Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Advances in Internetworking, Data & Web Technologies (eBook)

The 5th International Conference on Emerging Internetworking, Data & Web Technologies (EIDWT-2017)
eBook Download: PDF
2017 | 1st ed. 2018
XXIX, 779 Seiten
Springer International Publishing (Verlag)
978-3-319-59463-7 (ISBN)

Lese- und Medienproben

Advances in Internetworking, Data & Web Technologies -
Systemvoraussetzungen
213,99 inkl. MwSt
(CHF 208,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book highlights the latest research findings, innovative research results, methods and development techniques, from both theoretical and practical perspectives, in the emerging areas of information networking, data and Web technologies. It gathers papers originally presented at the 5th International Conference on Emerging Internetworking, Data & Web Technologies (EIDWT-2017) held 10-11 June 2017 in Wuhan, China. The conference is dedicated to the dissemination of original contributions that are related to the theories, practices and concepts of emerging internetworking and data technologies - and most importantly, to how they can be applied in business and academia to achieve a collective intelligence approach.

Information networking, data and Web technologies are currently undergoing a rapid evolution. As a result, they are now expected to manage increasing usage demand, provide support for a significant number of services, consistently deliver Quality of Service (QoS), and optimize network resources. Highlighting these aspects, the book discusses methods and practices that combine various internetworking and emerging data technologies to capture, integrate, analyze, mine, annotate, and visualize data, and make it available for various users and applications.

Welcome Message of EIDWT-2017 International Conference Organizers 6
EIDWT-2017 Steering Committee Chair 7
EIDWT-2017 General Co-chairs 7
EIDWT-2017 Program Committee Co-chairs 7
EIDWT-2017 International Conference Organizers 8
Honorary Co-chairs 8
General Co-chairs 8
Program Co-chairs 8
Workshops Co-chairs 8
International Advisory Committee 8
Publicity Co-chairs 9
International Liaison Co-chairs 9
Local Organizing Co-chairs 9
Web Administrators 9
Finance Chair 9
Steering Committee Chair 9
Track Area Co-chairs 10
1. Internetworking Issues and Challenges 10
2. Mobile and Wireless Networks 10
Chairs 10
3. Network Protocols, Modelling, Optimization and Performance Evaluation 10
Chairs 10
4. P2P and Grid Computing 10
Chairs 10
5. Distributed and Parallel Systems 10
Chairs 10
6. Ontologies and Metadata Representation 11
Chairs 11
7. Knowledge Discovery and Mining 11
Chairs 11
8. Databases and Data Warehouses 11
Chairs 11
9. Data Centers and IT Virtualization Technologies 11
Chairs 11
10. Web Science and Business Intelligence 11
Chairs 11
11. Data Analytics for Learning and Virtual Organisations 11
Chairs 11
12. Data Management and Information Retrieval 12
Chairs 12
13. Machine Learning on Large Data Sets & Massive Processing
Chairs 12
14. Data Modeling, Visualization and Representation Tools 12
Chairs 12
15. Nature Inspired Computing for Emerging Collective Intelligence 12
Chairs 12
16. Data Sensing, Integration and Querying Systems and Interfaces 12
Chairs 12
17. Data Security, Trust and Reputation 12
Chairs 12
18. eScience Data Sets, Repositories, Digital Infrastructures 13
Chairs 13
19. Energy-Aware and Green Computing in Data Centers 13
Chairs 13
20. Emerging Trends and Innovations in Inter-networking Data Technologies 13
Chairs 13
21. Bitcoin, Blockchain Techniques and Security 13
Chairs 13
Program Committee Members 13
EIDWT-2017 Reviewers 16
EIDWT-2017 Keynote Talks 17
A Security Management with Cyber Insurance—Event Study Approach with Social Network Sentimental Analysis for Cyber Risk Evaluation 18
Look Back! Earlier Versions will Reveal Weaknesses in Android Apps 19
Secret Sharing and Its Applications 20
New Short-Range Communication Technologies over Smartphones: Designs and Implementations 21
Contents 22
An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble 29
Abstract 29
1 Introduction 29
2 Basic Theory 30
2.1 Ensemble Classifiers 30
2.2 Rotation Forest 31
3 The Proposed Algorithm 32
3.1 Basic Classifier 33
3.2 Weight Assignment for Classifiers 34
3.3 Determination of dsub and L 35
4 Experiment Results 36
4.1 Experimental Environment 36
4.2 Comparison of Error Rate 36
4.3 Comparison of ROC Curve 37
4.4 Comparison of Training Time 38
