Академический Документы
Профессиональный Документы
Культура Документы
2015 IACSIT
AMSTERDAM CONFERENCES
Feb 12-13, 2015
Conference Program
2015 3rd International Conference on System Modeling and Optimization
(ICSMO 2015)
1/ 40
CONTENT
Welcome to Amsterdam Conferences
.3
Announcement
.4
Introduction of Conference Chair, Keynote Speakers and Program Chairs
.9
Instruction for Oral Presentation
.10
Technical Program at a Glance
.11
Detailed Technical Program
Schedule for Feb. 12.12
Schedule for Feb.13.13
Listener List.32
Information of Conference Venue
33
Call for Paper
34
2/ 40
Yours sincerely,
Teresa Zhang
Director of Conference Department, IACSIT
3/ 40
ANNOUNCEMENT
The ICSMO 2015 conference proceeding will be published in
the International Journal of Modeling and Optimization (ISSN:
2010-3697 www.ijmo.org ), and will be included in the Engineering &
Technology Digital Library, and indexed byProQuest,Google Scholar and
Crossref.
As usual, all accepted papers for the ICCMS 2015 will be published in the
International Journal of Computer Theory and Engineering
(ISSN:1793-8201 www.ijcte.org ), will be indexed byElectronic Journals
Library, EBSCO, Engineering & Technology Digital Library, Google
Scholar, INSPEC, Ulrich's Periodicals Directory, Crossref, ProQuest, WorldCat,
and EI (INSPEC, IET).
For the journal publication schedule, some authors could not get
the journal on conference site. Well post the journal after
publication.
IACSIT Committee
4/ 40
5/ 40
6/ 40
8/ 40
9/ 40
Notice:
Please keep your belongings (laptop and camera etc) with you!
10/ 40
Venue: Lobby
10:00-17:00
9:00-9:10
9:10-9:55
Venue:
Feb. 13
8:30-11:40
9:55-10:40
10:40-11:00
University of
Amsterdam 3
Feb. 13
12:30-13:30
Registration
Opening
Prof. Alexander Balinsky
Remarks
Plenary
Dr. Charles Mutigwe
Speech I
Plenary
Prof. Tarek El-Ghazawi
Speech II
Group Photo &Coffee Break
11:00-11:45
Plenary
Speech IV
11:45-12:30
Plenary
Speech V
University of
Amsterdam 3
13:30-16:00
Cambridge
Cambridge
Feb. 13
19:00-20:30
13:30-16:00
16:00-16:20
Coffee Break
16:20-18:20
16:20-18:20
11/ 40
10:00am-17:00pm
Arrival, registration and conference materials collection
Location
Venue: Lobby
Address
Telephone
Staff
Note:
You can also register at any working time during the conference
Certificate of Participation can be collected at the registration counter.
The organizer won't provide accommodation, and we suggest you make an
early reservation.
Please get the related paper documents and they are required when you
register on desk.
12/ 40
9:10-9:55
Plenary
Speech I
Opening Remarks
Prof. Alexander Balinsky
Topic: An Automated Design Framework for Matching Processor Architecture to
Applications
Speaker : Dr. Charles Mutigwe
University of Massachusetts Amherst, USA
9:55-10:40
Plenary
Speech II
11:45-12:30
Plenary
Speech IV
14/ 40
Session Chair I:
DR. M. Basel Almourad, Zayed University, UAEAssociated Professor
CA020
CA016
reflections in form of emails, sketches, and images with a group of experts from different
backgrounds, working altogether through the creation of a design, its development and
proper implementation. The particular paper explores -through COnCEPT research and
development EU co-funded project- the nature and requirements of early design work
focusing especially on issues of synchronous and asynchronous collaboration, team
dynamics and the management and monitoring of the early stages of the design process.
The overall aim is to identify the essential characteristics and needs of distributed teams
when in remote collaboration during the early stages of the design process and suggest a
prototype environment based on their requirements and workflow.
Language Learning Generators From Traditional Language Learning
Methodologies to Future Computer Assisted Technologies
Eva Zanuy
Escoles Betlem, Ramal 1, Premia de Dalt, Barcelona, Spain.
CA011
Abstract: Textbooks should are tools that generate learning, and if we improved them
taking into account the different learning styles, we would be creating a real Learning
Generator for all the students. But the piece of the larger problem I am breaking off to work
on is how to choose a Learning Generator or perfect textbook.
