Tải bản đầy đủ (.pdf) (496 trang)

Web information sysstems and mining

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (8.97 MB, 496 trang )



Lecture Notes in Computer Science
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board
David Hutchison
Lancaster University, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Alfred Kobsa
University of California, Irvine, CA, USA
Friedemann Mattern
ETH Zurich, Switzerland
John C. Mitchell
Stanford University, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
Oscar Nierstrasz
University of Bern, Switzerland
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Germany
Madhu Sudan


Microsoft Research, Cambridge, MA, USA
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbruecken, Germany

6988



Zhiguo Gong Xiangfeng Luo Junjie Chen
Jingsheng Lei Fu Lee Wang (Eds.)

Web Information Systems
and Mining
International Conference, WISM 2011
Taiyuan, China, September 24-25, 2011
Proceedings, Part II

13


Volume Editors
Zhiguo Gong
University of Macau, Department of Computer and Information Science
Av. Padre Tomás Pereira, Taipa, Macau, China
E-mail:
Xiangfeng Luo

Shanghai University, School of Computer
Shanghai 200444, China
E-mail:
Junjie Chen
Taiyuan University of Technology, School of Computer and Software
Taiyuan 030024, China
E-mail:
Jingsheng Lei
Shanghai University of Electric Power
School of Computer and Information Engineering
Shanghai 200090, China
E-mail:
Fu Lee Wang
Caritas Institute of Higher Education, Department of Business Administration
18 Chui Ling Road, Tseung Kwan O, Hong Kong, China
E-mail:
ISSN 0302-9743
e-ISSN 1611-3349
ISBN 978-3-642-23981-6
e-ISBN 978-3-642-23982-3
DOI 10.1007/978-3-642-23982-3
Springer Heidelberg Dordrecht London New York
Library of Congress Control Number: 2011936228
CR Subject Classification (1998): H.4, H.3, H.2, C.2.4, I.2.6, D.2
LNCS Sublibrary: SL 3 – Information Systems and Application, incl. Internet/Web
and HCI
© Springer-Verlag Berlin Heidelberg 2011
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is
concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,
reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication

or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,
in its current version, and permission for use must always be obtained from Springer. Violations are liable
to prosecution under the German Copyright Law.
The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply,
even in the absence of a specific statement, that such names are exempt from the relevant protective laws
and regulations and therefore free for general use.
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)


Preface

The 2011 International Conference on Web Information Systems and Mining
(WISM 2011) was held during September 24–25, 2011 in Taiyuan, China. WISM
2011 received 472 submissions from 20 countries and regions. After rigorous
reviews, 112 high-quality papers were selected for publication in the WISM 2011
proceedings. The acceptance rate was 23%.
The aim of WISM 2011 was to bring together researchers working in many
different areas of Web information systems and Web mining to foster the exchange of new ideas and promote international collaborations. In addition to
the large number of submitted papers and invited sessions, there were several
internationally well-known keynote speakers.
On behalf of the Organizing Committee, we thank Taiyuan University of
Technology for its sponsorship and logistics support. We also thank the members of the Organizing Committee and the Program Committee for their hard
work. We are very grateful to the keynote speakers, session chairs, reviewers, and
student helpers. Last but not least, we thank all the authors and participants
for their great contributions that made this conference possible.
September 2011

Gong Zhiguo

Xiangfeng Luo
Junjie Chen
Jingsheng Lei
Fu Lee Wang



Organization

Organizing Committee
General Co-chairs
Wendong Zhang
Qing Li

Taiyuan University of Technology, China
City University of Hong Kong, Hong Kong

Program Committee
Co-chairs
Gong Zhiguo
Xiangfeng Luo
Junjie Chen

University of Macau, Macau
Shanghai University, China
Taiyuan University of Technology, China

