This document contains the proceedings from the 2016 International Conference on Computer Science, Technology and Application (CSTA2016) held in Changsha, China from March 18-20, 2016. It includes 67 peer-reviewed articles organized into 5 areas: image and signal processing, computer network and information security, algorithm and simulation, data mining and cloud computing, and computer system and applications. The proceedings provide an overview of the conference including preface, committees, and keynote speaker information, followed by the full text of accepted papers presented at the conference.
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...sanaullah noonari
Abstract- Balochistan Rural Support Programme (BRSP) is a non-governmental organization working in
rural areas of Balochistan province since 1983. Its head office is situated in Quetta, Baluchistan, Pakistan,
sub-office is located in Islamabad, and a number of district offices are located in various districts of
Balochistan. It is clear that majority of the respondents 90 percent of the sample were male and 10
percent were females in district Mastung Balochistan. The respondents 86.66 percent had availed the
loan facility only for once and that too for the first time. 11.66 percent had availed this facility twice and
only 11.66 percent of them took loan three times. The respondents 40.00% were 25000, 16.66% were
40000.00, 20.00% were 50000.00, 13.33% were 60000.00 and 10.00% were above 80000.00 rupees
amount loans. 30.00% were get for seed, 23.33% were Pesticide, 26.66% were Fertilizer and 16.66% were
Others purposes.
Keywords: BRSP, impact of microcredit, agricultural development.
É uma norma regulamentadora do Ministério do Trabalho que estabelece os requisitos mínimos e medidas de proteção para o trabalho em altura. Pode se considerar trabalho em altura toda atividade executada acima de 2,00 m (dois metros) do nível inferior, onde haja risco de queda.
Transparency as Cure for the Resource Curse? A Nigerian Case Studysebhancock
A case study of the Nigerian resource curse and it\'s underlying causes with the aim of evaluating the effectiveness of the Extractive Industries Transparency Initiative
Service sector productivity finally starting to rise 6 jan 17Kitty Ussher
For the last few years economists have been worrying about the why productivity has remained stubbornly low even as the economy has got stronger. Part of the story is that employment has risen so strongly that output per hour worked hasn't gone up. There has also been particularly strong growth in the lower value service sector which brings down the average. But data from the ONS today has shown in the last year that even in this sector productivity has started to rise. in the last year even in this sector productivity has started to rise a little, although manufacturing has proved volatile.
(Source ONS productivity data released 6 January 2017)
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...sanaullah noonari
Abstract- Balochistan Rural Support Programme (BRSP) is a non-governmental organization working in
rural areas of Balochistan province since 1983. Its head office is situated in Quetta, Baluchistan, Pakistan,
sub-office is located in Islamabad, and a number of district offices are located in various districts of
Balochistan. It is clear that majority of the respondents 90 percent of the sample were male and 10
percent were females in district Mastung Balochistan. The respondents 86.66 percent had availed the
loan facility only for once and that too for the first time. 11.66 percent had availed this facility twice and
only 11.66 percent of them took loan three times. The respondents 40.00% were 25000, 16.66% were
40000.00, 20.00% were 50000.00, 13.33% were 60000.00 and 10.00% were above 80000.00 rupees
amount loans. 30.00% were get for seed, 23.33% were Pesticide, 26.66% were Fertilizer and 16.66% were
Others purposes.
Keywords: BRSP, impact of microcredit, agricultural development.
É uma norma regulamentadora do Ministério do Trabalho que estabelece os requisitos mínimos e medidas de proteção para o trabalho em altura. Pode se considerar trabalho em altura toda atividade executada acima de 2,00 m (dois metros) do nível inferior, onde haja risco de queda.
Transparency as Cure for the Resource Curse? A Nigerian Case Studysebhancock
A case study of the Nigerian resource curse and it\'s underlying causes with the aim of evaluating the effectiveness of the Extractive Industries Transparency Initiative
Service sector productivity finally starting to rise 6 jan 17Kitty Ussher
For the last few years economists have been worrying about the why productivity has remained stubbornly low even as the economy has got stronger. Part of the story is that employment has risen so strongly that output per hour worked hasn't gone up. There has also been particularly strong growth in the lower value service sector which brings down the average. But data from the ONS today has shown in the last year that even in this sector productivity has started to rise. in the last year even in this sector productivity has started to rise a little, although manufacturing has proved volatile.
