2015 Amsterdam Conference Program

40
2015 IACSIT AMSTERDAM CONFERENCES 1/ 40 2015 IACSIT AMSTERDAM CONFERENCES Feb 12-13, 2015 Conference Program 2015 3rd International Conference on System Modeling and Optimization (ICSMO 2015) 2015 6th International Conference on Computer Modeling and Simulation (ICCMS 2015) 2015 4th International Conference on Information Computer Application (ICICA 2015)

description

conference agenda 2015

Transcript of 2015 Amsterdam Conference Program

  • 2015 IACSIT AMSTERDAM CONFERENCES

    1/ 40

    2015 IACSIT

    AMSTERDAM CONFERENCES

    Feb 12-13, 2015

    Conference Program

    2015 3rd International Conference on System Modeling and Optimization

    (ICSMO 2015)

    2015 6th International Conference on Computer Modeling and Simulation

    (ICCMS 2015)

    2015 4th International Conference on Information Computer Application

    (ICICA 2015)

    http://www.icsmo.org/http://www.icsmo.org/http://www.iccms.org/http://www.iccms.org/http://www.icica.org/http://www.icica.org/

  • 2015 IACSIT AMSTERDAM CONFERENCES

    2/ 40

    CONTENT

    Welcome to Amsterdam Conferences

    .3

    Announcement

    .4

    Introduction of Conference Chair, Keynote Speakers and Program Chairs

    .9

    Instruction for Oral Presentation

    .10

    Technical Program at a Glance

    .11

    Detailed Technical Program

    Schedule for Feb. 12.12

    Schedule for Feb.13.13

    Listener List.32

    Information of Conference Venue

    33

    Call for Paper

    34

  • 2015 IACSIT AMSTERDAM CONFERENCES

    3/ 40

    WELCOME TO AMSTERDAM CONFERENCES

    Dear Professors and Distinguished Delegates,

    Welcome to 2015 IACSIT Amsterdam Conferences. On behalf of IACSIT

    organization, I would like to thank all the Conference Chairs, Program Chairs and

    the technical Committees. Their high competence and professional advice enable us

    to prepare the high-quality program. We hope all of you have a wonderful time at the

    conference and also in Dubai.

    We believe that by this excellent conference, you can get more opportunity for

    further communication with researchers and practitioners with the common interest

    in System Modeling and Optimization, Computer Modeling and Simulation, and

    Information Computer Application.

    In order to hold more professional and significant international conferences, your

    suggestions are warmly welcomed. And we are look forward to meeting you again

    next time.

    Best Regards!

    Yours sincerely,

    Teresa Zhang

    Director of Conference Department, IACSIT

    http://www.icsmo.org/http://www.iccms.org/http://www.icica.org/http://www.icica.org/

  • 2015 IACSIT AMSTERDAM CONFERENCES

    4/ 40

    ANNOUNCEMENT

    The ICSMO 2015 conference proceeding will be published in the International Journal of Modeling and Optimization (ISSN:

    2010-3697 www.ijmo.org ), and will be included in the Engineering &

    Technology Digital Library, and indexed byProQuest,Google Scholar and

    Crossref.

    As usual, all accepted papers for the ICCMS 2015 will be published in the International Journal of Computer Theory and Engineering

    (ISSN:1793-8201 www.ijcte.org ), will be indexed byElectronic Journals

    Library, EBSCO, Engineering & Technology Digital Library, Google

    Scholar, INSPEC, Ulrich's Periodicals Directory, Crossref, ProQuest, WorldCat,

    and EI (INSPEC, IET).

    The ICICA 2015 conference proceeding will be published in the International Journal of Computer and Communication Engineering

    (ISSN:2010-3743 www.ijcce.org ), which will be indexed by Google Scholar,

    Engineering & Technology Digital Library,ProQuest, and Crossref.

    For the journal publication schedule, some authors could not get

    the journal on conference site. Well post the journal after

    publication.

    A CD including all registered papers will be handed out to the

    presenters.

    IACSIT Committee

    http://www.ijmo.org/http://www.ijcte.org/http://ezb.uni-regensburg.de/frontdoor.phtml?bibid=AAAAA&colors=7&lang=en&id=2716544http://ezb.uni-regensburg.de/frontdoor.phtml?bibid=AAAAA&colors=7&lang=en&id=2716544http://www.ebsco.com/http://www.etlibrary.org/http://www.crossref.org/http://www.proquest.asia/zh-CN/http://www.engineeringvillage.com/home.url?redir=thttp://www.theiet.org/resources/inspec/http://www.theiet.org/resources/inspec/

  • 2015 IACSIT AMSTERDAM CONFERENCES

    5/ 40

    CONFERENCE CHAIRS & KEYNOTE SPEAKERS

    Prof. Alexander Balinsky

    Cardiff School of Mathematics, Cardiff University, UK

    Prof. Alexander Balinsky received his PhD degree in Mathematical Physics from the Landau

    Institute of Theoretical Physics in 1990 and was Research Fellow in the Department of

    Mathematics at The Technion-Israel Institute of Technology from 1993 till 1997. He joined Cardiff University in 1997.He is a Professor in the Cardiff School of Mathematics and WIMCS (Wales

    Institute of Mathematical and Computational Sciences) Chair in Mathematical Physics. His current

    research interests lie in the areas of spectral theory, stability of matter, image processing and machine learning.He has participated in EU TMR network on Partial Differential Equations and

    Quantum Mechanics (1996-2001).He was PI on three years grant from United State-Israel

    Binational Science Foundation (1996-1999), on three years EPSRC Research Grant 2003-2006.He was founding member of Cardiff Communication Research Cente. In 2007-2011 he had joint with

    Hewlett-Packard EPSRC CASE award, and from October 2011 joint with Hewlett-Packard 50%-50%

    PhD Scholarship. He also did consultancy work for Reuters, London on athematical models for Internet Security.

    Title: A-Contrario Methods for Data Mining and Image Analysis

    Abstract: We present a review and mathematical background of "a-contrario" detection theory in

    data mining and image processing. Several new applications for text mining, data segmentations and image analysis will be presented. Relations between "a-contrario" modeling and deep learning

    will be discussed.

  • 2015 IACSIT AMSTERDAM CONFERENCES

    6/ 40

    Prof., IEEE fellow, Tarek El-Ghazawi

    The George Washington University

    Tarek El-Ghazawi is a Professor in the Department of Electrical and Computer Engineering at The

    George Washington University, where he leads the university-wide Strategic Academic Program in

    High-Performance Computing. He is a founding director of The GW Institute for Massively Parallel Applications and Computing Technologies (IMPACT) and the NSF Industry/University Center for

    High-Performance Reconfigurable Computing (CHREC). El-Ghazawis research interests include

    high-performance computing, computer architectures, and heterogeneous computing. He is one of the principal co-authors of the UPC parallel programming language and the first author of the

    UPC Texbook. El-Ghazawi has published close to 250 refereed research publications in this area.

    Dr. El-Ghazawi has served in many editorial roles including an Associate Editor for the IEEE Transactions on Computers. He has chaired and co-chaired many international conferences and

    symposia. Dr. El-Ghazawis research has been frequently supported by Federal agencies and

    industry including DARPA/DoD, NSF, DoE/LBNL, AFRL, NASA, IBM, HP, Intel, AMD, SGI, and Microsoft. Professor El-Ghazawi was elected to a Fellow of the IEEE and is a Research Faculty

    Fellow of the IBM Center for Advanced Studies, Toronto. Professor El-Ghazawi was also awarded

    the Alexander von Humboldt Research Award, from Germany, which is given to 100 scientists

    across the world across all disciplines. El-Ghazawi was a recipient of the 2012 Alexander Schwarzkopf Prize for Technical Innovation, and has served as a Senior U.S. Fulbright Scholar.

    Title: Simulations with Heterogeneous High-Performance Computer Systems: Issues and Advances

    Abstract: In recent years, the top supercomputers in the world were built using heterogeneous chips as accelerators to conventional microprocessors. Such heterogeneous accelerators ranged

    from manycores (such as the Phi Processor) to specialized accelerators, such as gaming

    processors, general purpose graphics processors (GPGPUs) and field programmable gate arrays (FPGAs). Heterogeneous systems did not only achieve unprecedented successes but also often

    made history. Achieving 33.86 PFLOPS, Tianhe-2 in China topped the TOP500 list, and is today the

    fastest supercomputers in the world, using Intel Phi Manycore Chips as accelerators. Titan at ONRL, using NVIDIA K20 GPUs, achieves 17.59 PFLOPS, and was pushed to second. In 2010, China was

    able to build, also the first time of its history, a supercomputer, Tianhe-1A, that ranked as the top

    supercomputer in the world. Tianhe-1A performance boost came from NVIDIA graphical processing units (GPUs). In 2008, the Road Runner at LANL, using the Cell processor chips as

    accelerators, became the first system to reach the PetaFLOPs level of performance. The Cell was

    built by IBM/Sony/Toshiba for the Sony PlayStation 3. While the substantial performance

    advantages for such systems are obvious, enormous productivity challenges do exist. In this talk, we examine the progress and the productivity challenges for heterogeneous parallel computers

    and their implications for domain scientists.

    http://en.wikipedia.org/wiki/TOP500

  • 2015 IACSIT AMSTERDAM CONFERENCES

    7/ 40

    Dr. Charles Mutigwe

    University of Massachusetts Amherst, USA

    Dr. Charles Mutigwe teaches at the Isenberg School of Management at the University of

    Massachusetts Amherst. Dr. Mutigwe received a D.Tech in Electrical Engineering from the Central

    University of Technology (South Africa), a M.Sc. in Electrical Engineering from Western New England University (USA), a M.B.A. from Norwich University (USA), and a B.Sc. in Electrical

    Engineering with honors from the University of Zimbabwe. He is a member of the IEEE, the IEEE

    Computer Society and the ACM.

