CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates...

34
CONFERENCE ABSTRACTS 2017 VI International Conference on Network, Communication and Computing (ICNCC 2017) Workshop 2017 II International Conference on Network Security (ICNS 2017) Dec. 8-10, 2017 Kunming, China Grand Park Hotel Kunming | 昆明君樂酒店 Add: 20 Hong Hua Qiao, 650031, Kunming, China | 中国云南省昆明市洪化桥 20 号,昆明, 中国 Sponsored by Published by Co-sponsored by

Transcript of CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates...

Page 1: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

CONFERENCE ABSTRACTS

2017 VI International Conference on Network, Communication and Computing

(ICNCC 2017)

Workshop

2017 II International Conference on Network Security

(ICNS 2017)

Dec. 8-10, 2017

Kunming, China

Grand Park Hotel Kunming | 昆明君樂酒店

Add: 20 Hong Hua Qiao, 650031, Kunming, China | 中国云南省昆明市洪化桥 20 号,昆明, 中国

Sponsored by

Published by Co-sponsored by

Page 2: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 1 -

Table of Contents

Welcome Address…………………………………………………………………………… 2

Organizing Committee………………………………………………………………….. 3

Local Information…………………………………………………………………………. 4

Instructions for Oral& Poster Presentations…………….………………………… 6

Introduction of Keynote Speakers……………………………………………………… 7

Daily Schedule of Events………………………………………………………….……… 10

Content of Presentations………………………………..………………….…………… 11

Session 1……………………………………………………………………………………… 13

Session 2……………………………………………………………………………………… 19

Poster Session………………………………………………………………………………… 24

Listeners………………………………………………………………………….…………… 27

Author Index………………………………………………………………………………… 28

One-day Visit in Kunming…………………………..………………..………………… 29

Page 3: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 2 -

Welcome Address

We are pleased to welcome you to join the 2017 VI International Conference on Network, Communication

and Computing (ICNCC 2017) and the workshop 2017 II International Conference on Network Security

(ICNS 2017), which take place at Kunming, China during December 8-10, 2017.

After several rounds of review procedure, the program committee accepted those papers to be published into

Conference Proceedings. We wish to express our sincere appreciation to all of the individulas who have

contributed to ICNCC 2017 and ICNS 2017. Special thanks are extended to our colleagues in program

committee for their thorough review of all the submissions, which is vital to the success of the conferences,

and also to the members in the organizing committee and the volunteers who had delicated their time and

efforts in planning, promoting, organizing and helping the conference. Last but not least, our speacial thanks

go to invited keynote speakers as well as all the authors for contributing their latest researches to the

conference.

This conference program is highlighted by Three keynote speakers: Prof. Yanzhen Qu, from Colorado

Technical University (CTU), USA, Prof. Chin-Chen Chang, from Feng-Chia University, Taiwan and Prof.

Shien-Kuei Liaw, from National Taiwan University of Science and Technology, Taiwan

One best presentation will be selected from each session, evaluated from: Originality; Applicability;

Technical Merit; PPT and English. The best one will be announced at the end of each session, and be

awarded the certificate at the end of the session.

As one of China‟s most diversified provinces, Yunnan is certainly one of China‟s most alluring destinations.

Yunnan is home to more than one third of China‟s ethnic minorities and over half of the country‟s plant and

animal species. The province is blessed by its mixture of traditional folk cultures as well as breath-taking

scenery. Kunming, Yunnan‟s capital, resides at an elevation of 1890m and boasts a milder climate than most

other Chinese cities. Celebrated as the "Spring City," We hope your stay in Osaka will been riching and

memorable!

We wish you a successful conference and enjoyable visit in Kunming, China.

Conference Organizing Committee

Kunming, China

Page 4: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 3 -

Organizing Committee

Advisory Committee

Prof. Chin-Chen Chang, Feng Chia University, Taiwan

Conference Chairs

Prof. Yanzhen Qu, Colorado Technical University, USA

Prof. Andras Farago, The University of Texas at Dallas, USA

Program Chairs

Prof. Shien-Kuei Liaw, National Taiwan University of Science and Technology, Taiwan

Assoc. Prof. Sayaka Kamei, Hiroshima University, Japan

Technical Committee

Prof. Xin Chen, China University of Geosciences, China

Prof. Mashashi Sugano, Osaka Prefecture University, Japan

Prof. Wu Qing, Xi'an University of Posts and Telecommunications, China

Dr. Yen-Jen Chen, Ming Chi University of Technology, Taiwan

Prof. Yang Shulin, Beijing Institute of Graphic Communication, China

Assoc. Prof. Jian Wang, Shenyang Institute of Automation, Chinese Academy of Sciences, China

Assoc. Prof. Chu-Ti Lin, National Chiayi University, Taiwan

Dr. Eyüp Burak Ceyhan,Bartın University, Turkey

Assoc. Prof. Cheng-Chi Lee, Fu Jen Catholic University, Taiwan

Prof. Sang Guun Yoo, Universidad de las Fuerzas Armadas ESPE, Ecuador

Dr. E. Prince Edward, Department of Electronics, Sri Krishna Polytechnic College, India

Assoc. Prof. Suphamit Chittayasothorn, King Mongkut's institute of Technology Labkrabang, Thailand

Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates

Assoc. Prof. Garimella Rama Murthy, Intl. Inst. of Information Technology Hyderabad, India

Prof. Maushumi Barooah, Assam Engineering College, India

Prof. Kai-Wei Ke, National Taipei University of Technology, Taiwan

Prof. Wen-lin Yang, National University of Tainan, Taiwan

Prof. Yo-Ping Huang, National Taipei University of Technology, Taiwan

Prof. Yung-Chung Wang, National Taipei University of Technology, Taiwan

Dr. Hui Guo, School of Computer Science and Engineering, Australia

Dr. Chiam Yin Kia, University of Malaya, Malaysia

Dr. Yu-Ju Cheng, Chunghua Telecom Ltd., Taiwan

Dr. Xuewu Dai, Northumbria University, UK

Prof. A. Sivasubramanian, VIT University, India

Dr. Au Thien Wan, Universiti Teknologi Brunei, Brunei

Page 5: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 4 -

Local Information

Weather in December

Average daily minimum temperature

3℃

Average daily highest temperature

15℃

Banks and Foreign Exchange

The Currency is Chinese RMB here, you can exchange foreign currency 24 hours at the airport, or exchange

at the bank, Money exchanger

Emergency

Police emergency:110

Hospital Emergency phone: 112

Conference Venue

Grand Park Hotel Kunming |昆明君樂酒店

20 Hong Hua Qiao, 650031, Kunming, China

中国云南省昆明市洪化桥 20 号

Tel: (86 871) 6538 6688

E-mail: [email protected]

Page 6: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 5 -

Getting to the Hotel

1.Changshui Intl.Airport——→2.Airport bus stop———→4.Xiaoximeng Nanjiang Bus stop———→3.Grand Park Hotel Kunming

(Walk 2 min) (Take Airport Line 1) (Walk 8 min)

1.昆明长水国际机场————→2.机场公交站———→3.小西门南疆宾馆公交站———→4.昆明君乐酒店

(步行 2 分钟) (搭乘空港 1 号线) (步行 8 分钟)

Getting Here from the Hotel

2 minutes' walk to Green Lake Park

步行 2 分钟即可到达翠湖公园

10 minutes' walk to Yunnan University

步行 10 分钟即可到达云南大学

15 minutes' walk to the neartest Metro station

步行 15 分钟可到达城市地铁站

50 minutes' drive to Kunming Changshui International Airport

开车大约 50 分钟即可到达昆明长水国际机场

Page 7: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 6 -

Instructions for Oral&Poster Presentations

Oral Presentations

Timing: a maximum of 15 minutes total, including speaking time and discussion. Please make sure your

presentation is well timed. Please keep in mind that the program is full and that the speaker after you

would like their allocated time available to them.

