2,473 results
Search Results
2. Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the Cloud.
- Author
-
Hay, Brian, Nance, Kara, Bishop, Matt, and McDaniel, Lucas
- Abstract
As cloud usage continues to increase, new issues with respect to managing and securing resources in the cloud are becoming more apparent. While some people may believe that security and privacy in the cloud can be addressed without the consumer considering the physical location and internal structure of the cloud, we show that this is clearly not the case. Furthermore, we describe a mechanism by which cloud consumers can inform cloud providers of their requirements in a manner that still allows the cloud to remain dynamic and flexible. Specifically, this paper explores the analogy between human migration in the real world and virtual machine migration in an IaaS cloud environment. It addresses issues such as jurisdictional control, zone evolution, migration, and instantiation based on an examination of these analogous real-world scenarios and their applicability to the cloud. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
3. Condition monitoring for predictive maintenance in the pulp & paper industry: Two implementations.
- Author
-
Jokinen, J., Postelnicu, C., Zhang, B., Camp, R., Suhonen, M., Karhumaki, O., and Lastra, J. L. Martinez
- Abstract
This paper presents two implementations of condition monitoring of significant information in a typical machine utilized in the pulp and paper industry, a circuit oil lubrication system. The two discussed alternatives confront a traditional centralized monitoring approach against a Web Service based approach. Advantages and disadvantages of one choice over the other are considered. Both solutions make possible condition based and predictive maintenance as opposed to cyclic maintenance (the approach utilized before these improvements came into place in the presented industrial setting). The presented developments led to vital financial and time savings. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
4. Push vs. Pull: An Energy Perspective (Short Paper).
- Author
-
Burgstahler, Daniel, Lampe, Ulrich, Richerzhagen, Nils, and Steinmetz, Ralf
- Abstract
In many application scenarios, such as traffic guidance or ambient living, services need to notify mobile applications about status changes. Such notifications to mobile devices can be realized using two principal approaches, namely push- and pull-based. Apart from functional differences, the two options likely result in different energy consumption, which is an important aspect due to the battery constraints of contemporary mobile devices. This paper provides a detailed assessment of energy consumption in pull- and push-based notification scenarios, considering different payload sizes and notification intervals. Our results indicate that an educated choice among both options may, depending on the specific application scenario, facilitate energy savings of up to 19%. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
5. Innovative approach to server performance and power monitoring in data centers using wireless sensors (invited paper).
- Author
-
Khanna, Rahul, Choudhury, Debabani, Chiang, Patrick Yin, Liu, Huaping, and Xia, Lingli
- Abstract
Data Centers face considerable challenges in seamless propagation of telemetry data and executing control functions for performing various management functions. These functions are related to power capping, cooling, reliability, predictability, survivability, and adaptability control. In a conventional approach, distributed sense-data in a server node is collected through wired management interconnects and LAN. We present an alternative approach for this unique data center environment using wireless sensor network to improve data-collection efficiency and real-time delivery. We survey 2-tier sense data collection methodology using narrow-channel wireless interconnects for server management and RACK-level wireless sensor network for data center management. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
6. Comparative study of electronic voting models and a proposed security framework for the implementation in Mauritius.
- Author
-
Sheeba, Armoogum, Vinaye, Armoogum, Sameer, Sunhaloo, and Yatin, Diapermal
- Abstract
Currently, in Mauritius, elections are still being carried out through traditional voting methods (paper ballots) compared to other developing countries which are already using E-voting systems. With the rapid evolution of technologies in today's world, Mauritius, one of the emerging African countries, shall as well be progressing towards the modern era. However, prior to the implementation of E-voting in Mauritius, one of the most important issues that should be addressed is the system security aspect. The importance of security has been recognised for some time now, but providing complete security functions have proved difficult. The purpose of this paper is to propose one such e-voting model which will provide a secure framework for its implementation in Mauritius. To be able to make a good choice, several e-voting models are discussed, but two models are being considered after an analysis and a comparative study of these two is conducted. The best existing system is enhanced so that it could integrate into the Mauritian context successfully. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
7. Design and implementation of thesis management system based on B/S structure.
- Author
-
Huadong, Wang and Li, Liao
- Abstract
The paper proposes the framework, modules, design and implementation of thesis management system based on specific thesis management mode. The system uses ASP.NET as front development tool, SQL Server 2005 as the background database tool, and based on B/S structure. The system includes these features, teachers submitting topics online, students selecting topics online, exchanges of teachers and students online, thesis' submitting and reviewing online, documents printing online, etc. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
8. Internet banking fraud detection using HMM.
- Author
-
Mhamane, Sunil S and Lobo, L.M.R.J
- Abstract
Internet banking has their separate account for users and is managed by Banks or retail store. The aim of this paper is to detect and prevent fraud in case of internet banking using Hidden Markov Model algorithm. At the same time, we have tried to ensure that genuine transactions are not rejected by making use of one time password that was generated by the Bank server and sent to the particular customers through SMS to their Mobile number which is registered in the system. Banks are seeking to minimize huge losses through fraud detection and prevention systems. Many different advanced fraud technologies are being applied to fraudulent Internet banking transactions detection and prevention. However, they have no effective detection mechanism to identify legitimate users and trace their unlawful activities. We propose a model to overcome all these difficulties using Hidden Markov Model. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
