CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates...
Transcript of CONFERENCE ABSTRACTS - icncc.org · Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates...
CONFERENCE ABSTRACTS
2017 VI International Conference on Network, Communication and Computing
(ICNCC 2017)
Workshop
2017 II International Conference on Network Security
(ICNS 2017)
Dec. 8-10, 2017
Kunming, China
Grand Park Hotel Kunming | 昆明君樂酒店
Add: 20 Hong Hua Qiao, 650031, Kunming, China | 中国云南省昆明市洪化桥 20 号,昆明, 中国
Sponsored by
Published by Co-sponsored by
- 1 -
Table of Contents
Welcome Address…………………………………………………………………………… 2
Organizing Committee………………………………………………………………….. 3
Local Information…………………………………………………………………………. 4
Instructions for Oral& Poster Presentations…………….………………………… 6
Introduction of Keynote Speakers……………………………………………………… 7
Daily Schedule of Events………………………………………………………….……… 10
Content of Presentations………………………………..………………….…………… 11
Session 1……………………………………………………………………………………… 13
Session 2……………………………………………………………………………………… 19
Poster Session………………………………………………………………………………… 24
Listeners………………………………………………………………………….…………… 27
Author Index………………………………………………………………………………… 28
One-day Visit in Kunming…………………………..………………..………………… 29
- 2 -
Welcome Address
We are pleased to welcome you to join the 2017 VI International Conference on Network, Communication
and Computing (ICNCC 2017) and the workshop 2017 II International Conference on Network Security
(ICNS 2017), which take place at Kunming, China during December 8-10, 2017.
After several rounds of review procedure, the program committee accepted those papers to be published into
Conference Proceedings. We wish to express our sincere appreciation to all of the individulas who have
contributed to ICNCC 2017 and ICNS 2017. Special thanks are extended to our colleagues in program
committee for their thorough review of all the submissions, which is vital to the success of the conferences,
and also to the members in the organizing committee and the volunteers who had delicated their time and
efforts in planning, promoting, organizing and helping the conference. Last but not least, our speacial thanks
go to invited keynote speakers as well as all the authors for contributing their latest researches to the
conference.
This conference program is highlighted by Three keynote speakers: Prof. Yanzhen Qu, from Colorado
Technical University (CTU), USA, Prof. Chin-Chen Chang, from Feng-Chia University, Taiwan and Prof.
Shien-Kuei Liaw, from National Taiwan University of Science and Technology, Taiwan
One best presentation will be selected from each session, evaluated from: Originality; Applicability;
Technical Merit; PPT and English. The best one will be announced at the end of each session, and be
awarded the certificate at the end of the session.
As one of China‟s most diversified provinces, Yunnan is certainly one of China‟s most alluring destinations.
Yunnan is home to more than one third of China‟s ethnic minorities and over half of the country‟s plant and
animal species. The province is blessed by its mixture of traditional folk cultures as well as breath-taking
scenery. Kunming, Yunnan‟s capital, resides at an elevation of 1890m and boasts a milder climate than most
other Chinese cities. Celebrated as the "Spring City," We hope your stay in Osaka will been riching and
memorable!
We wish you a successful conference and enjoyable visit in Kunming, China.
Conference Organizing Committee
Kunming, China
- 3 -
Organizing Committee
Advisory Committee
Prof. Chin-Chen Chang, Feng Chia University, Taiwan
Conference Chairs
Prof. Yanzhen Qu, Colorado Technical University, USA
Prof. Andras Farago, The University of Texas at Dallas, USA
Program Chairs
Prof. Shien-Kuei Liaw, National Taiwan University of Science and Technology, Taiwan
Assoc. Prof. Sayaka Kamei, Hiroshima University, Japan
Technical Committee
Prof. Xin Chen, China University of Geosciences, China
Prof. Mashashi Sugano, Osaka Prefecture University, Japan
Prof. Wu Qing, Xi'an University of Posts and Telecommunications, China
Dr. Yen-Jen Chen, Ming Chi University of Technology, Taiwan
Prof. Yang Shulin, Beijing Institute of Graphic Communication, China
Assoc. Prof. Jian Wang, Shenyang Institute of Automation, Chinese Academy of Sciences, China
Assoc. Prof. Chu-Ti Lin, National Chiayi University, Taiwan
Dr. Eyüp Burak Ceyhan,Bartın University, Turkey
Assoc. Prof. Cheng-Chi Lee, Fu Jen Catholic University, Taiwan
Prof. Sang Guun Yoo, Universidad de las Fuerzas Armadas ESPE, Ecuador
Dr. E. Prince Edward, Department of Electronics, Sri Krishna Polytechnic College, India
Assoc. Prof. Suphamit Chittayasothorn, King Mongkut's institute of Technology Labkrabang, Thailand
Assoc. Prof. Qurban Memon, UAE University, United Arab Emirates
Assoc. Prof. Garimella Rama Murthy, Intl. Inst. of Information Technology Hyderabad, India
Prof. Maushumi Barooah, Assam Engineering College, India
Prof. Kai-Wei Ke, National Taipei University of Technology, Taiwan
Prof. Wen-lin Yang, National University of Tainan, Taiwan
Prof. Yo-Ping Huang, National Taipei University of Technology, Taiwan
Prof. Yung-Chung Wang, National Taipei University of Technology, Taiwan
Dr. Hui Guo, School of Computer Science and Engineering, Australia
Dr. Chiam Yin Kia, University of Malaya, Malaysia
Dr. Yu-Ju Cheng, Chunghua Telecom Ltd., Taiwan
Dr. Xuewu Dai, Northumbria University, UK
Prof. A. Sivasubramanian, VIT University, India
Dr. Au Thien Wan, Universiti Teknologi Brunei, Brunei
- 4 -
Local Information
Weather in December
Average daily minimum temperature
3℃
Average daily highest temperature
15℃
Banks and Foreign Exchange
The Currency is Chinese RMB here, you can exchange foreign currency 24 hours at the airport, or exchange
at the bank, Money exchanger
Emergency
Police emergency:110
Hospital Emergency phone: 112
Conference Venue
Grand Park Hotel Kunming |昆明君樂酒店
20 Hong Hua Qiao, 650031, Kunming, China
中国云南省昆明市洪化桥 20 号
Tel: (86 871) 6538 6688
E-mail: [email protected]
- 5 -
Getting to the Hotel
1.Changshui Intl.Airport——→2.Airport bus stop———→4.Xiaoximeng Nanjiang Bus stop———→3.Grand Park Hotel Kunming
(Walk 2 min) (Take Airport Line 1) (Walk 8 min)
1.昆明长水国际机场————→2.机场公交站———→3.小西门南疆宾馆公交站———→4.昆明君乐酒店
(步行 2 分钟) (搭乘空港 1 号线) (步行 8 分钟)
Getting Here from the Hotel
2 minutes' walk to Green Lake Park
步行 2 分钟即可到达翠湖公园
10 minutes' walk to Yunnan University
步行 10 分钟即可到达云南大学
15 minutes' walk to the neartest Metro station
步行 15 分钟可到达城市地铁站
50 minutes' drive to Kunming Changshui International Airport
开车大约 50 分钟即可到达昆明长水国际机场
- 6 -
Instructions for Oral&Poster Presentations
Oral Presentations
Timing: a maximum of 15 minutes total, including speaking time and discussion. Please make sure your
presentation is well timed. Please keep in mind that the program is full and that the speaker after you
would like their allocated time available to them.
