IEEE|6th ICCC 2020 - Co nference Pro g ram 2018-conference program.pdf · 2020-01-16 · 1 Contents...
Transcript of IEEE|6th ICCC 2020 - Co nference Pro g ram 2018-conference program.pdf · 2020-01-16 · 1 Contents...
ICCC
December 7-10, 2018 Dorsett Grand Chengdu,China
成都帝盛君豪酒店
HT
TP
://
WW
W.I
CC
C.O
RG
/
Sponsored By
Supported By
2018 IEEE 4th International Conference on Computer and Communications
Conference Program
1
Contents
Welcome Letter 2
Conference Committees 3
Useful Information 4
Instructions for Presentation 5
Conference Agenda
6
Introduction of Speakers
16
Parallel Presentation Sessions
Parallel Oral Session 1-7, Dec. 8, 2018 27
Parallel Oral Session 8-14, Dec. 8, 2018 39
Poster Presentation Session 15-16, Dec. 8, 2018 46
Parallel Oral Session 17-23, Dec. 9, 2018 51
Parallel Oral Session 24-30, Dec. 9, 2018 68
Poster Presentation Session 31-32, Dec. 9, 2018 81
Parallel Oral Session 33-39, Dec. 10, 2018 85
Poster Presentation Session 40, Dec. 10, 2018 99
Parallel Oral Session 41-47, Dec. 10, 2018
Parallel Oral Session 48-54, Dec. 10, 2018
101
115
Poster Presentation Session 55-56, Dec. 10, 2018 129
Academic Visiting 133
One Day Tour 134
Note
135
2
Welcome Letter
It is our great pleasure to welcome you to attend the 2018 IEEE 4th International Conference on
Computer and Communications (ICCC) during Dec. 7-10, 2018 in Chengdu. ICCC 2018 is dedicated to
issues related to computer and communications.
The major goal and feature of ICCC is to bring academic scientists, engineers, industry researchers
together to exchange and share their experiences and research results, and discuss the practical
challenges encountered and the solutions adopted. Prestigious experts and professors has been invited
to deliver the latest information in their respective expertise areas. It will be a golden opportunity for
the students, researchers and engineers to interact with the experts and specialists to get their advice
or consultation on technical matters, sales and marketing strategies. The conference has 5 Keynote
Speakers, 5 Plenary Speakers, 6 Invited Speakers, and 56 Technical Sessions.
The proceedings of ICCC consist of 502 excellent papers accepted from among papers which were
submitted to ICCC from universities, research institutes, and industries. All the papers were peer-
reviewed by conference committee members and reviewers.
We’d like to express our sincere gratitude to everyone who has contributed to ICCC 2018 as its success
could have only been achieved through a team effort. Additionally, our special thanks go to all the
conference speakers for their insightful and contemporary thought leadership on many emerging
research topics. We would also like to especially thank the conference chairs, the program chairs and
the session chairs, for putting the conference together; as well as to all the technical committee
members and reviewers for their excellent work in reviewing the papers and their other academic
support efforts. Finally, we are particularly grateful to all the authors and presenters of the papers as
well as all the attendees for their contributions to this wonderful conference.
Conference Organizing Committees
3
Conference Committees
Conference Advisory Committee
Prof. Leyi Wang, IEEE Fellow, Wayne State University, USA
Conference General Chairs
Prof. Sheng-Uei Guan, Xi'an Jiaotong-Liverpool University, China
Prof. Yulin Wang, Wuhan University, China
Conference Co-Chairs
Prof. Tianrui Li, Southwest Jiaotong University, China
Prof. Xiaohai He, Sichuan University, China
Prof. Yutaka Ishibashi, Nagoya Institute of Technology, Japan
Organizing Committee Co-Chairs
Prof. Bo Yan, University of Electronic Science and Technology of China, China
Prof. Yang Yang, Sichuan University, China
Prof. Yan Yang, Southwest Jiaotong University, China
Conference Program Chairs
Prof. Nan Wang, California State University, Fresno, USA
Prof. Ai Bo, Beijing Jiaotong University, China
Prof. Yinglei Song, Jiangsu University of Science and Technology, China
Prof. Zhanji Wu, Beijing University of Posts and Telecommunications, China
Prof. Wanyang Dai, Nanjing University, China
Publicity Chair
Prof. Pingguo Huang, Seijoh University, Japan
Technical Committees List is available at website: http://www.iccc.org/committee.html
4
Useful Information
Conference Venue
Dorsett Grand Chengdu (成都帝盛君豪酒店)
Website: http://www.dorsetthotels.com/chengdu/index.php
Address: 168 Xi Yulong Street (In Google Map, 168 W Yulong St) Qingyang District, Chengdu, Sichuan,
610041 China
(Contact: 刘琴 (Winnie Liu); Email: [email protected]; Mobile: (86) 1592895 0662 )
Free WIFI access is available for all delegates in the conference venue, please connect to
“DORSETT-WIFI” and no password is needed.
Weather
Average Temperature in December in Chengdu
5℃-11℃
Transportation
Public Transport: Chengdu Metro Line 1 (06:15-23:00) and Chengdu Metro Line 4 (06:10-23:30) are
both available and please take off at “Luomashi Station” G Exit (骡马市站-G 出口).
Taxi: It will cost around 60 RMB from Shuangliu International Airport to Conference Venue.
Attention
Please take care of your belongings in the public places. Don’t stay too late in the city, don’t be alone
in the remote area. Be aware of the strangers who offer you service, signature of charity, etc., at many
scenic spots. You can search more Tourist Information and Security tips online.
Contact Us
Ms. Heleny Yi
Email: [email protected]
Mobile: +86-13086600000
Website: http://www.iccc.org/
5
Instructions for Presentation
No-Show Policy
A paper not presented or presented by a non-author without prior written approval by the Conference
Technical Program Chair will be removed from the final conference proceedings before uploading to
IEEE Xplore. No refund will be made to authors of those papers.
Please come 10 minutes earlier before your session starts.
※ A best presentation will be selected from each session which will be announced and awarded a best
presentation certificate during the Conference Banquet On Dec. 8th and 9th, 2018.
Devices Provided by the Conference Organizer
Laptops (with MS-Office & Adobe Reader)
Projector & Screen
Laser Sticks
Portal Frame
Materials Provided by the Presenters
Oral Presentation: PowerPoint or PDF files. Please copy your slide file to the desktop before session
starts.
Poster Presentation: 841mm high and 594mm wide (A1 size), Poster must be in the “Portrait”
orientation (not “Landscape”). Please prepare the poster yourself and bring it to conference venue.
During your poster session, the author should stay by your poster paper to explain and discuss your
paper.
Duration of Each Presentation
Regular Oral Session: about 15 minutes of presentation including Q&A.
Poster Session: about 10 minutes of presentation for each poster.
About Dress Code
All participants are required to dress formally. Casual wear is unacceptable. National formal dress is
acceptable.
6
Conference Agenda
※Note:
7F: Dorsett Ballroom (帝盛厅), Meeting Room 3A (会议三厅 A), Meeting Room 3B (会议三厅 B) and
Meeting Room 6 (会议六厅)
5F: Meeting Room 8 (会议八厅), Meeting Room 9 (会议九厅) and Meeting Room 10 (会议十厅)
6F: Fu Yue Xuan (福悦轩中餐厅)
4F: Room Mudan (牡丹) and Furong (芙蓉)
2F: Yue Rong Café (悦蓉咖啡厅)
Dec. 7, 2018
10:00-17:00 Participants check-in & Materials Collection—Meeting Room 8 (5F)
Morning Schedule-Dec. 8, 2018
Venue: Dorsett Ballroom (7F)
Chair Person: Prof. Yang Yang, Sichuan University, China
08:30-09:00 Welcome Address
Prof. Xiaohai He, Sichuan University, China
Conference Opening Remarks
Prof. Yulin Wang, Wuhan University, China
TPC Chair Address
Prof. Zhanji Wu, Beijing University of Posts and Telecommunications, China
Experts Group Photo
09:00-09:40
Speaker I
Prof. Leyi Wang, IEEE Fellow, Wayne State University, USA
Speech Title: Embracing New Paradigms of Data- and Complexity-Based
Integration of Control, Communications, and Computing in Network Systems
7
09:40-10:20
Speaker II
Prof. Sheng-Uei Guan, Xi'an Jiaotong-Liverpool University, China
Speech Title: Opportunities and Challenges in Information Communications
Technology
10:20-11:10
Coffee Break and Group Photo
Chair Person: Prof. Yan Yang, Southwest Jiaotong University, China
11:10-11:50 Speaker III
Prof. Nan Wang, California State University, USA
Speech Title: BullDog Mote: Low Power Design Technologies for Wireless Sensor
Networks
11:50-12:30 Speaker IV
Prof. Thorsten Herfet, Saarland University, Germany
Speech Title: Enabling Multiview- and Light Field-Video for Veridical Visual
Experiences
12:30-14:00
Lunch-Yue Rong Café (2F) and Fu Yue Xuan (6F)
Afternoon Schedule-Dec. 8, 2018
Parallel Oral Sessions
14:00-16:00 Session1: Sentiment Analysis and Classification [Meeting Room 3A]
Papers: IC067 IC090 IC122 IC185 IC346 IC349 IC475 IC570
14:00-16:00 Session 2: Multimedia Technology and Network Protocol [Meeting Room 3B]
Papers: IC063 IC290 IC097 IC435 IC203 IC445 IC337 IC653
14:00-16:00 Session 3: Information Network and Application Technology
[Meeting Room 6]
Papers: IC274 IC643 IC243 IC548 IC328 IC489 IC636 IC642
14:00-16:00 Session 4: Mobile Computing and Cloud Computing [Meeting Room 9]
Papers: IC1011 IC410 IC499 IC651 IC093 IC291 IC342 IC414
8
14:00-16:00 Session 5: Algorithm Design and High Performance Computing
[Meeting Room 10]
Papers: IC580 IC269 IC386 IC444 IC484 IC486 IC519 IC524
14:00-16:00 Session 6: IP and Broadband Network Technology [Room Mudan]
Papers: IC022 IC526 IC553 IC258 IC1013 IC552 IC574 IC313
14:00-16:00 Session 7: Filter and Electronic Component Development [Room Furong]
Papers: IC154 IC382 IC092 IC234 IC403 IC704 IC711 IC563
16:00-16:20 Coffee Break
16:20-18:05 Session 8: Machine Learning and Calculation Method [Meeting Room 3A]
Papers: IC1022 IC215 IC339 IC387 IC512 IC585 IC130
16:20-18:05 Session 9: Channel Estimation [Meeting Room 3B]
Papers: IC181 IC191 IC412 IC080-A IC244 IC368 IC415
16:20-18:05 Session 10: Target Detection [Meeting Room 6]
Papers: IC087 IC546 IC667 IC058 IC348 IC169 IC646
16:20-18:05 Session 11: Microwave Communication Engineering [Meeting Room 9]
Papers: IC039 IC466 IC541 IC501 IC100 IC157 IC247
16:20-18:05 Session 12: Antenna Design and Development [Meeting Room 10]
Papers: IC040 IC102 IC1021 IC315 IC318 IC322 IC351
16:20-18:05 Session 13: Communication and Information System [Room Mudan]
Papers: IC113 IC400 IC277 IC633 IC404 IC421 IC442
16:20-18:05 Session 14: Image Matching and Image Classification [Room Furong]
Papers: IC470 IC161 IC142 IC151 IC165 IC594 IC698
Poster Presentation Sessions
14:00-16:00 Session 15: MIMO System and Performance Optimization [Meeting Room 8]
Papers: IC003 IC046 IC053 IC072 IC115 IC252 IC303 IC543 IC566 IC572 IC616 IC722
16:00-16:20 Coffee Break
9
16:20-18:20 Session 16: Navigation and Positioning Technology [Meeting Room 8]
Papers: IC148 IC641 IC294 IC567 IC054 IC270 IC371 IC083 IC462 IC528 IC631 IC236
18:30-20:30 Conference Banquet-Dorsett Ballroom (7F)
Morning Schedule-Dec. 9, 2018 Venue: Dorsett Ballroom (7F)
Chair Person: Prof. Yulin Wang, Wuhan University, China
08:45-09:25 Speaker V
Prof. Yutaka Ishibashi, Nagoya Institute of Technology, Japan
Speech Title: Cooperation among Humans and Robots with Force Feedback over
Network
09:25-10:05
Speaker VI
Prof. Tianrui Li, Southwest Jiaotong University, China
Speech Title: Data-Driven Intelligence: Challengues and our Solutions
10:05-10:45
Speaker VII
Prof. Ai Bo, Beijing Jiaotong University, China
Speech Title: Scatterer Modeling @ Mmwave Band in High-Speed Railway
Scenarios
10:45-11:05
Coffee Break
Chair Person: Prof. Yinglei Song, Jiangsu University of Science and Technology, China
11:05-11:35 Speaker VIII
Prof. Wanyang Dai, Nanjing University, China
Speech Title: Quantum-cloud-computing and MIMO Communication: Unification,
Fault Tolerance, and Bestgo Scheduling with Blockchain and Big Data
11:35-12:05 Speaker IX
Prof. Yan Yang, Southwest Jiaotong University, China
Speech Title: Muti-view Clustering and Its Applications
12:05-13:45
Lunch-Yue Rong Café (2F) and Fu Yue Xuan (6F)
10
Afternoon Schedule-Dec. 9, 2018
Invited Speakers Presentations and Parallel Oral Sessions
13:45-14:00 Invited Speaker I [Meeting Room 3A]
Prof. Shinji Sugawara, Chiba Institute of Technology, Japan
Speech Title: Distributed Systems for Contents Sharing --- From Peer-to-Peer to
Edge and Fog Computing
14:00-16:00
Session 17: Ad Hoc Network and Wireless Transmission Technology
[Meeting Room 3A]
Papers: IC557 IC597 IC625 IC125 IC128 IC452 IC558 IC480
13:45-14:00 Invited Speaker II [Meeting Room 3B]
Prof. Watanabe Histoshi, Tokyo University of Science, Japan
Speech Title: Reliability Management of the Nationwide Telecommunication
Network-Experiences in the Japanese PSTN Network
14:00-16:00
Session 18: Internet of Things Technology and Engineering Applications
[Meeting Room 3B]
Papers: IC530 IC064 IC136 IC232 IC323 IC481 IC600 IC604
13:45-14:00 Invited Speaker III [Meeting Room 6]
Prof. Herwig Unger, University of Hagen, Germany
Speech Title: Innovative Structures for the WWW
14:00-16:00
Session 19: Communication Network Resource Allocation and Management
[Meeting Room 6]
Papers: IC137 IC639 IC654 IC1008 IC280 IC257 IC200 IC1012
13:45-14:00 Invited Speaker IV [Meeting Room 9]
Assoc. Prof. Emanuel S. Grant, University of North Dakota, USA
Speech Title: Software Engineering Formal Specification Methodology in
Augmented and Virtual Reality Environments- A Proposal
14:00-16:00
Session 20: Cyber Security [Meeting Room 9]
Papers: IC206 IC205 IC503 IC437 IC492 IC532 IC657 IC326
11
13:45-14:00
Invited Speaker V [Meeting Room 10]
Asst. Prof. Yuichiro Tateiwa, Nagoya Institute of Technology, Japan
Speech Title: LiNeS: Network Administration Exercise System with Support
Functions for Finding and Helping Stuck Students
14:00-16:00
Session 21: Coding Theory and Method [Meeting Room 10]
Papers: IC043 IC062 IC1010 IC637 IC457 IC673 IC510 IC536
13:45-14:00 Invited Speaker VI [Room Mudan]
Prof. Pingguo Huang, Seijoh University, Japan
Speech Title: Will Transmission with Haptic Sensation in Networked Virtual
Environment
14:00-16:00
Session 22: Embedded System and Intelligent Control Engineering
[Room Mudan]
Papers: IC099 IC135 IC145 IC078 IC188 IC285 IC345 IC595
13:45-16:00 Session 23: Face Recognition [Room Furong]
Papers: IC490 IC539 IC568 IC699 IC705 IC021 IC589 IC147 IC502
16:00-16:20 Coffee Break
16:20-18:20 Session 24: Software Development and Testing [Meeting Room 3A]
Papers: IC709 IC242 IC073 IC196 IC329 IC668 IC551 IC025
16:20-18:20 Session 25: Big Data Processing and Key Technologies [Meeting Room 3B]
Papers: IC1002 IC138 IC158 IC278 IC284 IC335 IC413 IC507
16:20-18:20 Session 26: Medical Image Processing and Method [Meeting Room 6]
Papers: IC256 IC051 IC564 IC596 IC071 IC520 IC569 IC221
16:20-18:20 Session 27: Neural Network Theory and Application [Meeting Room 9]
Papers: IC458 IC461 IC529 IC602 IC635 IC648 IC676 IC702
16:20-18:20 Session 28: Text Classification and Semantic Analysis [Meeting Room 10]
Papers: IC422 IC716 IC301 IC180 IC201 IC383 IC605 IC708
16:20-18:20 Session 29: Computer Science and Engineering [Room Mudan]
Papers: IC491 IC562 IC632 IC199 IC672 IC085 IC518 IC132
12
16:20-18:20 Session 30: Smart Grid and Electrical Engineering [Room Furong]
Papers: IC186 IC515 IC082 IC432 IC504 IC508 IC578 IC249
Poster Presentation Sessions
14:00-16:00 Session 31: Data Theory and Engineering [Meeting Room 8]
Papers: IC010 IC101 IC120 IC173 IC275 IC464 IC476 IC533 IC537 IC707 IC320 IC692
16:00-16:20 Coffee Break
16:20-18:20 Session 32: Routing Protocol Design and Algorithm [Meeting Room 8]
Papers: IC433 IC213 IC263 IC334 IC423 IC493 IC523 IC582 IC591 IC603 IC661 IC273
18:30-20:30 Conference Banquet-Dorsett Ballroom (7F)
Morning Schedule-Dec. 10, 2018
Parallel Oral Sessions (10:30-10:50 Coffee Break Time)
09:00-12:20 Session 33: Modern Information Theory and Technology [Meeting Room 3A]
Papers: IC324 IC424 IC140 IC590 IC626 IC176 IC405 IC710 IC723 IC606 IC168 IC362
09:00-12:20 Session 34: Signal Analysis and Method [Meeting Room 3B]
Papers: IC207 IC075 IC451 IC057 IC440 IC1019 IC1007 IC264 IC299 IC353 IC479
IC617
09:00-12:20 Session 35: Pattern Recognition [Meeting Room 6]
Papers: IC718 IC049 IC121 IC241 IC288 IC296 IC366 IC583 IC239 IC701 IC534 IC420
09:00-12:20 Session 36: Computer Vision and Image Processing [Meeting Room 9]
Papers: IC333 IC024 IC516 IC696 IC139 IC286 IC195 IC390 IC573 IC706 IC179 IC144
09:00-12:20 Session 37: Neural Network Theory and Application [Meeting Room 10]
Papers: IC077 IC107 IC123 IC160 IC174 IC233 IC336 IC340 IC347 IC359 IC216 IC629
09:00-12:20 Session 38: Information System Management and Scheduling [Room Mudan]
Papers: IC081 IC1004 IC182 IC608 IC615 IC009 IC068 IC1015 IC193 IC577 IC575
IC609
13
09:00-12:20 Session 39: Image Denoising and Image Enhancement [Room Furong]
Papers: IC612 IC618 IC267 IC131 IC153 IC540 IC356 IC044 IC684 IC691 IC292 IC079
Poster Presentation Session (10:00-10:20 Coffee Break Time)
09:00-11:20 Session 40: Wireless Sensor Network Design and Optimization
[Meeting Room 8]
Papers: IC052 IC055 IC069 IC118 IC134 IC166 IC388 IC418 IC547 IC656 IC584 IC663
12:20-13:30 Lunch-Yue Rong Cafe (2F)
Afternoon Schedule-Dec. 10, 2018
Parallel Oral Sessions
13:30-15:45 Session 41: Future Communications and Satellite Communications Engineering
[Meeting Room 3A]
Papers: IC112 IC261 IC666 IC394 IC623 IC287 IC500 IC721 IC060
13:30-15:45 Session 42: Communication Network Resource Allocation and Calculation
[Meeting Room 3B]
Papers: IC446 IC295 IC159 IC175 IC031 IC251 IC621 IC690 IC588
13:30-15:45 Session 43: Traffic Network and Intelligent Transportation [Meeting Room 6]
Papers: IC311 IC314 IC126 IC042 IC056 IC531 IC576 IC614 IC693
13:30-15:45 Session 44: Information Privacy and Security [Meeting Room 9]
Papers: IC485 IC357 IC682 IC683 IC084 IC172 IC212 IC304 IC465
13:30-15:45 Session 45: Clustering Algorithm [Meeting Room 10]
Papers: IC194 IC439 IC282 IC027 IC030 IC088 IC350 IC363 IC649
13:30-15:45 Session 46: Intelligent Algorithm and Performance Analysis [Room Mudan]
Papers: IC438 IC066 IC105 IC222 IC255 IC309 IC560 IC610 IC150
13:30-15:45 Session 47: Information Attack and Defense [Room Furong]
Papers: IC070 IC076 IC455 IC559 IC670 IC119 IC262 IC355 IC2001
15:45-16:00 Coffee Break
14
16:00-18:15
Session 48: Communication Principle and Technology [Meeting Room 3A]
Papers: IC026 IC045 IC156 IC436 IC469 IC038 IC556 IC607 IC297
16:00-18:15 Session 49: Network Architecture Design and Function Optimization
[Meeting Room 3B]
Papers: IC659 IC662 IC665 IC361 IC189 IC306 IC385 IC431 IC310
16:00-18:15 Session 50: Signal Processing [Meeting Room 6]
Papers: IC694 IC164 IC426 IC352 IC360 IC448 IC613 IC713 IC549
16:00-18:15 Session 51: Data Encryption and Application [Meeting Room 9]
Papers: IC611 IC018 IC187 IC086 IC401 IC619 IC495 IC059 IC542
16:00-18:15 Session 52: Computer Network and Communication Engineering
[Meeting Room 10]
Papers: IC622 IC652 IC521 IC378 IC447 IC514 IC308 IC645 IC143
16:00-18:15 Session 53: Computer Theory and Engineering Practice [Room Mudan]
Papers: IC343 IC109 IC358 IC332 IC579 IC714 IC620 IC538 IC298
16:00-18:15 Session 54: Electronic Information Engineering and Application [Room Furong]
Papers: IC545 IC628 IC634 IC170 IC373 IC598 IC395 IC104 IC321
Poster Presentation Sessions
13:30-15:10 Session 55: Electronics and Communication Engineering [Meeting Room 8]
Papers: IC253 IC272 IC453 IC535 IC419 IC456 IC487 IC674 IC276 IC171
15:10-15:30 Coffee Break
15:30-17:10 Session 56: Signal Acquisition and Detection [Meeting Room 8]
Papers: IC505 IC593 IC091 IC319 IC389 IC517 IC312 IC689 IC198 IC259
18:10-20:30 Dinner-Yue Rong Cafe (2F)
15
Dec. 10, 2018
09:00-12:00 Academic Visiting at Southwest Jiaotong University
09:00-16:00
One-Day Tour in Chengdu
Giant Panda Research Base, Wenshu Monastery,
Kuanzhai Xiangzi Alleys and Tea-tasting in People’s Park
(Lunch and Tickets of Scenic Spots are already included in the fee)
(Onsite registration cannot be accepted)
16
Introduction of Speakers
Speaker I
Prof. Leyi Wang, IEEE Fellow, Department of Electrical and Computer
Engineering, Wayne State University, USA
Speech Title: Embracing New Paradigms of Data- and Complexity-Based
Integration of Control, Communications, and Computing in Network Systems
Abstract: Modern systems are dominantly characterized by interconnected network systems. They are
exemplified by power grids, electric vehicle charging networks, edge computing, renewable generators
and controllable loads, autonomous vehicles, smart buildings, smart cities, gene networks, energy and
material flow networks, to name just a few. Management of such network systems encounters
fundamental issues of information, uncertainty, and complexity, and demands integration of control,
communications, and computing.
