※ 注:请务必使用IE浏览器登录投稿系统
Important Dates:
Paper Submission Deadline:
October 25, 2016
Notification of Acceptance:
November 1, 2016
Registration Deadline:
November 10, 2016
About Changchun Normal University
About Changchun
Sponsor:
Changchun Normal University
Co-Sponsors:
*Jilin University
*Northeast Normal University
*State and Local Joint Engineering Lab. of Advanced Network and Monitoring Contral(新型网络与检测控制国家地方联合工程实验室)
Technical Co-Sponsor:
IEEE Harbin Section
Invited Speeches

Invited Speech I

Speaker:
Dr. Shuai Liu was born in Changchun, China, Oct. 27th 1982.
He now works as an Associate Professor in the College of Computer Science, Inner Mongolia University. He has published more than 20 papers in Elsevier, Springer, Oxford and other publishers. He is now interested in image processing, computer vision and fractal.
He acts as an associate editor of IEEE Access now. He also acts as a guest editor of many journals, including Multimedia Tools and Applications, Mobile Networks and Applications, Computers and Electrical Engineering, and so on. He reviews papers for many journals, including IEEE Transactions on Fuzzy Systems, IEEE Transactions on Image Processing, Applied Mathematics and Computation, The Journal of Supercomputing, and so on.

Invited speech title:
Moving Target Tracking with Physical Feature

Abstract:

Recently, since computer vision becomes an important research domain, multimedia understandingand visual tracking of moving target are highlights today. Here, we discuss a novel tracking method for moving target with physical features. Physical features are considered to have strong robustness in real application, and a novel visual tracking method is presented with these physical features. This method transforms these physical features and applies them into real tracking method. Experiments show effectiveness and robustness of this novel method.

Invited Speech II

Speaker:
Wang Rong, (University of Electronic Science and Technology of China), as one of engineers in Chongqing University of Posts and Telecommunications, Wang Rong is striving for her doctoral programme in the University of Electronic Science and Technology of China. Till now, She has published several papers in scientific journals. Her study and research focuses on two fields: theory of wireless communication and radio signal processing

Invited speech title:
Impact of Frequency Offset on System Performanceof Universal Filtered Multi-Carrier System

Abstract:
With  4G cellular technologies now beginning to be deployed widely around the world,  the fifth generation (5G) mobile and wireless communication technologies are  emerging into research fields. New services, applications and devices will drive requirements on data rate, ubiquity of data services, latency, cost, and  reliability and further drive data traffic growth. Networks, services, and devices will be more heterogeneous and the need to connect billions of devices  to the network will emerge. To meet the above challenges, 5G wireless systems  will require a mix of new technologies to boost spectral efficiency, energy  efficiency, latency, and the network design. New multi-carrier transmission mechanisms such as filter bank multicarrier (FBMC) , universal filtered multicarrier (UFMC)transmission system are both presented as candidates for 5G mobile communication system. In this talk, we will introduce this exciting research area and discuss the impact of the frequency offset on the system performance of the UFMC system.

Invited Speech III

Speaker:
Mostafa sadeghi (Faculty of computer engineering, Najafabad branch, Islamic Azad University, Najafabad, IRAN).
Mostafa sadeghi completed a B.S. degree in Islamic Azad University Najafabad Branch, and received a M.S. degree in Computer Engineering at the Islamic Azad University Arak Branch.He isPh.Dstudent in Islamic Azad University Najafabad Branch, IRAN.
He is also a member of IEEE and a member of ICT societies of Amirkabir University IRAN.
Mostafa Sadeghi's research interests are in the areas of image processing and hardware implementation and optimization of image processing algorithms. He is also interested in QCA, CNT&CNFET, Quantum computing, Computer Arithmetic, as well as, VLSI design and computer arithmetic.

Invited speech title:
Arithmetic circuits in Quantum Cellular Automata

Abstract:

Quantum-dot cellular automata is one of the emerging technologies for designing Nano scale digital circuits.
Its advantages such as faster speed, smaller size, and lower power consumption are very attractive.
It is not far from mind that one day this technology will be replaced with conventional CMOS circuits.

Invited Speech IV

Speaker:
Dr. Miao Yu (Nanjing Telecommunication Technology Research Institute)

Invited speech title:
The Blind Separation of Wireless Communication Signals

Abstract:

Blind source separation (BSS) is developed to deal with the famous cocktail party problem originally. With the development of theory and algorithm, BSS has attracted great interests in signal processing such as speech signal, image signal, biomedical signals. Based on the hypothesis, independent component analysis (ICA) has become the most popular approach of BSS. Although quite a few works have been done in the separation of wireless communication signals, the main aims of these works are to spy or acquire the communication information. However, the separation of the communication signals and the jamming signals will be more meaningful especially when malicious jamming signals exist.


Invited Speech V

Speaker:
Prof. S. K. Setua (Department of Computer Science & Engineering, University of Calcutta, West Bengal, India). S.K.Setua is associated with Department of Computer Science & Engineering, University of Calcutta. He has published many conference and journal papers on Network Security, DBMS Security, Image Processing, Distributed Computing.  His current research interests are in trust based security model for network & DBMS, Big Data and Machine Learning.  He has served requisite responsibilities of TPC for many conferences. He is also associated with many e-Governance project of State & Central Govt. of India. 

Invited speech title:
Trust Models for Security

Abstract:

Every security system depends on trust, in one form or another, among users of the system.  In general, different forms of trust exist to address different types of problems and mitigate risk in certain conditions. Which form of trust to apply in a given circumstance is generally dictated by corporate policy. In  network security solutions, there are two important forms of trust that users  should understand: third-party trust and direct (personal) trust. The purpose of presentation is to introduce these concepts so that users understand which form of trust should be applied in a given situation. The presentation will introduce the different trust models to counter the different attacks on network and DBMS.

 

Invited Speech VI

Speaker:
Mr. Robail Yasrab (University of Science and Technology of China)


5th International Conference on Computer Science and Network Technology
iccsnt@vip.163.com