program guide - Computer Science Department
PROGRAM GUIDE
3PGCIC-2014
The 9th International Conference on P2P, Parallel, Grid, Cloud and
Internet Computing
and
BWCCA-2014
The 9th International Conference on Broadband and Wireless Computing,
Communication and Applications
November 8th - November 10th , 2014
Guangzhou, China
Endorsed by:
Contents
3PGCIC-2014 Conference Organizing Committee . . . . . . . . . . . . . . . . . . . . . . . . .
Message from 3PGCIC-2014 Organizing Committee . . . . . . . . . . . . . . . . . . . . . . .
Message from 3PGCIC-2014 Workshops Chairs . . . . . . . . . . . . . . . . . . . . . . . . . .
BWCCA-2014 Conference Organizing Committee . . . . . . . . . . . . . . . . . . . . . . . .
Message from BWCCA-2014 Conference Organizers . . . . . . . . . . . . . . . . . . . . . . .
Message from BWCCA-2014 Workshop Co-Chairs . . . . . . . . . . . . . . . . . . . . . . . .
3PGCIC-2014 & BWCCA-2014 Keynote Talk I . . . . . . . . . . . . . . . . . . . . . . . . . .
3PGCIC-2014 & BWCCA-2014 Keynote Talk II . . . . . . . . . . . . . . . . . . . . . . . . .
3PGCIC-2014 & BWCCA-2014 Keynote Talk III . . . . . . . . . . . . . . . . . . . . . . . . .
3PGCIC-2014 & BWCCA-2014 Keynote Talk IV . . . . . . . . . . . . . . . . . . . . . . . . .
3PGCIC-2014 Main Conference and Workshops Program . . . . . . . . . . . . . . . . . . . . .
Saturday, November 8, 2014 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
08:00 Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
09:00-09:30 Single Session: Opening Ceremony . . . . . . . . . . . . . . . . . . . . . . .
09:30-10:30 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote I . . . . . . . . . .
10:30-11:00 Coffee Break . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11:00-12:00 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote II . . . . . . . . . .
12:00-13:00 Lunch Break . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13:00-14:30 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3PGCIC-S1: Cloud and Grid Computing Systems . . . . . . . . . . . . . . . . . .
3PGCIC-S2: Classification Systems . . . . . . . . . . . . . . . . . . . . . . . . .
3PGCIC-S3: Intelligent Networking and Scheduling . . . . . . . . . . . . . . . .
14:30-14:45 Coffee Break . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14:45-16:15 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3PGCIC-S4: Cloud Performance, Security and Trustworthiness . . . . . . . . . .
3PGCIC-S5: Data Intensive Computing, Data Mining, and Collaboprative Systems
3PGCIC-S6: Data Security, Authentication and Conmpression Algorithms . . . .
16:15-16:30 Break . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16:30-18:00 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3PGCIC-S7: Big Data, Data Management and Analytics I . . . . . . . . . . . . .
3PGCIC-S8: Big Data, Data Management and Analytics II . . . . . . . . . . . . .
3PGCIC-S9: Data Storage Security, Cryptographic Techniques and Algorithms . .
19:00-22:00 Welcome Reception Party (University Town International Hotel) . . . . . . .
Sunday, November 9, 2014 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
08:00 Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
09:00-10:00 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote III . . . . . . . . .
10:00-10:30 Coffee Break . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10:30-11:30 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote IV . . . . . . . . .
1
4
5
7
8
9
10
11
12
13
14
15
15
15
15
15
15
15
16
16
16
16
16
17
17
17
17
18
18
18
18
18
19
19
20
20
20
20
20
Program Guide
3PGCIC-2014 & BWCCA-2014
11:30-12:30 Lunch Break . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12:30-14:00 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . .
3PGCIC-S10: Bio-inspired Computing and Pattern Recognition . . .
3PGCIC-S11: Intelligent System and Applications . . . . . . . . . .
SMECS-S1: Simulation and Modelling . . . . . . . . . . . . . . . .
14:00-14:15 Coffee Break . . . . . . . . . . . . . . . . . . . . . . . . . . .
14:15-15:45 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . .
FCNC-S1: Cloud and Mobile Computing . . . . . . . . . . . . . . .
SMDMS-S1: Stream Media Delivery and Data Management . . . . .
FNPCS-S1: Secure Mechanisms and Techniques . . . . . . . . . . .
15:45-16:00 Break . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16:00-17:30 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . .
CADSA-S1: Cloud Computing and Distributed Applications . . . . .
NIS-S1: Authentication and Protection Schemes . . . . . . . . . . .
FNPCS-S2: Authentication Protocols . . . . . . . . . . . . . . . . .
IITPC-S1: Intelligent Image Processing . . . . . . . . . . . . . . . .
19:00-22:00 Banquet Party . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monday, November 10, 2014 . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3PGCIC-2014 Steering Committee Meeting and Discussion . . . . . . . . .
BWCCA-2014 Main Conference and Workshops Program . . . . . . . . . . . . .
Saturday, November 8, 2014 . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
08:00 Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
09:00-09:30 Single Session: Opening Ceremony . . . . . . . . . . . . . . . .
09:30-10:30 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote I . . .
10:30-11:00 Coffee Break . . . . . . . . . . . . . . . . . . . . . . . . . . .
11:00-12:00 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote II . . .
12:00-13:00 Lunch Break . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13:00-14:30 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . .
BWCCA-S1: Wireless Ad-Hoc and Sensor Networks . . . . . . . . .
BWCCA-S2: Network Algorithms and Systems . . . . . . . . . . . .
BWCCA-S3: Wireless Sensor Networks . . . . . . . . . . . . . . . .
BWCCA-S4: Watermarking and Security . . . . . . . . . . . . . . .
14:30-14:45 Coffee Break . . . . . . . . . . . . . . . . . . . . . . . . . . .
14:45-16:15 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . .
BWCCA-S5: Wireless Body and Mesh Networks . . . . . . . . . . .
BWCCA-S6: Mobile and Wireless Computing . . . . . . . . . . . .
NGWMN-S1: Wireless Networks and Cognitive Radio . . . . . . . .
RI3C-S1: Support Systems and Applications . . . . . . . . . . . . .
16:15-16:30 Break . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16:30-18:00 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . .
BWCCA-S7: Cloud and Cluster Computing . . . . . . . . . . . . . .
BWCCA-S8: Wireless Communication Systems . . . . . . . . . . .
NGWMN-S2: Applications on Wireless Communication Systems . .
RI3C-S2: Robotics Systems and Applications . . . . . . . . . . . . .
19:00-22:00 Welcome Reception Party (University Town International Hotel)
Sunday, November 9, 2014 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
08:00 Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
09:00-10:00 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote III . .
10:00-10:30 Coffee Break . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
20
20
20
21
21
21
21
21
22
22
22
22
22
23
23
23
24
24
24
25
25
25
25
25
26
26
26
26
26
26
26
27
27
27
27
27
28
28
28
28
28
29
29
29
29
30
30
30
30
Program Guide
3PGCIC-2014 & BWCCA-2014
10:30-11:30 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote IV . . . . . . . . .
11:30-12:30 Lunch Break . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12:30-14:00 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
BWCCA-S9: Trust Computing and Authentication . . . . . . . . . . . . . . . . .
BWCCA-S10: Vehicular Networks . . . . . . . . . . . . . . . . . . . . . . . . .
MAPWC-S1: Numerical Analysis for Wireless Communication . . . . . . . . . .
MNSA-S1: P2P Systems and Multimedia Networking . . . . . . . . . . . . . . .
14:00-14:15 Coffee Break . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14:15-15:45 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
SCC-S1: Secure Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . .
MAPWC-S2: Methods and Protocols for Wireless and Mobile Networking . . . .
MNSA-S2: E-Learning and Network Applications . . . . . . . . . . . . . . . . .
15:45-16:00 Break . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16:00-17:30 Parallel Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CWECS-S1: Network, Security, and Healthcare . . . . . . . . . . . . . . . . . . .
LSNS-S1: Network Technology and Security . . . . . . . . . . . . . . . . . . . .
2ASMUB-S1: Advanced Applications and Sustainability Management for Ubiquitous E-Business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
NTCAA-S1: Network Algorithms and Applications . . . . . . . . . . . . . . . .
19:00-22:00 Banquet Party . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monday, November 10, 2014 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
BWCCA-2014 Steering Committee Meeting and Discussion . . . . . . . . . . . . . . . .
