首页 > 最新文献

2009 International Conference on Innovations in Information Technology (IIT)最新文献

英文 中文
Towards design of a smart prepaid gas metering system 智能预付费燃气计量系统的设计
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413776
T. Khan, T. Paul, G. M. Shahabuddin, K. Wahid, A. H. Chowdhury, S. Kabir
Gas is an important source of energy in this world. At this age of energy crisis, gas must be utilized wisely and carefully. In this paper, a design of a smart card based prepaid gas metering system has been presented. Prepaid gas meter will make the consumers more conscious to utilize gas carefully and also it promises easy, fast and accurate billing scheme. The entire system is designed with the state-of-the-art digital and information technology. A prototype of the system has been developed and tested.
天然气是世界上一种重要的能源。在这个能源危机的时代,必须明智而谨慎地利用天然气。本文介绍了一种基于智能卡的燃气预付费计量系统的设计。预付费燃气表将使消费者更加有意识地谨慎使用燃气,并承诺简单,快速和准确的计费方案。整个系统采用最先进的数字和信息技术设计。该系统的原型已经开发和测试。
{"title":"Towards design of a smart prepaid gas metering system","authors":"T. Khan, T. Paul, G. M. Shahabuddin, K. Wahid, A. H. Chowdhury, S. Kabir","doi":"10.1109/IIT.2009.5413776","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413776","url":null,"abstract":"Gas is an important source of energy in this world. At this age of energy crisis, gas must be utilized wisely and carefully. In this paper, a design of a smart card based prepaid gas metering system has been presented. Prepaid gas meter will make the consumers more conscious to utilize gas carefully and also it promises easy, fast and accurate billing scheme. The entire system is designed with the state-of-the-art digital and information technology. A prototype of the system has been developed and tested.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117242177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On popularity quality: Growth and decay phases of publication popularities 论知名度质量:出版物知名度的增长期与衰退期
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413363
S. Bani-Ahmad, G. Ozsoyoglu
Within publication digital collections, citation analysis and publication score assignment are commonly used (i) to evaluate the impact of publications (and scientific collections, e.g., journals and conferences), and (ii) to order digital collection search outputs, e.g., Google Scholar. The popular citation-based web page (and, thus, publication) score measure PageRank is criticized for (a) computing only the current (and, thus, time-independent) publication scores, and (b) not taking into account the fact that citation graphs continuously evolve. Thus, the use of PageRank as is results in penalizing recent publications that have not yet developed enough popularity to receive citations. In order to overcome this inherent bias of PageRank and other citation-based popularity measures, Cho et. al. defined Page Quality for a webpage as its popularity after large numbers of web users become aware of it. Page Quality is based on the assumption that popularity evolves over time. In this paper, we (i) experimentally validate that PageRank scores of publications, as they change over time, follow the logistic growth model that often arises in the context of population growth, (ii) model one aspect of researchers' citation behavior in technology-driven fields (such as computer science) where authors tend not to cite old publications, (iii) argue and empirically verify that publication popularity, unlike web page popularity, has two distinct phases, namely, the popularity growth phase and the popularity decay phase, and (iv) extend the popularity growth model developed by Cho et. al. to capture the popularity decay phase. All of our claims are empirically verified using the ACM SIGMOD Anthology digital collection.
在出版物数字馆藏中,引文分析和出版物评分分配通常用于(i)评估出版物(和科学馆藏,例如期刊和会议)的影响,以及(ii)订购数字馆藏搜索输出,例如b谷歌Scholar。流行的基于引用的网页(因此,也就是发表)分数衡量方法PageRank被批评为:(a)只计算当前的(因此,与时间无关的)发表分数,(b)没有考虑到引用图不断发展的事实。因此,使用PageRank作为惩罚的结果是,最近的出版物尚未发展到足够的知名度,以获得引用。为了克服PageRank和其他基于引用的流行度度量的固有偏见,Cho等人将网页的页面质量定义为大量网络用户意识到它之后的受欢迎程度。页面质量是基于受欢迎程度随时间而变化的假设。在本文中,我们(i)实验验证出版物的PageRank分数随着时间的推移而变化,遵循人口增长背景下经常出现的逻辑增长模型;(ii)在作者倾向于不引用旧出版物的技术驱动领域(如计算机科学)中,对研究人员引用行为的一个方面进行建模;(iii)论证并实证验证出版物受欢迎程度与网页受欢迎程度不同,有两个不同的阶段,即:(4)扩展Cho等人开发的人气增长模型来捕捉人气衰减阶段。我们所有的主张都是使用ACM SIGMOD选集数字集合进行经验验证的。
{"title":"On popularity quality: Growth and decay phases of publication popularities","authors":"S. Bani-Ahmad, G. Ozsoyoglu","doi":"10.1109/IIT.2009.5413363","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413363","url":null,"abstract":"Within publication digital collections, citation analysis and publication score assignment are commonly used (i) to evaluate the impact of publications (and scientific collections, e.g., journals and conferences), and (ii) to order digital collection search outputs, e.g., Google Scholar. The popular citation-based web page (and, thus, publication) score measure PageRank is criticized for (a) computing only the current (and, thus, time-independent) publication scores, and (b) not taking into account the fact that citation graphs continuously evolve. Thus, the use of PageRank as is results in penalizing recent publications that have not yet developed enough popularity to receive citations. In order to overcome this inherent bias of PageRank and other citation-based popularity measures, Cho et. al. defined Page Quality for a webpage as its popularity after large numbers of web users become aware of it. Page Quality is based on the assumption that popularity evolves over time. In this paper, we (i) experimentally validate that PageRank scores of publications, as they change over time, follow the logistic growth model that often arises in the context of population growth, (ii) model one aspect of researchers' citation behavior in technology-driven fields (such as computer science) where authors tend not to cite old publications, (iii) argue and empirically verify that publication popularity, unlike web page popularity, has two distinct phases, namely, the popularity growth phase and the popularity decay phase, and (iv) extend the popularity growth model developed by Cho et. al. to capture the popularity decay phase. All of our claims are empirically verified using the ACM SIGMOD Anthology digital collection.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114691888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiple preauthentication schemes based on fast channel switching in public Wireless LANs 公共无线局域网中基于快速信道交换的多种预认证方案
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413368
Jaejong Baek, Joo-Seok Song, Sunghoon Seo
Seamless handoff issues including authentications have become considerable interest in wireless networks, which support pervasive environment users. Usually the active scanning and preauthentication methods are adopted to solve the disruption in seamless services. In this paper, we propose a new preauthentication scheme based on the fast channel switching and the power saving mode (PSM) in public wireless local area networks (LANs). We prove the effect of our proposed scheme using the simulation programming results. During the channel switching period (CPS), our proposed scheme performs multiple preauthentication with pre-scanned neighbor Access Points (APs). By using very short period of channel switching, our scheme doe not degrade Quality-of-Service (QoS) of its current applications. It also reduces the authentication latency in handoffs and improves the random mobility of users. In addition, our scheme only requires minor implementation changes on the client device driver, so it is apt for being deployed in current WLANs environment.
包括身份验证在内的无缝切换问题已经成为无线网络中非常重要的问题,无线网络支持普及环境用户。通常采用主动扫描和预认证的方式来解决无缝服务的中断问题。本文提出了一种基于快速信道交换和省电模式(PSM)的公共无线局域网预认证方案。通过仿真编程结果验证了所提方案的有效性。在信道交换期间(CPS),我们提出的方案与预扫描的邻居接入点(ap)进行多次预认证。通过使用非常短的信道交换周期,我们的方案不会降低当前应用的服务质量(QoS)。它还减少了切换中的身份验证延迟,提高了用户的随机移动性。此外,我们的方案只需要在客户端设备驱动程序上进行微小的实现更改,因此它适合部署在当前的wlan环境中。
{"title":"Multiple preauthentication schemes based on fast channel switching in public Wireless LANs","authors":"Jaejong Baek, Joo-Seok Song, Sunghoon Seo","doi":"10.1109/IIT.2009.5413368","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413368","url":null,"abstract":"Seamless handoff issues including authentications have become considerable interest in wireless networks, which support pervasive environment users. Usually the active scanning and preauthentication methods are adopted to solve the disruption in seamless services. In this paper, we propose a new preauthentication scheme based on the fast channel switching and the power saving mode (PSM) in public wireless local area networks (LANs). We prove the effect of our proposed scheme using the simulation programming results. During the channel switching period (CPS), our proposed scheme performs multiple preauthentication with pre-scanned neighbor Access Points (APs). By using very short period of channel switching, our scheme doe not degrade Quality-of-Service (QoS) of its current applications. It also reduces the authentication latency in handoffs and improves the random mobility of users. In addition, our scheme only requires minor implementation changes on the client device driver, so it is apt for being deployed in current WLANs environment.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131288869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A majority voter for intrusion tolerant software based on N-version programming techniques 基于n版本编程技术的入侵容忍软件的多数派投票人
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413780
Zahra Aghajani, M. A. Azgomi
One of the drawbacks of the existing majority voters, which are widely used in N-version programming (NVP) technique, is the high probability of agreement on incorrect results generated by variants. Therefore, to propose an intrusion-tolerant software architecture based on NVP for hostile environments and to consider possible attacks, a new voting scheme is required. In this paper, we propose a voting scheme to improve the correctness of the binary majority voters in the hostile environments to treat the situations that more than half of the variants may have been compromised. We have used stochastic activity networks (SANs) to model the scheme for a triple-version programming (3VP) system and measure the probability of detecting the correct outputs by the voter. The evaluation results showed that the proposed scheme can improve the correctness of the classic majority voting algorithms to detect the correct output, especially the intrusion detection mechanisms are used in the scheme.
在n版本编程(NVP)技术中广泛使用的现有多数投票人的缺点之一是,变体生成的错误结果一致的概率很高。因此,为了提出一种针对敌对环境的基于NVP的容错软件架构,并考虑可能的攻击,需要一种新的投票方案。在本文中,我们提出了一种投票方案来提高二元多数投票人在敌对环境下的正确性,以处理超过一半的变体可能已经被破坏的情况。我们使用随机活动网络(SANs)对三版本编程(3VP)系统的方案进行建模,并测量选民检测正确输出的概率。评估结果表明,该方案能够提高经典多数投票算法检测正确输出的正确性,特别是在方案中采用了入侵检测机制。
{"title":"A majority voter for intrusion tolerant software based on N-version programming techniques","authors":"Zahra Aghajani, M. A. Azgomi","doi":"10.1109/IIT.2009.5413780","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413780","url":null,"abstract":"One of the drawbacks of the existing majority voters, which are widely used in N-version programming (NVP) technique, is the high probability of agreement on incorrect results generated by variants. Therefore, to propose an intrusion-tolerant software architecture based on NVP for hostile environments and to consider possible attacks, a new voting scheme is required. In this paper, we propose a voting scheme to improve the correctness of the binary majority voters in the hostile environments to treat the situations that more than half of the variants may have been compromised. We have used stochastic activity networks (SANs) to model the scheme for a triple-version programming (3VP) system and measure the probability of detecting the correct outputs by the voter. The evaluation results showed that the proposed scheme can improve the correctness of the classic majority voting algorithms to detect the correct output, especially the intrusion detection mechanisms are used in the scheme.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131076087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring behaviors & collaborative mapping through Mindstorms robots: A case study in applied social constructionism at senior-project level 通过Mindstorms机器人探索行为和协作映射:在高级项目层面应用社会建构主义的案例研究
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413630
N. Mavridis, Asma Al Rashdi, Maryam Al Ketbi, Sara Al Ketbi, Alia Marar
Constructionism, a term first coined by Seymour Papert, is a learning theory based on constructivism, which however also holds that learning can happen most effectively when people are also active in making objects in the real world. In this paper, we will present a case study of an application of constructionism at the undergraduate senior project level. More specifically, we will describe a robotics project that took place in our lab, which aimed towards providing a strong hands-on background in the basics of robotics and the fundamentals of the research process to a group of four final-year students. During this project, the students experienced basics of team working, flexible project management, and intra- as well as extra-group constructionist tuition, as well as aspects of real-world research. Furthermore, they were able to gain experience in three programming languages, build and successfully demonstrate basic behaviors and collaborative mapping using the Mindstorms robots, and create a theoretical framework incorporating and providing novel extensions to their methods.