Steering Committee Chair
Jingsheng Lei


Shanghai University of Electric Power, China

Local Arrangements Co-chairs
Fu Duan
Dengao Li

Taiyuan University of Technology, China
Taiyuan University of Technology, China

Proceedings Co-chairs
Fu Lee Wang
Ting Jin

Caritas Institute of Higher Education,
Hong Kong
Fudan University, China

Sponsorship Chair
Zhiyu Zhou

Zhejiang Sci-Tech University, China


VIII

Organization

Program Committee
Ladjel Bellatreche
Sourav Bhowmick

Stephane Bressan
Erik Buchmann
Jinli Cao
Jian Cao
Badrish Chandramouli
Akmal Chaudhri
Qiming Chen
Lei Chen
Jinjun Chen
Hong Cheng
Reynold Cheng
Bin Cui
Alfredo Cuzzocrea
Wanchun Dou
Xiaoyong Du
Ling Feng
Cheng Fu
Gabriel Fung
Byron Gao
Yunjun Gao
Bin Gao
Anandha Gopalan
Stephane Grumbach
Ming Hua
Ela Hunt
Renato Iannella
Yan Jia
Yu-Kwong Ricky
Yoon Joon Lee
Carson Leung

Lily Li
Tao Li
Wenxin Liang
Chao Liu
Qing Liu
Jie Liu
JianXun Liu

ENSMA - Poitiers University, France
Nanyang Technological University, Singapore
National University of Singapore, Singapore
University of Karlsruhe, Germany
La Trobe University, Australia
Shanghai Jiao Tong University, China
Microsoft Research, USA
City University of London, UK
Hewlett-Packard Laboratories, USA
Hong Kong University of Science and
Technology, China
Swinburne University of Technology, Australia
The Chinese University of Hong Kong, China
Hong Kong Polytechnic University, China
Peking University, China
University of Calabria, Italy
Nanjing University, China
Renmin University of China, China
Tsinghua University, China
Nanyang Technological University, Singapore
The University of Queensland, Australia
University of Wisconsin, USA

Zhejiang University, China
Microsoft Research, China
Imperial College, UK
INRIA, France
Simon Fraser University, Canada
University of Strathclyde, UK
National ICT, Australia
National University of Defence Technology,
China
Colorado State University, USA
KAIST, Korea
The University of Manitoba, Canada
CSIRO, Australia
Florida International University, USA
Dalian University of Technology, China
Microsoft, USA
CSIRO, Australia
Chinese Academy of Sciences, China
Hunan University of Science and Technology,
China


Organization

Peng Liu
Jiaheng Lu
Weiyi Meng
Miyuki Nakano
Wilfred Ng
Junfeng Pan

Zhiyong Peng
Xuan-Hieu Phan
Tieyun Qian
Kaijun Ren
Dou Shen
Peter Stanchev
Xiaoping Su
Jie Tang
Zhaohui Tang
Yicheng Tu
Junhu Wang
Hua Wang
Guoren Wang
Lizhe Wang
Jianshu Weng
Raymond Wong
Jemma Wu
Jitian Xiao
Junyi Xie
Wei Xiong
Hui Xiong
Jun Yan
Xiaochun Yang
Jian Yang
Jian Yin
Qing Zhang
Shichao Zhang
Yanchang Zhao
Sheng Zhong
Aoying Zhou

Xingquan Zhu

IX

PLA University of Science and Technology,
China
University of California, Irvine
Binghamton University, USA
University of Tokyo, Japan
Hong Kong University of Science and
Technology, China
Google, USA
Wuhan University, China
University of New South Wales (UNSW),
Australia
Wuhan University, China
National University of Defense Technology,
China
Microsoft, USA
Kettering University, USA
Chinese Academy of Sciences, China
Tsinghua University, China
Microsoft, USA
University of South Florida, USA
Griffith University, Australia
University of Southern Queensland, Australia
Northeastern University, USA
Research Center Karlsruhe, Germany
Singapore Management University, Singapore
Hong Kong University of Science and

Technology, China
CSIRO, Australia
Edith Cowan University, Australia
Oracle Corp., USA
National University of Defence Technology,
China
Rutgers University, USA
University of Wollongong, Australia
Northeastern University, China
Macquarie University, Australia
Sun Yat-Sen University, China
CSIRO, Australia
University of Technology, Australia
University of Technology, Australia
State University of New York at Buffalo, USA
East China Normal University, China
Florida Atlantic University, USA



Table of Contents – Part II

Management Information Systems
Text Clustering Based on LSA-HGSOM . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jianfeng Wang and Lina Ma

