maximize their own secrecy rate, resulting in reduced network

secrecy rate. To solve this problem, the paper proposes a cooperative interference

method for physical layer security based on evolutionary game. First, it defines the

strategies (sending artificial noise or signal) and benefits (secrecy rate under different

strategy combination) according to the evolutionary game. Then, the transmission

nodes adjust strategy to maximize benefits based on current network state and

difference between cooperation benefit and average expected benefit; Finally, the

conditions that the transmitting nodes can cooperate with each othercould achieve, and

the network is evolution from an unstable state to a stable cooperative state to improve

the secrecy rate of the system. Simulation and analysis results show that under the

Gaussian channel, compared to the traditional game method, the network secrecy rate

of the proposed method can be improved 1bit/s/Hz.

Index Terms—secrecy rate; evolutionary game; cooperative interference; eavesdropper

Page 14: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

15

SN007

Availability Enhancement Model for Virtual Machines over Hypervisor Attacks

Chandrasekaran Subramaniam and Arthi Ravishankar

SRM University

Abstract—The objective of the research work is to propose an enhanced availability

model for the virtual machines over hypervisor attacks. In recent years, virtualization

has turned out to be a most promising area in the field of Information Technology.

However, there is always security threats existing in all domains and virtualization is

not new to it. Among the various components that lie in virtual environment,

hypervisors have always been an ideal target for attack as they provide a single entry

point into the virtual environment. Designing a model that could stand these security

threats has always been a challenge. The proposed work focuses on the architecture of

the virtual environment, the limitations of the various physical resources to be

virtualized and addresses various security related issues. It analyses various attack

vectors in a quantitative manner individually and integrates all the recovery actions to

enhance the overall availability of the virtual machines.

Index Terms—Hypervisor, Hypervisor Attack, Security, Virtual Machines,

Virtualization

SN008

Performance of MIMO-OFDM for LTE under Jamming

Jesada Sivaraks, Noppadol Tiamnara, Yodsapon Thamachareon and Nattakit

Suriyakrai

National Broadcasting and Telecommunications Commission, Thailand

Abstract—Multple Input Multiple Output (MIMO) is a major innovation and attractive

solution in LTE systems and if used in combination with Orthogonal Frequency

Division Multiplexing (OFDM), provides better signal performance or higher data

throughput achieving higher Quality of Service (QoS) and spectral efficiency.

However, any digital communication network that requires synchronization is

vulnerable to jamming. Jamming is intentionally transmitting continuous high power

noise across entire bandwidth near transmitting and receiving nodes which disturb

network communications resulting in performance degradation. Especially in the case

of military digital communication systems which must be robust under hostile

jamming. This paper provides a procedure for evaluating the performance of STBC

MIMO-OFDM operating in the presence of partial band noise jamming. By MATLAB

simulations, we consider Alamouti’s 𝟐 × 𝟐 MIMO systems between Signal to Noise

Ratio (SNR) and Symbol Error Rate (SER) for BPSK modulation under several

partial-band jamming factors 𝛒. It has been found that the performance of the systems

is severely deteriorated in the presence of jamming power.

Index Terms—Alamouti Space Time Block (STB) code, MIMO-OFDM, LTE,

Jamming.

SN015

Analysis on Extraction of Modulated signal using Adaptive filtering algorithms against

ambient noises in underwater communication

Sakthivel Murugan S, Natrajan V, Prethivika Srinivasan,

SSN College of Engineering/Department of ECE, Chennai, India

Abstract—Acoustic signals on transmission in underwater channels are often prone to

corruption by ambient noises, wind interference and other random sources of

Page 15: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

16

disturbance. Adaptive filters can be used to extenuate the effects of ambient noise in

acoustic signals. An effective technique for denoising the degraded acoustic signals

using adaptive filters has been proposed. Adaptive techniques, such as Least Mean

Square (LMS), Normalized Least Mean Square (NLMS), and Kalman Least Mean

Square (KLMS) have been analyzed based on their performance, with the help of

characteristics like Signal to Noise Ratio (SNR) and Mean Square Error (MSE) for

various wind speeds ranging from 2m/s to 6m/s. An exhaustive set of data, collected

using a custom made fixture containing two hydrophones, from shallow water regions

in Bay of Bengal, have been used to verify the efficacy of this method. According to

the adaptive filter technique, the filter equations and weight update equations are

processed continuously till the error signal approaches zero and the desired signal is

extracted. Based on the adaptive technique used, the filter equations and the weight

update equations vary accordingly. Simulation results show that Kalman Least Mean

Square (KLMS) technique produces notable results compared to Normalized Least

Mean Square (NLMS) and Least Mean Square (LMS) techniques even if the Signal to

Noise Ratio (SNR) value is remarkably low. From the simulation, it is observed that

the output of the Kalman Least Mean Square (KLMS) filter converges to the desired

useful signal faster than the other adaptive filter techniques. This result is further

supported by the fast converging Mean Square Error (MSE) signal of Kalman Least

Mean Square (KLMS) compared to the other adaptive filter techniques discussed. Thus

adaptive filtering eliminates all the undesired noise signals and reconstructs the desired

useful signal against all sources of ambient noise.

