首页 > 最新文献

2014 3rd International Conference on Advanced Computer Science Applications and Technologies最新文献

英文 中文
Organizational Factors in the Adoption of Cloud Computing in E-Learning 在电子学习中采用云计算的组织因素
S. A. Mokhtar, Abdulkarem Al-Sharafi, Siti Haryati Shaikh Ali, Abdulaziz Aborujilah
Information and communication technology (ICT) plays a significant role in education. Cloud computing is a relatively new technology in ICT. It has drastically changed the way ICT services are used in organisations. In education sector, many education institutions have started to recognise the usefulness and importance of adopting cloud computing technology, and some have started to adopt the technology in the organisation. There are several issues that must be taken into account when adopting cloud computing. They encompass technological factors, environmental factors and organisational factors. This paper aims to highlights the organisational factors within the context of cloud computing adoption in education, focusing on the e-learning domain area.
信息通信技术(ICT)在教育中发挥着重要作用。云计算是一项相对较新的信息通信技术。它彻底改变了组织使用信息通信技术服务的方式。在教育领域,许多教育机构已经开始认识到采用云计算技术的有用性和重要性,有些机构已经开始在组织中采用该技术。在采用云计算时,必须考虑几个问题。它们包括技术因素、环境因素和组织因素。本文旨在强调云计算在教育中应用的背景下的组织因素,重点关注电子学习领域。
{"title":"Organizational Factors in the Adoption of Cloud Computing in E-Learning","authors":"S. A. Mokhtar, Abdulkarem Al-Sharafi, Siti Haryati Shaikh Ali, Abdulaziz Aborujilah","doi":"10.1109/ACSAT.2014.40","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.40","url":null,"abstract":"Information and communication technology (ICT) plays a significant role in education. Cloud computing is a relatively new technology in ICT. It has drastically changed the way ICT services are used in organisations. In education sector, many education institutions have started to recognise the usefulness and importance of adopting cloud computing technology, and some have started to adopt the technology in the organisation. There are several issues that must be taken into account when adopting cloud computing. They encompass technological factors, environmental factors and organisational factors. This paper aims to highlights the organisational factors within the context of cloud computing adoption in education, focusing on the e-learning domain area.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131332831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Detecting TCP SYN Based Flooding Attacks by Analyzing CPU and Network Resources Performance 基于CPU和网络性能分析的TCP SYN泛洪攻击检测
Abdulaziz Aborujilah, Shahrulniza Musa, M. Ismail
The flooding based Denial-of-service attacks is one of the most common DoS attack targeting the web servers. Availability of the web server under this kind of attacks in danger. This attacks also cause bad influence on the networks bandwidth or in computing resources (CPU, Memory, Storage). Therefore, this paper will focus on studying the effects of (DoS) attacks on CPU power performance and in network band width. So, in this study real flooding attack is implemented in different scenarios in order to evaluate the CPU and bandwidth power performance Finally, the results are presented in all scenarios. Additionally, the most influential factors on a CPU performance and bandwidth power performance are highlighted in comparison method.