9. Confidential Information Poisoning Methods by Considering the Information Length in Electronic Portable Devices.
- Author
-
Ishii, Junya, Razali, Afiza, and Uda, Ryuya
- Abstract
To prevent leakage of personal information and privacy, there is an AR technology in which secret information from handy device is overlaid on paper on which nothing about personal information is printed. The invention takes bothers away from people who have to care about printed papers when they dump them. However, to be overlaid, the secret information drawn from handy device such as smart phone must be kept in the phone or be taken from a server via the phone. Ultimately the phone has to be locked by password to prevent secret information from being leaked when the phone is lost. If the length of the password is short, the password may be broken easily by attackers, and if the length is long enough in terms of security, inputting of the password always bothers the owner of the phone. Therefore, we suggest a poisoning method that prevents attackers from finding correct information although 4 digits password is applied for locking the phone. In the method, dummy words cannot be winnowed out and they fit in the space for correct one. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
10. Integrated analysis method on HTTP traffic.
- Author
-
Chang-Gyu Jin and Mi-Jung Choi
- Abstract
Internet traffic volume has been increasing rapidly due to popularization of various multimedia services such as P2P, streaming and online games other than simple Web browsing. In addition, management of increased Internet traffic is regarded as important to provide stable services guaranteeing QoS (Quality of Service) and security. In particular, for the HTTP traffic, its amount used is also on the rise due to an increase of smart devices, and utilized for a variety of purposes. Therefore, analysis and management on HTTP traffic is getting more important. This paper proposes an analysis method for each site at a server side and application levels at a client side in a server/client model of HTTP traffic. It could understand characteristics of HTTP traffic and prepare an efficient management method for the future increasing HTTP traffic through the integrated analysis in the HTTP traffic's server/client respect. It would like to prove validity of the HTTP traffic analysis method proposed in this paper by collecting traffic of campus networks to apply the proposed methodology. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
11. A MPQF-based multimedia database retrieval system.
- Author
-
Zhang, Shaolong
- Abstract
The MPEG Query Format (MPQF) developed by MPEG Group aims to standardize query interface for multimedia retrieval systems. MPQF is a XML-Based exchange standard which is platform independence, however now MPQF is not directly supported by any database products such as Oracle, DB2 and MS SQL Server. In this paper a MPQF-Based Multimedia Database Retrieval System is designed. The three-tier architecture of system is presented at first, then the paper focus on the key component of the system MPQF SQL Translator which translates MPQF query to SQL code that relational-based multimedia database can evaluate and execute. A case study over MS SQL Server is shown to illustrate the execution. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
12. A Ubiquitous Sensor Network for Domestic Energy Monitoring and Energy Consumption Optimization.
- Author
-
Gupta, Abhinav and Murarka, Priyans
- Abstract
The current energy dilemma facing the world today expatriates the need for smart grid development, effective home power management & realizing automated smart load distribution systems. In this paper, we introduce you to "Slug" (Smart Plug) sensor network. The "Slug" system is designed for use in occupational and domestic environments as a device that is able to identify the domestic appliance based on the behavior of the current patterns consumed by the appliance. The "Slug" system acts as both a sensor network and the individual node in the network acts as a functioning power strip. The nodes communicate with each other using the existing Power Line architecture of the environment. The use of Power Lines Communication (PLC) makes the system a seamless part of the environment. The issues related to the excessive noise and potential loss of data packets in PLC is solved by using the flood transmission protocol. We believe that the seamless integration of sensor network in its environment is important for being successful in the realm of successful ubiquitous computing. In this paper we discuss the hardware and software architectures of the "Slug" system which look at certain test appliances and explain by what we mean by current consumption patterns and current profiles of appliances. We try our best to come with a possible hypothesis of this behavior and explain the use of classifier algorithm which needs zero training but only a dynamically upgradeable database, thus creating a need of a cloud database connected to all the home servers. The system implementations and description of protocols developed for the appliance controls will also be explained in the paper. Finally we present the need for Flood transmission protocols in PLC and an encryption scheme to deal with security threats in the system. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
13. Research on replica placement strategy based on game theoretical analysis.
- Author
-
Wang, Xiaomei and Li, Xinming
- Abstract
It's the requirement to research data replication strategies for improving the reliability and efficiency of complex network. We use noncooperative game theory to analyze the replica placement problem in the paper, and the model of replica placement in large-scale distributed network is proposed. Then we prove the existence of pure strategy Nash equilibrium in the model, and propose the replica placement arithmetic. The method in this paper is of reference value for improving the usability and efficiency of massive data, and the content is helpful to elevate network performance in large-scale distribution network. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
14. Encryption Domain Text Retrieval.
- Author
-
Chiueh, Tzi-cker, Simha, Dilip N, Saxena, Alankar, Bhola, Saurabh, Lin, Ping-Hung, and Pang, Cheng-En
- Abstract
This paper proposes efficient indexing and querying services on encrypted user documents stored in the cloud. We develop few sophisticated techniques to ensure that any network intruder or even the cloud service provider itself is oblivious to both user data content and the type of operations performed over the data. All data operations, including encryption and decryption of data are performed in the client environment, thereby guaranteeing complete data security. By providing, such a secure system to store and access data on the cloud, end users will be free of any security concerns and hence can easily migrate their data to the cloud. We have implemented an Encryption Domain Text Retrieval (EDTR) System that has a server positioned in the cloud to provide indexing, storage and querying services and a client tool on the end user system that processes the user documents. In order to enable the cloud server to work on encrypted data, the client tool orchestrates the user data into sets of keywords which are again encrypted. We further provide an unique measurement technique to identify unfaithful execution of user requested services by the cloud service provider. Our experiments demonstrate the practical applicability of such a sophisticated system. Though we logically explain the security implications and how the EDTR system overcomes typical cloud security issues, we do not focus on providing concrete, theoretical security proofs. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
