Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
2014 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2014) Vegas, Nevada, USA 2 July 2014 30 June Las - #IEEE IEEE ISBN: Catalog Number: CFP1479A-POD 978-1-4799-5605-0 Table of Contents KEYNOTE Novice and Expert, How Are They Programming Differently? Simon Xu VMKit: 1 Improving Design and Performance of Managed Runtime Environments Bertil Folliot ALGORITHMS, Dynamic 3 ARTIFICIAL INTELLIGENCE Artificial Immune System and Milad Dastan Zand, Mohammad its application Kalantari, to File Transfer Scheduling Optimization Shahram Golzari Feature Selection Method Based on Across Centroid for Text 5 Categorization Jieming Yang, Zhiying Liu, Zhaoyang Qu, Jing Wang 11 ALGORITHMS COMMUNICATION SYSTEMS Efficient Structure for LKH Key Tree An Secure Multicast Communications on Sakamoto Naoshi 17 ARTIFICIAL INTELLIGENCE OntoSSN: ScientiFIc Social Network Eya Ben Ahmed, Collaborative Wafa Tebourski, Wahiba Ben Abdessalem Karaa, Fa'iez filtering recommendation algorithm based Mengxing Huang, Longfei Sun, New ONTOlogy Approach on on Gargouri 25 item attributes Wencai Du PCA-Based 3D Face 29 Recognition and Authentication Taher Khadhraoui, Faouzi Benzarti, Hamid Amiri Hierarchical speech recognition system using Tarek Behi, Najet Arous, 35 MFCC feature extraction and Dynamic Spiking Noureddine Ellouze RSOM 41 COMMUNICATION SYSTEMS AND NETWORKS Converting PCAPs into Weka Mineable Data Charles Fowler, Robert J. Hammell II 47 Microcredit Risk Assessment using Crowdsourcing Tofig Hasanov, Motoyuki Ozeki, Natsuki Oka and Social Networks 53 COMPONENT-BASED SOFTWARE ENGINEERING Non-functional Mohammad Properties Aware CharafEddin, Effective Domain Modeling Configuration Selection in Component-based Systems Zoubir Mammeri 59 for Mobile Business AHMS (Adaptive Human Management Systems) Requirements Haeng-Kon Kim Questionnaire Report on Matter Relating Hassan Almari, Clive Boughton 67 to Software Architecture Evaluation 77 CRYPTOGRAPHY AND NETWORK SECURITY Analysis and Acceleration of NTRU Lattice-Based Tianyu Bai, Spencer Davis, Juanjuan Li, Hai Cryptographic System Jiang 83 vii Survey of Attribute Based Encryption Zhi Qiao, Shuwen Liang, Spencer Davis, Hai Jiang Neuro Fuzzy Training of Inteligent Intrusion Detection System Using 89 95 Meharia Biswajit Panja, Olugbenga Ogunyanwo, Priyanka Error Value Driven Fault Analysis Attack Masaya Yoshikawa, 101 Hikaru Goto, Kensaku Asahi DATA MINING AND MACHINE LEARNING A Machine Software Learning Technique of Practitioners from Individually Developed Projects Cuauhtemoc Can Text Predicting the Productivity for Lopez-Martin, Mining Technique Arturo be used 105 Chavoya, Maria Elena Meda-Campana as an Alternative Tool for Qualitative Research in Education? Ill Carl Lee, Chin-I Cheng, Aklilu Zeleke Generation of Reducts Based on Nearest Relation Neighbor 117 Naohiro Ishii, Ippei Torii, Toyoshiro Nakashima, Kazunori Iwata Scalable Bootstrap Clustering for Massive Data Haocheng Wang, Security and Privacy Fuzhen Protocol for Emerging Mohammad Fal Sadikin, Marcel Smart RFID 123 Shi Zhuang, XiangAo, Qing He, Zhongzhi Applications 129 Kyas Bug Report Multiclass Classification Hierarchical Dirichlet Process with Latent Dirichlet Allocation in Comparing 137 Nachat Limsettho, Hideaki Hata, Ken-Ichi Matsumoto New Data Warehouse Design Approach Based Tebourski Wafa, Wahiba Karaa, Henda Using Client-Side Access Partitioning on Principal Component Analysis 143 Ben Ghezela for Data Clustering in Big Data Applications 149 Dapeng Liu, Shaochun Xu, Zengdi Cui IMAGE, SPEECH, Post Processing AND SIGNAL PROCESSING for Dense Stereo Matching by Iterative Local Plane Fitting 155 Hongbo Lu, Haibo Meng, Kun Du, Yuan Sun, Yuanchao Xu, Zhimin INFORMATION ASSURANCE A Theoretical Sidney Analysis Exploration of the Impact of Packet Loss on Network Intrusion Detection 161 C. Smith, Robert J. Hammell II, Travis