The Community for Technology Leaders
2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (2016)
Shanghai, China
May 30, 2016 to June 1, 2016
ISBN: 978-1-5090-0804-9
TABLE OF CONTENTS

Table of contents (Abstract)

pp. 1-6

Cover, front & back (Abstract)

pp. c1-c3

Title & copyright page (Abstract)

pp. 1-2

Message from conference chair (Abstract)

Huaikou Miao , Shanghai University, China
pp. 1

Message from program chair (Abstract)

Yihai Chen , Shanghai University, China
pp. 1

Data computations for Applied Informatics (Abstract)

Naohiro Ishii , Department of Information Science, Aichi Institute of Technology, Yakusacho, Toyota, Japan 470-0392
pp. 1

Social service innovations with information technologies (Abstract)

Tokuro Matsuo , Advanced Institute of Industrial Technology, Japan
pp. 1

A self-organizing algorithm for community structure analysis in complex networks (Abstract)

Hanlin Sun , Big Data Research Centre, Xi'an University of Posts and Telecommunications, China
Wei Jie , School of Computing and Technology, University of West London, UK
Christian Sauer , School of Computing and Technology, University of West London, UK
Sugang Ma , Big Data Research Centre, Xi'an University of Posts and Telecommunications, China
Gang Han , Department of Electronic Science and Technology, Northwestern Polytechnical University, China
Wei Xing , CRUK Manchester Institute, University of Manchester, UK
pp. 5-12

Automatic verification of non-recursive algorithm of Hanoi Tower by using Isabelle Theorem Prover (Abstract)

Huazhen Xu , Computer Information Engineering School, Jiangxi Normal University, Nanchang 330022, China
Zhen You , State International S&T Cooperation Base of Networked Supporting Software, Jiangxi Normal University, Nanchang 330022, China
Jinyun Xue , State International S&T Cooperation Base of Networked Supporting Software, Jiangxi Normal University, Nanchang 330022, China
pp. 13-18

An efficient Uniform Integrated Advection algorithm for Finite Time Lyapunov Exponent field computation on GPU and MIC (Abstract)

Wang Fang , College of Computer Scinece, National University of Defense Technology, Changsha, Hunan, China
Deng Liang , Computational Aerodynamics Insititute, China Aerodynamics Research and Development Center, Mianyang, Sichuan, China
Zhao Dan , Computational Aerodynamics Insititute, China Aerodynamics Research and Development Center, Mianyang, Sichuan, China
Li Sikun , College of Computer Scinece, National University of Defense Technology, Changsha, Hunan, China
pp. 19-26

An improved model for PM2.5 inference based on support vector machine (Abstract)

Yuhan Dong , Graduate School at Shenzhen, Tsinghua University, China
Hui Wang , Graduate School at Shenzhen, Tsinghua University, China
Lin Zhang , Graduate School at Shenzhen, Tsinghua University, China
Kai Zhang , Graduate School at Shenzhen, Tsinghua University, China
pp. 27-31

Projection search for approximate nearest neighbor (Abstract)

Cheng Feng , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
Bo Yang , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
pp. 33-38

Inferring gene regulatory networks based on spline regression and Bayesian group lasso (Abstract)

Yue Fan , School of Electrical and Information Engineering Xi'an Jiaotong University, China
Qinke Peng , School of Electrical and Information Engineering Xi'an Jiaotong University, China
pp. 39-42

A hybrid VNS based framework for biomass transportation (Abstract)

Hiba Yahyaoui , College of Arts and Applied Sciences, Dhofar university, Sultanate of Oman
Abdelkader Dekdouk , College of Arts and Applied Sciences, Dhofar university, Sultanate of Oman
Saoussen Krichen , LARODEC, Institut Superieur de Gestion, University of Tunis, Tunisia
pp. 43-48

Ultra High Frequency Polynomial and Cosine Artificial Higher Order Neural Networks (Abstract)

Ming Zhang , Christopher Newport University, Newport News, VA 23606, USA
Chenrui Hu , Christopher Newport University, Newport News, VA 23606, USA
pp. 49-56

Hierarchical Latent Semantic Mapping for automated topic generation (Abstract)

Guorui Zhou , School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, China, 100876
Guang Chen , School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, China, 100876
pp. 57-63

Document representation based on semantic smoothed topic model (Abstract)

Ying Liu , Information and Engineering College, Capital Normal University, Beijing, China
Wei Song , Information and Engineering College, Capital Normal University, Beijing, China
Lizhen Liu , Information and Engineering College, Capital Normal University, Beijing, China
Hanshi Wang , Information and Engineering College, Capital Normal University, Beijing, China
pp. 65-69

A novel fuzzy omni-directional gait planning algorithm for biped robot (Abstract)

Haobin Shi , School of Computer Science, Northwestern Polytechnical University, Xian, China
Xuesi Li , School of Computer Science, Northwestern Polytechnical University, Xian, China
Weihao Liang , School of Electronics and Information, Northwestern Polytechnical University, Xian, China
Ming'ai Dang , School of Software and Microelectronics, Northwestern Polytechnical University, Xian, China
Huahui Chen , School of Electronics and Information Northwestern Polytechnical University, Xian, China
Shixiong Wang , School of Electronics and Information Northwestern Polytechnical University, Xian, China
pp. 71-76

The optimization of beer recipe based on an improved ant colony optimization (Abstract)

Song Zheng , School of Automation, Hangzhou Dianzi University, China
Xiaoqing Zheng , School of Automation, Hangzhou Dianzi University, China
Chunlin Wang , School of Automation, Hangzhou Dianzi University, China
pp. 77-80