You can use CD or USB flash drive (memory stick) and make sure you scanned viruses in your own
computer. Each speaker is required to meet her / his session chair in the corresponding session rooms 10
minutes before the session starts and copy the slide file (PPT or PDF) to the computer.
It is suggested that you email a copy of your presentation to your personal inbox as a backup in case for
some reason the files can‟t be accessed from your flash drive.
Please note that each session room will be equipped with a LCD projector, screen, point device,
microphone, and a laptop with general presentation software such as Microsoft Power Point and Adobe
Reader. Please make sure that your files are compatible and readable with our operation system by using
commonly used fronts and symbols. If you plan to use your own computer, please try the connection and
make sure it works before your presentation.
Videos: If your Power Point files contain videos please make sure that they are well formatted and
connected to the main files.
Poster Presentations
Poster size is 60cm x 80cm.
Posters are required to be condensed and attractive. The characters should be large enough so that they
are visible from 1 meter apart.
Dress Code
Please wear formal clothes or national characteristics of clothing
- 7 -
Keynote Speeches
Prof. Yanzhen Qu
Colorado Technical University (CTU), USA
Yanzhen Qu is currently a Professor of Computer Science and the Dean of the College of Computer Science
and Technology at Colorado Technical University (CTU), USA. Over the course of his 20+ years in industry,
he has served as a senior or executive manager of product R&D and IT in several multinational
corporations. He was also the chief system architect and director of development for several of the world’s
first very large real-time commercial software systems. At Colorado Technical University, Dr. Qu has led his
faculty to create several new degree programs, including cybersecurity and data science at both
undergraduate and graduate levels, and has also supervised many doctoral students to conduct their
research work effectively and to complete their dissertations on time. Just in recent five years he and his
students have published several dozen scholarly papers, several of which have won top awards at various
international conferences. He has also coached CTU’s student teams to win two finalist and one 1st place
awards at The USA’s Annual National Security Innovation Competition from 2012 to 2014. As a senior
member of IEEE, Dr. Qu has served as general, program, and session chair at various meetings, and has
been invited as a keynote speaker at many IEEE, ACM, ASIS, and IFIP international conferences,
symposiums, and workshops. He is also an editorial board member of several professional peer-reviewed
CS and IT journals, and has been a visiting professor at over 30 international universities. Dr. Qu’s broad
research interests include internet of things, cyber security, affective computing, e-learning technologies,
software engineering, cloud computing, mobile computing, artificial intelligence, data mining, machine
learning, and big data analytics. He received his B.Eng. in Electronic Engineering from Anhui University,
China, M. Eng. in Electrical Engineering from Chinese Academy of Sciences, China, and Ph.D. in
Computer Science from Concordia University, Canada.
Title:Challenges and Research Opportunities in IoT Security and Privacy
The Internet of Things (IoT) has recently become a hot topic in both the commercial and academic world.
The innovative new products, services, and opportunities created by the extensive network of daily-use
devices have attracted widespread attention and huge investment from all aspects of society. However,
IoT also presents new and unprecedented security and privacy challenges. The addition of a huge number
"things" to the internet, most of which have no physical foundation to support even minimal security and
privacy measures, simply exceeds the limits of our collective knowledge and experience in internet
security and privacy. This talk will through some nontrivial IoT examples present insights into the key root
causes of the security and privacy challenges related to the implementation of IoT, and will also discuss
research opportunities which will facilitate the invention of appropriate technical solutions and regulatory
frameworks to address those causes.
- 8 -
Prof. Chin-Chen Chang
Feng-Chia University, Taiwan
Professor Chang has worked on many different topics in information security, cryptography, multimedia
image processing and published several hundreds of papers in international conferences and journals and
over 30 books. He was cited over 22800 times and has an h-factor of 71 according to Google Scholar. Several
well-known concepts and algorithms were adopted in textbooks. He also worked with the National Science
Council, Ministry of Technology, Ministry of Education, Ministry of Transportation, Ministry of Economic
Affairs and other Government agencies on more than 100 projects and holds 17 patents, including one in
US and two in China.He served as Honorary Professor, Consulting Professor, Distinguished Professor,
Guest Professor at over 50 academic institutions and received Distinguished Alumni Award's from his Alma
Master's. He also served as Editor or Chair of several internal journals and conferences and had given
almost a thousand invited talks at institutions including Chinese Academy of Sciences, Academia Sinica,
Tokyo University, Kyoto University, National University of Singapore, Nanyang Technological University,
The University of Hong Kong, National Taiwan University and Peking University. Professor Chang has
mentored 56 PhD students and 177 master students, most of whom hold academic positions at major
national or international universities. He has been the Editor-in-Chief of Information Education, a
magazine that aims at providing educational materials for middle-school teachers in computer science. He
is a leader in the field of information security of Taiwan. He founded the Chinese Cryptography and
Information Security Association, accelerating information security the application and development and
consulting on the government policy.He is also the recipient of several awards, including the Top Citation
Award from Pattern Recognition Letters, Outstanding Scholar Award from Journal of Systems and
Software, and Ten Outstanding Young Men Award of Taiwan. He was elected as a Fellow of IEEE and IET
in 1998 for his contribution in the area of information security.
Title:Sharing Secret Message Using Meaningful Digital Images with Cheating Detection
Secret sharing is an important technique to ensure well protection of transmitted information by dividing
a secret message into several shadows that are held among a set of participants. In this talk, I will
introduce a novel secret sharing method using two meaningful digital images with cheating detection. It
allows a dealer to share a secret message into two different meaningful images through the guidance of
the turtle shell magic matrix. Then, after performing a permutation operation, two meaningful shadow
images are generated and distributed to two participants. The secret message can be reconstructed only
when both participants cooperate by releasing real shadow images. Honest participant in this method can
easily detect whether the other participant is cheating via presenting a faked shadow. Experimental
results show that this method ensures high quality of shadow images and good embedding capacity. The
cheating detection process is also effective and very easy to implement.
- 9 -
Prof. Shien-Kuei Liaw
National Taiwan University of Science and Technology, Taiwan
Shien-Kuei (Peter) Liaw received double PhD degrees from National Chiao-Tung University in photonics
engineering and from National Taiwan University in mechanical engineering, respectively. He joined the
Chunghua Telecommunication, Taiwan, in 1993. Since then, he has been working on optical communication
and fiber based technologies. Prof. Liaw joined the department of Electronic Engineering, National Taiwan
University of Science and Technology (NTUST) in 2000. He has ever been director of the Optoelectronics
Research Center and the Technology Transfer Center, NTUST. He was a visiting researcher at Bellcore
(now Telcordia), USA for six months in 1996 and a visiting Professor at University of Oxford, UK for three
months in 2011. He owned six U.S. patents, and authored or coauthored for 250 journal articles and
international conference presentations. He earned many domestic honors and international honors. He has
been actively contributing for numerous conferences as conference chair, technical program chair,
organizing committee chair, steering committee andkeynote speaker. He serves as an Associate Editor for
Fiber and Integrated Optics. Currently, Prof. Liaw is a senior member of IEEE, OSA and SPIE. He is a
distinguished Professor of National Taiwan University of Science and Technology (NTUST), Vice President
of the Optical Society (OSA) Taiwan Chapter and Secretary-General of Taiwan Photonic Society. His
research interests are in optical sensing, optical communication and reliability testing.
