2012 Ninth International
Conference on Information
Technology: New Generations
\
(ITNG 2012)
Las Vegas, Nevada, USA
16-18 April 2012
4 IEEE IEEE Catalog Number: CFP1232A-PRT
ISBN: 978-1-4673-0798-7
2012 Ninth International Conference on Information
Technology - New Generations
ITNG 2012
Table of Contents
Message from the General Chair xix
Conference Organizers xx
Reviewers xxi
Session: AI Applications
A Multi-Layer Approach for Failure Detection in a Manufacturing SystemBased on Automation Agents 1
WilfriedLepuschitz, Vaclav Jirkovsky, Petr Kadera, and Pavel Vrba
A Novel Violent Videos Classification Scheme Based on the Bag of Audio
Words Features 7
LeiLi
Session: Image and Audio Processing Applications
Region of Interest Localization of Cardiac Structure from Cine MRI Images 14
Marwa M.A. Hadhoud, Mohamed I. Eladawy, and Ahmed Farag
A Context Space Model for Detecting Anomalous Behaviour in Video
Surveillance 18
Arnold Wiliem, Vamsi Madasu, Wageeh Boles, and Prasad Yarlagadda
Image Recovery by Recursive Spline Smoothing and Application
to Recognition of Compound Structures 25
Alexandre Grebennikov
Wavelet Based Region Duplication Forgery Detection 30
Yang Wang, Kaitlyn Giirule, Jacqueline Wise, and Jim Zheng
Rank Level Integration of Face Based Biometrics 36
Amioy Kumar, Madasu Hanmandlu, and Shantaram Vasikarla
Probability-based Imputation Method for Fuzzy Cluster Analysis of Gene
Expression Microarray Data 42
Thanh Le, Tom Altman, andKatheleen J. Gardiner
v
Session: Networking and Wireless Communications
Castalia Network Animator (CNA): A Visualization Tool for Castalia Wireless
Sensor Network Simulator 48
Adib Rastegarnia and Vahid Solonk
An Efficient Geo-aware Peer-to-Peer Resource Discovery and Sharing Scheme
in Vehicular Ad-hoc Networks 54
Yu-HongLee, Chyi-Ren Dow, Lii-Hni Huang, Ya-Chen Lin, Shiow-Fen Hwang,and Wei-Bin Lee
A UnicastMANET Routing Protocol to Simultaneously Minimize
the Stability-Hop Count Tradeoff and End-to-End Delay 60
Natarajan Meghanathan
MASID: Multi-Agent System for Intrusion Detection in MANET 65
Leila Mechtri, Fatiha Djemili Tolba, and Salim Ghanemi
Determining Coverage Area Using Voronoi Diagram Based on Local
Information for Wireless Mesh Networks 71
Go Hasegawa, Shoichi Takemori, Yoshiaki Taniguchi, andHirotaka Nakano
Spectrum Detection in Cognitive Networks by Minimizing Hidden Terminal
Problem 77
Yenumirfa B. Reddy
Finding Time and Buffer Preserving Routes in Gaussian Intermittent Networks 83
Omar Y. Tahboub and JavedI. Khan
An Open-Source Sandbox for Increasing the Accessibility of Functional
Programming to the Bioinformatics and Scientific Communities 89
Matthew Fenwick, Colbert Sesanker, Martin R, Schiller, Heidi JCEllis,
M. Lee Hinman, Jay Vyas, and MichaelR. Gryk
Planarization of Geographic Cluster-based Overlay Graphs in Realistic
Wireless Networks 95
Emi Mathews
Towards Transparent Anonymity for User-controlled Servers SupportingCollaborative Scenarios 102
Mohamed Bourimi, Marcel Henpel, Benedikt Westermann, Dogan Kesdogan,Marc Planagwna, Rafael Gimenez, Fatih Karatas, andPhilipp Schwarte
Recognising the Activities of Low Entropy Mobile People Using Wireless
Proximity Data 109
MuhammadAwais Azam, Jonathan Loo, Aboubaker Lasebae,
Sardar KashifAshrafKhan, and Waleed Ejaz
vi
A Large Scale Evolutionary Analysis of the Internet Autonomous System