15. Design and Implementation of an LBS Application Server Software Based on the PUB/SUB Paradigm.
- Author
-
Guoshi, Wang, Fang, Zhao, Rui, Wang, and Haiyong, Luo
- Abstract
This paper gives out a PUB/SUB-based application server software, which aims at improving the coarse granularity of the pushed information in current LBS systems. Taking the advantage of PUB/SUB system's asynchronous, loosely-coupled and multiplex communication mechanism, the server software pushes LBS information with its granularity refined. By combining position information and the PUB/SUB paradigm, users can easily focus on his points of interest. In this paper, three message formats, which are used in the communication between client app and server, are introduced and overall architecture is presented. Furthermore, in order to support indoor and outdoor service, a positioning middleware is also applied. The process of subscription matching utilizes a hash table to speed up the rate. Experimental result shows that the software could offer an efficient service to users. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
16. Design and modeling of highly power efficient node-level DC UPS.
- Author
-
Kwon, Wonok
- Abstract
This paper presents design and modeling of a highly efficient node-level DC uninterruptible power supply (UPS) in rack-level DC power architecture. In the previous research, we proposed the architecture of the highly efficient rack-level DC system combined with node-level DC UPS. This paper deals with the design and modeling of proposed node-level DC UPS. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
17. The research on the XML-based information exchange under heterogeneous Enviornment in HR Oursourcing enterprises.
- Author
-
Juan, Du and Zheng, Qin
- Abstract
In order to solve the problem that the information sharing and exchange lack uniform information exchange standards and information cannot be timely exchanged and shared, this paper proposes XML-based HR Information System under eterogeneous Enviornment. Simutaniously, considering the information chara1 cteristics of HR outsourcing and the related industry standards, this paper also designs the XML structure for HR outsourcing enterprises. The information management system not only realizes the standardization of information management and the quick-and-easy information change between heterogeneous systems, but also provides a reference to the design of other information exchange system in other related industrys. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
18. Formalization of discovery and communication mechanisms of Tuple Space based Mobile Middleware for underlying unreliable infrastructure.
- Author
-
De, Suddhasil, Chakraborty, Suchetana, Goswami, Diganta, and Nandi, Sukumar
- Abstract
Tuple Space based Mobile Middleware (TSMM), with tuple space as its coordination medium, provides decoupled coordination of different agents of its supported applications over mobile, dynamic and unreliable networks, like Infrastructure Basic Service Set (iBSS). TSMM includes its own discovery and communication mechanisms to achieve robustness and flexibility in such networks. This paper suggests an approach for formalizing these discovery and communication mechanisms of TSMM, in order to appropriately analyze robustness and flexibility of TSMM in presence of underlying unreliability. Formalization is carried out using Mobile UNITY. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
19. An enhanced password authenticated key exchange protocol without server public keys.
- Author
-
Saeed, Maryam, Mackvandi, Ali, Naddafiun, Mansour, and reza Karimnejad, Hamid
- Abstract
Password Authenticated Key Exchange (PAKE) protocols permit two entities to generate a large common session key and authenticate each other based on a pre-shared human memorable password. In 2006, Strangio proposed the DH-BPAKE protocol and claimed that the mentioned protocol is provably secure against several attacks. In this paper, it is shown that the DH-BPAKE protocol is vulnerable to password compromise impersonation attack and it is not efficient due to the number of running steps and its computational load. To overcome these weaknesses, an enhanced PAKE protocol is proposed which provides several security properties. In addition, it is proved that our proposed scheme is more sefficient1 (Secure & Efficient) in comparison with DH-BPAKE protocol. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
20. Detection of fast flux network based social bot using analysis based techniques.
- Author
-
Amit Kumar Tyagi and Aghila, G.
- Abstract
As the technology growing Botmasters are also growing with latest technology (e.g. virus to Botnet and Root kits) using fast flux feature have begun to exploit Social Network Sites (e.g., facebook.com; Twitter.com etc) as their command and control (C&C) infrastructures e.g. Social Bot hacked four lacs facebook accounts alone in Bangalore only in November 2011 and steal 64 lacs password of LinkedIn in June 2012. This paper proposed a novel technique “Analysis Based Detection Techniques (ABDT) ”to detect fast flux service network (FFSN) based Social Bots on OSNs based on presented information on user's profile. It use geographically-dispersed set of proxy hosts to locate the position of the mothership in an abstract and dimensional space and built similarity graph (clustering) for each URL presented to validation checking for each user. This similarity graph describe all users as nodes in a large graph, and build edges when two users are connected based on 1) group users with “similar” textual description together, where similarity is captured by a probabilistic fingerprint. 2) For single destination URL must come from the same Bot. Hence as conclusion, this paper detect FFSN based Social Bot, by combining information obtained in form of similarity graph (clustering) through Social networking users; performing cross validation (to identify normal users) for each cluster and measuring TTL value (time to live) for each user. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