Index terms -- Adaptive filters, Mean Square Error, Signal to Noise Ratio, Underwater

acoustic signal.

SN304

Formal Analysis of a Ranked Neighbour MANET Protocol Suite

Shamim H Ripon, Syed Fahin Ahmed, Afroza Yasmin, Yaminar Rashid and K. M.

Imtiaz-UD-Din

East West University, Bangladesh

Abstract—Formal verification plays an important role in development and application

of safety critical systems. Formalized verification techniques to analyze the security

and the safety properties of communication protocols increase and confirm the protocol

confidence The advancement of mobile and wireless communication technologies in

recent years introduced various adaptive protocols to adapt the need for secured

communications. Security is a crucial success factor for any communication protocols,

especially in mobile environment due to its ad hoc behavior. SPIN is a powerful model

checker that verifies the correctness of distributed communication models in a rigorous

and automated fashion. This paper presents a SPIN based formal verification approach

of a security adaptive protocol suite. The protocol suite includes a neighbor discovery

mechanism and routing protocol. The protocol suite is encoded into SPIN and is

exhaustively checked for various temporal properties ensuring the applicability of the

protocol suite in real-life applications.

Index Terms—Ranked neighbor, SPIN, model checking, loop freedom.

Page 16: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

17

Coffee Break 15:45pm-16:00pm

Afternoon Session 16:00pm-18:45pm

Session 3(Seminar room 4 )

Computer Systems and Applications

Opening Speech (16:00pm-16:30pm) Performance Evaluation of Social Relation Opportunistic Routing (SROR) in Dynamic Social Networks

By Dr. Ka Wai Gary Wong, The Hong Kong Institute of Education, Hong Kong

Session Chair:Prof. Weng Kin Lai,Tunku Abdul Rahman

University College, Malaysia

IP0005

The Implementation of Simplified Universal Assembler in Forth Assembly Language

Gang-Jeng Huang, Shiuh-Ku Weng and Jyi-Jinn Chang

Chung Cheng Institute of Technology, National Defense University, Taiwan

Abstract—In this paper, SDK (Software Development Kits) and IDE (Integrated

Development Environment) of forth assembly language is designed. It can be assembled

to different machine codes and would replace the traditional assembly languages, such as

x86, ARM, MIPS and so on. The forth language is a kind of algebra language that is

easier to code and to debug the programs. Therefore, it is a good tool language to be

taught in the courses of computer organization and architecture for the students learning

the low-level language easily and quickly.

Index Terms—Forth, Assembly Language, Machine Code, Assembler

IP0019

Short-Term Traffic Prediction Using Rainfall

Haiyun Lu

SAP Research & Innovation, Singapore

Abstract—We propose an approach to predict short-term travel time for expressways

using rainfall data. The rainfall rate is quantitatively related to the travel time and is used

to perform the prediction. The proposed approach is experimented on real data collected

in Singapore. Results show that it performs better compared to three baseline

Page 17: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

18

approaches. It is also shown that the proposed approach is applicable and effective in

Singapore.

Index Terms—intelligent transportation systems, traffic prediction, travel time

prediction, weather correlation, impulse response.

IP0023

A Comparative Performance of Various Analysis-synthesis Techniques

Ankita N. Chadha, Jagannath H. Nirmal, and Pramod Kachare

UNIVERSITY OF MUMBAI, INDIA

Abstract—In this paper, we present a comparative performance of the various

analysis-synthesis techniques which separate the acoustic parameters and allow the

reconstruction of the speech signal, which is very close to original speech. The

analysis-synthesis of speech signal is used for speech enhancement, speech coding,

speech synthesis, speech modification and voice conversion. Our comparative study

includes Linear Predictive Coder, Cepstral Coder, Harmonic Noise Model based coder

and Mel-Cepstrum Envelope with Mel Log Spectral Approximation. The comparative

performance of these vocoders is evaluated using different objective measures namely

line spectral distortion, Mel cepstral distortion and signal to noise ratio. Along with

objective measures, subjective measure, mean opinion score is also considered to

evaluate the quality and naturalness of the resynthesized speech in term of original

speech.

Index Terms—acoustic parameters, complex cepstrum, harmonic noise model, linear

predictive coefficients, mel-cepstrum envelope, mel log spectral approximation, vocoder

IP0024

Non-Invasive Monitoring of People with Disabilities via Motion Detection

Lau Bee Theng, Ong Chin Ann and Fernando Anddie Putra

SWINBURNE UNIVERSITY OF TECHNOLOGY SARAWAK, Malaysia

Abstract—This research developed a prototype to recognize the activities of people with

social interaction and communication impairments using two commercial grade infrared

motion sensing input devices. The model uses skeletal joints in the form of (x,y,z)

coordinates to perform computationally inexpensive and efficient real time indoor

monitoring. The prototype works well for a room with the size of 15 ft. by 15 ft. where it

can detect two human subjects simultaneously. The prototype promotes non-invasive

monitoring, no wearable sensor is required on the person under monitoring and no

identifiable face images are stored. The evaluation shows that it is able to recognize the

accident-critical activities, self-injurious activities and inactivity with satisfactory

recognition and false alarm rates.