W. Parker, Lisa M. Marvel of ID-based Proxy Signature Scheme Without Trusted PKG and an Scheme Without Trusted PKG and a Proxy Blind Multi-signature a Proxy Blind Multi-signature Scheme 167 Sha Limin Developing and Building a Quality Management System Based on Stakeholder Behavior into Enterprise Architecture Dominic M. 171 Mezzanotte, Sr, Josh INTERNET TECHNOLOGY AND A Framework for Mobile APPLICATIONS/ WEB-BASED APPLICATIONS eLearning (mLearning) with Analytical Decision Model 177 Jahangir Dewan, Morshed Chowdhury MOBILE/WIRELESS/AD-HOC NETWORKS Jade: An Efficient Energy-aware Computation Offloading System with Heterogeneous Network Interface Bonding for Ad-hoc Networked Mobile Devices Hao Qian, 183 Daniel Andresen viii Energy Balanced Topology Construction Soumya Saha, Lifford McLauchlan An Ensuring the and Integrity Protocol for Wireless Sensor Networks 191 Non-Repudiation of E-Invoices in Conventional Channels with Remitting Commercially Available NFC Devices Shi-Cho Cha, Ynh-Jzer Joung, Yen-Chung Tseng, Shih-Chieh Huang, Guan-Heng Chen, Chih-Teng Tseng. 197 NEURAL NETWORKS GENETIC ALGORITHMS Simplification of Chaotic On Toshinori Deguchi, Neural Network on Incremental Learning Toshiki Takahashi, Naohiro Ishii 203 PARALLEL AND DISTRIBUTED COMPUTING AES-128 ECB Encryption Abdul Jabbar GPUs and Effects of Plaintext Patterns Performance on Anas Almousa, Allam Fatayar, Abdul Rahman Ibrahim, 207 with Low Memory Requirements Yuanchao Xu, Haibo Yasong Zheng, Padding Input Mayez Al-Mouhamed, Siddiqui Optimizing MapReduce Ayaz on ul Hassan Khan Khan, Ayaz Meng, for Shared-Memory Systems Xiaochun Ye, Lingjun Fan, Futao Miao, Free Bank Conflict Resolution for CUDA-Based Matrix ul Hassan Khan, Mayez Al-Mouhamed, Allam Fatayar, Dongrui Fan 213 Transpose Algorithm Anas Almousa, Abdulrahman Baqais, Mohammed Assayony 219 Unbinds Data and Tasks to Kun High Improving the Hadoop Performance Lu, Dong Dai, Xuehai Zhou, Mingming Sun, Changlong Li, Hang Zhuang 225 Performance and Grid Computing with Quality of Service Control Sadiq M. Sait, RaedAl-Shaikh 231 SOFTWARE MANAGEMENT Refinement/Verification of Early Stage Probabilistic Software Project Schedules in the Planning Stage Donghwoon Kwon, Robert J. Hammell 239 SOFTWARE SPECIFICATION ARCHITECTURE A Dialogue-Based Framework for the User Requirements Description Language pLSCs Jinyu Kai, Design Huaikou Miao, Patterns Honghao Concerns in the 245 Three-Stage Events Gao 251 for Networked First Person Development Chia-Chu Legacy Application for Probabilistic Branches and Applied Junfeng Qu, Yong Wei, Yinglei Song Software of a Roberto Paiano, Andrea Pandurino Angelo Martella, A Experience Reengineering Shooting Game Programming 257 Building of Service-Oriented Based Enterprise Systems Chiang 263 Strategy-Guided Requirements Development Xiaofeng Cui, Richard and Validation 269 Paige SOFTWARE TESTING VISUAL AND MULTIMEDIA COMPUTING Test Image Generation Tahir Jameel, Lin using Segmental Symbolic Mengxiang, Evaluation for Unit Testing Li He, Hou Xiaomei 275 SPECIAL SESSION 1: ANALYSIS, EVALUATION, AND USAGE OF WEB BEHAVIORS, INFORMATION, SYSTEM AND HUMAN ACTIONS Consideration of Cross-validation in Estimating Objective Scores of Answer Statements Posted Yokoyama Yuya, Hochin Teruhisa, Nomiya Hiroki at QA Sites 281 ix Considerations on Pauses and Fundamental Movements for Teruhisa Hochin, Hiroki The Analysis Method Transmitting Traditional Skills 287 Nomiya Focusing on Peaks of Darkness for the Impression Evaluation Method by Space 293 Shunsuke Akai, Teruhisa Hochin, Hiroki Nomiya SPECIAL SESSION 2: DATA MINING FOR INFO-COMMUNICATION NETWORKS AND SERVICE DIFFUSION An Efficient Structure for LKH Key Tree Secure Multicast Communications on 299 Naoshi Sakamoto An Improvement of Micro Area Selection Technique for the Diffusion of ICT Infrastructure Motoi Iwashita, Risk Assessment Shigeaki Quantification 307 Takeshi Kurosawa, Ken