{"title":"A Method for Similarity of Assembly Based on Spatial Position of Parts","authors":"Pang Jiazhen, Ji Baoning, Wang Jianhan","doi":"10.1109/ICEIEC.2018.8473544","DOIUrl":"https://doi.org/10.1109/ICEIEC.2018.8473544","url":null,"abstract":"With the development of computer aided design (CAD) technology in the field of mechanical design, a large number of CAD models have been developed in recent decades. These models contain a great deal of experience and knowledge from designers and have important reference value. In this paper, we proposed a similarity calculation method for assembly to support assembly retrieval. First, the spatial information of parts in assembly are extracted which consist of the part position, connection position and connection relationship. Then the descriptor of spatial shortest path is established based on the spatial information. A similarity calculation method for the descriptor is proposed. At last the instance of similarity calculation is revealed to illustrate the process of information extraction and similarity calculation. According to the instance, it indicates that the method proposed in this paper is available support the retrieval of assembly for design reuse.","PeriodicalId":344233,"journal":{"name":"2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"503 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115887102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahnoor Balouch, Adeel Abro, J. A. Baloch, Raheel Noor, Kiran Manzoor
{"title":"ISDV-Hop Localization Algorithm with Increased Node Density In Wireless Sensor Networks","authors":"Mahnoor Balouch, Adeel Abro, J. A. Baloch, Raheel Noor, Kiran Manzoor","doi":"10.1109/ICEIEC.2018.8473526","DOIUrl":"https://doi.org/10.1109/ICEIEC.2018.8473526","url":null,"abstract":"A novel approach to the design of a localization algorithm for wireless sensor networks is presented, which promises scalability, with reduced energy consumption and localization error. The improved scalable distance vector hop (ISDV-Hop) algorithm employs the total least square trilateration method to achieve improved scalability, energy conservation and location accuracy. The algorithm could serve as a backbone of context aware wireless sensor network applications including, environmental monitoring and control of temperature and humidity for enclosures of internal horticultural enterprises, controlling potable and waste water, gas and electricity energy distribution systems and ground water collection and flood alerting systems for monitoring rainfall and accumulation points such as streams and rivers. Simulation results illustrate the operation benefits of the algorithm in terms of scalability, reduced energy consumption and improved location accuracy.","PeriodicalId":344233,"journal":{"name":"2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131195692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Traffic Classification Validation and Ground Truth Collection","authors":"Jinghua Yan","doi":"10.1109/ICEIEC.2018.8473477","DOIUrl":"https://doi.org/10.1109/ICEIEC.2018.8473477","url":null,"abstract":"Traffic classification has recently been widely used in quality of service measurements, network management and security monitoring. With the development of internet, many traffic classification methods have been proposed and developed. Correctly validate performance of traffic classifiers requires a perfect ground truth, i.e., information about the application or the protocol of traffic flows. However, the validation of the existing classification approaches is a controversial problem, because a perfect ground truth is difficult to obtain. Recently, several researchers have proposed solutions to collect ground truth of traffic traces and achieved satisfactory results. This paper presents review on the state of the art of traffic classification validation and ground truth collection, and explores the challenges and future directions.","PeriodicalId":344233,"journal":{"name":"2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123633209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Greedy Permuting Method for Genetic Algorithm on Traveling Salesman Problem","authors":"Junjun Liu, Wenzheng Li","doi":"10.1109/ICEIEC.2018.8473531","DOIUrl":"https://doi.org/10.1109/ICEIEC.2018.8473531","url":null,"abstract":"Genetic algorithm (GA) is a very efficient algorithm for solving optimization problems such as traveling salesman problem (TSP), timetable scheduling and 0/1 knapsack problem. Among these problems, the TSP is a well-known combinatorial optimization problem and it is a NP-hard problem. Many literatures have discussed how to use different methods to make genetic algorithm more efficient on solving TSP and these methods include how to design the representation of solution, how to initialize the initial population, how to design crossover, mutation and selection operator and so on. In this paper, we present a new method to initialize an initial population for GA on TSP, which we call greedy permuting method (or GPM for short). We test GPM on some TSP benchmark problems and find that it is competitive with an already proposed method NF and it can make GA much more efficient than a randomly initializing method.","PeriodicalId":344233,"journal":{"name":"2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124083651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"L-Code: An Efficient Coding Scheme for Recovering Single Disk Failure","authors":"Wenbo Liu, Ning Zhou, Xinyan Gao","doi":"10.1109/ICEIEC.2018.8473543","DOIUrl":"https://doi.org/10.1109/ICEIEC.2018.8473543","url":null,"abstract":"In modern storage system, the reliability of the data is very important. In order to deal with the disk failures, researchers put forward many methods. Among them, one important implementation is erasure code. In erasure code scheme, there exist many disk failure problems, the most common one is single disk failure, it has been receiving more attention in recent years. In this paper, we present an efficient erasure code scheme which we named L-code, through the different placement and calculation of redundant elements, this scheme can improve the performance on single disk failure reconstruction. To demonstrate it, we did some experiments, the result show that L-code gains up to 34.4% higher recovery performance than optimized H-code and 42.7% for optimized EVENODD. In encoding complexity, our scheme also gains up to 1.9% than optimized H-code and 44.2% than optimized