Index Terms—activity recognition, human body joints, gesture, accident-critical,

self-injurious, inactivity, fall detection, people with disabilities, motion sensor.

IP1003

Tour Pinoy Recognition

Clarence C. Robas, James Michael A. Adoremos, Kimberly S. Morales, Joanna C. Unida

and Raymond S. Macatangga, DIT

Our Lady of Fatima University, Philippines

Abstract—Tourism business faces many challenges brought by modern technology (i.e.

Internet). As online reservation and booking are growing into a more convenient tool for

tourists, we consider developing an image recognition application which helps in

Page 18: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

19

promoting the local tourism in the Philippines. While several of these image recognition

applications are being implemented, our system introduces another way of delivering

tourism facts focusing on the selected tourist destinations by just uploading a photo. The

system responds useful information needed by the tourists. The Tour Pinoy covers the

top five (5) tourist destinations in the Philippines provided by the Haranah Tours

Corporation, a duly licensed tourist transport operator accredited by the Department of

Tourism Philippines. Based on the criteria used by the proponents and the

implementations suggested, the proponents found out that Tour Pinoy helps in promoting

local tourism in the Philippines.

Index Terms—Tourism Promotion, Artificial Intelligence, Computer Vision, Image

Recognition

IP3001

Matlab Based Design of Adaptive Filters using least Pth norm : FIR vs IIR

Srishtee Chaudhary

Government Polytechnic College for Girls, Patiala, Punjab, India

Abstract—Adaptive filters are considered nonlinear systems; therefore their behavior

analysis is more complicated than for fixed filters. As adaptive filters are self designing

filters, their design can be considered less involved than in the case of digital filters with

fixed coefficients. The paper discusses adaptive filters, adaptive filtering with various

approaches, optimization methods, algorithms for a filter, IIR and FIR filter designs, in

order to improve a prescribed performance criterion. Further least Pth norm approach is

compared for both FIR and IIR filter. Since no specifications are available, the adaptive

algorithm that determines the updating of the filter coefficients requires extra

information that is usually given in the form of a signal. This signal is in general called a

desired or reference signal, whose choice depends on the application.

Index Terms—Adaptive filters, FIR, IIR, least pth

SN307

Semantic Concepts Classification on Outdoor Scene Images Based on Region-Based Approach

Kyawt Kyawt Htay

University of Computer Studies Mandalay (UCSM), Myanmar

Abstract—Outdoor scene analysis is a complex problem for both image processing and

pattern recognition domains. There are two methods of segmenting images to look for

objects in an image. One is block based and one is region based. Region-based method

can provide some useful information about objects even though segmentation may not be

perfect. In this paper, propose a method for semantic concepts classification on outdoor

scene images based on region-based approach. The basic idea of this approach is to

classify local image regions into semantic concept classes such as tree, sky and road etc.

There are three phases in this approach: segmentation phase, features extraction phase

and classification phase. In segmentation phase, Modified Marker-Control Watershed

algorithm (MCWS) is used. Second, texture feature vectors are extracted from

segmented regions by Gray-Level Co-occurrence Matrix (GLCM). Finally, classification

is performed by 3-layers Artificial Neural Network (ANN). The propose method is

applied on real scene images dataset.

Index Terms—Marker-Controlled Watershed, Outdoor Scene Analysis, Texture

SN021 The Challenges of Management Information System in Academic Work by Cloud

Computing Technology

Thassanee Rodmunkong, Panita Wannapiroon and Prachyanun Nilsook

Page 19: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

20

King Mongkut’s University of Technology North Bangkok (KMUTNB), Thailand.

Abstract— The objectives of this research were 1) to synthesize the features of cloud

computing management information system in academic work, 2) to synthesize the

elements of cloud computing management information system in academic work, 3) to

develop models of cloud computing management information system in academic work,

4) to evaluate the models of cloud computing management information system in

academic work.

The research findings were as follows: 1) the models of management information system

in academic work by cloud computing technology comprised of 6 elements: Cloud

Computing Technology, Curriculum, Center, Connectivity, Client and Consumer, which

are called C6. It is a very popular technology in the present time to be used for

administration in academic work of Thailand’s Universities. It is the integration and

sharing common resources of computer technology including software, hardware and

database, 2) the results evaluated by 5 experts showed that the model of cloud computing

management information system in academic work had appropriateness at a high level.

Index Terms— Cloud Computing, Management Information System, Academic

SN024

Efficient Feature Extraction for Bathroom Activities

Identification Based on Sound

Chaw Su, Moe Moe Aye

Department of InformationTechnology Engineering, Mandalay Technological

University,Myanmars

Abstract— Audio feature extraction plays an important role inanalyzing and

characterizing audio content. Moreover, theextracted feature should be robust to various

distortions andhave a good reliability property for a good classification system. This

paper describes efficient feature extraction for anautomated bathroom activities

identification system based onsound. To obtain a useful feature extraction in this system,

discrete wavelet entropy features are used. The popularity ofWavelet Transform is

growing because of its ability to reducedistortion in the reconstructed signal while

retaining all thesignificant features present in the signal. In this paper, thepersonal

hygiene activities such as showering, brushing of teeth, washing hands, flushing and

urination are studied and modeled. Then, the system is designed with the Sparse

RepresentationClassifier (SRC) for the efficient classification. SRC havereceived a great

deal of attention in recent years. SRC algorithmwas developed and successfully used for

classification. The mainidea of SRC is to represent a given test sample as a sparse

linearcombination of all training samples, then classifies the testsample by evaluating

which class leads to the minimum residual.

