You are on page 1of 54

Cloud Computing Smart Grid and

Innovative Frontiers in
Telecommunications 9th EAI
International Conference CloudComp
2019 and 4th EAI International
Conference SmartGIFT 2019 Beijing
China December 4 5 2019 and
December 21 22 2019 Xuyun Zhang
Visit to download the full and correct content document:
https://textbookfull.com/product/cloud-computing-smart-grid-and-innovative-frontiers-i
n-telecommunications-9th-eai-international-conference-cloudcomp-2019-and-4th-eai-i
nternational-conference-smartgift-2019-beijing-china-december-4-5/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Advanced Hybrid Information Processing Third EAI


International Conference ADHIP 2019 Nanjing China
September 21 22 2019 Proceedings Part I Guan Gui

https://textbookfull.com/product/advanced-hybrid-information-
processing-third-eai-international-conference-adhip-2019-nanjing-
china-september-21-22-2019-proceedings-part-i-guan-gui/

Advanced Hybrid Information Processing Third EAI


International Conference ADHIP 2019 Nanjing China
September 21 22 2019 Proceedings Part II Guan Gui

https://textbookfull.com/product/advanced-hybrid-information-
processing-third-eai-international-conference-adhip-2019-nanjing-
china-september-21-22-2019-proceedings-part-ii-guan-gui/

Interactivity Game Creation Design Learning and


Innovation 8th EAI International Conference ArtsIT 2019
and 4th EAI International Conference DLI 2019 Aalborg
Denmark November 6 8 2019 Proceedings Anthony Brooks
https://textbookfull.com/product/interactivity-game-creation-
design-learning-and-innovation-8th-eai-international-conference-
artsit-2019-and-4th-eai-international-conference-
dli-2019-aalborg-denmark-november-6-8-2019-proceedings-anth/

Innovative Technologies and Learning Second


International Conference ICITL 2019 Tromsø Norway
December 2 5 2019 Proceedings Lisbet Rønningsbakk

https://textbookfull.com/product/innovative-technologies-and-
learning-second-international-conference-icitl-2019-tromso-
norway-december-2-5-2019-proceedings-lisbet-ronningsbakk/
Science and Technologies for Smart Cities 5th EAI
International Summit SmartCity360 Braga Portugal
December 4 6 2019 Proceedings Henrique Santos

https://textbookfull.com/product/science-and-technologies-for-
smart-cities-5th-eai-international-summit-smartcity360-braga-
portugal-december-4-6-2019-proceedings-henrique-santos/

Broadband Communications, Networks, and Systems: 10th


EAI International Conference, Broadnets 2019, Xi’an,
China, October 27-28, 2019, Proceedings Qingshan Li

https://textbookfull.com/product/broadband-communications-
networks-and-systems-10th-eai-international-conference-
broadnets-2019-xian-china-october-27-28-2019-proceedings-
qingshan-li/

Context-Aware Systems and Applications, and Nature of


Computation and Communication: 8th EAI International
Conference, ICCASA 2019, and 5th EAI International
Conference, ICTCC 2019, My Tho City, Vietnam, November
28-29, 2019, Proceedings Phan Cong Vinh
https://textbookfull.com/product/context-aware-systems-and-
applications-and-nature-of-computation-and-communication-8th-eai-
international-conference-iccasa-2019-and-5th-eai-international-
conference-ictcc-2019-my-tho-city-vietn/

Cloud Computing and Services Science 9th International


Conference CLOSER 2019 Heraklion Crete Greece May 2 4
2019 Revised Selected Papers Donald Ferguson

https://textbookfull.com/product/cloud-computing-and-services-
science-9th-international-conference-closer-2019-heraklion-crete-
greece-may-2-4-2019-revised-selected-papers-donald-ferguson/

e Learning e Education and Online Training 5th EAI


International Conference eLEOT 2019 Kunming China
August 18 19 2019 Proceedings Guanglu Sun

https://textbookfull.com/product/e-learning-e-education-and-
online-training-5th-eai-international-conference-
eleot-2019-kunming-china-august-18-19-2019-proceedings-guanglu-
Xuyun Zhang
Guanfeng Liu
Meikang Qiu
Wei Xiang
Tao Huang (Eds.)

322

Cloud Computing, Smart Grid


and Innovative Frontiers
in Telecommunications
9th EAI International Conference, CloudComp 2019
and 4th EAI International Conference, SmartGIFT 2019
Beijing, China, December 4–5, 2019, and December 21–22, 2019

123
Lecture Notes of the Institute
for Computer Sciences, Social Informatics
and Telecommunications Engineering 322

Editorial Board Members


Ozgur Akan
Middle East Technical University, Ankara, Turkey
Paolo Bellavista
University of Bologna, Bologna, Italy
Jiannong Cao
Hong Kong Polytechnic University, Hong Kong, China
Geoffrey Coulson
Lancaster University, Lancaster, UK
Falko Dressler
University of Erlangen, Erlangen, Germany
Domenico Ferrari
Università Cattolica Piacenza, Piacenza, Italy
Mario Gerla
UCLA, Los Angeles, USA
Hisashi Kobayashi
Princeton University, Princeton, USA
Sergio Palazzo
University of Catania, Catania, Italy
Sartaj Sahni
University of Florida, Gainesville, USA
Xuemin (Sherman) Shen
University of Waterloo, Waterloo, Canada
Mircea Stan
University of Virginia, Charlottesville, USA
Xiaohua Jia
City University of Hong Kong, Kowloon, Hong Kong
Albert Y. Zomaya
University of Sydney, Sydney, Australia
More information about this series at http://www.springer.com/series/8197
Xuyun Zhang Guanfeng Liu
• •

Meikang Qiu Wei Xiang


• •

Tao Huang (Eds.)

Cloud Computing, Smart Grid


and Innovative Frontiers
in Telecommunications
9th EAI International Conference, CloudComp 2019
and 4th EAI International Conference, SmartGIFT 2019
Beijing, China, December 4–5, 2019, and December 21–22, 2019

123
Editors
Xuyun Zhang Guanfeng Liu
Macquarie University Macquarie University
Sydney, NSW, Australia Sydney, NSW, Australia
Meikang Qiu Wei Xiang
Pace University James Cook University
New York, NY, USA Cairns, QLD, Australia
Tao Huang
James Cook University
Smithfield, QLD, Australia

ISSN 1867-8211 ISSN 1867-822X (electronic)


Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering
ISBN 978-3-030-48512-2 ISBN 978-3-030-48513-9 (eBook)
https://doi.org/10.1007/978-3-030-48513-9

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

We are delighted to introduce the proceedings the 9th edition of the European Alliance
for Innovation (EAI) International Conference on Cloud Computing (CloudComp
2019). This conference brought researchers, developers, and practitioners from around
the world together who are leveraging and developing cloud computing related tech-
nology for IoT and big data applications.
The technical program of CloudComp 2019 consisted of 48 full papers from several
tracks. The conference tracks were: Track 1 – Cloud Architecture and Scheduling;
Track 2 – Cloud-based Data Analytics; Track 3 – Cloud Applications; and
Track 4 – Cloud Security and Privacy. Aside from the high-quality technical paper
presentations, the technical program also featured three keynote speeches and a
Distinguished Local Scholar Discussion Panel. The three keynote speeches were
delivered by Prof. Michael Sheng from Macquarie University, Australia, Prof.
Yew-soon Ong from Nanyang Technological University, Singapore, and Prof.
Longbing Cao from University of Technology Sydney, Australia. The scholars who sat
on the Distinguished Local Scholar Discussion Panel were Principle Scientist Surya
Nepal from CSIRO’s Data61, Australia, Prof. Shui Yu from University of Technology
Sydney, Australia, Dr. Lina Yao from University of New South Wales, Australia, Dr.
Qiang He from Swinburne University of Technology, Australia, Dr. Dong Yuan from
The University of Sydney, Australia, and Dr. Jia Wu from Macquarie University,
Australia. The panel discussion aimed to gain insights into key challenges and an
understanding of the state-of-the-art cloud computing technologies to develop and
implement future cloud and edge computing related services and applications.
Coordination with the Steering Committee chairs, Imrich Chlamtac, Victor
C. M. Leung, and Kun Yang was essential for the success of the conference. We
sincerely appreciate their constant support and guidance. It was also a great pleasure to
work with such an excellent Organizing Committee, and we thank them for their hard
work in organizing and supporting the conference. In particular, we thank the Technical
Program Committee (TPC), led by our TPC co-chairs, Dr. Deepak Puthal, Dr. Chi
Yang, and Dr. Zhiyuan Tan, who organized the peer-review process of technical papers
and made a high-quality technical program. We are also grateful to the conference
manager, Karolina Marcinova, for her support and to all the authors who submitted
their papers to the CloudComp 2019 conference.
We strongly believe that the CloudComp 2019 conference provides a good forum
for all researchers, developers, and practitioners to discuss all science and technology
aspects that are relevant to cloud and edge computing. We also expect that the future
CloudComp conferences will be as successful and stimulating, as indicated by the
contributions presented in this volume.

April 2020 Xuyun Zhang


Guanfeng Liu
Meikang Qiu
Preface

We are delighted to introduce the proceedings of the second edition of the European
Alliance for Innovation (EAI) International Conference on Smart Grid Inspired Future
Technologies (SmartGIFT 2019). This conference brought researchers, developers, and
practitioners from around the world together who are leveraging and developing smart
grid technology for a smarter and more resilient grid. The theme of SmartGIFT 2019
was “Smart Grid and Innovative Frontiers in Telecommunications”.
The technical program of SmartGIFT 2019 consisted of 14 full papers, including 3
invited papers in oral presentation sessions at the main conference track. Aside from the
high-quality technical paper presentations, the technical program also featured a key-
note speech. The keynote speech was presented by Prof. Zhaocheng Wang from
Tsinghua University, Beijing, China. This keynote speech was focused on the tech-
nology of AI-based low-power millimeter wave communications.
Coordination with the Steering Committee chairs, Imrich Chlamtac, Victor
C. M. Leung, and Kun Yang was essential for the success of the conference. We
sincerely appreciate their constant support and guidance. It was also a great pleasure to
work with such an excellent Organizing Committee, and we thank them for their hard
work in organizing and supporting the conference. In particular, we thank the Technical
Program Committee (TPC), led by our TPC chair, Dr Tao Huang, who completed the
peer-review process of technical papers and made a high-quality technical program. We
are also grateful to the conference manager, Lukas Skolek, for his support and to all the
authors who submitted their papers to the SmartGIFT 2019 conference and workshops.
We strongly believe that the SmartGIFT conference provides a good forum for all
researcher, developers, and practitioners to discuss all science and technology aspects
that are relevant to smart grids. We also expect that the future SmartGIFT conference
will be as successful and stimulating, as indicated by the contributions presented in this
volume.