Title:Investigation of Er/Yb Co-doped Fiber Lasers for Optical Communications
In this talk, I will review several types of single-longitudinal mode linear cavity, tunable fiber lasers. They
operate either in C+L band or 1064 nm band. The linear-cavity fiber laser schemes and characteristics will
be addressed and discussed. I will also introduce the wavelength tunable fiber laser design. The laser
characteristics such as output, signal-to-noise ratio, linewidth, threshold pump power, pumping slope
efficiency and side mode suppress ratio will be measured and be discussed. A methodology to increase
the pumping slope efficiency will also be proposed. These fiber lasers may find potential applications in
lightwave communication.
- 10 -
Daily Schedule of Events
Dec. 8th/ Friday Hotel Lobby
10:00am-17:00pm Registration Staff: Frannie Lee &Tina Wang
Dec.9th/ Saturday Morning 5F/ Conference Room 3
9:05am-9:10am
Opening Remarks
Prof. Chin-Chen Chang
Feng Chia University, Taiwan
9:10am-9:50am
Keynote Speech I
Prof. Shien-Kuei Liaw
National Taiwan University of Science and Technology, Taiwan
9:50am-10:30am
Keynote Speech II
Prof. Chin-Chen Chang
Feng Chia University, Taiwan
10:30am-11:00am
11:00am-11:40am
Keynote speech III
Prof. Yanzhen Qu
Colorado Technical University (CTU), USA
2F/Emerald
Dec. 9th/ Saturday Afternoon 5F/ Conference Room 3
13:00pm -15:45pm
Session 1
[TOPIC] Computer Network and Communication Technology
15:45pm -16:05pm
1
16:05pm -19:05pm
Session 2
[TOPIC] Information System Security and Management
1F/ Western Restaurant
Dec. 10th/ Sunday One-day Visit
- 11 -
Content of Presentations
Session 1: Computer Network and Communication Technology
Time: 13:00pm-15:45pm
Room: 5F/ Conference Room 3
Paper ID Title
K007 Weighted Hash Method based on Improved ABQ Algorithm
K014 In-network Cache Size Allocation for Video Streaming on Named Data Networking
K049 Cloud Tectonics : The Economics behind the Decline of Language Diversity in China
K026
Combined Heat and Power Economic Dispatch Using Differential Evolution
Algorithm
K039
Modeling and Simulation of Time-Division Multiplexing Navigation Satellite
Network based on OPNET
K062 Beamforming with Enhanced CNN Network
K067 Interference alignment with Jacobian Eigenvalue_
K2002
Smartphone Sensor-Based Activity Recognition by Using Machine learning and Deep
Learning Algorithms
S3006 Community detection in complex networks using flow simulation
K3009 Energy-efficient Fault-Localization Protocol for Wireless Sensor Networks
K3010 Fault-tolerant Self-stabilizing Protocol for Wireless Sensor Networks
NOTE:
*One best presentation will be selected from each session. (Evaluation is based on Originality, Applicability,
Technical Merit, PPT and English), and will be awarded at the end of the session.
**Please arrive at the conference room 10 minutes earlier before the session starts to copy your PPT to the
laptop.
- 12 -
Session 2: Information System Security and Management
Time: 16:05pm-19:05pm
Room: 5F/ Conference Room 3
Paper ID Title
K021 Trustworthiness in Fog: A Fuzzy Approach
K027 A Comparative Study of Data Skew in Hadoop
K034 Self-Adaptive Consolidation of Virtual Machines For Energy-Efficiency in the Cloud
K037 Hybrid RRT/DE algorithm for High performance UCAV path planning
K038 CNN-based Commercial Detection in TV Broadcasting
K051
Performance Study of Neural Network and ANFIS Based MPPT Methods For Grid
Connected PV System
K059
Grouper: A Framework for Developing Mobile Applications using a Secret Sharing
Scheme and Untrusted Servers
K066 Forecast Method of Short - term Passenger Flow on Urban Rail Transit
K070
A Case Study of Detecting and Characterizing Large-Scale Prefix Hijackings in the
Internet
K1002 PFESG: Permission-based Android Malware Feature Extraction Algorithm
K3005 Weighted Least Squares Twin Large Margin Distribution machine
K3011 A New Method for Evaluating Air Traffic Control Safety
NOTE:
*One best presentation will be selected from each session. (Evaluation is based on Originality, Applicability,
Technical Merit, quality of PPT and English), and will be awarded the certificate at the end of the session.
**Please arrive at the conference room 10 minutes earlier before the session starts to copy your PPT to the
laptop.
- 13 -
Afternoon, Dec. 9th,2017
Session 1 < Computer Network and Communication Tchnology >
Venue: 5F/ Conference Room 3
Chair: Prof. Shien-Kuei Liaw
Time: 13:00pm-13:45pm
Note:
* The certification of Oral/Poster presentations, listeners, will be awarded at the end of each session.
* For the Best Presentation of each session, it is encouraged to award to student author preferentially..
*To show the respect to other authors, especially to encourage the student authors, we strongly suggest you
attend the whole session, the scheduled time for presentations might be changed due to unexpected situations,
please come as early as you could.
*Session Photo will be taken at the end of the session.
K007
Weighted Hash Method based on Improved ABQ Algorithm
Time:13:00-13:15
Jiming Zheng and Ms. Wenfei Xie
University of Posts and Telecommunications Chongqing, China
For some hash algorithms, each dimension of the projection data is treated equally in the
data processing, and ignore the information between the various dimensions of the data,
so that the similarity between the data can‟t be preserved well. A weighted hash
algorithm (WABQ) is proposed to improve the ABQ algorithm by combining the
adaptive binary quantization (ABQ) method. The data in the algorithm is reduced by
PCA, and the variance of each dimension of the data after dimension reduction is
calculated to form a weight matrix to balance the variance of the original data after
mapping, and to ensure that the information quantity of each dimension is roughly the
same. Experimental results show that the proposed method improves the mean average
precision (MAP) and recall rate to some extent, and also improves the training time of
the data set compared with the original algorithm.
K014
In-network Cache Size Allocation for Video Streaming on Named Data Networking
Time:13:15-13:30
Mr. Yuanzun Zhang, Weiping Li, Xiaobin Tan
University of Science and Technology of China , China
In-network caching as a remarkable method to accelerate content distribution is
becoming an indispensible element in Named Data Networking (NDN) and increasingly
gaining attention in recent years. The fine-grained in-network caching behavior in NDN
gives a different problem background compared with that in file level caching. The
requests for chunks under a same video file are highly correlated and the caching
strategy is relatively complicated. It is challenging to design a high performance and
high efficiency caching algorithm based on chunks especially when the network
topology is complex. In this paper, we propose a proportional cache size division
(PCSD) cache replacement algorithm based on the requests from different interfaces and
- 14 -
different video streams. PCSD splits a complex network topology into multiple simple
cascade topologies, and puts the most popular video chunks nearest to the video viewers
in each cascade topology. We evaluate the performance of PCSD on GEANT topology,
the simulation results show that the proposed algorithm yields a high average cache hit
ratio and low average hops.