5 Conclusion 39
Acknowledgments 39
References 39
Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem 41
Abstract 41
1 Introduction 41
2 The Principle of the Proposed Scheme 42
3 Experimental Results and Discussions 45
4 Conclusion 47
References 48
Credit Risk Assessment of Peer-to-Peer Lending Borrower Utilizing BP Neural Network 50
Abstract 50
1 Introduction 50
2 BP Neutral Network 51
3 Application Flow Chart 52
4 Model Construction 53
4.1 Target Selection 53
4.2 Data Processing 54
5 Model Processing 56
5.1 Model Description 56
5.2 Model Simulation 56
6 Data Analysis 58
7 Conclusion 59
Acknowledgments 60
References 60
Implementation of a GA-based Simulation System for Placement of IoT Devices: Evaluation for a WSAN Scenario 62
1 Introduction 62
2 IoT and WSAN 63
2.1 Internet of Things (IoT) 63
2.2 WSAN Architectures 64
2.3 Node Placement Problems and Their Applicability to WSANs 65
3 Overview of GA 66
4 Design and Implementation of IoT Device Placement Simulation System 66
5 Simulation Results 68
6 Conclusions 69
References 69
A Cryptographically Secure Scheme for Preserving Privacy in Association Rule Mining 71
Abstract 71
1 Introduction 71
2 Related Work 72
3 Preliminaries 72
4 Proposed Algorithm 73
5 Results 77
6 Conclusions and Future Work 80
References 80
A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts 82
Abstract 82
1 Introduction 82
2 Preliminares 83
2.1 Bilinear Map 83
2.2 Access Structures 83
2.3 Linear Secret Sharing Schemes 84
2.4 BGN Scheme 84
2.5 Outsourcing the Decryption of ABE Ciphertexts Model 85
3 Our Construction 86
4 Security 88
4.1 The Subgroup Decision Problem 88
4.2 Proof 89
5 Performance Analysis 89
6 Summary 90
References 90
Performance Evaluation of WMN-PSOHC and WMN-PSO Simulation Systems for Node Placement in Wireless Mesh Networks: A Comparison Study 92
1 Introduction 92
2 Node Placement Problem in WMNs 93
3 Proposed and Implemented Simulation System 94
3.1 PSO 94
3.2 HC Algorithm 96
3.3 Implemented Simulation Systems 97
4 Simulation Results 98
5 Conclusions 100
References 100
Effects of Number of Activities the Member Failures on Qualified Voting in P2P Mobile Collaborative Team: A Comparison Study for Two Fuzzy-Based Systems 103
1 Introduction 104
2 Scenarios of Collaborative Teamwork 105
2.1 Collaborative Teamwork and Virtual Campuses 105
2.2 Mobile Ad Hoc Networks (MANETs) 106
3 Vote Weights 107
3.1 Votes with Embedded Weight 107
3.2 Voting Score 107
4 Application of Fuzzy Logic for Control 107
4.1 FC 108
4.2 Linguistic Variables 108
4.3 FC Rules 108
4.4 Control Knowledge Base 109
4.5 Defuzzification Methods 109
5 Proposed Fuzzy-Based Peer Voting Score System 109
6 Simulation Results 113
7 Conclusions and Future Work 115
References 115
A User Prediction and Identification System for Tor Networks Using ARIMA Model 117
1 Introduction 117
2 Deep Web and Tor Overview 119
2.1 Deep Web 119
2.2 Tor 120
3 ARIMA 120
4 The R Environment 121
5 Proposed Intrusion Detection Model for Tor Networks 122
6 Simulation Results 122
7 Conclusions 124
References 124
Implementation of an Actor Node for an Ambient Intelligence Testbed: Evaluation and Effects of Actor Node on Human Sleeping Condition 126
1 Introduction 126
2 Ambient Intelligence (AmI) 127
3 The k-means Algorithm 128
4 Testbed Description 129
5 Experimental Results 131
6 Conclusions 132
References 132
Designing the Light Weight Rotation Boolean Permutation on Internet of Things 135
1 Introduction 135
2 Preliminaries 137
3 Rotation Linear Boolean Permutation 139
4 Rotation Nonlinear Boolean Permutation 139
4.1 The First Construction 139
4.2 The Second Construction 141
4.3 The Third Construction 143
5 Conclusions 146
References 146
The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering 147
Abstract 147
1 Introduction 147
2 Related Work 148
3 Clue Words 148
4 Algorithm 149
4.1 Self-filtering 150
4.2 Locating Candidate Effect Statements 151
5 Experiments 152
5.1 Collection of Initial Clue Words 152
5.2 Iteration 152
6 Conclusion and Future Work 153
Acknowledgments 153
References 153
Numerical Simulation for the Nonlinear Elliptic Problem 154
1 Introduction 154
2 Notation, Weak Formulation and Approximation 155
3 Analysis of the Linearized Problem 157
4 Existence and Uniqueness 159
5 L2-Error Estimates 161
6 Numerical Examples 162
7 Conclusion 163
References 164
Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion 166
Abstract 166
1 Introduction 166
2 Preliminaries 168
2.1 Prediction Error Expansion 168
