Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045052
P. Hemant, N. P. Chawande, Avinash Sonule, Hemant Wani
Cloud computing makes an aim come true for the users to get all the resources instantly from various locations that are not known. But there are lot of hurdles in accomplishing this idea in the form of security parameters and backup issues. In this paper we have discussed the solution to there issue by integrating the encryption and server management techniques in order to make a smooth transaction between the user and the server. We propose a new prototype system where we have introduced a governance body which will handle all the transactions from the user to the actual server from where the user is requesting. We have introduced routing table at each end server and middle server (Governance server) so as to get the database of client to server connectivity.
{"title":"Development of servers in cloud computing to solve issues related to security and backup","authors":"P. Hemant, N. P. Chawande, Avinash Sonule, Hemant Wani","doi":"10.1109/CCIS.2011.6045052","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045052","url":null,"abstract":"Cloud computing makes an aim come true for the users to get all the resources instantly from various locations that are not known. But there are lot of hurdles in accomplishing this idea in the form of security parameters and backup issues. In this paper we have discussed the solution to there issue by integrating the encryption and server management techniques in order to make a smooth transaction between the user and the server. We propose a new prototype system where we have introduced a governance body which will handle all the transactions from the user to the actual server from where the user is requesting. We have introduced routing table at each end server and middle server (Governance server) so as to get the database of client to server connectivity.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130371754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045107
Yan Peng, Chenyue Zhang
Information extraction (IE) addresses the problem of extracting specific information from a collection of documents. The work presented in this paper described an approach of design an information extraction system; put forward basic system architecture. Describe the detail steps of web information extraction, such as web page organize, rule generate and result show. Finally, successfully extracted information is placed in an XML template, which has been designed to capture information needed in the teaching-learning system. Although the work presented in this paper was restricted to HTML course outlines, the concepts and methods are easily applied to other different domains.
{"title":"Web information extraction and its application","authors":"Yan Peng, Chenyue Zhang","doi":"10.1109/CCIS.2011.6045107","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045107","url":null,"abstract":"Information extraction (IE) addresses the problem of extracting specific information from a collection of documents. The work presented in this paper described an approach of design an information extraction system; put forward basic system architecture. Describe the detail steps of web information extraction, such as web page organize, rule generate and result show. Finally, successfully extracted information is placed in an XML template, which has been designed to capture information needed in the teaching-learning system. Although the work presented in this paper was restricted to HTML course outlines, the concepts and methods are easily applied to other different domains.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131176979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045021
Anqi Cui, Min Zhang, Yiqun Liu, Shaoping Ma
Microblogging services are attracting people and companies to share their ideas and interests. Since the texts of microblog messages are limited, people post URLs to link to other websites for detailed information. Hence, URLs with higher attentions are spread widely and represent popular information. However, not all these URLs are useful. Many of them are spam URLs which are posted by automated agents or by pushing services from other websites automatically. Based on the features of the popular URLs, we divide them into four categories and propose a clustering and classification algorithm to distinguish spam URLs from the really popular ones. Comparative experiments are conducted on English (Twitter) and Chinese (Sina Weibo) messages. We conclude that more than half of the popular URLs are spam. Most of them are pushed from other websites; even the really popular ones gain much attention from the pushing services. Although the proportions of URLs in Twitter and Sina Weibo messages are different, the characteristics of the spam URLs are similar. Our method is efficient for detecting spam URLs and their authors without annotations, and is helpful for both research and business on microblog.
