ebook img

Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 PDF

752 Pages·2013·8.321 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3

Lecture Notes in Electrical Engineering Volume 225 For furthervolumes: http://www.springer.com/series/7818 Yuhang Yang Maode Ma • Editors Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 123 Editors YuhangYang MaodeMa Department of ElectronicEngineering Electrical andElectronic Engineering ShanghaiJiaoTong University NanyangTechnological University Shanghai Singapore People’s Republic ofChina Singapore ISSN 1876-1100 ISSN 1876-1119 (electronic) ISBN 978-3-642-35469-4 ISBN 978-3-642-35470-0 (eBook) DOI 10.1007/978-3-642-35470-0 SpringerHeidelbergNewYorkDordrechtLondon LibraryofCongressControlNumber:2012955746 (cid:2)Springer-VerlagBerlinHeidelberg2013 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionor informationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purposeofbeingenteredandexecutedonacomputersystem,forexclusiveusebythepurchaserofthe work. Duplication of this publication or parts thereof is permitted only under the provisions of theCopyrightLawofthePublisher’slocation,initscurrentversion,andpermissionforusemustalways beobtainedfromSpringer.PermissionsforusemaybeobtainedthroughRightsLinkattheCopyright ClearanceCenter.ViolationsareliabletoprosecutionundertherespectiveCopyrightLaw. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexempt fromtherelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. While the advice and information in this book are believed to be true and accurate at the date of publication,neithertheauthorsnortheeditorsnorthepublishercanacceptanylegalresponsibilityfor anyerrorsoromissionsthatmaybemade.Thepublishermakesnowarranty,expressorimplied,with respecttothematerialcontainedherein. Printedonacid-freepaper SpringerispartofSpringerScience?BusinessMedia(www.springer.com) Preface Welcome to the Proceedings of the 2nd International Conference on Green CommunicationsandNetworks(GCN2012),whichwasheldonDecember12–14, 2012, in Chongqing, China. GCN 2012 will be a venue for leading academic and industrial researchers to exchange their views, ideas, and research results on innovative technologies and sustainable solutions leading to green communications and networks. The con- ferencewillfeaturekeynotespeakers,apaneldiscussion,andpaperpresentations. The objective of GCN 2012 is to facilitate an exchange of informationon best practicesforthelatestresearchadvancesintheareaofgreencommunicationsand networks, which mainly includes the intelligent control, or efficient management, or optimal design of access network infrastructures, home networks, terminal equipment, etc. GCN 2012 will provide a forum for engineers and scientists in academia, industry, and government to address the most innovative research and development including technical challenges, social and economic issues, and to present and discuss their ideas, results, work in progress, and experience on all aspects of advanced green communications and networks engineering. The GCN 2012 conference provided a forum for engineers and scientists in academia, industry, and government to address the most innovative research and development including technical challenges and social, legal, political, and eco- nomicissues,andtopresentanddiscusstheirideas,results,workinprogress,and experience on all aspects of information computing and applications. There was a very large number of paper submissions (1834). All submissions were reviewed by at least three Program or Technical Committee members or external reviewers. It was extremely difficult to select the presentations for the conference because there were so many excellent and interesting submissions. In order to allocate as many papers as possible and keep the high quality of the conference, we finally decided toaccept486 papers for presentations, reflecting a 26.5 % acceptance rate. We believe that all of these papers and topics not only