(Source ONS productivity data released 6 January 2017)
The Smoke-Free Alternatives Trade Association (SFATA) has released “Top 10 Vapor Facts: Demystifying Misconceptions about the Vapor Industry,” a scientific study-based presentation that addresses leading myths about vapor products.
Here are 10 great energy saving tips for your home that can help you and the planet!
Visit out blog:
www.glocalresidentialblog.wordpress.com
Visit our website:
www.glocal-residential.co.uk
Henry Badenhorst - Education portfolio: Saudi Arabia (2014-2015) Edumax Solutions
During the 2014/2015 Academic year I taught ESL and IT in Al Quwayiyah, KSA for ESG Saudi Arabia at the al quwayiyah vocational college. The video also includes all my travel experiences in KSA and to Bahrain.
Learn how to make this simple yet elegant pearl statement necklace by Ashly of Ash Ann Jewelry. This lovely piece can be executed with a few basic materials using freshwater pearls, sterling silver chain, headpins & jump rings. With these basic steps, you can create your own personalized necklace using this design. This design tutorial can be used as a model to create your own individual variations personalized to your taste. Discover what you can create by following these easy steps to create the perfect gift for yourself or loved ones while making a statement.
Here are the materials list and instructions:
Materials Needed:
• 4 silver headpins
• 4 pink pearl beads
• 10 medium silver jump rings
• 1 silver lobster clasp
• small silver chain
• medium silver chain
• flat nose pliers
• wire cutters
• rounded point pliers
Step 1:
Trim your medium size chain into desired length and connect your lobster clasp
Step 2:
Count 28 chain lengths of small silver chain and cut. Connect to your medium chain
Step 3:
Create a simple loop and connect with your medium jump ring (make sure you leave 3 chain lengths in between each connection)
Step 4:
Continue pattern
Step 5:
Continue pattern until you have made 4 loops
Step 6:
This is how it should look after creating 4 loops
Step 7:
Feed a pearl onto your headpin
Step 8:
Cut headpin about 1/2 inch in length
Step 9:
Prepare to cut four 17 chain lengths of small chain
Step 10:
Connect your pearl to the small chain
Step 11:
Connect finished pearl design to medium chain (connect in the center of the 3 chain lengths)
Step 12:
Repeat
Step 13:
Repeat
Step 14:
Connect your last fourth pearl design
A Lightning Round presentation for the University of Michigan's Emergent Research Series, July 23, 2016, presenting recent work from the MLA Systematic Review Team 6 on Emerging Technologies.
Sixteen Technology Commercialisation Projects receive S$4 million Proof-of-Co...James Chan
• 16 projects receive up to S$250,000 each in this second POC grant call,
• 2 projects came from the polytechnics
• Awarded projects are in the areas of engineering, info-comm technologies,
and life sciences.
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and OpportunitiesHezekiah Fatoki
The computational methods for in silico drug discovery have been broadly categories into two fields bioinformatics and chemoinformatics. In case of bioinformatics, major emphasis is on identification and validation of drug targets, mainly based on functional/structural annotation of genomes. In case of chemoinformatics or pharmacoinformatics, major emphasis is on designing of drug molecules or ligands and their interaction with drug targets.
Scott Edmunds talk at IARC: How can we make science more trustworthy and FAIR...GigaScience, BGI Hong Kong
Scott Edmunds talk at IARC, Lyon. How can we make science more trustworthy and FAIR? Principled publishing for more evidence based research. 8th July 2019
Most Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdfInsightsSuccess4
Dr. Haibin Zhu, Vice President – Systems Science and Engineering, IEEE SMC Society and Professor, Nipissing University, Canada, is a trailblazer in the field of computer science and robotics. His academic journey began with a bachelor’s degree in computer engineering in the early 1980s.
The Smoke-Free Alternatives Trade Association (SFATA) has released “Top 10 Vapor Facts: Demystifying Misconceptions about the Vapor Industry,” a scientific study-based presentation that addresses leading myths about vapor products.
Here are 10 great energy saving tips for your home that can help you and the planet!
Visit out blog:
www.glocalresidentialblog.wordpress.com
Visit our website:
www.glocal-residential.co.uk
Henry Badenhorst - Education portfolio: Saudi Arabia (2014-2015) Edumax Solutions
During the 2014/2015 Academic year I taught ESL and IT in Al Quwayiyah, KSA for ESG Saudi Arabia at the al quwayiyah vocational college. The video also includes all my travel experiences in KSA and to Bahrain.