    Dr. Mutigwe has over 20 years of work experience in the IT industry. He has worked in both the

    corporate and academic settings and his roles have included those of network engineer, systems

    administrator, systems engineer, systems developer, and IT director. In addition to UMass Amherst, he has worked for DHL International, Berkshire Bank, Pitney Bowes and a number of

    start-ups during the dot-com era

    Title: An Automated Design Framework for Matching Processor Architecture to Applications Abstract: In this talk we describe a method for the automatic generation of application specific

    processors. The presentation is organized around three separate but interrelated studies, which

    together provide: a justification for the method used, and a theory that supports the method, together with a software application that realizes the method. The first study looked at how

    modern day microprocessors utilize their hardware resources and it proposed a metric, called core

    density, for measuring the utilization rate. The core density is a function of the microprocessor's

    instruction set and the application scheduled to run on that microprocessor. This study concluded that modern day microprocessors use their resources very inefficiently and proposed the use of

    subset processors to execute the same applications more efficiently. The second study sought to

    provide a theoretical framework for the use of subset processors by developing a generic formal model of computer architecture. To demonstrate the model's versatility, it was used to describe a

    number of computer architecture components and entire computing systems. The third study

    describes the development of a set of software tools that enable the automatic generation of application specific processors. The FiT toolkit automatically generates a unique Hardware

    Description Language (HDL) description of a processor based on an application binary file and a

    parameterizable template of a generic microprocessor. Area-optimized and performance-optimized custom soft processors were generated using the FiT toolkit and the

    utilization of the hardware resources by the custom soft processors was characterized. The FiT

    toolkit was combined with an ANSI C compiler and a third-party tool for programming field-programmable gate arrays (FPGAs) to create an unconstrained C-to-silicon compiler.

  • 2015 IACSIT AMSTERDAM CONFERENCES

    8/ 40

    Prof. Farouk Yalaoui

    Universit de Technologie de Troyes, France

    Farouk YALAOUI obtained his Engineering degree in Industrial Engineering from the Polytechnics

    School of Algiers (Algeria) in 1995, his masters degree in Industrial System Engineering from Polytechnics Institute of Lorraine (Nancy, France) in 1997, his Ph.D. degree in Production

    Management from the Troyes University of Technology (UTT) in 2000 and followed by a

    Habilitation diriger les recherches (Dr. Hab) from Compiegne University of Technology (UTT) in 2006. He is currently a full Professor at Troyes University of Technology, France, where he is the

    head of Optimisation Industrial systems Optimisation Lab (Research Team), Charles Dealaunay

    Institute (ICD), UMR CNRS 6281. His research topic focuses on the scheduling problems, system design, operations research, modeling, analysis and optimization of logistic and production

    systems, reliability and maintenance optimization and on optimization problems in general.

    He is member of IFAC TC group 5.2. He is Chair of a Working Group on multiobjective optimization. He is member of French Universities National Council (CNU) field Automation, Control, Industrial

    Engineering (section61). http://losi.utt.fr/fr/membres/yalaoui.html.. He is French expert for

    different agency such French ANR agency, French AERES Agency, Natural Sciences and Engineering Research Council of Canada (NSERC), Algerian PNR program.

    Title: Production and logistics optimization: Parallel machines scheduling

    Abstract. The aim of this paper is to give an overview of some logistics optimization problem especially about the scheduling ones. The scheduling is to assign jobs to resources at established

    moments according to some constraints in order to optimize a given criterion. A couple of Results

    on parallel machines, re-entrant process and jobshop cases are developed with different criteria. The problems are both industrial configuration, with industrial partner, and academic. These

    results are proved, implemented on real data and already published in international journals.

    Key words: Scheduling, parallel machines, re-entrant process, job-shop, theoretical case,

    industrial case, optimization methods.

    http://losi.utt.fr/fr/membres/yalaoui.html

  • 2015 IACSIT AMSTERDAM CONFERENCES

    9/ 40

    Conference Program Chair

    Dr. Jrg Dmmler,

    Technische Universitt Chemnitz, Germany

    Florian Niedermeier, BMW Group, Karlsruher Institute of Technology,

    Germany (Chair of ICSMO)

    DR. M. Basel Almourad, Zayed University, UAE

  • 2015 IACSIT AMSTERDAM CONFERENCES

    10/ 40

    Instruction for Oral Presentation

    Devices Provided by the Conference Organizer:

    Laptop (with MS-Office & Adobe Reader)

    Projector & Screen

    Laser Sticks

    Materials Provided by the Presenters:

    PowerPoint or PDF files

    Duration of each Presentation (Tentatively):

    Regular oral presentation: about 10-15 minutes (including Q&A)

    Keynote speech: about 45 minute (including Q&A)

    Notice:

    Please keep your belongings (laptop and camera etc) with you!

  • 2015 IACSIT AMSTERDAM CONFERENCES

    11/ 40

    Technical Program at a Glance

    Feb. 12 Venue: Lobby 10:00-17:00 Registration

    Feb. 13

    8:30-11:40

    Venue:

    University of

    Amsterdam 3

    9:00-9:10 Opening

    Remarks Prof. Alexander Balinsky

    9:10-9:55 Plenary

    Speech I Dr. Charles Mutigwe

    9:55-10:40 Plenary

    Speech II Prof. Tarek El-Ghazawi

    10:40-11:00 Group Photo &Coffee Break

    11:00-11:45 Plenary

    Speech IV Prof. Farouk Yalaoui

    11:45-12:30 Plenary

    Speech V Prof. Alexander Balinsky

    Feb. 13

    12:30-13:30 Lunch Buffet (Restaurant)

    Feb. 13

    13:00-19:30

    Venue:

    University of

    Amsterdam 3

    University of

    Amsterdam 3 13:30-16:00

    Session I-12 papers

    Information Management and Industrial

    Modeling CA011, CA016, CA020, CA022, CA027, CA1010,

    MS15303, MS15304, MS15025, Q004, Q006, Q008,

    Cambridge 13:30-16:00

    Session II- 12papers

    Computer Networks and IT Application CA006,CA007,CA008,CA012, CA013, Q007, QMS15004,MS15005,MS15029,MS15030,

    MS15018,Q020

    Meeting Floor Area 16:00-16:20 Coffee Break

    University of

    Amsterdam 3 16:20-18:20

    Session III-9 papers

    Automation and Control Systems CA1004, CA017, MS15108, MS15305, Q014, Q018,

    CA010,MS15031,MS15037

    Cambridge

    16:20-18:20

    Session IV-9 papers

    Automation and Control Systems CA029, MS15027, MS15032, MS15002,Q015, Q019,

    MS15006,MS15036,MS15038

    Feb. 13

    19:00-20:30 Dinner Buffet (Restaurant)

  • 2015 IACSIT AMSTERDAM CONFERENCES

    12/ 40

    Detailed Technical Program

    Schedule for Feb. 12

    Onsite registration: Feb.12, 2015

    Time 10:00am-17:00pm

    Event Arrival, registration and conference materials collection

    Location Venue: Lobby

    Address Eerste Ringdijkstraat 4, 1097 BC Amsterdam

    Telephone Tel: +31 (0)20 665 11 71/+86-15208385669

    Staff Yoyo Yang

    Note:

    You can also register at any working time during the conference

    Certificate of Participation can be collected at the registration counter.

    The organizer won't provide accommodation, and we suggest you make an

    early reservation.

    Please get the related paper documents and they are required when you

    register on desk.

  • 2015 IACSIT AMSTERDAM CONFERENCES

    13/ 40

    Schedule for Feb.13

    Morning, Feb.13, 2015 Plenary Speeches

    Location: University of Amsterdam 3

    9:00-9:10 Opening Remarks

    Prof. Alexander Balinsky

    9:10-9:55

    Plenary

    Speech I

    Topic: An Automated Design Framework for Matching Processor Architecture to Applications

    Speaker : Dr. Charles Mutigwe

    University of Massachusetts Amherst, USA

    AbstractIn this talk we describe a method for the automatic generation of application specific processors. The presentation is organized around three separate but interrelated studies, which together provide: a justification for the method used, and a theory that supports the method, together with a software application that realizes the method. The first study looked at how modern day microprocessors utilize their hardware resources and it proposed a metric, called core density, for measuring the utilization rate. The core density is a function of the microprocessor's instruction set and the application scheduled to run on that microprocessor. This study concluded that modern day microprocessors use their resources very inefficiently and proposed the use of subset processors to execute the same applications more efficiently. The second study sought to provide a theoretical framework for the use of subset processors by developing a generic formal model of computer architecture. To demonstrate the model's versatility, it was used to describe a number of computer architecture components and entire computing systems. The third study describes the development of a set of software tools that enable the automatic generation of application specific processors. The FiT toolkit automatically generates a unique Hardware Description Language (HDL) description of a processor based on an application binary file and a parameterizable template of a generic microprocessor. Area-optimized and performance-optimized custom soft processors were generated using the FiT toolkit and the utilization of the hardware resources by the custom soft processors was characterized. The FiT toolkit was combined with an ANSI C compiler and a third-party tool for programming field-programmable gate arrays (FPGAs) to create an unconstrained C-to-silicon compiler.