3
30
30
30
30
30
31
31
31
31
31
32
32
32
32
32
33
33
33
33
34
34
Program Guide
3PGCIC-2014 & BWCCA-2014
3PGCIC-2014 Conference Organizing Committee
Honorary Co-Chairs
Dongqing Xie, Guangzhou University, China
Makoto Takizawa, Hosei University, Japan
General Co-Chairs
Fatos Xhafa, Technical University of Catalonia, Spain
Leonard Barolli, Fukuoka Institute of Technology, Japan
Program Committee Co-Chairs
Jin Li, Guangzhou University, China
Tomoki Yoshihisa, Osaka University, Japan
Marek R. Ogiela, AGH University of Science and Technology, Poland
Workshops Co-Chairs
Duncan Wong, City University, HK, China
Flora Amato, Second University of Naples, Italy
Juggapong Natwichai, Chiang Mai University, Thailand
International Advisory and Liaison Chair
Kuan-Ching Li, Providence University,Taiwan
Joseph Tan, McMaster University, Canada
Industry Track Chairs
Huajun Chen, Electric Power Research Institute, CSG, China
Hang Yang, Electric Power Research Institute, CSG, China
Web Administrator Chairs
Joan Arnedo Moreno, Universitat Oberta de Catalunya, Spain
4
Program Guide
3PGCIC-2014 & BWCCA-2014
Message from 3PGCIC-2014 Organizing Committee
Welcome to the 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing
(3PGCIC-2014), which will be held in conjunction with BWCCA-2014 International Conference from
November 8 to November 10, 2014 in Guangzhou, China.
P2P, Grid, Cloud and Internet computing technologies have been very fast established as breakthrough
paradigms for solving complex problems by enabling large-scale aggregation and sharing of computational,
data and other geographically distributed computational resources.
Grid Computing originated as a paradigm for high performance computing, as an alternative to expensive supercomputers. Since late 80’s, Grid computing domain has been extended to embrace different forms
of computing, including Semantic and Service-oriented Grid, Pervasive Grid, Data Grid, Enterprise Grid,
Autonomic Grid, Knowledge and Economy Grid, etc.
P2P Computing appeared as the new paradigm after client-server and web-based computing. These
systems are evolving beyond file sharing towards a platform for large scale distributed applications. P2P
systems have as well inspired the emergence and development of social networking, B2B (Business to
Business), B2C (Business to Consumer), B2G (Business to Government), B2E (Business to Employee),
and so on.
Cloud Computing has been defined as a “computing paradigm where the boundaries of computing
are determined by economic rationale rather than technical limits”. Cloud computing is a multi-purpose
paradigm that enables efficient management of data centres, timesharing, and virtualization of resources
with a special emphasis on business model. Cloud Computing has fast become the computing paradigm
with applications in all application domains and providing utility computing at large scale.
Finally, Internet Computing is the basis of any large-scale distributed computing paradigms; it has very
fast developed into a vast area of flourishing field with enormous impact on today’s information societies.
Internet-based computing serves thus as a universal platform comprising a large variety of computing forms.
The aim of the 3PGCIC conference is to provide a research forum for presenting innovative research
results, methods and development techniques from both theoretical and practical perspectives related to
P2P, Grid, Cloud and Internet computing.
Many people have helped and worked hard to produce a successful 3PGCIC-2014 technical program
and conference proceedings. First, we would like to thank all the authors for submitting their papers, the PC
members, and the reviewers who carried out the most difficult work by carefully evaluating the submitted
papers. Based on the reviewers’ reports, the Program Committee selected 67 papers from 312 submissions
(about 22% acceptance rate) for presentation in the conference and publication in the CSP proceedings.
The General Chairs of the conference would like to thank the PC Co-Chairs Jin Li, Guangzhou University,
China, Tomoki Yoshihisa, Osaka University, Japan and Marek R. Ogiela, AGH University of Science and
Technology, Poland for their great efforts in organizing a successful conference and an interesting conference programme. We would like to appreciate the work of the Workshop Co-Chairs Duncan Wong, City
University, HK, China, Flora Amato, Second University of Naples, Italy and Juggapong Natwichai, Chiang Mai University, Thailand for supporting the workshop organizers. Our appreciations also go to all
workshops organizers for their hard work in successfully organizing these workshops.
We thank Joan Arnedo Moreno, Open University of Catalonia, Spain, for his excellent work and support
with the Web Submission and Management System of conference.
We would like to express our gratitude to Prof. Dongqing Xie, Guangzhou University, China and Prof.
Makoto Takizawa, Hosei University, Japan, as Honorary Co-Chairs of 3PGCIC-2014 for his support and
help.
Our special thanks to Prof. Xinbo Gao, Xidian University, China; Prof. Dritan Nace, University of
Technology of Compiègne, France; Prof. Albert Y. Zomaya, University of Sydney, Australia and Dr. Patrick
Lee, The Chinese University of Hong Kong, Hong Kong, China for kindly accepting to be Keynote Speakers
of 3PGCIC-2014.
5
Program Guide
3PGCIC-2014 & BWCCA-2014
Finally, we would like to thank the Local Arrangement at Guangzhou for making excellent local arrangement for the conference.
We hope you will enjoy the conference and have a great time in Guangzhou, China!
3PGCIC-2014 International Conference Organizers
3PGCIC-2014 General Co-Chairs
Fatos Xhafa, Technical University of Catalonia, Spain
Leonard Barolli, Fukuoka Institute of Technology, Japan
3PGCIC-2014 Program Committee Co-Chairs
Jin Li, Guangzhou University, China
Tomoki Yoshihisa, Osaka University, Japan
Marek R. Ogiela, AGH University of Science and Technology, Poland
6
Program Guide
3PGCIC-2014 & BWCCA-2014
Message from 3PGCIC-2014 Workshops Chairs
Welcome to the 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing
(3PGCIC-2014), held from November 8 to November 10, 2014 in Guangzhou, China.
This year 7 workshops are held together with 3PGCIC-2014. The objective of the workshops was to
present research results, work on progress and thus complement the main themes of 3PGCIC-2014 with
specific topics of Grid, P2P, Cloud and Internet Computing. The workshops cover research on Simulation
and Modelling of Emergent Computational Systems, Multimedia, Web, Streaming Media Delivery, Middleware of Large Scale Distributed Systems, Network Convergence, Pervasive Computing and Distributed
Systems and Security. The held workshops are as following:
1. Seventh International Workshop on Simulation and Modelling of Emergent Computational Systems
(SMECS-2014)
2. Fifth International Workshop on Streaming Media Delivery and Management Systems (SMDMS2014)
3. Second International Workshop on Cloud and Distributed System Applications (CADSA-2014)
4. International Workshop on Future Computing and Network Convergence (FCNC-2014)
5. The First International Workshop on The Future of Network & Pervasive Computing Security (FNPCS204)
6. International Workshop on Intelligence Information Processing and Trusted Computing (IIPTC-2014)
7. International Workshop on Network and Information Security (NIS-2014)
We would like to thank all workshop organizers for their hard work in organizing these workshops and
selecting high quality papers for presentation at workshops, the interesting programs and for the arrangements of the workshop during the conference days.
We hope you will enjoy the conference and have a great time in Guangzhou!
3PGCIC-2014 Workshops Chairs
Duncan Wong, City University, HK, China
Flora Amato, University “Federico II” of Naples, Italy
Juggapong Natwichai, Chiang Mai University, Thailand
7
Program Guide
3PGCIC-2014 & BWCCA-2014
BWCCA-2014 Conference Organizing Committee
Honorary Chairs
Dongqing Xie, Guangzhou University, China
Makoto Takizawa, Hosei University Japan
General Co-Chairs
Leonard Barolli, Fukuoka Institute of Technology, Japan
Fatos Xhafa, Technical University of Catalonia, Spain
Programme Co-Chairs
Xiaofeng Chen, Xidian University, China
Makoto Ikeda, Fukuoka Institute of Technology, Japan
Mauro Migliardi, University of Padua, Italy
Workshop Co-Chairs
Zheli Liu, Nankai University, China
Fang-Yie Leu, Tunghai University, Taiwan
Nadeem Javaid, COMSATS IIT, Pakistan
Web Administrators
Joan Arnedo Moreno, Universitat Oberta de Catalunya, Spain
8
Program Guide
3PGCIC-2014 & BWCCA-2014
Message from BWCCA-2014 Conference Organizers
Welcome to the 9th IEEE International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2014), which will be held in conjunction with the 9th 3PGCIC 2014 International Conference
from November 8 to November 10, 2014 at Guangzhou University, Guangzhou, China.
This International Conference is a forum for sharing ideas and research work in the emerging areas of broadband
and wireless computing.
Communication networks of today are going through a rapid evolution. Different kinds of networks with different
characteristics are emerging and they are integrating in heterogeneous networks. For these reasons, there are many
interconnection problems which may occur at different levels of the hardware and software design of communicating
entities and communication networks. These kinds of networks need to manage an increasing usage demand, provide
support for a significant number of services, guarantee their QoS, and optimize the network resources.
The success of all-IP networking and wireless technology has changed the ways of living for people around the
world. The progress of electronic integration and wireless communications is going to pave the way to offer people
the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the
information with each other whenever necessary. Also, ubiquitous computing is an emerging field of research for
computing paradigms in the 21st century. This emergence is the natural result of research and technological advances,
mainly in wireless communications, mobile computing, sensor networks, ad-hoc networks and agent technologies.