The scope of my research includes the bestseller publishing houses in teaching English as a
second language (Cambridge, Oxford, Longman, Macmillan and Richmond) and each
single exercise in these textbooks will be classified on the basis of Learning Styles. The
higher representation of exercises that could help the Reflector Style shows that all the
publishing houses, without exception, follows the natural method. The natural method fails
because it has an excess of a single Learning Style.
Consequently, the publishing houses have to pay greater attention to the theories on
Learning Styles and use learning systems platforms that benefit all the students. This can be
accomplished through multimedia education. The future of education is in a virtual world.
We should change a system based on books which just benefits a small group of students,
to an e-learning system. The application of technology should become normalized moving
from classrooms to language labs. Could we imagine a learning system where all students
learned at their best?
The Most Violated WCAG 1.0 Guidelines by the Developers of e-Government
Websites
M. Basel Al Mourad
Zayed University, UAE
CA022
Abstract: Most governments today are moving toward information society where
e-Government websites are universally accessible by all citizens. Accessible websites
means that people with disabilities can use the Web and the website developers must follow
the WWW Consortium (W3C)s Web Content Accessibility Guidelines (WCAG). This
paper seeks to examine the most violated accessibility guidelines by the developer of the
web portals. For this purpose, we examined 21 e-Government websites. We identified and
discussed the most violated WCAG. Our findings may raise awareness to the web
developer about these violations and encourage them on how to build better and accessible
websites.
Technical requirements of the e-Waybill service
16/ 40
CA027
CA1010
Abstract: In this paper, we present experimental results evaluating the performance of the
Multipath TCP over a shared bottleneck path in a series of benchmark tests. We found that
the Multipath TCPs fairness as well as its competitiveness responds to the change of
network conditions, such as latency and loss rate. MPTCP is unfairness and powerful with
regular TCP in ideal network conditions, but its throughput clearly decreases even less than
regular TCP in worse network conditions with high latency and a higher rate of loss of
packets.
Design of Mobile e-Learning Forecasting System Based on Case Study Using Multiple
Intelligence Analysis
Thongchai Kaewkiriya
Thai-Nichi Institute of Technology, Bangkok, Thailand
Abstract: The objective of this research is to design an adaptive mobile e-learning
forecasting system based on case study using Multiple Intelligence. Thus, our paper
proposes a conceptual framework of an adaptive e-learning guidance system based on
Multiple Intelligence. The conceptual framework is divided into six modules. Firstly,
introduction of a Pattern based module. Secondly, detailed explanation of the Forecasting
module for students. The third, presentation of the Learning portal module. The fourth,
presentation of the Adaptive module. The fifth, explanation the Mapping module. And
finally, proposal of learning content for the module which is based on Multiple
Intelligence.
The evaluation of this paper consists of 2 sections. The first section is to evaluate
achievement of students. Second section is to evaluate precision of prediction for students.
The result of the first evaluation shown that students who studied via mobile e-learning
forecasting system are more successful than students who studied via normal e-learning
system with significant at .05 (t = 2.547, p < .05). The result of second section, we
considered the percentage of precision. Then, we compared 3 algorithms which consists of
1) J48 algorithm 2) C4.5 algorithm 3) Nave Bayes algorithm. The percentage of J48
17/ 40
Q004
understanding phase transitions and critical phenomena. For the first time, the exact integer
values for the density of states of the triangular-lattice Ising model with eighteen spins on a
side and free boundary conditions are evaluated. Also, the exact specific heats are obtained
for the triangular-lattice Ising ferromagnet and antiferromagnet at the same time.
Effectiveness of Conventional CUSUM Control Chart for Correlated Observations
D. R. Prajapati
Department of Mechanical Engineering, PEC University of Technology (Formerly
Punjab Engineering College), Chandigarh, India
Q008
Abstract: Control charts; one of the important tools of quality control, are also known as
Shewhart charts or process behavior charts. Page (1954) was the first, who introduced the
Cumulative Sum (CUSUM) control charts for detection of process shifts and claimed that
these charts are more efficient compared to Shewhart chart to detect small shifts in the
process average. Various schemes of the CUSUM chart for autocorrelated data for sample
size of 4 are developed and compared with the schemes of the Shewhart X chart for
autocorrelated data. It is found that CUSUM chart outperforms the Shewhart X chart for
all the shifts and at all the levels of correlation () for sample size (n) of four. So, the
CUSUM control chart is much better option for faster detection in the process mean.
