SlideShare a Scribd company logo
1 of 26
Download to read offline
10290_9789813200432_tp.indd 1 30/8/16 11:45 AM
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
b2530   International Strategic Relations and China’s National Security: World at the Crossroads
b2530_FM.indd 6 01-Sep-16 11:03:06 AM
This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
10290_9789813200432_tp.indd 2 30/8/16 11:45 AM
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
Published by
World Scientific Publishing Co. Pte. Ltd.
5 Toh Tuck Link, Singapore 596224
USA office: 27 Warren Street, Suite 401-402, Hackensack, NJ 07601
UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
COMPUTER  SCIENCE,  TECHNOLOGY  AND  APPLICATION
Proceedings of the 2016 Joint International Conference on Computer Science, Technology and
Application (CSTA2016)
Copyright © 2017 by World Scientific Publishing Co. Pte. Ltd.
All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means,
electronic or mechanical, including photocopying, recording or any information storage and retrieval
system now known or to be invented, without written permission from the publisher.
For photocopying of material in this volume, please pay a copying fee through the Copyright Clearance
Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA. In this case permission to photocopy
is not required from the publisher.
ISBN	 978-981-3200-43-2	
Printed in Singapore
Xiran - Computer Science, Technology and Application.indd 1 29-08-16 10:14:38 AM
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
v
Preface
The 2016 International Conference on Computer Science,
Technology and Application (CSTA2016) have been successfully
held in Changsha, China during March 18-20, 2016. The main
objective of this conference is to provide a platform for scientists,
researchers, and engineers from different part of the world to get
together under one roof to discuss, present and share their research
findings and results in the development in computing technology
and its application.
CSTA2016 received over more than 150 submissions, but only 67
articles are included in this proceedings after a rigorous process of
double peer review. The proceedings is organized into 5 specialize
areas, which include image and signal processing, computer
network and information security, algorithm and simulation, data
mining and cloud computing, computer system and applications.
Finally, we would like to take this opportunity to express our
sincere gratitude to all members of the conference committee and
reviewers for their effort and comments on articles under their
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
 
vi
 
review. Without them, we would not able to pull out this
proceedings so quickly after our conference.
Guest Editor
Dr. Xing Zhang (Wuhan University)
On behalf of the CSTA2016 Organizing Committee
Changsha, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
 
vii
 
CSTA2016 Committees
General Chair
Bing-Lan Shui
Ph.D., Hubei Engineering University, China
Co-Chair
Xiao-Shan Ma
Ph.D., Yangzhou University, China
Technical Program Committee
Huai-Qiu Zhu
Professor, Department of Biomedical Engineering,
College of Engineering, Peking University,China
Jie Zhu
Professor, School of Information, Beijing Wuzi University, China
Bao-lin Sun
Professor, Computer Science and Technology,
Hubei University of Economics, Hubei, China
Hong-Zhi Fu
Professor, College of Physics and Electronic Information,
Luoyang Normal College, Luoyang, P. R. China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
 
viii
 
Kai-Qi Zou,
Professor, Dalian University, China
Jin-Xing Shen,
Ph.D. School of Computer Science, Guangdong Polytechnic
Normal University, China
Deng Wu
Professor, Dalian Jiaotong University, China
Xue-Qian Fang
Professor, Shijiazhuang Tiedao University, China
Bo Sun
Professor, The International Outsourcing Research Institute of
Guangdong University of Foreign Languages, China
Yan Cheng
Professor, Jiangxi Normal University, China Ph.D. Hanri Cao,
Donghua University, China
Qian-Liu Li
Ph.D., Wenzhou University, China
Heng-Qing Cang
Ph.D., Hohai University, China
Xiu Xu
Ph.D., Shanghai Dian Ji University, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
 
ix
 
Lv-Ben Wu
Ph.D., North China Institute of Aerospace Engineering, China
Zi-Chen Ning
Ph.D., North China University of Technology, China
Qiao Yuan
Ph.D., Shanxidatong University, China
Zheng-Hai Zhang
Ph.D., Changchun University of Science and Technology, China
Jia-Ding Feng
Ph.D., Shandong Agricultural University, China
Dong-Xuan Cui
Ph.D., Changchun University of Science and Technology, China
Ning Wan
Ph.D., Northeast Agricultural University, China
Fanchou Wu
Ph.D., Shanghai University of Electric Power, China
Qin Zheng
Ph.D., North University of China, China
Zhi-Hui Sun
Ph.D., Polytechnic School of Shenyang Ligong University, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
 
x
 
Kun-Hao Zhou
Ph.D., Taiyuan Institute of Technology, China
Xue-Qing Wang
Ph.D., North China Institute of Aerospace Engineering, China
Lin-Shan Fang
Ph.D., Beijing Institute of Technology, China
Mu He
Ph.D., Northeast Agricultural University, China
Chu-Wei Ren
Ph.D., Hubei Engineering University, China
De Yan
Ph.D., North University of China, China
Man-Di Zhao
Ph.D., Inner Mongolia Normal University, China
Xia-Rong Yin
Ph.D., Wuhan Business University, China
Rong-Xing Bao
Ph.D., Shanghai University of Electric Power, China
Di-Zhu Le
Ph.D., Yantai University, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
 
xi
 
Yun-Yao Liu
Ph.D., Liaocheng University, China
Muhammad Naufal Bin Mansor
Ph.D., Universiti Malaysia Perlis, Malaysia
Mohd Helmy Abd Wahab
Ph.D., Universiti Tun Hussein Onn Malaysia, Malaysia
Imran Memon,
PhD. Zhejiang University, Computer Engineering, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
b2530   International Strategic Relations and China’s National Security: World at the Crossroads
b2530_FM.indd 6 01-Sep-16 11:03:06 AM
This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
 
xiii
KEYNOTE SPEECH
Name: Prof. Huaiqiu Zhu
Department of Biomedical Engineering, College of Engineering,
Peking University, China
Prof. Zhu's research interests include the computational methods
and tools in bioinformatics based on the genome and genomic
sequences, and protein sequences and structures. Recently Prof.
Zhu and his lab are focusing on the problems of metagenomics
issues driven by human health and environments, and data mining
in medicine informatics. In the post-genome era, especially with
the next generation sequencing (NGS) technologies, it is the great
mission for bioinformatics to carry out the data intensive
computation and analysis to meet the needs of high-throughput
genomic data. Since 2004 Zhu's lab has addressed to the
bioinformatics methods of genome analysis and annotation, and
developed a series of methods of microbial gene prediction,
genome comparison, and protein molecular dynamics. Since 2009,
Prof. Zhu developed the tools such as sequence assembly, gene
prediction and microbial community comparison for metagenomic
sequence produced by NGS. Most of these methods and tools were
demonstrated with leading performances in the field, and they have
been applied in several genome projects and were incited or
highlighted by Cell and Nature etc. Currently, the lab has close
collaborations with Gastroenterology lab and Critical Care
Medicine lab of Peking University Third Hospital in Beijing, and
BME lab of GaTech, and Bioengineering lab of UIUC in USA.
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
 