Network 115
Craig Stewart and Javed I. Khan
Session: Information Systems and Internet Technology
An Efficient Approach for Finding Near Duplicate Web Pages Using
Minimum Weight Overlapping Method 121
Shine N. Das, Midhun Mathew, andPramodK. Vijayaraghavan
Novel Cloud Service for Improving World Universities Ranking 127
Shu-Ming Hsieh, Suu-An Lo, Chiun-Chieh Hsu, and Wei-Chao Lin
Tree-based Search Algorithm for Web Service Composition in SaaS 132
Ching-Seh Wu andIbrahim Khoury
Aspect Algebra: The Operational Semantics for Aspect Oriented Software 139
Anirban Sarkar and Narayan C. Debnath
Semantic Web: A Topic Specific Search 145
Kishan Dharavath and Sri Khetwat Saritha
MEBPCM: A Method for Evaluating Business Process Conceptual Models. A
Study Case 149
Narayan Debnath, Carlos Salgado, Mario Peralta, Mario Beron, Daniel Riesco,
and German Montejano
A Mobile Data Analysis Framework for Environmental Health Decision
Support 155
Wan D. Bae, Shayma Alkobaisi, Sada Narayanappa, and Cheng C. Liu
A Design ofMutual Exclusion Protocol in Cellular Wireless Networks 162
Sung-Hoon Park and Seoun-Hyung Lee
Using Two-tier Bitwise Interest Oriented QRP Data Structure for High
Clustering through Interest Similarity in SWB P2P Systems 168
Tong-Ming Lim, YongLiang Choong, andAngela Lee Siew Hoong
The Use of Knowledge Management Systems to Support Knowledge Creation
and Sharing Activities among Employees -A Survey Based Study of IT
Shared Services Company 175
Angela Lee Siew Hoong and Tong-Ming Lim
A Constraint-Driven Business Object Model for Service-Based Business
Processes 182
Farhana H. Zulkernine, Piergiorgio Bertoli, Marco Pistore, Andreas Friesen,
Jens Lemcke, Bernhard Thimmel, and Otfried Von Geisau
vii
Automated Security Analysis ofDynamic Web Applications
through Symbolic Code Execution 189
Giovanni Agosta, Ahssandro Barenghi, Antonio Parata, and Gerardo Pelosi
New Hashing-Based Multiple String Pattern Matching Algorithms 195
Chouvalit Khancome and Veera Boonjing
Searching for the Optimal Proof Schedule in a Proof-Carrying Survivability
Paradigm - A Dynamic, Interactive Approach 201
Yanjun Zuo and John Babin
Session: Energy-Efficient Systems
An Empirical Study on the Impact of an Idle Limit in Distributed Systems 209
Karl Smith, Jeffrey Galloway, and Susan Vrbsky
HyBuM: Hybrid Energy Efficient Architecture for Mobile Storage Systems 214
Mais Nijim, YoungLee, andKiranmai Bellam
Piezoelectric Converter for Wind Energy Harvesting 221
Taufik Taufik, Jameson Thornton, and Dale Dolan
Harmonics and Dynamic Response of a Virtual Air Gap Variable Reactor 225
Dale S.L. Dolan, P. W. Lehn, and Taufik Taufik
An Empirical Study of Power Aware Load Balancing in Local Cloud
Architectures 232
Jeffrey Galloway, Karl Smith, andJeffrey Carver
Session: Software Testing
API Backward Compatibility Testing Using VSTS 237
James Gagnon, Corey Weathers, Marty Wiedmeyer, Phani Koppineedi,
Raghavender Anegouni, Steve Schon, andXinBai
Using Test Cases to Size Systems: A Case Study 242
Adam Schwartz
Using Reverse-Engineered Test-Based Models to Generate More Tests: Where
is the Sense in That? 247
Teemu Kanstren, Eric Piel, andHans-Gerhard Gross
A Hybrid System for Analyzing Very Large Graphs 253
James D. McCaffrey
Software Testing with Budget Constraints 258
Soumen Maity