In this presentation, we will highlight some key motivations and critical issues in networked systems and
explain the importance in pursuing data- and complexity-based approaches. In particular, we will briefly
discuss some recent advances in this direction, including data-size reduction in system identification,
data transfer frequency reduction in estimation, data volume reduction in decision-based methodologies
for modeling, and data travel distance reduction in distributed optimization and control strategies. A few
cases will be used to illustrate how communication system properties and uncertainties can impact safety
and control performance of network systems.
Biography: Le Yi Wang received the Ph.D. degree in electrical engineering from McGill University,
Montreal, Canada, in 1990. Since 1990, he has been with Wayne State University, Detroit, Michigan, where
he is currently a professor in the Department of Electrical and Computer Engineering. His research
interests are in the areas of complexity and information, system identification, robust control, H-infinity
optimization, time-varying systems, adaptive systems, hybrid and nonlinear systems, information
processing and learning, as well as medical, automotive, communications, power systems, and computer
applications of control methodologies. He was a keynote speaker in several international conferences.
He serves on the IFAC Technical Committee on Modeling, Identification and Signal Processing. He was
an Associate Editor of the IEEE Transactions on Automatic Control and several other journals, and an
Associate Editor of Journal of Control Theory and Applications. He was a Visiting Faculty at University of
Michigan in 1996, Visiting Faculty Fellow at University of Western Sydney, Australia, in 2009 and 2013,
and Visiting Faculty at Vienna University of Technology, Austria, in 2016.
17
He is a member of a Foreign Expert Team in Beijing Jiao Tong University and a member of the Core
International Expert Group at Academy of Mathematics and Systems Science, Chinese Academy of
Sciences.
He received Research Initiation Award (1992) and Faculty Internship Award (1994) from the USA National
Science Foundation, Best Paper Award from IEEE EIT 2012, Best Poster Award from IEEE SEM 2012, Best
Paper Award from ICEEE 2017, Best Paper Award in Journal of Systems Science and Complexity in 2016,
Best Associate Editor Award (2016) from Control Theory and Technology, Outstanding Reviewer Award
(2012-2013) from Automatica, Faculty Research Award (1992), College of Engineering Outstanding
Teaching Award (1995), President Research Enhancement Award (2003-2005), College of Engineering
Faculty Research Excellence Award (2015) from Wayne State University. He is an Eminent Engineer in Tau
Beta Pi, a member of Academy of Scholars at Wayne State University, and a Fellow of IEEE.
18
Speaker II
Prof. Sheng-Uei Guan, Xi'an Jiaotong-Liverpool University, China
Speech Title: Opportunities and Challenges in Information Communications
Technology
Abstract: This talk introduces the overall trends of Information Communications Technology (ICT) and
presents an overview for opportunities and challenges in ICT. Critical issues, research problems and
developments of ICT in various areas are addressed, such as green computing, Internet computing,
mobile computing, and intelligent computing. Opportunities and challenges in relevant areas are also
covered, for example, Internet of Things, cloud computing, big data analytics. Critical development of
ICT in various aspects are proposed thereafter. Finally, the challenges faced by the higher education
sector are also discussed.
Biography: Steven Guan received his M.Sc. & Ph.D. from the University of North Carolina at Chapel Hill.
He is currently a Professor and the Director for Research Institute of Big Data Analytics at Xi'an Jiaotong-
Liverpool University (XJTLU). He served the head of department position at XJTLU for 4.5 years, creating
the department from scratch and now in shape. Before joining XJTLU, he was a tenured professor and
chair in intelligent systems at Brunel University, UK. Prof. Guan has worked in a prestigious R&D
organization for several years, serving as a design engineer, project leader, and department manager.
After leaving the industry, he joined Yuan-Ze University for three and half years. He served as deputy
director for the Computing Center and the chairman for the Department of Information &
Communication Technology. Later he joined the Electrical & Computer Engineering Department at
National University of Singapore as an associate professor. Prof. Guan’s research interests include:
machine learning, intelligent systems, computational intelligence, big data analytics, data mining,
personalization, modeling, security, networking, electronic commerce, mobile commerce, coding theory,
and pseudorandom number generation. He has published extensively in these areas, with 130+ journal
papers and 180+ book chapters or conference papers. He has chaired and delivered keynote speeches
for 30+ international conferences and served in 170+ international conference committees and 20+
editorial boards.
19
Speaker III
Prof. Nan Wang, California State University, USA
Speech Title: BullDog Mote: Low Power Design Technologies for Wireless
Sensor Networks
Abstract: Wireless Sensor Networks (WSNs) have been widely employed in numerous real world
applications, from air pollution monitoring and landslide detection to structural health monitoring.
However, its limited battery life span and data transmission throughput of small sensor nodes majorly
hinders its further development. In most cases, WSNs are composed of a significant number of nodes
deployed in a widespread area in which not all nodes are directly connected. Several attractive low power
design techniques, such as energy harvesting, clock scheduling, dynamic voltage scheduling and low
power design methods at all of WSNs multiple layers will be discussed in this talk. The same low-power
design techniques can be employed for a variety of other power-constrained applications such as
consumer electronics and medical devices.
Biography: Dr. Nan Wang received his B.S. in Computer Science from Xiamen University in Xiamen, China,
and his Ph.D. in Computer Engineering from the University of Louisiana in Lafayette, Louisiana. From
2008 to 2015, Dr. Wang has been with West Virginia University Institute of Technology, where he earned
a tenured position in 2014. He is currently an associate professor within the Department of Electrical and
Computer Engineering at California State University in Fresno, California. He has served as a keynote
speaker, session chair, TPC member, and reviewer for various peer reviewed journals and conferences, in
which he also has numerous publications. Dr. Wang is also serving as a panelist for the National Science
Foundation’s program solicitation for the Japan-US Network Opportunity (JUNO2) and the R&D for
Trustworthy Networking for Smart and Connected Communities. He has more than 20 years of combined
industry and teaching experience. His research interests include system-on-chip/network-on-chip
communication architecture, embedded systems, FPGA/ASIC design and implementation, real-time
computing and VLSI design, and wireless communication. In his free time, Dr. Wang serves as a faculty
advisor for the Asian Christian Student Organization at the California State University in Fresno, California.
20
Speaker IV
Prof. Thorsten Herfet, Saarland University, Germany
Speech Title: Enabling Multiview- and Light Field-Video for Veridical Visual
Experiences
Abstract: With the advent of UHDTV and the inclusion of High Dynamic Range, High Frame Rate and
Extended Color Gamut 2D-imagery is able to push technical parameters up to the limits of the human
visual sense. Consequently, developments in sensor technology can be used to capture information
beyond 2D-imagery. In this paper we introduce multiview- and light field-video as an option to capture
(at least parts of) the plenoptic function and therewith drive veridical visual experiences. Our contribution
is on tools for capturing and encoding so called 5D light fields. We have built a multi-camera array
producing up to 6 GigaRays/s and a real-time hierarchical H.264 MVC encoder that enables encoding
the light fields in form of a legacy compliant video stream.
Biography: Prof. Dr.-Ing Thorsten Herfet is full university professor at the Saarland Informatics Campus,
Germany. Prior to his appointment (2004) he has been VP Advanced Research with Grundig AG and
Manager CE Standards and Regulation EMEA with Intel Corp.
Thorsten received his diploma on electrical engineering and his Ph.D. on digital image processing and
transmission form Technical University Dortmund in 1988 and 1991 respectively. In his industrial and
academic carrier Thorsten published more than 150 papers and articles, holds more than 15 patents and
has led large scale collaborative research projects of several 10 Mio. € volume, funded by the German
National Science Foundation, Ministry of Research and Education and the European Commission under
FP7 and H2020. He served as the Dean for Mathematics and Computer Science 2006-2008 and as the
University's Vice President Research and Techology Transfer 2014-2017 and as the Director of Research
and Operations of the Intel Visual Computing Institute 2009-2017. Thorsten’s research is focused on
Cyber-Physical Networking, Latency and Resilience-Aware Streaming, Computational Videography and
High Mobility in Multicarrier-Systems
21
Speaker V
Prof. Yutaka Ishibashi, Nagoya Institute of Technology, Japan
Speech Title: Cooperation among Humans and Robots with Force Feedback
over Network
Abstract: Currently, many researchers focus on studies on collaborative work by employing multiple
remote robot systems with force feedback. In a remote robot system, for example, a human can operate
a remote robot with force sensors over a network by using a haptic interface device while watching video.
Each human can perceive reaction force via the haptic interface device when the robot arm hits/touches
some objects. Therefore, by using multiple systems, we can do various types of work which only humans
cannot do. In such work, we need to achieve efficient cooperation among humans and robots (that is,
between robots, between robots and humans, and between humans) by using force feedback as well as
voice and video over a network. To realize stable and high-quality remote robot control with force
feedback, we need to integrate and enhance stabilization control and QoS (Quality of Service) control
which we have independently studied so far. In the keynote speech, we will explain the current state of
study on remote robot systems with force feedback and present new directions of the study
Biography: Yutaka Ishibashi received the B.E., M.E., and Ph.D. degrees from Nagoya Institute of
Technology, Nagoya, Japan, in 1981, 1983, and 1990, respectively. In 1983, he joined the Musashino
Electrical Communication Laboratory of Nippon Telegraph and Telephone Public Corporation (currently,
NTT). From 1993 to 2001, he served as an Associate Professor of Department of Electrical and Computer
Engineering, Faculty of Engineering, Nagoya Institute of Technology. Currently, he is a Professor of
Department of Computer Science, Graduate School of Engineering, Nagoya Institute of Technology.
From June 2000 to March 2001, he was a visiting researcher, Department of Computer Science and
Engineering, University of South Florida (USF), USA. His research interests include networked multimedia,
QoS (Quality of Service) control, media synchronization, and remote robot control with force feedback.
He was the Chair of the IEICE Communication Quality Technical Committee from 2007 to 2009. He served
as TPC Chair of IEEE CQR (Communications Quality and Reliability) Workshop in 2011 and 2012. He also
served as NetGames (Network and Systems Support for Games) Workshop Co-Chair in 2006, 2010, 2014,
and 2017, Executive Committee Chair of Tokai-Section Joint Conference on Electrical, Electronics,
Information, and Related Engineering in Japan, Chair of MAW 2017 (Metro Area Workshop in Nagoya,
2017), Conference Co-Chair of IEEE ICCC 2017, Conference Chair of ICCCS 2018, and Technical Program
Chair of IEEE ICCE-TW 2018. He was IEEE Nagoya Section Secretary in 2015 and 2016, and he is currently
IEEE Nagoya Section Chair. He is further a Steering Committee Member of NetGames. He is a Fellow of
IEICE, a Senior member of IEEE, and a Member of ACM, ITE, IPSJ, VRSJ, and IEEJ.
22
Speaker VI
Prof. Tianrui Li, Southwest Jiaotong University, China
Speech Title: Data-Driven Intelligence: Challengues and Our Solutions
Abstract: Data-Driven Intelligence has become a hot research topic in the area of information science.
This talk aims to outline the challengues on Data-Driven Intelligence. Then our solutions for Data-Driven
Intelligence are provided, which cover the following aspects. 1) A hierarchical entropy-based approach
is demonstrated to evaluate the effectiveness of data collection, the first step of Data-Driven Intelligence.
2) A multi-view-based method is illustrated for filling missing data, the preprocessing step for Data-
Driven Intelligence. 3) A unified framework is outlined for Parallel Large-scale Feature Selection to
manage Big Data with high dimension. 4) A MapReduce-based parallel method together with three
parallel strategies are presented to compute rough set approximations for classification, which is a
fundamental part in rough set-based data analysis similar to frequent pattern mining in association rules.
5) Incremental learning-based approaches are shown for updating approximations and knowledge in
dynamic data environments, e.g., the variation of objects, attributes or attribute values, which improve
the computational efficiency by using previously acquired learning results to facilitate knowledge
maintenance without re-implementing the original data mining algorithm. 6) A deep-learning-based
model to deal with multiple different sources of data is developed. 7) Several applications on high speed
train and urban computing, etc. are shown.
Biography: Tianrui Li received his B.S. degree, M.S. degree and Ph.D. degree from the Southwest Jiaotong
University, China in 1992, 1995 and 2002 respectively. He was a Post-Doctoral Researcher at Belgian
Nuclear Research Centre (SCK • CEN), Belgium from 2005-2006, a visiting professor at Hasselt University,
Belgium in 2008, the University of Technology, Sydney, Australia in 2009 and the University of Regina,
Canada in 2014. And, he is presently a Professor and the Director of the Key Lab of Cloud Computing
and Intelligent Technique of Sichuan Province, Southwest Jiaotong University, China. Since 2000, he has
co-edited 6 books, 10 special issues of international journals, 15 proceedings, received 5 Chinese
invention patents and published over 240 research papers in refereed journals and conferences (e.g.,
KDD, IJCAI, UbiComp). Three papers were ESI Hot Papers and Ten papers was ESI Highly Cited Papers.
His Google H-index is 32. He serves as the area editor of International Journal of Computational
Intelligence Systems (SCI), editor of Knowledge-based Systems (SCI) and Information Fusion (SCI), etc.
He is an IRSS fellow, a distinguished member of CCF, a senior member of ACM, IEEE, CAAI, ACM SIGKDD
member, Chair of IEEE CIS Chengdu Chapter, Treasurer of ACM SIGKDD China Chapter and CCF YOCSEF
Chengdu Chair (2013- 2014). Over fifty graduate students (including 8 Post- Docs, 12 Doctors) have been
trained. Their employment units include Microsoft Research Asia, Sichuan University, Baidu, Alibaba,
Tencent and Huawei. They have received 2 "Si Shi Yang Hua" Medals, Best Papers/ Dissertation Awards
13 times, Champion of Sina Weibo Interaction-prediction at Tianchi Big Data Competition (Bonus 200,000
RMB), Second Place of Social Influence Analysis Contest of IJCAI-2016 Competitions.
23
Speaker VII
Prof. Ai Bo, Beijing Jiaotong University, China
Speech Title: Scatterer Modeling @ Mmwave Band in High-Speed Railway
Scenarios
Abstract: Mmwave communication has been regarded as one of key technology in 5G. FCC has allocated
28 GHz, 37/39 GHz and 64-71 GHz frequencies as licensed or unlicensed bands for 5G mobile radio
services (MRS). As is known, the sensitivity of mmWave links to blockage is due to their weak diffraction
characteristics and the scatterers in real physical scenarios are usually neglected. In this talk, we will
discuss about the scatterer modeling for wireless channel at mmwave band in high-speed railway
scenarios, which is of great importance to the precise channel modeling in rail traffic scenarios.