You can use CD or USB flash drive (memory stick) and make sure you scanned viruses in your own

computer. Each speaker is required to meet her / his session chair in the corresponding session rooms 10

minutes before the session starts and copy the slide file (PPT or PDF) to the computer.

It is suggested that you email a copy of your presentation to your personal inbox as a backup in case for

some reason the files can‟t be accessed from your flash drive.

Please note that each session room will be equipped with a LCD projector, screen, point device,

microphone, and a laptop with general presentation software such as Microsoft Power Point and Adobe

Reader. Please make sure that your files are compatible and readable with our operation system by using

commonly used fronts and symbols. If you plan to use your own computer, please try the connection and

make sure it works before your presentation.

Videos: If your Power Point files contain videos please make sure that they are well formatted and

connected to the main files.

Poster Presentations

Poster size is 60cm x 80cm.

Posters are required to be condensed and attractive. The characters should be large enough so that they

are visible from 1 meter apart.

Dress Code

Please wear formal clothes or national characteristics of clothing

Page 8: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 7 -

Keynote Speeches

Prof. Yanzhen Qu

Colorado Technical University (CTU), USA

Yanzhen Qu is currently a Professor of Computer Science and the Dean of the College of Computer Science

and Technology at Colorado Technical University (CTU), USA. Over the course of his 20+ years in industry,

he has served as a senior or executive manager of product R&D and IT in several multinational

corporations. He was also the chief system architect and director of development for several of the world’s

first very large real-time commercial software systems. At Colorado Technical University, Dr. Qu has led his

faculty to create several new degree programs, including cybersecurity and data science at both

undergraduate and graduate levels, and has also supervised many doctoral students to conduct their

research work effectively and to complete their dissertations on time. Just in recent five years he and his

students have published several dozen scholarly papers, several of which have won top awards at various

international conferences. He has also coached CTU’s student teams to win two finalist and one 1st place

awards at The USA’s Annual National Security Innovation Competition from 2012 to 2014. As a senior

member of IEEE, Dr. Qu has served as general, program, and session chair at various meetings, and has

been invited as a keynote speaker at many IEEE, ACM, ASIS, and IFIP international conferences,

symposiums, and workshops. He is also an editorial board member of several professional peer-reviewed

CS and IT journals, and has been a visiting professor at over 30 international universities. Dr. Qu’s broad

research interests include internet of things, cyber security, affective computing, e-learning technologies,

software engineering, cloud computing, mobile computing, artificial intelligence, data mining, machine

learning, and big data analytics. He received his B.Eng. in Electronic Engineering from Anhui University,

China, M. Eng. in Electrical Engineering from Chinese Academy of Sciences, China, and Ph.D. in

Computer Science from Concordia University, Canada.

Title:Challenges and Research Opportunities in IoT Security and Privacy

The Internet of Things (IoT) has recently become a hot topic in both the commercial and academic world.

The innovative new products, services, and opportunities created by the extensive network of daily-use

devices have attracted widespread attention and huge investment from all aspects of society. However,

IoT also presents new and unprecedented security and privacy challenges. The addition of a huge number

"things" to the internet, most of which have no physical foundation to support even minimal security and

privacy measures, simply exceeds the limits of our collective knowledge and experience in internet

security and privacy. This talk will through some nontrivial IoT examples present insights into the key root

causes of the security and privacy challenges related to the implementation of IoT, and will also discuss

research opportunities which will facilitate the invention of appropriate technical solutions and regulatory

frameworks to address those causes.

Page 9: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 8 -

Prof. Chin-Chen Chang

Feng-Chia University, Taiwan

Professor Chang has worked on many different topics in information security, cryptography, multimedia

image processing and published several hundreds of papers in international conferences and journals and

over 30 books. He was cited over 22800 times and has an h-factor of 71 according to Google Scholar. Several

well-known concepts and algorithms were adopted in textbooks. He also worked with the National Science

Council, Ministry of Technology, Ministry of Education, Ministry of Transportation, Ministry of Economic

Affairs and other Government agencies on more than 100 projects and holds 17 patents, including one in

US and two in China.He served as Honorary Professor, Consulting Professor, Distinguished Professor,

Guest Professor at over 50 academic institutions and received Distinguished Alumni Award's from his Alma

Master's. He also served as Editor or Chair of several internal journals and conferences and had given

almost a thousand invited talks at institutions including Chinese Academy of Sciences, Academia Sinica,

Tokyo University, Kyoto University, National University of Singapore, Nanyang Technological University,

The University of Hong Kong, National Taiwan University and Peking University. Professor Chang has

mentored 56 PhD students and 177 master students, most of whom hold academic positions at major

national or international universities. He has been the Editor-in-Chief of Information Education, a

magazine that aims at providing educational materials for middle-school teachers in computer science. He

is a leader in the field of information security of Taiwan. He founded the Chinese Cryptography and

Information Security Association, accelerating information security the application and development and

consulting on the government policy.He is also the recipient of several awards, including the Top Citation

Award from Pattern Recognition Letters, Outstanding Scholar Award from Journal of Systems and

Software, and Ten Outstanding Young Men Award of Taiwan. He was elected as a Fellow of IEEE and IET

in 1998 for his contribution in the area of information security.

Title:Sharing Secret Message Using Meaningful Digital Images with Cheating Detection

Secret sharing is an important technique to ensure well protection of transmitted information by dividing

a secret message into several shadows that are held among a set of participants. In this talk, I will

introduce a novel secret sharing method using two meaningful digital images with cheating detection. It

allows a dealer to share a secret message into two different meaningful images through the guidance of

the turtle shell magic matrix. Then, after performing a permutation operation, two meaningful shadow

images are generated and distributed to two participants. The secret message can be reconstructed only

when both participants cooperate by releasing real shadow images. Honest participant in this method can

easily detect whether the other participant is cheating via presenting a faked shadow. Experimental

results show that this method ensures high quality of shadow images and good embedding capacity. The

cheating detection process is also effective and very easy to implement.

Page 10: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 9 -

Prof. Shien-Kuei Liaw

National Taiwan University of Science and Technology, Taiwan

Shien-Kuei (Peter) Liaw received double PhD degrees from National Chiao-Tung University in photonics

engineering and from National Taiwan University in mechanical engineering, respectively. He joined the

Chunghua Telecommunication, Taiwan, in 1993. Since then, he has been working on optical communication

and fiber based technologies. Prof. Liaw joined the department of Electronic Engineering, National Taiwan

University of Science and Technology (NTUST) in 2000. He has ever been director of the Optoelectronics

Research Center and the Technology Transfer Center, NTUST. He was a visiting researcher at Bellcore

(now Telcordia), USA for six months in 1996 and a visiting Professor at University of Oxford, UK for three

months in 2011. He owned six U.S. patents, and authored or coauthored for 250 journal articles and

international conference presentations. He earned many domestic honors and international honors. He has

been actively contributing for numerous conferences as conference chair, technical program chair,

organizing committee chair, steering committee andkeynote speaker. He serves as an Associate Editor for

Fiber and Integrated Optics. Currently, Prof. Liaw is a senior member of IEEE, OSA and SPIE. He is a

distinguished Professor of National Taiwan University of Science and Technology (NTUST), Vice President

of the Optical Society (OSA) Taiwan Chapter and Secretary-General of Taiwan Photonic Society. His

research interests are in optical sensing, optical communication and reliability testing.