21. Research and Implementation of the High-Availability Spatial Database Based on Oracle.
- Author
-
Wu, Xiaochun, Wang, Kai, Su, Zixuan, and Liu, Yanjun
- Abstract
With the technology of geographic information system (GIS) developing and the application of enterprise-level GIS gradually wide, it is necessary to build the high-availability spatial database. Now there are not commercial spatial database software which can realize the high-availability. The paper proposes the architecture of high-availability spatial database based on popular object-relation database software-Oracle and verify its feasibility by experiment. The paper provides a new idea to realize the high-availability spatial database. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
22. A transfer function based intrusion detection system for SCADA systems.
- Author
-
Papa, Stephen, Casper, William, and Nair, Suku
- Abstract
Most SCADA and industrial control systems have a limited and deterministic set of behaviors that results with a relatively small amount of variability during normal system operation. Automatic controller commands, operator commands and sensor measurement data within the system may be modified by an attacker to cause system failures. To detect these intrusions a Transfer Function based Intrusion Detection System (TFIDS) is proposed in this paper. Normal operational behaviors can be modeled and integrated into the TFIDS with alarm filtering and reporting rules. Trust anchors within the system are required to collect some of the signals, ensure the signal integrity when delivered to the TFIDS, and to host the TFIDS if physical attacks are a concern. This paper provides an overview of the TFIDS and simulation results for attacks on a waste water treatment system with and without the TFIDS. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
23. MapReduce Based Skyline Services Selection for QoS-aware Composition.
- Author
-
Chen, Liang, Kuang, Li, and Wu, Jian
- Abstract
Service selection is an important issue of Service-oriented computing (SOC), which is a fundamental step to the composition of complex and large-grained services from single-function components. Skyline operation is recently adopted to select candidate services for composition, as skyline services have better QoS. However, the fast increasing web services, multiple quality attributes to be considered, and dynamic service environment pose a big challenge to skyline service selection. In this paper, we present a parallel skyline service selection method to improve the efficiency by upgrading the MapReduce paradigm. In particular, an angle-based data space partitioning approach is employed in our MapReduce based skyline service selection. To handle the dynamic nature of service environment, we employ Paper-Tape (PT) Model which is used to rapidly locate varying services, and present a dynamic skyline service selection algorithm based on PT model. By experimenting over 10,000 web services along 10 quality attributes, we demonstrate the efficiency of our proposed methods. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
24. Simulation-based performance evaluation of queuing for e-learning real time system.
- Author
-
Badr, Shaimaa, Bayoumi, Fatma, and Darwesh, Gamal
- Abstract
Electronic learning has produced a comfortable, sophisticated, interactive and adaptable teaching model. Moreover, the consistent technical progress in this field allows the development of increasingly interesting applications [1]. We chose to select those elements to create an e-learning environment. This paper presents a model of the multi-tiered e-learning system based on Web Services. It shows architecture for implementing e-learning environment by taking into account quality of service (QoS) requirements namely traffic dropped, traffic received and packet end to end delay. However, there exists no known simulation approach on how to deploy a popular real-time network service such as e-learning system. This paper offers remarkable details on how to model and configure OPNET for such a purpose. The study has been carried out using OPNET IT Guru on 3 scenarios are suggested first before enabling any QoS mechanism at the routers, second apply class based weighted fair queuing using low latency queue (CBWFQ-LLQ) for video traffic and last scenario apply CBWFQ-LLQ for voice. The simulation results show that CBWFQ with LLQ for Voice Traffic has a superior quality than the other techniques. This model was tested with different number of learners. Results indicate that improvements caused by traffic differentiation, become more significant as the number of users increases. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
25. A cloud-based TaaS infrastructure with tools for SaaS validation, performance and scalability evaluation.
- Author
-
Gao, Jerry, Manjula, K., Roopa, P., Sumalatha, E., Bai, Xiaoying, Tsai, W. T., and Uehara, Tadahiro
- Abstract
With the fast advancements in cloud computing and software- as-a-service (SaaS), testing and evaluation of cloud-based software and SaaS applications became an important task for engineers. Since most existing tools are not developed to support cloud-based software testing and SaaS evaluation, there is a strong demand for a new cloud-based testing infrastructure and evaluation environment for SaaS applications. This paper proposes a testing-as-service (TaaS) infrastructure and reports a cloud-based TaaS environment with tools (known as CTaaS) developed to meet the needs in SaaS testing, performance and scalability evaluation. The paper presents TaaS concepts and CTaaS, including their infrastructure, design and implementation. In addition, the paper demonstrates the application results of our previously proposed graphic models and metrics for SaaS performance and scalability evaluation. Moreover, the paper reports one case study for a selected SaaS (OrangeHRM) using the developed TaaS environment. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
26. System management to comply with SLA availability guarantees in cloud computing.
- Author
-
Gonzalez, Andres J. and Helvik, Bjarne E.