Damped Oscillator under Stokesian Realm and Added-Mass Effects
Jiradech Kongthon
Assumption University of Thailand, Thailand
Abstract: This article presents the modeling and simulations of a sphere that oscillates
vertically in a high-viscosity liquid. The sphere is connected to a linear spring and given an
initial displacement from the equilibrium position to allow free vibration and the sphere
undergoes the inertia force, the spring force, the drag force, the buoyancy force, the gravity
force, and the added-mass force. In general, the added-mass force is not considered in
modeling an oscillator. In this article, the added-mass force is included in the modeling to
reflect the reality and the effect of the added-mass force is investigated and discussed. The
main contribution of this article is to model and simulate the system and to show that (i) the
natural frequency of oscillation is reduced by the added mass; (ii) the damping ratio is also
reduced by the added mass; (iii) the return time to the original equilibrium is increased by
the added mass; (iv) furthermore, the difference on the densities between the liquids
density and the spheres density dictates the degree of the added-mass effect; i.e., the effect
due to the added mass is small if the difference on the densities is large.
19/ 40
CA012
CA007
Abstract: Recently RIAs (Rich Internet Applications) have been widely adopted in Web
applications. Although RIAs realize that Web pages change dynamically, their accessibility
is often insufficient, preventing people with disabilities from properly operating and
recognizing content. To resolve these problems, the WAI (Web Accessibility Initiative) of
the W3C (World Wide Web Consortium) has established accessibility guidelines, called
WAI-ARIA (Web Accessibility Initiative - Accessible Rich Internet Applications), which
provide detailed instructions to make RIAs accessible for users with disabilities employing
ATs (assistive technologies). ATs include screen readers, alternative keyboards, screen
magnification software, and voice recognition software. Applying these guidelines to Web
applications is extremely burdensome due to the numerous elements in the guidelines.
Herein we propose a method to automatically evaluate the accessibility of Web applications,
reducing developers' efforts and costs. The target RIAs of our current method are developed
by JavaScript.
Authentication Protocol for Healthcare Services over Wireless Body Area Networks
Seulgi Shin, Sung Woon Lee, Hyunsung Kim
Tongmyong University, Korea
CA013
Abstract: Ubiquitous healthcare service is one of the major fields of research for wireless
body area networks (WBANs). Ensuring complete and a good level of security for such
types of WBANs, is not a trivial task. It is practically impossible to deal with all sorts of
security threats with a single mechanism. This paper reviews Khan et al.s authentication
protocol for healthcare service over WBANs and shows that it does not provide forward
secrecy. Furthermore, this paper proposes a remedy protocol for Khan et al.s authentication
protocol and the previous related protocols. The proposed protocol could be utilized as a
basic security building block for healthcare applications based on WBANs.
Parallel Matrix Multiplication on Centralized Diamond Architecture
Masumeh Damrudi and Kamal Jadidy Aval
Islamic Azad University, Iran
Abstract: In this paper, we introduce a matrix multiplication algorithm on the new born
parallel architecture named Centralized Diamond architecture. Matrix multiplication is a
20/ 40
CA008
MS15004
Abstract: Mobile payment is being adopted all over the world in different ways. Along with
the increased convenience at the point of sale, mobile payment acceptance can also bring
new risks to the security of cardholder data. Authentication is a basic security building block
for mobile payment and there are some of research results, which were proven to be weak
against attacks. This paper proposes a new authenticated key agreement based on NFC for
mobile payment to solve the problems in the previous researches. The proposed scheme is
secure against various attacks and could provide privacy to the participants.
HPC (High-Performance Computing) for Big Data on the Cloud: Opportunities and
Challenges
Mohamed Riduan Abid
Alakhawayn University in Ifrane
MS15005
Abstract: Big data and Cloud computing are emerging as new promising technologies,
gaining noticeable momentum in nowadays IT. Nowadays, and unprecedentedly, the amount
of produced data exceeds all what has been generated since the dawn of computing; a fact
which is mainly due to the pervasiveness of IT usage and to the ubiquity of Internet access.
Nevertheless, this generated big data is only valuable if processed and mined. To process and
mine big data, substantial HPC (High-Performance Computing) power is needed; a faculty
which is not that affordable for most, unless we adopt for a convenient venue, e.g., cloud
computing. In this paper, we propose a blue print for deploying a real-world HPC testbed.
This will help simulating and evaluating HPC relevant concerns with minimum cost.