    9:55-10:40

    Plenary

    Speech II

    Topic: Simulations with Heterogeneous High-Performance Computer Systems: Issues and Advances

    Speaker : Prof., IEEE fellow, Tarek El-Ghazawi

    The George Washington University, USA

    AbstractIn recent years, the top supercomputers in the world were built using

  • 2015 IACSIT AMSTERDAM CONFERENCES

    14/ 40

    heterogeneous chips as accelerators to conventional microprocessors. Such heterogeneous accelerators ranged from manycores (such as the Phi Processor) to specialized accelerators, such as gaming processors, general purpose graphics processors (GPGPUs) and field programmable gate arrays (FPGAs). Heterogeneous systems did not only achieve unprecedented successes but also often made history. Achieving 33.86 PFLOPS, Tianhe-2 in China topped the TOP500 list, and is today the fastest supercomputers in the world, using Intel Phi Manycore Chips as accelerators. Titan at ONRL, using NVIDIA K20 GPUs, achieves 17.59 PFLOPS, and was pushed to second. In 2010, China was able to build, also the first time of its history, a supercomputer, Tianhe-1A, that ranked as the top supercomputer in the world. Tianhe-1A performance boost came from NVIDIA graphical processing units (GPUs). In 2008, the Road Runner at LANL, using the Cell processor chips as accelerators, became the first system to reach the PetaFLOPs level of performance. The Cell was built by IBM/Sony/Toshiba for the Sony PlayStation 3. While the substantial performance advantages for such systems are obvious, enormous productivity challenges do exist. In this talk, we examine the progress and the productivity challenges for heterogeneous parallel computers and their implications for domain scientists.

    10:40-11:00 Group Photo &Coffee Break

    11:00-11:45

    Plenary

    Speech III

    Topic: Production and logistics optimization : Parallel machines scheduling

    Speaker : Prof. Farouk Yalaoui

    Universit de Technologie de Troyes, France

    AbstractThe aim of this paper is to give an overview of some logistics optimization problem especially about the scheduling ones. The scheduling is to assign jobs to resources at established moments according to some constraints in order to optimize a given criterion. A couple of Results on parallel machines, re-entrant process and jobshop cases are developed with different criteria. The problems are both industrial configuration, with industrial partner, and academic. These results are proved, implemented on real data and already published in international journals.

    11:45-12:30

    Plenary

    Speech IV

    Topic: A-Contrario Methods for Data Mining and Image Analysis

    Speaker : Prof. Alexander Balinsky

    Cardiff School of Mathematics, Cardiff University, UK

    AbstractWe present a review and mathematical background of "a-contrario" detection theory in data mining and image processing. Several new applications for text mining, data segmentations and image analysis will be presented. Relations between "a-contrario" modelling and deep learning will be discussed.

    12:30-13:30 Lunch (Restaurant)

    http://en.wikipedia.org/wiki/TOP500

  • 2015 IACSIT AMSTERDAM CONFERENCES

    15/ 40

    Afternoon, Feb.13, 2015

    Time: 13:30-18:20pm

    Session I- Information Management and Industrial Modeling

    Venue: University of Amsterdam 3

    Time: 13:30-16:00

    Session Chair I:

    DR. M. Basel Almourad, Zayed University, UAEAssociated Professor

    Session Chair II:

    Dr. D. R. Prajapati

    PEC University of Technology, India

    Q006 The Human Resources Assignment with Multiple Sites Problem

    Mohamed Afilal, Hicham Chehade, and Farouk Yalaoui

    University of Technology of Troyes, France

    Abstract: Human resources assignment is the process of creating an employees

    assignment in order to meet the demand of a set of tasks over time horizon. Many research

    works have been developed for similar problems in many field areas like health-caring,

    manufacturing, transportation However in our study, we approach a general case where

    tasks do not have a specific daily or weekly pattern. Employees can be assigned to more

    than one task per day and taking in consideration multiple sites. The objective of our study

    is to find a feasible solution that respect different constraints relative to labor regulations

    and a constraint relative to multiple sites, balance the workload over employees and

    minimize overload hours. We propose a mixed integer programming model and a key

    performance indicator based heuristic to solve this problem. The results of the heuristic are

    very promising.

    CA020 The COnCEPT Project: Decoding the IT needs of the Professional Designer when in

    Remote Collaboration during the Early Stages of the Design Process

    Liapis Aggelos1, Didaskalou Alexandros, Thiveos Konstantinos

    INTRASOFT International SA, Research and Innovation Department, Greece

    Abstract: Designers are frequently challenged by complex projects in which the problem

    space is unique, rapidly changing, and the information available is limited. In such cases,

    combining knowledge from different fields of expertise is required. Furthermore,

    collaboration during the design process is essential for achieving a meaningful and

    well-formed solution. Designers therefore regularly find themselves exchanging ideas and

  • 2015 IACSIT AMSTERDAM CONFERENCES

    16/ 40

    reflections in form of emails, sketches, and images with a group of experts from different

    backgrounds, working altogether through the creation of a design, its development and

    proper implementation. The particular paper explores -through COnCEPT research and

    development EU co-funded project- the nature and requirements of early design work

    focusing especially on issues of synchronous and asynchronous collaboration, team

    dynamics and the management and monitoring of the early stages of the design process.

    The overall aim is to identify the essential characteristics and needs of distributed teams

    when in remote collaboration during the early stages of the design process and suggest a

    prototype environment based on their requirements and workflow.

    CA016 Language Learning Generators From Traditional Language Learning

    Methodologies to Future Computer Assisted Technologies

    Eva Zanuy

    Escoles Betlem, Ramal 1, Premia de Dalt, Barcelona, Spain.

    Abstract: Textbooks should are tools that generate learning, and if we improved them

    taking into account the different learning styles, we would be creating a real Learning

    Generator for all the students. But the piece of the larger problem I am breaking off to work

    on is how to choose a Learning Generator or perfect textbook.

    The scope of my research includes the bestseller publishing houses in teaching English as a

    second language (Cambridge, Oxford, Longman, Macmillan and Richmond) and each

    single exercise in these textbooks will be classified on the basis of Learning Styles. The

    higher representation of exercises that could help the Reflector Style shows that all the

    publishing houses, without exception, follows the natural method. The natural method fails

    because it has an excess of a single Learning Style.

    Consequently, the publishing houses have to pay greater attention to the theories on

    Learning Styles and use learning systems platforms that benefit all the students. This can be

    accomplished through multimedia education. The future of education is in a virtual world.

    We should change a system based on books which just benefits a small group of students,

    to an e-learning system. The application of technology should become normalized moving

    from classrooms to language labs. Could we imagine a learning system where all students

    learned at their best?

    CA011 The Most Violated WCAG 1.0 Guidelines by the Developers of e-Government

    Websites

    M. Basel Al Mourad

    Zayed University, UAE

    Abstract: Most governments today are moving toward information society where

    e-Government websites are universally accessible by all citizens. Accessible websites

    means that people with disabilities can use the Web and the website developers must follow

    the WWW Consortium (W3C)s Web Content Accessibility Guidelines (WCAG). This

    paper seeks to examine the most violated accessibility guidelines by the developer of the

    web portals. For this purpose, we examined 21 e-Government websites. We identified and

    discussed the most violated WCAG. Our findings may raise awareness to the web

    developer about these violations and encourage them on how to build better and accessible

    websites.

    CA022 Technical requirements of the e-Waybill service

  • 2015 IACSIT AMSTERDAM CONFERENCES

    17/ 40

    Shoaib Bakhtyar, Johan Holmgren, Jan A. Persson

    Blekinge Institute of Technology, Sweden

    Abstract: An electronic waybill (e-Waybill) is a service whose purpose is to replace the

    paper waybill, which is a paper documents that traditionally follows a consignment during

    transport. An important purpose of the e-Waybill is to achieve a paperless flow of

    information during freight transport. In this paper, we investigate five e-Waybill solutions,

    that is, system design specifications for the e-Waybill, regarding their non-functional

    (technical) requirements. In addition, we discuss how well existing technologies are able to

    fulfil the identified requirements. We have identified that information storage,

    synchronization and conflict management, access control, and communication are

    important categories of technical requirements of the e-Waybill service. We argue that the

    identified technical requirements can be used to support the process of designing and

    implementing the e-Waybill service.

    CA027 Performance Evaluation of MPTCP over a Shared Bottleneck Link

    Soonghwan Ro and Dien Nguyen Van

    Kongju National University, Korea

    Abstract: In this paper, we present experimental results evaluating the performance of the

    Multipath TCP over a shared bottleneck path in a series of benchmark tests. We found that

    the Multipath TCPs fairness as well as its competitiveness responds to the change of

    network conditions, such as latency and loss rate. MPTCP is unfairness and powerful with

    regular TCP in ideal network conditions, but its throughput clearly decreases even less than

    regular TCP in worse network conditions with high latency and a higher rate of loss of

    packets.