xiv
KEYNOTE SPEECH
Name: Dr. Amol R. Madane
Video Security experts, TCS, Pune, India
Dr. Amol R. Madane has completed Doctorate of Philosophy
(Ph.D.) under the guidance of Dr. Uttam D. Kolekar in Image/
Video Security area in May 2015. He holds Masters of Engineering
degree in Electronics Engineering from Mumbai University, India.
He is an associate of Tata Consultancy Services Ltd. from last 9+
years. His main area of research is Digital Image Processing,
Digital Video Processing and Digital Signal Processing. He has
published various research papers in international conferences and
journals. He is “editor in chief” of various international journals.
Recently, he has published book titled “Design and Performance
Evaluation of Image Encoder in View of 4G Applications” by Lulu
book publication, Raleigh, United States. He is member of
professional institutes such as IEEE, IETE, ISTE, IEI, ISTD, CSI,
ACM etc.
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
 
xv
KEYNOTE SPEECH
Name: Prof. Yan Cheng
Professor, Jiangxi Normal University, China
Yan Cheng holds a Bachelor's degree, Master's degree and Ph.D.
degrees from Tongji University in Shanghai and won Guanghua
Ph.D. scholarship, national doctoral academic best paper award.
From July 2013 to March 2014, she went to the California
University as a visiting scholar. Currently she is a professor in
Jiangxi Normal University. Currently she is the leader of national
NSFC (Natural Science Foundation of China) Plan Project and
more than Provincial projects. She also has undertaken provincial
key projects, one Key Projects of Science and Technology in
Jiangxi Province, One Jiangxi science and technology support
project (the Areas of Social Development), one Natural Science
Fund Projects in Jiangxi Province, one Provincial Science and
Technology Support Project (Industry) and many Social Sciences
Planning Projects. She published academic monograph (Beijing,
Science Press, 2014) on educational data mining, computer
professional teaching materials.
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
b2530   International Strategic Relations and China’s National Security: World at the Crossroads
b2530_FM.indd 6 01-Sep-16 11:03:06 AM
This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
xvii
Contents
Preface v
Committees vii
Keynote Speech xiii
Chapter 1 Image and Signal Processing 1
Image denoising based on a new thresholding function...................3
Jun-Ke Kou and Yan-Ling Fu
Age estimation based on image feature fusion method....................9
Lei Wang and Qing Zhu
The intelligent video surveillance and recognition system based
on summarization video ..................................................................15
Wan-Jia Qu, Zhong-Lin Xu and Yu-Wei Yuan
A smart video surveillance system based on moving target
recognition ......................................................................................22
Wan-Jia Qu, Zhong-Lin Xu and Yu-Wei Yuan
Design of MUAV target recognition system based on binary
descriptor of Brisk ...........................................................................28
Ya-Wei Liu and Xiao-Min Li
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
xviii
Time difference based highly accurate anemometer: architecture
and practice......................................................................................35
Li-Wei Zhang, Ying Yao, Long Xiao and Shi-Bo Yin
A three-layer framework for correlated multi-label classification
with respect of package recommendation .......................................43
Jing-Kang Yang, Jie Shi, Rui Xuan, Regina Wang, Zhao-Jing
Zhang and Liang Dong
Applying improved split Bregman method to fluorescence
microscopic image restoration.........................................................54
Chang-Chun Zhang, Yu Wang and Hong-Bing Xiao
A new image enhancement method based on high-dimensional
information geometry ......................................................................61
Jun-An Wu and Wen-Ming Cao
Interactive rendering of approximate soft shadows using ray
tracing with visibility filtering.........................................................68
Chun-Yi Chen, Hua-Min Yang and Hua Li
Design of global cooperative signaling system for train control.....75
Wan-Ting Zhao, Xiang-Xian Chen, Zhu-Jun Ling, Zhen-Peng Nie,
Wen-Bin Tang, Guo-Dong Teng and Lan-Qing Hu
The liver nonstandard segment based on relationship of vascular
blood supply ....................................................................................84
Yuan Gao and Ke Tan
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
xix
Image content authentication algorithm based on finite ridgelet
transform..........................................................................................91
Rui-Ling Zhu and Zhuo-Ran Han
An resolution impact analysis for the catadioptric system.............100
Mai Jiang, Ming-Ming Qiao and Li-Min Zhang
Design of a colored QR code adaptive to logo contour..................106
Dong Li and Hong-An Xie
Detection of imagined and actual hand movements with EEG
signals.............................................................................................113
Miguel Contreras, Javier Suárez and Xiao-Hua Yu
Target detection and tracking based on embedded multicore
DSP system.....................................................................................119
Hao Chen, Hong Zhang, Yi-Fan Yang, Lei Zhang and Yue-Ren
Wang
Dynamic properties and modified projective synchronization of
two four-scroll hyperchaotic systems with non-identical fractional
orders ..............................................................................................127
Zhen-Wu Sun
Chapter 2 Computer Network and Information Security 137
Design and implementation of a RFID-based intelligent tools
management system........................................................................139
Jia-Wen Xie, Min-Li Wang and Tan Jie
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
xx
sDOMO communication protocol for home robotic systems
in the context of the internet of things............................................151
Marcel-Titus Marginean and Chao Lu
A research on Chinese selectional preference based on online
materials .........................................................................................161
Qing Zhang
Multi-route avoidance routing without location information
of malicious wireless nodes in MANET.........................................168
T. Kanachi and H. Higaki
Computerized flat knitting machine network control research ......178
Cheng-Jun Zhang and Xiao-Yan Zuo
A novel dependability optimization method in network layer
of IOT .............................................................................................185
Rui-Juan Zheng, Tong Zhang, Ming-Chuan Zhang,
Qing-Tao Wu and Wang-Yang Wei
The effectiveness of applying moodle E-learning platform
on resource classroom students ......................................................191
Hua-Yi Lin, Jiann-Gwo Doong and Xiao-Wei Lin
A general threshold scheme based on elliptic curve
cryptosystem...................................................................................199
Yu-Lian Shang, Wu-Li Song, Wu-Yuan Jia
and Zhao-Chen Zhang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
xxi
New short interleaver design for turbo codes.................................210
Li-Fang Ma , Shi-Zhan Lan, Zhao-Jing Zhang and Hua-Hua Xie
Trusted network management model based on clustering
