首页 > 最新文献

Journal of Innovation in Digital Ecosystems最新文献

英文 中文
Effect of selective replication strategy and dynamic admission control to QoS management in video on demand systems 选择性复制策略和动态准入控制对视频点播系统QoS管理的影响
Pub Date : 2015-12-01 DOI: 10.1016/j.jides.2015.11.002
Bechir Alaya, Salah Zidi, Lamri Laouamer, Tarek Moulahi

Several solutions have been proposed till date to achieve effective replication policies and admission control methods that can ensure a high Quality of Service (QoS) to Video on Demand (VoD) systems. In this paper, we have chosen to study admission control and a replication strategy in a video on demand system called Feedback Control Architecture for Distributed Multimedia Systems (FCA-DMS). The proposed approaches are founded on (i) the supervision and auto-adaptation of the system load, (ii) continued knowledge of the network and of the video servers’ workload, and (iii) the development of a dynamic replication strategy of segments for popular video, that remade to replica-placement problem by discussing the problem of the replicas number to create (Replication Degree). The workload of video servers and of network are calculated by a QoS controller. The proposed approach takes into account of replica detail and offers a replica removal policy to avoid waste and for a good management of storage space. The goal is to maintain an updated broad view of the system’s behaviour from the collected measurements to databases of available videos and databases of available video servers. To demonstrate the efficiency and feasibility of our approaches and validate the results obtained, we conducted a series of experiments based on a simulator that we implemented.

迄今为止,已经提出了几种解决方案来实现有效的复制策略和允许控制方法,以确保视频点播系统的高服务质量(QoS)。在本文中,我们选择研究了一个视频点播系统中的准入控制和复制策略,该系统称为分布式多媒体系统(FCA-DMS)的反馈控制体系结构。所提出的方法是建立在(i)系统负载的监督和自适应,(ii)对网络和视频服务器工作负载的持续了解,以及(iii)流行视频片段的动态复制策略的开发,通过讨论要创建的副本数量(复制程度)问题,将其重新定位为副本放置问题。通过QoS控制器计算视频服务器和网络的工作负载。该方法考虑了副本的细节,并提供了副本删除策略,以避免浪费和良好的存储空间管理。目标是从收集到的测量数据到可用视频数据库和可用视频服务器数据库,保持对系统行为的更新的广泛视图。为了证明我们的方法的有效性和可行性,并验证所获得的结果,我们在我们实现的模拟器上进行了一系列实验。
{"title":"Effect of selective replication strategy and dynamic admission control to QoS management in video on demand systems","authors":"Bechir Alaya,&nbsp;Salah Zidi,&nbsp;Lamri Laouamer,&nbsp;Tarek Moulahi","doi":"10.1016/j.jides.2015.11.002","DOIUrl":"10.1016/j.jides.2015.11.002","url":null,"abstract":"<div><p>Several solutions have been proposed till date to achieve effective replication policies and admission control methods that can ensure a high Quality of Service (QoS) to Video on Demand (VoD) systems. In this paper, we have chosen to study admission control and a replication strategy in a video on demand system called Feedback Control Architecture for Distributed Multimedia Systems (FCA-DMS). The proposed approaches are founded on (i) the supervision and auto-adaptation of the system load, (ii) continued knowledge of the network and of the video servers’ workload, and (iii) the development of a dynamic replication strategy of segments for popular video, that remade to replica-placement problem by discussing the problem of the replicas number to create (Replication Degree). The workload of video servers and of network are calculated by a QoS controller. The proposed approach takes into account of replica detail and offers a replica removal policy to avoid waste and for a good management of storage space. The goal is to maintain an updated broad view of the system’s behaviour from the collected measurements to databases of available videos and databases of available video servers. To demonstrate the efficiency and feasibility of our approaches and validate the results obtained, we conducted a series of experiments based on a simulator that we implemented.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"2 1","pages":"Pages 45-54"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.11.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133161690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification and statistical learning for detecting of switching time for switched linear systems 切换线性系统切换时间检测的分类与统计学习
Pub Date : 2015-12-01 DOI: 10.1016/j.jides.2015.10.002
Lamaa Sellami, Kamel Abderrahim

