By Topic

2015 IEEE International Conference on Computer and Communications (ICCC)

10-11 Oct. 2015

Filter Results

Displaying Results 1 - 25 of 99
  • [Front cover]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (72 KB) | HTML iconHTML
    Freely Available from IEEE
  • Preface

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (50 KB) | HTML iconHTML
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):1 - 7
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Light sources tracking based on illumination singular transformation

    Publication Year: 2015, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    In this paper an algorithm based on light radiation model and combined with the singularities of gradient descent and strengthening method to track the light sources is presented, which gives the accurate model for tracking light sources or secondary light sources. The entire model does not need any limitations for the light sources, which greatly enhanced the applicability of this model. The trac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using association statistics to rank risk of Android application

    Publication Year: 2015, Page(s):6 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    With the development of Android system and intelligent mobile technology, Android applications have been widely used in recent years. However, the trust on these applications may be used by attackers who design malware to achieve illegal income. Therefore, to evaluate the security risk of applications is necessary. In this paper, an evaluation approach based on association statistics of applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust opportunistic routing for high complex decentralized controlled distribution center

    Publication Year: 2015, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (654 KB) | HTML iconHTML

    High complex decentralized controlled distribution centers are depending on the throughput to increase the service level to fulfill the customer needs in transportation in the supply chain. Decentralized control gives the ability in increased scalability in system structure to react on changes in the market with changes in the conveyor system, to handle new goods or increase the overall throughput... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A highly automated binary software vulnerability risk evaluation method for off-by-one stack based buffer overflow

    Publication Year: 2015, Page(s):16 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    Software off-by-one stack based buffer overflow vulnerability may enable attacker to execute arbitrary code via a malformed input, causing persistent threat to computer and communication systems. However, current risk evaluation method is time-consuming and requires a group of people with security knowledge. This paper takes an insight investigation and presents a novel black-box off-by-one stack-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electroencephalogram based brain concentration and its human computer interface application

    Publication Year: 2015, Page(s):21 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    Electroencephalogram (EEG) signal has been studied as a biological signal input for human-computer interaction. This research defines a control signal - focus value R to measure the concentration degree of human brain. According to frequency band, human brain waves have been classified to, such as alpha wave, beta wave, theta wave, delta wave. The focus value R is the ratio of beta wave's and thet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A recommendation algorithm for two-sided matching problems based on F-Score

    Publication Year: 2015, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB) | HTML iconHTML

    According to the historical matched data and the agent's risk preference, the proposed algorithm calculates the agent's standardized F-Score to each agent on the opposite side. The agent on the opposite side which has the biggest standardized F-Score is recommended to the original agent. A typical application background of the algorithm is the parallel enrolment mechanism of college education in C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel graphical UI design for futures trading

    Publication Year: 2015, Page(s):30 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (869 KB) | HTML iconHTML

    This paper presents a novel graphical user interface for futures trading. It combines real time market chart and order submission and manipulation into one chart frame, providing an extra edge on trading compared to traditional grid-based trading interface. A general graphical user interface class is designed and implemented using C++ and Qwt plot and can be used for trading any futures products o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive on-line optimizing the Gaussian kernel for classification based on the kernel target alignment

    Publication Year: 2015, Page(s):35 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Kernel target alignment is a very efficient evaluation criterion. It has been widely applied in kernel optimization. However the traditional kernel methods that based on the Kernel target alignment optimize the kernel function mainly with batch gradient descent algorithm. This kind of methods has to scan through the entire training set at each step, which is much too costly. The On-line learning a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of clustering algorithm on TV programmes preference grouping of subscribers

    Publication Year: 2015, Page(s):40 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (601 KB) | HTML iconHTML

    With the development of digital cable interactive business and the diversification of the customers' demand, grouping TV programmes based on preferences of users effectively is vital for market segmentation and differentiation. The study summarizes the main principle and characteristic of clustering algorithm, and uses K-Means algorithm to show TV programmes preference grouping based on 52392 subs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research of OpenFlow management and control interface protocols based on SDN technology