According to the experimental results, the proposed methodconfirms the good

performance of bathroom activitiesidentification with 81.43%.

Index Terms— audio feature extraction, classification, discretewavelet entropy, Sparse

Representation, SRC.

SN303

Bee Colony Optimization Solution to Single Machine Just In Time Scheduling Problem

V.C.Mahavishnu, A.N.Senthilvel, Dr.S.Umamaheswari.

Coimbatore institute of technology, India

Abstract— Objective of this paper is to create optimized Schedule for a set of jobs on a

single machine which minimize the total early and tardy penalty. No preemption of jobs

Page 20: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

21

is allowed while scheduling. During the process of scheduling, no machine idle time is

allowed and the jobs are assumed to be continuously available. This problem of reducing

the machine idle time is an NP class problem. The proposed bee schedule algorithm uses

the swarm intelligence approach to solve the single machine early/tardy scheduling

problem. The solution obtained using the proposed algorithm contains a local selective

search procedure to further improve the schedule. This helps to fine tune and achieve

more optimal solution to this scheduling problem. The pairwise interchange procedure is

also implemented on the schedule obtained in several passes till the range value is

obtained, thus attaining the best solution to the problem. The proposed algorithm is

tested and found that it outperforms the existing algorithms like dynamic programming

and genetic algorithms. Experimental analysis proves that the proposed algorithm is

suitable for similar problems also.

Index Terms— Bee Schedule algorithm, Early/Tardy Scheduling, NP Class Problem,

Single machine scheduling.

Afternoon Session 16:00pm-18:45pm

Session 4(Seminar room 5)

Optical and Wireless Communications

Opening Speech (16:00pm-16:30pm) Simplified Overlay Architecture for CognitiveWireless Systems

By Prof. Mohamed El-Tarhuni, American University of Sharjah,UAE

Session Chair:Asst.N. Nishanth, TKM College

ofEngineering(KERALA UNIVERSITY), India

OC0009

Performance Limitations of 40-Gb/s RZ-DPSK DWDM Systems Due to Nonlinear

Effects and their Mitigation

M. Arafat Rahman Khan, Tahsin Faruque and Mohammad Faisal

Bangladesh University of Engineering and Technology, Bangladesh

Abstract—Performance of 40-Gb/s return-to-zero differential phase-shift keying

(RZ-DPSK) dense wavelength division multiplexed (DWDM) systems is evaluated

numerically. The quality factor Q is measured at the receiving end of the

dispersion-managed (DM) transmission line. The performance margin due to fiber

nonlinear effects like cross-phase modulation and four-wave mixing has been

Page 21: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

22

investigated. The mitigation technique for these nonlinear effects has also been

explored with satisfactory results.

Index Terms—cross-phase modulation (XPM), dispersion management, DWDM,

four-wave mixing (FWM), RZ-DPSK

OC0015

Performance Analysis of Two Dimensional Wavelength/Time Encoding System for

Optical CDMA Networks

Awab Fakih,Shraddha Panbude,Santosh Jagtap

Mumbai University, India

Abstract—Optical code-division multiple access (OCDMA)combines the large

bandwidth of the fiber medium with theflexibility of the CDMA technique to achieve

the high-speedconnectivity. OCDMA has the potential to supportasynchronous, bursty

communications. The establishment ofOCDMA needs to overcome the cardinality

problem of 1-Dcodes. In order to increase the number of users, unipolar codeswith

larger capacity need to be designed. In this paper we haveanalyzed the performance of

an incoherent OCDMA schemebased on wavelength/time codes. This paper shows

that 2-Dcodes have better spectrum efficiency than 1-D OCDMA codesof the same

cardinality

Index Terms—Code-Division Multiple Access (CDMA),unipolar codes, wavelength

hopping/ time spreading (W/T),encoding, cardinality, Multiple Access Interference

(MAI).

OC0018

Performance Analysis of MIMO-OFDM Systems on Coexistence Environment in

FDD-LTE Networks

S. Malisuwan, J. Sivaraks, N. Tiamnara, and Y. Thamachareon

National Broadcasting and Telecommunications Commission, Thailand

Abstract—The explosive growth of Multiple Input Multiple Output (MIMO) systems

has recently drawn wide interests due to their capability of high data rate and wide

variety of applications. Recent advances in Long Term Evolution (LTE)

communication systems have contributed to the design of multi-user scenarios with

MIMO communication. This paper addresses the effect of coexistence of FDD-LTE

networks in 2.6GHz frequency band employing MIMO-OFDM antenna systems in

Rayleigh channel. The performance results of 𝟐 × 𝟐 MIMO-OFDM systems on the

coexistence of FDD-LTE Networks is evaluated by using simulations on MATLAB.

Index Terms—MIMO-OFDM, Performance, Coexistence, FDD-LTE.