A Comparative Evaluation of Unit Testing Techniques on a Mobile Platform 263
Selin Benli, Anthony Habash, Andy Herrmann, Tyler Loftis, and Devon Simmonds
viii
Applying Test-First and Parallel Processing Techniques to ERP Data
Conversion 269
Talukdar S. Asgar, Mohammed Akour, and Tariq M. King
Session: Software Engineering
The Application of the Component-based Product Line in the Data ProcessingDomain 275
Xinyu Zhang and Rui Wang
Generator Flow: An XML Configurable Design Pattern Used in NoGAP 281
Per Karlstrom and Wenbiao Zhou
Protecting Intellectual Property by Certified Component Quality Descriptions 287
Henning Groenda
Loan System in Brazilian Financial Institution - A SOA Application 293
Claudio Gongalves Bernardo
System Development for Violence Mapping in a Social Network in Real Time 299
Claudio Goncalves Bernardo, William Bragagnollo Montini, Fernanda Naomi Yamato,
Gerson Pereira Domingues, and Felipe D 'Oliveira
An MDA-Based Approach for WS Composition Using UML Scenarios 306
Ayoub Sabraoui, Abdeslam Ennouaaiy, Ismail Khriss, and Mohammed El Kontbi
Challenges Faced While Simultaneously Implementing CMMI and Scrum: A
Case Study in the Tax Preparation Software Industry 314
James R. Miller andHisham M. Haddad
Incorporation of Aspects of Systems Security and Software Security in Senior
Capstone Projects 319
Natarajan Meghanathan, Hyunju Kim, and Loretta A. Moore
Developing a Smart Grids System as a PBL with Agile Method on Computer
Engineering Courses 325
Caio Henrique Coutinho, Johnny Cardoso Marques,
Sarasuaty Megume Hayashi Yelisetty, Samoel Mirachi,
Alexandre Lima Possebon Ribeiro, Marcelo Amaral da Silva,
Adilson Marques da Cunha, andLuiz Alberto Vieira Dias
Developing Rapidly Expandable Data-driven Software Systems Based
on Multitier Architecture: Examination of the Development of Modules
for Content Management Systems Used to Construct Web Portals and Virtual
Communities 331
Jumie Yuventi and Jose Cortes
ix
Strategic Analysis Towards Deriving Competitive Advantage with the Use
ofFOSS: The Case of a South African University 335
Kehinde Dehinbo, Pieter Pretorins, and Johnson Dehinbo
Facilitating Agile Software Development with Lean Architecture in the DCI
Paradigm 343
Tomohiro Hayata, Jianchao Han, and Mohsen Beheshti
A Tool for Teaching Risk 349
Santosh Rajendran, Kevin Gary, and Harry Koehnemann
Session: Information Security and Privacy
Perceived Privacy 355
Sabah Al-Fedaghi
Data Outsourcing in Cloud Environments: A Privacy Preserving Approach 361
TJ.V.R.K.M.K. Sayi, R.K.N. SaiKrishna, R. Mukkamala, andP.K. Bamah
Connect with Your Friends and Share Private Information Safely 367
Arijit Ukil
Location Privacy for Vehicle-to-Grid Interaction through Battery Management 373
Mark Stegelmann and Dogan Kesdogan
CIDS: A Framework for Intrusion Detection in Cloud Systems 379
Hisham A. Kholidy and Fabrizio Baiardi
Security Analysis Concerning the Random Numbers of Threshold Ring
Signatures 386
Kaibin Huang and Raylin Tso
Data Hiding Techniques in Steganography Using Fibonacci and Catalan
Numbers 392
Nikolaos Aroukatos, Kostas Manes, Stelios Zimeras, andFotis Georgiakodis
CIDD: A Cloud Intrusion Detection Dataset for Cloud Computingand Masquerade Attacks 397
Hisham A. Kholidy andFabrizio Baiardi
When the Software Goes Beyond its Requirements - A Software Security
Perspective 403
Jing-Chioa Lion