- Abstract
SLAs are common means to define specifications and requirements of cloud computing services in business relationships. The terms that define the guaranteed availability for a given period are fundamental to these contracts. In this context, a natural question for cloud providers is: How to guarantee the availability promised? This paper studies the level of availability offered to a virtual machine during an SLA period in clouds with different: size, redundancy, and fault tolerance techniques. Finally, this paper proposes the use of the SLA -budget for the implementation of smart policies in: i) the assignment of spare servers when virtual machines are restored. ii) the dynamic use of different fault tolerance licenses. Using such policies results in a considerable reduction of the probability of breaching the SLA guarantee, by making an efficient use of the cloud resources available. This paper is a first step in the design of SLA-aware cloud architectures. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
27. DLAS: Data Location Assurance Service for cloud computing environments.
- Author
-
Noman, Ali and Adams, Carlisle
- Abstract
In this paper, we present a Data Location Assurance Service (DLAS) solution for the well-known, honest-but-curious server model of the cloud computing environment; the proposed DLAS solution facilitates cloud users not only to give preferences regarding their data location but also to receive verifiable assurance about their data location from the Cloud Service Provider (CSP). Our proposed DLAS solution is based on cryptographic primitives such as zero knowledge sets protocol and ciphertext-policy attribute based encryption. According to the best of our knowledge, we are the first to propose a solution of this kind. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
28. A Privacy Preserving Model for Personal Information in Search Engine.
- Author
-
Cho, Eun-Ae, Lee, Kyungroul, and Yim, Kangbin
- Abstract
In this modern-day society, people get information by using a search engine, and this is a very ordinary part of our lives. When users, however, begin to retrieve some information after their login on the portal sites, the data related to the user and the query information may be sent to the portal server to enhance the users' comfort. Here, the information that the user does not want to expose can be included. So, an invasion of privacy can occur and we have to protect this kind of incident. In this case, if the user hides all the information, the server can not show the customized result for the user, which can influence the advertising revenue. Moreover, there may be a general downward trend in the portal sites field. Thus, in this paper, we propose a user privacy preserving model in a search engine by using a homomorphic encryption algorithm on the user's policy to solve this problem. This can provide information on what the user wants to know with encrypted user information and targeted advertising service from the portal sites. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
29. Pool vs. Island Based Evolutionary Algorithms: An Initial Exploration.
- Author
-
Merelo, J.J., Mora, A.M., Fernandes, C.M., Esparcia-Alcazar, Anna I., and Laredo, Juan L.J.
- Abstract
This paper explores the scalability and performance of pool and island based evolutionary algorithms, both of them using as a mean of interaction an object store, we call this family of algorithms SofEA. This object store allows the different clients to interact asynchronously, the point of the creation of this framework is to build a system for spontaneous and voluntary distributed evolutionary computation. The fact that each client is autonomous leads to a complex behavior that will be examined in the work, so that the design can be validated, rules of thumb can be extracted, and the limits of scalability can be found. In this paper we advance the design of an asynchronous, fault-tolerant and scalable distributed evolutionary algorithm based on the object store CouchDB. We test experimentally the different options and show the trade-offs that pool and island-based solutions offer. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
30. Communication Protocols in Layered Groups with Heterogeneous Clocks.
- Author
-
Duolikun, Dilawaer and Takizawa, Makoto
- Abstract
In distributed systems, a group of multiple processes are required to cooperate with each other to achieve some objectives. In this paper, we consider a distributed system where there is o centralized coordinator. Each member process is peer, i.e. each peer has to autonomously make a decision by itself through communicating with other peers in a group. Each peer sends a message to every peer and every other peer receives the message in a group. In group communication, each message sent by a peer has to be causally delivered to every peer. Types of clocks, linear clock, vector clocks, and physica clocks are used to causally order messages. The linear clock can be used in a scalable group since message length is O(1). However, some messages which are not to be causally ordered are ordered. On the other hand, all and only messages to be causally ordered are ordered in the vector clock. However, the vector clock cannot be adopted in a scalable group due to the message length O(n) for the number n of peers of the group. A computer is equipped with a physical clock which is synchronized with a time server. Each peer can read time at a physical clock of a computer where the peer is performed. Messages are totally ordered in terms of physical time when the messages are sent. However, a pair of messages to be causally ordered might be ordered in the reverse order due to difference of times shown by physical clocks. In a scalable group, it is not easy for each peer to send a message to every peer. In this paper, we discuss a hierarchical group to realize a scalable group. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
31. A proposal for a still picture Internet broadcasting system with dynamic picture quality adjustment based on audience requests for smartphone broadcasters.
- Author
-
Nakano, Yuki, Saito, Yoshia, and Murayama, Yuko
- Abstract
3G Internet connections are required for Internet broadcasting with smartphones in outdoor where wireless LAN connections are unavailable. However, it is not easy for the smartphone users broadcast over due to lack of the 3G transmission speed for video streaming in real time. Cell phone carriers, furthermore, tend to shift flat-rate data services to pay-as-you-go data services. 3G data traffic on smartphones should be reduced. In this paper, we propose a still picture Internet broadcasting system with dynamic picture quality adjustment based on audience requests for smartphone broadcasters to achieve stable Internet broadcasting anywhere and optimize amount of data traffic. Since the required bit-rate of still pictures is much smaller than that of the video streaming, still picture Internet broadcasting can reduce data traffic. We introduce a scheme of dynamic picture quality adjustment based on audience requests so that the data traffic can be optimized. This paper reports the design and implementation of the proposed system on a Google's Android terminal. Furthermore, we show the result of an experiment on minimal picture quality. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
32. AJAX Crawling Scheme Based on Document Object Model.
- Author
-
Zhang, Xuesong and Wang, Honglei
- Abstract
Many web applications adopt AJAX to enhance their user experience. But AJAX has a number of properties making it extremely difficult for traditional search engines to crawl. Google's AJAX crawling scheme suggests webmasters change their website architectures and add additional codes. It is so complicated that it be currently supported only by Google. The paper proposed an AJAX crawling scheme based on DOM and breadth-first AJAX crawling algorithm. It can build a State Transition Graph (STG) of an AJAX web application by tracking the changes of DOM tree triggered by some AJAX events, and then generate a static mirror site of the original AJAX web application. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
33. Mechanism for on demand Tag-Based software testing in virtualized environments.
- Author
-
Gopularam, Bhanu Prakash and Yogeesha, C. B.