2.2 Paillier Encryption 168
3 The Proposed Algorithm 169
3.1 Preprocessing 169
3.2 Encryption and Embedding 171
3.3 Data Extraction and Image Recovery 172
4 Experimental Results 173
5 Conclusions 176
References 176
Reversible Image Data Hiding with Homomorphic Encryption and Contrast Enhancement 178
Abstract 178
1 Introduction 178
2 Image Encryption and Data Embedding 179
2.1 Preprocessing 180
2.2 Embedding in Plain Domain 180
2.3 Paillier-Based Image Encryption 180
2.4 Embedding in Encrypted Domain 181
3 Data Extraction and Image Recovery 181
3.1 Image Decryption 182
3.2 Data Extraction 182
3.3 Image Recovery 183
4 Experimental Results and Analysis 184
4.1 Feasibility 184
4.2 Visual Quality 184
4.3 Embedding Capacity 186
5 Conclusions 186
References 186
A Deep Network with Composite Residual Structure for Handwritten Character Recognition 188
Abstract 188
1 Introduction 188
2 Handwriting Recognition Framework Based on Deep Learning 189
3 Handwritten Character Recognition Algorithm Based on Composite Residual Structure 189
3.1 Data Preprocessing 190
3.2 Convolution Neural Network with Composite Residual Structure Kernel Structure 190
3.3 Composite Residual Structure Kernel Structure 191
4 Experimental Comparison 192
5 Conclusion 193
Acknowledgments 193
References 193
An Ensemble Hashing Framework for Fast Image Retrieval 195
Abstract 195
1 Introduction 195
2 Related Work 196
3 The Proposed Ensemble Hashing Framework 197
4 A Novel Weighted Bagging PCA-ITQ Method 198
4.1 PCA-ITQ 198
4.2 A Simple Weighted Method 199
4.3 Diverse Hash Tables Learning 200
5 Experiments 202
6 Conclusion 203
Acknowledgments 204
References 204
A Novel Construction and Design of Network Learning Platform in Cloud Computing Environment 206
Abstract 206
1 Introduction 206
2 Theoretical Foundation 207
2.1 Learning Theory 207
2.2 Object Analysis 207
2.3 Design Principles 208
3 Demand Analysis 208
3.1 Network Learning Environment in Cloud Computing 208
3.2 Application Analysis 208
3.3 Function Analysis 209
4 System Architecture 211
4.1 The Architecture of Our Proposed Platform 211
4.2 The Modular Construction of Our System in the Cloud 211
5 Conclusion 213
Acknowledgments 213
References 213
Automatic Kurdish Text Classification Using KDC 4007 Dataset 215
Abstract 215
1 Introduction 215
2 Literature Survey 216
3 Text Mining Functionalities 217
3.1 Naive Bayes Classifier 217
3.2 Decision Tree Classifier 218
3.3 Support Vector Machine Classifier 218
4 Methods and Materials 218
4.1 Kurdish Sorani Pre-processing Steps 219
4.2 Data Representation and Term Weighting 219
4.2.1 Boolean or Binary Weighting 220
4.2.2 Term Frequency (TF) 220
4.2.3 Term Frequency Inverse Document Frequency (TF × IDF) 220
5 Dataset, Experimentations, and Evaluation 220
5.1 Dataset 221
5.2 Experimentations 221
5.3 Evaluation 222
6 Results and Discussion 222
7 Conclusion 225
References 225
Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm 227
Abstract 227
1 Introduction 227
2 Preliminares 228
2.1 Bilinear Map 228
2.2 Access Structures 228
2.3 Linear Secret Sharing Schemes 229
2.4 Paillier Scheme 229
2.5 Security Model for PE 230
2.6 Assumption 231
2.7 Paillier Type Outsourcing the Decryption of PE Ciphertexts Model 232
3 Our Construction 232
4 Security 235
5 Summary 237
References 238
A New Middleware Architecture for RFID Data Management 240
Abstract 240
1 Introduction 240
2 RFID Middleware Structure 242
3 Data Processing Module 244
3.1 Data Processing Module 244
3.2 Design of Redundancy Data Elimination 244
3.3 Design of Skipping Reading Data Process 246
3.4 Data Transferring Module 246
3.5 Other Modules’ Design 247
4 Conclusion 248
Acknowledgments 249
References 249
Multidimensional Zero-Correlation Linear Cryptanalysis on PRINCE 250
Abstract 250
1 Introduction 250
2 Backgrounds 251
2.1 The Encryption Process of PRINCE 251
2.2 Properties of the Matrix M 253
3 Multidimensional Zero-Correlation Linear Cryptanalysis 254
4 5-Round Zero Correlation Linear Approximations of PRINCE 255
5 9-Round Zero Correlation Linear Attack on PRINCE 257
6 Summary 259
Acknowledgments 259
References 259
Design and Implementation of Simulated DME/P Beaconing System Based on FPGA 261
Abstract 261
1 Introduction 261
2 Overall Scheme of Simulated DME/P Beaconing System 262
2.1 Host Computer 262
2.2 RF Front-End 263
2.3 Signal Processing Unit 263
2.3.1 RF Receiving 263
2.3.2 RF Transmission 263
2.3.3 FPGA Signal Processing [6] 263
3 Implementation and Simulation Result of Baseband Signal Processing 266