Characteristics of analysis methods for the Impression Evaluation Method by Space (Abstract)

Shunsuke Akai , Graduate School of Information Science, Kyoto Institute of Technology, Japan
Teruhisa Hochin , Graduate School of Information Science, Kyoto Institute of Technology, Japan
Hiroki Nomiya , Graduate School of Information Science, Kyoto Institute of Technology, Japan
pp. 81-86

Team negotiation based on solidarity behavior: A concession strategy in the team (Abstract)

Jian Wang , System Engineering Institute, School of Automation, Huazhong University of Science and Technology, Wuhan Hubei, China
Jingqiu Gong , System Engineering Institute, School of Automation, Huazhong University of Science and Technology, Wuhan Hubei, China
pp. 87-92

A hybrid method for bilingual text sentiment classification based on deep learning (Abstract)

Guolong Liu , School of Computer and Information Science, Southwest University, Chongqing, China
Xiaofei Xu , School of Computer and Information Science, Southwest University, Chongqing, China
Bailong Deng , School of Computer and Information Science, Southwest University, Chongqing, China
Siding Chen , School of Computer and Information Science, Southwest University, Chongqing, China
Li Li , School of Computer and Information Science, Southwest University, Chongqing, China
pp. 93-98

Functional classification study for mathematical formulas retrieval (Abstract)

Sai Hong , School of Information Science & Engineering, Lanzhou University, LZU, Gansu Province, China
Wei Su , School of Information Science & Engineering, Lanzhou University, LZU, Gansu Province, China
He Lin , School of Information Science & Engineering, Lanzhou University, LZU, Gansu Province, China
Xianchao Lv , School of Information Science & Engineering, Lanzhou University, LZU, Gansu Province, China
pp. 99-104

Single-trial ERP detecting for emotion recognition (Abstract)

Jingfang Jiang , National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China
Ying Zeng , National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China
Li Tong , National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China
Chi Zhang , National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China
Bin Yan , National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China
pp. 105-108

A hybrid model for Arabic document indexing (Abstract)

Souheila Ben Guirat , LISI: Laboratory of computer science for industrial systems, Carthage University, Tunis, Tunisia
Ibrahim Bounhas , LISI: Laboratory of computer science for industrial systems, Carthage University, Tunis, Tunisia
Yahya Slimani , LISI: Laboratory of computer science for industrial systems, Carthage University, Tunis, Tunisia
pp. 109-114

Facial expression classification using Support Vector Machine based on bidirectional Local Binary Pattern Histogram feature descriptor (Abstract)

Talele Kiran , Sardar Patel Institute of Technology, Mumbai, India
Tuckley Kushal , AGV Systems Pvt. Ltd. Mumbai, India
pp. 115-120

An empirical study on recovering requirement-to-code links (Abstract)

Yuchen Zhang , School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China
Chengcheng Wan , School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China
Bo Jin , The Third Research Institute of Ministry of Public Security, Shanghai, China
pp. 121-126

Composite-based conflict resolution in merging versions of UML models (Abstract)

Hao Chong , School of Software Engineering, Tsinghua University, Beijing, China 100084
Renwei Zhang , School of Software Engineering, Tsinghua University, Beijing, China 100084
Zheng Qin , School of Software Engineering, Tsinghua University, Beijing, China 100084
pp. 127-132

A fuzzy-logic system for the user interface usability measurement (Abstract)

Marwa Hentati , University of Sfax, national school of engineering, CES Laboratory, TUNISIE
Lassaad Ben Ammar , University of Sfax, national school of engineering, CES Laboratory, TUNISIE
Abdelwaheb Trabelsi , College of Computation and Informatics, Saudi Electronic University, Saudi Arabia, Dammam
Adel Mahfoudhi , College of computers and information technology, Taif University, Saudi Arabia
pp. 133-138

A formal model for safety evaluation of platooning system (Abstract)

Mohamed Garoui , IRTES-SET, UTBM, F-90010, Belfort cedex, France
pp. 139-146

Position orientating path reverse ray tracing algorithm based on cluster analysis (Abstract)

Fanzeng Kong , Zhengzhou Institute of Information Science and Technology, China
Nae Zheng , Zhengzhou Institute of Information Science and Technology, China
Guanyi Liu , Zhengzhou Institute of Information Science and Technology, China
Xiukun Ren , Zhengzhou Institute of Information Science and Technology, China
pp. 147-153

Network intrusion detection system model based on data mining (Abstract)

Yanjie Zhao , School of Computer Engineering, Weifang University, China
pp. 155-160

Request distribution with pre-learning for distributed SSL reverse proxies (Abstract)

Haitao Dong , Key Laboratory of Noise and Vibration Research, Institute of Acoustics, Chinese Academy of Sciences, Beijing, China
Jun Yang , Key Laboratory of Noise and Vibration Research, Institute of Acoustics, Chinese Academy of Sciences, Beijing, China
Yiqiang Sheng , National Network New Media Engineering Research Center, Institute of Acoustics, Chinese Academy of Sciences, Beijing, China
pp. 161-167

Self-adaptive access control & delegation in cloud computing (Abstract)

Ali Ahmad Malik , Department of Computing, SEECS, National University of Sciences & Technology, Islamabad, Pakistan
Hirra Anwar , Department of Computing, SEECS, National University of Sciences & Technology, Islamabad, Pakistan
Muhammad Awais Shibli , Department of Computing, SEECS, National University of Sciences & Technology, Islamabad, Pakistan
pp. 169-176

Optimal placement of charging stations for electric taxis in urban area with profit maximization (Abstract)