April 2020 Wei Xiang


Organization CloudComp 2019

Steering Committee
Imrich Chlamtac University of Trento, Italy

Organizing Committee
General Chair
Xuyun Zhang Macquarie University, Australia

General Co-chairs
Xuyun Zhang Macquarie University, Australia
Meikang Qiu Pace University, USA

TPC Chair and Co-chair


Deepak Puthal University of Technology Sydney, Australia
Chi Yang Huazhong University of Science and Technology,
China
Hiyuan Tan Edinburgh Napier University, UK

Sponsorship and Exhibit Chair


Daniel Sun CSIRO, Australia

Local Chair
Dong Yuan The University of Sydney, Australia

Workshops Chair
Lianyong Qi Qufu Normal University, China

Publicity and Social Media Chairs


Qiang He Swinburne University of Technology, Australia
Hao Wang Norwegian University of Science and Technology,
Norway

Publications Chairs
Shaohua Wan Zhongnan University of Economics and Law, China
Xiaolong Xu Nanjing University of Information Science and
Technology, China
x Organization CloudComp 2019

Web Chair
Meng Liu Shandong University, China

Conference Manager
Karolina Marcinova EAI

Technical Program Committee


Fiza Abdul Rahim University of the Southern Queensland, Australia
Chaodit Aswakul Chulalongkorn University, Thailand
Zhifeng Bao Royal Melbourne Institute of Technology University,
Australia
Lili Bo China University of Mining and Technology, China
Maria Dolores Cano Universidad Politécnica de Cartagena, Spain
Liqun Chen Southeast University, China
Lianhua Chi IBM Research Center
Manuel Fernandez-Veiga atlanTTic, University of Vigo, Spain
Jidong Ge Nanjing University, China
Ruili Geng Spectral MD, USA
Wenwen Gong China Agriculture University, China
Ying Guo Qingdao University of Science and Technology, China
Debiao He Wuhan University, China
Yu-Chen Hu Providence University, USA
Tao Huang Silicon Lake University, USA
Md. Kafiul Islam Independent University, Bangladesh
Juwook Jang Sogang University, South Korea
Rossi Kamal Shanto-Mariam University of Creative Technology,
Bangladesh
Santanu Koley Birla Institute of Science and Technology, India
Xin Li Nanjing University of Aeronautics and Astronautics,
China
Zhixu Li Soochow University, China
Wenmin Lin Hangzhou Dianzi University, China
An Liu Soochow University, China
Liangfu Lu Tianjing University, China
Mahesh Maddumala University of Missouri, USA
Tamim Al Mahmud Green University of Bangladesh, Bangladesh
Sofia Meacham Bournemouth University, UK
Shunmei Meng Nanjing University of Science and Technology, China
Syeda Naqvi University of Engineering and Technology, Pakistan
Khine Moe New University of Computer Studies, Myanmar
Ashish Payal Guru Gobind Singh Indraprastha University, India
Kai Peng Huaqiao University, China
Leonard Poon The Education University of Hong Kong, Hong Kong
Organization CloudComp 2019 xi

Amit Sehgal G.L. Bajaj Institute of Technology and Management,


India
Manik Sharma DAV University, India
Patrick Siarry Université Paris Est Créteil, France
Daniel Sun CSIRO, Australia
Jianyong Sun Xi’an Jiaotong University, China
Wenda Tang Lancaster University, UK
Jing Tian National University of Singapore, Singapore
Shaohua Wan Zhongnan University of Economics and Law, China
Ding Wang Peking University, China
Jinwei Wang Nanjing University of Information Science
and Technology, China
Liangmin Wang Jiangsu University, China
Mingzhong Wang University of the Sunshine Coast, Australia
Yiping Wen Hunan University of Science and Technology, China
Yirui Wu Hohai University, China
Ying Xie Anhui University, China
Rongbin Xu Anhui University, China
Tao Xu Northwestern Polytechnical University, China
Chao Yan Qufu Normal University, China
Ching-Nung Yang Taiwan Dong Hwa University, Taiwan
Xiangnan Zhang China Agriculture University, China
Gaofeng Zhang Hefei University of Technology, China
Jie Zhang Nanjing University, China
Xuan Zhao Nanjing University, China
Chunjie Zhou Ludong University, China
Yun Zhou Shaanxi Normal University, China
Organization SmartGIFT 2019

Steering Committee
Imrich Chlamtac University of Trento, Italy
Victor C. M. Leung The University of British Columbia, Canada
Kun Yang University of Essex, UK

Organizing Committee
General Chair
Wei Xiang James Cook University, Australia

General Co-chair
Lin Cao Beijing Information Science and Technology
University, China

TPC Chair
Tao Huang James Cook University, Australia

Local Chair
Xuehua Li Beijing Information Science and Technology
University, China

Publicity and Social Media Chair


Xinwei Yue Beijing Information Science and Technology
University, China

Publications Chair
Yuanyuan Yao Beijing Information Science and Technology
University, China

Panels Chair
Yanxiao Zhao Beijing Information Science and Technology
University, China

Posters and PhD Track Chair


Peiran Song Beijing Information Science and Technology
University, China
xiv Organization SmartGIFT 2019

Web Chair
Eric Wang James Cook University, Australia

Conference Manager
Lukáš Školek EAI

Technical Program Committee


Haibin Zhang Xidian University, China
Mehboob Ul Amin University of Kashmir, India
Kelvin Anoh Manchester Metropolitan University, UK
Muhannad Bakir Georgia Institute of Technology, USA
Xiaoxiong Gu IBM, USA
Aqdas Naveed Malik International Islamic University, Pakistan
Minglei You Durham University, UK
Yinghua Han Northeastern University at Qinhuangdao, China
Suhong Yang Northeastern University, USA
Radhakrishna Achanta IVRL-EPFL, Switzerland
Yves Rozenholc USPC, France
Xiaoheng Jiang Zhengzhou University, China
Darui Jin Beijing University of Aeronautics and Astronautics,
China
Xiangzhi Bai Beihang University, China
Yuan Zhuang Southeast University, China
Pan Cao University of Hertfordshire, UK
Yongpeng Wu Shanghai Jiao Tong University, China
Jiangnan Li University of Tennessee, USA
Xiangyu Niu University of Tennessee, USA
Israa Aziz Huazhong University of Science and Technology,
China
Hai Jin Huazhong University of Science and Technology,
China
Dileep K. Verma Research Center for Information Technology
Innovation
Ronald Chang Research Center for Information Technology
Innovation (CITI)
Bing Wang James Cook University, Australia
Dezhi Li Harbin Institute of Technology, China
He Yu Changchun University, China
Tao Huang James Cook University, Australia
Shushi Gu Harbin Institute of Technology, China
Jacob Crandall Brigham Young University, USA
Mihir Laghate UCLA, USA
Ding Xu Nanjing University of Posts and Telecommunications,
China
Organization SmartGIFT 2019 xv

Ling Luo SGCC, China


Ju Ren Central South University, China
Junying Hu Central South University, China
Deyu Zhang Central South University, China
Hui Guo Central South University, China
Hyungeun Choi Sogang University, South Korea
Seunghyoung Ryu Sogang University, South Korea
Hongseok Kim Missouri University, USA
Ying-Chin Lin Feng Chia University, Taiwan
Yu-Min Zhang Feng Chia University, Taiwan
Yen Hung Chen University of Taipei, Taiwan
Wei-Kuang Wang Feng Chia University, Taiwan
Liansheng Tan Central China Normal University, China
Zhaohui Yang Southeast University, China
Wei Xu Southeast University, China
Yijin Pan Southeast University, China
Cunhua Pan Queen Mary University of London, UK
Ming Chen National Mobile Communications Research,
Laboratory, Southeast University, China
Amritpal Singh Guru Nanak Dev University, India
Harjit Singh Guru Nanak Dev University, India
Jurong Bai University of Posts and Telecommunications, China
Muhammad Asim National University of Computer and Emerging
Sciences, Pakistan
Aswin Raj C. Amrita Vishwa Vidyapeetham University, India
Qingsi Wang University of Michigan, USA
Mingyan Liu University of Michigan, USA
Rahul Jain University of California, USA
Anwer Al-Dulaimi EXFO Inc., Canada
Khaled Elbassioni Khalifa University of Science and Technology, UAE
Trung Thanh Nguyen Hai Phong University, Vietnam
Mardavij Roozbehani Massachusetts Institute of Technology, USA
Sofana Reka. S Vellore Institute of Technology, India
Tomislav Dragicevic Aalborg University, Denmark
S. R. Sahaya Prabaharan SRM Institute of Science and Technology, India
Pierluigi Siano University of Salerno, Italy
Kai Ma Yanshan University, China
Cailian Chen Shanghai Jiao Tong University, China
Hao Liang University of Alberta, Canada
Bing Wang James Cook University, Australia
Roberto DiCecco University of Toronto, Canada
Lin Sun University of Toronto, Canada
Paul Chow University of Toronto, Canada
Sisi Liu James Cook University, Australia
Yun Liang Peking University, China
Liqiang Lu Peking University, China
xvi Organization SmartGIFT 2019