基于洪水的拒绝服务攻击是针对web服务器的最常见的DoS攻击之一。web服务器的可用性在这种攻击下处于危险之中。这种攻击还会对网络带宽或计算资源(CPU、内存、存储)造成不良影响。因此,本文将重点研究(DoS)攻击对CPU性能和网络带宽的影响。因此,本研究在不同的场景下实施真实的洪水攻击,以评估CPU和带宽功耗性能,最后给出了所有场景下的结果。此外,在比较方法中还突出了对CPU性能和带宽功耗性能影响最大的因素。
{"title":"Detecting TCP SYN Based Flooding Attacks by Analyzing CPU and Network Resources Performance","authors":"Abdulaziz Aborujilah, Shahrulniza Musa, M. Ismail","doi":"10.1109/ACSAT.2014.34","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.34","url":null,"abstract":"The flooding based Denial-of-service attacks is one of the most common DoS attack targeting the web servers. Availability of the web server under this kind of attacks in danger. This attacks also cause bad influence on the networks bandwidth or in computing resources (CPU, Memory, Storage). Therefore, this paper will focus on studying the effects of (DoS) attacks on CPU power performance and in network band width. So, in this study real flooding attack is implemented in different scenarios in order to evaluate the CPU and bandwidth power performance Finally, the results are presented in all scenarios. Additionally, the most influential factors on a CPU performance and bandwidth power performance are highlighted in comparison method.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Providing Always Best Connected Service in VANET with Complete and Partial Information 在VANET中提供始终最佳的连接服务,提供完整和部分信息
A. Mabrouk, A. Kobbane, M. El Koutbi, Essaid Sabir
Mobile communication has become the preferred choice of personal communication today. With the rapid proliferation of wireless network technologies, heterogeneous wireless network environments increase more and more. Such environments provide multiple access networks simultaneously for mobile users. Each mobile user wishes to get connected to Internet using the access technology that best suits his needs at any point in time. Always Best Connected is considered as a special concept for mobile users to select their suitable access networks. In this paper, we have presented two scenarios which are based on Always Best Connected concept to provide, for a smart vehicle moving in a road network installed with multiple access technologies, an always best connected service at any point in time. In the first scenario, we assume that the mobile user (vehicle) has complete information on the road network (all access technologies installed in the road network). Whilst the second scenario is the same as the first one except that the mobile user periodically receives a partial information on the road network (only the access technologies installed in the edges which are immediately accessible by mobile user). For both scenarios, we have proposed a graph model to characterize the observed mobility pattern. Also, two algorithms are proposed to find the optimal path that provides always best connected service for vehicles in both scenarios.
移动通信已经成为当今个人通信的首选。随着无线网络技术的迅速发展,异构无线网络环境越来越多。这种环境同时为移动用户提供多个接入网。每个移动用户都希望在任何时间点使用最适合其需求的接入技术连接到Internet。“始终最佳连接”是移动用户选择合适接入网络的一个特殊概念。在本文中,我们提出了两种基于始终最佳连接概念的场景,为在安装了多接入技术的道路网络中移动的智能车辆提供在任何时间点始终最佳连接的服务。在第一种场景中,我们假设移动用户(车辆)拥有完整的路网信息(路网中安装的所有接入技术)。而第二种情况与第一种情况相同,除了移动用户定期接收有关道路网络的部分信息(仅安装在移动用户可立即访问的边缘的接入技术)。对于这两种情况,我们提出了一个图模型来描述观察到的迁移模式。此外,提出了两种算法来寻找在两种场景下始终为车辆提供最佳连接服务的最优路径。
{"title":"Providing Always Best Connected Service in VANET with Complete and Partial Information","authors":"A. Mabrouk, A. Kobbane, M. El Koutbi, Essaid Sabir","doi":"10.1109/ACSAT.2014.26","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.26","url":null,"abstract":"Mobile communication has become the preferred choice of personal communication today. With the rapid proliferation of wireless network technologies, heterogeneous wireless network environments increase more and more. Such environments provide multiple access networks simultaneously for mobile users. Each mobile user wishes to get connected to Internet using the access technology that best suits his needs at any point in time. Always Best Connected is considered as a special concept for mobile users to select their suitable access networks. In this paper, we have presented two scenarios which are based on Always Best Connected concept to provide, for a smart vehicle moving in a road network installed with multiple access technologies, an always best connected service at any point in time. In the first scenario, we assume that the mobile user (vehicle) has complete information on the road network (all access technologies installed in the road network). Whilst the second scenario is the same as the first one except that the mobile user periodically receives a partial information on the road network (only the access technologies installed in the edges which are immediately accessible by mobile user). For both scenarios, we have proposed a graph model to characterize the observed mobility pattern. Also, two algorithms are proposed to find the optimal path that provides always best connected service for vehicles in both scenarios.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130619574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Composition Process Based on Heterogeneous Software Entities for Mobile Applications 基于异构软件实体的移动应用组合过程
Afrah Djeddar, H. Bendjenna, A. Amirat, M. Oussalah
Despite the plethora of available mobile applications (apps) with theirs different implementations forms (e.g. Component, service, or app) the user's needs differ from user to another. Moreover, the mobile devices are characterized by heterogeneous software and hardware configurations. Thus, an important challenge in the development of mobile apps is their deployment in the heterogeneous devices available on the market. To tackle these challenges, there is a need for a composition process to reuse existing heterogeneous entities for developing mobile apps according to user's requirements and that the behavior of the desired apps can be customized according to theirs various context information. In this paper we address this issue by proposing context-aware mobile apps composition process based-on existing heterogeneous software entities.
尽管有大量可用的移动应用程序(应用程序)具有不同的实现形式(例如组件,服务或应用程序),但用户的需求因用户而异。此外,移动设备具有异构软件和硬件配置的特点。因此,开发移动应用程序的一个重要挑战是在市场上可用的异构设备上部署它们。为了应对这些挑战,需要一个组合过程来重用现有的异构实体,以根据用户的需求开发移动应用程序,并且所需应用程序的行为可以根据他们的各种上下文信息进行定制。在本文中,我们通过提出基于现有异构软件实体的上下文感知移动应用程序组合过程来解决这个问题。
{"title":"Composition Process Based on Heterogeneous Software Entities for Mobile Applications","authors":"Afrah Djeddar, H. Bendjenna, A. Amirat, M. Oussalah","doi":"10.1109/ACSAT.2014.27","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.27","url":null,"abstract":"Despite the plethora of available mobile applications (apps) with theirs different implementations forms (e.g. Component, service, or app) the user's needs differ from user to another. Moreover, the mobile devices are characterized by heterogeneous software and hardware configurations. Thus, an important challenge in the development of mobile apps is their deployment in the heterogeneous devices available on the market. To tackle these challenges, there is a need for a composition process to reuse existing heterogeneous entities for developing mobile apps according to user's requirements and that the behavior of the desired apps can be customized according to theirs various context information. In this paper we address this issue by proposing context-aware mobile apps composition process based-on existing heterogeneous software entities.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129630326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Elicit the Best Ways through Identify Congestion Places 通过确定拥堵地点引出最佳方法
Mohammad Alodat, I. Abdullah
In this paper the exploitation of infrastructure and take advantage of communication techniques wired and wireless to help drivers in finding ways does not contain any obstacles and reach to the target with commitment in speed of assessed road. We use Fusion or Polygamy Technology with Fuzzy Logic, Neural Network and Genetic Algorithm for extract Cut-Node (CN). We use Cut-Node (CN) in order to identify obstacles and avoid them such as changes that occur in the lighting, weather conditions, accidents, congestion and maintenance of roads. Cut-Node (CN) useful in understanding the surrounding environment, supporting safe driving, increases the flow and fastest path to arrive at the designated target (end point). Three models have been proposed to extract Cut-Node (CN) as follows: 1) Intuitionistic Fuzzy Set (IFS). 2) The Intuitionistic Fuzzy Set Data Base is representing imprecise data. 3) Intuitionistic Fuzzy Neural Network with Genetic Algorithm (IFNN-GA).
在本文中,利用基础设施,利用有线和无线通信技术,帮助驾驶员找到不包含任何障碍的方法,并以评估道路的速度达到目标。采用模糊逻辑、神经网络和遗传算法相结合的融合或一夫多妻技术提取切割节点(CN)。我们使用Cut-Node (CN)来识别障碍物并避开它们,例如发生在照明、天气条件、事故、拥堵和道路维护中的变化。Cut-Node (CN)有助于了解周围环境,支持安全驾驶,增加流量和到达指定目标(终点)的最快路径。本文提出了三种提取Cut-Node (CN)的模型:1)直觉模糊集(IFS)。2)直觉模糊集数据库表示不精确的数据。3)直觉模糊神经网络遗传算法(IFNN-GA)。
{"title":"Elicit the Best Ways through Identify Congestion Places","authors":"Mohammad Alodat, I. Abdullah","doi":"10.1109/ACSAT.2014.25","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.25","url":null,"abstract":"In this paper the exploitation of infrastructure and take advantage of communication techniques wired and wireless to help drivers in finding ways does not contain any obstacles and reach to the target with commitment in speed of assessed road. We use Fusion or Polygamy Technology with Fuzzy Logic, Neural Network and Genetic Algorithm for extract Cut-Node (CN). We use Cut-Node (CN) in order to identify obstacles and avoid them such as changes that occur in the lighting, weather conditions, accidents, congestion and maintenance of roads. Cut-Node (CN) useful in understanding the surrounding environment, supporting safe driving, increases the flow and fastest path to arrive at the designated target (end point). Three models have been proposed to extract Cut-Node (CN) as follows: 1) Intuitionistic Fuzzy Set (IFS). 2) The Intuitionistic Fuzzy Set Data Base is representing imprecise data. 3) Intuitionistic Fuzzy Neural Network with Genetic Algorithm (IFNN-GA).","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117201251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Communication Performance of TTN with Uniform and Non-uniform Traffic Patterns Using Virtual Cut-Through Flow Control 基于虚拟直通流控制的均匀和非均匀流量模式下TTN的动态通信性能
Faiz Al Faisal, M. M. Hafizur Rahman, Y. Inoguchi
Tori connected Torus Network (TTN) is a 2D-torus network of multiple basic modules, where each basic module is a 2D-torus network that are hierarchically interconnected for higher-level networks. The static network performance and dynamic communication performance using wormhole (WH) flow control of TTN has already been studied earlier and shown to be good than that of other networks. In this paper, we evaluate the dynamic communication performance of TTN using the virtual cut-through (VCT) flow control under uniform and non-uniform traffic patterns, and also compare the result with the other networks as well as the wormhole flow control of TTN network. We found that VCT with the non-uniform traffic patterns for TTN yields much better performance than that of 2D Torus, 2D Mesh, TESH, STTN and even better than the WH flow of TTN network in terms of network throughput and latency.
TTN (Tori connected Torus Network)是由多个基本模块组成的二维环面网络,其中每个基本模块都是一个二维环面网络,这些二维环面网络在更高层次的网络中分层互联。采用虫洞流量控制的TTN的静态网络性能和动态通信性能已经得到较早的研究,并证明其优于其他网络。本文在均匀和非均匀流量模式下,利用虚拟穿越(VCT)流量控制对TTN的动态通信性能进行了评价,并与其他网络以及TTN网络的虫洞流量控制进行了比较。我们发现,具有非均匀流量模式的VCT在TTN上的性能远远优于2D Torus、2D Mesh、TESH、STTN,在网络吞吐量和延迟方面甚至优于TTN网络的WH流。
{"title":"Dynamic Communication Performance of TTN with Uniform and Non-uniform Traffic Patterns Using Virtual Cut-Through Flow Control","authors":"Faiz Al Faisal, M. M. Hafizur Rahman, Y. Inoguchi","doi":"10.1109/ACSAT.2014.30","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.30","url":null,"abstract":"Tori connected Torus Network (TTN) is a 2D-torus network of multiple basic modules, where each basic module is a 2D-torus network that are hierarchically interconnected for higher-level networks. The static network performance and dynamic communication performance using wormhole (WH) flow control of TTN has already been studied earlier and shown to be good than that of other networks. In this paper, we evaluate the dynamic communication performance of TTN using the virtual cut-through (VCT) flow control under uniform and non-uniform traffic patterns, and also compare the result with the other networks as well as the wormhole flow control of TTN network. We found that VCT with the non-uniform traffic patterns for TTN yields much better performance than that of 2D Torus, 2D Mesh, TESH, STTN and even better than the WH flow of TTN network in terms of network throughput and latency.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Framework for Identifying Skylines over Incomplete Data 在不完整数据上识别天际线的框架
A. Alwan, H. Ibrahim, N. Udzir
Skyline queries provide a flexible query operator that returns data items (skylines) which are not being dominated by other data items in all dimensions (attributes) of the database. Most of the existing skyline techniques determine the skylines by assuming that the values of dimensions for every data item are available (complete). However, this assumption is not always true particularly for multidimensional database as some values may be missing. The incompleteness of data leads to the loss of the transitivity property of skyline technique and results into failure in test dominance as some data items are incomparable to each other. Furthermore, incompleteness of data influences negatively on the process of finding skylines, leading to high overhead, due to exhaustive pair wise comparisons between the data items. This paper proposed a framework to process skyline queries for incomplete data with the aim of avoiding the issue of cyclic dominance in deriving skylines. The proposed framework for identifying skylines for incomplete data consists of four components, namely: Data Clustering Builder, Group Constructor and Local Skylines Identifier, k-dom Skyline Generator, and Incomplete Skylines Identifier. Including these processes in the proposed framework has optimized the process of identifying skylines in incomplete database by reducing the necessary number of pair wise comparison through eliminating the dominated data items as early as possible before applying the skyline technique.
Skyline查询提供了一个灵活的查询操作符,它返回的数据项(skylines)在数据库的所有维度(属性)中没有被其他数据项所支配。大多数现有的天际线技术通过假设每个数据项的维度值是可用的(完整的)来确定天际线。然而,这个假设并不总是正确的,特别是对于多维数据库,因为一些值可能会丢失。数据的不完备性导致天际线技术的传递性丧失,部分数据项之间的不可比较性导致测试优势失效。此外,数据的不完整性对查找天际线的过程产生负面影响,由于数据项之间的穷举成对比较,导致高开销。本文提出了一个框架来处理不完整数据的天际线查询,目的是避免在推导天际线时出现循环优势问题。提出的用于识别不完整数据天际线的框架由四个组件组成,即:数据聚类构建器、组构造器和本地天际线标识符、k-dom天际线生成器和不完整天际线标识符。在应用天际线技术之前,通过尽早消除主导数据项,减少必要的配对比较次数,从而优化了在不完整数据库中识别天际线的过程。
{"title":"A Framework for Identifying Skylines over Incomplete Data","authors":"A. Alwan, H. Ibrahim, N. Udzir","doi":"10.1109/ACSAT.2014.21","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.21","url":null,"abstract":"Skyline queries provide a flexible query operator that returns data items (skylines) which are not being dominated by other data items in all dimensions (attributes) of the database. Most of the existing skyline techniques determine the skylines by assuming that the values of dimensions for every data item are available (complete). However, this assumption is not always true particularly for multidimensional database as some values may be missing. The incompleteness of data leads to the loss of the transitivity property of skyline technique and results into failure in test dominance as some data items are incomparable to each other. Furthermore, incompleteness of data influences negatively on the process of finding skylines, leading to high overhead, due to exhaustive pair wise comparisons between the data items. This paper proposed a framework to process skyline queries for incomplete data with the aim of avoiding the issue of cyclic dominance in deriving skylines. The proposed framework for identifying skylines for incomplete data consists of four components, namely: Data Clustering Builder, Group Constructor and Local Skylines Identifier, k-dom Skyline Generator, and Incomplete Skylines Identifier. Including these processes in the proposed framework has optimized the process of identifying skylines in incomplete database by reducing the necessary number of pair wise comparison through eliminating the dominated data items as early as possible before applying the skyline technique.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"34 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121016529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design a New Proposed Route Optimization Scheme Based NEMO-Centric MANEMO (NCM) 一种新的基于NEMO-Centric MANEMO (NCM)的路径优化方案设计
A. A. Mousa, A. Abdalla, Khalid Al Khateeb, Othman Omran Khalifa, Huda Adibah
Route Optimization (RO) refers to any approach that optimizes the transmission of packets between a Mobile Network Node/Mobile Router and a Corresponding Node/Home Agent. RO would mean that a binding between the address of an MNN/MR and the location of the mobile network is registered at the CE/HA. Technically, route optimization mechanism comes up with a complementing solution for the pinball problem by avoiding the MRHA Bidirectional Tunnel(BT) that is to be used. This paper discusses the RO issues for NEMO and more specifically issues of Nested NEMO such astunneling redundant, HA dependency, processing delay, bottleneck, traffic congestion, ER selection, and scalability in the design consideration. In order to address NEMO ROsuboptimal, this work utilizes the NCM protocol plus to PHA. The proposed MANEMO RO scheme is a layer three solution to support RO for mobile networks. Additionally, the paper proposes the design to address Nested NEMO issues in a post disaster scenario by using Proxy Home Agent (PHA) in the infrastructure with using Neighbor Discovery protocol(TDP/NINA) for localizing communications. Thus, thesignaling message flow and the algorithm are written to give proposed scheme more flexibility.
路由优化(Route Optimization, RO)是指优化移动网络节点/移动路由器与相应节点/家庭代理之间的数据包传输的任何方法。RO是指在行政长官/民政事务局登记了MNN/MR的地址与流动网络的位置之间的绑定。从技术上讲,路由优化机制通过避免使用MRHA双向隧道(BT),为弹球问题提供了一个补充解决方案。本文讨论了NEMO的RO问题,更具体地说,讨论了设计考虑的嵌套NEMO的惊人冗余、HA依赖、处理延迟、瓶颈、流量拥塞、ER选择和可扩展性等问题。为了解决NEMO的次优问题,这项工作利用了NCM协议加上PHA。提出的MANEMO反渗透方案是支持移动网络反渗透的三层解决方案。此外,本文提出了通过在基础设施中使用代理家园代理(PHA)和使用邻居发现协议(TDP/NINA)进行本地化通信来解决灾后场景中嵌套NEMO问题的设计。因此,通过编写信令消息流和算法,使所提出的方案具有更大的灵活性。
{"title":"Design a New Proposed Route Optimization Scheme Based NEMO-Centric MANEMO (NCM)","authors":"A. A. Mousa, A. Abdalla, Khalid Al Khateeb, Othman Omran Khalifa, Huda Adibah","doi":"10.1109/ACSAT.2014.37","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.37","url":null,"abstract":"Route Optimization (RO) refers to any approach that optimizes the transmission of packets between a Mobile Network Node/Mobile Router and a Corresponding Node/Home Agent. RO would mean that a binding between the address of an MNN/MR and the location of the mobile network is registered at the CE/HA. Technically, route optimization mechanism comes up with a complementing solution for the pinball problem by avoiding the MRHA Bidirectional Tunnel(BT) that is to be used. This paper discusses the RO issues for NEMO and more specifically issues of Nested NEMO such astunneling redundant, HA dependency, processing delay, bottleneck, traffic congestion, ER selection, and scalability in the design consideration. In order to address NEMO ROsuboptimal, this work utilizes the NCM protocol plus to PHA. The proposed MANEMO RO scheme is a layer three solution to support RO for mobile networks. Additionally, the paper proposes the design to address Nested NEMO issues in a post disaster scenario by using Proxy Home Agent (PHA) in the infrastructure with using Neighbor Discovery protocol(TDP/NINA) for localizing communications. Thus, thesignaling message flow and the algorithm are written to give proposed scheme more flexibility.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117238025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hot-Spot Traffic Pattern on Hierarchical 3D Mesh Network 分层三维网格网络的热点流量模式
M. M. Hafizur Rahman, M. Akhand, Y. Miura, Y. Inoguchi
A Hierarchical 3D-Mesh (H3DM) Network is a 2D-mesh network of multiple basic modules (BMs), in which the basic modules are 3D-torus networks that are hierarchically interconnected for higher-level networks. In this paper, we evaluate the dynamic communication performance of a H3DM network under hot-spot traffic pattern using a deadlock-free dimension order routing algorithm with minimum number of virtual channels. We have also evaluated the dynamic communication performance of the mesh and torus networks. It is shown that under most imbalance hot-spot traffic pattern H3DM network yields high throughput and low average transfer time than that of mesh and torus networks, providing better dynamic communication performance compared to those networks.
H3DM (Hierarchical 3D-Mesh)网络是由多个基本模块(bm)组成的2D-mesh网络,其中基本模块是3d环面网络,这些环面网络在更高级别的网络中分层互连。本文采用一种虚拟信道数最少的无死锁维序路由算法,对热点流量模式下H3DM网络的动态通信性能进行了评估。我们还评估了网格和环面网络的动态通信性能。研究表明,在大多数不平衡的热点流量模式下,H3DM网络比mesh和torus网络具有更高的吞吐量和更低的平均传输时间,提供了更好的动态通信性能。
{"title":"Hot-Spot Traffic Pattern on Hierarchical 3D Mesh Network","authors":"M. M. Hafizur Rahman, M. Akhand, Y. Miura, Y. Inoguchi","doi":"10.1109/ACSAT.2014.17","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.17","url":null,"abstract":"A Hierarchical 3D-Mesh (H3DM) Network is a 2D-mesh network of multiple basic modules (BMs), in which the basic modules are 3D-torus networks that are hierarchically interconnected for higher-level networks. In this paper, we evaluate the dynamic communication performance of a H3DM network under hot-spot traffic pattern using a deadlock-free dimension order routing algorithm with minimum number of virtual channels. We have also evaluated the dynamic communication performance of the mesh and torus networks. It is shown that under most imbalance hot-spot traffic pattern H3DM network yields high throughput and low average transfer time than that of mesh and torus networks, providing better dynamic communication performance compared to those networks.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129709929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hiding Message in Color Image Using Auto Key Generator 隐藏信息在彩色图像使用自动密钥生成器
Q. M. Hussein
This paper suggests a new method for hidden secret message text in a RGB 24-bit color image. The positions of hidden text are selected randomly using auto key generator. The auto key is generated by selected three bytes from image each time, and then deposits these pixels to the main components Red, Green and Blue bytes. The values of least significant bits (LSB) from red color bytes are used to configure a binary number. The binary number determines the hidden position of message text bit in either LSB of green or blue color in the selected bytes, depending on specific criteria. After implementing this method on different images, it was founded easy to implement, high security, and difficulty of detection. The values of some metrics used to measure the efficiency of the proposed method are well. Also, there is no difference between the images before and after the information hiding which detect with human eye perception.
提出了一种在RGB 24位彩色图像中隐藏秘密信息文本的新方法。使用自动密钥生成器随机选择隐藏文本的位置。每次从图像中选择三个字节生成自动密钥,然后将这些像素存入主要组件红、绿、蓝字节。红色字节中的最低有效位(LSB)值用于配置二进制数。二进制数根据特定的标准确定所选字节中消息文本位在绿色或蓝色LSB中的隐藏位置。在不同的图像上实现后,发现该方法易于实现,安全性高,检测难度大。用于衡量所提出方法效率的一些指标的值是良好的。人眼感知检测到的信息隐藏前后的图像也没有差异。
{"title":"Hiding Message in Color Image Using Auto Key Generator","authors":"Q. M. Hussein","doi":"10.1109/ACSAT.2014.33","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.33","url":null,"abstract":"This paper suggests a new method for hidden secret message text in a RGB 24-bit color image. The positions of hidden text are selected randomly using auto key generator. The auto key is generated by selected three bytes from image each time, and then deposits these pixels to the main components Red, Green and Blue bytes. The values of least significant bits (LSB) from red color bytes are used to configure a binary number. The binary number determines the hidden position of message text bit in either LSB of green or blue color in the selected bytes, depending on specific criteria. After implementing this method on different images, it was founded easy to implement, high security, and difficulty of detection. The values of some metrics used to measure the efficiency of the proposed method are well. Also, there is no difference between the images before and after the information hiding which detect with human eye perception.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2014 3rd International Conference on Advanced Computer Science Applications and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1