3.1 Pulse Amplitude Test and Time Reference Sampling 266
3.2 Simulation on Fixed Distance and Fixed Rate 267
3.3 Simulation of Pulse Interference and Random Pulse Encoder 267
3.4 Noise Simulation 268
4 Conclusion 269
References 270
LDPC Codes Estimation Model of Decoding Parameter and Realization 271
Abstract 271
1 Introduction 271
2 Estimation Model 272
3 Precision Analysis of Model 274
4 Estimation Method 275
4.1 Moment Estimation and Maximum Likelihood Estimation 275
4.2 Bayesian Estimation 276
5 Performance Simulation and Analysis 277
6 Conclusion 279
References 279
A Novel Query Extension Method Based on LDA 281
Abstract 281
1 Introduction 281
2 Related Works 282
3 Our Method 283
3.1 Fit Document Set with LDA 283
3.2 Retrieve the First Relevant Documents for Input Query 286
3.3 Extend the Original Query 287
4 Experiments 287
Acknowledgments 288
References 288
Target Recognition Method Based on Multi-class SVM and Evidence Theory 290
Abstract 290
1 Introduction 290
2 SVM and D-S Theory 291
2.1 SVM Theory 291
2.2 Multi Classification SVM 291
2.3 D-S Evidence Theory 292
3 The Combination of MSVM and Evidence Theory 293
3.1 SVM Probability Output 293
3.2 MSVM Soft Output 293
3.3 Fast Murphy Combination Rule 295
3.4 Multi-sensor Target Recognition Structure Model 296
4 Simulation Experiments 297
5 Conclusion 298
Acknowledgement 299
References 299
Selective Ensemble Based on Probability PSO Algorithm 301
Abstract 301
1 Introduction 301
2 Particle Swarm Optimization Algorithm and Its Improvement 302
3 Selective Integration Based on Probabilistic PSO 303
3.1 Basic Ideas 303
3.2 Selection of Fitness Function 304
3.3 Algorithm Flow 304
4 Numerical Experiments and Analysis 306
5 Conclusion 307
Acknowledgment 307
References 307
The Research of QoS Monitoring-Based Cloud Service Selection 309
Abstract 309
1 Introduction 309
2 Related Works 310
3 QoS Factor for Cloud Services 311
4 The Architecture of Agent-Based Cloud Service Provider 312
5 Experiment and Results 314
6 Conclusion and Future Works 315
References 316
Developing Cloud-Based Tools for Water Resources Data Analysis Using R and Shiny 317
Abstract 317
1 Introduction 317
2 Related Works 318
3 Key Technologies 319
3.1 Cloud Computing and Apache CloudStack 319
3.2 Map-Reduce Model, Hadoop and Cascading 319
3.3 R and Shiny 320
4 The Architecture Proposed 320
5 Use Case 322
6 The Conclusion and Future Work 323
Acknowledgments 324
References 324
Perception Mining of Network Protocol’s Dormant Behavior 326
Abstract 326
1 Introduction 326
2 Related Work 328
3 Design of the Protocol Behavior Analysis System 330
4 Protocol Dormant Behavior Analysis 331
4.1 Experimental Scheme 331
4.2 Experimental Results 332
5 Conclusions 333
Acknowledgments 333
References 334
Video Stabilization Algorithm Based on Kalman Filter and Homography Transformation 336
Abstract 336
1 Introduction 336
2 Research Methods 337
2.1 SURF Feature Point Extraction 337
2.2 Nearest Neighbor Algorithm 338
2.3 Motion Compensation 339
3 Experimental Results 339
3.1 Video Rotation Compensation 340
3.2 Evaluation of Image Stabilization 340
4 Conclusion 341
Acknowledgments 341
References 341
Towards a Web-Based Teaching Tool to Measure and Represent the Emotional Climate of Virtual Classrooms 342
Abstract 342
1 Introduction 342
2 Background 344
2.1 Models for Emotion Recognition and Affective Feedback 345
2.2 Emotion-Aware Methods and Techniques for ELearning 346
2.2.1 Emotional Detection 346
2.2.2 Affective Feedback 346
3 Research Methodology 347
3.1 Conceptual Approach and Requirements 347
3.2 Development and Prototyping 348
3.2.1 Post Classification 348
3.2.2 Graphical Representation 350
4 Evaluation Results 352
5 Conclusions and Future Work 353
Acknowledgements 354
References 354
An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation 356
Abstract 356
1 Introduction 356
1.1 Related Works 357
1.2 Paper Organization 358
2 Preliminaries 359
2.1 Bilinear Pairing 359
2.2 Pre-computation Algorithm 359
2.3 Computational Indistinguishability 360
3 Security Model 360
4 The Efficient Secure Algorithm 363
4.1 Construction 363
4.2 Proofs 364
4.3 Comparisons 365
5 Conclusions 366
Acknowledgments 366
References 366
A New Broadcast Encryption Scheme for Multi Sets 368
Abstract 368
1 Introduction 368
2 Preliminaries 369
2.1 Multilinear Maps 369
2.2 The Diffie-Hellman Inversion Assumption 370
2.3 Broadcast Encryption Scheme for Multi Sets 370
2.4 Broadcast Encryption Scheme for Multi Sets Security Model 371