analysis ...........................................................................................220
Hong-An Xie and Dong Li
Multi-level sleep scheduling for heterogeneous wireless sensor
networks .........................................................................................227
Shahzad Hassan, Muhammad S. Nisar and Hong-Bo Jiang
Mobile multi-node recharging in heterogeneous wireless sensor
networks .........................................................................................234
Shahzad Hassan, Muhammad S. Nisar and Hong-Bo Jiang
Research on an embedded intelligent-unit based on multi-sensor
fusion oriented internet...................................................................241
Jian Yang
Round-robin differential-phase-shift quantum secret sharing........248
Zhen-Yuan Sun, Jian Wang and Chao-Jing Tang
Based on solr distributed classification algorithm of system design
for science and technology plan projects........................................256
Gui-Lan Cai, Kai Xu and Ping-Hua Chen
An improved approximation formula for the symmetric capacity
of 2-dimentional constellations under AWGN channel .................264
Pei Yang, Li-Qiang Jin and Hong-Wen Yang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
xxii
Two-hop multi-relay selection for secrecy improvement
in broadcast wireless system ..........................................................270
L. A. Olawoyin, Yue Wu and Hong-Wen Yang
Chapter 3 Algorithm and Simulation 277
Apply classical physical laws to algorithms for analysis
of stocks..........................................................................................279
Xing-Bo Wang
An improved recommendation algorithm based on user dynamic
interests...........................................................................................288
Chao Li, Jun-Min Ye, Qiang Wang, Liu-Yin Huang and Shu Chen
Indoor localization algorithm based on multiple logistic regression
analysis and quad-tree with irregular boundary .............................298
Tian-Yi Feng, Shu-Yi Liu, Jing-Kang Yang, Chen Lu, Zhao-Jing
Zhang and Dong Liang
Explosion simulation based on the CUDA physical model
and particle system .........................................................................307
Bai-Yu Zhao and Ji-Cheng Quan
Cognitive student model based on the gray partial correlation ......314
Sheng-Bing Ren, Di Feng and Xiao-Nan Chen
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
xxiii
Application of smart medical based on distributed apriori
algorithm.........................................................................................321
Hai-Feng Lu and Fang-Qin Xu
An improved genetic algorithm based on k-means clustering
for solving traveling salesman problem .........................................334
Li-Zhuang Tan, Yan-Yan Tan, Guo-Xiao Yun and Chao Zhang
Research on HOG algorithm based on compressed sensing ..........344
Xi Chen and Song Wang
Chapter 4 Data Mining and Cloud Computing 353
Optimizing resource-service sequence based on genetic algorithm
for collaborative task systems ........................................................355
Xiu-Yang Lei, Hai-Bo Li and Ya-Feng Gao
GSkiplist: A GPU-method to accelerate key-value
database search ...............................................................................362
Xin Zhao, Kai Lu, Xiao-Ping Wang and Gen Li
Label-weight adapting (LWA): a method for non-independent
multi-label learning ........................................................................370
Jing-Kang Yang, Jiang Jun, Hao-Ran Lv, Tianyi Wang, Wei-Wei
Wang, Zhaojing Zhang and Liang Dong
Schedule model in a cloud computing based on credit
and cost...........................................................................................381
Yi-Li Zhang and Jin-Bai Zhang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
xxiv
A method of SQL access logs pretreatment for power business
system.............................................................................................389
Wei-Ei Li, Xiu-Li Huang, Bo Zhang, Rong Zeng and Yong Li
Recurrent neural network for forecasting stock market trend........397
Xin-Kai Xie and Hong Wang
Text mining of medical insurance policy based on association
rules ................................................................................................403
Li-Li Han
The research and application of data visualization based on D3 in
the filed of healthcare .....................................................................410
Xin-Liang Xu and Lian-Jun Chen
Chapter 5 Computer System and Application 419
Efficient concurrent virtual machine scheduling for Xen
hypervisors .....................................................................................421
Po-Jen Chuang and Chih-Yuan Chou
Rotating laser precision machining computer control system........426
Tao Wang, Long-Fei Ma, Bo Zhang, Sha Han, Ya-Peng Hu,
Xin-Chao Zhao and Zhuo Wang
The design of microcirculatory hemodynamic detection system
based on Android............................................................................435
W. Jiang, L. Yang, J. Su, Y. Li and X X. Yang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
xxv
The computer control system design and implementation
of food production line ...................................................................441
Cheng-Jun An
Extended operation and permission model based on RBAC..........446
Zhi-Hong Liang, Wen-Hong Li, Xing-Ping Sun, Qing-Yi Chen,
Jun-Hua Hu and Shu-Qiong Sun
Performance analysis and the staffing optimization for a multi-skill
call center in M-design based on queueing model method ............454
Chun-Yan Li
A resource management system design for malware behavior
detection .........................................................................................467
Jian-Guo Jiang, Zhi-Song Liu, Min Yu and Chao Liu
Combining static and dynamic analysis for the detection
of malicious JavaScript-bearing PDF documents...........................475
Min Li, Ying Zhou, Min Yu and Chao Liu
The design of intelligent remote meter reading system based
on mechanical water meter.............................................................483
Lei Jing, Lai-Lei Jiao and Zeng-Kang Wang
The theory research on portable monitoring system model
of the environment of banana growth.............................................489
Ling-Ling Wang , Yu-Ping Li, Hong-Xia Luo and Ji-Hua Fang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
xxvi
Study on the operation quality assessment of P2P platform based
on factor analysis............................................................................495
Lu-Ming Yang, Ya-Na Wu and Liang Shan
An efficient tables memory access optimized algorithms
for CAVLC decoding .....................................................................504
Xiao-Bo Lin and Hui-Lin Wang
The research investigations on the NetFPGA platform..................514
Xing Zheng, Juan Cao and Hai-Jun Gao
Chapter 6 Mathematics and Management 521
An approach to process uncertain complex events.........................523
Qi-Xin Cai, Jian Liu, Qing Xu, Hui-Ling Su and Hong-Sheng
Zhao
N-soliton solutions for an integrable differential-difference
equation with computer symbolic computation..............................530
Xiao-Yong Wen
Research on knowledge management for collaborative design
of aviation enterprises.....................................................................538
Yong-Hua Wu and Bin Liu
Author Index 545
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.