Yuhan Dong , Graduate School at Shenzhen, Tsinghua University, China
Siyuan Qian , Graduate School at Shenzhen, Tsinghua University, China
Jinxing Liu , Graduate School at Shenzhen, Tsinghua University, China
Lin Zhang , Graduate School at Shenzhen, Tsinghua University, China
Kai Zhang , Graduate School at Shenzhen, Tsinghua University, China
pp. 177-182

An efficient page replacement algorithm for PCM-based mobile embedded systems (Abstract)

Seunghoon Yoo , School of Computer Science and Engineering, Seoul National University, Korea
Hyokyung Bahn , Department of Computer Engineering, Ewha Womans University, Seoul, Korea
pp. 183-188

Scheduling overload for real-time systems using SMT solver (Abstract)

Zhuo Cheng , School of Information Science, Japan Advanced Institute of Science and Technology, Japan
Haitao Zhang , School of Information Science and Engineering, Lanzhou University, China
Yasuo Tan , School of Information Science, Japan Advanced Institute of Science and Technology, Japan
Yuto Lim , School of Information Science, Japan Advanced Institute of Science and Technology, Japan
pp. 189-194

Study of occlusion problem in stereo matching (Abstract)

Jianguo Liu , Hubei Key Laboratory of Advanced Technology for Automotive Components (Wuhan University of Technology), China
Xuesong Li , Hubei Key Laboratory of Advanced Technology for Automotive Components (Wuhan University of Technology), China
Qin Qin , College of Computer and Information Technology, China Three Gorges University, Yichang, China
Hao Zhang , State Grid Hubei Yichang Electric Power Supply Company, China
pp. 195-199

Traffic sign detection based on cascaded convolutional neural networks (Abstract)

Di Zang , Department of Computer Science and Technology, The Key Laboratory of Embedded System and Service Computing, Ministry of Education, Tongji University, Shanghai, China
Junqi Zhang , Department of Computer Science and Technology, Tongji University, Shanghai, China
Dongdong Zhang , Department of Computer Science and Technology, Tongji University, Shanghai, China
Maomao Bao , Department of Computer Science and Technology, The Key Laboratory of Embedded System and Service Computing, Ministry of Education, Tongji University, Shanghai, China
Jiujun Cheng , Department of Computer Science and Technology, Tongji University, Shanghai, China
Keshuang Tang , Department of Transportation Information and Control Engineering, College of Transportation Engineering, Tongji University, Shanghai, China
pp. 201-206

Sample reconstruction and secondary feature selection in noisy speech emotion recognition (Abstract)

Xiaoqing Jiang , School of Information Science and Engineering, University of Jinan, China
pp. 207-211

Image segmentation based on local Chan-Vese model optimized by max-flow algorithm (Abstract)

Li Zhongguo , National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China
Zeng Lei , National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China
Wang Ti , National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China
Chen Jian , National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China
Yan Bin , National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, China
pp. 213-218

Improved accuracy of speaker verification system in noisy environment (Abstract)

Nirmala Salam , CDAC MUMBAI, Gulmohar Cross Road No.9, Juhu, Maharashtra, India
Rekha Nair , CDAC MUMBAI, Gulmohar Cross Road No.9, Juhu, Maharashtra, India
pp. 219-224

A fingertips detection method based on the combination of centroid and Harris corner algorithm (Abstract)

Jiajun Chen , State Key Laboratory on Integrated Optoelectronics, College of Electronic Science & Engineering, Jilin University, Changchun, China
Mengmeng Han , State Key Laboratory on Integrated Optoelectronics, College of Electronic Science & Engineering, Jilin University, Changchun, China
Shu Yang , State Key Laboratory on Integrated Optoelectronics, College of Electronic Science & Engineering, Jilin University, Changchun, China
Yuchun Chang , State Key Laboratory on Integrated Optoelectronics, College of Electronic Science & Engineering, Jilin University, Changchun, China
pp. 225-230

Bilateral histogram equalization with pre-processing for contrast enhancement (Abstract)

Feroz Mahmud Amil , Institute of Information Technology, University of Dhaka, Bangladesh
Md. Mostafijur Rahman , Institute of Information Technology, University of Dhaka, Bangladesh
Shanto Rahman , Institute of Information Technology, University of Dhaka, Bangladesh
Emon Kumar Dey , Institute of Information Technology, University of Dhaka, Bangladesh
Mohammad Shoyaib , Institute of Information Technology, University of Dhaka, Bangladesh
pp. 231-236

A layered tone-mapping operator based on contrast enhanced adaptive histogram equalization (Abstract)

Shaojun Zhang , Department of Electronic Engineering, Tsinghua University, Beijing, China
Jianhua Pang , Department of Electronic Engineering, Tsinghua University, Beijing, China
Hailong Chen , Department of Electronic Engineering, Tsinghua University, Beijing, China
Sheng Zhang , Key Laboratory of Advanced Sensor and Integrated System, Graduate School at Shenzhen, Tsinghua University, China
pp. 237-242

RaceTracker: Effective and efficient detection of data races (Abstract)

Zhen Yang , School of Computer Science and Technology, Harbin Institute of Technology, 15001, China
Zhen Yu , School of Computer Science and Technology, Harbin Institute of Technology, 15001, China
Xiaohong Su , School of Computer Science and Technology, Harbin Institute of Technology, 15001, China
Peijun Ma , School of Computer Science and Technology, Harbin Institute of Technology, 15001, China
pp. 293-300

Ranking web service for high quality by applying improved Entropy-TOPSIS method (Abstract)

Ruonan Sun , College of Computer Science and Engineering, Northeastern University, Institute of Computer Application Technology, Shenyang, China
Bin Zhang , College of Computer Science and Engineering, Northeastern University, Institute of Computer Application Technology, Shenyang, China
Tingting Liu , College of Computer Science and Engineering, Northeastern University, Institute of Computer Application Technology, Shenyang, China
pp. 249-254

