icsta 2016

26
Computer Science, Technology and Application Downloaded from www.worldscientific.com by ZHEJIANG UNIVERSITY on 01/04/17. For personal use only.

Upload: imran-memon

Post on 14-Apr-2017

20 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: icsta 2016

10290_9789813200432_tp.indd 1 30/8/16 11:45 AM

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 2: icsta 2016

b2530 International Strategic Relations and China’s National Security: World at the Crossroads

b2530_FM.indd 6 01-Sep-16 11:03:06 AM

This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 3: icsta 2016

10290_9789813200432_tp.indd 2 30/8/16 11:45 AM

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 4: icsta 2016

Published by

World Scientific Publishing Co. Pte. Ltd.5 Toh Tuck Link, Singapore 596224USA office: 27 Warren Street, Suite 401-402, Hackensack, NJ 07601UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE

British Library Cataloguing-in-Publication DataA catalogue record for this book is available from the British Library.

COMPUTER SCIENCE, TECHNOLOGY AND APPLICATIONProceedings of the 2016 Joint International Conference on Computer Science, Technology and Application (CSTA2016)

Copyright © 2017 by World Scientific Publishing Co. Pte. Ltd.

All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the publisher.

For photocopying of material in this volume, please pay a copying fee through the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA. In this case permission to photocopy is not required from the publisher.

ISBN 978-981-3200-43-2

Printed in Singapore

Xiran - Computer Science, Technology and Application.indd 1 29-08-16 10:14:38 AM

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 5: icsta 2016

v

Preface

The 2016 International Conference on Computer Science, Technology and Application (CSTA2016) have been successfully held in Changsha, China during March 18-20, 2016. The main objective of this conference is to provide a platform for scientists, researchers, and engineers from different part of the world to get together under one roof to discuss, present and share their research findings and results in the development in computing technology and its application.

CSTA2016 received over more than 150 submissions, but only 67 articles are included in this proceedings after a rigorous process of double peer review. The proceedings is organized into 5 specialize areas, which include image and signal processing, computer network and information security, algorithm and simulation, data mining and cloud computing, computer system and applications.

Finally, we would like to take this opportunity to express our sincere gratitude to all members of the conference committee and reviewers for their effort and comments on articles under their

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 6: icsta 2016

 

vi  

review. Without them, we would not able to pull out this proceedings so quickly after our conference.

Guest Editor Dr. Xing Zhang (Wuhan University) On behalf of the CSTA2016 Organizing Committee Changsha, China

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 7: icsta 2016

 

vii  

CSTA2016 Committees

General Chair

Bing-Lan Shui Ph.D., Hubei Engineering University, China

Co-Chair

Xiao-Shan Ma Ph.D., Yangzhou University, China

Technical Program Committee

Huai-Qiu Zhu Professor, Department of Biomedical Engineering, College of Engineering, Peking University,China Jie Zhu Professor, School of Information, Beijing Wuzi University, China Bao-lin Sun Professor, Computer Science and Technology, Hubei University of Economics, Hubei, China Hong-Zhi Fu Professor, College of Physics and Electronic Information, Luoyang Normal College, Luoyang, P. R. China

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 8: icsta 2016

 

viii  

Kai-Qi Zou, Professor, Dalian University, China Jin-Xing Shen, Ph.D. School of Computer Science, Guangdong Polytechnic Normal University, China Deng Wu Professor, Dalian Jiaotong University, China Xue-Qian Fang Professor, Shijiazhuang Tiedao University, China Bo Sun Professor, The International Outsourcing Research Institute of Guangdong University of Foreign Languages, China Yan Cheng Professor, Jiangxi Normal University, China Ph.D. Hanri Cao, Donghua University, China Qian-Liu Li Ph.D., Wenzhou University, China Heng-Qing Cang Ph.D., Hohai University, China Xiu Xu Ph.D., Shanghai Dian Ji University, China