Title:Investigation of Er/Yb Co-doped Fiber Lasers for Optical Communications

In this talk, I will review several types of single-longitudinal mode linear cavity, tunable fiber lasers. They

operate either in C+L band or 1064 nm band. The linear-cavity fiber laser schemes and characteristics will

be addressed and discussed. I will also introduce the wavelength tunable fiber laser design. The laser

characteristics such as output, signal-to-noise ratio, linewidth, threshold pump power, pumping slope

efficiency and side mode suppress ratio will be measured and be discussed. A methodology to increase

the pumping slope efficiency will also be proposed. These fiber lasers may find potential applications in

lightwave communication.

Page 11: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 10 -

Daily Schedule of Events

Dec. 8th/ Friday Hotel Lobby

10:00am-17:00pm Registration Staff: Frannie Lee &Tina Wang

Dec.9th/ Saturday Morning 5F/ Conference Room 3

9:05am-9:10am

Opening Remarks

Prof. Chin-Chen Chang

Feng Chia University, Taiwan

9:10am-9:50am

Keynote Speech I

Prof. Shien-Kuei Liaw

National Taiwan University of Science and Technology, Taiwan

9:50am-10:30am

Keynote Speech II

Prof. Chin-Chen Chang

Feng Chia University, Taiwan

10:30am-11:00am

11:00am-11:40am

Keynote speech III

Prof. Yanzhen Qu

Colorado Technical University (CTU), USA

2F/Emerald

Dec. 9th/ Saturday Afternoon 5F/ Conference Room 3

13:00pm -15:45pm

Session 1

[TOPIC] Computer Network and Communication Technology

15:45pm -16:05pm

1

16:05pm -19:05pm

Session 2

[TOPIC] Information System Security and Management

1F/ Western Restaurant

Dec. 10th/ Sunday One-day Visit

Page 12: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 11 -

Content of Presentations

Session 1: Computer Network and Communication Technology

Time: 13:00pm-15:45pm

Room: 5F/ Conference Room 3

Paper ID Title

K007 Weighted Hash Method based on Improved ABQ Algorithm

K014 In-network Cache Size Allocation for Video Streaming on Named Data Networking

K049 Cloud Tectonics : The Economics behind the Decline of Language Diversity in China

K026

Combined Heat and Power Economic Dispatch Using Differential Evolution

Algorithm

K039

Modeling and Simulation of Time-Division Multiplexing Navigation Satellite

Network based on OPNET

K062 Beamforming with Enhanced CNN Network

K067 Interference alignment with Jacobian Eigenvalue_

K2002

Smartphone Sensor-Based Activity Recognition by Using Machine learning and Deep

Learning Algorithms

S3006 Community detection in complex networks using flow simulation

K3009 Energy-efficient Fault-Localization Protocol for Wireless Sensor Networks

K3010 Fault-tolerant Self-stabilizing Protocol for Wireless Sensor Networks

NOTE:

*One best presentation will be selected from each session. (Evaluation is based on Originality, Applicability,

Technical Merit, PPT and English), and will be awarded at the end of the session.

**Please arrive at the conference room 10 minutes earlier before the session starts to copy your PPT to the

laptop.

Page 13: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 12 -

Session 2: Information System Security and Management

Time: 16:05pm-19:05pm

Room: 5F/ Conference Room 3

Paper ID Title

K021 Trustworthiness in Fog: A Fuzzy Approach

K027 A Comparative Study of Data Skew in Hadoop

K034 Self-Adaptive Consolidation of Virtual Machines For Energy-Efficiency in the Cloud

K037 Hybrid RRT/DE algorithm for High performance UCAV path planning

K038 CNN-based Commercial Detection in TV Broadcasting

K051

Performance Study of Neural Network and ANFIS Based MPPT Methods For Grid

Connected PV System

K059

Grouper: A Framework for Developing Mobile Applications using a Secret Sharing

Scheme and Untrusted Servers

K066 Forecast Method of Short - term Passenger Flow on Urban Rail Transit

K070

A Case Study of Detecting and Characterizing Large-Scale Prefix Hijackings in the

Internet

K1002 PFESG: Permission-based Android Malware Feature Extraction Algorithm

K3005 Weighted Least Squares Twin Large Margin Distribution machine

K3011 A New Method for Evaluating Air Traffic Control Safety

NOTE:

*One best presentation will be selected from each session. (Evaluation is based on Originality, Applicability,

Technical Merit, quality of PPT and English), and will be awarded the certificate at the end of the session.

**Please arrive at the conference room 10 minutes earlier before the session starts to copy your PPT to the

laptop.

Page 14: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 13 -

Afternoon, Dec. 9th,2017

Session 1 < Computer Network and Communication Tchnology >

Venue: 5F/ Conference Room 3

Chair: Prof. Shien-Kuei Liaw

Time: 13:00pm-13:45pm

Note:

* The certification of Oral/Poster presentations, listeners, will be awarded at the end of each session.

* For the Best Presentation of each session, it is encouraged to award to student author preferentially..

*To show the respect to other authors, especially to encourage the student authors, we strongly suggest you

attend the whole session, the scheduled time for presentations might be changed due to unexpected situations,

please come as early as you could.

*Session Photo will be taken at the end of the session.

K007

Weighted Hash Method based on Improved ABQ Algorithm

Time:13:00-13:15

Jiming Zheng and Ms. Wenfei Xie

University of Posts and Telecommunications Chongqing, China

For some hash algorithms, each dimension of the projection data is treated equally in the

data processing, and ignore the information between the various dimensions of the data,

so that the similarity between the data can‟t be preserved well. A weighted hash

algorithm (WABQ) is proposed to improve the ABQ algorithm by combining the

adaptive binary quantization (ABQ) method. The data in the algorithm is reduced by

PCA, and the variance of each dimension of the data after dimension reduction is

calculated to form a weight matrix to balance the variance of the original data after

mapping, and to ensure that the information quantity of each dimension is roughly the

same. Experimental results show that the proposed method improves the mean average

precision (MAP) and recall rate to some extent, and also improves the training time of

the data set compared with the original algorithm.

K014

In-network Cache Size Allocation for Video Streaming on Named Data Networking

Time:13:15-13:30

Mr. Yuanzun Zhang, Weiping Li, Xiaobin Tan

University of Science and Technology of China , China

In-network caching as a remarkable method to accelerate content distribution is

becoming an indispensible element in Named Data Networking (NDN) and increasingly

gaining attention in recent years. The fine-grained in-network caching behavior in NDN

gives a different problem background compared with that in file level caching. The

requests for chunks under a same video file are highly correlated and the caching

strategy is relatively complicated. It is challenging to design a high performance and

high efficiency caching algorithm based on chunks especially when the network

topology is complex. In this paper, we propose a proportional cache size division

(PCSD) cache replacement algorithm based on the requests from different interfaces and

Page 15: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 14 -

different video streams. PCSD splits a complex network topology into multiple simple

cascade topologies, and puts the most popular video chunks nearest to the video viewers

in each cascade topology. We evaluate the performance of PCSD on GEANT topology,

the simulation results show that the proposed algorithm yields a high average cache hit

ratio and low average hops.