- Abstract
Software development life cycle consists of various stages like requirements, design, implementation, testing and maintenance. In a typical enterprise level project number of testcases to be executed for each release would be in thousands. One known way of segregating the testcases is using component or module names and one can also classify them based on level of importance like unit testing, functional, sanity etc. With iterative development models like Agile, the release cycle is short and it is prudent to execute the testcase selectively majorly concentrating on impacting components. In this paper we provide a generic way to manage the tests and provide an efficient mechanism to run the tests selectively. In our approach we make use of well-known build management tool called Jenkins for running the tests on-demand. One unique benefit of our approach is that the input is a single comma-separated-value (CSV) file and it is very easy to add/modify existing tests. The tests are tagged using well known keywords (viz. database-layer, configuration, regression). When some particular tests need to be run, the user enters ‘Tag’ in the job parameter and testsuite will be generated dynamically. In this paper we also describe an end-to-end test management system that supports running selective tests with help of jobs created in Jenkins environment. The proposed model of Tests execution is highly useful in high demanding environments like agile software development model, Test driven development model where feature development is many times faster than traditional water fall model. The approach suggested in this paper makes optimum use of cloud resources by distributing the jobs, so this can be utilized specially for testing under virtualized environment. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
34. Context aware services for mobile users: JQMobile vs Flash Builder implementations.
- Author
-
Costanzo, Alfio, Faro, Alberto, Giordano, Daniela, and Spampinato, Concetto
- Abstract
Current information systems that help user mobility, i.e., mobility information systems, generally lack of the basic context information that support people activity in time-changing environments: they do not take into account current traffic, weather or car pollution conditions, nor the mobile users are timely informed about accidents, or road works. Also, such systems do not consider the user personal information that influences the user context awareness such as age, or health status. Aim of the paper is to illustrate how context aware services may be offered by an implementation architecture based on a server following the Model-View-Controller paradigm, i.e., Ruby on Rails (RoR), whose controllers implement the use stories of the mobile users, and whose views are JQMobile scripts that provide for each story the most suitable scenario by an user interface based on the familiar Google Maps. How Flash Builder applications resident on the user mobiles may provide the users with similar RoR views, but saving RoR time, is also widely discussed. Furthermore the paper claims that involving actively the mobiles into the mobility information system may support more effectively the context aware decisions of the mobile users. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
35. Electrochemistry remote experiment - galvanic cell - II.
- Author
-
Schauer, F., Gerhatova, Z., Ozvoldova, M., Cernansky, P., and Tkac, L.
- Abstract
The paper is a free continuation of the paper presented at the REV 2009 conference, where we reported about remote experiment “Electrochemical cell characterization - is it a start of remote experiments in chemistry education?”. As a matter of fact it was meant as a small spur to the chemistry instructors to inspire them to build remote experiments, which are scarce in literature even now after three years. We want to present the continuation to the 2009 talk, showing what may be gained from a chemical remote experiment data, which wealth of information it may bring if properly used. We show how the experiment Electrochemical cell with controlled change of the electrolyte concentration and simultaneous measurement of electromotive force and electrolyte conductivity provides the possibility for the elucidation of the electrolyte conductivity, decision about strong/weak electrolytes, ions mobility and the study of Fermi level of various metals and reaction constant (http://remotelab2.truni.sk ). In the paper we want to use the experience gained in the meantime with the experiment Electrochemical cell and show all the possibility it offers. Paper may serve for inspiration to build, using ISES system, similar experiments for chemistry education. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
36. Context-Aware Management Scheme for service continuity.
- Author
-
Alhazmi, Hanan and Akkari Adra, Nadine
- Abstract
As wireless access technologies grow rapidly, the recent studies have focused on granting mobile users the ability of roaming across different wireless networks in a seamless manner thus offering seamless mobility. The different characteristics of each wireless technology with regard to Quality of Service (QoS) brought many challenges for provisioning the continuous services (audio/video streaming) in a seamless way. The paper proposes Context-Aware Management Scheme (CAMS) which facilitates service continuity in real-time application such as video and audio streaming. Unlike previous research efforts which focuses on session continuity only while handover and does not account for the characteristics differences between the networks, this work focuses on improving QoS and user experience by adapting the session parameters after Vertical Handover (VHO) according to the new environment and available resources. The new scheme would improve users experience and allow the network to admit more users at the same time compared to non-context aware solutions. In this paper, the architecture of the proposed scheme is presented. In addition, detailed signaling messages of the VHO and Context-Aware Management from WiFi to WiMax and vice versa are discussed. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
