computer and information sciences ii - springer978-1-4471-2155-8/1 · computer and information...

12
Computer and Information Sciences II

Upload: doandiep

Post on 04-Feb-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

Computer and Information Sciences II

Page 2: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

Erol Gelenbe • Ricardo Lent •

Georgia SakellariEditors

Computer and InformationSciences II

26th International Symposium on Computerand Information Sciences

123

Page 3: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

Erol GelenbeDepartment of Electrical

and Electronics EngineeringImperial CollegeLondonUKe-mail: [email protected]

Ricardo LentImperial CollegeLondonUKe-mail: [email protected]

Georgia SakellariUniversity of East LondonLondonUK

ISBN 978-1-4471-2154-1 e-ISBN 978-1-4471-2155-8DOI 10.1007/978-1-4471-2155-8Springer London Dordrecht Heidelberg New York

British Library Cataloguing in Publication DataA catalogue record for this book is available from the British Library

Library of Congress Control Number: 2011938586

� Springer-Verlag London Limited 2012Apart from any fair dealing for the purposes of research or private study, or criticism or review, aspermitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced,stored or transmitted, in any form or by any means, with the prior permission in writing of thepublishers, or in the case of reprographic reproduction in accordance with the terms of licenses issuedby the Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should besent to the publishers.The use of registered names, trademarks, etc., in this publication does not imply, even in the absence ofa specific statement, that such names are exempt from the relevant laws and regulations and thereforefree for general use.The publisher makes no representation, express or implied, with regard to the accuracy of theinformation contained in this book and cannot accept any legal responsibility or liability for any errorsor omissions that may be made.

Cover design: eStudio Calamar S.L.

Printed on acid-free paper

Springer is part of Springer Science+Business Media (www.springer.com)

Page 4: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

Preface

The 26th Annual International Symposium on Computer and Information Sciencewas held in London at the Royal Society, on 26–28 September 2011.

The symposium included presentations of the papers in these proceedingswhich were selected from some 140 submission through a refereeing processcarried out by both the programme committee members and additional referees. Inaddition there were several other invited papers and special sessions.

Special thanks go to both the programme committee members and to the ref-erees, for the diligent efforts that they have made to select the best of the submittedpapers, and then for their generous help to the authors so that they could improvethe final versions through constructive suggestions and comments.

The topics included in these proceedings cover timely topics such as WebComputing and Search, Data Engineering, Green ICT which aims at saving energyin information processing and communication systems, Wireless Networks,Computer Networks, Discovery Science, Computer Vision and Image Processing,Machine Learning, Agent Based Systems, Security and Safety, Modelling andSimulation, Architecture and Systems, and Algorithms.

As computer science and engineering has matured, we see that the emphasis ofmuch of the research in this conference turns towards the interaction between basicscientific problems and the important areas of application. In a way, this leads to amore exciting proceedings volume with broader appeal both for industry and forthe research community.

Erol GelenbeRicardo Lent

Georgia Sakellari

v

Page 5: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

Contents

Search Computing: Addressing Complex Search on the Web . . . . . . . 1Stefano Ceri and Marco Brambilla

Part I Web Computing and Search

Hypergraph-Theoretic Partitioning Models forParallel Web Crawling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Ata Turk, B. Barla Cambazoglu and Cevdet Aykanat

Web Service Discovery: A Service Oriented, Peer-to-Peer Approachwith Categorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27Mustafa Onur Özorhan and Nihan Kesim Cicekli

Finding High Order Dependencies in Data . . . . . . . . . . . . . . . . . . . . . 35Rosa Meo and Leonardo D’Ambrosi

Heuristic Algorithms for Real-Time Unsplittable DataDissemination Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43Mustafa Müjdat Atanak and Atakan Dogan

Automatic Categorization of Ottoman Literary Textsby Poet and Time Period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51Ethem F. Can, Fazli Can, Pinar Duygulu and Mehmet Kalpakli