K049

Cloud Tectonics : The Economics behind the Decline of Language Diversity in China

Time:13:30-13:45

Mr. Stephen P. Davis and Dr. David W. Marlow

Dongbei University of Finance and Economics, China

The world‟s languages are disappearing at an alarming rate. Scientists estimate that

around half of the world‟s languages will be moribund or extinct within the next century

along with the unique worldview conveyed through each. This paper explores the

underlying economic causes behind the decline in language diversity globally and in

China in particular. It further takes the position that attitudes and educational

prerogatives which more directly influence language change are typically themselves

preceded by economic conditions that ultimately drive and often predict the longevity

and character of languages. Commonly, as in many developing nations, the demand for a

common language to replace natural diversity has been driven primarily by urbanization,

an increase in global commercial activities, and government policies which favor the

efficiencies and opportunities of regional prestige language varieties. While

understandable, these strong tendencies toward monolingualism are often met with

apprehension and resistance as community members interpret the reduction of languages

and dialects as a significant loss of cognitive and cultural diversity. Finally the paper

explores the rationale and methods often employed for contextualizing, conceptualizing,

protecting, and preserving language diversity in China and elsewhere. Examples from a

variety of regions and nations are used in exploring how linguists, governments, and

community members might employ a variety of technologies and strategies in their

efforts to promote linguistic autonomy and diversity in China and abroad.

K026

Combined Heat and Power Economic Dispatch Using Differential Evolution

Time:13:45-14:00

Mr .YAFEI OUYANG, QUN NIU, YANG ZHANG

Shanghai University, China

In this paper, the different evolution (DE) algorithm is introduced to solve the combined

heat and power economic dispatch (CHPED) problem, a non-convex, non-linear and

non-different optimization problem under a number of constraints. DE is a simple yet

powerful algorithm which mainly adopts the mutation, crossover and selection operators,

and it can solve the CHPED problem easily. To confirm the superiority of DE, an

experiment on a power system with 24 units (14 conventional units, 7 CHP units and 3

pure heat units) is conducted, and the performance of DE is compared with other 8

intelligent algorithms. A parameter study with scaling factor F, crossover rate CR and

different mutation operators is performed to find the best operators. The experimental

results confirm the performance of the DE over other algorithms as a powerful

technology for optimization problems.

Page 16: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 15 -

K039

Modeling and Simulation of Time-Division Multiplexing Navigation Satellite Network

based on OPNET

Time:14:00-14:15

Dr. Hongcheng Yan, Rui Zhang, Lin Li, Lianlian Zeng, Xianghui Wang, Jian Guo

Institute of spacecraft System Engineering, CAST, China

Due to the constraints of satellite platform and inter-satellite links, navigation satellite

network has a characteristic of time-division multiplexing. Since the information

exchange in time division-multiplexing navigation satellite network is very complex, it

is generally necessary to use network simulation software to evaluate the design of

navigation satellite network protocol. In this paper, the time-division multiplexing

navigation satellite network is modeled based on the OPNET network simulation

software. The satellite network is modeled from three levels: network domain, node

domain and process domain. Also, the process models of link layer, network layer and

transport layer are designed and described, respectively. Finally, the simulation results of

network throughput with regard to different sliding window sizes and packet drop rates

are given. It can be seen from the simulation results that the proposed simulation model

of time-division multiplexing navigation satellite network based on OPNET is sufficient

to evaluation the network performance.

K062

Beamforming with Enhanced CNN Network

Time:14:15-14:30

Mr. Shu Kai, Wang Yanteng and Guanghui Zhao

Xidian university, China

In this paper, by exploiting the inherent similarity among the generalized cross

correlation (GCC) pattern of the microphone arrays, a robust neural network for

beamforming is proposed. To reduce the complexity, one-dimensional convolutional

neutral network is taken into account to simplify the classification.More particularly,

taking GCC pattern as input,our network outputs an angle as a result of classification

task. In addtion, the technique of mean and variance normalization (MVN) is engaged to

further promote the efficiency. The experimental results show that, better estimation

performance can be obtained by the proposed CNN network than the DNN network.

K067

Interference alignment with Jacobian Eigenvalue

Time:14:30-14:45

Dr. Christian ango Mbom, James K.N.Nyarko, Ling Wang

Northwestern Polytechnical University, China

In this paper, we mix at each transmitter and receiver two cascaded matrix , the first

matrix is obtained after applying the Jacobian eigenvalue method , the second is the

Interference alignment (IA) method based on nuclear norm. The main idea of our

proposed method is to apply the interference alignment with the classic mathematical

method Jacobian eigenvalue in the K-user Multiple Input Multiple Output (MIMO)

system and cellular networks. The results show our proposed method has a better sum of

Page 17: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 16 -

rate than the classic nuclear norm (without cascaded matrices) and in the case of K-user

MIMO system sum of rate outperforms than classic interference Alignment methods

(MaxSINR, Minimum Leakage).

K2002

Smartphone Sensor-Based Activity Recognition by Using Machine learning and Deep

Learning Algorithms

Time:14:45-15:00

Mr. Sarbagya Ratna Shakya, Prathyusha Uduthalapally, Qingzhong Liu, Zhaoxian

Zhou, Mengyu Qiao, Andrew H. Sung

University of Southern Mississippi, USA

Smartphones are widely used today, and it becomes possible to detect the user's

environmental changes by using the smartphone sensors, as demonstrated in this paper

where we propose a method to identify human activities with reasonably high accuracy

by using smartphone sensor data. First, the raw smartphone sensor data are collected

from two categories of human activity: motion-based, e.g., walking and running; and

phone movement-based, e.g., left-right, up-down, clockwise and counterclockwise

movement. Firstly, two types of features extraction are designed from the raw sensor

data, and activity recognition is analyzed using machine learning classification models

based on these features. Secondly, the activity recognition performance is analyzed

through the Convolutional Neural Network (CNN) model using only the raw data. Our

experiments show substantial improvement in the result with the addition of features and

the use of CNN model based on smartphone sensor data with judicious learning

techniques and good feature designs.

S3006 Community detection in complex networks using flow simulation

Time:15:00-15:15

Zheng Sun, Fuyou Miao, Yang Xu, Qiyu Shao, Weihua Wang,Xingfu Wang Assoc. Prof.

Chenxi Shao

University of Science and Technology of China, China

Community detection and analysis is an important part of studying the organization of

complex systems in real world, and it‟s extensively applied on many fields. Recently,

many of existing algorithms are not effective or the results are unstable. In this paper, a

new method of community testing is proposed by us based on the conception of flow

field. In our approach, each node is represented as a field source and has a tendency to

forward data to the connected nodes with highest field strength, after some iterations the

nodes with same data information form a community. It is evaluated by us for the

approach on some synthetic and real-world networks whose community structures are

known. It is demonstrated that the approach performs wellin effectiveness and

robustness.