    CA1010 Design of Mobile e-Learning Forecasting System Based on Case Study Using Multiple

    Intelligence Analysis

    Thongchai Kaewkiriya

    Thai-Nichi Institute of Technology, Bangkok, Thailand

    Abstract: The objective of this research is to design an adaptive mobile e-learning

    forecasting system based on case study using Multiple Intelligence. Thus, our paper

    proposes a conceptual framework of an adaptive e-learning guidance system based on

    Multiple Intelligence. The conceptual framework is divided into six modules. Firstly,

    introduction of a Pattern based module. Secondly, detailed explanation of the Forecasting

    module for students. The third, presentation of the Learning portal module. The fourth,

    presentation of the Adaptive module. The fifth, explanation the Mapping module. And

    finally, proposal of learning content for the module which is based on Multiple

    Intelligence.

    The evaluation of this paper consists of 2 sections. The first section is to evaluate

    achievement of students. Second section is to evaluate precision of prediction for students.

    The result of the first evaluation shown that students who studied via mobile e-learning

    forecasting system are more successful than students who studied via normal e-learning

    system with significant at .05 (t = 2.547, p < .05). The result of second section, we

    considered the percentage of precision. Then, we compared 3 algorithms which consists of

    1) J48 algorithm 2) C4.5 algorithm 3) Nave Bayes algorithm. The percentage of J48

  • 2015 IACSIT AMSTERDAM CONFERENCES

    18/ 40

    algorithm has the highest value which equaled 86.487%.

    MS15303 Investigating Combined Drug and Plasma Apheresis Therapy of HIV Infection by

    Double Compartment Cellular Automata Simulatio

    Sompop Moonchai and Yongwimon Lenbury

    Mahidol University

    Abstract: It has become widely acknowledged that potent combination drug therapy of

    patients infected with Human Immunodeficiency Virus can significantly prolong life, but

    exerts detrimental effect on a patients quality of life. Lymph nodes and lymphatic tissue

    are busy sites of immunological activity. Germs are brought there by the cells of the

    immune system to be broken down and analyzed. However, clinics commonly used blood

    tests for viral load therein to assess the effect of drug therapy. We are therefore of the

    opinion that most cellular automata models in the past that only considered viral

    proliferation in the lymph node cannot give a sufficiently accurate picture of the dynamics

    of HIV infection, especially when the impact of treatments that combine both drugs and

    plasma apheresis are in question. We thus present a two-compartment Cellular Automata

    (CA) model, which simulates the dynamics of HIV infection in both the lymph node and

    blood compartments when drugs and plasma apheresis are applied simultaneously. It is

    found that the combined usage of these two types of therapy yields more favorable outcome

    than the sole use of plasma apheresis.

    MS15304 Contribution of Virtual Reality for Lines Productions Simulation in a Lean

    Manufacturing Environment

    Mohamed-Amine Abidi, Barbara Lyonnet, Pierre Chevaillier, and Rosario Toscano

    ENISE

    Abstract: In an increasingly competitive world, the responsiveness has become essential to

    improve the performance of companies. Accordingly a large number of companies have

    implemented the Lean approach. This approach is a production management method based

    on waste elimination and just-in-time production. This leads manufacturers to update and

    adapt their ways of production management and so reorganize the production lines to

    reduce costs, minimize delays as well as optimize their flexibility. To do this, the use of the

    Virtual Reality (VR) in the lines productions simulation would offer many advantages.

    Thus, this technology would allow users to interact with simulation model in real-time and

    in a 3D format. However, few works have integrated virtual reality in the field of

    simulation in Lean manufacturing environment. The objective of this paper is to propose a

    method of simulation of production flows in a virtual environment in real time. To this end,

    we will review the traditional industrial tools in the field of production simulation. Then we

    will present the main advantages of using the VR to the manufacturing processes in a lean

    environment. Finally a global software solution which integrates VR will be proposed and

    an example of its application to simulate lines production in VR will be presented.

    MS15025 Exact Computation of the Triangular-Lattice Ising Model with Eighteen Spins on a

    Side

    Seung-Yeon Kim

    Korea National University of Transportation, Korea

    Abstract: The Ising model, consisting of magnetic spins, is the most important system in

  • 2015 IACSIT AMSTERDAM CONFERENCES

    19/ 40

    understanding phase transitions and critical phenomena. For the first time, the exact integer

    values for the density of states of the triangular-lattice Ising model with eighteen spins on a

    side and free boundary conditions are evaluated. Also, the exact specific heats are obtained

    for the triangular-lattice Ising ferromagnet and antiferromagnet at the same time.

    Q004 Effectiveness of Conventional CUSUM Control Chart for Correlated Observations

    D. R. Prajapati

    Department of Mechanical Engineering, PEC University of Technology (Formerly

    Punjab Engineering College), Chandigarh, India

    Abstract: Control charts; one of the important tools of quality control, are also known as

    Shewhart charts or process behavior charts. Page (1954) was the first, who introduced the

    Cumulative Sum (CUSUM) control charts for detection of process shifts and claimed that

    these charts are more efficient compared to Shewhart chart to detect small shifts in the

    process average. Various schemes of the CUSUM chart for autocorrelated data for sample

    size of 4 are developed and compared with the schemes of the Shewhart X chart for

    autocorrelated data. It is found that CUSUM chart outperforms the Shewhart X chart for

    all the shifts and at all the levels of correlation () for sample size (n) of four. So, the

    CUSUM control chart is much better option for faster detection in the process mean.

    Q008 Damped Oscillator under Stokesian Realm and Added-Mass Effects

    Jiradech Kongthon

    Assumption University of Thailand, Thailand

    Abstract: This article presents the modeling and simulations of a sphere that oscillates

    vertically in a high-viscosity liquid. The sphere is connected to a linear spring and given an

    initial displacement from the equilibrium position to allow free vibration and the sphere

    undergoes the inertia force, the spring force, the drag force, the buoyancy force, the gravity

    force, and the added-mass force. In general, the added-mass force is not considered in

    modeling an oscillator. In this article, the added-mass force is included in the modeling to

    reflect the reality and the effect of the added-mass force is investigated and discussed. The

    main contribution of this article is to model and simulate the system and to show that (i) the

    natural frequency of oscillation is reduced by the added mass; (ii) the damping ratio is also

    reduced by the added mass; (iii) the return time to the original equilibrium is increased by

    the added mass; (iv) furthermore, the difference on the densities between the liquids

    density and the spheres density dictates the degree of the added-mass effect; i.e., the effect

    due to the added mass is small if the difference on the densities is large.

    Session II- Computer Networks and IT Application

    Venue: Cambridge

    Time: 13:30-16:00

    Session chair: Dr. Jrg Dmmler,

    Technische Universitt Chemnitz, Germany

  • 2015 IACSIT AMSTERDAM CONFERENCES

    20/ 40

    CA012 Support to Apply Accessibility Guidelines to Web Applications

    Tamaki Ohara, Hajime Iwata, Junko Shirogane and Yoshiaki Fukazawa

    Waseda University, Japan.

    Tokyo Womans Christian University, Japan

    Abstract: Recently RIAs (Rich Internet Applications) have been widely adopted in Web

    applications. Although RIAs realize that Web pages change dynamically, their accessibility

    is often insufficient, preventing people with disabilities from properly operating and

    recognizing content. To resolve these problems, the WAI (Web Accessibility Initiative) of

    the W3C (World Wide Web Consortium) has established accessibility guidelines, called

    WAI-ARIA (Web Accessibility Initiative - Accessible Rich Internet Applications), which

    provide detailed instructions to make RIAs accessible for users with disabilities employing

    ATs (assistive technologies). ATs include screen readers, alternative keyboards, screen

    magnification software, and voice recognition software. Applying these guidelines to Web

    applications is extremely burdensome due to the numerous elements in the guidelines.

    Herein we propose a method to automatically evaluate the accessibility of Web applications,

    reducing developers' efforts and costs. The target RIAs of our current method are developed

    by JavaScript.

    CA007 Authentication Protocol for Healthcare Services over Wireless Body Area Networks

    Seulgi Shin, Sung Woon Lee, Hyunsung Kim

    Tongmyong University, Korea

    Abstract: Ubiquitous healthcare service is one of the major fields of research for wireless

    body area networks (WBANs). Ensuring complete and a good level of security for such

    types of WBANs, is not a trivial task. It is practically impossible to deal with all sorts of

    security threats with a single mechanism. This paper reviews Khan et al.s authentication

    protocol for healthcare service over WBANs and shows that it does not provide forward

    secrecy. Furthermore, this paper proposes a remedy protocol for Khan et al.s authentication

    protocol and the previous related protocols. The proposed protocol could be utilized as a

    basic security building block for healthcare applications based on WBANs.

    CA013 Parallel Matrix Multiplication on Centralized Diamond Architecture

    Masumeh Damrudi and Kamal Jadidy Aval

    Islamic Azad University, Iran

    Abstract: In this paper, we introduce a matrix multiplication algorithm on the new born

    parallel architecture named Centralized Diamond architecture. Matrix multiplication is a

  • 2015 IACSIT AMSTERDAM CONFERENCES

    21/ 40

    fundamental mathematical operation which has numerous applications in most of scientific

    fields. There are some sorting and searching algorithms on Centralized Diamond architecture

    which have appropriate time complexity. Once different kinds of parallel algorithms are

    applicable to a parallel architecture, the architecture is considered to be more functional and

    can be employed for different purposes and applications. The theoretical analysis proves that

    the matrix multiplication operation on Centralized Diamond architecture runs in a

    competitive number of steps compared to existing solutions.

