syed bahauddin alam at ieee security 2010
TRANSCRIPT
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 1/20
No
Paper
ID Paper Title
The First
Author
The Second
Author
The Third
Author
The Fourth
Author
The Fifth
Author
The Sixth
Author
Accession
Number
10001- Realization Based on Hybrid LabVIEW
Wanxu Zhang Liu He Wu Zhao20110813677033
2 0002- An Advanced Design of Data Mining Wangjie Sun Zhigao Zheng 20110813677034
30003-
070
Development of Simulation System for
Auxiliary BoilerQiang Ma Aijun Ma Tao Wang
20110813677031
- V v4
-
074
of Oedaleus Fieber by SSRP-PCR Xianyun Zheng Nina Zhou Li Dang Enbo Ma
50005-
083
Rough Set Theories and Applications in
Security Evaluation of Hydropower
Engineering Construction
Xiazhong
ZhengJie Guo Shu Chen Wei Guo
20110813677029
60006-
098
Rough Set Attributes Reduction Based on
Adaptive PBIL AlgorithmLihua Wang Liangli Ma Qiang Bian Xiliang Zhao
20110813677030
70007-
103
Construct Assembly Model for Assembly
Sequence Planning Xiaoming Guo Liangli Ma Yang Shi20110813677027
8-
104
of Army Aviation Based on the "3S"Fuxin Jin Jiangang Yan Donghua Pan
90009-
115
An Algorithm for Moving Semantic
Objects Trajectories Detection in VideoLiang Zhang
Xiangming
WenWei Zheng Bo Wang
20110813677025
0010- A Hardware Multiplier Design of 20110813677026
117 Embedded Microprocessor
eng a m n en anwen ang
110011-
140
The Single-chip Solution of Embedded
USB EncryptorHanlin Chen
20110813677023
120012- Design of Generalization of Threshold
Xueming Wang Ruifang Ren20110813677024
gncryp on c eme ase on
130013-
191
The Technology of Music Retrieval by
Humming and Its Application in InternetYunfeng Dong Bei Qi
20110813677021
14 0014-247 Conformance Testing for IS-IS ProtocolBased on E-LOTOS Yulan Zhao Yingze Liu Xiaoqing Guo ChenguangZhang 20110813677022
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 2/20
Cycle Chain Ladder Deceleration Control
150015-
254
Method Research Based on Permanent
Magnet Synchronous Generator
Yecheng Zhang Guohai LiuRongbiao
Zhang
Chunyan
Zhang
20110813677019
160016-265
The Design of a Remote Control SignalSource Based On SPI Bus
ZenggangWang
Shujing Su20110813677020
17
0017-
271
obust otat on st mat on o ap
Fingerprint ImageYanmiao Li
Yongliang
ZhangJiawei Lu Chaofan Liu
Shanshan
Fang20110813677017
180018-
286
Homologous Detection Based on Text,
Token and Abstract Syntax TreeYan Zhang Xinyu Gao Ce Bian Ding Ma
Baojiang
Cui
20110813677018
0019- A Face Anal sis and Descri tion Don chen 20110813677015
19 307
Algorithm Based on Depth Information Shi Fengguang Shi
200020-
315
Research on IR Small Target Detection
and Backgroud SuppressionXingqiao Qin Yujuan Zhao Kai Yang Hui Wang
20110813677016
210021- Improved Method for Source Camera Gengzhong
Wenhui Lan Jianshe Wan20110813677013
323 orens cs s ng ompress on Wang
220022-
326
Software Documents Quality
Measurement- A Fuzzy ApproachChangli Sun
20110813677014
230023-
Manipulation and Transparency Controlof ICT constituted E-Administrative
Syed
BahauddinA B M Rafi Md. Nazmus
Hussain
Mohammed Celia
Shaikh
Anowarul20110813677011
387 Protocol via Digital Watermarking for AlamSazzad Sakib
Dipu Kabir Shahnaz Fattah
240024-
388
A Secured Electronic Transaction
Scheme for Mobile Banking in
Bangladesh Incorporating Digital
Syed
Bahauddin
Alam
Hussain
Mohammed
Dipu Kabir
Md. Nazmus
Sakib
A B M Rafi
SazzadCelia
Shahnaz
Shaikh
Anowarul
Fattah
20110813677012
25
0025-
397
Exploring the Data Locality of On-Board
Disk Cache Yuhui Deng Jipeng Zhou Xiaohua Meng
20110813677009
260026-
401
2D-RAID-Based Array Self-adaptation
StrategyJi Zhang Bing He
20110813677010
0027- A Rockin Period Control Method for a Soichiro 2011081367700727
442
Biped Quasi Passive Walker Using aYing Cao
SuzukiKangling Fang
280028-
443
UPPAAL-Based Real-Time Testing: New
Coverage Criteria and Length-Optimal
Test Generation
Lin Xi Qinglei Zhou20110813677008
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 3/20
0029- Performance Analysis of Turbo Codes Dongfeng 2011081367700529
455 with Different Interleavers and DecodingKaiying Sun
YuanXiaotian Zhou
30 0030-477
Recognition of Expression Variant Faces
– A Principle Component Analysis BasedApproach for Access Control
JanarthanyNagendrarajah M.U.S. Perera 20110813677006
