Communications in Computer and Information Science

136

Simon Fong (Ed.)

Networked Digital Technologies Third International Conference, NDT 2011 Macau, China, July 11-13, 2011 Proceedings

13

Volume Editor Simon Fong University of Macau Faculty of Science and Technology, Building N, Room N410 Av. Padre Tomas Pereira, Taipa, Macau, PR China E-mail: [email protected]

ISSN 1865-0929 e-ISSN 1865-0937 ISBN 978-3-642-22184-2 e-ISBN 978-3-642-22185-9 DOI 10.1007/978-3-642-22185-9 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2011930275 CR Subject Classification (1998): I.2, H.3, H.4, C.2, H.5, J.1

© Springer-Verlag Berlin Heidelberg 2011 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Message from the Chairs

We are honored to present the final papers of the prestigious conference the Third International Conference on Networked Digital Technologies (NDT 2011). The NDT conference has gained significance in the last couple of years and we hope to make it a standardized conference in computer and information sciences. NDT 2011 was co-sponsored (published) by Springer like the previous editions. The University of Macau was happy to organize this scholarly conference in July 2011. NDT 2011 aimed to provide support for concerted efforts in building federated digital technologies that will enable the formation of a network of digital technologies. NDT 2011 consisted of invited talks, papers and presentations. We accepted 41 papers out of 127 submissions. We believe that the conference stimulated interesting discussions. We are grateful to the University of Macau for hosting this conference. We use this occasion to express our thanks to the Technical Committee and to all the external reviewers. We are grateful to Springer for co-sponsoring the event. Finally, we would like to thank all the participants and sponsors. April 2011

Editors Simon Fong Pit Pichappan

Table of Contents

Information Security Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions . . . . . Hao Wang and William Emmanuel Yu Authentication and Authorization in Web Services . . . . . . . . . . . . . . . . . . . Khalil Challita, Hikmat Farhat, and Joseph Zalaket Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Meghdad Mirabi, Hamidah Ibrahim, Ali Mamat, and Nur Izura Udzir

1

13

24

An Access Control Model for Supporting XML Document Updating . . . . Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, and Ali Mamat

37

A Secure Proxy Blind Signature Scheme Using ECC . . . . . . . . . . . . . . . . . . Daniyal M. Alghazzawi, Trigui Mohamed Salim, and Syed Hamid Hasan

47

Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and Applications . . . . . . . . . . . . . . . . . . . . . . . . . Xin-She Yang, Suash Deb, and Simon Fong

53

Networks A Study on the Reliability of Data Transmission of an over the Top Network Protocol on SMS versus UDP/ GPRS (Fragmented) . . . . . . . . . . Alyssa Marie Dykimching, Jan Aaron Angelo Lee, and William Emmanuel Yu QuickFlood: An Efficient Search Algorithm for Unstructured Peer-to-Peer Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hassan Barjini, Mohamed Othman, and Hamidah Ibrahim

67

82

VIII

Table of Contents

Improved-XY: A High Performance Wormhole-Switched Routing Algorithm for Irregular 2-D Mesh NoC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ladan Momeni, Arshin Rezazadeh, and Davood Abednejad

93

XRD Metadata to Make Digital Identity Less Visible and Foster Trusted Collaborations across Networked Computing Ecosystems . . . . . . Ghazi Ben Ayed and Solange Ghernaouti-H´elie

105

An Overview of Performance Comparison of Different TCP Variants in IP and MPLS Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Madiha Kazmi, Muhammad Younas Javed, and Muhammad Khalil Afzal Routing in Mobile Ad-Hoc Networks as a Reinforcement Learning Task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Saloua Chettibi and Salim Chikhi

120

128

Information Management Identifying Usability Issues in Personal Calendar Tools . . . . . . . . . . . . . . . Dezhi Wu Adaptive Query Processing for Semantic Interoperable Information Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Benharzallah Saber, Kazar Okba, and Guy Caplat Statistical Character-Based Syntax Similarity Measurement for Detecting Biomedical Syntax Variations through Named Entity Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hossein Tohidi, Hamidah Ibrahim, and Masrah Azrifan Azmi Correction of Invalid XML Documents with Respect to Single Type Tree Grammars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Martin Svoboda and Irena Ml´ynkov´ a

136

147

164

179

Identification of Scholarly Papers and Authors . . . . . . . . . . . . . . . . . . . . . . . Kensuke Baba, Masao Mori, and Eisuke Ito

195

A Social Network Model for Academic Collaboration . . . . . . . . . . . . . . . . . Sreedhar Bhukya

203

Performance Evaluation of Preference Evaluation Techniques . . . . . . . . . . Alwan A. Ali, Ibrahim Hamidah, Tan Chik Yip, Sidi Fatimah, and Udzir Nur Izura

212

Collective Action Theory Meets the Blogosphere: A New Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Nitin Agarwal, Merlyna Lim, and Rolf T. Wigand

224

Table of Contents

IX

Multimedia Evaluating K-Best Site Query on Spatial Objects . . . . . . . . . . . . . . . . . . . . Yuan-Ko Huang and Lien-Fa Lin

240

Performance of Annotation-Based Image Retrieval . . . . . . . . . . . . . . . . . . . Phani Kidambi, Mary Fendley, and S. Narayanan

251

Multimedia Streams Retrieval in Distributed Systems Using Learning Automata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Safiye Ghasemi and Amir Masoud Rahmani

269

Real-Time Detection of Parked Vehicles from Multiple Image Streams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Kok-Leong Ong and Vincent C.S. Lee