Learn how to make this simple yet elegant pearl statement necklace by Ashly of Ash Ann Jewelry. This lovely piece can be executed with a few basic materials using freshwater pearls, sterling silver chain, headpins & jump rings. With these basic steps, you can create your own personalized necklace using this design. This design tutorial can be used as a model to create your own individual variations personalized to your taste. Discover what you can create by following these easy steps to create the perfect gift for yourself or loved ones while making a statement.
Here are the materials list and instructions:
Materials Needed:
• 4 silver headpins
• 4 pink pearl beads
• 10 medium silver jump rings
• 1 silver lobster clasp
• small silver chain
• medium silver chain
• flat nose pliers
• wire cutters
• rounded point pliers
Step 1:
Trim your medium size chain into desired length and connect your lobster clasp
Step 2:
Count 28 chain lengths of small silver chain and cut. Connect to your medium chain
Step 3:
Create a simple loop and connect with your medium jump ring (make sure you leave 3 chain lengths in between each connection)
Step 4:
Continue pattern
Step 5:
Continue pattern until you have made 4 loops
Step 6:
This is how it should look after creating 4 loops
Step 7:
Feed a pearl onto your headpin
Step 8:
Cut headpin about 1/2 inch in length
Step 9:
Prepare to cut four 17 chain lengths of small chain
Step 10:
Connect your pearl to the small chain
Step 11:
Connect finished pearl design to medium chain (connect in the center of the 3 chain lengths)
Step 12:
Repeat
Step 13:
Repeat
Step 14:
Connect your last fourth pearl design
A Lightning Round presentation for the University of Michigan's Emergent Research Series, July 23, 2016, presenting recent work from the MLA Systematic Review Team 6 on Emerging Technologies.
Sixteen Technology Commercialisation Projects receive S$4 million Proof-of-Co...James Chan
• 16 projects receive up to S$250,000 each in this second POC grant call,
• 2 projects came from the polytechnics
• Awarded projects are in the areas of engineering, info-comm technologies,
and life sciences.
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and OpportunitiesHezekiah Fatoki
The computational methods for in silico drug discovery have been broadly categories into two fields bioinformatics and chemoinformatics. In case of bioinformatics, major emphasis is on identification and validation of drug targets, mainly based on functional/structural annotation of genomes. In case of chemoinformatics or pharmacoinformatics, major emphasis is on designing of drug molecules or ligands and their interaction with drug targets.
Scott Edmunds talk at IARC: How can we make science more trustworthy and FAIR...GigaScience, BGI Hong Kong
Scott Edmunds talk at IARC, Lyon. How can we make science more trustworthy and FAIR? Principled publishing for more evidence based research. 8th July 2019
Most Influential Robotics Trailblazers, Making Wave in The Industry - 2024.pdfInsightsSuccess4
Dr. Haibin Zhu, Vice President – Systems Science and Engineering, IEEE SMC Society and Professor, Nipissing University, Canada, is a trailblazer in the field of computer science and robotics. His academic journey began with a bachelor’s degree in computer engineering in the early 1980s.
Slides contain information about why bioinformatics appeared,
who bioinformaticians are, what they do, what kind of cool applications and challenges in bioinformatics there are.
Slides were prepared for the Bioinformatics seminar 2016, Institute of Computer Science, University of Tartu.
1/31/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=07655bd6-379b-44ca-bf70-fcf30eb046bc… 1/3
%39
%5
SafeAssign Originality Report
Spring 2020 - InfoTech Import in Strat Plan (ITS-831-32) - Full Term • Week 4 Research Paper: Blockchain
%44Total Score: High riskSpandana Kollipara
Submission UUID: b5247c95-6d9d-9160-127a-44a26fd2cf17
Total Number of Reports
1
Highest Match
44 %
week 4 assignment.docx
Average Match
44 %
Submitted on
01/31/20
09:29 AM PST
Average Word Count
651
Highest: week 4 assignment.docx
%44Attachment 1
Institutional database (3)
Student paper Student paper Student paper
Global database (2)
Student paper Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 651
week 4 assignment.docx
3 2 5
4 1
3 Student paper 4 Student paper 2 Student paper
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=07655bd6-379b-44ca-bf70-fcf30eb046bc&course_id=_113956_1&download=true&includeDeleted=true&print=true&force=true
1/31/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=07655bd6-379b-44ca-bf70-fcf30eb046bc… 2/3
Source Matches (10)
Student paper 73%
Student paper 86%
Student paper 100%
Student paper 87%
Student paper 100%
Running Head: BLOCKCHAIN TECHNOLOGY BLOCKCHAIN TECHNOLOGY 2
Blockchain Technology in Healthcare Sector.