Qingcheng Xiao Peking University, China


Shengen Yan SenseTime Group, Hong Kong
Hui Tian Beijing University of Posts and Telecommunications,
China
Weipeng Guan South China University of Technology, China
Hongbin Liu James Cook University, Australia
Bhalchandra Hardas Visvesvaraya National Institute of Technology, India
Shengda Tang Central China Normal University, China
Shailesh Chaudhari University of California, USA
Danijela Cabric UCLA, USA
Yunfei Chen University of Warwick, UK
Hee-Seok Oh Seoul National University, South Korea
Sixing Yin Beijing University of Posts and Telecommunications,
China
Shufang Li Beijing University of Posts and Telecommunications,
China
Dawei Chen The Hong Kong University of Science
and Technology, Hong Kong
Tong Tong Imperial Vision, China
Gen Li Imperial Vision, China
Xiejie Liu Imperial Vision, China
Qinquan Gao Imperial Vision, China
Zhaowen Wang Adobe, USA
Ding Liu University of Illinois, USA
Jianchao Yang University of Illinois, USA
Kun Xiao Guangxi Normal University, China
Xiaole Cui Peking University ShenZhen Graduate School, China
Xiaoxin Cui Peking University, China
Paragkumar Thadesar Georgia Institute of Technology, USA
He Yu Chang chun University, China
Jeany Son Seoul National University, South Korea
Kang Han James Cook University, Australia
Weidang Lu Zhejiang University of Technology, China
Guangzhe Liu Zhejiang University of Technology, China
Bo Li Harbin Institute of Technology, China
Chandresh D. Parekha Raksha Shakti University, India
Tingting Liu Beihang University, China
Xiangyang Wang Southeast University, China
Hiroki Baba NTT Network Technology Laboratories, Japan
Hucheng Wang Beijing University of Posts and Telecommunications,
China
Shanzhi Chen Datang Telecom Technology and Industry Group,
China
Hongming Yang Changsha University of Science and Technology,
China
Jing Qiu The University of Newcastle, Australia
Organization SmartGIFT 2019 xvii

A. S. M. Ashraf Mahmud Heriot Watt University, UK


Bharat J. R. Sahu Sungkyunkwan University, South Korea
Jing Lei National University of Defense Technology, China
Dezhi Li Harbin Engineering University, China
Al-Sakib Khan Pathan Southeast University, Bangladesh
Lihui Feng Beijing Institute of Technology, China
Aiying Yang Beijing Institute of Technology, China
Xiansheng Guo University of Electronic Science and Technology
of China, China
Han Xiao Ocean University of China, China
Hao Zhang Ocean University of China, China
Zengfeng Wang Ludong University, China
Aaron Gulliver University of Victoria, Canada
Ming-li Lu NDSC, Zhengzhou University, China
Bruno Carpentieri University of Bozen-Bolzano, Italy
Kyung Sup Kwak Inha University, South Korea
Guoqiang Zheng Henan University of Science and Technology, China
Geng Yang Royal Institute of Technology (KTH), Sweden
Li Xie Royal Institute of Technology (KTH), Sweden
Qiang Chen Royal Institute of Technology (KTH), Sweden
Matti Mantysalo Tampere University of Technology, Finland
Xiaolin Zhou Fudan University, China
Zhibo Pang ABB Corporate Research, Sweden
Sharon Kao-Walter Blekinge Institute of Technology (BTH), Sweden
Li-Rong Zheng Royal Institute of Technology (KTH), Sweden
HanSeok Kim System Design Laboratory, Network Division,
Samsung Electronics, South Korea
Tong Zhang Beijing University of Posts and Telecommunications,
China
Shatarupa Dash Sungkyunkwan University, South Korea
Navrati Saxena Sungkyunkwan University, South Korea
Abhishek Roy System Design Laboratory, Network Division,
Samsung Electronics, South Korea
Wei Li National University of Defense Technology, China
Chunlin Xiong National University of Defense Technology, China
Ji-Bo Wei National University of Defense Technology, China
Tao Wang Shanghai University, China
Qi Huang University of Electronic Science and Technology
of China, China
Jian Li University of Electronic Science and Technology
of China, China
Jie Wu Sichuan Provincial Key Lab of Power System
Wide-Area Measurement and Control, China
Wei Zhen Sichuan Provincial Key Lab of Power System
Wide-Area Measurement and Control, China
xviii Organization SmartGIFT 2019

Jiasheng Liu Harbin Institute of Technology, China


Zhang Sheng-qing Southeast University, China
Jian-Chiun Liou National Kaohsiung University of Applied Sciences,
Taiwan
Kang Han James Cook University, Australia
Lingyu Zhou University of Electronic Science and Technology
of China, China
Yu Han Harbin Institute of Technology, China
Shi Jing University of Electronic Science and Technology
of China, China
Bing Wang James Cook University, Australia
Priyanka Mishra SHUATS, India
Sheraz Alam National University of Modern Languages, Pakistan
Rana Abbas The University of Sydney, Australia
Contents

Cloud Architecture and Scheduling

MCOPS-SPM: Multi-Constrained Optimized Path Selection Based Spatial


Pattern Matching in Social Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Ying Guo, Lianzhen Zheng, Yuhan Zhang, and Guanfeng Liu

A Multi-objective Computation Offloading Method


in Multi-cloudlet Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Kai Peng, Shuaiqi Zhu, Lixin Zheng, Xiaolong Xu,
and Victor C. M. Leung

A Survey of QoS Optimization and Energy Saving in Cloud,


Edge and IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Zhiguo Qu, Yilin Wang, Le Sun, Zheng Li, and Dandan Peng

A Multi-objective Computation Offloading Method for Hybrid Workflow


Applications in Mobile Edge Computing . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Kai Peng, Bohai Zhao, Xingda Qian, Xiaolong Xu, Lixin Zheng,
and Victor C. M. Leung

An Introduction and Comparison of the Application of Cloud


and Fog in IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Zheng Li and Yilin Wang

Distributed Cloud Monitoring Platform Based on Log In-Sight . . . . . . . . . . . 76


E. Haihong, Yuanxing Chen, Meina Song, and Meijie Sun

A Self-adaptive PSO-Based Dynamic Scheduling Method on Hierarchical


Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Shunmei Meng, Weijia Huang, Xiaolong Xu, Qianmu Li, Wanchun Dou,
and Bowen Liu

Application of Bluetooth Low Energy Beacons and Fog Computing


for Smarter Environments in Emerging Economies . . . . . . . . . . . . . . . . . . . 101
Mingxu Sun, Kondwani Michael Kamoto, Qi Liu, Xiaodong Liu,
and Lianyong Qi

Near-Data Prediction Based Speculative Optimization


in a Distribution Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Mingxu Sun, Xueyan Wu, Dandan Jin, Xiaolong Xu, Qi Liu,
and Xiaodong Liu
xx Contents

Rendering of Three-Dimensional Cloud Based on Cloud Computing . . . . . . . 123


Yonghua Xie, Xiaoyong Kou, Ping Li, and Xiaolong Xu

Cloud-Based Data Analytics

Distributed Stochastic Alternating Direction Method of Multipliers for Big


Data Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Huihui Wang, Xinwen Li, Xingguo Chen, Lianyong Qi, and Xiaolong Xu

Personalized Recommendation Algorithm Considering Time Sensitivity . . . . . 154


Fuzhen Sun, Haiyan Zhuang, Jin Zhang, Zhen Wang, and Kai Zheng

Cloud-Based Master Data Platform for Smart Manufacturing Process . . . . . . 163


Lei Ren, Ziqiao Zhang, Chun Zhao, and Guojun Zhang

A Semi-supervised Classification Method for Hyperspectral Images


by Triple Classifiers with Data Editing and Deep Learning. . . . . . . . . . . . . . 171
Guoming Zhang, Junshu Wang, Ge Shi, Jie Zhang, and Wanchun Dou

A Survey of Image Super Resolution Based on CNN . . . . . . . . . . . . . . . . . 184


Qianxiong Xu and Yu Zheng

Design and Development of an Intelligent Semantic Recommendation


System for Websites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Zhiqiang Zhang, Heping Yang, Di Yang, Xiaowei Jiang, Nan Chen,
Mingnong Feng, and Ming Yang

A Lightweight Neural Network Combining Dilated Convolution


and Depthwise Separable Convolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Wei Sun, Xijie Zhou, Xiaorui Zhang, and Xiaozheng He

Resource Allocation Algorithms of Vehicle Networks


with Stackelberg Game . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Ying Zhang, Guang-Shun Li, Jun-Hua Wu, Jia-He Yan,
and Xiao-Fei Sheng

Research on Coordination Control Theory of Greenhouse Cluster Based


on Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Xiangnan Zhang, Wenwen Gong, Yifei Chen, Dan Li, and Yawei Wang

Anomalous Taxi Route Detection System Based on Cloud Services . . . . . . . 240


Yu Zi, Yun Luo, Zihao Guang, Lianyong Qi, Taoran Wu,
and Xuyun Zhang

Collaborative Recommendation Method Based on Knowledge Graph


for Cloud Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Weijia Huang, Qianmu Li, Xiaoqian Liu, and Shunmei Meng
Contents xxi

Efficient Multi-user Computation Scheduling Strategy Based on Clustering


for Mobile-Edge Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Qing-Yan Lin, Guang-Shun Li, Jun-Hua Wu, Ying Zhang,
and JiaHe Yan

Grazing Trajectory Statistics and Visualization Platform Based


on Cloud GIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Dong Li, Chuanjian Wang, Qilei Wang, Tianying Yan, Ju Wang,
and Wanlong Bing

Cloud-Based AGV Control System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283


Xiangnan Zhang, Wenwen Gong, Haolong Xiang, Yifei Chen, Dan Li,
and Yawei Wang

Cloud Applications

A Parallel Drone Image Mosaic Method Based on Apache Spark . . . . . . . . . 297


Yirui Wu, Lanbo Ge, Yuchi Luo, Deqiang Teng, and Jun Feng

CycleSafe: Safe Route Planning for Urban Cyclists . . . . . . . . . . . . . . . . . . . 312


Mehdi Shah, Tianqi Liu, Sahil Chauhan, Lianyong Qi, and Xuyun Zhang

Prediction of Future Appearances via Convolutional Recurrent Neural


Networks Based on Image Time Series in Cloud Computing . . . . . . . . . . . . 328
Zao Zhang and Xiaohua Li

Video Knowledge Discovery Based on Convolutional Neural Network . . . . . 341


JinJiao Lin, ChunFang Liu, LiZhen Cui, WeiYuan Huang, Rui Song,
and YanZe Zhao

Time-Varying Water Quality Analysis with Semantical


Mining Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Jun Feng, Qinghan Yu, and Yirui Wu

Data-Driven Fast Real-Time Flood Forecasting Model for Processing


Concept Drift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Le Yan, Jun Feng, Yirui Wu, and Tingting Hang

A Survey on Dimension Reduction Algorithms in Big Data Visualization . . . . 375


Zheng Sun, Weiqing Xing, Wenjun Guo, Seungwook Kim, Hongze Li,
Wenye Li, Jianru Wu, Yiwen Zhang, Bin Cheng, and Shenghui Cheng

Quantum Searchable Encryption for Cloud Data Based on Delegating


Quantum Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
Yinsong Xu, Wenjie Liu, Junxiu Chen, and Lian Tong

Quantum Solution for the 3-SAT Problem Based on IBM Q . . . . . . . . . . . . 410