OC0020

Enhancing Energy Efficiency in Wireless Sensor Networks using Optimal Gradient

Routing Protocol

K.Nattar Kannan , Dr.B.Paramasivan,

Manonmaniam Sundaranar University, India

Abstract—In recent day, Wireless Sensor Networks (WSNs) adequately needs

effective mechanisms for data forwarding to enhance the energy efficiency in

networks. Energy efficiency and is the critical parameters for routing in WSNs.

Routing protocols play a major role in WSNs for maintaining routes to ensure reliable

communication. In this paper, on demand acquisitions of neighborhood information is

used to find the optimal routing paths that reduce the message exchange overhead. It

optimizes the number of hops for packet forwarding to the sink node which gives a

better solution for energy consumption and delay. The proposed protocol combining

Page 22: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

23

on demand Multi hop information based multipath routing (OMLRP) and a gradient

based network for achieving optimal path and reduces energy consumption. The

network lifetime is prolonged up to 82% when adopting both OMLRP and gradient

based network. OMLRP provides the least routing overhead which is most suitable to

real time data delivery.

Index Terms—Wireless sensor Networks, Gradient network, energy efficiency,

optimal routing, routing overhead

OC0024

Q- Switched ultrafast TDFL using MWCNTs-SA at 2 µm region

M .T. Ahmad, A. A. Latiff , Z. Zakaria, and S. W. Harun

Universiti Teknikal Malaysia Melaka (UTeM), Malaysia.

Abstract—We demonstrate an ultrafast TDFL Q-switched pulse in 2 µm wavelength

using multi-walled carbon nanotubes (MWCNTs) as passive saturable absorber (SA).

MWCNTs film is sandwiched between two fibre connectors or patch cords after

deposited with index matching gel on the fibre ferrules. Thulium-doped fibre was

pumped using 1552 nm source in the ring cavity. The repetition rate for the pulses can

be tuned from 13.33 kHz to 21.07 kHz by varying the pump power from 307.5 mW to

371.4 mW. At the maximum power, the pulse generated energy of 87.34 nJ with

full-width at half maximum (FHWM) of 8.21 µs.

Index Terms—Multi-walled carbon nanotubes, passive saturabe absorber,

Q-switching.

SN006

A SVD-based Optical MIMO Precoding Scheme in Indoor Visible Light

Communication

Qingfeng Liu, Shuaifang Xiao, Kaizhi Huang, Zhou Zhong

NDSC,China

Abstract—A novel optical precodingscheme based on singular value decomposition

(SVD) is proposed to solve the problem that strong channel correlation causes low

spatial multiplexing gain in indoor visible light MIMO communication. This scheme

first ensures a nonnegative signal after precoding through mapping the transmit bits

into a specific symbol constellation.Then it eliminates the inter-channel interference

by decomposing the MIMO channel through SVD. Finally, it reduces the BER by

optimally allocating power among the sub-channels with the object to make the

condition of each sub-channel equal. The simulation results show that SVD-based

optical precoding scheme can significantly reduce the BER compared to ZF algorithm.

And with the enhancement of channel correlation, the BER performance remains in a

relatively low level, so it can obtain high spatial multiplexing gain under the strong

correlation channel.

Index Terms—indoor visible light communication,optical MIMO, precoding,SVD,

power allocation

SN016

Agent-based Pricing Determination for Cloud Services in Multitenant Environment.

Masnida Hussin, Azizol Abdullah, Rohaya Latip

UNIVERSITY PUTRA MALAYSIA

Abstract—Cloud computing acts as a resource sharing pool that provides services to

multiple customers, which are called tenants through the Internet. One of the big

challenges in Cloud is providing a price for leasing the services while adapting with

budget limit of the tenants. In order to meet the rapidly growing and dynamic

Page 23: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

24

demands of tenants, this paper proposes a pricing determination scheme for Cloud

services using mathematical analysis. It aims to balance satisfaction between tenants

and service provider in terms of budget and profit. Specifically, our pricing

determination procedure aggregated the budget constraint of tenants and service cost

to calculate the potential price of service. Service Level Agreement (SLA) is handled

by an agent for determining minimum and maximum prices that represent in a range.

Hence, the service cost that charged by the provider is identified within the price range

in order to meet tenants’ requests. The results from our simulation demonstrate that

the proposed pricing determination scheme provides better tenant satisfaction while

sustaining provider profitability.

Index Terms—Cloud computing, multitenant, pricing determination scheme, Service

Level Agreement.

SN017

6in4 Tunnel based IPv6 Transition Solution for IPv4 MobileTerminals

Jingwen Gao, Qin Zhao

Institute of Network Technology, Beijing University of Posts and

Telecommunications,China

Abstract—Along with the commercialization of IPv6 in global scale, the whole IPv6

industry chain will mature gradually. However, even after a real world deployment of

IPv6, a huge amount of legacy IPv4 devices and applications won’t disappear just

overnight. Despite the solutions and tools developed to help ease the IPv4/IPv6

transition, few of them is focused on dealing with the situation of mobile terminals

which may move among different WIFI and 3G networks. This paper documents a

novel 6in4 tunnel based transition solution for IPv4 mobile terminals to access to IPv6

resources, together with the prototype implementation and evaluation. The aim of this

paper is to provide solution for IPv4 mobile terminals, which grow in quantity

dramatically day by day, to peacefully migrate to IPv6.