More Related Content

Viewers also liked

Satanic origin of the Gregorian Calendar
Satanic origin of the Gregorian Calendar Satanic origin of the Gregorian Calendar
Satanic origin of the Gregorian Calendar charlesmartel1974
 
Top 10 Vapor Facts
Top 10 Vapor FactsTop 10 Vapor Facts
Top 10 Vapor FactsSFATA
 
10 Energy Saving Tips
10 Energy Saving Tips10 Energy Saving Tips
10 Energy Saving TipsChelsea Aston
 
Cancioneroinfantil2pdf 140304022700-phpapp02
Cancioneroinfantil2pdf 140304022700-phpapp02Cancioneroinfantil2pdf 140304022700-phpapp02
Cancioneroinfantil2pdf 140304022700-phpapp02covadonga1970
 
Integrity use-care-es-en-pt-de-it-nl-fr-se
Integrity use-care-es-en-pt-de-it-nl-fr-seIntegrity use-care-es-en-pt-de-it-nl-fr-se
Integrity use-care-es-en-pt-de-it-nl-fr-seFlemington Granite
 
Henry Badenhorst - Education portfolio: Saudi Arabia (2014-2015)
Henry Badenhorst - Education portfolio: Saudi Arabia (2014-2015) Henry Badenhorst - Education portfolio: Saudi Arabia (2014-2015)
Henry Badenhorst - Education portfolio: Saudi Arabia (2014-2015) Edumax Solutions
 
Elegant Pearl Statement Necklace Tutorial
Elegant Pearl Statement Necklace TutorialElegant Pearl Statement Necklace Tutorial
Elegant Pearl Statement Necklace TutorialHouseofGems.com
 
Teoría política de Rousseau
Teoría política de RousseauTeoría política de Rousseau
Teoría política de Rousseaualle_sofi
 
Peligros de las tic
Peligros de las ticPeligros de las tic
Peligros de las ticTeo Castro
 
OBRA DEL DESCUBRIMIENTO DE AMERICA
OBRA DEL DESCUBRIMIENTO DE AMERICAOBRA DEL DESCUBRIMIENTO DE AMERICA
OBRA DEL DESCUBRIMIENTO DE AMERICAleadyneip
 

Viewers also liked (11)

Satanic origin of the Gregorian Calendar
Satanic origin of the Gregorian Calendar Satanic origin of the Gregorian Calendar
Satanic origin of the Gregorian Calendar
 
Top 10 Vapor Facts
Top 10 Vapor FactsTop 10 Vapor Facts
Top 10 Vapor Facts
 
10 Energy Saving Tips
10 Energy Saving Tips10 Energy Saving Tips
10 Energy Saving Tips
 
Cancioneroinfantil2pdf 140304022700-phpapp02
Cancioneroinfantil2pdf 140304022700-phpapp02Cancioneroinfantil2pdf 140304022700-phpapp02
Cancioneroinfantil2pdf 140304022700-phpapp02
 
Hacer Que Las Cosas Sucedan
Hacer Que Las Cosas SucedanHacer Que Las Cosas Sucedan
Hacer Que Las Cosas Sucedan
 
Integrity use-care-es-en-pt-de-it-nl-fr-se
Integrity use-care-es-en-pt-de-it-nl-fr-seIntegrity use-care-es-en-pt-de-it-nl-fr-se
Integrity use-care-es-en-pt-de-it-nl-fr-se
 
Henry Badenhorst - Education portfolio: Saudi Arabia (2014-2015)
Henry Badenhorst - Education portfolio: Saudi Arabia (2014-2015) Henry Badenhorst - Education portfolio: Saudi Arabia (2014-2015)
Henry Badenhorst - Education portfolio: Saudi Arabia (2014-2015)
 
Elegant Pearl Statement Necklace Tutorial
Elegant Pearl Statement Necklace TutorialElegant Pearl Statement Necklace Tutorial
Elegant Pearl Statement Necklace Tutorial
 
Teoría política de Rousseau
Teoría política de RousseauTeoría política de Rousseau
Teoría política de Rousseau
 
Peligros de las tic
Peligros de las ticPeligros de las tic
Peligros de las tic
 
OBRA DEL DESCUBRIMIENTO DE AMERICA
OBRA DEL DESCUBRIMIENTO DE AMERICAOBRA DEL DESCUBRIMIENTO DE AMERICA
OBRA DEL DESCUBRIMIENTO DE AMERICA
 

Similar to Computer Science, Technology and Application Proceedings

Wireless Medical Infusion Pumps- Medical Device Cybersecurity Issues
Wireless Medical Infusion Pumps- Medical Device Cybersecurity IssuesWireless Medical Infusion Pumps- Medical Device Cybersecurity Issues
Wireless Medical Infusion Pumps- Medical Device Cybersecurity IssuesDr Dev Kambhampati
 
Sixteen Technology Commercialisation Projects receive S$4 million Proof-of-Co...
Sixteen Technology Commercialisation Projects receive S$4 million Proof-of-Co...Sixteen Technology Commercialisation Projects receive S$4 million Proof-of-Co...
Sixteen Technology Commercialisation Projects receive S$4 million Proof-of-Co...James Chan
 
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and Opportunities
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and OpportunitiesApplied Bioinformatics & Chemoinformatics: Techniques, Tools, and Opportunities
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and OpportunitiesHezekiah Fatoki
 
Scott Edmunds talk at IARC: How can we make science more trustworthy and FAIR...
Scott Edmunds talk at IARC: How can we make science more trustworthy and FAIR...Scott Edmunds talk at IARC: How can we make science more trustworthy and FAIR...
Scott Edmunds talk at IARC: How can we make science more trustworthy and FAIR...GigaScience, BGI Hong Kong
 
To study the impact of technology on psychology
To study the impact of technology on psychologyTo study the impact of technology on psychology
To study the impact of technology on psychologyshweta2804
 
1st MyCT e-Newsletter
1st MyCT e-Newsletter1st MyCT e-Newsletter
1st MyCT e-NewsletterEngku Fahmi
 
