首页 > 最新文献

2009 International Conference on Innovations in Information Technology (IIT)最新文献

英文 中文
Database virtualization technology in ubiquitous computing 普适计算中的数据库虚拟化技术
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413639
Yuji Wada, J. Sawamoto, Yuta Watanabe, T. Katoh
In this paper, our research objective is to develop a database virtualization technique so that data analysts or other users who apply data mining methods to their jobs can use all ubiquitous databases in the Internet as if they were recognized as a single database, thereby helping to reduce their workloads such as data collection from the databases and data cleansing works. In this study, firstly we examine XML scheme advantages and propose a database virtualization method by which such ubiquitous databases as relational databases, object-oriented databases, and XML databases are useful, as if they all behaved as a single database. Next, we show the method of virtualization of ubiquitous databases can describe ubiquitous database schema in a unified fashion using the XML schema. Moreover, it consists of a high-level concept of distributed database management of the same type and of different types, and also of a location transparency feature.
在本文中,我们的研究目标是开发一种数据库虚拟化技术,以便数据分析师或其他将数据挖掘方法应用于其工作的用户可以使用互联网上所有无处不在的数据库,就好像它们被识别为单个数据库一样,从而帮助减少他们的工作负载,例如从数据库收集数据和数据清理工作。在本研究中,我们首先考察了XML方案的优点,并提出了一种数据库虚拟化方法,通过这种方法,关系数据库、面向对象数据库和XML数据库等无处不在的数据库都是有用的,就好像它们都表现为单个数据库一样。接下来,我们将展示无处不在数据库的虚拟化方法,该方法可以使用XML模式以统一的方式描述无处不在的数据库模式。此外,它还包含相同类型和不同类型的分布式数据库管理的高级概念,以及位置透明特性。
{"title":"Database virtualization technology in ubiquitous computing","authors":"Yuji Wada, J. Sawamoto, Yuta Watanabe, T. Katoh","doi":"10.1109/IIT.2009.5413639","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413639","url":null,"abstract":"In this paper, our research objective is to develop a database virtualization technique so that data analysts or other users who apply data mining methods to their jobs can use all ubiquitous databases in the Internet as if they were recognized as a single database, thereby helping to reduce their workloads such as data collection from the databases and data cleansing works. In this study, firstly we examine XML scheme advantages and propose a database virtualization method by which such ubiquitous databases as relational databases, object-oriented databases, and XML databases are useful, as if they all behaved as a single database. Next, we show the method of virtualization of ubiquitous databases can describe ubiquitous database schema in a unified fashion using the XML schema. Moreover, it consists of a high-level concept of distributed database management of the same type and of different types, and also of a location transparency feature.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
True state-space complexity prediction: By the proxel-based simulation method 真状态空间复杂度预测:采用基于proxel的仿真方法
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413761
S. Lazarova-Molnar
All state-space based simulation methods are doomed by the phenomenon of state-space explosion. The condition occurs when the simulation becomes memory-infeasible as simulation time advances due to the large number of states in the model. However, state-space explosion is not something that depends solely on the number of discrete states of the model as typically observed. While this is correct and completely sufficient for Markovian models, it is certainly not a sufficient criterion when models involve non-exponential probability distribution functions. In this paper we discuss the phenomenon of state-space explosion in terms of accurate complexity prediction for a general class of models. Its early diagnosis is especially significant in the case of proxel-based simulation, as it can lead towards hybridization of the method by employing discrete phase approximations for the critical states and transitions. This can significantly reduce the computational complexity of the simulation.