Spandana kollipara
ITS 831-32
University of the Cumberlands
Blockchain technology is a cryptography technology that keeps large records of data. Blocks of records are linked together as a transaction data. By use of open
distributed ledger, transactions engaged in between parties are stored efficiently and in a verifiable and permanent way. It records transactions across many
computers and thus the records involved cannot be interfered with or altered (Crosby, 2016). Various techniques has been used in the storage of data however, there
have been various challenges on the security measures and storage of large amounts of data. Therefore, with blockchain technology we can be able to store
large amount of data in various different locations closely linked together and safely stored without alteration. This technology is applicable in various fields which
includes data collection, management and analysis. However, this is a new technology and IT staff will need training in order to gain more understanding on the
use of blockchain together with improvising it in their various organizations and its applications in order to attain maximum advantage. Healthcare sector looks
forward to a great transition over its services using blockchain technology. This technology has a great impact in the healthcare sector in various fields. We will look on
its impact on how it monitors health together with the security of the patients’ records and data. I ...
Additive Manufacturing (AM) technologies are developing impressively and are expected to bring about the next revolution. AM is gradually replacing traditional manufacturing methods in some applications because of its unique properties of customisability and versatility. This book provides a very comprehensive and updated text about different types of AM technologies, their respective advantages, shortcomings and potential applications.
3D Printing and Additive Manufacturing: Principles and Applications is a comprehensive textbook that takes readers inside the world of additive manufacturing. This book introduces the different types of AM technologies, categorised by liquid, solid and powder-based AM systems, the common standards, the trends in the field and many more.
Easy to understand, this book is a good introduction to anyone interested in obtaining a better understanding of AM. For people working in the industry, this book will provide information on new methods and practices, as well as recent research and development in the field. For professional readers, this book provides a comprehensive guide to distinguish between the different technologies, and will help them make better decisions regarding which technology they should use. For the general public, this book sheds some light on the fast-moving AM field.
In this edition, new AM standards (e.g. Standard of Terminology and Classification of AM systems) and format standards will be included, Furthermore, the listing of new machines and systems, materials, and software; as well as new case studies and applications in industries that have recently adopted AM (such as the Marine and Offshore industry) have also been incorporated.
1. 10290_9789813200432_tp.indd 1 30/8/16 11:45 AM
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
2. b2530 International Strategic Relations and China’s National Security: World at the Crossroads
b2530_FM.indd 6 01-Sep-16 11:03:06 AM
This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
3. 10290_9789813200432_tp.indd 2 30/8/16 11:45 AM
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
5. v
Preface
The 2016 International Conference on Computer Science,
Technology and Application (CSTA2016) have been successfully
held in Changsha, China during March 18-20, 2016. The main
objective of this conference is to provide a platform for scientists,
researchers, and engineers from different part of the world to get
together under one roof to discuss, present and share their research
findings and results in the development in computing technology
and its application.
CSTA2016 received over more than 150 submissions, but only 67
articles are included in this proceedings after a rigorous process of
double peer review. The proceedings is organized into 5 specialize
areas, which include image and signal processing, computer
network and information security, algorithm and simulation, data
mining and cloud computing, computer system and applications.
Finally, we would like to take this opportunity to express our
sincere gratitude to all members of the conference committee and
reviewers for their effort and comments on articles under their
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
6.
vi
review. Without them, we would not able to pull out this
proceedings so quickly after our conference.