The aim of this conference is to present the innovative research and technologies as well as developments related to
broadband networking, and mobile and wireless communications. BWCCA 2014 received 215 paper submissions and
based on review results, we accepted 44 papers (21% acceptance ratio) for presentation.
The organization of an International Conference requires the support and help of many people. A lot of people
have helped and worked hard to produce a successful BWCCA 2014 technical program and conference proceedings.
First, we would like to thank all authors for submitting their papers, Program Committee Members and reviewers who
carried out the most difficult work by carefully evaluating the submitted papers.
This year in conjunction with BWCCA 2014 we have 9 International Workshops that complemented BWCCA
2014 program with contributions for specific topics. We would like to thank the Workshop Co-Chairs Zheli Liu,
Nankai University, China; Fang-Yie Leu, Tunghai University, Taiwan; Nadeem Javaid, COMSATS IIT, Pakistan and
all workshops organizers for organizing these workshops.
We thank Joan Arnedo Moreno, Open University of Catalonia, Spain, for his excellent work and support with the
Web Submission and Management System of conference.
We would like to express our gratitude to Prof. Dongqing Xie, Guangzhou University, China and Prof. Makoto
Takizawa, Hosei University, Japan, as Honorary Co-Chairs of BWCCA 2014 for their support and help.
We give special thanks to Prof. Xinbo Gao, Xidian University, China; Prof. Dritan Nace, University of Technology
of Compiègne, France; Prof. Albert Y. Zomaya, University of Sydney, Australia and Dr. Dr. Patrick P. C. Lee, The
Chinese University of Hong Kong, Hong Kong, China for kindly accepting to be Keynote Speakers of BWCCA 2014.
Finally, we would like to thank the Local Arrangement at Guangzhou for making excellent local arrangement for
the conference. We hope you will enjoy the conference and have a great time in Guangzhou, China.
BWCCA 2014 General Co-Chairs
Leonard Barolli, Fukuoka Institute of Technology, Japan
Fatos Xhafa, Technical University of Catalonia, Spain
BWCCA 2014 Program Committee Co-Chairs
Xiaofeng Chen, Xidian University, China
Makoto Ikeda, Fukuoka Institute of Technology, Japan
Mauro Migliardi, University of Padua, Italy
9
Program Guide
3PGCIC-2014 & BWCCA-2014
Message from BWCCA-2014 Workshop Co-Chairs
Welcome to the Workshops of the 9th IEEE International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2014, which will be held in conjunction with the 9th
3PGCIC 2014 International Conference from November 8 to November 10, 2014 at Guangzhou University,
Guangzhou, China.
This year 9 workshops will be held in conjunction with BWCCA 2014 International Conference. The
workshops are very important part of the main conference and they cover specific topics related to next
generation networks, network traffic analysis, sensor technologies, smart environments, complex systems,
wireless communication, mobile networks and bio-sensing.
BWCCA 2014 workshops are as follows:
1. The 16-th International Symposium on Multimedia Network Systems and Applications (MNSA
2014)
2. The 7-th International Workshop on Next Generation of Wireless and Mobile Networks (NGWMN
2014)
3. The 6-th International Workshop on Network Traffic Control, Analysis and Applications (NTCAA
2014)
4. The 5-th International Workshop on Methods, Analysis and Protocols for Wireless Communication
(MAPWC 2014)
5. The 5-th International Workshop on Cloud, Wireless and e-Commerce Security (CWECS 2014)
6. The 3-rd International Workshop on Robot Interaction, Control, Communication and Cooperation
(RI3C 2014)
7. The International Workshop on Secure Cloud Computing (SCC 2014)
8. The International Workshop on Large Scale Network Security (LSNS 2014)
9. The 1-st International Workshop on Advanced Applications and Sustainability Management for Ubiquitous e-Business (2ASMUB 2014)
These workshops bring to the researchers conducting research in specific themes the opportunity to
learn from this rich multi-disciplinary experience.
The Workshop Chairs would like to thank the workshop organizers for their great efforts and hard work
in proposing the workshop, selecting the papers, the interesting programs and for the arrangements of the
workshop during the conference days.
We hope you enjoy the workshops programs and proceedings.
BWCCA 2014 Workshops Co-Chairs
Zheli Liu, Nankai University, China
Fang-Yie Leu, Tunghai University, Taiwan
Nadeem Javaid, COMSATS IIT, Pakistan
10
Program Guide
3PGCIC-2014 & BWCCA-2014
3PGCIC-2014 & BWCCA-2014 Keynote Talk I
Prof. Xinbo Gao, Xidian University, China
Image Quality Assessment
Abstract: The aim of the image quality assessment (IQA) is to find a computational model that can predict
the visual perception quality automatically. This talk will focus on the image quality assessment based on
machine learning. It is to simulate and describe the human visual system to find the optimal description
of image feature for depicting the degree of image degradation, and then construct the best quality model
for measuring visual quality of distorted image and the ability to provide information of the image. The
available image quality assessment based on machine learning can be divided into 3 categories, IQA based
on distortion classification, IQA based on feature representation and IQA based on feature mapping. By
discovering the potential correlation between the cognitive model of human learning and the computational
model of human perception, these IQA models are precisely established to describe the visual perception
quality from different aspects. Finally, I will introduce some new research topics and applications of image
quality assessment.
11
Program Guide
3PGCIC-2014 & BWCCA-2014
3PGCIC-2014 & BWCCA-2014 Keynote Talk II
Prof. Albert Y. Zomaya, University of Sydney, Australia
Adaptable Resource Allocation in Cloud Computing Systems
Abstract: Cloud Computing is among the fastest growing topics in computing research today. Although
the idea of offering computational power as a service is not novel, it did not publically become available before Clouds. Clouds are fundamentally different from their predecessors (Grids/Clusters) and thus require
specific expertise to be properly utilized. Today, there are literally hundreds of cloud providers in all forms
and scales. Computing needs (applications) have also become increasingly diverse. In this talk, I will describe challenges with the dynamicity and heterogeneity of resources and the diversity of applications from
resource management perspective. Then, I will discuss how we can turn these challenges into opportunities
for cloud systems’ efficiency.
12
Program Guide
3PGCIC-2014 & BWCCA-2014
3PGCIC-2014 & BWCCA-2014 Keynote Talk III
Prof. Dritan Nace, University of Technology of Compiègne, Compiègne, France
Network Design Optimization: New Trends and Methods
Abstract: Network optimization is a well identified research area in telecommunications. From network
manager point of view Network Optimization is mainly concerned with the process to keep a network operating at high efficiency with a lower cost. From research methodology point of view Network Optimization
includes mathematical modeling and optimization methods, with applications in network design, performance analysis, reliability, survivability, network restoration, routing, traffic analysis, wireless networks,
etc. These last years there has been much progress in both methodology and operational tools development
applied to Network Optimization. We can cite advances in robust optimization and mathematical programming solvers. During this talk we will present some related topics on network design with a special focus
on resilient networks, evolving networks and robustness. For each case study, both the related mathematical
problems and solving methodologies will be presented.
13
Program Guide
3PGCIC-2014 & BWCCA-2014
3PGCIC-2014 & BWCCA-2014 Keynote Talk IV
Dr. Patrick P. C. Lee, The Chinese University of Hong Kong, Hong Kong, China
Building Efficient Erasure-Coded Clustered Storage Systems
Abstract: Modern clustered storage systems increasingly adopt erasure coding to reduce the storage overhead of traditional 3-way replication. However, there remain challenging issues of maintaining high performance in erasure-coded clustered storage systems. In this talk, I will share our experiences of deploying
erasure coding in Hadoop, a popular clustered storage platform for big data analytics. I will present two
new designs: (1) CORE, which augments existing optimal regenerating codes for the recovery of a general
number of failures including single and concurrent failures, and (2) Degraded-First Scheduling, which improves MapReduce performance in erasure-coded storage. I will present new analytical results, as well as
experimental findings based on our prototypes in a Hadoop cluster.