建构主义是一个基于建构主义的学习理论,该理论认为,当人们在现实世界中积极地制造物体时,学习可以最有效地发生。在本文中,我们将呈现一个建构主义在本科高年级专题层面应用的案例研究。更具体地说,我们将描述一个机器人项目,发生在我们的实验室,其目的是提供一个强大的实践背景,在机器人的基础知识和研究过程的基本原理,一组四名大四学生。在这个项目中,学生们体验了团队合作的基本知识,灵活的项目管理,小组内和小组外的建构主义教学,以及现实世界研究的各个方面。此外,他们能够获得三种编程语言的经验,构建并成功演示了使用Mindstorms机器人的基本行为和协作映射,并创建了一个理论框架,并为他们的方法提供了新的扩展。
{"title":"Exploring behaviors & collaborative mapping through Mindstorms robots: A case study in applied social constructionism at senior-project level","authors":"N. Mavridis, Asma Al Rashdi, Maryam Al Ketbi, Sara Al Ketbi, Alia Marar","doi":"10.1109/IIT.2009.5413630","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413630","url":null,"abstract":"Constructionism, a term first coined by Seymour Papert, is a learning theory based on constructivism, which however also holds that learning can happen most effectively when people are also active in making objects in the real world. In this paper, we will present a case study of an application of constructionism at the undergraduate senior project level. More specifically, we will describe a robotics project that took place in our lab, which aimed towards providing a strong hands-on background in the basics of robotics and the fundamentals of the research process to a group of four final-year students. During this project, the students experienced basics of team working, flexible project management, and intra- as well as extra-group constructionist tuition, as well as aspects of real-world research. Furthermore, they were able to gain experience in three programming languages, build and successfully demonstrate basic behaviors and collaborative mapping using the Mindstorms robots, and create a theoretical framework incorporating and providing novel extensions to their methods.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116060441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effective ways of encouraging teachers to design and use ITS: feature analysis of intelligent tutoring systems authoring tools 激励教师设计和使用ITS的有效途径:智能辅导系统创作工具的特点分析
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413784
N. Katuk, A. Sarrafzadeh, F. Dadgostar
Intelligent tutoring systems (ITSs) have been proven effective in supporting students' learning activities, but the actual utilization of ITSs has not been confirmed. Delegation of development tasks from developers to teachers through the use of ITS authoring tools (ITSATs) is not promoting rapid progress in this area of research. Designing ITSs using ITSATs by teachers seems to be difficult to realize. This could be affected by insufficient features in ITASTs which meet teachers' requirements. This paper presents feature analysis of ITSATs. In this study, we examined two categories of features: authoring environment and lesson content creation. The study focuses on three ITSAT namely CTAT, ASPIRE and Assistment Buider. We investigated the availability of such features in those ITSAT and propose ITSAT features which could meet teachers' requirements in using ITSAT to design ITS.
智能辅导系统(ITSs)在支持学生学习活动方面已被证明是有效的,但其实际使用情况尚未得到证实。通过使用ITS创作工具(itsat)将开发任务从开发人员委托给教师,并没有促进这一研究领域的快速进展。教师利用itsat设计信息技术服务系统似乎很难实现。这可能会受到itast中满足教师需求的功能不足的影响。本文对it考试的特点进行了分析。在本研究中,我们考察了两类特征:创作环境和课程内容创作。这项研究的重点是三个信息技术测试,即CTAT、ASPIRE和Assistment builder。我们调查了这些功能在这些ITSAT中的可用性,并提出了能够满足教师使用ITSAT设计ITS需求的ITSAT功能。
{"title":"Effective ways of encouraging teachers to design and use ITS: feature analysis of intelligent tutoring systems authoring tools","authors":"N. Katuk, A. Sarrafzadeh, F. Dadgostar","doi":"10.1109/IIT.2009.5413784","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413784","url":null,"abstract":"Intelligent tutoring systems (ITSs) have been proven effective in supporting students' learning activities, but the actual utilization of ITSs has not been confirmed. Delegation of development tasks from developers to teachers through the use of ITS authoring tools (ITSATs) is not promoting rapid progress in this area of research. Designing ITSs using ITSATs by teachers seems to be difficult to realize. This could be affected by insufficient features in ITASTs which meet teachers' requirements. This paper presents feature analysis of ITSATs. In this study, we examined two categories of features: authoring environment and lesson content creation. The study focuses on three ITSAT namely CTAT, ASPIRE and Assistment Buider. We investigated the availability of such features in those ITSAT and propose ITSAT features which could meet teachers' requirements in using ITSAT to design ITS.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123964707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reliability of NAND-2 CMOS gates from threshold voltage variations 阈值电压变化对NAND-2 CMOS门可靠性的影响
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413631
W. Ibrahim, Valeriu Beiu
The high-level approach for estimating circuit reliability tends to consider the probability of failure of a logic gate as a constant, and work towards the higher levels. With scaling, such gate-centric approaches become highly inaccurate, as both transistors and input vectors drastically affect the probability of failure of the logic gates. This paper will present a transistor-level gate failure analysis starting from threshold voltage variations. We will briefly review the state-of-the-art, and rely upon freshly reported results for threshold voltage variations. These will be used to estimate the probabilities of failure of a classical NAND-2 CMOS gate for (a few) different technologies, voltages, and input vectors. They will also reveal huge differences between the highest and the lowest probabilities of failure, and will show how strongly these are affected by the supply voltage.
估计电路可靠性的高级方法倾向于将逻辑门的故障概率视为常数,并朝着更高的水平工作。随着缩放,这种以门为中心的方法变得非常不准确,因为晶体管和输入向量都极大地影响逻辑门失效的概率。本文将介绍从阈值电压变化出发的晶体管级栅极失效分析。我们将简要回顾最先进的技术,并依靠最新报道的阈值电压变化结果。这些将用于估计(几种)不同技术、电压和输入矢量下经典NAND-2 CMOS栅极失效的概率。它们还将揭示最高和最低故障概率之间的巨大差异,并将显示这些差异受电源电压影响的程度。
{"title":"Reliability of NAND-2 CMOS gates from threshold voltage variations","authors":"W. Ibrahim, Valeriu Beiu","doi":"10.1109/IIT.2009.5413631","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413631","url":null,"abstract":"The high-level approach for estimating circuit reliability tends to consider the probability of failure of a logic gate as a constant, and work towards the higher levels. With scaling, such gate-centric approaches become highly inaccurate, as both transistors and input vectors drastically affect the probability of failure of the logic gates. This paper will present a transistor-level gate failure analysis starting from threshold voltage variations. We will briefly review the state-of-the-art, and rely upon freshly reported results for threshold voltage variations. These will be used to estimate the probabilities of failure of a classical NAND-2 CMOS gate for (a few) different technologies, voltages, and input vectors. They will also reveal huge differences between the highest and the lowest probabilities of failure, and will show how strongly these are affected by the supply voltage.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129725189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Combination of duty and historical constraints in role-based access control 基于角色的访问控制中的职责约束和历史约束的组合
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413771
A. Hosseini, M. A. Azgomi
Constraints are an important topic in any access control mechanism. Always, there are demands for defining new constraints or generalizing the existing ones in order to better managing and controlling organizations and specifying new policies. Among access control models, role-based access control (RBAC) is very useful and is continuously under development. In this paper, we propose a new constraint in the RBAC model based on dependent roles that we call combination of duty (CD). Furthermore, static and dynamic types of this constraint are also defined. In addition, these constraints and the two existing constraints in RBAC model (i.e. static and dynamic separation of duty (SD)) are generalized in the base of history as static historical SD, dynamic historical SD, static historical CD and dynamic historical CD.
约束在任何访问控制机制中都是一个重要的主题。为了更好地管理和控制组织并指定新的策略,总是需要定义新的约束或概括现有的约束。在访问控制模型中,基于角色的访问控制(RBAC)非常有用,并且正在不断发展。在本文中,我们提出了一种新的基于依赖角色的RBAC模型约束,我们称之为职责组合(CD)。此外,还定义了此约束的静态和动态类型。此外,这些约束以及RBAC模型中已有的两种约束(即静态和动态职责分离(SD))在历史的基础上被概括为静态历史职责分离、动态历史职责分离、静态历史职责分离和动态历史职责分离。
{"title":"Combination of duty and historical constraints in role-based access control","authors":"A. Hosseini, M. A. Azgomi","doi":"10.1109/IIT.2009.5413771","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413771","url":null,"abstract":"Constraints are an important topic in any access control mechanism. Always, there are demands for defining new constraints or generalizing the existing ones in order to better managing and controlling organizations and specifying new policies. Among access control models, role-based access control (RBAC) is very useful and is continuously under development. In this paper, we propose a new constraint in the RBAC model based on dependent roles that we call combination of duty (CD). Furthermore, static and dynamic types of this constraint are also defined. In addition, these constraints and the two existing constraints in RBAC model (i.e. static and dynamic separation of duty (SD)) are generalized in the base of history as static historical SD, dynamic historical SD, static historical CD and dynamic historical CD.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121436717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-layer parallel shooting method for multi-layer boundary value problems 多层边值问题的多层平行射击方法
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413402
F. Allan, M. Hajji
Multi-layer boundary value problems have received a great deal of attention in the past few years. This is due to the fact that they model many engineering applications. Examples of applications include fluid flow though multi-layers porous media such as ground water and oil reservoirs. In this work, we present a new method for solving multilayer boundary value problems. The method is based on an efficient adaption of the classical shooting method, where boundary value problems are solved for by means of solving a sequence of initial value problems. Illustration of the method is presented on application to fluid flow through multi-layer porous media. The examples presented suggested that the method is reliable and accurate.