Biography: Prof. Bo Ai received his Master degree and Ph. D. degree from Xidian University in China. He
graduated from Tsinghua University with the honor of Excellent Postdoctoral Research Fellow at Tsinghua
University in 2007. He was a visiting professor at EE Department, Stanford University in 2015. He is now
working at Beijing Jiaotong University as a full professor and Ph. D. candidate advisor. He is the Deputy
Director of State Key Lab of Rail Traffic Control and Safety, and the Deputy Director of International Joint
Research Center. He is one of the main responsible people for Beijing “Urban rail operation control
system” International Science and Technology Cooperation Base, and the backbone member of the
Innovative Engineering Based jointly granted by Chinese Ministry of Education and the State
Administration of Foreign Experts Affairs.
He has authored/co-authored 8 books and published over 300 academic research papers in his research
area. He has hold 26 invention patents. He has been the research team leader for 26 national projects
and has won some important scientific research prizes. He has been notified by Council of Canadian
Academies (CCA) that, based on Scopus database, Prof. Bo Ai has been listed as one of the Top 1%
authors in his field all over the world. Prof. Bo Ai has also been Feature Interviewed by IET Electronics
Letters. His interests include the research and applications of channel measurement and channel
modeling, dedicated mobile communications for rail traffic systems.
Prof. Bo Ai is a Fellow of the Institution of Engineering and Technology (IET Fellow), IEEE VTS
Distinguished Lecturer. He is an IEEE VTS Beijing Chapter Vice Chair. IEEE BTS Xi’an Chapter Chair. He was
as a Co-chair or a Session/Track Chair for many international conferences. He is an Editor of IEEE
Transactions on Consumer Electronics and an Editorial Committee Member of the Wireless Personal
Communications journal. He is the Lead Guest Editor for Special Issues on IEEE Transactions on Vehicular
Technology, IEEE Antennas and Propagations Letters, International Journal on Antennas and
Propagations.
24
He has received many awards such as Outstanding Youth Foundation from National Natural Science
Foundation of China, the Qiushi Outstanding Youth Award by Hong Kong Qiushi Foundation, the New
Century Talents by the Chinese Ministry of Education, the Zhan Tianyou Railway Science and Technology
Award by the Chinese Ministry of Railways, and the Science and Technology New Star by the Beijing
Municipal Science and Technology Commission.
25
Speaker VIII
Prof. Wanyang Dai, Nanjing University, China
Speech Title: Quantum-cloud-computing and MIMO Communication:
Unification, Fault Tolerance, and Bestgo Scheduling with Blockchain and Big
Data
Abstract: We develop a smart generic system that unifies quantum cloud-computing and MIMO wireless
communication into a single system for resources-competing users. Inside the system, network hardware
architecture and software structure are designed by high-performance cloud quantum-computers and
quantum blockchain for the evolution of the current Internet to the future quantum IP based one. User’s
qubit based arrival data streams are described by big data flows whose random dynamics is accurately
modeled by our recently known stochastic models. Fault tolerance with optimal error correction and
service capacity via our latest mutual information formula are presented. Smart BestGo resource
allocation policies within quantum blockchain are dynamically proposed via Nash equilibrium points to
a game-theoretic scheduling problem. Numerical implementations will be presented to illustrate the
effectiveness of our system and policies.
Biography: Wanyang Dai is a Distinguished Professor in Nanjing University, a Special Guest Expert in
Jiangsu FinTech Research Center, President of Jiangsu Probability & Statistics Society, Chairman of
Jiangsu BigData-Blockchain and Smart Information Special Committee, and Editor-in-Chief of Journal of
Advances in Applied Mathematics, where his research includes stochastic processes related optimization
and Pareto optimal control/game, admission/scheduling/routing protocols and performance
analysis/optimization for BigData-Blockchain oriented quantum-cloud computing and wireless/wireline
communication systems, forward/backward stochastic (ordinary/partial) differential equations and their
applications to queueing systems, Internet of Things, energy and power engineering. His “influential"
papers are published in ”big name" journals, e.g., Operations Research, Communications in Mathematical
Sciences, Journal of Computational and Applied Mathematics, Queueing Systems, Mathematical and
Computer Modeling of Dynamical Systems. His researches were awarded as outstanding papers by
academic societies, e.g., IEEE Top Conference Series. He received his Ph.D degree from Georgia Institute
of Technology, U.S.A., in 1996. He was an MTS (permanent) in End-to-End Network Architecture
Department of AT&T Bell Labs (now called Nokia Bell Labs) in U.S.A. from 1996-1999, where he was
principal investigators and developers of several projects in telecommunication network architecture and
design, network performance and financial engineering, operating system and database development to
support various intelligent engines/models for strategy planning and BigData analytics in a “Plug-in and
Play" manner, with some (nowadays called cloud computing) project won ”Technology Transfer". He is
also editors of over 20 international journals ranging from pure mathematics to its applications (e.g.,
Wireless Engineering and Technology, Artificial Intelligence), General Chairs and plenary/keynote
speakers of over 30 IEEE and international conferences.
26
Speaker IX
Prof. Yan Yang, Southwest Jiaotong University, China
Speech Title: Muti-view Clustering and Its Applications
Abstract: In many real-world problems data are from different sources or different views. For instance,
the same news may be reported by different news organizations, and a video may be encoded in different
amounts of images and sounds. All these are referred to as multi-view data. Multi-view Clustering (MvC)
has attracted increasing attention in recent years by aiming to exploit complementary and consensus
information across multiple views. In this talk, I will discuss MvC including co-training style algorithms,
multi-kernel learning, multi-view graph clustering, multi-view subspace clustering, multi-task multi-view
clustering and their applications.
Biography: Dr. Yan Yang is currently Professor and vice dean of Information Science and Technology,
Southwest Jiaotong University. She worked as a visiting scholar at the Center of Pattern Analysis and
Machine Intelligence (CPAMI) in Waterloo University of Canada for one and half year. She is an Academic
and Technical Leader of Sichuan Province. Her research interests include artificial intelligence, big data
analysis and mining, ensemble learning, cloud computing and service. Prof. Yang has participated in
more than 10 high-level projects recently. And have taken charge of two programs supported by the
National Natural Science Foundation of China (NSFC), one NSFC International (Regional) Cooperation
and Exchanges program, one Project of National Science and Technology Support Program, and one
Supporting Program for Science and Technology of Sichuan Province. She has authored and co-authored
over 150 papers in journals and international conference proceedings, 1 special issue of international
journal, 1 proceeding and 2 books. She also serves as the Vice Chair of ACM Chengdu Chapter, a
distinguished member of CCF, a senior member of CAAI, a member of IEEE, ACM, ACM SIGKDD, CCF
Education Work, CCF Artificial Intelligence and Pattern Recognition, CCF Theoretical Computer Science,
CAAI Machine Learning, CAAI Grain Calculation and Knowledge Discovery Committee, Deputy Secretary
General of Sichuan Computer Society and Vice Chair of Big Data Industry University Research Council of
Sichuan Institute of Electronics.
27
Parallel Presentation Sessions
Dec. 8-Parallel Oral Session 1
S1: Sentiment Analysis and Classification
Session Chair:
Time: 14:00-16:00 [Meeting Room 3A-7F]
IC067
14:00-14:15
Text Sentiment Analysis: A Review
Ronglei Hu
Beijing Electronic Science and Technology Institute, China
IC090
I. 14:15-14:30
Research on Highlight Snippets Identification Technology Based on Sentiment
Analysis of Bullet Curtain
Meiqi HAN
East China University of Science and Technology, China
IC122
II. 14:30-14:45
Lyric Emotion Estimation Using Word Embedding Learned from Lyric Corpus
Kazuyuki Matsumoto
Tokushima University, Japan
IC185
III. 14:45-15:00
Cross-domain Sentiment Classification based on Transfer Learning and Adversarial
Network
Xiuyu Duan
Beijing University of Posts and Telecommunications, China
IC346
IV. 15:00-15:15
User and Product Attention Model Based on Recommendation Algorithm for
Sentiment Classification
Yingli Shen
Jiangsu Normal University, China
IC349
V. 15:15-15:30
Sentiment-Polarized Word Embedding for Multi-Label Sentiment Classification
Liujie Zhang
Beijing University of Posts and Telecommunications, China
IC475
VI. 15:30-15:45
Sentiment Classification Based on Specific Target
Yaping Yin
Beijing University of Posts and Telecommunications, China
28
IC570
VII. 15:45-16:00
Attribute-based Sentiment Analysis for Recommendation
Qianqian Wang
Beijing University of Posts and Telecommunications, China
Note
29
Dec. 8-Parallel Oral Session 2
S2: Multimedia Technology and Network Protocol
Session Chair:
Time: 14:00-16:00 [Meeting Room 3B-7F]
IC063
14:00-14:15
Research on Congestion Control Algorithms for Real-time Audio and Video Stream
Chaojun Li
Beijing University of Posts and Telecommunications, China
IC290
VIII. 14:15-14:30
A Panoramic Video Transmission System Design Based on LTE Network
Xianghuang Chen
Tongji University, China
IC097
IX. 14:30-14:45
Predicting Micro-blog Individual Retweet Behavior based on user's Interest Drift
Chunlong Fu
XiHua University, China
IC435
X. 14:45-15:00
Forensics on Twitter and WeChat Using a Customised Android Emulator
Songyang Wu
The Third Research Institute of Ministry of Public Security, China
IC203
XI. 15:00-15:15
Refactoring Orchestrated Web Services into Microservices Using Decomposition
Pattern
Mathawee Tusjunt
Chulalongkorn university, Thailand
IC445
XII. 15:15-15:30
A Robust Authentication Protocol for Multi-Server RFID System Applications
Wei Wang
Tianjin University of Technology, China
IC337
XIII. 15:30-15:45
REEFS: An SDN Hyper File System Based on Erasure Coding
Jehn-Ruey Jiang
National Central University, Taiwan
IC653
XIV. 15:45-16:00
Locality-Aware PMI Usage for Efficient MPI Startup
Giuseppe Congiu
Argonne National Laboratory, USA
30
Dec. 8-Parallel Oral Session 3
S3: Information Network and Application Technology
Session Chair:
Time: 14:00-16:00 [Meeting Room 6-7F]
IC274
14:00-14:15
A New Data Packet Transfer Strategy for Opportunistic Mobile Network
Bitao Peng
Guangdong University of Foreign Studies, China
IC643
XV. 14:15-14:30
Research on The Positioning Precision of Ranging Methods in VHF Data Exchange
System
Wenjun An
Nanjing University of Science and Technology, China
IC243
XVI. 14:30-14:45
Data Transmission Optimization Method Based on Mobile Nodes
Lingling Gao
China Transport Telecommunications and Information Center, China
IC548
XVII. 14:45-15:00
Adapting Block-sized Captures for Faster Network Flow Analysis on the Hadoop
Ecosystem
Alberto Hilado MEDALLA
Ateneo de Manila University, Philippines
IC328
XVIII. 15:00-15:15
Oversampling for Imbalanced Time Series Classification Based on Generative
Adversarial Networks
Chengbao Liu
University of Chinese Academy of Sciences, China
IC489
XIX. 15:15-15:30
Research on Network Traffic Prediction Based on Long Short-Term Memory Neural
Network
Haipeng Lu
Beijing University of Technology, China
IC636
XX. 15:30-15:45
An Anti-Jamming Approach for Infrared Target Tracking Using Trajectory Prediction
and Network Flow
Hong Cui
Beijing Institute of Environmental Features, China
31
IC642
XXI. 15:45-16:00
Sparse-Domain Interference Coordination Scheme in Ultra-Dense Networks
Lusheng Wang
Hefei University of Technology, China
Note
32
Dec. 8-Parallel Oral Session 4
S4: Mobile Computing and Cloud Computing
Session Chair:
Time: 14:00-16:00 [Meeting Room 9-5F]
IC1011
14:00-14:15
QoE-aware Access Node Selection Considering Mobile Edge Computing
Yang Gao
Beijing University of Technology, China
IC410
XXII. 14:15-14:30
Competition and Cooperation between Edge and Remote Clouds: A Stackelberg
Game Approach
Xin Yu
Nanjing University of Science and Technology, China
IC499
XXIII. 14:30-14:45
Incomplete Contract-Based Ownership Allocation for Operator in Mobile Edge
Computing
Ran Ding
Nanjing University of Science and Technology, China
IC651
XXIV. 14:45-15:00
Minimum Completion Time Offloading Algorithm for Mobile Edge Computing
Li Niu
Yunnan University, China
IC093
XXV. 15:00-15:15
Research on Cloud Computing Security Evaluation Model Based on Trust
Management
Zihuan YU
Jilin University, China
IC291
XXVI. 15:15-15:30
A PSO-Based Energy-Efficient Fault-Tolerant Static Scheduling Algorithm for Real-
Time Tasks in Clouds
Pengze Guo
Shanghai Jiao Tong University, China
IC342
XXVII. 15:30-15:45
Data-dependent Tasks Re-scheduling Energy Efficient Algorithm
Zhang Xiaoqing
Wuhan Polytechnic University, China
33
IC414
XXVIII. 15:45-16:00
Dynamic Access Control Model Based on FAHP in Cloud Environment
Ya LI
East China University of Science and Technology, China
Note
34
Dec. 8-Parallel Oral Session 5
S5: Algorithm Design and High Performance Computing
Session Chair:
Time: 14:00-16:00 [Meeting Room 10-5F]
IC580
14:00-14:15
An Efficient Genetic Algorithm of Multi-Constellation Satellite Selection
Xin Meng
Peking University, China
IC269
XXIX. 14:15-14:30
An Improved Adaptive Sampling Algorithm
Lian Wu
Northeastern University, China
IC386
XXX. 14:30-14:45
Gas Emission Prediction in Coal Mining Faces Based on GA-SM-SVR
Hui Chen
Anhui University of Science& Technology, China
IC444
XXXI. 14:45-15:00
Use FCN to Accurately Judge the Frontal Face or Side Face
Yan Zhang
East China Normal University, China
IC484
XXXII. 15:00-15:15
Correction for Energy Level Transition under the Constraint of Elite Rate in
Multiscale Quantum Harmonic Oscillator Algorithm
Lei Mu
University of Electronic Science and Technology of China, China
IC486
XXXIII. 15:15-15:30
Properties of (λ, q)-Bézier Curves and Surfaces
Qing-Bo Cai
Quanzhou Normal University, China
IC519
XXXIV. 15:30-15:45
Ultrasound Compressive Sensing Using BCS-FOCUSS
Muhammad Amir
International Islamic University, Pakistan
IC524
XXXV. 15:45-16:00
ABC Algorithm Based Multiuser Detector for TDRSS Forward Link MA Service
Xu Jiang
Harbin Institute of Technology, China
35
Dec. 8-Parallel Oral Session 6
S6: IP and Broadband Network Technology
Session Chair:
Time: 14:00-16:00 [Room Mudan-4F]
IC022
14:00-14:15
Research on IPv6 Transition Technology for Digital Ocean
Yongquan Yang
Ocean University of China, China
IC526
XXXVI. 14:15-14:30
A Low-Loss Broadband One-Way Transmission Structure Based on Nonreciprocal
Coupling
Maomao jiang
University of Science and Technology of China, China
IC553
XXXVII. 14:30-14:45
Broadband Asymmetric Transmission of Linear Polarization in a Tri-layer
Metasurface
Xiaodong Wu
Chongqing University, China
IC258
XXXVIII. 14:45-15:00
Enabling Work-Conserving Bandwidth Guarantees for Multi-tenant Datacenters
with Network Support
Fang Cao
Inspur Electronic Information Industry Co., Ltd., China
IC1013
XXXIX. 15:00-15:15
Broadband Miniaturized Bandpass Frequency Selective Surfaces Based on Fractal
Transmissive Metasurface Elements
Lina Ma
University of Science and Technology of China, China
IC552
XL. 15:15-15:30
Evaluating the Impact of High-Bandwidth Memory on MPI Communications
Giuseppe Congiu
Argonne National Laboratory, USA
IC574
XLI. 15:30-15:45
Tactical Internet Communication Traffic Characteristics and Modeling Methods
Qi Guo
Xi‘an Technological University, China
36
IC313
XLII. 15:45-16:00
A Modified UWB Antipodal Vivaldi Antenna with Elliptical Lens
Zeqiang Chen
Communication University of China, China
Note
37
Dec. 8-Parallel Oral Session 7
S7: Filter and Electronic Component Development
Session Chair:
Time: 14:00-16:00 [Room Furong-4F]
IC154
14:00-14:15
Efficient Frequency-Domain Equalization Scheme for High-Order Faster-Than-
Nyquist System
Zhanji Wu
Beijing University of Posts and Telecommunications, China
IC382
XLIII. 14:15-14:30
Suspected Abnormal Cervical Nucleus Screening Based on a Two-Cascade Classifier
Ying Han
Tianjin University of Technology, China
IC092
XLIV. 14:30-14:45
Road-Map Aided VSIMM-GMPHD Filter for Ground Moving Target Tracking
Haojie Yu
Beijing Institute of Technology, China
IC234
XLV. 14:45-15:00
Road Map Extraction Using GMPHD Filter and Linear Regression Method for Ground
Target Tracking
Jihong Zheng
Beijing Institute of Technology, China
IC403
XLVI. 15:00-15:15
Kernelized Correlation Filter Tracking with Scale Adaptive Filter and Feature
Integration
Shan Jiang
Chinese Academy of Science, China
IC704
XLVII. 15:15-15:30
Hammerstein Subband Spline Adaptive Filter for Nonlinear System Identification
Chang Liu
Dongguan University of Technology, China
IC711
XLVIII. 15:30-15:45
Median Based Wiener Filtering interpolation method for Progressive display using
Local Homogeneous Area Selector
Xiangdong Chen
Nanjing University of Posts and telecommunications, China
38
IC563
XLIX. 15:45-16:00
Fault Detecting and Excluding upon S-RANCO and Lagrange Interpolation
Zun Niu
Peking University, China
Note
39
Dec. 8-Parallel Oral Session 8
S8: Machine Learning and Calculation Method
Session Chair:
Time: 16:20-18:05 [Meeting Room 3A-7F]
IC1022
16:20-16:35
A Cloud Based Four-Tier Architecture for Early Detection of Heart Disease with
Machine Learning Algorithms
S M Hasan Mahmud
Daffodil International University, Bangladesh and University of Electronic Science
and Technology of China, China
IC215
L. 16:35-16:50
Performance Prediction for CSR-Based SpMV on GPUs Using Machine Learning
Changjiang Zhang
Wenzhou-Kean University, China
IC339
LI. 16:50-17:05
A Machine Learning Approach to Service Rule Conversion
Xinfeng Ye
The University of Auckland, New Zealand
IC387
LII. 17:05-17:20
An SDN/NFV Proof-of-Concept Test-Bed for Machine Learning-based Network
Management
Wei Jiang
German Research Center for Artificial Intelligence, Germany
IC512
LIII. 17:20-17:35
Topology Construction of Backbone Network Based on Machine Learning
Qi Chen