Intelligent mailbox with centralized parallel processing (Abstract)

Adeel Muhammad , University of Stuttgart, Germany
Nabeel ur Rehman , University of Heilbronn, Germany
pp. 255-259

Joint multi-channel assignment and routing in wireless mesh network (Abstract)

Changsheng Yin , Academy of Defense Information, Wuhan 430010, China
Ruopeng Yang , Academy of Defense Information, Wuhan 430010, China
Dongdong Wu , Academy of Defense Information, Wuhan 430010, China
Wei Zhu , Academy of Defense Information, Wuhan 430010, China
pp. 261-265

Percolation thresholds on tree-based communities of wireless sensor networks (Abstract)

Qiao Li , School of Computer Science and Technology, Beijing Institute of Technology, 100081, China
Zhendong Niu , School of Computer Science and Technology, Beijing Institute of Technology, 100081, China
Baihai Zhang , School of Automation, Beijing Institute of Technology, 100081, China
Lingguo Cui , School of Automation, Beijing Institute of Technology, 100081, China
Bin Wu , Science and Technology on Space Physics Laboratory, Beijing 100076, China
pp. 267-273

Study on improvement of fingerprint matching algorithm in wireless LAN based indoor positioning system (Abstract)

Hongyu Wang , School of Information and Safety Engineering, Zhongnan University of Economics and Law, Wuhan, China
Zhanhao Zhao , School of Information and Safety Engineering, Zhongnan University of Economics and Law, Wuhan, China
Jialiang Hu , School of Information and Safety Engineering, Zhongnan University of Economics and Law, Wuhan, China
Zhenxin Qu , School of Information and Safety Engineering, Zhongnan University of Economics and Law, Wuhan, China
Hao Feng , School of Information and Safety Engineering, Zhongnan University of Economics and Law, Wuhan, China
pp. 275-280

A novel compact antenna design for secure eHealth wireless applications (Abstract)

M. Arif Khan , School of Computing and Mathematics, Charles Sturt University, NSW Australia
Md Rafiqul Islam , School of Computing and Mathematics, Charles Sturt University, NSW Australia
pp. 281-286

Visual hand gesture recognition with convolution neural network (Abstract)

Mengmeng Han , State Key Laboratory on Integrated Optoelectronics, Jilin University, Chang Chun, China
Jiajun Chen , State Key Laboratory on Integrated Optoelectronics, Jilin University, Chang Chun, China
Ling Li , State Key Laboratory on Integrated Optoelectronics, Jilin University, Chang Chun, China
Yuchun Chang , State Key Laboratory on Integrated Optoelectronics, Jilin University, Chang Chun, China
pp. 287-291

A distributed-memory parallel approach for the generation of multibillion element tetrahedral meshes (Abstract)

Xiaoqing Wang , School of Mechanical Engineering Department, Shanghai Jiao Tong University, China
Xianlong Jin , School of Mechanical Engineering Department, Shanghai Jiao Tong University, China
pp. 301-306

Accelerated diffusion-based recommendation algorithm on tripartite graphs with GPU clusters (Abstract)

Mi Li , School of Software Engineering, Tongji University, Shanghai, China
Jie Huang , School of Software Engineering, Tongji University, Shanghai, China
Jingpeng Wang , School of Software Engineering, Tongji University, Shanghai, China
pp. 307-312

Paralleled Fast Search and Find of Density Peaks clustering algorithm on GPUs with CUDA (Abstract)

Mi Li , School of Software Engineering, Tongji University, Shanghai, China
Jie Huang , School of Software Engineering, Tongji University, Shanghai, China
Jingpeng Wang , School of Software Engineering, Tongji University, Shanghai, China
pp. 313-318

A deep learning approach for VM workload prediction in the cloud (Abstract)

Feng Qiu , Software College, Northeastern University, Shenyang, China
Bin Zhang , School of Computer Science and Engineering, Northeastern University, Shenyang, China
Jun Guo , School of Computer Science and Engineering, Northeastern University, Shenyang, China
pp. 319-324

A comparative evaluation of open-source graph processing platforms (Abstract)

Xiaohui Pan , Modern Education Technology Center, Shanghai University of Political Science and Law, 201701, China
pp. 325-330

On optimal electric vehicles penetration in a novel Archipelago microgrids (Abstract)

Qingyu Yang , SKLMSE Lab, Xi'an Jiaotong University, China
Zhengan Tan , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
Dou An , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
Wei Yu , Department of Computer and Information Sciences, Towson University, Maryland, USA
Xinyu Yang , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
pp. 331-336

A novel microgrid based resilient Demand Response scheme in smart grid (Abstract)

Xinyu Yang , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
Xiaofei He , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
Jie Lin , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
Wei Yu , Department of Computer and Information Sciences, Towson University, MD, USA
Qingyu Yang , SKLMSE Lab, Xi'an Jiaotong University, China
pp. 337-342

Optimal many-to-many personalized concurrent communication in RapidIO-based fat-trees (Abstract)

Lin Shu , Institute of Automation, Chinese Academy of Sciences, Beijing, China
Jie Hao , Institute of Automation, Chinese Academy of Sciences, Beijing, China
Yafang Song , Institute of Automation, Chinese Academy of Sciences, Beijing, China
Chengcheng Li , Institute of Automation, Chinese Academy of Sciences, Beijing, China
Donglin Wang , Institute of Automation, Chinese Academy of Sciences, Beijing, China
pp. 343-350

Design patterns applied for game design patterns (Abstract)