3 Our Construction 372
4 Program Analysis 373
4.1 Correctness 373
4.2 Security Proof 373
5 Performance Analysis 374
6 Summary 375
Acknowledgments 375
References 375
Key Encapsulation Mechanism from Multilinear Maps 377
Abstract 377
1 Introduction 377
2 Preliminaries 378
2.1 Multilinear Maps and Assumption 378
2.2 Identity-Based Key Encapsulation Mechanism 379
2.3 Identity-Based Key Encapsulation Mechanism Security Model 379
3 Our Construction 380
4 Program Analysis 381
4.1 Correctness 381
4.2 Security Proof 381
5 Performance Analysis 383
6 Summary 384
References 384
An Multi-hop Broadcast Protocol for VANETs 386
Abstract 386
1 Introduction 386
2 ELCMBP Enhanced Broadcast Protocol 386
2.1 Disadvantages of DV-CAST 387
2.2 ELCMBP Protocol Design 388
2.2.1 Broadcast Message Initiation 389
2.2.2 Broadcast Message Forwarding 389
3 Simulation Experiment and Result Analysis 391
4 Conclusion 393
References 393
DPHKMS: An Efficient Hybrid Clustering Preserving Differential Privacy in Spark 395
Abstract 395
1 Introduction 395
2 Preliminaries 397
2.1 k-means Clustering 397
2.2 Differential Privacy 397
3 DPHKS Algorithm 398
3.1 Attack Model 398
3.2 Design of DPHKS Algorithm 399
3.3 Privacy Analysis of DPHKS 401
4 Experiment and Analysis 401
4.1 Clustering Efficiency 402
4.2 Computation Time 402
4.3 Clustering Results Usability 403
5 Conclusion 404
Acknowledgments 404
References 404
Technique for Image Fusion Based on PCNN and Convolutional Neural Network 406
Abstract 406
1 Introduction 406
2 Convolution Neural Network 408
3 Improved Pulse Coupled Neural Network 409
3.1 IPCNN and Its Time Matrix 409
3.2 Parameters Determination of IPCNN 411
4 Experimental Results and Analysis 413
4.1 Methods Introduction and Parameters Setting 413
4.2 Subjective and Objective Evaluation on the Experimental Results 414
5 Conclusions 416
Acknowledgements 416
References 416
Fast Iterative Reconstruction Based on Condensed Hierarchy Tree 418
Abstract 418
1 Introduction 418
2 Related Research 418
3 FIRA Algorithm 419
3.1 Image Similarity Calculation 419
3.2 Hierarchical Tree Generation 423
4 Experimental Results 424
4.1 Performance 424
4.2 Accuracy 425
5 Summary 426
Acknowledgement 426
References 426
An Optimal Model of Web Cache Based on Improved K-Means Algorithm 428
Abstract 428
1 Introduction 428
2 The Performance of the Web Cache Replacement Model 429
3 The Existing Web Replacement Strategy 429
4 Web Cache Optimization Model Based on Improved K-Means Clustering Algorithm 430
4.1 Several Definitions 430
4.2 Establishment of HSF Model Based on Improved K-Means Algorithm 431
4.3 The K-Means Clustering Analysis Algorithm 431
4.4 The Improved K-Means Algorithm 432
5 Experiment 433
5.1 Matrix Transformation 433
5.2 K-Means Algorithm Clustering Effect 434
5.3 The Improved K-Means Algorithm Clustering Result 434
5.4 Comparison of RFS Model and HSF Model 436
6 Conclusion 438
References 438
Detecting Crowdsourcing Spammers in Community Question Answering Websites 440
1 Introduction 440
2 Background and Data Collection 441
2.1 Link Crowdsourcing Services to CQA Websites 441
2.2 Data Collection 442
3 Analysis of Non-semantic Features and Semantic Features 443
3.1 Non-Semantic Analysis 443
3.2 Semantic Analysis 444
4 Detect Crowdsourcing Spammers 445
4.1 Features 445
4.2 Feature Selection 447
5 Results and Evaluation 447
5.1 Settings and Metrics 447
5.2 Classification Results 448
5.3 Compare with Existing Methods 448
6 Related Work 449
7 Conclusions 450
References 450
A Spam Message Detection Model Based on Bayesian Classification 452
Abstract 452
1 Introduction 452
2 The Bayesian Spam Detection Model 454
2.1 Introduction to Bayesian Algorithm 454
2.2 The Bayesian Spam Detection Model 455
3 Spam Message Forensics 457
3.1 Background 457
3.2 Forensics Process 458
4 Experiments and Discussion 460
4.1 Experiment Objectives 460
4.2 Experimental Environment 460
4.3 Experimental Process 460
4.4 Result Analysis 461
5 Conclusion 461
References 462
Spam Mail Filtering Method Based on Suffix Tree 464
Abstract 464
1 Introduction 464
1.1 Black/White List Filtering 465
1.2 Naïve Bayes Classification 465
1.3 K-NN Algorithm 465
1.4 Suffix Tree Algorithm 465
2 Ukkonen’s Algorithm 467
3 Search and Matching Algorithm 469
3.1 Break the Limitation of Language 469
3.2 Search and Matching 469
4 Experiment 471
4.1 Spam Corpus Collection 471
4.2 Spam Mail Key-Words Database 471
4.3 Ham Text Dataset 472
4.4 Evaluation Indicator 472
4.5 Weight Choosing· 473
4.6 Complexity Analysis 474
