This document contains the proceedings from the 2016 International Conference on Computer Science, Technology and Application (CSTA2016) held in Changsha, China from March 18-20, 2016. It includes 67 peer-reviewed articles organized into 5 areas: image and signal processing, computer network and information security, algorithm and simulation, data mining and cloud computing, and computer system and applications. The proceedings provide an overview of the conference including preface, committees, and keynote speaker information, followed by the full text of accepted papers presented at the conference.
Computer Science, Technology and Application Proceedings
1. 10290_9789813200432_tp.indd 1 30/8/16 11:45 AM
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
2. b2530 International Strategic Relations and China’s National Security: World at the Crossroads
b2530_FM.indd 6 01-Sep-16 11:03:06 AM
This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
3. 10290_9789813200432_tp.indd 2 30/8/16 11:45 AM
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
5. v
Preface
The 2016 International Conference on Computer Science,
Technology and Application (CSTA2016) have been successfully
held in Changsha, China during March 18-20, 2016. The main
objective of this conference is to provide a platform for scientists,
researchers, and engineers from different part of the world to get
together under one roof to discuss, present and share their research
findings and results in the development in computing technology
and its application.
CSTA2016 received over more than 150 submissions, but only 67
articles are included in this proceedings after a rigorous process of
double peer review. The proceedings is organized into 5 specialize
areas, which include image and signal processing, computer
network and information security, algorithm and simulation, data
mining and cloud computing, computer system and applications.
Finally, we would like to take this opportunity to express our
sincere gratitude to all members of the conference committee and
reviewers for their effort and comments on articles under their
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
6.
vi
review. Without them, we would not able to pull out this
proceedings so quickly after our conference.
Guest Editor
Dr. Xing Zhang (Wuhan University)
On behalf of the CSTA2016 Organizing Committee
Changsha, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
7.
vii
CSTA2016 Committees
General Chair
Bing-Lan Shui
Ph.D., Hubei Engineering University, China
Co-Chair
Xiao-Shan Ma
Ph.D., Yangzhou University, China
Technical Program Committee
Huai-Qiu Zhu
Professor, Department of Biomedical Engineering,
College of Engineering, Peking University,China
Jie Zhu
Professor, School of Information, Beijing Wuzi University, China
Bao-lin Sun
Professor, Computer Science and Technology,
Hubei University of Economics, Hubei, China
Hong-Zhi Fu
Professor, College of Physics and Electronic Information,
Luoyang Normal College, Luoyang, P. R. China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
8.
viii
Kai-Qi Zou,
Professor, Dalian University, China
Jin-Xing Shen,
Ph.D. School of Computer Science, Guangdong Polytechnic
Normal University, China
Deng Wu
Professor, Dalian Jiaotong University, China
Xue-Qian Fang
Professor, Shijiazhuang Tiedao University, China
Bo Sun
Professor, The International Outsourcing Research Institute of
Guangdong University of Foreign Languages, China
Yan Cheng
Professor, Jiangxi Normal University, China Ph.D. Hanri Cao,
Donghua University, China
Qian-Liu Li
Ph.D., Wenzhou University, China
Heng-Qing Cang
Ph.D., Hohai University, China
Xiu Xu
Ph.D., Shanghai Dian Ji University, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
9.
ix
Lv-Ben Wu
Ph.D., North China Institute of Aerospace Engineering, China
Zi-Chen Ning
Ph.D., North China University of Technology, China
Qiao Yuan
Ph.D., Shanxidatong University, China
Zheng-Hai Zhang
Ph.D., Changchun University of Science and Technology, China
Jia-Ding Feng
Ph.D., Shandong Agricultural University, China
Dong-Xuan Cui
Ph.D., Changchun University of Science and Technology, China
Ning Wan
Ph.D., Northeast Agricultural University, China
Fanchou Wu
Ph.D., Shanghai University of Electric Power, China
Qin Zheng
Ph.D., North University of China, China
Zhi-Hui Sun
Ph.D., Polytechnic School of Shenyang Ligong University, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
10.