An Empirical Study About Search-Based Refactoring UsingAlternative Multiple and Population-Based Search Techniques . . . . . . 59Ekin Koc, Nur Ersoy, Ali Andac, Zelal Seda Camlidere,Ibrahim Cereci and Hurevren Kilic

vii

Page 6: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

Part II Data Engineering

Unsupervised Morphological Analysis Using Tries . . . . . . . . . . . . . . . 69Koray Ak and Olcay Taner Yildiz

A Novel Approach to Morphological Disambiguation for Turkish . . . . 77Onur Görgün and Olcay Taner Yildiz

A Small Footprint Hybrid Statistical and Unit SelectionText-to-Speech Synthesis System for Turkish . . . . . . . . . . . . . . . . . . . 85Ekrem Guner and Cenk Demiroglu

Enhancing Incremental Feature Subset Selectionin High-Dimensional Databases by Adding a Backward Step . . . . . . . 93Pablo Bermejo, Luis de La Ossa, Jose A. Gamez and Jose M. Puerta

Memory Resident Parallel Inverted Index Construction . . . . . . . . . . . 99Tayfun Kucukyilmaz, Ata Turk and Cevdet Aykanat

Dynamic Programming with Ant Colony Optimization Metaheuristicfor Optimization of Distributed Database Queries . . . . . . . . . . . . . . . 107Tansel Dökeroglu and Ahmet Cosar

Part III Green ICT

Energy Cost Model for Frequent Item Set Discoveryin Unstructured P2P Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117Emrah Cem, Ender Demirkaya, Ertem Esiner, Burak Ozaydinand Oznur Ozkasap

Towards a Fairer Energy Consumption in WirelessAd hoc Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125Maurizio D’Arienzo

Energy Efficient Resource Allocation Strategyfor Cloud Data Centres . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133Dang Minh Quan, Robert Basmadjian, Hermann De Meer, Ricardo Lent,Toktam Mahmoodi, Domenico Sannelli, Federico Mezza,Luigi Telesca and Corenten Dupont

A Survey of Recent Work on Energy Harvesting Networks . . . . . . . . 143H. Erkal, F. M. Ozcelik, M. A. Antepli, B. T. Bacinogluand E. Uysal-Biyikoglu

viii Contents

Page 7: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

Distributed Energy-Aware Routing Protocol. . . . . . . . . . . . . . . . . . . . 149Erol Gelenbe and Toktam Mahmoodi

Part IV Wireless Networks

A Distributed Scheme to Detect Wormhole Attacks inMobile Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Oya Simsek and Albert Levi

Cross-Layer Optimization with Two-Group Loadingfor Ad hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165Hadhrami Ab Ghani, Mustafa Gurcan and Zhenfeng He

Algorithms for Sink Mobility in Wireless Sensor Networksto Improve Network Lifetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Metin Koç and Ibrahim Körpeoglu

A Hybrid Interference-Aware Multi-Path Routing Protocolfor Mobile Ad hoc Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179Phu Hung Le and Guy Pujolle

Providing Automated Actions in Wireless Multimedia SensorNetworks via Active Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185Hakan Öztarak, Kemal Akkaya and Adnan Yazici

File Transfer Application For Sharing Femto Access . . . . . . . . . . . . . 191Mariem Krichen, Johanne Cohen and Dominique Barth

Part V Computer Networks

Time Parallel Simulation and hv-Monotonicity . . . . . . . . . . . . . . . . . . 201J. M. Fourneau, I. Kadi and F. Quessette

A Prediction Based Mobility Extension for eHIP Protocol . . . . . . . . . 209Zeynep Gurkas Aydin, A. Halim Zaim, Hakima Chaouchiand Tulin Atmaca

Performance Evaluation of a Multiuser InteractiveNetworking System: A Comparison of Modelling Methods . . . . . . . . . 215Tadeusz Czachórski, Krzysztof Grochla, Adam Jozefiok,Tomasz Nycz and Ferhan Pekergin

Contents ix

Page 8: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

Auction-Based Admission Control for Self-Aware Networks . . . . . . . . 223Georgia Sakellari, Timothy Leung and Erol Gelenbe