Guest Editor
Dr. Xing Zhang (Wuhan University)
On behalf of the CSTA2016 Organizing Committee
Changsha, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
7.
vii
CSTA2016 Committees
General Chair
Bing-Lan Shui
Ph.D., Hubei Engineering University, China
Co-Chair
Xiao-Shan Ma
Ph.D., Yangzhou University, China
Technical Program Committee
Huai-Qiu Zhu
Professor, Department of Biomedical Engineering,
College of Engineering, Peking University,China
Jie Zhu
Professor, School of Information, Beijing Wuzi University, China
Bao-lin Sun
Professor, Computer Science and Technology,
Hubei University of Economics, Hubei, China
Hong-Zhi Fu
Professor, College of Physics and Electronic Information,
Luoyang Normal College, Luoyang, P. R. China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
8.
viii
Kai-Qi Zou,
Professor, Dalian University, China
Jin-Xing Shen,
Ph.D. School of Computer Science, Guangdong Polytechnic
Normal University, China
Deng Wu
Professor, Dalian Jiaotong University, China
Xue-Qian Fang
Professor, Shijiazhuang Tiedao University, China
Bo Sun
Professor, The International Outsourcing Research Institute of
Guangdong University of Foreign Languages, China
Yan Cheng
Professor, Jiangxi Normal University, China Ph.D. Hanri Cao,
Donghua University, China
Qian-Liu Li
Ph.D., Wenzhou University, China
Heng-Qing Cang
Ph.D., Hohai University, China
Xiu Xu
Ph.D., Shanghai Dian Ji University, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
9.
ix
Lv-Ben Wu
Ph.D., North China Institute of Aerospace Engineering, China
Zi-Chen Ning
Ph.D., North China University of Technology, China
Qiao Yuan
Ph.D., Shanxidatong University, China
Zheng-Hai Zhang
Ph.D., Changchun University of Science and Technology, China
Jia-Ding Feng
Ph.D., Shandong Agricultural University, China
Dong-Xuan Cui
Ph.D., Changchun University of Science and Technology, China
Ning Wan
Ph.D., Northeast Agricultural University, China
Fanchou Wu
Ph.D., Shanghai University of Electric Power, China
Qin Zheng
Ph.D., North University of China, China
Zhi-Hui Sun
Ph.D., Polytechnic School of Shenyang Ligong University, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
10.
x
Kun-Hao Zhou
Ph.D., Taiyuan Institute of Technology, China
Xue-Qing Wang
Ph.D., North China Institute of Aerospace Engineering, China
Lin-Shan Fang
Ph.D., Beijing Institute of Technology, China
Mu He
Ph.D., Northeast Agricultural University, China
Chu-Wei Ren
Ph.D., Hubei Engineering University, China
De Yan
Ph.D., North University of China, China
Man-Di Zhao
Ph.D., Inner Mongolia Normal University, China
Xia-Rong Yin
Ph.D., Wuhan Business University, China
Rong-Xing Bao
Ph.D., Shanghai University of Electric Power, China
Di-Zhu Le
Ph.D., Yantai University, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
11.
xi
Yun-Yao Liu
Ph.D., Liaocheng University, China
Muhammad Naufal Bin Mansor
Ph.D., Universiti Malaysia Perlis, Malaysia
Mohd Helmy Abd Wahab
Ph.D., Universiti Tun Hussein Onn Malaysia, Malaysia
Imran Memon,
PhD. Zhejiang University, Computer Engineering, China
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
12. b2530 International Strategic Relations and China’s National Security: World at the Crossroads
b2530_FM.indd 6 01-Sep-16 11:03:06 AM
This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
13.
xiii
KEYNOTE SPEECH
Name: Prof. Huaiqiu Zhu
Department of Biomedical Engineering, College of Engineering,
Peking University, China
Prof. Zhu's research interests include the computational methods
and tools in bioinformatics based on the genome and genomic
sequences, and protein sequences and structures. Recently Prof.
Zhu and his lab are focusing on the problems of metagenomics
issues driven by human health and environments, and data mining
in medicine informatics. In the post-genome era, especially with
the next generation sequencing (NGS) technologies, it is the great
mission for bioinformatics to carry out the data intensive
computation and analysis to meet the needs of high-throughput
genomic data. Since 2004 Zhu's lab has addressed to the
bioinformatics methods of genome analysis and annotation, and
developed a series of methods of microbial gene prediction,
genome comparison, and protein molecular dynamics. Since 2009,
Prof. Zhu developed the tools such as sequence assembly, gene
prediction and microbial community comparison for metagenomic
sequence produced by NGS. Most of these methods and tools were
demonstrated with leading performances in the field, and they have
been applied in several genome projects and were incited or
highlighted by Cell and Nature etc. Currently, the lab has close
collaborations with Gastroenterology lab and Critical Care
Medicine lab of Peking University Third Hospital in Beijing, and
BME lab of GaTech, and Bioengineering lab of UIUC in USA.
