Frontier Computing
Theory, Technologies and Applications
Samenvatting
This volume contains the proceedings of the 4th International
Conference on Frontier Computing (FC 2015), Bangkok, Thailand, September
9-11, 2015, and brings together state-of-the-art results covering many aspects
of emerging computer science and information technology from international
academic and industrial researchers. FC 2015 aimed at providing an open forum to reach a
comprehensive understanding of the recent advances and developing trends in
information technology, computer science and engineering, with themes under the
scope of communication networks, business intelligence and knowledge management,
web intelligence, and any related fields that prompt the development of
information technology. Contributions cover a wide spectrum of topics:
database and data mining, networking and communications, web and internet of
things, embedded system, soft computing, social network analysis, security and
privacy, optics communication, and ubiquitous/pervasive computing. Many papers
have shown great academic potential and value, and in addition indicate
promising directions of research in the focused realm of this conference
series.
Readers, including students,
researchers, and industry professionals, will benefit from the results
presented in this book, and it provides indicators for emerging trends for
those starting their research careers.
Specificaties
Inhoudsopgave
Based Learning. </p>
<p> 2 Artificial Neural
Network based Evaluation Method of Urban Public Security. </p>
<p> 3 Building the Search
Pattern of Social Media User based on Cyber Individual Model. </p>
<p> 4 Design of health
supervision system base on WBAN. </p>
<p> 5 The Analysis of Hot
Topics and Frontiers of Financial Engineering Based on Visualization Analysis. </p>
<p> 6 An efficient ACL
segmentation method. </p>
<p> 7 Image Haze Removal
of Optimized Contrast Enhancement Based on GPU. </p>
<p> 8 Research of
Thunderstorm Warning System Based on Credit Scoring Model. </p>
9 Cloud-Based
Marketing: Does Cloud Applications for Marketing Bring Positive Identification
and Post-purchase Evaluation? </p>
<p> 10 Decision Analyses
of Medical Resources for Disabled Elderly Home Care: The Super Aged District in
Taiwan. </p>
<p> 11 The Research about
Vehicle Recognition of Parallel Computing Based on GPU. </p>
<p> 12 Pseudo Nearest
Centroid Neighbor Classification. </p>
<p> 13 Recommended System
for Cognitive Assessment Evaluation Based on two-phase Blue-Red Tree of Rule-Space Model-A Case Study of MTA Course. </p>
<p> 14 A Algorithm of
Detectors Generating Based on Negative Selection Algorithm. </p>
<p> 15 A Algorithm of
Detectors Generating Based on Negative Selection Algorithm. </p>
<p> 16 An Algorithm for
Image Denoising Based on Adaptive Total Variation. </p>
17 Social Events
Detection and Tracking based on Microblog. </p>
<p> 18 An optimization of
the delay scheduling algorithm for real-time video stream processing. </p>
<p> 19 Microblogging
Recruitment Information Mining. </p>
<p> 20 Community Trust
Recommendation Based on Probability Matrix Factorization. </p>
<p> 21 Robust Markov
Random Field Model for Image Segmentation. </p>
<p> 22 Community
Clustering Based on Weighted Informative Graph. </p>
<p> 23 A Data Clustering
Algorithm Using Cuckoo Search. </p>
<p> 24 The Application of
Bacteria Swarm Optimization Algorithm in Site Choice of Logistics Center. </p>
<p> 25 SIDA: An
Information Dispersal based Encryption algorithm. </p>
26 Software Behavior
Analysis Method Based On Behavior Template. </p>
<p> 27 Formalizing
Dynamic Service Interaction Based on Pi-Calculus. </p>
<p> 28 Applications of
Video Structured Description Technology for Traffic Violation Monitoring. </p>
<p> 29 Research of Mining
Multi-Level Association Rule Models. </p>
<p> 30 Research of the
Dimension Combination Strategy Model. </p>
<p> 31 Short Latency Bias
in Latency Matrix Completion. </p>
<p> 32 Facial Feature