14
Program Guide
3PGCIC-2014 Main Conference and Workshops Program
3PGCIC-2014
3PGCIC-2014
Main Conference and Workshops Program
Saturday, November 8, 2014
08:00 Registration
09:00-09:30 Single Session: Opening Ceremony
09:30-10:30 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote I
3PGCIC-2014 & BWCCA-2014 Keynote Talk I (PLENARY ROOM – Room 1)
Prof. Xinbo Gao: Image Quality Assessment
10:30-11:00 Coffee Break
11:00-12:00 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote II
15
Program Guide
Saturday, November 8, 2014
3PGCIC-2014
3PGCIC-2014 & BWCCA-2014 Keynote Talk II
Prof. Albert Y. Zomaya: Adaptable Resource Allocation in Cloud Computing Systems
12:00-13:00 Lunch Break
13:00-14:30 Parallel Sessions
3PGCIC-S1: Cloud and Grid Computing Systems - Room 1
Chair: Fatos Xhafa, Technical University of Catalonia, Spain
1. New Evaluation Criterion of File Replicas Placement for Replication Strategies in Data Grids
C. Hamdeni, T. Hamrouni, and F. Ben Charrada
2. A Security Enhanced IEEE1588 Protocol for Deep-Space Environment
Zijing Cheng, Lei He, Jingling Zhao, Kai Lin, and Baojiang Cui
3. Developing Map Matching Algorithm for Transportation Data Center
Jian Huang, Chunwei Liu, and Jinhui Qie
4. A Dynamic Re-encrypted Ciphertext-Policy Attributed-Based Encryption Scheme for Cloud Storage
Lequn Mo and Fuyong Lin
5. On Reliability and Security in Knowledge Grids
Christian Esposito, Massimo Ficco, Francesco Palmieri, Vincenzo Loia
6. Research of Trust Model Personalized Dynamic Recommendation System Based on Auction Mechanism
ShanGuo Lv, HongLi Chen
3PGCIC-S2: Classification Systems - Room 2
Chair: Jin Li, Guangzhou University, China
1. A Method to Predict the Intermittent Power by Classification Model
Hang Yang, Fuzheng Zhang, Aidong Xu, Cai Yuan, and Chuanlin Chen
2. A Review: The Effects of Imperfect Data on Incremental Decision Tree
Hang Yang, Aidong Xu, Huajun Chen, and Cai Yuan
3. A Decision Support System Using Two-Level Classifier for Smart Grid
Huajun Chen, Hang Yang, Aidong Xu, and Cai Yuan
4. A Collective Intelligence Approach for Building Student’s Trustworthiness Profile in Online Learning
Jorge Miguel, Santi Caballé, Fatos Xhafa, Josep Prieto, Leonard Barolli
5. A Vertical Handoff Decision Algorithm Based on the Movement-Aware of Mobile Nodes
Qiu Xiaona and Liao Qing
6. Distribution Properties and 2-adic Complexity of Clock-Controlled FCSR Sequences
Lishan Ke and Zhiqiang Lin
3PGCIC-S3: Intelligent Networking and Scheduling - Room 3
Chair: Tomoki Yoshihisa, Osaka University, Japan
1. Concept Drift Mining of Fundamental Variables in China Stock Market
Yong Hu, Kang Liu, Bin Feng, Lijun Su, Xiangzhou Zhang, Weiqi Chen, and Yuran Zeng
2. Epidemic Dynamics in Weighted Adaptive Networks
Bo Song, Guo-Ping Jiang, and Yu-Rong Song
16
Program Guide
Saturday, November 8, 2014
3PGCIC-2014
3. A Multi-attribute Vertical Handover Algorithm Based on Adaptive Weight in Heterogeneous Wireless Network
Dan Feng, Ma Yajie, Zhou Fengxing, and Lu Shaowu
4. Static-Dynamic Control Flow Integrity
Xiaolong Liu, Qiang Wei, and Ziwei Ye
5. The Chinese Conceptual Graph Matching Algorithm Based on Conceptual Sub-graph Weight Self-Adjustment
Hui Zeng, Liyan Xiong, and Jianjun Chen
6. Adaptive cloud bandwidth rental and allocation strategy
HongLi Chen, ShanGuo Lv
14:30-14:45 Coffee Break
14:45-16:15 Parallel Sessions
3PGCIC-S4: Cloud Performance, Security and Trustworthiness - Room 1
Chair: Zheli Liu, Nankai University, China
1. An Efficient Cloud-Based Personal Health Records System Using Attribute-Based Encryption and Anonymous
Multi-receiver Identity-Based Encryption
Chang-Ji Wang, Xi-Lei Xu, Dong-Yuan Shi, and Wen-Long Lin
2. HPC Cloud Pills: On-Demand Deployment and Execution of HPC Application in Cloud Environments
Pietro Ruiu, Olivier Terzo, Giuseppe Carlino, Rossella Prandi, Alberto Falzone, Paolo Maggi, Livia Torterolo,
Enrico Usai, and Gianpaolo Perego
3. MOMC: Multi-objective and Multi-constrained Scheduling Algorithm of Many Tasks in Hadoop
Cristiana Voicu, Florin Pop, Ciprian Dobre, and Fatos Xhafa
4. A Network Gene-Based Framework for Detecting Advanced Persistent Threats
Yuan Wang, Yongjun Wang, Jing Liu, and Zhijian Huang
5. Mixed Fruit Fly Optimization Algorithm Based on Lozi’s Chaotic Mapping
Huixia Luo, Guidong Zhang, Yongjun Shen, and Jialin Hu
6. New Data Publishing Framework in the Big Data Environments
Jun Yang, Zheli Liu, Chunfu Jia, Kai Lin, Zijing Cheng
3PGCIC-S5: Data Intensive Computing, Data Mining, and Collaboprative Systems - Room 2
Chair: Jin Li, Guangzhou University, China
1. Improving Differential Evolution with Ring Topology-Based Mutation Operators
Jingliang Liao, Yiqiao Cai, Yonghong Chen, Tian Wang, and Hui Tian
2. Topic Detection in Chinese Microblogs Using Hot Term Discovery and Adaptive Spectral Clustering
Chengxu Ye, Ping Yang, and Shaopeng Liu
3. Design and Implementation of WPF-based Mini OA System
Cheng Wang, Zhixiao Lin, Fangsheng Guotang, Lixiao Zheng, and Zhigang Zhu
4. Improved Recommendation System with Friends on SNS
Yanxiang Ling and Qing Liao
5. Multi-input Functional Encryption Based Electronic Voting Scheme
Yang Chen and You Lin
6. Security Analysis of TAU Procedure in LTE Network
Li Qiang, Wenan Zhou, Baojiang Cui, Liu Na
17
Program Guide
Saturday, November 8, 2014
3PGCIC-2014
3PGCIC-S6: Data Security, Authentication and Conmpression Algorithms - Room 3
Chair: Marek Ogiela, AGH University of Science and Technology, Krakow, Poland
1. Distance-Bounding Protocol with Time-Stamped Authentication for RFID
Wei Guo-Heng, Zhang Huan-Guo, and Li Zheng
2. A Novel Fingerprint-Based Biometric Encryption
Bin Liang, Zhendong Wu, and Linyou
3. A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps
Zhengjun Jing, Guoping Jiang, and Chunsheng Gu
4. The Analysis of Compressive Sensing Theory
Jia Yu
5. Rumor Spreading Model Considering the Importance and Fuzziness
of Information Ling-Ling Xia, Guo-Ping Jiang, Bo Song, and Guan-Hua Zhu
6. Static Compliance Checking beyond Separation of Duty Constraints
Yang Bo, Chunhe Xia, Yang Luo, and Qing Tang
16:15-16:30 Break
16:30-18:00 Parallel Sessions
3PGCIC-S7: Big Data, Data Management and Analytics I - Room 1
Chair: Zheli Liu, Nankai University, China
1. Chinese Person Name Recognition Based on Naive Bayes
Hui Zeng, Jun Wang, and Tao Wan
2. Vinyl Acetate Polymerization Rate Prediction Based on FOA GNN
Yang Jing, Zeng Hui, and Huang Jiangping
3. An Improved Method of Interrogative Sentence Similarity Compute and Application in Q&A System
Yang Jing, Zhu Qi, and Xu Haizhou
4. Strain Sensitizing of High-Sensitivity SAW Sensor Based on FBG
Zhang Wei
5. Self-Certified Public Auditing for Data Integrity in Cloud Storage
Jianhong Zhang and Weina Zeng
6. A Dynamic Multiple Digital Watermarking Model based on Temporal Series
Xiaoyi Zhou, Jixin Ma, Wencai Du, Yihong Li
3PGCIC-S8: Big Data, Data Management and Analytics II - Room 2
Chair: Fatos Xhafa, Technical University of Catalonia, Spain
1. An Improved Image Encoding Algorithm Based on EZW and Huffman Joint Encoding
Zhang Wei
2. The Research of Scale-Free Sensor Network Topology Evolution Based on the Energy Efficient
Yueshun He, Wei Zhang, Nan Jiang, and Xiaoyan Luo
3. The Research of Wireless Sensor Network Channel Propagation Model in the Wild Environment
Yueshun He, Wei Zhang, Nan Jiang, and Xiaoyan Luo
4. Reliability Analysis of Business Continuity Based on SPN in Information System Security Management
Pan Ping, Mao Xinyue, Yang Ping, and Zhou Huiling
18
Program Guide
Saturday, November 8, 2014
3PGCIC-2014
5. ‘NoSQL’ and Electronic Patient Record Systems: Opportunities and Challenges
Philip Moore, Tarik Qassem, and Fatos Xhafa
6. Multiple Nested Schema of HBase for Migration from SQL
Gansen Zhao, Libo Li, Zijing Li, Qiaoying Lin
3PGCIC-S9: Data Storage Security, Cryptographic Techniques and Algorithms - Room 3
Chair: Jin Li, Guangzhou University, China
1. A Survey of Chaos-Based Cryptography
Ping Zhen, Geng Zhao, Lequan Min, and Xiaodong Li
2. High Efficient Multi-party Quantum Secret Sharing Scheme
Xiaoqian Zhang, Xiaoqing Tan, and Cui Liang
3. Multi-party Quantum Secure Direct Communication