Indeed, cloud computing provides the unique opportunity for circumventing the initial cost
of owning private HPC platforms for big data processing, and this by providing HPC as a
service (HPCaaS). In this paper, we present the subtleties of a synergetic fitting between
big data and cloud computing. We delineate opportunities and address relevant
challenges.To concretize, we advocateusing private clouds instead of public ones, and
propose using Hadoop along with MapReduce, on top of Openstack, as a promising venue
for scientific communities to own research-oriented private clouds meant to provide HPCaaS
for Big data mining.
Parallel Simulation Algorithm of VLSI for Multicore Workstations with Dynamic
Faults Grouping
Dmitry Ivanov
Institute of Mathematics of National Academy of Sciences of Ukraine, Ukraine
21/ 40
MS15029
Abstract: A new algorithm for parallel fault simulation of VLSI on multicore workstations
with common memory is proposed. To speeding up the algorithm two-level parallelization is
used. First, main schema of the algorithm is based on the concurrent many-threaded
simulation of the groups of faults for each input vector. Second, each group of faults is
simulated in bit-parallel way. The dynamic fault grouping is adopted. The results of
computational experiments on ISCAS-89 benchmarks circuits are reported, which are
obtained on the 12-core workstation.
Extraction of Region with Excessive Disparities Using Block based Disparity
Calculation
Sang Hyun Kim, Jeong Yeop Kim and Gil Ja So
Youngsan University
CA006
Abstract: In this paper, we propose the method extracts regions with excessive disparities in
3D stereoscopic images using block based disparity calculation for fatigue evaluation. The
proposed method calculates the disparity-map using not pixel based method but block based
method. The disparity-maps resolution is decreased in proportion to block size. In the
proposed method, first, the disparity-map is calculated based on BMA (block matching
algorithm). The normalized cross- correlation is used as the cost function. The excessive
disparity regions are extracted using the automatically decided threshold with Otsu algorithm
in the disparity-map. Next, to eliminate the small regions, the extracted regions are post
processed by morphological filter, erosion and dilation. The sum of the disparities in the
object regions which is normalized with image size is used as parameter in fatigue evaluation
model. To extract the exact object, the object regions will be segmented in 3D stereoscopic
left image using region growing.
NFC based Privacy Preserving User Authentication Scheme in Mobile Office
Jungsub Ahn, Sung Woon Lee, and Hyunsung Kim
Tongmyong University, Korea
MS15030
Abstract: Smartwork is a flexible type of work that provides users with a more convenient
work possibility, which refers to employees who work away from the companys office in
any capacity. Smartwork technologies often need additional protection because their nature
generally places them at higher exposure to external threats. Therefore, smartwork
application should provide securing infrastructures for both of users, inside and outside of
the organization. This paper proposes a NFC based privacy preserving user authentication
scheme as a basic security building block for smartwork environment, which is focused only
on the mobile office one of smartwork environment. The proposed scheme provides
anonymity and untraceability, which requires for the ubiquitous environment applications.
The proposed scheme could be used as a basic building block for security on the various
smartwork environments.
The Evaluation Model of the Visual Fatigue on the 3D Stereoscopic Video
Gilja So, Sanghyun Kim and Jeongyeop Kim
Youngsan University, Korea
Abstract: We propose content dependent factors to be an argument of evaluation model of
visual fatigue. The content factors we choose are the strength and size of the excessive
disparity range, the complexity of the background objects, the variation of the motion-depth,
22/ 40
MS15018
the contrast of the objects in the scene. We verify that these factors have a relationship with
visual fatigue through the experiment and suggest methods to extract the degree of these
factors automatically.
Simulating SQL-Injection Cyberattacks using GNS3
Aadil Al-Mahrouqi, Patrick Tobin, Sameh Abdalla and Tahar Kechadi
University College Dublin, Dublin
Q007
Q020
The developed model was applied within an automotive case study which shows a
theoretical energy saving potential of 36.2 %. This demonstrates the potential and relevance
of modeling energy estimation within early development phases.
Multi-state reliability Assessment of Tool Magazine & Manipulator
Yi Ou, Jun Han, Yi Liang, Aihua Yin, Hutian Feng, Yulin Wang
Nanjing University of Science and Technology, China
Abstract: Tool Magazine & Manipulator has many intermediate states on tool changing
between success and failure, Multi-State Reliability theory must be applied in modeling and
analyzing the process of performance degradation. Combined with the data from reliability
test and performance test, carry out definition on sub-systems states of Tool Magazine &
Manipulator, use Markov random process theory in calculation of sub-systems states
probability, use Universal Generation Function (UGF) construct Multi-State Reliability
model of system, and give assess formula of performance reliability in a certain demands,
this method is easy to understand, makes up the shortage of Two-State Reliability analysis.