37. Location Dependent Query Processing in Mobile Environment.
- Author
-
Thomas, Diya
- Abstract
With advancement in Location Based Service and GPS enabled mobile devices, different types of queries to obtain location based information exist in mobile environment. Location based queries or spatial queries are the backbone of Location Based Services. LBS is gaining more popularity in today's world, as they enable the mobile users to obtain location information or location based information. Spatial Query Processing as a tool for Location Based Services is one branch of mobile query processing. In Location dependent query processing, the location information of mobile user is revealed to obtain location based information. Many research works are focusing on privacy protection of mobile users. Many other research works focus on reducing the workload of server while processing mobile queries. Though there exist a lot of research papers that discuss different approaches for doing efficient spatial query processing, this paper propose a novel integrated approach for solving several issues that arise while doing spatial query processing. This paper deals with spatial query processing and has proposed a framework for processing spatial queries efficiently. Both static and dynamic aspect of location dependent query is discussed in this paper. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
38. The application of Water Supply Management System based on data stream.
- Author
-
Wu, Wanchun and Zhang, Junhu
- Abstract
In China, water resource is scarce and polluted here and there. To manage efficiently the water resource, A Water Supply Management System (WSMS) is developed for collecting and storing the data obtained from many monitoring hosts. In this paper we propose a subsystem of WSMS for reassembling the data quickly for statistical analysis and continuous querying based on the data stream. Two methods for statistical analysis based on the data stream are proposed in this paper. The experiment shows that the method we applied in the WSMS is the better one. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
39. Interference coordination scheme between WiFi and Zigbee networks.
- Author
-
Amir, Shehzad and Choi, Young-June
- Abstract
WiFi and Zigbee sensor networks have their own usage and market but they both work in ISM frequency bands, thus causing coexistence issues. The difference of their transmission powers makes the problem even worst, as Zigbee transmission power is overruled by WiFi nodes. In this paper, we propose an interference coordination scheme based on the infrastructure operational mode. Our scheme uses the inherent feature of Zigbee to generate the channel scan report and communicate to the server connecting both networks, which in return directs the nodes to decrease their power in order to decrease the interference between both networks. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
40. Semantic Analysis of Component-aspect Dynamism for Connector-based Architecture Styles.
- Author
-
Su, Guoxin, Ying, Mingsheng, and Zhang, Chengqi
- Abstract
Architecture Description Languages usually specify software architectures in the levels of types and instances. Components instantiate component types by parameterization and type conformance. Behavioral analysis of dynamic architectures needs to deal with the uncertainty of actual configurations of components, even if the type-level architectural descriptions are explicitly provided. This paper addresses this verification difficulty for connector-based architecture styles, in which all communication channels of a system are between components and a connector. The contribution of this paper is two-fold: (1) We propose a process-algebraic model, in which the main architectural concepts (such as component type and component conformance) and several fundamental architectural properties (i.e.~deadlock-freedom, non-starvation, conservation, and completeness) are formulated. (2) We demonstrate that the state space of verification of these properties can be reduced from the entire universe of possible configurations to specific configurations that are fixed according to the type-level architectural descriptions. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
41. Exposing resources as Web services: A performance oriented approach.
- Author
-
Kanagasundaram, Ravishankar, Majumdar, Shikharesh, Zaman, Marzia, Srivastava, Pradeep, and Goel, Nishith
- Abstract
This paper focuses on exposing computing and database resources as Web services for providing inter-operability among clients and servers that uses diverse technologies. A systematic performance analysis of two technologies, the RESTful Web Service and the SOAP-based Web service used for exposing resources as Web services is reported. A novel Hybrid Web service that combines the advantages of both RESTful and SOAP-based Web services is proposed and analyzed. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
42. Opportunistic estimation of television audience through smartphones.
- Author
-
Bisio, Igor, Delfino, Alessandro, Luzzati, Giulio, Lavagetto, Fabio, Marchese, Mario, Fra, Cristina, and Valla, Massimo
- Abstract
Television audience estimation is an important task for advertisement placement. In this paper we present a system based on a client-server architecture able to recognize a live television show. The clients are implemented throughout smartphones, thus a well known audio fingerprint algorithm has been modified to fit smartphone needs. To reach this aim, the optimization of an ad-hoc cost function has been introduced. Server and client are generally far from being synchronized, due to the variety of broadcasting media (aerial, satellite or streaming over the Internet) leading to different and unpredictable delays. For this reason, we present a new likelihood estimate designed to overcome the lack of synchronization issue. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
43. LabVIEW-based data communication in LAMOST telescope.
- Author
-
Xu, Lingzhe
- Abstract
The Large sky Area Multi-Object fiber Spectroscopic Telescope (LAMOST), one of the National large scientific and engineering projects, successfully passed the National inspection and acceptance test in 2008. Ever since then the giant astronomical telescope has become the world's most powerful survey instrument of its kind with nominal scan rate of 4000 celestial objects simultaneously per observation. This amazing output rate absolutely requires a means of efficient data acquisition, accessing and publication with enormous volume of local and remote data. The dataflow is running on networks of hierarchical levels within various kinds of components of the LAMOST control system. The paper briefly describes about LAMOST control system as a start, and further evolves into discussion on the data communication based on LabVIEW virtual instrument technology with an illustration of accessing a rain-and-dew sensor using a serial port. Also the paper presents the mechanism of DataSocket interface connected to the LabVIEW in LAMOST remote monitoring and control. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
44. Securing VoIP networks via signaling protocol layer.
- Author
-
Moon, Kapila, Moon, M. M., and Meshram, B. B.