5 Conclusion 475
References 475
MP3 Audio Watermarking Algorithm Based on Unipolar Quantization 476
Abstract 476
1 Introduction 476
2 MP3 Audio Watermarking Based on Discrete Wavelet Transform 477
2.1 Watermark Embedding 477
2.2 Watermark Extraction 481
3 Simulation 481
3.1 Auditory Transparency 481
3.2 Robustness 482
4 Conclusion 483
References 483
Multi-documents Summarization Based on the TextRank and Its Application in Argumentation System 485
Abstract 485
1 Introduction 485
2 Multi-document Summarization Method Based on TextRank Algorithm 486
2.1 Text Preprocessing 487
2.2 Text Preprocessing 487
2.2.1 Text Feature Weighting 487
2.2.2 Vector Space Model (VSM) 488
2.2.3 Text Similarity Calculation 488
2.2.4 Expert Opinion in Text Clustering 489
2.3 Multiple Document Summary 489
2.3.1 Text Summary Algorithm 489
2.3.2 Similarity Calculation Between Sentences 490
3 Application Effect Analysis 491
4 Conclusion 493
Acknowledgements 493
References 493
An Unconstrained Face Detection Algorithm Based on Visual Saliency 495
Abstract 495
1 Introduction 495
2 Saliency Detection Algorithm Based on Log_Gabor_GBVS 496
3 Segmentation Method Based on Maximum Entropy Criterion 497
4 Face Detection Algorithm Based on Object Region Centroid 498
5 Experiment Results 500
6 Conclusions 501
Acknowledgement 501
References 501
Pavement Crack Detection Fused HOG and Watershed Algorithm of Range Image 503
Abstract 503
1 Introduction 503
2 3-D Measurement of Line Structured Light and Crack Feature of Pavement Range Image 505
3 Crack Edge Detection by HOG 507
4 Crack Detection by Direction Watershed Algorithm 510
5 Experiment and Analysis 511
6 Conclusion 514
Acknowledgments 515
References 515
Compressed Video Sensing with Multi-hypothesis Prediction 517
Abstract 517
1 Introduction 517
2 Compressed Sensing Overview 518
3 The Proposed CVS Scheme Based on MH 519
3.1 The Block Diagram of the Proposed CVS Scheme 519
3.2 Side Information Estimation Based on MH in Measurement Domain 520
3.3 Multi-hypothesis Prediction for Non-key Frame Reconstruction 521
4 Experimental Results 522
5 Conclusions 523
Acknowledgments 524
References 524
Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol 525
Abstract 525
1 Introduction 525
2 Review of Xu et al.’s Protocol 526
2.1 Notations 526
2.2 Protocol Description 527
3 Attacks on Xu et al.’s 3PAKE Protocol 529
4 Improved Scheme 531
5 Security Analysis and Performance Comparison 533
5.1 Security Analysis 533
5.2 Efficiency Analysis 534
6 Conclusion 535
Acknowledgments 535
References 535
A Combined Security Scheme for Network Coding 537
Abstract 537
1 Introduction 537
2 Network Model and Operation 538
2.1 Network Model 538
2.2 Adversary Model 539
3 Our Scheme 539
3.1 Basic Idea 539
3.2 Define Our Scheme 540
3.3 Construction Our Scheme 541
4 Security Analysis 542
5 Comparison with Existing Schemes 543
6 Conclusion 544
Acknowledgements 544
References 544
Gaussian Scale Patch Group Sparse Representation for Image Restoration 546
Abstract 546
1 Introduction 546
2 Sparse Representation Model 547
3 Algorithm Implementation 547
4 Simulation Analysis 548
5 Conclusion 550
Acknowledgments 551
References 551
An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding 552
1 Introduction 552
2 Preliminaries 553
2.1 Linear Network Coding 553
2.2 Identity-Based Signature 554
2.3 Network Coding Signature Scheme 555
2.4 Bilinear Groups and Complexity Assumptions 555
3 Our Construction 556
4 Security Analysis 557
5 Conclusion 558
References 558
A Three-Dimensional Digital Watermarking Technique Based on Integral Image Cryptosystem and Discrete Fresnel Diffraction 560
Abstract 560
1 Introduction 560
2 The Principle of the System 561
3 Experimental Results and Discussions 564
4 Conclusion 566
References 566
Building Real-Time Travel Itineraries Using `off-the-shelf' Data from the Web 569
1 Introduction 569
2 Related Work 570
3 Methodology 572
3.1 System Design 572
3.2 Phase-1: Data Collection 573
3.3 Phase-2: Algorithms for Itinerary Construction 574
4 Results and Conclusion 576
4.1 Results 577
4.2 Conclusion 578
4.3 Limitations 579
References 579
Energy Efficient Integration of Renewable Energy Sources in Smart Grid 581
1 Introduction 581
2 Related Work 582
3 System Model 583
3.1 Appliances Classification 583
3.2 RE Integration Model 585
4 Simulations and Discussion 586
4.1 Electricity Cost Analysis for Different Scheduling Scheme 587
4.2 Trade-Off Analysis of Electricity Cost and User Comfort 588
4.3 PAR Performance Analysis 588