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 9: icsta 2016

 

ix  

Lv-Ben Wu Ph.D., North China Institute of Aerospace Engineering, China Zi-Chen Ning Ph.D., North China University of Technology, China Qiao Yuan Ph.D., Shanxidatong University, China Zheng-Hai Zhang Ph.D., Changchun University of Science and Technology, China Jia-Ding Feng Ph.D., Shandong Agricultural University, China Dong-Xuan Cui Ph.D., Changchun University of Science and Technology, China Ning Wan Ph.D., Northeast Agricultural University, China Fanchou Wu Ph.D., Shanghai University of Electric Power, China Qin Zheng Ph.D., North University of China, China Zhi-Hui Sun Ph.D., Polytechnic School of Shenyang Ligong University, China

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 10: icsta 2016

 

x  

Kun-Hao Zhou Ph.D., Taiyuan Institute of Technology, China Xue-Qing Wang Ph.D., North China Institute of Aerospace Engineering, China Lin-Shan Fang Ph.D., Beijing Institute of Technology, China Mu He Ph.D., Northeast Agricultural University, China Chu-Wei Ren Ph.D., Hubei Engineering University, China De Yan Ph.D., North University of China, China Man-Di Zhao Ph.D., Inner Mongolia Normal University, China Xia-Rong Yin Ph.D., Wuhan Business University, China Rong-Xing Bao Ph.D., Shanghai University of Electric Power, China Di-Zhu Le Ph.D., Yantai University, China

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 11: icsta 2016

 

xi  

Yun-Yao Liu Ph.D., Liaocheng University, China Muhammad Naufal Bin Mansor Ph.D., Universiti Malaysia Perlis, Malaysia Mohd Helmy Abd Wahab Ph.D., Universiti Tun Hussein Onn Malaysia, Malaysia Imran Memon, PhD. Zhejiang University, Computer Engineering, China

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Memon
Highlight
Page 12: icsta 2016

b2530 International Strategic Relations and China’s National Security: World at the Crossroads

b2530_FM.indd 6 01-Sep-16 11:03:06 AM

This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 13: icsta 2016

 

xiii

KEYNOTE SPEECH

Name: Prof. Huaiqiu Zhu Department of Biomedical Engineering, College of Engineering, Peking University, China

Prof. Zhu's research interests include the computational methods and tools in bioinformatics based on the genome and genomic sequences, and protein sequences and structures. Recently Prof. Zhu and his lab are focusing on the problems of metagenomics issues driven by human health and environments, and data mining in medicine informatics. In the post-genome era, especially with the next generation sequencing (NGS) technologies, it is the great mission for bioinformatics to carry out the data intensive computation and analysis to meet the needs of high-throughput genomic data. Since 2004 Zhu's lab has addressed to the bioinformatics methods of genome analysis and annotation, and developed a series of methods of microbial gene prediction, genome comparison, and protein molecular dynamics. Since 2009, Prof. Zhu developed the tools such as sequence assembly, gene prediction and microbial community comparison for metagenomic sequence produced by NGS. Most of these methods and tools were demonstrated with leading performances in the field, and they have been applied in several genome projects and were incited or highlighted by Cell and Nature etc. Currently, the lab has close collaborations with Gastroenterology lab and Critical Care Medicine lab of Peking University Third Hospital in Beijing, and BME lab of GaTech, and Bioengineering lab of UIUC in USA.

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 14: icsta 2016

 

xiv

KEYNOTE SPEECH

Name: Dr. Amol R. Madane Video Security experts, TCS, Pune, India Dr. Amol R. Madane has completed Doctorate of Philosophy (Ph.D.) under the guidance of Dr. Uttam D. Kolekar in Image/ Video Security area in May 2015. He holds Masters of Engineering degree in Electronics Engineering from Mumbai University, India. He is an associate of Tata Consultancy Services Ltd. from last 9+ years. His main area of research is Digital Image Processing, Digital Video Processing and Digital Signal Processing. He has published various research papers in international conferences and journals. He is “editor in chief” of various international journals. Recently, he has published book titled “Design and Performance Evaluation of Image Encoder in View of 4G Applications” by Lulu book publication, Raleigh, United States. He is member of professional institutes such as IEEE, IETE, ISTE, IEI, ISTD, CSI, ACM etc.