31
0031-
510
A Novel Digital Watermark against RST
Distortion Based on SURFBin Zhang Jiazhen Wang Jiafu Wen Bin Zhang
Zhongling
Tong
20110813676874
320032-
511
Temperature Controlling Design Based on
VB and PLCYaning Sun Junyu Fu
20110813677004
0033- Desi n and Im lementation of VEEL 20110813676875
33 513
Archive System for Computer Forensics Gang Zhou Yonghao Mai Qiang Cao
340034-
531
UR Coding – A Novel Algorithm for Data
Compression
Syed Usama
Khalid
Muhammad
Asim Noor
20110813676873
0035-Neural Network-based Terminal sliding
20110813676877
35579
o e ontro or t e ncerta nty
Coupled Chaotic System with TwoLiming Wang
36 0036-611
ROI–Based Tamper Detection and
Recovery for Medical Images UsingReversible Watermarking Technique
Osamah M. Al-Qershi
Bee Ee Khoo 20110813683708
370037-
612
A Recursive Construction of p-ary Bent
Functions Which are not Weakly RegularYin Tan Jing Yang Xiao Zhang
20110813676879
380038-
621
A Test-Driven Web Application Model
Based on Layered ApproachDengshan Tian Jiwen Wen Yin Liu Ning Ma
Huiping
Wei
20110813676876
39
0039-
623
Method to Generate Elliptic Curves
Based on CM Algorithm Bin Yu
20110813676881
400040-
624
Improved K-Means Cluster Algorithm in
Telecommunications Enterprises
Customer Segmentation
Jinghua Zhao Wenbo Zhang Yanwei Liu 20110813676878
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 4/20
No
Paper
ID Paper Title
The First
Author
The Second
Author
The Third
Author
The Fourth
Author
The Fifth
Author
The Sixth
Author
Accession
Number
410041- Pipelined Implementation of AES
Yulin ZhangXinggang
W
20110813676882
420042-
071
Generalized Fast Coding Steganographic
Algorithm Based on Prime NumberYu Fu Sen Xu
20110813676880
430043-
072
Design and Realization of the MSN
Monitoring SystemGuotian Xu
20110813676884
44 0044-095
Computing the K-Error 2-AdicComplexity of 2
n-Periodic Sequence
Zhihua Niu Zheng Li 20110813683709
450045-
101
A Study of Intrusion Detection System
Based on Data MiningChunyu Miao Wei Chen
20110813676886
460046-
119
A Location Privacy Preserving Algorithm
Based on Linkage ProtectionZ.P. Jin Jian Xu Ming Xu Ning Zheng
20110813676883
47
0047-
159
Optimized Source Authentication Scheme
for Multicast Based on Merkle Tree and Yang Li Miao Zhang Yanhui Guo Guoai Xu
20110813676888
0048- Research on Data Streams Publishin of 2011081367688548
161
Privacy PreservingGaoming Yang Jing Yang Jianpei Zhang Yan Chu
490049-
168
An Identity Authentication Scheme Based
on USB Key for Trusted Network Zhihui Liu Lize Gu Yixian Yang Guoqiang Xing
20110813676890
500050- An Attack Graph Based Network Security
Haihui Ge Lize Gu Yixian Yan Kewei Liu20110813676887
170 va uat on ode or erarch ca
510051-
179
Image Tamper Detection Algorithm Based
on Radon and Fourier-Mellin TransformTao Jing Xinghua Li Feifei Zhang
20110813676892
520052-
188
A Novel Extended Visual Cryptography
Scheme Usin One Shared Ima eXiaotian Wu Wei Sun
20110813676889
530053-
189
Architectural-Enhanced Intrusion
Detection and Memory Authentication
Schemes in Embedded Systems
Lin Wang Xiang Wang Zichen Zhou Qinghai Liu Hao Yang20110813676894
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 5/20
Desi n and Implementation of an
540054-
194
Efficient Montgomery Modular Multiplier
with a New Linear Systolic Array
Jizhong Liu Jinming Dong20110813676891
55 0055-196
Grid Resource Selection Model Based onTrust Moment
Jingnan Wang Junfeng Tian Chao Li 20110813676896
560056-
201
onstruct ng c ent ert cate- ased
Encryption Scheme with Pairing in theYang Lu Jiguo Li
20110813676893
570057-
206
Improved Algorithm of Pattern Matching
based on BMHSYuting Han Guoai Xu
20110813676898
0058- A New Detection Scheme for Echo 20110813676895
58 207
Hiding Chunhui Xie Yimin Cheng Fubao Wu
590059-
209
Batch Rekeying Model Based on
Queueing Theory in Secure GroupGuopeng Li Bo Li Tinglong Du Jin Pan
Yuansheng
Li
20110813676900
600060- A Provably Secure and Practical Fair E-
Bin LianGongliang
Jianhua Li20110813676897
218 cash Scheme
Chen
610061-
226
Design of Sensitivity for Direct Trust
Computation Model in Trusted NetworksYanfeng Fan Zhixiao Yang Bin Zhang
20110813676902
620062-230
Research on Supply-Chain InformationManagement of Animal Products Based
