Table of Contents

Applications of Web Information Systems

Study 011 the Design of Automatic Cotton Bale Inspecting Management System 1 Jie . Fang Yu, Minfeng Tang, Wenliao Du, and Yuan

The Smallest Randic Index for Trees 9 Bingjun Li and Weijun Liu

Design of Meridian and Acupoints Compatibility Analysis System 15 Jingchang Pan and Guangwen Wang

Invariant Subspaces for Operators with Thick Spectra 22 Mingxue Liu

Voronoi Feature Selection Model Considering Variable-Scale Map's Balance and Legibility 26 Hua Wang, Jiatian Li, Haixia Pu, Rui Li, arid Yufeng He

A Code Dissemination Protocol of Low Energy Consumption 36 Haiyong Wang, Geng Yang, Jian Xu, Zhengyu , and Zhen Yang

Dynamic Spectrum Analysis of High-Speed Train Passenger Compartment Luggage Rack Noise 44 Chuanhui Wu, Xiangling Gao, and Pinxia.n Gao

Port-Based Cornposable Modeling and Simulation for Safety Critical System Testbed 51 Yujun Zhu, Zhongwei Xu, and Meng Mei

Risk Assessment Method of Radio Block Center in Fuzzy Uncertain Environment 59 Qiuxiang Tao, Wei Nai, Haiming Gao, and Jiliang Tu

Learning Research in Knowledge Transfer 67 Bing Wu and Pingping Chen

A Post-filtering Technique for Enhancing Acoustic Echo Cancelation System 73 Yaxun Wang

Packet Dropping Schemes and Quality Evaluation for H.264 Videos at High Packet Loss Rates 81 Yuxia Wang, Yi Qu, and Rui Lv

http://d-nb.info/1025199073 XII Table of Contents

A Blocked Statistics Method Based on Directional Derivative 90 Junli Li, Chengxi , Gang Li, and Yang Lou

Study on Cooperative Game Model of Talent Training through School-Enterprise Coalition 98 Jun Li, Yan Niu, and Jingliang Chen

Applications of Web Mining

Research on Internet Public Opinion Detection System Based on Domain Ontology 105 Chunming Yang

A Security Analysis Model Based on Artificial Neural Network Ill Rongqi Liu and Shifen Zhong

Social Network Analyses on Knowledge Diffusion of China's Management Science 117 Hongjiang Yue

A Parallel Association-Rule Mining Algorithm 125 Zhi-gang Wang and Chi-she Wang

An Algorithm of Parallel Programming Design Based on Problem Domain Model 130 Xin Zhang, Guangnan Guo, Bai, Yu Zhang, and Hao Wang

E-government and E-commerce

Metadata-Aware Small Files Storage Architecture on Hadoop 136 Xiaoyong Zhao, Yang Yang, Li-li Sun, and Han Huang

Research on the Isomorphism of the Electronic-Government and Electronic-Commerce in Support System 144 Yunbiao Gu and Jian Liu

On the Deployment of Wireless Sensor Networks with Regular Topology Patterns 150 Wen-xiang Li and Ya-jie Ma

An Empirical Study on the Relationship among Trust and the Risky and Non-Risky Components of E-Commerce 159 Xibao Zhang

Process Modeling and Reengineering in the Integration Stage of Electronic Government 167 Ning Zhang and Haifeng Li Table of Contents XIII

Development of Vertical Industrial B2B in China: Based on Cases Study 175 Jinghuai She and Xiaotong Xing

Personalized Recommendation System on Massive Content Processing Using Improved MFNN 183 Jianyang Li and Xiaoping Liu

Information Security A Speaker Recognition Based Approach for Identifying Voice Spammer 191 Fei Wang, KeXing Yan, and Min Feng

Security Access Authentication System for IPv4/IPv6 Dual-Stack Campus Network Based on IpoE 199 Jinshan Zhu, Jiankang Guo, and Yueguang Ruan

Information Encryption Based on Virtual Optical Imaging System and Chen's Chaos 206 Wei Zhu, Geng Yang, Jian Xu, and Xiao-ling Yang

A New Scheme with Secure Cookie against SSLStrip Attack 214 Sendong Zhao, Wu Yang, Ding Wang, and Wenzhen Qiu

ID-Based Signatures from Lattices in the Random Oracle Model 222 Chunxiang Gu, Li Chen, and Yonghui

Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability 231 Fugeng Zeng, Chunxiang Xu, Xiujie Zhang, and Jian Liu

A New Public Key Signature Scheme Based on Multivariate Polynomials 239 Feng Yuan, Shangwei Zhao, Haiwen Ou, and Shengwei Xu

Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing 246 Ding Wang, Ying Mei, Chun-guang Ma, and Zhen-shan Cui

Research on Security Management in Active Network Node Operating Systems 254 Yongchun Cao, Yabin Shao, and Zhengqi

An Integrity Verification Scheme for Multiple Replicas in Clouds 264 La Zhang, Qingzhong Li, Yuliang Shi, Lin Li, and Wenxiao He

Multi-stage Attack Detection Algorithm Based on Hidden Markov Model 275 Nurbol Luktarhan, Xue Jia, Liang Hu, and Nannan Xie XIV Table of Contents

Security Analysis of a Secure and Practical Dynamic Identity-Based Remote User Authentication Scheme '283 Mo-han Zhang, Chen-guang Yang, and Ding Wang

Formal Construction of Secure Information Transmission in Office Automation System 291 Xiaole Li, Lianggang Nie, Jianrong Yin, and Yuanlu Lu

A Novel CBCD Scheme Based on Local Features Category 299 Jie Hou, Baolong Guo, and Jinfu Wu

Research and Improvement on Association Rule Algorithm Based on FP-Growth 306 Jingbo Yuan and Shunli Ding

Encrypted Remote User Authentication Scheme by Using Smart Card 314 Ali A. Yassin, Hai Jin, Ayad Ibrahim, and Deqing Zou

Intelligent Networked Systems

A Web Visualization System of Cyberinfrastructure Resources 324 Yuwei Wang, Kaichao Wu, Danhuai Guo, Wenting Xiang, and Baoping Yan

A Novel Clustering Mechanism Based on Image-Oriented Correlation Coefficient for Wireless Multimedia Sensor Networks 333 Rong Wu, Ruchuan Wang, Chao Sha, and Liyang Qian

Design of Underground Miner Positioning System Based on ZigBee Technology 342 Xin Xu, Ping Zheng, Lingling Li, Haisheng Chen, Jianping Ye, and Jun Wang

Management Information Systems

Metadata Management of Context Resources in Context-Aware Middleware System 350 Rong Tan, Junzhong Gu, Zhou Zhong, and Peng Chen

Research on Scientific Data Sharing Platform of Hydrology and Water Resources Based on Service Composition 358 Dingsheng Wan, Juan Tang, Dazheng Yu, Yufeng Yu, and Xingzhong Guan

Study on the Scheme of Tianjin Area E-commerce Platform Construction 366 Yunbiao Gu Table of Contents XV

Research on Chinese Hydrological Data Quality Management 372 Yufeng Yu, Yuelong Zhu. Jianxin Zhang, and Jingjin Jiang

Using IoT Technologies to Resolve the Food Safety Problem - An Analysis Based on Chinese Food Standards 380 Yun Gu, Weili Han, Lirong Zheng, and Bo Jin

Towards Better Cross-Cloud Data Integration: Using P2P and ETL Together ' 393 Jian Dai and Shuanzhu Du

Design of Intelligent Maintenance Decision-Making System for Fixed Equipment in Petrochemical Plants 402 Guangpei Cong, Jinji Gao, Bing Hou, and Guochen Wang

Dimensional Modeling for Landslide Monitoring Data Warehouse 414 Hongbo Mei and Guangdao Hu

A New Fuzzy Risk Evaluation Method for Uncertain Network Public Sentiment Emergency 422 Qiansheng Zhang, Xia Li, and Yirong Huang

Service Lifecycle Management in Distributed JBI Environment 431 Ben Wang, Xingshe Zhou, Gang Yang, and Yunfeng Lou

Mobile Computing

Graded BDI Models for Agent Architectures Based on Lukasiewicz Logic and Prepositional Dynamic Logic 439 Xiaojun Zhang, Min Jiang, Changle Zhou, and Yijiang Hao

A Polymorphic Type System with Progress for Binary Sessions 451 Zhenguo Yang, Farong Zhong, and Jinfang Zhang

Energy Model of SARA and Its Performance Analysis 462 Bo Pang, Zhiyi Fang, Hongyu Sun, Ming Han, and Xiaohui Nie