- Abstract
Securing Voice over IP (VoIP) is a crucial requirement for its successful adoption. Since SIP is the predominant protocol used for signaling to create, manage, monitor and tear down the VOIP sessions, this paper will focus on building a strong defense system around the signaling protocol layer. In this paper, we examine and investigate the concerns and requirements of VoIP security. After a detailed study of security issues and defense mechanisms, we focus on attacks and threats at signaling protocol layer and countermeasures to it that are essential for current and future VoIP implantations. Then, we analyze two popular industry best practices for securing VoIP networks and conclude this paper with further discussion on future research directions. This paper aims to direct future research efforts and to offer helpful guidelines for practitioners. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
45. Porting TRU64 UNIX™ on Avanti™ emulator.
- Author
-
Hussien, Mohamed Saied Essa Othman
- Abstract
Real time processing is becoming an increasingly important discipline. It is one of the mandatory requirements in industrial applications in order to achieve the five general areas: determinism, responsiveness, user control, reliability and fail soft operation; but what is the solution if you have aging hardware like my company? You will meet big problems and huge workload to maintain and develop your system and its applications. How can you keep your legacies alive? You need an alternative approach. Emulation will allow you to use new hardware without having to change the application, improve up-time and reliability, save floor space, power and maintenance cost, make the application faster, and preserve the past investment in the application. In this paper I perform a case in my company which was TRU64 UNIX™ O/S installed on DEC Alpha servers™. This paper will explain the way of porting it into two virtual emulators Avanti™ and FreeAXP™ and the problems that faced us during porting. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
46. Design, implementation and validation of a simulation tool for Networked Virtual Environments.
- Author
-
Font, Juan Luis, Sevillano, Jose Luis, Cascado-Caballero, Daniel, Lopez-Munoz, Gema, and Regassa, Berhanu
- Abstract
The popularisation of Networked Virtual Environment (NVE) applications in several context, including social interaction and e-Health fields, makes them an interesting subject of study. The proper estimation of their network requirements are key to ensure a good user experience, an important factor that determines the acceptance and success of the applications. The studies focused on NVE with an important social component are relatively scarce. This paper presents the design, implementation and validation of a simulation tool to assist in the study of the requirements of a NVE application, Open Wonderland. This tool will facilitate the study of several parameters that define the user experience. The study describes the overall structure, development framework and models that define the traffic generation patterns and validates the simulation results by comparing its traces with real traffic from previous studies. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
47. Improving the Efficiency of Storing for Small Files in HDFS.
- Author
-
Zhang, Yang and Liu, Dan
- Abstract
HDFS (Hadoop Distributed File System) is the popular file system. But HDFS has inefficient issue with small files. Traditional method has the drawback of high resource consumption and low efficiency performance. In order to resolve this problem, this paper proposes a novel approach for small files process, which works as an engine independent with the HDFS. This engine can reduce the overhead of HDFS effectively. It uses Reactor multiplexed IO to build the server and uses non-blocking IO to merge and read small files. And the engine has a cache of small files that can make the reading efficiently. This paper presents the small files processing strategy for files efficient merger, which builds the file index and uses boundary file block filling mechanism to accomplish files separation and files retrieval. At last the experimental results show that the novel approach has improved the efficiency of storing and processing massive small files in HDFS. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
48. Research and Implementation of a Research Projects Management System Based on SOA.
- Author
-
Zhang, Gang, Yue, Tong, and Liu, Mengwen
- Abstract
In order to cooperate and integrate among heterogeneous systems of different departments in schools, a solution of Research Projects Management System (RPMS) based on Service-Oriented Architecture (SOA) is proposed in this paper. This solution divides the application system into two parts: service layer and application layer. Service layer provides the abstract level between traditional business process and application layer. The service in service layer encapsulates the business unit and business process logic. After analyzing some SOA's techniques, our system uses Web services as service layer and adopts Apache Axis2 as the engine of web service process. Application layer encapsulates application logic to achieve concrete functions. The system employs J2EE architecture to implement concrete business functions [1]. The implementation of this system achieves the purpose of information interaction and business process integration between heterogeneous systems. Every part of this system has favorable ability of reusable, and can fit the changes of business process rather good. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
49. The Design Method of Network Chat System Based on Socket and Cloud Computing.
- Author
-
Cai, Minqiang
- Abstract
This paper puts forward the design method of network chat system based on Socket and cloud computing technology. Socket interface is an application programming interface of TCP/IP network, this interface definition of a number of functions or routine, programmers can use them to the development of TCP / IP network applications. Java Socket is tailored for the Java language by SUN which is used to develop network application program. This paper reference as the predecessor's research achievements, this paper introduces the Socket interface and cloud computing technology is an important concept of, analyzes the Socket communication mechanism in principle, this paper studies the application of Java Socket, In order to improve the communication network chat in the data stored safety and efficiency, specifically in the Socket technology application based add on cloud computing technology to the improvement of the method. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
50. Study on Performance Test of Storage Structure Base on State Scene Performance.
- Author
-
Li, Zhu, Lei-Lei, Zhai, Hongyu, Liu, Dan, and Wang, Hai-Fang
- Abstract
This paper is an introduction to software performance automated testing and theory. It introduces the features of Open Xml storage and SQL Server storage. Then this paper sets three state scenes and chooses different test automated tools respectively. Finally, it uses tools to monitor software performance index from these two data storage systems. Results are then analyzed, comparing the quality performance of different storage systems to the same state scene. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.