    CA008 Authenticated Key Agreement based on NFC for Mobile Payment

    Bomi Seo, Sung Woon Lee, Hyunsung Kim

    Tongmyong University, Korea

    Abstract: Mobile payment is being adopted all over the world in different ways. Along with

    the increased convenience at the point of sale, mobile payment acceptance can also bring

    new risks to the security of cardholder data. Authentication is a basic security building block

    for mobile payment and there are some of research results, which were proven to be weak

    against attacks. This paper proposes a new authenticated key agreement based on NFC for

    mobile payment to solve the problems in the previous researches. The proposed scheme is

    secure against various attacks and could provide privacy to the participants.

    MS15004 HPC (High-Performance Computing) for Big Data on the Cloud: Opportunities and

    Challenges

    Mohamed Riduan Abid

    Alakhawayn University in Ifrane

    Abstract: Big data and Cloud computing are emerging as new promising technologies,

    gaining noticeable momentum in nowadays IT. Nowadays, and unprecedentedly, the amount

    of produced data exceeds all what has been generated since the dawn of computing; a fact

    which is mainly due to the pervasiveness of IT usage and to the ubiquity of Internet access.

    Nevertheless, this generated big data is only valuable if processed and mined. To process and

    mine big data, substantial HPC (High-Performance Computing) power is needed; a faculty

    which is not that affordable for most, unless we adopt for a convenient venue, e.g., cloud

    computing. In this paper, we propose a blue print for deploying a real-world HPC testbed.

    This will help simulating and evaluating HPC relevant concerns with minimum cost.

    Indeed, cloud computing provides the unique opportunity for circumventing the initial cost

    of owning private HPC platforms for big data processing, and this by providing HPC as a

    service (HPCaaS). In this paper, we present the subtleties of a synergetic fitting between

    big data and cloud computing. We delineate opportunities and address relevant

    challenges.To concretize, we advocateusing private clouds instead of public ones, and

    propose using Hadoop along with MapReduce, on top of Openstack, as a promising venue

    for scientific communities to own research-oriented private clouds meant to provide HPCaaS

    for Big data mining.

    MS15005 Parallel Simulation Algorithm of VLSI for Multicore Workstations with Dynamic

    Faults Grouping

    Dmitry Ivanov

    Institute of Mathematics of National Academy of Sciences of Ukraine, Ukraine

  • 2015 IACSIT AMSTERDAM CONFERENCES

    22/ 40

    Abstract: A new algorithm for parallel fault simulation of VLSI on multicore workstations

    with common memory is proposed. To speeding up the algorithm two-level parallelization is

    used. First, main schema of the algorithm is based on the concurrent many-threaded

    simulation of the groups of faults for each input vector. Second, each group of faults is

    simulated in bit-parallel way. The dynamic fault grouping is adopted. The results of

    computational experiments on ISCAS-89 benchmarks circuits are reported, which are

    obtained on the 12-core workstation.

    MS15029 Extraction of Region with Excessive Disparities Using Block based Disparity

    Calculation

    Sang Hyun Kim, Jeong Yeop Kim and Gil Ja So

    Youngsan University

    Abstract: In this paper, we propose the method extracts regions with excessive disparities in

    3D stereoscopic images using block based disparity calculation for fatigue evaluation. The

    proposed method calculates the disparity-map using not pixel based method but block based

    method. The disparity-maps resolution is decreased in proportion to block size. In the

    proposed method, first, the disparity-map is calculated based on BMA (block matching

    algorithm). The normalized cross- correlation is used as the cost function. The excessive

    disparity regions are extracted using the automatically decided threshold with Otsu algorithm

    in the disparity-map. Next, to eliminate the small regions, the extracted regions are post

    processed by morphological filter, erosion and dilation. The sum of the disparities in the

    object regions which is normalized with image size is used as parameter in fatigue evaluation

    model. To extract the exact object, the object regions will be segmented in 3D stereoscopic

    left image using region growing.

    CA006 NFC based Privacy Preserving User Authentication Scheme in Mobile Office

    Jungsub Ahn, Sung Woon Lee, and Hyunsung Kim

    Tongmyong University, Korea

    Abstract: Smartwork is a flexible type of work that provides users with a more convenient

    work possibility, which refers to employees who work away from the companys office in

    any capacity. Smartwork technologies often need additional protection because their nature

    generally places them at higher exposure to external threats. Therefore, smartwork

    application should provide securing infrastructures for both of users, inside and outside of

    the organization. This paper proposes a NFC based privacy preserving user authentication

    scheme as a basic security building block for smartwork environment, which is focused only

    on the mobile office one of smartwork environment. The proposed scheme provides

    anonymity and untraceability, which requires for the ubiquitous environment applications.

    The proposed scheme could be used as a basic building block for security on the various

    smartwork environments.

    MS15030 The Evaluation Model of the Visual Fatigue on the 3D Stereoscopic Video

    Gilja So, Sanghyun Kim and Jeongyeop Kim

    Youngsan University, Korea

    Abstract: We propose content dependent factors to be an argument of evaluation model of

    visual fatigue. The content factors we choose are the strength and size of the excessive

    disparity range, the complexity of the background objects, the variation of the motion-depth,

  • 2015 IACSIT AMSTERDAM CONFERENCES

    23/ 40

    the contrast of the objects in the scene. We verify that these factors have a relationship with

    visual fatigue through the experiment and suggest methods to extract the degree of these

    factors automatically.

    MS15018 Simulating SQL-Injection Cyberattacks using GNS3

    Aadil Al-Mahrouqi, Patrick Tobin, Sameh Abdalla and Tahar Kechadi

    University College Dublin, Dublin

    Abstract: Network Forensics is a subtopic of Digital Forensics wherein research on artificat

    investigations and intrusions evidence acquisition is addressed. Among many challenges in

    the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data),

    when network devices are suddenly non-operational remains a topic of interest to many

    investigators. The main objective of this article is to simulate an SQL injection attack

    scenarios in a complex network environment. We designed and simulated a typical

    Demilitarized Zone (DMZ) network environment using Graphical Network Simulator

    (GNS3), Virtual Box and VMware workstation. Using this set-up we are now able to

    simulate specific network devices configuration, perform SQL injection attacks against

    victim machines and collect network logs. The main motivation of our work is to finally

    define an attack pathway prediction methodology that makes it possible to examine the

    network artifacts collected in case network attacks.

    Q007 Early Energy Estimation of Networked Embedded Systems Executing Concurrent

    Software Components

    Patrick Heinrich, Hannes Bergler, and Erik Oswald

    Fraunhofer Institute for Embedded Systems and Communication Technologies ESK,

    Munich, Germany

    Abstract: This paper presents and evaluates a new approach of modeling energy

    consumption of embedded systems resulted by concurrent software components. The

    objective is to enable energy estimation within early phases of system development, which

    allows system designers to compare different allocations of software components within

    networked systems.

    The model is presented in detail and its application demonstrated by a case study.

    Additionally, an execution time estimation for software components is presented which is

    necessary for the energy model but previously not available. The model was developed

    being applicable early in the development process, i.e. previous to any software

    implementation. This was realized by using only available information.

    The individual elements of the presented model are: energy consumption of software

    components themselves, energy consumption resulted by any software component, and

    energy consumption resulted by specific software components. The variables of the model

    can be estimated during early phases of system design using existing methods, expecting the

    execution time of software components. For that reason, a previously energy estimation

    technique was further developed to estimate the execution time based on program

    flowcharts.

    The estimation was verified by using three commercially available benchmarks. The

    flowcharts of these are utilized to estimate the execution times. The comparison between

    estimated and measured execution time of an exemplary embedded system results in an

    estimation error bandwidth between -12.5 % and +6.8 %. Additionally, an algorithm is

    presented which enables an automated analysis of program flowcharts as part of the

    execution time estimation.

  • 2015 IACSIT AMSTERDAM CONFERENCES

    24/ 40

    The developed model was applied within an automotive case study which shows a

    theoretical energy saving potential of 36.2 %. This demonstrates the potential and relevance

    of modeling energy estimation within early development phases.

    Q020 Multi-state reliability Assessment of Tool Magazine & Manipulator

    Yi Ou, Jun Han, Yi Liang, Aihua Yin, Hutian Feng, Yulin Wang

    Nanjing University of Science and Technology, China

    Abstract: Tool Magazine & Manipulator has many intermediate states on tool changing

    between success and failure, Multi-State Reliability theory must be applied in modeling and

    analyzing the process of performance degradation. Combined with the data from reliability

    test and performance test, carry out definition on sub-systems states of Tool Magazine &

    Manipulator, use Markov random process theory in calculation of sub-systems states

    probability, use Universal Generation Function (UGF) construct Multi-State Reliability

    model of system, and give assess formula of performance reliability in a certain demands,

    this method is easy to understand, makes up the shortage of Two-State Reliability analysis.

    16:00-16:20 Coffee Break

    Session III- Automation and Control Systems

    Venue:

    Time: 16:20-18:20pm

    Session Chair:

    Florian Niedermeier,

    BMW Group, Karlsruher Institute of Technology, Germany

    CA010 Comparative Performance of a Parallel Implementation of an Internet-Scale

    Zero-Day Worm Epidemiology Simulator

    Luc Tidy, Steve Woodhead and Jodie Wetherall

  • 2015 IACSIT AMSTERDAM CONFERENCES

    25/ 40

    University of Greenwich, UK

    Abstract: The threat posed by fast-spreading malware is significant, particularly given the

    fact that network operator / administrator intervention is not likely to take effect within the

    typical epidemiological timescale of such infections. The cost of zero-day network worm

    outbreaks has been estimated to be up to US$2.6 billion for a single worm outbreak.