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
14.
xiv
KEYNOTE SPEECH
Name: Dr. Amol R. Madane
Video Security experts, TCS, Pune, India
Dr. Amol R. Madane has completed Doctorate of Philosophy
(Ph.D.) under the guidance of Dr. Uttam D. Kolekar in Image/
Video Security area in May 2015. He holds Masters of Engineering
degree in Electronics Engineering from Mumbai University, India.
He is an associate of Tata Consultancy Services Ltd. from last 9+
years. His main area of research is Digital Image Processing,
Digital Video Processing and Digital Signal Processing. He has
published various research papers in international conferences and
journals. He is “editor in chief” of various international journals.
Recently, he has published book titled “Design and Performance
Evaluation of Image Encoder in View of 4G Applications” by Lulu
book publication, Raleigh, United States. He is member of
professional institutes such as IEEE, IETE, ISTE, IEI, ISTD, CSI,
ACM etc.
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
15.
xv
KEYNOTE SPEECH
Name: Prof. Yan Cheng
Professor, Jiangxi Normal University, China
Yan Cheng holds a Bachelor's degree, Master's degree and Ph.D.
degrees from Tongji University in Shanghai and won Guanghua
Ph.D. scholarship, national doctoral academic best paper award.
From July 2013 to March 2014, she went to the California
University as a visiting scholar. Currently she is a professor in
Jiangxi Normal University. Currently she is the leader of national
NSFC (Natural Science Foundation of China) Plan Project and
more than Provincial projects. She also has undertaken provincial
key projects, one Key Projects of Science and Technology in
Jiangxi Province, One Jiangxi science and technology support
project (the Areas of Social Development), one Natural Science
Fund Projects in Jiangxi Province, one Provincial Science and
Technology Support Project (Industry) and many Social Sciences
Planning Projects. She published academic monograph (Beijing,
Science Press, 2014) on educational data mining, computer
professional teaching materials.
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
16. b2530 International Strategic Relations and China’s National Security: World at the Crossroads
b2530_FM.indd 6 01-Sep-16 11:03:06 AM
This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
17. xvii
Contents
Preface v
Committees vii
Keynote Speech xiii
Chapter 1 Image and Signal Processing 1
Image denoising based on a new thresholding function...................3
Jun-Ke Kou and Yan-Ling Fu
Age estimation based on image feature fusion method....................9
Lei Wang and Qing Zhu
The intelligent video surveillance and recognition system based
on summarization video ..................................................................15
Wan-Jia Qu, Zhong-Lin Xu and Yu-Wei Yuan
A smart video surveillance system based on moving target
recognition ......................................................................................22
Wan-Jia Qu, Zhong-Lin Xu and Yu-Wei Yuan
Design of MUAV target recognition system based on binary
descriptor of Brisk ...........................................................................28
Ya-Wei Liu and Xiao-Min Li
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
18. xviii
Time difference based highly accurate anemometer: architecture
and practice......................................................................................35
Li-Wei Zhang, Ying Yao, Long Xiao and Shi-Bo Yin
A three-layer framework for correlated multi-label classification
with respect of package recommendation .......................................43
Jing-Kang Yang, Jie Shi, Rui Xuan, Regina Wang, Zhao-Jing
Zhang and Liang Dong
Applying improved split Bregman method to fluorescence
microscopic image restoration.........................................................54
Chang-Chun Zhang, Yu Wang and Hong-Bing Xiao
A new image enhancement method based on high-dimensional
information geometry ......................................................................61
Jun-An Wu and Wen-Ming Cao
Interactive rendering of approximate soft shadows using ray
tracing with visibility filtering.........................................................68
Chun-Yi Chen, Hua-Min Yang and Hua Li
Design of global cooperative signaling system for train control.....75
Wan-Ting Zhao, Xiang-Xian Chen, Zhu-Jun Ling, Zhen-Peng Nie,
Wen-Bin Tang, Guo-Dong Teng and Lan-Qing Hu
The liver nonstandard segment based on relationship of vascular
blood supply ....................................................................................84
Yuan Gao and Ke Tan
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
19. xix
Image content authentication algorithm based on finite ridgelet
transform..........................................................................................91
Rui-Ling Zhu and Zhuo-Ran Han
An resolution impact analysis for the catadioptric system.............100
Mai Jiang, Ming-Ming Qiao and Li-Min Zhang
Design of a colored QR code adaptive to logo contour..................106