16:00-16:20
Coffee Break
CA010
University of Greenwich, UK
CA017
Abstract: The threat posed by fast-spreading malware is significant, particularly given the
fact that network operator / administrator intervention is not likely to take effect within the
typical epidemiological timescale of such infections. The cost of zero-day network worm
outbreaks has been estimated to be up to US$2.6 billion for a single worm outbreak.
Zero-day network worm outbreaks have been observed that spread at a significant pace
across the global Internet, with an observed rate of reaching more than 90 percent of
vulnerable hosts within 10 minutes. An accepted technology that is used in addressing the
security threat presented by zero-day worms is the use of simulation systems, and a
common factor determining their efficacy is their performance. An empirical comparison of
a sequential and parallel implementation of a novel simulator, the Internet Worm Simulator
(IWS), is presented detailing the impact of a selection of parameters on its performance.
Experimentation demonstrates that IWS has the capability to simulate up to 91.8 million
packets transmitted per second (PTS) for an IPv4 address space simulation on a single
workstation computer, comparing favourably to previously reported metrics. It is concluded
that in addition to comparing PTS performance, simulation requirements should be taken
into consideration when assessing the performance of such simulators.
Modeling and Querying Multidimensional Bitemporal Data Warehouses
Canan Eren ATAY and Gzde ALP
Marmara University, Turkey
CA1004
Abstract: Data warehouses have been considered to be the key aspect of success for any
Decision Support System (DSS). Temporal database research has produced important
results in this field. Data warehouses store historical data, and therefore could clearly
benefit from the research on temporal databases. Temporal data warehouses join the two
fields of temporal databases and data warehouse research. This paper introduces a
bitemporal data warehouse model that both valid time and transaction time are attached to
attributes. Data warehouse objects and cubes are created with multidimensional bitemporal
relational database. Performance of available well-known relational database and
bitemporal extension for data warehouse is evaluated and compared in terms of execution
time and disk space consumption with the set of queries.
Improving the Recommendation Accuracy for Cold Start Users in Trust-Based
Recommender Systems
Abdelghani Bellaachia and Deema Alathel
The George Washington University, USA
Abstract: Recommender systems have become extremely popular in recent years due to
their ability to predict a users preference or rating of a certain item by analyzing similar
users in the network. Trust-based recommender systems generate these predictions by using
an explicitly issued trust between the users. In this paper we propose a recommendation
algorithm called Averaged Localized Trust-Based Ant Recommender (ALT-BAR) that
follows the methodology applied by Ant Colony Optimization algorithms to increase the
accuracy of predictions in recommender systems, especially for cold start users. Cold start
users are considered challenging to deal with in any recommender system because of the
few ratings they have in their profiles. ALT-BAR reinforces the significance of trust
between users, to overcome the lack of ratings, by modifying the way the initial pheromone
25/ 40
levels of edges are calculated to reflect each edges associated trust level. An appropriate
initialization of pheromone in ant algorithms in general can guarantee a proper convergence
of the system to the optimal solution. ALT-BARs approach allows the ants to expand their
search scope in the solution space to find ratings for cold start users while exploiting
discovered good solutions for the sake of heavy raters. When compared to other algorithms
in the literature, ALT-BAR proved to be extremely successful in enhancing the prediction
accuracy and coverage for cold start users while still maintaining fairly good results for
heavy raters.
MS15031 The Modeling of Color Fatigue in 3-Dimensional Stereoscopic Video
Jeong-Yeop Kim, Sang-Hyun Kim andGil Ja So
Youngsan University, Korea
Abstract: The change of color information on 3-dimensional stereoscopic video usually
causes visual fatigue. Color information also gives some effect on the depth recognition
because of the visual perception for the effect such as forward color. However the effect
of forward colordoes not gives much influence on depth perception. Therefore, the
analysis of color itself rather than the concept of forward color is important. In this paper,
the method for calculating visual fatigue by color only is proposed.
MS15108 Plc Based Automatic Intelligent Car Parking System
Faraz Islam, Mohammad Adil, Sayeed Akhtar Alvi
Aligarh Muslim University
Abstract: The main purpose of this paper was to design and implement an intelligent car
parking system. The proposed system works on three modes such as ON, OFF and
EMERGENCY.
The system developed is able to sense the presence of the vehicles standing at the main car
parking gate through an IR sensor. These IR sensors give their output to the PLC
(programmable logic controller).