Design and Implementation of an Open Network and Host-Based Intrusion
Detection Testbed with an Emphasis on Accuracy and Repeatability 409
Robert F. Erbacher and Michael J. Shevenell
Distributed Sensor Objects for Intrusion Detection Systems 417
Robert F. Erbacher and Steve Hutchinson
x
A Reversible Secret Sharing Scheme Based on GF(2A8) 425
Dong-Hyun Kim, Gil-Je Lee, Min-Ho Park, and Kee-Yoimg Yoo
Session: Model-based Software Development
Using Model-Based Development as Software Low-Level Requirements
to Achieve Airborne Software Certification 431
Johnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty,
Luiz Alberto Vieira Bias, and Adilson Marques da Cunha
Modeling Security Aspects in Distributed Real-Time Component-BasedEmbedded Systems 437
Mehrdad Saadatmand and Thomas Leveque
A Computational Teaching Approach through the Use of a Narrative
Technique and a Comic Strip 445
Mario Masayuki Takeda, Francisco Supino Marcondes, Italo Santiago Vega,
Elizabete B.M, Gara, and Luciano Gaspar
A Formal Control Model for Risks Management within Software Projects 452
Felipe Rafael Motta Cardoso, Paulo Marcelo Tasinaffo, Denis Avila Montini,
Danilo Douradinho Fernandes, Adilson Marques da Cunha, and Luiz Alberto Vieira Dias
Multilevel Graph Partitioning Scheme to Solve Traveling Salesman Problem 458
AtifAli Khan, Muhammad Umair Khan, andMuneeb Iqbal
Implementation of a Wavelength Division Multiplexing and Bidirectional
Optic Fiber Link iLab 464
Doreen Orishaba, RaymondBesiga, Arthur T.A., Sandy S.T. Togboa, Paul I. Musasizi,
and Cosmas Mwikirize
Session: Circuits & Systems
Behavior Modeling of Programmable Metallization Cell Using Verilog-A 466
Darshan Anandappa Dimplu andFei Wang
A Novel SAR Fast-Locking Digital PLL: SPICE Modeling and Simulations 472
Mahmoud Fawzy Wagdy and Robin Sur
Design and Simulation of Multiple-Input Single-Output DC-DC Converter 478
Taufik Taufik, Taffy Wong, Owen Jong, and Dale Dolan
xi
Session: High Performance Computing Architectures
Design of a FPGA-based Timing Sharing Architecture for Sound Rendering
Applications484
Tan Yiyu, Yasushi Inoguchi, Yukinori Sato, Makoto Otani, Yukio Iwaya,
Hiroshi Matsiwka, and Takao Tsuchiya
A High Performance Agent-Based System for Reporting Suspected Adverse
Drug Reactions 490
Yanqing Ji, Fangyang Shen, and John Tran
Performance-Sensitivity-based Workload Tailoring for Effective Design
Exploration 496
Jie Luo, Yilin Zhang, Saarvaani Vadlamani, and Byeong Kil Lee
iBATD: ANew Routing Metric for Multi-radio Wireless Mesh Networks 502
Bing Qi, Fangyang Shen, and SyedRaza
A Performance Based QoS Aware Resource Brokering Framework for
the Grid 508
B. Asvija, K. Kalaiselvan, M. Ateet, R. Sridharan, andS.R. Krishnamurthy
A Hardware-Software Integrated Design for a High-Performance Java
Processor 516
Anthony S. Fong, C.H. Yau, and Yijim Liu
An IT-based System to Facilitate Architectural Design 522
Kamyar Ardekani andAmirreza Ardekani
Virtual Machine and Bytecode for Optimization on Heterogeneous Systems 528
Kerry A. SeitzJr. andMark C. Lewis
Loopback Virtual Channel Router Architecture for Network on Chip 534
Jaya Suseela and Venkatesan Muthukiimar
Session: Data Mining
Simulating Online Consumer Satisfaction Using Fuzzy Cognitive Mapping 540
Fahimeh Tabatabayi, BabakAkhgar, S.M.R. Nasserzadeh, and Simeon Yates