Ying Zhang, Yu-xiang Bian, Qiang Fan, and Junxiu Chen
xxii Contents

Cloud Grazing Management and Decision System Based on WebGIS . . . . . . 424


Dong Li, Chuanjian Wang, Tianying Yan, Qilei Wang, Ju Wang,
and Wanlong Bing

Application Design of Provincial Meteorological Service System Based


on National Unified Meteorological Data Environment . . . . . . . . . . . . . . . . 437
Qing Chen, Ming Yang, You Zeng, Yefeng Chen, Shucheng Wu,
Yun Xiao, and Yueying Hong

Moving Vehicle Detection Based on Optical Flow Method


and Shadow Removal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Min Sun, Wei Sun, Xiaorui Zhang, Zhengguo Zhu, and Mian Li

Refactor Business Process Models for Efficiency Improvement . . . . . . . . . . . 454


Fei Dai, Miao Liu, Qi Mo, Bi Huang, and Tong Li

A New Model of Cotton Yield Estimation Based on AWS. . . . . . . . . . . . . . 468


Quan Xu, Chuanjian Wang, Jianguo Dai, Peng Guo, Guoshun Zhang,
Yan Jiang, and Hongwei Shi

Cloud Security and Privacy

Intelligent System Security Event Description Method . . . . . . . . . . . . . . . . . 487


Jun Hou, Qianmu Li, Yini Chen, Shunmei Meng, Huaqiu Long,
and Zhe Sun

Designing a Bit-Based Model to Accelerate Query Processing Over


Encrypted Databases in Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
Sultan Almakdi and Brajendra Panda

Review of Research on Network Flow Watermarking Techniques . . . . . . . . . 519


Hui Chen, Qianmu Li, Shunmei Meng, Haiyuan Shen, Kunjin Liu,
and Huaqiu Long

A Multi-objective Virtual Machine Scheduling Algorithm in Fault


Tolerance Aware Cloud Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Heyang Xu, Pengyue Cheng, Yang Liu, Wei Wei, and Wenjie Zhang

PSVM: Quantitative Analysis Method of Intelligent System Risk


in Independent Host Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
Shanming Wei, Haiyuan Shen, Qianmu Li, Mahardhika Pratama,
Meng Shunmei, Huaqiu Long, and Yi Xia

Coordinated Placement of Meteorological Workflows and Data


with Privacy Conflict Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
Tao Huang, Shengjun Xue, Yumei Hu, Qing Yang, Yachong Tian,
and Dan Zeng
Contents xxiii

Method and Application of Homomorphic Subtraction of the Paillier


Cryptosystem in Secure Multi-party Computational Geometry. . . . . . . . . . . . 569
Meng Liu, Yun Luo, Chi Yang, Dongliang Xu, and Taoran Wu

A Secure Data Access Control Scheme Without Bilinear Pairing


in Edge Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
Xiaofei Sheng, Junhua Wu, Guangshun Li, Qingyan Lin,
and Yonghui Yao

Simulations on the Energy Consumption of WRF


on Meteorological Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Junwen Lu, Yongsheng Hao, and Xianmei Hua

A Survey of Information Intelligent System Security Risk Assessment


Models, Standards and Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
Zijian Ying, Qianmu Li, Shunmei Meng, Zhen Ni, and Zhe Sun

Smart Grid and Innovative Frontiers in Telecommunications

Multiple Time Blocks Energy Harvesting Relay Optimizing


with Time-Switching Structure and Decoding Cost . . . . . . . . . . . . . . . . . . . 615
Chenxu Wang, Yanxin Yao, Zhengwei Ni, Rajshekhar V. Bhat,
and Mehul Motani

Spectrum Sharing in Cognitive Radio Enabled Smart Grid:


A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
Shuo Chen

Colorization of Characters Based on the Generative Adversarial Network. . . . 636


Changtong Liu, Lin Cao, and Kangning Du

Enhanced LSTM Model for Short-Term Load Forecasting in Smart Grids . . . 650
Jianing Guo, Yuexing Peng, Qingguo Zhou, and Qingquan Lv

Time-Switching Energy Harvesting Relay Optimizing Considering


Decoding Cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
Wanqiu Hu, Yanxin Yao, Zhengwei Ni, Rajshekhar V. Bhat,
and Mehul Motani

A Resource Allocation Scheme for 5G C-RAN Based on Improved


Adaptive Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
Xinyan Ma, Yingteng Ma, and Dongtang Ma
xxiv Contents

A Novel Adaptive Multiple-Access Scheme for Wireless Chip Area


Network in the Smart Grid System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Xin-Yue Luo, Hao Gao, and Xue-Hua Li

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699


Cloud Architecture and Scheduling
MCOPS-SPM: Multi-Constrained Optimized
Path Selection Based Spatial Pattern Matching
in Social Networks

Ying Guo1(B) , Lianzhen Zheng1 , Yuhan Zhang1 , and Guanfeng Liu2


1 Qingdao University of Science and Technology, Qingdao 266061, Shandong, China
guoying@qust.edu.cn
2 Macquarie University, Sydney, Australia

Abstract. In this paper, we study the multi-constrained optimized path selection


based spatial pattern matching in Location-Based Social Network (MCOPS-SPM).
Given a set D including spatial objects (each with a social identity and a social
reputation) and social relationships (e.g., trust degree, social intimacy) between
them. We aim at finding all connections (paths) of objects from D that match a
user-specified multi-constraints spatial pattern P. A pattern P is a complex network
where vertices represent spatial objects, and edges denote social relationships
between them. The MCOPS-SPM query returns all the instances that satisfy P.
Answering such queries is computationally intractable, and we propose algorithms
to solve the multi-constrained optimized path matching problem and guide the join
order of the paths in the query results. An extensive empirical study over real-world
datasets has demonstrated the effectiveness and efficiency of our approach.

Keywords: Location-Based Social Network · Multiple constraints · Optimized


path selection · Spatial Pattern Matching

1 Introduction

The emerging Location-Based Social Network (LBSN) attracts a large number of partic-
ipants. Foursquare, Twitter and other applications make it easy for people to mark their
locations. This has aroused widespread interests among researchers. In LBSN, Multi-
Constrained Optimized Path Selection (MCOPS) has become a challenging problem. In
this paper, we study a Spatial Pattern Matching (SPM) problem based on MCOPS, that
is, in the LBSN, to find all the matches satisfying multi-constrained path pattern P in
the space objects set D. The multi-constraints in P include keyword constraint, distance
constraint, and social impact factors (trust, intimacy, social reputation) constraints. The
related Spatial Keyword Query (SKQ) and Graph Pattern Matching (GPM) have been
extensively studied.
In general, a spatial-keyword query (SKQ) [1–4] returns spatial objects that are spa-
tially close to each other and match the keywords. For example, top-k keyword query [5],
takes the spatial location and a set of keywords as parameters, returning k spatio-textual

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
X. Zhang et al. (Eds.): CloudComp 2019/SmartGift 2019, LNICST 322, pp. 3–19, 2020.
https://doi.org/10.1007/978-3-030-48513-9_1
4 Y. Guo et al.

objects that well meet the user’s requirements, and the k objects are sorted according to
the proximity of the query location and the relevance of the query keywords. Although
SKQ plays an important role in geo-location-oriented applications (e.g., Google Maps),
however, with the continuous emergence of new application scenarios, the requirements
of users are increasingly diversified, which results in the returned query results not
meeting the needs of users [6]. Moreover, various relationships between social network
participants (e.g., location relationships, social relationships) are not well represented.
Suppose that a user wishes to find a supplier, which is close to a bank and is far from
a retailer and a whole-seller. SKQ will return objects that are spatially close to each
other as shown in the dashed box in Fig. 1(a). However, users generally have restrictions
on the spatial objects of the query (e.g., the supplier is at least 10 km away from the
retailer in Fig. 1(b)). Therefore, the objects connected by the solid line in Fig. 1(a) are
the answer to the query that the user really wants. Second, simply using spatial indexing
structures (such as R-tree and their variants) requires dynamically creating an index for
each vertex, which results in serious overhead [7]. Therefore, the solution to the SKQ
problem cannot be directly applied to the MCOPS-SPM problem.

bank
20 whole-seller
{bank,supermarket} dis=[0,2]
supplier retailer td>=0.7
15 si>=0.1
doctor economist supplier
sr>=0.5
10 dis>=10 dis=[10,20]
td>=0.6 td>=0.7
si>=0.05 si>=0.2
5 whole-seller
retailer sr>=0.4 sr>=0.5

0 5 10 15 20 (km) retailer whole-seller

Fig. 1. MCOPS-SPM examples

In general, graph pattern matching (GPM) aims to find all matches of P in data
graph G according to a given pattern graph P [8]. However, using GPM algorithms
to solve MCOPS-SPM problem is not straightforward because (1) the solution to the
GPM problem is primarily designed for the data structure of the graph, rather than spatio-
textual objects indexed by an IR-tree index structure, (2) in the pattern graph, only a single
constraint (such as hops or distances) among vertices is generally considered. Therefore,
if GPM is used to solve the MCOPS-SPM problem, it is necessary to convert the spatial
objects into graphs and extend the distance-based constraint to multi-constraints. The
experiments in [7] prove that it is not efficient.
There are few studies on Spatial Pattern Matching (SPM). [9] proposed a database
query language based on time mode, spatial mode and spatiotemporal mode. In [7], a
SPM algorithm is proposed, but only a single constraint (different expression of distance
constraint) is considered, which cannot meet the requirements of the user’s multiple
constraints.
We use an example in [10] to illustrate the importance of specifying multiple con-
straints for query keywords. In business activities, the pattern graph can be specified to
look for keywords about suppliers, retailers, whole-sellers, banks in the social network.
MCOPS-SPM: Multi-Constrained Optimized Path Selection Based SPM 5