K049
Cloud Tectonics : The Economics behind the Decline of Language Diversity in China
Time:13:30-13:45
Mr. Stephen P. Davis and Dr. David W. Marlow
Dongbei University of Finance and Economics, China
The world‟s languages are disappearing at an alarming rate. Scientists estimate that
around half of the world‟s languages will be moribund or extinct within the next century
along with the unique worldview conveyed through each. This paper explores the
underlying economic causes behind the decline in language diversity globally and in
China in particular. It further takes the position that attitudes and educational
prerogatives which more directly influence language change are typically themselves
preceded by economic conditions that ultimately drive and often predict the longevity
and character of languages. Commonly, as in many developing nations, the demand for a
common language to replace natural diversity has been driven primarily by urbanization,
an increase in global commercial activities, and government policies which favor the
efficiencies and opportunities of regional prestige language varieties. While
understandable, these strong tendencies toward monolingualism are often met with
apprehension and resistance as community members interpret the reduction of languages
and dialects as a significant loss of cognitive and cultural diversity. Finally the paper
explores the rationale and methods often employed for contextualizing, conceptualizing,
protecting, and preserving language diversity in China and elsewhere. Examples from a
variety of regions and nations are used in exploring how linguists, governments, and
community members might employ a variety of technologies and strategies in their
efforts to promote linguistic autonomy and diversity in China and abroad.
K026
Combined Heat and Power Economic Dispatch Using Differential Evolution
Time:13:45-14:00
Mr .YAFEI OUYANG, QUN NIU, YANG ZHANG
Shanghai University, China
In this paper, the different evolution (DE) algorithm is introduced to solve the combined
heat and power economic dispatch (CHPED) problem, a non-convex, non-linear and
non-different optimization problem under a number of constraints. DE is a simple yet
powerful algorithm which mainly adopts the mutation, crossover and selection operators,
and it can solve the CHPED problem easily. To confirm the superiority of DE, an
experiment on a power system with 24 units (14 conventional units, 7 CHP units and 3
pure heat units) is conducted, and the performance of DE is compared with other 8
intelligent algorithms. A parameter study with scaling factor F, crossover rate CR and
different mutation operators is performed to find the best operators. The experimental
results confirm the performance of the DE over other algorithms as a powerful
technology for optimization problems.
- 15 -
K039
Modeling and Simulation of Time-Division Multiplexing Navigation Satellite Network
based on OPNET
Time:14:00-14:15
Dr. Hongcheng Yan, Rui Zhang, Lin Li, Lianlian Zeng, Xianghui Wang, Jian Guo
Institute of spacecraft System Engineering, CAST, China
Due to the constraints of satellite platform and inter-satellite links, navigation satellite
network has a characteristic of time-division multiplexing. Since the information
exchange in time division-multiplexing navigation satellite network is very complex, it
is generally necessary to use network simulation software to evaluate the design of
navigation satellite network protocol. In this paper, the time-division multiplexing
navigation satellite network is modeled based on the OPNET network simulation
software. The satellite network is modeled from three levels: network domain, node
domain and process domain. Also, the process models of link layer, network layer and
transport layer are designed and described, respectively. Finally, the simulation results of
network throughput with regard to different sliding window sizes and packet drop rates
are given. It can be seen from the simulation results that the proposed simulation model
of time-division multiplexing navigation satellite network based on OPNET is sufficient
to evaluation the network performance.
K062
Beamforming with Enhanced CNN Network
Time:14:15-14:30
Mr. Shu Kai, Wang Yanteng and Guanghui Zhao
Xidian university, China
In this paper, by exploiting the inherent similarity among the generalized cross
correlation (GCC) pattern of the microphone arrays, a robust neural network for
beamforming is proposed. To reduce the complexity, one-dimensional convolutional
neutral network is taken into account to simplify the classification.More particularly,
taking GCC pattern as input,our network outputs an angle as a result of classification
task. In addtion, the technique of mean and variance normalization (MVN) is engaged to
further promote the efficiency. The experimental results show that, better estimation
performance can be obtained by the proposed CNN network than the DNN network.
K067
Interference alignment with Jacobian Eigenvalue
Time:14:30-14:45
Dr. Christian ango Mbom, James K.N.Nyarko, Ling Wang
Northwestern Polytechnical University, China
In this paper, we mix at each transmitter and receiver two cascaded matrix , the first
matrix is obtained after applying the Jacobian eigenvalue method , the second is the
Interference alignment (IA) method based on nuclear norm. The main idea of our
proposed method is to apply the interference alignment with the classic mathematical
method Jacobian eigenvalue in the K-user Multiple Input Multiple Output (MIMO)
system and cellular networks. The results show our proposed method has a better sum of
- 16 -
rate than the classic nuclear norm (without cascaded matrices) and in the case of K-user
MIMO system sum of rate outperforms than classic interference Alignment methods
(MaxSINR, Minimum Leakage).
K2002
Smartphone Sensor-Based Activity Recognition by Using Machine learning and Deep
Learning Algorithms
Time:14:45-15:00
Mr. Sarbagya Ratna Shakya, Prathyusha Uduthalapally, Qingzhong Liu, Zhaoxian
Zhou, Mengyu Qiao, Andrew H. Sung
University of Southern Mississippi, USA
Smartphones are widely used today, and it becomes possible to detect the user's
environmental changes by using the smartphone sensors, as demonstrated in this paper
where we propose a method to identify human activities with reasonably high accuracy
by using smartphone sensor data. First, the raw smartphone sensor data are collected
from two categories of human activity: motion-based, e.g., walking and running; and
phone movement-based, e.g., left-right, up-down, clockwise and counterclockwise
movement. Firstly, two types of features extraction are designed from the raw sensor
data, and activity recognition is analyzed using machine learning classification models
based on these features. Secondly, the activity recognition performance is analyzed
through the Convolutional Neural Network (CNN) model using only the raw data. Our
experiments show substantial improvement in the result with the addition of features and
the use of CNN model based on smartphone sensor data with judicious learning
techniques and good feature designs.
S3006 Community detection in complex networks using flow simulation
Time:15:00-15:15
Zheng Sun, Fuyou Miao, Yang Xu, Qiyu Shao, Weihua Wang,Xingfu Wang Assoc. Prof.
Chenxi Shao
University of Science and Technology of China, China
Community detection and analysis is an important part of studying the organization of
complex systems in real world, and it‟s extensively applied on many fields. Recently,
many of existing algorithms are not effective or the results are unstable. In this paper, a
new method of community testing is proposed by us based on the conception of flow
field. In our approach, each node is represented as a field source and has a tendency to
forward data to the connected nodes with highest field strength, after some iterations the
nodes with same data information form a community. It is evaluated by us for the
approach on some synthetic and real-world networks whose community structures are
known. It is demonstrated that the approach performs wellin effectiveness and
robustness.
