Accession number:20152700992722 Title:Frequency synthesizer with filter to signal detection for health care wireless network applications Authors:Lai, Wen-Cheng (1); Huang, Jhin-Fang (1) Author affiliation:(1) Department of Electronic Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:11-14 Article number:7105561 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:A 2.4 GHz integer-N frequency synthesizer is purposed in tsmc 0.18-μm CMOS process. The purposed design can be used for the IEEE 802.15.4a unlicensed ultra-wideband healthcare applications such as body sensor network to wireless connect with computer network. Electrocardiogram (ECG) is the important physiological parameters in human body. Through monitoring and analyzing ECG, the current-switching differential Colpitts VCO by charge pump linearization technique can know the health condition of human body and achieve the purpose of prevention and diagnosis for diseases accordingly. In this paper, a solution of this design with a discrete-time sample-hold-reset loop filter build in human body for monitoring ECG signal detection is purposed. © 2014 IEEE. Number of references:31 Main heading:Signal detection Controlled terms:Biomedical signal processing - Body sensor networks - Circuit oscillations - CMOS integrated circuits - Diagnosis - Electrocardiography - Frequency synthesizers - Health care - Medical computing - Oscillistors - Phase locked loops - Physiological models - Signal processing - Ultra-wideband (UWB) - Variable frequency oscillators - Wireless sensor networks Uncontrolled terms:Current switching - ECG signals - Health care application - Health care network - Linearization technique - Loop filter - Network applications - Physiological parameters Classification code:461 Bioengineering and Biology - 703.1.1 Electric Network Analysis - 713.2 Oscillators - 713.5 Electronic Circuits Other Than Amplifiers, Oscillators, Modulators, Limiters, Discriminators or Mixers - 714.2 Semiconductor Devices and Integrated Circuits - 716.1 Information Theory and Signal Processing - 716.3 Radio Systems and Equipment - 722.3 Data Communication, Equipment and Techniques DOI:10.1109/ICITEC.2014.7105561 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993048 Title:Research on improved the Tarantula spectrum fault localization algorithm Authors:Liang, Xu (1); Mao, Liqiang (1); Huang, Ming (1) Author affiliation:(1) Software Technology Institute, Dalian Jiaotong University, Dalian, Liaoning, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:60-63 Article number:7105572 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:The paper presents a measure to improve the Tarantula spectral fault localization algorithm and solves the problems that the weight of the statements with a high-frequency coverage is significantly lower than the statements with a low-frequency coverage when Tarantula algorithm calculate the statement suspicious degrees. The improved algorithm has better discrimination when calculating the statement suspicious degrees. Comparing with the calculation results of different algorithms, it proves that the improved Tarantula algorithm is better than other algorithms through the experiment. © 2014 IEEE. Number of references:8 Main heading:Algorithms Controlled terms:Electric fault location - Software testing Uncontrolled terms:Calculation results - Fault localization - High frequency HF - Low-frequency - Suspicious degree Classification code:706.2 Electric Power Lines and Equipment - 723 Computer Software, Data Handling and Applications - 723.5 Computer Applications - 921 Mathematics DOI:10.1109/ICITEC.2014.7105572 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993041 Title:Research on end-user programming tool for pen-based e-form software Authors:Wang, Xiaochun (1); Zhu, Lin (2) Author affiliation:(1) Department of Educational Technology, Capital Normal University, Beijing, China; (2) Institute of Cultural Development, School of International Communication, Beijing International Studies University, Beijing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:301-305 Article number:7105623 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Pen-based e-form is the e-form software based on pen-based user interface. Because of the complexity of existing development tool and difficulty of implementing pen-based user interface, pen-based e-form only can be designed and implemented by the professional developers, which make it difficult to adapt to the changing user requirements. It is a good method to solve the above problem to develop a software programming tool which supports end users to design their own software. Therefore, the paper systemically searches the end-user programming tool for pen-based e-form software, and details its software structure and component. In the end, we develop the prototype system and analyze its end-user programming support degree. © 2014 IEEE. Number of references:11 Main heading:User interfaces Controlled terms:Computer programming Uncontrolled terms:Development tools - E-forms - End user programming - Interactive design - Pen based user interfaces - Programming tools - Software programming - Software structures Classification code:722.2 Computer Peripheral Equipment - 723.1 Computer Programming DOI:10.1109/ICITEC.2014.7105623 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993020 Title:A modified marginalized Kalman filter for maneuvering target tracking Authors:Sun, Yiou (1); Xie, Jingwen (1); Guo, Junhai (1); Wang, Haifang (1); Zhao, Yang (1) Author affiliation:(1) Beijing Institute of Tracking and Telecommunication Technology, Beijing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:107-111 Article number:7105582 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:This paper uses a new nonlinear Kalman filter algorithm in maneuvering target tracking. Marginalized KalmanFilter (MKF) algorithm expresses the system's nonlinear measurement equation as weighted sum of Hermite polynomials, then models the prior distribution of the weighted matrix as a Gaussian process. After that, calculates the weighted matrix's posteriori distribution and removes the influence of the weighted matrix by calculating its integration. As a result, the closed-form of the system's state and its covariance are available. To improve the stability of the MKF algorithm, Strong Tracking Filter concept is brought in by using a fading factor in the MKF algorithm. It can decrease the influence of previous filtering step on the current step. The Strong Tracking Marginalized Kaiman Filter (STMKF) algorithm has a adaptability to the sudden maneuver of the target. Using STMKF with UKF, CKF, and standard MKF in high maneuvering target tracking problem, the result shows that the STMKF has a better stability and a higher accuracy. © 2014 IEEE. Number of references:10 Main heading:Target tracking Controlled terms:Algorithms - Clutter (information theory) - Kalman filters - Mathematical transformations - Nonlinear equations - Nonlinear systems - Polynomials - Tracking (position) Uncontrolled terms:Hermite polynomials - High maneuvering target tracking - Maneuvering target tracking - marginalized transformation - Nonlinear Kalman filter - Nonlinear measurement - Posteriori distribution - Strong tracking filter Classification code:716.1 Information Theory and Signal Processing - 716.2 Radar Systems and Equipment - 723 Computer Software, Data Handling and Applications - 921 Mathematics - 961 Systems Science DOI:10.1109/ICITEC.2014.7105582 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993052 Title:Compact optimization method of sample data and its application to axial fans on-line condition monitoring and fault diagnosis Authors:Dong, Lili (1); Yang, Deyong (1); Hu, Jianping (1); Yang, Qizhi (1); Hu, Yongguang (1) Author affiliation:(1) Key Laboratory of Modern Agricultural Equipment and Technology (Jiangsu University), Ministry of Education, Jiangsu University, Zhenjiang, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:132-136 Article number:7105587 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:A compact optimization method with neural network fault diagnosis samples is presented by combining with grey correlation analysis theory, so as to resolve on-line fault diagnosis issues on massive amounts of samples affecting the neural network diagnostic performances and its application in engineering. This method is utilized to enhance the network performances of neural network, and speed up the convergent velocity, so as to reduce the time and misjudgment of the condition monitoring in the neural network and fault diagnosis, while its application steps in fault diagnosis are designed to be applied for the sample compact optimization of coal mine ventilator fault diagnosis. The simulation result shows that this method in this paper can be effective. Compared with the rough set neural network method, it has the advantage of simplified computation that is convenient for engineering applications. © 2014 IEEE. Number of references:18 Main heading:Fault detection Controlled terms:Axial flow turbomachinery - Coal mines - Computation theory - Condition monitoring - Failure analysis - Fans - Neural networks - Social networking (online) Uncontrolled terms:Axial fans - Engineering applications - Grey correlation analysis - Grey relevancy analysis - Neural network fault diagnosis - Neural network method - On-line fault diagnosis - Online condition monitoring Classification code:421 Strength of Building Materials; Mechanical Properties - 422 Strength of Building Materials; Test Equipment and Methods - 503.1 Coal Mines - 603 Machine Tools - 617 Turbines and Steam Turbines - 618 Compressors and Pumps - 618.3 Blowers and Fans - 706 Electric Transmission and Distribution - 723 Computer Software, Data Handling and Applications - 723.4 Artificial Intelligence - 921 Mathematics DOI:10.1109/ICITEC.2014.7105587 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152801013016 Title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Language:English ISBN-13:9781479952984 Document type:Conference proceeding (CP) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:The proceedings contain 69 papers. The topics discussed include: a parallelized deep packet inspection design in software defined network; frequency synthesizer with filter to signal detection for health care and wireless network applications; research on the ipv6 and sensor network based terrestrial ecosystem flux research network; a novel epidemic routing based on mobility and occurrence probability in buffer-limited opportunistic networks; a new energy-efficient time synchronization algorithm; a new re-shaping method for reducing delay jitter on AFDX network; research of the retransmission policy based on compound parameters in SCTP-CMT; a novel travelling time estimation mechanism for minimizing unnecessary handovers from cellular networks to WLANs; and research on reactive power compensation for distribution network based on biogeography-based optimization algorithm. Abstract type:(Edited Abstract) Page count:333 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992729 Title:An unsupervised method for information retrieval on E-commerce websites Authors:Wang, Baoqiu (1); Zhong, Yukun (1) Author affiliation:(1) Department of Computer Science and Engineering, Sichuan University, Jinjiang College, Pengshan, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:98-102 Article number:7105580 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:In this paper, we present an unsupervised method to find the covert properties of the product on E-commerce web sites. Our method is generic because we do not have to depend on web site restricted pattern. The method works by 3 algorithms which are Page Type Recognition, List Page Clustering and Query Relationship Discovery. Experimental results show that it can acquire accurate rate of 96% and recall rate of 94%. © 2014 IEEE. Number of references:9 Main heading:Websites Controlled terms:Commerce - Electronic commerce - Information retrieval - Social networking (online) Uncontrolled terms:covert properties - E-commerce websites - Recall rate - Restricted pattern - Unsupervised method Classification code:723 Computer Software, Data Handling and Applications - 723.5 Computer Applications - 911.2 Industrial Economics DOI:10.1109/ICITEC.2014.7105580 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992717 Title:A new energy-efficient time synchronization algorithm Authors:Guo, Weidong (1); Qiu, Tie (1); Wang, Lei (1); Luo, Diansong (1); Liu, Jie (1) Author affiliation:(1) School of Software, Dalian University of Technology, Dalian, China Corresponding author:Qiu, Tie Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:34-37 Article number:7105566 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:In recent years, issues of Wireless Sensor Networks (WSNs) have been widely studied. The energy is limited in WSNs. However, it always takes much energy to achieve highly accurate time synchronization. In this paper, a Spanning Tree-based Energy-efficient Time Synchronization (STETS) strategy for WSNs is proposed. In STETS, only a small number of sensor nodes in the WSN have the privilege to send messages and each of these nodes sends only one broadcast in a single round of time synchronization. By taking advantage of the intersection and difference set of these broadcasts' domains, a spanning tree structure will be created in the WSN. By using the information carried by these broadcasts, time synchronization process will also be completed. We simulate and evaluate the performances of the algorithm on NS2. The experiment results show that our algorithm is efficient in both energy consumption and accuracy of time synchronization. © 2014 IEEE. Number of references:10 Main heading:Energy efficiency Controlled terms:Algorithms - Energy utilization - Sensor nodes - Synchronization - Trees (mathematics) - Wireless sensor networks Uncontrolled terms:Difference sets - Energy efficient - Highly accurate - New energies - Small number of sensors - Spanning tree - Time synchronization - Wireless sensor network (WSNs) Classification code:525.2 Energy Conservation - 525.3 Energy Utilization - 722 Computer Systems and Equipment - 723 Computer Software, Data Handling and Applications - 732 Control Devices - 921 Mathematics - 921.4 Combinatorial Mathematics, Includes Graph Theory, Set Theory - 961 Systems Science DOI:10.1109/ICITEC.2014.7105566 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993038 Title:Evaluation of intelligibility of noisy whisper enhanced by compressive sensing Authors:Wen, Junwu (1); Chu, Zhuanzhuan (2); Zhou, Jian (3) Author affiliation:(1) School of Electrical Engineering and Automation, Anhui University, Hefei, China; (2) School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China; (3) Key Laboratory of Intelligent Computing and Signal Processing, Ministry of Education, Anhui University, Hefei, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:216-219 Article number:7105605 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Noisy whisper contaminated by different types of noise are enhanced by compressive sensing method. The intelligibility performance of the enhanced whisper is measured using the short time objective index (STOI). To assess the effect of spectra density on compressive sensing, the real-valued discrete Gabor transform is used to transform the noisy whisper into the time-frequency domain. Experimental results show that, similar to conventional speech enhancement algorithm, the