    Zero-day network worm outbreaks have been observed that spread at a significant pace

    across the global Internet, with an observed rate of reaching more than 90 percent of

    vulnerable hosts within 10 minutes. An accepted technology that is used in addressing the

    security threat presented by zero-day worms is the use of simulation systems, and a

    common factor determining their efficacy is their performance. An empirical comparison of

    a sequential and parallel implementation of a novel simulator, the Internet Worm Simulator

    (IWS), is presented detailing the impact of a selection of parameters on its performance.

    Experimentation demonstrates that IWS has the capability to simulate up to 91.8 million

    packets transmitted per second (PTS) for an IPv4 address space simulation on a single

    workstation computer, comparing favourably to previously reported metrics. It is concluded

    that in addition to comparing PTS performance, simulation requirements should be taken

    into consideration when assessing the performance of such simulators.

    CA017 Modeling and Querying Multidimensional Bitemporal Data Warehouses

    Canan Eren ATAY and Gzde ALP

    Marmara University, Turkey

    Abstract: Data warehouses have been considered to be the key aspect of success for any

    Decision Support System (DSS). Temporal database research has produced important

    results in this field. Data warehouses store historical data, and therefore could clearly

    benefit from the research on temporal databases. Temporal data warehouses join the two

    fields of temporal databases and data warehouse research. This paper introduces a

    bitemporal data warehouse model that both valid time and transaction time are attached to

    attributes. Data warehouse objects and cubes are created with multidimensional bitemporal

    relational database. Performance of available well-known relational database and

    bitemporal extension for data warehouse is evaluated and compared in terms of execution

    time and disk space consumption with the set of queries.

    CA1004 Improving the Recommendation Accuracy for Cold Start Users in Trust-Based

    Recommender Systems

    Abdelghani Bellaachia and Deema Alathel

    The George Washington University, USA

    Abstract: Recommender systems have become extremely popular in recent years due to

    their ability to predict a users preference or rating of a certain item by analyzing similar

    users in the network. Trust-based recommender systems generate these predictions by using

    an explicitly issued trust between the users. In this paper we propose a recommendation

    algorithm called Averaged Localized Trust-Based Ant Recommender (ALT-BAR) that

    follows the methodology applied by Ant Colony Optimization algorithms to increase the

    accuracy of predictions in recommender systems, especially for cold start users. Cold start

    users are considered challenging to deal with in any recommender system because of the

    few ratings they have in their profiles. ALT-BAR reinforces the significance of trust

    between users, to overcome the lack of ratings, by modifying the way the initial pheromone

  • 2015 IACSIT AMSTERDAM CONFERENCES

    26/ 40

    levels of edges are calculated to reflect each edges associated trust level. An appropriate

    initialization of pheromone in ant algorithms in general can guarantee a proper convergence

    of the system to the optimal solution. ALT-BARs approach allows the ants to expand their

    search scope in the solution space to find ratings for cold start users while exploiting

    discovered good solutions for the sake of heavy raters. When compared to other algorithms

    in the literature, ALT-BAR proved to be extremely successful in enhancing the prediction

    accuracy and coverage for cold start users while still maintaining fairly good results for

    heavy raters.

    MS15031 The Modeling of Color Fatigue in 3-Dimensional Stereoscopic Video

    Jeong-Yeop Kim, Sang-Hyun Kim andGil Ja So

    Youngsan University, Korea

    Abstract: The change of color information on 3-dimensional stereoscopic video usually

    causes visual fatigue. Color information also gives some effect on the depth recognition

    because of the visual perception for the effect such as forward color. However the effect

    of forward colordoes not gives much influence on depth perception. Therefore, the

    analysis of color itself rather than the concept of forward color is important. In this paper,

    the method for calculating visual fatigue by color only is proposed.

    MS15108 Plc Based Automatic Intelligent Car Parking System

    Faraz Islam, Mohammad Adil, Sayeed Akhtar Alvi

    Aligarh Muslim University

    Abstract: The main purpose of this paper was to design and implement an intelligent car

    parking system. The proposed system works on three modes such as ON, OFF and

    EMERGENCY.

    The system developed is able to sense the presence of the vehicles standing at the main car

    parking gate through an IR sensor. These IR sensors give their output to the PLC

    (programmable logic controller).

    Due to lack of parking spaces and skilled labour, there is a global shift towards the

    automatic car parking system to calculate accurate space available for car and revenue

    collection as a parking fee.

    This new scheme provides an improvement and reliability in the current car parking system

    and this system can be implemented easily because it is very economical as it uses solar

    panel for its power consumption and also the cheap IR sensor reduces the implementation

    cost.

    MS15305 A Study on Diesel Plug-in Hybrid Vehicle Powertrain Analysis and Modeling

    Ho-Un Jeong, Kyu-Hyun Sim, Kwan-Soo Han, and Sung-Ho Hwang

    Sungkyunkwan University

    Abstract: TMED (Transmission Mounted Electric Device) PHEV(Plug-in Hybrid Vehicle)

    powertrain consist of engine, engine clutch, motor, transmission ,differential gear, wheel

    and tire. By disengaging engine clutch, the vehicle can use only motor power for driving.

    After battery depleted, engine and motor are cooperate to increase engine efficiency.In this

    paper, diesel PHEV (Plug-in Hybrid Vehicle) powertrain dynamic equations was derived

    from longitudinal vehicle model. In order to design optimal powertrain capacity in given

    specifications, various capacities of engine and motor model was derived from commercial

  • 2015 IACSIT AMSTERDAM CONFERENCES

    27/ 40

    engine and motor test data. Engine and Motor model use input signal and input shaft speed

    to calculate torque outputs, also calculate energy conversion efficiency.Using MATLAB

    Simulink program, diesel PHEV dynamic model was created from engine and motor

    model, and powertrain dynamic equations. Using developed simulator, we analysis basic

    performance of diesel PHEV.

    Q014 Model Approximate Method of Complex System

    Juan Chen, Yuqin Liu, Shiang Qi, and Qing Guo

    Beijing University of Chemical Technology, China

    Abstract: During the internal model control of multivariate multiple time delay system,

    process model is very important in the design of controller, but complicated mathematical

    model is often encountered in decoupled multivariable multiple time delay system and

    needs to be reduced order. So this paper proposes a low order identification structure and

    an optimization method for model approximation of the complex model containing the time

    delay and non-minimum phase parts. In this paper, with the adoption of Pade

    approximation, a suboptimal approximate algorithm is used for the model approximation

    and model identification. The integral square error index and the frequency-domain integral

    square error index, as well as the integral time absolute error index is used to evaluate the

    approximate model comprehensively. Simulation results show that using the proposed

    model identification structure and adopting the suboptimal approximate algorithm to deal

    with this kind of approximation, that can get an approximate model that well reveals the

    dynamic characteristics of system and has a high approximation precision.

    Q018 Measurement and Control System Design of Precision Retentivity of Rolling Linear Guide Pair

    Jun Han, Hutian Feng, Yi Ou, Yi Liang, Aihua Yin, Li Zu

    Nanjing University of Science and Technology, China

    Abstract: Researched measurement and control system of precision retentivity of rolling

    linear guide pair for the problem of precision retentivity of rolling linear guide pair.

    Introduced the test bed testing system respectively from the hardware structure and

    software design in detail, and analyzed the data of test results. The design of test system

    provides a platform for the on-line measurement of precision retentivity of rolling linear

    guide pair, provides theoretical basis, testing methods and data support for new product

    research and development or product improvement. It has a very important significance to

    improve the performance of rolling linear guide pair made in China.

    MS15037 Finite Element Simulation and Analysis of the Vertical and Pitching Static Stiffness of

    Linear Rolling Guide

    Bin Zhou, Yulin Wang, Jun Han, Hetian Feng, Yi Ou, Aihua Yin and Wei Zhang

    Nanjing University of Science and Technology, China

    Abstract: The static stiffness has a direct influence on performance of the linear rolling

    guide (LRG). Therefore, it is necessary and useful to study on how to improve the static

    stiffness. In this work, a 3D finite element model (FEM) of LRG was developed based on

    ANSYS Workbench. Then the influence of the number, diameter and material of rolling

    balls, curvature ratio and initial contact angle on vertical and pitching static stiffness was

    studied based on the simulation. Finally, several methods for improving vertical and

  • 2015 IACSIT AMSTERDAM CONFERENCES

    28/ 40

    pitching static stiffness of LRG were proposed.

    Session IV- Automation and Control Systems

    Venue: Cambridge

    Time: 16:20-18:20pm

    Session Chair:

    Dr. Charles Mutigwe

    University of Massachusetts Amherst, USA

    CA029 WSNs and On-board Visual Fuzzy Servoing on Blimp Robot for Tracking Purposes

    Rami Al-Jarrah, Mohammad A. Al-Jarrah, Hubert Roth

    Siegen University, Siegen, Germany

    Abstract: The aerial robots represent an interested and rich area of research because they

    are very useful to perform complex tasks such as localization and tracking targets. To

    develop blimp system that is appropriate in diversity scenarios, an intelligent control with

    high autonomy degree is required. Therefore, we design blimp robot based on embedded

    system; then, we present several fuzzy sets models that should deal with autonomous,

    navigation and visual tracking problems. These models are empirically designed by

    combining the possibilities distributions theory with fuzzy logic. Thus, this paper addresses

    the problem of tracking robots in parallel with achieving the cooperative behavior based on

    computer vision system and artificial intelligent control to improve the efficiency of such

    system. In addition, considering use of wireless sensor networks for estimation

    multi-targets locations and the distances between them is presented.