1

Design Pattern Modeling and Implementation Based on MDA . . . . . . . . .
Xuejiao Pang, Kun Ma, and Bo Yang


11

End-to-End Resources Planning Based on Internet of Service . . . . . . . . . .
Baoan Li and Wei Zhang

19

A Comprehensive Reputation Computation Model Based on Fuzzy
Regression Method of Cross-Domain Users . . . . . . . . . . . . . . . . . . . . . . . . . .
Juan Zhou, Gang Hu, and Qinghua Pang
A TV Commercial Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Yijun Li and Suhuai Luo
Research and Implementation of Entropy-Based Model to Evaluation
of the Investment Efficiency of Grid Enterprise . . . . . . . . . . . . . . . . . . . . . .
Kehe Wu, Xiao Tu, and Cheng Duan
Passive Data Storage Based Housewares Store Management System . . . .
Yang Xiao, Guoqi Li, and Juan Zhang

27
35

44
51

Mobile Computing
Multiple Solutions for Resonant Difference Equations . . . . . . . . . . . . . . . . .
Shuli Wang and Jianming Zhang

57


The Application of the GPRS Network on the Design of Real-Time
Monitor System for Water Pollution Resource . . . . . . . . . . . . . . . . . . . . . . .
Shi-he Sun

65

CuttingPlane: An Efficient Algorithm for Three-Dimensional Spatial
Skyline Queries Based on Dynamic Scan Theory . . . . . . . . . . . . . . . . . . . . .
Meng Zhao and Jing Yu

72

Semantic Web and Ontologies
ROS: Run-Time Optimization of SPARQL Queries . . . . . . . . . . . . . . . . . . .
Liuqing Li, Xin Wang, Xiansen Meng, and Zhiyong Feng

79


XII

Table of Contents – Part II

The Research and Implementation of Heterogeneous Data Integration
under Ontology Mapping Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jing Bian, Hai Zhang, and Xinguang Peng

87


Extracting Hyponymy Patterns in Tibetan Language to Enrich
Minority Languages Knowledge Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Lirong Qiu, Yu Weng, Xiaobing Zhao, and Xiaoyu Qiu

95

Web Content Mining
Discovering Atypical Property Values for Object Searches on the
Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tatsuya Fujisaka, Takayuki Yumoto, and Kazutoshi Sumiya

103

An Indent Shape Based Approach for Web Lists Mining . . . . . . . . . . . . . .
Yanxu Zhu, Gang Yin, Huaimin Wang, Dianxi Shi, Xiang Li, and
Lin Yuan

113

Web Text Clustering with Dynamic Themes . . . . . . . . . . . . . . . . . . . . . . . . .
Ping Ju Hung, Ping Yu Hsu, Ming Shien Cheng, and Chih Hao Wen

122

Multi-aspect Blog Sentiment Analysis Based on LDA Topic Model and
Hownet Lexicon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Xianghua Fu, Guo Liu, Yanyan Guo, and Wubiao Guo

131


Redundant Feature Elimination by Using Approximate Markov Blanket
Based on Discriminative Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Xue-Qiang Zeng, Su-Fen Chen, and Hua-Xing Zou

139

Synchronization of Hyperchaotic Rossler System and Hyperchaotic
Lorenz System with Different Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Yi-qiang Wei and Nan Jiang

147

Research of Matrix Clustering Algorithm Based on Web User Access
Pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jian Bao

154

Web Information Classification
Combining Link-Based and Content-Based Classification Method . . . . . .
Kelun Tian

160

Chinese Expert Entity Homepage Recognition Based on Co-EM . . . . . . .
Li Liu, Zhengtao Yu, and Lina Li

169

Semi-supervised K-Means Clustering by Optimizing Initial Cluster

Centers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Xin Wang, Chaofei Wang, and Junyi Shen

178


Table of Contents – Part II

Fuzzy ID3 Algorithm Based on Generating Hartley Measure . . . . . . . . . . .
Fachao Li and Dandan Jiang

XIII

188

A Technique for Improving the Performance of Naive Bayes Text
Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Yuqian Jiang, Huaizhong Lin, Xuesong Wang, and Dongming Lu

196

Mapping Data Classification Based on Modified Fuzzy Statistical
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Yi Cheng, Mingxia Xie, and Jianzhong Guo