compressive sensing based speech enhancement method can not efficiently improve intelligibility of the whisper. © 2014 IEEE. Number of references:17 Main heading:Compressed sensing Controlled terms:Frequency domain analysis - Signal reconstruction - Speech enhancement - Speech intelligibility Uncontrolled terms:Compressive sensing - Real-valued discrete Gabor transforms - Speech enhancement algorithm - Speech enhancement methods - Time frequency domain Classification code:461.4 Ergonomics and Human Factors Engineering - 716.1 Information Theory and Signal Processing - 723.5 Computer Applications - 731.1 Control Systems DOI:10.1109/ICITEC.2014.7105605 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992715 Title:Local-SURF based 3D scene reconstruction for mobile robot Authors:Chen, Zhengrong (1); Zhang, Haofeng (1) Author affiliation:(1) School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China Corresponding author:Zhang, Haofeng Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:146-151 Article number:7105590 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Traditional SURF based 3D reconstruction methods need to extract features on the whole image. Although this technique can provide rich and accurate environment information, however, it is too time consuming and not practical. To solve that problem, a local SURF based 3D reconstruction algorithm for mobile robot is proposed, which includes three main steps: first, the posture variations were captured from posture sensor and milemeter, and then the initial transition matrix was established; second, when finishing extracting features of the previous frame, searching areas were computed from the initial transition matrix and search radius; last, final transition matrix was computed according to the matching points. Experiments showed that the proposed algorithm did improve the speed of scene reconstruction while preserving precision, and moreover, our approach also can correct the posture variation of robot according to the matching results. © 2014 IEEE. Number of references:11 Main heading:Robots Controlled terms:Image matching - Mobile robots Uncontrolled terms:3-D reconstruction algorithms - 3D reconstruction - 3D scene reconstruction - Environment information - Extracting features - local-SURF - Scene reconstruction - Transition matrices Classification code:731.5 Robotics - 741 Light, Optics and Optical Devices DOI:10.1109/ICITEC.2014.7105590 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992726 Title:An adaptive genetic algorithm based on the structure of the chain agent Authors:Bei, Yunyun (1); Shi, Lianshuan (1) Author affiliation:(1) School of Information Technology Engineering, Tianjin University of Technology and Education, Tianjin, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:68-71 Article number:7105574 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:In order to solve the function optimization problem, an adaptive genetic algorithm is proposed based on the structure of the chain agent. The algorithm adopts the structure of the chain agent to reduce the computational overhead. The mixing crossover strategy that includes the arithmetic crossover and two-point crossover is adopted in the crossover operator. In the crossover and mutation operator, the adaptive probabilities of crossover and mutation related to the generations are adopted. The simulations reveal that this algorithm has better convergence and the speed to get the optimal solution is very fast. © 2014 IEEE. Number of references:10 Main heading:Algorithms Controlled terms:Chains - Genetic algorithms - Optimization - Software agents Uncontrolled terms:Adaptive genetic algorithms - Adaptive probabilities - Arithmetic crossover - Computational overheads - Crossover and mutation - Crossover strategies - Function optimization problems - hybrid crossover Classification code:602.1 Mechanical Drives - 723 Computer Software, Data Handling and Applications - 723.5 Computer Applications - 921 Mathematics - 921.5 Optimization Techniques DOI:10.1109/ICITEC.2014.7105574 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993049 Title:A collaborative method between CAD and CAR software for robotic cells design Authors:Fang, Xinyu (1); Zhang, Jiafan (1) Author affiliation:(1) ABB Corporate Research Center, Shanghai, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:127-131 Article number:7105586 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:This paper presents a collaborative method to make full use of the advantages of CAD and CAR (Computer aided robot) software in industrial robotic application. CAR software is a necessary tool in robotic cell design with robot programming and robotic cell/line performance simulation with imported CAD model. However, due to the lack of efficient channel between CAD and CAR, the check-and-change design loop is always time consuming. This paper illustrates how to link these two types of software with an intermediate file, which records geometric data of CAD model and robot simulation information as well. With the implementation of this method, a high efficient design-simulation loop is set up and the productivity is highly improved on the engineering site. Finally this paper gives a concrete demonstration. © 2014 IEEE. Number of references:11 Main heading:Computer aided design Controlled terms:Application programs - Computer software - Design - Machine design - Marking machines - Robot programming - Robotics - Robots Uncontrolled terms:CAR - Collaborative method - Efficient channels - Engineering site - Industrial robotics - Performance simulation - Robot simulations - Robotic applications Classification code:408 Structural Design - 601 Mechanical Design - 601.1 Mechanical Devices - 723 Computer Software, Data Handling and Applications - 723.5 Computer Applications - 731.5 Robotics DOI:10.1109/ICITEC.2014.7105586 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993053 Title:Study on pricing model of online music product based on particle swarm and Stackelberg model Authors:Fan, Yunhui (1); Guo, Shuhang (1); Hang, Mingjia (1) Author affiliation:(1) Central University of Finance and Economics, Beijing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:294-300 Article number:7105622 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:The past decades have witnessed a boom in online music industry as a result of rapid development of information technology. This emerging field, however, lacks appropriate pricing methods. In order to coordinate with the marketing strategies of online music and guarantee satisfactory returns for both sellers and buyers of online music, a pricing model based on Stackelberg Model and Particle Swarm Model is proposed. This paper starts with an introduction of several traditional methods for pricing online products. Then it demonstrates Hypothesis and relevant variables in the new model, categorizes online musical products into different groups according to their qualities and uses PSO algorithm to acquire price and quantity trends of online music, which contribute to solving the optimal price at given time. Finally, the paper compares the model with traditional pricing models to test the validity of online music pricing. © 2014 IEEE. Number of references:12 Main heading:Costs Controlled terms:Marketing - Particle swarm optimization (PSO) - Social networking (online) Uncontrolled terms:Internet resources - Marketing strategy - Online music industry - Online products - Particle swarm - Pricing methods - PSO algorithms - Stackelberg model Classification code:723 Computer Software, Data Handling and Applications - 911 Cost and Value Engineering; Industrial Economics - 911.4 Marketing DOI:10.1109/ICITEC.2014.7105622 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993024 Title:Research on reactive power compensation for distribution network based on biogeography-based optimization algorithm Authors:Yin, Li-Min (1); Du, Shu (1) Author affiliation:(1) School of Electrical Engineering, Northeast Dianli University, Jilin, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:47-51 Article number:7105569 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Distribution network reactive power optimization, which can effectively reduce distribution network wastage, can not only improve voltage distribution network quality, but also realize the distribution network security control. Stable operation provides solid foundation for the electric power enterprise economy. Unlike genetic algorithm that shares the feature information between the chromosomes, the unique migration pattern of BBO algorithm makes the good feature in the habitats broadcast widely among habitats, thus, the optimization process would be accelerated and the reactive power compensation location could be confirmed quickly. And by using BBO algorithm in the example analysis and conducting simulation through PSASP, it proves that biogeography optimization algorithm is quite effective when applied in distribution network reactive power optimization. © 2014 IEEE. Number of references:12 Main heading:Algorithms Controlled terms:Ecology - Ecosystems - Genetic algorithms - Heuristic algorithms - Network security - Optimization - Quality control - Reactive power Uncontrolled terms:Biogeography optimization algorithms - Biogeography-based optimization algorithms - Electric power enterprise - Feature information - Grid loss - Reactive power compensation - Reactive power optimization - Voltage distribution Classification code:454.3 Ecology and Ecosystems - 706 Electric Transmission and Distribution - 723 Computer Software, Data Handling and Applications - 723.1 Computer Programming - 913.3 Quality Assurance and Control - 921.5 Optimization Techniques DOI:10.1109/ICITEC.2014.7105569 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992720 Title:An implementation of cognitive management framework for the Internet of Things system Authors:Jiang, Yuan (1); Xie, Wei (1); Wang, Fapeng (1); Li, Ning (1) Author affiliation:(1) Institute of Communications Engineering, PLA University of Science and Technology, Nanjing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:103-106 Article number:7105581 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:With the rapid development of Internet of Things (IoT), how to deal with the increasing number of objects with heterogeneity has become a new issue. Cognitive management emerges as the times require. On the basis of existing cognitive management frameworks, we provide a new cognitive management framework for the IoT system. The framework is based on cognitive cycle with the ability of controlling the behaviors of virtual representation of real world objects in virtual world according to users' request. A case study for renting a car and choosing an optimal way from origin to destiny is illustrated to show how the framework works. © 2014 IEEE. Number of references:14 Main heading:Internet of things Controlled terms:Internet - Virtual reality Uncontrolled terms:cognitive cycle - Cognitive managements - Internet of Things (IOT) - Real-world objects - Virtual objects - Virtual representations - Virtual worlds Classification code:723 Computer Software, Data Handling and Applications DOI:10.1109/ICITEC.2014.7105581 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992733 Title:The design and implementation of approving system on private IaaS cloud platform Authors:Tang, Yifan (1); Zheng, Jun (1) Author affiliation:(1) Computer Center, East China Normal University, Shanghai, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:276-279 Article number:7105618 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:To make the allocation of hardware resources more reasonable and flexible on private infrastructure as a service cloud platform in enterprises, approving system described in this paper provides an efficient solution. Each user has a basic quota. If users need to get more resources, the reason must be given to apply. According to the performance of the eventually practice on OpenStack, this system can prevent users from allocating more hardware resources than they need, and save the hardware resources. We implemented the approving system on OpenStack, and the resource of server was saved. © 2014 IEEE. Number of references:10 Main heading:Computer hardware Controlled terms:Hardware - Infrastructure as a service (IaaS) Uncontrolled terms:Approving system - Design and implementations - Hardware resources - Iaas clouds - OpenStack - Virtual machines Classification code:605 Small Tools and Hardware - 722 Computer Systems and Equipment - 722.4 Digital Computers and Systems DOI:10.1109/ICITEC.2014.7105618 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993059 Title:Linear discriminant analysis based on Zp-norm maximization Authors:An, Lei-Lei (1); Xing, Hong-Jie (1) Author affiliation:(1) Key Laboratory of Machine Learning and Computational Intelligence, College of Computer Science and Technology, Hebei University, Baoding, Hebei Province, China Corresponding author:Xing, Hong-Jie Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:88-92 Article number:7105578 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:In this paper, linear discriminant analysis (LDA) based on L<inf>p</inf>-norm (LDA-L<inf>p</inf>) optimization method is proposed. The objective function utilizing the L<inf>p</inf>-norm with arbitrary p value is studied. By maximizing the L<inf>p</inf>-norm-based ratio between the between-class scatter and the within-class scatter, LDA-L<inf>p</inf> can construct a set of local optimal projection vectors. Moreover, the optimal projection vectors can be obtained by the gradient ascent method. Experimental results on the two synthetic and fourteen benchmark datasets demonstrate that the better performance of LDA-L<inf>p</inf> can be achieved by choosing the optimal value of p. © 2014 IEEE. Number of references:11 Main heading:Discriminant analysis Controlled terms:Benchmarking - Feature extraction Uncontrolled terms:Benchmark datasets - Between class scatter - Gradient ascent - Linear discriminant analysis - Objective functions - Optimization method - Projection vectors - Within class scatter Classification code:716 Telecommunication; Radar, Radio and Television - 912 Industrial Engineering and Management - 913 Production Planning and Control; Manufacturing - 922 Statistical Methods DOI:10.1109/ICITEC.2014.7105578 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993032 Title:Application of H<inf>∞</inf> filtering algorithm in SINS/GPS integrated navigation system Authors:Su, Wan-Xin (1) Author affiliation:(1) Changchun Institute of Optics, Fine Mechanics and Physics, Chinese Academy of Sciences, Changchun, China Corresponding author:Su, Wan-Xin Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:72-76 Article number:7105575 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:H<inf>∞</inf> filtering is a representative method of robust control. In the SINS/GPS integrated navigation system, to solve the limitation of Kalman in the system model and noise, this paper puts forward an application of H<inf>∞</inf> filtering algorithm, which has strong robust performance in integrated navigation system. The filter equation of H<inf>∞</inf> and Kalman algorithm is given. The integrated navigation (SINS/GPS) uses the output difference between SINS and GPS as input value of the filter, and then the error of integrated navigation system is estimated and corrected by one filtering method in real time. The accuracy and robustness are analyzed and compared between the two kinds