Junfeng Qu , Department of Computer Science & Information Technology, Clayton State University, Morrow, GA, 30260, USA
Yinglei Song , Department of Computer Science, Jiangsu University of Science and Technology, Zhenjiang, China, 212001
Yong Wei , epartment of Computer Science, University of North Georgia, Dahlonega, 30597, USA
pp. 351-356

Exploring topic models in software engineering data analysis: A survey (Abstract)

Xiaobing Sun , School of Information Engineering, Yangzhou University, China
Xiangyue Liu , School of Information Engineering, Yangzhou University, China
Bin Li , School of Information Engineering, Yangzhou University, China
Yucong Duan , Hainan University, Haikou, China
Hui Yang , School of Information Engineering, Yangzhou University, China
Jiajun Hu , School of Information Engineering, Yangzhou University, China
pp. 357-362

Automatic support for formal specification construction using pattern knowledge (Abstract)

Xi Wang , School of Computer Engineering and Science, Shanghai University, China
Weikai Miao , Shanghai Key Lab for Trustworthy Computing, East China Normal University, China
pp. 363-372

Verifying RTuinOS using VCC: From approach to practice (Abstract)

Hongliang Liang , College of Computer Science, Beijing University of Posts and Telecommunications, China
Daijie Zhang , College of Computer Science, Beijing University of Posts and Telecommunications, China
Xiaodong Jia , College of Computer Science, Beijing University of Posts and Telecommunications, China
Xiaoxiao Pei , College of Computer Science, Beijing University of Posts and Telecommunications, China
Guangyuan Li , Institute of Software, Chinese Academy of Science, Beijing, China
pp. 373-378

A correct by construction approach for modeling and formalizing self-adaptive systems (Abstract)

Marwa Hachicha , ReDCAD Laboratory, University of Sfax, Tunisia
Emna Dammak , ReDCAD Laboratory, University of Sfax, Tunisia
Riadh Ben Halima , ReDCAD Laboratory, University of Sfax, Tunisia
Ahmed Hadj Kacem , ReDCAD Laboratory, University of Sfax, Tunisia
pp. 379-384

Detecting integer overflow in Windows binary executables based on symbolic execution (Abstract)

Bin Zhang , School of Electronic Science & Engineering, National University of Defense Technology, Changsha, China
Chao Feng , School of Electronic Science & Engineering, National University of Defense Technology, Changsha, China
Bo Wu , Xi'an Communication Institute, China
Chaojing Tang , School of Electronic Science & Engineering, National University of Defense Technology, Changsha, China
pp. 385-390

A framework for test data generation of object-oriented programs based on complete testing chain (Abstract)

Gang Li , State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China
Lei Yu , State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China
Huihui Sun , State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China
pp. 391-397

A method of metamorphic relations constructing for object-oriented software testing (Abstract)

Xinglong Zhang , State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China
Lei Yu , State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China
Xuemei Hou , State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China
pp. 399-406

MLSA: A static bugs analysis tool based on LLVM IR (Abstract)

Hongliang Liang , School of Computer Science, Beijing University of Posts and Telecommunications, China
Lei Wang , School of Computer Science, Beijing University of Posts and Telecommunications, China
Dongyang Wu , School of Computer Science, Beijing University of Posts and Telecommunications, China
Jiuyun Xu , School of Computer & Communication Engineering, China University of Petroleum, Qingdao, China
pp. 407-412

Understanding and detecting performance and security bugs in IOT OSes (Abstract)

Hongliang Liang , College of Computer Science, Beijing University of Posts and Telecommunications, China
Qian Zhao , College of Computer Science, Beijing University of Posts and Telecommunications, China
Yuying Wang , College of Computer Science, Beijing University of Posts and Telecommunications, China
Haifeng Liu , Beijing Information Security Test and Evaluation Center, China
pp. 413-418

Test case prioritization based on requirement correlations (Abstract)

Tingting Ma , School of Computer Engineering and Science, Shanghai University, 200444, China
Hongwei Zeng , School of Computer Engineering and Science, Shanghai University, 200444, China
Xiaolin Wang , School of Computer Engineering and Science, Shanghai University, 200444, China
pp. 419-424

Operational pattern based code generation for management information system: An industrial case study (Abstract)

Fagui Mao , School of Software, Shanghai Jiao Tong University, China
Xuyang Cai , School of Software, Shanghai Jiao Tong University, China
Beijun Shen , School of Software, Shanghai Jiao Tong University, China
Yong Xia , IBM Client Innovation Center China, Shanghai, China
Bo Jin , The Third Research Institute of Ministry of Public Security, Shanghai, China
pp. 425-430

Service matchmaking with closed world reasoning (Abstract)

Wenli Qi , School of computer engineering and science, Shanghai University, China
Fangfang Liu , School of computer engineering and science, Shanghai University, China
pp. 431-436

Mechanistic relationship between instruction fetch width and basic block size to architectural vulnerability factor (Abstract)

Liu Tang , Embedded Computing Institute, Beijing university of Technology, China
Zhangqin Huang , Embedded Computing Institute, Beijing university of Technology, China
pp. 437-442

A method for issue queue soft error vulnerability mitigation (Abstract)

Liu Tang , Embedded computing Institutes, Beijing University of Technology, China
Zhangqin Huang , Embedded computing Institutes, Beijing University of Technology, China
pp. 443-450

Toward hybrid method for parsing Modern Standard Arabic (Abstract)

Nabil Khoufi , ANLP Research Group, MIRACL Laboratory, FSEGS, University of Sfax, Tunisia
Chafik Aloulou , ANLP Research Group, MIRACL Laboratory, FSEGS, University of Sfax, Tunisia
Lamia Hadrich Belguith , ANLP Research Group, MIRACL Laboratory, FSEGS, University of Sfax, Tunisia
pp. 451-456