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 15: icsta 2016

 

xv

KEYNOTE SPEECH

Name: Prof. Yan Cheng Professor, Jiangxi Normal University, China Yan Cheng holds a Bachelor's degree, Master's degree and Ph.D. degrees from Tongji University in Shanghai and won Guanghua Ph.D. scholarship, national doctoral academic best paper award. From July 2013 to March 2014, she went to the California University as a visiting scholar. Currently she is a professor in Jiangxi Normal University. Currently she is the leader of national NSFC (Natural Science Foundation of China) Plan Project and more than Provincial projects. She also has undertaken provincial key projects, one Key Projects of Science and Technology in Jiangxi Province, One Jiangxi science and technology support project (the Areas of Social Development), one Natural Science Fund Projects in Jiangxi Province, one Provincial Science and Technology Support Project (Industry) and many Social Sciences Planning Projects. She published academic monograph (Beijing, Science Press, 2014) on educational data mining, computer professional teaching materials. C

ompu

ter

Scie

nce,

Tec

hnol

ogy

and

App

licat

ion

Dow

nloa

ded

from

ww

w.w

orld

scie

ntif

ic.c

omby

ZH

EJI

AN

G U

NIV

ER

SIT

Y o

n 01

/04/

17. F

or p

erso

nal u

se o

nly.

Page 16: icsta 2016

b2530 International Strategic Relations and China’s National Security: World at the Crossroads

b2530_FM.indd 6 01-Sep-16 11:03:06 AM

This page intentionally left blankThis page intentionally left blankThis page intentionally left blankThis page intentionally left blank

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 17: icsta 2016

xvii

Contents Preface v Committees vii

Keynote Speech xiii

Chapter 1 Image and Signal Processing 1

Image denoising based on a new thresholding function ................... 3 Jun-Ke Kou and Yan-Ling Fu Age estimation based on image feature fusion method .................... 9 Lei Wang and Qing Zhu The intelligent video surveillance and recognition system based on summarization video .................................................................. 15 Wan-Jia Qu, Zhong-Lin Xu and Yu-Wei Yuan A smart video surveillance system based on moving target recognition ...................................................................................... 22 Wan-Jia Qu, Zhong-Lin Xu and Yu-Wei Yuan Design of MUAV target recognition system based on binary descriptor of Brisk ........................................................................... 28 Ya-Wei Liu and Xiao-Min Li

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 18: icsta 2016

xviii

Time difference based highly accurate anemometer: architecture and practice ...................................................................................... 35 Li-Wei Zhang, Ying Yao, Long Xiao and Shi-Bo Yin A three-layer framework for correlated multi-label classification with respect of package recommendation ....................................... 43 Jing-Kang Yang, Jie Shi, Rui Xuan, Regina Wang, Zhao-Jing Zhang and Liang Dong Applying improved split Bregman method to fluorescence microscopic image restoration ......................................................... 54 Chang-Chun Zhang, Yu Wang and Hong-Bing Xiao A new image enhancement method based on high-dimensional information geometry ...................................................................... 61 Jun-An Wu and Wen-Ming Cao Interactive rendering of approximate soft shadows using ray tracing with visibility filtering ......................................................... 68 Chun-Yi Chen, Hua-Min Yang and Hua Li Design of global cooperative signaling system for train control ..... 75 Wan-Ting Zhao, Xiang-Xian Chen, Zhu-Jun Ling, Zhen-Peng Nie, Wen-Bin Tang, Guo-Dong Teng and Lan-Qing Hu The liver nonstandard segment based on relationship of vascular blood supply .................................................................................... 84 Yuan Gao and Ke Tan

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 19: icsta 2016

xix

Image content authentication algorithm based on finite ridgelet transform .......................................................................................... 91 Rui-Ling Zhu and Zhuo-Ran Han An resolution impact analysis for the catadioptric system ............. 100 Mai Jiang, Ming-Ming Qiao and Li-Min Zhang Design of a colored QR code adaptive to logo contour .................. 106 Dong Li and Hong-An Xie Detection of imagined and actual hand movements with EEG signals ............................................................................................. 113 Miguel Contreras, Javier Suárez and Xiao-Hua Yu Target detection and tracking based on embedded multicore DSP system ..................................................................................... 119 Hao Chen, Hong Zhang, Yi-Fan Yang, Lei Zhang and Yue-Ren Wang Dynamic properties and modified projective synchronization of two four-scroll hyperchaotic systems with non-identical fractional orders .............................................................................................. 127 Zhen-Wu Sun Chapter 2 Computer Network and Information Security 137

