We propose and demonstrate a novel technique to implement distributed amplification in a bidirectional link. Multiple optical signals are transmitted in a duplex configuration over a single fiber. The multiple channels are generated using only two optical sources on each side of the link. Distributed amplification is achieved using Raman scattering where the data modulated signal in the downlink direction acts as a pump signal as well. To obtain maximum Raman gain and to minimize Rayleigh scattering, the difference between the center frequencies of the downlink and uplink signals is kept at 13 THz. The resulting bit-error-rate plots show low values of receiver sensitivities.
{"title":"Cost-Efficient Distributed Amplification in a Bidirectional Optical Fiber Link","authors":"F. Khan, Ahmed Raza Danish, S. Ghafoor","doi":"10.1145/3209914.3209935","DOIUrl":"https://doi.org/10.1145/3209914.3209935","url":null,"abstract":"We propose and demonstrate a novel technique to implement distributed amplification in a bidirectional link. Multiple optical signals are transmitted in a duplex configuration over a single fiber. The multiple channels are generated using only two optical sources on each side of the link. Distributed amplification is achieved using Raman scattering where the data modulated signal in the downlink direction acts as a pump signal as well. To obtain maximum Raman gain and to minimize Rayleigh scattering, the difference between the center frequencies of the downlink and uplink signals is kept at 13 THz. The resulting bit-error-rate plots show low values of receiver sensitivities.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128918663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of information technology has promoted the process of landscape architecture research. Data warehouse and data mining technology can solve the huge data storage and operation. And according to the analysis of data processing, solving the relationship between artificial lighting and plant biological rhythm in landscape lighting. The technical parameters of artificial lighting suitable for all kinds of plants are provided, which is beneficial to the scientific study of nightscape of garden plants.
{"title":"Application of Data Warehouse and Data Mining in Landscape Research","authors":"Duan Ran, Chunyu Yang, S. Jiafu","doi":"10.1145/3209914.3234640","DOIUrl":"https://doi.org/10.1145/3209914.3234640","url":null,"abstract":"The development of information technology has promoted the process of landscape architecture research. Data warehouse and data mining technology can solve the huge data storage and operation. And according to the analysis of data processing, solving the relationship between artificial lighting and plant biological rhythm in landscape lighting. The technical parameters of artificial lighting suitable for all kinds of plants are provided, which is beneficial to the scientific study of nightscape of garden plants.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127169379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this study was to investigate demographic variables in knowledge sharing. The study conducted a quantitative study, and the participants were IT engineers. Random sampling was used. The questionnaires were sent to 25 IT companies by mails. The cover of the questionnaire explained the purposes of the study. A self-addressed stamped envelope was enclosed. 250 copies of questionnaires were sent and 84 copies were returned. The response rate was 33.6%. The data was analyzed by the independent t-test and One-way ANOVA in IBM SPSS 22. The findings of the study show (1) knowledge sharing behavior differs in terms of education level, (2) knowledge sharing behavior has significant influence in terms of profession, and (3) knowledge sharing behavior does not have significant influence in gender, age group, position grade, job tenure, workplace, marital status, and number of children.
{"title":"Demographic Variables in Knowledge Sharing Behavior among IT Engineers in Taiwan","authors":"Chiang Hsing Tien","doi":"10.1145/3209914.3209924","DOIUrl":"https://doi.org/10.1145/3209914.3209924","url":null,"abstract":"The purpose of this study was to investigate demographic variables in knowledge sharing. The study conducted a quantitative study, and the participants were IT engineers. Random sampling was used. The questionnaires were sent to 25 IT companies by mails. The cover of the questionnaire explained the purposes of the study. A self-addressed stamped envelope was enclosed. 250 copies of questionnaires were sent and 84 copies were returned. The response rate was 33.6%. The data was analyzed by the independent t-test and One-way ANOVA in IBM SPSS 22. The findings of the study show (1) knowledge sharing behavior differs in terms of education level, (2) knowledge sharing behavior has significant influence in terms of profession, and (3) knowledge sharing behavior does not have significant influence in gender, age group, position grade, job tenure, workplace, marital status, and number of children.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"127 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luyao Zou, Xuhua Rui, T. Nguyen, D. Min, Eunmi Choi, Tran Duc Thang, Nguyen Nhu Son
Modelling and analysis of storage system in data centers for availability prediction is of paramount importance. Many studies in literature proposed different architectures and techniques to enhance availability of the storage system. In this paper, we proposed to incorporate virtualization techniques on a network area storage. We used stochastic reward nets to model the system's architecture and operational scenarios. Furthermore, we investigated various measures of interests including steady state availability, downtime and downtime cost, and sensitivity of the system availability with respect to impacting parameters. The analysis results show that the proposed storage system with virtualization can obtain an acceptable level of service availability. Furthermore, the sensitivity analysis also points out complicated dependences of service availability upon system parameters. This paper presents a preliminary study to help guide the development of a scalable network area storage with virtualization in practice.