Index Terms—ISATAP, mobile terminal, transition, tunnel

SN020

Monitoring Parking Space Availability via Zigbee Technology

Hee Chien Yee and Yusnita Rahayu

Universiti Malaysia Pahang, Malaysia

Abstract— With the rapid growth of vehicle availability and usage on the road in

recent years, finding a vacant car parking space is becoming more and more difficult

which resulting in a number of conflicts such as traffic problems. In this paper, a

prototype of Monitoring Parking Space Vacancy System is introduced using wireless

technologies to alleviate the traffic problems. The system includes two modules,

parking lot vacancy monitoring module, and master module. Parking lot vacancy

monitoring module consists of digital infrared sensor, liquid crystal display (LCD),

and Zigbee module which are interfaced with PIC microcontroller. Master modules

include laptop GUI display, and Zigbee modules. The user can get the status of

parking lot vacancy through the LCD of monitoring parking vacancy module. The

Zigbee transceiver on monitoring parking vacancy module which interfaced with

microcontroller is to transmit the infrared sensor data when the

digital infrared sensor detects the presence of vehicle in the parking areas and thus

provide the status of the parking lot to be displayed in master module

with Graphical User interface (GUI).

Index Terms— Parking Monitoring, Zigbee, Graphical User interface (GUI).

Page 24: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

25

Dinner 18:30pm-20:00pm

Day 3, Monday, May 26, 2014 –Visiting Day

The END

Conference Venue

Nanyang Executive Centre Add: 50 NANYANG AVENUESINGAPORE 639798

http://www.ntu.edu.sg/NEC/Pages/default.aspx

About Keynote Speakers

Prof. Yang Xiao, The University of Alabama, Tuscaloosa, USA

Dr. Yang Xiao currently is a full professor of Department of Computer Science at The University of Alabama. He was a voting member of IEEE 802.11 Working Group from 2001 to 2004. He served/serves as a panelist for the US National Science Foundation (NSF), Canada Foundation for Innovation (CFI)'s Telecommunications expert committee, and the American Institute of Biological Sciences (AIBS), as well as a referee/reviewer for many national and international funding agencies. His research areas are security and communications/networks. He has published more than 200 SCI-indexed journal papers (including 50 IEEE/ACM transactions papers) and over 200 EI-indexed refereed

conference papers and book chapters related to these research areas. Dr. Xiao’s research has been supported by the US National Science Foundation (NSF), U.S. Army Research, The Global Environment for Network Innovations (GENI), Fleet Industrial Supply Center-San Diego (FISCSD), FIATECH, and The University of Alabama's Research Grants Committee. He currently serves as Editor-in-Chief for International Journal of Security and Networks (IJSN) and International Journal of Sensor Networks (IJSNet) (SCI-index). Dr. Xiao delivered 15 keynote speeches for international conferences and gave more than 60 invited talks at different international institutes. Dr. Xiao had directed 9 doctoral dissertations in the past and is currently supervising 9 Ph.D. students/candidates in computer security and networking areas. Dr. Xiao also supervised 19 M.S. graduates in the past.

Page 25: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

26

Dr. Maode Ma Nanyang Technological University, Singapore

Dr. Maode Ma received his Ph.D. degree in computer science from Hong Kong University of Science and Technology in 1999. Dr. Ma is an Associate Professor in the School of Electrical and Electronic Engineering at Nanyang Technological University in Singapore. He has extensive research interests including wireless networking and wireless network security. He has been a member of the technical program committees for more than 150 international conferences. He has been a general chair, technical symposium chair, tutorial chair, publication chair, publicity chair and session chair for more than 50 international conferences. Dr. Ma has more than 250

international academic publications including over 100 journal papers and more than 130 conference papers. He currently serves as the Editor-in-Chief of International Journal of Electronic Transport. He serves as a Senior Editor for IEEE Communications Surveys and Tutorials, and an Associate Editor for other 4 International academic Journals. Dr. Ma is a senior member of IEEE Communication Society and IEEE Education Society. He is a Fellow of IET. He is the Vice Chair of IEEE Education Society, Singapore Chapter. He is also a Distinguished Lecturer of IEEE Communication Society.

Prof.Yulin Wang International School of Software, Wuhan University, China

Prof. Yulin Wang is a full professor and PhD supervisor in International School of Software, Wuhan University, China. He got PhD degree in 2005 in Queen Mary, University of London, UK. Before that, he has worked in high-tech industry for more than ten years. He has involved many key projects, and hold 8 patents. He got his master and bachelor degree in 1990 and 1987 respectively from Xi-Dian University, and

Huazhong University of Science and Technology(HUST), both in China. His research interests include digital rights management, digital watermarking, multimedia and network security, and signal processing. In recently 10 years, Prof. Wang has published as first author 3 books, 40 conference papers and 45 journal

papers, including in IEEE Transactions and IEE proceedings and Elsevier Journals. Prof. Wang served as editor-in-chief for International Journal of Advances in Multimedia in 2010. He served as reviewer for many journals, including IEEE Transactions on Image Processing, IEEE Signal Processing Letters, Elsevier Journal of Information Sciences. He served as reviewer for many research funds, including National

High Technology Research and Development Program of China ( ‘863’ project). Prof. Wang was the external PhD adviser of Dublin City University, Ireland during 2008-2010. He was the

keynote speakers in many international conferences. He bas been listed in Marcus ‘who’s who in the world’ since 2008.

