By Topic

2016 3rd International Conference on Information Science and Control Engineering (ICISCE)

8-10 July 2016

Filter Results

Displaying Results 1 - 25 of 314
  • [Front cover]

    Publication Year: 2016, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1654 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - xxvi
    Request permission for commercial reuse | PDF file iconPDF (189 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2016, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2016, Page(s): xxviii
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2016, Page(s): xxix
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2016, Page(s):xxx - xxxii
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2016, Page(s):xxxiii - xxxv
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Acknowlegdments

    Publication Year: 2016, Page(s): xxxvi
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • A CAD/CAM System for Complicated Jacquard Circular Knitting Machine

    Publication Year: 2016, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    To meet the requirement of knitted fabric design and production using complicated jacquard circular knitting machine, an improved CAD/CAM system has been designed in this paper. The system has two subsystem, one named "pattern design subsystem" is for needle selectors control, and the other one named "action chain subsystem" is for +additional actuators control. In the pattern design subsystem, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cloud Computing Resource Allocation Model Based on Combinatorial Double Auction

    Publication Year: 2016, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    As the rate of information growth intensifies, so has the study of cloud resource management because cloud computing can generate powerful online resource convergence. This paper presents a new cloud computing resource allocation model based on combinatorial double auction mechanism (CDA-CCRA) for more effective resource utilization. The CDA-CCRA model can simultaneously satisfy the requirements o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cluster-Based Passive Direction Finding Cross Location Method

    Publication Year: 2016, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    Direction finding cross location is a widely used passive location method, featuring omni-direction and fast speed. However, with the increase in station number, false location points are seen to be rapidly increased among the direction finding lines. In order to accurately and rapidly locate radiation sources, how to rapidly eliminate false points is an important issue urgent to be solved. This p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Collaborative Filtering Method for Trustworthy Cloud Service Selection

    Publication Year: 2016, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    This paper investigates the problem of trustworthy cloud service selection based on collaborative filtering in open network environment. First, it searches a set of Cloud services with same or similar functions according to the user's requirement, then computes the collection of users that have similar preferences for the target user based on their common evaluations, and obtains the recommendable... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Component Business Model-Based Approach for Business Architecture Integration of C4ISR System

    Publication Year: 2016, Page(s):17 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Synthesis integration of C4ISR system is being well studied in the field of military operational research. As current methodologies for integrating C4ISR system mostly focus on application integration and physical integration, while researches on business architecture integration mostly ignore important features of C4ISR system, e.g., Command and Control (C2) organizations and operational resource... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Delay Sending Mechanism for a CR User's Handoff over CR Networks

    Publication Year: 2016, Page(s):22 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    It is well-known that the spurious fast retransmission and timeout widely exist in the course of vertical handover when a mobile node (MN) moves from a longer transmission delay network into a shorter one. Some solutions for the problems have been discussed in a lot of literatures for non-Cognitive Radio (non-CR) scenarios. One of them, bicasting is the main method to improve the transmission perf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework of e-Learning Education Clouds to Efficiency and Personalization

    Publication Year: 2016, Page(s):26 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    E-Learning is widely accepted to be the next generation of learning approach with extended features, while technology and theory step forward. However, the current model of e-Learning system lacks the scalable and sustainable infrastructure to support extended features. In this paper, we discuss the technical challenges faced in e-Learning and some common problems concerned by content providers. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework of Multi-index Modeling for Similarity-Based Remaining Useful Life Estimation

    Publication Year: 2016, Page(s):31 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    As an emerging technique, the similarity-based residual life prediction (SbRLP) method is a significant method for residual useful life (RUL) prediction. However, related researches on the SbRLP method with multiple degradation variables are rare. Hence, a framework of the SbRLP method with multiple degradation indicators is advanced. Within the framework, two solutions (e.g. solution A and B) are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fused Multi-feature Based Co-training Approach for Document Clustering

    Publication Year: 2016, Page(s):38 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    Document clustering is a popular topic in data mining and information retrieval. Most models and methods for this problem are based on computing the similarity between pair documents modeled in a space of all terms, or a new feature space obtained by applying a topic modeling technique for a given corpus. In this paper, we regard these two ideas as clustering on term feature and on semantic featur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Kind of Efficient Data Archiving Method for Historical Sensor Data

    Publication Year: 2016, Page(s):44 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (161 KB) | HTML iconHTML

    Nowadays there are more than 10 billion sensors in the Internet of Things. These sensors will produce a mass of historical data as time goes on. And these data are useful in data mining and may create great value for human. However, historical sensor data are hard to archive because they have the characteristics of mass, complexity, isomerism and dynamic nature. Therefore, how to archive historica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Manycore Processor Based Multilayer Perceptron Feedforward Acceleration Framework for Embedded System

    Publication Year: 2016, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    Because of the complex architecture and multiple iterations algorithm, neural network is sometimes hard for traditional embedded devices to meet the needs of real-time processing speed in large scale data applications. Manycore processors are directly applicable for parallel implementation of the neural network. In this paper we present a multilayer perception feed forward acceleration framework b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Color Calibration Based on Simulated Annealing Optimization

    Publication Year: 2016, Page(s):54 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB) | HTML iconHTML

    To accurately reproduce colors, it is necessary to calibrate a digital camera that is used to acquire images. The traditional calibration methods have been used to build a color correction model that has a transformation matrix mapping data from a RGB image to standard XYZ tristimulus. Determination of this matrix is performed through matrix transformation from each color checker patch to its corr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Cracking the Password of WPA2-PSK Based on SA and HMM

    Publication Year: 2016, Page(s):59 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (490 KB) | HTML iconHTML

    Password recovery of WPA2-PSK is an important problem in digital forensics. Since the encryption mechanism of WPA-PSK is gradually enhanced, it is difficult to deal with this problem by the traditional methods such as brute force, rainbow table, Markov model, and so on. In this paper, we give a new method based on simulated annealing (SA) and hidden markov model (HMM). The main principle of this m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of Predicting Crude Oil Output Based on RS-C4.5 Algorithm

    Publication Year: 2016, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    An accurate prediction of crude oil output is crucial to oilfield enterprise in reasonable production arrangement and the production management improvement. This paper proposes a RS-C4.5 data mining method based on the rough set theory and decision tree C4.5 algorithm to predict the crude oil output. Firstly, relevant data of crude oil production is pre-processed by K-Means algorithm to obtain a d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.