{"title":"A Scalable Network Area Storage with Virtualization: Modelling and Evaluation using Stochastic Reward Nets","authors":"Luyao Zou, Xuhua Rui, T. Nguyen, D. Min, Eunmi Choi, Tran Duc Thang, Nguyen Nhu Son","doi":"10.1145/3209914.3209918","DOIUrl":"https://doi.org/10.1145/3209914.3209918","url":null,"abstract":"Modelling and analysis of storage system in data centers for availability prediction is of paramount importance. Many studies in literature proposed different architectures and techniques to enhance availability of the storage system. In this paper, we proposed to incorporate virtualization techniques on a network area storage. We used stochastic reward nets to model the system's architecture and operational scenarios. Furthermore, we investigated various measures of interests including steady state availability, downtime and downtime cost, and sensitivity of the system availability with respect to impacting parameters. The analysis results show that the proposed storage system with virtualization can obtain an acceptable level of service availability. Furthermore, the sensitivity analysis also points out complicated dependences of service availability upon system parameters. This paper presents a preliminary study to help guide the development of a scalable network area storage with virtualization in practice.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129954529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image data is one of the key data in the ship's navigation record. Ship scene reappearance depends on its efficient retrieval. Recently, the exponential growth of the number of images makes the traditional single-machine image retrieval method gradually show the problem of inefficiency. In this paper, the image retrieval method based on the Bag of Visual Words (BoVW) model under the Hadoop platform is proposed and the distributed image retrieval is realized. Firstly, this paper takes BoVW model as the research object. Based on the Hadoop platform, the construction method of traditional visual dictionary is improved and the word frequency vectors are weighted by Term Frequency-Inverse Document Frequency (TF-IDF). Then the inverted index is generated in parallel for image retrieval. Experimental results show this method doubled the efficiency of visual dictionary construction while maintaining the original retrieval results and effectively improved the efficiency of image retrieval.
图像数据是船舶航行记录中的关键数据之一。船舶场景再现依赖于船舶场景的高效检索。近年来,图像数量的指数增长使得传统的单机图像检索方法逐渐显示出效率低下的问题。本文提出了在Hadoop平台下基于BoVW (Bag of Visual Words)模型的图像检索方法,实现了分布式图像检索。首先,本文以BoVW模型为研究对象。基于Hadoop平台,改进了传统视觉词典的构建方法,采用术语频率-逆文档频率(TF-IDF)对词频向量进行加权。然后并行生成倒排索引用于图像检索。实验结果表明,该方法在保持原始检索结果的同时,将视觉词典构建效率提高了一倍,有效地提高了图像检索的效率。
{"title":"Research on Ship Image Retrieval Based on BoVW Model under Hadoop Platform","authors":"R. Hu, J. Yang, Bangpei Zhu, Zhiqiang Guo","doi":"10.1145/3209914.3209948","DOIUrl":"https://doi.org/10.1145/3209914.3209948","url":null,"abstract":"Image data is one of the key data in the ship's navigation record. Ship scene reappearance depends on its efficient retrieval. Recently, the exponential growth of the number of images makes the traditional single-machine image retrieval method gradually show the problem of inefficiency. In this paper, the image retrieval method based on the Bag of Visual Words (BoVW) model under the Hadoop platform is proposed and the distributed image retrieval is realized. Firstly, this paper takes BoVW model as the research object. Based on the Hadoop platform, the construction method of traditional visual dictionary is improved and the word frequency vectors are weighted by Term Frequency-Inverse Document Frequency (TF-IDF). Then the inverted index is generated in parallel for image retrieval. Experimental results show this method doubled the efficiency of visual dictionary construction while maintaining the original retrieval results and effectively improved the efficiency of image retrieval.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128452983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Regression testing is an activity in the software testing process to ensure the software is validated and verified after modification occurred on software. It is costly process procedure which has been expected to reach half cost of the software maintenance cost. Many techniques and approaches have been used in regression testing process to enhance the efficiency and effectiveness of regression testing process. Such as test case reduction, test case selection, test case prioritization and retest all. Test case prioritization has been used in regression testing to increase the effectiveness through selecting the most vital test case that has the ability in finding and uncovering errors in the system under test. This paper has introduced a new algorithm for prioritizing test cases in test suite that is based on method and line of code coverage. Test cases which cover the most methods and line of code are more effective and efficient in finding errors.