Enhancing spatial data warehouse exploitation: A SOLAP recommendation approach (Abstract)

Saida Aissi , SOIE Laboratory, High Institute of Management, Tunisia
Mohamed Salah Gouider , SOIE Laboratory, High Institute of Management, Tunisia
Tarek Sboui , ESSPCR & CONTOS, Faculty of Sciences of Tunis, Tunisia
Lamjed Ben Said , SOIE Laboratory, High Institute of Management, Tunisia
pp. 457-464

Improved image matching method based on ORB (Abstract)

Letian Li , School of Science, Communication University of China, Beijing, China
Lin Wu , School of Computer, Communication University of China, Beijing, China
Yongcun Gao , School of Science, Communication University of China, Beijing, China
pp. 465-468

Visual abstraction improvement of interactive dot map (Abstract)

Di Zhang , Communication University of China, Beijing Key Laboratory of Big Data in Security & Protection Industry, China
Ligu Zhu , Communication University of China, Beijing Key Laboratory of Big Data in Security & Protection Industry, China
Zida Xiao , Communication University of China, Beijing Key Laboratory of Big Data in Security & Protection Industry, China
Lei Zhang , Communication University of China, Beijing Key Laboratory of Big Data in Security & Protection Industry, China
pp. 469-474

Design, modeling and tuning of modified PID controller for autopilot in MAVs (Abstract)

Xu-Hui Chen , Key of Internet of Things Lab, Xiamen University of Technology, China, 361024
Ejaz Ul Haq , Key of Internet of Things Lab, Xiamen University of Technology, China, 361024
Jiawei Lin , Key of Internet of Things Lab, Xiamen University of Technology, China, 361024
pp. 475-480

The research of the brain default network using cascading algorithm (Abstract)

Ming Ke , College of Computer and Communication, Lanzhou University of Technology, 730050, China
Zhao Cao , College of Computer and Communication, Lanzhou University of Technology, 730050, China
Zhijing Li , College of Computer and Communication, Lanzhou University of Technology, 730050, China
Xuhui Chen , The Key Lab of the Internet of Things Application Technology, Xiamen University of Technology, 361024, China
pp. 481-486

Notice of Violation of IEEE Publication Principles
Adaptive Fuzzy PID speed control of DC belt conveyor system
(Abstract)

Xu-hui Chen , Key of Internet of Things Lab, Xiamen University of Technology, China, 361024
Md Lutfar Rahman , Key of Internet of Things Lab, Xiamen University of Technology, China, 361024
Yin Zhang , Key of Internet of Things Lab, Xiamen University of Technology, China, 361024
pp. 487-490

Genetic algorithm optimization research based on simulated annealing (Abstract)

Shunan Lan , School of Computer Science, Community University of China, Beijing, 100024, China
Weiguo Lin , School of Computer Science, Community University of China, Beijing, 100024, China
pp. 491-494

Development of puzzle game about children's etiquette based on Unity3D (Abstract)

Li Jiyuan , Dept. Computer, Communication University of China, China
Hu Wenfeng , Dept. Computer, Communication University of China, China
pp. 495-500

Research and implementation of documented media asset management mode (Abstract)

Wang Bo , Practice Experiment Teaching Center, Communication University of China, Beijing, China
Zhang Xin , Practice Experiment Teaching Center, Communication University of China, Beijing, China
pp. 501-506

A novel multidimensional professionalism evaluation model (Abstract)

Zhenzhong Li , School of Computer Science, Communication University of China, Beijing, China
Wenqian Shang , School of Computer Science, Communication University of China, Beijing, China
Yuqi Wang , School of Computer Science, Communication University of China, Beijing, China
pp. 507-510

SLACM: Heterogeneous multilevel service aggregation access control model based situation logic (Abstract)

Min Wang , School of Computer, Communication University of China, Beijing, China
Yongbin Wang , School of Computer, Communication University of China, Beijing, China
pp. 511-516

Network security risk assessment method based on HMM and attack graph model (Abstract)

Si-chao Liu , Jiang Nan University, School of Digital Media, Wuxi, China
Yuan Liu , Jiang Nan University, School of Digital Media, Wuxi, China
pp. 517-522

Development of electrostatic decay time intelligent test instrument and software design (Abstract)

Hui Li , The First Engineers Scientific Research Institute, Engineer Equipment Software Testing Center, Wuxi, China
XiaoHua Shi , The First Engineers Scientific Research Institute, Engineer Equipment Software Testing Center, Wuxi, China
KeJun Lin , The First Engineers Scientific Research Institute, Engineer Equipment Software Testing Center, Wuxi, China
HongYu Yu , The First Engineers Scientific Research Institute, Engineer Equipment Software Testing Center, Wuxi, China
pp. 523-526

A comparative study on black-box testing with open source applications (Abstract)

Shaochun Xu , Algoma University, Sault Ste Marie, Canada
Lichao Chen , Taiyuan University of Science and Technology, China
Chunning Wang , China Geological Library, Beijing, China
Oleksandr Rud , Algoma University, Sault Ste Marie, Canada
pp. 527-532

Complexity analysis and comparison of test paths based on DSE (Abstract)

Jiawen Lu , School of Information Science & Engineering, East China University of Science and Technology, Shanghai, China
Lizhi Cai , School of Information Science & Engineering, East China University of Science and Technology, Shanghai, China
Yang Zhang , School of Information Science & Engineering, East China University of Science and Technology, Shanghai, China
Keyi Hong , Cyber Security Department of Shanghai Public Security Bureau, China
pp. 533-539