In this paper, a new method for the detection of switching time is proposed for discrete-time linear switched systems, whose switching mechanism is unknown. The switching instant estimation problem consists to predict the mode switching for discrete behavior from a finite set of input–output data. First, the proposed method use a clustering and classification approach define the number of submodels and the data repartition. Then, by the use of statistical learning approach, we define the linear boundary separator of each validity region. Finally, a technique of detection given an explicitly estimation of switching time. A numerical example was reported to evaluate the proposed method.

针对开关机制未知的离散线性开关系统,提出了一种新的开关时间检测方法。切换瞬间估计问题包括从一组有限的输入输出数据中预测离散行为的模式切换。首先,采用聚类和分类的方法定义子模型的个数和数据的重划分。然后,利用统计学习的方法,定义每个有效区域的线性边界分隔符。最后,给出了一种显式估计开关时间的检测技术。最后通过数值算例对该方法进行了验证。
{"title":"Classification and statistical learning for detecting of switching time for switched linear systems","authors":"Lamaa Sellami,&nbsp;Kamel Abderrahim","doi":"10.1016/j.jides.2015.10.002","DOIUrl":"10.1016/j.jides.2015.10.002","url":null,"abstract":"<div><p>In this paper, a new method for the detection of switching time is proposed for discrete-time linear switched systems, whose switching mechanism is unknown. The switching instant estimation problem consists to predict the mode switching for discrete behavior from a finite set of input–output data. First, the proposed method use a clustering and classification approach define the number of submodels and the data repartition. Then, by the use of statistical learning approach, we define the linear boundary separator of each validity region. Finally, a technique of detection given an explicitly estimation of switching time. A numerical example was reported to evaluate the proposed method.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"2 1","pages":"Pages 13-19"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.10.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125223882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing digital image integrity by exploiting JPEG bitstream attributes 利用JPEG比特流属性增强数字图像的完整性
Pub Date : 2015-12-01 DOI: 10.1016/j.jides.2015.10.003
Musab Ghadi , Lamri Laouamer , Tarek Moulahi

The need for protecting a huge amount of digital images on the internet has become an important requirement against different kind of attacks in order to insure transmitted process in a secure way. Cryptography introduces many security goals to achieve privacy of image include confidentiality, authentication and integrity. Encryption process may applied on the result of JPEG DCT-based encoding process, which are DC and AC coefficients, where DC coefficients present the average of the overall magnitude of the input image and AC coefficients present the higher frequency components of image. In this paper, we develop a new model for securing the transmitted images via wireless network by parsing JPEG bitstream to encrypting both DC and AC coefficients in each 8×8 block of image. This work utilizes the features of DCT-based encoding process preserving low complexity, efficient compression, and robustness to protect the image integrity. The experiments result shows that the proposed approach gives an interesting and a significant robustness ratio reaching a range of 60.3 dB for Peak Signal-to-Noise Ratio (PSNR) and a 0.006% for Bit Error Rate (BER) in average. The obtained results are discussed in details.