x
Kun-Hao Zhou
Ph.D., Taiyuan Institute of Technology, China
Xue-Qing Wang
Ph.D., North China Institute of Aerospace Engineering, China
Lin-Shan Fang
Ph.D., Beijing Institute of Technology, China
Mu He
Ph.D., Northeast Agricultural University, China
Chu-Wei Ren
Ph.D., Hubei Engineering University, China
De Yan
Ph.D., North University of China, China
Man-Di Zhao
Ph.D., Inner Mongolia Normal University, China
Xia-Rong Yin
Ph.D., Wuhan Business University, China
Rong-Xing Bao
Ph.D., Shanghai University of Electric Power, China
Di-Zhu Le
Ph.D., Yantai University, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
11.
xi
Yun-Yao Liu
Ph.D., Liaocheng University, China
Muhammad Naufal Bin Mansor
Ph.D., Universiti Malaysia Perlis, Malaysia
Mohd Helmy Abd Wahab
Ph.D., Universiti Tun Hussein Onn Malaysia, Malaysia
Imran Memon,
PhD. Zhejiang University, Computer Engineering, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
12. b2530 International Strategic Relations and China’s National Security: World at the Crossroads
b2530_FM.indd 6 01-Sep-16 11:03:06 AM
This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
13.
xiii
KEYNOTE SPEECH
Name: Prof. Huaiqiu Zhu
Department of Biomedical Engineering, College of Engineering,
Peking University, China
Prof. Zhu's research interests include the computational methods
and tools in bioinformatics based on the genome and genomic
sequences, and protein sequences and structures. Recently Prof.
Zhu and his lab are focusing on the problems of metagenomics
issues driven by human health and environments, and data mining
in medicine informatics. In the post-genome era, especially with
the next generation sequencing (NGS) technologies, it is the great
mission for bioinformatics to carry out the data intensive
computation and analysis to meet the needs of high-throughput
genomic data. Since 2004 Zhu's lab has addressed to the
bioinformatics methods of genome analysis and annotation, and
developed a series of methods of microbial gene prediction,
genome comparison, and protein molecular dynamics. Since 2009,
Prof. Zhu developed the tools such as sequence assembly, gene
prediction and microbial community comparison for metagenomic
sequence produced by NGS. Most of these methods and tools were
demonstrated with leading performances in the field, and they have
been applied in several genome projects and were incited or
highlighted by Cell and Nature etc. Currently, the lab has close
collaborations with Gastroenterology lab and Critical Care
Medicine lab of Peking University Third Hospital in Beijing, and
BME lab of GaTech, and Bioengineering lab of UIUC in USA.
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
14.
xiv
KEYNOTE SPEECH
Name: Dr. Amol R. Madane
Video Security experts, TCS, Pune, India
Dr. Amol R. Madane has completed Doctorate of Philosophy
(Ph.D.) under the guidance of Dr. Uttam D. Kolekar in Image/
Video Security area in May 2015. He holds Masters of Engineering
degree in Electronics Engineering from Mumbai University, India.
He is an associate of Tata Consultancy Services Ltd. from last 9+
years. His main area of research is Digital Image Processing,
Digital Video Processing and Digital Signal Processing. He has
published various research papers in international conferences and
journals. He is “editor in chief” of various international journals.
Recently, he has published book titled “Design and Performance
Evaluation of Image Encoder in View of 4G Applications” by Lulu
book publication, Raleigh, United States. He is member of
professional institutes such as IEEE, IETE, ISTE, IEI, ISTD, CSI,
ACM etc.
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
15.
xv
KEYNOTE SPEECH
Name: Prof. Yan Cheng
Professor, Jiangxi Normal University, China
Yan Cheng holds a Bachelor's degree, Master's degree and Ph.D.
degrees from Tongji University in Shanghai and won Guanghua
Ph.D. scholarship, national doctoral academic best paper award.