Design and implementation of a RFID-based intelligent tools management system ........................................................................ 139 Jia-Wen Xie, Min-Li Wang and Tan Jie

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 20: icsta 2016

xx

sDOMO communication protocol for home robotic systems in the context of the internet of things ............................................ 151 Marcel-Titus Marginean and Chao Lu A research on Chinese selectional preference based on online materials ......................................................................................... 161 Qing Zhang Multi-route avoidance routing without location information of malicious wireless nodes in MANET......................................... 168 T. Kanachi and H. Higaki Computerized flat knitting machine network control research ...... 178 Cheng-Jun Zhang and Xiao-Yan Zuo A novel dependability optimization method in network layer of IOT ............................................................................................. 185 Rui-Juan Zheng, Tong Zhang, Ming-Chuan Zhang, Qing-Tao Wu and Wang-Yang Wei The effectiveness of applying moodle E-learning platform on resource classroom students ...................................................... 191 Hua-Yi Lin, Jiann-Gwo Doong and Xiao-Wei Lin A general threshold scheme based on elliptic curve cryptosystem ................................................................................... 199 Yu-Lian Shang, Wu-Li Song, Wu-Yuan Jia and Zhao-Chen Zhang

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 21: icsta 2016

xxi

New short interleaver design for turbo codes ................................. 210 Li-Fang Ma , Shi-Zhan Lan, Zhao-Jing Zhang and Hua-Hua Xie Trusted network management model based on clustering analysis ........................................................................................... 220 Hong-An Xie and Dong Li Multi-level sleep scheduling for heterogeneous wireless sensor networks ......................................................................................... 227 Shahzad Hassan, Muhammad S. Nisar and Hong-Bo Jiang Mobile multi-node recharging in heterogeneous wireless sensor networks ......................................................................................... 234 Shahzad Hassan, Muhammad S. Nisar and Hong-Bo Jiang Research on an embedded intelligent-unit based on multi-sensor fusion oriented internet ................................................................... 241 Jian Yang Round-robin differential-phase-shift quantum secret sharing ........ 248 Zhen-Yuan Sun, Jian Wang and Chao-Jing Tang Based on solr distributed classification algorithm of system design for science and technology plan projects ........................................ 256 Gui-Lan Cai, Kai Xu and Ping-Hua Chen An improved approximation formula for the symmetric capacity of 2-dimentional constellations under AWGN channel ................. 264 Pei Yang, Li-Qiang Jin and Hong-Wen Yang

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 22: icsta 2016

xxii

Two-hop multi-relay selection for secrecy improvement in broadcast wireless system .......................................................... 270 L. A. Olawoyin, Yue Wu and Hong-Wen Yang Chapter 3 Algorithm and Simulation 277

Apply classical physical laws to algorithms for analysis of stocks .......................................................................................... 279 Xing-Bo Wang An improved recommendation algorithm based on user dynamic interests ........................................................................................... 288 Chao Li, Jun-Min Ye, Qiang Wang, Liu-Yin Huang and Shu Chen Indoor localization algorithm based on multiple logistic regression analysis and quad-tree with irregular boundary ............................. 298 Tian-Yi Feng, Shu-Yi Liu, Jing-Kang Yang, Chen Lu, Zhao-Jing Zhang and Dong Liang Explosion simulation based on the CUDA physical model and particle system ......................................................................... 307 Bai-Yu Zhao and Ji-Cheng Quan Cognitive student model based on the gray partial correlation ...... 314 Sheng-Bing Ren, Di Feng and Xiao-Nan Chen

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 23: icsta 2016

xxiii

Application of smart medical based on distributed apriori algorithm ......................................................................................... 321 Hai-Feng Lu and Fang-Qin Xu An improved genetic algorithm based on k-means clustering for solving traveling salesman problem ......................................... 334 Li-Zhuang Tan, Yan-Yan Tan, Guo-Xiao Yun and Chao Zhang Research on HOG algorithm based on compressed sensing .......... 344 Xi Chen and Song Wang Chapter 4 Data Mining and Cloud Computing 353