{"title":"Combined Source Code Approach for Test Case Prioritization","authors":"Iyad Alazzam, K. Nahar","doi":"10.1145/3209914.3209936","DOIUrl":"https://doi.org/10.1145/3209914.3209936","url":null,"abstract":"Regression testing is an activity in the software testing process to ensure the software is validated and verified after modification occurred on software. It is costly process procedure which has been expected to reach half cost of the software maintenance cost. Many techniques and approaches have been used in regression testing process to enhance the efficiency and effectiveness of regression testing process. Such as test case reduction, test case selection, test case prioritization and retest all. Test case prioritization has been used in regression testing to increase the effectiveness through selecting the most vital test case that has the ability in finding and uncovering errors in the system under test. This paper has introduced a new algorithm for prioritizing test cases in test suite that is based on method and line of code coverage. Test cases which cover the most methods and line of code are more effective and efficient in finding errors.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128264770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of Internet and the communication technology, the construction of smart tourism is no longer a slogan that can not be realized. The construction of smart tourism in tourist destinations conforms to the strategic goal of tourism industry development in China. Based on the background of big data, this paper elaborated the connotation of big data and smart tourism, and built a large data platform to realize the forecast and feedback of smart tourism through the analysis of tourism development. The platform could be divided into government tourism platform, tourists platform, tourism enterprises platform and community residents platform relying on big data do their own duty. Eventually this paper put forward a construction model and path to realize the smart tourism platform.
{"title":"A Study on the Management Model of Smart Tourism Industry under the Era of Big Data","authors":"Zhao Hua","doi":"10.1145/3209914.3234637","DOIUrl":"https://doi.org/10.1145/3209914.3234637","url":null,"abstract":"With the rapid development of Internet and the communication technology, the construction of smart tourism is no longer a slogan that can not be realized. The construction of smart tourism in tourist destinations conforms to the strategic goal of tourism industry development in China. Based on the background of big data, this paper elaborated the connotation of big data and smart tourism, and built a large data platform to realize the forecast and feedback of smart tourism through the analysis of tourism development. The platform could be divided into government tourism platform, tourists platform, tourism enterprises platform and community residents platform relying on big data do their own duty. Eventually this paper put forward a construction model and path to realize the smart tourism platform.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128882267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network application identification technology is widely used in the fields of network management, network optimization and intrusion detection and so on. And among the methods, the DPI (Deep Packet Inspection) is the most popular one with high accuracy relaying on a small amount of payload data. However, DPI depends on the effective protocol keywords. In order to cope with the speed of the applications updating, we proposed a protocol keywords extraction method for unencrypted network applications based on frequent itemsets mining. It contains two major steps: Firstly, we generate candidate words by using unsupervised methods and reduce the word set size with rules of words length and position. Then, we extract effective protocol keywords with frequent item-sets mining method and remove the noise words and redundant words by evaluating the candidate word co-occurrence relationship. The experiment result shows that our method shrinks the size of the keywords set and is better at extracting the real protocol keywords compared with Proword.