Xiaoqing Tan, Xiaoqian Zhang, and Cui Liang
4. An Enhancement for Key Management in LTE/SAE X2 Handover Based on Ciphering Key Parameters
Qinshu Xiao, Wen’An Zhou, Baojiang Cui, and Lingrong Li
5. Comprehensive Evaluation Method of Reliability of Internet of Things
Li Yong-Fei and Tian Li-Qin
6. Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing
Hongyang Yan, Xuan Li, Jin Li
7. Interactive Headphones for a Cloud 3D Audio Application
Daniela D’Auria, Dario Di Mauro, Davide Maria Calandra, Francesco Cutugno
19:00-22:00 Welcome Reception Party (University Town International Hotel)
19
Program Guide
Sunday, November 9, 2014
3PGCIC-2014
Sunday, November 9, 2014
08:00 Registration
09:00-10:00 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote III
3PGCIC-2014 & BWCCA-2014 Keynote Talk II (PLENARY ROOM – Room 1)
Prof. Dritan Nace: Network Design Optimization: New Trends and Methods
10:00-10:30 Coffee Break
10:30-11:30 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote IV
3PGCIC-2014 & BWCCA-2014 Keynote Talk IV
Dr. Patrick P. C. Lee: Building Efficient Erasure-Coded Clustered Storage Systems
11:30-12:30 Lunch Break
12:30-14:00 Parallel Sessions
3PGCIC-S10: Bio-inspired Computing and Pattern Recognition - Room 1
Chair: Marek Ogiela, AGH University of Science and Technology, Krakow, Poland
1. An Asynchronous Periodic Sequential Patterns Mining Algorithm with Multiple Minimum Item Supports
Xiangzhan Yu and Haining Yu
2. Computer-Aided Enterprise Management
Lidia Ogiela and Marek R. Ogiela
3. Intelligent Bio-inspired Approach for Secrecy Management in the Cloud
Marek R. Ogiela, Lidia Ogiela, and Urszula Ogiela
4. Recognition of Body Movements Patterns for Immersive Virtual Reality System Interface
Tomasz Hachaj and Marek R. Ogiela
5. Linguistic Approach to Modeling of Coronary Arteries in Semantic Techniques of Image Retrieval
Miroslaw Trzupek and Marek R. Ogiela
6. Emerging Technologies for Monitoring Behavioural and Psychological Symptoms of Dementia
Tarik Qassem, George Tadros, Philip Moore, and Fatos Xhafa
20
Program Guide
Sunday, November 9, 2014
3PGCIC-2014
3PGCIC-S11: Intelligent System and Applications - Room 2
Chair: ShanGuo Lv, East China Jiaotong University, China
1. Discovering many-to-one causality in Software Project Risk Analysis
Weiqi Chen, Kang Liu, Lijun Su, Mei Liu, Zhifeng Hao, Yong Hu, Xiangzhou Zhang
2. Photon Pulses based Heterodyne Detection Precision Ranging System
Li-Xia Lei, Yue-Jin Zhang
3. Medical image feature extraction and fusion algorithm based on K-SVD
Hongli Chen, Zhaohua Huang
4. An algorithm of video network transmission based on unbalanced multiple description coding
ShanGuo Lv, YiQin Cao
5. Schema Conversion Model of SQL Database to NoSQL
Gansen Zhao, Qiaoying Lin, Libo Li, Zijing Li
6. Design of a New EPON Connection Automatic Protection System
Yuejin Zhang, Lixia Lei
7. All-optical Signal Processing with new DPSK based on Multi-dimensional Complex
Dan Zou, Yan Mei
SMECS-S1: Simulation and Modelling - Room 3
Chair: Fatos Xhafa, Technical University of Catalonia, Spain
1. Integrated Technical Planning for Regional Smart Grid
Wu Zhengrong, Xu Aidong, Zhang Tao, and Chen Chuanlin
2. WDM-PON Breakpoint Precision Detection System Based Broadband Chaos Light
Dan Zou, Yuejin Zhang
3. Malicious Code Detection Using Opcode Running Tree Representation
Ding Yuxin, Dai Wei, Zhang Yibin, Xue Chenglong
4. An Efficient Time-Frequency Domain Speech Perceptual Hashing Authentication Algorithm Based on Discrete
Wavelet Transform
Zhang Qiu-Yu, Xing Peng-Fei, Huang Yi-Bo, Dong Rui-Hong, Yang Zhong-Ping
5. Performance of Space Network Time Synchronization Protocol in Proximity Link
Xiang Lu, Jianxun Liu
14:00-14:15 Coffee Break
14:15-15:45 Parallel Sessions
FCNC-S1: Cloud and Mobile Computing - Room 1
Chair: Xianglin Wei, PLA University of Science and Technology, China
1. Research on Online Measurement Method of Smartphone Energy Consumption
Jie Ma, Haiyang Yu, Xiaoli Gong, and Xiaoyu Zhang
2. A Novel Framework for Application of Cloud Computing in Wireless Mesh Networks
Ran Li, Qingqing Liu, Mingqiang Wang, and Xianglin We
3. Performance Overhead of Xen on Linux 3.13 on ARM Cortex-A7
Xiaoli Gong, Qi Du, Xu Li, Jin Zhang, and Ye Lu
4. GMCR: A Novel Scheme for Improving Quality of Service of Live Streaming
Guomin Zhang, Chao Hu, Na Wang, Xianglin Wei, and Changyou Xing
21
Program Guide
Sunday, November 9, 2014
3PGCIC-2014
5. A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer Systems
Xianglin Wei, Jianhua Fan, Ming Chen, and Guomin Zhang
6. Optimizational Method of HBase Multi-dimensional Data Query Based on Hilbert Space-Filling Curve
Qingcheng Li, Ye Lu, Xiaoli Gong, and Jin Zhang
SMDMS-S1: Stream Media Delivery and Data Management - Room 2
Chair: Tomoki Yoshihisa, Osaka University, Japan
1. Evaluation of Division Based Broadcasting System Considering Additional Information
Yusuke Gotoh, Akihiro Kimura
2. Experimental Deployment of a Multi-channel Wireless Backbone Network Based on an Efficient Traffic Management Framework
Yuzo Taenaka, Masaki Tagawa and Kazuya Tsukamoto
3. DTLS for Lightweight Secure Data Streaming in the Internet of Things
Roy Fisher and Gerhard Hancke
4. A Study of Robustness Enhancement Technique on P2P Sensor Data Stream Delivery System Using Distributed
Hashing
Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, and Yuuichi Teranishi
5. An Evaluation of a P2P Sensor Data Streaming System Considering the Number of Hops on the PIAX Testbed
Yoshimasa Ishi, Tomoya Kawakami, Tomoki Yoshihisa, and Yuuichi Teranishi
FNPCS-S1: Secure Mechanisms and Techniques - Room 3
Chair: Baojiang Cui, Beijing University of Posts And Telecommunications, China
1. An Enhanced Secure Mechanism of Low Level Reader Protocol (LLRP) V1.1
Bing Zhao, Ziyue Wang, Baojiang Cui, and Xiaobing Liang
2. Mining Mobile Internet Packets for Malware Detection
Haifeng Jin, Baojiang Cui, and Jianxin Wang
3. Reverse Analysis Method of Static XSS Defect Detection Technique Based on Database Query Language
Cui Baojiang, Long Baolian, and Hou Tingting
4. Program Crash Analysis Based on Taint Analysis
Zhang Puhan, Wu Jianxiong, Wang Xin, and Zehui Wu
5. Sentence Similarity Based on Semantic Vector Model
Zhao Jingling, Zhang Huiyun, and Cui Baojiang
15:45-16:00 Break
16:00-17:30 Parallel Sessions
CADSA-S1: Cloud Computing and Distributed Applications - Room 1
Chair: Flora Amato, University of Naples “Federico II,” Italy
1. A Cost-Energy Trade-Off Model in Smart Energy Grids
Ugo Gentile, Stefano Marrone, Nicola Mazzocca, and Roberto Nardone
2. A Semantic Access Control for Easy Management of the Privacy for EHR Systems
Mario Sicuranza and Mario Ciampi
3. A Modeling Profile for Availability Analysis of Composite Cloud Services
Flora Amato and Francesco Moscato
22
Program Guide
Sunday, November 9, 2014
3PGCIC-2014
4. Mobile Traffic Analysis Exploiting a Cloud Infrastructure and Hardware Accelerators
Mario Barbareschi, Alessandra De Benedictis, Antonino Mazzeo and Antonino Vespoli
5. A Distributed Information Extraction System Integrating Ontological Knowledge and Probabilistic Classifiers
Anita Alicante, Massimo Benerecetti, Anna Corazza, and Stefano Silvestri
6. An Automatic Method for Deriving OWL Ontologies from XML Documents
A. Minutolo, A. Esposito, M. Ciampi, M. Esposito, and G. Cassetti
7. Automatic Population of Italian Medical Thesauri: A Morphosemantic Approach
Flora Amato, Annibale Elia, Alessandro Maisto, Antonino Mazzeo, and Serena Pelosi
8. Interactive Headphones for a Cloud 3D Audio Application
Daniela D’Auria, Dario Di Mauro, Davide Maria Calandra, Francesco Cutugno
NIS-S1: Authentication and Protection Schemes - Room 2
Chair: Chundong Wang Tianjin University of Technology, China
1. A Statistical Integrity Authentication Scheme without Grouping for Streaming Data
Xi Shi
2. Virus-Evolutionary Genetic Algorithm Based Selective Ensemble for Steganalysis
Di Fuqiang, Zhang Minqing, and Liu Jia
3. Encrypted Botnet Detection Scheme
Wang Ying
4. Challenges and Trends of Big Data Analytics
Hui Li, Xin Lü
5. Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves?