- 17 -
K3009 Energy-efficient Fault-Localization Protocol for Wireless Sensor Networks
Time:15:15-15:30
Mr. Ather Saeed, John Rankin and Ali Syed
Centre for Informatics and Applied Optimization Federation University, Australia
Maintaining network connectivity for the reliable acquisition of data is crucial when
disseminating the sensed phenomena in wireless sensor networks. The use of GPS is
considered as the most reliable method when detecting the location of particular nodes
but it is extremely expensive when the sensor field is massively dense. Alternatively
researchers have designed methods like “Triangulation” where beacon nodes are used
for creating a reference point from the nearest neighbor for locating nodes of interest.
Such techniques rely on estimates where chances of errors are extremely high if there are
problems with the beacon node that is used for creating a reference point. Similarly,
techniques such as AoA (Angle of arrival), TDoA (Time difference of arrival) and RSSI
(Received signal strength indicator) and Trilateration etc. are designed specifically for
efficiently identifying the exact location of nodes, specifically when they are faulty.
Unfortunately these well designed solutions are computationally intensive and are not
suitable for real-time and mission-critical environments.
A novel Green‟s Theorem based fault-localization protocol has been investigated and
discussed in this paper that partitions the dense sensor network and forms clusters. Each
cluster has a cluster-head for disseminating datasets to the sink node. It is also assumed
that the network is partitioned such that the neighboring edges of the next cluster are
closer than their sensing radius, and the sensor nodes store RSSI values and disseminate
information about their battery levels and consumption rates. Experiments have been
performed for proactively monitoring network health and the mathematical formulation
of the problem has also been discussed for enhancing fault-tolerance and network
connectedness, which is crucial for prolonging network life. In other words this paper
investigates: (i) how to efficiently identify faulty nodes and pinpoint their exact location.
(ii) Dynamically partitioning the network for reliability and adaptability (iii) the
Mathematical formulation of the localization problem is discussed and investigated
using Green‟s Theorem from an analogy of Fluid Flow and the theory of Electrostatics
in Physics.
K3010 Fault-tolerant Self-stabilizing Protocol for Wireless Sensor Networks
Time:15:30-15:45
Mr. Ather Saeed, John Rankin and Ali Syed
Centre for Informatics and Applied Optimization Federation University, Australia
Node organization and network adaptability are considered as two important metrics for
the reliable acquisition and dissemination of datasets. In wireless sensor networks
maintaining energy-balance is a challenge when network is dense and disseminating the
sensed phenomena to the sink requires an efficient routing and network partitioning
scheme to achieve robustness for prolonging network life. This paper investigates the
effect of sudden node failures, network connectivity and dynamic fault-recovery for
improving fault-tolerance and also provides a novel fault-detection and recovery scheme
that self-stabilizes network for minimizing data losses in the mission-critical and
- 18 -
data-intensive environments. Experimental results show that the proposed SSRS
(Self-stabilizing Sliding Rectangle Scheme) has out-performed in terms of efficiently
detecting faults and stabilizing sensor networks with significantly low packets drop rate.
Such characteristics of SSRS protocol ensure reliable data acquisition, network
longevity and robustness that are crucial for prolonging sensor network life.
Mathematical formulation of our proposed Model is also provided to elaborate on how
the Green„s Theorem has been applied for dynamically localizing faults and
self-stabilizing network.
Coffee Break 15:45PM-16:05PM
- 19 -
Afternoon, Dec. 9th, 2017
Session 2< Information System Security and Management >
Venue: 5F/ Conference Room 3
Chair:
Time: 16:05pm-19:05pm
Note:
* The certification of Oral/Poster presentations, listeners, will be awarded at the end of each session.
* For the Best Presentation of each session, it is encouraged to award to student author preferentially.
*To show the respect to other authors, especially to encourage the student authors, we strongly suggest you
attend the whole session, the scheduled time for presentations might be changed due to unexpected situations,
please come as early as you could.
*Session Photo will be taken at the end of the session.
K021
Trustworthiness in Fog: A Fuzzy Approach
Time:16:05-16:20
Fatin Hamada_Rahman, Dr. Au Thien Wan, S.H. Shah Newaz, and Wida Susanty Suhaili
Unniversiti Teknologi, Brunei
Trust management issue in cloud domain has been a persistent research topic discussed among
scholars. Similar issue is bound to occur in the surfacing fog domain. Although fog and cloud
are relatively similar, evaluating trust in fog domain is more challenging than in cloud. Fog‟s
high mobility support, distributive nature, and closer distance to end user means that they are
likely to operate in vulnerable environments. Unlike cloud, fog has little to no human
intervention, and lack of redundancy. Hence, it could experience downtime at any given time.
Thus it is harder to trust fogs given their unpredictable status. These distinguishing factors,
combined with the existing factors used for trust evaluation in cloud can be used as metrics to
evaluate trust in fog. This paper discusses a use case of a campus scenario with several fog
servers, and the metrics used in evaluating the trustworthiness of the fog servers. While fuzzy
logic method is used to evaluate the trust, the contribution of this study is the identification of
fuzzy logic configurations that could alter the trust value of a fog.
K027
A Comparative Study of Data Skew in Hadoop
Time:16:20-16:35
Majun He, Guozhong Li, Chaojie Huang, Yufei Ye, Prof. Wenhong Tian
University of Electronic Science and Technology of China, China
MapReduce which has been a well-known programming model processes numerous raw data
in large scale clusters. However, great challenges have been brought to MapReduce
programming model while routinely handling the big data. To mitigate the process time of the
clusters through minimizing the makespan is one of the key challenges. For now, (data) skew
is partly responsible for that and there are some methods presented by research teams from
different perspectives. In order to fully understand and utilize the state-of-the-art of data skew
problem, in this paper, we compare six algorithms: Hadoop default (speculative execution),
SkewReduce, SkewTune, iShuffle, LEEN and LIBRA. They are compared in terms of
- 20 -
architecture and main features, core algorithms, performance metrics and evaluation methods.
Finally, a few challenging problems as future research trends are summarized.
K034
Self-Adaptive Consolidation of Virtual Machines For Energy-Efficiency in the Cloud
Wenxia Guo, Xiaoqin Ren, Prof. Wenhong Tian, Srikumar Venugopal
Time:16:35-16:50
University of Electronic Science and Technology of China, China
In virtualized data centers, consolidation of Virtual Machines (VMs) on minimizing the
number of total physical machines (PMs) has been recognized as a very ecient approach. This
paper considers the energy-ecient consolidation of VMs in a Cloud Data center. Concentrating
on CPU-intensive applications, the objective is to schedule all requests non-preemptively,
subjecting to constraints of PM capacities and running time interval spans, such that the total
energy consumption of all PMs is minimized (called MinTE for abbreviation). The MinTE
problem is NP-complete in general. We propose a self-adaptive approached called SAVE. The
approach makes decisions of the assignment and migration of VMs by probabilistic processes
and is based exclusively on local information, therefore it is very simple to implement. Both
simulation and real environment test show that our proposed method SAVE can reduce energy
consumption about 30% against VMWare DRS and 10-20% against EcoCloud on average.