280

E Learning and E Government An Adaptive Framework for Personalized E-Learning . . . . . . . . . . . . . . . . . Ronnie Cheung and Hassan B. Kazemian Gov 2.0 and Beyond: Using Social Media for Transparency, Participation and Collaboration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F. Dianne Lux Wigand

292

307

Web Services/Semantics MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cihan Aksoy, Vincent Labatut, Chantal Cherifi, and Jean-Fran¸cois Santucci

319

Meshing Semantic Web and Web2.0 Technologies to Construct Profiles: Case Study of Academia Europea Members . . . . . . . . . . . . . . . . . . . . . . . . . Petra Korica-Pehserl and Atif Latif

334

Towards Ontology-Based Collaboration Framework Based on Messaging System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Gridaphat Sriharee

345

A QoS and Consumer Personality Considered Services Discovery . . . . . . . Xiuqin Ma, Norrozila Sulaiman, and Hongwu Qin User Centric Homogeneity-Based Clustering Approach for Intelligence Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yun Wei Zhao, Chi-Hung Chi, and Chen Ding

357

364

X

Table of Contents

Data Mining Mining Temporal Association Rules with Incremental Standing for Segment Progressive Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mohsin Naqvi, Kashif Hussain, Sohail Asghar, and Simon Fong

373

Multi-way Association Clustering Analysis on Adaptive Real-Time Multicast Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sheneela Naz, Sohail Asghar, Simon Fong, and Amir Qayyum

383

Multi Level Mining of Warehouse Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . Muhammad Usman and Russel Pears

395

On Inserting Bulk Data for Linear Hash Files . . . . . . . . . . . . . . . . . . . . . . . . Satoshi Narata and Takao Miura

409

Cloud Computing Cloud Data Storage with Group Collaboration Supports . . . . . . . . . . . . . . Jyh-Shyan Lin

423

A Negotiation Mechanism That Facilitates the Price-Timeslot-QoS Negotiation for Establishing SLAs of Cloud Service Reservation . . . . . . . . Seokho Son and Kwang Mong Sim

432

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

447

Communications in Computer and Information Science ...

CR Subject Classification (1998): I.2, H.3, H.4, C.2, H.5, J.1. © Springer-Verlag ... Springer is part of Springer Science+Business Media (www.springer.com) ...

171KB Sizes 2 Downloads 232 Views

Recommend Documents

Communications in Computer and Information Science ... - Springer Link
The International Conference on Digital Enterprise and Information Systems. (DEIS 2011) ... coy, digital management products, business technology intelligence, software ap- plications ... Biquitous Computing, Services and Applications.

Communications in Computer and Information Science ...
don Metropolitan University, UK, during July 20–22, 2011, in association with the Society ..... Content within the Context of Social Media Communications ..........

Adoption of Information and Communications Technologies in ...
Information and communications technologies (ICT) have played a key role in .... development can be restricted as a network administrator's job is considered a ...

computer / information technology / computer science & engineering
GUJARAT TECHNOLOGICAL UNIVERSITY. B.E Semester: 4. Computer Engineering/ Computer Science & Engineering/. Information Technology. Subject Name ...

computer / information technology / computer science & engineering
Object-oriented programming in Turbo C++ By Robert Lafore, Galgotia Publication. 3. Object-oriented programming with C++ By E.Balagurusamy, 2 nd. Edition ...

Computer Science and Engg Information Science Engg..pdf
Page 3 of 4. -Computer Science and Engg Information Science Engg..pdf. -Computer Science and Engg Information Science Engg..pdf. Open. Extract. Open with.

. Computer Science and Engg Information Science Engg..pdf ...
Page 3 of 4 . Computer Science and Engg Information Science Engg..pdf . Computer Science and Engg Information Science Engg..pdf. Open. Extract. Open with.

. Computer Science and Engg Information Science Engg..pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... . Computer S ... ce Engg..pdf . Computer Sc ... nce Engg..pdf. Open.

TEXTS IN COMPUTER SCIENCE
Java — Designed as a language to support mobile programs, Java has special .... We offer a few low-level coding hints that are helpful in building quality programs. ...... cheap in selecting your table size or else you will pay the price later.

TEXTS IN COMPUTER SCIENCE
thousand bright students, so look there for errata and revised solutions. ..... content, just like the house numbers on a street permit access by address, not ...

COMPUTER SCIENCE, INFORMATION SYSTEMS.pdf
Loading… Displaying COMPUTER SCIENCE, INFORMATION SYSTEMS.pdf. COMPUTER SCIENCE, INFORMATION SYSTEMS.pdf. COMPUTER SCIENCE ...

Managers 2016 Computer Science & Information Technology.pdf ...
Managers 2016 Computer Science & Information Technology.pdf. Managers 2016 Computer Science & Information Technology.pdf. Open. Extract. Open with.

COMPUTER SCIENCE, INFORMATION SYSTEMS.pdf
CHEMINFORMATICS. 1758-. 2946 315 3.590 3.671 0.314 35 1.9 0.00175 1.221. J AM MED INFORM. ASSN. 1067-. 5027 5012 3.571 3.959 0.925 186 6.2 0.01317 1.333. J INF TECHNOL 0268-. 3962 1165 3.532 3.801 1.263 19 6.5 0.00320 1.347. DATA MIN KNOWL. DISC. 138

Download [Epub] Data and Computer Communications (William Stallings Books on Computer and Data Communications) Full Pages
Data and Computer Communications (William Stallings Books on Computer and Data Communications) Download at => https://pdfkulonline13e1.blogspot.com/0133506487 Data and Computer Communications (William Stallings Books on Computer and Data Communic

computer communications
provided for teachers and students to learn about the technology through setting up and .... how to teach and learn in the online world which is not shallow will not ... The systems which are described in detail below enable each MS- ..... studies in