    Q015 Modelling of Diagrid Structural System for High Rise Buildings

    Gulshan Mann and Vijay Pal Singh

    Department of Civil Engineering, National Institute of Technology, Kurukshetra

    Abstract: As in modern era population of metropolitan cities increased very rapidly. Due

    to which construction of high rise buildings is justified. In high rise building lateral loads

    are critical than gravity load. Presently the Framed, tubular, space truss, super frame

    structural systems are used to construct high rise buildings. Nowadays a new system named

    diagrid system has been adopted as a replacement of framed structure. In diagrid system the

    diagonal members are designed as tress element. Diagrid structural system is unique as it

    resist lateral load by its axial action. Efficiency of diagrid structural system mainly depends

    upon angle of diagrid. In the present study a 40 storey building with and without corner

    column has been analyzed. Comparison of analysis results in term of time period and top

  • 2015 IACSIT AMSTERDAM CONFERENCES

    29/ 40

    storey displacement for different angles is presented in this paper. The entire modeling and

    analysis of the structure has been done using SAP-2000 software.

    Q019 Modeling and Error Analysis of the Parallelism Measurement for Linear Rolling

    Guide Pair

    Yi Liang, Yulin Wang*, Aihua Yin, Li Zu, Hutian Feng, Dan Xu

    Nanjing University of Science and Technology, China

    Abstract: The parallelism of a linear rolling guide pair directly affects the machining

    precision of machine tools. Therefore, its necessary and meaningful to find the

    measurement method to test them. A test method of parallelism of rolling linear guide pairs

    based on non-contact laser displacement sensors has been put forward. The paper derives

    an analytical testing algorithm of measurements of five laser displacement sensors to obtain

    the parallelism and their error analysis of linear rolling guide pairs. The parallelism of

    linear guide pairs includes five movement precisions which are horizontal parallelism,

    vertical parallelism, elevation angle, deflection angle and roll angle of a slider block

    relative to its guide way. The converting formulas from the laser sensors measurement to

    the two parallelisms and three angles are derived based on the basic theory of three-points

    can determine a plane. Because the sensors are installed with inevitably errors, the

    deviation of two parallelisms and three angles caused by the errors are analyzed. Results

    show that two parallelisms and three rotation angles depend critically on the measuring

    length of five laser sensors. The paper provides an effective method for measuring the

    parallelism and makes progress of the automatic detection of a linear rolling guide pair.

    MS15002 Optimal Dispatch of Distributed Generation in a Grid-Tied Microgrid Via Direct

    Search Method

    Wei-Tzer Huang, Kai-Chao Yao and Chun-Ching Wu

    Department of Industrial Education and Technology in National Changhua University

    of Education

    Abstract: This paper proposed a simple and efficient approach, Minimum Incremental

    Cost Approach(MICA), for the optimal schedule in a grid-tied micro-grid (MG) with

    various types of distributed generation (DG). The fuel costs generated by these DGs are

    determined using quadratic and linear functions dependent on the types of DGs. The

    proposed approach, MICA, is able to handle several inequality constraints without

    introducing any multipliers and furthermore it can solve the non-derivative problems or the

    fuel cost functions being much more complicated. Accordingly, the MICA is proposed for

    determining the optimal schedule of MGs with various types of DG to minimize generation

    costs under grid-tied operation. Results demonstrate that the proposed MICA is a simple

    approach to determining the optimal schedule in MGs with various types of DG.

    MS15006 Innovation Process Simulation on the base "Predator and Prey" Model

    Victor Romanov, Helen Agafonova,Saltanat Sandybaeva and Nikita Mullin

    Russian Plekhanov University of Economics

    Abstract: The paper is devoted to the simulation of two populations coexistence, one of

    which represents old big corporations and the other one small innovative business. It is

    hard to imagine modern digital world without such combination of words as computer

    modeling and simulation. This discipline gains popularity throughout the whole scientific

    app:ds:basicapp:ds:theory

  • 2015 IACSIT AMSTERDAM CONFERENCES

    30/ 40

    world. In our paper we examine such phenomenon as emotion simulation. It contains as a

    review of emotion simulating research as some original results on the innovation

    simulation based on predator and prey model.

    There is widely spread opinion, that modern information technologies provide us an

    opportunity to simulate emotions and feelings. Simulation of conflicts, cooperation, and the

    emotion simulation are often used to explain the nature of human behavior, depending on

    different factors such as personality, emotional state and mood at the specific moment in

    time. For instance, we can consider large company, which faces some troubles, as feeling

    some hunger and to satisfy it, the company tries to absorb some other smaller firm.

    The most important result of our research is the discovery of such parameters values

    interval in which great firms and small businesses (start-ups) can grow and raise

    simultaneously.

    MS15027 Advanced Smart Cruise Control with Safety Distance Considered Road Friction

    Coefficient

    Do Ui Hong, Chanho Park, Yongho Yoo and Sung-Ho Hwang

    Sungkyunkwan University, Korea

    Abstract: This research suggests the velocity controller with Advanced Smart Cruise

    Control(ASCC) with stop & go control considering the surface friction coefficient and

    applying a safety distance. A safety distance affects quality of cruise control. If a safety

    distance is too short, the probability to cause a collision gets greater whereas if it is too

    long, it can cause traffic congestion. Thus, calculating the optimal safety distance is very

    important. In this study, we used fitting functions to obtain a basic safety distance and then

    added the -safety distance, considering friction coefficient and relative velocity, to

    calculate final safety distance. We invented ASCC and stop & go control by considering

    velocity of vehicle to maintain the safety distance and relative velocity at the same time.

    Carsim was used for simulation and we found that while a vehicle with the velocity

    controller, calculating the velocity and location difference between preceding and following

    vehicles with four friction coefficients, it keeps a safety distance.

    MS15032 Chaos Control in Memristor-based Oscillators Using Intelligent Terminal Sliding

    Mode Controller

    Amir Hossein Abolmasoumi and Somayeh Khosravinejad

    Arak University

    Abstract: The problem of terminal sliding mode controller design for chaos control

    inmemristor-based oscillatorsis investigated. The main goal is to stabilize the chaotic

    Chuas memristor-basedoscillator and to track the sinusoidal reference input.The stability

    of the oscillator with terminal sliding mode control is analyzed using Lyapunov criteria.

    Moreover, by defining a new objective function,genetic algorithm optimization is used to

    reduce the chattering effect and to decrease the convergence timeof terminal sliding mode

    controller. Simulation results demonstrate the usefulness of the proposed control method.

    MS15036 Deformation Analysis and Simulation of the Cup-shaped Flexspline for Harmonic

    Drive Using in Aerocrafts

    Li Zu, Aihua Yin, Yanyang Sun, Yulin Wang, Yi Ou, Yi Liang and Hutian Feng

    Nanjing University of Science and Technology, China

  • 2015 IACSIT AMSTERDAM CONFERENCES

    31/ 40

    Abstract: The harmonic gears used in servo drive systems of aerocrafts have the features

    of over loading and working for a short time. They are required to be smaller and lighter.

    Theoretical research and finite element analysis are given to the deformation characteristic

    of the flexible gear for the harmonic drive. This paper studies the initial deformation of the

    flexible gear, and compares with the result of finite element analysis. Overload is applied to

    the flexible gear, and by using ABAQUS FEA software, the distortions on the flexspline

    can be found. The research results provide theoretical references for improving load

    capacity of harmonic drive and designing this type of harmonic drive.

    MS15038 The Structure Optimization of Test-bed for Load Bearing Performance of Harmonic

    Gear Drive

    Hetian Feng, Li Zu, Yiwen Zhang, Yi Ou, Yi Liang, Jun Han and Aihua Yin

    Nanjing University of Science and Technology, China

    Abstract: This paper aims at the structural design and optimization of the test-bed for the

    load bearing performance of the harmonic gear drive. Based on the computer software, the

    mode analyses are given to the test-bed. The effects brought by different structures of

    stiffened plate on bed natural frequencies and deformations are studied. The Loading and

    overloading tests of the harmonic gear drive can be realized on the optimized designed

    test-bed, we can know the bearing capacity and transmission efficiency of the harmonic

    gear drive.

    19:00-20:30 Dinner Buffet (Restaurant)

  • 2015 IACSIT AMSTERDAM CONFERENCES

    32/ 40

    Listener List

    ICCMS 2015 ICICA 2015 Helen Agafonova

    Russian Plekhanov University of Economics,

    Russian Federation

    Annalyn Casino

    eXcode Innovations Corp, Philippines

    Saltanat Sandybaeva

    Russian Plekhanov University of Economics,

    Russian Federation

    AZEEZ OLADIPUPO TIJANI University Of

    Johannesburg, South Africa

    Mwembo Olimo Alain Yvan RuedasNestle Philippines-Philippines Kyuhyun Sim

    Sungkyunkwan University, Korea

    Ibrahim Salum Mohammed

    Convent Holdings Ltd, Tanzania

    Rehema Godwin Mwambipile

    Convent Holdings Ltd, Tanzania

    Julian Lee

  • 2015 IACSIT AMSTERDAM CONFERENCES

    33/ 40

    Hotel Casa 400

    http://www.hotelcasa400.nl/en/index.html

    CONTACT

    +31 (0)20 665 11 71

    Eerste Ringdijkstraat 4

    1097 BC Amsterdam

    Hotel Casa 400 is the ideal starting point in Amsterdam. Thanks to our unique location near the Amstel

    Station, youll have the whole city at your feet. In addition, Casa 400 has a large underground car park.