5 Conclusion 589
References 589
Cost and Comfort Based Optimization of Residential Load in Smart Grid 591
1 Introduction 591
2 Related Work 592
3 Problem Statement 594
4 System Model 595
4.1 Energy Management Controller 595
4.2 Residential Consumers 595
4.3 Communication Network 595
5 Simulations and Discussions 597
6 Conclusion 599
References 599
Efficient Utilization of HEM Controller Using Heuristic Optimization Techniques 601
1 Introduction 601
2 Related Work and Motivation 602
3 Proposed System Model 603
4 Results 605
4.1 Clothes Dryer 605
4.2 Dishwasher 607
4.3 Refrigerator 608
5 Conclusion 611
References 611
A Shadow Elimination Algorithm Based on HSV Spatial Feature and Texture Feature 613
Abstract 613
1 Introduction 613
2 Shadow Detection of Traditional HSV Color Space 614
2.1 Background Subtraction Method 614
2.2 Model of the HSV Color Space to Removing Shadow 614
3 The Proposed Shadow Elimination Method 615
3.1 OTSU 615
4 Experimental Results 616
5 Conclusions 618
Acknowledgments 618
References 618
A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment 620
1 Introduction 620
2 Related Work 621
3 Preliminaries 622
3.1 Bilinear Pairings 622
3.2 Security Model 622
4 Proposed Protocol 623
4.1 Initialization Phase 624
4.2 User Authentication and Key Agreement Phase 625
4.3 Correctness of Our Protocol 626
5 Security analysis 626
5.1 Client-to-server Authentication 626
5.2 Key Agreement 627
5.3 Sever-to-client Authentication 627
6 Performance Analysis 628
7 Conclusion 629
References 629
Improved Online/Offline Attribute Based Encryption and More 631
1 Introduction 631
2 Review of HW's Online/Offline ABE Scheme 632
2.1 Our Improved Online/Offline ABE Scheme 633
3 Generalization 635
3.1 CF's Vector Commitments 635
3.2 Our Improved Algorithm 636
4 Conclusion 637
References 637
On the Security of a Cloud Data Storage Auditing Protocol IPAD 639
1 Introduction 639
2 Review of Zhang et al.'s IPAD Scheme 640
3 Our Attack 642
4 Conclusion 644
References 644
LF-LDA: A Topic Model for Multi-label Classification 646
Abstract 646
1 Introduction 646
2 LF-LDA 648
2.1 Review LDA and L-LDA 648
2.2 Our Proposed LF-LDA 651
3 Inference and Parameter Estimation 653
4 Experiments 654
5 Conclusion 655
Acknowledgments 655
References 655
Data Analysis for Infant Formula Nutrients 657
Abstract 657
1 Introduction 657
2 Nutrients Data Analysis 657
2.1 Observations 658
2.2 Design of Dataset 660
3 Experimental Results 660
4 Conclusion 663
Acknowledgments 663
References 664
A Classification Method Based on Improved BIA Model for Operation and Maintenance of Information System in Large Electric Power Enterprise 665
Abstract 665
1 Introduction 665
2 Status Analysis 665
3 The Improved Information System Classification Model 666
3.1 Objective and Principle of the Model 666
3.2 Content of the Model 667
3.3 Application of the Model 670
4 Method for System Classification Service 670
5 Conclusions 671
Acknowledgments 671
References 671
A Model Profile for Pattern-Based Definition and Verification of Composite Cloud Services 673
1 Introduction 673
2 MetaMORP(h)OSy Profile for Cloud Patterns 674
3 Model Transformation 678
4 A Case Study 680
5 Conclusions and Future Works 682
References 683
A Routing Based on Geographical Location Information for Wireless Ad Hoc Networks 685
Abstract 685
1 Introduction 685
2 Forwarding Algorithm of Backup Copy Based on Geographic Location 685
2.1 Forwarding Strategy Based on Geographic Location 686
2.2 Backup Copy Forwarding Strategy 689
2.3 Backup Copy Forwarding Algorithm Based on Geographic Location Information 690
3 Simulation Analysis 691
4 Conclusion 694
References 694
Cyber-Attack Risks Analysis Based on Attack-Defense Trees 695
Abstract 695
1 Introduction 695
2 Related Work 696
3 Modeling with ADTree 696
3.1 Attack-Defense Tree Model 696
3.2 Risk Analysis Framework with ADTree 697
4 Risk Analysis Framework 702
4.1 Framework Construction 702
4.2 Numerical Illustrations 703
5 Conclusion 705
Acknowledgments 705
References 705
Multi-focus Image Fusion Method Based on NSST and IICM 707
Abstract 707
1 Introduction 707
2 Improved Intersecting Cortical Model 708
2.1 Basic ICM 708
2.2 Improved ICM 709
3 Fusion Framework of Multi-focus Images 710
4 Experimental Results and Analysis 711
4.1 Methods Introduction and Parameters Setting 711
4.2 Comparative Experiments of Multi-focus Image Fusion 713
5 Conclusions 715
Acknowledgements 715
References 715
Pilot Contamination Elimination in Massive MIMO Systems 718