为了保证传输过程的安全,保护互联网上大量的数字图像免受各种攻击已经成为一项重要的要求。密码学引入了许多安全目标来实现图像的隐私性,包括机密性、身份验证和完整性。基于JPEG的dct编码过程的结果可以应用加密过程,即DC系数和AC系数,其中DC系数表示输入图像整体幅度的平均值,AC系数表示图像的高频分量。在本文中,我们开发了一个新的模型来保护通过无线网络传输的图像,通过解析JPEG比特流来加密每个8×8块图像中的DC和AC系数。利用基于dct的编码过程保持低复杂度、高效压缩和鲁棒性的特点来保护图像的完整性。实验结果表明,该方法具有显著的鲁棒性,峰值信噪比(PSNR)可达60.3 dB,误码率(BER)平均为0.006%。对所得结果进行了详细的讨论。
{"title":"Enhancing digital image integrity by exploiting JPEG bitstream attributes","authors":"Musab Ghadi ,&nbsp;Lamri Laouamer ,&nbsp;Tarek Moulahi","doi":"10.1016/j.jides.2015.10.003","DOIUrl":"10.1016/j.jides.2015.10.003","url":null,"abstract":"<div><p>The need for protecting a huge amount of digital images on the internet has become an important requirement against different kind of attacks in order to insure transmitted process in a secure way. Cryptography introduces many security goals to achieve privacy of image include confidentiality, authentication and integrity. Encryption process may applied on the result of JPEG DCT-based encoding process, which are DC and AC coefficients, where DC coefficients present the average of the overall magnitude of the input image and AC coefficients present the higher frequency components of image. In this paper, we develop a new model for securing the transmitted images via wireless network by parsing JPEG bitstream to encrypting both DC and AC coefficients in each 8×8 block of image. This work utilizes the features of DCT-based encoding process preserving low complexity, efficient compression, and robustness to protect the image integrity. The experiments result shows that the proposed approach gives an interesting and a significant robustness ratio reaching a range of 60.3 dB for Peak Signal-to-Noise Ratio (PSNR) and a 0.006% for Bit Error Rate (BER) in average. The obtained results are discussed in details.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"2 1","pages":"Pages 20-31"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.10.003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133504393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Robust watermarking scheme and tamper detection based on threshold versus intensity 基于阈值强度的鲁棒水印方案及篡改检测
Pub Date : 2015-12-01 DOI: 10.1016/j.jides.2015.10.001
Lamri Laouamer , Muath AlShaikh , Laurent Nana , Anca Chrisitine Pascu

A watermarking field is necessary to prove the copyright, ownership, authenticity and other related security aspects of the electronic data. Semi-Blind watermarking refers to need the watermark image during the extraction process. While, informed watermarking generates the watermark data from the original image itself. Moreover, Tamper detection is useful to discover the tamper zone in the image. In this paper, we propose a semi blind and informed watermarking approach. We build the watermark from the original image using Weber Law. Our approach aims to provide a high robustness and imperceptibility with perfectly tamper detection zone. We divide the original image into blocks and the main pixel is chosen for watermark insertion, where the embedding/extraction operates in the spatial domain. The tamper detection is tested by tampering watermarked image, and then based on the extracted attacked watermark; we can discover the tamper area. Also, the robustness watermarking aspect is proved against different kind of geometric and non-geometric attacks. Based on the experimental results, the imperceptibility and robustness of our watermarking approach are proven and showing perfectly the detection of the tamper zones.

水印是证明电子数据的版权、所有权、真实性和其他相关安全方面的必要条件。半盲水印是指在提取过程中需要对水印图像进行提取。而知情水印则从原始图像本身生成水印数据。此外,篡改检测有助于发现图像中的篡改区域。本文提出了一种半盲的知情水印方法。我们利用韦伯定律从原始图像中生成水印。我们的方法旨在提供高鲁棒性和不可感知性,具有完美的篡改检测区域。我们将原始图像分割成若干块,选择主像素进行水印嵌入,水印嵌入/提取在空间域中进行。通过对水印图像进行篡改,然后根据提取的被攻击水印进行篡改检测;我们可以发现篡改区域。同时,证明了水印对各种几何和非几何攻击的鲁棒性。实验结果表明,该方法具有较好的不可感知性和鲁棒性,能够很好地检测出篡改区。
{"title":"Robust watermarking scheme and tamper detection based on threshold versus intensity","authors":"Lamri Laouamer ,&nbsp;Muath AlShaikh ,&nbsp;Laurent Nana ,&nbsp;Anca Chrisitine Pascu","doi":"10.1016/j.jides.2015.10.001","DOIUrl":"10.1016/j.jides.2015.10.001","url":null,"abstract":"<div><p>A watermarking field is necessary to prove the copyright, ownership, authenticity and other related security aspects of the electronic data. Semi-Blind watermarking refers to need the watermark image during the extraction process. While, informed watermarking generates the watermark data from the original image itself. Moreover, Tamper detection is useful to discover the tamper zone in the image. In this paper, we propose a semi blind and informed watermarking approach. We build the watermark from the original image using Weber Law. Our approach aims to provide a high robustness and imperceptibility with perfectly tamper detection zone. We divide the original image into blocks and the main pixel is chosen for watermark insertion, where the embedding/extraction operates in the spatial domain. The tamper detection is tested by tampering watermarked image, and then based on the extracted attacked watermark; we can discover the tamper area. Also, the robustness watermarking aspect is proved against different kind of geometric and non-geometric attacks. Based on the experimental results, the imperceptibility and robustness of our watermarking approach are proven and showing perfectly the detection of the tamper zones.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"2 1","pages":"Pages 1-12"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.10.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125238538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A pattern-based method for refining and formalizing informal specifications in critical control systems 一种基于模式的方法,用于精炼和形式化关键控制系统中的非正式规范
Pub Date : 2015-12-01 DOI: 10.1016/j.jides.2015.11.001
Mohamed Ghazel, Jing Yang, El-Miloudi El-Koursi

