By Topic

2016 2nd IEEE International Conference on Computer and Communications (ICCC)

14-17 Oct. 2016

Filter Results

Displaying Results 1 - 25 of 608
  • [Front and back cover]

    Publication Year: 2016, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (247 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2016, Page(s):1 - 20
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):iii - xliv
    Request permission for commercial reuse | PDF file iconPDF (344 KB)
    Freely Available from IEEE
  • Reconstruction of big sensor data

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (705 KB)

    With ubiquitous sensors continuously monitoring and collecting large amounts of information, there is no doubt that this is an era of big data. One of the important source for scientific big data is the datasets collected by Internet of things (IoT). For an IoT application to analyze big sensor data, it is necessary that the data are clean and lossless. However, data loss in IoT is common due to u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big data survey in healthcare and a proposal for intelligent data diagnosis framework

    Publication Year: 2016, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (650 KB) | HTML iconHTML

    Healthcare is one of the core areas in medical domain. In healthcare the data exist in various forms like respiration data, blood pressure readings, prescriptions and others. The data may help in decision-making for different initiatives in order to provide better healthcare services. However, in order to make this possible there is a need to diagnose the data in a professional way. Currently, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic cluster number selection by finding density peaks

    Publication Year: 2016, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1199 KB) | HTML iconHTML

    Clustering is one of the most fundamental techniques in data mining. Although various algorithms have been proposed to solve clustering problem, the main difficulty left is the determination of optimal number for clusters. There are many algorithms trying to automatically select reasonable cluster number, such as Silhouette, Gap-test, Akiake Information Criterion, and Bayes Information Criterion. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blockchain-based trusted computing in social network

    Publication Year: 2016, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    MIT Media Lab employed blockchain to describe a decentralized personal data management system (i.e. Decentralizing Privacy) that ensures users own and control their data without authentication from a third party. In this paper, we employ a better encryption algorithm from NTT Service Evolution Laboratory to enforce the “Decentralizing Privacy”. Instead of using Proof-of-Work (PoW) fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Review of wireless big data in 5G: From physical layer to application layer

    Publication Year: 2016, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    The 5th generation wireless communication system has become popular in recent industry and academic studies. The 5G wireless communication system has advantages in spectrum efficiency, energy efficiency, transmission speed, latency, etc. However, current key techniques could not satisfy the gradually increased service on-demand requirements. In this work, we summarize the utilization of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outsourcing attribute-based encryption with multi-keywords and similarity ranking search

    Publication Year: 2016, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (549 KB) | HTML iconHTML

    With the increasing popularity of cloud computing, a huge amount of documents are stored on the cloud for reduced management cost and ease of access. Although data encryption offers help in some ways, it leaves other privacy concerns behind when users want to share documents with others. Otherwise, the users often share documents in the ABE settings in order to support broadcasting, error-tolerace... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matching preprocessing methods for improving the prediction of student's graduation

    Publication Year: 2016, Page(s):33 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    the aim of this paper is to improve the effectiveness and efficiency of rule-based learning for predicting student's graduation to help in enhancing the quality of education system by matching two preprocessing methods, which are SMOTE and Releif algorithms. This paper used the real-world dataset, which contains 544 students data, obtained from the registration information system at King Mongkut's... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design a novel electronic medical record system for regional clinics and health centers in China

    Publication Year: 2016, Page(s):38 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    In this study a novel electronic health information system that integrates the functions of medical recording, reporting and data utilization is presented. The goal of this application is to provide synchronized operation and auto-generated reports to improve the efficiency and accuracy for physicians working at regional clinics and health centers in China, where paper record is the dominant way f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A short term co-movement detection of financial data

    Publication Year: 2016, Page(s):42 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    This paper aims to apply statistical and the tree-based data mining techniques to build a model for predicting the movement of Thailand stock price index (SET). Predictors are stock price indexes of Hong Kong Hang Seng (HSI) and Nikkei 225. We also incorporate the index difference from the previous day closing price of HSI and Nikkei as additional predictors. The positive or negative movement of S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote sensing based modeling of dengue outbreak with regression and binning classification

