Table of Contents
Total Page:16
File Type:pdf, Size:1020Kb
Table of Contents Applications of Web Information Systems Study 011 the Design of Automatic Cotton Bale Inspecting Management System 1 Jie Zhao. Fang Yu, Minfeng Tang, Wenliao Du, and Jin Yuan The Smallest Randic Index for Trees 9 Bingjun Li and Weijun Liu Design of Meridian and Acupoints Compatibility Analysis System 15 Jingchang Pan and Guangwen Wang Invariant Subspaces for Operators with Thick Spectra 22 Mingxue Liu Voronoi Feature Selection Model Considering Variable-Scale Map's Balance and Legibility 26 Hua Wang, Jiatian Li, Haixia Pu, Rui Li, arid Yufeng He A Code Dissemination Protocol of Low Energy Consumption 36 Haiyong Wang, Geng Yang, Jian Xu, Zhengyu Chen, and Zhen Yang Dynamic Spectrum Analysis of High-Speed Train Passenger Compartment Luggage Rack Noise 44 Chuanhui Wu, Xiangling Gao, and Pinxia.n Gao Port-Based Cornposable Modeling and Simulation for Safety Critical System Testbed 51 Yujun Zhu, Zhongwei Xu, and Meng Mei Risk Assessment Method of Radio Block Center in Fuzzy Uncertain Environment 59 Qiuxiang Tao, Wei Nai, Haiming Gao, and Jiliang Tu Learning Research in Knowledge Transfer 67 Bing Wu and Pingping Chen A Post-filtering Technique for Enhancing Acoustic Echo Cancelation System 73 Yaxun Wang Packet Dropping Schemes and Quality Evaluation for H.264 Videos at High Packet Loss Rates 81 Yuxia Wang, Yi Qu, and Rui Lv http://d-nb.info/1025199073 XII Table of Contents A Blocked Statistics Method Based on Directional Derivative 90 Junli Li, Chengxi Chu, Gang Li, and Yang Lou Study on Cooperative Game Model of Talent Training through School-Enterprise Coalition 98 Jun Li, Yan Niu, and Jingliang Chen Applications of Web Mining Research on Internet Public Opinion Detection System Based on Domain Ontology 105 Chunming Yang A Security Analysis Model Based on Artificial Neural Network Ill Rongqi Liu and Shifen Zhong Social Network Analyses on Knowledge Diffusion of China's Management Science 117 Hongjiang Yue A Parallel Association-Rule Mining Algorithm 125 Zhi-gang Wang and Chi-she Wang An Algorithm of Parallel Programming Design Based on Problem Domain Model 130 Xin Zhang, Guangnan Guo, Lu Bai, Yu Zhang, and Hao Wang E-government and E-commerce Metadata-Aware Small Files Storage Architecture on Hadoop 136 Xiaoyong Zhao, Yang Yang, Li-li Sun, and Han Huang Research on the Isomorphism of the Electronic-Government and Electronic-Commerce in Support System 144 Yunbiao Gu and Jian Liu On the Deployment of Wireless Sensor Networks with Regular Topology Patterns 150 Wen-xiang Li and Ya-jie Ma An Empirical Study on the Relationship among Trust and the Risky and Non-Risky Components of E-Commerce 159 Xibao Zhang Process Modeling and Reengineering in the Integration Stage of Electronic Government 167 Ning Zhang and Haifeng Li Table of Contents XIII Development of Vertical Industrial B2B in China: Based on Cases Study 175 Jinghuai She and Xiaotong Xing Personalized Recommendation System on Massive Content Processing Using Improved MFNN 183 Jianyang Li and Xiaoping Liu Information Security A Speaker Recognition Based Approach for Identifying Voice Spammer 191 Fei Wang, KeXing Yan, and Min Feng Security Access Authentication System for IPv4/IPv6 Dual-Stack Campus Network Based on IpoE 199 Jinshan Zhu, Jiankang Guo, and Yueguang Ruan Information Encryption Based on Virtual Optical Imaging System and Chen's Chaos 206 Wei Zhu, Geng Yang, Jian Xu, and Xiao-ling Yang A New Scheme with Secure Cookie against SSLStrip Attack 214 Sendong Zhao, Wu Yang, Ding Wang, and Wenzhen Qiu ID-Based Signatures from Lattices in the Random Oracle Model 222 Chunxiang Gu, Li Chen, and Yonghui Zheng Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability 231 Fugeng Zeng, Chunxiang Xu, Xiujie Zhang, and Jian Liu A New Public Key Signature Scheme Based on Multivariate Polynomials 239 Feng Yuan, Shangwei Zhao, Haiwen Ou, and Shengwei Xu Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing 246 Ding Wang, Ying Mei, Chun-guang Ma, and Zhen-shan Cui Research on Security Management in Active Network Node Operating Systems 254 Yongchun Cao, Yabin Shao, and Zhengqi Cai An Integrity Verification Scheme for Multiple Replicas in Clouds 264 La Zhang, Qingzhong Li, Yuliang Shi, Lin Li, and Wenxiao He Multi-stage Attack Detection Algorithm Based on Hidden Markov Model 275 Nurbol Luktarhan, Xue Jia, Liang Hu, and Nannan Xie XIV Table of Contents Security Analysis of a Secure and Practical Dynamic Identity-Based Remote User Authentication Scheme '283 Mo-han Zhang, Chen-guang Yang, and Ding Wang Formal Construction of Secure Information Transmission in Office Automation System 291 Xiaole Li, Lianggang Nie, Jianrong Yin, and Yuanlu Lu A Novel CBCD Scheme Based on Local Features