Processing specifications is an issue of crucial importance when developing critical complex systems. In particular, establishing rigorous specifications broadly impacts the subsequent engineering phases. This paper discusses a refinement technique for processing informal specifications expressed in a literal shape, with the aim to generate formal specifications appropriate to automatic processing. The developed technique carries out an iterative process which relies on a set of basic refinement patterns that we have established, and ends up with a formalization step which actually generates logical CTL* formulas. Furthermore, the method implements traceability facilities, which allow for a tidy backtracking of the whole process. The concepts introduced to set up the various mechanisms are discussed and a case study featuring an embedded railway control system is used to illustrate our technique.

在开发关键复杂系统时,处理规范是一个至关重要的问题。特别地,建立严格的规范会广泛地影响后续的工程阶段。本文讨论了一种处理以文字形式表示的非正式规范的细化技术,目的是生成适合于自动处理的正式规范。所开发的技术执行一个迭代过程,该过程依赖于我们已经建立的一组基本的细化模式,并以实际生成逻辑CTL*公式的形式化步骤结束。此外,该方法实现了可追溯性工具,允许对整个过程进行整齐的回溯。讨论了建立各种机制的概念,并以嵌入式铁路控制系统为例说明了我们的技术。
{"title":"A pattern-based method for refining and formalizing informal specifications in critical control systems","authors":"Mohamed Ghazel,&nbsp;Jing Yang,&nbsp;El-Miloudi El-Koursi","doi":"10.1016/j.jides.2015.11.001","DOIUrl":"10.1016/j.jides.2015.11.001","url":null,"abstract":"<div><p>Processing specifications is an issue of crucial importance when developing critical complex systems. In particular, establishing rigorous specifications broadly impacts the subsequent engineering phases. This paper discusses a refinement technique for processing informal specifications expressed in a literal shape, with the aim to generate formal specifications appropriate to automatic processing. The developed technique carries out an iterative process which relies on a set of basic refinement patterns that we have established, and ends up with a formalization step which actually generates logical CTL* formulas. Furthermore, the method implements traceability facilities, which allow for a tidy backtracking of the whole process. The concepts introduced to set up the various mechanisms are discussed and a case study featuring an embedded railway control system is used to illustrate our technique.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"2 1","pages":"Pages 32-44"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.11.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130257490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A method for automatic detection and manual localization of content-based translation errors and shifts 一种基于内容的翻译错误和移位的自动检测和手动定位方法
Pub Date : 2014-12-01 DOI: 10.1016/j.jides.2015.02.004
Éric André Poirier