    Publication Year: 2016, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    We present in this paper the application of data mining techniques using remote sensing data to help modeling the prominent characteristics of dengue and severe dengue outbreak in the northeast of Thailand. Dengue is a lethal mosquito-borne viral disease that has long been a serious public health problem in many tropical and some sub-tropical countries. We investigate the rainfall and other remote... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing numerical simulations and evolutionary dynamics of a population model in a polluted environment

    Publication Year: 2016, Page(s):50 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1089 KB) | HTML iconHTML

    This paper investigates the effects of toxicant on evolving trait of species in a polluted environment. By using the method of population dynamics and adaptive analysis, conditions for continuously stable strategy and evolutionary branching of the monomorphic or dimorphic model are obtained. In addition, some computing numerical simulations are introduced to illustrate the theoretical results. It ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PASCMP: A novel cache framework for data mining application

    Publication Year: 2016, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (625 KB) | HTML iconHTML

    In Chip Multiprocessors (CMP) architecture, traditional shared last level cache (LLC) is widely used. Shared LLC has a large aggregate cache capacity, so it able to minimizes off-chip memory requests. However, with the number of cores increasing, the global wire delay affects cache performance greatly. Data mining is the main method of processing data and knowledge discovery. By analyzing the char... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework and management of competitive intelligence system for tourist hotels in the era of big data

    Publication Year: 2016, Page(s):60 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    In the era of big data, tourist hotels should be equipped with the consciousness of competitive intelligence (CI), and grasp the key points of CI, then set up an efficient but simple framework of CI collecting, analyzing and using. On the base of four-staged process for enterprise CI and the characteristics of hospitality industry, a framework of CI in hotels is proposed in this paper. This hotel ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Review of hadoop performance optimization

    Publication Year: 2016, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Hadoop has become a key component of big data, and gained more and more support. Since users have recognized the enormous potential of Hadoop, some of them are working to develop and optimize the existing technologies to supplement Hadoop when using it. This paper gives the basic framework of Hadoop system and describes the optimization work on the parallel computing framework MapReduce, the perfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The application scheme of dynamic data protection in SaaS based on DIFC

    Publication Year: 2016, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (563 KB) | HTML iconHTML

    Data security concerns are one of obstacles to adopt cloud computing on a large scale. Especially users cannot control the behavior of SaaS applications how to use their data in SaaS cloud. It is hard to verify whether the security protocols have been performed or not. In addition, the service model of single instance multi-tenant causes the threat of data leakage between tenants who share the sam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint nearest neighbor data association based on interacting multiple model Kalman filtering

    Publication Year: 2016, Page(s):75 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    As one of the key issue in multiple target tracking, track association is very important and difficult, especially in a heavily multi-corssed environment. In the long-range multitarget tracking engineering practice, relative to the clutter problem, data association for target crossing is the key problem. There are several data association algorithm, such as NNDA and JPDA, but the accuracy of NNDA ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HDFS enabled storage and management of remote sensing data

    Publication Year: 2016, Page(s):80 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    The continuously growing volume of massive remote sensing data raised huge challenges on storage space and querying efficiency. In this paper, a new management model of remote sensing data has been proposed to address these issues of system architecture, data storage strategies, and functionalities based on Hadoop Distributed File System (HDFS). The model is capable of relieving the overloading pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compression algorithm of scattered point cloud based on octree coding

    Publication Year: 2016, Page(s):85 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (857 KB) | HTML iconHTML

    An octree-based point cloud compression algorithm is proposed from 3D point cloud data that are without any foreknowledge of information. The algorithm improves the stop condition of segmentation to stop dividing at the right depth and to ensure appropriate voxel size; and in the data structure, each node is assigned a bitmask; by manipulating bitmask, query and remove data when traversing; later ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering irregular periodic patterns in audit data

    Publication Year: 2016, Page(s):90 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Apart from providing rich data security information, database audit trails are the good sources of information on the workload characteristics of database system. This is why the periodic patterns of database operations found in the audit trails can be used for both performance tuning and intrusion detection. This work defines a new concept of an irregular periodic pattern and it shows how such pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of key server data store based on private cloud localization

    Publication Year: 2016, Page(s):95 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1049 KB) | HTML iconHTML

    In the era of big data, the requirement for information security and system reliability has become more and more strict. There are some disadvantages in the application of the existing universal data backup and synchronization scheme to the data storage of the key server (The security problems in data transmission and the synchronization problem in the case of the primary is not connected to the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.