XML Querying Using Data Logic Structures and Primitives 548
Jesus Ubaldo Quevedo-Torrero and Geno Erickson
Watermarking XML Structures Using Multi-valued Dependencies 554
Jesus Ubaldo Quevedo-Torrero and Geno Erickson
Predicting Future Climate Using Algae Sedimentation 560
Jasdeep Natt, Ray Hashemi, Azita Bahrami, Mahmood Bahar, Nicholas Tyler,
and Jay Hodgson
xii
A Secure Software Architecture for Mobile Computing 566
Hassan Reza andNarayana Mazumder
Context-Based Testing of COTs Using Petri Nets 572
Hassan Reza and Liang Cheng
Brain Imaging for Diagnosis of Schizophrenia: Challenges, Successes and
a Research Road Map 578
Jack O. Shelton andHamid R. Arabnia
Successful Forecasting for Knowledge Discovery by Statistical Methods 584
Yas Alsitltanny
The Building of a Large Government Digital Library 589
Kazem Taghva
Session: Computer Information Technology Education
Student Perceptions of Learning Management Systems in a University
Environment: Yahoo Groups vs Blackboard 594
Samir N. Hamade
A Comprehensive Undergraduate Application Security Project 600
Prem Uppuhiri andJeffPittges
Useful Compiler Directives for Teaching Programming 608
John T. Minor andLaxmi P. Gewali
The Design and Implementation of an Antivirus Software Advising System 612
Eugene Chamorro, Jianchao Han, and Mohsen Beheshti
Session: Data Hiding
Data Hiding Method Based on Dyadic Wavelet Transformation Improving
Invisibility of Secret Images on Circulation Images by Means of Run-Length
Coding with Permutation Matrix Based on Random Number 618
Kohei Arai
A Non-blind Digital Image Watermarking Method Based on the Dual-tree
Complex Discrete Wavelet Transform and Interval Arithmetic 623
Teruya Minamoto and Ryuji Ohura
A New Variable-Band Filter Design Method for the Discrete Wavelet
Transform 629
Zhong Zhang, Hiroshi Toda, Takashi Imamura, and Tetsuo Miyake
Efficient Securing of Iris Image Template by Using Grayscale Level
Incremented/Decremented Method 635
Maqsood Mahmud, Mohammad Waqar, Abdulrahman Abdulkarim Mirza,
andAbdul Hanan Bin Abdullah
xiii
Visualization of Digital Audio Watermarking Based on the Dyadic Wavelet
Transform 640
Teruya Minamoto, Yitji Ogata, and Masahiro Sawai
Session: Human-Computer Interaction
Human Body Parts Tracking Using Torso Tracking: Applications to Activity
Recognition 646
Aras Dargazany andMircea Nicolescu
Who-Works-With-Whom (WWWW): Web-based Directed Work Relationship
Network for Maximizing Organizational Efficiency in Enterprises 652
Xinyit Zhang, Xiangyu Zhang, andLn Ynhao
Gait Recognition Method Based on Wavelet Transformation and its Evaluation
with Chinese Academy of Sciences (CASIA) Gait Database as a Human Gait
Recognition Dataset 656
Kohei Aral and Rosa Andrie
Usability Heuristics for Touchscreen-based Mobile Devices 662
Rodolfo Inostroza, Cristian Rush, Silvana Roncagliolo, Cristhy Jimenez,
and Virginica Rush
Extraction of Local Features for Tri-Phone Based Bangla ASR 668
MohammedRokibid Alam Kotwal, Tasneem Halim, Md. Mehedi Hassan Almaji,
Imtiaz Hossain, andMohammad Nurul Hilda
An Active Cinema Experience: A Study on User Expectation and Perceived
Gratifications of a Real-time Animated Film System 674
Yun-Ke Chang, Mark Chavez, MiguelA, Morales-Arroyo, and Jaime Jimenez
Wireless Sensors Network in the Efficient Management of Greenhouse Crops 680
Alejandro Jimenez, Santiago Jimenez, Pablo Lozada, and Cristhy Jimenez