Evaluating accuracy and performance of GPU-accelerated random walk computation on heterogeneous networks (Abstract)

Jiayu Gong , Shanghai Industrial Technology Institute, China
Lizhi Cai , Laboratory of Computer Software Testing & Evaluation, Shanghai Development Center of Computer Software Technology, China
Yuxin Shen , Cyber Security Department of Shanghai Public Security Bureau, China
pp. 541-545

Evaluating quality-in-use of FLOSS through analyzing user reviews (Abstract)

Zhenzheng Qian , School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China
Chengcheng Wan , School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China
Yuting Chen , School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China
pp. 547-552

Research and practice on the whole life cycle test process model (Abstract)

Jiwen Ding , School of Computer Science & Engineering, Northeastern University, 110819 Shenyang, China
Xiushuang Yi , School of Computer Science & Engineering, Northeastern University, 110819 Shenyang, China
Jun Guo , School of Computer Science & Engineering, Northeastern University, 110819 Shenyang, China
pp. 553-556

Software test cases recommendation system research based on collaborative filtering (Abstract)

Jianxin Ge , School of Information Science and Engineering, Yanshan University, Qinhuangdao, China
Jiaomin Liu , School of Information Science and Engineering, Yanshan University, Qinhuangdao, China
pp. 557-562

Research on non-authorized privilege escalation detection of android applications (Abstract)

Yaping Yang , Shanghai Key Laboratory of Computer Software Testing & Evaluating, Shanghai Development Center of Computer Software Technology, China
Lizhi Cai , Shanghai Key Laboratory of Computer Software Testing & Evaluating, Shanghai Development Center of Computer Software Technology, China
Yanguo Zhang , Shanghai Key Laboratory of Computer Software Testing & Evaluating, Shanghai Development Center of Computer Software Technology, China
pp. 563-568

Fuzzy set based data publishing for privacy preservation (Abstract)

Meng-bo Xie , School of Computer Engineering & Science, Shanghai University, 200444, China
Quan Qian , School of Computer Engineering & Science, Shanghai University, 200444, China
pp. 569-574

P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for clouds (Abstract)

Lifeng Li , Department of Computer Science, Arkansas State University, United States of America
Xiaowan Chen , Department of Computer Science, Arkansas State University, United States of America
Hai Jiang , Department of Computer Science, Arkansas State University, United States of America
Zhongwen Li , College of Information Science and Technology; Chengdu University, China
Kuan-Ching Li , College of Information Science and Technology; Chengdu University, China
pp. 575-580

Parallel image dehazing algorithm based on GPU using fuzzy system and hybird evolution algorithm (Abstract)

Che-Lun Hung , Department of Computer Science and Communication Engineering, Providence University, Taichung, Taiwan
Ren-You Yan , Department of Computer Science and Communication Engineering, Providence University, Taichung, Taiwan
Hsiao-Hsi Wang , Department of Computer Science and Information Management, Providence University, Taichung, Taiwan
pp. 581-583

An approach to improving the performance of CUDA in virtual environment (Abstract)

Shenquan Han , School of Computer Engineering and Science, Shanghai University, 200444, China
Zhou Lei , School of Computer Engineering and Science, Shanghai University, 200444, China
Wenfeng Shen , School of Computer Engineering and Science, Shanghai University, 200444, China
Shengbo Chen , School of Computer Engineering and Science, Shanghai University, 200444, China
Huiran Zhang , School of Computer Engineering and Science, Shanghai University, 200444, China
Tao Zhang , School of Computer Engineering and Science, Shanghai University, 200444, China
Baoyu Xu , School of Computer Engineering and Science, Shanghai University, 200444, China
pp. 585-590

Profiling and analysis of object lazy allocation in Java programs (Abstract)

Jianjun Shi , School of Computer Science, Beijing Institute of Technology, China
Weixing Ji , School of Computer Science, Beijing Institute of Technology, China
Lulu Zhang , School of Computer Science, Beijing Institute of Technology, China
Yujin Gao , School of Computer Science, Beijing Institute of Technology, China
Han Zhang , Science and Technology on Special System Simulation Laboratory, Beijing Simulation Center, China
Duzheng Qing , Science and Technology on Special System Simulation Laboratory, Beijing Simulation Center, China
pp. 591-596

Similarity model based on CBR and FCA (Abstract)

Chongyang Shi , School of Computer Science, Beijing Institute of Technology, China
Linjing Lai , School of Computer Science, Beijing Institute of Technology, China
Jing Fan , School of Computer Science, Beijing Institute of Technology, China
Yu Bai , QCIS, University of Technology, Sydney, Australia
pp. 597-603

Study on the evolution process of nuclear accident consequence assessment system (Abstract)

Qiming Zhang , Environmental Protection and Radiation Safety Center, Suzhou Nuclear Power Research Institute Co., Ltd, Jiangsu, China
Qian Chen , Environmental Protection and Radiation Safety Center, Suzhou Nuclear Power Research Institute Co., Ltd, Jiangsu, China
Yunliang Tao , Environmental Protection and Radiation Safety Center, Suzhou Nuclear Power Research Institute Co., Ltd, Jiangsu, China
pp. 605-611

Computing uncertain skyline of Web services via interval number (Abstract)

Guobing Zou , School of Computer Engineering and Science, Shanghai University, China
Mei Zhao , School of Computer Engineering and Science, Shanghai University, China
Sen Niu , School of Computer Engineering and Science, Shanghai University, China
Yanglan Gan , School of Computer Science and Technology, Donghua University, China
Bofeng Zhang , School of Computer Engineering and Science, Shanghai University, China
pp. 613-618