Semantic Web and Ontologies

Data Profiling for Semantic Web Data 472 Huiying Li

Checking and Handling Inconsistency of DBpedia 480 Zhaohua Sheng, Xin Wang, Hong Shi, and Zhiyong Feng

Conceptual Representing of Documents and Query Expansion Based on Ontology 489 Haoming Wang, Ye Guo, Xibing Shi, and Fan Yang XVI Table of Contents

Web Information Extraction

Robust Web Data Extraction: A Novel Approach Based on Minimum Cost Script Edit Model 497 Donglan Liu, Xinjun Wang, Zhongmin Yan, and Qiuyan Li

Rule-Based Text Mining of Chinese Herbal Medicines with Patterns in Traditional Chinese Medicine for Chronic Obstructive Pulmonary Disease 510 Junping Zhan, Guang Zheng, Miao Jiang, Cheng Lu, Hongtao Guo, and Aiping Lu

Fault Forecast of Electronic Equipment Based on £ - SVR 521 Lina Liu, Jihong Shen, and Hui Zhao

Analysis and Design of Internet Monitoring System on Public Opinion Based on Cloud Computing and NLP 528 Hui Wen, Peiguang Lin, and Yaobin Hu

Using Similes to Extract Basic Sentiments across Languages 536 Bin Li, Haibo Kuang, Yingjie Zhang, Jiajun Chen, and Xuri Tang

Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis 543 Rui Yang, Zhan Bu, and Zhengyou Xia

A Webpage Deletion Algorithm Based on Hierarchical Filtering 551 Xunxun Chen, Wei Wang, Dapeng Man, and Sichang Xuan

Research in Keyword Extraction 558 Bing Wu and Pingping Chen

Tuple Refinement Method Based on Relationship Keyword Extension. . . 564 Xiaoling Yang, Jing Yang, and Chao Chen

Web Intelligence An Agent Based Intelligent Meta Search Engine 572 Qingshan Li and Yingcheng Sun

A Novel Image Annotation Feedback Model Based on Internet-Search 580 JianSong Yu, DongLin Cao, ShaoZi Li, and DaZhen Lin

The Design and Application of an Ancient Porcelain Online Identification Analysis System 589 Wei Li, Xiaochuan Wang, Rongwu Li, Guoxia Li, Weijuan Zhao, Wenjun Zhao, and Peiyu Guo Table of Contents XVII

A Self-adaptive Strategy for Web Crawler in In-Site Search 595 Rui Sun, Peng Jin, and Wei Xiang

A Novel Shark-Search Algorithm for Theme Crawler 603 Lei Luo, Rong-bo Wang, Xiao-xi Huang, and Zhi-qun Chen

A Framework of Online Proxy-Based Web Prefetching 610 Zhijie Ban and Sansan Wang

Mapping the Intellectual Structure by Co-word: A Case of International Management Science 621 Hongjiang Yue

Study on Multi-sensor Information Fusion Technology in the Dynamic Monitoring of Coal Mine Roof 629 Yong Zhang, Zhao-Jun Liu, and Yun-Fu Cheng

Detecting Hot Topics in Chinese Microblog Streams Based on Frequent Patterns Mining 637 Weili Xu, Shi Feng, Lin Wang, Dating Wang, and Ge Yu

KACTL: Knowware Based Automated Construction of a Treelike Library from Web Documents 645 Ruqian Lu, Yu Huang, Kai Sun, Zhongxiang Chen, Yiwen Chen, and Songmao Zhang

Web Interfaces and Applications

Associating Labels and Elements of Deep Web Query Interface Based on DOM 657 Baohua Qiang, Long Shi, Chunming Wu, Qian He, and Chao Shen

Design and Implementation of the Online Shopping System 664 Guoyong Zhao and Zhiyu Zhou

System Development of Residence Property Management Based on WEB 671 Hanbin Cui and Zhiyu Zhou

XML and Semi-structured Data

An Intelligent Metadata Extraction Approach Based on Programming by Demonstration 678 Binge Cui and Jie Zhang

OF-NEDL: An OpenFlow Networking Experiment Description Language Based on XML 686 Junxue Liang, Zhaowen Lin, and Yan Ma XVIII Table of Contents

Structural Similarity Evaluation of XML Documents Based on Basic Statistics 698 Chen-Ying Wang, Xiao-Jun Wu, Jia Li, and Yi Ge

An XML Data Query Method Based on Structure-Encoded 706 Zhaohui Xu, Jie Qin, and Fuliang Yan

Author Index 715