Page 18: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 17 -

K3009 Energy-efficient Fault-Localization Protocol for Wireless Sensor Networks

Time:15:15-15:30

Mr. Ather Saeed, John Rankin and Ali Syed

Centre for Informatics and Applied Optimization Federation University, Australia

Maintaining network connectivity for the reliable acquisition of data is crucial when

disseminating the sensed phenomena in wireless sensor networks. The use of GPS is

considered as the most reliable method when detecting the location of particular nodes

but it is extremely expensive when the sensor field is massively dense. Alternatively

researchers have designed methods like “Triangulation” where beacon nodes are used

for creating a reference point from the nearest neighbor for locating nodes of interest.

Such techniques rely on estimates where chances of errors are extremely high if there are

problems with the beacon node that is used for creating a reference point. Similarly,

techniques such as AoA (Angle of arrival), TDoA (Time difference of arrival) and RSSI

(Received signal strength indicator) and Trilateration etc. are designed specifically for

efficiently identifying the exact location of nodes, specifically when they are faulty.

Unfortunately these well designed solutions are computationally intensive and are not

suitable for real-time and mission-critical environments.

A novel Green‟s Theorem based fault-localization protocol has been investigated and

discussed in this paper that partitions the dense sensor network and forms clusters. Each

cluster has a cluster-head for disseminating datasets to the sink node. It is also assumed

that the network is partitioned such that the neighboring edges of the next cluster are

closer than their sensing radius, and the sensor nodes store RSSI values and disseminate

information about their battery levels and consumption rates. Experiments have been

performed for proactively monitoring network health and the mathematical formulation

of the problem has also been discussed for enhancing fault-tolerance and network

connectedness, which is crucial for prolonging network life. In other words this paper

investigates: (i) how to efficiently identify faulty nodes and pinpoint their exact location.

(ii) Dynamically partitioning the network for reliability and adaptability (iii) the

Mathematical formulation of the localization problem is discussed and investigated

using Green‟s Theorem from an analogy of Fluid Flow and the theory of Electrostatics

in Physics.

K3010 Fault-tolerant Self-stabilizing Protocol for Wireless Sensor Networks

Time:15:30-15:45

Mr. Ather Saeed, John Rankin and Ali Syed

Centre for Informatics and Applied Optimization Federation University, Australia

Node organization and network adaptability are considered as two important metrics for

the reliable acquisition and dissemination of datasets. In wireless sensor networks

maintaining energy-balance is a challenge when network is dense and disseminating the

sensed phenomena to the sink requires an efficient routing and network partitioning

scheme to achieve robustness for prolonging network life. This paper investigates the

effect of sudden node failures, network connectivity and dynamic fault-recovery for

improving fault-tolerance and also provides a novel fault-detection and recovery scheme

that self-stabilizes network for minimizing data losses in the mission-critical and

Page 19: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 18 -

data-intensive environments. Experimental results show that the proposed SSRS

(Self-stabilizing Sliding Rectangle Scheme) has out-performed in terms of efficiently

detecting faults and stabilizing sensor networks with significantly low packets drop rate.

Such characteristics of SSRS protocol ensure reliable data acquisition, network

longevity and robustness that are crucial for prolonging sensor network life.

Mathematical formulation of our proposed Model is also provided to elaborate on how

the Green„s Theorem has been applied for dynamically localizing faults and

self-stabilizing network.

Coffee Break 15:45PM-16:05PM

Page 20: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 19 -

Afternoon, Dec. 9th, 2017

Session 2< Information System Security and Management >

Venue: 5F/ Conference Room 3

Chair:

Time: 16:05pm-19:05pm

Note:

* The certification of Oral/Poster presentations, listeners, will be awarded at the end of each session.

* For the Best Presentation of each session, it is encouraged to award to student author preferentially.

*To show the respect to other authors, especially to encourage the student authors, we strongly suggest you

attend the whole session, the scheduled time for presentations might be changed due to unexpected situations,

please come as early as you could.

*Session Photo will be taken at the end of the session.

K021

Trustworthiness in Fog: A Fuzzy Approach

Time:16:05-16:20

Fatin Hamada_Rahman, Dr. Au Thien Wan, S.H. Shah Newaz, and Wida Susanty Suhaili

Unniversiti Teknologi, Brunei

Trust management issue in cloud domain has been a persistent research topic discussed among

scholars. Similar issue is bound to occur in the surfacing fog domain. Although fog and cloud

are relatively similar, evaluating trust in fog domain is more challenging than in cloud. Fog‟s

high mobility support, distributive nature, and closer distance to end user means that they are

likely to operate in vulnerable environments. Unlike cloud, fog has little to no human

intervention, and lack of redundancy. Hence, it could experience downtime at any given time.

Thus it is harder to trust fogs given their unpredictable status. These distinguishing factors,

combined with the existing factors used for trust evaluation in cloud can be used as metrics to

evaluate trust in fog. This paper discusses a use case of a campus scenario with several fog

servers, and the metrics used in evaluating the trustworthiness of the fog servers. While fuzzy

logic method is used to evaluate the trust, the contribution of this study is the identification of

fuzzy logic configurations that could alter the trust value of a fog.

K027

A Comparative Study of Data Skew in Hadoop

Time:16:20-16:35

Majun He, Guozhong Li, Chaojie Huang, Yufei Ye, Prof. Wenhong Tian

University of Electronic Science and Technology of China, China

MapReduce which has been a well-known programming model processes numerous raw data

in large scale clusters. However, great challenges have been brought to MapReduce

programming model while routinely handling the big data. To mitigate the process time of the

clusters through minimizing the makespan is one of the key challenges. For now, (data) skew

is partly responsible for that and there are some methods presented by research teams from

different perspectives. In order to fully understand and utilize the state-of-the-art of data skew

problem, in this paper, we compare six algorithms: Hadoop default (speculative execution),

SkewReduce, SkewTune, iShuffle, LEEN and LIBRA. They are compared in terms of

Page 21: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 20 -

architecture and main features, core algorithms, performance metrics and evaluation methods.

Finally, a few challenging problems as future research trends are summarized.

K034

Self-Adaptive Consolidation of Virtual Machines For Energy-Efficiency in the Cloud

Wenxia Guo, Xiaoqin Ren, Prof. Wenhong Tian, Srikumar Venugopal

Time:16:35-16:50

University of Electronic Science and Technology of China, China

In virtualized data centers, consolidation of Virtual Machines (VMs) on minimizing the

number of total physical machines (PMs) has been recognized as a very ecient approach. This

paper considers the energy-ecient consolidation of VMs in a Cloud Data center. Concentrating

on CPU-intensive applications, the objective is to schedule all requests non-preemptively,

subjecting to constraints of PM capacities and running time interval spans, such that the total

energy consumption of all PMs is minimized (called MinTE for abbreviation). The MinTE

problem is NP-complete in general. We propose a self-adaptive approached called SAVE. The

approach makes decisions of the assignment and migration of VMs by probabilistic processes

and is based exclusively on local information, therefore it is very simple to implement. Both

simulation and real environment test show that our proposed method SAVE can reduce energy

consumption about 30% against VMWare DRS and 10-20% against EcoCloud on average.

