Professional Documents
Culture Documents
Cloud Computing and Security 4th International Conference ICCCS 2018 Haikou China June 8 10 2018 Revised Selected Papers Part I Xingming Sun
Cloud Computing and Security 4th International Conference ICCCS 2018 Haikou China June 8 10 2018 Revised Selected Papers Part I Xingming Sun
https://textbookfull.com/product/cloud-computing-and-
security-4th-international-conference-icccs-2018-haikou-china-
june-8-10-2018-revised-selected-papers-part-ii-xingming-sun/
https://textbookfull.com/product/cloud-computing-and-
security-4th-international-conference-icccs-2018-haikou-china-
june-8-10-2018-revised-selected-papers-part-vi-xingming-sun/
https://textbookfull.com/product/cyber-security-15th-
international-annual-conference-cncert-2018-beijing-china-
august-14-16-2018-revised-selected-papers-xiaochun-yun/
Cloud Computing
and Security
4th International Conference, ICCCS 2018
Haikou, China, June 8–10, 2018
Revised Selected Papers, Part I
123
Lecture Notes in Computer Science 11063
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zurich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology Madras, Chennai, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbrücken, Germany
More information about this series at http://www.springer.com/series/7409
Xingming Sun Zhaoqing Pan
•
Cloud Computing
and Security
4th International Conference, ICCCS 2018
Haikou, China, June 8–10, 2018
Revised Selected Papers, Part I
123
Editors
Xingming Sun Elisa Bertino
Nanjing University of Information Science Department of Computer Science
and Technology Purdue University
Nanjing West Lafayette, IN
China USA
Zhaoqing Pan
Nanjing University of Information Science
and Technology
Nanjing
China
LNCS Sublibrary: SL3 – Information Systems and Applications, incl. Internet/Web, and HCI
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
The 4th International Conference on Cloud Computing and Security (ICCCS 2018)
was held in Haikou, China, during June 8–10, 2018, and hosted by the School of
Computer and Software at the Nanjing University of Information Science and Tech-
nology. ICCCS is a leading conference for researchers and engineers to share their
latest results of research, development, and applications in the field of cloud computing
and information security.
We made use of the excellent Tech Science Press (TSP) submission and reviewing
software. ICCCS 2018 received 1743 submissions from 20 countries and regions,
including USA, Canada, UK, Italy, Ireland, Japan, Russia, France, Australia,
South Korea, South Africa, India, Iraq, Kazakhstan, Indonesia, Vietnam, Ghana, China,
Taiwan, and Macao. The submissions covered the areas of cloud computing, cloud
security, information hiding, IOT security, multimedia forensics, and encryption, etc.
We thank our Technical Program Committee members and external reviewers for their
efforts in reviewing papers and providing valuable comments to the authors. From the
total of 1743 submissions, and based on at least two reviews per submission, the
Program Chairs decided to accept 386 papers, yielding an acceptance rate of 22.15%.
The volume of the conference proceedings contains all the regular, poster, and
workshop papers.
The conference program was enriched by six keynote presentations, and the keynote
speakers were Mauro Barni, University of Siena, Italy; Charles Ling, University of
Western Ontario, Canada; Yunbiao Guo, Beijing Institute of Electronics Technology
and Application, China; Yunhao Liu, Michigan State University, USA; Nei Kato,
Tokyo University, Japan; and Jianfeng Ma, Xidian University, China. We thank them
very much for their wonderful talks.
There were 42 workshops organized in conjunction with ICCCS 2018, covering all
the hot topics in cloud computing and security. We would like to take this moment to
express our sincere appreciation for the contribution of all the workshop chairs and
their participants. In addition, we would like to extend our sincere thanks to all authors
who submitted papers to ICCCS 2018 and to all PC members. It was a truly great
experience to work with such talented and hard-working researchers. We also appre-
ciate the work of the external reviewers, who assisted the PC members in their par-
ticular areas of expertise. Moreover, we would like to thank our sponsors: Nanjing
University of Information Science and Technology, Springer, Hainan University, IEEE
Nanjing Chapter, ACM China, Michigan State University, Taiwan Cheng Kung
University, Taiwan Dong Hwa University, Providence University, Nanjing University
of Aeronautics and Astronautics, State Key Laboratory of Integrated Services Net-
works, Tech Science Press, and the National Nature Science Foundation of China.