Dong Li and Hong-An Xie
Detection of imagined and actual hand movements with EEG
signals.............................................................................................113
Miguel Contreras, Javier Suárez and Xiao-Hua Yu
Target detection and tracking based on embedded multicore
DSP system.....................................................................................119
Hao Chen, Hong Zhang, Yi-Fan Yang, Lei Zhang and Yue-Ren
Wang
Dynamic properties and modified projective synchronization of
two four-scroll hyperchaotic systems with non-identical fractional
orders ..............................................................................................127
Zhen-Wu Sun
Chapter 2 Computer Network and Information Security 137
Design and implementation of a RFID-based intelligent tools
management system........................................................................139
Jia-Wen Xie, Min-Li Wang and Tan Jie
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
20. xx
sDOMO communication protocol for home robotic systems
in the context of the internet of things............................................151
Marcel-Titus Marginean and Chao Lu
A research on Chinese selectional preference based on online
materials .........................................................................................161
Qing Zhang
Multi-route avoidance routing without location information
of malicious wireless nodes in MANET.........................................168
T. Kanachi and H. Higaki
Computerized flat knitting machine network control research ......178
Cheng-Jun Zhang and Xiao-Yan Zuo
A novel dependability optimization method in network layer
of IOT .............................................................................................185
Rui-Juan Zheng, Tong Zhang, Ming-Chuan Zhang,
Qing-Tao Wu and Wang-Yang Wei
The effectiveness of applying moodle E-learning platform
on resource classroom students ......................................................191
Hua-Yi Lin, Jiann-Gwo Doong and Xiao-Wei Lin
A general threshold scheme based on elliptic curve
cryptosystem...................................................................................199
Yu-Lian Shang, Wu-Li Song, Wu-Yuan Jia
and Zhao-Chen Zhang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
21. xxi
New short interleaver design for turbo codes.................................210
Li-Fang Ma , Shi-Zhan Lan, Zhao-Jing Zhang and Hua-Hua Xie
Trusted network management model based on clustering
analysis ...........................................................................................220
Hong-An Xie and Dong Li
Multi-level sleep scheduling for heterogeneous wireless sensor
networks .........................................................................................227
Shahzad Hassan, Muhammad S. Nisar and Hong-Bo Jiang
Mobile multi-node recharging in heterogeneous wireless sensor
networks .........................................................................................234
Shahzad Hassan, Muhammad S. Nisar and Hong-Bo Jiang
Research on an embedded intelligent-unit based on multi-sensor
fusion oriented internet...................................................................241
Jian Yang
Round-robin differential-phase-shift quantum secret sharing........248
Zhen-Yuan Sun, Jian Wang and Chao-Jing Tang
Based on solr distributed classification algorithm of system design
for science and technology plan projects........................................256
Gui-Lan Cai, Kai Xu and Ping-Hua Chen
An improved approximation formula for the symmetric capacity
of 2-dimentional constellations under AWGN channel .................264
Pei Yang, Li-Qiang Jin and Hong-Wen Yang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
22. xxii
Two-hop multi-relay selection for secrecy improvement
in broadcast wireless system ..........................................................270
L. A. Olawoyin, Yue Wu and Hong-Wen Yang
Chapter 3 Algorithm and Simulation 277
Apply classical physical laws to algorithms for analysis
of stocks..........................................................................................279
Xing-Bo Wang
An improved recommendation algorithm based on user dynamic
interests...........................................................................................288
Chao Li, Jun-Min Ye, Qiang Wang, Liu-Yin Huang and Shu Chen
Indoor localization algorithm based on multiple logistic regression
analysis and quad-tree with irregular boundary .............................298
Tian-Yi Feng, Shu-Yi Liu, Jing-Kang Yang, Chen Lu, Zhao-Jing
Zhang and Dong Liang
Explosion simulation based on the CUDA physical model
and particle system .........................................................................307
Bai-Yu Zhao and Ji-Cheng Quan
Cognitive student model based on the gray partial correlation ......314
Sheng-Bing Ren, Di Feng and Xiao-Nan Chen
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
23. xxiii
Application of smart medical based on distributed apriori