Yonglin Sun, Yongjun Wang, Xiaobin Wang
FNPCS-S2: Authentication Protocols - Room 3
Chair: Senlin Luo, Beijing Institute of Technology, China
1. Analysis on Password Protection in Android Applications
Shao Shuai, Dong Guowei, Guo Tao, Yang Tianchang, and Shi Chenjie
2. A RFID Mutual Authentication Security Protocol Design and Analysis
Xiaobing Liang, Yingjie Lv, Bing Zhao, Ying Liu, Zhiqiang Sun, Wei Cen
3. JavaScript Malicious Codes Analysis Based on Naive Bayes Classification
Yongle Hao, Hongliang Liang, Daijie Zhang, Qian Zhao, Baojiang Cui
4. OpenSSL Heart Bleed:security management of implements of basic protocols
Yongle Hao, Yizhen Jia, Baojiang Cui, Wei Xin, Dehu Meng
IITPC-S1: Intelligent Image Processing - Room 4
Chair: Xin Liu, China University of Petroleum, China
1. A Digital Watermarking Algorithm of Color Image Based on Visual Cryptography and Discrete Cosine Transform
Yanyan Han, Wencai He, Shuai Ji, Qing Luo
2. Automatic Generation Algorithm of Penetration Graph in Penetration Testing
Xueqiu, Qiong Jia, Shuguang Wang, Chunhe Xia, and Liangshuang Lv
3. Research and Prevention of Rogue AP Based MitM in Wireless Network
Mengru Cai, Zhendong Wu, and Jianwu Zhang
4. Improved EAP-AKA Protocol Based on Redirection Defense
Binbin Yu, Jianwu Zhang, and Zhendong Wu
23
Program Guide
Monday, November 10, 2014
19:00-22:00 Banquet Party
Monday, November 10, 2014
3PGCIC-2014 Steering Committee Meeting and Discussion
24
3PGCIC-2014
Program Guide
BWCCA-2014 Main Conference and Workshops Program
BWCCA-2014
BWCCA-2014
Main Conference and Workshops Program
Saturday, November 8, 2014
08:00 Registration
09:00-09:30 Single Session: Opening Ceremony
09:30-10:30 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote I
3PGCIC-2014 & BWCCA-2014 Keynote Talk I (PLENARY ROOM – Room 1)
Prof. Xinbo Gao: Image Quality Assessment
25
Program Guide
Saturday, November 8, 2014
BWCCA-2014
10:30-11:00 Coffee Break
11:00-12:00 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote II
3PGCIC-2014 & BWCCA-2014 Keynote Talk II
Prof. Albert Y. Zomaya: Adaptable Resource Allocation in Cloud Computing Systems
12:00-13:00 Lunch Break
13:00-14:30 Parallel Sessions
BWCCA-S1: Wireless Ad-Hoc and Sensor Networks - Room 4
Chair: Leonard Barolli, Fukuoka Institute of Technology, Japan
1. A Fuzzy-Based Method for Selection of Actor Nodes in Wireless Sensor and Actor Networks
Elis Kulla, Tetsuya Oda, Leonard Barolli
2. ACE: Adaptive Cooperation in EEDBR for Underwater Wireless Sensor Networks
H. Nasir, N. Javaid, M. Murtaza, S. Manzoor, Z.A. Khan, U. Qasim, M. Sher
3. A Study on the Feasibility of Mobile Ad-Hoc Networks Applied to Foreign Objective Debris Detection System
Liangyou Wang, Liangyou Wang, Wancheng Ge, Haoyu Xu, Han Zhou
4. THEEM: Threshold-Sensitive Energy Efficient Multi-hop Routing Protocol for WSNs
W. Raza, I. Khan, F. Arshad, I. Naqvi, U. Qasim, Z.A. Khan, N. Javai
5. Underwater Wireless Sensor Network’s Performance Enhancement with Cooperative Routing and Sink Mobility
A. Umar, M. Akbar, S. Ahmed, N. Javaid, Z.A. Khan, U. Qasim
BWCCA-S2: Network Algorithms and Systems - Room 5
Chair: Dritan Nace, University of Technology of Compiègne, Compiègne, France
1. The Study on Three-Stage Matching Algorithm Framework of Semantic Similarity
Chijun Zhang, Na Huang, Ying Liu, Zhanwei Du
2. Gaussian Process Machine Learning Based ITO Algorithm
Ma Chuang, Yang Yongjian, Zhanwei Du, Chijun Zhang
3. Overview of Routing Algorithm in Pocket Switched Networks
Ma Chuang, Yang Yongjian, Zhanwei Du, Chijun Zhang
4. Research on the User Behavior-Based QoE Evaluation Method for HTTP Mobile Streaming
Yajun Huang, Wen’an Zhou, Yu Du
BWCCA-S3: Wireless Sensor Networks - Room 6
Chair: Makoto Ikeda, Fukuoka Institute of Technology, Japan
1. CoDBR: Cooperative Depth Based Routing for Underwater Wireless Sensor Networks
H. Nasir, N. Javaid, H. Ashraf, S. Manzoor, Z.A. Khan, U. Qasim, M. Sher
2. Research of Optimal Clustering Routing Algorithm for NGB with Small-World Property
Y. Wang, Y. Cui, Y.L. Wang
3. The Location Privacy of Wireless Sensor Networks: Attacks and Countermeasures
Lin Zhou, Changsheng Wan, Jie Huang, Bei Pei, Changsong Chen
26
Program Guide
Saturday, November 8, 2014
BWCCA-2014
4. Volunteer Sensor Networks Node Availability Prediction via Stronger Intelligent Selection Optimization Algorithm
Yu Wang, Wenbin Zhou, Fanfan Zhou
5. TSDDR: Threshold Sensitive Density Controlled Divide and Rule Routing Protocol for Wireless Sensor Networks
M. Behzad, N. Javaid, A. Sana, M.A. Khan, N. Saeed, Z.A. Khan, U. Qasim
BWCCA-S4: Watermarking and Security - Room 7
Chair: Xiaofeng Chen, Xidian University, Xi’an, China
1. A Novel Text Watermarking Algorithm Based on Graphic Watermarking Framework
Xiaowei Liu, Jin Zhang, Haozhou Wang, Xiaoli Gong, Yuanyuan Cheng
2. Research on Polymorphism and Inertial Reading Application in Text Watermarking Algorithm
Yuanyuan Cheng, Jin Zhang, Xiaoli Gong, Haozhou Wan, Xiaowei Liu
3. On the Security of a Remote Data Possession Checking Scheme in Cloud Storage
Xinlong Liang, Rui Jiang
4. Shorten Reed-Solomon Code for Wireless USB
Runfeng Yang, Xiaoning Chen, Jian Zhao
5. Detecting and Defending against Sybil Attacks in Social Networks: An Overview
Faxin Li, Bo Liu, Zhefeng Xiao, Yi Fu
14:30-14:45 Coffee Break
14:45-16:15 Parallel Sessions
BWCCA-S5: Wireless Body and Mesh Networks - Room 4
Chair: Makoto Takizawa, Hosei University, Japan
1. Incremental Relay-Based Co-CEStat Protocol for Wireless Body Area Networks
S. Yousaf, S. Ahmed, M. Akbar, N. Javaid, Z.A. Khan, U. Qasim
2. A GA-Based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering TCP
Tetsuya Oda, Shinji Sakamoto, Admir Barolli, Makoto Ikeda, Leonard Barolli, Fatos Xhafa
3. Co-CEStat: Cooperative Critical Data Transmission in Emergency in Static Wireless Body Area Network
S. Yousaf, S. Ahmed, M. Akbar, N. Javaid, Z.A. Khan, U. Qasim
4. Optimization of Number of Mesh Routers in WMNs Using WMN-SA System Considering Uniform Distribution
for Different Number of Mesh Clients
Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Santi Caballé, Fatos Xhafa
5. Analysis of WMN-GA Simulation System Results: A Comparison Study for Node Placement in WMNs Considering Exponential and Weibull Distributions and Different Transmission Rates
Admir Barolli, Tetsuya Oda, Leonard Barolli, Fatos Xhafa, Makoto Takizawa, Vincenzo Loia
BWCCA-S6: Mobile and Wireless Computing - Room 5
Chair: Kin Fun Li, University of Victoria, Canada
1. A Low-Complexity Decoding Algorithm for RaptorQ Code
Rucheng Zhang, Yajun Kou
27
Program Guide
Saturday, November 8, 2014
BWCCA-2014
2. Non-supervised Rule for Direct Sequence Spread Spectrum Signal Sequence Acquisition