Beijing University of Posts and Telecommunications, China
IC585
LIV. 17:35-17:50
Machine Learning and Emotional Fluctuation System to Indicate Game Quality and
Foreboding Anticipating Players in Future Serials of Games
Tianshu Li
Wenzhou-Kean University, China
IC130
LV. 17:50-18:05
Incremental Learning of Single-stage Detectors with Mining Memory Neurons
Wei Li
University of Electronic Science and Technology of China, China
40
Dec. 8-Parallel Oral Session 9
S9: Channel Estimation
Session Chair:
Time: 16:20-18:05 [Meeting Room 3B-7F]
IC181
16:20-16:35
Joint Sparse Channel Estimation and Data Transmission for Many Access MIMO
System
Kun Zhang
University of Science and Technology of China, China
IC191
LVI. 16:35-16:50
Joint Sparse Channel Estimation Under NOMA Scheme for Many Access MIMO
System
Kun Zhang
University of Science and Technology of China, China
IC412
LVII. 16:50-17:05
Weighted lP Minimization for Compressive Channel Estimation in FDD Massive
MIMO
Wei Lu
Air Force Early Warning Academy, China
IC080-A
LVIII. 17:05-17:20
State Estimation of Chaotic Lurie Systems with Event-triggered Sampling and
Transmission Delay
Juanhui Zheng
Jiangnan University, China
IC244
LIX. 17:20-17:35
On Practical Applications of Channel-Aware Polar Codes
Yu-Ming Huang
National Chiao Tung University, Taiwan
IC368
LX. 17:35-17:50
Research on Channel Characteristic Analysis Method Based on Laplace Wavelet and
Matching Pursuit Algorithm
Hu Aihua
Beijing University of Post and Telecommunication, China
IC415
LXI. 17:50-18:05
Physical-layer Secret Key Generation with Correlated Eavesdropping Channel
Henglei Jin
Information Engineering University, China
41
Dec. 8-Parallel Oral Session 10
S10: Target Detection
Session Chair:
Time: 16:20-18:05 [Meeting Room 6-7F]
IC087
16:20-16:35
Analyses of Time Efficiency and Speed-ups in Inference Process of Two-stage Object
Detection Algorithms
Jiang Wu
Zhengzhou Information Science and Techology Institute, China
IC546
LXII. 16:35-16:50
Zenithal People Detection Based on Improved Faster R-CNN
Lin Li
National Digital Switching System Engineering and Technology Research Center,
China
IC667
LXIII. 16:50-17:05
Smoking Image Detection based on Convolutional Neural Networks
Shuo Wang
University of Science & Technology Beijing, China
IC058
LXIV. 17:05-17:20
Traffic Sign Detection Method of Improved SSD Based on Deep Learning
ZHU Dongtao
National University of Defense Technology, China
IC348
LXV. 17:20-17:35
Crack Detection using Fast Spectral Clustering Considering Graph Connectivity
Daiki Shiotsuka
DepaKurume College, Japan
IC169
LXVI. 17:35-17:50
Proposal Generation by Learning Visual Relationship
Yahui Dong
Beijing University of Posts and Telecommunications, China
IC646
LXVII. 17:50-18:05
Accelerometer-based Gesture Recognition Using MFCC and HMM
Zhenyu He
Jinan University, China
42
Dec. 8-Parallel Oral Session 11
S11: Microwave Communication Engineering
Session Chair:
Time: 16:20-18:05 [Meeting Room 9-5F]
IC039
16:20-16:35
Phase Noise Compensation for DFT-s-OFDM Waveforms in MIMO System
Xinyue Zheng
University of Chinese Academy of Sciences, China
IC466
LXVIII. 16:35-16:50
Iterative Rank-Two Transmit Beamforming Design for QoS-Diffserv Multi-group
Multicasting Systems
Zilong Zhang
The 28th Research Institute of China Electronics Technology Group Corporation,
China
IC541
LXIX. 16:50-17:05
Controllability of Wave Propagation through Periodic Waveguides
Hayk Sargsyan
Institute of Informatics, NAS of Armenia
IC501
LXX. 17:05-17:20
Secure Beamformer Design for Cognitive Satellite Terrestrial Networks
Chunyan Yin
Army Engineering University of PLA, China
IC100
LXXI. 17:20-17:35
Estimating Target Situation Based on 77GHz Radar Sensor for ACC System
Wei Zhou
Northwestern Polytechnical University, China
IC157
LXXII. 17:35-17:50
Application of Spoof Surface Plasmon Polariton in Reducing Radiation Loss of
Asymmetric Microstrip Lines with Small Radius Bends
Zhitao Yin
Communication University of China, China
IC247
LXXIII. 17:50-18:05
Research on Digital Instantaneous Frequency Measurement Based on Passive
Positioning System
Lu Wenfang
Yangzhou Baojun Subei Electronics Co., Ltd., China
43
Dec. 8-Parallel Oral Session 12
S12: Antenna Design and Development
Session Chair:
Time: 16:20-18:05 [Meeting Room 10-5F]
IC040
16:20-16:35
An Improved Cuckoo Search Algorithm for Optimizing the Beam Patterns of the
Random Antenna Arrays
Qianyu Zhou
Jilin University, China
IC102
LXXIV. 16:35-16:50
Design of a Compact Biconical antenna with Asymmetric Configuration
Yang Zhiheng
Yunnan University, China
IC1021
LXXV. 16:50-17:05
Multi-antenna Common Clock Measurement for Multi-platform Applications
Lei Zhang
East China Normal University, China
IC315
LXXVI. 17:05-17:20
High-Gain Lens Antenna Using Transmissive Phase Gradient Metasurface
Hang Yu
Communication University of China, China
IC318
LXXVII. 17:20-17:35
Beam Reconfigurable Antenna Based on Liquid Crystal Metasurface
Li Liu
Beijing University of Posts and Telecommunications, China
IC322
LXXVIII. 17:35-17:50
Wideband Magnetoelectric Dipole Antenna with Stable Wide E-plane Beamwidth
Dongya Ling
University of Science and Technology of China, China
IC351
LXXIX. 17:50-18:05
A Robust Fractal Tag Antenna for UHF RFID
Yaru Dong
Beijing University of Posts and Telecommunications, China
44
Dec. 8-Parallel Oral Session 13
S13: Communication and Information System
Session Chair:
Time: 16:20-18:05 [Room Mudan-4F]
IC113
16:20-16:35
PAPR Reduction via Degree of Freedom from Multiple Antennas in Large-Scale
MIMO-OFDM Systems
Yi Gong
University of Electronic Science and Technology of China, China
IC400
LXXX. 16:35-16:50
Joint Antenna Selection and User Scheduling in Downlink Multi-user MIMO
Haojin Li
University of Science and Technology Beijing, China
IC277
LXXXI. 16:50-17:05
Clock Skew Elimination using Robust Regression in Time Triggered Communication
Zhang Yingjing
Beijing Institute of Electronic Engineering, China
IC633
LXXXII. 17:05-17:20
Stepwise Noncoherent Accumulation Acquisition for High-Dynamic DSSS
Communications
Tao Peng
Beijing University of Posts and Telecommunications, China
IC404
LXXXIII. 17:20-17:35
JRAS and LRAS Strategies for Two-Way Full-Duplex Amplify-and-Forward Relaying
Siyuan Wang
Beijing University of Posts and Telecommunications, China
IC421
LXXXIV. 17:35-17:50
Performance Analysis of Hybrid Protocol Based Two-way Decode-and-Forward
Relay Networks
Ruyi Xiao
Northwest Normal University, China
IC442
LXXXV. 17:50-18:05
SWIPT-Based Three-Step Multiplicative Amplify-and-Forward Two-Way Relay
Networks with Non-Linear Energy Conversion Model
Syed Tariq Shah
Balochistan University of Information Technology, Engineering and Management
Sciences (BUITEMS), Pakistan
45
Dec. 8-Parallel Oral Session 14
S14: Image Matching and Image Classification
Session Chair:
Time: 16:20-18:05 [Room Furong-4F]
IC470
16:20-16:35
Automatic Classification and Detection of Oranges Based on Computer Vision
Yuwei Chen
Sichuan Agricultural University, China
IC161
LXXXVI. 16:35-16:50
Spectral-Spatial Graph-Based Semi-Supervised Hyperspectral Image Classification
Long Yu
South China University of Technology, China
IC142
LXXXVII. 16:50-17:05
Human Classification Based on Micro-Doppler Features of Walking Using Deep
Learning Algorithm
Mengyuan Zhang
Beijing University of Posts and Telecommunications, China
IC151
LXXXVIII. 17:05-17:20
A Pyramid Image Matching Algorithm for Chang’E-2 CCD Images of the Moon
Zhezhe Zhou
Tianjin University of Technology, China
IC165
LXXXIX. 17:20-17:35
Study on A-pillar Display Algorithm Through Image Registration
Minling Yang
Tianjin University of Technology, China
IC594
XC. 17:35-17:50
Image Feature Matching Based on Deep Learning
Yinyang Liu
Beijing University of Technology, China
IC698
XCI. 17:50-18:05
Kinect V2 Edge base registration with RANSAC-ICP
YOSSAWEE KEAOMANEE
King Mongkut’s University of Technology Thonburi (KMUTT), Thailand
46
Dec. 8-Poster Presentation Session 15
S15: MIMO System and Performance Optimization
Session Chair:
Time: 14:00-16:00 [Meeting Room 8-5F]
IC003
14:00-14:10
Power Optimization in Cell-Free Massive MIMO with Short-Term Power Constraints
Yao Zhang
Nanjing University of Posts and Telecommunications, China
IC046
XCII. 14:10-14:20
Location-Based Greedy Pilot Assignment for Cell-Free Massive MIMO Systems
Yao Zhang
Nanjing University of Posts and Telecommunications, China
IC053
XCIII. 14:20-14:30
Improved Joint Unitary ESPRIT Target Tracking Algorithm for Bistatic MIMO Radar
Xuewen Ding
Shandong University, China
IC072
XCIV. 14:30-14:40
Iterative MIMO Detection Algorithm Based on Successive Interference Cancellation
in Multi-cell Scenario
Cai xiaowen
Beijing University of Posts and Telecommunications, China
IC115
XCV. 14:40-14:50
An Adaptive Energy Consumption Optimization for Massive MIMO Systems with
Imperfect CSI
Feng Hu
Communication University of China, China
IC252
XCVI. 14:50-15:00
Sparsely Connected Neural Network for Massive MIMO Detection
Guili Gao
Beijing University of Posts and Telecommunications, China
IC303
XCVII. 15:00-15:10
Maximizing Minimum Phase Difference Based Hybrid Beamforming for Multiuser
mmWave Massive MIMO systems
Yadi Ding
Hangzhou Dianzi University, China
47
IC543
XCVIII. 15:10-15:20
Multi-user Grouping Based Scheduling Algorithm in Massive MIMO Uplink
Networks
Xiaoxu Meng
Beijing University of Posts and Telecommunications, China
IC566
XCIX. 15:20-15:30
Supervised Learning Method for Link Adaptation Algorithm in Coded MIMO-OFDM
Systems
Wenshuo Zhang
Harbin Institute of Technology, China
IC572
C. 15:30-15:40
Conjugate Gradient Method Based Linear Precoding with low-complexity for
Massive MIMO systems
Xu Qiao
Nanjing University of Posts and Telecommunications, China
IC616
CI. 15:40-15:50
Topological Interference Management for three-cell MIMO-NOMA with Alternating
Connectivity
Yanni Xie
Hefei University of Technology, China
IC722
CII. 15:50-16:00
A Novel Comprehensive Quality Index QoX and the Corresponding Context-aware
System Framework
Min Chen
Shandong University, China
Note
48
Dec. 8-Poster Presentation Session 16
S16: Navigation and Positioning Technology
Session Chair:
Time: 16:20-18:20 [Meeting Room 8-5F]
IC148
16:20-16:30
Robust UWB Indoor Position Tracking Using TDOA Measurements
Yi Liu
Jiangnan University, China
IC641
CIII. 16:30-16:40
Design of the Indoor Positioning Glasses for the Blind based on the LiFi Technology
Jingfeng Liu
Shenyang University, China
IC294
CIV. 16:40-16:50
Comparison of Fingerprint Matching Methods for Wi-Fi Indoor Positioning
Renjie Jiang
University of Liverpool, United Kingdom
IC567
CV. 16:50-17:00
CSI-Based Device-free Indoor Localization Using Convolutional Neural Networks
Chenwei Cai
Beijing University of Posts and Telecommunications, China
IC054
CVI. 17:00-17:10
Error Elimination Method for TOA Based Wireless Cooperative Localization
Networks in NLOS Case
Xuewen Ding
Shandong University, China
IC270
CVII. 17:10-17:20
Joint TOA and DOA Estimation Based on Improved Matrix Pencil Method
Haiwen Li
China National Digital Switching System Engineering and Technological Research
Center, China
IC371
CVIII. 17:20-17:30
Optimization of IMU Indoor Localization with Wireless Sensors
Zhengyu Yu
University of Technology, Australia
49
IC083
CIX. 17:30-17:40
A Clustering-based Algorithm for Device-free Localization in IoT
Lei Jin
Nanchang Hangkong University, China
IC462
CX. 17:40-17:50
An Ensemble Learning Algorithm for Indoor Localization
Xintong Wang
Harbin Institute of Technology at Weihai, China
IC528
CXI. 17:50-18:00
Passive Positioning for LTE User Equipment
Huijie Zhu
No. 36 Research Institute of China Electronics Technology Group Corporation, China
IC631
CXII. 18:00-18:10
Fake Access Point Localization based on Optimal Reference Points
Bin Xu
Hefei University of Technology, China
IC236
CXIII. 18:10-18:20
Performance Evaluation of Interference Coexistence in Dense Urban Scenario for 5G
NR System
Hanwei Li
Beijing University of Posts and Telecommunications, China
Note
50
Dec. 9-Invited Speaker I
Invited Speaker I Prof. Shinji Sugawara, Chiba Institute of Technology,
Japan
13:45-14:00 Meeting Room 3A-7F
Speech Title: Distributed Systems for Contents Sharing --- From Peer-to-Peer to Edge and
Fog Computing
Abstract: This talk will illustrate various content sharing systems that take advantage of peer-
to-peer and cloud's storage, and computational resources as well as their supporting
conventional technologies. First, basic technology concepts toward recent cloud-based systems
from a client-server to cloud or edge and fog computing as well as their relationships and
functional linkages will be shown. Second, the taxonomy and actual examples of peer-to-peer
and cloud-based system models for contents sharing will be brought up and discussed. Third,
the latest research trend of edge and fog computing will be mentioned. Finally, future direction
of distributed systems for content sharing will be suggested.
51
Dec. 9-Parallel Oral Session 17
S17: Ad Hoc Network and Wireless Transmission Technology
Session Chair:
Time: 14:00-16:00 [Meeting Room 3A-7F]
IC557
14:00-14:15
An All-to-All Broadcast Algorithm with Variable Length Packets in Ad hoc Networks
Using Directional Antennas
Yichen Zhang
Army Engineering University of PLA, China
IC597
CXIV. 14:15-14:30
A New Distributed Coalition Formation Algorithm for Cooperation in Ad Hoc
Networks
Wang Bo
CNCERT/CC, China
IC625
CXV. 14:30-14:45
How to Implement NDN MANET over ndnSIM Simulator
Toshihiko Kato
University of Electro-Communications, Japan
IC125
CXVI. 14:45-15:00
A Modified TDMA Algorithm Based on Adaptive Timeslot Exchange in Ad Hoc
Network
Yao Lu
University of Electronic Science and Technology of China, China
IC128
CXVII. 15:00-15:15
Detection Efficiency Analysis of Cooperative Spectrum Sensing in Congnitive Radio
Networks
Xin Li
Beijing University of Posts and Telecommunications, China
IC452
CXVIII. 15:15-15:30
Design of Spectral Line Agile Observation and Analysis Platform
Tan Jingjia
Yunnan University, China
IC558
CXIX. 15:30-15:45
Security-Reliability Tradeoff Analysis for Artificial Noise Aided MISO Transmission
System
Sheng Huang
Army Engineering University of PLA, China
52
IC480
CXX. 15:45-16:00
Semi-dynamic Virtual Network Embedding Algorithm of Wireless Virtualization
Letian Li
University of Science and Technology of China, China
Note
53
Dec. 9-Invited Speaker II
Invited Speaker II Prof. Watanabe Histoshi, Tokyo University of Science, Japan
13:45-14:00 Meeting Room 3B-7F
Speech Title: Reliability Management of the Nationwide Telecommunication Network-
Experiences in the Japanese PSTN Network
CXXI. Abstract: Reliability is an important attribute of telecommunication networks. Especially, the
nationwide network such as the telephone network is required extra high reliability. The
telephone network (PSTN) in Japan experienced various disasters or failures and have been
advance in the reliability countermeasures. The standard for disaster response and reliability
design has been well defined. As the consequence, currently, the network has been realized
rather high reliability. By the way, the high reliability must be achieved economically. For this
purpose, it is required the reliability management system. The speaker have been engaged in
the research and practical business of reliability management of PSTN in Japan. Today, the
theoretical basement and issues of practical of the reliability management of PSTN of Japan is
presented.
CXXII. The reliability management is to execute the cycle consists of (1) determining the reliability
objective, (2) designing the equipment and network for satisfying the above objective, (3)
verifying the achievement of the reliability and (4) correcting the management policy hereafter.
These steps should be realized as the concrete processes and must be considered the actual
feature of networks. The basement of disaster response is same as the reliability counter
measure under the normal condition. The basis is the strength against the disaster.
Furthermore, the principle of disaster response is too avoid the area to be separated from the
other side.
CXXIII. This is considered when the counter measure determined. However, the great difference is that
the other infrastructures are also damaged in disaster condition and the importance is the
logistics. In recent years, Japan experienced twice large earthquakes, the Great Hanshin
Earthquake and the Great East Jana Earthquake and we learned some actual problems in
disaster conditions.
The reliability management is the overall judgment taking into account of the user’s
requirement, the technical possibility and the cost. This presentation will explain this with
experience.
54
Dec. 9-Parallel Oral Session 18
S18: Internet of Things Technology and Engineering Applications
Session Chair:
Time: 14:00-16:00 [Meeting Room 3B-7F]
IC530
14:00-14:15
Abstract Structure of Data Communication in IoT Application
Hanhua Lu
Nanjing University of Posts and Telecommunication, China
IC064
CXXIV. 14:15-14:30
Performance Analysis of LoRa Modulation with Residual Frequency Offset
Hongqiang Li
Beijing Smart-Chip Microelectronics Technology Co., Ltd., China
IC136
CXXV. 14:30-14:45
The Dynamic Long-Term Equity DWRR Algorithm in Mine IoT
Yifei Han
Beijing University of Posts and Telecommunications, China
IC232
CXXVI. 14:45-15:00
A Study of the Collision Probability for R-FTMA Ultra-Narrowband IoT Networks
Yaning Wang
Xi’an Jiaotong University, China
IC323
CXXVII. 15:00-15:15
Distributed Probability Random Access Scheme in Satellite IoT System
Xue Zhao
Beijing University of Post and Telecommunications, China
IC481
CXXVIII. 15:15-15:30
LPDC: Mobility- and Deadline-aware Task Scheduling in Tiered IoT
Jianhua Fan
National university of Defense Technology, China
IC600
CXXIX. 15:30-15:45
A Fuzzy Logic Based Warning Scheme of Monitoring Systems for IoT Cloud Services
Xuanxi Li
Beijing University of Posts and Telecommunications, China
IC604
CXXX. 15:45-16:00
LVChain: A Lightweight and Vote-based Blockchain for Access Control in the IoT
Yue Yu
Tsinghua University, China
55
Dec. 9-Invited Speaker III
Invited Speaker III Prof. Herwig Unger, University of Hagen, Germany
13:45-14:00 Meeting Room 6-7F
Speech Title: Innovative Structures for the WWW
Abstract: Obviously, with the exception of web server connections through hypertext links, the
world wide web is organised as a hierarchical, client-server-based architecture of content and
services. Big, centralised search engines are employed to find the non-transparent connection
between them and the location (URL's), where they can be found and/or executed.