Journal of Otolaryngology-Head and Neck Surgery Face and Content Validity of ...
Journal of Otolaryngology-Head and Neck Surgery Face and Content Validity of ...Journal of Otolaryngology-Head and Neck Surgery Face and Content Validity of ...
Journal of Otolaryngology-Head and Neck Surgery Face and Content Validity of ...Jordan Lewis
 
Introduction to Bioinformatics.
 Introduction to Bioinformatics. Introduction to Bioinformatics.
Introduction to Bioinformatics.Elena Sügis
 
System_Reliability-Based_Design_and_Multiresolutio.pdf
System_Reliability-Based_Design_and_Multiresolutio.pdfSystem_Reliability-Based_Design_and_Multiresolutio.pdf
System_Reliability-Based_Design_and_Multiresolutio.pdfLeonardoNahle1
 
Scott Edmunds & Mendel Wong, Citizen Science #101. HKU MPA lecuture
Scott Edmunds & Mendel Wong, Citizen Science #101. HKU MPA lecutureScott Edmunds & Mendel Wong, Citizen Science #101. HKU MPA lecuture
Scott Edmunds & Mendel Wong, Citizen Science #101. HKU MPA lecutureScott Edmunds
 
1312020 Originality Reporthttpsucumberlands.blackboar.docx
1312020 Originality Reporthttpsucumberlands.blackboar.docx1312020 Originality Reporthttpsucumberlands.blackboar.docx
1312020 Originality Reporthttpsucumberlands.blackboar.docxaulasnilda
 
3D Printing and Additive Manufacturing - Principles and Applications
3D Printing and Additive Manufacturing - Principles and Applications3D Printing and Additive Manufacturing - Principles and Applications
3D Printing and Additive Manufacturing - Principles and ApplicationsWorld Scientific Publishing
 
X-Ray Disease Identifier
X-Ray Disease IdentifierX-Ray Disease Identifier
X-Ray Disease IdentifierIRJET Journal
 

Similar to Computer Science, Technology and Application Proceedings (20)

IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016
 
Identification of emerging technologies via a systematic search strategy deve...
Identification of emerging technologies via a systematic search strategy deve...Identification of emerging technologies via a systematic search strategy deve...
Identification of emerging technologies via a systematic search strategy deve...
 
Wireless Medical Infusion Pumps- Medical Device Cybersecurity Issues
Wireless Medical Infusion Pumps- Medical Device Cybersecurity IssuesWireless Medical Infusion Pumps- Medical Device Cybersecurity Issues
Wireless Medical Infusion Pumps- Medical Device Cybersecurity Issues
 
Sixteen Technology Commercialisation Projects receive S$4 million Proof-of-Co...
Sixteen Technology Commercialisation Projects receive S$4 million Proof-of-Co...Sixteen Technology Commercialisation Projects receive S$4 million Proof-of-Co...
Sixteen Technology Commercialisation Projects receive S$4 million Proof-of-Co...
 
AIT Newsletter October 2017
AIT Newsletter October 2017AIT Newsletter October 2017
AIT Newsletter October 2017
 
SIN2015-CFP
SIN2015-CFPSIN2015-CFP
SIN2015-CFP
 
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and Opportunities
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and OpportunitiesApplied Bioinformatics & Chemoinformatics: Techniques, Tools, and Opportunities
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and Opportunities
 
Scott Edmunds talk at IARC: How can we make science more trustworthy and FAIR...
Scott Edmunds talk at IARC: How can we make science more trustworthy and FAIR...Scott Edmunds talk at IARC: How can we make science more trustworthy and FAIR...
Scott Edmunds talk at IARC: How can we make science more trustworthy and FAIR...
 
To study the impact of technology on psychology
To study the impact of technology on psychologyTo study the impact of technology on psychology
To study the impact of technology on psychology
 
mae_06-07
mae_06-07mae_06-07
mae_06-07
 
1st MyCT e-Newsletter
1st MyCT e-Newsletter1st MyCT e-Newsletter
1st MyCT e-Newsletter
 
Journal of Otolaryngology-Head and Neck Surgery Face and Content Validity of ...
Journal of Otolaryngology-Head and Neck Surgery Face and Content Validity of ...Journal of Otolaryngology-Head and Neck Surgery Face and Content Validity of ...
Journal of Otolaryngology-Head and Neck Surgery Face and Content Validity of ...
 
Introduction to Bioinformatics.
 Introduction to Bioinformatics. Introduction to Bioinformatics.
Introduction to Bioinformatics.
 
Research kickoff and seminar series on brain engineering, the new ict frontier.
Research kickoff and seminar series on brain engineering, the new ict frontier.Research kickoff and seminar series on brain engineering, the new ict frontier.
Research kickoff and seminar series on brain engineering, the new ict frontier.
 
System_Reliability-Based_Design_and_Multiresolutio.pdf
System_Reliability-Based_Design_and_Multiresolutio.pdfSystem_Reliability-Based_Design_and_Multiresolutio.pdf
System_Reliability-Based_Design_and_Multiresolutio.pdf
 
Scott Edmunds & Mendel Wong, Citizen Science #101. HKU MPA lecuture
Scott Edmunds & Mendel Wong, Citizen Science #101. HKU MPA lecutureScott Edmunds & Mendel Wong, Citizen Science #101. HKU MPA lecuture
Scott Edmunds & Mendel Wong, Citizen Science #101. HKU MPA lecuture
 
1312020 Originality Reporthttpsucumberlands.blackboar.docx
1312020 Originality Reporthttpsucumberlands.blackboar.docx1312020 Originality Reporthttpsucumberlands.blackboar.docx
1312020 Originality Reporthttpsucumberlands.blackboar.docx
 
AIT Newsletter June 2014
AIT Newsletter June 2014AIT Newsletter June 2014
AIT Newsletter June 2014
 
3D Printing and Additive Manufacturing - Principles and Applications
3D Printing and Additive Manufacturing - Principles and Applications3D Printing and Additive Manufacturing - Principles and Applications
3D Printing and Additive Manufacturing - Principles and Applications
 
X-Ray Disease Identifier
X-Ray Disease IdentifierX-Ray Disease Identifier
X-Ray Disease Identifier
 

More from Imran Memon

More from Imran Memon (7)

1
11
1
 
ICISCE 2016 member list
ICISCE 2016 member listICISCE 2016 member list
ICISCE 2016 member list
 
