Communications in Computer and Information Science
136
Simon Fong (Ed.)
Networked Digital Technologies Third International Conference, NDT 2011 Macau, China, July 11-13, 2011 Proceedings
13
Volume Editor Simon Fong University of Macau Faculty of Science and Technology, Building N, Room N410 Av. Padre Tomas Pereira, Taipa, Macau, PR China E-mail:
[email protected]
ISSN 1865-0929 e-ISSN 1865-0937 ISBN 978-3-642-22184-2 e-ISBN 978-3-642-22185-9 DOI 10.1007/978-3-642-22185-9 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2011930275 CR Subject Classification (1998): I.2, H.3, H.4, C.2, H.5, J.1
© Springer-Verlag Berlin Heidelberg 2011 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)
Message from the Chairs
We are honored to present the final papers of the prestigious conference the Third International Conference on Networked Digital Technologies (NDT 2011). The NDT conference has gained significance in the last couple of years and we hope to make it a standardized conference in computer and information sciences. NDT 2011 was co-sponsored (published) by Springer like the previous editions. The University of Macau was happy to organize this scholarly conference in July 2011. NDT 2011 aimed to provide support for concerted efforts in building federated digital technologies that will enable the formation of a network of digital technologies. NDT 2011 consisted of invited talks, papers and presentations. We accepted 41 papers out of 127 submissions. We believe that the conference stimulated interesting discussions. We are grateful to the University of Macau for hosting this conference. We use this occasion to express our thanks to the Technical Committee and to all the external reviewers. We are grateful to Springer for co-sponsoring the event. Finally, we would like to thank all the participants and sponsors. April 2011
Editors Simon Fong Pit Pichappan
Table of Contents
Information Security Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions . . . . . Hao Wang and William Emmanuel Yu Authentication and Authorization in Web Services . . . . . . . . . . . . . . . . . . . Khalil Challita, Hikmat Farhat, and Joseph Zalaket Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Meghdad Mirabi, Hamidah Ibrahim, Ali Mamat, and Nur Izura Udzir
1
13
24
An Access Control Model for Supporting XML Document Updating . . . . Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, and Ali Mamat
37
A Secure Proxy Blind Signature Scheme Using ECC . . . . . . . . . . . . . . . . . . Daniyal M. Alghazzawi, Trigui Mohamed Salim, and Syed Hamid Hasan
47
Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and Applications . . . . . . . . . . . . . . . . . . . . . . . . . Xin-She Yang, Suash Deb, and Simon Fong
53
Networks A Study on the Reliability of Data Transmission of an over the Top Network Protocol on SMS versus UDP/ GPRS (Fragmented) . . . . . . . . . . Alyssa Marie Dykimching, Jan Aaron Angelo Lee, and William Emmanuel Yu QuickFlood: An Efficient Search Algorithm for Unstructured Peer-to-Peer Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hassan Barjini, Mohamed Othman, and Hamidah Ibrahim
67
82
VIII
Table of Contents
Improved-XY: A High Performance Wormhole-Switched Routing Algorithm for Irregular 2-D Mesh NoC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ladan Momeni, Arshin Rezazadeh, and Davood Abednejad
93
XRD Metadata to Make Digital Identity Less Visible and Foster Trusted Collaborations across Networked Computing Ecosystems . . . . . . Ghazi Ben Ayed and Solange Ghernaouti-H´elie
105
An Overview of Performance Comparison of Different TCP Variants in IP and MPLS Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Madiha Kazmi, Muhammad Younas Javed, and Muhammad Khalil Afzal Routing in Mobile Ad-Hoc Networks as a Reinforcement Learning Task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Saloua Chettibi and Salim Chikhi
120
128
Information Management Identifying Usability Issues in Personal Calendar Tools . . . . . . . . . . . . . . . Dezhi Wu Adaptive Query Processing for Semantic Interoperable Information Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Benharzallah Saber, Kazar Okba, and Guy Caplat Statistical Character-Based Syntax Similarity Measurement for Detecting Biomedical Syntax Variations through Named Entity Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hossein Tohidi, Hamidah Ibrahim, and Masrah Azrifan Azmi Correction of Invalid XML Documents with Respect to Single Type Tree Grammars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Martin Svoboda and Irena Ml´ynkov´ a
136
147
164
179
Identification of Scholarly Papers and Authors . . . . . . . . . . . . . . . . . . . . . . . Kensuke Baba, Masao Mori, and Eisuke Ito
195
A Social Network Model for Academic Collaboration . . . . . . . . . . . . . . . . . Sreedhar Bhukya
203
Performance Evaluation of Preference Evaluation Techniques . . . . . . . . . . Alwan A. Ali, Ibrahim Hamidah, Tan Chik Yip, Sidi Fatimah, and Udzir Nur Izura
212
Collective Action Theory Meets the Blogosphere: A New Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Nitin Agarwal, Merlyna Lim, and Rolf T. Wigand
224
Table of Contents
IX
Multimedia Evaluating K-Best Site Query on Spatial Objects . . . . . . . . . . . . . . . . . . . . Yuan-Ko Huang and Lien-Fa Lin
240
Performance of Annotation-Based Image Retrieval . . . . . . . . . . . . . . . . . . . Phani Kidambi, Mary Fendley, and S. Narayanan
251
Multimedia Streams Retrieval in Distributed Systems Using Learning Automata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Safiye Ghasemi and Amir Masoud Rahmani
269
Real-Time Detection of Parked Vehicles from Multiple Image Streams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Kok-Leong Ong and Vincent C.S. Lee
280
E Learning and E Government An Adaptive Framework for Personalized E-Learning . . . . . . . . . . . . . . . . . Ronnie Cheung and Hassan B. Kazemian Gov 2.0 and Beyond: Using Social Media for Transparency, Participation and Collaboration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F. Dianne Lux Wigand
292
307
Web Services/Semantics MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cihan Aksoy, Vincent Labatut, Chantal Cherifi, and Jean-Fran¸cois Santucci
319
Meshing Semantic Web and Web2.0 Technologies to Construct Profiles: Case Study of Academia Europea Members . . . . . . . . . . . . . . . . . . . . . . . . . Petra Korica-Pehserl and Atif Latif
334
Towards Ontology-Based Collaboration Framework Based on Messaging System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Gridaphat Sriharee
345
A QoS and Consumer Personality Considered Services Discovery . . . . . . . Xiuqin Ma, Norrozila Sulaiman, and Hongwu Qin User Centric Homogeneity-Based Clustering Approach for Intelligence Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yun Wei Zhao, Chi-Hung Chi, and Chen Ding
357
364
X
Table of Contents
Data Mining Mining Temporal Association Rules with Incremental Standing for Segment Progressive Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mohsin Naqvi, Kashif Hussain, Sohail Asghar, and Simon Fong
373
Multi-way Association Clustering Analysis on Adaptive Real-Time Multicast Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sheneela Naz, Sohail Asghar, Simon Fong, and Amir Qayyum
383
Multi Level Mining of Warehouse Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . Muhammad Usman and Russel Pears
395
On Inserting Bulk Data for Linear Hash Files . . . . . . . . . . . . . . . . . . . . . . . . Satoshi Narata and Takao Miura
409
Cloud Computing Cloud Data Storage with Group Collaboration Supports . . . . . . . . . . . . . . Jyh-Shyan Lin
423
A Negotiation Mechanism That Facilitates the Price-Timeslot-QoS Negotiation for Establishing SLAs of Cloud Service Reservation . . . . . . . . Seokho Son and Kwang Mong Sim
432
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
447