2015 International Conference on Computer Science and Mechanical Automation (CSMA)

23-25 Oct. 2015

Filter Results

Displaying Results 1 - 25 of 80
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Welcome Message from the General Chair

    Publication Year: 2015, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (71 KB) | HTML iconHTML
    Freely Available from IEEE
  • CSMA 2015 Organizing Committee

    Publication Year: 2015, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Keynote Speakers

    Publication Year: 2015, Page(s):xiv - xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (126 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Evolutionary Game Theoretic Approach for Efficient Virtual Machine Deployment in Green Cloud

    Publication Year: 2015, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    In cloud computing, an energy efficient resource allocation problem becomes more and more challenging. Multiple cloud servers can cooperate to establish a virtual machine pool to support internal users and to offer services to public cloud users. Game theory is used to solve the problem of resource allocation. In this paper, we study the cooperative behavior of multiple cloud servers and present t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Security Analysis of MySQL's Encryption Functions

    Publication Year: 2015, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB) | HTML iconHTML

    The popular database MySQL provides many cryptographic encryption functions to protect the privacy of its data storage. In this paper, we investigate the inner principle and security of encryption functions in three main categories and indicate that most of them are not secure as MySQL has claimed in the official manual document. By exploiting the vulnerability of these functions, we present some ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Small Sample Fault Data Prediction Study Based on Weibull Model

    Publication Year: 2015, Page(s):9 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Using software testing data collected, this paper established a software safety defects S curve model based on Weibull model theory. χ2 testing and prediction error testing are employed to verify the matching ability of the Weibull model and applicability of the predicting result. How to select truncation error is also discussed here. Results show that better predictive effect can be achiev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic Constructions for Signcryption with Non-interactive Non-repudiation

    Publication Year: 2015, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    Non-interactive non-repudiation is a very important property of signcryption which enables a receiver to settle a repudiation dispute with the help of a judge without the need to engage in costly multi-round interactive communications with the judge. In this paper, we construct the generic "Sign-then-Encrypt" and "Encrypt-then-Sign" compositions for signcryption with non-interactive non-repudiatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding the Dynamic Relationships among Interpersonal Personality Characteristics, Loneliness, and Smart-Phone Use: Evidence from Experience Sampling

    Publication Year: 2015, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    Smart-phone is a major channel of interpersonal communication. As the rapid development of communication technology, its function is becoming ever more powerful. Meanwhile, people are far more dependent on it. This study aims at investigating how long undergraduate students spend on their smart-phones everyday and the relationship between the time of smart-phone use and loneliness, as while as exa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Overview of Study of Passowrd Cracking

    Publication Year: 2015, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    This paper studies the current status and advance of study of password cracking. First, we give a classification for password cracking from different dimensions. We studies brute-force cracking, dictionary cracking and rainbow table cracking. We found some new techniques such as brute-force cracking based on probability method, Markov models and data mining. High performance computing in password ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rolling Thickness Prediction Based on the Extreme Learning Machine and Clustering

    Publication Year: 2015, Page(s):30 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    The accuracy of thickness is an important standard to measure the strip quality. Therefore, it is crucial to accurately obtain a high precision thickness. The ELM (extreme learning machine) based on clustering forecast method is presented for hot rolled strip thickness prediction. Firstly, strong correlation properties of thickness are obtained by data pretreatment, in order to ensure the effectiv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A MPI-Friendly Efficient Static Binary Translator Based on QEMU

    Publication Year: 2015, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    While high performance computing (HPC) is flourishing these years, the lack of HPC applications is increasingly serious. Conventional binary translation focused on desktop applications and embedded software, which could not be scaled up to HPC. This paper proposed a novel static binary translator MPI-QEMU aiming at MPI programs, the most commonly used on HPC platforms. Firstly, the efficient dynam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Coalgebraic Semantics of Behavioral Adaptation in Component-Based Software Systems

    Publication Year: 2015, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB) | HTML iconHTML