Certificate
CertificateCertificate
Certificate
 
1853
18531853
1853
 
reviewer
reviewerreviewer
reviewer
 
verification- letter(imran memon)
verification- letter(imran memon)verification- letter(imran memon)
verification- letter(imran memon)
 
IFS_2
IFS_2IFS_2
IFS_2
 

Computer Science, Technology and Application Proceedings

  • 1. 10290_9789813200432_tp.indd 1 30/8/16 11:45 AM ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 2. b2530   International Strategic Relations and China’s National Security: World at the Crossroads b2530_FM.indd 6 01-Sep-16 11:03:06 AM This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 3. 10290_9789813200432_tp.indd 2 30/8/16 11:45 AM ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 4. Published by World Scientific Publishing Co. Pte. Ltd. 5 Toh Tuck Link, Singapore 596224 USA office: 27 Warren Street, Suite 401-402, Hackensack, NJ 07601 UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. COMPUTER  SCIENCE,  TECHNOLOGY  AND  APPLICATION Proceedings of the 2016 Joint International Conference on Computer Science, Technology and Application (CSTA2016) Copyright © 2017 by World Scientific Publishing Co. Pte. Ltd. All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the publisher. For photocopying of material in this volume, please pay a copying fee through the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA. In this case permission to photocopy is not required from the publisher. ISBN 978-981-3200-43-2 Printed in Singapore Xiran - Computer Science, Technology and Application.indd 1 29-08-16 10:14:38 AM ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 5. v Preface The 2016 International Conference on Computer Science, Technology and Application (CSTA2016) have been successfully held in Changsha, China during March 18-20, 2016. The main objective of this conference is to provide a platform for scientists, researchers, and engineers from different part of the world to get together under one roof to discuss, present and share their research findings and results in the development in computing technology and its application. CSTA2016 received over more than 150 submissions, but only 67 articles are included in this proceedings after a rigorous process of double peer review. The proceedings is organized into 5 specialize areas, which include image and signal processing, computer network and information security, algorithm and simulation, data mining and cloud computing, computer system and applications. Finally, we would like to take this opportunity to express our sincere gratitude to all members of the conference committee and reviewers for their effort and comments on articles under their ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 6.   vi   review. Without them, we would not able to pull out this proceedings so quickly after our conference. Guest Editor Dr. Xing Zhang (Wuhan University) On behalf of the CSTA2016 Organizing Committee Changsha, China ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 7.   vii   CSTA2016 Committees General Chair Bing-Lan Shui Ph.D., Hubei Engineering University, China Co-Chair Xiao-Shan Ma Ph.D., Yangzhou University, China Technical Program Committee Huai-Qiu Zhu Professor, Department of Biomedical Engineering, College of Engineering, Peking University,China Jie Zhu Professor, School of Information, Beijing Wuzi University, China Bao-lin Sun Professor, Computer Science and Technology, Hubei University of Economics, Hubei, China Hong-Zhi Fu Professor, College of Physics and Electronic Information, Luoyang Normal College, Luoyang, P. R. China ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 8.   viii   Kai-Qi Zou, Professor, Dalian University, China Jin-Xing Shen, Ph.D. School of Computer Science, Guangdong Polytechnic Normal University, China Deng Wu Professor, Dalian Jiaotong University, China Xue-Qian Fang Professor, Shijiazhuang Tiedao University, China Bo Sun Professor, The International Outsourcing Research Institute of Guangdong University of Foreign Languages, China Yan Cheng Professor, Jiangxi Normal University, China Ph.D. Hanri Cao, Donghua University, China Qian-Liu Li Ph.D., Wenzhou University, China Heng-Qing Cang Ph.D., Hohai University, China Xiu Xu Ph.D., Shanghai Dian Ji University, China ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 9.   ix   Lv-Ben Wu Ph.D., North China Institute of Aerospace Engineering, China Zi-Chen Ning Ph.D., North China University of Technology, China Qiao Yuan Ph.D., Shanxidatong University, China Zheng-Hai Zhang Ph.D., Changchun University of Science and Technology, China Jia-Ding Feng Ph.D., Shandong Agricultural University, China Dong-Xuan Cui Ph.D., Changchun University of Science and Technology, China Ning Wan Ph.D., Northeast Agricultural University, China Fanchou Wu Ph.D., Shanghai University of Electric Power, China Qin Zheng Ph.D., North University of China, China Zhi-Hui Sun Ph.D., Polytechnic School of Shenyang Ligong University, China ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 10.   x   Kun-Hao Zhou Ph.D., Taiyuan Institute of Technology, China Xue-Qing Wang Ph.D., North China Institute of Aerospace Engineering, China Lin-Shan Fang Ph.D., Beijing Institute of Technology, China Mu He Ph.D., Northeast Agricultural University, China Chu-Wei Ren Ph.D., Hubei Engineering University, China De Yan Ph.D., North University of China, China Man-Di Zhao Ph.D., Inner Mongolia Normal University, China Xia-Rong Yin Ph.D., Wuhan Business University, China Rong-Xing Bao Ph.D., Shanghai University of Electric Power, China Di-Zhu Le Ph.D., Yantai University, China ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 11.   xi   Yun-Yao Liu Ph.D., Liaocheng University, China Muhammad Naufal Bin Mansor Ph.D., Universiti Malaysia Perlis, Malaysia Mohd Helmy Abd Wahab Ph.D., Universiti Tun Hussein Onn Malaysia, Malaysia Imran Memon, PhD. Zhejiang University, Computer Engineering, China ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 12. b2530   International Strategic Relations and China’s National Security: World at the Crossroads b2530_FM.indd 6 01-Sep-16 11:03:06 AM This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 13.   xiii KEYNOTE SPEECH Name: Prof. Huaiqiu Zhu Department of Biomedical Engineering, College of Engineering, Peking University, China Prof. Zhu's research interests include the computational methods and tools in bioinformatics based on the genome and genomic sequences, and protein sequences and structures. Recently Prof. Zhu and his lab are focusing on the problems of metagenomics issues driven by human health and environments, and data mining in medicine informatics. In the post-genome era, especially with the next generation sequencing (NGS) technologies, it is the great mission for bioinformatics to carry out the data intensive computation and analysis to meet the needs of high-throughput genomic data. Since 2004 Zhu's lab has addressed to the bioinformatics methods of genome analysis and annotation, and developed a series of methods of microbial gene prediction, genome comparison, and protein molecular dynamics. Since 2009, Prof. Zhu developed the tools such as sequence assembly, gene prediction and microbial community comparison for metagenomic sequence produced by NGS. Most of these methods and tools were demonstrated with leading performances in the field, and they have been applied in several genome projects and were incited or highlighted by Cell and Nature etc. Currently, the lab has close collaborations with Gastroenterology lab and Critical Care Medicine lab of Peking University Third Hospital in Beijing, and BME lab of GaTech, and Bioengineering lab of UIUC in USA. ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 14.   xiv KEYNOTE SPEECH Name: Dr. Amol R. Madane Video Security experts, TCS, Pune, India Dr. Amol R. Madane has completed Doctorate of Philosophy (Ph.D.) under the guidance of Dr. Uttam D. Kolekar in Image/ Video Security area in May 2015. He holds Masters of Engineering degree in Electronics Engineering from Mumbai University, India. He is an associate of Tata Consultancy Services Ltd. from last 9+ years. His main area of research is Digital Image Processing, Digital Video Processing and Digital Signal Processing. He has published various research papers in international conferences and journals. He is “editor in chief” of various international journals. Recently, he has published book titled “Design and Performance Evaluation of Image Encoder in View of 4G Applications” by Lulu book publication, Raleigh, United States. He is member of professional institutes such as IEEE, IETE, ISTE, IEI, ISTD, CSI, ACM etc. ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 15.   xv KEYNOTE SPEECH Name: Prof. Yan Cheng Professor, Jiangxi Normal University, China Yan Cheng holds a Bachelor's degree, Master's degree and Ph.D. degrees from Tongji University in Shanghai and won Guanghua Ph.D. scholarship, national doctoral academic best paper award. From July 2013 to March 2014, she went to the California University as a visiting scholar. Currently she is a professor in Jiangxi Normal University. Currently she is the leader of national NSFC (Natural Science Foundation of China) Plan Project and more than Provincial projects. She also has undertaken provincial key projects, one Key Projects of Science and Technology in Jiangxi Province, One Jiangxi science and technology support project (the Areas of Social Development), one Natural Science Fund Projects in Jiangxi Province, one Provincial Science and Technology Support Project (Industry) and many Social Sciences Planning Projects. She published academic monograph (Beijing, Science Press, 2014) on educational data mining, computer professional teaching materials. ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 16. b2530   International Strategic Relations and China’s National Security: World at the Crossroads b2530_FM.indd 6 01-Sep-16 11:03:06 AM This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 17. xvii Contents Preface v Committees vii Keynote Speech xiii Chapter 1 Image and Signal Processing 1 Image denoising based on a new thresholding function...................3 Jun-Ke Kou and Yan-Ling Fu Age estimation based on image feature fusion method....................9 Lei Wang and Qing Zhu The intelligent video surveillance and recognition system based on summarization video ..................................................................15 Wan-Jia Qu, Zhong-Lin Xu and Yu-Wei Yuan A smart video surveillance system based on moving target recognition ......................................................................................22 Wan-Jia Qu, Zhong-Lin Xu and Yu-Wei Yuan Design of MUAV target recognition system based on binary descriptor of Brisk ...........................................................................28 Ya-Wei Liu and Xiao-Min Li ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 18. xviii Time difference based highly accurate anemometer: architecture and practice......................................................................................35 Li-Wei Zhang, Ying Yao, Long Xiao and Shi-Bo Yin A three-layer framework for correlated multi-label classification with respect of package recommendation .......................................43 Jing-Kang Yang, Jie Shi, Rui Xuan, Regina Wang, Zhao-Jing Zhang and Liang Dong Applying improved split Bregman method to fluorescence microscopic image restoration.........................................................54 Chang-Chun Zhang, Yu Wang and Hong-Bing Xiao A new image enhancement method based on high-dimensional information geometry ......................................................................61 Jun-An Wu and Wen-Ming Cao Interactive rendering of approximate soft shadows using ray tracing with visibility filtering.........................................................68 Chun-Yi Chen, Hua-Min Yang and Hua Li Design of global cooperative signaling system for train control.....75 Wan-Ting Zhao, Xiang-Xian Chen, Zhu-Jun Ling, Zhen-Peng Nie, Wen-Bin Tang, Guo-Dong Teng and Lan-Qing Hu The liver nonstandard segment based on relationship of vascular blood supply ....................................................................................84 Yuan Gao and Ke Tan ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 19. xix Image content authentication algorithm based on finite ridgelet transform..........................................................................................91 Rui-Ling Zhu and Zhuo-Ran Han An resolution impact analysis for the catadioptric system.............100 Mai Jiang, Ming-Ming Qiao and Li-Min Zhang Design of a colored QR code adaptive to logo contour..................106 Dong Li and Hong-An Xie Detection of imagined and actual hand movements with EEG signals.............................................................................................113 Miguel Contreras, Javier Suárez and Xiao-Hua Yu Target detection and tracking based on embedded multicore DSP system.....................................................................................119 Hao Chen, Hong Zhang, Yi-Fan Yang, Lei Zhang and Yue-Ren Wang Dynamic properties and modified projective synchronization of two four-scroll hyperchaotic systems with non-identical fractional orders ..............................................................................................127 Zhen-Wu Sun Chapter 2 Computer Network and Information Security 137 Design and implementation of a RFID-based intelligent tools management system........................................................................139 Jia-Wen Xie, Min-Li Wang and Tan Jie ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 20. xx sDOMO communication protocol for home robotic systems in the context of the internet of things............................................151 Marcel-Titus Marginean and Chao Lu A research on Chinese selectional preference based on online materials .........................................................................................161 Qing Zhang Multi-route avoidance routing without location information of malicious wireless nodes in MANET.........................................168 T. Kanachi and H. Higaki Computerized flat knitting machine network control research ......178 Cheng-Jun Zhang and Xiao-Yan Zuo A novel dependability optimization method in network layer of IOT .............................................................................................185 Rui-Juan Zheng, Tong Zhang, Ming-Chuan Zhang, Qing-Tao Wu and Wang-Yang Wei The effectiveness of applying moodle E-learning platform on resource classroom students ......................................................191 Hua-Yi Lin, Jiann-Gwo Doong and Xiao-Wei Lin A general threshold scheme based on elliptic curve cryptosystem...................................................................................199 Yu-Lian Shang, Wu-Li Song, Wu-Yuan Jia and Zhao-Chen Zhang ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 21. xxi New short interleaver design for turbo codes.................................210 Li-Fang Ma , Shi-Zhan Lan, Zhao-Jing Zhang and Hua-Hua Xie Trusted network