Shengjun Yuan Caixia Zhao20110813676899
630063-
234
Conflicts Analysis and Resolution for
Access Control PoliciesYigong Wang Hongqi Zhang
Xiangdong
DaiJiang Liu
20110813676904
640064-
236
Application of Intelligent Transparent
Encryption Model on Intranet SecurityPing Zhang Zeguo Wei
20110813676901
65
0065-
239
The C-Secure Codes from BIBD and
Packing Design YuLi Zhang Qingjun Cai
20110813676906
660066-
248
An Improved Kerberos Protocol Based on
Fast RSA AlgorithmDahui Hu Zhiguo Du
20110813676903
0067- Ima e Information Hidin Al orithm Xiaolon 2011081367690867
252
Based on DWT with Alterable ParametersHaiying Gao
Zheng
680068-
253
A Practical Implementation of Ternary
Query Tree for RFID Tag Anti-Collision
Ching-Nung
YangYu-Ching Kun Jyun-Yan He
Chih-Cheng
Wu
20110813676905
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 6/20
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 7/20
0084- A Key-Chain Based Key Management 2011081367699884
309 Scheme for Heterogeneous SensorGuohua Ou Jie Huang Juan Li
850085-
320
Recursive Construction Method of
Boolean PermutationsHaimo Zhang
20110813676996
860086- Identity Management with Trust
Xiang Zou Bo Jin20110813676997
e at onsh p and r vacy reservat on
870087-
329
A Secure Distributed Key Management
Scheme for AD Hoc Network Yan Xu Hong Zhong
Xianping
YuanJia Yu
20110813676994
880088-
Probability Analysis and Application of
XOR Difference Between Jie Guan Lin Din20110813676995
(X+K)mod2n and X⊕K
890089-
338
A Modified Cooperation Stimulation
Mechanism Based on Game Theory in AdGuan Wang Yu Sun Jianwei Liu
20110813676992
900090- Input Method against Trojan Horse and
Sho i SakuraiShinobu 20110813676993
340 Replay Attack
Ushirozawa
910091-
347
Identity Attributes Quantitative Analysis
and the Development of a Metrics Model
Using Text Mining Techniques and
Jackson Phiri Tiejun Zhao20110813676990
0092- Desi n and Anal sis of Ba esian Game in 2011081367699192
350
Role Based Trust ManagementLan Li Wei Cai Lin Liang Lei Fan
930093-
352
Digital Spliced Image Forensics Based on
Edge Blur MeasurementQianru Zheng Wei Sun Wei Lu
20110813676988
940094- Automated Planning for Incident
Pin Liu Haifen Yu in Miao20110813676989
353 Response Based on CBR
950095-354
Verifier-Based Password AuthenticatedKey Exchange Protocol via Elliptic Curve
Zijian Zhang Qijian Zhang20110813676986
960096-
360
Analysis and Improvement of the Linear
MAKEP ProtocolXinglan Zhang Dapeng Shao
20110813676987
970097-
362
Cryptanalysis of a New Blind Signature
Based on the DLPHua Chen Jianhua Chen
Guangxing
Cai
20110813676984
98
0098-
371
Information Hiding for H.264 in Video
Stream Switching Application Yao Guo Feng Pan
20110813676985
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 8/20
0099- The Research of Recovery Mechanism in Mengmeng 2011081367698299
372 The Process of the Trusted ChainXiaolin Yi Xuhui Liu
FengYujing Wang
1000100-
373
Efficient and Scalable Multicast Key
Management Using Attribute BasedHongyong Jia Yue Chen Xiuqing Mao Ruiyu Dou
20110813676983
1010101- A New Watermarking Method Based on
Chao Cao Ruoyu WangMinghu
Rujun Chen20110813676980
and resne ract on rans orms uang
1020102-
377
A General Scheme for Construction of
Bound Entangled States by Convex LinearWei Cheng Fang Xu
20110813676981
1030103-
381
An Improved Method Based on Random
Hash Lock Guozi Sun Wan Bao Danwei Chen Qiufeng Ding
20110813676978
104 0104-384
A Cryptographic Algorithm Based on pq-Generalized Fibonacci Matrix
Ying Zhang 20110813676979
1050105-
385
Watermarking with Fast and Highly
Secured Encryption for Real-time Speech
Hussain
Mohammed Saeed Anwar
Syed
BahauddinK. M. Sabidur
Rahman
Md. Abdul
Matin
Imranul
Kabir20110813676976
gna s pu ab r am howdhury
1060106-
389
Hardware Based Realtime, Fast and
Highly Secured Speech Communication
Using FPGA
Hussain
Mohammed
Dipu Kabir
Syed
Bahauddin
Alam
20110813676977
0107- Performance of the Direct Sequence 20110813676974107
394
Spread Spectrum System with Single-toneHongling Li Bin Pei Yunfei Huang Qidi Yang
1080108-
395
An Image Encryption Scheme Based on
Image ComplexityFeng Pan
ChuanCai
WangXiaoNan Chen
20110813676975
1090109- An FDIA Approach for Aircraft Based on
Caihon Jian Xi Wan Ai He Xian xin Kon20110813676972