In this paper, we describe a method for automatic detection and manual localization of four compositional translation errors and shifts between automatically aligned segments in source and target languages. The automatic detection of errors and shifts is based on a content word precision algorithm which measures the equality of information content between source and target segments. The manual localization of errors and shifts within the segments is based on the compositionality principle. The method allows for the detection and localization of two potential errors; omission and addition, as well as two translation shifts required to avoid a translation error such as over-translation (when a correct translation results in more content words than in the source segment) and under-translation (when a correct translation results in less content words than in the source segment). Because of manual localization within bilingual pairs of segments, the method is not intended for automatic error detection but for human-assisted revision of translations. The analysis, described with the method and the algorithm is applied to real translation examples culled from a state-of-the-art translation corpus sampled for various translation errors. The algorithm and the localization method have implications for the development of more content-oriented natural language processing as well as for the training of professional translators; they can also be useful for formal and systematic description of content-based translation errors.

在本文中,我们描述了一种自动检测和手动定位源语言和目标语言中四种组合翻译错误和自动对齐片段之间偏移的方法。错误和移位的自动检测基于内容词精度算法,该算法测量源段和目标段之间信息内容的相等性。人工定位的误差和位移分段是基于组合性原则。该方法允许检测和定位两个潜在的错误;省略和添加,以及避免翻译错误所需的两次翻译转换,例如过度翻译(正确的翻译导致的内容词比源段多)和欠翻译(正确的翻译导致的内容词比源段少)。由于在双语片段对中需要手动定位,因此该方法不是用于自动错误检测,而是用于人工辅助的翻译修订。用该方法和算法描述的分析应用于从最先进的翻译语料库中挑选的真实翻译示例,以采样各种翻译错误。该算法和本地化方法对面向内容的自然语言处理的发展以及专业翻译人员的培训具有重要意义;它们还可以用于正式和系统地描述基于内容的翻译错误。
{"title":"A method for automatic detection and manual localization of content-based translation errors and shifts","authors":"Éric André Poirier","doi":"10.1016/j.jides.2015.02.004","DOIUrl":"https://doi.org/10.1016/j.jides.2015.02.004","url":null,"abstract":"<div><p>In this paper, we describe a method for automatic detection and manual localization of four compositional translation errors and shifts between automatically aligned segments in source and target languages. The automatic detection of errors and shifts is based on a content word precision algorithm which measures the equality of information content between source and target segments. The manual localization of errors and shifts within the segments is based on the compositionality principle. The method allows for the detection and localization of two potential errors; omission and addition, as well as two translation shifts required to avoid a translation error such as over-translation (when a correct translation results in more content words than in the source segment) and under-translation (when a correct translation results in less content words than in the source segment). Because of manual localization within bilingual pairs of segments, the method is not intended for automatic error detection but for human-assisted revision of translations. The analysis, described with the method and the algorithm is applied to real translation examples culled from a state-of-the-art translation corpus sampled for various translation errors. The algorithm and the localization method have implications for the development of more content-oriented natural language processing as well as for the training of professional translators; they can also be useful for formal and systematic description of content-based translation errors.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"1 1","pages":"Pages 38-46"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.02.004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91736333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A bi-objective cost model for optimizing database queries in a multi-cloud environment 用于优化多云环境中数据库查询的双目标成本模型
Pub Date : 2014-12-01 DOI: 10.1016/j.jides.2015.02.002
Anastasios Gounaris, Zisis Karampaglis, Athanasios Naskos, Yannis Manolopoulos

Cost models are broadly used in query processing to drive the query optimization process, accurately predict the query execution time, schedule database query tasks, apply admission control and derive resource requirements to name a few applications. The main role of cost models is to estimate the time needed to run the query on a specific machine. In a multi-cloud environment, cost models should be easily calibrated for a wide range of different physical machines, and time estimates need to be complemented with monetary cost information, since both the economic cost and the performance are of primary importance. This work aims to serve as the first proposal for a bi-objective query cost model suitable for queries executed over resources provided by potentially multiple cloud providers. We leverage existing calibrating modeling techniques for time estimates and we couple such estimates with monetary cost information covering the main charging options for using cloud resources. Moreover, we explain how the cost model can become part of an optimizer. Our approach is applicable to more generic data flow graphs, the execution plans of which do not necessarily comprise relational operators. Finally, we give a concrete example about the usage of our proposal and we validate its accuracy through real case studies.

