Proceedings of ICNDC2013 have already published in IEEE Xplore

Proceedings of ICNDC2013 have already published in IEEE Xplore

Read More

final paper submission deadline is postphoned to March 30, 2014

Go to and follow the instructions.
Use conference ID: 31966XP

Read More

Instruction for upload camera ready paper Ready paper submission

Read More

SOFA: Statistic based Collaborative Filtering Algorithm

Abstract—The classic user-based collaborative filtering algorithm has some shortcomes in its similarity calculation. In this paper, we propose a statistic based collaborative filtering algorithm (SOFA). The contributions are three-fold: 1) a threshold is used to filter those inaccurate similarities between users who have less intersection; 2) users’ statistics, such as mean, and variance, are used for similarity measurements; 3) two similarities are aggregated for more accurate prediction. The experiments are conducted on MovieLens data set, and the results show that the proposed method performs better than traditional ones in several popular metrics, i.e. MAE, Coverage, Precision, Recall, and F-measure etc.

Read More












Read More

Predicate Priority Based Event Matching Algorithm in Publish/Subscribe System

Abstract—The large distributed interactive simulation system which based on the publish/subscribe model has considerable data, it needs to disseminate accurate data to the interested users quickly, so improving the match efficient is a very important method to solve this problem. Based on the study and comparison of current matching algorithm, we have proposed a predicate priority based event matching algorithm(hereinafter referred to as PPEM). Performance analysis and detailed experimentations are carried out to verify the effectiveness of PPEM. When the number of subscriptions is 10000, the average time of matching one event is only 22.6ms and when we change the type of data distribution or increase the number of event attribute, the average matching time of PPEM is almost unchangeable comparing with bucket and multi-dimension algorithms. All the results show that PPEM achieves high matching efficiency and also has good scalability and robustness.

Read More

Pragmatic Tabular Specification Framework for Interactive Systems

The need for a multi-format specification method with unambiguous, easy-to-understand, and easy-to-validate notation is widely recognized. In practice, presenting specifications by diagrams or tables is considered a significant help. In this paper, we focus on the tabular specification method for the multi-functional systems. We introduce a pragmatic tabular specification framwork for interactive systems, i.e., formal specification method using tabular method on Focus framework. The proposed framework can not only supply a method to specify the multifunctional systems in an effective way, but can also analyze the properties of the specified system, and eliminate ambiguity in the initial requirement documents.

Read More

A Device-Similarity-Based Recommendation System in Mobile Terminals

Abstract—Smart Mobile device are becoming popular platforms for information accessing, especially when coupled with recommendation system technologies. They are also treated as key tools for mobile users both for leisure and business applications. Recommendation techniques can increase the usability of mobile systems by providing more personalized and interested content. In this paper, a novel personalized recommender system is proposed, focusing on Mobile Terminal (MT) similarities, such as brands, versions and types of Operating Systems. These similarities play a key role in filtering original recommendation data sets at the pre-processing stage. By calculating and comparing the Mean Absolute Error (MAE) values through 5-fold cross validation of the Slope One algorithm with/without optimizing data sets by device-similarity , the overall effectiveness and accuracy of the recommendation results are at least 20% improved in our experiment.

Main Activities:  The implanted system is consists of 2 modules, shown in Fig. 1 and throughout the design process for DSR, there are 3 vital parts, User-Item-Device model, MT similarity algorithm and the recommendation system. In order to calculate similarities between different devices, we collected some context information, such as brand, brand-version and Operating System (OS).

 Results: The DSR model could optimize and screen data by using context information of devices’ similarities. We also conducted experiments on two kinds of real data sets collected from mobile markets: ADS and WDS respectively. Then the experimental results are used to testify the feasibility of our model and verify its efficiency, compared with those of Slope One. Finally, the evaluation results of MAE indicate that our DSR system can improve the accuracy of recommending by at least 20%.