The supplier directly or indirectly provides the retailer, whole-seller with products. Sup-
pliers, retailers, whole-sellers obtain services directly or indirectly from the same bank.
As shown in Fig. 1, the user specifies the supplier is at least 10 km from the retailer and
the trust value is at least 0.6, the intimacy is at least 0.05, and the social reputation is at
least 0.4 in the field. However, SKQ and GPM tend to ignore the distance constraint and
social impact factor constraints of these problems, and the results of the query are often
not of the most interest to the users.
In order to facilitate users to specify the spatial relationships between the keywords
and the social relationships, we propose a multi-constrained optimized path selection
based spatial pattern matching query (MCOPS-SPM). As shown in Fig. 1, given a set of
spatial objects D (Fig. 1 (a)) and a spatial path pattern P (Fig. 1 (b)), MCOPS-SPM returns
all matches about P in D. The pattern P is a complex network in which vertices represent
spatial objects associated with keywords, edges represent spatial distance relationships
between objects, and social relationships. For example, the distance between the user-
specified bank and the supplier is [0, 2] (km), the trust value is at least 0.7, the intimacy
is at least 0.1, and the social reputation is at least 0.5. In this example, the four objects
connected by solid lines satisfy all constraints in P, which is a match of pattern P.
The main research contents of this paper are as follows:

1. We first proposed Multi-Constrained Optimized Path Matching algorithm


(MCOPM). Different from the traditional path selection algorithms, MC-SPM based
on MCOPS aims to find the matching of the spatial path pattern P in D. The vertices
of the matching results satisfy the query keywords, and satisfy the spatial relationship
and social relationship among the spatial objects. This will well support LBSN-based
applications.
2. In general, participants and social relationships in social networks are relatively
stable for a long period of time. We use IR-tree as an index structure, which is more
effective in keyword search and distance pruning. It can effectively reduce search
space and improve effectiveness.
3. Based on the IR-tree index structure, we propose an IR-tree based multi-constrained
optimized path matching algorithm, namely IR-MCOPM. Matches of the multiple
constrained paths of P in D can be found.
4. After mapping all the edges in P to corresponding paths in D, they need to be
connected in a certain order to form a complete answer. Therefore, a sampling-
based estimation algorithm is proposed to guide the connection order of the paths at
the matching result in an efficient way, namely MCPJoin.

The rest of this paper is organized as follows. We first review the related work on
SKQ and GPM in Sect. 2. Then we introduce the necessary concepts and formulate the
focal problem of this paper in Sect. 3. Section 4 presents our solutions MCOPM, IR-
MCOPM, MCPJoin algorithms. We report experimental results in Sect. 5 and conclude
in Sect. 6.
6 Y. Guo et al.

2 Related Works
The most related works about spatial pattern matching are spatial keyword query and
graph pattern matching. Below we analyze each of them in detail.

2.1 Spatial Keyword Query (SKQ)


In general, researches on SKQ issues can be roughly divided into two types. The first
is m-Closest Keywords query [1, 11]. Given spatial data D, the mCK query returns a
collection of objects that are spatially close to each other. The objects in the collection
satisfy the m keywords specified by the user. [1] proposes an index structure of bR*-tree,
and uses distance and keyword constraints to reduce the search space.
The second is the top-k SKQ. Top-k SKQ returns the objects with the highest sorting
scores, determined by the sorting function, which takes into account both spatial proxim-
ity and text correlation [12]. In order to improve the efficiency of the query, some index
structures are proposed, which can be divided into two types of structures depending on
the method used. One is an R-Tree based index structure, such as: KR*-Tree [13], Hybrid
Spatial-Keyword Indexing (SKI) [14], IR-tree [15], Spatial Inverted Index (S2I) [5], The
other is a grid-based index structure, such as: Spatial-Keyword Inverted File (SKIF) [16].
In [17], the author used W-IBR-Tree (using keyword partitioning and inverted bitmaps
to organize spatial objects) to solve the joint top-k SKQ problem. Recently, [18] pro-
posed why the answer is why-not (SKQ), returning the result of the smallest modified
query containing the expected answer. In [19], in order to improve the query efficiency
in space, semantics and text dimensions, the NIQ-tree and LHQ-tree hybrid indexing
methods are proposed, and the similarity in these three dimensions is used to prune the
search space.
However, our proposed MCOPS-SPM can more clearly reflect users’ needs. The
MCOPS-SPM problem is also related to the multi-way spatial join [20]. In [21], the
vertices in the data graph G are transformed into points in the vector space by the
graph embedding method, which converts pattern matching queries into distance-based
multi-paths-joining problems on vector space. However, in these solutions, the keyword
attributes and multi-constraints between objects are not considered, so they cannot be
directly applied to the MCOPS-SPM solution.

2.2 Graph Pattern Matching (GPM)


There are two types of GPM issues in the references. The first one is subgraph isomor-
phism [10, 22–24]. The subgraph isomorphism is an exact match between the data graph
and the pattern graph. It aims to find the subgraph that exactly matches the pattern graph
on the nodes and edges properties in the data graph [25]. [25] indicates that the subgraph
isomorphism requires too strict conditions and poor scalability, and it is difficult to find
a useful matching pattern in the data graph.
The second type of GPM problem is graph simulation. [26–28] pointed out that the
graph simulation has more loose constraints, and it is convenient to search the data graph
for the subgraph matching the specified pattern P. The returned subgraph can well meet
the users’ requirements, but it still needs to execute the edge to edge mapping, which is
MCOPS-SPM: Multi-Constrained Optimized Path Selection Based SPM 7

still very harsh for applications that need to meet the specified path length. In order to
solve the above problem, a bounded simulation is proposed in [8], in which each node
has an attribute, each edge is associated with the path length (hops), and the value of
each edge is One of len and *, len indicates that the path length cannot exceed len, and
* indicates that there is no constraint on the path length. The bounded simulation maps
the edges in pattern P to paths that meet the specified length in the data graph, further
reducing the strict constraints, thereby better capturing users’ intents.
There are some algorithms that connect the searched edges in a certain order [21].
In [21], an MDJ (Multi-Distance-Join) algorithm is proposed to guide the connection
order of edges. In [10], the author proposed an R-join algorithm based on reachability
conditions, using the B+ -tree structure as the index method.
However, the solutions above mentioned are based on a single constraint algorithm,
and can not meet the requirements of multiple constraints specified by users, so these
methods can not be directly applied to the MCOPS-SPM problem.

3 Problem Definition
3.1 Social Impact Factors
Social networks can be modeled as directed graphs, and we use G = (V, E) to express
social networks. Where V = {v1 , v2 , . . . , vn } represents a collection of vertices, each
vertex vi represents a participant in a social network. E = {e1 , e2 , . . . , em } is a collection
representing edges, each edge ej represents an interaction or social relationships between
two participants. However, the factors that influence social networks are always diverse,
and we cannot draw precise conclusions based on a single condition. We propose four
factors that influence social networks:
Social Identities. In a social network, each participant has his or her own identities, rep-
resented by keywords k(vi ). Each participant may have multiple identities (for example,
a digital blogger may be a student at a university), so the social identities help describe
the social roles of participants.
Trust Degree. In a social network, trust degree refers to the level of trust  that one par-
ticipant forms in the interaction process with another participant.  Let  vi , vj ∈ [0, 1]
td
indicate the trust degree that participant
 v
 i evaluates v j . If td vi , v j = 1, it represents
that vi completely trusts vj while td vi , vj = 0 represents vi wholly distrusts vj .
Social Intimacy. In social networks, intimacy refers to the degree of intimacy formed
between participants during the participation of social
 activities.
 It reflects the frequency
of interaction between the two participants.
  si v ,
i jv ∈ [0, 1] reflects the degree of
intimacy between vi and vj . When si vi , vj = 1, it expresses that vi and vj are the most
intimate. On the contrary, they have the least intimate social relationships.
Social Reputation. In social networks, social reputation refers to the extent to which a
participant contributes in the field. It reflects the extent to which all participants rated this
participant. Let sr(vi ) ∈ [0, 1] denote social reputations in the domain. Here sr(vi ) = 1
represents that vi has won the best reputations in the domain. Otherwise, there is no
foothold for vi in this field.
8 Y. Guo et al.

3.2 Social Impact Factor Aggregations


In order to meet the requirements of different conditions of users, the match of an edge
in the pattern P may be a path in the data graph G. Then we need to aggregate the social
impact factors along this path [29].
Trust Degree Aggregation. The aggregation of trust degree between source participants
and target participants can be calculated according to the following formula [29]:
  
td(p) = td vi , vj (1)
(vi ,vj ) ∈ p
Where, p represents
 a complete path from the source participant to the target
participant, vi , vj represents the path between vi and vj .
Social Intimacy Aggregation. The social intimacy aggregation between the source
participant and the target participant is calculated according to the following formula
[29]:
  
(vi ,vj ) ∈ p si vi, vj
si(p) = (2)
εσ
Where, ε denotes the length (hops) of the path from the source participant to the
target participant, σ is called the attenuation factor that controls the decay rate.
Social Reputation Aggregation. The social reputation aggregation on the path p is
calculated according to the following formula [29]:
n−1
sr(vi )
sr(p) = i=2 (3)
n−2
Here, in addition to the source and target participants, a weighted average of their
social reputations is made to express the social reputation about the path p.

3.3 Multi-constrained Path Pattern


The multi-constrained path pattern P is a complex social network (for convenience of
description, we will collectively refer to pattern P below). P = (V, E, KV, MCE) obeys
the following constraints:

• V and E are the vertex and edge sets in P respectively;


• KV(Vi ) is a collection of keywords (social identities) that the user specifies on vertices
vi ;
• For (u, v) ∈ E, MCE(u, v) is the multi-constraints that users specified on edge (u,
v). MCE(u, v) = {dis(u, v), td(u, v), si(u, v), sr(u, v)}, ∀ϕ ∈ {td, si, sr}, ϕ ∈ [0, 1].
Where, dis(u, v) denotes their distance limits in real world. We assume the distance
metric is Euclidean.

For example, in the pattern P of Fig. 1(b), the limit of distance between bank and
supplier is at [0, 2] km, trust degree is no less than 0.7, social intimacy is not less than
0.1, social reputation is no less than 0.5.
Another random document with
no related content on Scribd:
city, membership in which now, I was informed, amounted to
10,000. The chief organizer was a shrewd mestizo, a former
close companion of Aguinaldo, by whom he had been commissioned
to perform this work. He was a friend and associate of some of
our officers; was engaged in organizing the clubs only, as he
stated, to give the poorer classes amusement and education;
held public entertainments in athletics to which our officers
were invited, and in which our soldiers were asked to
participate. Gradually arms were being secretly introduced and
bolos were being manufactured and distributed. The arms were
kept concealed in buildings, and many of them were
subsequently captured. The Chinamen were carrying on a
lucrative business in bolo making, but the provost-marshal had
cruelly seized considerable of their stock. These clubs had
received military organization and were commanded by cunning
Filipino officers regularly appointed by the Malolos
government. The chief organizer departed after organization
had been perfected and thereafter became a confidential
adviser in Malolos affairs. This organization was the subject
of grave apprehension, as it was composed of the worst social
element of the city, and was kept under police supervision as
closely as possible. … The streets of the city were thronged
with unarmed insurgent officers and enlisted men from the
numerically increasing insurgent line on the outskirts, proud
of their uniforms and exhibiting matchless conceit, amusing to
our men, who were apparently unconcerned observers, but who
were quick to take in the rapidly changing conditions. …

"Greater precautionary measures were directed and taken in the


way of redistributing organizations throughout the city, in
advancing and strengthening (though still far within our own
mutually conceded military lines) our posts of observation,
and for the quick response of the men if summoned for
defensive action. Otherwise no change in the conduct,
condition, or temper of the troops was observable. So quietly
were these precautions effected that Filipino citizens,
noticing the apparent indifference of our men, warned me
repeatedly of the danger to be apprehended from a sudden
simultaneous attack of the insurgents within and without the
city, and were quietly informed that we did not anticipate any
great difficulty. Another very noticeable proof of
premeditated intent on the part of the insurgents was
perceived in the excitement manifested by the natives and
their removal in large numbers from the city. All avenues of
exit were filled with vehicles transporting families and
household effects to surrounding villages. The railway
properties were taxed to their utmost capacity in carrying the
fleeing inhabitants to the north within the protection of the
established insurgent military lines. Aguinaldo, by written
communications and messages, invited his old-time friends to
send their families to Malolos, where their safety was
assured, but Hongkong was considered a more secure retreat and
was taken advantage of. A carefully prepared estimate showed
that 40,000 of the inhabitants of the city departed within the
period of fifteen days."

Report of General Otis, August 31, 1899


(Message and Documents: Abridgment, 1899-1900,
volume 2, pages 1075-88).

The counter-proclamation of Aguinaldo, referred to above by


General Otis, was issued on the 5th of January, 1899, from
Malolos, addressed to My brothers, the Filipinos, all the
honorable consuls, and other foreigners." It said:

"Major General E. S. Otis's proclamation published yesterday


in the Manila papers obliges me to circulate the present one,
in order that all who read and understand it may know of my
most solemn protest against said proclamation, for I am moved
by my duty and my conscience before God, by my political
obligations with my beloved country, by my official and
private relations to the North American nations.
{378}
In the above mentioned proclamation, General Otis calls
himself 'Military Governor in the Philippines,' and I protest
once and a thousand times, with all the energy in my soul,
against such an authority. I solemnly proclaim that I have
never had, either at Singapore or here in the Philippines, any
verbal or written contract for the recognition of American
sovereignty over this cherished soil. … Our countrymen and
foreigners are witnesses that the land and naval forces of the
United States existing here have recognized by act the
belligerency of the Philippines, not only respecting but also
doing public honor to the Filipino banner, which triumphantly
traversed our seas in view of foreign nations represented here
by their respective consuls.

"As in his proclamation General Otis alludes to some


instructions issued by His Excellency the President of the
United States relating to the administration of affairs in the
Philippines, I solemnly protest in the name of God, root and
source of all justice and all right, who has visibly acceded
me the power to direct my dear brethren in the difficult task
of our regeneration, against this intrusion of the United
States Government in the administration of these islands. In
the same manner I protest against such an unexpected act which
treats of American sovereignty in these islands in the face of
all antecedents that I have in my possession referring to my
relations with the American authorities, which are unequivocal
testimony that the United States did not take me out of Hong
Kong to make war against Spain for their own benefit, but for
the benefit of our liberty and independence, to which end said
authorities verbally promised me their active support and
efficacious co-operation. So that you all may understand it,
my beloved brothers, it is the principle of liberty and
absolute independence that has been our noble ambition for the
purpose of obtaining the desired object, with a force given by
the conviction, now very widespread, not to retrace the path
of glory that we have passed over."-

United States, 56th Congress, 1st Session,


Senate Document 208, page 103.

PHILIPPINE ISLANDS: A. D. 1899 (January).


Appointment of the First Commission to the Philippines
and the President's instructions to it.

On the 20th of January, 1899, the President of the United


States addressed the following communication to the Secretary
of State: "My communication to the Secretary of War, dated
December 21, 1898, declares the necessity of extending the
actual occupation and administration of the city, harbor, and
bay of Manila to the whole of the territory which by the
treaty of Paris, signed on December 10, 1898, passed from the
sovereignty of Spain to the sovereignty of the United States,
and the consequent establishment of military government
throughout the entire group of the Philippine Islands. While
the treaty has not yet been ratified, it is believed that it
will be by the time of the arrival at Manila of the
commissioners named below. In order to facilitate the most
humane, pacific, and effective extension of authority
throughout these islands, and to secure, with the least
possible delay, the benefits of a wise and generous protection
of life and property to the inhabitants, I have named Jacob G.
Schurman, Rear-Admiral George Dewey, Major General Elwell S.
Otis, Charles Denby, and Dean C. Worcester to constitute a
commission to aid in the accomplishment of these results. In
the performance of this duty, the commissioners are enjoined
to meet at the earliest possible day in the city of Manila and
to announce, by a public proclamation, their presence and the
mission intrusted to them, carefully setting forth that, while
the military government already proclaimed is to be maintained
and continued so long as necessity may require, efforts will
be made to alleviate the burden of taxation, to establish
industrial and commercial prosperity, and to provide for the
safety of persons and of property by such means as may be
found conducive to these ends.
"The commissioners will endeavor, without interference with
the military authorities of the United States now in control
of the Philippines, to ascertain what amelioration in the
condition of the inhabitants and what improvements in public
order may be practicable, and for this purpose they will study
attentively the existing social and political state of the
various populations, particularly as regards the forms of
local government, the administration of justice, the
collection of customs and other taxes, the means of
transportation, and the need of public improvements. They will
report through the Department of State, according to the forms
customary or hereafter prescribed for transmitting and preserving
such communications, the results of their observations and
reflections, and will recommend such executive action as may
from time to time seem to them wise and useful. The
commissioners are hereby authorized to confer authoritatively
with any persons resident in the islands from whom they may
believe themselves able to derive information or suggestions
valuable for the purposes of their commission, or whom they
may choose to employ as agents, as may be necessary for this
purpose.

"The temporary government of the islands is intrusted to the


military authorities, as already provided for by my
instructions to the Secretary of War of December 21, 1898, and
will continue until Congress shall determine otherwise. The
commission may render valuable services by examining with
special care the legislative needs of the various groups of
inhabitants, and by reporting, with recommendations, the
measures which should be instituted for the maintenance of
order, peace, and public welfare, either as temporary steps to
be taken immediately for the perfection of present
administration, or as suggestions for future legislation. In
so far as immediate personal changes in the civil
administration may seem to be advisable, the commissioners are
empowered to recommend suitable persons for appointment to
these offices from among the inhabitants of the islands who
have previously acknowledged their allegiance to this
Government.

"It is my desire that in all their relations with the


inhabitants of the islands the commissioners exercise due
respect for all the ideals, customs, and institutions of the
tribes which compose the population, emphasizing upon all
occasions the just and beneficent intentions of the Government
of the United States. It is also my wish and expectation that the
commissioners may be received in a manner due to the honored
and authorized representatives of the American Republic, duly
commissioned on account of their knowledge, skill, and
integrity as bearers of the good will, the protection, and the
richest blessings of a liberating rather than a conquering
nation.

WILLIAM McKINLEY."

Report of the Philippine Commission, January 31, 1900,


volume 1, exhibit 2 (page 185).

{379}

PHILIPPINE ISLANDS: A. D. 1899 (January-February).


Causes of and responsibility for the outbreak of hostilities
between the Americans and the Filipinos.

"The Philippine Information Society," organized for the


purpose of "placing within reach of the American people the
most reliable and authoritative evidence attainable in regard
to the people of the Philippine Islands and our relations to
them," has published in Number VII of the First Series of its
pamphlets a carefully made collection of information, from
official and other sources, relative to the circumstances in
which hostilities between the American and Filipino forces
came about. On this as on other subjects which the society has
investigated it seems to have pursued its inquiries with no
aim but to learn and set forth the truth. Its conclusions,
resting on the evidence which it submits, are stated in an
introduction to the pamphlet as follows:

"It will presumably he admitted that the important question


with regard to the Outbreak of Hostilities, February 4, 1899,
is not, who fired the first shot, but who was responsible for
the conditions that made it evident to every observer weeks
before the clash came that a single shot might bring on war. …
The situation may be briefly explained as follows: We believed
that the Philippine Archipelago was and ought to be ours, and
we were moving to take possession as rapidly as possible. The
Filipinos, or at least Aguinaldo's government and followers,
believed that the country was theirs and they resented every
effort on our part to occupy it. We considered it ours through
cession from Spain and right of conquest. They claimed that
Spain no longer held possession of the country and therefore
had no right to cede it to us; moreover, that by right of
conquest we were entitled only to temporary occupation of
Manila. We wished to extend our sovereignty throughout the
Archipelago with all possible dispatch. They desired
independence, or at least a protectorate which, while securing
them from foreign aggression, should leave them control of
their internal affairs. While a discussion of the justice of
either position does not come within the limits of the present
inquiry, it is important to remember that from the first a
minority in this country urged that the Filipinos were
entitled to a promise of ultimate independence, and that a
resolution of Congress, similar to that passed in the case of
Cuba, would avert all occasion for war. This course having
been rejected by our country, the question arises, did the
assertion of United States sovereignty render war inevitable? …

"No doubt most Americans believe that left to themselves the


Filipinos would soon have lapsed into anarchy, while a few
maintain that with temporary assistance in international
affairs they would have developed a government better suited
to their peculiar needs than we can ever give them. Still
others who are familiar with the Filipinos and kindred races
believe that their aspiration for an independent national
existence was not deep rooted, that had we adopted an
affectionate, admiring tone to their leaders, had we
recognized their government and approved of it, we could soon
have made their government our government, could have been as
sovereign as we pleased, and had the people with us. Whatever
view one may hold, it must be admitted that if we were to
establish our sovereignty by peaceful methods it was essential
to win the confidence and affection of the Filipinos. … There
is every indication that the Filipinos were prepared, at
first, to treat us as friends and liberators. General Anderson
tells the following interesting story: The prevailing
sentiment of the Filipinos towards us can be shown by one
incident. About the middle of July the insurgent leaders in
Cavite invited a number of our army and navy officers to a
banquet. There was some post-prandial speech-making, the
substance of the Filipino talk being that they wished to be
annexed but not conquered. One of our officers in reply
assured them that we had not come to make them slaves, but to
make them free men. A singular scene followed. All the
Filipinos rose to their feet, and Buencomeno, taking his
wine-glass in his hand, said: We wish to be baptized in that
sentiment. Then he and the rest poured the wine from their
glasses over their heads. After the very first, however, the
cultivation of intimate relations with the Filipino leaders
seems to have been considered unimportant or inadvisable.
General Merritt states that he never saw Aguinaldo. Social
intercourse between our officers and the Filipinos was
discouraged by General Otis. In fact after the surrender of
Manila General Whittier seems to have been the only one of our
superior officers who ever had a personal interview with
Aguinaldo.