{"title":"Protocol Keywords Extraction Method Based on Frequent Item-Sets Mining","authors":"Gaochao Li, Q. Qian, Zhonghua Wang, Xin Zou, Xunxun Chen, Xiao Wu","doi":"10.1145/3209914.3209937","DOIUrl":"https://doi.org/10.1145/3209914.3209937","url":null,"abstract":"Network application identification technology is widely used in the fields of network management, network optimization and intrusion detection and so on. And among the methods, the DPI (Deep Packet Inspection) is the most popular one with high accuracy relaying on a small amount of payload data. However, DPI depends on the effective protocol keywords. In order to cope with the speed of the applications updating, we proposed a protocol keywords extraction method for unencrypted network applications based on frequent itemsets mining. It contains two major steps: Firstly, we generate candidate words by using unsupervised methods and reduce the word set size with rules of words length and position. Then, we extract effective protocol keywords with frequent item-sets mining method and remove the noise words and redundant words by evaluating the candidate word co-occurrence relationship. The experiment result shows that our method shrinks the size of the keywords set and is better at extracting the real protocol keywords compared with Proword.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Augmented Reality (AR) is a technique which seamlessly integrate virtual 3D models into the image of the real scenario in real time. Using the QR code as the identification mark, an algorithm is proposed to extract the virtual straight line of QR code and to locate and track the camera based on the hybrid features, thus it avoids the possibility of failure when locating and tracking only by feature points. The experimental results show that the method of combining straight lines with feature points is better than that of using only straight lines or feature points. Further, an AR (Augmented Reality) system is developed.
{"title":"Using Hybrid Features of QR Code to Locate and Track in Augmented Reality","authors":"Caixia Zhang, Gang Bai","doi":"10.1145/3209914.3226161","DOIUrl":"https://doi.org/10.1145/3209914.3226161","url":null,"abstract":"Augmented Reality (AR) is a technique which seamlessly integrate virtual 3D models into the image of the real scenario in real time. Using the QR code as the identification mark, an algorithm is proposed to extract the virtual straight line of QR code and to locate and track the camera based on the hybrid features, thus it avoids the possibility of failure when locating and tracking only by feature points. The experimental results show that the method of combining straight lines with feature points is better than that of using only straight lines or feature points. Further, an AR (Augmented Reality) system is developed.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121843962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Loseva, A. Obeid, H. Richter, R. Backes, D. Eichhorn
The deployment of software packages becomes more and more difficult. Thus Canonical Ltd. has created a framework called "JuJu" that serves as a DevOps toolchain. JuJu allows an integrated software development, deployment and operation of software packages. Additionally Canocial provided hundreds of open-source JuJu-maintained software packages in an own online store for download. However, our tests revealed that only 14 % of 35 picked packages from the Canonical's JuJu charm store really be installed as they are. The reason is that many of them are sensitive against mismatches of what is contained in the relevant JuJu files and what exists as target hardware at the customer. Because of that, a new concept and tool called Fixit was created by us for the semi-automatic software-deployment of JuJu software packages onto arbitrary hardware and software environments such as Windows and Linux operating systems. Fixit improves the quota of successful first-try installations from 14 to 69 %. This is accomplished by semi-automatic analysis and transformation of the package source codes.
{"title":"Fixit - A Semi-Automatic Software Deployment Tool for Arbitrary Targets","authors":"E. Loseva, A. Obeid, H. Richter, R. Backes, D. Eichhorn","doi":"10.1145/3209914.3209938","DOIUrl":"https://doi.org/10.1145/3209914.3209938","url":null,"abstract":"The deployment of software packages becomes more and more difficult. Thus Canonical Ltd. has created a framework called \"JuJu\" that serves as a DevOps toolchain. JuJu allows an integrated software development, deployment and operation of software packages. Additionally Canocial provided hundreds of open-source JuJu-maintained software packages in an own online store for download. However, our tests revealed that only 14 % of 35 picked packages from the Canonical's JuJu charm store really be installed as they are. The reason is that many of them are sensitive against mismatches of what is contained in the relevant JuJu files and what exists as target hardware at the customer. Because of that, a new concept and tool called Fixit was created by us for the semi-automatic software-deployment of JuJu software packages onto arbitrary hardware and software environments such as Windows and Linux operating systems. Fixit improves the quota of successful first-try installations from 14 to 69 %. This is accomplished by semi-automatic analysis and transformation of the package source codes.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122730989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}