成本模型广泛应用于查询处理中,用于驱动查询优化过程、准确预测查询执行时间、调度数据库查询任务、应用准入控制和派生资源需求等。成本模型的主要作用是估计在特定机器上运行查询所需的时间。在多云环境中,成本模型应该很容易针对各种不同的物理机器进行校准,并且时间估计需要与货币成本信息相辅相成,因为经济成本和性能都是最重要的。这项工作旨在作为双目标查询成本模型的第一个建议,该模型适用于在可能由多个云提供商提供的资源上执行的查询。我们利用现有的校准建模技术进行时间估计,并将这种估计与涵盖使用云资源的主要收费选项的货币成本信息结合起来。此外,我们解释了成本模型如何成为优化器的一部分。我们的方法适用于更通用的数据流图,这些图的执行计划不一定包含关系操作符。最后,我们给出了一个具体的应用实例,并通过实际案例验证了该方法的准确性。
{"title":"A bi-objective cost model for optimizing database queries in a multi-cloud environment","authors":"Anastasios Gounaris,&nbsp;Zisis Karampaglis,&nbsp;Athanasios Naskos,&nbsp;Yannis Manolopoulos","doi":"10.1016/j.jides.2015.02.002","DOIUrl":"https://doi.org/10.1016/j.jides.2015.02.002","url":null,"abstract":"<div><p>Cost models are broadly used in query processing to drive the query optimization process, accurately predict the query execution time, schedule database query tasks, apply admission control and derive resource requirements to name a few applications. The main role of cost models is to estimate the time needed to run the query on a specific machine. In a multi-cloud environment, cost models should be easily calibrated for a wide range of different physical machines, and time estimates need to be complemented with monetary cost information, since both the economic cost and the performance are of primary importance. This work aims to serve as the first proposal for a bi-objective query cost model suitable for queries executed over resources provided by potentially multiple cloud providers. We leverage existing calibrating modeling techniques for time estimates and we couple such estimates with monetary cost information covering the main charging options for using cloud resources. Moreover, we explain how the cost model can become part of an optimizer. Our approach is applicable to more generic data flow graphs, the execution plans of which do not necessarily comprise relational operators. Finally, we give a concrete example about the usage of our proposal and we validate its accuracy through real case studies.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"1 1","pages":"Pages 12-25"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.02.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91736331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A brief overview and an experimental evaluation of data confidentiality measures on the cloud 对云上数据保密措施的简要概述和实验评估
Pub Date : 2014-12-01 DOI: 10.1016/j.jides.2015.02.001
Hussain Aljafer , Zaki Malik , Mohammed Alodib , Abdelmounaam Rezgui

Due to the many advantages offered by the cloud computing paradigm, it is fast becoming an enabling technology for many organizations, and even individual users. Flexibility and availability are two of the most important features that promote the wide spread adoption of this technology. In cloud-based data storage scenarios, where the data is controlled by a third party (i.e. the cloud service provider), the data owner usually does not have full control of its data at all stages. Consequently, this poses a prime security threat, and a major challenge is the development of a secure protocol for data storage, sharing, and retrieval. In recent years, a number of research works have targeted this problem. In this paper, we discuss some of the major approaches for secure data sharing in the cloud computing environment. The goal is to provide a concise survey of existing solutions, discuss their benefits, and point out any shortcomings for future research. Specifically, we focus on the use of encryption schemes, and provide a comparative study of the major schemes, through implementation of some representative frameworks.