Abstract 718
1 Introduction 718
2 System Model 720
3 Intelligent Assignment Pilot Sequence Scheme Based on User Area Location Priority 722
4 Experimental Simulation and Result Analysis 725
5 Conclusion 728
References 728
Improved Leader-Follower Method in Formation Transformation Based on Greedy Algorithm 730
Abstract 730
1 Introduction 730
2 Greedy Algorithm Based on Leader-Follower Method 731
2.1 Formation Maintenance Based on Leader-Follower Algorithm 731
2.2 Greedy Algorithm 733
3 Modeling and Simulation 733
3.1 Formation Control with Greedy Algorithm Based on Conditional Formation Feedback 734
3.2 Collision Prediction 736
3.3 Collision Avoidance 736
4 Simulation Experiment and Result Analysis 737
5 Conclusion 738
Acknowledgments 739
References 739
A Kind of Improved Hidden Native Bayesian Classifier 740
Abstract 740
1 Introduction 740
2 The Naive Bayesian Classification 741
3 The Hidden Naive Bayesian Classifier 742
3.1 Brief Introduction of Hidden Naive Bayes Classifier 742
3.2 Evaluations of the Hidden Naive Bayesian Classifier 744
4 The Implicit Naive Bayes Classifier with Improved Mutual Information 744
4.1 The Basic Ideas 745
4.2 The Algorithm Flow 745
4.3 Test Procedures and Results 746
5 Summary 747
References 748
Study of a Disaster Relief Troop’s Transportation Problem Based on Minimum Cost Maximum Flow 749
Abstract 749
1 Introduction 749
2 Model of Rescue and Relief Troop Dispatching Network 750
3 The Troops Dispatching the Algorithm in Rescue and Relief Work is Based on a Path Priority Limit 752
4 Example Analysis of Troops Dispatching in Rescue and Relief Work 755
5 Conclusion 760
Acknowledgments 760
References 760
A Cascading Diffusion Prediction Model in Micro-blog Based on Multi-dimensional Features 762
Abstract 762
1 Introduction 762
1.1 Forwarding Mechanism 763
1.2 Model of Information Dissemination 763
2 Notations and Problem Statement 764
3 Model Framework 765
3.1 Features Extraction 765
3.1.1 Node Attributes ?U 765
3.1.2 Content Attributes ?C 766
3.1.3 Edge Features ?E 767
3.2 Model Construction 767
3.3 Solution Method 770
4 Experiment and Evaluation 770
4.1 The Experimental Data and Method 770
4.2 Experimentation Results 771
4.2.1 Analysis of Transmission Probability and Transmission Delay 771
4.2.2 Experimentation Results and Conclusion 772
References 773
Multi-target Detection of FMCW Radar Based on Width Filtering 775
Abstract 775
1 Introduction 775
2 Related Work 776
2.1 The Basic Theory of FMCW Radar 776
2.2 Distance and Speed Estimation 778
2.3 Range and Speed Resolution 778
2.4 The Influence of Radar Sampling Points on the Target Spectrum Width 779
3 The Method of Width Filter and Spectrum Association 779
4 Numerical Simulation 781
5 Conclusion 783
References 783
DroidMark: A Lightweight Android Text and Space Watermark Scheme Based on Semantics of XML and DEX 784
1 Introduction 784
2 Related Work 785
3 Proposed Scheme - DroidMark 786
3.1 Design Goals 786
3.2 Notations 787
3.3 Scheme Construction 787
4 Security Analysis and Performance Evaluation 789
4.1 Security Analysis 790
4.2 Performance Analysis 791
5 Conclusions 794
References 794
Research on CSER Rumor Spreading Model in Online Social Network 795
Abstract 795
1 Introduction 795
2 CSER Rumor Spreading Model 796
3 Analysis 798
4 Experimental Simulation 799
4.1 Experimental Environment 799
4.2 Homogeneous Network 799
4.3 Heterogeneous Network 801
5 Conclusions 802
Acknowledgments 802
References 802
Author Index 804

Erscheint lt. Verlag 25.5.2017
Reihe/Serie Lecture Notes on Data Engineering and Communications Technologies
Lecture Notes on Data Engineering and Communications Technologies
Zusatzinfo XXIX, 779 p. 291 illus.
Verlagsort Cham
Sprache englisch
Themenwelt Mathematik / Informatik Informatik
Technik Nachrichtentechnik
Schlagworte Big Data And Cloud Computing • Databases and Data Warehouses • Data Centers and IT Virtualization Technologies • Data Management and Information Retrieval • Data Security • Data Sensing • Data Visualization and Representation Tools • Engineering of Data Sets • Integration and Querying Systems and Interfaces • Repositories and Digital Infrastructures • trust and reputation
ISBN-10 3-319-59463-X / 331959463X
ISBN-13 978-3-319-59463-7 / 9783319594637
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich

von Herbert Voß

eBook Download (2025)
Lehmanns Media (Verlag)
CHF 19,50
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel …

eBook Download (2024)
Carl Hanser Fachbuchverlag
CHF 68,35