Saad Abid2, Zhiyong Li1, and Renfa Li1 1College of Information Science and Engineering, Hun an University, China 2Department of Computer Science and Informatics, Al- Mansour University College, Iraq
Meng Han1,2, Zhihai Wang1, and Jidong Yuan1 1School of Computer and Information Technology, Beij ing Jiaotong University, China* 2School of Computer Science and Engineering, Beifang University of Nationalities, China
Ke Yan1, Hong Zhu1, and Kevin Lü2 1School of Computer Science and Technology, Huazhong University of Science and Technology, China 2College of Business, Arts and Social Sciences, Brunel University, UK
Jin-long Zhu1, Wenhui Li2, Huiying Li2, Qiong Wu2, and Liang Zhang2 1Department of Computer Science and Technology, ChangChun Normal University, China 2Department of Computer Science and Technology, Jilin University, China
1School of Information Engineering, Anhui Xinhua University, China 2School of Science, Anhui Agricultural University, China 3Department of Computing and New Media Technologies, University of Wisconsin-Stevens Point, USA
Xia Zhai1, Weiwei Guo2, Yongqin Zhang3, Jinsheng Xiao4, and Xiaoguang Hu5 1Arts Department, Henan University of Economics and Law, China 2Department of Information and Communication Engineering, University of Electronic Science and
1College of Computer Science and Electronic Engineering, Hunan University, China 2The Second Hospital, University of South China, China 3Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, China
Department of Network Engineering, Information Engi neering University, China 2Department of Computer Science and Engineering, Sha nghai Jiaotong University, China 3Institute of China Electronic System Engineering Corporation, China