{"title":"Are the URLs really popular in microblog messages?","authors":"Anqi Cui, Min Zhang, Yiqun Liu, Shaoping Ma","doi":"10.1109/CCIS.2011.6045021","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045021","url":null,"abstract":"Microblogging services are attracting people and companies to share their ideas and interests. Since the texts of microblog messages are limited, people post URLs to link to other websites for detailed information. Hence, URLs with higher attentions are spread widely and represent popular information. However, not all these URLs are useful. Many of them are spam URLs which are posted by automated agents or by pushing services from other websites automatically. Based on the features of the popular URLs, we divide them into four categories and propose a clustering and classification algorithm to distinguish spam URLs from the really popular ones. Comparative experiments are conducted on English (Twitter) and Chinese (Sina Weibo) messages. We conclude that more than half of the popular URLs are spam. Most of them are pushed from other websites; even the really popular ones gain much attention from the pushing services. Although the proportions of URLs in Twitter and Sina Weibo messages are different, the characteristics of the spam URLs are similar. Our method is efficient for detecting spam URLs and their authors without annotations, and is helpful for both research and business on microblog.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124924561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045054
Wei Li, Shanping Li, Xingen Wang
The load balance optimization is an important research topic in a replication system, which will affect the performance a lot. Especially in a capacity restricted system, the load balance will be adversely affected by the strategy to replicate the object. In this paper, an algorithm which will calculate the different replication degree based on the popularity and the size of each object to improve the load balance of the system is proposed. The simulation of a cache system shows that the algorithm could achieve around 50% performance increase compare with the identical replication degree approach as the system is much more balanced and could process much more requests in a certain time period.
{"title":"Load balance optimization with replication degree customization","authors":"Wei Li, Shanping Li, Xingen Wang","doi":"10.1109/CCIS.2011.6045054","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045054","url":null,"abstract":"The load balance optimization is an important research topic in a replication system, which will affect the performance a lot. Especially in a capacity restricted system, the load balance will be adversely affected by the strategy to replicate the object. In this paper, an algorithm which will calculate the different replication degree based on the popularity and the size of each object to improve the load balance of the system is proposed. The simulation of a cache system shows that the algorithm could achieve around 50% performance increase compare with the identical replication degree approach as the system is much more balanced and could process much more requests in a certain time period.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045105
Bo Zhang
With the proliferation of Web services and the evolution towards the Semantic Web comes the opportunity to automate various Web services tasks. In this paper, we propose the conception of Sub Web Service and present an algorithm of automatic web service composition which based on Sub Web Service. The most contribution of this paper is: (1) propose the conception of Sub Web Service; (2) present a automatic composition algorithm. The simulation experiment indicated that the algorithm we proposed is effective and efficiency when applied in web service composition engine.
{"title":"A Web service composition method based on Sub Web Service","authors":"Bo Zhang","doi":"10.1109/CCIS.2011.6045105","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045105","url":null,"abstract":"With the proliferation of Web services and the evolution towards the Semantic Web comes the opportunity to automate various Web services tasks. In this paper, we propose the conception of Sub Web Service and present an algorithm of automatic web service composition which based on Sub Web Service. The most contribution of this paper is: (1) propose the conception of Sub Web Service; (2) present a automatic composition algorithm. The simulation experiment indicated that the algorithm we proposed is effective and efficiency when applied in web service composition engine.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125222946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045025
Yu Mao, Muyuan Xi, Hao Yu, Xiaojie Wang
In this paper, we propose a novel algorithm that extends the classical probabilistic models to semi-supervised learning framework via manifold regularization. This regularization is used to control the complexity of the model as measured by the geometry of the distribution. Specifically, the intrinsic geometric structure of data is modeled by an adjacency graph, then, the graph Laplacian, analogous to the Laplace-Beltrami operator on manifold, is applied to smooth the data distributions. We realize the regularization framework by applying manifold regularization to conditionally trained log-linear maximum entropy models, which are also known as multinomial logistic regression models. Experimental evidence suggests that our algorithm can exploit the geometry of the data distribution effectively and provide consistent improvement of accuracy. Finally, we give a short discussion of generalizing manifold regularization framework to other probabilistic models.