Hao Cheng, Zhenghua Luo, Guolin Sun
3. Mobility Model for WBANs
M.M. Sandhu, M. Akbar, M. Behzad, N. Javaid, Z.A. Khan, U. Qasim
4. Impact of Sensor Sensitivity in Assistive Environment
Kin Fun Li, Ana-Maria Sevcenco, Lei Cheng
NGWMN-S1: Wireless Networks and Cognitive Radio - Room 6
Chair: Hsing-Chung Chen, Asia University, Taiwan
1. Node Placement in WMNs for Different Movement Methods: A Hill Climbing System Considering Exponential
and Weibull Distributions
Xinyue Chang, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa
2. REEC: Reliable Energy Efficient Critical Data Routing in Wireless Body Area Networks
M.M. Sandhu, M. Akbar, M. Behzad, N. Javaid, Z.A. Khan, U. Qasim
3. MASEHA: Multi-hop Communication Using Active and Sleep Nodes for Energy Hole Avoidance in Wireless
Sensor Networks
Y. Moeen, N. Javaid, F. Saleem, A. Umar, M. Akbar, Z.A. Khan, U. Qasim
4. Interference Estimation of Analog TV and LTE System Based on Cognitive Radio
Mingxing Liu, Wenwen Ma
RI3C-S1: Support Systems and Applications - Room 7
Chair: Hiroyuki Fujioka, Fukuoka Institute of Technology, Japan
1. Extraction of Physical Motion Dictating the Difference between Skilled Cyclist and Beginner
Tatsushi Tokuyasu, Takuhiro Sato, Shimpei Matsumoto, Tomoki Kitawaki
2. Facial Emotion Recognition Using Active Shape Models and Statistical Pattern Recognizers
Gil-Jin Jang, Jeong-Sik Park, Ahra Jo, Ji-Hwan Kim
3. An Objective Assessment of Mental Condition Based on EEG and ECG
Takako Otabe, Tomochika Kaneda, Makoto Yoshikai, Tatsushi Tokuyasu
4. Simulation of Slash-and-Burn Using a Cellular Automaton
Sayaka Abe, Kaoru Fujioka
5. An Efficient Head Pose Determination and its Application to Face Recognition Using Multi-pose Face DB and
SVM
Jun Lee, Yong-Ho Seo
16:15-16:30 Break
16:30-18:00 Parallel Sessions
BWCCA-S7: Cloud and Cluster Computing - Room 4
Chair: Tomoya Enokido, Rissho University, Japan
1. The Redundant Delay Time-Based (RDTB) Algorithm for Fault Tolerant Server Clusters
Tomoya Enokido, Makoto Takizawa
2. Multiple DAGs Dynamic Workflow Scheduling Based on the Primary Backup Algorithm in Cloud Computing
System
Yu Wang, Changyun Jia, Yang Xu
28
Program Guide
Saturday, November 8, 2014
BWCCA-2014
3. Time Series QoS Forecasting for Management of Cloud Services
Zia Ur Rahman, Omar Khadeer Hussain, Farookh Khadeer Hussain
4. A Process Migration Approach to Energy-Efficient Computation in a Cluster of Servers
Dilawaer Duolikun, Tomoya Enokidoy, Makoto Takizawa
BWCCA-S8: Wireless Communication Systems - Room 5
Chair: Fumiaki Sato, Toho University, Japan
1. Coordinated Scan Detection Algorithm Based on the Global Characteristics of Time Sequence
Yanli Lv, Yuanlong Li, Shouzhong Tu, Shuang Xiang, Chunhe Xia
2. An Optimized Resource Allocation and CoMP Based Interference Coordination Scheme for LTE-A Het-Net
Du Hai-Tao, Zhou Wen-An, Lu Xian-Qi, Sun Jing-Yuan
3. Outage Analysis of Interference-Limited Dual-Hop Amplify-and-Forward Bidirectional Relaying Systems
Honghang Wen, Jianhua Ge, Jifu Wang
NGWMN-S2: Applications on Wireless Communication Systems - Room 6
Chair: Hsing-Chung Chen, Asia University, Taiwan
1. Localization Scheme of Multistatic Radars System Based on the Information of Measured Signal
Jyh-Horng Wen, Jheng-Sian Li, Cheng-Ying Yang, Chun-Hung Chen, Hsing-Chung Chen
2. The Performance Analysis of Direct/Cooperative Transmission with TXOP Scheme in WLANs
Chien-Erh Weng, Lie Yang, Hsing-Chung Chen
3. A Secure End-to-End Mobile Chat Scheme
Hsing-Chung Chen, Jyh-Horng Wen, Cheng-Ying Yang
RI3C-S2: Robotics Systems and Applications - Room 7
Chair: Yong-Ho Seo, Mokwon University, Korea
1. Design and Implementation of an Omnidirectional Wheelchair: Control System and Its Applications
Keita Matsuo, Leonard Barolli
2. Development of Small Footprint Korean Large Vocabulary Speech Recognition for Commanding a Standalone
Robot
Donghyun Lee, Minkyu Lim, Myoung-Wan Koo, Jungyun Seo, Gil-Jin Jang, Ji-Hwan Kim, Jeong-Sik Park
3. Training System for Endoscopic Surgery by Using Augmented Reality and Forceps Control Devices
Tatsushi Tokuyasu, Wako Okamura, Toru Kusano, Masafumi Inomata, Norio Shiraishi, Seigo Kitanou
4. Reconstructing Dynamic Character Font Models with Incorrect Stroke Order
Hirotsugu Matsukida, Yuta Mieno, Hiroyuki Fujioka
5. Response Surface Learning for Face Misalignment Correction
Youngmin Park, Yeongjae Choi, Hyun S. Yang, Yong-Ho Seo
6. Controlling Mobile Robot Using IMU and EMG Sensor-Based Gesture Recognition
Seong-Og Shin, Donghan Kim, Yong-Ho Seo
19:00-22:00 Welcome Reception Party (University Town International Hotel)
29
Program Guide
Sunday, November 9, 2014
BWCCA-2014
Sunday, November 9, 2014
08:00 Registration
09:00-10:00 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote III
3PGCIC-2014 & BWCCA-2014 Keynote Talk II (PLENARY ROOM – Room 1)
Prof. Dritan Nace: Network Design Optimization: New Trends and Methods
10:00-10:30 Coffee Break
10:30-11:30 Single Session: 3PGCIC-2014 & BWCCA-2014 Keynote IV
3PGCIC-2014 & BWCCA-2014 Keynote Talk IV
Dr. Patrick P. C. Lee: Building Efficient Erasure-Coded Clustered Storage Systems
11:30-12:30 Lunch Break
12:30-14:00 Parallel Sessions
BWCCA-S9: Trust Computing and Authentication - Room 4
Chair: Omar Khadeer Hussain, University of New South Wales, Australia
1. An ACO-Based Trust Inference Algorithm
Leyi Shi, Yao Wang, Xin Liu
2. Implementation of a Trust-Behavior Based Reputation System for Mobile Applications
Tianli Dang, Zheng Yan, Fei Tong, Weidong Zhang, Peng Zhang
3. An Improved Authenticated Skip List for Relational Query Authentication
Jian Xu, Ze Cao, Qiong Xiao, Fucai Zhou
4. A New Security and Privacy Risk Assessment Model for Information System Considering Influence Relation of
Risk Elements
Wu Tianshui, Zhao Gang
5. An Efficient and Flexible Dynamic Remote Attestation Method
Hongjiao Li, Shan Wang
BWCCA-S10: Vehicular Networks - Room 5
Chair: Makoto Ikeda, Fukuoka Institute of Technology, Japan
1. Performance Comparison of DTN Routing Protocols in Vehicular-DTN Environment
Makoto Ikeda, Taiki Honda, Seiichiro Ishikawa, Leonard Barolli
2. Pseudonym-Based Cryptography and Its Application in Vehicular Ad Hoc Networks
Chang-Ji Wang, Dong-Yuan Shi, Xi-Lei Xu
30
Program Guide
Sunday, November 9, 2014
BWCCA-2014
3. A Jammer Deployment Method for Multi-hop Wireless Network Based on Degree Distribution
Xianglin Wei, Yongyang Hu, Jianhua Fan, Baoqiang Kan
4. QoE Issues of OTT Services over 5G Network
Huang Feng-Hui, Zhou Wen-An, Du Yu
MAPWC-S1: Numerical Analysis for Wireless Communication - Room 6
Chair: Kazunori Uchida, Fukuoka Institute of Technology, Japan
1. Propagation Constant Measurement in Two Dimensional Post Array Waveguide with Triangular Lattice by