providednovelideas,newresults,workinprogress,andstate-of-the-arttechniques in this field, but also stimulated the future research activities in the area of information computing and applications. v vi Preface The exciting program for this conference was the result of the hard and excellent work of many others, such as Program and Technical Committee members,ExternalReviewers,andPublicationChairsunderaverytightschedule. We are also grateful to the members of the Local Organizing Committee for supporting us in handling so many organizational tasks, and to the Keynote Speakers for accepting to come to the conference with enthusiasm. Last but not least, we hope you enjoy the conference program, and the beautiful attractions of Chongqing, China. December 2012 Maode Ma Yuhang Yang General and Program Chairs GCN 2012 Organization Committee GCN2012wasorganizedbyChongqingNormalUniversity,BeiHangUniversity, Peking University, and sponsored by the National Science Foundation of China, ShanghaiJiaoTongUniversity,NanyangTechnologicalUniversity.Itwasheldin cooperation with Lecture Notes in Electrical Engineering (LNEE) of Springer. Executive Committee General Chairs: Maode Ma Nanyang Technological University, Singapore Yuhang Yang, Shanghai Jiao Tong University, China Program Chairs: Qi Jing, Peking University, China Hongsong Chen, University of Science and Technology Beijing, China Local Arrangement Chairs: Xilong Qu, Hunan Institute of Engineering, China Pan Deng, BeiHang University, China Wenjiang Du, Chongqing Normal University, China Steering Committee: Qun Lin,ChineseAcademyofSciences,China MaodeMa,NanyangTechnologicalUniversity, Singapore Nadia Nedjah, State University of Rio de Janeiro, Brazil Lorna Uden, Staffordshire University, UK Yiming Chen, Yanshan University, China Aimin Yang, Hebei united University, China ChunyingZhang,HebeiUnitedUniversity, China vii viii OrganizationCommittee DechangChen,UniformedServicesUniversity oftheHealthSciences,USA Mei-ChingChen,TatungUniversity,Taiwan Rong-ChangChen,NationalTaichungInstitute ofTechnology,Taiwan Chi-Cheng Cheng, National Sun Yat-Sen University,Taiwan DonaldC.Wunsch,UniversityofMissouri Rolla,USA Publicity Chairs: Aimin Yang, Hebei United University, China Xilong Qu, Hunan Institute of Engineering, China Publication Chairs: Yuhang Yang, Shanghai Jiao Tong University, China Financial Chair: Wenjiang Du, Chongqing Normal University, China LocalArrangementCommittee: Defang Luo, Chongqing Normal University, China LinyanChen,ChongqingNormalUniversity, China PanDeng,BeiHangUniversity,China YuhuanCui,HebeiPolytechnicUniversity, China Secretaries: DuWu Cui, Xian University of Technology, China Jinai Qu, Defense Security Command, Korea Yaang Yang, Shanghai University, China Lichao Feng, Defense Security Command, Korea Program/Technical Committee Mina Gui Texas State University, USA Yajun Li Shanghai Jiao Tong University, China Yanliang Jin Shanghai University, China Liang Zhou ENSTA-ParisTech, France Yajun Guo Huazhong Normal University, China Haibing Yin Peking University, China Worap Kreesuradej KingMongkuts Institute of Technology Ladkra- bang, Thailand Jianxin Chen University of Vigo, Spain Zengqiang Chen Nankai University, China Ven Prasad DelftUniversityofTechnology,TheNetherlands Yuan Lin NorwegianUniversityofScienceandTechnology, Norwegian OrganizationCommittee ix Haining Wang College of William and Marry, USA Ragip Kur Nokia Research, USA On Altintas Toyota InfoTechnology Center, Japan Suresh Subra George Washington University, USA Xiyin Wang Hebei Polytechnic University, China Hu Changhua Xi’an Research Institute of Hi-Tech, China Chunxiao Yu Yanshan University, China Yanbin Sun Beijing University of Posts and Telecommunica- tions, China Guofu Gui CMC Corporation, China Haiyong Bao NTT Co., Ltd, Japan Mingyi Gao National Institute of AIST, Japan Miche Rossi University of Padova, Italy Yangwen Zou Apple China Co., Ltd, China Yanbing Sun Beijing University of Posts and Telecommunica- tions, China Zhanguo Wei Beijing