management model based on clustering analysis ...........................................................................................220 Hong-An Xie and Dong Li Multi-level sleep scheduling for heterogeneous wireless sensor networks .........................................................................................227 Shahzad Hassan, Muhammad S. Nisar and Hong-Bo Jiang Mobile multi-node recharging in heterogeneous wireless sensor networks .........................................................................................234 Shahzad Hassan, Muhammad S. Nisar and Hong-Bo Jiang Research on an embedded intelligent-unit based on multi-sensor fusion oriented internet...................................................................241 Jian Yang Round-robin differential-phase-shift quantum secret sharing........248 Zhen-Yuan Sun, Jian Wang and Chao-Jing Tang Based on solr distributed classification algorithm of system design for science and technology plan projects........................................256 Gui-Lan Cai, Kai Xu and Ping-Hua Chen An improved approximation formula for the symmetric capacity of 2-dimentional constellations under AWGN channel .................264 Pei Yang, Li-Qiang Jin and Hong-Wen Yang ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 22. xxii Two-hop multi-relay selection for secrecy improvement in broadcast wireless system ..........................................................270 L. A. Olawoyin, Yue Wu and Hong-Wen Yang Chapter 3 Algorithm and Simulation 277 Apply classical physical laws to algorithms for analysis of stocks..........................................................................................279 Xing-Bo Wang An improved recommendation algorithm based on user dynamic interests...........................................................................................288 Chao Li, Jun-Min Ye, Qiang Wang, Liu-Yin Huang and Shu Chen Indoor localization algorithm based on multiple logistic regression analysis and quad-tree with irregular boundary .............................298 Tian-Yi Feng, Shu-Yi Liu, Jing-Kang Yang, Chen Lu, Zhao-Jing Zhang and Dong Liang Explosion simulation based on the CUDA physical model and particle system .........................................................................307 Bai-Yu Zhao and Ji-Cheng Quan Cognitive student model based on the gray partial correlation ......314 Sheng-Bing Ren, Di Feng and Xiao-Nan Chen ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 23. xxiii Application of smart medical based on distributed apriori algorithm.........................................................................................321 Hai-Feng Lu and Fang-Qin Xu An improved genetic algorithm based on k-means clustering for solving traveling salesman problem .........................................334 Li-Zhuang Tan, Yan-Yan Tan, Guo-Xiao Yun and Chao Zhang Research on HOG algorithm based on compressed sensing ..........344 Xi Chen and Song Wang Chapter 4 Data Mining and Cloud Computing 353 Optimizing resource-service sequence based on genetic algorithm for collaborative task systems ........................................................355 Xiu-Yang Lei, Hai-Bo Li and Ya-Feng Gao GSkiplist: A GPU-method to accelerate key-value database search ...............................................................................362 Xin Zhao, Kai Lu, Xiao-Ping Wang and Gen Li Label-weight adapting (LWA): a method for non-independent multi-label learning ........................................................................370 Jing-Kang Yang, Jiang Jun, Hao-Ran Lv, Tianyi Wang, Wei-Wei Wang, Zhaojing Zhang and Liang Dong Schedule model in a cloud computing based on credit and cost...........................................................................................381 Yi-Li Zhang and Jin-Bai Zhang ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 24. xxiv A method of SQL access logs pretreatment for power business system.............................................................................................389 Wei-Ei Li, Xiu-Li Huang, Bo Zhang, Rong Zeng and Yong Li Recurrent neural network for forecasting stock market trend........397 Xin-Kai Xie and Hong Wang Text mining of medical insurance policy based on association rules ................................................................................................403 Li-Li Han The research and application of data visualization based on D3 in the filed of healthcare .....................................................................410 Xin-Liang Xu and Lian-Jun Chen Chapter 5 Computer System and Application 419 Efficient concurrent virtual machine scheduling for Xen hypervisors .....................................................................................421 Po-Jen Chuang and Chih-Yuan Chou Rotating laser precision machining computer control system........426 Tao Wang, Long-Fei Ma, Bo Zhang, Sha Han, Ya-Peng Hu, Xin-Chao Zhao and Zhuo Wang The design of microcirculatory hemodynamic detection system based on Android............................................................................435 W. Jiang, L. Yang, J. Su, Y. Li and X X. Yang ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 25. xxv The computer control system design and implementation of food production line ...................................................................441 Cheng-Jun An Extended operation and permission model based on RBAC..........446 Zhi-Hong Liang, Wen-Hong Li, Xing-Ping Sun, Qing-Yi Chen, Jun-Hua Hu and Shu-Qiong Sun Performance analysis and the staffing optimization for a multi-skill call center in M-design based on queueing model method ............454 Chun-Yan Li A resource management system design for malware behavior detection .........................................................................................467 Jian-Guo Jiang, Zhi-Song Liu, Min Yu and Chao Liu Combining static and dynamic analysis for the detection of malicious JavaScript-bearing PDF documents...........................475 Min Li, Ying Zhou, Min Yu and Chao Liu The design of intelligent remote meter reading system based on mechanical water meter.............................................................483 Lei Jing, Lai-Lei Jiao and Zeng-Kang Wang The theory research on portable monitoring system model of the environment of banana growth.............................................489 Ling-Ling Wang , Yu-Ping Li, Hong-Xia Luo and Ji-Hua Fang ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
  • 26. xxvi Study on the operation quality assessment of P2P platform based on factor analysis............................................................................495 Lu-Ming Yang, Ya-Na Wu and Liang Shan An efficient tables memory access optimized algorithms for CAVLC decoding .....................................................................504 Xiao-Bo Lin and Hui-Lin Wang The research investigations on the NetFPGA platform..................514 Xing Zheng, Juan Cao and Hai-Jun Gao Chapter 6 Mathematics and Management 521 An approach to process uncertain complex events.........................523 Qi-Xin Cai, Jian Liu, Qing Xu, Hui-Ling Su and Hong-Sheng Zhao N-soliton solutions for an integrable differential-difference equation with computer symbolic computation..............................530 Xiao-Yong Wen Research on knowledge management for collaborative design of aviation enterprises.....................................................................538 Yong-Hua Wu and Bin Liu Author Index 545 ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.