Nishimatsu Akiya Inoue, in Life Log Service Tanimoto, Ken Takahashi, Taro Yabuki, Kazuhiko Kato, Motoi Iwashita, Hiroyuki Sato, 313 Atsushi Kanai SPECIAL SESSION 3: EXPERIENCES OF SOFTWARE ENGINEERING A proposal of Cloud-based Home Network System for Multi-Vendor Services Satoshi Takatori, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura A Rule-Based Framework for Managing Context-Aware Services Based on 319 Heterogeneous and Distributed Web Services Hiroki Takatsuka, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura An Obfuscation Method to Build a Fake Call Flow Graph by Hooking 325 Method Calls 331 Kazumasa Fukuda, Haruaki Tamada Brain Activity Measurement during Program Comprehension with NIRS 337 Ikutani Yoshiharu, Uwano Hidetake Designing Service Framework for Virtual and Implementing Hiroyasu Horiuchi, Sachio Saiki, Shinsuke Pitfalls of Analyzing a Agents in Home Network System Matsumoto, Masahide Nakamura Cross-company Dataset of Software Maintenance and 343 Support 349 Masateru Tsunoda, Kenichi Toward A Dynamic Analysis Technique to Locate Framework Misuses That Cause Unexpected Side Effects 355 Naoya Nitta, Etsuya Shibayama Stories in Agile Software Development Izuru Kume, Masahide Nakamura, Using Goal Net to Model User Jun Lin, Han Yu, Zhiqi Shen, Chunyan 361 Miao SPECIAL SESSION 4: THEORY AND PRACTICE OF INTELLECTUAL SOFTWARE A Data Structure for Triangular Dissection of Multi-Resolution Images 367 Taiyou Kikuchi, Koichi Anada, Shinji Koka, Youzou Miyadera, Takeo Yaku A Source Code Plagiarism Detecting Method Using Alignment with Abstract Syntax Tree Elements Kikuchi Hiroshi, Goto Takaaki, Wakatsuki Mitsuo, Nishino Tetsuro An Application of 3D Spiral Chieko Kato, Futoshi Zhuang Heliang, Multisensory Images Evoked Kazuyoshi Ichihashi, Software by Olfactory 375 Uchida-Kraepelin Psychodiagnostic Sugimoto, Test Kensei Tsuchida 381 Stimuli Hideki Ichihashi Ontology Design Mahfuzus Visualization to the to 387 Support Organized Open Source Software Development Salam Khan, Anwarus Salam Khan, Takaaki Goto, Tetsuro Nishino, Narayan Debnath 393 SPECIAL SESSION 5: SIGNAL PROCESSING FOR SOCIAL WELFARE Applications Shenglin of Ultrasonic Sensors and Obrid-Sensor in Mu, Shota Nakashima, Kanya Safety Tanaka Confirmation System for Elders 399 x Detection Type Obrid-Sensor Shenglin Mu, Tatsuya Ichikawa, Range Fitting Shota Nakashima, of Slit Hiromasa Tomimoto, Shintaro Okabe, Kanya Tanaka, Yuhki Kitazono, Seiichi Serikawa Development of Input Assistance Naruki Shirahama, Yuki Development 405 Application Sakuragi, for Mobile Devices for Satoshi Watanabe, of Leaving-bed Detection System Physically Naofumi Nakaya, to Prevent Midnight Disabled Yukio Mori, Kazunori 411 Miyamoto... Prowl Yuhki Takahashi, Yuhki Kitazono, Shota Nakashima One Dimensional Hand Shape Instruction of Eye-gaze Application to a Learning System Takashi Kuremoto, Takuhiro Otani, Masanao Proposal 417 SOM with Asymmetric Neighborhood Function and its Ring Type Growing Method for Recognize Obayashi, Input Kunikazu Kobayashi, Shingo Interface without Infra-red Mabu 423 Ray Equipment Kazuki Fukushima, Naruki Shirahama 429 SPECIAL SESSION 6: SOFTWARE TESTING 1 An Efficient Reduction Approach to Test Suite 435 Pan Liu Dynamic Test Case Prioritization based on Multi-objective 441 Xiaolin Wang, Hongwei Zeng Modeling Web Application Xinxin Li, VM scheduling strategies Compatibility Testing based 447 on artificial intelligence in Cloud Testing Shidong Huang, Zhihong Wang Bat Algorithm for Optimization in Radiation Therapy Yang Zheng, A Self-tuned for Cross-browser Hongwei Zeng 453 Lizhi Cai, Treatment Planning 461 Georgios Kalantzis, Yu Lei Big Data in Memory: Benchimarking In Memory Database Using the Distributed Key-Value Store for Machine to Machine Communication Michiaki Iwazume, Takahiro Iwase, Kouji Tanaka, Hideaki Fujii, Makoto Hijiya, Hiroshi Haraguchi 467 474 Author Index xi