Metallic Pillars
Huili Chen, Yuting Bao, Jianming Jin, Hiroshi Maeda
2. Numerical Analysis of Y-Shaped Branch Waveguide in Photonic Crystal Structures and Its Application
Jianming Jin, Yuting Bao, Huili Chen, Hiroshi Maeda
3. Experimental Study on Crank-Shaped Waveguide in 2D Post Array
Yuting Bao, Huili Chen, Jianming Jin, Hiroshi Maeda
4. Optical Ray Tracing Based on Dijkstra Algorithm in Inhomogeneous Medium
Kazunori Uchida
MNSA-S1: P2P Systems and Multimedia Networking - Room 7
Chair: Makoto Takizawa, Hosei University, Japan
1. A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering Number of Interaction, Security, and Packet Loss Parameters
Yi Liu, Shinji Sakamoto, Leonard Barolli, Makoto Ikeda, Fatos Xhafa
2. A P2P Model of Publish/Subscribe Systems
Hiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa
3. Scalable and Accurate Data Aggregation Mechanism on Structured P2P Network
Atsushi Takeda, Takuma Oide, Akiko Takahashi, Takuo Suganuma
4. A Digital Fabrication Assistant for 3D Arts and Crafts
Jiaqing Lin, Hiroaki Nishino, Tsuneo Kagawa
5. Proposal of Seeking Wireless Station by Flight Drones Based on Delay Tolerant Networks
Noriki Uchida, Norihiro Kawamura, Tomoyuki Ishida, Yoshitaka Shibata
6. Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient System
Goshi Sato, Noriki Uchida, Koji Hashimoto, Yoshitaka Shibata
14:00-14:15 Coffee Break
14:15-15:45 Parallel Sessions
SCC-S1: Secure Cloud Computing - Room 5
Chair: Xiaofeng Chen, Xidian University, China
1. A XOR Based Public Auditing Scheme for Proof-of-storage
Bei Pei, Changsong Chen, Changsheng Wan
2. Online/Offline Attribute Based Signature
Shaojun Zhang, Peng Chen, Jianfeng Wang
3. Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution
Haixin Nie, Hua Ma, Jianfeng Wang, Xiaofeng Chen
31
Program Guide
Sunday, November 9, 2014
BWCCA-2014
4. Secure Approximate Nearest Neighbor Search over Encrypted Data
Yaqian Gao, Meixia Miao, Jianfeng Wang, Xiaofeng Chen
5. Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE
Pengliang Liu, Jianfneg Wang, Hua Ma, Haixin Nie
6. A Study on Service Performance Evaluation of Openstack
Qifeng Xu, Jie Yuan
MAPWC-S2: Methods and Protocols for Wireless and Mobile Networking - Room 6
Chair: Hiroshi Maeda, Fukuoka Institute of Technology, Japan
1. A CAC Scheme Based on Fuzzy Logic for Cellular Networks Considering Security and Priority Parameters
Takaaki Inaba, Shinji Sakamoto, Vladi Kolici, Gjergji Mino, Leonard Barolli
2. Experimental Results on Energy Harvesting by Using AM Radio Broadcasting
Shingo Otsuka, Norimasa Nakashima
3. A Message Suppression Method for Vehicular Delay Tolerant Networking
Taiki Honda, Seiichiro Ishikawa, Makoto Ikeda, Leonard Barolli
MNSA-S2: E-Learning and Network Applications - Room 7
Chair: Tomoya Enokido, Rissho University, Japan
1. A Language-Learning Support System with a Handwriting-Based Communication Interface
Shu Li, Masato Kasahara, Kosuke Takano, Kin Fun Li
2. An Interactive Learning System Using Smartphone: Improving Students’ Learning Motivation and Self-Learning
Noriyasu Yamamoto
3. Proposal of the Relief Supplies Support System at the Time of Large-Scale Natural Disaster
Kazuhiro Takahagi, Tomoyuki Ishida, Akira Sakuraba, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata
4. Construction of a Communication Support Tool for Understanding Emotion in an Unstable Narrowband Network
Kaoru Sugita, Kaori Urabe, Ken Nishimura
5. User Location Anonymization Based on Secret Computation
Fumiaki Sato
6. A Circuit Switching Method for Improving Congestion of Tor Network
Kale Timothy Girry, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato
15:45-16:00 Break
16:00-17:30 Parallel Sessions
CWECS-S1: Network, Security, and Healthcare - Room 4
Chair: Fang-Yie Leu, Tunghai University, Taiwan
1. S-PMIPv6: Efficient Handover of Proxy Mobile IPv6 by Using SCTP
Chin-Yu Liu, Fang-Yie Leu, Jung-Chun Liu
2. Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements
Sen-Tarng Lai, Fang-Yie Leu, William Cheng-Chung Chu
3. Improving Multi-path Congestion Control for Event-Driven Wireless Sensor Networks by Using TDMA
Fang-Yie Leu, Hsin-Liang Chen, Jung-Chun Liu
4. A Wandering Path Tracking and Fall Detection System for People with Dementia
Chia-Yin Ko, Fang-Yie Leu, I-Tsen Lin
32
Program Guide
Sunday, November 9, 2014
BWCCA-2014
LSNS-S1: Network Technology and Security - Room 5
Chair: Xiaofeng Chen, Xidian University, China
1. B-Mobishare: Privacy-Preserving Location Sharing Mechanism in Mobile Online Social Networks
Nan Shen, Ke Yuan, Jun Yang, Chunfu Jia
2. Rule-Based Business Data Processing in Service Coordination Systems
Jie Yuan, Lirong Qiu
3. Erasing the JPEG Compression Artifacts: An Improved Counter-Forensic Algorithm Based on Parameter Adjustment
Guorui Sheng, Qingtang Su
4. Construction of Semantic Associative Network Based on Topic Maps
Lirong Qiu, Jie Yuan
5. A Method for Tibetan Text Orientation Identification
Xiaodong Yan
6. A Bidirectional Process Algorithm for Mining Probabilistic Frequent Itemsets
Xiaomei Yu, Hong Wang, Xiangwei Zheng
2ASMUB-S1: Advanced Applications and Sustainability Management for Ubiquitous E-Business Room 6
Chair: Hsing-Chung Chen, Asia University, Taiwan
1. Estimation on Dynamic Correlations Among Foreign Reserve Growing, Liquidity Shock and Stock Market
Fluctuation in China
Wang Yongmao
2. Consumption Tilting and the Current Account: Evidence from China
Zhou Yajun
3. A Principal Component Analysis Fusion Method on Infrared Multi-Light-Intensity Finger Vein Images
Chen Liukui, Li Zuojin, Wu Ying, Feng Lixiao
NTCAA-S1: Network Algorithms and Applications - Room 7
Chair: Leonard Barolli, Fukuoka Institute of Technology, Japan
1. MEET: Multi-hop Energy Efficient Protocol for Energy Hole Avoidance Using Variable Transmission Range in
Wireless Sensor Networks
F. Saleem, N. Javaid, Y. Moeen, M. Akbar, Z.A. Khan, U. Qasim
2. TEECH-ME: Threshold Sensitive Energy Efficient Cluster Heads Based on Maximum Energy Routing Protocol
for WSNs
I. Khan, W. Raza, F. Arshad, F. Kalsoom, U. Qasim, Z.A. Khan, N. Javaid
3. An Alternative Flocking Algorithm with Additional Dynamic Conditions
Ningping Sun, Yusuke Tokunaga
4. Detection of JavaScript of Malware with Un-readability Using Mahalanobis-Distance
Kentaro Takamori, Mai Iwamoto, Shunsuke Oshima, Takuo Nakashima
5. The Evaluation Method of Consumer Behavior Pattern Using an Illuminance Sensor Function on a Smart-Tablet
Kyoko Taguchi, Masataka Iwasaki, Shinich Ogata, Yoshifumi Oyama
19:00-22:00 Banquet Party
33
Program Guide
Monday, November 10, 2014
Monday, November 10, 2014
BWCCA-2014 Steering Committee Meeting and Discussion
34
BWCCA-2014
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising