首页 > 最新文献

2014 3rd International Conference on Advanced Computer Science Applications and Technologies最新文献

英文 中文
A Survey of Intrusion Detection System Using Case Study Kuwait Governments Entities 入侵检测系统的案例研究——以科威特政府为例
Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, A. Al-kandari, Lulwa Ziad Al-Tayyar
The tremendous developments in information technology in our world requires a modern way of Intrusion Detection Systems to prevent damage or compromise the system. Computer Emergency Response Team handles the computer incidents in the computer systems. In the Kuwaiti government entities may find some weaknesses in Intrusion Detection Systems this research dwells for these points by distribute a questionnaire in government's employees. Then try to find the ideal solutions for these problems to reach the maximum level of security in Kuwait government entities. In this paper found that the information security and especially the intrusion detection system in Kuwait government needs to be more efficient by ensure that the organizations use the principles and criteria of using IDS and Cyber security. In the end of this paper there are some recommendations for the organization to improve their system security.
当今世界信息技术的飞速发展需要一种现代化的入侵检测系统来防止对系统的破坏或危害。电脑事故应变小组负责处理电脑系统中的电脑事故。在科威特政府机构可能会发现入侵检测系统的一些弱点,本研究通过在政府雇员中分发调查问卷来探讨这些问题。然后尝试为这些问题找到理想的解决方案,以达到科威特政府实体的最大安全水平。本文发现科威特政府的信息安全,特别是入侵检测系统需要通过确保组织使用入侵检测和网络安全的原则和标准来提高效率。在本文的最后,对企业如何提高系统安全性提出了一些建议。
{"title":"A Survey of Intrusion Detection System Using Case Study Kuwait Governments Entities","authors":"Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, A. Al-kandari, Lulwa Ziad Al-Tayyar","doi":"10.1109/ACSAT.2014.14","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.14","url":null,"abstract":"The tremendous developments in information technology in our world requires a modern way of Intrusion Detection Systems to prevent damage or compromise the system. Computer Emergency Response Team handles the computer incidents in the computer systems. In the Kuwaiti government entities may find some weaknesses in Intrusion Detection Systems this research dwells for these points by distribute a questionnaire in government's employees. Then try to find the ideal solutions for these problems to reach the maximum level of security in Kuwait government entities. In this paper found that the information security and especially the intrusion detection system in Kuwait government needs to be more efficient by ensure that the organizations use the principles and criteria of using IDS and Cyber security. In the end of this paper there are some recommendations for the organization to improve their system security.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Elicit the Best Ways through Identify Congestion Places 通过确定拥堵地点引出最佳方法
Mohammad Alodat, I. Abdullah
In this paper the exploitation of infrastructure and take advantage of communication techniques wired and wireless to help drivers in finding ways does not contain any obstacles and reach to the target with commitment in speed of assessed road. We use Fusion or Polygamy Technology with Fuzzy Logic, Neural Network and Genetic Algorithm for extract Cut-Node (CN). We use Cut-Node (CN) in order to identify obstacles and avoid them such as changes that occur in the lighting, weather conditions, accidents, congestion and maintenance of roads. Cut-Node (CN) useful in understanding the surrounding environment, supporting safe driving, increases the flow and fastest path to arrive at the designated target (end point). Three models have been proposed to extract Cut-Node (CN) as follows: 1) Intuitionistic Fuzzy Set (IFS). 2) The Intuitionistic Fuzzy Set Data Base is representing imprecise data. 3) Intuitionistic Fuzzy Neural Network with Genetic Algorithm (IFNN-GA).
在本文中,利用基础设施,利用有线和无线通信技术,帮助驾驶员找到不包含任何障碍的方法,并以评估道路的速度达到目标。采用模糊逻辑、神经网络和遗传算法相结合的融合或一夫多妻技术提取切割节点(CN)。我们使用Cut-Node (CN)来识别障碍物并避开它们,例如发生在照明、天气条件、事故、拥堵和道路维护中的变化。Cut-Node (CN)有助于了解周围环境,支持安全驾驶,增加流量和到达指定目标(终点)的最快路径。本文提出了三种提取Cut-Node (CN)的模型:1)直觉模糊集(IFS)。2)直觉模糊集数据库表示不精确的数据。3)直觉模糊神经网络遗传算法(IFNN-GA)。
{"title":"Elicit the Best Ways through Identify Congestion Places","authors":"Mohammad Alodat, I. Abdullah","doi":"10.1109/ACSAT.2014.25","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.25","url":null,"abstract":"In this paper the exploitation of infrastructure and take advantage of communication techniques wired and wireless to help drivers in finding ways does not contain any obstacles and reach to the target with commitment in speed of assessed road. We use Fusion or Polygamy Technology with Fuzzy Logic, Neural Network and Genetic Algorithm for extract Cut-Node (CN). We use Cut-Node (CN) in order to identify obstacles and avoid them such as changes that occur in the lighting, weather conditions, accidents, congestion and maintenance of roads. Cut-Node (CN) useful in understanding the surrounding environment, supporting safe driving, increases the flow and fastest path to arrive at the designated target (end point). Three models have been proposed to extract Cut-Node (CN) as follows: 1) Intuitionistic Fuzzy Set (IFS). 2) The Intuitionistic Fuzzy Set Data Base is representing imprecise data. 3) Intuitionistic Fuzzy Neural Network with Genetic Algorithm (IFNN-GA).","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117201251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Composition Process Based on Heterogeneous Software Entities for Mobile Applications 基于异构软件实体的移动应用组合过程
Afrah Djeddar, H. Bendjenna, A. Amirat, M. Oussalah
Despite the plethora of available mobile applications (apps) with theirs different implementations forms (e.g. Component, service, or app) the user's needs differ from user to another. Moreover, the mobile devices are characterized by heterogeneous software and hardware configurations. Thus, an important challenge in the development of mobile apps is their deployment in the heterogeneous devices available on the market. To tackle these challenges, there is a need for a composition process to reuse existing heterogeneous entities for developing mobile apps according to user's requirements and that the behavior of the desired apps can be customized according to theirs various context information. In this paper we address this issue by proposing context-aware mobile apps composition process based-on existing heterogeneous software entities.
尽管有大量可用的移动应用程序(应用程序)具有不同的实现形式(例如组件,服务或应用程序),但用户的需求因用户而异。此外,移动设备具有异构软件和硬件配置的特点。因此,开发移动应用程序的一个重要挑战是在市场上可用的异构设备上部署它们。为了应对这些挑战,需要一个组合过程来重用现有的异构实体,以根据用户的需求开发移动应用程序,并且所需应用程序的行为可以根据他们的各种上下文信息进行定制。在本文中,我们通过提出基于现有异构软件实体的上下文感知移动应用程序组合过程来解决这个问题。
{"title":"Composition Process Based on Heterogeneous Software Entities for Mobile Applications","authors":"Afrah Djeddar, H. Bendjenna, A. Amirat, M. Oussalah","doi":"10.1109/ACSAT.2014.27","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.27","url":null,"abstract":"Despite the plethora of available mobile applications (apps) with theirs different implementations forms (e.g. Component, service, or app) the user's needs differ from user to another. Moreover, the mobile devices are characterized by heterogeneous software and hardware configurations. Thus, an important challenge in the development of mobile apps is their deployment in the heterogeneous devices available on the market. To tackle these challenges, there is a need for a composition process to reuse existing heterogeneous entities for developing mobile apps according to user's requirements and that the behavior of the desired apps can be customized according to theirs various context information. In this paper we address this issue by proposing context-aware mobile apps composition process based-on existing heterogeneous software entities.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129630326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting TCP SYN Based Flooding Attacks by Analyzing CPU and Network Resources Performance 基于CPU和网络性能分析的TCP SYN泛洪攻击检测
Abdulaziz Aborujilah, Shahrulniza Musa, M. Ismail
The flooding based Denial-of-service attacks is one of the most common DoS attack targeting the web servers. Availability of the web server under this kind of attacks in danger. This attacks also cause bad influence on the networks bandwidth or in computing resources (CPU, Memory, Storage). Therefore, this paper will focus on studying the effects of (DoS) attacks on CPU power performance and in network band width. So, in this study real flooding attack is implemented in different scenarios in order to evaluate the CPU and bandwidth power performance Finally, the results are presented in all scenarios. Additionally, the most influential factors on a CPU performance and bandwidth power performance are highlighted in comparison method.
基于洪水的拒绝服务攻击是针对web服务器的最常见的DoS攻击之一。web服务器的可用性在这种攻击下处于危险之中。这种攻击还会对网络带宽或计算资源(CPU、内存、存储)造成不良影响。因此,本文将重点研究(DoS)攻击对CPU性能和网络带宽的影响。因此,本研究在不同的场景下实施真实的洪水攻击,以评估CPU和带宽功耗性能,最后给出了所有场景下的结果。此外,在比较方法中还突出了对CPU性能和带宽功耗性能影响最大的因素。
{"title":"Detecting TCP SYN Based Flooding Attacks by Analyzing CPU and Network Resources Performance","authors":"Abdulaziz Aborujilah, Shahrulniza Musa, M. Ismail","doi":"10.1109/ACSAT.2014.34","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.34","url":null,"abstract":"The flooding based Denial-of-service attacks is one of the most common DoS attack targeting the web servers. Availability of the web server under this kind of attacks in danger. This attacks also cause bad influence on the networks bandwidth or in computing resources (CPU, Memory, Storage). Therefore, this paper will focus on studying the effects of (DoS) attacks on CPU power performance and in network band width. So, in this study real flooding attack is implemented in different scenarios in order to evaluate the CPU and bandwidth power performance Finally, the results are presented in all scenarios. Additionally, the most influential factors on a CPU performance and bandwidth power performance are highlighted in comparison method.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Providing Always Best Connected Service in VANET with Complete and Partial Information 在VANET中提供始终最佳的连接服务,提供完整和部分信息
A. Mabrouk, A. Kobbane, M. El Koutbi, Essaid Sabir
Mobile communication has become the preferred choice of personal communication today. With the rapid proliferation of wireless network technologies, heterogeneous wireless network environments increase more and more. Such environments provide multiple access networks simultaneously for mobile users. Each mobile user wishes to get connected to Internet using the access technology that best suits his needs at any point in time. Always Best Connected is considered as a special concept for mobile users to select their suitable access networks. In this paper, we have presented two scenarios which are based on Always Best Connected concept to provide, for a smart vehicle moving in a road network installed with multiple access technologies, an always best connected service at any point in time. In the first scenario, we assume that the mobile user (vehicle) has complete information on the road network (all access technologies installed in the road network). Whilst the second scenario is the same as the first one except that the mobile user periodically receives a partial information on the road network (only the access technologies installed in the edges which are immediately accessible by mobile user). For both scenarios, we have proposed a graph model to characterize the observed mobility pattern. Also, two algorithms are proposed to find the optimal path that provides always best connected service for vehicles in both scenarios.
移动通信已经成为当今个人通信的首选。随着无线网络技术的迅速发展,异构无线网络环境越来越多。这种环境同时为移动用户提供多个接入网。每个移动用户都希望在任何时间点使用最适合其需求的接入技术连接到Internet。“始终最佳连接”是移动用户选择合适接入网络的一个特殊概念。在本文中,我们提出了两种基于始终最佳连接概念的场景,为在安装了多接入技术的道路网络中移动的智能车辆提供在任何时间点始终最佳连接的服务。在第一种场景中,我们假设移动用户(车辆)拥有完整的路网信息(路网中安装的所有接入技术)。而第二种情况与第一种情况相同,除了移动用户定期接收有关道路网络的部分信息(仅安装在移动用户可立即访问的边缘的接入技术)。对于这两种情况,我们提出了一个图模型来描述观察到的迁移模式。此外,提出了两种算法来寻找在两种场景下始终为车辆提供最佳连接服务的最优路径。
{"title":"Providing Always Best Connected Service in VANET with Complete and Partial Information","authors":"A. Mabrouk, A. Kobbane, M. El Koutbi, Essaid Sabir","doi":"10.1109/ACSAT.2014.26","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.26","url":null,"abstract":"Mobile communication has become the preferred choice of personal communication today. With the rapid proliferation of wireless network technologies, heterogeneous wireless network environments increase more and more. Such environments provide multiple access networks simultaneously for mobile users. Each mobile user wishes to get connected to Internet using the access technology that best suits his needs at any point in time. Always Best Connected is considered as a special concept for mobile users to select their suitable access networks. In this paper, we have presented two scenarios which are based on Always Best Connected concept to provide, for a smart vehicle moving in a road network installed with multiple access technologies, an always best connected service at any point in time. In the first scenario, we assume that the mobile user (vehicle) has complete information on the road network (all access technologies installed in the road network). Whilst the second scenario is the same as the first one except that the mobile user periodically receives a partial information on the road network (only the access technologies installed in the edges which are immediately accessible by mobile user). For both scenarios, we have proposed a graph model to characterize the observed mobility pattern. Also, two algorithms are proposed to find the optimal path that provides always best connected service for vehicles in both scenarios.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130619574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Communication Performance of TTN with Uniform and Non-uniform Traffic Patterns Using Virtual Cut-Through Flow Control 基于虚拟直通流控制的均匀和非均匀流量模式下TTN的动态通信性能
Faiz Al Faisal, M. M. Hafizur Rahman, Y. Inoguchi
Tori connected Torus Network (TTN) is a 2D-torus network of multiple basic modules, where each basic module is a 2D-torus network that are hierarchically interconnected for higher-level networks. The static network performance and dynamic communication performance using wormhole (WH) flow control of TTN has already been studied earlier and shown to be good than that of other networks. In this paper, we evaluate the dynamic communication performance of TTN using the virtual cut-through (VCT) flow control under uniform and non-uniform traffic patterns, and also compare the result with the other networks as well as the wormhole flow control of TTN network. We found that VCT with the non-uniform traffic patterns for TTN yields much better performance than that of 2D Torus, 2D Mesh, TESH, STTN and even better than the WH flow of TTN network in terms of network throughput and latency.
TTN (Tori connected Torus Network)是由多个基本模块组成的二维环面网络,其中每个基本模块都是一个二维环面网络,这些二维环面网络在更高层次的网络中分层互联。采用虫洞流量控制的TTN的静态网络性能和动态通信性能已经得到较早的研究,并证明其优于其他网络。本文在均匀和非均匀流量模式下,利用虚拟穿越(VCT)流量控制对TTN的动态通信性能进行了评价,并与其他网络以及TTN网络的虫洞流量控制进行了比较。我们发现,具有非均匀流量模式的VCT在TTN上的性能远远优于2D Torus、2D Mesh、TESH、STTN,在网络吞吐量和延迟方面甚至优于TTN网络的WH流。
{"title":"Dynamic Communication Performance of TTN with Uniform and Non-uniform Traffic Patterns Using Virtual Cut-Through Flow Control","authors":"Faiz Al Faisal, M. M. Hafizur Rahman, Y. Inoguchi","doi":"10.1109/ACSAT.2014.30","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.30","url":null,"abstract":"Tori connected Torus Network (TTN) is a 2D-torus network of multiple basic modules, where each basic module is a 2D-torus network that are hierarchically interconnected for higher-level networks. The static network performance and dynamic communication performance using wormhole (WH) flow control of TTN has already been studied earlier and shown to be good than that of other networks. In this paper, we evaluate the dynamic communication performance of TTN using the virtual cut-through (VCT) flow control under uniform and non-uniform traffic patterns, and also compare the result with the other networks as well as the wormhole flow control of TTN network. We found that VCT with the non-uniform traffic patterns for TTN yields much better performance than that of 2D Torus, 2D Mesh, TESH, STTN and even better than the WH flow of TTN network in terms of network throughput and latency.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hot-Spot Traffic Pattern on Hierarchical 3D Mesh Network 分层三维网格网络的热点流量模式
M. M. Hafizur Rahman, M. Akhand, Y. Miura, Y. Inoguchi
A Hierarchical 3D-Mesh (H3DM) Network is a 2D-mesh network of multiple basic modules (BMs), in which the basic modules are 3D-torus networks that are hierarchically interconnected for higher-level networks. In this paper, we evaluate the dynamic communication performance of a H3DM network under hot-spot traffic pattern using a deadlock-free dimension order routing algorithm with minimum number of virtual channels. We have also evaluated the dynamic communication performance of the mesh and torus networks. It is shown that under most imbalance hot-spot traffic pattern H3DM network yields high throughput and low average transfer time than that of mesh and torus networks, providing better dynamic communication performance compared to those networks.
H3DM (Hierarchical 3D-Mesh)网络是由多个基本模块(bm)组成的2D-mesh网络,其中基本模块是3d环面网络,这些环面网络在更高级别的网络中分层互连。本文采用一种虚拟信道数最少的无死锁维序路由算法,对热点流量模式下H3DM网络的动态通信性能进行了评估。我们还评估了网格和环面网络的动态通信性能。研究表明,在大多数不平衡的热点流量模式下,H3DM网络比mesh和torus网络具有更高的吞吐量和更低的平均传输时间,提供了更好的动态通信性能。
{"title":"Hot-Spot Traffic Pattern on Hierarchical 3D Mesh Network","authors":"M. M. Hafizur Rahman, M. Akhand, Y. Miura, Y. Inoguchi","doi":"10.1109/ACSAT.2014.17","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.17","url":null,"abstract":"A Hierarchical 3D-Mesh (H3DM) Network is a 2D-mesh network of multiple basic modules (BMs), in which the basic modules are 3D-torus networks that are hierarchically interconnected for higher-level networks. In this paper, we evaluate the dynamic communication performance of a H3DM network under hot-spot traffic pattern using a deadlock-free dimension order routing algorithm with minimum number of virtual channels. We have also evaluated the dynamic communication performance of the mesh and torus networks. It is shown that under most imbalance hot-spot traffic pattern H3DM network yields high throughput and low average transfer time than that of mesh and torus networks, providing better dynamic communication performance compared to those networks.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129709929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Identifying Skylines over Incomplete Data 在不完整数据上识别天际线的框架
A. Alwan, H. Ibrahim, N. Udzir
Skyline queries provide a flexible query operator that returns data items (skylines) which are not being dominated by other data items in all dimensions (attributes) of the database. Most of the existing skyline techniques determine the skylines by assuming that the values of dimensions for every data item are available (complete). However, this assumption is not always true particularly for multidimensional database as some values may be missing. The incompleteness of data leads to the loss of the transitivity property of skyline technique and results into failure in test dominance as some data items are incomparable to each other. Furthermore, incompleteness of data influences negatively on the process of finding skylines, leading to high overhead, due to exhaustive pair wise comparisons between the data items. This paper proposed a framework to process skyline queries for incomplete data with the aim of avoiding the issue of cyclic dominance in deriving skylines. The proposed framework for identifying skylines for incomplete data consists of four components, namely: Data Clustering Builder, Group Constructor and Local Skylines Identifier, k-dom Skyline Generator, and Incomplete Skylines Identifier. Including these processes in the proposed framework has optimized the process of identifying skylines in incomplete database by reducing the necessary number of pair wise comparison through eliminating the dominated data items as early as possible before applying the skyline technique.
Skyline查询提供了一个灵活的查询操作符,它返回的数据项(skylines)在数据库的所有维度(属性)中没有被其他数据项所支配。大多数现有的天际线技术通过假设每个数据项的维度值是可用的(完整的)来确定天际线。然而,这个假设并不总是正确的,特别是对于多维数据库,因为一些值可能会丢失。数据的不完备性导致天际线技术的传递性丧失,部分数据项之间的不可比较性导致测试优势失效。此外,数据的不完整性对查找天际线的过程产生负面影响,由于数据项之间的穷举成对比较,导致高开销。本文提出了一个框架来处理不完整数据的天际线查询,目的是避免在推导天际线时出现循环优势问题。提出的用于识别不完整数据天际线的框架由四个组件组成,即:数据聚类构建器、组构造器和本地天际线标识符、k-dom天际线生成器和不完整天际线标识符。在应用天际线技术之前,通过尽早消除主导数据项,减少必要的配对比较次数,从而优化了在不完整数据库中识别天际线的过程。
{"title":"A Framework for Identifying Skylines over Incomplete Data","authors":"A. Alwan, H. Ibrahim, N. Udzir","doi":"10.1109/ACSAT.2014.21","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.21","url":null,"abstract":"Skyline queries provide a flexible query operator that returns data items (skylines) which are not being dominated by other data items in all dimensions (attributes) of the database. Most of the existing skyline techniques determine the skylines by assuming that the values of dimensions for every data item are available (complete). However, this assumption is not always true particularly for multidimensional database as some values may be missing. The incompleteness of data leads to the loss of the transitivity property of skyline technique and results into failure in test dominance as some data items are incomparable to each other. Furthermore, incompleteness of data influences negatively on the process of finding skylines, leading to high overhead, due to exhaustive pair wise comparisons between the data items. This paper proposed a framework to process skyline queries for incomplete data with the aim of avoiding the issue of cyclic dominance in deriving skylines. The proposed framework for identifying skylines for incomplete data consists of four components, namely: Data Clustering Builder, Group Constructor and Local Skylines Identifier, k-dom Skyline Generator, and Incomplete Skylines Identifier. Including these processes in the proposed framework has optimized the process of identifying skylines in incomplete database by reducing the necessary number of pair wise comparison through eliminating the dominated data items as early as possible before applying the skyline technique.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"34 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121016529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Relationship between Mobile Marketing and Customer Relationship Management (CRM) 移动营销与客户关系管理(CRM)的关系
Kiandokht Hadadi, Mahmoud Khalid Almsafir
Mobile marketing refers to different kinds of marketing that contain operation of mobile phone technology to achieve the target spectators. Commonly, people associate mobile marketing with SMS and MMS marketing, pay per call mobile marketing, mobile banner ads, quick response code, location based marketing, Mobile applications and mobile website design. Among the variety of mobile services, considerable attention has been dedicated to mobile marketing specifically to mobile customer relationship management services. The mobile medium is well matched to improve classical CRM as it has a great influence and interactivity and may permit the firm to improve close relationships with clients. The main objective of this research is to investigate the relationship between mobile marketing and CRM. This paper concentrates on different types of mobile marketing and CRM to investigate which type of mobile marketing has a significant relationship on which type of CRM. This research has a quantitative approach and data which is used in this research is primary data. Data were collected by distributing questionnaire among one hundred students, especially those who are in the middle of 17-18 from international high school which is located in the Klang Valley area. The result of this research shows that teenagers are more influenced by mobile banner ads and mobile applications followed by other types of mobile marketing. Mobile applications have a wealthier mobile capability than mobile web. Deep associating of mobile apps is a great occasion for each industry to improve the loyalty of their customers. The results of this research proposed some important inferences which will support marketers to produce better mobile marketing and enhance the mobile customer relationship management services. Also, this research found that there would be a brighter future for mobile advertising rather than any other types of advertising.
移动营销是指利用移动电话技术实现目标受众的各种营销活动。通常,人们将手机营销与短信和彩信营销、按电话付费手机营销、手机横幅广告、快速响应代码、基于位置的营销、手机应用程序和手机网站设计联系在一起。在各种各样的移动服务中,移动营销特别是移动客户关系管理服务受到了相当大的关注。移动媒体可以很好地改善传统的客户关系管理,因为它具有很大的影响力和互动性,可以让公司改善与客户的密切关系。本研究的主要目的是调查移动营销和客户关系管理之间的关系。本文以不同类型的移动营销和客户关系管理为研究对象,探讨哪种类型的移动营销对哪种类型的客户关系管理有显著的影响。本研究采用定量方法,研究中使用的数据均为原始数据。数据是通过向100名学生发放问卷收集的,特别是位于巴生谷地区的国际高中17-18年级的学生。研究结果表明,青少年更容易受到移动横幅广告和移动应用的影响,其次是其他类型的移动营销。移动应用程序比移动网络具有更丰富的移动功能。移动应用的深度关联是每个行业提高客户忠诚度的好机会。本研究的结果提出了一些重要的推论,将支持营销人员产生更好的移动营销和提高移动客户关系管理服务。此外,这项研究还发现,与其他类型的广告相比,移动广告的前景更加光明。
{"title":"The Relationship between Mobile Marketing and Customer Relationship Management (CRM)","authors":"Kiandokht Hadadi, Mahmoud Khalid Almsafir","doi":"10.1109/ACSAT.2014.18","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.18","url":null,"abstract":"Mobile marketing refers to different kinds of marketing that contain operation of mobile phone technology to achieve the target spectators. Commonly, people associate mobile marketing with SMS and MMS marketing, pay per call mobile marketing, mobile banner ads, quick response code, location based marketing, Mobile applications and mobile website design. Among the variety of mobile services, considerable attention has been dedicated to mobile marketing specifically to mobile customer relationship management services. The mobile medium is well matched to improve classical CRM as it has a great influence and interactivity and may permit the firm to improve close relationships with clients. The main objective of this research is to investigate the relationship between mobile marketing and CRM. This paper concentrates on different types of mobile marketing and CRM to investigate which type of mobile marketing has a significant relationship on which type of CRM. This research has a quantitative approach and data which is used in this research is primary data. Data were collected by distributing questionnaire among one hundred students, especially those who are in the middle of 17-18 from international high school which is located in the Klang Valley area. The result of this research shows that teenagers are more influenced by mobile banner ads and mobile applications followed by other types of mobile marketing. Mobile applications have a wealthier mobile capability than mobile web. Deep associating of mobile apps is a great occasion for each industry to improve the loyalty of their customers. The results of this research proposed some important inferences which will support marketers to produce better mobile marketing and enhance the mobile customer relationship management services. Also, this research found that there would be a brighter future for mobile advertising rather than any other types of advertising.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130761222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design a New Proposed Route Optimization Scheme Based NEMO-Centric MANEMO (NCM) 一种新的基于NEMO-Centric MANEMO (NCM)的路径优化方案设计
A. A. Mousa, A. Abdalla, Khalid Al Khateeb, Othman Omran Khalifa, Huda Adibah
Route Optimization (RO) refers to any approach that optimizes the transmission of packets between a Mobile Network Node/Mobile Router and a Corresponding Node/Home Agent. RO would mean that a binding between the address of an MNN/MR and the location of the mobile network is registered at the CE/HA. Technically, route optimization mechanism comes up with a complementing solution for the pinball problem by avoiding the MRHA Bidirectional Tunnel(BT) that is to be used. This paper discusses the RO issues for NEMO and more specifically issues of Nested NEMO such astunneling redundant, HA dependency, processing delay, bottleneck, traffic congestion, ER selection, and scalability in the design consideration. In order to address NEMO ROsuboptimal, this work utilizes the NCM protocol plus to PHA. The proposed MANEMO RO scheme is a layer three solution to support RO for mobile networks. Additionally, the paper proposes the design to address Nested NEMO issues in a post disaster scenario by using Proxy Home Agent (PHA) in the infrastructure with using Neighbor Discovery protocol(TDP/NINA) for localizing communications. Thus, thesignaling message flow and the algorithm are written to give proposed scheme more flexibility.
路由优化(Route Optimization, RO)是指优化移动网络节点/移动路由器与相应节点/家庭代理之间的数据包传输的任何方法。RO是指在行政长官/民政事务局登记了MNN/MR的地址与流动网络的位置之间的绑定。从技术上讲,路由优化机制通过避免使用MRHA双向隧道(BT),为弹球问题提供了一个补充解决方案。本文讨论了NEMO的RO问题,更具体地说,讨论了设计考虑的嵌套NEMO的惊人冗余、HA依赖、处理延迟、瓶颈、流量拥塞、ER选择和可扩展性等问题。为了解决NEMO的次优问题,这项工作利用了NCM协议加上PHA。提出的MANEMO反渗透方案是支持移动网络反渗透的三层解决方案。此外,本文提出了通过在基础设施中使用代理家园代理(PHA)和使用邻居发现协议(TDP/NINA)进行本地化通信来解决灾后场景中嵌套NEMO问题的设计。因此,通过编写信令消息流和算法,使所提出的方案具有更大的灵活性。
{"title":"Design a New Proposed Route Optimization Scheme Based NEMO-Centric MANEMO (NCM)","authors":"A. A. Mousa, A. Abdalla, Khalid Al Khateeb, Othman Omran Khalifa, Huda Adibah","doi":"10.1109/ACSAT.2014.37","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.37","url":null,"abstract":"Route Optimization (RO) refers to any approach that optimizes the transmission of packets between a Mobile Network Node/Mobile Router and a Corresponding Node/Home Agent. RO would mean that a binding between the address of an MNN/MR and the location of the mobile network is registered at the CE/HA. Technically, route optimization mechanism comes up with a complementing solution for the pinball problem by avoiding the MRHA Bidirectional Tunnel(BT) that is to be used. This paper discusses the RO issues for NEMO and more specifically issues of Nested NEMO such astunneling redundant, HA dependency, processing delay, bottleneck, traffic congestion, ER selection, and scalability in the design consideration. In order to address NEMO ROsuboptimal, this work utilizes the NCM protocol plus to PHA. The proposed MANEMO RO scheme is a layer three solution to support RO for mobile networks. Additionally, the paper proposes the design to address Nested NEMO issues in a post disaster scenario by using Proxy Home Agent (PHA) in the infrastructure with using Neighbor Discovery protocol(TDP/NINA) for localizing communications. Thus, thesignaling message flow and the algorithm are written to give proposed scheme more flexibility.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117238025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 3rd International Conference on Advanced Computer Science Applications and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1