K037
Hybrid RRT/DE algorithm for High performance UCAV path planning
Time:16:50-17:05
Fathy S. Elkazzaz, Mohammed A. H. Abozied, Mr. Chunming Hu
Beihang University, China
Path planning is an optimization problem that is crucial for robot or UCAV. Among the
optimization approaches, we focus in this paper on a new hybrid modified Rapidly Exploring
Random Tree algorithm (RRTs) and Differential Evolution (DE), for solving the optimization
path planning problem to generate a fast and optimal 3D collision-free path under complex
environment. We demonstrate the proposed algorithm performance through comparative
analysis with Improved Bat algorithm (IBA). The results demonstrated the robustness and
effectiveness of the proposed algorithm for generating an optimal free collision path in a short
time, which is suitable for the UCAV applications.
K038
CNN-based Commercial Detection in TV Broadcasting
Time:17:05-17:20
Mr. Mengyue Li, Yuchun Guo, Yishuai Chen
Beijing Jiaotong University, China
TV is an important advertising media. Information of a piece of TV commercial, such as
broadcasting time, the duration, the casting and etc., may reflect the business value of the host
company of this commercial. An automatic commercial detection system is needed for
third-party by business analysis. Previous works about TV commercial detection just apply to
one kind of video, like news, sports. And those methods detect commercials at frame level,
which need expensive computing cost. In this paper, we design and implement an automatic
commercial detection system for TV broadcasting. This system works at shot level and detects
- 21 -
commercials in streaming videos, including TV broadcasting and online videos. It consists of
two modules, the shot boundary detection module and the shot classification module. We
crawl actual broadcasting videos and split them into shots, classify these shots into two
classes, commercial and non-commercial. Then, we extract shot features with deep
convolutional neural network, and train a support vector machine classifier to complete shot
classification. Combining the state-of-the-art convolutional neural network with traditional
machine learning techniques, our system can handle various program types and indiscernible
commercials, and get precision 93% and recall 95% in realistic TV programs. Except the TV
broadcasting, our system works in other video media like online videos.
K051
Performance Study of Neural Network and ANFIS Based MPPT Methods For Grid Connected
PV System
Time:17:20-17:35
Mr. Mohammad Abu Sarhan, Ding Min, Chen Xin, and Wu Min
China University of Geosciences , China
The maximum power point tracking (MPPT) methods are applied in PV solar systems to
accomplish the desired maximum power from the PV system. Hence, it is important to design
the best technique which can reach the maximum power point (MPP) effectively. In this paper,
a grid connected PV system is controlled by artificial neural network (ANN) and adaptive
neuro-fuzzy system (ANFIS) based MPPT methods. Both of proposed MPPT methods are
analyzed related to their performance efficiency and response under the variation of solar
irradiation and cell temperature. The obtained results of both methods are compared to
experimental results which show that ANFIS has more response and efficiency than ANN in
maximum power point tracking. The investigation has been done by using
MATLAB/Simulink Environment.
K059
Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme
and Untrusted Servers
Time:17:35-17:50
Mr. Meng Li and Yasushi Shinjo
University of Tsukuba, Japan
Conventional mobile applications are built based on a client-server modal and require central
servers for storing shared data and processing confidential information. If the central servers
are accessed by an attacker, a curious administrator or a government, private information will
be revealed because data is often stored on the central servers in the form of cleartext. This
paper presents Grouper, a framework for developing mobile applications without trusted
central servers. Grouper provides object synchronization among mobile devices. It also uses a
secret sharing scheme to create several shares from a marshalled object and uploads these
shares to multiple untrusted servers. These untrusted servers construct a selfdestruction
system. Uploaded shares will be deleted after a certain period of time. Mobile devices
exchange messages via untrusted servers based on the GrouperMessage Protocol. Grouper
consists of a client framework and a Web service. We have implemented client framework for
iOS, macOS, tvOS and watchOS in Objective-C. The Web service is implemented in Java and
runs on multiple untrusted servers. We have implemented two applications using Grouper: an
- 22 -
iOS application named Account Book, and a benchmark application named Test. We have
evaluated the development efforts of applications using Grouper as well as the performance.
Developing these applications demonstrates that Grouper requires little development effort to
convert a standalone application to a data sharing application. Experimental results prove that
the performance of Grouper is satisfactory for mobile applications that are used among a small
group of people.
K066
Forecast Method of Short - term Passenger Flow on Urban Rail Transit
Time:17:50-18:05
Ms. Ling Guo and Yue Yuan
Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences,
China
Due to the greater randomness of short-term passenger flow forecasting, the current passenger
flow forecasting method for short-term urban rail transit has a large error for predicting traffic
with complex changes. Aiming at the shortcomings of forecasting accuracy of short-term
urban rail transit traffic forecasting method, this paper adopts a more adaptable vehicle traffic
forecasting method for urban rail transit line sites - based on genetic optimization particle
filter, to improve the accuracy of short-term traffic forecast for passenger flow monitoring and
emergency management, intelligent travel planning to provide decision-making basis.
K070
A Case Study of Detecting and Characterizing Large-Scale Prefix Hijackings in the Internet
Time:18:05-18:20
Dr. Yujing Liu, Dr. Zhilin Wang and Nan Li
National University of Defense Technology, China
BGP prefix hijacking is a major threat to the Internet. Detecting and characterizing large-scale
prefix hijacking events is very important, yet quite difficult in practical. In this paper, we take
the Google hijacking event on 2017 as a study case to develop effective detecting and
characterizing mechanisms by using publicly available BGP data. The analysis result reveals
key insights about the event. Firstly, the types of this event consist of hijacking a prefix and its
AS, as well as hijacking a sub-prefix and its AS. Secondly, more than 160,000 prefixes
belonging to over 7,200 ASes are hijacked. The largest service provider in Japan is the worst
impacted AS. Thirdly, over 200 ASes are infected. AS701 is a critical infector in the
propagation of hijacking routes. Finally, sub-prefix hijacking is more impactful than original
prefix hijacking in terms of polluting more infectors. Such results shed light on how to deploy
efficient defense mechanisms against prefix hijacking attacks.
K1002
PFESG: Permission-based Android Malware Feature Extraction Algorithm
Time:18:20-18:35
Mr. Chengcheng Wang and Yuqing Lan
Beihang University, China
Being open source and portable, Android has become a mobile operating system with the
highest market share. Due to the open market and loose review mechanisms, malware has
emerged in an endless stream, which makes malware detection a research emphasis in the field
- 23 -
of mobile security in recent years. Since feature description of malware is an important factor
that influences malware detection, this paper proposes a malware feature extraction method
based on Android permission mechanisms, namely PFESG. PFESG merely uses permissions
with high utilization, which avoids over-fitting of classification models and quantifies each
permission‟s ability to identify malware. By virtue of extensive specimen and comparison
experiments, the paper verifies that PFESG can effectively extract features of malware and
significantly reduce model-training time. What‟s more, it has higher generalization
capabilities.
K3005
Weighted Least Squares Twin Large Margin Distribution machine
Time:18:35-18:50
Prof. Wu Qing, Qi Shaowei, Sun Kaiyue_
Xi‟an University of Posts and Telecommunications, China
In order to improve training efficiency and generalization performance of twin support vector
machine, a weighted least squares twin large margin distribution machine is proposed. In our
approach, equality constraint technique is used to improve the training speed. The structural
risk minimization principle is implemented by introducing a regularization term to improve
classification accuracy. In addition, different weights are put on the error variables in order to
eliminate the impact of noise data. The experimental results show that the proposed algorithm
has better classification performance in testing accuracy and efficiency.