K037

Hybrid RRT/DE algorithm for High performance UCAV path planning

Time:16:50-17:05

Fathy S. Elkazzaz, Mohammed A. H. Abozied, Mr. Chunming Hu

Beihang University, China

Path planning is an optimization problem that is crucial for robot or UCAV. Among the

optimization approaches, we focus in this paper on a new hybrid modified Rapidly Exploring

Random Tree algorithm (RRTs) and Differential Evolution (DE), for solving the optimization

path planning problem to generate a fast and optimal 3D collision-free path under complex

environment. We demonstrate the proposed algorithm performance through comparative

analysis with Improved Bat algorithm (IBA). The results demonstrated the robustness and

effectiveness of the proposed algorithm for generating an optimal free collision path in a short

time, which is suitable for the UCAV applications.

K038

CNN-based Commercial Detection in TV Broadcasting

Time:17:05-17:20

Mr. Mengyue Li, Yuchun Guo, Yishuai Chen

Beijing Jiaotong University, China

TV is an important advertising media. Information of a piece of TV commercial, such as

broadcasting time, the duration, the casting and etc., may reflect the business value of the host

company of this commercial. An automatic commercial detection system is needed for

third-party by business analysis. Previous works about TV commercial detection just apply to

one kind of video, like news, sports. And those methods detect commercials at frame level,

which need expensive computing cost. In this paper, we design and implement an automatic

commercial detection system for TV broadcasting. This system works at shot level and detects

Page 22: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 21 -

commercials in streaming videos, including TV broadcasting and online videos. It consists of

two modules, the shot boundary detection module and the shot classification module. We

crawl actual broadcasting videos and split them into shots, classify these shots into two

classes, commercial and non-commercial. Then, we extract shot features with deep

convolutional neural network, and train a support vector machine classifier to complete shot

classification. Combining the state-of-the-art convolutional neural network with traditional

machine learning techniques, our system can handle various program types and indiscernible

commercials, and get precision 93% and recall 95% in realistic TV programs. Except the TV

broadcasting, our system works in other video media like online videos.

K051

Performance Study of Neural Network and ANFIS Based MPPT Methods For Grid Connected

PV System

Time:17:20-17:35

Mr. Mohammad Abu Sarhan, Ding Min, Chen Xin, and Wu Min

China University of Geosciences , China

The maximum power point tracking (MPPT) methods are applied in PV solar systems to

accomplish the desired maximum power from the PV system. Hence, it is important to design

the best technique which can reach the maximum power point (MPP) effectively. In this paper,

a grid connected PV system is controlled by artificial neural network (ANN) and adaptive

neuro-fuzzy system (ANFIS) based MPPT methods. Both of proposed MPPT methods are

analyzed related to their performance efficiency and response under the variation of solar

irradiation and cell temperature. The obtained results of both methods are compared to

experimental results which show that ANFIS has more response and efficiency than ANN in

maximum power point tracking. The investigation has been done by using

MATLAB/Simulink Environment.

K059

Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme

and Untrusted Servers

Time:17:35-17:50

Mr. Meng Li and Yasushi Shinjo

University of Tsukuba, Japan

Conventional mobile applications are built based on a client-server modal and require central

servers for storing shared data and processing confidential information. If the central servers

are accessed by an attacker, a curious administrator or a government, private information will

be revealed because data is often stored on the central servers in the form of cleartext. This

paper presents Grouper, a framework for developing mobile applications without trusted

central servers. Grouper provides object synchronization among mobile devices. It also uses a

secret sharing scheme to create several shares from a marshalled object and uploads these

shares to multiple untrusted servers. These untrusted servers construct a selfdestruction

system. Uploaded shares will be deleted after a certain period of time. Mobile devices

exchange messages via untrusted servers based on the GrouperMessage Protocol. Grouper

consists of a client framework and a Web service. We have implemented client framework for

iOS, macOS, tvOS and watchOS in Objective-C. The Web service is implemented in Java and

runs on multiple untrusted servers. We have implemented two applications using Grouper: an

Page 23: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 22 -

iOS application named Account Book, and a benchmark application named Test. We have

evaluated the development efforts of applications using Grouper as well as the performance.

Developing these applications demonstrates that Grouper requires little development effort to

convert a standalone application to a data sharing application. Experimental results prove that

the performance of Grouper is satisfactory for mobile applications that are used among a small

group of people.

K066

Forecast Method of Short - term Passenger Flow on Urban Rail Transit

Time:17:50-18:05

Ms. Ling Guo and Yue Yuan

Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences,

China

Due to the greater randomness of short-term passenger flow forecasting, the current passenger

flow forecasting method for short-term urban rail transit has a large error for predicting traffic

with complex changes. Aiming at the shortcomings of forecasting accuracy of short-term

urban rail transit traffic forecasting method, this paper adopts a more adaptable vehicle traffic

forecasting method for urban rail transit line sites - based on genetic optimization particle

filter, to improve the accuracy of short-term traffic forecast for passenger flow monitoring and

emergency management, intelligent travel planning to provide decision-making basis.

K070

A Case Study of Detecting and Characterizing Large-Scale Prefix Hijackings in the Internet

Time:18:05-18:20

Dr. Yujing Liu, Dr. Zhilin Wang and Nan Li

National University of Defense Technology, China

BGP prefix hijacking is a major threat to the Internet. Detecting and characterizing large-scale

prefix hijacking events is very important, yet quite difficult in practical. In this paper, we take

the Google hijacking event on 2017 as a study case to develop effective detecting and

characterizing mechanisms by using publicly available BGP data. The analysis result reveals

key insights about the event. Firstly, the types of this event consist of hijacking a prefix and its

AS, as well as hijacking a sub-prefix and its AS. Secondly, more than 160,000 prefixes

belonging to over 7,200 ASes are hijacked. The largest service provider in Japan is the worst

impacted AS. Thirdly, over 200 ASes are infected. AS701 is a critical infector in the

propagation of hijacking routes. Finally, sub-prefix hijacking is more impactful than original

prefix hijacking in terms of polluting more infectors. Such results shed light on how to deploy

efficient defense mechanisms against prefix hijacking attacks.

K1002

PFESG: Permission-based Android Malware Feature Extraction Algorithm

Time:18:20-18:35

Mr. Chengcheng Wang and Yuqing Lan

Beihang University, China

Being open source and portable, Android has become a mobile operating system with the

highest market share. Due to the open market and loose review mechanisms, malware has

emerged in an endless stream, which makes malware detection a research emphasis in the field

Page 24: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 23 -

of mobile security in recent years. Since feature description of malware is an important factor

that influences malware detection, this paper proposes a malware feature extraction method

based on Android permission mechanisms, namely PFESG. PFESG merely uses permissions

with high utilization, which avoids over-fitting of classification models and quantifies each

permission‟s ability to identify malware. By virtue of extensive specimen and comparison

experiments, the paper verifies that PFESG can effectively extract features of malware and

significantly reduce model-training time. What‟s more, it has higher generalization

capabilities.

K3005

Weighted Least Squares Twin Large Margin Distribution machine

Time:18:35-18:50

Prof. Wu Qing, Qi Shaowei, Sun Kaiyue_

Xi‟an University of Posts and Telecommunications, China

In order to improve training efficiency and generalization performance of twin support vector

machine, a weighted least squares twin large margin distribution machine is proposed. In our

approach, equality constraint technique is used to improve the training speed. The structural

risk minimization principle is implemented by introducing a regularization term to improve

classification accuracy. In addition, different weights are put on the error variables in order to

eliminate the impact of noise data. The experimental results show that the proposed algorithm

has better classification performance in testing accuracy and efficiency.