Complexity Reduction for Multi-hop Network End-to-EndDelay Minimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231Mustafa Gurcan, Irina Ma, Hadhrami Ab Ghani and Zhenfeng He

Performance Improvement of an Optical Network ProvidingServices Based on Multicast. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Vincent Reinhard, Johanne Cohen, Joanna Tomasik, Dominique Barthand Marc-Antoine Weisser

Part VI Discovery Science

FLIP-CPM: A Parallel Community Detection Method . . . . . . . . . . . . 249Enrico Gregori, Luciano Lenzini, Simone Mainardi and Chiara Orsini

G-Network Modelling Based Abnormal Pathway Detectionin Gene Regulatory Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257Haseong Kim, Rengul Atalay and Erol Gelenbe

DeDALO: A Framework for Distributed Systems DependenciesDiscovery and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265Emiliano Casalicchio, Antonello Paoletti and Salvatore Tucci

A Content-Based Social Network Study of Evliyâ Çelebi’sSeyahatnâme-Bitlis Section . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271Ceyhun Karbeyaz, Ethem F. Can, Fazli Can and Mehmet Kalpakli

On the Parameterised Complexity of Learning Patterns . . . . . . . . . . . 277Frank Stephan, Ryo Yoshinaka and Thomas Zeugmann

Using SVM to Avoid Humans: A Case of a Small AutonomousMobile Robot in an Office . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283Emi Matsumoto, Michèle Sebag and Einoshin Suzuki

Part VII Computer Vision and Image Processing

Palmprint Verification Using SIFT Majority Voting . . . . . . . . . . . . . . 291H. Pasindu Abeysundera and M. Taner Eskil

x Contents

Page 9: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

3D Object Exploration Using Viewpoint and MeshSaliency Entropies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299Ekrem Serin, Candemir Doger and Selim Balcisoy

Boundary Descriptors for Visual Speech Recognition . . . . . . . . . . . . . 307Deepika Gupta, Preety Singh, V. Laxmi and Manoj S. Gaur

Semi-Automatic Adaptation of High-Polygon Wireframe FaceModels Through Inverse Perspective Projection . . . . . . . . . . . . . . . . . 315Kristin S. Benli, Didem Agdogan, Mete Özgüz and M. Taner Eskil

A Fuzzy Metric in GPUs: Fast and Efficient Methodfor the Impulsive Image Noise Removal . . . . . . . . . . . . . . . . . . . . . . . 323María G. Sánchez, Vicente Vidal, Jordi Bataller and Josep Arnal

Improved Secret Image Sharing Method By EncodingShared Values With Authentication Bits . . . . . . . . . . . . . . . . . . . . . . 331Guzin Ulutas, Mustafa Ulutas and Vasif Nabiyev

Part VIII Agent Based Systems

Intelligent Navigation Systems for Building Evacuation . . . . . . . . . . . 339Gokce Gorbil, Avgoustinos Filippoupolitis and Erol Gelenbe

Automatic Population of Scenarios with Augmented Virtuality . . . . . . 347Oscar Ripolles, Jose Simo and Roberto Vivo

Support for Resilient Communications in FutureDisaster Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355V. M. Jones, G. Karagiannis and S. M. Heemstra de Groot

Agent-Based Modeling of a Price Information Trading Business . . . . . 361Saad Ahmad Khan and Ladislau Bölöni

Modeling Lane Preferences in Agent-Based Multi-LaneHighway Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369Yi Luo and Ladislau Bölöni

Chromosome Coding Methods in Genetic Algorithmfor Path Planning of Mobile Robots . . . . . . . . . . . . . . . . . . . . . . . . . . 377Adem Tuncer and Mehmet Yildirim

Contents xi

Page 10: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

Part IX Security and Safety

Client-Based CardSpace-OpenID Interoperation. . . . . . . . . . . . . . . . . 387Haitham S. Al-Sinani and Chris J. Mitchell

An Artificial Immune Classifier Using Pseudo-Ellipsoid Rules . . . . . . . 395Aris Lanaridis and Andreas Stafylopatis

