首页 > 最新文献

2015 5th World Congress on Information and Communication Technologies (WICT)最新文献

英文 中文
A dynamic group privacy protection mechanism based on cloud model 一种基于云模型的动态组隐私保护机制
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489650
Ruxiang Zhai, Kun Zhang, Mingjun Liu
Data publishing has become an import way for information sharing. However, data privacy is still a challenge issue. When publishing data frequently, certain sensitive accurate trend may leak. Some significant sensitive overall information may be got from these published time-dependent data sets. It may result in serious consequences and heavy loss. For this issue, this paper proposes a group privacy preservation mechanism for dynamic data-sets. The sensitive accurate overall information of data-sets could be confused by some faked but rational value. In order to guarantee the rationality of the fake data, cloud model is used to generate the fake data. Analysis and experiments shows the effectiveness of this mechanism.
数据发布已成为信息共享的重要方式。然而,数据隐私仍然是一个具有挑战性的问题。在频繁发布数据时,可能会泄露某些敏感的准确趋势。从这些公布的时变数据集中可以得到一些重要的敏感的总体信息。可能会造成严重的后果和重大的损失。针对这一问题,本文提出了一种动态数据集的组隐私保护机制。数据集的敏感准确的整体信息可能会被一些虚假但合理的值所混淆。为了保证假数据的合理性,采用云模型生成假数据。分析和实验表明了该机制的有效性。
{"title":"A dynamic group privacy protection mechanism based on cloud model","authors":"Ruxiang Zhai, Kun Zhang, Mingjun Liu","doi":"10.1109/WICT.2015.7489650","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489650","url":null,"abstract":"Data publishing has become an import way for information sharing. However, data privacy is still a challenge issue. When publishing data frequently, certain sensitive accurate trend may leak. Some significant sensitive overall information may be got from these published time-dependent data sets. It may result in serious consequences and heavy loss. For this issue, this paper proposes a group privacy preservation mechanism for dynamic data-sets. The sensitive accurate overall information of data-sets could be confused by some faked but rational value. In order to guarantee the rationality of the fake data, cloud model is used to generate the fake data. Analysis and experiments shows the effectiveness of this mechanism.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of location aided routing protocol in Vehicular Ad Hoc Networks on highway 高速公路车载自组网中位置辅助路由协议的改进
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489644
M. Nabil, A. Hajami, Abdlakrim Haqiq
Vehicular Ad Hoc Network (VANET) is an instance of MANETs that establishes wireless connections between vehicles. Recently, it was shown for the case of highway traffic that position-based routing protocols can very well deal with the high mobility of network vehicles. In VANETs, these routing protocols must be adapted to vehicular-specific capabilities and requirements. As many previous works have shown, routing performance is greatly dependent on the availability and stability of wireless links. This work proposes a small extension to the Location Aided Routing (LAR) protocol specific to highway scenarios. We seek to improve the stability of path between sources and destinations by removing from the paths the nodes that move in opposite direction of the source movement. The performance metrics such as average delay of stability path between source and destination, packet delivery ratio (PDR), throughput, and normalized routing load (NRL) are measured using ns2. The Intelligent Driver Model with Lane Changing (IDM_LC) based on VanetMobiSim tool is used to generate realistic mobility traces in highway.
车辆自组织网络(VANET)是在车辆之间建立无线连接的manet的一个实例。近年来,以高速公路交通为例,表明基于位置的路由协议可以很好地处理网络车辆的高移动性。在vanet中,这些路由协议必须适应车辆特定的功能和需求。正如许多先前的工作所表明的那样,路由性能在很大程度上取决于无线链路的可用性和稳定性。这项工作提出了一个针对高速公路场景的定位辅助路由(LAR)协议的小扩展。我们试图通过从路径中移除与源运动方向相反的节点来提高源和目标之间路径的稳定性。通过ns2,可以测量源和目的之间稳定路径的平均时延、PDR (packet delivery ratio)、吞吐量、NRL (normalized routing load)等性能指标。采用基于VanetMobiSim工具的智能驾驶员变道模型(IDM_LC)来生成真实的高速公路移动轨迹。
{"title":"Improvement of location aided routing protocol in Vehicular Ad Hoc Networks on highway","authors":"M. Nabil, A. Hajami, Abdlakrim Haqiq","doi":"10.1109/WICT.2015.7489644","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489644","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) is an instance of MANETs that establishes wireless connections between vehicles. Recently, it was shown for the case of highway traffic that position-based routing protocols can very well deal with the high mobility of network vehicles. In VANETs, these routing protocols must be adapted to vehicular-specific capabilities and requirements. As many previous works have shown, routing performance is greatly dependent on the availability and stability of wireless links. This work proposes a small extension to the Location Aided Routing (LAR) protocol specific to highway scenarios. We seek to improve the stability of path between sources and destinations by removing from the paths the nodes that move in opposite direction of the source movement. The performance metrics such as average delay of stability path between source and destination, packet delivery ratio (PDR), throughput, and normalized routing load (NRL) are measured using ns2. The Intelligent Driver Model with Lane Changing (IDM_LC) based on VanetMobiSim tool is used to generate realistic mobility traces in highway.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Optimisation of the queries execution plan in cloud data warehouses 优化云数据仓库中的查询执行计划