    In this paper, we present a co algebraic model for behavioral adaptation in component-based systems. Bisimulation equivalence and refinement relationship are used to ensure that a component can replace another one. When the behavior of two components can not be matched perfectly, behavioral adaptation might be needed to allow substitution of components. In this case, bisimulation is not enough to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Passive Attack against an Asymmetric Key Exchange Protocol

    Publication Year: 2015, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    Constructing key exchange protocols which can resist the quantum-attack is a hot topic. In China Crypt2014, S. Mao et al claimed a new quantum-resistant key exchange protocol and also recommended a set of practical parameter. In this paper, we present a passive attack against this key exchange protocol. Specifically, an eavesdropper can recover the exchange key in polynomial time provided with an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Expected Cross Entropy Method for Text Feature Selection

    Publication Year: 2015, Page(s):49 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    Feature selection plays an important role in text categorization, and contributes directly to the accuracy of the categorization. In the process of feature selection, due to the lack of consideration of the traditional expected cross entropy algorithm for document frequency, we first improve the expected cross entropy formula of the traditional, and then propose an improved text feature selection ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Document Copy Detection Using the Improved Fuzzy Hashing

    Publication Year: 2015, Page(s):55 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    Document copy detection is an effective method that can protect intellectual property rights as well as improve the efficiency of information retrieval. To our knowledge, it is a common method that using the fingerprints of one document in the process of detecting. Therefore, selecting the appropriate document fingerprints plays a key role. This paper firstly describes several mature methods of se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Computing Products Selection Based on Shapley Value Weighted Correlation Coefficient of HFSs

    Publication Year: 2015, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    In this paper, an approach to decision making under hesitant fuzzy environment is developed with incomplete weight information and inter-correlations between attributes. Firstly, when the elements in an attribute set are correlative, Shapley value weighted correlation coefficient of hesitant fuzzy sets are defined that the length of hesitant fuzzy elements and the arrangement of their possible val... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved K-means Algorithm for Document Clustering

    Publication Year: 2015, Page(s):65 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    K-Means algorithm has a major shortcoming of high dimensional and sparse data. So the traditional measurement of the distance can't deal with the data effectively. Motivated by this, this paper proposed a K-Means algorithm based on Sim Hash. After preprocessing of the text, Sim Hash is used to calculate the feature vectors extracted, and then the fingerprint of each text is obtained. Sim Hash not ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Parallel Data Stream Clustering Algorithm Based on Grid and Density

    Publication Year: 2015, Page(s):70 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    With the emergence of big data and cloud computing, data stream arrives rapidly, large-scale and continuously, real-time data stream clustering analysis has become a hot topic in the study on the current data stream mining. Some existing data stream clustering algorithms cannot effectively deal with the high-dimensional data stream and are incompetent to find clusters of arbitrary shape in real-ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud-Computing-Based Resource Allocation Research on the Perspective of Improved Ant Colony Algorithm

    Publication Year: 2015, Page(s):76 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    As a creative intelligent optimization algorithm, ant colony algorithm (ACO) has advantages such as good robustness, positive feedback and distributed computation. It is powerful to solve complicated combinational optimization problems. However, there are many defections existing in a single ACO such as slow solving speed at the primary stage, poor convergence accuracy and easy falling into a loca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UAV Path Planning Based on Chaos Ant Colony Algorithm

    Publication Year: 2015, Page(s):81 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    Aiming at the problems that the low convergent rate and easily failing into local extremum of the ant colony algorithm (ACA) in the process of path planning, a new method based on the chaos ant colony algorithm (CACA) is proposed. By adding the chaos disturbance factor into standard ACA, the ACA defects of fall into local optimum is effectively overcome and the searching efficiency is improved. By... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GCORE: A Gravitation-Based Approach for Chinese Open Relation

    Publication Year: 2015, Page(s):86 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    Traditional Relation Extraction (RE) trains individual extractors for pre-defined relations. Open Relation Extraction (ORE) can eschew domain-specific training data, tackle an unbounded number of relations, and scale up to massive and heterogeneous corpus such as the web. However, It is difficult to process micro log texts: the genre is noisy, utterances are very short, and texts have little conte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.