所有基于状态空间的仿真方法都存在状态空间爆炸现象。由于模型中存在大量状态,随着仿真时间的推移,仿真变得内存不可行的情况就会发生。然而,状态空间爆炸并不像通常观察到的那样仅仅取决于模型离散状态的数量。虽然这对于马尔可夫模型是正确的,并且是完全充分的,但当模型涉及非指数概率分布函数时,这当然不是一个充分的准则。本文从精确的复杂性预测的角度讨论了一类模型的状态空间爆炸现象。它的早期诊断在基于proxel的模拟中尤其重要,因为它可以通过对临界状态和过渡采用离散相位近似来导致方法的杂交。这可以显著降低仿真的计算复杂度。
{"title":"True state-space complexity prediction: By the proxel-based simulation method","authors":"S. Lazarova-Molnar","doi":"10.1109/IIT.2009.5413761","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413761","url":null,"abstract":"All state-space based simulation methods are doomed by the phenomenon of state-space explosion. The condition occurs when the simulation becomes memory-infeasible as simulation time advances due to the large number of states in the model. However, state-space explosion is not something that depends solely on the number of discrete states of the model as typically observed. While this is correct and completely sufficient for Markovian models, it is certainly not a sufficient criterion when models involve non-exponential probability distribution functions. In this paper we discuss the phenomenon of state-space explosion in terms of accurate complexity prediction for a general class of models. Its early diagnosis is especially significant in the case of proxel-based simulation, as it can lead towards hybridization of the method by employing discrete phase approximations for the critical states and transitions. This can significantly reduce the computational complexity of the simulation.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131256229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A steganographic computational paradigm for wireless sensor networks 无线传感器网络的隐写计算范式
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413637
Claude Turner
This article provides a brief review of steganography, steganalysis and wireless sensor networks (WSNs). It also presents a computational framework for steganography in WSN. The technique uses the concept of redundancy and distributed computing to add robustness to the steganographic embedding and extraction algorithms.
本文简要介绍了隐写术、隐写分析和无线传感器网络(WSNs)的研究进展。提出了一种无线传感器网络隐写的计算框架。该技术使用冗余和分布式计算的概念来增加隐写嵌入和提取算法的鲁棒性。
{"title":"A steganographic computational paradigm for wireless sensor networks","authors":"Claude Turner","doi":"10.1109/IIT.2009.5413637","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413637","url":null,"abstract":"This article provides a brief review of steganography, steganalysis and wireless sensor networks (WSNs). It also presents a computational framework for steganography in WSN. The technique uses the concept of redundancy and distributed computing to add robustness to the steganographic embedding and extraction algorithms.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130651129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using common devices as collaborative tools for collecting and connecting people's stories 使用通用设备作为协作工具来收集和连接人们的故事
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413774
Kosuke Numa, Tatsuo Sugimoto, Masako Miyata, Kiyoko Toriumi, J. Abe, Yuri Tanaka, S. Niida, K. Hori
We propose a system for collecting and connecting people's stories. In order to help encourage participants to engage their “expression mode,” we employed mobile phones for video capture, as opposed to traditional video cameras. As part of our work, we held a workshop in an art festival. In the workshop, facilitators capture participants' stories using mobile phones. Applying a question-and-answer game format, each video has connections to other videos. Our system shows these connections on a large screen such that participants can see an entire network of stories and add their own to it. We show the results of our experiments and conclude that our proposed workshop could successfully collect people's stories and connect them.
我们提出了一个收集和连接人们故事的系统。为了帮助鼓励参与者参与他们的“表达模式”,我们使用手机来拍摄视频,而不是传统的摄像机。作为我们工作的一部分,我们在艺术节上举办了一个工作坊。在研讨会上,主持人用手机捕捉参与者的故事。采用问答游戏的形式,每个视频都有与其他视频的连接。我们的系统在大屏幕上显示这些联系,这样参与者就可以看到整个故事网络,并将自己的故事添加到其中。我们展示了我们的实验结果,并得出结论,我们提出的工作坊可以成功地收集人们的故事并将它们联系起来。
{"title":"Using common devices as collaborative tools for collecting and connecting people's stories","authors":"Kosuke Numa, Tatsuo Sugimoto, Masako Miyata, Kiyoko Toriumi, J. Abe, Yuri Tanaka, S. Niida, K. Hori","doi":"10.1109/IIT.2009.5413774","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413774","url":null,"abstract":"We propose a system for collecting and connecting people's stories. In order to help encourage participants to engage their “expression mode,” we employed mobile phones for video capture, as opposed to traditional video cameras. As part of our work, we held a workshop in an art festival. In the workshop, facilitators capture participants' stories using mobile phones. Applying a question-and-answer game format, each video has connections to other videos. Our system shows these connections on a large screen such that participants can see an entire network of stories and add their own to it. We show the results of our experiments and conclude that our proposed workshop could successfully collect people's stories and connect them.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129666392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Localized QoS routing and admission control: Performance evaluation 本地化QoS路由和准入控制:性能评估
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413369
A. H. Mohammad, M. E. Woodward
Localized Quality of Service (QoS) routing has been recently proposed for supporting the requirements of multimedia applications and satisfying QoS constraints. Localized algorithms avoid the problems associated with the maintenance of global network state by using statistics of flow blocking probabilities. Using local information for routing avoids the overheads of global information with other nodes. However, localized QoS routing algorithms perform routing decision based on information updated from path request to path request. This paper proposes to tackle a combined localized routing and admission control in order to avoid congestion. We introduce a Congestion Avoidance Routing algorithm (CAR) in localized QoS routing which make a decision of routing in each connection request using an admission control to route traffic away from congestion. Simulations of various network topologies are used to illustrate the performance of the CAR. We compare the performance of the CAR algorithm against the Credit Based Routing (CBR) algorithm and the Quality Based Routing (QBR) under various ranges of traffic loads.