204

Web Clustering Using a Two-Layer Approach . . . . . . . . . . . . . . . . . . . . . . .
Yanping Li, Jinsheng Xing, Rui Wu, and Fulan Zheng


211

An Improved KNN Algorithm for Vertical Search Engines . . . . . . . . . . . . .
Yubo Jia, Hongdan Fan, Guanghu Xia, and Xing Dong

219

Web Information Extraction
Concluding Pattern of Web Page Based on String Pattern Matching . . . .
Yiqing Cai, Xinjun Wang, Chunsheng Lu, Zhongmin Yan, and
Zhaohui Peng
A Rapid Method to Extract Multiword Expressions with Statistic
Measures and Linguistic Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Lijuan Wang and Rong Liu
Mining Popular Menu Items of a Restaurant from Web Reviews . . . . . . .
Yeong Hyeon Gu and Seong Joon Yoo
News Information Extraction Based on Adaptive Weighting Using
Unsupervised Bayesian Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Shilin Huang, Xiaolin Zheng, Xiaowei Wang, and Deren Chen

224

234
242

251

Web Intelligence
Infectious Communities Forging: Using Information Diffusion Model in
Social Network Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Tianran Hu and Xuechen Feng

259

Extracting Dimensions for OLAP on Multidimensional Text
Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chao Zhang, Xinjun Wang, and Zhaohui Peng

272

A Conceptual Framework for Efficient Web Crawling in Virtual
Integration Contexts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Inma Hern´
andez, Hassan A. Sleiman, David Ruiz, and
Rafael Corchuelo

282


XIV

Table of Contents – Part II

Web Trace Duplication Detection Based on Context . . . . . . . . . . . . . . . . . .
Chang Gao, Xiaoguang Hong, Zhaohui Peng, and Hongda Chen
A Framework for Incremental Deep Web Crawler Based on URL
Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Zhixiao Zhang, Guoqing Dong, Zhaohui Peng, and Zhongmin Yan

292


302

Query Classification Based on Index Association Rule Expansion . . . . . . .
Xianghua Fu, Dongjian Chen, Xueping Guo, and Chao Wang

311

A Link Analysis Model Based on Online Social Networks . . . . . . . . . . . . . .
Bu Zhan and ZhengYou Xia

319

Research on Information Measurement at Semantic Level . . . . . . . . . . . . .
Kaizhong Jiang, Lu Li, and Bosheng Xu

327

A New Similarity Measure Based Robust Possibilistic C-Means
Clustering Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Kexin Jia, Miao He, and Ting Cheng

335

DOM Semantic Expansion-Based Extraction of Topical Information
from Web pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Junjie Chen, Junyao Jia, and Liguo Duan

343


Web Interfaces and Applications
A Domain Specific Language for Interactive Enterprise Application
Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jingang Zhou, Dazhe Zhao, and Jiren Liu
Scalable Application Description Language to Support IPTV Client
Device Independence Based on MPEG-21 . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tae-Beom Lim, Kyoungro Yoon, Kyung Won Kim, Jae Won Moon,
Yun Ju Lee, and Seok-Pil Lee

351

361

A Study on Using Two-Phase Conditional Random Fields for Query
Interface Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Yongquan Dong, Xiangjun Zhao, and Gongjie Zhang

369

Key Techniques Research on Water Resources Scientific Data Sharing
Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Yufeng Yu, Shijin Li, and Jingjin Jiang

377

ExpertRec: A Collaborative Web Search Engine . . . . . . . . . . . . . . . . . . . . .
Jingyu Sun, Junjie Chen, Xueli Yu, and Ning Zhong

385



Table of Contents – Part II

XV

Web Services and E-Learning
A QoS Evaluation Method for Personalized Service Requests . . . . . . . . . .
Rutao Yang, Qi Chen, Lianyong Qi, and Wanchun Dou

393

Virtual Personalized Learning Environment (VPLE) on the Cloud . . . . . .
Po-Huei Liang and Jiann-Min Yang

403

MTrust-S : A Multi-model Based Prototype System of Trust
Management for Web Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dunlu Peng, Shaojun Yi, Huan Huo, and Jing Lu
Web Application Security Based on Trusted Network Connection . . . . . .
Yongwei Fu and Xinguang Peng