of filtering algorithm. The simulation result shows that the H<inf>∞</inf> filtering has better stability and robustness in colored noise. Through this research, H<inf>∞</inf> filtering algorithm can well solve the uncertainty of the noise model and statistical characteristics. H<inf>∞</inf> filtering algorithm is more suitable for the application of SINS/GPS to integrated navigation system. © 2014 IEEE. Number of references:9 Main heading:Algorithms Controlled terms:Air navigation - Multiuser detection - Navigation systems - Robust control - Signal filtering and prediction - White noise Uncontrolled terms:Colored noise - filter - Integrated navigation - Integrated navigation systems - Kalman - SINS/GPS - Stability and robustness - Statistical characteristics Classification code:431.5 Air Navigation and Traffic Control - 711 Electromagnetic Waves - 718 Telephone Systems and Related Technologies; Line Communications - 723 Computer Software, Data Handling and Applications - 731 Automatic Control Principles and Applications - 731.1 Control Systems - 921 Mathematics DOI:10.1109/ICITEC.2014.7105575 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993058 Title:Brand posts on Sina Weibo: Predicting popularity Authors:Xu, Yi (1); Tang, Zhenya (2) Author affiliation:(1) Department of Communication Engineering, Shanghai University, Shanghai, China; (2) Department of Information Management, Shanghai University, Shanghai, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:1-5 Article number:7105559 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Sina Weibo has become one of the most popular sites in China. Attracted by the huge commercial potential on Sina Weibo, many companies create their own Weibo accounts to enhance their online influence. Companies deliver information and interact with customers through placing brand posts. In this paper, some features are extracted from properties of brand posts and evaluate the roles of these features in predicting the popularity of brand posts. The reposts count of a brand post is regarded as an important indicator of online popularity because it reveals both the public attention and the spread of a post. Linear regression is used to figure out the relationship between the selected features and the reposts counts. In our experiments, it is possible to predict ranges of popularity on Sina Weibo with an overall 81% accuracy. © 2014 IEEE. Number of references:35 Main heading:Social networking (online) Controlled terms:Forecasting Uncontrolled terms:brand posts - Commercial potential - Micro blogging - Sina-weibo Classification code:723 Computer Software, Data Handling and Applications - 921 Mathematics DOI:10.1109/ICITEC.2014.7105559 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993061 Title:Stereo vision based road scene segment and vehicle detection Authors:Zhu, Kai (1); Li, Jiangxiang (1); Zhang, Haofeng (1) Author affiliation:(1) College of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China Corresponding author:Zhang, Haofeng Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:152-156 Article number:7105591 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:A stereo vision based road scene segment and vehicle detection method was proposed in this paper. In the method, First, dynamic programming was used for stereo matching, and then mismatching pixels were removed by left-right-consistency check; Second, V disparity was built by computing the disparity map, and a fast projection based line detection method was used to detect lines in V disparity map, after that, the road surface and vanishing line was extracted, and the intersection point between road and vehicle was computed; Third, the U disparity map was built to detect the horizontal position of vehicle. The experiment results have shown that our method not only can extract road area correctly, but also can detect vehicle position correctly too. © 2014 IEEE. Number of references:14 Main heading:Stereo vision Controlled terms:Airships - Dynamic programming - Object detection - Research aircraft - Roads and streets - Stereo image processing - Transportation - Vehicles Uncontrolled terms:left-right consistency - Road segments - Stereo matching - V disparities - Vehicle detection Classification code:406.2 Roads and Streets - 432 Highway Transportation - 652.1 Aircraft, General - 652.5 Balloons and Gliders - 723.5 Computer Applications - 921.5 Optimization Techniques DOI:10.1109/ICITEC.2014.7105591 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993054 Title:The Cloud Phone Authors:Jolly, Geo (1); Varghese, Tittu (1); Syama, S.R. (1) Author affiliation:(1) Department of Computer Science and Engineering, College of Engineering, Adoor, India Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:290-293 Article number:7105621 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Latest innovations demand the employment of web based services and applications in Internet rather than developing the applications. This paradigm shift could be attributed with the high scalability of Web Applications. The Cloud Phone is HTML5 based mobile device. In this device all the user functionalities, applications and entire tope level UI/UX will be downloaded and cached from a cloud server to the device. One of the major advantages of a Cloud Phone will be any of the customer facing functionality can be installed / changed to millions of users almost instantly by changing the software on the server. It will shorten application and service deployment and update life cycle significantly. Another key benefit of a Cloud Phone is multiple device ownership - the user will be able to access the same data and applications effortlessly from different devices. © 2014 IEEE. Number of references:10 Main heading:Telephone sets Controlled terms:HTML - Life cycle - Mobile devices - Mobile phones - Social networking (online) Uncontrolled terms:Cloud servers - High scalabilities - HTML5 - Multiple devices - Paradigm shifts - Service deployment - WEB application - Web-based service Classification code:716 Telecommunication; Radar, Radio and Television - 718.1 Telephone Systems and Equipment - 723 Computer Software, Data Handling and Applications - 913.1 Production Engineering DOI:10.1109/ICITEC.2014.7105621 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992725 Title:Learning high-level features by deep Boltzmann machines for handwriting digits recogintion Authors:Zhang, Shuo (1); Zhang, Wuyi (2); Kang, Kary (3) Author affiliation:(1) CIMS Research Center, Tongji University, Shanghai, China; (2) Department of Computer Science, Hohai University, Nanjing, China; (3) Department of Computer Science, University of Southern California, Los Angeles, United States Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:243-246 Article number:7105611 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Handwriting recognition is the ability of a computer to understand handwritten inputs from users. Generally it includes preprocessing, feature extraction, and classifier training. In this paper, we will develop a handwriting digit recognition system by using Deep Boltzmann Machine (DBM) together with the Support Vector Machine (SVM). DBM is a deep learning technique to learn high level features from the training data, while SVM is a method to train non-linear classifiers from the learn features. Such a framework is a promising way to build up a powerful digit recognition system. Our experimental result shows that our system can achieve desired performance. © 2014 IEEE. Number of references:8 Main heading:Classification (of information) Controlled terms:Character recognition - Feature extraction - Support vector machines Uncontrolled terms:Classifier training - Deep boltzmann machines - Deep learning - Handwriting digit recognition - Handwriting recognition - High-level features - Nonlinear classifiers - svm Classification code:716 Telecommunication; Radar, Radio and Television - 716.1 Information Theory and Signal Processing - 723 Computer Software, Data Handling and Applications DOI:10.1109/ICITEC.2014.7105611 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993050 Title:A fast proof generating system for verifying cloud search Authors:Wang, Genguo (1) Author affiliation:(1) School of Software, Shanghai Jiao Tong University, Shanghai, China Corresponding author:Wang, Genguo Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:184-187 Article number:7105597 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:With the developing of network and hardware, cloud computing is playing a more important role in business and daily usage. The need of searching cloud data is growing increasingly. And the need to proof the correctness of cloud searching has also grown. Previous work has proposed many useful theories on verifiable computing, such as probabilistically checkable proofs, authHashtable, but an efficient and scalable system is rare. We design and implement a fast proof generating system for verifying cloud search based on RSA accumulators, nonmember-ship witnesses. The system is efficient and scalable. Evaluation on real datasets shows that our system can speed up the proof generation time and our system can handle datasets with size around 100GB. © 2014 IEEE. Number of references:10 Main heading:Distributed computer systems Controlled terms:Cloud computing - Computation theory Uncontrolled terms:Design and implements - Document search - Generating system - Parallel processing - Performance evaluation - Probabilistically checkable proof - Scalable systems - Verifiable Computing Classification code:722.4 Digital Computers and Systems - 921 Mathematics DOI:10.1109/ICITEC.2014.7105597 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993055 Title:Quantum information technology in radar system Authors:Zhou, Chenghong (1); Qian, Weiping (1); Zhang, Yuchao (2) Author affiliation:(1) Beijing Institute of Tracking and Telecommunications Technology, Beijing, China; (2) Beijing Institute of System Engineering, Beijing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:195-198 Article number:7105600 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Quantum radar is a remote sensor that exploits quantum phenomena to perceive target in the distance and receive its state information. In this article, the concept and principle of quantum radar are introduced in detail, including interferometrie quantum radar, quantum ladar and quantum illumination radar. And it is proved in theory that quantum radar can beat standard quantum limitation and surpass classical radar. © 2014 IEEE. Number of references:14 Main heading:Quantum theory Controlled terms:Optical radar - Quantum entanglement - Quantum optics - Radar - Radar systems - Radar theory Uncontrolled terms:Quantum illuminations - Quantum Information - Quantum information technologies - Quantum phenomena - Quantum sensors - Remote sensors - State information Classification code:716.2 Radar Systems and Equipment - 931.4 Quantum Theory; Quantum Mechanics DOI:10.1109/ICITEC.2014.7105600 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993051 Title:Cryptanalysis and improvement of a SIP authentication scheme Authors:Zheng, Jun (1); Wang, Dongyun (1) Author affiliation:(1) School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:199-203 Article number:7105601 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:SIP (Session Initial Protocol) has been a very popular protocol for VoIP. However, the authentication of this protocol just derives from HTTP digest authentication, which has been demonstrated insecure in the open network. Recently, Arshad et al. proposed an improved mutual authentication scheme based on ECC and claimed that it's secure enough. In this paper, however, we point out that their protocol still could not resist offline password guessing attacks. Furthermore, we propose an ECC-based mutual authentication and key agreement scheme to overcome such a security problem. Also, an analysis of it is provided to indicate that compared to Arshad et al.'s scheme, this scheme reduces twice hash operation and is more secure with reasonable computation cost. © 2014 IEEE. Number of references:16 Main heading:Authentication Controlled terms:Cryptography - Hypertext systems - Internet protocols - Internet telephony - Mobile security - Network security Uncontrolled terms:ECC - Key agreement - Mutual authentication - Password guessing attack - Session initial protocols Classification code:723 Computer Software, Data Handling and Applications DOI:10.1109/ICITEC.2014.7105601 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993026 Title:A novel epidemic routing based on mobility and occurrence probability in buffer-limited opportunistic networks Authors:Li, Ning (1); Lai, Rongxuan (1); Wang, Cong (1); Zhang, Jianfeng (1) Author affiliation:(1) Institute of Communication Engineering, PLA University of Science and Technology, Nanjing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:20-24 Article number:7105563 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Under the opportunistic network environments, normal network protocols can hardly transfer data successfully and efficiently. In order to overcome this problem, many new routing algorithms have been raised pertinently. Thereinto, the Epidemic routing algorithm is a typical approach, which maintains least delay with a highest delivery ratio. However, it is a defective method for routing data as it requires an infinite node cache and results in infinite circulate even one of the data duplicates arrived at the destination, which is proved to be an extremely limitation on its routing performance. Confronted with this drawback, this paper puts forward a novel Epidemic Routing based on Mobility and Probability of Occurrence (MPOER), which endows message with a 'Hop Life' dynamically. And, we formulates with a simulation platform called 'The ONE', and the experiment shows that the approach proposed can increase the routing performance in several aspects just sacrifice some delay performance. © 2014 IEEE. Number of references:16 Main heading:Epidemiology Controlled terms:Carrier mobility - Network protocols - Probability - Routing algorithms Uncontrolled terms:Epidemic routing - Hop Life - Occurrence probability - Opportunistic networks - Pause Time - Probability of occurrence - Routing performance - Simulation platform Classification code:461.7 Health Care - 723 Computer Software, Data Handling and Applications - 922.1 Probability Theory - 933 Solid State Physics DOI:10.1109/ICITEC.2014.7105563 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993019 Title:A novel travelling time estimation mechanism for minimizing unnecessary handovers from cellular networks to WLANs Authors:Mahmood, A. (1); Zen, H. (1); Othman, A.K. (1); Siddiqui, S.A. (2) Author affiliation:(1) Faculty of Engineering, Universiti Malaysia Sarawak, Kota Samarahan, Sarawak, Malaysia; (2) University of Jinan, Jinan, Shandong, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:38-42 Article number:7105567 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:The 'Beyond 3G Wireless Networks Architecture' proposes to assimilate numerous heterogeneous wireless network technologies over an Internet Protocol Backbone. However, in order to offer seamless mobility, cost - effective connectivity and desired Quality of Service (QoS) in such a diverse environment; efficacious vertical handover support still remains a major design challenge. In this research/manuscript, a novel handover decision mechanism, 'Travelling Time Prediction Based on the Consecutive