由于云计算范式提供了许多优点,它正迅速成为许多组织甚至个人用户的支持技术。灵活性和可用性是促进该技术广泛采用的两个最重要的特性。在基于云的数据存储场景中,数据由第三方(即云服务提供商)控制,数据所有者通常不会在所有阶段完全控制其数据。因此,这构成了主要的安全威胁,而主要的挑战是开发用于数据存储、共享和检索的安全协议。近年来,针对这一问题进行了大量的研究工作。在本文中,我们讨论了云计算环境中安全数据共享的一些主要方法。目的是提供现有解决方案的简明调查,讨论它们的好处,并指出未来研究的任何缺点。具体来说,我们关注加密方案的使用,并通过实现一些有代表性的框架对主要方案进行比较研究。
{"title":"A brief overview and an experimental evaluation of data confidentiality measures on the cloud","authors":"Hussain Aljafer ,&nbsp;Zaki Malik ,&nbsp;Mohammed Alodib ,&nbsp;Abdelmounaam Rezgui","doi":"10.1016/j.jides.2015.02.001","DOIUrl":"https://doi.org/10.1016/j.jides.2015.02.001","url":null,"abstract":"<div><p>Due to the many advantages offered by the cloud computing paradigm, it is fast becoming an enabling technology for many organizations, and even individual users. Flexibility and availability are two of the most important features that promote the wide spread adoption of this technology. In cloud-based data storage scenarios, where the data is controlled by a third party (i.e. the cloud service provider), the data owner usually does not have full control of its data at all stages. Consequently, this poses a prime security threat, and a major challenge is the development of a secure protocol for data storage, sharing, and retrieval. In recent years, a number of research works have targeted this problem. In this paper, we discuss some of the major approaches for secure data sharing in the cloud computing environment. The goal is to provide a concise survey of existing solutions, discuss their benefits, and point out any shortcomings for future research. Specifically, we focus on the use of encryption schemes, and provide a comparative study of the major schemes, through implementation of some representative frameworks.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"1 1","pages":"Pages 1-11"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.02.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91736332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A typed applicative system for a language and text processing engineering 一种用于语言和文本处理工程的类型化应用系统
Pub Date : 2014-12-01 DOI: 10.1016/j.jides.2015.02.003
Ismaïl Biskri, Marie Anastacio, Adam Joly, Boucif Amar Bensaber

In this paper, we present a flexible, modular, consistent, and coherent approach for language and text processing engineering. Each processing chain dedicated to text processing is regarded as a serial or parallel assembly of modules, underlying particular tasks a user wants to apply to a text. Users, according to their needs and perspectives might want to build and validate their own processing chain by assembling a set of modules according to a certain configuration. In this paper, we suggest a theoretical formal system based on the model of the typed applicative grammars and the combinatory logic. This approach allows providing a general framework in which users would be able to build multiple language and text analysis processes according to their own objectives. It will also systematize the verification of the logical consistency of the sequence of modules in the assembly that characterizes a given processing chain.

在本文中,我们提出了一种灵活、模块化、一致和连贯的语言和文本处理工程方法。每个专门用于文本处理的处理链都被视为模块的串行或并行组装,这些模块是用户想要应用于文本的特定任务的基础。根据用户的需求和观点,他们可能希望通过根据特定配置组装一组模块来构建和验证他们自己的处理链。本文提出了一种基于类型化应用语法和组合逻辑模型的理论形式体系。这种方法允许提供一个通用的框架,在这个框架中,用户可以根据自己的目标构建多种语言和文本分析过程。它还将系统化验证具有给定处理链特征的装配中模块序列的逻辑一致性。
{"title":"A typed applicative system for a language and text processing engineering","authors":"Ismaïl Biskri,&nbsp;Marie Anastacio,&nbsp;Adam Joly,&nbsp;Boucif Amar Bensaber","doi":"10.1016/j.jides.2015.02.003","DOIUrl":"10.1016/j.jides.2015.02.003","url":null,"abstract":"<div><p>In this paper, we present a flexible, modular, consistent, and coherent approach for language and text processing engineering. Each processing chain dedicated to text processing is regarded as a serial or parallel assembly of modules, underlying particular tasks a user wants to apply to a text. Users, according to their needs and perspectives might want to build and validate their own processing chain by assembling a set of modules according to a certain configuration. In this paper, we suggest a theoretical formal system based on the model of the typed applicative grammars and the combinatory logic. This approach allows providing a general framework in which users would be able to build multiple language and text analysis processes according to their own objectives. It will also systematize the verification of the logical consistency of the sequence of modules in the assembly that characterizes a given processing chain.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"1 1","pages":"Pages 26-37"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.02.003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121026024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Co-locating services in IoT systems to minimize the communication energy cost 在物联网系统中共同定位服务,以最大限度地降低通信能源成本
Pub Date : 2014-12-01 DOI: 10.1016/j.jides.2015.02.005
Zhenqiu Huang , Kwei-Jay Lin , Shih-Yuan Yu , Jane Yung-jen Hsu