From July 2013 to March 2014, she went to the California
University as a visiting scholar. Currently she is a professor in
Jiangxi Normal University. Currently she is the leader of national
NSFC (Natural Science Foundation of China) Plan Project and
more than Provincial projects. She also has undertaken provincial
key projects, one Key Projects of Science and Technology in
Jiangxi Province, One Jiangxi science and technology support
project (the Areas of Social Development), one Natural Science
Fund Projects in Jiangxi Province, one Provincial Science and
Technology Support Project (Industry) and many Social Sciences
Planning Projects. She published academic monograph (Beijing,
Science Press, 2014) on educational data mining, computer
professional teaching materials.
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
16. b2530 International Strategic Relations and China’s National Security: World at the Crossroads
b2530_FM.indd 6 01-Sep-16 11:03:06 AM
This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
17. xvii
Contents
Preface v
Committees vii
Keynote Speech xiii
Chapter 1 Image and Signal Processing 1
Image denoising based on a new thresholding function...................3
Jun-Ke Kou and Yan-Ling Fu
Age estimation based on image feature fusion method....................9
Lei Wang and Qing Zhu
The intelligent video surveillance and recognition system based
on summarization video ..................................................................15
Wan-Jia Qu, Zhong-Lin Xu and Yu-Wei Yuan
A smart video surveillance system based on moving target
recognition ......................................................................................22
Wan-Jia Qu, Zhong-Lin Xu and Yu-Wei Yuan
Design of MUAV target recognition system based on binary
descriptor of Brisk ...........................................................................28
Ya-Wei Liu and Xiao-Min Li
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
18. xviii
Time difference based highly accurate anemometer: architecture
and practice......................................................................................35
Li-Wei Zhang, Ying Yao, Long Xiao and Shi-Bo Yin
A three-layer framework for correlated multi-label classification
with respect of package recommendation .......................................43
Jing-Kang Yang, Jie Shi, Rui Xuan, Regina Wang, Zhao-Jing
Zhang and Liang Dong
Applying improved split Bregman method to fluorescence
microscopic image restoration.........................................................54
Chang-Chun Zhang, Yu Wang and Hong-Bing Xiao
A new image enhancement method based on high-dimensional
information geometry ......................................................................61
Jun-An Wu and Wen-Ming Cao
Interactive rendering of approximate soft shadows using ray
tracing with visibility filtering.........................................................68
Chun-Yi Chen, Hua-Min Yang and Hua Li
Design of global cooperative signaling system for train control.....75
Wan-Ting Zhao, Xiang-Xian Chen, Zhu-Jun Ling, Zhen-Peng Nie,
Wen-Bin Tang, Guo-Dong Teng and Lan-Qing Hu
The liver nonstandard segment based on relationship of vascular
blood supply ....................................................................................84
Yuan Gao and Ke Tan
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
19. xix
Image content authentication algorithm based on finite ridgelet
transform..........................................................................................91
Rui-Ling Zhu and Zhuo-Ran Han
An resolution impact analysis for the catadioptric system.............100
Mai Jiang, Ming-Ming Qiao and Li-Min Zhang
Design of a colored QR code adaptive to logo contour..................106
Dong Li and Hong-An Xie
Detection of imagined and actual hand movements with EEG
signals.............................................................................................113
Miguel Contreras, Javier Suárez and Xiao-Hua Yu
Target detection and tracking based on embedded multicore
DSP system.....................................................................................119
Hao Chen, Hong Zhang, Yi-Fan Yang, Lei Zhang and Yue-Ren
Wang
Dynamic properties and modified projective synchronization of
two four-scroll hyperchaotic systems with non-identical fractional
orders ..............................................................................................127
Zhen-Wu Sun
Chapter 2 Computer Network and Information Security 137
Design and implementation of a RFID-based intelligent tools