    Publication Year: 2015, Page(s):45 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    With the introductions of the development and further applications of SDN network, this paper describes a new architecture based on the OpenFlow protocol which is consist of four virtual levels: the application layer, the virtual platform, the control layer and the physical layer. And by studying the features of SDN and the OpenFlow protocol, it makes a theoretical foundation and an effective solu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SADP: Security assurance development process for building reliable Linux-based operating system

    Publication Year: 2015, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    With the increased attention on cyber security, more and more people focus on the security and reliability of the software they utilize. Therefore, software vendors, especially operating system suppliers, make great efforts to build more secure and reliable software. The aim of this paper is finding a re-development way building secure and reliable operating system (OS) based on open source softwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expert system for diagnosis of Discus fish disease using fuzzy logic approach

    Publication Year: 2015, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    Discus fish is a favourite fish because of its beauty and unique characteristic, ranging from a variety of style, colour and shape. This fish has become one of the profitable business opportunities for fish farmers, mainly for export to overseas because the price is quite expensive. However, Discus fish is difficult to maintain since it is susceptible to various diseases. An expert system applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research for storage scheme based on Hadoop

    Publication Year: 2015, Page(s):62 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    With the rise of big data, people begin to focus on storage of it. In this paper, first, we design four different storage solutions on Hadoop platform with HBase, MySQL, XML and plain text for specific data storage. Data is stored in Hadoop Distributed File System except for MySQL storage solution, in which data is stored directly in the Linux File System. Second, for each solution, we write speci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BP neural network PID controller of pocket dropout

    Publication Year: 2015, Page(s):67 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    The loss of data packets affects seriously the stability of control system in modern network. This article mainly for the problem of packet loss uses a randomly distributed variable satisfying Bernoulli to describe the data loss during transmission, and then establishes a random and non-linear input model. A PID controller based on BP neural network is designed. The controller combines BP neural n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Replica placement strategy based on VCG mechanism

    Publication Year: 2015, Page(s):72 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB) | HTML iconHTML

    With the rapid development of the cloud computing and big data, many data center network are growing more large scale, and the number of servers is increasing at an exponential rate. In this paper, VCG (Vickrey-Clarke-Groves) mechanism was introduced into replica placement. Mapping from replica placement model to VCG mechanism was established and suitable payment function was designed. Data storag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the performance of online classifier by removing the error samples from offline training data

    Publication Year: 2015, Page(s):77 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    Brain-computer interface (BCI) plays an important role in helping the people with severe motor disability. In event-related potential (ERP) based BCIs, subjects were asked to count the target stimulus in the offline experiment, the recorded electroencephalogram (EEG) data was used to train the classification mode. However, subjects may make mistakes in counting the target stimulus or be affected b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query by humming based on the hierarchical matching algorithm

    Publication Year: 2015, Page(s):82 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    Along with the continuous development of science and technology, the multimedia retrieval is not only confined to the text retrieval. Content-based music retrieval technology has been widely used in modern society. The query by humming method based on the matching of user's humming fragments and music segments is a research hotspot in recent years. The establishment and the matching based on a lar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kepler GPU vs. Xeon Phi: Performance case study with a high-order CFD application

    Publication Year: 2015, Page(s):87 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1362 KB) | HTML iconHTML

    This paper focuses on the performance aspects of two types of many-core architectures, Tesla K20c GPU and Xeon Phi 31SP coprocessor, in solving complicated flow structures with a high-order weighted essentially non-oscillatory (WENO) scheme. Some performance optimization techniques are also detailed discussed. The results show that the K20c GPU can run several times faster than Xeon Phi 31SP due t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The locations of moving object data privacy protection technology research and application

    Publication Year: 2015, Page(s):95 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    With the rapid development of information technology and the Internet, resulting in a large number of moving object location data, the application of moving object location service is also expanding, such as GPS positioning, the car navigation, position sensor, search and rescue system. More and more location data is being collected, published and used, which may contain the moving object privacy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revocable attribute-based ring signature scheme with constant size signature

    Publication Year: 2015, Page(s):100 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (538 KB) | HTML iconHTML

    Ring signature is used to sign messages on behalf of a ring of possible signers. Meanwhile, attribute-based signature, in which each user is defined by a set of attributes, can also be used to realize anonymous authentication. Applying the attribute-based technology to ring signature, we propose a revocable attribute-based ring signature scheme with constant size signature. In our scheme, the data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.