412
420

Model Checking for Asynchronous Web Service Composition Based on
XYZ/ADL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Guangquan Zhang, Huijuan Shi, Mei Rong, and Haojun Di

428


Specification and Verification of Data and Time in Web Service
Composition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Guangquan Zhang, Haojun Di, Mei Rong, and Huijuan Shi

436

Development of LMS/LCMS (Contents Link Module) Real-Time
Interactive in Videos for Maximizing the Effect of Learning . . . . . . . . . . . .
Junghyun Kim, Doohong Hwang, Kangseok Kim,
Changduk Jung, and Wonil Kim

444

XML and Semi-structured Data
Converting XML Schema Data to Object-Relational Data with DOM . . .
Lijun Sang, Jihai Xiao, and Xiaohong Cui

452

XML Query Algorithm Based on Matching Pretreatment
Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Yi Wang, Heming Ye, Haixia Ma, and Weizhao Zhang

461

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

469




Table of Contents – Part I

Applications of Web Information Systems
Research on Electromagnetic Wave Through-The-Earth Wireless
Communication for Coal Mine Disaster . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jinyi Tao

1

The Investigation of WEB Software System Based on Domain-Driven
Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Fei Wang, LiHua Yan, Peng Zhou, Wei Sun, and Yuan Ding

11

MediaCRM: Enabling Customer Relationship Management in the
Broadcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Robbie De Sutter, Mike Matton, Niels Laukens,
Dieter Van Rijsselbergen, and Rik Van de Walle
Jordan Triple Multiplicative Maps on the Symmetric Matrices . . . . . . . . .
Haifeng Zhang and Yuying Li

19

27

International Collaborations in Brain-Computer Interface (BCI)
Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Brahim Hamadicharef

35

A Classification of Cluster Validity Indexes Based on Membership
Degree and Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Nannan Xie, Liang Hu, Nurbol Luktarhan, and Kuo Zhao

43

Several Methods of Calculating the Distribution of Linear Combinations
of Two-Dimensional Random Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Yuying Li and Haifeng Zhang

51

Propagation in LHM Slab Loaded Rectangular Waveguide . . . . . . . . . . . .
Rui-lian Li

59

The Study of Images Emotion Based on fMRI . . . . . . . . . . . . . . . . . . . . . . .
Xiaoyan Qiao, Haifang Li, Jie Xiang, and Hongxia Deng

66

The Communication Protocol Design of Electro-Hydraulic Control
System for Hydraulic Supports at Coal Mine . . . . . . . . . . . . . . . . . . . . . . . .
Jingguo Wen and Zisheng Lian


73

Temperature Characteristics and Compensation Method of Capacitive
Ice Layer Thickness Sensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dou Yinke and Chang Xiaomin

79


XVIII

Table of Contents – Part I

False Alarm Probability of the Digital Channelized Receiver Based
CA-CFAR Detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Miao He, Kexin Jia, and Ting Cheng

86

Strong Solution of Initial-Boundary Value Problem for a Class of
Nonlinear Thermoelastic Couple Beam Equations . . . . . . . . . . . . . . . . . . . .
Cai-xian Wang and Jian-wen Zhang

92

Initial-Boundary Value Problem for Viscoelastic Rectangular Plate
Equation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dongbao Wang and Yinzhu Wang

98


An Invariant Subspace Theorem for Sequentially Subdecomposable
Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mingxue Liu

104

The Genetic Algorithm in the Test Paper Generation . . . . . . . . . . . . . . . . .
Jian-Jun Hu, Yue-Hong Sun, and Qing-Zhen Xu

109

Applications of Web Mining
CDMA Mobile Internet User Behavior Analysis Based on RP
Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Kai Yu, Dazhong He, Yinan Dou, and Zhenming Lei

114

Personalizing Group Recommendation to Social Network Users . . . . . . . .
Leila Esmaeili, Mahdi Nasiri, and Behrouz Minaei-Bidgoli

124

A Novel Frequent Trajectory Mining Method Based on GSP . . . . . . . . . . .
Junhuai Li, Jinqin Wang, Lei Yu, and Jing Zhang

134

Study of a Fuzzy Clustering Algorithm Based on Interval Value . . . . . . . .