    Casa 400 is a modern hotel, which opened its doors in the spring of 2010. Staying with us means having

    no worries. Hospitality and service is what we focus on in Casa 400. The reception team is always at your

    disposal!

    CONTACT:

    +31 (0)20 665 11 71

    Eerste Ringdijkstraat 4

    1097 BC Amsterdam

    http://www.hotelcasa400.nl/en/index.html

  • 2015 IACSIT AMSTERDAM CONFERENCES

    34/ 40

    www.icccm.org

    Welcome to ICCCM 2015

    2015 5th International Conference on Computer Communication and Management (ICCCM 2015) will be

    held during May 18-19, 2015 in Rome, Italy together with the workshops ICSEM 2015 and ICIII 2015.

    The aim of ICCCM 2015 is to provide a platform for researchers, engineers, academicians as well as

    industrial professionals from all over the world to present their research results and development activities

    in Computer Communication and Management. This conference provides opportunities for the delegates

    to exchange new ideas and application experiences face to face, to establish business or research relations

    and to find global partners for future collaboration.

    Important Dates

    Paper Submission (Full Paper) March 5, 2015

    Notification Day March30, 2015

    Registration Deadline April 15, 2015

    Conference Date May 18-19, 2015

    Publication

    Conference papers can be selected and published into International Journal of Computer and

    Communication Engineering (IJCCE) or Journal of Advanced Management Science(JOAMS) excellent

    papers will be select to be published in International Journal of e-Education, e-Business, e-Management

    and e-Learning(IJEEEE)

    E-mail: [email protected]

    http://www.icdle.org/inner.htmlhttp://www.icdip.org/date.htmlmailto:[email protected]

  • 2015 IACSIT AMSTERDAM CONFERENCES

    35/ 40

    Welcome to ICEMP 2015

    ICEMP-International Conference on Engineering Mathematics and Physics is the main annual research

    conference aimed at presenting current research being carried out. The ICEMP 2013 and 2014 were held

    in Colombo, Sri Lanka, and Hong Kong.ICEMP 2015 will be held in Kuala Lumpur, Malaysia during

    June 11 to 12, 2015. The idea of the conference is for the scientists, scholars, engineers and students from

    the Universities all around the world and the industry to present ongoing research activities, and hence to

    foster research relations between the Universities and the industry. ICEMP 2015 is sponsored by

    International Association of Computer Science and Information Technology, and technical co-sponsored

    by many other universities and institutes

    Prof. Haydar Akca

    Abu Dhabi University, Abu Dhabi, UAE

    Important Date

    Full Paper Submission Before March 25,2015

    Notification of Acceptance Before March 15, 2015

    Registration Deadline April 5, 2015

    Conference Date June 11-12, 2015

    Contact US

    Ms. Yolanda

    E-mail: [email protected]

    mailto:[email protected]

  • 2015 IACSIT AMSTERDAM CONFERENCES

    36/ 40

    2015 International Conference on Advances in Engineering Materials

    (ICAEM 2015)

    27-30 June, 2015, Romania

    2015 International Conference on Advances in Engineering Materials (ICAEM 2015) will be held

    in Romania during June 27th-30th, 2015. The main objective of this conference is to provide a platform

    for engineers, academicians, scientists, industrial professionals and researchers from over the world to

    present the result of their research activities in the field of Advances in Engineering Materials. ICAEM

    2015 provides opportunities for the delegates to share the knowledge, ideas, innovations and problem

    solving techniques.

    Important Dates

    Full Paper Deadline 2015/03/30

    Acceptance Notification 2015/04/20

    Registration Deadline 2015/05/05

    Conference Date 2015/06/27-30

    Paper Publication All accepted papers will be published in the Trans Tech Publication Ltd. from

    Switzerland www.scientific.net/AMM-and indexed by Elsevier in on-line data base(see

    the web page by click here)

    Contact Us

    Inquires referred to any general questions, please email to the secretariat at [email protected].

    Yoyo Yang,

    Conference secretary

    http://www.ttp.net/1660-9336.htmlhttp://www.ttp.net/1660-9336.htmlmailto:[email protected]

  • 2015 IACSIT AMSTERDAM CONFERENCES

    37/ 40

    Welcome to ICIKM 2015

    ICIKM is the main annual research conference aimed at presenting current research being carried

    out. The ICIKM 2012-2014 were held in Kuala Lumpur, Chengdu, and Bangkok respectively, and the

    currently ICIKM 2015 will be held on 29 to 30 July 2015 in Shanghai, China. The idea of the conference

    is for the scientists, scholars, engineers and students from the Universities all around the world and the

    industry to present ongoing research activities, and hence to foster research relations between the

    Universities and the industry.

    Submitted papers can be selected and published into one of the following Journals:

    International Journal of Knowledge Engineering which will be indexed byDOAJ, Electronic Journals

    Library, Engineering & Technology Digital Library, Google Scholar, Crossref and ProQuest

    International Journal of Information and Education

    Technology (ISSN: 2010-3689 DOI: 10.7763/IJIET),which will be indexed by DOAJ, Electronic

    Journals Library, Engineering & Technology Digital Library, Google Scholar, Crossref andProQuest.

    Important Dates

    Submission Deadline March 10, 2015

    Notification Deadline March 30, 2015

    Registration Deadline April 20, 2015

    Conference Date July 29-30, 2015

    Contact Us

    Ms. Yoyo Yang

    E-mail: [email protected]

    Tel (AM 9:30--PM 12:00, PM 13:30--PM 18:00, Monday to Friday):

    +1-518-478-2659 (USA)

    +86-28-86528758 (China)

    http://www.ijke.org/http://www.doaj.org/doaj?func=openurl&genre=journal&issn=20103689http://ezb.uni-regensburg.de/searchres.phtml?bibid=AAAAA&colors=7&lang=en&jq_type1=KT&jq_term1=ijiethttp://ezb.uni-regensburg.de/searchres.phtml?bibid=AAAAA&colors=7&lang=en&jq_type1=KT&jq_term1=ijiethttp://www.etlibrary.org/http://www.google.com.hk/http://www.crossref.org/http://www.proquest.asia/zh-CN/http://www.ijiet.org/http://www.ijiet.org/http://dx.doi.org/10.7763/ijiethttp://www.doaj.org/doaj?func=openurl&genre=journal&issn=20103689http://ezb.uni-regensburg.de/searchres.phtml?bibid=AAAAA&colors=7&lang=en&jq_type1=KT&jq_term1=ijiethttp://ezb.uni-regensburg.de/searchres.phtml?bibid=AAAAA&colors=7&lang=en&jq_type1=KT&jq_term1=ijiethttp://www.etlibrary.org/http://www.google.com.hk/http://www.crossref.org/http://www.proquest.asia/zh-CN/mailto:[email protected]

  • 2015 IACSIT AMSTERDAM CONFERENCES

    38/ 40

    WELCOME TO ICACTE 2015

    ICACTE 2015 will be held in Berlin, Germany during August 13-14, 2015.

    Welcome to the official website of the 8th International Conference on Advanced Computer Theory and

    Engineering (ICACTE 2015). The conference will be held in Berlin, Germany during August 13-14,

    2015. Together with worshops ICETC 2015 and ICCRC 2015. The aim objective of ICACTE is to present

    the latest research and results of scientists (preferred students, PhD Students, and post-doc scientist)

    related to Advanced Computer Theory and Engineering topics. This conference provides opportunities for

    the different areas delegates to exchange new ideas and application experiences face to face, to establish

    business or research relations and to find global partners for future collaboration. We hope that the

    conference results constituted significant contribution to the knowledge in these up to date scientific

    field.

    Submitted papers can be selected and published into one of the following Journals. Registration fee

    is different of each journal. Get to know the registration fee here.

    *WIT Transactions on Engineering Sciences (ISSN: 1743-3533)

    Indexed by EI Compendex and ISI

    *International Journal of Computer Theory and Engineering (IJCTE)

    Abstracting/Indexing: Index Copernicus,Electronic Journals Library, EBSCO, Engineering & Technology Digital Library, Google Scholar,

    Ulrich's Periodicals Directory, Crossref, ProQuest, WorldCat, andEI (INSPEC, IET), Cabell's Directories.

    IMPORTANT DATES

    Full Paper Submission Deadline Before April 5, 2015

    Notification of Acceptance Before April 25, 2015

    Authors' Registration Before May 10, 2015

    Conference date August 13-14, 2015

    CONTACT US

    Ms. Yolanda Dong

    E-mail: [email protected]

    http://www.icetc.org/http://www.iccrc.org/http://www.icacte.org/reg.htmlmailto:[email protected]

  • 2015 IACSIT AMSTERDAM CONFERENCES

    39/ 40

    Note

  • 2015 IACSIT AMSTERDAM CONFERENCES

    40/ 40