EVENODD.","PeriodicalId":344233,"journal":{"name":"2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129898984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Satellite Remote Education System for Agricultural and Pastoral Areas Based on IPv6","authors":"Qi Liu, Xiangyu Bai, Xiaopeng Luo","doi":"10.1109/ICEIEC.2018.8473534","DOIUrl":"https://doi.org/10.1109/ICEIEC.2018.8473534","url":null,"abstract":"This paper proposes a satellite remote education system based on IPv6 due to the lack of network infrastructure in agriculture and pasturing areas. The system combines satellite network with DTN in order to deliver educational resources to the users in the farming and pastoral areas. In the special DTN of agricultural and pastoral areas, a new bundle encapsulation method is designed, which combines IPv6 and DTN. An endpoint can be identified by its IPv6 address and we propose a corresponding data transmission protocol for the network of IPv6 over DTN. We implement an interactive distance education system through reverse transport mechanism, DTN users can send their resource subscription information to the server. A security policy and a bundle authentication process are proposed to ensure the security of the DTN and the entire education system.","PeriodicalId":344233,"journal":{"name":"2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128942359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Wang, Jinquan Hang, Chen Li, Jia You, Shujia Chen, Long Cheng
{"title":"A Mobile Localization Method for Wireless Sensor Network in Mixed LOS/NLOS Environments","authors":"Yan Wang, Jinquan Hang, Chen Li, Jia You, Shujia Chen, Long Cheng","doi":"10.1109/ICEIEC.2018.8473467","DOIUrl":"https://doi.org/10.1109/ICEIEC.2018.8473467","url":null,"abstract":"In Wireless Sensor Networks (WSNs), Non-Line-of-Sight (NLOS) propagation becomes the main challenge of mobile nodes localization. In order to solve this problem, this paper presents a Square Root Unscented Kalman Filtering-Convex Optimization (SRUKF-CO) method. The Square Root Unscented Kalman Filter (SRUKF) is first used to correct the measuring distance of the LOS and NLOS mobile nodes without prior information on the statistical properties of the NLOS error, which is independent of the physical measuring method. Then, the maximum likelihood localization method is used to estimate the position coordinates. Finally, the limit conditions are determined, and the convex optimization method is adopted to further reduce the NLOS errors. The simulation results show that this method has higher accuracy of positioning compared with unfiltered direct positioning (NF), Kalman Filter (KF) and Particle Filter (PF) under mixed LOS / NLOS environment, and it is robust to NLOS errors.","PeriodicalId":344233,"journal":{"name":"2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126294784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Radar Performance Under Complex Electromagnetic Environment Using Supervised Machine Learning Methods: A Case Study","authors":"Yujian Pan, Jingke Zhang, G. Luo, B. Yuan","doi":"10.1109/ICEIEC.2018.8473520","DOIUrl":"https://doi.org/10.1109/ICEIEC.2018.8473520","url":null,"abstract":"Evaluating radar performance under complex electromagnetic environment is important for modern warfare. Traditional experimental method is expensive due to large number of experimental parameters. This paper presents a new machine learning based method via a case study. In this case, only a small number of experimental samples are required. After the data preprocessing and feature selection, the model for predicting the radar performance is learned by the machine learning algorithm. We compare six machine learning algorithms via cross-validation and find the multiple layers perceptron (MLP) possesses the highest prediction accuracy with a satisfied root-mean-square error (RMSE) of 1.77. The results of the paper exhibit the effectiveness of the machine learning based radar performance evaluation method.","PeriodicalId":344233,"journal":{"name":"2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126089658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Distributed Register File Architecture Based on Dynamic Scheduling for VLIW Machine","authors":"Yang Guo, Donglin Wang, Zijun Liu, Hongyu Meng","doi":"10.1109/ICEIEC.2018.8473572","DOIUrl":"https://doi.org/10.1109/ICEIEC.2018.8473572","url":null,"abstract":"Distributed register files have the advantages of area and power compared with centralized register files in very long instruction word (VLIW) machine. But it may complicate the internetwork. A distributed register file architecture based on dynamic scheduling is proposed in our work. A portion of latency on internetwork is shifted to the latency among registers by latency transfer. And the decrease in the fanout of writing ports leads to a reduction in the power of the internetwork. To ensure the external compatibility of the distributed register file interface, the register was redirection designed. A dynamic scheduling strategy is designed to avoid conflicts between physical entities and logical entities that redirect registers. The optimization was evaluated on our in-house processor. The register file based on distributed dynamic scheduling reduces 15.48% of latency. The system frequency is raised from 1.19 GHz to 1.41 GHz. The power decreased by 27.42%.","PeriodicalId":344233,"journal":{"name":"2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134115760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of IT Helpdesk with Microservices","authors":"Ratthida Wongsakthawom, Y. Limpiyakorn","doi":"10.1109/ICEIEC.2018.8473557","DOIUrl":"https://doi.org/10.1109/ICEIEC.2018.8473557","url":null,"abstract":"Often, businesses employ technology in driving business growth. Many applications or systems have been introduced to organizations for process improvement and customer satisfaction. An IT helpdesk is the system that allows users to submit service requests for reporting problems or their requirements to IT teams for trouble shooting. This paper presents a design of IT helpdesk with microservice architecture to promote scalability of the system. The implementation includes the classification service that automatically categorizes tickets to the associated IT teams for support. The thesaurus database is utilized for clustering the request subjects. The benefits of the proposed approach would be to enable the scalability and fortify the availability of the system.","PeriodicalId":344233,"journal":{"name":"2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117288204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}