396 The Kalman Filter
1100110-398
An Efficient and Practicable AnonymousAuthentication Scheme Using Smart
Jie Gu Liang Zhao Zhi Xue20110813676973
1110111-
Adoption of Delayed Feedback Rekeying
Algorithm for Secure Multicast Services Ibrahim Hesham M.EL EL Sayed 20110813676970
409 During Handover in Mobile WiMAX A.Gomaa Badawy M.Saad
1120112-
412
The Study of Secure Agent-Based Scheme
on Health Information Systems
Tzer-Long
Chen
Szu-Han
ChengChia-Hui Liu
Tsui-Ying
Fang
Tzer-
ShyongChih-Sheng
Chen
20110813676971
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 9/20
Group Key Mana ement Based on
1130113-
419
Information Flow Policy
for Multi-Privileged Groups
Zhen Wang Xuehui Du Yi Sun Guoyu Xu20110813676968
114 0114-421
A Compliance Policy Model for SecurityAudit
Lianzhong Liu Xiaoni Wang DongliangJiao
20110813676969
0115- Statistical Modelin of DCT Coefficients 20110813676966115
428
for AudioCuiping Wang Li Guo Yifang Wei Yujie Wang
1160116-
430
Against Mobile Attacks in Mobile Ad-hoc
NetworksShushan Zhao
Akshai
Aggarwal
20110813676967
1170117- Intrusion Detection Based on Model
Wei un Zhu in lei Zhou Pin Li20110813676964
432 Checking Timed Interval Temporal Logic
1180118-
437
Provably Secure Identity-Based Key
Agreement Protocols under SimpleXiufeng Zhao Qiuliang Xu Hao Wang
20110813676965
1190119-
444
An Intrusion-Resilient Signature Scheme
Based on ECDLPChenghua Li Xingbo Peng
20110813676962
1200120-
450
Enabling User Privacy in Identity
Management SystemsKheira Bekara
Maryline
Laurent
20110813676963
121 0121-460
A Comparative Study on SoftwareVulnerability Static Analysis Techniques Peng Li Baojiang Cui 20110813676960
1220122-
462
A Practical Customer Privacy Protection
on Shared Servers
Pramote
Kuacharoen
20110813676961
1230123-
463Building the Chip Based SSL Protocol Liping Du Jie Wang
20110813676958
-124
-
469
Dataflow Analysis
Yongji Ouyang
Wang
Qiang Wei Jie Liu
1250125-
470
3D Visualization Model Using Cyclic
Distributions of Complex 0-1 SequencesYao Zhou
Jeffrey Zhijie
Zheng
20110813676956
1260126- Detecting Malicious Rootkit Web Pages
Hen a LiuDongmei
Gen u Wei Jinxin Zhon20110813676957
472 in High-interaction Client Honeypots
Zhang
1270127-
474
A Novel Blind Watermarking Scheme
Based on Neural Networks for Image
Yonghong
ChenJiancong Chen
20110813676954
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 10/20
0128- 3D Visual Method for Logic Functions on Jeffrey Zhi J. 20110813676955128
480
Exhaustive SequencesQingping Li
Zheng
1290129-
481
Worm Containment Based on Double-
Neighbor Lists in P2P Overlay NetworksChunfu Jia Xin Liu Guoyou Liu Zhichao Hu
20110813676952
1300130- Detecting Spam Comments with
’Qianqian Wang Bin Liang Wenchang Shi Zhaohui Liang Wei Sun
20110813676953a c ous sers e av ora
1310131-
484
New Client Puzzle Approach for DoS
Risistance in Ad Hoc Networks
Antonis
Michalas
Nikos
Komninos
Neeli R.
Prasad
Vladimir A.
Oleshchuk
20110813676950
1320132-
488
Vulnerabilities Static Detection for Web
Applications with False PositiveJianjun Huang Bin Liang Jiagui Zhong
Qianqian
WangJingjing Cai
20110813676951
133 0133-489
An Efficient Cryptanalysis of a ChaoticCryptosystem and Its Improvement
Xianfeng Guo Jiashu Zhang 20110813676948
134 0134- Cryptanalysis of Harn-Ren’s Multi- Jingjing Li Shixin Zhu 20110813676949
0135- Application Traffic Classification Based 20110813676946
498 on Command Exchange Mode of TCPu en ayu ng ao e
1360136-
515
An Effective Access Control Mechanism
in Home Network Environment
Based on SPKI Certificates
Bin Song In-Kwan Yu Jiseong SonDoo-Kwon
Baik
20110813676947
137-
516
ased ey anagement ethod
for Wireless Sensor NetworksDong Li Yixian Yang Yang Xin Bin Tian
1380138-
520
A Robust Text Digital Watermarking
Algorithm Based on FragmentsWengang
ChengHui Feng Cuiru Yang
20110813676945
0139- Practical Identity-Based Signature 20110813676942
521 without Random Oracleeng uo ong e u n ang uo
1400140-
524
An Alterable-Capacity Authentication
Watermarking Algorithm with SuperiorYaoran Huo Fan Chen Hongjie He Zhongke Yin
20110813676943
1410141- Trusted Module Based Secure Electronic
Jian Mao Ku Li Xiandong Xu20110813676940
ransact on c eme
1420142-
533
A Secure Mobile RFID Architecture for
the Internet of ThingsTao Yan Qiaoyan Wen