RSS Measurements' in an IEEE 802.11 WLAN cell is suggested. The method uses a time threshold which is computed by a Mobile Terminal (MT) as soon as it penetrates into a WLAN boundary. The estimated travelling time is then compared with the time threshold, so as to make handover decisions for minimizing the probability of unnecessary handovers. Our performance analysis reveals that the suggested mechanism effectively reduces number of unnecessary handovers by 60% as compared to the already proposed schemes. © 2014 IEEE. Number of references:16 Main heading:Radio systems Controlled terms:Cost effectiveness - Heterogeneous networks - Internet protocols - Mobile security - Mobile telecommunication systems - Network architecture - Quality of service - Standards - Telecommunication networks - Wireless networks Uncontrolled terms:Hand over - Handover decision mechanism - Handover failure - Heterogeneous wireless network - Performance analysis - Received signal strength - Vertical handover decisions - Vertical handovers Classification code:716 Telecommunication; Radar, Radio and Television - 716.3 Radio Systems and Equipment - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications - 722 Computer Systems and Equipment - 723 Computer Software, Data Handling and Applications - 902.2 Codes and Standards - 912.3 Operations Research DOI:10.1109/ICITEC.2014.7105567 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993028 Title:The research of professional meta-search engine result based on genetic algorithm Authors:Liang, Xu (1); Wu, Yaoxu (1); Huang, Ming (1) Author affiliation:(1) Software Technology Institute, Dalian Jiaotong University, Dalian, Liaoning, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:64-67 Article number:7105573 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:The query results returned from the meta-search engine come from the independent search engine and the results will be evaluated the professional correlation; additional information must be dogged beyond its location information. This paper proposes a web page ranking algorithm based on genetic algorithms, and discusses the principle of the algorithm and implementation process, researches and realizes the meta-search engine in the field of training. Based on the fully dig of web text information and combined with the web professional correlation algorithm given by genetic algorithm, this paper extracts the features of professional website. Experimental results show that the engine has a high professional information filtering and sorting capabilities. © 2014 IEEE. Number of references:10 Main heading:Search engines Controlled terms:Algorithms - Genetic algorithms - Information filtering - Professional aspects - Social networking (online) - Websites Uncontrolled terms:Algorithm and implementation - Correlation algorithm - Location information - Meta search engines - Query results - Web page ranking - Web texts Classification code:723 Computer Software, Data Handling and Applications - 901.1 Engineering Professional Aspects - 903.1 Information Sources and Analysis DOI:10.1109/ICITEC.2014.7105573 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992719 Title:Dynamic mirror based real-time query contention solution for support big real-time data analysis Authors:Mao, Yingchi (1); Min, Wei (1); Wang, Jiulong (1); Jia, Bicong (1); Jie, Qing (1) Author affiliation:(1) College of Computer and Information Engineering, Hohai University, Nanjing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:229-233 Article number:7105608 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Real-time data warehouse is one of the important research field in the data management. Real-time data query and import can bring about the problem of query contention. Query contention will not only seriously affect the accuracy of query analysis, but also reduce the performance of the real-time data warehouse. In this paper, combining an external dynamic storage area, a dynamic mirror replication technology is proposed to avoid the contention between OLAP queries and OLTP updates. An external dynamic storage area (DSA) for real-time data warehouse is established based on the TPC-H benchmark, and an improved ETL framework is proposed to deal with the real-time data and historical data, respectively. The experimental results demonstrate that the proposed solution can get better performance in terms of the effectiveness. © 2014 IEEE. Number of references:12 Main heading:Digital storage Controlled terms:Data handling - Data reduction - Data warehouses - Information analysis - Information management - Mirrors Uncontrolled terms:Better performance - External dynamics - Mirror replication - OLAP - query contention - Real time data analysis - Real-time data warehouse - Tpc-h benchmarks Classification code:722.1 Data Storage, Equipment and Techniques - 723.2 Data Processing and Image Processing - 723.3 Database Systems - 741.3 Optical Devices and Systems - 903.1 Information Sources and Analysis - 903.2 Information Dissemination DOI:10.1109/ICITEC.2014.7105608 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993017 Title:A novel synthesis technique for generalized Chebyshev microwave band-pass filters Authors:Qi, Nan (1); Li, Sheng-Xian (1) Author affiliation:(1) China Academy of Space Technology (xi'An), Xi'an, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:93-97 Article number:7105579 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:A novel synthesis technique which can arbitrarily place transmission zeros, directly synthesize in band-pass domain without a low-pass prototype transformation for generalized Chebyshev microwave band-pass filters is discussed in this paper. Compared with the classical synthesis theory for narrowband filters, this method can reduce the relative error generated in the frequency transformation and apply to synthesize wideband and ultra-wideband filters. The network matrix derived from the discussed technique is physically meaningful and examples show a good agreement. © 2014 IEEE. Number of references:10 Main heading:Microwave filters Controlled terms:Bandpass filters - Low pass filters - Synthesis (chemical) - Ultra-wideband (UWB) Uncontrolled terms:Band pass - Chebyshev - Frequency transformations - Narrow band filter - Synthesis techniques - Synthesis theory - Transmission zeros - Ultra-wideband filters Classification code:703.2 Electric Filters - 716.3 Radio Systems and Equipment - 802.2 Chemical Reactions DOI:10.1109/ICITEC.2014.7105579 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992731 Title:Robust smooth one-class support vector machine Authors:Hu, Jin-Kou (1); Xing, Hong-Jie (1) Author affiliation:(1) Key Laboratory of Machine Learning and Computational Intelligence, College of Mathematics and Information, Science, Hebei University, Baoding, Hebei Province, China Corresponding author:Xing, Hong-Jie Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:83-87 Article number:7105577 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:In this paper, a novel one-class classification approach, namely, robust smooth one-class support vector machine (RSOCSVM) is proposed. The proposed method can efficiently enhance the anti-noise ability of the traditional one-class support vector machine (OCSVM). Utilizing the smooth technique, RSOCSVM reformulates the quadratic programming problem of OCSVM as an unstrained optimization format. Moreover, half-quadratic minimization is used to solve the obtained unstrained optimization problem. Experimental results on two synthetic data sets and nine benchmark data sets demonstrate that the proposed method is superior to the traditional OCSVM. © 2014 IEEE. Number of references:20 Main heading:Support vector machines Controlled terms:Optimization - Quadratic programming - Vectors Uncontrolled terms:Anti-noise ability - Kernel function - One-class Classification - One-class support vector machine - One-class support vector machines (OCSVM) - Optimization problems - Quadratic minimization - Quadratic programming problems Classification code:723 Computer Software, Data Handling and Applications - 921.1 Algebra - 921.5 Optimization Techniques DOI:10.1109/ICITEC.2014.7105577 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992724 Title:A solution which can support privacy protection and fuzzy search quickly under cloud computing environment Authors:Li, Xue (1); Ren, Wuling (1); Jiang, Guoxin (1); Yang, Jie (1) Author affiliation:(1) Information Institute, Zhejiang Gongshang University, Hangzhou, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:43-46 Article number:7105568 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:With the rapid development and widely-use of cloud computing, nowadays more and more users store data in the cloud storages. Some users, especially enterprise users, who have more privacy requirements, urgently need a solution where the cloud storage can be encrypted and retrieved rapidly and also open to internal staff only. However, to protect the privacy of data, the data must be encrypted when it is uploaded. This will greatly reduce the efficiency of retrieval. On the basis of the above, the author proposes a solution which can provide privacy protection and rapid fuzzy search under cloud computing environment. This solution can provide a more reasonable and efficient data storage and retrieval services to the user's data. © 2014 IEEE. Number of references:13 Main heading:Digital storage Controlled terms:Cloud computing - Clouds - Cryptography - Data privacy Uncontrolled terms:Cloud computing environments - Cloud storages - computing - fuzzy - Fuzzy searches - Privacy protection - Privacy requirements - search Classification code:443 Meteorology - 716 Telecommunication; Radar, Radio and Television - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications - 722.1 Data Storage, Equipment and Techniques - 722.4 Digital Computers and Systems - 723 Computer Software, Data Handling and Applications DOI:10.1109/ICITEC.2014.7105568 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993029 Title:An optimized load balance based on data popularity on HBASE Authors:Xia, Linjuan (1); Chen, Hongzhong (1); Sun, Haichun (1) Author affiliation:(1) College of Electronic and Information Engineering, Tongji University, Shanghai, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:234-238 Article number:7105609 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Load balancing is an important technique for improving distributed system performance. It results in a better utilization of server resources and quick response time for user requests. In distributed database, it is crucial to take data popularity into account. It is known that servers storing popular data usually become hotspots, so using forecasting methods to predict the popular data in advance will have great impact on performance. For HBase, several methods are proposed for balancing the load but still some improvement in terms of efficiency is required. In this paper, we present an efficient load balancing algorithm which alleviates hotspots by considering data popularity using secondary exponential smoothing method. In the algorithm we construct a region move evaluation function which takes data locality into consideration for further improvement of the throughput in HBase. The experimental result illustrates that our optimized algorithm runs faster and better, and gains about 3% throughput improvement as the cluster is much more balanced. © 2014 IEEE. Number of references:10 Main heading:Distributed computer systems Controlled terms:Algorithms - Clustering algorithms - Forecasting - Network management Uncontrolled terms:Data locality - Data popularity - HBase - Load balance - Load predictions Classification code:721 Computer Circuits and Logic Elements - 722.4 Digital Computers and Systems - 723 Computer Software, Data Handling and Applications - 921 Mathematics DOI:10.1109/ICITEC.2014.7105609 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993063 Title:An improvement in MySQL cluster in e-commerce scenarios Authors:Xiang, Kai (1) Author affiliation:(1) Shanghai Jiaotong University, Shanghai, China Corresponding author:Xiang, Kai Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:286-289 Article number:7105620 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:With the rapid development of e-commerce business, a more reliable and extensible database cluster architecture is needed in almost all e-commerce systems. For a distributed-system, Percona XtraDB Cluster provides consistency and availability. MySQL Replication provides availability and partitioning tolerance. In an e-commerce system, we need consistency, availability, partitioning tolerance in different scenarios. The contributions of this paper are a new design of a proper architecture to satisfy CAP in different aspects in an e-commerce business, why this architecture is appropriate. Finally, we implemented a system called MEC based on this architecture. © 2014 IEEE. Number of references:9 Main heading:Cluster computing Controlled terms:Architecture - Availability - Commerce - Electronic commerce Uncontrolled terms:consistency - massive - mysql replication - Partition tolerances - Percona XtraDB Cluster - reliable - scalable Classification code:402 Buildings and Towers - 722.4 Digital Computers and Systems - 911.2 Industrial Economics - 913.5 Maintenance DOI:10.1109/ICITEC.2014.7105620 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993015 Title:An user behavior credibility authentication model in cloud computing environment Authors:Lu, Xin (1); Xu, Yue (1) Author affiliation:(1) School of Information and Software Engineering, University of Electronic Science and Technology of China, Cheng du, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:271-275 Article number:7105617 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:To address the issue of credibility authentication of user behaviors in the cloud computing environment, this paper proposes a user behavior credibility authentication model built on the characteristic-based random Petri network to assess the behavior contract credibility of the users accessing the cloud service resources. This model first makes dimensional normalization of the behavioral residue data of the users and uses the decision tree ID3 algorithm to characterize the behavioral residue data of the users to check such data against the behavior authentication sets, so as to determine the credibility of the compliance of the user behaviors with the contract. User behaviors are dynamic and random, so this paper proposes the status deduction function of the random Petri network to analyze the credibility of the compliance of user behaviors with the contract. Then the credible degree is calculated to make quantitative assessment of the user behaviors' credibility. The simulation experiments indicate that this model is able to reliably assess user behaviors' credibility in the cloud computing environment and is a certain improvement in terms of accuracy and efficiency of credibility authentication compared with the traditional models. © 2014 IEEE. Number of references:10 Main heading:Authentication Controlled terms:Behavioral research - Cloud computing - Compliance control - Data mining - Decision trees - Distributed computer systems - Trees (mathematics) Uncontrolled terms:Authentication models - Behavioral residues - Cloud computing environments - Dimensional normalization - Petri network - Quantitative assessments - Traditional models - User behaviors Classification