Extraction Based on Weithted ALW and Pulse-Coupled Neural Network. </p>
<p> 33 Event
Representation and Reasoning Based on SROIQ and Event Elements Projection. </p>
<p> 34 The Research and
Application of Data Warehouse's Model Design. </p>
<p> 35 Question
Recognition Based on Subject. </p>
<p> 36 Development of a
mobile augmented reality system to facilitate real-world learning. </p>
<p> 37 A simple
randomized algorithm for complete target coverage problem in sensor wireless
networks. </p>
<p> 38 A Novel
Enveloped-Form Feature Extraction Technique for Heart Murmur Classification. </p>
<p> 39 Research on
Network Security Strategy Model. </p>
<p> 40 Investigating on
radioactivity of LBE and Pb in ADS Spallation Target. </p>
<p> 41 Design of Farmland
Environment Remote Monitoring System Based on ZigBee Wireless Sensor Network. </p>
<p> 42 Attractions and
Monuments Touring System based on Cloud Computing and Augmented Reality. </p>
43 Constructing
weighted gene correlation network on GPUs. </p>
<p> 44 Design of scalable
control plane via multiple controllers. </p>
<p> 45 Research on
Learning Record Tracking System Based on Experience API. </p>
46 An EF6 Code-First
approach using MVC architecture pattern for watershed data download, visualization
and analysis system development based on CUAHSI-HIS. </p>
<p> 47 Student-t Mixture
Modelling for Image Segmentation With Markov Random Field. </p>
<p> 48 Integrated genetic
algorithm and fuzzy logic for planning path of mobile robots. </p>
<p> 49 Characterization
of Noise Contaminations in Realistic Heart Sound Acquisition. </p>
50 Independent Component
Analysis of space-time patterns of Groundwater system. </p>
<p> 51 Analysis of the
Status Quo of MOOCs in China. </p>
<p> 52 Detection for
Different Type Botnets Using Feature Subset Solution. </p>
<p> 53 Rotation Invariant
Feature Eextracting Of Seal Images Based on PCNN. </p>
<p> 54 The Taguchi
System-Two Steps Optimal Algorithm based Neural Network for Dynamic Sensor Product Design. </p>
<p> 55 Movie
Recommendation Service with Linked Data Using Hadoop and Mahout.
<p> 56 A Method of Event
Ontology Mapping. </p>
<p> 57 A Research on
Multi-Dimensional Multi-Attribute String Matching Mechanism for 3D Motion Databases. </p>
<p> 58 A Novel Web
Service Clustering Approach for Linked Social Service. </p>
59 Cloud Computing
Adoption Decision Modelling for SMEs: From the PAPRIKA Perspective. </p>
<p> 60 Cost Analysis
between Statins and Hepatocellular Carcinoma by Using Data Mining Approach. </p>
<p> 61 Hospital Service
Queue Management System with Wireless Approach. </p>
<p> 62 A Smartphone Based
Hand-held Indoor Positioning System. </p>
<p> 63 A Variational
Bayesian Approach for Unsupervised Clustering. </p>
<p> 64 Virtualized
Multimedia Environment for Shoulder Pain Rehabilitation. </p>
<p> 65 Multimedia
Technology with Tracking Function for Hand Rehabilitation. </p>
<p> 66 LBS with
University Campus Navigation System. </p>
<p> 67 An Efficient
Energy Deployment Scheme of Sensor Node. </p>
68 Channel
Equalization for MIMO LTE System in Multi-path Fading Channels. </p>
<p> 69 All-digital
High-Speed Wide-Range Binary Detecting Pulse-Width Lock Loops. </p>
<p> 70 A BUS Topology
Temperature Sensor Cell Design with System in Pakage Application. </p>
<p> 71 The Off-Axis
Parabolic Mirror Optical Axis Adjustment based on lateral shearing
interferometer. </p>
<p> 72 Two-mirror
telescope Optical Axis Alignment by Additive Color Mixing Method. </p>
<p> 73 Design of relay
lens based on zero Seidel aberrations. </p>
<p> 74 The optical
spectra analysis of 4 LED white-light sources passing through different fogs. </p>
<p> 75 High Resolution
Camera Lens Design for Tablet PC. </p>
76 Two-Wavelength
Optical Microscope Optical Axis Adjustment by five incident parallel laser
beams. </p>
<p> 77 The Correlation
Analysis between the Non-Contact Intraocular Pressure and Dioptre. </p>
<p> 78 Automated Tool
Trajectory Planning for Spray Painting Robot of Free-form surfaces. </p>
<p> 79 The research of