Page 26: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

27

Welcome to the Upcoming Conferences:

DATE NAME PAPER WILL BE PUBLISHED BY

July 6-7,2014 Nottingham, UK

ICSIA 2014

2014 the 4th International

Conference on Signal, Image

Processing and Applications http://www.icsia.us/

International Journal of Information and Electronics Engineering at http://www.ijiee.org/ (ISSN: 2010-3719) indexed by Google Scholar, EBSCO, Electronic Journals Library, Engineering & Technology Digital Library, Crossref and ProQuest, DOAJ, Ei (INSPEC, IET).

ICROM 2014

2014 International

Conference on Robotics and

Mechatronics http://www.icrom.org/

International Journal of Materials Science and Engineering(IJMSE)(ISSN: 2315-4527) included in Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library.

ICCSS 2014

2014 4th International

Conference on Circuits,

System and Simulation http://www.iccss.org/

International Journal of Computer and Electrical Engineering(IJCEE)(ISSN: 1793-8163) included in Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library, Crossref, ProQuest, EI (INSPEC, IET), DOAJ, and Electronic Journals Library

July 28-29, 2014 Hong Kong

ICAME 2014

2014 the 3rd International

Conference on Advances in

Mechanics Engineering http://www.icame.org/

Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.

ICCCD 2014

2014 the 4th International

Conference on Computer and

Communication Devices http://www.icccd.org/

International Journal of Computer Theory and Engineering (IJCTE) included in the Electronic Journals Library, EBSCO, Engineering & Technology Digital Library, Google Scholar, INSPEC, Ulrich's Periodicals Directory, Crossref, ProQuest, WorldCat, and EI (INSPEC, IET).

ICIAE 2014

2014 International

Conference on Industrial and

Applied Electronics http://www.iciae.org/

International Journal of Computer and Electrical Engineering (IJCEE) (ISSN: 1793-8163 ) included in the Ulrich's Periodicals Directory,

Google ,, EBSCO, Engineering & Technology Digital

Library, Crossref, ProQuest, EI (INSPEC, IET), DOAJ, and Electronic Journals Library .

Page 27: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

28

July30-Aug1, 2014

Campinas City, Brazil

ICCEA 2014

2014 the 3rd International

Conference on Civil

Engineering and Architecture http://www.iccea.org/

International Journal of Engineering and Technology (IJET) (ISSN: 1793-8244 (Online Version); 1793-8236 (Print Version)) included in the Chemical Abstracts Services (CAS), DOAJ, Engineering & Technology Digital Library, Google Scholar, Ulrich Periodicals Directory, Crossref, ProQuest, Electronic Journals Library.

August 15-17,2014

Lijiang, China

ICSCT 2014

2014 5th International

Conference on Software and

Computing Technology http://www.icsct.org/

WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) indexed by EI Compendex, Scopus and ISI

ICINT 2014

2014 3rd International

Conference on Information

and Network Technology http://www.icint.org/

WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) indexed by EI Compendex, Scopus and ISI

ICMCT 2014

2014 International

Conference on Multimedia

and Communication

Technologies http://www.icmct.org/

WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) indexed by EI Compendex, Scopus and ISI

Sep17-18, 2014 Paris, France

ICITM 2014

2014 the 4th International

Conference on Industrial

Technology and Management http://www.icitm.org/

Accepted papers will be published in the one of the following Journals with ISSN. Journal of Industrial and Intelligent Information( JIII ) (ISSN: 2301-3745) Indexed by Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library Journal of Advanced Management Science(JAMS) (ISSN: 2168-0787) Editor-in-Chief: Prof. Rajive Mohan Pant Indexed byUlrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library

ICIVC 2014

2014 the 3rd International

Conference on Image, Vision

and Computing http://www.icivc.org/

The Proceedings of this conference will be published, and will be included in the SPIE Digital Library, andindexed by Ei Compendex and Thomson ISI.

ICSTE 2014

2014 6th International

Conference on Software

Technology and Engineering http://www.icste.org/

Lecture Notes on Software Engineering (LNSE) (ISSN: 2301-3559) included in the DOAJ, Electronic Journals Library, Engineering & Technology Digital Library, EBSCO, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest and Google Scholar.

Page 28: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

29

Oct 5-7, 2014 Asheville, North Carolina, U.S.A.

ICMCE 2014

2014 the 3rd International

Conference on Mechanics

and Control Engineering http://www.icmce.org/

Applied Mechanics and Materials Journal (ISSN: 1660-9336). indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org/. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.

Oct 24-26, 2014 Beijing, China

ICGIP 2014

The 2014 6th International

Conference on Graphic and

Image Processing http://www.icgip.org/

SPIE Digital Library included in the SPIE Digital Library, and indexed by Ei Compendex and Thomson ISI.I.