code:722.4 Digital Computers and Systems - 723 Computer Software, Data Handling and Applications - 731.3 Specific Variables Control - 921.4 Combinatorial Mathematics, Includes Graph Theory, Set Theory - 971 Social Sciences DOI:10.1109/ICITEC.2014.7105617 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993047 Title:Research on the access control in the education private cloud Authors:Li, Jinshuang (1); Liu, Xiumei (1) Author affiliation:(1) Computing Center, Northeastern University, Shenyang, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:192-194 Article number:7105599 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:The access control model based on roles and permission-groups was put forward for private cloud computing environment, and then defined formally. The model extended the concept of RBAC's permissions using permission-groups which has a hierarchy structure. Based on the model, we constructed the undergraduate teaching resources and learning platform of Liaoning province in China. The model solved the problem of access control in the education private cloud. © 2014 IEEE. Number of references:10 Main heading:Access control Controlled terms:Cloud computing - Education Uncontrolled terms:Access control models - Hierarchy structure - Learning platform - Liaoning Province - Private clouds - Undergraduate teaching Classification code:722.4 Digital Computers and Systems - 723 Computer Software, Data Handling and Applications - 901.2 Education DOI:10.1109/ICITEC.2014.7105599 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993064 Title:An parallelized deep packet inspection design in software defined network Authors:Li, Yunchun (1); Fu, Rong (1) Author affiliation:(1) Beihang University, Beijing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:6-10 Article number:7105560 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Deep packet inspection (DPI) is a key technology in software defined network (SDN) which can centralize network policy control and accelerate packet transmission. In this paper, we propose a new SDN architecture with DPI module. Base on the centralization idea of SDN, we deploying a parallel DPI to the control layer. We present DPI interface in the SDN controller and discuss OpenFlow protocol extension. Paralleling the DPI algorithm effectively reduces the time of detecting packets and sending flow tables. We also describe an Adaptive Highest Random Weight with an additional feedback corresponding to queue length and string length matching at each processor. The original Highest Random Weight (HRW) hash ensures the connection locality. Treating all tasks as the same weight just balances the workload over the number of different task. By adding the adjustment multiplier and combined with the characteristics of the fixed hash function, the system can allocate resource dynamically and achieve connection-level parallelism in consideration of the processing time for per packet. © 2014 IEEE. Number of references:25 Main heading:Packet networks Controlled terms:Adaptive control systems - Controllers - Hash functions - Inspection Uncontrolled terms:Connection localities - Deep packet inspection - Deep packet inspection (DPI) - Key technologies - Packet transmissions - Processing time - Random weight - Software-defined networks Classification code:716 Telecommunication; Radar, Radio and Television - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications - 723 Computer Software, Data Handling and Applications - 731.1 Control Systems - 732.1 Control Equipment - 913.3.1 Inspection - 921 Mathematics DOI:10.1109/ICITEC.2014.7105560 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993036 Title:Research on application of Bayesian discriminant method in intrusion detection model Authors:Guan, Keqing (1); Kong, Xianli (2) Author affiliation:(1) Information Technology and Business Management Department, Dalian Neusoft University of Information, Dalian, China; (2) School of Mathematics and Quantitative Economics, Dongbei University of Finance and Economics, Dalian, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:180-183 Article number:7105596 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:An intrusion detection model based on bayesian discriminant method is constructed in this paper. The intrusion detection problem is transformed into a discriminant classify problem in the model. We use stepwise discriminant method in selecting significant discriminatory variables to decrease computational complexity. The model is trained and validated by using the denial of service (DoS) attack data of KDD CUP99's data set. The result of the experiment shows high correctly identified percentage of the model. Intrusion detection system can be constructed with the model when there are sufficient network packet records as a support. © 2014 IEEE. Number of references:10 Main heading:Intrusion detection Controlled terms:Complex networks - Computer crime - Denial-of-service attack Uncontrolled terms:Bayesian discriminants - Data set - Denial of Service - Intrusion detection models - Intrusion Detection Systems - Network packets - Stepwise discriminant Classification code:722 Computer Systems and Equipment - 723 Computer Software, Data Handling and Applications DOI:10.1109/ICITEC.2014.7105596 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993018 Title:A goal-driven and content-oriented planning system for knowledge-intensive service composition Authors:Gao, Ming (1); Yang, Lei (1); Zhang, Chunhua (1); Guan, Wen (1); Li, Ailing (1) Author affiliation:(1) School of Management Science and Engineering, Dongbei University of Finance and Economics, Dalian, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:316-321 Article number:7105627 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:With the rapid development of Cloud computing, social computing, and Big Data, the service composition in support of increasing knowledge-intensive innovation activities across enterprises and organizations sets a new challenge of dealing with diversified users' needs and changeable structures in process. Automatic service composition mainly makes use of artificial intelligence planning techniques to address these challenges. But current research focuses on separate aspects of these challenges, and special effort should be made to put goals, domain knowledge and activities into a unified perspective. This paper proposes a goal-driven and content-oriented automatic service composition method based on Hierarchical Task Network. First a unified planning domain knowledge modeling approach is given regarding goals, contents, tasks and their relationships, then a planning framework and corresponding algorithms are designed by extending Simple Hierarchical Ordered Planner 2, finally a loosely-coupled, extensible and flexible planning system is implemented and the experiment proves its feasibility and features. © 2014 IEEE. Number of references:33 Main heading:Web services Controlled terms:Artificial intelligence - Big data - Knowledge based systems - Quality of service - Telecommunication services Uncontrolled terms:content-oriented - Goal driven - HTN - SHOP2 - Web service composition Classification code:716 Telecommunication; Radar, Radio and Television - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications - 723 Computer Software, Data Handling and Applications DOI:10.1109/ICITEC.2014.7105627 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993045 Title:Research on energy-efficient text classification Authors:Lin, Hao (1) Author affiliation:(1) School of Software, Shanghai Jiao Tong University, Shanghai, China Corresponding author:Lin, Hao Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:257-261 Article number:7105614 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:People rely on data mining techniques like text categorization more and more to explore valuable information, due to the ever-increasing electronic documents produced. Although the energy consumed by text categorization increases with the data, people usually pay attention to its effectiveness and there is little research about its energy cost. In this paper, we evaluate the energy cost of different classifiers and reduce energy cost by parallelization, trying to find a classifier that performs best on both aspects - effectiveness and efficiency. Several classifiers are obtained by using existing libraries or implementing classification algorithms. Comprehensive experiments on three real datasets show that an improved version of Naive Bayes can have competitive precision compared to SVM while has low energy costs. Parallelization can further reduce its energy cost by a factor of 10 for RCV1 dataset. © 2014 IEEE. Number of references:17 Main heading:Energy efficiency Controlled terms:Classification (of information) - Cost reduction - Costs - Data mining - Text processing - Word processing Uncontrolled terms:Classification algorithm - Effectiveness and efficiencies - Electronic document - Green computing - Parallel processing - Performance evaluation - Text categorization - Text classification Classification code:525.2 Energy Conservation - 716.1 Information Theory and Signal Processing - 723.2 Data Processing and Image Processing - 911 Cost and Value Engineering; Industrial Economics - 911.2 Industrial Economics DOI:10.1109/ICITEC.2014.7105614 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993040 Title:Research and design of the common curriculum online examination system that used in military academies Authors:Lv, Hai-Yan (1); Lv, Hong (1); Zhou, Lijun (1); Zhang, Jie (1) Author affiliation:(1) Naval Aeronautical and Astronautical University, Yantai, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:122-126 Article number:7105585 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:To improve the shortage of the existing online examination system, a common online curriculum examination system is designed and realized. Mainly from the system function design, database design and security mechanisms design, the paper elaborates the implementation of the system. Many courses and a variety of questions can be taken into account by the system, and also flexible and comprehensive exam test paper organization strategy service can be provided by the system. Its online learning allows students to study independently anywhere and anytime. Application shows that the online examination system has greatly improved the quality of examinations and reduced the workload of teachers, also it can inspire students' study interest greatly. © 2014 IEEE. Number of references:11 Main heading:E-learning Controlled terms:Curricula - Design - Education - Mobile security - Social networking (online) - Teaching Uncontrolled terms:ASP - Database design - On-line examinations - Security mechanism - SQL servers Classification code:408 Structural Design - 723 Computer Software, Data Handling and Applications - 901.2 Education DOI:10.1109/ICITEC.2014.7105585 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993044 Title:A modified eigenvalue-based cooperative spectrum sensing algorithm Authors:Fang, Yuting (1) Author affiliation:(1) School of Electronic Information Engineering, Tianjin University, Tianjin, China Corresponding author:Fang, Yuting Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:220-224 Article number:7105606 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Spectrum sensing is an essential function in cognitive radio (CR) to dynamically detect temporarily unused frequency bands, which improve the efficiency of utilization of frequency spectrum. In this paper, based on traditional maximum and minimum eigenvalue detection (MME), a modified algorithm is presented by proposing a new decision statistic and the corresponding decision threshold is also deduced based on Random Matrix Theory. The modified algorithm is robust against noise uncertainty and has good performance in low SNR for the nature of correlation of primary signal. The modified algorithm is simulated in MATLAB and results are analyzed. Compared with traditional MME algorithm, the modified algorithm has better performance in detecting probability. © 2014 IEEE. Number of references:21 Main heading:Cognitive radio Controlled terms:Algorithms - Decision theory - Eigenvalues and eigenfunctions - Frequency bands - Matrix algebra - Random variables - Signal to noise ratio Uncontrolled terms:Co-operative spectrum sensing - Decision statistics - Eigen-value - Minimum eigenvalue - Modified algorithms - Noise uncertainties - Random matrix theory - Spectrum sensing Classification code:716.1 Information Theory and Signal Processing - 716.3 Radio Systems and Equipment - 723 Computer Software, Data Handling and Applications - 921 Mathematics - 921.1 Algebra - 922.1 Probability Theory - 961 Systems Science DOI:10.1109/ICITEC.2014.7105606 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993035 Title:Comparison of different variants of Restricted Boltzmann Machines Authors:Guo, Xiaowei (1); Huang, Haiying (2); Zhang, Jason (3) Author affiliation:(1) Department of Economics, University of Kentucky, Lexington, United States; (2) Department of Mathematics, Hohai University, Nanjing, China; (3) Department of Computer Science, University of Southern California, Los Angeles, United States Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:239-242 Article number:7105610 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Restricted Boltzmann Machines (RBMs) have been developed for a lot of applications in the past few years, and many of its variants have also appeared. In this paper, RBM model and its learning algorithm with contrastive divergence algorithm will be introduced firstly. Then three important variants of RBM are presented in details, which are sparse RBM, discriminative RBM, and the Deep Boltzmann Machines (DBM). All the variants including original RBM are tested on MNIST handwriting digit dataset for classification task. Our empirical results demonstrate the advantage of RBM models and show that compared with other variants, the DBM is the best one in terms of the classification accuracy. © 2014 IEEE. Number of references:8 Main heading:Classification (of information) Uncontrolled terms:Classification accuracy - Contrastive divergence - DBM - Deep boltzmann machines - handwriting digit images - RBM - Restricted boltzmann machine - sparse Classification code:716.1 Information Theory and Signal Processing DOI:10.1109/ICITEC.2014.7105610 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc.Compendex references:YES Accession number:20152700993030 Title:An empirical study of knowledge sharing in Congolese company Authors:Yan, Jing-Hong (1); Tang, Zhen-Ya (1); Jin, Xiao-Ling (1) Author affiliation:(1) Dept. of Management, Shanghai University, Shanghai, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:252-256 Article number:7105613 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:This paper explored why employees share their knowledge with others based on three typical Congolese companies. A thorough content analysis was conducted in order to analyze our data, which were collected from an online survey. Our results indicated that motivations were divided into different types depending on different knowledge sharing behaviors. Learning new knowledge, knowledge self-efficacy and knowledge linkages mainly contributed to job-related knowledge sharing, while relational linkages, altruism as long as hoping for advance in company significantly affected team-related knowledge sharing. Consequently, we presented some suggestions and guidelines