Nevertheless, a lot of disdavantages like a missing coverage and actuality of information come
along with this appraoch.
After a consideration of the state of the art, the talk will discuss two major structural changes
helping to overcome those difficulties: the introduction of a system-wide, self-organising,
decentralised system structure (commonly known as peer-to-peer (P2P)) as well as a new kind
of associative memory and management structures working on top of such P2P-based system
organisations. Random walkers are the main communication means making the exploration of
networks and the building, management and self-organisation in changing environmental
situations possible in an efficient manner. Consequently, main working principles of random
walkers and their efficient use are discussed in another, major part of this talk.
Last but not least, the WebEngine, a prototype of the first fully integrated, decentrally working
web search engine will be introduced (and demonstrated).
56
Dec. 9-Parallel Oral Session 19
S19: Communication Network Resource Allocation and Management
Session Chair:
Time: 14:00-16:00 [Meeting Room 6-7F]
IC137
14:00-14:15
Uplink User Power Control for Low-Orbit Satellite Communication Systems
Li Zhi Hui
Shenyang Aerospace University, China
IC639
CXXXI. 14:15-14:30
Computing Resource Allocation of Mobile Edge Computing Networks Based on
Potential Game Theory
Heng Liu
Huazhong University of Science and Technology, China
IC654
CXXXII. 14:30-14:45
Joint Energy-efficient Power Control of Full-Duplex Ultra-Dense Heterogeneous
Networks
Feng Ke
South China University of Technology, China
IC1008
CXXXIII. 14:45-15:00
Uplink Power Control of the DUDE Mode in HetNets
Jing-miao Wu
Inner Mongolia University, China
IC280
CXXXIV. 15:00-15:15
Latency Aware Optimal Workload Assignment in Mobile Edge Cloud Offloading
Network
Dileep Kumar Sajnani
Southeast University Nanjing, China
IC257
CXXXV. 15:15-15:30
Efficient Bandwidth Management (EBM) Algorithm for NG-EPON
Ammar Rafiq
University of Engineering and Technology, Pakistan
IC200
CXXXVI. 15:30-15:45
Dynamic Partitioning and Task Scheduling for Complex Workflow Healthcare
Application in Mobile Edge Cloud Architecture
Abdullah Lakhan
Southeast University P.R China, China
57
IC1012
CXXXVII. 15:45-16:00
Power Allocation for NOMA Based Layered Multicast Transmission
Mingshuai Chen
Nankai University, China
Note
58
Dec. 9-Invited Speaker IV
Invited Speaker IV Assoc. Prof. Emanuel S. Grant, University of North Dakota,
USA
13:45-14:00 Meeting Room 9-5F
Speech Title: Software Engineering Formal Specification Methodology in Augmented and
Virtual Reality Environments- A Proposal
Abstract: Software engineering seeks to move software development from mainly creative
processes into a true engineering discipline. A number of promising approaches have emerged
and adapted in the productive domain. One approach is the use of formal specification
techniques in software development. Formal specification addresses the use of rigorous models
of a software system for the purpose of analysis to identify incorrect or missing specification
requirements. Formal specification can be applied at various stages of the software
development lifecycle. A growing trend in the established engineering fields is the use of
augmented and virtual reality tools to aid in the design, development of products. It is of
research interest, for the technologies of augmented and virtual realities to be used in software
development. The work presented herein, proposes the use of augmented and virtual reality
approaches to advance the use of formal specification in software engineering. In this work, a
safety-critical software engineering methodology is proposed that implements formal
specification verification and validation through the use of augmented and virtual reality
environments. The proposed framework simulates the safety-critical mechanism in operation
and augments the view with the execution of the formal specification; permitting the
identification of undesired system states.
59
Dec. 9-Parallel Oral Session 20
S20: Cyber Security
Session Chair:
Time: 14:00-16:00 [Meeting Room 9-5F]
IC206
14:00-14:15
A Network Vulnerability Assessment Method Based on Attack Graph
Shuo Wang
Zhengzhou Information Science and Technology Institute, China
IC205
CXXXVIII. 14:15-14:30
Malicious Hidden Redirect Attack Web Page Detection Based on CSS Features
Boshen Chen
Beijing University of Posts and Telecommunications Beijing, China
IC503
CXXXIX. 14:30-14:45
Research on Security Isolation Method for Wireless Public Network Oriented to
Smart Power Distribution Service
Yajing Liu
North China Electric Power University, China
IC437
CXL. 14:45-15:00
Security Assessment of Dynamic Networks with An Approach of Integrating
Semantic Reasoning and Attack Graphs
Songyang Wu
The Third Research Institute of Ministry of Public Security Shanghai, China
IC492
CXLI. 15:00-15:15
Democratic Supervision Makes Controls in Software-Defined Networks More Secure
Li Junfei
NDSC, China
IC532
CXLII. 15:15-15:30
The Research on Application of Software Diversity in Cyberspace Security
Zhenwu Liu
State key Laboratory of Mathematical Engineering and Advanced Computing, China
IC657
CXLIII. 15:30-15:45
Interference-based VM Migration to Mitgate Cache-based Side-channel Attacks in
Cloud
Chao Yang
National Digital Switching System Engineering & Technological Research Center,
China
60
IC326
CXLIV. 15:45-16:00
Vulnerability of Complex Networks under Neighbor nodes Attack Strategies
Hao yaohui
Zhengzhou Institute of Information Science and Technology, China
Note
61
Dec. 9-Invited Speaker V
Invited Speaker V Asst. Prof. Yuichiro Tateiwa, Nagoya Institute of
Technology, Japan
13:45-14:00 Meeting Room 10-5F
Speech Title: LiNeS: Network Administration Exercise System with Support Functions for
Finding and Helping Stuck Students
Abstract: LiNeS is a network construction exercise system for beginners in universities. Learners
can construct virtual wired-networks consisting of virtual network devices (e.g., Linux servers
and routers) and virtual Ethernet-cables implemented by virtual machine software User-mode
Linux. In the exercises, instructers look for stuck students and help to solve their problems. In
the former, it is hard for instructors to grasp learners' progress at a glance, because learners
construct their networks by switching views on their PC monitor such as command execution
on each network device and file editing. LiNeS can provide instructors with learners' progress
based on analysis of learners' working history. In the latter, instructors point out learners'
setting errors, however, finding setting errors tend to spend much time. LiNeS can narrow down
setting including errors by analyzing learners' settings.
62
Dec. 9-Parallel Oral Session 21
S21: Coding Theory and Method
Session Chair:
Time: 14:00-16:00 [Meeting Room 10-5F]
IC043
14:00-14:15
CRC-aided Iterative Decoding of Turbo-hadamard Codes
Huanhuan Xu
Beijing University of Posts and Telecommunications, China
IC062
CXLV. 14:15-14:30
Fast Motion Estimation Algorithm for High Efficient Video Coding
Qian Liu
Guangdong University of Technology, China
IC1010
CXLVI. 14:30-14:45
Rate-adaptive Polar Codes Design for MLC NAND Flash Memory
Lingjun Kong
Nanjing University of Posts & Telecommunications, China
IC637
CXLVII. 14:45-15:00
Energy Efficiency Optimization of Generalized Spatial Modulation with Sub-
Connected Hybrid Precoding
Kai Chen
Huazhong University of Science and Technology, China
IC457
CXLVIII. 15:00-15:15
CRC-Polar Codes in TRPC-UWB Communication System
Qinwen Luo
Chang'an University, China
IC673
CXLIX. 15:15-15:30
Polar Code in FSO Communication System for Sea Surface Scenario
Li Songlang
Navy Aviation University, China
IC510
CL. 15:30-15:45
A Modified Version of Huffman Coding with Random Access Abilities
Ke Yang
University of Science and Technology of China, China
IC536
CLI. 15:45-16:00
A Low-Complexity Improved Progressive Bit-Flipping Decoding for Polar Codes
Xiaojun Zhang
Shandong University of Science and Technology, China
63
Dec. 9-Invited Speaker VI
Invited Speaker VI Prof. Pingguo Huang, Seijoh University, Japan
13:45-14:00 Room Mudan-4F
Speech Title: Will Transmission with Haptic Sensation in Networked Virtual Environment
Abstract: In recent years, many researchers have been paying attention to networked virtual
environments with haptics. Since we can largely improve the efficiency of collaborative work
and get high realistic sensations by using haptic sensation together with other sensations such
as visual and auditory sensations, haptic sensation is utilized in various fields such as medical,
artistic, and educations fields. In haptic collaborative work, it is necessary to transmit users’ wills
to each other. Traditionally, wills can be transmitted by audio and video. However, it needs
much more time to transmit the wills, and it may be difficult to transmit the wills in delicate
manipulation such as remote surgery training. In contrast, will transmission using haptic
sensation may reduce the transmission time, and it is possible to transmit wills in delicate
manipulation work in which it is difficult to transmit wills only by audio and video. Therefore, it
is very important to establish an efficient method to transmit wills by haptics for collaborative
work, especially for delicate manipulation work. This speech focuses on will transmission using
haptics, and investigates how to transmit wills by haptics and the influences of network delay
on will transmission. I also discuss the future directions of the research.
64
Dec. 9-Parallel Oral Session 22
S22: Embedded System and Intelligent Control Engineering
Session Chair:
Time: 14:00-16:00 [Room Mudan-4F]
IC099
14:00-14:15
Human Perception of Force in Cooperation between Remote Robot Systems with
Force Feedback
Pingguo Huang
Seijoh University, Japan
IC135
CLII. 14:15-14:30
A Discretization Method for Floating-Point Number in FPGA-based Decision Tree
Accelerator
Shuang Zhao
National University of Defense Technology, China
IC145
CLIII. 14:30-14:45
Optimization and Implementation of AES Algorithm Based on FPGA
Xiwei Zhang
Heilongjiang University, China
IC078
CLIV. 14:45-15:00
Research and FPGA Implementation of Security Control System Based on High
Alphabet Modulation
Sai Li
North China University of Technology, China
IC188
CLV. 15:00-15:15
Event-Triggered Feedback Control for Piecewise-Affine Systems via Convex
Combination
Yifei Ma
Jiangnan University, China
IC285
CLVI. 15:15-15:30
Design and Realization of Covers Monitoring and Controlling System
Lv Siqi
Xi'an Technological University, China
IC345
CLVII. 15:30-15:45
Research of Feed Forward Control of a Sewage Treatment Process Fuzzy Control
System
Lijuan Wang
Xi'an Technological University, China
65
IC595
CLVIII. 15:45-16:00
Truth Discovery on Categorical Multi-Valued Attributes with Source Relations
Yan Zheng
China State Key Laboratory of Mathematical Engineering and Advanced Computing,
China
Note
66
Dec. 9-Parallel Oral Session 23
S23: Face Recognition
Session Chair:
Time: 13:45-16:00 [Room Furong-4F]
IC490
13:45-14:00
Facial Expression Recognition based on Spatial Transformer Siamese Networks
Ximing Zhang
Northwestern Polytechnical University, China
IC539
CLIX. 14:00-14:15
Facial Expression Recognition Algorithm based on LDN and SVM
Zeng yiming
School of Electronic & Engineering, SEU, China
IC568
CLX. 14:15-14:30
Empirical study on Web-based Facial Recognition Services
Tao Yang
Zhejiang Gongshang University, China
IC699
CLXI. 14:30-14:45
Multimodal Biometric Authentication System for Smartphone based on Face and
Voice using Matching Level Fusion
Xinman Zhang
Xi’an Jiaotong University, China
IC705
CLXII. 14:45-15:00
Face Biometric Identity Authentication System
Xinman Zhang
Xi’an Jiaotong University, China
IC021
CLXIII. 15:00-15:15
An Novel Face Image Super-Resolution Based on Sparse Representation and
Wasserstein Distance
Zeyu Fan
University of Electronic Science and Technology of China, China
IC589
CLXIV. 15:15-15:30
Integrating GAN with CNN for Face Sketch Synthesis
ADEEL AKRAM
Xidian University, China
67
IC147
CLXV. 15:30-15:45
Face Alignment Based On 3D Morphable Model
Yufeng Zhao
Tianjin University of Technology, China
IC502
CLXVI. 15:45-16:00
Power-Grid Services Oriented Coordinated and Unified Control Technology of IP
and Optical Networks
Shengjin Lin
North China Electric Power University, China
Note
68
Dec. 9-Parallel Oral Session 24
S24: Software Development and Testing
Session Chair:
Time: 16:20-18:20 [Meeting Room 3A-7F]
IC709
16:20-16:35
Research and Practice of Swoole Asynchronous Multithreading Design Method
Jiajie Yang
Shaoguan University, China
IC242
CLXVII. 16:35-16:50
How Do HPC Programmers Mix MPC and SMC in Distributed Computing
Environment?
Zhen Yu
Guizhou Education University, China
IC073
CLXVIII. 16:50-17:05
Design and Implementation of Business Processes Efficiency Analysis System
Bo Li
China North Vehicle Research Institute, China
IC196
CLXIX. 17:05-17:20
A Feedback Scheduling Algorithm based on Resource Reservation
Azhen Peng
University of Chinese Academy of Sciences, China
IC329
CLXX. 17:20-17:35
STACKEEPER: A Static Source Code Analyzer to Detect Stack-based Uninitialized Use
Vulnerabilities
Zhenquan Xu
Shanghai Jiao Tong University, China
IC668
CLXXI. 17:35-17:50
User Behavior Analyses in Mobile Personal Livecasts
Shuo Wang
University of Science & Technology Beijing, China
IC551
CLXXII. 17:50-18:05
Android Malware Detection Based on Deep Learning
Junru Zhu
Shanghai Jiaotong University, China
69
IC025
CLXXIII. 18:05-18:20
An Adaptive Malicious Punishment over Secure Distributed Estimation under
Attacks
Feng chen
Southwest University, China
Note
70
Dec. 9-Parallel Oral Session 25
S25: Big Data Processing and Key Technologies
Session Chair:
Time: 16:20-18:20 [Meeting Room 3B-7F]
IC1002
16:20-16:35
Transmission Line Evaluation of Smart Grid based on Big Data Mining
Zhengnan Gao
Dalian University of Technology, China
IC138
CLXXIV. 16:35-16:50
Inferring Land Use Type in Urban Area with Mobile Big Data
Zhizhuang Xing
Beijing University of Posts and Telecommunications, China
IC158
CLXXV. 16:50-17:05
Design of Manufacturing Big Data Access Platform Based on SOA
Le Wei
Chengdu University of Information Technology, China
IC278
CLXXVI. 17:05-17:20
Design and Implementation of Air Quality Data Processing System Based on Big
Data Technology
Menghao Chu
Beijing University of Technology, China
IC284
CLXXVII. 17:20-17:35
Application of Big Data Technology in Evaluation of Operating State of High-
pressure Hydrogenation Heat Exchanger
Li Lujie
Beijing University of Posts and Telecommunications, China
IC335
CLXXVIII. 17:35-17:50
The Impact of E-Commerce on Customers’ Purchasing Patterns in the Era of Big Data
Guanzhen Wu
Beijing University of Posts and Telecommunications, China
IC413
CLXXIX. 17:50-18:05
Research on Automatic Classification for Driving Scenarios Based on Big Data and
Ontology
Yinan Wu
China Automotive Technology & Research Center Co. Ltd., China
71
IC507
CLXXX. 18:05-18:20
A Study on the Application of Big Data Mining in E-commerce
Xuesong Zhao
Kunming University of Science and Technology, China
Note
72
Dec. 9-Parallel Oral Session 26
S26: Medical Image Processing and Method
Session Chair:
Time: 16:20-18:20 [Meeting Room 6-7F]
IC256
16:20-16:35
Automatic Cataract Classification Based on Multi-feature Fusion and SVM
Yanmin Xiong
Beijing University of Posts and Telecommunications, China
IC051
CLXXXI. 16:35-16:50
Fuzzy C-means Thresholding for a Brain MRI Image Based on Edge Detection
Ismail Yaqub. Maolood
Huazhong University of Science and Technology, China
IC564
CLXXXII. 16:50-17:05
Segmentation of Lesions in Skin Image Based on Salient Object Detection with
Deeply Supervised Learning
Weijia Ji
East China University of Science and Technology, China
IC596
CLXXXIII. 17:05-17:20
Detection of Hepatolithiasis in CT Images for Image-Guided Surgery
UDOESSIET IKEBETOBONG PETER
Shenyang Jianzhu University, China
IC071
CLXXXIV. 17:20-17:35
Brain CT and MRI medical image fusion scheme Using NSST And Dictionary Learning
Yanyu Liu
Yunnan University, China
IC520
CLXXXV. 17:35-17:50
Capsule Endoscopy Image Classification with Deep Convolutional Neural Networks
Wenming Yang
Tsinghua University, China
IC569
CLXXXVI. 17:50-18:05
A New Feature Extraction Method for Medical Images Integrity Verification
Pengliang Hou
University of Chinese Academy of Science, China
IC221
CLXXXVII. 18:05-18:20
The Combinations of Loss Functions and Schemes for Mammographic Classification
Lintong Li
Harbin Institute of Technology, China
73
Dec. 9-Parallel Oral Session 27
S27: Neural Network Theory and Application
Session Chair:
Time: 16:20-18:20 [Meeting Room 9-5F]
IC458
16:20-16:35
Multi-dimensional Speaker Information Recognition with Multi-Task Neural
Network
Haixia Chen
Nanjing University of Posts and Telecommunications, China
IC461
CLXXXVIII. 16:35-16:50
Recognition of Access Control Role Based on Convolutional Neural Network
Liu Aodi
ZhengZhou Science and Technology Institute, China
IC529
CLXXXIX. 16:50-17:05
FPGA-based Accelerator for Independently Recurrent Neural Network
Gao Chen
China National Digital Switching System Engineering & Technological R&D Center,
China
IC602
CXC. 17:05-17:20