ICNIS 2014

2014 International

conference on Networks and

Information Security http://www.icnis.org/

Journal of Advances in Computer Networks (JACN; ISSN: 1793-8244) included in Engineering & Technology Digital Library, EBSCO, DOAJ, Electronic Journals Library, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest, and Google Scholar.

ICRCV 2014

2014 International

Conference on Robotics and

Computer Vision http://www.icrcv.org/

Accepted papers will be published in one of the following Journals with ISSN. International Journal of Computer Theory and Engineering (IJCTE, ISSN: 1793-8201) Abstracting/Indexing: Index Copernicus, Electronic Journals Library, EBSCO, Engineering & Technology Digital Library, Google Scholar, INSPEC, Ulrich's Periodicals Directory, Crossref, ProQuest, WorldCat, and EI (INSPEC, IET). Journal of Automation and Control Engineering(ISSN: 2301-3702) Abstracting/Indexing: Ulrich's Periodicals Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library and Electronic Journals Digital Library.

Page 29: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

30

Nov 21-23, 2014 Singapore

ICNIT 2014

2014 5th International

Conference on Networking

and Information Technology http://www.icnit.org/

Accepted papers will be published in the one of the following Journals with ISSN. International Journal of Computer and Communication Engineering (IJCCE, ISSN: 2010-3743) Abstracting/ Indexing: EI (INSPEC, IET), Google Scholar, Engineering & Technology Digital Library, ProQuest, and Crossref, DOAJ, Electronic Journals Library Journal of Advances in Computer Networks (JACN, ISSN: 1793-8244) Abstracting/ Indexing: EI (INSPEC, IET), Engineering & Technology Digital Library, DOAJ, Electronic Journals Library, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest, and Google Scholar. Journal of Communications(ISSN: 1796-2021) Abstracting/Indexing: EI Compendex; SCOPUS; ULRICH's Periodicals Directory; Google Scholar; INSPEC; etc.

ICPES 2014

2014 the 4th International

Conference on Power and

Energy Systems http://www.icpes.org/

Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.

ICMMC 2014

International Conference on

Mechanical Manufacturing

and Control http://www.icmmc.org/

Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.

Dec 18-20, 2014 Barcelona,

Spain ICPSE 2014

2014 3rd International

Conference on Power Science

and Engineering http://www.icpse.org/

Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.

Page 30: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

31

ICNB 2014

2014 5th International

Conference on

Nanotechnology and

Biosensors http://www.icnb.org/

Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.

ICMPM 2014

2014 International

Conference on Mechanical

Properties of

Materials(ICMPM 2014) http://www.icmpm.org/

Applied Mechanics and Materials Journal (ISSN: 1660-9336) Indexed by Elsevier: SCOPUS www.scopus.com and Ei Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA) www.cas.org, Google and Google Scholar google.com, ISI (ISTP, CPCI, Web of Science) www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.

Dec 22-24, 2014 Barcelona,

Spain

ICCNE 2014

2014 International

Conference on

Communications and

Network

Engineering(ICCNE 2014) http://www.iccne.org/

All accepted papers will be published in one of the indexed Journals after being selected. Journal of Computers (JCP, ISSN: 1796-203X, 20 Papers) Journal of Software (JSW, ISSN: 1796-217X, 20 Papers) International Journal of Future Computer and Communication (IJFCC, ISSN: 2010-3751, 30 Papers) International Journal of Computer and Communication Engineering (IJCCE, ISSN: 2010-3743, 30 Papers) Journal of Advances in Computer Networks (JACN, ISSN: 1793-8244, 20 Papers)

ICOAI2014

2014 International

Conference on Artificial

Intelligence http://www.icoai.org/

International Journal of Machine Learning and Computing (IJMLCISSN: 2010-3700) Abstracting/ Indexing: Engineering & Technology Digital Library, Google Scholar, Crossref, ProQuest, Electronic Journals Library, DOAJ and EI (INSPEC, IET).

Page 31: 2014IACSIT Singapore Conferences · Singapore during May 24-26, 2014. For the conferences of ICCSN 2014&ICWOC 2014&ICIIP 2014, we had received over 105 submissions, and 33 excellent

2014 IACSIT Singapore Conferences

32

ICCSIT 2014

2014 7th International

Conference on Computer

Science and Information

Technology http://www.iccsit.org/

All accepted papers will be published in one of the indexed Journals after being selected. Journal of Computers (JCP, ISSN: 1796-203X, 20 Papers) Journal of Software (JSW, ISSN: 1796-217X, 20 Papers) Journal of Communications (JCM, ISSN: ISSN: 1796-2021, 20 papers) International Journal of Future Computer and Communication (IJFCC, ISSN: 2010-3751, 30 Papers) International Journal of Computer Theory and Engineering (IJCTE, ISSN: 1793-8201, 30 Papers) International Journal of Computer and Electrical Engineering (IJCEE, ISSN: 1793-8163, 30 Papers) International Journal of Information and Electronics Engineering (IJIEE, ISSN: 2010-3719, 20 Papers) International Journal of Information and Education Technology (IJIET, ISSN: 2010-3689, 20 Papers) Journal of Advances in Computer Networks (JACN, ISSN: 1793-8244, 20 Papers) Lecture Notes on Software Engineering (LNSE, ISSN: 2301-3559, Papers)