analysis addiction for online game. </p>
<p> 80 Parameter
estimation of trailing suction hopper dredger dredging model by GA. </p>
<p> 81 CPP Control System
Design of Ship Based on Siemens PLC. </p>
<p> 82 The Surface
Deformation Prediction of Ship-hull Plate for Line Heating. </p>
<p> 83 The Framework
Research of the Internet of Things in Dispatching Emergency Supplies. </p>
84 Simulation and
Optimization of the AS/RS Based on Flexsim. </p>
<p> 85 Design and
Experiment of Control System for Underwater Ocean Engineering Structure
Inspection and Cleaning Remotely
Operated Vehicle. </p>
<p> 86 A Using Experiment
On Social Learning Environment Base on an Open Source Social Platform. </p>
<p> 87 User
Authentication Mechanism on Wireless Medical Sensor Networks. </p>
<p> 88 Application of
Cloud Computing for Emergency Medical Services : A Study of Spatial Analysis and Data Mining Technology. </p>
<p> 89 Social Event
Detection and Analysis Using Social Event Radar. </p>
<p> 90 Social Network and
Consumer Behavior Analysis: a Case Study in the Retail Store. </p>
91 Novel Scheme for
the Distribution of Flyers using a Real Movement Model for DTNs. </p>
<p> 92 A Study of
Two-dimensional Normal Class Grouping. </p>
<p> 93 Visualized
Comparison as a Correctness Indicator for Music Sight-Singing Learning
Interface Evaluation – A Pitch
Recognition Technology Study. </p>
<p> 94 A Fuzzy Genetic
Approach for Optimization of Online Auction Fraud Detection. </p>
<p> 95 A Study on the Use
Intention of After School Teachers Using Interactive e-Learning Systems in Teaching. </p>
<p> 96 Bibliometric
Analysis of Emerging Trends in High Frequency Trading Research. </p>
<p> 97 Interactive
Performance Using Wearable Devices: Technology and Innovative Applications. </p>
98 Usability
Evaluation of Acoustic-oriented Services on Mouse Manipulation: Can
Manipulation with Dual Senses be Good? </p>
<p> 99 Effect of
We-intention on Adoption of Information System Embedding Social Networking Technology: A Case of Cloud Drive.
</p>
<p> 100 Improving Project
Risk Management of Cloud CRM Using DANP Approach. </p>
<p> 101 Improving Project
Risk Management by a Hybrid MCDM Model Combining DEMATEL with DANP and VIKOR Methods – An Example of Cloud CRM. </p>
<p> 102 Using VIKOR to
Improve E-Service Quality Performance in E-Store. </p>
<p> 103 Study on the
Intellectual Capital and Firm Performance. </p>
<p> 104 Voluntary
Disclosure and Future Earnings. </p>
<p> 105 A Smart Design of
Pre-processing Classifier for Impulse Noises on Digital Images. </p>
106 An Effective
Machine Learning Approach for Refining the Labels of Web Facial Images. </p>
<p> 107 Using the
Data-Service Framework to Design a Distributed Multi-Levels Computer Game for
Insect Education. </p>
<p> 108 Financial
Diagnosis System (FDS) For Food Industry Listed In The Taiwan Stock Exchange
(TWSE). </p>
<p> 109 Classification
rule discovery for housing purchase life cycle. </p>
<p> 110 The mediating
role of knowledge integration mechanisms on fostering product innovation performance. </p>
<p> 111 Algorithms of AP+
Tree Operations for IoT System. </p>
<p> 112 Dynamic Storage
Method of Big Data Based on Layered and Configurable Technology. </p>
<p> 113 MIC-based
preconditioned conjungate gradient method for Sloving Large Sparse Linear
Equations.
<p> 114 Modeling and
Assessing the Helpfulness of Chinese Online Reviews based on Writing Behavior. </p>
<p> 115 The average Path
Length of Association Link Network. </p>
<p> 116 The Intelligent
Big Data Analytics Framework for Surveillance Video System. </p>
<p> 117 The Intelligent
Video Processing Platform using Video Structural Description Technology for the
Highway Traffic. </p>
<p> 118 The Scheme of the
Cooperative Gun-Dome Face Image Acquisition in Surveillance Sensors. </p>
<p> 119 Vehicle Color
Recognition Based on CUDA Acceleration. </p>
<p> 120 Video Retargeting
for Intelligent Sensing of Surveillance Devices. </p>
<p> 121 Web Knowledge
Acquisition Model based on Human Cognitive Process. </p>