Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

2015 2nd International Conference on Information Science and Control Engineering

24-26 April 2015

Filter Results

Displaying Results 1 - 25 of 231
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (875 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - xx
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2015, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (104 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organizing Committee

    Publication Year: 2015, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s):xxiii - xxv
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Conference sponsors and co-sponsors

    Publication Year: 2015, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • A Framework of Breast Density Estimation System for Breast Magnetic Resonance Images

    Publication Year: 2015, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Breast density, which is defined as the proportion of fibro glandular tissues in a breast, is a potential indicator for breast cancer risk. This paper proposes an information system entitled BREASDEN (BREASt DENsity) to estimate breast density in breast magnetic resonance (MR) images. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Heterogeneity Based Heuristic Algorithm for Scheduling Out-Tree Task Graphs

    Publication Year: 2015, Page(s):4 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Efficient task scheduling is a challenging aspect of achieving high performance in parallel programming. Aiming at the problem that many heuristics for this NP-hard problem were always developed based on homogeneous systems and ignored the heterogeneity of processors which are not met on real parallel systems, this paper presents a heuristic algorithm based on list and task duplication for schedul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Low Cost Anti-aliasing Scheme for Mobile Devices

    Publication Year: 2015, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1679 KB) | HTML iconHTML

    An improved anti-aliasing sampling algorithm is submitted to reduce the increasing memory consumption caused by super-sampling in mobile devices. Six-point anisotropy sampling blends the two samples of a pixel, as well as the nearby pixels. Experiment results showed that six-point anisotropy sampling has reduced the memory consumption by 50% than traditional FLIPQUAD anti-aliasing super-sampling a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for the Trajectory Privacy Protection Based on the Segmented Fake Trajectory under Road Networks

    Publication Year: 2015, Page(s):13 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    In recent years, LBS (Location-Based Service)have been widely used. According tithe historical location of user, location service providers may analyze the user's interests, health and other personal privacy. The traditional k-anonymous protection method for trajectory mainly depends on the European space but not consider the road networks. In this paper, we proposed a method for trajectory privac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Modified Octagon-Based Search Algorithm for Fast Block Motion Estimation

    Publication Year: 2015, Page(s):18 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    Based on zero-block detection method in H.264/AVC, the directional characteristic of the SAD(Sum of Absolute Differences Distortion), the centre-biased characteristic of motion vectors, and by analyzing the characteristics of OCTBS(Octagon-based Search), MOCTBS (Modified Octagon-based Search) algorithm is proposed in this paper. Firstly, MOCTBS employs small octagon pattern to judge if the MBD (Mi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-level Dynamic Access Control Model and Its Formalization

    Publication Year: 2015, Page(s):23 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    It is a big challenge to establish a dynamic access control model to secure applications in open and dynamic environment. The dynamic feature of an access control system is sometimes related with that of applications of open environment. This paper analyzes first the reason that causes the dynamic change of access control systems and then proposes a five-level access control architecture which des... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Algorithm for Embedding Dynamic Virtual Network Request

    Publication Year: 2015, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    Most of the current researches in virtual network embedding field often assume that the VN requests are static. However, in practical cases, virtual network requests on substrate resources change dynamically over time. To support such dynamical feature, we model the VNE problem as a mixed linear programming problem and use multiple queues to store different types of virtual network requests respec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Image Encryption Algorithm Based on Lifting-Based Wavelet Transform

    Publication Year: 2015, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    In order to trade-off between computational effects and computational cost of present image encryption algorithm, a novel image encryption algorithm based on lifting-based wavelet transform is proposed in this paper. The image encryption process includes three steps: first the original image was divided into blocks, which were transformed by lifting based wavelet, secondly the wavelet domain coeff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Method for Verification of Composite Web Services

    Publication Year: 2015, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    This paper presents a novel method based on object-oriented MSVL for verification of composite Web services described by OWL-S. First, object-oriented MSVL, an executable temporal logic language for modelling, is briefly presented. Secondly, modelling rules are defined for OWL-S which is used to compose Web services. Further, Propositional Projection Temporal Logic (PPTL), a specification language... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Parallel Algorithm for Frequent Itemset Mining of Incremental Dataset

    Publication Year: 2015, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB) | HTML iconHTML

    Most Algorithms for frequent item set mining typically make the assumption that data is centralized or static. They may waste computational and I/O resources when the data is dynamic, and they impose excessive communication overhead when the data is distributed. As a result, the data mining process is harmed by slow response time. In this paper we propose a novel algorithm that uses overlapping da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Particle Swarm Optimization Algorithm with Intelligent Weighting Mechanism

    Publication Year: 2015, Page(s):45 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    This paper presents a novel particle swarm optimization algorithm with an intelligent weighting mechanism, which is termed as weighted particle swarm optimization (WPSO) for short. The intelligent weighting mechanism is developed based on an effectiveness index to improve performance on a diverse set of problems and enhance the ability of local search infeasible region. Three search techniques, a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Survivable Scheme for OFDM-PON Based on Ring Topology

    Publication Year: 2015, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    By using the advantages of symmetry, a novel architecture of orthogonal frequency division multiplexing passive optical network (OFDM-PON) is proposed. It can not only achieve flexible protections but also provide the function of adding users conveniently. By utilizing the characteristics of ring based optical access network, the network keeps strong survivability against the fibers' failures. Bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Parallel Algorithm to Construct BISTs on Parity Cubes

    Publication Year: 2015, Page(s):54 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Independent spanning trees(ISTs) have applications in interconnection networks such as reliable communication protocols, and secure message distribution, etc. In this paper, we use BIST to denote the IST isomorphic to binomial-like tree. We propose an algorithm to construct n BISTs and the algorithm can be parallelized on PQn to run in O(N) time, where N = 2n. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Private Cloud Instances Placement Algorithm Based on Maximal Flow Algorithm

    Publication Year: 2015, Page(s):59 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1113 KB) | HTML iconHTML

    With the continuous development of cloud computing, bigger and bigger data processing run in the cloud computing environment. In generally, large companies or organizations have the demand of big data processing. However, these companies or organizations do not want to expose their business processes and data to third parties (Amazon, Google, etc.). The private cloud could meet their needs. In pri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Provenance Storage Method Based on Parallel Database

    Publication Year: 2015, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    When faced with dirty data fused from different sources, modern data management generally trace origins using data provenance technical to repair it fundamentally. Unfortunately, the state-of-art data provenance approaches can only deal with small amount of data using annotation or inverse process. What's worse, these approaches just work under stand-alone mode, resulting in low efficiencies. In t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Recommendation System Combining LDA and Collaborative Filtering Method for Scenic Spot

    Publication Year: 2015, Page(s):67 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Researchers have long sought to find an effective and straightforward method to bridge the gap between us and big data. Especially during the big data era, how to find the needed information with rapid speed and exact result has become the central concerns of the internet users. This paper focuses on exploring the valuable data in UGC (User Generated Content), and recommending useful information t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.