近年来,多层边值问题受到了广泛的关注。这是因为它们对许多工程应用进行了建模。应用实例包括流体流过多层多孔介质,如地下水和油藏。本文提出了一种求解多层边值问题的新方法。该方法是对经典射击法的有效改进,通过求解一系列初值问题来求解边值问题。给出了该方法在流体在多层多孔介质中的应用实例。算例表明,该方法可靠、准确。
{"title":"Multi-layer parallel shooting method for multi-layer boundary value problems","authors":"F. Allan, M. Hajji","doi":"10.1109/IIT.2009.5413402","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413402","url":null,"abstract":"Multi-layer boundary value problems have received a great deal of attention in the past few years. This is due to the fact that they model many engineering applications. Examples of applications include fluid flow though multi-layers porous media such as ground water and oil reservoirs. In this work, we present a new method for solving multilayer boundary value problems. The method is based on an efficient adaption of the classical shooting method, where boundary value problems are solved for by means of solving a sequence of initial value problems. Illustration of the method is presented on application to fluid flow through multi-layer porous media. The examples presented suggested that the method is reliable and accurate.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115725536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RSMA Matching Algorithm for searching biological sequences 生物序列搜索的RSMA匹配算法
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413769
Ahmad F. Klaib, H. Osborne
Huge amounts of biological data are stored in linear files. Biological proteins are sequences of amino acids. The quantities of data in these fields tend to increase year on year. String matching algorithms play a key role in many computer science problems, and in the implementation of computer software. For this reason efficient string-matching algorithms should be used which use minimal computer storage and which minimize the searching response time. In this study, we propose a new algorithm called the Random String Matching Algorithm (RSMA). RSMA combines our enhanced preprocessing phase from the Berry Ravindran algorithm with our proposed new searching phase procedure. This variety of searching order allows our proposed algorithm to reduce the number of comparison characters and enhances the searching response time. Experimental results show that the RSMA algorithm offers a smaller number of comparisons and offers improved elapsed searching time when compared to other well-known algorithms.
大量的生物数据存储在线性文件中。生物蛋白质是氨基酸的序列。这些领域的数据量有逐年增加的趋势。字符串匹配算法在许多计算机科学问题和计算机软件的实现中起着关键作用。出于这个原因,应该使用高效的字符串匹配算法,这些算法使用最小的计算机存储并最小化搜索响应时间。在这项研究中,我们提出了一种新的算法,称为随机字符串匹配算法(RSMA)。RSMA将Berry Ravindran算法的增强预处理阶段与我们提出的新搜索阶段过程相结合。这种不同的搜索顺序使得我们提出的算法减少了比较字符的数量,提高了搜索响应时间。实验结果表明,与其他已知算法相比,RSMA算法提供了更少的比较次数,并缩短了运行时间。
{"title":"RSMA Matching Algorithm for searching biological sequences","authors":"Ahmad F. Klaib, H. Osborne","doi":"10.1109/IIT.2009.5413769","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413769","url":null,"abstract":"Huge amounts of biological data are stored in linear files. Biological proteins are sequences of amino acids. The quantities of data in these fields tend to increase year on year. String matching algorithms play a key role in many computer science problems, and in the implementation of computer software. For this reason efficient string-matching algorithms should be used which use minimal computer storage and which minimize the searching response time. In this study, we propose a new algorithm called the Random String Matching Algorithm (RSMA). RSMA combines our enhanced preprocessing phase from the Berry Ravindran algorithm with our proposed new searching phase procedure. This variety of searching order allows our proposed algorithm to reduce the number of comparison characters and enhances the searching response time. Experimental results show that the RSMA algorithm offers a smaller number of comparisons and offers improved elapsed searching time when compared to other well-known algorithms.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128484978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2009 International Conference on Innovations in Information Technology (IIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1