Contextually Learnt Detection of Unusual Motion-Based Behaviourin Crowded Public Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403Ognjen Arandjelovic

Grid Security Loopholes with Proposed Countermeasures . . . . . . . . . 411Nureni Ayofe Azeez, Tiko Iyamu and Isabella M. Venter

Detection of Broken Link Fraud in DSDV Routing. . . . . . . . . . . . . . . 419Rajbir Kaur, Vijay Laxmi and Manoj Singh Gaur

Strategies for Risk Facing in Work Environments . . . . . . . . . . . . . . . 425MariaGrazia Fugini, Claudia Raibulet and Filippo Ramoni

Part X Modelling and Simulation

Numerical Integration Methods for Simulationof Mass-Spring-Damper Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435Mete Özgüz and M. Taner Eskil

Multi-Layered Simulation Architecture: A Practical Approach . . . . . . 439Okan Topçu and Halit Oguztüzün

Variable Threshold Based Cutting Method for VirtualSurgery Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445Ömer Çakir, Fatih Çakir and Oguzhan Çakir

Model Based Approach to the Federation Object ModelIndependence Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451Mehmet Fatih Uluat and Halit Oguztüzün

xii Contents

Page 11: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

Part XI Architecture and Systems

Secondary Bus Performance in Retiring CacheWrite-Backs to Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463John W. O’Farrell, Rakshith Thambehalli Venkateshand Sanjeev Baskiyar

Runtime Verification of Component-Based Embedded Software . . . . . 471Hasan Sözer, Christian Hofmann, Bedir Tekinerdoganand Mehmet Aksit

Model-Based Software Integration for Flexible Designof Cyber-Physical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479K. Ravindran

Generating Preset Distinguishing Sequences Using SAT . . . . . . . . . . . 487Canan Güniçen, Uraz Cengiz Türker, Hasan Ural and Hüsnü Yenigün

A Decision-Making Ontology for Analytical RequirementsElicitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495Fahmi Bargui, Hanene Ben-Abdallah and Jamel Feki

Part XII Maching Learning

Spatio-Temporal Pattern and Trend Extractionon Turkish Meteorological Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505Isil Goler, Pinar Senkul and Adnan Yazici

Contrastive Learning in Random Neural Networksand its Relation to Gradient-Descent Learning . . . . . . . . . . . . . . . . . . 511Alexandre Romariz and Erol Gelenbe

A Genetic Algorithms Based Classifier for Object Classificationin Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519Turgay Yilmaz, Yakup Yildirim and Adnan Yazici

Two Alternate Methods for Information Retrieval fromTurkish Radiology Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527Kerem Hadımlı and Meltem Turhan Yöndem

Scaled On-line Unsupervised Learning Algorithm fora SOM-HMM Hybrid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533Christos Ferles, Georgios Siolas and Andreas Stafylopatis

Contents xiii

Page 12: Computer and Information Sciences II - Springer978-1-4471-2155-8/1 · Computer and Information Sciences II 26th International Symposium on Computer and Information Sciences 123. Erol

Sequential Pattern Knowledge in Multi-Relational Learning . . . . . . . . 539Carlos Abreu Ferreira, João Gama and Vítor Santos Costa

Part XIII Algorithms

Zoom-In/Zoom-Out Algorithms for FCAwith Attribute Granularity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549Radim Belohlavek, Bernard De Baets and Jan Konecny

A Hyper-Heuristic Based on Random Gradient, Greedyand Dominance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557Ender Özcan and Ahmed Kheiri

A Class of Methods Combining L-BFGS and Truncated Newton. . . . . 565Lennart Frimannslund and Trond Steihaug

Adaptation and Fine-Tuning of the Weighted Sum Methodon Personnel Assignment Problem with Hierarchical Orderingand Team Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571Yılmaz Arslanoglu and Ismail Hakki Toroslu

An Option Pricing Model Calibration UsingAlgorithmic Differentiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577Emmanuel M. Tadjouddine and Yi Cao

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583

xiv Contents