K3011

A New Method for Evaluating Air Traffic Control Safety

Time:18:50-19:05

Mr. Wang Qinghao and Yao Dengkai

Air Force Engineering University, China

This paper presents a fuzzy Petri net method to assess the risk of air traffic control. Firstly, the

research status of the method of air traffic safety and safety risk assessment are analyzed.

Secondly, we construct a targeted risk system that can objectively reflect the safety risk of air

traffic control. Thirdly, an improved fuzzy Petri net method is introduced for the ambiguity

and uncertainty of the air traffic safety risk assessment. We employ the concept of risk level

threshold to improve the reasoning efficiency and reduce the computational complexity. And

we give the specific steps of the algorithm. Finally, the article takes an example in order to

verify the feasibility and effectiveness of the improved fuzzy Petri net method on the safety

risk assessment of air traffic control.

Page 25: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 24 -

Poster Session

Note:

* The certificates of poster presentations will be issued at the registration day, and the certificates need to be

signed by session chair at the end of session.

S005

CNN-Webshell: Malicious Web Shell Detection with Convolutional Neural Network

Mr. Yifan Tian, Jiabao Wang, Zhenji Zhou, Shengli Zhou

Army Engineering University, China

Malicious web shell detection is one of the most important methods for protecting the network

security. Most state of the art methods are based on malicious keywords matching, where the

keywords are usually defined by the domain experts. So its effect depends on the domain

experts and it is hard to detect new type of malicious web shells. This paper proposed a new

malicious web shell detection approach based on „word2vec‟representation and convolutional

neural network (CNN). Firstly, each word, separated from the HTTP requests, is represented

as a vector by using the „word2vec‟ tool. Next, a web request can be represented as a

size-fixed matrix. Finally, a CNN-based model is designed to classify the malicious web shells

and the normal ones. Experimental results showed that this approach achieves the best

performance, comparing with several other classification methods. To the best of our

knowledge, this is the first time that CNN has been applied to malicious web shell detection.

S010

Multiple Bloom filters

Mr. Yuanhang Yang and Shuhui Chen

National University of Defense Technology, China

A standard technique from the cryptanalysis is to use exhaustive search that consists of

systematically enumerating all possible candidates for the solution and checking whether each

candidate satisfies the hash value. But this will take a lot of storage space and the time spent

on query will be very long. In this paper, we introduce multiple Bloom filter, which improves

performance when the password is attacked by brute-force or dictionary. Bloom filters can be

used represent the password dictionary, which requires less storage space and searching time.

For example, Bloom filters have been suggested as a mean for searching keywords in a huge

database. In this setting, users do not search the whole of keywords, but instead query the

table of a Bloom filter that represents the full set of keyword. Our goal is to recover the

passwords from hash values that have been stored in or transmitted by a computer system. By

using Bloom filters, we can just query a Bloom filter table instead of gigabyte dictionaries,

correspondingly, the time spent on searching becomes much fewer.

K010 A Dynamic Convergent Replication Strategy Based on Distributed Hierarchical Systems

Mr. Pu Zhao, Jingtao Shang, Xin Sun, Jianjun Lin , Bo Li

China North Vehicle research Institute, China

Data replication strategies have been used to increase data access efficiency in P2P

systems. This paper studies the replica selection strategy and replication strategy. By

Page 26: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 25 -

concerning real-time bandwidth, performance of the peer, and replica‟s history request,

following the principle that high valued replica has high proportionality to be select, a

proportional matching based self-convergent replica selection strategy(PMC) is presented.

By concerning the access frequency, the status of the network connection and average

response time, and implementing replication only if the logic replica is a popular and

scarce one, a hot-estimation based ECO replication strategy (HOT_ECO) is presented in

this paper. The strategies avoid leading to high overhead for unnecessary file replications

and consistency maintenance in case of updates while replicating. The simulation results

show that the optimal selection and replication strategy offers better performance by

shortening the response time with fewer replicas.

K060

Robust Topology Design in Time-Evolving and Predictable Spacecraft Network with

Node Efficiency

Dr. Dawei Yan, Cong Liu, Peng You, Shaowei Yong

National University of Defense Technology, China

In spacecraft network, each nodes move in a predictable trajectory and the communication

opportunities between them are often very short, therefore, network topology changes

frequent and predictable. However, with the expansion of spacecraft network, how to

maintain efficient and dynamic topology becomes increasingly crucial. In this paper, the

topology design problem is studied in a spacecraft network where the dynamic topology

and node efficiency can be predicted. First, a directed space-time graph that includes both

spatial and temporal information is modeled for the spacecraft network. In order to reduce

the impact of node congestion on the network performance, a new robust topology design

problem which aims to balance the network load and minimize the total cost of the sparse

structure while still maintaining the network connectivity over time is proposed. Second,

two topology design algorithms which can significantly reduce the total cost of topology

and maintain a space-time path connecting with robustness higher than the required

threshold are proposed for this optimization problem. Finally, simulations results from

random time-evolving and predicted spacecraft network demonstrate the efficiency of the

proposed methods.

K061

The Synthesis of Multi-Graphic Visual Encryption Technology

Ms Jianle Zhu, Peng Cao, Fangfang Chen, Xuan Wang and Peijun Huo

Beijing Institute of Graphic Communication, China

Visual encryption is a widely used in the field of security and information hiding

technology. The visual effect of information extraction and the non-visual effect

embedding are the key factors that reflect the level of this technology, especially the

multiple image information hidden in the same image, the technical requirements for its

higher. This paper presents a method of combining moire fringe amplification based on

binary phase modulation (2PSK) and multi-angle grating, in order to realize the visual

encryption of multiple image information implantation. Using the same frequency grating

as decoder, this technique can effectively solve the problem of combining the invisible

effect of information hiding and the visual effect of extracting information.This

technology has the advantages of large information capacity, good hiding effect and strong

anti-replication performance, which can be widely used in packaging printing and

Page 27: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 26 -

copyright protection of books, and to provide value-added services while piracy

infringement.

K2001

The impact of target near-field scattering on missile communication operations

Mr. YUAN Jun-chao, ZHANG Xiao-kuan, SUN Ming-cai, Liu Mao

Air and Missile Defense College of Air Force Engineering University, China

The communication between fuze of missile and warhead is the key to the effectiveness of

missile attacking target. The near-field scattering characteristic of target is an important

factor influencing the communication of detonation command. In this paper, the near-field

radar cross section (RCS) sequence of target under different encounter conditions is

calculated. Then, by establishing the model of detonation communication of fuze, the

operational efficiency of the fuze command communication under different encounter

conditions is simulated. According to the analysis of results, the intensity of near-field

RCS has direct influence on fuze communication. Severely, warhead may explore early or

late.