K3011
A New Method for Evaluating Air Traffic Control Safety
Time:18:50-19:05
Mr. Wang Qinghao and Yao Dengkai
Air Force Engineering University, China
This paper presents a fuzzy Petri net method to assess the risk of air traffic control. Firstly, the
research status of the method of air traffic safety and safety risk assessment are analyzed.
Secondly, we construct a targeted risk system that can objectively reflect the safety risk of air
traffic control. Thirdly, an improved fuzzy Petri net method is introduced for the ambiguity
and uncertainty of the air traffic safety risk assessment. We employ the concept of risk level
threshold to improve the reasoning efficiency and reduce the computational complexity. And
we give the specific steps of the algorithm. Finally, the article takes an example in order to
verify the feasibility and effectiveness of the improved fuzzy Petri net method on the safety
risk assessment of air traffic control.
- 24 -
Poster Session
Note:
* The certificates of poster presentations will be issued at the registration day, and the certificates need to be
signed by session chair at the end of session.
S005
CNN-Webshell: Malicious Web Shell Detection with Convolutional Neural Network
Mr. Yifan Tian, Jiabao Wang, Zhenji Zhou, Shengli Zhou
Army Engineering University, China
Malicious web shell detection is one of the most important methods for protecting the network
security. Most state of the art methods are based on malicious keywords matching, where the
keywords are usually defined by the domain experts. So its effect depends on the domain
experts and it is hard to detect new type of malicious web shells. This paper proposed a new
malicious web shell detection approach based on „word2vec‟representation and convolutional
neural network (CNN). Firstly, each word, separated from the HTTP requests, is represented
as a vector by using the „word2vec‟ tool. Next, a web request can be represented as a
size-fixed matrix. Finally, a CNN-based model is designed to classify the malicious web shells
and the normal ones. Experimental results showed that this approach achieves the best
performance, comparing with several other classification methods. To the best of our
knowledge, this is the first time that CNN has been applied to malicious web shell detection.
S010
Multiple Bloom filters
Mr. Yuanhang Yang and Shuhui Chen
National University of Defense Technology, China
A standard technique from the cryptanalysis is to use exhaustive search that consists of
systematically enumerating all possible candidates for the solution and checking whether each
candidate satisfies the hash value. But this will take a lot of storage space and the time spent
on query will be very long. In this paper, we introduce multiple Bloom filter, which improves
performance when the password is attacked by brute-force or dictionary. Bloom filters can be
used represent the password dictionary, which requires less storage space and searching time.
For example, Bloom filters have been suggested as a mean for searching keywords in a huge
database. In this setting, users do not search the whole of keywords, but instead query the
table of a Bloom filter that represents the full set of keyword. Our goal is to recover the
passwords from hash values that have been stored in or transmitted by a computer system. By
using Bloom filters, we can just query a Bloom filter table instead of gigabyte dictionaries,
correspondingly, the time spent on searching becomes much fewer.
K010 A Dynamic Convergent Replication Strategy Based on Distributed Hierarchical Systems
Mr. Pu Zhao, Jingtao Shang, Xin Sun, Jianjun Lin , Bo Li
China North Vehicle research Institute, China
Data replication strategies have been used to increase data access efficiency in P2P
systems. This paper studies the replica selection strategy and replication strategy. By
- 25 -
concerning real-time bandwidth, performance of the peer, and replica‟s history request,
following the principle that high valued replica has high proportionality to be select, a
proportional matching based self-convergent replica selection strategy(PMC) is presented.
By concerning the access frequency, the status of the network connection and average
response time, and implementing replication only if the logic replica is a popular and
scarce one, a hot-estimation based ECO replication strategy (HOT_ECO) is presented in
this paper. The strategies avoid leading to high overhead for unnecessary file replications
and consistency maintenance in case of updates while replicating. The simulation results
show that the optimal selection and replication strategy offers better performance by
shortening the response time with fewer replicas.
K060
Robust Topology Design in Time-Evolving and Predictable Spacecraft Network with
Node Efficiency
Dr. Dawei Yan, Cong Liu, Peng You, Shaowei Yong
National University of Defense Technology, China
In spacecraft network, each nodes move in a predictable trajectory and the communication
opportunities between them are often very short, therefore, network topology changes
frequent and predictable. However, with the expansion of spacecraft network, how to
maintain efficient and dynamic topology becomes increasingly crucial. In this paper, the
topology design problem is studied in a spacecraft network where the dynamic topology
and node efficiency can be predicted. First, a directed space-time graph that includes both
spatial and temporal information is modeled for the spacecraft network. In order to reduce
the impact of node congestion on the network performance, a new robust topology design
problem which aims to balance the network load and minimize the total cost of the sparse
structure while still maintaining the network connectivity over time is proposed. Second,
two topology design algorithms which can significantly reduce the total cost of topology
and maintain a space-time path connecting with robustness higher than the required
threshold are proposed for this optimization problem. Finally, simulations results from
random time-evolving and predicted spacecraft network demonstrate the efficiency of the
proposed methods.
K061
The Synthesis of Multi-Graphic Visual Encryption Technology
Ms Jianle Zhu, Peng Cao, Fangfang Chen, Xuan Wang and Peijun Huo
Beijing Institute of Graphic Communication, China
Visual encryption is a widely used in the field of security and information hiding
technology. The visual effect of information extraction and the non-visual effect
embedding are the key factors that reflect the level of this technology, especially the
multiple image information hidden in the same image, the technical requirements for its
higher. This paper presents a method of combining moire fringe amplification based on
binary phase modulation (2PSK) and multi-angle grating, in order to realize the visual
encryption of multiple image information implantation. Using the same frequency grating
as decoder, this technique can effectively solve the problem of combining the invisible
effect of information hiding and the visual effect of extracting information.This
technology has the advantages of large information capacity, good hiding effect and strong
anti-replication performance, which can be widely used in packaging printing and
- 26 -
copyright protection of books, and to provide value-added services while piracy
infringement.
K2001
The impact of target near-field scattering on missile communication operations
Mr. YUAN Jun-chao, ZHANG Xiao-kuan, SUN Ming-cai, Liu Mao
Air and Missile Defense College of Air Force Engineering University, China
The communication between fuze of missile and warhead is the key to the effectiveness of
missile attacking target. The near-field scattering characteristic of target is an important
factor influencing the communication of detonation command. In this paper, the near-field
radar cross section (RCS) sequence of target under different encounter conditions is
calculated. Then, by establishing the model of detonation communication of fuze, the
operational efficiency of the fuze command communication under different encounter
conditions is simulated. According to the analysis of results, the intensity of near-field
RCS has direct influence on fuze communication. Severely, warhead may explore early or
late.