{"title":"Semi-supervised logistic regression via manifold regularization","authors":"Yu Mao, Muyuan Xi, Hao Yu, Xiaojie Wang","doi":"10.1109/CCIS.2011.6045025","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045025","url":null,"abstract":"In this paper, we propose a novel algorithm that extends the classical probabilistic models to semi-supervised learning framework via manifold regularization. This regularization is used to control the complexity of the model as measured by the geometry of the distribution. Specifically, the intrinsic geometric structure of data is modeled by an adjacency graph, then, the graph Laplacian, analogous to the Laplace-Beltrami operator on manifold, is applied to smooth the data distributions. We realize the regularization framework by applying manifold regularization to conditionally trained log-linear maximum entropy models, which are also known as multinomial logistic regression models. Experimental evidence suggests that our algorithm can exploit the geometry of the data distribution effectively and provide consistent improvement of accuracy. Finally, we give a short discussion of generalizing manifold regularization framework to other probabilistic models.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121846223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045069
L. Hou, Lin Zuo, Pei Luo, Dong Liu
In this paper, a new wavelength assignment scheme called CSSIR (collision-safe source-initiated reservation) has been proposed for distributed lightpath establishment in GMPLS/PCE based Wavelength-switched Optical Networks (WSONs), which has DIR-like forward blocking probability with SIR-like backward blocking probability. In CSSIR, the PCE selects one wavelength reserved with multi-backup to protect the collision. Simulations are conducted to compare it with SIR&DIR. The results show that CSSIR performs better in total blocking than the others under various traffic loads.
{"title":"Collision-safe wavelength assignment scheme for lightpath establishment in WSONs","authors":"L. Hou, Lin Zuo, Pei Luo, Dong Liu","doi":"10.1109/CCIS.2011.6045069","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045069","url":null,"abstract":"In this paper, a new wavelength assignment scheme called CSSIR (collision-safe source-initiated reservation) has been proposed for distributed lightpath establishment in GMPLS/PCE based Wavelength-switched Optical Networks (WSONs), which has DIR-like forward blocking probability with SIR-like backward blocking probability. In CSSIR, the PCE selects one wavelength reserved with multi-backup to protect the collision. Simulations are conducted to compare it with SIR&DIR. The results show that CSSIR performs better in total blocking than the others under various traffic loads.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122298889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045068
Ting Yu, Jing Tian, Shilong Ma, Shengwei Yi, Dan Yu
Recently, scientific computing not only brings benefits for science but also brings new challenges for scientists. Therefore, scientists have to face headache “4 how” problems, which are how to know, organize, use and guarantee resources, and as the solution, scientific computing infrastructure should coordinate and organize kinds of capabilities effectively, so as to provide on-demand and safe computing environment for scientists. So, this paper concludes the related research about scientific computing infrastructure in recent years, and base on that systematically analyze the primary demands of infrastructure, and moreover, we propose Capability Meta Model-CMM as the foundation model for kinds of infrastructure; and then, based on CMM we compare kinds of different infrastructure, including grid and cloud computing, from resources, knowledge, quality and security these four aspects, finally, we summarize the problems and challenges the current infrastructure is facing.