Due to lack of parking spaces and skilled labour, there is a global shift towards the
automatic car parking system to calculate accurate space available for car and revenue
collection as a parking fee.
This new scheme provides an improvement and reliability in the current car parking system
and this system can be implemented easily because it is very economical as it uses solar
panel for its power consumption and also the cheap IR sensor reduces the implementation
cost.
MS15305 A Study on Diesel Plug-in Hybrid Vehicle Powertrain Analysis and Modeling
Ho-Un Jeong, Kyu-Hyun Sim, Kwan-Soo Han, and Sung-Ho Hwang
Sungkyunkwan University
Abstract: TMED (Transmission Mounted Electric Device) PHEV(Plug-in Hybrid Vehicle)
powertrain consist of engine, engine clutch, motor, transmission ,differential gear, wheel
and tire. By disengaging engine clutch, the vehicle can use only motor power for driving.
After battery depleted, engine and motor are cooperate to increase engine efficiency.In this
paper, diesel PHEV (Plug-in Hybrid Vehicle) powertrain dynamic equations was derived
from longitudinal vehicle model. In order to design optimal powertrain capacity in given
specifications, various capacities of engine and motor model was derived from commercial
26/ 40
Q014
engine and motor test data. Engine and Motor model use input signal and input shaft speed
to calculate torque outputs, also calculate energy conversion efficiency.Using MATLAB
Simulink program, diesel PHEV dynamic model was created from engine and motor
model, and powertrain dynamic equations. Using developed simulator, we analysis basic
performance of diesel PHEV.
Model Approximate Method of Complex System
Juan Chen, Yuqin Liu, Shiang Qi, and Qing Guo
Beijing University of Chemical Technology, China
Q018
Abstract: During the internal model control of multivariate multiple time delay system,
process model is very important in the design of controller, but complicated mathematical
model is often encountered in decoupled multivariable multiple time delay system and
needs to be reduced order. So this paper proposes a low order identification structure and
an optimization method for model approximation of the complex model containing the time
delay and non-minimum phase parts. In this paper, with the adoption of Pade
approximation, a suboptimal approximate algorithm is used for the model approximation
and model identification. The integral square error index and the frequency-domain integral
square error index, as well as the integral time absolute error index is used to evaluate the
approximate model comprehensively. Simulation results show that using the proposed
model identification structure and adopting the suboptimal approximate algorithm to deal
with this kind of approximation, that can get an approximate model that well reveals the
dynamic characteristics of system and has a high approximation precision.
Measurement and Control System Design of Precision Retentivity of Rolling Linear
Guide Pair
Jun Han, Hutian Feng, Yi Ou, Yi Liang, Aihua Yin, Li Zu
Nanjing University of Science and Technology, China
CA029
WSNs and On-board Visual Fuzzy Servoing on Blimp Robot for Tracking Purposes
Rami Al-Jarrah, Mohammad A. Al-Jarrah, Hubert Roth
Siegen University, Siegen, Germany
Q015
Abstract: The aerial robots represent an interested and rich area of research because they
are very useful to perform complex tasks such as localization and tracking targets. To
develop blimp system that is appropriate in diversity scenarios, an intelligent control with
high autonomy degree is required. Therefore, we design blimp robot based on embedded
system; then, we present several fuzzy sets models that should deal with autonomous,
navigation and visual tracking problems. These models are empirically designed by
combining the possibilities distributions theory with fuzzy logic. Thus, this paper addresses
the problem of tracking robots in parallel with achieving the cooperative behavior based on
computer vision system and artificial intelligent control to improve the efficiency of such
system. In addition, considering use of wireless sensor networks for estimation
multi-targets locations and the distances between them is presented.
Modelling of Diagrid Structural System for High Rise Buildings
Gulshan Mann and Vijay Pal Singh
Department of Civil Engineering, National Institute of Technology, Kurukshetra
Abstract: As in modern era population of metropolitan cities increased very rapidly. Due
to which construction of high rise buildings is justified. In high rise building lateral loads
are critical than gravity load. Presently the Framed, tubular, space truss, super frame
structural systems are used to construct high rise buildings. Nowadays a new system named
diagrid system has been adopted as a replacement of framed structure. In diagrid system the
diagonal members are designed as tress element. Diagrid structural system is unique as it
resist lateral load by its axial action. Efficiency of diagrid structural system mainly depends
upon angle of diagrid. In the present study a 40 storey building with and without corner
column has been analyzed. Comparison of analysis results in term of time period and top
28/ 40
Q019
storey displacement for different angles is presented in this paper. The entire modeling and
analysis of the structure has been done using SAP-2000 software.