Forestry University, China Hao Chen Hu’nan University, China Xiwen Hu Wuhan University of Technology, China Xilong Qu Hunan Institute of Engineering, China Duolin Liu ShenYang Ligong University, China Xiaozhu Liu Wuhan University, China Yiming Chen Yanshan University, China Hui Wang University of Evry in France, France Shuang Cong University of Science and Technology of China, China Mengze Liao Cisco China R&D Center, China Dianxuan Gong Hebei Polytechnic University, China Dumisa Wellington Ngwenya Illinois State University, USA Nils Asc University of Bonn, Germany Lilei Wang Beijing University of Posts and Telecommunica- tions, China Zhao-Hui Jiang Hiroshima Institute of Technology, Japan Michael Watts Lincoln University, New Zealand Tai-hon Kim Defense Security Command, Korea Muhammad Khan Southwest Jiaotong University, China Juntao Fei Hohai University, China Seong Kong The University of Tennessee USA Uwe Kuger Queen’s University of Belfast, UK Paolo Li Polytechnic of Bari, Italy Tashi Kuremoto Yamaguchi University, Japan Jams Li University of Birmingham, UK Xiao Li CINVESTAV-IPN, Mexico Lui Piroddi Technical University of Milan, Italy Mei Yu Simula Research Laboratory, Norway x OrganizationCommittee Qishi Wu University of Memphis, USA Lisong Xu University of Nebraska-Lincoln, USA Sean McLoo National University of Ireland, Ireland Jian-Xin Peng Queens University of Belfast, UK Xiang Mei The University of Leeds, UK Cheol Moon Gwangju University, Korea Veli Mumcu Technical University of Yildiz, Turkey Wenbin Jiang HuazhongUniversityofScienceandTechnology, China Wi Richert University of Paderborn, Germany Chun Lee Howon University, Korea Zheng Liu Nagasaki Institute of Applied Science, Japan Yongning Tang Illinois State University, USA Girij Prasad University of Ulster, UK Gui-Rong Xue Shanghai Jiao Tong University, China Cent Leung Victoria University of Technology, Australia Sunil Maharaj Sentech University of Pretoria, South Africa Liang Li University of Sheffield, UK Hai Qi University of Tennessee, USA Michiharu Kurume National College of Technology, Japan Meh shafiei Dalhousie University, Canada Sa Sharma University of Plymouth, UK Jun Cai University of Manitoba, Canada YongSheng Ding Donghua University, China Yuezhi Zhou Tsinghua University, China R. McMenemy Queens University Belfast, UK Yan Zhang Simula Research Laboratory and University of Oslo, Norway Xingang Zhang Nanyang Normal University, China Dong Yue HuazhongUniversityofScienceandTechnology, China Nin Pang Auckland University of Technology, New Zealand Wang Bin Chinese Academy of Sciences, China Jalel Ben-Othman University of Versailles, France Ruichun Tang Ocean University of China, China Zhichun Li Northwestern University, China Stefa Lindstaedt Division Manager Knowledge Management, Austria Contents Part I Information Security and Applications 1 Stochastic Insuring Critical Path Problem with Value-at-Risk Criterion. . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 ZhenHong Li, YanKui Liu and WenJuan Zang 2 Research on Classification of Highway Emergency Telephone System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Xu Jia, Yuxin Liu and Liwei Zhu 3 Semantic Analysis Model of Chinese MMT Based on Hierarchical Network of Concepts in Chinese–English Machine Translation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Wen Xiong and Yao Hong Jin 4 Study of University Students’ Psychological Warning Prevention and Control Based on Automatic Control. . . . . . . . . . 27 Jie Liang 5 Research of Toxic Gas Diffusion Simulation Technology Based on Arc Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Qing-long Zhang, Yi-ru Dai, Jiang Wang and Rong-yong Zhao 6 Network Security Evaluation Based on Support Vector Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Xiang Chen and Yun Li 7 Study on Nursing Safety and Quality Management . . . . . . . . . . . 51 XiuFen Ma, Qingling Han, Lichun Zhou and Ying Hu xi

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.