An accelerating approach for simulating texture sharp transition mechanism of pyrocarbon on Hexagonal-Mesh Surface (Abstract)

Mengqi Guo , School of Environmental and Chemical Engineering, Shanghai University, China
Qin Li , School of Computer Engineering and Science, Shanghai University, China
Wenfeng Shen , School of Computer Engineering and Science, Shanghai University, China
Guangren Qian , School of Environmental and Chemical Engineering, Shanghai University, China
Huiran Zhang , School of Computer Engineering and Science, Shanghai University, China
pp. 619-623

The modularity-based Hierarchical tree algorithm for multi-class classification (Abstract)

Chengwei Gu , School of Computer Engineering & Science, Shanghai University, 200444, China
Bofeng Zhang , School of Computer Engineering & Science, Shanghai University, 200444, China
Xinyue Wan , School of Computer Engineering & Science, Shanghai University, 200444, China
Mingqing Huang , School of Computer Engineering & Science, Shanghai University, 200444, China
Guobing Zou , School of Computer Engineering & Science, Shanghai University, 200444, China
pp. 625-629

Steganalysis of JPEG image-based steganography with support vector machine (Abstract)

Satoshi Watanabe , University of Aizu, Aizu-Wakamatsu City, Fukushima, 965-8580 Japan
Kazuki Murakami , University of Aizu, Aizu-Wakamatsu City, Fukushima, 965-8580 Japan
Tomoya Furukawa , University of Aizu, Aizu-Wakamatsu City, Fukushima, 965-8580 Japan
Qiangfu Zhao , University of Aizu, Aizu-Wakamatsu City, Fukushima, 965-8580 Japan
pp. 631-636

High resolution feature extraction from optical coherence tomography acquired internal fingerprint (Abstract)

Rethabile Khutlang , Biometrics Research Group, Identity Authentication, CSIR Modelling and Digital Science, Pretoria, Republic of South Africa
Nontokozo P. Khanyile , Biometrics Research Group, Identity Authentication, CSIR Modelling and Digital Science, Pretoria, Republic of South Africa
Sisanda Makinana , Biometrics Research Group, Identity Authentication, CSIR Modelling and Digital Science, Pretoria, Republic of South Africa
Fulufhelo V. Nelwamondo , CSIR Modelling and Digital Science, Pretoria, Republic of South Africa
pp. 637-641

A novel and fast connected component count algorithm based on graph theory (Abstract)

Sihai Yang , Huaqiao University, Xiamen, China
Duansheng Chen , Huaqiao University, Xiamen, China
Xianhua Han , Huaqiao University, Xiamen, China
Yenwei Chen , Huaqiao University, Xiamen, China
pp. 643-647

Motion estimation method based on efficient memory bandwidth for HEVC real-time algorithm based on graph theoryncoding (Abstract)

Kodai Miyajima , Information and Computer Science, Osaka Electro-Communication University, 18-8, Hatsu-cho, Neyagawa, Japan
Gen Fujita , Information and Computer Science, Osaka Electro-Communication University, 18-8, Hatsu-cho, Neyagawa, Japan
pp. 649-653

An improved unsharp masking model for intensive care unit chest radiograph enhancement (Abstract)

Sikai Zhong , School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, China
Sheng Chen , School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, China
pp. 655-661

Features extraction of prostate with graph spectral method for prostate cancer detection (Abstract)

Weiwei Du , Department of Information Science, Kyoto Institute of Technology, Japan
Yi-peng Liu , College of Information Engineering, Zhejiang University of Technology, Hangzhou, China
Shiyang Wang , Department of Radiology, The University of Chicago, Illinois, USA
Yahui Peng , School of Electronic and Information Engineering, Beijing Jiaotong University, China
Aytekin Oto , Department of Radiology, The University of Chicago, Illinois, USA
pp. 663-668

STNoSQL: Creating NoSQL database on the SensibleThings platform (Abstract)

Suna Yin , Department of Computer Science and Technology, Donghua University, Shanghai, China
Dehua Chen , Department of Computer Science and Technology, Donghua University, Shanghai, China
Jiajin Le , Department of Computer Science and Technology, Donghua University, Shanghai, China
pp. 669-674

On higher-order communication of Erlang (Abstract)

Nannan Liu , Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
Xian Xu , Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
pp. 675-679

A novel approach for efficient accessing of small files in HDFS: TLB-MapFile (Abstract)

Bing Meng , East China University of Science and Technology, School of Information Science and Engineering, Shanghai, China
Wei-bin Guo , East China University of Science and Technology, School of Information Science and Engineering, Shanghai, China
Gui-sheng Fan , East China University of Science and Technology, School of Information Science and Engineering, Shanghai, China
Neng-wu Qian , East China University of Science and Technology, School of Information Science and Engineering, Shanghai, China
pp. 681-686

Ensuring replication-based data integrity and availability in multicloud storage (Abstract)

Xin Pei , Key Lab of Information Network Security of Ministry of Public Security, Shanghai, China
Jiuchuan Lin , Key Lab of Information Network Security of Ministry of Public Security, Shanghai, China
Bo Jin , Key Lab of Information Network Security of Ministry of Public Security, Shanghai, China
Yongjian Wang , Key Lab of Information Network Security of Ministry of Public Security, Shanghai, China
pp. 687-692

Attack-defense trees based cyber security analysis for CPSs (Abstract)

Xiang Ji , Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
HuiQun Yu , Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
GuiSheng Fan , Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
WenHao Fu , Department of Computer Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
pp. 693-698

Author index (PDF)

pp. 699-702
102 ms
(Ver 3.3 (11022016))