Modeling and Error Analysis of the Parallelism Measurement for Linear Rolling
Guide Pair
Yi Liang, Yulin Wang*, Aihua Yin, Li Zu, Hutian Feng, Dan Xu
Nanjing University of Science and Technology, China
Abstract: The parallelism of a linear rolling guide pair directly affects the machining
precision of machine tools. Therefore, its necessary and meaningful to find the
measurement method to test them. A test method of parallelism of rolling linear guide pairs
based on non-contact laser displacement sensors has been put forward. The paper derives
an analytical testing algorithm of measurements of five laser displacement sensors to obtain
the parallelism and their error analysis of linear rolling guide pairs. The parallelism of
linear guide pairs includes five movement precisions which are horizontal parallelism,
vertical parallelism, elevation angle, deflection angle and roll angle of a slider block
relative to its guide way. The converting formulas from the laser sensors measurement to
the two parallelisms and three angles are derived based on the basic theory of three-points
can determine a plane. Because the sensors are installed with inevitably errors, the
deviation of two parallelisms and three angles caused by the errors are analyzed. Results
show that two parallelisms and three rotation angles depend critically on the measuring
length of five laser sensors. The paper provides an effective method for measuring the
parallelism and makes progress of the automatic detection of a linear rolling guide pair.
MS15002 Optimal Dispatch of Distributed Generation in a Grid-Tied Microgrid Via Direct
Search Method
Wei-Tzer Huang, Kai-Chao Yao and Chun-Ching Wu
Department of Industrial Education and Technology in National Changhua University
of Education
Abstract: This paper proposed a simple and efficient approach, Minimum Incremental
Cost Approach(MICA), for the optimal schedule in a grid-tied micro-grid (MG) with
various types of distributed generation (DG). The fuel costs generated by these DGs are
determined using quadratic and linear functions dependent on the types of DGs. The
proposed approach, MICA, is able to handle several inequality constraints without
introducing any multipliers and furthermore it can solve the non-derivative problems or the
fuel cost functions being much more complicated. Accordingly, the MICA is proposed for
determining the optimal schedule of MGs with various types of DG to minimize generation
costs under grid-tied operation. Results demonstrate that the proposed MICA is a simple
approach to determining the optimal schedule in MGs with various types of DG.
MS15006 Innovation Process Simulation on the base "Predator and Prey" Model
Victor Romanov, Helen Agafonova,Saltanat Sandybaeva and Nikita Mullin
Russian Plekhanov University of Economics
Abstract: The paper is devoted to the simulation of two populations coexistence, one of
which represents old big corporations and the other one small innovative business. It is
hard to imagine modern digital world without such combination of words as computer
modeling and simulation. This discipline gains popularity throughout the whole scientific
29/ 40
Abstract: The harmonic gears used in servo drive systems of aerocrafts have the features
of over loading and working for a short time. They are required to be smaller and lighter.
Theoretical research and finite element analysis are given to the deformation characteristic
of the flexible gear for the harmonic drive. This paper studies the initial deformation of the
flexible gear, and compares with the result of finite element analysis. Overload is applied to
the flexible gear, and by using ABAQUS FEA software, the distortions on the flexspline
can be found. The research results provide theoretical references for improving load
capacity of harmonic drive and designing this type of harmonic drive.
MS15038 The Structure Optimization of Test-bed for Load Bearing Performance of Harmonic
Gear Drive
Hetian Feng, Li Zu, Yiwen Zhang, Yi Ou, Yi Liang, Jun Han and Aihua Yin
Nanjing University of Science and Technology, China
Abstract: This paper aims at the structural design and optimization of the test-bed for the
load bearing performance of the harmonic gear drive. Based on the computer software, the
mode analyses are given to the test-bed. The effects brought by different structures of
stiffened plate on bed natural frequencies and deformations are studied. The Loading and
overloading tests of the harmonic gear drive can be realized on the optimized designed
test-bed, we can know the bearing capacity and transmission efficiency of the harmonic
gear drive.