Ubiquitous sensing and actuating devices are now everywhere in our living environment as part of the global cyber–physical ecosystem. Sensing and actuating capabilities can be modeled as services to compose intelligent Internet of Things (IoT) applications. An issue for perpetually running and managing these IoT devices is the energy cost. One energy saving strategy is to co-locate several services on one device in order to reduce the computing and communication energy. In this paper, we propose a service merging strategy for mapping and co-locating multiple services on devices. In a multi-hop network, the service co-location problem is formulated as a quadratic programming problem. We show a reduction method that reduces it to the integer programming problem. In a single hop network, the service co-location problem can be modeled as the Maximum Weighted Independent Set (MWIS) problem. We show the algorithm to transform a service flow to a co-location graph, then use known heuristic algorithms to find the maximum independent set which is the basis for making service co-location decisions. The performance of different co-location algorithms are evaluated by simulation in this paper.

作为全球网络物理生态系统的一部分,无处不在的传感和驱动设备现在在我们的生活环境中无处不在。感知和执行能力可以建模为服务,以组成智能物联网(IoT)应用程序。长期运行和管理这些物联网设备的一个问题是能源成本。一种节能策略是在一台设备上共同定位多个服务,以减少计算和通信能量。在本文中,我们提出了一种服务合并策略,用于在设备上映射和共定位多个服务。在多跳网络中,服务共址问题被表述为一个二次规划问题。我们给出了一种简化方法,将其简化为整数规划问题。在单跳网络中,服务共址问题可以建模为最大加权独立集(MWIS)问题。我们给出了将服务流转换为共址图的算法,然后使用已知的启发式算法找到最大独立集,这是做出服务共址决策的基础。本文通过仿真对不同的协同定位算法的性能进行了评价。
{"title":"Co-locating services in IoT systems to minimize the communication energy cost","authors":"Zhenqiu Huang ,&nbsp;Kwei-Jay Lin ,&nbsp;Shih-Yuan Yu ,&nbsp;Jane Yung-jen Hsu","doi":"10.1016/j.jides.2015.02.005","DOIUrl":"10.1016/j.jides.2015.02.005","url":null,"abstract":"<div><p>Ubiquitous sensing and actuating devices are now everywhere in our living environment as part of the global cyber–physical ecosystem. Sensing and actuating capabilities can be modeled as services to compose intelligent Internet of Things (IoT) applications. An issue for perpetually running and managing these IoT devices is the energy cost. One energy saving strategy is to co-locate several services on one device in order to reduce the computing and communication energy. In this paper, we propose a service merging strategy for mapping and co-locating multiple services on devices. In a multi-hop network, the service co-location problem is formulated as a quadratic programming problem. We show a reduction method that reduces it to the integer programming problem. In a single hop network, the service co-location problem can be modeled as the Maximum Weighted Independent Set (MWIS) problem. We show the algorithm to transform a service flow to a co-location graph, then use known heuristic algorithms to find the maximum independent set which is the basis for making service co-location decisions. The performance of different co-location algorithms are evaluated by simulation in this paper.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"1 1","pages":"Pages 47-57"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.02.005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113966355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
期刊
Journal of Innovation in Digital Ecosystems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1