Development of Dynamic Vocalization Customer Service Software
for Multiple Languages for Telephone Environment 686
S, Kami Makki and Charles Williams
Defining Virtual Worlds Usability Heuristics 690
Roberto Muhoz and Virginia Chalegre
Developing a Touchscreen-based Domotic Tool for Users with Motor
Disabilities 696
Juan Pablo Cofre, Gabriel Moraga, Cristian Rush, Ivan Mercado, Rodolfo Inostroza,
and Cristhy Jimenez
xiv
Session: Social Computing
Health Intelligence Model for Evaluation of Social Media Outcomes 702
Joseph M. Woodside
User-centric Trust-based Recommendation 707
Simon Meyffret, Lionel Medini, and Frederique Laforest
Do Videowikis on the Web Support Better (Constructivist) Learning in
the Basics of Information Systems Science? 714
Pekka Makkonen
A Survey and Typology of Human Computation Games 720
Ei Pa Pa Pe-Than, Dion Hoe-Lian Goh, and Chei Sian Lee
Sharing in Social News Websites: Examining the Influence of News Attributes
and News Sharers 726
Long Ma, Chei Sian Lee, and Dion Hoe-Lian Goh
Performance Evaluation of a Countering Method to Social BookmarkingPollution Based on Degree of Bookmark Similarity 732
Hiroyuki Hisamatsu and Takahiro Hatanaka
Scalable Link Prediction in Social Networks Based on Local GraphCharacteristics 738
Alexis Papadimitriou, Panagiotis Symeonidis, and Yannis Manoloponlos
Cultural Impact on e-service Use in Saudi Arabia: Results from Focus Groups 744
MajidAldraehim, Sylvia L. Edwards, and Jason Watson
Development and Implementation of a Chat Bot in a Social Network 751
Salto Martinez Rodrigo and Jacques Garcia Fausto Abraham
An Empirical Study on Forecasting Using Decomposed Arrival Data of
an Enterprise Computing System 756
Linh Bao Ngo, Amy Apon, and Doug Hoffman
Session: Potpourri
An Investigation Into Feature Selection for Oncological Survival Prediction 764
Dmitry Stninkin, Brian Mac Namee, and John D, Kelleher
Quantum Blind Computation with Teleportation-based Computation 769
Nai-Hui Chia, Chia-Himg Chien, Wei-Ho Chung, and Sy-Yen Kno
Semantic Information Modeling for Emerging Applications in Smart Grid 775
Qanzhi Zhou, Sreedhar Natarajan, Yogesh Simmhan, and Viktor Prasanna
An Architecture for Mining and Visualization of U.S. Higher Educational Data 783
Linh Ngo, Vijay Dantuhiri, Michael Stealey, Stan Ahalt, andAmy Apon
xv
Business Escalation Management: A Case Study - Resolution of a Business
Relationship Deterrent 790
K.S. Pradeep Kumar andRose Neena Tom
Fostering the User Interface Acceptance in Customer Relationship
Management: A Multimedia-aided Approach 796
Mutlaq B. Alotaibi and Dimitrios I. Rigas
Selection of Suitable Evaluation Function Based on Win/Draw Parameter
in Othello 802
Basit Shahzad, Lolowah R. Alssum, and YousefAl-Ohali
Session: Posters
Network Management System for Quantum Key Distribution 807
Piya Techateerawat
A Scheduling Algorithm for Downloading Data from RSU Using Multicast
Technique 809
Sana Sahebgharani and MohammadShahverdy
Software Security: The Dangerous Afterthought 815
Curtis StewardJr., LuayA. Wahsheh, Aftab Ahmad, Jonathan M. Graham,
Cheryl V. Hinds, Aurelia T. Williams, and Sandra J. DeLoatch
Exploring Model-Based Design 819
Devon Simmonds, Mark Lanter, Lyle Scott HI, Ashley Young, Selin Benli,
andAndy Herrmann
Speeding Up Big-Numbers Squaring 821
Shay Gueron and Vlad Krasnov
Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel®
Core Processors 824
Shay Gueron
Retargetable Netlists Generation and Structural Synthesis Based on a Meta
Hardware Description Language: Melasy+ 827
Sho Nishida andKatsumi Wasaki
Knowledge Services and Knowledge Building in E-learning 831
Xinyu Zhang, Lu Yuhao, and Zhaohui Liang
The Exploration of the E-Learning Standard Test System 833
Xinyu Zhang, Qian Wang, and Yiqian Lu
Rule-based Management of Large Unorganized Data Sets 835
Daniel D. Beatty andNoe Lopez-Benitez
xvi
Acoustic Signature Based Intelligent Health Monitoring ofAir Compressorswith Selected Features 839
NishchalK. Verma, Tarun Maini, andAl Salour
An Activity Pattern Based Wireless Intrusion Detection System 846
NurAl Hasan Haldar, MuhammadAbulaish, and Syed Asim Pasha
An Exploratory Study of the Users' Behavior on Social Network Sites 848
Shwu-Min Horng
Using Chatbots to Teach Socially Intelligent Computing Principlesin Introductory Computer Science Courses 850
Alan Shaw
Can You See Me Now? Design SEO-friendly Classroom Blogs for Reaching
Valuable Public 852
Xuesong (Sonya) Zhang
Evaluating Students Online Discussion Performance by Using Social Network
Analysis 854
Peng He
Social Engine Web Store: Create Your Web Store and Publish It on Your
Social Network 856
Thiago Catoto Dias, Andre Luiz de Soma Fatala, andArnaldo de Moraes Pereira
Using Social Networks to Improve the Performance of a Service Desk 860
Joel Mana Gongalves andRejane Pereira da Silva Gonqalves
Proposed Model for Social and Collaborative Social Network ofPositive
Reinforcement: Positive Reinforcement Online Social Network: PRSN 861
Habib M. Fardoun, Daniyal M. Algazzawi, Sebastian R. Lopez,
and Jose Antonio Gallud Lazarro
How Can Social Networks Help Us Measure Trust Online? 865
Wei-Lun Chang and Arleen N. Diaz
Automatic Coverage Evaluation for a Medical Expert System 867
AhmadEyadat andIzzat Alsmadi
Annotating Resources in Sequence Diagrams for Testing Web Security 873
WeifengXu, Lin Deng, and Qing Zheng
Serious Video Games: Games for Education and Health 875
Vasudevan Janarthanan
Innovations in Art and Production: Sound, Modeling and Animation 879
Vasudevan Janarthanan
Link Encryption to Counteract with Rouge Social Network Crawlers 883
Sri Khetwat Saritha andKishan Dharavath
xvii
A Survey of Requirement Engineering Interactions in Telecommunication
Systems 885
AhmadB. Alnafoosi
Excessive Use of the Internet and Gender: The Case for University Students
in Jordan 886
YousefAhmedEyadat
ROI Detection Using Spatial Kernel Based Filter for Steam Generator Tube
Inspection in Eddy Current Nondestructive Evaluation 892
Jaejoon Kim and Lalita Udpa
Relationship between State Machine and Dynamic Behavior: Coherence
among Events and Messages 893
Jose Gongalves Batista da Luz and Michele Puretachi de Barros
Community Environmental Monitoring Mode Based on Wireless Sensor
Network 894
Chimming Li, Shuanning Zheng, Xiaodan Sit, QingLi, and Quanyi Qiu
Utilization of Urban Form Information for Extracting Commuting Travel
Carbon Emission on Urban Road Network 895
Quanyi Qiu, Yang Zhao, Lei Chen, and Yuan Quan
Packet Reversed Packet Combining Scheme: A Thorough Analysis 896
Chandan T. Bhunia andAbhinandan Bhunia
Biological Cells as Storage Devices 897
Ralph M. DeFrangesco
Author Index 899
xviii