{"title":"Grey discrete parameters model and its application","authors":"Ying-Jian Qi, Zheng-peng Wu, Ying Li, Jing Yu","doi":"10.1109/SMC.2014.6974223","DOIUrl":"https://doi.org/10.1109/SMC.2014.6974223","url":null,"abstract":"To solve the problem that the growth of prediction of discrete grey model is constant, the paper establishes a new grey discrete parameters prediction model by instructing quadratic time-varying parameters, which is called as quadratic time-varying discrete grey model(referred to as QDGM(1,1)). We discuss the affine properties of QDGM model. The paper employed a majorization principle to optimizing the iterative starting value of the new model, and introduced the steps of using QDGM (1, 1) to predict. Finally, there is an instance that demonstrates the new model has the best results in the four discrete grey models. It was proved that the new model greatly improves the simulation and prediction precision.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126297056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An introduction of Multiple P-adic Data Type and its parallel implementation","authors":"Chao Lu, Xinkai Li","doi":"10.1109/ICIS.2014.6912151","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912151","url":null,"abstract":"Our research group at Towson University has been working on the P-adic theory and its implementation. Based on the Chinese Remainder theorem and the Hensel code a new data type, called Multiple P-adic Data Type, has been established to realize rational calculation. With this data type all rational number operations are converted to integer calculation, and the fast integer multiplication of modern computer architectures can be fully taken advantage of. This data type can be significantly effective in the parallel and cloud computing environment due to its independent computation at each node during the calculation process. Experimental results are given to illustrate computational efficiency.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129657016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A virtual data center deployment model based on the green cloud computing","authors":"Lijun Xu, Chunlin Li, La-yuan Li, Yanpei Liu, Zhiyong Yang, Yunchang Liu","doi":"10.1109/ICIS.2014.6912140","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912140","url":null,"abstract":"Energy consumption is the main obstacle to the green cloud computing, particularly with the global climate warming and data center scale expanding. The green computing is gaining more and more attention because energy consumption increased rapidly. We propose a cloud computing management framework in order to ensure energy consumption of cloud computing to be a minimum. The framework uses virtual date center instead of virtual machine service mode of traditional service providers, and partition the virtual data center used in the management framework is based on the network communications of virtual machines. Then the virtual data center partition is placed into corresponding green data center in order to maximize revenue of providers and minimize the carbon emissions.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115373762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A contact prediction method for DTNs based on BP artificial neural network","authors":"Haiquan Wang, Ying Yang, Yifeng Hu, Zexi Li","doi":"10.1109/ICIS.2014.6912104","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912104","url":null,"abstract":"Predicting the contact of the nodes in Delay Tolerant Networks (DTNs) helps to determine the next node of a data package and choose an appropriate transfer opportunity. The existing contact prediction methods mainly divide into two types, model-based methods and history-based methods. The model-based methods always need the location, velocity and direction of nodes which are difficult to obtain. So, this kind of methods can only suit one particular scenario, which don't have good adaptability. The history-based methods all consider the future contact has a linear correlation with the history contact, but in fact the future contact of nodes is also influenced by nodes' position, velocity, direction and other factors, in this way, the future contact shouldn't have a linear correlation with the history contact. In this paper, a contact prediction method for DTNs based on BP artificial neural network is proposed which uses BP neural network to predict the future contact of two nodes. This method includes two parts: discretization of time and design of BP neural network. The results show that this method can predict the future contact of two nodes more accurately than existing PROPHET.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128975883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Query integrity verification based-on MAC chain in cloud storage","authors":"Jun Hong, Tao Wen, Quan Gu, Gang Sheng","doi":"10.1109/ICIS.2014.6912119","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912119","url":null,"abstract":"In order to reduce data maintenance overhead, more and more enterprises outsource their data to the cloud storage, which provides flexible and on-demand storage service for companies. Data outsourcing also brings a lot of security problems, of which query integrity is a critical issue to be resolved. Current research mainly focuses on how to ensure correctness and completeness of the query integrity and pays little attention to freshness verification of query integrity. In this paper, we propose a scheme called MAC Chain for users to verify that their query results are correct, complete and fresh. Experiments show that our scheme does not only have a better performance but also support freshness verification.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129107540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evolutionary algorithm with double strategy for global optimization problems","authors":"Jianqin Liu, Ning Li, Yang Zhao","doi":"10.1109/ICIS.2014.6912141","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912141","url":null,"abstract":"In this paper, we propose a novel evolutionary algorithm with double strategy (DSEA), and prove the asymptotic convergence of DSEA by using the Markov-chain theory. For five high dimension Benchmark functions, the simulation calculation shows that DSEA is superior to PSO and DE, and it is very suitable to solve the global optimization problems.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing system for CAN bus-oriented embedded software","authors":"Shunkun Yang, Dongxiao Tang, Xiaohua Shi","doi":"10.1109/ICIS.2014.6912162","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912162","url":null,"abstract":"Based on the analysis on the characteristics of embedded system based on CAN bus, this paper proposed one CAN bus-oriented test system scheme. The scheme consists of a non-real time host and a real time target; the non-real time host constructs test data, while the real time target drives the data transmission, processes the response of tested system, and returns the results to the non-real time host for analyzing. The system can test, analyze and evaluate the CAN bus-oriented embedded application in a real time, closed-loop and nonintrusive way.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125649816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low-power register file based on access queues for multi-issue processors","authors":"Jianqing Xiao, Wei Li, Xubang Shen","doi":"10.1109/ICIS.2014.6912113","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912113","url":null,"abstract":"Multi-port register file is a critical component of high-performance multi-issue processors to exploit instruction parallelisms. However, multiple ports cause such problems as high power and large area. In this paper, we present a novel multi-bank register file (MBRF) architecture to reduce register ports as well as its power and area, which is based on register access queues. The proposed architecture organizes a read queue and a write queue for each register bank, and buffers all the register operations from instructions into the access queues, thus avoiding bank conflicts. At the same time, we use both combine and forward assignment strategies to reduce read and write requests for register file. Experimental results show our techniques are more advantageous in both performance and power saving than the traditional MBRF, achieving 52% and 47% power saving for integer and floating-point programs respectively, with only 1.6% and 2.8% IPC loss.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122239637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from program chair","authors":"Wenai Song, Simon Xu, L. Chen","doi":"10.1109/ICIS.2014.6912094","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912094","url":null,"abstract":"On behalf of the Technical Program Committee, welcome to the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014), sponsored by IEEE and the International Association for Computers and Information Science (ACIS). This conference allows both researchers and practitioners to present and share their on-going ideas, experiences, and research results about all aspects of computer and information science.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134402130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EM algorithm for reconstructing overpressure field of underwater explosion induced shock wave","authors":"M. Bai, Yali Guo, Liming Wang","doi":"10.1109/ICIS.2014.6912143","DOIUrl":"https://doi.org/10.1109/ICIS.2014.6912143","url":null,"abstract":"In this paper, we study the techniques of blast wave field reconstruction based on Tomography. Overpressure field is reconstructed by inverting the velocity field in the process of shock wave transmission. Since the reconstruction process is difficult due to the insufficient number of excitation sources and detectors, we propose an EM algorithm based on prior information. Appropriate models are constructed using the proposed methods, and a simulation example is put forward at last. The result reveals that compared with the traditional methods, this method has higher precision and converges faster. It also shows the validity and practicality of the developed algorithm in solving the problem of incomplete data reconstruction.","PeriodicalId":237256,"journal":{"name":"2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131473479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}