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489659
Ettaoufik Abdelaziz, Ouzzif Mohamed
Our everyday massive data processing activities and making correct decisions require a specific work environment. The cloud computing provides a flexible environment for customers to host and process their information through an outsourced infrastructure. This information was habitually located on local servers. Many applications dealing with massive data is routed to the cloud. Data Warehouse (DW) also benefit from this new paradigm to provide analytical data online and in real time. DW in the Cloud benefited of its advantages such flexibility, availability, adaptability, scalability, virtualization, etc. Improving the DW performance in the cloud requires the optimization of data processing time. The classical optimization techniques (indexing, materialized views and fragmentation) are still essential for DW in the cloud. The DW is partitioned before being distributed across multiple servers (nodes) in the Cloud. When queries containing multiple joins or ask voluminous data stored on multiple nodes, inter-node communication increases and consequently the DW performance degrades. In this paper, we propose an approach for improving the performance of DW in the cloud. Our approach is based on a classification technique of requests received by the nodes. For this purpose we use an algorithm based on the MapReduce programming model, this algorithm allows to identify the list of requests sent to the DW hosted in the cloud, and classify queries by the publication frequency. From the list of search queries we propose a partitioning scheme of DW on different nodes in order to reduce the inter-node communication and therefore minimize the queries processing time.
我们日常的海量数据处理活动和做出正确的决策需要一个特定的工作环境。云计算为客户提供了一个灵活的环境,可以通过外包基础设施托管和处理他们的信息。这些信息通常位于本地服务器上。许多处理大量数据的应用程序被路由到云。数据仓库(DW)也受益于这种新的模式,可以在线和实时地提供分析数据。云中的数据仓库得益于其灵活性、可用性、适应性、可伸缩性、虚拟化等优势。提高云中的数据仓库性能需要优化数据处理时间。经典的优化技术(索引、物化视图和碎片化)对于云中的数据仓库仍然是必不可少的。DW在分发到云中的多个服务器(节点)之前进行分区。当查询包含多个连接或询问存储在多个节点上的大量数据时,节点间通信增加,从而导致DW性能下降。在本文中,我们提出了一种改进云环境下数据仓库性能的方法。我们的方法基于节点接收到的请求的分类技术。为此,我们使用基于MapReduce编程模型的算法,该算法允许识别发送到托管在云中的DW的请求列表,并根据发布频率对查询进行分类。从搜索查询列表中,我们提出了一种DW在不同节点上的分区方案,以减少节点间的通信,从而最大限度地减少查询处理时间。
{"title":"Optimisation of the queries execution plan in cloud data warehouses","authors":"Ettaoufik Abdelaziz, Ouzzif Mohamed","doi":"10.1109/WICT.2015.7489659","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489659","url":null,"abstract":"Our everyday massive data processing activities and making correct decisions require a specific work environment. The cloud computing provides a flexible environment for customers to host and process their information through an outsourced infrastructure. This information was habitually located on local servers. Many applications dealing with massive data is routed to the cloud. Data Warehouse (DW) also benefit from this new paradigm to provide analytical data online and in real time. DW in the Cloud benefited of its advantages such flexibility, availability, adaptability, scalability, virtualization, etc. Improving the DW performance in the cloud requires the optimization of data processing time. The classical optimization techniques (indexing, materialized views and fragmentation) are still essential for DW in the cloud. The DW is partitioned before being distributed across multiple servers (nodes) in the Cloud. When queries containing multiple joins or ask voluminous data stored on multiple nodes, inter-node communication increases and consequently the DW performance degrades. In this paper, we propose an approach for improving the performance of DW in the cloud. Our approach is based on a classification technique of requests received by the nodes. For this purpose we use an algorithm based on the MapReduce programming model, this algorithm allows to identify the list of requests sent to the DW hosted in the cloud, and classify queries by the publication frequency. From the list of search queries we propose a partitioning scheme of DW on different nodes in order to reduce the inter-node communication and therefore minimize the queries processing time.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"94 S87","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tr-OrBAC: A trust model for collaborative systems within critical infrastructures Tr-OrBAC:关键基础设施内协作系统的信任模型
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489657
Nawal Ait Aali, A. Baina, L. Echabbi
In last decades, the notion of collaborative systems is presented as the new concept in Critical Infrastructures. It regroups different organizations collaborating in order to ensure the continuity of these infrastructures. However, some malicious behavior can arise causing perturbations on the information systems of the organizations. To avoid this behavior, building trust between collaborating organizations is necessary; it allows cooperating and sharing resources in a secure way. In this paper, we present Tr-OrBAC: a new trust model applicable in collaborative systems; it is based on the OrBAC (Organization Based Access Control) access control model and trust evaluation. In this paper, we will focus on explaining and detailing the proposed trust model.