"Certainly after the proclamation of January 4, [see above: A.


D. 1898-1899 (JANUARY-FEBRUARY)] war could only have been
avoided by a decisive action of Congress promising ultimate
independence to the Filipinos. That proclamation of January 4
raised the issue and provoked the counter proclamation of
January 5, which so stirred the people against us—a
proclamation in which Aguinaldo once and a thousand times and
with all the energy of his soul protested against American
sovereignty, and which closed with the words, 'upon their
heads be all the blood which may be shed.' …

"Aguinaldo's proclamation was followed by a series of


conferences of which General Otis reports 'It was one
continued plea for some concession that would satisfy tho
people.' On January 16th he cabled to Washington, 'Aspiration
Filipino people is independence with restrictions resulting
from conditions which its government agree with American when
latter agree to officially recognize the former.' Finally on
January 25th he sent word to the insurgent commissioners that
'To this dispatch no reply has been received.' From this time
General Otis states, the insurgents hurried forward
preparations for war. Contemporaneous with these events in the
Philippines the Treaty of Peace was pending in the United
States Senate where it had been assigned for a vote on
February 6th.

"With regard to the actual outbreak of' hostilities, there is


a sharp difference of opinion. The United States press
dispatches announcing the outbreak, and the contemporaneous
newspaper statements by the Filipinos … are of interest as
evidence that from the very first each side claimed the other
to be the aggressor.
{380}
As to which of these opposing claims is borne out by the
facts, the editors would say that after careful study of all
the accessible evidence they find that according to the most
authoritative statements the outbreak occurred as the result
of a trespass by four armed Filipinos on territory admitted by
the Filipino in command to be within the jurisdiction of the
United States. The number of Filipinos has been variously
estimated. The editors follow the report of General MacArthur
in command of the division in which the firing began, which
agrees with the report of Second-Lieutenant Wheedon of the
First Nebraska U. S. Volunteer Infantry, stationed at Santa
Mesa. The action of the Filipino trespassers seems to have
been an instance of bad discipline in the insurgent army.
Certainly it was not ordered on that date by the insurgent
leaders, although there are some indications that the leaders
had planned to attack in a few days. The claim that our forces
instigated the attack for the purpose of securing the votes
necessary to ratify the treaty is absolutely unsupported by
any evidence which has come to the attention of the editors."

Philippine Information Society,


Publications, First Series, VII., Introduction.

PHILIPPINE ISLANDS: A. D. 1899 (January-November).


Attack on American forces by the Tagalos.
Continued hostilities.
Progress of American conquest.

"No definite date had been set for the attack [by the hostile
Tagalos], but a signal by means of rockets had been agreed
upon, and it was universally understood that it would come
upon the occurrence of the first act on the part of the
American forces which would afford a pretext; and in the lack
of such act, in the near future at all events. Persistent
attempts were made to provoke our soldiers to fire. The
insurgents were insolent to our guards and made persistent and
continuous efforts to push them back and advance the insurgent
lines farther into the city of Manila. … With great tact and
patience the commanding general had held his forces in check,
and he now made a final effort to preserve the peace by
appointing a commission to meet a similar body appointed by
Aguinaldo and to 'confer with regard to the situation of
affairs and to arrive at a mutual understanding of the intent,
purposes, aims, and desires of the Filipino people and of the
people of the United States.' Six sessions were held, the last
occurring on January 29, six days before the outbreak of
hostilities. No substantial results were obtained, the
Filipino commissioners being either unable or unwilling to
give any definite statements of the 'intent, purposes, and
aims of their people.' At the close of the last session they
were given full assurances that no hostile act would be
inaugurated by the United States troops. The critical moment
had now arrived. Aguinaldo secretly ordered the Filipinos who
were friendly to him to seek refuge outside the city. The
Nebraska regiment at that time was in camp on the east line at
Santa Mesa, and was guarding its front. For days before the
memorable 4th of February, 1899, the outposts in front of the
regiment had been openly menaced and assaulted by insurgent
soldiers; they were attempting to push our outposts back and
advance their line. They made light of our sentinels and
persistently ignored their orders. On the evening of the 4th
of February, an insurgent officer came to the front with a
detail of men and attempted to pass the guard on the San Juan
Bridge, our guard being stationed at the west end of the
bridge. The Nebraska sentinel drove them back without firing,
but a few minutes before 9 o'clock that evening a large body
of insurgent troops made an advance on the South Dakota
outposts, which fell back rather than fire. About the same
time the insurgents came in force to the east end of the San
Juan Bridge, in front of the Nebraska regiment. For several
nights prior thereto a lieutenant in the insurgent army had
been coming regularly to our outpost No. 2, of the Nebraska
regiment, and attempting to force the outpost back and
insisting on posting his guard within the Nebraska lines; and
at this time and in the darkness he again appeared with a
detail of about six men and approached Private Grayson, of
Company D, First Nebraska Volunteers, the sentinel on duty at
outpost No. 2. He, after halting them three times without
effect, fired, killing the lieutenant, whose men returned the
fire and then retreated. Immediately rockets were sent up by
the Filipinos, and they commenced firing all along the line, …
and continued to fire until about midnight; and about 4
o'clock on the morning of February 5 the insurgents again
opened fire all around the city and kept it up until the
Americans charged them and drove them with great slaughter out
of their trenches."

Philippine Commission, Preliminary Report


(Exhibit 1.—Report, January 31, 1900,
volume 1, pages 174-175).

"They [the insurgents] were promptly repulsed in a series of


active engagements which extended through the night of the
4th, and the 5th, 6th, and 10th days of February. Our lines
were extended and established at a considerable distance from
the city in every direction. On the 22d of February a
concerted rising of the Tagalogs in the city of Manila, of
whom there are about 200,000, was attempted, under
instructions to massacre all the Americans and Europeans in
the city. This attempt was promptly suppressed and the city
was placed under strict control. The troops composing the
Eighth Army Corps under General Otis's command at that time
were of regulars 171 officers and 5,201 enlisted men and of
volunteers 667 officers and 14,831 enlisted men, making an
aggregate of 838 officers and 20,032 enlisted men. All of the
volunteers and 1,650 of the regulars were, or were about to
become entitled to their discharge, and their right was
perfected by the exchange of ratifications of the treaty on
the 11th of April. …

"The months of the most intense heat, followed by the very


severe rainy season of that climate, were immediately
approaching, and for any effective occupation of the country
it was necessary to await both the close of the rainy season
and the supply of new troops to take the place of those about
to be discharged. Practically all the volunteers who were then
in the Philippines consented to forego the just expectation of
an immediate return to their homes, and to remain in the field
until their places could be supplied by new troops. They
voluntarily subjected themselves to the dangers and casualties
of numerous engagements, and to the very great hardships of
the climate. They exhibited fortitude and courage, and are
entitled to high commendation for their patriotic spirit and
soldierly conduct. …

{381}

"No attempt was … made to occupy the country, except in the


vicinity of Manila, and at such points as were important for
the protection of our lines. Such movements as passed beyond
this territory were designed primarily to break up threatening
concentrations of insurgent troops, and to prevent undue
annoyance to the positions which we occupied. On the 11th of
February the city of Iloilo, on the island of Panay, the
second port of the Philippines in importance, was occupied.
After the capture of Iloilo the navy took possession of the
city of Cebu, on the island of Cebu, and on the 26th of
February a battalion of the 23d Infantry was dispatched to
that port for the protection of the inhabitants and property.
On the 1st of March a military district comprising the islands
of Panay, Negros, and Cebu, and such other Visayan islands as
might be thereafter designated, to be known as the 'Visayan
Military District,' was established and placed under the
supervision of Brigadier General Marcus P. Miller, commanding
1st Separate Brigade, Eighth Army Corps, with headquarters at
Iloilo. The 3d Battalion of the 1st California Volunteer
Infantry was thereupon ordered to the island of Negros, under
the command of Colonel (now Brigadier General) James F. Smith,
and took possession of the city of Bacolod, on that island,
without resistance. On the 5th of May Brigadier General James
F. Smith assumed temporary command of the Visayan military
district, and on the 25th of May Brigadier General R. P.
Hughes, United States Volunteers, was assigned to the command
of the district. On the 19th of May the Spanish garrison at
Jolo, in the Sulu Archipelago, was replaced by American
troops. By the 31st of August the number of troops stationed
at Jolo and the Visayan Islands, including a small guard at
the Cavite Arsenal, amounted to 4,145. …

"All of the forces who were entitled to be discharged as above


mentioned have now [November. 29, 1899] been returned to this
country and mustered out. The new troops designed to take the
place of those returning to this country, and to constitute an
effective army for the occupation of the Philippines, have
been transported to Manila. … The troops now in the
Philippines comprise 905 officers and 30,578 men of the
regular force, and 594 officers and 15,388 men of the
volunteer force, making an aggregate of 1,499 officers and
45,966 men, and when the troops on the way have arrived the
total force constituting the Eighth Army Corps will be 2,051
officers and 63,483 men.