Finally, we would like to thank all attendees for their active participation and the
VI Preface
organizing team, who nicely managed this conference. Next year, ICCCS will be
renamed as the International Conference on Artificial Intelligence and Security
(ICAIS). We look forward to seeing you again at the ICAIS.
General Chairs
Xingming Sun Nanjing University of Information Science
and Technology, China
Han-Chieh Chao Taiwan Dong Hwa University, Taiwan, China
Xingang You China Information Technology Security Evaluation
Center, China
Elisa Bertino Purdue University, USA
Workshop Chair
Baowei Wang Nanjing University of Information Science
and Technology, China
Publication Chair
Zhaoqing Pan Nanjing University of Information Science
and Technology, China
Publicity Chair
Chuanyou Ju Nanjing University of Information Science
and Technology, China
Website Chair
Wei Gu Nanjing University of Information Science
and Technology, China
Cloud Computing
Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree . . . 525
Yanbin Sun, Mohan Li, Le Wang, and Hui Lu
Long Short Term Memory Model for Analysis and Forecast of PM2.5 . . . . . 623
Leiming Yan, Min Zhou, Yaowen Wu, and Luqi Yan
1 Introduction
2 Method
Definition 1 Boundary voxel: locall all 2-D cross sections Ai and their boundaries
@Ai , where
Ai ¼ fðx; y; zi Þj set of four-connected voxel ðx; y; zi Þ, satisfying I ðx; y; zi Þ t;
t 2 ½1000; 600g;
@Ai ¼ fðx; y; zi Þj voxels 62 @Ai that are 4-neighbors of a voxel 2 @Ai g;
Definition 2 Reliable path: reliable path in virtual organ is defined as a set of con-
nected points inside the model. It must be satisfy the following requirements: (1) entire
interior surface can be seen; (2) the path as short as possible; (3) do not through the
3D Airway Tree Centerline Extraction Algorithm for Virtual Bronchoscope 5
surface; (4) ensure it has a wide perspective for navigation, and as far as possible away
from the surface of model.
The airway tree centerline extraction method consists of the following main steps
and as show in Fig. 1:
2. Repeat the region growing according to the threshold T until the volume VT > Ve
(Ve = 75000 mm3), and then voxels are stripped from the segmentation until the
volume has dropped to at least 95% of the segmentation volume just prior to
explosion.
3. Determination of candidate airway tree A by region growing method.
4. Analysis the candidate branches based
on the quality evaluation
function, retain the
good branches into the set S ¼ Ai jAi 2 A; f ðAi Þ [ 0 , and delete the bad ones.
Quality evaluation function f ðAi Þ equals to the intensity difference between the
weakest airway-wall voxel 2 @Ai and the average airway-lumen voxel 2 Ai , as
equal (2).
1 X
f ðAi Þ ¼ min fI ðx; y; zi Þg I ðx; y; zi Þ ð2Þ
ðx;y;zi Þ2@Ai jAi j ðx;y;z Þ2A
i i
3. (3) if JIðpm Þ JIðpn Þ [ 0, the value of Jacobian of pm and pn with the same symbol.
It represents that the original center at the outside of boundary voxles, so
Ci ¼ Ci þ ðjJIðpm Þj þ2 jJIðpn ÞjÞ
The shortest path generation algorithm of Dijstra is a more mature algorithm. But
for complex model, this method will connect the two nonadjacent models together.
Therefore, in the process of centers connection, we need to judged whether or not the
centerline through the boundary of model. If the centerline through the boundary, we
need break the two point, and insert new one until the line does not through the
boundary.
8 X. Yu et al.
Eðbi Þ Sðbi Þ
di ¼ ð6Þ
kEðbi Þ Sðbi Þk
P
ðEðbk Þ Eðbi ÞÞ
bk 2Dðbi Þ
mi ¼
P
ð8Þ
ðEðbk Þ Eðbi ÞÞ
bk 2Dðbi Þ
3 Experiments
The visible human male CT data set was used as the basis for the lung lobes and the
initial airway tree structure. The CT data consists of transaxial CT scans of the entire
body taken at 1 mm intervals at a resolution of 512 pixels by 512 pixels. The pixel size
of the images was 0.898 mm.