for Congolese companies and their top managers. © 2014 IEEE. Number of references:18 Main heading:Knowledge management Controlled terms:Information management - Management science Uncontrolled terms:Content analysis - Empirical studies - Knowledge-sharing - Online surveys - Self efficacy - Top managers Classification code:723.5 Computer Applications - 912.2 Management DOI:10.1109/ICITEC.2014.7105613 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993016 Title:Simulation analysis of constant-envelope multiplex algorithm for navigation signals in band-limited systems Authors:Cai, Minggui (1); Xie, Jun (2); Wang, Gang (1) Author affiliation:(1) Xi'An Branch, China Academy of Space Technology, Xi'an, China; (2) China Academy of Space Technology, Beijing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:112-116 Article number:7105583 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:First of all, the three constant-envelope multiplex methods have been introduced: Interplex/CASM (Coherent Adaptive Subcarrier Modulation), Majority voting and POCET (Phase-Optimized Constant-Envelope Transmission). And then four signals multiplex has been simulated as an illustration using the three kinds of constant envelope multiplex techniques respectively. According to simulation analysis, the highest multiplex efficiency has reached -0.64dB when using POCET. And then the performance of three multiplex algorithms in band-limited systems has been simulated and analyzed. With the bandwidth limit, the multiple signal after constant-envelope multiplex cannot keep its envelope constant any more, which makes the multiple signal distort and brings crosstalk among sub signals. Therefore to study the constant-envelope multiplex techniques with bandwidth limit will become the important issue for the further research on navigation signal multiplex techniques. © 2014 IEEE. Number of references:10 Main heading:Multiplexing Controlled terms:Algorithms - Bandwidth Uncontrolled terms:Adaptive subcarrier - Band-limit - Bandwidth limit - Constant envelope - constellation - In-band - Navigation signals - Simulation analysis Classification code:716 Telecommunication; Radar, Radio and Television - 716.1 Information Theory and Signal Processing - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications - 723 Computer Software, Data Handling and Applications - 921 Mathematics DOI:10.1109/ICITEC.2014.7105583 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992721 Title:Multiple attribute decision making with triangular intuitionistic fuzzy numbers and application to cloud service provider selection Authors:Zheng, Ye-Fu (1); Xu, Jun (2) Author affiliation:(1) School of Economics and Management, East China JiaoTong University, Nanchang, China; (2) Modern Economics and Management College, Jiangxi University of Finance and Economics, Nanchang, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:311-315 Article number:7105625 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:The notion of Triangular intuitionistic fuzzy numbers (TIFNs) is very useful and interesting in Multiple Attribute Decision Making (MADM) problems for quantifying uncertainty and subjectivity, but the ranking of TIFNs is not an easy problem. The aim of this paper is to propose a new approach to rank TIFNs. The concepts and operational laws of TIFNs are introduced. Then a new approach is developed to rank TIFNs by determining intersection value of diagonals. And the ranking method is applied to MADM problems, in which the attribute preference values take the form of TIFNs. In addition, a cloud computing service provision example is also provided to illustrate the procedure of the proposed method, and the results of experiments verify that the method is effective and feasible. © 2014 IEEE. Number of references:18 Main heading:Decision making Controlled terms:Distributed database systems - Fuzzy rules - Fuzzy sets Uncontrolled terms:Cloud service providers - Multiple attribute decision making - Ranking - Triangular intuitionistic fuzzy numbers - Uncertainty Classification code:723.3 Database Systems - 912.2 Management - 921 Mathematics - 921.4 Combinatorial Mathematics, Includes Graph Theory, Set Theory DOI:10.1109/ICITEC.2014.7105625 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993042 Title:A highly efficient and identity-based proxy signature scheme without random oracle Authors:Hu, Xiaoming (1); Yang, Yinchun (1); Liu, Yan (1); Wang, Jian (1); Xiong, Xiaohua (1) Author affiliation:(1) School of Computer and Information, Shanghai Second Polytechnic University, Shanghai, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:204-207 Article number:7105602 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Recently, Au et al. proposed a hierarchical identity-based signature scheme and Hu-Huang proposed a proxy key generation protocol. Based on the both schemes, we present a novel identity-based proxy signature scheme. The proposed scheme is provablly secure in the standard model and its security can be reduced to the hardness assumption of the g-strong Diffie-Hellman problem. Compared with all existing identity-based proxy signature schemes secure in the standard model, the proposed scheme has the following two advantages: shorter signature length and less computational cost. So, the proposed scheme is very suitable for application in some low resource situations. © 2014 IEEE. Number of references:16 Main heading:Electronic document identification systems Controlled terms:Authentication - Mobile security - Security of data Uncontrolled terms:g-SDH - Hierarchical identity-based signature - Identity-based proxy signatures - Key generation protocols - Security analysis - Standard model - Strong diffie-hellman - Without random oracles Classification code:723 Computer Software, Data Handling and Applications DOI:10.1109/ICITEC.2014.7105602 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993023 Title:What special about Top-N recommendation for mobile app stores Authors:Zhu, Taojiang (1); Yan, Jiabao (2); Zhao, Ying (1) Author affiliation:(1) Dept. of Computer Science and Technology, Tsinghua University, Beijing, China; (2) Dept. of Software Engineering, Tsinghua University, Beijing, China; (3) Research Institute, Tsinghua University in Shenzhen, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:306-310 Article number:7105624 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:As the number of mobile applications grows rapidly, personalized recommendation for mobile apps becomes more and more important to mobile App stores. While most of the current works focused on proposing novel recommendation models for mobile apps, the lack of understanding of user download behaviors still remains a problem. Towards this end, we conducted a user behavior study on a large scale real world dataset, focusing on three kinds of biases to user download behaviors, namely, browsing history, app update history, and app categories. The dataset we used in this paper was constructed from Mobile Market (MM), an online mobile app store released by China Mobile, server logs from April 16, 2013 to June 13, 2013, containing 12,125,702 users and 67,577 apps. © 2014 IEEE. Number of references:10 Main heading:Behavioral research Uncontrolled terms:Browsing history - China mobiles - Mobile applications - Mobile apps - Mobile markets - Personalized recommendation - Server logs - User behaviors Classification code:971 Social Sciences DOI:10.1109/ICITEC.2014.7105624 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc.Compendex references:YES Accession number:20152700992716 Title:Adaptive suppression method of radar jamming in joint time frequency domain Authors:Meng, Jinli (1); Fu, Youguang (1); Chen, Yi (1); Wang, Ning (1); Zhang, Yujie (1) Author affiliation:(1) Department of Pre-research, Nanjing Research Institute of Electronics Technology, Nanjing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:212-215 Article number:7105604 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:A novel radar adaptive jamming suppression method based on joint time-frequency transformation is proposed. Confronting the challenges of non-stationary jamming signals that radar receives, a new technique is presented to deal with them. Firstly, the time-frequency characteristics of radar received signal are analyzed by short-time Fourier transform (STFT). Secondly, an adaptive filter function is constructed in STFT domain. By applying a proper threshold to the time-frequency modulus spectrum (TFMS), strong jamming signal can be adaptively eliminated, polluted signal can be shrunk slightly and the useful signals can be retained. Finally, simulations validate the efficiency of our new method. © 2014 IEEE. Number of references:10 Main heading:Radar Controlled terms:Adaptive filtering - Frequency domain analysis - Jamming Uncontrolled terms:Adaptive suppression - Jamming suppression method - Radar jamming - Short time Fourier transforms - Time frequency analysis - Time frequency characteristics - Time frequency domain - Time-frequency transformation Classification code:404 Civil Defense and Military Engineering - 711 Electromagnetic Waves - 716.2 Radar Systems and Equipment - 731.1 Control Systems DOI:10.1109/ICITEC.2014.7105604 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993027 Title:Privacy protection beyond encryption for cloud big data Authors:Cheng, Hongbing (1); Wang, Weihong (1); Rong, Chunming (2) Author affiliation:(1) College of Computer Science, Zhejiang University of Technology, Hangzhou, China; (2) Department of Computer Science, University of Stavanger, Stavanger, Norway Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:188-191 Article number:7105598 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:As the paradigm of future information technology architecture, cloud computing has been a hot issue since it emerged. However, data privacy protection is perceived as the most important challenge that cloud tenants concern, and conventional protection technology sometimes can not be applied to cloud data efficiently. In this paper, a scheme is proposed to protect the tenants' data privacy in cloud computing beyond encryption. In the scheme, in order to protect the data privacy which will be stored in the cloud, tenants only need to do some hash operations on privacy data rather than encryption. Analysis and simulation experiment results show that the proposed scheme can protect the tenants' data privacy efficiently. © 2014 IEEE. Number of references:12 Main heading:Data privacy Controlled terms:Big data - Cloud computing - Cryptography - Hash functions - Security of data Uncontrolled terms:Analysis and simulation - Cloud data - Conventional protections - Data privacy protections - Hash operations - Information technology architectures - Privacy protection Classification code:716 Telecommunication; Radar, Radio and Television - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications - 722.4 Digital Computers and Systems - 723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing - 921 Mathematics DOI:10.1109/ICITEC.2014.7105598 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993021 Title:Research of the retransmission policy based on compound parameters in SCTP-CMT Authors:Shen, Huahua (1); Wang, Cong (1); Ma, Wenfeng (1); Zhang, Dongmei (1) Author affiliation:(1) Institute of Communications Engineering, PLA University of Science and Technology, Nanjing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:25-28 Article number:7105564 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:In order to solve the rbuf blocking in concurrent multipath transfer, firstly, this paper analyzes the reason for receiving buffer blocking and the disadvantages of traditional retransmission policies. And then, it proposes an improved retransmission policy - RTX-CR (retransmission-congestion window and RTT), which can reduce rbuf blocking. The simulation indicates that the retransmission policy can reduce receive buffer blocking and achieve better transmission performance. © 2014 IEEE. Number of references:10 Main heading:Multipath propagation Uncontrolled terms:Compound parameters - Concurrent multipath transfers - Congestion window - Rbuf blocking - receive buffer blocking - Retransmission policies - Retransmissions - Transmission performance Classification code:711 Electromagnetic Waves - 716 Telecommunication; Radar, Radio and Television DOI:10.1109/ICITEC.2014.7105564 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc.Compendex references:YES Accession number:20152700992732 Title:Improved difference method for fast-moving object recognition in complex background Authors:Li, Xiaoping (1); Ren, Xulong (2); Song, Ye (2); Liu, Qiongxin (2) Author affiliation:(1) School of Continuing Education, Beijing Institute of Technology, Beijing, China; (2) School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:137-140 Article number:7105588 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Aiming at the problem that it is difficult to identify the fast moving objects in complex background, the paper proposes a method that establishes the inter-frame background sequence, and then multiply the pixel grayscale in the difference image. It defines constraint rules for public background image, gets moving target region with higher-order cumulant and block grayscale, and further highlights the edges of moving objects, largely eliminating the natural environment noise from lighting, scene and shooting angle changes. Experimental results show that this method can maintain real-time tracking of moving objects, identify non-overlapping moving targets, and provide the basis for subsequent target analysis. © 2014 IEEE. Number of references:8 Main heading:Target tracking Controlled terms:Object recognition Uncontrolled terms:Complex background - Difference images - difference multiplication - Gray scale - Higher order cumulants - Moving object recognition - Natural environments - Real time tracking Classification code:716 Telecommunication; Radar, Radio and Television - 716.2 Radar Systems and Equipment DOI:10.1109/ICITEC.2014.7105588 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993060 Title:An SVD-based fragile watermarking scheme with grouped blocks Authors:Kang, Qingbo (1); Li, Ke (2); Chen, Hu (2) Author affiliation:(1) Chengdu Yufei Information Engineering Co., Ltd., Chengdu, China; (2) National Key Laboratory of Fundamental Science on Synthetic Vision, Sichuan University, Chengdu, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:172-179 Article number:7105595 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:This paper proposes a novel fragile watermarking scheme for digital image authentication which is based on Singular Value Decomposition(SVD) and grouped blocks. The watermark bits which include two types of bits are inserted into the least significant bit(LSB) plane of the host image using the adaptive chaotic map to determine the positions. The groped blocks break the block-wise independence and therefore can withstand the Vector Quantization attack(VQ attack). The inserting positions are related to the statistical information of image block data, in order to increase the security and provide an auxiliary way to authenticate the image data. The effectiveness of the proposed scheme is checked by a variety of attacks, and the experimental results prove that it has a remarkable tamper detection ability and also has a precise locating ability. © 2014 IEEE. Number of references:19 Main heading:Singular value decomposition Controlled terms:Authentication - Chaotic systems - Digital watermarking - Image watermarking - Vector quantization - Watermarking Uncontrolled terms:Digital image - Fragile watermarking - Image authentication - Image block data - Least significant bits - Statistical information - Tamper detection - Watermark bits Classification code:723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing - 811.1.1 Papermaking Processes - 921 Mathematics DOI:10.1109/ICITEC.2014.7105595 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993062 Title:Analysis of the influence to productivity of software corrective maintenance using an economic model Authors:Huang, Kai (1); Kong, Xiaoying (1); Sandrasegaran, Kumbesan (1) Author affiliation:(1) Faculty of Engineering and Information Technology, University of Technology, Sydney, Australia Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:117-121 Article number:7105584 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:This paper presents an economic model for productivity of software corrective maintenance. The productivity is modeled using economic value of the maintenance process as the output, and the pre-committed fixed cost and variable cost as input. The relationship of the economic value and these cost components are modeled using analytical theory of investment. The values of corrective maintenance process are analyzed. A simulation approach is demonstrated to analyze the influences to the productivity in corrective maintenance. This approach provides a tool to identify and analyze the optimal parameters in productivity using the economic model and simulation. © 2014 IEEE. Number of references:14 Main heading:Computer software maintenance Controlled terms:Computer software - Cost accounting - Costs - Economics - Maintenance - Productivity Uncontrolled terms:Analytical theory - Corrective maintenance - Economic modeling - influence factor - Maintenance process - Optimal parameter - simulation - Simulation approach Classification code:723 Computer Software, Data Handling and Applications - 911 Cost and Value Engineering; Industrial Economics - 911.1 Cost Accounting - 913.1 Production Engineering - 913.5 Maintenance - 971 Social Sciences DOI:10.1109/ICITEC.2014.7105584 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993034 Title:A hot topic detection method for Chinese Microblog based on topic words Authors:Zheng, Jun (1); Li, Yuanjun (1) Author affiliation:(1) School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China Corresponding author:Zheng, Jun Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:262-266 Article number:7105615 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Microblog is a kind of new network medium which sprang up quickly. Detection and tracking of hot topics through Microblog has attracted wide attentions from scholars at home and abroad in recent years. The algorithm which aims at finding topics in long text messages such as in traditional news websites and blogs, etc. can't effectively be used in disposing the Microblog data with a property of sparseness. This paper contributes a method, which aims to identify hot topics in Microblog based on the topic words. This method, throughpre-treating the Microblog data and dividing the time-window, extracts topic words in the Microblog data according to the two factors of increasing rate of word frequency and relative word frequency from Microblog data in every time-window. And then extracts and clusters the topic words according to the similarity among them, sieving for a suitable cluster of topic words so as to describe the hot topic and realize the detection of hot topic in Microblog. Through experimental verification, this method can improve the efficiency of detection to a certain extent, and raise the recall ratio and the precision ratio, so as to find hot topic in Microblog effectively and timely. © 2014 IEEE. Number of references:10 Main heading:Data mining Controlled terms:Clustering algorithms - Linguistics Uncontrolled terms:Hot topics - Micro-blog - TDT - topic - word Classification code:721 Computer Circuits and Logic Elements - 723.3 Database Systems - 903.2 Information Dissemination DOI:10.1109/ICITEC.2014.7105615 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993031 Title:Fusion of visible image and infrared image based on Contourlet transform and improved spatial frequence Authors:Liao, Jiawen (1); Huang, Jijiang (1); Wang, Zefeng (1); Wang, Huawei (1); Yang, Lei (1); Yi, Bo (1); Ren, Long (1) Author affiliation:(1) Xi'An Institute of Optics and Precious Mechanics, Science Academy of China, Xi'an, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:322-325 Article number:7105626 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Pointing at the defect of Space Frequency Algorithm in abstracting detail information used in Regional Feature Self-Adaptive Image Fusion Algorithm, an improved Spatial Frequency Algorithm is proposed. Firstly, the histogram specification is used to adjust pixel values of the infrared image. Secondly, the multi-scale decomposition is performed on visible image and the adjusted infrared image using Contourlet transform. Finally, low-frequency sub-band is fused using a rule based on Regional Energy rather than the simple weighted sum method. Other sub-bands are fused using the Improve Spatial Frequency rule. The experimental results show that the proposed method preserves more details of the visible image and obtains clear target information in the infrared image. A better effect is achieved compared to the reference article. © 2014 IEEE. Number of references:10 Main heading:Image fusion Controlled terms:Algorithms - Graphic methods - Image enhancement - Infrared imaging - Specifications Uncontrolled terms:Contourlet transform - Histogram specifications - Multi-scale Decomposition - regional energy - Regional feature - Spatial frequency - Target information - Weighted sum method Classification code:723 Computer Software, Data Handling and Applications - 746 Imaging Techniques - 902.1 Engineering Graphics - 902.2 Codes and Standards - 921 Mathematics DOI:10.1109/ICITEC.2014.7105626 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993033 Title:Research on the IPv6 and sensor network based terrestrial ecosystem flux research network Authors:Liu, Xiaohan (1); Gu, Dujuan (1); Yang, Zhichao (1); Wu, Chao (1); Yan, Baoping (1); Li, Wenqing (2); Su, Wen (2); He, Honglin (2) Author affiliation:(1) Computer Network Information Center, Chinese Academy of Sciences, Beijing, China; (2) Institute of Geographic Sciences and Natural Resources Research, Chinese Academy of Sciences, Beijing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:15-19 Article number:7105562 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:For the actual demand for carbon cycle research in China, from 2012 to 2013, we started the research and development on IPv6-based Chinese terrestrial ecosystem flux research network. We set up IPv6 and sensor network based real-time carbon flux observation system in ten field stations. We complete data acquisition, data transmission, data storage and sharing from flux observation tower to field station, then to data center. Researchers develop a series of scientific applications in the research network. © 2014 IEEE. Number of references:17 Main heading:Digital storage Controlled terms:Carbon - Data acquisition - Ecology - Ecosystems - Sensor networks Uncontrolled terms:Carbon fluxes - Field Station - Flux observation - IPv6 - Research and development - Research networks - Scientific applications - Terrestrial ecosystems Classification code:454.3 Ecology and Ecosystems - 722.1 Data Storage, Equipment and Techniques - 723.2 Data Processing and Image Processing - 732 Control Devices - 804 Chemical Products Generally DOI:10.1109/ICITEC.2014.7105562 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992728 Title:A new re-shaping method for reducing delay jitter on AFDX network Authors:Gao, Xu (1); Fu, Yuzhuo (1); Liu, Ting (1); Wang, Jiafang (2) Author affiliation:(1) School of Microelectronics, Shanghai Jiaotong University, Shanghai, China; (2) School of Computer Science and Technology, Heilongjiang University, Harbin, Heilongjiang, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:29-33 Article number:7105565 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:AFDX (Avionics Full Duplex Switched Ethernet) as the new generation avionics databus, represents a major improvement in bandwidth and security. With the development of avionics system, delay jitter is becoming a more and more significant indicator for the designer. This paper presents a new re-shaping (RSP) method to reduce delay jitter by assigning fixed transmission order to different virtual links based on historical information and priority. Compared with traditional scheduling algorithms FIFO (first in first out), RSP effectively reduces delay jitter in the scenario of conflict of different virtual links. © 2014 IEEE. Number of references:10 Main heading:Ethernet Controlled terms:Avionics - Delay control systems - Jitter - Scheduling algorithms Uncontrolled terms:AFDX - Avionics full duplex switched ethernets - Avionics systems - Delay jitters - First in first outs - Historical information - reshaping - Transmission order Classification code:715 Electronic Equipment, General Purpose and Industrial - 722.3 Data Communication, Equipment and Techniques - 723 Computer Software, Data Handling and Applications - 731.1 Control Systems - 921 Mathematics DOI:10.1109/ICITEC.2014.7105565 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992727 Title:Estimation of distribution algorithm for solving hybrid flow-shop scheduling problem Authors:Liu, Xiaobing (1); Jiao, Xuan (1); Zhang, Fengchao (2) Author affiliation:(1) School of Management, DalianUniversity of Techno Logy, Dalian, Liaoning, China; (2) Software Technology Institute, Dalian Jiaotong University, Dalian, Liaoning, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:56-59 Article number:7105571 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:According to the characteristics of hybrid flow shop scheduling problem (HFSP), this paper designed encoding and decoding methods based on permutation, established a probability model to describe the problem solution space, and proposed a estimation of distribution algorithm (EDA) to solve the hybrid flow shop scheduling problem. The algorithm based on probabilistic models generates new individuals by random sampling methods and updates the probabilistic models based on the dominant population. Based on examples of numerical simulation and compared with the existing algorithm, the paper verified the effectiveness and robustness of the algorithm. © 2014 IEEE. Number of references:10 Main heading:Scheduling Controlled terms:Algorithms - Design of experiments - Evolutionary algorithms - Heuristic algorithms - Machine shop practice - Probability distributions Uncontrolled terms:Encoding and decoding - Estimation of distribution algorithm (EDA) - Estimation of distribution algorithms - Hybrid flow shop scheduling - Hybrid flowshop scheduling problem (HFSP) - Probabilistic models - Probability modeling - Random sampling method Classification code:604.2 Machining Operations - 723 Computer Software, Data Handling and Applications - 723.1 Computer Programming - 901.3 Engineering Research - 912.2 Management - 921 Mathematics - 922.1 Probability Theory DOI:10.1109/ICITEC.2014.7105571 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993046 Title:Software test cases generation based on improved particle swarm optimization Authors:Huang, Ming (1); Zhang, Chunlei (1); Liang, Xu (1) Author affiliation:(1) Software Technology Institute, Dalian Jiaotong University, Dalian, Liaoning, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:52-55 Article number:7105570 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:The analysis of test case generation based on particle swarm algorithm introduced the group self-activity feedback (SAF) operator and Gauss mutation (G) changing inertia weight to improve the performance of particle swarm optimization (PSO). Using the improved algorithm in software test case, experiments show that the introduction of a single path fitness function structure and multi-path fitness calculation of parallel thinking are superior to the iteration time in single path test than standard PSO, and more efficient in multi-path test case generation. © 2014 IEEE. Number of references:12 Main heading:Particle swarm optimization (PSO) Controlled terms:Algorithms - Iterative methods - Software testing - Testing Uncontrolled terms:Active feedback - Fitness calculation - Fitness functions - Gauss Mutation - Particle swarm algorithm - Test case - Test case generation - Test cases generation Classification code:423.2 Non Mechanical Properties of Building Materials: Test Methods - 723 Computer Software, Data Handling and Applications - 723.5 Computer Applications - 921 Mathematics - 921.6 Numerical Methods DOI:10.1109/ICITEC.2014.7105570 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993037 Title:Vietnamese handwriting recognition for automatic data entry in enrollment forms Authors:Pham-Van, Hung (1); Nguyen, Hoach The (2); Wu, Shinq-Jen (3) Author affiliation:(1) Vietnam Academy of Science and Technology, Viet Nam; (2) Hanoi Architecture University, Viet Nam; (3) Dayeh University, Taiwan Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:141-145 Article number:7105589 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:This paper presents an efficient method of feature extraction for Vietnamese handwriting and an approach to group Vietnamese characters into similar sub-classes to support recognition process. Furthermore, it's the algorithm to look up two dictionaries simultaneously with least database storage in the post-processing in order to increase the recognition accuracy. The results of our approach on recognizing Vietnamese handwriting such as name, birthplace and birthday are also presented. By using Vietnamese Personal Name Dictionary for post-processing, the recognition accuracy for Vietnamese characters, words, person name is 91.23%, 85.41% and 96.03% in comparison with 75% 79.67% and 77.81% from common methods correlatively. The statistics are based on 2384, 2248 and 302 testing samples of Vietnamese character, words and personal name respectively. The recognition accuracy for province/city name is 99.8% among 64 provinces of Vietnam. Our approach is embedded into the automatic data entry system for enrollment forms, VnHandwritten1.0, the first commercial application in recognizing Vietnamese handwriting in Vietnam. On this application, our method proves itself an efficient method for commercial purpose. © 2014 IEEE. Number of references:12 Main heading:Character recognition Controlled terms:Digital storage - Feature extraction Uncontrolled terms:Commercial applications - Database storage - Handwriting recognition - Personal names - postprocessing - Recognition accuracy - Recognition process - Testing samples Classification code:716 Telecommunication; Radar, Radio and Television - 722.1 Data Storage, Equipment and Techniques - 723 Computer Software, Data Handling and Applications DOI:10.1109/ICITEC.2014.7105589 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993025 Title:Small target detection in sea clutter based on linear prediction Authors:Liu, Yunfeng (1); Suo, Jidong (1); Liu, Xiaoming (1); Li, Bo (1) Author affiliation:(1) College of Information Science and Technology, Dalian Maritime University, Dalian, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:225-228 