K3014 314 Meter Distributed Fiber Sensing using Brillouin Optical Correlation Domain Analysis
(BOCDA)with 3 Meter Resolution
Yu-Chien Chou, Cheng-Hsiung Lee, Guan-Hong Chen, Nobuo Goto,Chi-Wen. Liao,
Yu-Lin Shen, Zheng-Kuan Lee, Chow-Shing Shin and Shien-Kuei Liaw*
National Taiwan University of Science and Technology, Taiwan
In this paper, a distributed fiber sensing system based on Stimulated Brillouin scattering
(SBS) effect is experimentally studied. Using Brillouin optical correlation domain
analysis, the spatial resolution was affected by the reference frequency and the sideband
component suppressed in the probe. The lower side band and the central wavelength was
filtered by a fiber Bragg grating (FBG). We successfully achieved the measurement range
314 m with 3 m spatial resolution.
K3015 Water Two-Parameter Measurement Based on Fiber Bragg Grating Sensing
Yi-Lin Yu, Hzu-Hsuan Hung, Guan-Hong Chen, Hiroki Kishikawa, Chi-Wen. Liao, Chun
Chung Chen, Min-Hsiung Shih, Yu-Lin Shen, Shien-Kuei Liaw*
National Taiwan University of Science and Technology, Taiwan
We proposed and demonstrated a complex sensor which combined a tilted fiber Bragg
grating and a long period fiber grating. We used this sensor to measure the surrounding
refractive index and temperature of an unknown liquid. The measured range of the
temperature and environmental refractive index were 30~70 oC and 1.33~1.4,
respectively. The measured results have linearly trend with high sensitivity.
- 27 -
Listener
Note:
* The certificates of listeners will be issued at the registration day, and the certificates need to be signed by
session chair at the end of session.
L001
Dr. Luyao Wang
Beijing University of Technology, China
- 28 -
Name ID Session Page
A
Ather Saeed K3009 S1 16
Ather Saeed K3010 S1 17
Au Thien Wan K021 S2 19
C
Christian ango Mbom K067 S1 15
Chenxi Shao S3006 S1 16
Chunming Hu K037 S2 20
Chengcheng Wang K1002 S2 22
D
Dawei Yan K060 Poster 25
J
Jianle Zhu K061 Poster 25
L
Ling Guo K066 S2 22
Luyao Wang L001 Listener 24
M
Mengyue Li
Mohammad Abu
Sarhan
K038
K051
S2
S2
20
21
Name ID Session Page
Meng Li K059 S2 21
P
Pu Zhao K010 Poster 24
S
Shu Kai K062 S1 15
Sarbagya Ratna
Shakya K2002 S1 16
Stephen P. Davis K049 S1 14
W
Wenfei Xie K007 S1 13
Wenhong Tian K027 S2 19
Wenhong Tian K034 S2 20
Wu Qing K3005 S2 23
Wang Qinghao K3011 S2 23
Y
Yuanzun Zhang K014 S1 13
Jian Wang K022 S1 14
Yujing Liu K070 S2 22
Yifan Tian S005 Poster 24
Yuanhang Yang S010 Poster 24
YUAN Jun-chao K2001 Poster 24
Yafei Ouyang K026 S1 14
Z
Zhilin Wang K070 S2 22
As one of China’s most diversified provinces, Yunnan is certainly one of China’s most alluring destinations.
Yunnan is home to more than one third of China’s ethnic minorities and over half of the country’s plant and
animal species. The province is blessed by its mixture of traditional folk cultures as well as breath-taking
scenery. Kunming, Yunnan’s capital, resides at an elevation of 1890m and boasts a milder climate than most
other Chinese cities. Celebrated as the "Spring City," Kunming has neither severe winters nor extremely
hot summers and can be visited at any time of the year.
昆明,享“春城”之美誉,云南省省会,中国面向东南亚、南亚开放的门户城市,国家历史文化名城,我国重要的旅游、商贸城市,西
部地区重要的中心城市之一。昆明地处云贵高原中部,北与凉山彝族自治州相连,西南与玉溪市、东南与红河哈尼族彝族自治州毗邻,
西与楚雄彝族自治州接壤,东与曲靖市交界,是滇中城市群的核心圈、亚洲 5 小时航空圈的中心,国家一级物流园区布局城市之一。
昆明市为山原地貌。地势大致北高南低,多溶洞和溶岩地貌,溶岩盆地有石林坝子。属北亚热带低纬高原山地季风气候。年平均气温
16.5℃,气候宜人。
Visit Schedule
07:40:Get on the bus from Grand Park Hotel Kunming
昆明君乐酒店出发
09:00:Arrive at Stone Forest
到达石林,游玩 3 小时左右
12:00:Lunch Time
午餐
14:00:Arrive at Jiuxiang
到达九乡风景区,游玩 3 小时左右
19:00:Arrive at Kunming Railway Station and end the visit
到达昆明火车站,游客自行解散
Notice:
Fee: RMB450/person (including bus fare, main
scenic spot tickets, lunch, insurance and guide
service fee)
费用:450 人民币/人 (包含车费、大小石林门票,午餐,
九乡门票及索道,导游费)
Payment Deadline: Dec. 1st, 2017
一日游注册截止日: 2017 年 12 月 1 日
One-day Visit 2017.12.10
- 29 -
Stone Forest
Stone Forest Lake
石林湖
Sword Peak Pond
剑峰池
Wangfeng Pavilion
望峰亭
The Stone Forest lies about 80 miles to the southeast of Kunming. A geological
phenomenon, the Stone Forest was a vast expanse of sea during the Paleozoic era---some
270 million years ago. Later the movement of tectonic plates altered the earth’s crust,
causing the sea to recede and its limestone bottom to appear, thereby forming land. Due to
the constant rain through the cracks in the limestone, some of the stone formation dissolved
and the fissures broadened, producing a group of great sculpture of different shapes, all
molded by nature.
石林具有世界上最奇特的喀斯特地貌,这里在约 3 亿年前还是一片海,经过漫长的地质演变,终于形成了现今极
为珍贵的地质遗迹。景区是一座名副其实的由岩石组成的“森林”,穿行其间,但见怪石林立,突兀峥嵘,姿态
各异。壁峰之间,翠蔓挂石,金竹挺秀,山花香溢,灵禽和鸣,一派生机盎然。石林以其无与伦比的天造奇观吸
引着海内外无数游客。
- 30 -
Jiuxiang Garst Scenic Region
Yincui Valley
荫翠峡
Jiuxiang is a state class scenic spot, 90 kilometer from Kunming city or 22 kilometers north
from the Stone Forest. Jiuxiang mainly features karst caves, fused with natural landscapes and
human sights and national customs and conventions.Here are nearly 100 large and small karst
caves, one of the largest cave groups in China. It is dubbed as a cave museum for its complete
range and styles.
九乡是国家重点风景名胜区、是云南省新兴的以溶洞景观为主、溶洞外自然风光、人文景观、民族风情为一体的综合性
风景名胜区。九乡位于宜良县九乡彝族回族自治乡境内,这里气候温和,年平均气温 14.6˚C,冬无严寒、夏无酷暑,气
温与昆明市区相当。与石林景区共同形成“地上看石林,地下游九乡”的喀斯特立体景观。九乡拥有上百座大小溶洞,为
国内觃模最大、数量最多的洞穴群落体系之一。
Lovers’ Waterfalls
雌雄双瀑
The Mysterious Land
麦田河神田
Goddess Cave
神女宫
- 31 -
- 32 -
MEMO
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
- 33 -
MEMO
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________
________________________________________