The Method for Single Well Operational Costprediction Combining RBF Neural
Network and Improved PSO Algorithm
Hongtao Hu
Xi’an Shiyou University, China
IC635
CXCI. 17:20-17:35
Modeling of Synchronization Behavior of Excitatory and Inhibitory Neurons in
Complex Neuronal Networks
Zhiheng Liu
Beijing University of Posts and Telecommunications, China
IC648
CXCII. 17:35-17:50
Convolutional neural network-based Simple Online Multiple Object Tracking
Jiahui Wang
National University of Defense Technology, China
IC676
CXCIII. 17:50-18:05
Experimental Evaluation of Metaheuristic Optimization of Gradients as an
Alternative to Backpropagation
Oleksandr Zavalnyi
Beihang University, China
74
IC702
CXCIV. 18:05-18:20
Distant Supervision for Relation Extraction via Retrieval-based Neural Networks
Kejun Deng
Peking University, China
Note
75
Dec. 9-Parallel Oral Session 28
S28: Text Classification and Semantic Analysis
Session Chair:
Time: 16:20-18:20 [Meeting Room 10-5F]
IC422
16:20-16:35
Marrying K-means with Evidence Accumulation in Clustering Analysis
Xiaoding Guo
Harbin Institute of Technology, China
IC716
CXCV. 16:35-16:50
A Short Text Spectrum Clustering Method Based on Frequent Itemsets
Nan Luo
State Key Laboratory of Mathematical Engineering and Advanced Computing, China
IC301
CXCVI. 16:50-17:05
Mobile Phone Spam Text Classification based on Prior Knowledge
Yang Li
Beijing University of Technology, China
IC180
CXCVII. 17:05-17:20
Research on Stylistic Features in Translation Based on Supervised Learning
Algorithms
Jianyu Zheng
Beijing Normal University, China
IC201
CXCVIII. 17:20-17:35
Text Features Extraction based on TF-IDF Associating Semantic
Jing Wang
Yunnan University, China
IC383
CXCIX. 17:35-17:50
Word-Level and Character-Level Mixed Features for Chinese Short Text
Classification
Jingwen Li
Beijing University of Posts and Telecommunications, China
IC605
CC. 17:50-18:05
Synergistic Union of Word Embedding and Knowledge Graph for Words Semantic
Similarity Measure
Xiaoqiang Xia
Yunnan University, China
76
IC708
CCI. 18:05-18:20
Word Relevancy Evaluation Based on GBDT Regression Model
Yunyan Zhou
LEETC, China
Note
77
Dec. 9-Parallel Oral Session 29
S29: Computer Science and Engineering
Session Chair:
Time: 16:20-18:20 [Room Mudan-4F]
IC491
16:20-16:35
A DHR-based Security-critical Task Scheduling Algorithm for Heterogeneous
Processing System
Ye Shengzhao
China National Digital Switching System Engineering & Technological R&D Center,
China
IC562
CCII. 16:35-16:50
Dynamic Memory Access Monitoring Based on VMM
Xinyue Feng
University of Chinese Academy of Sciences, China
IC632
CCIII. 16:50-17:05
Energy-Efficient Phase-Aware Load Balancing on Asymmetric Multicore Processors
Shan Zhao
University of Chinese Academy of Sciences, China
IC199
CCIV. 17:05-17:20
A Model-driven Approach for Formal Verification of Embedded Systems Using
Timed Colored Petri Nets
Faleeha Moin
National University of Sciences and Technology (NUST), Pakistan
IC672
CCV. 17:20-17:35
Rule-based Complex Event Processing on Tactical Moving Objects
Bonghee Hong
Pusan National University, South Korea
IC085
CCVI. 17:35-17:50
A Divede and Conquer Approach to Parallel All Solutions Satisfiability Problem
Xiaoqin Ren
University of Electronic Science and Technology of China, China
IC518
CCVII. 17:50-18:05
Modeling and Accessment of the Regional Energy Internet Based on Multi-Agent
Yinghua Han
Northeastern University at Qinhuangdao, China
78
IC132
CCVIII. 18:05-18:20
Real-Time Simulation of Brush Behaviors in Chinese Calligraphy with the Sense of
Immersion
Dong Huang
Beijing Language and Culture University, China
Note
79
Dec. 9-Parallel Oral Session 30
S30: Smart Grid and Electrical Engineering
Session Chair:
Time: 16:20-18:20 [Room Furong-4F]
IC186
16:20-16:35
Challenges and Statues of Rectifier for Far Field Wireless Energy Harvester in Power
Variation of Input RF/Microwave Signal
Baohong Liu
Nanchang Institute of Technology, China
IC515
CCIX. 16:35-16:50
Soft Computing Detection Method for Remaining Capacity of Lead-Acid Battery
Hao Zhou
Chongqing University of Science and Technology, China
IC082
CCX. 16:50-17:05
Battery Grouping Based on Dynamic Gaussian Mixture Model
Lianjing Wang
Harbin University of Science and Technology, China
IC432
CCXI. 17:05-17:20
Hybrid Kernel LSSVM Model for Prediction of Short-term Wind Speed
Wenping Xiao
Jilin University, China
IC504
CCXII. 17:20-17:35
Research on Centralized Control Architecture Deployment of Power Optical
Network Based on Network Perception
Junjie Liu
North China Electric Power University, China
IC508
CCXIII. 17:35-17:50
Research on Business Recognition Perception for Active fault early warning of Power
Optical Network
Junjie Liu
North China Electric Power University, China
IC578
CCXIV. 17:50-18:05
Network Recovery for Large-scale Failures in Smart Grid by Reinforcement Learning
Huibin Jia
North China Electric Power University, China
80
IC249
CCXV. 18:05-18:20
Bad Data Identification in Power System based on Improved GSA Algorithm
Yinghua Han
Northeastern University at Qinhuangdao, China
Note
81
Dec. 9-Poster Presentation Session 31
S31: Data Theory and Engineering
Session Chair:
Time: 14:00-16:00 [Meeting Room 8-5F]
IC010
14:00-14:10
Enterprise Lean Catering Material Management Information System based on
Sequence Pattern Data Mining
Li Lin
China Tobacco Shandong Industrial Co., Ltd., China
IC101
CCXVI. 14:10-14:20
Building Syndrome and Symptom Association Network by Bayesian Network
Wan Qiu
Communication University of China, China
IC120
CCXVII. 14:20-14:30
Event Based Forecasting of Database Workloads
Janusz R. Getta
University of Wollongong, Australia
IC173
CCXVIII. 14:30-14:40
Research on Data filling Algorithm Based on Improved k-means and Information
Entropy
Xiaofei Gong
Beijing University of Posts and Telecommunications, China
IC275
CCXIX. 14:40-14:50
A Data Processing Method for Fault Prediction of Industrial Pipeline Time Series
Data
Fulong Xu
University of Chinese Academy of Sciences, China
IC464
CCXX. 14:50-15:00
Parallel Processing of Top-k Dominating Queries on Incomplete Data
Chao Yan
Donghua University, China
IC476
CCXXI. 15:00-15:10
Miku VMD: Special Motion Data and Predictive Methods for Choreography Model
Jingxin Chen
Southeast University, China
82
IC533
CCXXII. 15:10-15:20
Memory-Compact Membership Lookup for Multiple Data Sets by a Single Bloom
Filter
Lin Wen
Southeast University, China
IC537
CCXXIII. 15:20-15:30
Web Evaluation Analysis of Tourism Destinations Based on Data Mining—Taking
Scenic Spots of Hainan Province as an Example
Mengyuan Li
China Unicom System Integration Limited Corporation, China
IC707
CCXXIV. 15:30-15:40
CCXXV. A Survey of Gene Selection and Classification Techniques based on Cancer
Microarray Data Analysis
Xuebin Xu
Guangdong Xi’an Jiaotong University Academy, China
IC320
CCXXVI. 15:40-15:50
An Improved Weighted KNN Algorithm for Imbalanced Data Classification
Shenglan Liu
Beijing University of Posts and Telecommunications, China
IC692
CCXXVII. 15:50-16:00
Research on Awareness Method of Cloud User Abnormal Behavior Based on Log
Auditing
Weijie Wang
Beijing Information Science and Technology University, China
Note
83
Dec. 9-Poster Presentation Session 32
S32: Routing Protocol Design and Algorithm
Session Chair:
Time: 16:20-18:20 [Meeting Room 8-5F]
IC433
16:20-16:30
Research on Simulation of Cluster Routing Protocol for Industrial Wireless Sensor
Networks
Feiqing Zhang
University of Chinese Academy of Sciences, China
IC213
CCXXVIII. 16:30-16:40
An Overlay Routing Algorithm based on QoS for Internet of Things
Jun Tao
Anhui Institute of Information Technology, China
IC263
CCXXIX. 16:40-16:50
Multi-constrained Routing Algorithm based on PSPSO_FWA in DAG
Youbing Hu
Xidian University, China
IC334
CCXXX. 16:50-17:00
QEBR: Q-Learning Based Routing Protocol for Energy Balance in Wireless Mesh
Networks
Jialing Chen
Peking University, China
IC423
CCXXXI. 17:00-17:10
Routing Algorithm of Congestion Control for Aeronautic Swarm Network
Fangbo Cao
Air Force Engineering University, China
IC493
CCXXXII. 17:10-17:20
Time-relevant Deep Reinforcement Learning for Routing Optimization
Penghao Sun
NDSC, China
IC523
CCXXXIII. 17:20-17:30
FD-SP: A Method for Predicting Cascading Failures of Inter-Domain Routing System
Han Qiu
National Digital Switching System Engineering and Technological R&D Center,
China
84
IC582
CCXXXIV. 17:30-17:40
A Community-Based Opportunistic Routing Protocol in Delay Tolerant Networks
Sun Haoran
Beijing University of Post and Telecommunications, China
IC591
CCXXXV. 17:40-17:50
A Cross-Layer Anti-Jamming Routing Protocol for FANETS
Xiangrui Fan
National Key Laboratory of Aerospace Intelligent Control Technology, China
IC603
CCXXXVI. 17:50-18:00
A Correlation-aware Diverse Variant Placement to Increase Network Resilience
Jianjian Ai
NDSC, China
IC661
CCXXXVII. 18:00-18:10
Unequal Clustering and Routing Algorithm based on Dynamic Topology for WSN
Hongying Bai
Ordos Institute of Technology, China
IC273
CCXXXVIII. 18:10-18:20
A Study on Collaborative Filtering Recommendation Algorithms
Dong Liu
Guangdong University of Foreign Studies, China
Note
85
Dec. 10-Parallel Oral Session 33
S33: Modern Information Theory and Technology
Session Chair:
Time: 09:00-12:20 (10:30-10:50 Coffee Break Time) [Meeting Room 3A-7F]
IC324
09:00-09:15
Ranking the Future Influence of Scientific Literatures
Xi Zhang
Shanghai Jiao Tong University, China
IC424
CCXXXIX. 09:15-09:30
A Signature Scheme Applying on Blockchain Voting Scene Based on the Asmuth-
Bloom Algorithm
Wang Lipeng
Zhengzhou Normal University, China
IC140
CCXL. 09:30-09:45
A High Performance Consensus Algorithm for Consortium Blockchain
Siye Ding
Beijing University of Posts and Telecommunications, China
IC590
CCXLI. 09:45-10:00
A CNN-based Feature Extraction Scheme for Patent Analysis
Yingyu Wang
Beijing University of Posts and Telecommunications, China
IC626
CCXLII. 10:00-10:15
A Method to Improve the Teaching Effect of Mobile Communication Course by
Establishing Propagation Loss Model
Huafu Li
Yunnan Normal University, China
IC176
CCXLIII. 10:15-10:30
Optimizing Attention Mechanism for Neural Machine Translation
Zhonghao Li
Shanghai Jiao Tong University, China
IC405
CCXLIV. 10:50-11:05
Dynamic Flow Scheduling in a Software-Defined Network Environment
Xin Sun
Ball State University, USA
86
IC710
CCXLV. 11:05-11:20
Feature Analysis and Optimisation for Computational Personality Recognition
Yu Mao
Beijing University of Posts and Telecommunications, China
IC723
CCXLVI. 11:20-11:35
Cooperative Beamforming for UAV-assisted Cognitive Relay networks with Partial
Channel State Information
Shengxiang Zhu
Nanjing University of Posts and Telecommunications, China
IC606
CCXLVII. 11:35-11:50
DGPA-Based Tone Reservation for PAPR Reduction in OFDM Systems
Ran Ding
Nanjing University of Science and Technology, China
IC168
CCXLVIII. 11:50-12:05
Impact of Frequency Offset on the Performance of Uplink OFDM-NOMA Systems
Xinyi Chen
University of Science and Technology of China, China
IC362
CCXLIX. 12:05-12:20
LSTM-based Traffic Prediction in Support of Periodically Light Path Reconfiguration
in Hybrid Data Center Network
Cen Wang
Beijing University of Posts and Telecommunications, China
Note
87
Dec. 10-Parallel Oral Session 34
S34: Signal Analysis and Method
Session Chair:
Time: 09:00-12:20 (10:30-10:50 Coffee Break Time) [Meeting Room 3B-7F]
IC207
09:00-09:15
Multiuser Secret Key Generation based on Received Signal
Cai Aolin
National Digital Switching System Engineering & Technological R&D Center, China
IC075
CCL. 09:15-09:30
A Novel Throat Microphone Speech Enhancement Framework based on Deep
BLSTM Recurrent Neural Networks
Changyan Zheng
PLA Army Engineering University, China
IC451
CCLI. 09:30-09:45
Speech Enhancement based on Cepstral Mapping and Deep Neural Networks
Yang Xiang
Beijing University of Technology, China
IC057
CCLII. 09:45-10:00
M-ary Orthogonal Signal and BER Performance in Wireless Communication Systems
Xuewen Ding
Shandong University, China
IC440
CCLIII. 10:00-10:15
Speech Enhancement based on Energy-focused NMF
Changchun Bao
Beijing University of Technology, China
IC1019
CCLIV. 10:15-10:30
Voice Intonation Transformation Using Segmental Linear Mapping of Pitch
Contours
Sakshi Pandey
South Asian University, India
IC1007
CCLV. 10:50-11:05
Blind Identification of Signals with Stochastic Frequency Offset in Non-cooperative
Environment
Li Xu
Chinese Academy of Sciences, China
88
IC264
CCLVI. 11:05-11:20
Matching Pursuit based Sparse Time-frequency Analysis for Seismic Signal
Yingpin Chen
University of Electronic Science and Technology of China, China
IC299
CCLVII. 11:20-11:35
An Optimized Window Length based Time-Frequency Representation for Non-
Linear Frequency Modulated Signals
Qi Xu
University of Electronic Science and Technology of China, China
IC353
CCLVIII. 11:35-11:50
An Improved IMCRA Algorithm for Sleep Signal Denoising
Yawen Huang
Beijing University of Technology, China
IC479
CCLIX. 11:50-12:05
Style Transfer Based on Normalization Loss
Yuan Sun
Central South University, China
IC617
CCLX. 12:05-12:20
Research on Chinese Spam Comments Detection Based on Chinese Characteristics
Chunyu He
Beijing University of Posts and Telecommunications, China
Note
89
Dec. 10-Parallel Oral Session 35
S35: Pattern Recognition
Session Chair:
Time: 09:00-12:20 (10:30-10:50 Coffee Break Time) [Meeting Room 6-7F]
IC718
09:00-09:15
A Robust Algorithm for Go Image Recognition in Go Game
Shanshan Li
Anhui University, China
IC049
CCLXI. 09:15-09:30
Multi-Feature Fusion Using Collaborative Residual for Hyperspectral Palmprint
Recognition
Shuping Zhao
University of Macau, China
IC121
CCLXII. 09:30-09:45
EasiSMR: Recognizing Non-Specific Low Back Pain Symptomatic Muscles Using
Multi-Muscles Fusion based Machine Learning
Nian Wang
University of Chinese Academy of Sciences, China
IC241
CCLXIII. 09:45-10:00
Multidimensional Particle Swarm Optimization Based Long Short-Term Memory
Method for Human Activity Recognition
Yuanli Zhang
Beijing Electronic Science and Technology Institute, China
IC288
CCLXIV. 10:00-10:15
Traffic Police Gesture Recognition for Autonomous Driving
Chaojun Li
Beijing University of Technology, China
IC296
CCLXV. 10:15-10:30
A Deep Learning Approach for Website Fingerprinting Attack
Xiaomin He
Beijing University of Posts and Telecommunications, China
IC366
CCLXVI. 10:50-11:05
Research on Regional Traffic State Identification Method Based on MRGA-FCM
MEI Duo
Bohai University, China
90
IC583
CCLXVII. 11:05-11:20
Utilize Smart Insole to Recognize Basketball Motions
Shaodong Shi
Hefei University of Technology, China
IC239
CCLXVIII. 11:20-11:35
An Object Detection System Based on YOLOv2 in Fashion Apparel
Zhihua Feng
Donghua University, China
IC701
CCLXIX. 11:35-11:50
Voice Biometric Identity Authentication System Based on Android Smart Phone
Xinman Zhang
Xi’an Jiaotong University, China
IC534
CCLXX. 11:50-12:05
A Vision-based Human Action Recognition System for Companion Robots and
Human Interaction
Meng-Lin Chiang
National Taiwan Normal University, Taiwan
IC420
CCLXXI. 12:05-12:20
Research on Big Data Storage Model of Oilfield Assay Data Based on MongoDB
Man Yuan
Northeast Petroleum University, China
Note
91
Dec. 10-Parallel Oral Session 36
S36: Computer Vision and Image Processing
Session Chair:
Time: 09:00-12:20 (10:30-10:50 Coffee Break Time) [Meeting Room 9-5F]
IC333
09:00-09:15
An Improved Visual Tracking Algorithm based on Efficient Convolution Operators
Yi Liang
University of Central Lancashire of the United Kingdom, UK
IC024
CCLXXII. 09:15-09:30
Design of a Large Area Array CMOS of Camera System that Can Automatically Zoom
Liu Yang
University of Chinese Academy of Science, China
IC516
CCLXXIII. 09:30-09:45
Photographic Image Synthesis with Highway Residual U-net
Xin Chen
Hubei University of Technology, China
IC696
CCLXXIV. 09:45-10:00
Scatter Inpainting Algorithm for Rain or Snow Removal in a Single Image
Jianyu Hao
Yunnan University, China
IC139
CCLXXV. 10:00-10:15
Enabling Multiview- and Light Field-Video for Veridical Visual Experiences
Thorsten Herfet
Saarland University, Germany
IC286
CCLXXVI. 10:15-10:30
ISAR Imaging Algorithm of Maneuvering Target Based on Matching Flourier
Transform
Baofeng Guo
Shijiazhuang Campus Army Engineering University, China
IC195
CCLXXVII. 10:50-11:05
A Fast Object Proposal Assessment Method based on Edge Directions
Kai Tan
UESTC, China
92
IC390
CCLXXVIII. 11:05-11:20
Developing a Framework for the University-Wide Implementation of Micro-
Credentials and Digital Badges: A Case Study from a Malaysian Private University
Chee Leong Lim
Taylor’s University, Malaysia
IC573
CCLXXIX. 11:20-11:35
Floor Plan Classification Based on Transfer Learning
Xingyu Guo
Beijing University of Posts and Telecommunications, China
IC706
CCLXXX. 11:35-11:50
Magnetic Ring Detection System Based on Multi-camera Vision Technology
Xuebin Xu
Guangdong Xi’an Jiaotong University Academy, China
IC179
CCLXXXI. 11:50-12:05
Analysis and Fusion Algorithm of Weak Target based on Infrared Dual-Band
Xiaozhu Wang
Northwestern Polytechnical University, China
IC144
CCLXXXII. 12:05-12:20
Improving Comprehensive Sampling Sets Matting Using Texture Feature
Xin Hong
Communication University of China, China
Note
93
Dec. 10-Parallel Oral Session 37