K3014 314 Meter Distributed Fiber Sensing using Brillouin Optical Correlation Domain Analysis

(BOCDA)with 3 Meter Resolution

Yu-Chien Chou, Cheng-Hsiung Lee, Guan-Hong Chen, Nobuo Goto,Chi-Wen. Liao,

Yu-Lin Shen, Zheng-Kuan Lee, Chow-Shing Shin and Shien-Kuei Liaw*

National Taiwan University of Science and Technology, Taiwan

In this paper, a distributed fiber sensing system based on Stimulated Brillouin scattering

(SBS) effect is experimentally studied. Using Brillouin optical correlation domain

analysis, the spatial resolution was affected by the reference frequency and the sideband

component suppressed in the probe. The lower side band and the central wavelength was

filtered by a fiber Bragg grating (FBG). We successfully achieved the measurement range

314 m with 3 m spatial resolution.

K3015 Water Two-Parameter Measurement Based on Fiber Bragg Grating Sensing

Yi-Lin Yu, Hzu-Hsuan Hung, Guan-Hong Chen, Hiroki Kishikawa, Chi-Wen. Liao, Chun

Chung Chen, Min-Hsiung Shih, Yu-Lin Shen, Shien-Kuei Liaw*

National Taiwan University of Science and Technology, Taiwan

We proposed and demonstrated a complex sensor which combined a tilted fiber Bragg

grating and a long period fiber grating. We used this sensor to measure the surrounding

refractive index and temperature of an unknown liquid. The measured range of the

temperature and environmental refractive index were 30~70 oC and 1.33~1.4,

respectively. The measured results have linearly trend with high sensitivity.

Page 28: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 27 -

Listener

Note:

* The certificates of listeners will be issued at the registration day, and the certificates need to be signed by

session chair at the end of session.

L001

Dr. Luyao Wang

Beijing University of Technology, China

Page 29: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 28 -

Name ID Session Page

A

Ather Saeed K3009 S1 16

Ather Saeed K3010 S1 17

Au Thien Wan K021 S2 19

C

Christian ango Mbom K067 S1 15

Chenxi Shao S3006 S1 16

Chunming Hu K037 S2 20

Chengcheng Wang K1002 S2 22

D

Dawei Yan K060 Poster 25

J

Jianle Zhu K061 Poster 25

L

Ling Guo K066 S2 22

Luyao Wang L001 Listener 24

M

Mengyue Li

Mohammad Abu

Sarhan

K038

K051

S2

S2

20

21

Name ID Session Page

Meng Li K059 S2 21

P

Pu Zhao K010 Poster 24

S

Shu Kai K062 S1 15

Sarbagya Ratna

Shakya K2002 S1 16

Stephen P. Davis K049 S1 14

W

Wenfei Xie K007 S1 13

Wenhong Tian K027 S2 19

Wenhong Tian K034 S2 20

Wu Qing K3005 S2 23

Wang Qinghao K3011 S2 23

Y

Yuanzun Zhang K014 S1 13

Jian Wang K022 S1 14

Yujing Liu K070 S2 22

Yifan Tian S005 Poster 24

Yuanhang Yang S010 Poster 24

YUAN Jun-chao K2001 Poster 24

Yafei Ouyang K026 S1 14

Z

Zhilin Wang K070 S2 22

Page 30: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

As one of China’s most diversified provinces, Yunnan is certainly one of China’s most alluring destinations.

Yunnan is home to more than one third of China’s ethnic minorities and over half of the country’s plant and

animal species. The province is blessed by its mixture of traditional folk cultures as well as breath-taking

scenery. Kunming, Yunnan’s capital, resides at an elevation of 1890m and boasts a milder climate than most

other Chinese cities. Celebrated as the "Spring City," Kunming has neither severe winters nor extremely

hot summers and can be visited at any time of the year.

昆明,享“春城”之美誉,云南省省会,中国面向东南亚、南亚开放的门户城市,国家历史文化名城,我国重要的旅游、商贸城市,西

部地区重要的中心城市之一。昆明地处云贵高原中部,北与凉山彝族自治州相连,西南与玉溪市、东南与红河哈尼族彝族自治州毗邻,

西与楚雄彝族自治州接壤,东与曲靖市交界,是滇中城市群的核心圈、亚洲 5 小时航空圈的中心,国家一级物流园区布局城市之一。

昆明市为山原地貌。地势大致北高南低,多溶洞和溶岩地貌,溶岩盆地有石林坝子。属北亚热带低纬高原山地季风气候。年平均气温

16.5℃,气候宜人。

Visit Schedule

07:40:Get on the bus from Grand Park Hotel Kunming

昆明君乐酒店出发

09:00:Arrive at Stone Forest

到达石林,游玩 3 小时左右

12:00:Lunch Time

午餐

14:00:Arrive at Jiuxiang

到达九乡风景区,游玩 3 小时左右

19:00:Arrive at Kunming Railway Station and end the visit

到达昆明火车站,游客自行解散

Notice:

Fee: RMB450/person (including bus fare, main

scenic spot tickets, lunch, insurance and guide

service fee)

费用:450 人民币/人 (包含车费、大小石林门票,午餐,

九乡门票及索道,导游费)

Payment Deadline: Dec. 1st, 2017

一日游注册截止日: 2017 年 12 月 1 日

One-day Visit 2017.12.10

- 29 -

Page 31: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

Stone Forest

Stone Forest Lake

石林湖

Sword Peak Pond

剑峰池

Wangfeng Pavilion

望峰亭

The Stone Forest lies about 80 miles to the southeast of Kunming. A geological

phenomenon, the Stone Forest was a vast expanse of sea during the Paleozoic era---some

270 million years ago. Later the movement of tectonic plates altered the earth’s crust,

causing the sea to recede and its limestone bottom to appear, thereby forming land. Due to

the constant rain through the cracks in the limestone, some of the stone formation dissolved

and the fissures broadened, producing a group of great sculpture of different shapes, all

molded by nature.

石林具有世界上最奇特的喀斯特地貌,这里在约 3 亿年前还是一片海,经过漫长的地质演变,终于形成了现今极

为珍贵的地质遗迹。景区是一座名副其实的由岩石组成的“森林”,穿行其间,但见怪石林立,突兀峥嵘,姿态

各异。壁峰之间,翠蔓挂石,金竹挺秀,山花香溢,灵禽和鸣,一派生机盎然。石林以其无与伦比的天造奇观吸

引着海内外无数游客。

- 30 -

Page 32: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

Jiuxiang Garst Scenic Region

Yincui Valley

荫翠峡

Jiuxiang is a state class scenic spot, 90 kilometer from Kunming city or 22 kilometers north

from the Stone Forest. Jiuxiang mainly features karst caves, fused with natural landscapes and

human sights and national customs and conventions.Here are nearly 100 large and small karst

caves, one of the largest cave groups in China. It is dubbed as a cave museum for its complete

range and styles.

九乡是国家重点风景名胜区、是云南省新兴的以溶洞景观为主、溶洞外自然风光、人文景观、民族风情为一体的综合性

风景名胜区。九乡位于宜良县九乡彝族回族自治乡境内,这里气候温和,年平均气温 14.6˚C,冬无严寒、夏无酷暑,气

温与昆明市区相当。与石林景区共同形成“地上看石林,地下游九乡”的喀斯特立体景观。九乡拥有上百座大小溶洞,为

国内觃模最大、数量最多的洞穴群落体系之一。

Lovers’ Waterfalls

雌雄双瀑

The Mysterious Land

麦田河神田

Goddess Cave

神女宫

- 31 -

Page 33: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 32 -

MEMO

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

Page 34: CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates ... point device, microphone, and a laptop with general presentation software such

- 33 -

MEMO

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________

________________________________________