20110813676941
1430143-
535
A Fast Regular Expression Matching
Algorithm for Deep Packet Inspection Lei Guo Yadi Wang Qing Yao Shuqiao Chen Yuxian Jian20110813676938
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 11/20
0144- Application Independent Identity 20110813676939144
543
ManagementZombo Fu Jianxin Wang Lin Yang Yuan Cao
1450145-
544
A Practical Dynamic Multi-Secret Sharing
SchemeJuan Qu Limin Zou
Jianzhong
Zhang
20110813676936
1460146- Image Steganography Based on Sparse
Soodeh AhaniShahrokh 20110813676937
ecompos t on n ave et pace aemmag a
1470147-
548
Introducing a Framework for Security
Measurements
Morteza Ansari
Dogaheh
20110813676935
1480148-
557
The Integration Technology of Multi-
source Heterogeneous EMR Based onYabin Xu Yunmei Shi Xuhong Liu
20110813676917
149 0149-564
A Scalable Encryption Scheme forCCSDS Image Data Compression
Mingyu Li Xiaowei Yi Hengtai Ma 20110813676933
1500150-
568
A Dynamic Authorization Model Based
on Security Label and RoleJing Gao Bin Zhang Zhiyu Ren
20110813676934
1510151-
581
A New Method to Construct DoS Attack
Oriented to Attack Resistance TestNing Zhu Yongfu Zhang Xinyuan Chen
20110813676919
1520152-
582
Preimage Awareness Proofs of Two
Compression FunctionsMengdong Li
20110813676920
0153- Privacy-Aware: Tracking and Protecting Weiwei 20110813676921153
583
Sensitive Information Using Automatic Ouyang
1540154-
588
Qualitative Initial Risk Analysis for
Selecting Risk Analysis ApproachJung-Ho Eom
Young-Hyun
ChoiSeon-Ho Park
Tai-Myoung
Chung
20110813676922
1550155- Study on Data Acquisition Solution of
Kunlun Gao Jianmin Liu Jian Guo Rui An20110813676923
593 Network Security Monitoring System
156 0156-596
On the Application of Ethernet in aDistributed Radar System
Zhoujie Yan Qiongzhi Wu Fang Nan 20110813676924
1570157-
600
Vulnerabilities in Personal Firewalls
Caused by Poor Security Usability
Bander
AlfayyadhJames Ponting
Mohammed
AlzomaiAudun JØsang
20110813676925
1580158-
609
An Efficient Chinese Remainder Theorem
Based Node Capture Resilience SchemeYi Ren
Vladimir A.
Oleshchuk Frank Y. Li 20110813676926
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 12/20
No
Paper
ID Paper Title
The First
Author
The Second
Author
The Third
Author
The Fourth
Author
The Fifth
Author
The Sixth
Author
Accession
Number159
0159- The Attempt about Using ImageHui Zhou Bing Yan Guangchao Du Ping He
20110813676927
1600160-
025
Design of Ship Dynamic Hydrocyclone
Slop Treatment SystemQiang Ma Yuna Miao
Xiangxin
Cheng
20110813676928
1610161-
044
FTA Applied in Management of High-
Rise Buildings Fire PreventionHongmin Li
20110813676929
1620162-
056
Theory and Simulation of StatisticalRepresentation of the Stokes Parameters
in Multilook Fileds Based on PolarizationTao Liu Qi Chen
Youbing
ZhangQifeng Wang
20110813676930
1630163- Dynamic Weighted Track Fusion
Yu Zhang Jinhe Ran20110813676931
1640164-
152
Full Interference Cancellation for An
Asymptotically Full Rate CooperativeGaojie Chen
Jonathon
Chambers
20110813676932
165 0165-157
Resolution Analysis of the MUSIC-BasedTOA Algorithm
Jing Li Maoyong Cao Liang Pei 20110813677048
1660166-
167
Multi Parameter Estimation of Wideband
Chirp Signals Based on OMPXiangyun Gao Tianqi Zhang
20110813677045
1670167-
185
A Novel Sub-Optimal PTS Algorithm for
Controlling PAPR of OFDM SignalsFang Wang Fei Weng
Zhenchao
WangLixia Chen
20110813677050
168-
214
mage e- o s ng gor t m tu y an
Realization Based on Wavelet Analysis
Yulin Zhang Xia Zhu
1690169-
228
Affine Model for Disparity Estimation in
Multiview Sequence CodingJiali Zheng Tuanfa Qin
20110813677052
0170- Empirical Mode Decomposition of Traffic 20110813677049
240 Time Seriesan a ue eng an ang eq ang ong
1710171-
241
Time-Dependent Hurst Exponent in
Traffic Time SeriesJianhai Yue Pengjian Shang Keqiang Dong
20110813677054
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 13/20
Research Conflict Problems of D-S
1720172-
266
Evidence and Its Application in Multi-
Sensor Information Fusion Technology
Huiping Peng Xiaojun Cao20110813677051
173 0173-301
Wideband MIMO Channel SpatialCorrelation Measurement under Different
Limei Lin Yang Wang Jiliang Zhang Dayong Yan 20110813677056
1740174-
339
mage estorat on w th gn cant