Optimizing resource-service sequence based on genetic algorithm for collaborative task systems ........................................................ 355 Xiu-Yang Lei, Hai-Bo Li and Ya-Feng Gao GSkiplist: A GPU-method to accelerate key-value database search ............................................................................... 362 Xin Zhao, Kai Lu, Xiao-Ping Wang and Gen Li Label-weight adapting (LWA): a method for non-independent multi-label learning ........................................................................ 370 Jing-Kang Yang, Jiang Jun, Hao-Ran Lv, Tianyi Wang, Wei-Wei Wang, Zhaojing Zhang and Liang Dong Schedule model in a cloud computing based on credit and cost ........................................................................................... 381 Yi-Li Zhang and Jin-Bai Zhang

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 24: icsta 2016

xxiv

A method of SQL access logs pretreatment for power business system ............................................................................................. 389 Wei-Ei Li, Xiu-Li Huang, Bo Zhang, Rong Zeng and Yong Li Recurrent neural network for forecasting stock market trend ........ 397 Xin-Kai Xie and Hong Wang Text mining of medical insurance policy based on association rules ................................................................................................ 403 Li-Li Han The research and application of data visualization based on D3 in the filed of healthcare ..................................................................... 410 Xin-Liang Xu and Lian-Jun Chen Chapter 5 Computer System and Application 419

Efficient concurrent virtual machine scheduling for Xen hypervisors ..................................................................................... 421 Po-Jen Chuang and Chih-Yuan Chou Rotating laser precision machining computer control system ........ 426 Tao Wang, Long-Fei Ma, Bo Zhang, Sha Han, Ya-Peng Hu, Xin-Chao Zhao and Zhuo Wang The design of microcirculatory hemodynamic detection system based on Android ............................................................................ 435 W. Jiang, L. Yang, J. Su, Y. Li and X X. Yang

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 25: icsta 2016

xxv

The computer control system design and implementation of food production line ................................................................... 441 Cheng-Jun An Extended operation and permission model based on RBAC .......... 446 Zhi-Hong Liang, Wen-Hong Li, Xing-Ping Sun, Qing-Yi Chen, Jun-Hua Hu and Shu-Qiong Sun Performance analysis and the staffing optimization for a multi-skill call center in M-design based on queueing model method ............ 454 Chun-Yan Li A resource management system design for malware behavior detection ......................................................................................... 467 Jian-Guo Jiang, Zhi-Song Liu, Min Yu and Chao Liu Combining static and dynamic analysis for the detection of malicious JavaScript-bearing PDF documents ........................... 475 Min Li, Ying Zhou, Min Yu and Chao Liu The design of intelligent remote meter reading system based on mechanical water meter ............................................................. 483 Lei Jing, Lai-Lei Jiao and Zeng-Kang Wang The theory research on portable monitoring system model of the environment of banana growth ............................................. 489 Ling-Ling Wang , Yu-Ping Li, Hong-Xia Luo and Ji-Hua Fang

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.

Page 26: icsta 2016

xxvi

Study on the operation quality assessment of P2P platform based on factor analysis ............................................................................ 495 Lu-Ming Yang, Ya-Na Wu and Liang Shan An efficient tables memory access optimized algorithms for CAVLC decoding ..................................................................... 504 Xiao-Bo Lin and Hui-Lin Wang The research investigations on the NetFPGA platform .................. 514 Xing Zheng, Juan Cao and Hai-Jun Gao Chapter 6 Mathematics and Management 521

An approach to process uncertain complex events ......................... 523 Qi-Xin Cai, Jian Liu, Qing Xu, Hui-Ling Su and Hong-Sheng Zhao N-soliton solutions for an integrable differential-difference equation with computer symbolic computation.............................. 530 Xiao-Yong Wen Research on knowledge management for collaborative design of aviation enterprises ..................................................................... 538 Yong-Hua Wu and Bin Liu Author Index 545

Com

pute

r Sc

ienc

e, T

echn

olog

y an

d A

pplic

atio

n D

ownl

oade

d fr

om w

ww

.wor

ldsc

ient

ific

.com

by Z

HE

JIA

NG

UN

IVE

RSI

TY

on

01/0

4/17

. For

per

sona

l use

onl

y.