为了支持多媒体应用的需求和满足QoS约束,最近提出了本地化服务质量(QoS)路由。局部化算法利用流阻塞概率的统计信息,避免了维护全局网络状态的问题。使用本地信息进行路由可以避免使用其他节点的全局信息带来的开销。然而,本地化的QoS路由算法根据从路径请求到路径请求的更新信息执行路由决策。为了避免拥塞,本文提出了一种结合局部路由和准入控制的方法。本文在局部QoS路由中引入了一种拥塞避免路由算法(CAR),该算法利用允许控制对每个连接请求进行路由决策,使流量远离拥塞。各种网络拓扑的仿真被用来说明CAR的性能。我们比较了CAR算法与基于信用的路由(CBR)算法和基于质量的路由(QBR)算法在不同流量负载范围下的性能。
{"title":"Localized QoS routing and admission control: Performance evaluation","authors":"A. H. Mohammad, M. E. Woodward","doi":"10.1109/IIT.2009.5413369","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413369","url":null,"abstract":"Localized Quality of Service (QoS) routing has been recently proposed for supporting the requirements of multimedia applications and satisfying QoS constraints. Localized algorithms avoid the problems associated with the maintenance of global network state by using statistics of flow blocking probabilities. Using local information for routing avoids the overheads of global information with other nodes. However, localized QoS routing algorithms perform routing decision based on information updated from path request to path request. This paper proposes to tackle a combined localized routing and admission control in order to avoid congestion. We introduce a Congestion Avoidance Routing algorithm (CAR) in localized QoS routing which make a decision of routing in each connection request using an admission control to route traffic away from congestion. Simulations of various network topologies are used to illustrate the performance of the CAR. We compare the performance of the CAR algorithm against the Credit Based Routing (CBR) algorithm and the Quality Based Routing (QBR) under various ranges of traffic loads.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fleet management automation using the global positioning system 车队管理自动化使用全球定位系统
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413792
R. Zantout, Mazen Jrab, L. Hamandi, F. Sibai
Fleet management is an important topic in research and development nowadays. Companies, security and emergency forces need to keep track of their trucks and cars and know where a vehicle is at a moment in time, and when, where and for how long a vehicle stopped.
车队管理是当今研究和开发的一个重要课题。公司、安全和应急部队需要跟踪他们的卡车和汽车,并了解车辆在某个时刻的位置,以及车辆在何时、何地和停了多久。
{"title":"Fleet management automation using the global positioning system","authors":"R. Zantout, Mazen Jrab, L. Hamandi, F. Sibai","doi":"10.1109/IIT.2009.5413792","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413792","url":null,"abstract":"Fleet management is an important topic in research and development nowadays. Companies, security and emergency forces need to keep track of their trucks and cars and know where a vehicle is at a moment in time, and when, where and for how long a vehicle stopped.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115318138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
FuzzyCART: A novel Fuzzy Logic based Classification & Regression Trees Algorithm FuzzyCART:一种基于模糊逻辑的分类与回归树算法
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413763
Piers R. J. Campbell, H. Fathulla, Faheem Ahmed
Classification algorithms have found high levels of application in a range of domains. One of the most important classification algorithms that is currently in wide use Classification And Regression Trees (CART), which yields accurate and consistent results in most multiple domains. A significant failing of CART and other similar algorithms is their inability to handle imprecision. This inability to handle the “grey areas” makes these algorithms less applicable to a range of domains such as Medicine and Finance. A well-regarded method for handling such imprecision is Fuzzy Logic, and in this paper a novel algorithm that combines CART and Fuzzy Logic is presented. Following the description of the implementation the experimental results presented which have been achieved through the use of the proposed FuzzyCART algorithm demonstrate an increased level of classification accuracy for medical data when compared to classical CART.