HaiZhou Du

141

The Influence of the Fourth-Order Dispersion Coefficient for the
Information Transmission in Fiber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jiang Xingfang and Shao Kai

148

Distributed Systems
A Research of Resource Scheduling Strategy with SLA Restriction for
Cloud Computing Based on Pareto Optimality M×N Production
Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Huixi Li and Hao Li
A Distributed Processing Method for Design Patent Retrieval
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jiang-Zhong Cao, Jian-Wei Zhu, Xian-Wei Wang, and
Qing-Yun Dai

155

166


Table of Contents – Part I

XIX

An Adaptive Distribution Model for Multi-dimensional Data in

Decentralized Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Wei He and Lizhen Cui

175

Research on SOA Business Process Disaster Tolerance Recovery
Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Xinfeng Zhang, Junfeng Sun, and Pengyu Guo

184

Admission Control for WebServices in Enterprise Systems Using Expert
Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Arash Jodeiri Salimi, Ayaz Isazadeh, and Jaber Karimpour

192

An Improved Lookup Algorithm on Over-DHT Paradigm Based P2P
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Youming Fu, Ruimin Hu, Jun Chen, Zhongyuan Wang, and
Gang Tian
Maximizing the Lifetime of Daley-Tolerant Wireless Sensor Networks
Using Fuzzy System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Vahide Rafati Porshokooh, Abolfazl Toroghi Haghighat, and
Farzad Tashtarian

200

208


e-Government and e-Commerce
Structural Equation Modeling for Evaluating the Public Value of
Service Delivery through e-Government: A Case Study from
Sri Lanka . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Kanishka Karunasena, Hepu Deng, and Anuradha Karunasena

216

W-entropy Index: The Impact of the Members on Social Networks . . . . .
Weigang Li, Jianya Zheng, and Daniel LeZhi Li

226

Improving Security of SET Protocol Based on ECC . . . . . . . . . . . . . . . . . .
Lai-Cheng Cao

234

Geographic Information Systems
The Constrained Computing and Application for Intelligent
Generalization of Settlements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Li Wang and Jin Zhang

242

Integrating Landsat TM Imagery and See5 Decision-Tree Software for
Identifying Croplands: A Case Study in Shunyi District, Beijing. . . . . . . .
Jinling Zhao, Dongyan Zhang, Dacheng Wang, and Wenjiang Huang

251



XX

Table of Contents – Part I

Information Security
An Authenticated Key Exchange to Improve the Security of Shi et al.
and Kim et al.’s Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mijin Kim, Changyoung Kwon, and Dongho Won
A Fast and Tolerant Voting Mechanism in Wireless Sensor Networks . . .
Jian-hua Huang and Yong-hong Shi
The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based
on Hierarchical Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jian-hua Huang and Fei-fei Wang
A Network-Flow-Based Method for Embedding Rectification . . . . . . . . . .
Wanqi Li, Heng Wang, and Zhiwei He
An Approach of Authentication Base on Modified Digital Identity
Metasystem in Service-Oriented Architecture . . . . . . . . . . . . . . . . . . . . . . . .
Peng Li, Junhao Wen, Junping Dong, and Fangfang Tang

259
271

283
294

304

Defense against DNS Man-In-The-Middle Spoofing . . . . . . . . . . . . . . . . . . .

Xiaolong Bai, Liang Hu, Zixing Song, Feiyan Chen, and Kuo Zhao

312

Defensive Steganography: A Novel Way against Steganalysis . . . . . . . . . . .
Wanqi Li, Heng Wang, and Zhiwei He

320

A New Privacy-Preserving Scheme DOSPA for SaaS . . . . . . . . . . . . . . . . . .
Lin Li, Qingzhong Li, Yuliang Shi, and Kun Zhang

328

Performance Evaluation of Digital Audio Watermarking Algorithm
under Low Bits Rates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Guilan Yu, Jinglong Zuo, and Delong Cui
An Anti-collusion Trust Model in P2P Networks . . . . . . . . . . . . . . . . . . . . .
Xin Tang, Ruchuan Wang, and Haiping Huang
An Alerts Correlation Technology for Large-Scale Network Intrusion
Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jingbo Yuan and Shunli Ding
Dynamic Authorization of Grid Based on Trust Mechanism . . . . . . . . . . .
Rui-ping Niu, Xiao-fang Mu, and Gao-feng Sun