31/ 40
Listener List
ICCMS 2015
ICICA 2015
Helen Agafonova
Annalyn Casino
Russian Plekhanov University of Economics, eXcode Innovations Corp, Philippines
Russian Federation
Saltanat Sandybaeva
AZEEZ OLADIPUPO TIJANI University Of
Russian Plekhanov University of Economics, Johannesburg, South Africa
Russian Federation
Mwembo Olimo Alain
Yvan RuedasNestle Philippines-Philippines
Kyuhyun Sim
Sungkyunkwan University, Korea
Ibrahim Salum Mohammed
Convent Holdings Ltd, Tanzania
Rehema Godwin Mwambipile
Convent Holdings Ltd, Tanzania
Julian Lee
32/ 40
Hotel Casa 400 is the ideal starting point in Amsterdam. Thanks to our unique location near the Amstel
Station, youll have the whole city at your feet. In addition, Casa 400 has a large underground car park.
Casa 400 is a modern hotel, which opened its doors in the spring of 2010. Staying with us means having
no worries. Hospitality and service is what we focus on in Casa 400. The reception team is always at your
disposal!
CONTACT:
+31 (0)20 665 11 71
Eerste Ringdijkstraat 4
1097 BC Amsterdam
33/ 40
www.icccm.org
Welcome to ICCCM 2015
2015 5th International Conference on Computer Communication and Management (ICCCM 2015) will be
held during May 18-19, 2015 in Rome, Italy together with the workshops ICSEM 2015 and ICIII 2015.
The aim of ICCCM 2015 is to provide a platform for researchers, engineers, academicians as well as
industrial professionals from all over the world to present their research results and development activities
in Computer Communication and Management. This conference provides opportunities for the delegates
to exchange new ideas and application experiences face to face, to establish business or research relations
and to find global partners for future collaboration.
Important Dates
Paper Submission (Full Paper)
Notification Day
Registration Deadline
Conference Date
March 5, 2015
March30, 2015
April 15, 2015
May 18-19, 2015
Publication
Conference papers can be selected and published into International Journal of Computer and
Communication Engineering (IJCCE) or Journal of Advanced Management Science(JOAMS) excellent
papers will be select to be published in International Journal of e-Education, e-Business, e-Management
and e-Learning(IJEEEE)
E-mail: icccm@iacsit.or
34/ 40
Contact US
Ms. Yolanda
E-mail: icemp@iacsit.org
35/ 40
2015/03/30
Acceptance Notification
2015/04/20
Registration Deadline
2015/05/05
Conference Date
2015/06/27-30
Paper Publication
All accepted papers will be published in the Trans Tech Publication Ltd. from
Switzerland www.scientific.net/AMM-and indexed by Elsevier in on-line data base(see
the web page by click here)
Contact Us
Inquires referred to any general questions, please email to the secretariat at icaem@iacsit.org.
Yoyo Yang,
Conference secretary
36/ 40
Important Dates
Submission Deadline
Notification Deadline
Registration Deadline
Conference Date
Contact Us
Ms. Yoyo Yang
E-mail: icikm@iacsit.org
Tel (AM 9:30--PM 12:00, PM 13:30--PM 18:00, Monday to Friday):
+1-518-478-2659 (USA)
+86-28-86528758 (China)
37/ 40
WELCOMETO ICACTE2015
ICACTE 2015 will be held in Berlin, Germany during August 13-14, 2015.
Welcome to the official website of the 8th International Conference on Advanced Computer Theory and
Engineering (ICACTE 2015). The conference will be held in Berlin, Germany during August 13-14,
2015. Together with worshops ICETC 2015 and ICCRC 2015. The aim objective of ICACTE is to present
the latest research and results of scientists (preferred students, PhD Students, and post-doc scientist)
related to Advanced Computer Theory and Engineering topics. This conference provides opportunities for
the different areas delegates to exchange new ideas and application experiences face to face, to establish
business or research relations and to find global partners for future collaboration. We hope that the
conference results constituted significant contribution to the knowledge in these up to date scientific
field.
Submitted papers can be selected and published into one of the following Journals. Registration fee
is different of each journal. Get to know the registration fee here.
*WIT Transactions on Engineering Sciences (ISSN: 1743-3533)
Indexed by EI Compendex and ISI
*International Journal of Computer Theory and Engineering (IJCTE)
Abstracting/Indexing: Index Copernicus,Electronic Journals Library, EBSCO, Engineering & Technology Digital Library, Google Scholar,
Ulrich's Periodicals Directory, Crossref, ProQuest, WorldCat, andEI (INSPEC, IET), Cabell's Directories.
IMPORTANT DATES
Full Paper Submission Deadline
Notification of Acceptance
Authors' Registration
Conference date
CONTACTUS
Ms. Yolanda Dong
E-mail: icacte@iacsit.org
38/ 40
Note
39/ 40
40/ 40