Curvelet Coefficients Index SetQianzong Bao Qingchun Li
20110813677053
1750175-
341
A Kind of Bit and Power Allocation
Approach for OFDM Systems in theLei Wang Ying Liu Chen Gu Wei Zhang
20110813677058
0176- An Obstacle Detection Al orithm Based Xiaochuan Yuan 20110813677055176
348
on U-V Disparity Map AnalysisMin Zhang Peizhi Liu
ZhaoXinxin Zhao
Zhang
1770177-
349
A Novel Line Detection Algorithm in
Images Based on Improved Hough
Transform and Wavelet Lifting Transform
Xiaochuan
ZhaoPeizhi Liu Min Zhang Xinxin Zhao
20110813677060
1780178-
364
Fast Algorithm for Direction of Arrival
Based onTime-Frequency DistributionsLutao Liu Liguo Wang
20110813677057
1790179-
367
The Application of Grey Clustering
Analysis on Social Impact Assessment of Natural Forest Protection Project
Haihua Li Yingying Fu Weiping Tang Weijie Yang20110813677062
1800180-
386
A Loss-less Compression Technique for
High Quality Speech Signals and It’s
Implementation with MPEG-4 ALS for
Hussain
Mohammed
Dipu Kabir
Syed
Bahauddin
Alam
Md. Abdul
Matin
Imranul Kabir
Chowdhury20110813677059
1810181- Research on the Relationship Between
Xinxin Pei Zhi an Huan Yanbo Zhu Wei Liu20110813677064
408 and the umber o tat ons or
182 0182-413
Research on Robust UnscentedRegularized Particle Filtering
Li Xue Shesheng Gao JianchaoWang
20110813677061
1830183-
427
Research and Implementation of an
Improved 800BPS Speech CodingJiyong Zhao Jingyuan Wang Xia Zou Zhiyong Xu
20110813677066
1840184-
452
A Novel Sparse Representation Algorithm
Based on Local CompetitionsPing Cheng Haitian Liu Jiaqun Zhao
20110813677063
185
0185-
457
A Multi-Source Cooperative Scheme
Based on IDMA Aided Superposition Xiaotian Zhou Haixia Zhang
Dongfeng
Yuan
20110813677068
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 14/20
0186- An Audio Watermarking Algorithm for Dongsheng 20110813677065186
465
Audio AuthenticationHong Zhao
Shen
1870187-
485
Subsample Time Delay Estimation in
Impulsive Noise EnvironmentYing Guo Caiyun Meng
20110813677070
1880188- BEM-Based Soft-in Soft-out Detection of
Zheng feng Du Jiee ChenDongfeng
Xiaotian Zhou20110813677067
mp oy ng yc c roup odes uan
1890189-
527
Blind Source Separation Based on a Novel
Relative GradientYunfeng Xue Yujia Wang Qiudong Sun
20110813677072
1900190-
Combination of Two Adaptive Filters for
Interference Miti ation Based on Space Zhenyu Tan Son tao Lu20110813677069
Time Processing
1910191-
562
DCT Image Watermarking Technique
Based on the Mix of Time-domain
Dongyang
TengRenghui Shi Xiaoqun Zhao
20110813677074
1920192- Image Synchronization Using Watermark
Xin Xu Ru Zhan Xinxin Niu20110813677071
563 As RST Invariant Descriptors
1930193-
572
Remote Control of an Electrical Car with
SSVEP-Based BCIHongtao Wang Ting Li
Zhenfeng
Huang
20110813683710
1940194- Improved Method for Detecting the Short
Pan Hu Hongyu Zhao20110813677073
Paper The First The Second The Third The Fourth The Fifth The Sixth Accession
Session 4 Network Theory and Technology
195 0195- A New Underwater Sensor Networks Junjie Zheng Shudao Zhou Zhihua Liu Song Ye Lilong Liu Lu Yin 20110813677077
1960196-
250
An Adaptive Error Control Mechanism
for Wireless Media Streaming Based on
GOP Fetchin and Cross-la er Desi n
Hongqiang Jiao Wanning Ding20110813677075
-
1970197-
308
Distributed Scheme Based on Network
Coding to Construct k -RedundantJing Wang Xiangyang Liu Xinmei Wang
20110813677079
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 15/20
A Model of the Solution of the Task
1980198-
328Distribution and Load Balance among
Parallel Multiprocessors Based on theMian Sun Jieao Zhu Xue Liu
Jeffrey Zhi-jie
Zheng
20110813677076
199 0199-404
Research on Double Chaos EncryptionAlgorithm Based on Disturbance
Ping Chen Fenmei Wang Yihang Peng Dejun Chu 20110813677117
2000200-
411
Research on Data Forwarding Mechanism
for Space Information Network Xuehui Du
Xingyuan
ChenYadi Wang Daowen Hua
20110813677078
2010201-
420
Energy-Aware Routing Protocol in Fading
Channel for Mobile Ad Hoc NetworksXinyu Shen Limin Meng
20110813683712
0202- The Failure Probabilit at Sink Node of 20110813677116202
440
Random Linear Network CodingXuan Guang Fangwei Fu
2030203-
466
An Efficient A-DSR Routing Algorithm