S37: Neural Network Theory and Application
Session Chair:
Time: 09:00-12:20 (10:30-10:50 Coffee Break Time) [Meeting Room 10-5F]
IC077
09:00-09:15
Analysis for Influence of Training Data Sequence on CNN-based Steganalysis
Shunxiang Yang
Zhengzhou Information Science and Technology Institute, China
IC107
CCLXXXIII. 09:15-09:30
A RBF-DBN Composite Neural Network Model for the Datasets with Few Input
Dimensions
Jianjun Jiang
National Digital Switching System Engineering and Technological Research Center
(NDSC) ZhengZhou, China
IC123
CCLXXXIV. 09:30-09:45
The Prediction of Hypertension Based on Convolution Neural Network
Yue Luo
University of Electronic Science and Technology of China, China
IC160
CCLXXXV. 09:45-10:00
Discharge Voltage Time Series Classification of Lithium-ion Cells Based on Deep
Neural Networks
Chengbao Liu
University of Chinese Academy of Sciences, China
IC174
CCLXXXVI. 10:00-10:15
Incorporating Forward and Backward Instances in a Bi-LSTM-CNN for Relation
Classification
Taoling Xu
Xihua University, China
IC233
CCLXXXVII. 10:15-10:30
Application of Artificial Neural Network in HRV Analysis
Yating Zhu
Xi'an Technological University, China
IC336
CCLXXXVIII. 10:50-11:05
Research on Chinese Named Entity Recognition Based on Neural Network
Junyao Zhang
Beijing University of Posts and Telecommunications, China
94
IC340
CCLXXXIX. 11:05-11:20
End-to-End Chinese Dialect Identification Using Deep Feature Model of Recurrent
Neural Network
Yingli Shen
Jiangsu Normal University, China
IC347
CCXC. 11:20-11:35
Neural Network Aided SC Decoder for Polar Codes
Jie Gao
Beihang University, China
IC359
CCXCI. 11:35-11:50
A Research on Deep Neural Network based Airline Market Share Prediction Model
in Aviation Market Network Evaluation
Fan Yang
China Southern Airlines, China
IC216
CCXCII. 11:50-12:05
A CNN-based Broad Learning System
Fan Yang
University of Chinese Academy of Science, China
IC629
CCXCIII. 12:05-12:20
An Automatic Brain Tumor Image Segmentation Method based on the U-net
Jikun Song
Henan University of Technology, China
Note
95
Dec. 10-Parallel Oral Session 38
S38: Information System Management and Scheduling
Session Chair:
Time: 09:00-12:20 (10:30-10:50 Coffee Break Time) [Room Mudan-4F]
IC081
09:00-09:15
Design and Implementation of Production Planning Management System based on
SSH
Xiang Da-fang
Science and Technology dept. guangdong songshan polytechnic, China
IC1004
CCXCIV. 09:15-09:30
A Column Generation Based Algorithm for Airline Cabin Crew Rostering Problem
Nan Xu
China Southern Airlines, China
IC182
CCXCV. 09:30-09:45
A Low Power Consumption Period Task Scheduling Algorithm in Real-Time System
Haotian Wu
University of Chinese Academy of Sciences, China
IC608
CCXCVI. 09:45-10:00
The Vector Scheduling Game on Two Hierarchical Identical Machines
Li Guan
Yunnan University, China
IC615
CCXCVII. 10:00-10:15
A Fusion Prognostics Framework for Electronic System
Lulu Shao
Zhengzhou Information Science and Technology Institute, China
IC009
CCXCVIII. 10:15-10:30
A Full Life Cycle Monitoring Information System for Cigarette Equipments
Li Lin
China Tobacco Shandong Industrial Co., Ltd., China
IC068
CCXCIX. 10:50-11:05
Research on Entity Relationship Extraction in Financial and Economic Field based on
Deep Learning
Zhenyu Zhou
Beijing University of Posts and Telecommunications, China
96
IC1015
CCC. 11:05-11:20
Usability Evaluation of Mobile Applications: An Empirical Analysis of Supply Chain
Management Systems
S M Hasan Mahmud
Daffodil International University, Bangladesh
IC193
CCCI. 11:20-11:35
Research on Agricultural Environment Information Collection System Based on LoRa
Zheng Wang
Southeast University, China
IC577
CCCII. 11:35-11:50
Research on LSTM-Based Load Prediction for Edge Data Centers
Qianying Guo
Beijing University of Technology, China
IC575
CCCIII. 11:50-12:05
Power Allocation for Uplink Cognitive Heterogeneous Network with Non-
Orthogonal Multiple Access
Woping Xu
Donghua University, China
IC609
CCCIV. 12:05-12:20
Cluster Formation and Power Control for M2M-enabled Two-tier Cellular Network
Song Zhang
Southeast University, China
Note
97
Dec. 10-Parallel Oral Session 39
S39: Image Denoising and Image Enhancement
Session Chair:
Time: 09:00-12:20 (10:30-10:50 Coffee Break Time) [Room Furong-4F]
IC612
09:00-09:15
Multi-focus Image Fusion Framework using Total Variationand Phase Congruency
Jiatian Mei
Yunnan University, China
IC618
CCCV. 09:15-09:30
A Two-layer Image Caching Mechanism Based on Social Relationships
Ling Zhao
Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream Data,
China
IC267
CCCVI. 09:30-09:45
Channel Calibration Method for ISAR Imaging System
Baofeng Guo
Shijiazhuang Campus Army Engineering University, China
IC131
CCCVII. 09:45-10:00
Affine and Magnitude Transforms Based Data Augmentation Comparison for SAR
Automatic Target Recognition
Moulay Idriss Bellil
Beihang University, China
IC153
CCCVIII. 10:00-10:15
Image-Based Label Placement for Augmented Reality Browsers
Xiaoce Wu
Hebei Normal University, China
IC540
CCCIX. 10:15-10:30
Image Deblurring Algorithm using Accelerated Gradient Descent Method
Hayk Sargsyan
Institute of Informatics, NAS of Armenia
IC356
CCCX. 10:50-11:05
Single Image Dehazing via relativity-of-Gaussian
Yin Gao
Quanzhou Institute of Equipment Manufacturing, China
98
IC044
CCCXI. 11:05-11:20
Double Weighted RPCA Denoising Algorithm for Color Images
Yisu Zhou
Nanjing University, China
IC684
CCCXII. 11:20-11:35
RGB-D Image Enhancement by Prior Guided Weighted Nonlocal Laplacian
Bo Li
Nanchang Hangkong University, China
IC691
CCCXIII. 11:35-11:50
Comparing and Combining MLPs and CNNs for Image Denoising
Dan Zhang
Zhejiang University, China
IC292
CCCXIV. 11:50-12:05
Stereo Matching based on Improved Census Transform
Yurong Wang
Army Engineering University of PLA, China
IC079
CCCXV. 12:05-12:20
Research and Improvement of a WM Multimode Pattern Matching Algorithm
Yansen Zhou
University of International Relations, China
Note
99
Dec. 10-Poster Presentation Session 40
S40: Wireless Sensor Network Design and Optimization
Session Chair:
Time: 09:00-11:20 (10:00-10:20 Coffee Break Time) [Meeting Room 8-5F]
IC052
09:00-09:10
Design and Analysis of Dual-Channel Structure for Software-Defined Wireless
Sensor Networks
Wang Ziyin
Beijing University of Post and Telecommunications, China
IC055
CCCXVI. 09:10-09:20
Network-Balanced Algorithm Based on Hierarchical Subnet Space for Software-
Defined Wireless Sensor Networks
Li Yajun
Beijing University of Post and Telecommunications, China
IC069
CCCXVII. 09:20-09:30
Coverage optimization based on Improved Firefly Algorithm for Mobile Wireless
Sensor Networks
Xiaolin Lu
Northwestern Polytechnical University, China
IC118
CCCXVIII. 09:30-09:40
Modeling Wireless Sensor Networks on FPGA Platform: A Stochastic Network
Calculus Approach
Lin Pang
China Gridcom Co.,Ltd., China
IC134
CCCXIX. 09:40-09:50
Balancing Energy Consumption Algorithm Based-on Controller Handover for
Software-Defined Wireless Sensor Network
Cao Lei
Beijing University of Post and Telecommunications, China
IC166
CCCXX. 09:50-10:00
Design and Analysis of Software-defined Wireless Sensor Network Based on Mobile
Agent Topology Discovery
Wang Tian
Beijing University of Post and Telecommunications, China
IC388
CCCXXI. 10:20-10:30
Towards General Software-Defined Wireless Sensor Networks
Meigen Huang
Zhengzhou Information Science and Technology Institute, China
100
IC418
CCCXXII. 10:30-10:40
An Effective Cluster Heads Selection Method for Wireless Sensor Networks
Meng Ni
Nanjing University of Posts and Telecommunications, China
IC547
CCCXXIII. 10:40-10:50
MAC Protocol Analysis based on Adaptive Wireless Sensor Network
Zheng liu
Yunnan University, China
IC656
CCCXXIV. 10:50-11:00
Exploiting Unmanned Aerial Vehicle for Energy Efficient Data Collection in Wireless
Sensor Networks
Yuying Fan
Shanghai Jiaotong University, China
IC584
CCCXXV. 11:00-11:10
A Sliding Window Based Efficient Transmission for Underwater Sensor Networks
Hongcui Ji
Hohai University, China
IC663
CCCXXVI. 11:10-11:20
Multiple Access Protocol for ad-hoc networks in VHF Data Exchange System
Shijie Rong
Nanjing University of Science and Technology, China
Note
101
Dec. 10-Parallel Oral Session 41
S41: Future Communications and Satellite Communications Engineering
Session Chair:
Time: 13:30-15:45 [Meeting Room 3A-7F]
IC112
13:30-13:45
Uplink Interference Analysis Between LEO and GEO Systems in Ka Band
Pin Xu
Beijing University of Posts and Telecommunications, China
IC261
CCCXXVII. 13:45-14:00
Open-Loop Precoding Scheme for Multi-beam Mobile Satellite Communication
Systems
Zeliang An
Nanchang Hangkong University, China
IC666
CCCXXVIII. 14:00-14:15
Design and Implementation of NS3-Based Simulation System of LEO Satellite
Constellation for IoTs
Zheng Wang
Beijing University of Posts and Telecommunications, China
IC394
CCCXXIX. 14:15-14:30
Research on TD - LTE Uplink Frequency Offset Estimation Algorithm for High - speed
Railway
Feng Ding
Lanzhou Jiaotong University, China
IC623
CCCXXX. 14:30-14:45
Roadside Units Non-full Coverage Optimization Deployment Based On Simulated
Annealing Particle Swarm Optimization Algorithm
Shanjie Zhang
Nanjing University, China
IC287
CCCXXXI. 14:45-15:00
Deployment of Edge-Computing in 5G NFV Environment and Future Service-Based
Architecture
Huazhang Lv
China Unicom, China
IC500
CCCXXXII. 15:00-15:15
Max-Min User Throughput in Emergency Situations with a Master-Slave UAV Model
Yuning Chen
Beijing University of Posts and Telecommunications, China
102
IC721
CCCXXXIII. 15:15-15:30
Enabling Smart Cities Through V2X Communication
Mohammad Samarah
Florida Polytechnic University, USA
IC060
CCCXXXIV. 15:30-15:45
An Energy Efficiency Optimization Algorithm Based on the Factor for Portion of Time
Division in Backhaul-Constrained Ultra Dense HetNets
Shiqiang Chu
Ministry of Education, China
Note
103
Dec. 10-Parallel Oral Session 42
S42: Communication Network Resource Allocation and Calculation
Session Chair:
Time: 13:30-15:45 [Meeting Room 3B-7F]
IC446
13:30-13:45
Resource Allocation in Cognitive Wireless Powered Communication Networks under
Outage Constraint
Longqi Wang
Nanjing University of Posts and Telecommunications, China
IC295
CCCXXXV. 13:45-14:00
Resource Allocation for IoT Devices in FeD2D Communication Networks
Ting Zhang
Beijing University of Posts and Telecommunications, China
IC159
CCCXXXVI. 14:00-14:15
Load Balancing and QoS Supporting Access and Handover Decision Algorithm for
GEO/LEO Heterogeneous Satellite Networks
Hangyu Song
Beijing University of Posts and Telecommunications, China
IC175
CCCXXXVII. 14:15-14:30
Resource Allocation for Delay QoS-Driven Multicarrier Relay Networks with Energy
Harvesting Nodes
Yanan Dong
Shandong University, China
IC031
CCCXXXVIII. 14:30-14:45
Joint Computation Offloading and Wireless Resource Allocation in Mobile Edge
Computing
Ling Li
Jilin University, China
IC251
CCCXXXIX. 14:45-15:00
Hybrid Resource Allocation Algorithm based on Spectrum Sharing and Separation
in Ultra-Dense Networks
Yang zhi ming
Chongqing University of Posts and Telecommunications, China
IC621
CCCXL. 15:00-15:15
Dynamic Computing and Radio Resource Allocation in Downlink Green C-RAN
Systems
Kangkang Wang
Beijing University of Posts and Telecommunications, China
104
IC690
CCCXLI. 15:15-15:30
Resource Allocation for Downlink SCMA System Based on Coalitional Game
Mengchen Zhang
Peking University, China
IC588
CCCXLII. 15:30-15:45
An Adaptive Multicast Bandwidth Allocation Mechanism in TDM-WDM PONs
Dashuai Hu
Beijing University of Posts and Telecommunications, China
Note
105
Dec. 10-Parallel Oral Session 43
S43: Traffic Network and Intelligent Transportation
Session Chair:
Time: 13:30-15:45 [Meeting Room 6-7F]
IC311
13:30-13:45
Research on Parallel Encryption Technology in the Emergency Platform of High
Speed Railway in China
Jiaojiao Li
Beijing Jiaotong University, China
IC314
CCCXLIII. 13:45-14:00
Path Loss and Blockage Modeling for Vehicle to Vehicle Channel above 6 GHz
Zhanji Wu
Beijing University of Posts and Telecommunications, China
IC126
CCCXLIV. 14:00-14:15
Research on Polling Based Traffic Signal Control Strategy with Fuzzy Control
Yi-Fei Wang
Yunnan University, China
IC042
CCCXLV. 14:15-14:30
A Useful Decision Support Model for Road Owners to Select ETC tags Based on C4.5
Algorithm
Yu Gu
Nantong University, China
IC056
CCCXLVI. 14:30-14:45
An Improved Fusion Algorithm of Path Planning for Automated Guided Vehicle in
Storage System
Xing Tang
Nanjing University of Science and Technology, China
IC531
CCCXLVII. 14:45-15:00
Forward Vehicle Deceleration Detection System for Motorcycle at Nighttime
Jian-Kai Feng
National Taiwan Normal University, Taiwan
IC576
CCCXLVIII. 15:00-15:15
An Online Incentive Mechanism for Time-sensitive Vehicle-based Crowdsourcing
Shuying Hu
Fuzhou University, China
106
IC614
CCCXLIX. 15:15-15:30
Railway Network Modeling Using Building Block of Timed Coloured Petri Nets
Nitipat Songwiroj
Chulalongkorn University, Thailand
IC693
CCCL. 15:30-15:45
Detecting Anomalies in Distributed Control Systems by Modeling Traffic Behaviors
Wei Wang
Beijing Jiaotong University, China
Note
107
Dec. 10-Parallel Oral Session 44
S44: Information Privacy and Security
Session Chair:
Time: 13:30-15:45 [Meeting Room 9-5F]
IC485
13:30-13:45
Secure Medical Data Collection via Local Differential Privacy
Pingchuan Ma
Beijing Electronic Science and Technology Institute, China
IC357
CCCLI. 13:45-14:00
Protecing Hidden Location Visit Privacy with High Trajectory Data Utility
Zhufeng Liu
Shenyang Aerospace University, China
IC682
CCCLII. 14:00-14:15
Research on Privacy Concerns Determination of Micro-blog Users
Yabin Xu
Beijing Information Science and Technology University, China
IC683
CCCLIII. 14:15-14:30
Privacy Disclosure Detection for Location-Based Social Network
Yabin Xu
Beijing Information Science and Technology University, China
IC084
CCCLIV. 14:30-14:45
Multi-modal Adaptive Steganography Algorithm with Variable Parity Check Matrix
Haitao Song
Zhengzhou Information Science and Technology Institute, China
IC172
CCCLV. 14:45-15:00
Quantitative Evaluation in Security Assurance
Qiang Zhi
Nagoya University, China
IC212
CCCLVI. 15:00-15:15
Distance-based Outlier Mining for a Time-Series of Police Calls for Service
Peng Chen
People’s Public Security University of China, China
IC304
CCCLVII. 15:15-15:30
Functional Safety Assessment and Security Protection Framework of Cyber Physical
Machine Yool System
Ai Gu
University of Chinese Academy of Sciences, China
108
IC465
CCCLVIII. 15:30-15:45
Joint Encoding/Decoding Algorithm Design Based on Hidden Information for Short-
Length LT Codes
Zilong Zhang
The 28th Research Institute of China Electronics Technology Group Corporation,
China
Note
109
Dec. 10-Parallel Oral Session 45
S45: Clustering Algorithm
Session Chair:
Time: 13:30-15:45 [Meeting Room 10-5F]
IC194
13:30-13:45
Application of Modified K-Means Clustering Algorithm in Battery Grouping
Lianjing Wang
Harbin University of Science and Technology, China
IC439
CCCLIX. 13:45-14:00
Multi-Swarm Particle Swarm Optimization Algorithm based on Clustering Dynamic
Grouping
Yan Li
Yunnan University, China
IC282
CCCLX. 14:00-14:15
An Improved Algorithm for Multi-Swarm Particle Swarm Optimization Based on
Clustering Algorithm
Ping Hu
Yunnan University, China
IC027
CCCLXI. 14:15-14:30
Perceptual Hash Algorithm Based on Scale-Invariant Feature Transform and Cluster
Analysis
Zeyu Fan
University of Electronic Science and Technology of China, China
IC030
CCCLXII. 14:30-14:45
Research on Improved LEACH Clustering Protocol in Energy Inhomogeneity
Between Clusters in Network
Qiu JanHong
Nanjing University of Science and Technology, China
IC088
CCCLXIII. 14:45-15:00
Research and Application of Tobacco Slice Feeding based on Semi-Supervised
Learning
Wang Guangchao
China Tobacco Shandong Industrial Co., Ltd., China
IC350
CCCLXIV. 15:00-15:15
Modularity-based Clustering Approaches for Economics Networks
Yafei Xing
East China Normal University, China
110
IC363
CCCLXV. 15:15-15:30
Research on Random Source Points Aggregation Method of Urban Logistics Based
on Hierarchical Clustering
Rong Huang
Wuhan University of Technology, China
IC649
CCCLXVI. 15:30-15:45
Short-term Load Combination Forecasting based on Cluster Analysis
Yinghua Han
Northeastern University at Qinhuangdao, China
Note
111
Dec. 10-Parallel Oral Session 46
S46: Intelligent Algorithm and Performance Analysis
Session Chair:
Time: 13:30-15:45 [Room Mudan-4F]
IC438
13:30-13:45
Research on Swarm Size of Multi-Swarm Particle Swarm Optimization Algorithm
Yan Li
Yunnan University, China
IC066
CCCLXVII. 13:45-14:00
Collaborative Filtering Service Recommendation Algorithm Based on Trusted User
and Recommendation Evaluation
Wei Zhao
Dalian Maritime University, China
IC105
CCCLXVIII. 14:00-14:15
User Identification for Enhancing Recommendation by Social Media
Xuedi Li
Beijing University of Posts and Telecommunications, China
IC222
CCCLXIX. 14:15-14:30
A Recommendation Method of Educational Resources Based on Knowledge
Structure
Lei Mao
Central South University, China
IC255
CCCLXX. 14:30-14:45
Multi-criteria Collaborative Filtering Based on Matrix Filling
Li Ye
Southwest University, China
IC309
CCCLXXI. 14:45-15:00
Supporting Movie Production: A Recommender Approach
Qiong Jia