"By the 10th of October the process of changing armies and the
approach of the dry season had reached a point where an
advance toward the general occupation of the country was
justified. At that time the American lines extended from the
Bay of Manila to Laguna de Bay, and included considerable
parts of the provinces of Cavite, Laguna, and Morong to the
south and east of Manila, substantially all of the province of
Manila and the southern parts of Bulacan and Pampanga,
dividing the insurgent forces into two widely separated parts.
To the south and east of our lines in Cavite and Morong were
numerous bands occasionally concentrating for attack on our
lines, and as frequently dispersed and driven back toward the
mountains. On the 8th or October, the insurgents in this
region having again gathered and attacked our lines of
communication, General Schwan with a column of 1,726 men
commenced a movement from Bacoor, in the province of Cavite,
driving the enemy through Old Cavite, Noveleta, Santa Cruz,
San Francisco de Malabon, Saban, and Perez das Marinas,
punishing them severely, scattering them and destroying them
as organized forces, and returning on the 13th to Bacoor. On
the north of our lines stretched the great plain of central
Luzon extending north from Manila about 120 miles. This plain
comprises parts of the provinces of Manila, Pampanga, Bulacan,
Tarlac, Nueva, Ecija, and Pangasinan. It is, roughly speaking,
bounded on the south by the Bay of Manila: on the east and
west by high mountain ranges separating it from the seacoasts,
and on the north by mountains and the Gulf of Lingayen.
Through the northeast and central portion flows the Rio Grande
from the northern mountains southwesterly to the Bay of Manila,
and near the western edge runs the only railroad on the island
of Luzon, in a general southeasterly direction from Dagupan,
on the Bay of Lingayen, to Manila. In this territory Aguinaldo
exercised a military dictatorship, and with a so-called
cabinet imitated the forms of civil government, having his
headquarters at Tarlac, which he called his capital, and which
is situated near the center of the western boundary of the
plain.

"The operations commenced in October involved the movement of


three separate forces:

(1) A column proceeding up the Rio Grande and along the


northeastern borders of the plain and bending around to the
westward across the northern boundary toward the Gulf of
Lingayen, garrisoning the towns and occupying the mountain
passes which gave exit into the northeastern division of the
island.

(2) An expedition proceeding by transports to the Gulf of


Lingayen, there to land at the northwestern corner of the
plain and occupy the great coast road which from that point
runs between the mountains and the sea to the northern
extremity of the island, and to proceed eastward to a junction
with the first column.

(3) A third column proceeding directly up the railroad to the


capture of Tarlac, and thence still up the road to Dagupan,
driving the insurgent forces before it toward the line held by
the first two columns.

These movements were executed with energy, rapidity, and


success, notwithstanding the exceedingly unfavorable weather
and deluges of rain, which rendered the progress of troops and
transportation of subsistence most difficult. On the 12th of
October a strong column under General Lawton, with General
Young commanding the advance, commenced the northerly movement
up the Rio Grande from Arayat, driving the insurgents before
it to the northward and westward. On the 18th the advance
reached Cabiao. On the 19th San Isidro was captured, and a
garrison established; on the 27th Cabanatuan was occupied, and
a permanent station established there. On the 1st of November
Aliaga and Talavera were occupied. In the meantime
detachments, chiefly of Young's cavalry, were operating to the
west of the general line of advance, striking insurgent
parties wherever they were found and driving them toward the
line of the railroad. By the 13th of November the advance had
turned to the westward, and our troops had captured San Jose,
Lupao, Humingan, San Quintin, Tayug, and San Nicolas. By the
18th of November the advance had occupied Asingan and Rosales,
and was moving on Pozorrubio, a strongly intrenched post about 12
miles east of San Fabian. General Lawton's forces now held a
line of posts extending up the eastern side of the plain and
curving around and across the northern end to within a few
miles of the Gulf of Lingayen.

{382}

"On the 6th of November a force of 2,500, under command of


General Wheaton, sailed from Manila for the Gulf of Lingayen,
convoyed by ships of the Navy, and on the 7th the expedition
was successfully landed at San Fabian with effective
assistance from a naval convoy against spirited opposition. On
the 12th the 33d Volunteers, of Wheaton's command, under
Colonel Hare, proceeded southeastward to San Jacinto, attacked
and routed 1,200 intrenched insurgents, with the loss of the
gallant Major John A. Logan and 6 enlisted men killed, and one
officer and 11 men wounded. The enemy left 81 dead in the
trenches and suffered a total loss estimated at 300. In the
meantime, on the 5th of November, a column under General
McArthur advanced up the railroad from Angeles to Magalang,
clearing the country between Angeles and Arayat, encountering
and routing bodies of the enemy at different points, and
capturing Magalang. On the 11th it took Bamban, Capas, and
Concepcion, and on the 12th of November entered Tarlac, from
which the enemy fled on its approach. Meantime, parties,
mainly of the 36th Volunteers, under Colonel J. F. Bell,
cleared the country to the right of the line of advance as far
east as the points reached by General Lawton's flanking
parties. On the 17th of November McArthur's column had
occupied Gerona and Panique, to the north of Tarlac, On the
19th, Wheaton's troops, and on the 20th, McArthur's troops,
entered Dagupan.

"On the 24th of November General Otis was able to telegraph to


the Department as follows: 'Claim to government by insurgents
can be made no longer under any fiction. Its treasurer,
secretary of the interior, and president of congress in our
hands; its president and remaining cabinet officers in hiding,
evidently in different central Luzon provinces; its generals
and troops in small bands scattered through these provinces,
acting as banditti, or dispersed, playing the rôle of
"Amigos," with arms concealed.' Since that time our troops
have been actively pursuing the flying and scattered bands of
insurgents, further dispersing them, making many prisoners,
and releasing many Spanish prisoners who had been in the
insurgents' hands. On the 23d General Young's column had
reached Namacpacan, 30 miles north of San Fernando, in the
province of Union, and passed north into the mountains; and on
the 24th Vigan, the principal port of the northwest coast, was
occupied by a body of marines landed from the battle ship
Oregon. Wherever the permanent occupation of our troops has
extended in the Philippine Islands civil law has been
immediately put in force. The courts have been organized and
the most learned and competent native lawyers have been
appointed to preside over them. A system of education has been
introduced and numerous schools have been established."

Annual Report of the Secretary of War, 1899


(Message and Documents: Abridgment, 1899-1900,
volume 2, pages 735-741).

General Young, whose movement is referred to above, reported


to General Otis from Pozorrubio, on the 17th of November:
"Aguinaldo is now a fugitive and an outlaw, seeking security
in escape to the mountains or by sea. My cavalry have ridden
down his forces wherever found, utterly routing them in every
instance, killing some, capturing and liberating many
prisoners, and destroying many arms, ammunition, and other war
impediments." On the 30th, Major March was sent by General
Young, as he expresses it, "on Aguinaldo's trail," and
encountered the forces of the Filipino General Pilar in the
Tila Pass. The following is Major March's report of the fight
which then occurred, and in which the Filipino commander fell:
"The trail winds up the Tila Mountains in a sharp zigzag. The
enemy had constructed a stone barricade across the trail at a
point where it commanded the turns of the zigzag for a
considerable distance. The barricade was loopholed for
infantry fire and afforded head cover for the insurgents. On
passing on beyond Lingey the advance was checked by a heavy
fire from this barricade, which killed and wounded several
men, without having its position revealed. I brought up the
remainder of the command at double time, losing two men
wounded during the run up. On arriving at the point, I located
the insurgents' position with my glasses—their fire being
entirely Mauser and smokeless powder—by the presence of the
insurgent officer who showed himself freely and directed the
fire. On pushing forward, the number of my men who were hit
increased so rapidly that it was evident that the position
could not be taken by a front attack, when the trail only
allowed the men to pass one at a time. On the left of the
barricade was a gorge several hundred feet deep. On its right,
as we faced it, was a precipitous mountain which rose 1,500 feet
above the trail. Across the gorge and to the left front of the
barricade was a hill, which, while it did not permit of flank
fire into the barricade, commanded the trail in its rear, and
this point I occupied with ten sharpshooters in command of
Sergeant-Major McDougall. He lost one man wounded in getting
to the top, and when there rendered most effective assistance.
I then ordered Lieutenant Tompkins to take his company (H) and
proceeding back on the trail to ascend the slope of the
mountain under cover of a slight ridge which struck the face
of the mountain about 150 feet from the summit. From there he
had a straight-up climb to the top, where the men pulled
themselves up by twigs and by hand. The ascent took two hours,
during which the enemy kept up an incessant and accurate fire,
which they varied by rolling down stones on our heads. When
Tompkins' men appeared upon the crest of the hills over their
heads, he had the command of the two other trenches which were
constructed in rear of the barricade, I have described, around
a sharp turn in the trail, and which were also held by the
insurgents. He opened fire upon them and I charged the first
barricade at the same time, and rushed the enemy over the
hill. We found eight dead bodies on the trail, and the bushes
which grew at the edge of the gorge were broken and
blood-stained where dead or wounded men fell through. Among
the dead bodies was that of Gregorio del Pilar, the general
commanding insurgent forces. I have in my possession his
shoulder straps; French field glasses, which gave the range of
objects; official and private papers, and a mass of means of
identification. He was also recognized personally by Mr.
McCutcheon and Mr. Keene, two newspaper correspondents who had
met him before.
{383}
The insurgents' report of their loss in this fight is 52,
given to me after I reached Cervantes. My loss was 2 killed
and 9 wounded. I reached the summit at 4.30 P. M. and camped
there for the night. … At Cervantes I learned that the force
at Tila Pass was a picked force from Aguinaldo's body guard,
and that it was wiped out of existence. Aguinaldo with his
wife and two other women and a handful of men were living in a
convent at Cervantes, perfectly secure in his belief that Tila
Pass was an impregnable position. It was the insurgents'
Thermopylæ."

Report of Lieutenant-General Commanding the Army, 1900,


part 4, page 331.

Mr. McCutcheon, one of the newspaper correspondents referred


to by Major March, gave to the "Chicago Record" a graphic
account of the fight in Tila Pass, and wrote feelingly of the
death to the young Filipino General Pilar:

"General Gregorio del Pilar," wrote Mr. McCutcheon, "was the


last man to fall. He was striving to escape up the trail and
had already received a wound in the shoulder. A native was
holding his horse for him and just as he was preparing to
mount a Krag-Jorgensen bullet caught him in the neck, and
passing through came out just below his mouth. The men of
Company E, rushing up the trail, caught the native, who was
endeavoring to secure the papers which the general had in his
pockets, and a moment later captured the horse. At that time
no one knew who the dead man was, but from his uniform and
insignia they judged that he was an officer of high rank. The
souvenir fiend was at once at work and the body was stripped
of everything of value from the diamond ring to the boots. …
Many letters were found, most of them from his sweetheart,
Dolores Jose, who lived in Dagupan. A handkerchief bearing her
name was also found in his pocket. One letter was found from
the president of Lingay and gave the exact number of soldiers
in March's command. Pilar's diary, which ran from November 19
on to the day of his death, was of remarkable interest, for it

You might also like