management system........................................................................139
Jia-Wen Xie, Min-Li Wang and Tan Jie
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
20. xx
sDOMO communication protocol for home robotic systems
in the context of the internet of things............................................151
Marcel-Titus Marginean and Chao Lu
A research on Chinese selectional preference based on online
materials .........................................................................................161
Qing Zhang
Multi-route avoidance routing without location information
of malicious wireless nodes in MANET.........................................168
T. Kanachi and H. Higaki
Computerized flat knitting machine network control research ......178
Cheng-Jun Zhang and Xiao-Yan Zuo
A novel dependability optimization method in network layer
of IOT .............................................................................................185
Rui-Juan Zheng, Tong Zhang, Ming-Chuan Zhang,
Qing-Tao Wu and Wang-Yang Wei
The effectiveness of applying moodle E-learning platform
on resource classroom students ......................................................191
Hua-Yi Lin, Jiann-Gwo Doong and Xiao-Wei Lin
A general threshold scheme based on elliptic curve
cryptosystem...................................................................................199
Yu-Lian Shang, Wu-Li Song, Wu-Yuan Jia
and Zhao-Chen Zhang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
21. xxi
New short interleaver design for turbo codes.................................210
Li-Fang Ma , Shi-Zhan Lan, Zhao-Jing Zhang and Hua-Hua Xie
Trusted network management model based on clustering
analysis ...........................................................................................220
Hong-An Xie and Dong Li
Multi-level sleep scheduling for heterogeneous wireless sensor
networks .........................................................................................227
Shahzad Hassan, Muhammad S. Nisar and Hong-Bo Jiang
Mobile multi-node recharging in heterogeneous wireless sensor
networks .........................................................................................234
Shahzad Hassan, Muhammad S. Nisar and Hong-Bo Jiang
Research on an embedded intelligent-unit based on multi-sensor
fusion oriented internet...................................................................241
Jian Yang
Round-robin differential-phase-shift quantum secret sharing........248
Zhen-Yuan Sun, Jian Wang and Chao-Jing Tang
Based on solr distributed classification algorithm of system design
for science and technology plan projects........................................256
Gui-Lan Cai, Kai Xu and Ping-Hua Chen
An improved approximation formula for the symmetric capacity
of 2-dimentional constellations under AWGN channel .................264
Pei Yang, Li-Qiang Jin and Hong-Wen Yang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
22. xxii
Two-hop multi-relay selection for secrecy improvement
in broadcast wireless system ..........................................................270
L. A. Olawoyin, Yue Wu and Hong-Wen Yang
Chapter 3 Algorithm and Simulation 277
Apply classical physical laws to algorithms for analysis
of stocks..........................................................................................279
Xing-Bo Wang
An improved recommendation algorithm based on user dynamic
interests...........................................................................................288
Chao Li, Jun-Min Ye, Qiang Wang, Liu-Yin Huang and Shu Chen
Indoor localization algorithm based on multiple logistic regression
analysis and quad-tree with irregular boundary .............................298
Tian-Yi Feng, Shu-Yi Liu, Jing-Kang Yang, Chen Lu, Zhao-Jing
Zhang and Dong Liang
Explosion simulation based on the CUDA physical model
and particle system .........................................................................307
Bai-Yu Zhao and Ji-Cheng Quan
Cognitive student model based on the gray partial correlation ......314
Sheng-Bing Ren, Di Feng and Xiao-Nan Chen
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
23. xxiii
Application of smart medical based on distributed apriori
algorithm.........................................................................................321
Hai-Feng Lu and Fang-Qin Xu
An improved genetic algorithm based on k-means clustering
for solving traveling salesman problem .........................................334
Li-Zhuang Tan, Yan-Yan Tan, Guo-Xiao Yun and Chao Zhang
Research on HOG algorithm based on compressed sensing ..........344
Xi Chen and Song Wang