Category 299 Jie Hou, Baolong Guo, and Jinfu Wu Research and Improvement on Association Rule Algorithm Based on FP-Growth 306 Jingbo Yuan and Shunli Ding Encrypted Remote User Authentication Scheme by Using Smart Card 314 Ali A. Yassin, Hai Jin, Ayad Ibrahim, and Deqing Zou Intelligent Networked Systems A Web Visualization System of Cyberinfrastructure Resources 324 Yuwei Wang, Kaichao Wu, Danhuai Guo, Wenting Xiang, and Baoping Yan A Novel Clustering Mechanism Based on Image-Oriented Correlation Coefficient for Wireless Multimedia Sensor Networks 333 Rong Wu, Ruchuan Wang, Chao Sha, and Liyang Qian Design of Underground Miner Positioning System Based on ZigBee Technology 342 Xin Xu, Ping Zheng, Lingling Li, Haisheng Chen, Jianping Ye, and Jun Wang Management Information Systems Metadata Management of Context Resources in Context-Aware Middleware System 350 Rong Tan, Junzhong Gu, Zhou Zhong, and Peng Chen Research on Scientific Data Sharing Platform of Hydrology and Water Resources Based on Service Composition 358 Dingsheng Wan, Juan Tang, Dazheng Yu, Yufeng Yu, and Xingzhong Guan Study on the Scheme of Tianjin Area E-commerce Platform Construction 366 Yunbiao Gu Table of Contents XV Research on Chinese Hydrological Data Quality Management 372 Yufeng Yu, Yuelong Zhu. Jianxin Zhang, and Jingjin Jiang Using IoT Technologies to Resolve the Food Safety Problem - An Analysis Based on Chinese Food Standards 380 Yun Gu, Weili Han, Lirong Zheng, and Bo Jin Towards Better Cross-Cloud Data Integration: Using P2P and ETL Together ' 393 Jian Dai and Shuanzhu Du Design of Intelligent Maintenance Decision-Making System for Fixed Equipment in Petrochemical Plants 402 Guangpei Cong, Jinji Gao, Bing Hou, and Guochen Wang Dimensional Modeling for Landslide Monitoring Data Warehouse 414 Hongbo Mei and Guangdao Hu A New Fuzzy Risk Evaluation Method for Uncertain Network Public Sentiment Emergency 422 Qiansheng Zhang, Xia Li, and Yirong Huang Service Lifecycle Management in Distributed JBI Environment 431 Ben Wang, Xingshe Zhou, Gang Yang, and Yunfeng Lou Mobile Computing Graded BDI Models for Agent Architectures Based on Lukasiewicz Logic and Prepositional Dynamic Logic 439 Xiaojun Zhang, Min Jiang, Changle Zhou, and Yijiang Hao A Polymorphic Type System with Progress for Binary Sessions 451 Zhenguo Yang, Farong Zhong, and Jinfang Zhang Energy Model of SARA and Its Performance Analysis 462 Bo Pang, Zhiyi Fang, Hongyu Sun, Ming Han, and Xiaohui Nie Semantic Web and Ontologies Data Profiling for Semantic Web Data 472 Huiying Li Checking and Handling Inconsistency of DBpedia 480 Zhaohua Sheng, Xin Wang, Hong Shi, and Zhiyong Feng Conceptual Representing of Documents and Query Expansion Based on Ontology 489 Haoming Wang, Ye Guo, Xibing Shi, and Fan Yang XVI Table of Contents Web Information Extraction Robust Web Data Extraction: A Novel Approach Based on Minimum Cost Script Edit Model 497 Donglan Liu, Xinjun Wang, Zhongmin Yan, and Qiuyan Li Rule-Based Text Mining of Chinese Herbal Medicines with Patterns in Traditional Chinese Medicine for Chronic Obstructive Pulmonary Disease 510 Junping Zhan, Guang Zheng, Miao Jiang, Cheng Lu, Hongtao Guo, and Aiping Lu Fault Forecast of Electronic Equipment Based on £ - SVR 521 Lina Liu, Jihong Shen, and Hui Zhao Analysis and Design of Internet Monitoring System on Public Opinion Based on Cloud Computing and NLP 528 Hui Wen, Peiguang Lin, and Yaobin Hu Using Similes to Extract Basic Sentiments across Languages 536 Bin Li, Haibo Kuang, Yingjie Zhang, Jiajun Chen, and Xuri Tang Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis 543 Rui Yang, Zhan Bu, and Zhengyou Xia A Webpage Deletion Algorithm Based on Hierarchical Filtering 551 Xunxun Chen, Wei Wang, Dapeng Man, and Sichang Xuan Research in Keyword Extraction 558 Bing Wu and Pingping Chen Tuple Refinement Method Based on Relationship Keyword Extension. 564 Xiaoling Yang, Jing Yang, and Chao Chen Web Intelligence An Agent Based Intelligent Meta Search Engine 572 Qingshan Li and Yingcheng Sun A Novel Image Annotation Feedback Model Based on Internet-Search 580 JianSong Yu, DongLin Cao, ShaoZi Li, and DaZhen Lin The Design and Application of an Ancient Porcelain Online Identification Analysis System 589 Wei Li, Xiaochuan Wang, Rongwu Li, Guoxia Li, Weijuan Zhao, Wenjun Zhao, and Peiyu Guo Table of Contents XVII A Self-adaptive Strategy for Web Crawler in In-Site Search 595 Rui Sun, Peng Jin, and Wei Xiang A Novel Shark-Search Algorithm for Theme Crawler 603 Lei Luo, Rong-bo Wang, Xiao-xi Huang, and Zhi-qun Chen A Framework of Online Proxy-Based Web Prefetching 610 Zhijie Ban and Sansan Wang Mapping the Intellectual Structure by Co-word: A Case of International Management Science 621 Hongjiang Yue Study on Multi-sensor Information