分类算法在许多领域都有很高的应用。分类回归树(classification And Regression Trees, CART)是目前广泛使用的一种重要的分类算法,它能在大多数多领域产生准确一致的结果。CART和其他类似算法的一个重大缺陷是它们无法处理不精确。由于无法处理“灰色地带”,这些算法不太适用于医学和金融等一系列领域。模糊逻辑是一种很好的处理这种不精确的方法,本文提出了一种结合CART和模糊逻辑的新算法。在描述实现之后,通过使用所提出的FuzzyCART算法实现的实验结果表明,与经典CART相比,医疗数据的分类精度提高了。
{"title":"FuzzyCART: A novel Fuzzy Logic based Classification & Regression Trees Algorithm","authors":"Piers R. J. Campbell, H. Fathulla, Faheem Ahmed","doi":"10.1109/IIT.2009.5413763","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413763","url":null,"abstract":"Classification algorithms have found high levels of application in a range of domains. One of the most important classification algorithms that is currently in wide use Classification And Regression Trees (CART), which yields accurate and consistent results in most multiple domains. A significant failing of CART and other similar algorithms is their inability to handle imprecision. This inability to handle the “grey areas” makes these algorithms less applicable to a range of domains such as Medicine and Finance. A well-regarded method for handling such imprecision is Fuzzy Logic, and in this paper a novel algorithm that combines CART and Fuzzy Logic is presented. Following the description of the implementation the experimental results presented which have been achieved through the use of the proposed FuzzyCART algorithm demonstrate an increased level of classification accuracy for medical data when compared to classical CART.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126276287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted shingling: an adaptation of shingling for weighted shingles 加权铺瓦:对加权铺瓦的一种调整
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413370
Zahra Eskandari Gharghe, B. M. Bidgoli
Broder's shingling is one of the state-of-the-art approaches in detecting near-duplicate documents. Prior evaluations of this method have shown that document-pairs which have different main content but have a large amount of similar unimportant details are the main sources of its errors. Different web pages from the same site are a good example of such documents. In such pages, almost always there is a similar boilerplate text which has a chance to be selected as the document's fingerprint and trick the algorithm. It seems that this problem is due to representing each document only by a sample of its shingles. This sample only contains some of the page's shingles and discards any other information. by Including additional information such as frequencies of shingles in this sample, we can improve the performance of the algorithm. This paper proposes a weighting of shingles and adapts shingling to be applied on weighted shingles. Our results have shown an improvement in shingling's performance.
Broder's shingling是检测几乎重复的文件的最先进的方法之一。先前对该方法的评价表明,具有不同主要内容但具有大量相似的不重要细节的文档对是其误差的主要来源。来自同一站点的不同网页就是此类文档的一个很好的例子。在这样的页面中,几乎总是有一个类似的样板文本,它有机会被选中作为文档的指纹并欺骗算法。这个问题似乎是由于每个文件只代表其瓦的一个样本。此示例仅包含页面的一些带状信息,并丢弃了任何其他信息。通过在这个样本中加入额外的信息,如瓦的频率,我们可以提高算法的性能。本文提出了一种配筋法,并对配筋法在配筋板上的应用进行了调整。我们的结果表明,shingling的性能有所改善。
{"title":"Weighted shingling: an adaptation of shingling for weighted shingles","authors":"Zahra Eskandari Gharghe, B. M. Bidgoli","doi":"10.1109/IIT.2009.5413370","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413370","url":null,"abstract":"Broder's shingling is one of the state-of-the-art approaches in detecting near-duplicate documents. Prior evaluations of this method have shown that document-pairs which have different main content but have a large amount of similar unimportant details are the main sources of its errors. Different web pages from the same site are a good example of such documents. In such pages, almost always there is a similar boilerplate text which has a chance to be selected as the document's fingerprint and trick the algorithm. It seems that this problem is due to representing each document only by a sample of its shingles. This sample only contains some of the page's shingles and discards any other information. by Including additional information such as frequencies of shingles in this sample, we can improve the performance of the algorithm. This paper proposes a weighting of shingles and adapts shingling to be applied on weighted shingles. Our results have shown an improvement in shingling's performance.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132002305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A design pattern for dependable web services using design diversity techniques and WS-BPEL 使用设计多样性技术和WS-BPEL的可靠web服务的设计模式
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413635
E. Nourani, M. A. Azgomi
As the use of web services is growing, there is an increasing demand for dependability. In this paper we intend to introduce various offered solutions for dependable web services. The existing solutions are divided into two categories: fault tolerance techniques, such as active and passive replications, and the use of design diversity. The main contribution of this paper is the use of design diversity techniques and WS-BPEL, which would result in proposing a useful and flexible architecture for dependable web services. The proposed architecture has been used as the basis of a design pattern for dependable web services, called D3WS. We have implemented the proposed architecture in a prototype application using N-version programming (NVP). We have also modeled the architecture using stochastic reward nets (SRNs) for further evaluation of dependability measures.