The improved airway tree segmentation method can extract 60% of airways at a
depth up to the 5 generation subsegmental level. It is reconstructed using the Marching
Cube method as Fig. 3 shows.
Table 1 summarizes the airway tree segmentation results. The number of branches
using the proposed method is 1.6 as much as the region growing method, and the
accuracy can reach 76%. In the time, conservation segmentation is very fast, but the
segmentation and filtering for sub branches need 147 s. Overall calculation time is no
more than 3 min. The hybrid method need roughly 13 to 20 min. Therefore, the
proposed method can improve the calculation speed.
For centerline extraction analysis, using the lung slice and colon slice images of
CT. As Fig. 4 shows that this method can effectively extract the centerline, and ensure
the uniqueness.
Table 2 summarizes the number of inner voxels, branches, centers and running
time, includes the center extraction time, center correction time and centerline
10 X. Yu et al.
direction of the child branches mi 。The accuracy increased 9.5% compare with the
Mori’s method [9].
4 Conclusion
Image based planning and guidance of peripheral bronchoscopy requires the reliable
path. Our proposed method is computationally efficient, not only segmented the
complete the airway tree and solved the leakage problem, but also generated the
uniqueness centerline for navigation. In addition, we have successfully applied the
method to represent the airway tree structure. Future work includes: (1) to solve the
problem that how to guide the doctors to observe the organ inner structure, (2) research
for route planning.
Acknowledgment. This work was supported by National Natural Science Foundation of China
under Grant No 61572153, and the National Key research and Development Plan (Grant
No. 2018YFB0803504). key research topics of economic and social development in Hei-
longjiang province under Grant No WY2017048-B.
References
1. Graham, M.W., Gibbs, J.D., Higgins, W.E.: Computer-based route-definition system for
peripheral bronchoscopy. J. Digit. Imaging 25(2), 307–317 (2012)
2. Kiraly, A.P., Higgins, W.E., Hoffman, E.A., et al.: 3D human airway segmentation method
for virtual bronchoscopy. Acad. Radiol. 19(10), 1153–1168 (2002)
3. Suter, M., Schirren, J.T., Reinhardt, J.: Evaluation of the human airway with multidetector
X-ray-computed tomography and optical imaging. Inst. Phys. Publ. Physioligical Meas. 25
(4), 837–847 (2004)
4. Tan, W., Yang, J., Zhao, D., et al.: A novel method for automated segmentation of airway
tree. In: 24th Chinese Control and Decision Conference, pp. 976–979 (2012)
5. Fabijanska, A.: Two pass region growing algorithm for segmenting airway trees for MDCT
chest scans. Comput. Med. Image Graph. 11(23), 1353–1364 (2009)
6. Law, T.Y., Heng, P.: Automated extraction of bronchus from 3D CT images of lung based
on genetic algorithm and 3D region growing. Proceeding SPIE Med. Imaging 3979, 906–
916 (2000)
7. Schlathalter, T., Lorenz, C., Carlsen, I., et al.: Simultaneous segmentation and tree
reconstruction of the airways for virtual bronchoscopy. In: Proceeding of SPIE Medical
Imaging, vol. 4684, pp. 103–113 (2002)
Another random document with
no related content on Scribd:
“We know a great deal about a good many things,” said Mrs.
Maplebury.
“What is it, Bradbury?” said Mrs. Fisher.
“I’m afraid I shall have to leave you for a couple of days. Great
nuisance, but there it is. But, of course, I must be there.”
“Where?”
“Ah, where?” said Mrs. Maplebury.
“At Sing-Sing. I see in the paper that to-morrow and the day after
they are inaugurating the new Osborne Stadium. All the men of my
class will be attending, and I must go, too.”
“Must you really?”
“I certainly must. Not to do so would be to show a lack of college
spirit. The boys are playing Yale, and there is to be a big dinner
afterwards. I shouldn’t wonder if I had to make a speech. But don’t
worry, honey,” he said, kissing his wife affectionately. “I shall be back
before you know I’ve gone.” He turned sharply to Mrs. Maplebury. “I
beg your pardon?” he said, stiffly.
“I did not speak.”
“I thought you did.”