Read More

Energy Internet – Towards Smart Grid 2.0

Price rising of energy and the limitation of fossil fuel makes it an inevitable tendency to introduce distributed energy such as renewable energy to the existing supply system in the future. Different players, such as power generation, transmission, and distribution, along with the value chain must now cooperate and interact with each other by shared interfaces or eventually a customized network for secure and reliable delivery of energy. While smart grids are focusing on the informationization and intellectualization of the existing power grid, the new concept of an energy internet is proposed as an internet-style solution for energy issues by integrating information and power flows bi-directionally, which can be considered as the version 2.0 of smart grids. Some key features of an energy internet compared with conventional energy grid such as openness and peer-to-peer are introduced. Architecture of an energy internet is proposed in details, including energy storage, switches and routers. The definition of an energy internet call for a much greater degree of interactive flexibility for efficient energy management than the present system is designed to handle.

Read More

Conference Program

DownLoad Progran of ICNDC2013

Conference Schedule Overview

DEC. 21, 2013

8:00-17:30 Registration 8:30-9:00 Opening Session 9:00-9:50 Keynote Speech 110:10-11:00 Keynote Speech 211:00-11:50 Keynote Speech 3 13:30-18:30 Session talks

Accepted Paper List

    Kumiko Kobayashi, I Gusti Bagus Baskara Nugraha and Hiroyoshi Morita. Wall Pass Algorithm in a Geographic Location-Based Distributed Routing System,Kumiko Kobayashi Laboratory, Japan
    HaiMing Zhang, JianHui Li, YuanChun Zhou, XueZhi Wang, and BaoPing Yan. Using MODIS Satellite Imagery to Study the Wild Birds’ Migration, Chinese Academy of Sciences, China
    Qiuluan Li, Guohua Zhan and Zhihua Li. Novel Multi-hop Routing Algorithm Based on Uneven Clustering, Hangzhou Institute of Service Engineering, China
    Zhu Yanjun, Wang Binjun and Zhang Wei. SSL VPN System Based on Simulated Virtual NIC, Chinese People’s Public Security University, China
    Doan B Hoang and Najmeh Kamyabpour. Energy-constrained paths for optimization of energy consumption in Wireless Sensor Networks, University of Technology, Sydney , Australia
    Zijing Yang, Junwei Cao, Yanxiang Xu, Huaying Zhang, Peng Yu and Senjing Yao. Data Cleaning for Power Quality Monitoring, Tsinghua University, China
    Tian Gao, Junwei Cao, Yanxiang Xu, Huaying Zhang, Peng Yu and Senjing Yao. From Power Quality to Power Experience, Tsinghua University, China
    Kai Lei, Qian Yu and Rui Ning. A Device-Similarity-Based Recommendation System in Mobile Terminals, Peking University, China
    Xiuqing Lu, Chen Ye, Jian Yu and Yaying Zhang. A Real-Time Distributed Intelligent Traffic Video-surveillance System on Embedded Smart Cameras, Tongji University, China

Willyan Daniel Abilhoa and Leandro Nunes de Castro. Keyword Extraction from Twitter Messages based on Graphs for Text Representation , Mackenzie Presbyterian University, Brazil

    Bin Cao, Zhen Chen, Hongjian Liu, Ge Ma, Peng Zhang and Guodong Peng. Black Box Testing for Cloud-based Client Security Software in Network Behaviors, Tsinghua University, China
    Yuanjun Yao, Hao Yuan, Feng Xie and Zhen Chen. SOFA: Statistic based Collaborative Filtering Algorithm, Tsinghua University, China
    Ge Ma, Zhen Chen, Hongjian Liu and Bin Cao. Large-scale emulation for Content Centric Network, Tsinghua University, China
    Ge Ma, Zhen Chen and Kaichen Zhao. A Cache Management Strategy for Content Store in Content Centric Network, Tsinghua University, China
    Junwei Cao and Mingbo Yang. Energy Internet – Towards Smart Grid 2.0 , Tsinghua University, China
    Songbin Liu, Xiaomeng Huang, Yufang Ni, Haohuan Fu and Guangwen Yang. A Versatile Compression Method for Floating-point Data Stream , Tsinghua University, China
    Yubo Jia, Qian Zhang, Qianqian Ding and Danli Liu. An Improved Decision Strategy of Network Routing Based on Ant Colony Algorithm , Zhejiang Sci-Tech University, China
    Wanghui Wang, Siping Hu and Jinshan Dai. Research and Analysis of Internet QoS Performance , Wuhan University of Technology, China