Article number:7105607 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:To detect small target in sea clutter, a method based on local backscattering amplitude prediction error is proposed in the paper. This approach builds on linear prediction: calculating the mean of the fourth power of prediction error of backscattering amplitude. By analyzing the IPIX radar datasets, it is found that the prediction error's mean and variance of the range bin containing a small target is much smaller than that of other range bins containing only sea clutter. The range bin, in which a small target is contained, gets smaller prediction error than those bins in which only pure sea clutter is occupied. Upon this point, we detect the small target in sea clutter with small amount of priori knowledge. The experimental results show that the proposed method can effectively detect small target in sea clutter with better performance. © 2014 IEEE. Number of references:13 Main heading:Radar clutter Controlled terms:Backscattering - Bins - Clutter (information theory) - Errors - Forecasting - Target tracking Uncontrolled terms:Backscattering amplitude - Better performance - fourth power - Linear prediction - Prediction errors - Sea clutters - Small target detection - Small targets Classification code:694.4 Storage - 711 Electromagnetic Waves - 716.1 Information Theory and Signal Processing - 716.2 Radar Systems and Equipment - 731 Automatic Control Principles and Applications - 921 Mathematics DOI:10.1109/ICITEC.2014.7105607 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992730 Title:Non-linear signal processing with improved STAM algorithm Authors:Li, Zhixiang (1); Wang, Yinlong (1); Gao, Xiufeng (1); Wang, Xiwu (1); Li, Qianjin (1); Li, Xi (1) Author affiliation:(1) Department of Information Engineering, Ordnance Engineering College, Shijiazhuang, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:208-211 Article number:7105603 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Symmetric Table Lookup Addition Method (STAM) is an efficient approach to implement non-linear function approximation with hardware, in which only lookup tables and addition are involved, and size of table could be reduced remarkably due to symmetry of the second term of Taylor series. Nevertheless, the dominant memory occupier is the first term, which still uses relatively big table. An improved method based on differential decomposition was brought forth aiming at relieving the problem, and hyperbolic tangent sigmoid function was implemented on FPGA using the improved algorithm. Experiment results showed that 17% to 30% of memory was saved after improvement. © 2014 IEEE. Number of references:10 Main heading:Table lookup Controlled terms:Algorithms - Field programmable gate arrays (FPGA) - Functions - Hyperbolic functions - Signal processing Uncontrolled terms:Addition method - Differential decomposition - Hyperbolic tangent - Non linear - Non-linear signal processing - Nonlinear functions - Sigmoid function Classification code:716.1 Information Theory and Signal Processing - 721.3 Computer Circuits - 723.1 Computer Programming - 921 Mathematics DOI:10.1109/ICITEC.2014.7105603 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992723 Title:Model- and constraint-based engineering of complex software ecosystems Authors:Rausch, Andreas (1); Bergner, Sandra (1); Wang, Daning (1) Author affiliation:(1) Software Systems Engineering, Department of Computer Science, TU Clausthal, Clausthal-Zellerfeld, Germany Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:77-82 Article number:7105576 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:No software is an island. It is executed by hardware and interacts with its environment. So-called software systems are complicated hierarchical systems. Competent engineers carefully engineer them. In contrast, complex systems, like biological ecosystems, railway systems and the Internet itself, have never been developed and tested as a whole by a team of engineers. Nevertheless, those complex systems have the ability to evolve without explicit control by anyone, and they are more robust to deal with problems at the level of its constituent elements compared to classical engineered systems. Consequently in this article we introduce the concept of complex software ecosystems comprising of interacting adaptive software systems and human beings. Ecosystems achieve the demanded flexibility and dependability by means of a kind of higher-level regulatory system. Thereby equilibrium is continuously preserved through the appropriate balance between self-adaption and self-control capabilities of ecosystem's participants. We will outline a methodology to support engineering of ecosystems by integrating a model- and constraint-based engineering approach and applying it during design and run time. The open-world semantics of constraints set up a frame for the behavior of participants and the ecosystem itself. Violations of constraints can be identified during design time, but also provide a knowledge transfer to run time. Constraints are additionally monitored and enforced during run time. Thus, we propose an evolutionary engineering approach covering the whole life-cycle for forever active complex software ecosystems. © 2014 IEEE. Number of references:9 Main heading:Ecosystems Controlled terms:Computer software - Ecology - Engineers - Hierarchical systems - Knowledge management - Railroad transportation - Semantics Uncontrolled terms:Adaptive software systems - Biological ecosystem - Complex software - Constituent elements - Constraint-based - Evolutionary engineering - Semantics of constraints - Software systems Classification code:433.1 Railroad Transportation, General - 454.3 Ecology and Ecosystems - 723 Computer Software, Data Handling and Applications - 723.5 Computer Applications - 903.2 Information Dissemination - 903.3 Information Retrieval and Use - 912.4 Personnel - 961 Systems Science DOI:10.1109/ICITEC.2014.7105576 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993056 Title:Intelligent communication network research of isolation security model based on the anomaly detection Authors:Cao, Wantian (1); Jiang, Chengzhi (1) Author affiliation:(1) State Grid Smart Grid Research Institute, No.8 Nanrui Road, Nanjing City, Jiangsu Province, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:167-171 Article number:7105594 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Power distribution communication network is an important part of smart grid. Through the study of the communication network security isolation key theory and technology. This paper analyses the anomaly detection method for the network service and presents a kind of network security isolation model based on the anomaly detection. The paper describes the overall concept, network structure, operation flow and key technical modules of the model, which provides a feasible solution to the network information security. © 2014 IEEE. Number of references:5 Main heading:Network security Controlled terms:Mobile security - Security of data - Smart power grids Uncontrolled terms:Anomaly detection - Anomaly detection methods - Intelligent communication - Network information securities - Physical isolation - Power distribution communication networks - Security isolations - Security protection Classification code:706.1 Electric Power Systems - 723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing DOI:10.1109/ICITEC.2014.7105594 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993022 Title:An region of interest based video compression for indoor surveillance Authors:Qiang, Ganfeng (1); Yue, Lijun (1); Yu, Fengqi (1) Author affiliation:(1) Department of Integrated Electronics, Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen, Guangdong, China; (2) Shenzhen College of Advanced Technology, University of Chinese Academy of Sciences, Chinese University of Hong Kong, Hong Kong, Hong Kong Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:157-160 Article number:7105592 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Motion detection is an important part in video surveillance. When it is combined with video compression and transmission, the bit rate can be further minimized under a fixed background. In this paper, we show that under indoor circumstance, most of the macro blocks (MB) in I frame are redundant in the sequence. In H.264, standard pulse code modulation (PCM) is chosen to encode MBs by writing pixel values directly into the bit stream. Experiments show that surveillance sequence hardly uses this PCM in encoding, leaving us an interface to encode background MBs with. The foreground is encoded normally using H.264, which causes little degradation in video quality while the bit rate is dramatically decreased. In decoder, PCM MB is decoded accordingly. © 2014 IEEE. Number of references:10 Main heading:Security systems Controlled terms:Decoding - Encoding (symbols) - Image compression - Image segmentation - Monitoring - Motion analysis - Motion Picture Experts Group standards - Pulse code modulation - Space surveillance - Video signal processing Uncontrolled terms:H.264/AVC - Indoor surveillance - Macro block - Motion detection - Pixel values - Region of interest - Video quality - Video surveillance Classification code:404.1 Military Engineering - 716 Telecommunication; Radar, Radio and Television - 716.4 Television Systems and Equipment - 723.2 Data Processing and Image Processing - 914.1 Accidents and Accident Prevention - 941 Acoustical and Optical Measuring Instruments - 942 Electric and Electronic Measuring Instruments - 943 Mechanical and Miscellaneous Measuring Instruments - 944 Moisture, Pressure and Temperature, and Radiation Measuring Instruments DOI:10.1109/ICITEC.2014.7105592 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993043 Title:Cloud database systems: A model conversion in databases Authors:Muntjir, Mohd (1); Asadullah, Mohd (1); Hassan, Shabbir (1); Hussain, Altaf (1) Author affiliation:(1) Taif University, Saudi Arabia Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:280-285 Article number:7105619 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Relational databases have controlled the Information Technology businesses for more than four decades. However, there has been a revolution widely accepted in the way Information Technology is being used and observed. Mostly, Standalone systems used to access using internet-based software, network with huge bandwidth and dedicated servers with multiple distributed servers. Cloud Database emphasizes the applications of actual traditional databases specifically to scalability, dynamic appliances and ease of use facility. Databases in Cloud are basically used for data through tools such as business intelligence, data mining and data warehousing. These tools provide capability to create new business strategies and also show scalability and elasticity nature. They are able to handle large amount of data as well. The main purpose of this paper is to review the requirements of the standard way in the cloud databases and multiple frameworks. Furthermore, it determines the contest to develop and maintain cloud databases that fulfill the user requirements. © 2014 IEEE. Number of references:23 Main heading:Distributed computer systems Controlled terms:Cloud computing - Data mining - Data warehouses - Internet - Scalability Uncontrolled terms:Business strategy - Cloud database - Dedicated servers - Distributed servers - Model conversion - Relational Database - Standalone systems - User requirements Classification code:716 Telecommunication; Radar, Radio and Television - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications - 722.4 Digital Computers and Systems - 723 Computer Software, Data Handling and Applications - 723.3 Database Systems - 961 Systems Science DOI:10.1109/ICITEC.2014.7105619 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700992718 Title:Sentiment analysis method based on the focus sentence and context for Chinese comment text Authors:Liu, Rui (1); Jin, Ling (1) Author affiliation:(1) School of Science and Engineering, Beihang University, Beijing, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:267-270 Article number:7105616 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:With the increasing popularization and extensive application of Internet, more and more netizens begin to post their views, opinions and comments on the Internet. The sentiment analysis on these comment texts will become a focus for future research. According to the characteristics of Chinese comment text, a method based on the text sentiment analysis of the focus sentence and context is put forward in this paper, and it proves a certain validity by experiments. © 2014 IEEE. Number of references:10 Main heading:Data mining Controlled terms:Internet Uncontrolled terms:comment text - context - Netizens - Sentiment analysis - the focus sentence Classification code:716 Telecommunication; Radar, Radio and Television - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications - 723 Computer Software, Data Handling and Applications DOI:10.1109/ICITEC.2014.7105616 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc. Accession number:20152700993057 Title:An improved algorithm of OMKC based on the optimized perceptron with the best kernel Authors:Cheng, Bingjie (1); Zhong, Shangping (1) Author affiliation:(1) College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China Source title:Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Abbreviated source title:Proc. Int. Conf. Inf. Technol. Electron. Commer., ICITEC Part number:1 of 1 Issue date:May 11, 2015 Publication year:2014 Pages:247-251 Article number:7105612 Language:English ISBN-13:9781479952984 Document type:Conference article (CA) Conference name:2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014 Conference date:December 20, 2014 - December 21, 2014 Conference location:Dalian, China Conference code:112291 Publisher:Institute of Electrical and Electronics Engineers Inc. Abstract:Online Multiple Kernel Classification (OMKC) algorithm has been a popular method for exploring effective online combination of multiple kernel classifiers. The framework for OMKC is commonly obtained by learning multiple kernel classifiers and simultaneously their linear combination. However, the traditional perceptron algorithm which OMKC algorithm bases on does not achieve a much smaller mistake rate. In this paper, we put forward a novel algorithm based on OMKC using an improved perceptron algorithm. Our perceptron algorithm is applied with the best kernel. The algorithm produces an online validation procedure to search for the best kernel among the pool of kernels using the first 10% training examples. By using histograms analysis, our proposed algorithm can achieve smaller mistake rate and less time consuming. Extensive experimental results on twelve data sets demonstrate the effectiveness and efficiency of our algorithm. © 2014 IEEE. Number of references:17 Main heading:Algorithms Controlled terms:Classification (of information) - Social networking (online) Uncontrolled terms:Effectiveness and efficiencies - Linear combinations - Multi-kernel - Multiple kernels - Online learning - Perceptron - Perceptron algorithms - the best kernel Classification code:716.1 Information Theory and Signal Processing - 723 Computer Software, Data Handling and Applications DOI:10.1109/ICITEC.2014.7105612 Database:Compendex Compilation and indexing terms, Copyright 2015 Elsevier Inc.