for Asymmetric Space InformationHefei Hu Yuan’an Liu
20110813677118
2040204- Fault Tolerant and Storage Efficient
Jiayi Liu Zilian Pin20110813677119
468 recte - us on or re ess ensor
2050205-
540n-Order Prime Sequences Qingge Liu Guangwen Yan
20110813677120
Session 5 Communication and Information System
No
Paper
ID Paper Title
The First
Author
The Second
Author
The Third
Author
The Fourth
Author
The Fifth
Author
The Sixth
Author
Accession
Number
2060206-
060
Research on Adaptive Control Algorithm
of Jitter in Laser Beam Pointing Zhaowei Sun Xiangzhi Li 20110813677121
207 0207-065
A New Photonic Crystal Patch AntennaBased on EBG Structure
Jianwei Wang Kang Xie 20110813677122
2080208-
078
Predictions Based on the GM Model of
Gre S stemWuji Sun Yichen Liu Wei Fu 20110813677123
2090209-
082
Research on The Key Technologies of
DRM Intercommunications
Dongfang
ZhangYu Han Shuai Zeng Jianli Ma 20110813677124
2100210-
139
Conceptual Interoperability Model of
NCW SimulationYuanzheng Ge Xiaogang Qiu Kedi Huang 20110813677125
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 16/20
0211- Joint Source-Channel Coding Based on211
178 End-to-End Distortion over WirelessYan Huo Tao Jing Liyuan Zhong 20110813677126
2120212-
200
The Research and Design of
Communication Power Supply Based onthe Proton Exchange Membrane Fuel Cell
Renbin Feng Hui Wang Kui Xie Chunhua Xu Enyong Hu 20110813677127
2130213-
216
Optimizing the Number of Pilot Symbols
for OFDM SystemsBin Sheng Laili Wang Lan Chen 20110813677128
2140214-
235
Cooperative Communication with
Grouped Relays for Zero-Padding MB-Tao Xu H. Lu H. Nikookar R. van Leuken 20110813677129
0215- Flexible Resources Reservation Scheme Hassene Sihem215
243
for Ad Hoc Networks Bouhouch Guemara El20110813677130
2160216-
256
Research on Fuzzy Comprehensive
Evaluation of Enterprise Websites
Xiaohong
WangLiwei Li Ling Tian 20110813677131
2170217- A Large Family of Binary Sequences with
Yefen He Wenpin Ma 20110813677132269 Low Correlation
2180218-
272
Simulating BB84 Protocol in Amplitude
Damping ChannelYingkai Tang Xiaoyu Chen 20110813677133
219 0219-279
A Kind of Cyclotomic Numbers andSidel'nikov Sequences
Jing Yang Lingli Xia 20110813677134
2200220-
289
Design and Implementation of the Mobile
Internet of Things Based on TD-SCDMAZhiyong Shi Kui Liao Shiping Yin Qingbo Ou 20110813677135
2210221-
310
The Remote Intelligent Controlling and
Monitoring System of Home AppliancesPeng Wang Lixiang Yan Jun Wang
Yuancheng
Zhu20110813677136
2220222-
333
Research of Information Dissemination
Model Based on Network Centric WarfareYong Yao Zhi Li 20110813677137
2230223-
342
Research for Service Fastly Setuping and
Restoration in Mesh Network Zegang Bai 20110813677138
0224- A Cooperative STC Scheme for IEEE Xuezhen
225 0225- Stability Analysis for Ranking Algorithms Wei Gao Yungang Li Liang Youming Xia 20110813677046
226 0226- A New Equation Involving the Euler Bin Chen 20110813677043
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 17/20
A Low-complexity Schedulin Scheme
2270227-
399
for Multiuser MIMO System Based on
Tomlinson-Harashima Precoding
Heng Liu Li Hao Pingzhi Fan20110813677044
228 0228-403
Low-Density Parity-Check Codes forAsymmetric Distributed Source Coding
Jeffrey J.Micallef
Reuben A.Farrugia
Carl J. Debono 20110813677041
2290229-
418
On the Application of Sphere Decoding
Algorithm in Overload MIMO SystemsXiaoli Lian Daoben Li
20110813677042
2300230-
448
Distributed Fusion for Satellite Passive
Localization Using Convex CombinationZhengbin Yang Yan Qiu Xiaoxing Li Yong Kang
20110813677039
0231- Deterministic Multi le Access Wireta Vahid Mahmoud 20110813677040231
449
Channel JahandidehSomaye Salimi
Salmasizadeh
2320232-
456
Closed-Loop Four-Antenna Transmission
Schemes Based on EO-STBCs withPeng Zhang
Dongfeng
YuanHaixia Zhang Xiaotian Zhou
20110813677037
0233-Performance Analysis for Rectangular
20110813677038233
459QAM Modulation with Arbitrary Bits-to-
Symbols Mapping over Rician Channel
Youfu Yang Jianwei Liu Qishan Zhang Chundi Xiu
2340234-
467MSN and QQ in China Xiaodong Hai Laurent GILLE
20110813677035
0235- Undetected Error Probabilit of Hammin Jaskaran S. Bharat Naresh 20110813677036235
476
Code for Any Number of SymbolsManish Gupta
.