Menglu Xu, Pin Lv and Haibo Wang. Predicate Priority Based Event Matching Algorithm in Publish/Subscribe System, Chinese Academy of Sciences ,China

    Minzhe Guo and Prabir Bhattacharya. Controller Placement for Improving Resilience of Software-defined Networks, University of Cincinnati ,USA
    Xiuna Zhu. Pragmatic Tabular Specification Framework of Interactive Systems, Technische Universit¨at M¨unchen, Germany

Feng Kang, Yonghua Han and Huaxiong Zhang. Video Stabilization Based on Multi-scale Colored Local Invariants, Zhejiang Sci-Tech University, China

    Ume-Hani Syed, Fahad Khurshid and Dr. Arif Iqbal Umar. Avoidance of BlackHole Affected Routes in AODV-Based MANET, Hazara University , Pakistan
    Rongxian Chen, Yaying Zhang and Dongdong Zhang. Cloud Task Scheduling Algorithm Based on Users’ Satisfaction, Tongji University, China
    Prachi Saxena and Sini Shibu. A Novel Approach to Design Time Efficient and Secure encryption Algorithm (T-SEA), Bhopal (M.P.), INDIA
    Tian Chen, Xie Lanchi and Wang Xingjun. Conbination of DRM and mobile code: A practice to protect TV contents and applications on Android Smartphone, Tsinghua University, China
    Ali Makke, Yves Mahéo and Nicolas Le Sommer. Towards Opportunistic Service Provisioning in Intermittently Connected Hybrid Networks, IRISA, France
      Hyungjik Lee, Joonyoung Jung, Dongoh Kang and Changseok Bae. Policy-based Dynamic Power Management Architecture for Cluster System, Electronics and Telecommunications Research Institute


    Daejeon, Korea
    Ronghua Liu, Jiahua Wei and Dejun Zhu. A Parallel JPWSPC Algorithm for Hydrodynamic Simulation of River Network, Tsinghua University, China
    Yen-Yin Chu, I-Hsuan Peng, Chih-Wei Lai and Addison Y.S. Su. State Dependent Radio Resource Scheduling for Energy Saving in LTE Downlink, Taiwan National Central University
    Jin Ho Ahn. Real-time Constrained Causal Order Delivery Ensuring Broadcast Algorithm Providing High Responsiveness, Kyonggi University, Republic of Korea
    Kuo-Hsuan Huang, En-Chi Chang and Chen-Lin Chang. Secure File Sharing Scheme for Mobile Devices, Tatung University, Taipei
    Kuo-Hsuan Huang and En-Chi Chang. A Patient-Centric Access Control Scheme for Personal Health Record in the Cloud, Tatung University, Taipei,
    Lican Huang. Instant Messaging based on Semantic P2P System. China
    Lican Huang, Chuane Wu, LiYa Chen,Lian Zhu, Comparisons of Encryption Algorithms in Histogram-equalized Image, Zhejiang Sci-Tech University , China
    Lican Huang, Zhilong Li. A Novel Method of Parallel GPU Implementation of KNN Used in Text Classification, Zhejiang Sci-Tech University , China
    Kelin Deng, Junwei Cao, Peng Guo and Xingtao Xu, Energy Saving Analysis of Harmonic Suppression in a Distribution Network,Tsinghua University, China
    Bin Zhu, Responsive design: E-learning site transformation , Hangzhou Normal University, China
    Hua He, Bin Zhu, Blended Learning of Professional English for Computer Science based on Moodle, Zhejiang International Studies University, China
    Yang Li, Xiang Chen Research on Education Reform of Dynamic P2P Training Framework Based on Cloud Computing,Hangzhou Normal University, China
    Xiang Chen, Yang Li Geometry-Based Virtual Simulation for Fire Escape in Emergency Environment,Hangzhou Normal University, China
Read More