随着web服务使用的增长,对可靠性的需求也在增加。在本文中,我们打算介绍各种现有的可靠web服务解决方案。现有的解决方案分为两类:容错技术,如主动和被动复制,以及设计多样性的使用。本文的主要贡献是使用了设计多样性技术和WS-BPEL,这将为可靠的web服务提出一个有用且灵活的体系结构。所提出的体系结构已被用作可靠web服务设计模式(称为D3WS)的基础。我们已经使用n版本编程(NVP)在原型应用程序中实现了所建议的体系结构。我们还使用随机奖励网(srn)对体系结构进行了建模,以进一步评估可靠性措施。
{"title":"A design pattern for dependable web services using design diversity techniques and WS-BPEL","authors":"E. Nourani, M. A. Azgomi","doi":"10.1109/IIT.2009.5413635","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413635","url":null,"abstract":"As the use of web services is growing, there is an increasing demand for dependability. In this paper we intend to introduce various offered solutions for dependable web services. The existing solutions are divided into two categories: fault tolerance techniques, such as active and passive replications, and the use of design diversity. The main contribution of this paper is the use of design diversity techniques and WS-BPEL, which would result in proposing a useful and flexible architecture for dependable web services. The proposed architecture has been used as the basis of a design pattern for dependable web services, called D3WS. We have implemented the proposed architecture in a prototype application using N-version programming (NVP). We have also modeled the architecture using stochastic reward nets (SRNs) for further evaluation of dependability measures.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131332416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Network effects on the functionality of voice-controlled systems and applications 网络对语音控制系统和应用程序功能的影响
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413777
Y. Gadallah, Ikbal Taleb
The use of voice to control devices and applications provides a flexible, convenient and secure method for operating these systems. Users can control these systems using voice commands while they are in the proximity of the system to be controlled. Attempting to apply such control over the internet may be affected by several network impairments, e.g. jitter, errors, losses, etc. The effects of these impairments, while may not be felt by the normal human ear, can impact the operation of the software that processes these commands. This processing system is usually based on speaker identification and speech recognition components. In this paper, we study these network effects on the correct operation of such systems. We experiment with different types of network impairments and measure the effects on the voice-controlled operation. Our experiments show that network impairments affect the processing of voice commands to varying degrees. They also provide a comparative view between the behavior of command processing modules and the perceived quality of voice.
使用语音控制设备和应用程序为操作这些系统提供了一种灵活、方便和安全的方法。当用户在待控制系统附近时,可以使用语音命令控制这些系统。试图在互联网上应用这种控制可能会受到一些网络缺陷的影响,例如抖动、错误、丢失等。虽然正常人的耳朵可能感觉不到这些损伤的影响,但它们会影响处理这些命令的软件的操作。这种处理系统通常由说话人识别和语音识别两部分组成。在本文中,我们研究了这些网络效应对这些系统的正确运行的影响。我们对不同类型的网络障碍进行了实验,并测量了对语音控制操作的影响。我们的实验表明,网络障碍对语音命令的处理有不同程度的影响。他们还提供了命令处理模块的行为和语音感知质量之间的比较观点。
{"title":"Network effects on the functionality of voice-controlled systems and applications","authors":"Y. Gadallah, Ikbal Taleb","doi":"10.1109/IIT.2009.5413777","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413777","url":null,"abstract":"The use of voice to control devices and applications provides a flexible, convenient and secure method for operating these systems. Users can control these systems using voice commands while they are in the proximity of the system to be controlled. Attempting to apply such control over the internet may be affected by several network impairments, e.g. jitter, errors, losses, etc. The effects of these impairments, while may not be felt by the normal human ear, can impact the operation of the software that processes these commands. This processing system is usually based on speaker identification and speech recognition components. In this paper, we study these network effects on the correct operation of such systems. We experiment with different types of network impairments and measure the effects on the voice-controlled operation. Our experiments show that network impairments affect the processing of voice commands to varying degrees. They also provide a comparative view between the behavior of command processing modules and the perceived quality of voice.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130818204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 International Conference on Innovations in Information Technology (IIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1