336
344

352
360


Timestamp Based Authentication Protocol for Smart Card Using
ECC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Kakali Chatterjee, Asok De, and Daya Gupta

368

Data Privacy Preservation during Schema Evolution for Multi-tenancy
Applications in Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Kun Zhang, Qingzhong Li, and Yuliang Shi

376


Table of Contents – Part I

A Simple (v, t, n)-Fairness Secret Sharing Scheme with One Shadow
for Each Participant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Yung-Cheng Lee
An Encrypted Data-Transportation Method for Distributed System . . . .
Hongqian Chen, Yi Chen, Jian Cao, and Yuehong Sun
Study on Grid Access Control Strategy Based on Trust and Security
Grade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Yihe Liu

XXI

384
390


397

Intelligent Networked Systems
Self-adaptive QoS Control Mechanism in Cognitive Networks Based on
Intelligent Service Awareness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chengjie Gu and Shunyi Zhang

402

Robustness Promotion of High Speed Network Content Auditing
Integrated System Based on Machine Learning Method . . . . . . . . . . . . . . .
Jie Yang, Yuanhao Wu, Yinan Dou, and Kun Zhang

411

Diagnosis Method of Combing Feature Extraction Based on
Time-Frequency Analysis and Intelligent Classifier . . . . . . . . . . . . . . . . . . .
Baolu Gao, Junjie Chen, Xiaoyan Xiong, and Shibo Xiong

419

Performance Analysis of Sleep-Mode with Uplink/Downlink Traffics in
IEEE 802.16m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Zhanqiang Huo and Xiaoke Liu

426

LMI Conditions for Stability of Impulsive Stochastic Neural Networks
with Unbounded Time-Varying Delays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Lizi Yin and Dianwu Yang


434

Queuing System M/M/1/T with Priority Dropping Packets Mechanism
Based on Living Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Wei Wen, Yequn Wang, and Henyang Zhang

441

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

447



Text Clustering Based on LSA-HGSOM*
Jianfeng Wang and Lina Ma
Technology College, North China Electric Power University,
071051 Baoding, China


Abstract. Text clustering has been recognized as an important component in
data mining. Self-Organizing Map (SOM) based models have been found to
have certain advantages for clustering sizeable text data. However, current
existing approaches lack in providing an adaptive hierarchical structure within
in a single model. This paper presents a new method of hierarchical text
clustering based on combination of latent semantic analysis (LSA) and
hierarchical GSOM, which is called LSA-HGSOM method. The text clustering
result using traditional methods can not show hierarchical structure. However,
the hierarchical structure is very important in text clustering. The LSA-HGSOM

method can automatically achieve hierarchical text clustering, and establishes
vector space model (VSM) of term weight by using the theory of LSA, then
semantic relation is included in the vector space model. Both theory analysis
and experimental results confirm that LSA-HGSOM method decreases the
number of vector, and enhances the efficiency and precision of text clustering.
Keywords: Text Clustering, Hierarchical GSOM, Latent Semantic Analysis,
Vector Space Model.

1

Introduction

With the popularization and application of Internet network has become an important
part of the people's working and living, and various search engines have been an
indispensable tool to retrieve the necessary resources for the people. However, the
Internet search engine can often find thousands of search results. Even if some useful
information is obtained, it is often mixed with a lot of "noises" to waste the users’
time and money. Therefore, in order to efficiently and economically retrieve the
resource subset relevant to the given search request and with the appropriate number,
the Text clustering is performed and becomes one of important and hot research fields
in data mining[1].
Text clustering is different from Text classification. The latter has them for each
category while Text clustering has no category annotates in advance. The Text
clustering is to divide the Text sets into several clusters according to the Text contents,
*

This research was supported by Young Teachers Research Foundation of North China Electric
Power University No. 200811036.

Z. Gong et al. (Eds.): WISM 2011, Part II, LNCS 6988, pp. 1–10, 2011.

© Springer-Verlag Berlin Heidelberg 2011


×