Chapter 4 Data Mining and Cloud Computing 353
Optimizing resource-service sequence based on genetic algorithm
for collaborative task systems ........................................................355
Xiu-Yang Lei, Hai-Bo Li and Ya-Feng Gao
GSkiplist: A GPU-method to accelerate key-value
database search ...............................................................................362
Xin Zhao, Kai Lu, Xiao-Ping Wang and Gen Li
Label-weight adapting (LWA): a method for non-independent
multi-label learning ........................................................................370
Jing-Kang Yang, Jiang Jun, Hao-Ran Lv, Tianyi Wang, Wei-Wei
Wang, Zhaojing Zhang and Liang Dong
Schedule model in a cloud computing based on credit
and cost...........................................................................................381
Yi-Li Zhang and Jin-Bai Zhang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
24. xxiv
A method of SQL access logs pretreatment for power business
system.............................................................................................389
Wei-Ei Li, Xiu-Li Huang, Bo Zhang, Rong Zeng and Yong Li
Recurrent neural network for forecasting stock market trend........397
Xin-Kai Xie and Hong Wang
Text mining of medical insurance policy based on association
rules ................................................................................................403
Li-Li Han
The research and application of data visualization based on D3 in
the filed of healthcare .....................................................................410
Xin-Liang Xu and Lian-Jun Chen
Chapter 5 Computer System and Application 419
Efficient concurrent virtual machine scheduling for Xen
hypervisors .....................................................................................421
Po-Jen Chuang and Chih-Yuan Chou
Rotating laser precision machining computer control system........426
Tao Wang, Long-Fei Ma, Bo Zhang, Sha Han, Ya-Peng Hu,
Xin-Chao Zhao and Zhuo Wang
The design of microcirculatory hemodynamic detection system
based on Android............................................................................435
W. Jiang, L. Yang, J. Su, Y. Li and X X. Yang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
25. xxv
The computer control system design and implementation
of food production line ...................................................................441
Cheng-Jun An
Extended operation and permission model based on RBAC..........446
Zhi-Hong Liang, Wen-Hong Li, Xing-Ping Sun, Qing-Yi Chen,
Jun-Hua Hu and Shu-Qiong Sun
Performance analysis and the staffing optimization for a multi-skill
call center in M-design based on queueing model method ............454
Chun-Yan Li
A resource management system design for malware behavior
detection .........................................................................................467
Jian-Guo Jiang, Zhi-Song Liu, Min Yu and Chao Liu
Combining static and dynamic analysis for the detection
of malicious JavaScript-bearing PDF documents...........................475
Min Li, Ying Zhou, Min Yu and Chao Liu
The design of intelligent remote meter reading system based
on mechanical water meter.............................................................483
Lei Jing, Lai-Lei Jiao and Zeng-Kang Wang
The theory research on portable monitoring system model
of the environment of banana growth.............................................489
Ling-Ling Wang , Yu-Ping Li, Hong-Xia Luo and Ji-Hua Fang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
26. xxvi
Study on the operation quality assessment of P2P platform based
on factor analysis............................................................................495
Lu-Ming Yang, Ya-Na Wu and Liang Shan
An efficient tables memory access optimized algorithms
for CAVLC decoding .....................................................................504
Xiao-Bo Lin and Hui-Lin Wang
The research investigations on the NetFPGA platform..................514
Xing Zheng, Juan Cao and Hai-Jun Gao
Chapter 6 Mathematics and Management 521
An approach to process uncertain complex events.........................523
Qi-Xin Cai, Jian Liu, Qing Xu, Hui-Ling Su and Hong-Sheng
Zhao
N-soliton solutions for an integrable differential-difference
equation with computer symbolic computation..............................530
Xiao-Yong Wen
Research on knowledge management for collaborative design
of aviation enterprises.....................................................................538
Yong-Hua Wu and Bin Liu
Author Index 545
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.