Bhullar
Bansal
2360236-
479
A Simple Simi-Blind Equalization
Algorithm for Precoding Single Carrier
System with Frequency DomainMeiyan Ju Li Li
20110813677080
2370237-
486
An Improved Geography and Overlay
Routing in Urban Vehicular EnvironmentMiao Hu Tao Luo Xinjun Shi
20110813677081
2380238-
487
A Self-Optimizing Method Based on
Handover for Load BalancingBo Wang
Xiangming
WenWei Zheng
20110813677082
0239- Distributed Turbo with Pre-Decodin in Jianhon 20110813677083239
494
Relay Communication ZhengXinli Zhao
2400240-
501
A Novel Downlink Signaling Method for
OFDM Based Cognitive Radio SystemHaigang Zhang
Dongfeng
Yuan
20110813677084
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 18/20
0241- A Format-Compliant Encryption Scheme Zilong 20110813677085241
512
for JPEG2000 CodestreamJiafu Wen Jiazhen Wang Bin Zhang Zhande Li
Huang
2420242-
522
A Novel Constant-Power Bit Loading
Algorithm for QAM Modulated OFDM
Yunxia Song Deqiang Wang Man LiYuanyuan
Yang
20110813677086
2430243- A Relay Selection Scheme for IR-UWB Yuanyuan
Deqiang Wang Man Li Yunxia Song20110813677087
etwor s ased on stance n ormat on ang
2440244-
525
On Repeated-Root Cyclic Codes and Its
Weight Enumirator
Jaskaran S.
BhullarManish Gupta Sonia
20110813677088
2450245-
528
A Low Complexity Resource Allocation
Method for Relay OFDMA SystemsGaojun Song Hongwu Liu
20110813677089
246 0246-529
Outage Capacity Analysis for SIMONakagami-m Fading Channel in Spectrum
Yang Yang Xin Liu Qihui Wu Jinlong Wang 20110813677090
2470247-
534
Cooperative Relay Cognitive Interference
Channel
Mohammad
Kazemi
Mohammad
Reza Aref
Mahmood
Ahmadian20110813677091
ttar
2480248-
537
Cooperative Relay Cognitive Interference
Channels with Causal Channel StateMohammad
Kazemi
Mahtab
Mirmohseni
Mohammad
Reza Aref
20110813677092
2490249- Iterative Multi-Channel Equalization and
LDPC Decodin for Underwater Acoustic Lian Zhao Jianhua Ge20110813677093
554
Coherent Communications
2500250-
573
Achievable Rate Regions for Relay
Channel with Private Messages withBahareh
Akhbari
Mahtab
Mirmohseni
Mohammad
Reza Aref
20110813677094
2510251- Compress-and-Forward Strategy for Mahtab Bahareh Mohammad 20110813677095
575 Causal Cognitive Interference Channel Mirmohseni Akhbari Reza Aref
252 0252-594
Cognitive Radio-Based InterferenceAvoidance Schemes for MB-OFDM
Man Li Deqiang Wang Yunxia Song YuanyuanYang
20110813677096
2530253-
601
Proportional Resource Allocation for
Multi-User OFDM SystemsXinfeng Zhao Laibo Zheng
Mingjuan
HuanJintang Wang
20110813677097
2540254-
603
The Teaching Reform Research and
Practice of Satellite CommunicationsYajuan Xue
20110813677098
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 19/20
Construction of Multiple-Wei ht
2550255-
606
Signature Pattern Codes
for Optical CDMA Networks
Xiyang Li Pingzhi FanShinya
Matsufuji20110813677099
Session 6 Artificial Intelligence and Machine Learning
No ID Paper Title
Author
Author
Author
Author
Author
Author Number
2560256-
066
Detecting Objects in Complex Urban Area
Using Depth InformationYu Song Haijun Zhou
Xiongchang
Pang20110813677100
0257- Research on the Disposal of Negative Xianwen
111 Partial Product for Booth Algorithm
eng a m n en
Yang
2580258-
127
Optimization of the Compensatory
Anticathode in the Electric Fields
Protection of Ship Based on EvolutionaryQiang Bian Min Zhang Lihua Wang Fangjun Zhou 20110813677102
259-
131
erarc ca uzzy ystems as n versa
ApproximatorsLijuan Cai Zhanhua Cui Huilin Liu 20110813677103
2600260-
181
Image Splicing Detection Based on
Moment Features and Hilbert-Huang
Xuefang Li Tao Jing Xinghua Li 20110813677104
0261- Algorithm of Ensemble of Multi-Cassifier
183 Based on Roughnessun ang
2620262-
210
Combination Rule for Belief Functions
Based on Improved Measure of ConflictYing Peng Huairong Shen 20110813677106
2630263- Handwritten Character Recognition via
Kaibing Zhang Jun Lu 20110813683711
2640264-
425
Distributed log information Processingwith Map-Reduce
A Case Study from Raw Data to Final
Models
Mingyue Luo Gang Liu 20110813677107
2650265-
539
A Novel Scheme of Webpage Information
Hiding Based on Attributes
Dongsheng
ShenHong Zhao 20110813677108
2660266-
542
An Effective Resources Organizational
Structure in the Grid Environment
Qing YaoXingyuan
Chen
Lei Guo Xi Wang Yuxian Jian 20110813677109
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010
http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 20/20
0267- Effects of Image Lossy Compression on Yinglong267
591
Palmprint Verification PerformanceHengjian Li Jizhi Wang
WangJiashu Zhang 20110813677110
2680268-
607
Matter Element Analysis Theory to Urban
Public Transport System Evaluation
Meng Li 20110813677111
269 0269- Establishement of Elliptic Curve Bin Yu 20110813677112
2700270-
626
Classify Encryption Algorithm Methods
Using Pattern Recognition Techniques
Suhaila O.
Sharif L.I. Kuncheva S.P. Mansoor 20110813677113