“I merely inhaled. I simply drew in air through my nostrils. If I am
not at liberty to draw in air through my nostrils in your house, pray
inform me.”
“I would prefer that you didn’t,” said Bradbury, between set teeth.
“Then I would suffocate.”
“Yes,” said Bradbury Fisher.
And what of Felicia, meanwhile? She was, alas, far from returning
the devotion which scorched Chester’s vital organs. He seemed to
her precisely the sort of man she most disliked. From childhood up
Felicia Blakeney had lived in an atmosphere of highbrowism, and the
type of husband she had always seen in her daydreams was the
man who was simple and straightforward and earthy and did not
know whether Artbashiekeff was a suburb of Moscow or a new kind
of Russian drink. A man like Chester, who on his own statement
would rather read one of her mother’s novels than eat, revolted her.
And his warm affection for her brother Crispin set the seal on her
distaste.
Felicia was a dutiful child, and she loved her parents. It took a bit
of doing, but she did it. But at her brother Crispin she drew the line.
He wouldn’t do, and his friends were worse than he was. They were
high-voiced, supercilious, pince-nezed young men who talked
patronisingly of Life and Art, and Chester’s unblushing confession
that he was one of them had put him ten down and nine to play right
away.
You may wonder why the boy’s undeniable skill on the links had no
power to soften the girl. The unfortunate fact was that all the good
effects of his prowess were neutralised by his behaviour while
playing. All her life she had treated golf with a proper reverence and
awe, and in Chester’s attitude towards the game she seemed to
detect a horrible shallowness. The fact is, Chester, in his efforts to
keep himself from using strong language, had found a sort of relief in
a girlish giggle, and it made her shudder every time she heard it.
His deportment, therefore, in the space of time leading up to the
proposal could not have been more injurious to his cause. They
started out quite happily, Chester doing a nice two-hundred-yarder
off the first tee, which for a moment awoke the girl’s respect. But at
the fourth, after a lovely brassie-shot, he found his ball deeply
embedded in the print of a woman’s high heel. It was just one of
those rubs of the green which normally would have caused him to
ease his bosom with a flood of sturdy protest, but now he was on his
guard.
“Tee-hee!” simpered Chester, reaching for his niblick. “Too bad, too
bad!” and the girl shuddered to the depths of her soul.
Having holed out, he proceeded to enliven the walk to the next tee
with a few remarks on her mother’s literary style, and it was while
they were walking after their drives that he proposed.
His proposal, considering the circumstances, could hardly have
been less happily worded. Little knowing that he was rushing upon
his doom, Chester stressed the Crispin note. He gave Felicia the
impression that he was suggesting this marriage more for Crispin’s
sake than anything else. He conveyed the idea that he thought how
nice it would be for brother Crispin to have his old chum in the family.
He drew a picture of their little home, with Crispin for ever popping in
and out like a rabbit. It is not to be wondered at that, when at length
he had finished and she had time to speak, the horrified girl turned
him down with a thud.
It is at moments such as these that a man reaps the reward of a
good upbringing.
In similar circumstances those who have not had the benefit of a
sound training in golf are too apt to go wrong. Goaded by the sudden
anguish, they take to drink, plunge into dissipation, and write vers
libre. Chester was mercifully saved from this. I saw him the day after
he had been handed the mitten, and was struck by the look of grim
determination in his face. Deeply wounded though he was, I could
see that he was the master of his fate and the captain of his soul.
“I am sorry, my boy,” I said, sympathetically, when he had told me
the painful news.
“It can’t be helped,” he replied, bravely.
“Her decision was final?”
“Quite.”
“You do not contemplate having another pop at her?”
“No good. I know when I’m licked.”
I patted him on the shoulder and said the only thing it seemed
possible to say.
“After all, there is always golf.”
He nodded.
“Yes. My game needs a lot of tuning up. Now is the time to do it.
From now on I go at this pastime seriously. I make it my life-work.
Who knows?” he murmured, with a sudden gleam in his eyes. “The
Amateur Championship—”
“The Open!” I cried, falling gladly into his mood.
“The American Amateur,” said Chester, flushing.
“The American Open,” I chorused.
“No one has ever copped all four.”
“No one.”
“Watch me!” said Chester Meredith, simply.