algorithm.........................................................................................321
Hai-Feng Lu and Fang-Qin Xu
An improved genetic algorithm based on k-means clustering
for solving traveling salesman problem .........................................334
Li-Zhuang Tan, Yan-Yan Tan, Guo-Xiao Yun and Chao Zhang
Research on HOG algorithm based on compressed sensing ..........344
Xi Chen and Song Wang
Chapter 4 Data Mining and Cloud Computing 353
Optimizing resource-service sequence based on genetic algorithm
for collaborative task systems ........................................................355
Xiu-Yang Lei, Hai-Bo Li and Ya-Feng Gao
GSkiplist: A GPU-method to accelerate key-value
database search ...............................................................................362
Xin Zhao, Kai Lu, Xiao-Ping Wang and Gen Li
Label-weight adapting (LWA): a method for non-independent
multi-label learning ........................................................................370
Jing-Kang Yang, Jiang Jun, Hao-Ran Lv, Tianyi Wang, Wei-Wei
Wang, Zhaojing Zhang and Liang Dong
Schedule model in a cloud computing based on credit
and cost...........................................................................................381
Yi-Li Zhang and Jin-Bai Zhang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
24. xxiv
A method of SQL access logs pretreatment for power business
system.............................................................................................389
Wei-Ei Li, Xiu-Li Huang, Bo Zhang, Rong Zeng and Yong Li
Recurrent neural network for forecasting stock market trend........397
Xin-Kai Xie and Hong Wang
Text mining of medical insurance policy based on association
rules ................................................................................................403
Li-Li Han
The research and application of data visualization based on D3 in
the filed of healthcare .....................................................................410
Xin-Liang Xu and Lian-Jun Chen
Chapter 5 Computer System and Application 419
Efficient concurrent virtual machine scheduling for Xen
hypervisors .....................................................................................421
Po-Jen Chuang and Chih-Yuan Chou
Rotating laser precision machining computer control system........426
Tao Wang, Long-Fei Ma, Bo Zhang, Sha Han, Ya-Peng Hu,
Xin-Chao Zhao and Zhuo Wang
The design of microcirculatory hemodynamic detection system
based on Android............................................................................435
W. Jiang, L. Yang, J. Su, Y. Li and X X. Yang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
25. xxv
The computer control system design and implementation
of food production line ...................................................................441
Cheng-Jun An
Extended operation and permission model based on RBAC..........446
Zhi-Hong Liang, Wen-Hong Li, Xing-Ping Sun, Qing-Yi Chen,
Jun-Hua Hu and Shu-Qiong Sun
Performance analysis and the staffing optimization for a multi-skill
call center in M-design based on queueing model method ............454
Chun-Yan Li
A resource management system design for malware behavior
detection .........................................................................................467
Jian-Guo Jiang, Zhi-Song Liu, Min Yu and Chao Liu
Combining static and dynamic analysis for the detection
of malicious JavaScript-bearing PDF documents...........................475
Min Li, Ying Zhou, Min Yu and Chao Liu
The design of intelligent remote meter reading system based
on mechanical water meter.............................................................483
Lei Jing, Lai-Lei Jiao and Zeng-Kang Wang
The theory research on portable monitoring system model
of the environment of banana growth.............................................489
Ling-Ling Wang , Yu-Ping Li, Hong-Xia Luo and Ji-Hua Fang
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.
26. xxvi
Study on the operation quality assessment of P2P platform based
on factor analysis............................................................................495
Lu-Ming Yang, Ya-Na Wu and Liang Shan
An efficient tables memory access optimized algorithms
for CAVLC decoding .....................................................................504
Xiao-Bo Lin and Hui-Lin Wang
The research investigations on the NetFPGA platform..................514
Xing Zheng, Juan Cao and Hai-Jun Gao
Chapter 6 Mathematics and Management 521
An approach to process uncertain complex events.........................523
Qi-Xin Cai, Jian Liu, Qing Xu, Hui-Ling Su and Hong-Sheng
Zhao
N-soliton solutions for an integrable differential-difference
equation with computer symbolic computation..............................530
Xiao-Yong Wen
Research on knowledge management for collaborative design
of aviation enterprises.....................................................................538
Yong-Hua Wu and Bin Liu
Author Index 545
ComputerScience,TechnologyandApplicationDownloadedfromwww.worldscientific.com
byZHEJIANGUNIVERSITYon01/04/17.Forpersonaluseonly.