近年来,科学计算在给科学带来好处的同时,也给科学家带来了新的挑战。因此,如何认识、组织、使用和保障资源是科学家们头痛的“4个如何”问题,而作为解决方案,科学计算基础设施应有效协调和组织各种能力,为科学家提供按需、安全的计算环境。因此,本文总结了近年来科学计算基础设施的相关研究,在此基础上系统分析了基础设施的主要需求,并提出了能力元模型(Capability Meta model - cmm)作为各类基础设施的基础模型;然后,在CMM的基础上,从资源、知识、质量和安全四个方面对网格和云计算等不同的基础设施进行了比较,总结了当前基础设施面临的问题和挑战。
{"title":"Gird or cloud? Survey on scientific computing infrastructure","authors":"Ting Yu, Jing Tian, Shilong Ma, Shengwei Yi, Dan Yu","doi":"10.1109/CCIS.2011.6045068","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045068","url":null,"abstract":"Recently, scientific computing not only brings benefits for science but also brings new challenges for scientists. Therefore, scientists have to face headache “4 how” problems, which are how to know, organize, use and guarantee resources, and as the solution, scientific computing infrastructure should coordinate and organize kinds of capabilities effectively, so as to provide on-demand and safe computing environment for scientists. So, this paper concludes the related research about scientific computing infrastructure in recent years, and base on that systematically analyze the primary demands of infrastructure, and moreover, we propose Capability Meta Model-CMM as the foundation model for kinds of infrastructure; and then, based on CMM we compare kinds of different infrastructure, including grid and cloud computing, from resources, knowledge, quality and security these four aspects, finally, we summarize the problems and challenges the current infrastructure is facing.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122345060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045026
X. Geng, Shuxin Qin, Hongxing Chang, Yiping Yang
After nearly 40 years of development, Intelligent Tutoring Systems (ITS) is moving from research labs into the real world. However, Flight training seems to be somewhat divorced from the mainstream of ITS' application. One reason is the difficulty in the knowledge representation of flight training domain, especially the procedural knowledge of flight maneuvers. After a brief review of knowledge representation in ITS, it is clear that the requirements of KR are naturalness and ease to update. Concept Knowledge Tree (CKT) is an ideal method to represent structural and relational knowledge. Behavior Tree is an elegant and understandable solution to procedural knowledge representation for creating reusable logic. CKT and BT can be combined through script and thus a powerful hybrid knowledge representation method was put forward. With authoring tools, a domain expert can even work without the help of knowledge engineer. The analysis of normal takeoff as an example of a single flight maneuver and the construction of flight maneuver knowledge tree proved the hybrid method an appropriate method to develop the domain model of intelligent flight trainer.
{"title":"A hybrid knowledge representation for the domain model of intelligent flight trainer","authors":"X. Geng, Shuxin Qin, Hongxing Chang, Yiping Yang","doi":"10.1109/CCIS.2011.6045026","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045026","url":null,"abstract":"After nearly 40 years of development, Intelligent Tutoring Systems (ITS) is moving from research labs into the real world. However, Flight training seems to be somewhat divorced from the mainstream of ITS' application. One reason is the difficulty in the knowledge representation of flight training domain, especially the procedural knowledge of flight maneuvers. After a brief review of knowledge representation in ITS, it is clear that the requirements of KR are naturalness and ease to update. Concept Knowledge Tree (CKT) is an ideal method to represent structural and relational knowledge. Behavior Tree is an elegant and understandable solution to procedural knowledge representation for creating reusable logic. CKT and BT can be combined through script and thus a powerful hybrid knowledge representation method was put forward. With authoring tools, a domain expert can even work without the help of knowledge engineer. The analysis of normal takeoff as an example of a single flight maneuver and the construction of flight maneuver knowledge tree proved the hybrid method an appropriate method to develop the domain model of intelligent flight trainer.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127402358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-13DOI: 10.1109/CCIS.2011.6045055
Li Gao, Yinghu Zhao
Cloud computing would be a developing tendency for computing network in the future, which had been widely used in many fields. Combing with the domestic and foreign relevant research and based on current situation of the library, virtual node model of cloud computing library was established in this study, then one method of realizing virtualization data service was discussed and virtual node of similar node cluster data was introduced, which would been more reaonalble distribution between dynamic nodes data. In the end, the changing of service mode of future library on cloude computing would be discussed.
{"title":"Application on cloud computing in the future library","authors":"Li Gao, Yinghu Zhao","doi":"10.1109/CCIS.2011.6045055","DOIUrl":"https://doi.org/10.1109/CCIS.2011.6045055","url":null,"abstract":"Cloud computing would be a developing tendency for computing network in the future, which had been widely used in many fields. Combing with the domestic and foreign relevant research and based on current situation of the library, virtual node model of cloud computing library was established in this study, then one method of realizing virtualization data service was discussed and virtual node of similar node cluster data was introduced, which would been more reaonalble distribution between dynamic nodes data. In the end, the changing of service mode of future library on cloude computing would be discussed.","PeriodicalId":128504,"journal":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128020550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}