Communication University of China, China
IC560
CCCLXXII. 15:00-15:15
On Six Directions Chain Code and Its Application of Beaded Weaving
Xiangdong Zhao
Tianjin University of Technology and Education, China
112
IC610
CCCLXXIII. 15:15-15:30
Interleaver-Aided Successive Cancellation Flip Decoding Algorithm for Polar Codes
Haseong Kim
Chonnam National University, South Korea
IC150
CCCLXXIV. 15:30-15:45
Improved Dynamic Programming for the Shortest Path Problem with Resource
Constraints in DAG
Lishun Zeng
China Southern Airlines, China
Note
113
Dec. 10-Parallel Oral Session 47
S47: Information Attack and Defense
Session Chair:
Time: 13:30-15:45 [Room Furong-4F]
IC070
13:30-13:45
Research on Scrapy-based Distributed Crawler System for Crawling Semi-Structure
Information at High Speed
Xiating He
Communication University of China, China
IC076
CCCLXXV. 13:45-14:00
A Click Fraud Detection Scheme based on Cost sensitive BPNN and ABC in Mobile
Advertising
Xin Zhang
Nanjing Tech University, China
IC455
CCCLXXVI. 14:00-14:15
Hardware-based Adversary-controlled States Tracking
Weiwei Li
University of Chinese Academy of Sciences, China
IC559
CCCLXXVII. 14:15-14:30
DPDA: A Moving Target Defense System based on Detection and Prediction
Mechanism
Tan Jinglei
Henan Provincial Key Laboratory of Information Security, China
IC670
CCCLXXVIII. 14:30-14:45
The Attack Surface Shifting in the Mimic Defense System
Liqun Wang
State key Laboratory of Mathematical Engineering and Advanced Computing, China
IC119
CCCLXXIX. 14:45-15:00
Design of Bluetooth DOS Attacks Detection and Defense Mechanism
Hong Pengcheng
Institute of Electronic Technology Information Engineering University, China
IC262
CCCLXXX. 15:00-15:15
A Slow Rate Denial-Of-Service Attack Against HTTP/2
Yihang Zhang
Beijing University of Posts and Telecommunications, China
114
IC355
CCCLXXXI. 15:15-15:30
Analyzing Core Structure and Role Transition Features of Terrorist Organizations
based on Meta-Network Take Al Qaida as an Example
Meng Luan
National University of Defence Technology, China
IC2001
CCCLXXXII. 15:30-15:45
Human Perception of Weight in Networked Virtual Environment with Haptic Sense:
Influence of Network Delay
Pingguo Huang
Seijoh University, Japan
Note
115
Dec. 10-Parallel Oral Session 48
S48: Communication Principle and Technology
Session Chair:
Time: 16:00-18:15 [Meeting Room 3A-7F]
IC026
16:00-16:15
Multiple Parallel Frequency-Hopping Communication System Applying to Anti-
Follower Jamming
Chao Zhi-chao
Army Engineering University of PLA, China
IC045
CCCLXXXIII. 16:15-16:30
Adaptive Composite Phases Modulation/Demodulation Based on Transform
Domain Communication System
Cheng Chang
China Academy of Launch Vehicle Technology, China
IC156
CCCLXXXIV. 16:30-16:45
An Experimental Analysis of SNR Performance for LoRa Communication
Rong Tan
Hebei University, China
IC436
CCCLXXXV. 16:45-17:00
μcos-II Porting and Low Power Mode Design based on STM32Ls
Weibin Wang
University of Chinese Academy of Sciences, China
IC469
CCCLXXXVI. 17:00-17:15
Research on Nonreconstruction Spectrum Sensing Algorithm based on Reputation
Hierarchy
Jingjing Chen
Nanjing University of Posts and Telecommunications, China
IC038
CCCLXXXVII. 17:15-17:30
Gateway Nodes Selection Strategy for Hierarchical Edge-Cloud
Guangyi Cao
Wuhan University of Technology, China
IC556
CCCLXXXVIII. 17:30-17:45
A Distributed Broadcasting Protocol Based on Local Information Sensing in IoV
Wenjie Wang
China Transport Telecommunications and Information Center, China
116
IC607
CCCLXXXIX. 17:45-18:00
Improved Calibration Procedure of Block Error Rate Estimation for Fast Link
Adaptation
Hyunjee Lee
Chonnam National University, South Korea
IC297
CCCXC. 18:00-18:15
Fault Diagnosis Application of Short Wave Transmitter Based on Stacked Auto-
Encoder
Cheng Liu
Naval University of Engineering, China
Note
117
Dec. 10-Parallel Oral Session 49
S49: Network Architecture Design and Function Optimization
Session Chair:
Time: 16:00-18:15 [Meeting Room 3B-7F]
IC659
16:00-16:15
The Reliability Mapping Monitoring Method of Network Function Virtualization
Ziwei Zhang
Beijing University of Posts and Telecommunications, China
IC662
CCCXCI. 16:15-16:30
A TCP Decoupling based SDN Architecture for Asymmetric Networks
Hailun Liu
University of Science and Technology of China, China
IC665
CCCXCII. 16:30-16:45
An NFV Framework for Supporting Elastic Scaling of Service Function Chain
Zhen Shen
Shanghai Jiao Tong University, China
IC361
CCCXCIII. 16:45-17:00
Optimized Deployment of Network Function for Resource Pooling Switch
Fei Hu
University of Electronic Science and Technology of China, China
IC189
CCCXCIV. 17:00-17:15
A Network Slicing Deployment Method for Guaranteeing Service Performance
Qirun Pan
National Digital Switching System Engineering & Technological Research Center,
China
IC306
CCCXCV. 17:15-17:30
The Application of Reliability in the Information Hypernetworks Optimization
Ke Zhang
Qinghai Normal University, China
IC385
CCCXCVI. 17:30-17:45
Research on the Architecture of Cyber-Physical Machine Tool System
Chuting Wang
University of Chinese Academy of Sciences, China
118
IC431
CCCXCVII. 17:45-18:00
A New Particle Swarm Optimization Algorithm based on Local-World Evolving
Network Model
Yibing Li
Yunnan University, China
IC310
CCCXCVIII. 18:00-18:15
An Opportunistic Routing Protocol based on Link Quality and Local Topology in
Mobile Ad hoc Networks
Long Yan
University of Science and Technology of China, China
Note
119
Dec. 10-Parallel Oral Session 50
S50: Signal Processing
Session Chair:
Time: 16:00-18:15 [Meeting Room 6-7F]
IC694
16:00-16:15
A Mixed Signal Separation Algorithm Based on Wavelet Transform
Xintao Jiao
South China Normal University, China
IC164
CCCXCIX. 16:15-16:30
Research on Co-frequency Interference of CBTC Signal Based on IEEE 802.11
Xin He
Beijing University of Posts and Telecommunications, China
IC426
CD. 16:30-16:45
Method of Time Sampling Error of Time-Interleaved ADC Based on Statistical Rule
RiGa Qi
Beijing Institute of Technology, China
IC352
CDI. 16:45-17:00
Research on Multipath Mitigation Method for BOC Signal Based on CCRW
Technology
Peiyue AI
Central South of University, China
IC360
CDII. 17:00-17:15
Array Configuration for Distributed Spaceborne Coherent Aperture Radar
Yanan Yu
Beihang University, China
IC448
CDIII. 17:15-17:30
Joint Data/Pilot Tracking Techniques for the Modern Beidou B1C Signal
Yuguo Zhang
Qingdao Jari Automation Limited Company, China
IC613
CDIV. 17:30-17:45
Simulation and Implementation of Spectrum Synthesis Method for Linear
Modulated Stepped Frequency Signal Based on Spectral Extraction
Tenglong Li
Beijing Institute of Technology, China
120
IC713
CDV. 17:45-18:00
The Impact of Bathtub Water Temperature on Personal Identification with ECG
Signal based on Convolutional Neural Network
Jianbo Xu
The University of Aizu, Japan
IC549
CDVI. 18:00-18:15
Secure Transmission Based on Differential Spatial Modulation with Artificial Noise
Tao Zhang
National University of Defense Technology, China
Note
121
Dec. 10-Parallel Oral Session 51
S51: Data Encryption and Application
Session Chair:
Time: 16:00-18:15 [Meeting Room 9-5F]
IC611
16:00-16:15
An Improvement of the Remote Authentication Scheme for Anonymous Users Using
an Elliptic Curve Cryptosystem
Cheng-Ying Yang
University of Taipei, Taiwan
IC018
CDVII. 16:15-16:30
A Novel Image Encryption Algorithm Based on Cellular Neural Networks Hyper
Chaotic System
Weili Kou
Southwest Forestry University, China
IC187
CDVIII. 16:30-16:45
A Color Image Encryption Scheme Using Inverse Fractal Interpolation Function
Ruisong Ye
Shantou University, China
IC086
CDIX. 16:45-17:00
The Attribute-weight Cache Replacement Algorithm for Encrypted Files
Yafei Xing
East China Normal University, China
IC401
CDX. 17:00-17:15
A Physical-Layer Message Encryption and Authentication Scheme
Xingzhi Li
Information Engineering University, China
IC619
CDXI. 17:15-17:30
Research on Key Management Server Key Re-Encryption Technology
Hao Huang
HuaZhong University of Science & Technology, China
IC495
CDXII. 17:30-17:45
Research on Key Management Scheme for Dynamic Revocable Key-Aggregate
Cryptosystem
Xirui Zhang
Zhengzhou Information Science and Technology Institute, China
122
IC059
CDXIII. 17:45-18:00
Improved Randomness of Visual Cryptography Scheme Based on Basis Matrix
Sijia Liu
Zhengzhou Information Science and Technology Institute, China
IC542
CDXIV. 18:00-18:15
Joint Channel-Encryption Coding Based on Interleaver and Multiplexer in Turbo
Codes
Chen Deyuan
University of Chinese Academy of Sciences, China
Note
123
Dec. 10-Parallel Oral Session 52
S52: Computer Network and Communication Engineering
Session Chair:
Time: 16:00-18:15 [Meeting Room 10-5F]
IC622
16:00-16:15
Minimum Redundancy Broadcast in Multi-Channel Multi-Radio Wireless Networks
Tao Peng
Beijing University of Posts and Telecommunications, China
IC652
CDXV. 16:15-16:30
Secrecy Polar Coding Scheme for Relay-Wiretap Channel
Nana Kobina Gerrar
Nanjing University of Posts and Telecommunications, China
IC521
CDXVI. 16:30-16:45
Statistical Max-SINR Beamforming for Wireless Powered Communications in
Airborne Massive MIMO System
Yurong Wang
Army Engineering University of PLA, China
IC378
CDXVII. 16:45-17:00
Design of an 3-Element Arc Array of Microstrip Antenna for Widen Bandwidth and
Adjusting Beam Direction
Ying Kang
Naval University of Engineering, China
IC447
CDXVIII. 17:00-17:15
Extended Generalised Spatial Modulation with Variable Number of Activated
Transmit Antennas
Junjie Wang
Northwest Institute of Nuclear Technology, China
IC514
CDXIX. 17:15-17:30
A Dual-Band and Dual-Circularly-Polarized Array Antenna with a Single Element
Qi Yao
Nanjing University of Science and Technology, China
IC308
CDXX. 17:30-17:45
A Frame Prioritization Based on Classified Contentions in Multi-hop Wireless Ad hoc
Networks
Lei Tao
University of Science and Technology of China, China
124
IC645
CDXXI. 17:45-18:00
Research on Smart Household Appliance System Based on NB-IoT and Cloud
Platform
Zhen Jiang
Southeast University, China
IC143
CDXXII. 18:00-18:15
Design and Implementation of the NB-IoT Downlink System on Open Air Interface
Platform
Xinyu Wang
Beijing University of Posts and Telecommunications, China
Note
125
Dec. 10-Parallel Oral Session 53
S53: Computer Theory and Engineering Practice
Session Chair:
Time: 16:00-18:15 [Room Mudan-4F]
IC343
16:00-16:15
Neural Machine Translation with Dynamic Selection Network
Fei Han
Sichuan Agricultural University, China
IC109
CDXXIII. 16:15-16:30
An Efficient Method to Transform a SAT problem to a Mixed Integer Linear
Programming Problem
Wenxia Guo
University of Electronic Science and Technology of China, China
IC358
CDXXIV. 16:30-16:45
A Non-Parametric Method for Curve Smoothing
Shuangfeng Lan
Lanzhou University, China
IC332
CDXXV. 16:45-17:00
Small Object Detection Using Context Information Fusion in Faster R-CNN
Fang Pengcheng
Beijing University of Posts and Telecommunications, China
IC579
CDXXVI. 17:00-17:15
RPN with the Attention-Based Multi-Scale Method and the Adaptive Non-Maximum
Suppression for Billboard Detection
Chuyi Wang
Hubei University of Technology, China
IC714
CDXXVII. 17:15-17:30
Automatic Reverse Engineering of Unknown Security Protocols from Network
Traces
Yudan Fan
Zhengzhou Information Science and Technology Institute, China
IC620
CDXXVIII. 17:30-17:45
An Optimized Receiving Method Based on Noise Estimation in Spreading Spectrum
Audio Watermarking System
Tao Peng
Beijing University of Posts and Telecommunications, China
126
IC538
CDXXIX. 17:45-18:00
The Research on M2M Load Prediction Algorithm
Chaofeng Fu
Beijing University of Posts and Telecommunications, China
IC298
CDXXX. 18:00-18:15
Hybrid Beamforming Based on Minimum Mean Square Error for Multi-user Multi-
data Stream System
Gaozheng Liu
University of Science and Technology of China, China
Note
127
Dec. 10-Parallel Oral Session 54
S54: Electronic Information Engineering and Application
Session Chair:
Time: 16:00-18:15 [Room Furong-4F]
IC545
16:00-16:15
Distributed LSA controller for Public Safety Communications
NGÔ TRUNG KIÊN
VTT Technical Research Centre of Finland Ltd., Finland
IC628
CDXXXI. 16:15-16:30
An Adaptive Predistortion Algorithm Based on Parallel Two-box Model
Xingji Miao
Navy Aviation University, China
IC634
CDXXXII. 16:30-16:45
Optimization Strategy of SDN Control Deployment Based on Simulated Annealing-
Genetic Hybrid Algorithm
Bai Yong
Beijing University of Posts and Telecommunications, China
IC170
CDXXXIII. 16:45-17:00
A Checkerboard Corner Detection Method Using Circular Samplers
Linchao Huang
South China University of Technology, China
IC373
CDXXXIV. 17:00-17:15
Analysis on Control Performance Assessment Based on Minimum Entropy
Jiang Huixia
The Army Engineering University, China
IC598
CDXXXV. 17:15-17:30
An Improved On-line Strategy for Exploring a Simple Grid Polygon
Qi Wei
Liaoning Normal University, China
IC395
CDXXXVI. 17:30-17:45
Structural Design of Operational Analysis and State Modeling for Power Secondary
System
Yuan Zhou
NARI Group Corporation/State Grid Electric Power Research Institute, China
128
IC104
CDXXXVII. 17:45-18:00
Thermal Load Forecasting Based on PSO-SVR
Zhang Jie
Dalian Maritime University, China
IC321
CDXXXVIII. 18:00-18:15
Design of the Stand-Alone Photovoltaic System Based on the MPPT
Tao Wang
Taizhou University, China
Note
129
Dec. 10-Poster Presentation Session 55
S55: Electronics and Communication Engineering
Session Chair:
Time: 13:30-15:10 [Meeting Room 8-5F]
IC253
13:30-13:40
Processing of Multireceiver Sonar Data with Failed Receivers
Cheng Tan
China Aerodynamics Research and Development Center, China
IC272
CDXXXIX. 13:40-13:50
Soft Demapping Based Receiver for Asymmetrically Clipped Optical OFDM
Jian Dang
Southeast University, China
IC453
CDXL. 13:50-14:00
A New Tracking Technique with the Memory Discriminator for High Sensitivity GNSS
Receivers
Ji Li
Beihang University, China
IC535
CDXLI. 14:00-14:10
Development of Ultra-Fast Laser Controller based on Network Integration
Hu Lin
University of Chinese Academy of Sciences, China
IC419
CDXLII. 14:10-14:20
Throughput Analysis in Collaborative Communication Based on Relay Energy
Harvesting
Fengchuang Xing
Guangdong University of Education, China
IC456
CDXLIII. 14:20-14:30
Securing UAV-Enabled Millimeter Wave Communication Via Trajectory and Power
Optimization
Yang Wu
The Army Engineering University of PLA, China
IC487
CDXLIV. 14:30-14:40
Social-Aware and Payment Incentivized Caching for D2D Communications
Qinxue Fu
The Army Engineering University of PLA, China
130
IC674
CDXLV. 14:40-14:50
Research on Simulation Modeling of Tactical Communication Subnet Availability
Qi Guo
Xi‘an Technological University, China
IC276
CDXLVI. 14:50-15:00
Internet of Building Equipment System Based on Thread Network and Methods for
Managing End Devices
Shen Bin
Shandong Jianzhu University, China
IC171
CDXLVII. 15:00-15:10
CDXLVIII. The Design of Soft Base Station Based on Docker
Kunheng Wu
Tongji University, China
Note
131
Dec. 10-Poster Presentation Session 56
S56: Signal Acquisition and Detection
Session Chair:
Time: 15:30-17:10 [Meeting Room 8-5F]
IC505
15:30-15:40
ISAR False Target Array Generated by Sub-Nyquist Sampling Jamming in Fast and
Slow Time
Jiyuan Chen
National University of Defense Technology, China
IC593
CDXLIX. 15:40-15:50
Epilepsy EEG Classification and Visualization using Linear Discriminate Analysis
Jeng-Wei Lin
Tunghai University, Taiwan
IC091
CDL. 15:50-16:00
A Fast TDOA Estimation Algorithm for UAV Signals
Ying HUANG
Central South of University, China
IC319
CDLI. 16:00-16:10
Seismic Signal Detection Algorithm Based on GS Transform Filtering and EMD
Denoising
Ruonan Han
Beijing University of Post and Telecommunications, China
IC389
CDLII. 16:10-16:20
Blind Extraction for PCMA Downlink Mixed Signals Using Guided Signature
Zhongqiang Luo
Sichuan University of Science and Engineering, China
IC517
CDLIII. 16:20-16:30
A Low-complexity Method of NB-IoT Identification
Huijie Zhu
No. 36 Research Institute of China Electronics Technology Group Corporation, China
IC312
CDLIV. 16:30-16:40
Performance Analysis of Active Cancellation System based on DRFM
Huimin Zhong
Nanjing University of Aeronautics and Astronautics, China
132
IC689
CDLV. 16:40-16:50
Integrating GAN with CNN for Face Sketch Synthesis
ADEEL AKRAM
Xidian University, China
IC198
CDLVI. 16:50-17:00
Spoofing Attack of Drone
Seow Chee Kiat
Nanyang Technological University, Singapore
IC259
CDLVII. 17:00-17:10
CDLVIII. A TE Process Fault Diagnosis Method based on Improved Wavelet Threshold
Denoising and Principal Component Analysis
Zhuang Chengwen
Qilu University of Technology, China
Note
133
Academic Visiting
Time/时间 Agenda/日程
Dec. 10
8:20
Gather at Lobby, Dorsett Grand Chengdu
帝盛君豪酒店大厅集合
9:30-11:00 General View of Southwest Jiaotong University
西南交大介绍
Visit Key Lab of Cloud Computing & Intelligent Technology
参观四川省云计算与智能技术高校重点实验室
Interactive Academic Session
自由学术讨论交流
134
One Day Tour
Time/时间 Agenda/日程
Dec. 10
08:50
Gather at Lobby, Dorsett Grand Chengdu
帝盛君豪酒店大厅集合
9:00-16:00 Giant Panda Research Base, Wenshu Monastery,
Kuanzhai Xiangzi Alleys and Tea-tasting in People’s Park
(Lunch and Tickets of Scenic Spots are already included in the fee)
(Onsite registration cannot be accepted)
135
Note
136
Note
137
Note