在过去的几十年里,协作系统的概念在关键基础设施中作为一个新概念被提出。它重新组合不同的组织协作,以确保这些基础设施的连续性。然而,一些恶意行为可能会对组织的信息系统造成干扰。为了避免这种行为,在合作组织之间建立信任是必要的;它允许以一种安全的方式合作和共享资源。本文提出了一种适用于协作系统的新型信任模型Tr-OrBAC;它基于OrBAC (Organization based Access Control)访问控制模型和信任评估。在本文中,我们将重点解释和详细介绍提议的信任模型。
{"title":"Tr-OrBAC: A trust model for collaborative systems within critical infrastructures","authors":"Nawal Ait Aali, A. Baina, L. Echabbi","doi":"10.1109/WICT.2015.7489657","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489657","url":null,"abstract":"In last decades, the notion of collaborative systems is presented as the new concept in Critical Infrastructures. It regroups different organizations collaborating in order to ensure the continuity of these infrastructures. However, some malicious behavior can arise causing perturbations on the information systems of the organizations. To avoid this behavior, building trust between collaborating organizations is necessary; it allows cooperating and sharing resources in a secure way. In this paper, we present Tr-OrBAC: a new trust model applicable in collaborative systems; it is based on the OrBAC (Organization Based Access Control) access control model and trust evaluation. In this paper, we will focus on explaining and detailing the proposed trust model.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128366906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Formal analysis of SEP protocol using the interpretation function-based method 采用基于解释函数的方法对SEP协议进行形式化分析
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489637
Houssam El Ismaili, H. Houmani, Hicham Madroumi
Electronic payment is the very important step of the electronic business system, and its security must be ensured. The Secure Electronic protocol (SEP) [1] was proposed to protect online payment transactions against the fraud without involving the third party such as Visa or MasterCard. SEP protocol avoids the complexities relating to the implementation unlike SET and 3D-secure, integration and utilization are also easier than before. Then it's crucial to ensure that this protocol respect security properties such as confidentiality, authentication and integrity. In this paper, we analyze the SEP protocol with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method [2, 3]. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily life protocols such us SEP.
电子支付是电子商务系统的重要环节,必须保证其安全性。安全电子协议(Secure Electronic protocol, SEP)[1]的提出是为了在不涉及Visa或MasterCard等第三方的情况下保护在线支付交易免受欺诈。与SET和3D-secure不同,SEP协议避免了与实施相关的复杂性,集成和使用也比以前更容易。然后,确保该协议尊重机密性、身份验证和完整性等安全属性是至关重要的。本文从机密性的角度分析了SEP协议。为了进行这种分析,我们使用了基于解释函数的方法[2,3]。基于解释函数的技术背后的主要思想是给出充分的条件,以保证加密协议尊重保密属性。所提议条件的灵活性允许对日常生活协议(如SEP)进行验证。
{"title":"Formal analysis of SEP protocol using the interpretation function-based method","authors":"Houssam El Ismaili, H. Houmani, Hicham Madroumi","doi":"10.1109/WICT.2015.7489637","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489637","url":null,"abstract":"Electronic payment is the very important step of the electronic business system, and its security must be ensured. The Secure Electronic protocol (SEP) [1] was proposed to protect online payment transactions against the fraud without involving the third party such as Visa or MasterCard. SEP protocol avoids the complexities relating to the implementation unlike SET and 3D-secure, integration and utilization are also easier than before. Then it's crucial to ensure that this protocol respect security properties such as confidentiality, authentication and integrity. In this paper, we analyze the SEP protocol with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method [2, 3]. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily life protocols such us SEP.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131267200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of the credibility of the information shared by a wireless sensor network 研究无线传感器网络共享信息的可信度
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489655
Lahma Karim, H. Mohamed, Belhaddaoui Hicham
The technology of the wireless sensor networks (WSN) is increasingly invading our daily life, taking into account a plenty of existing applications to nowadays (measurements, supervision ...). In many applications of this type of network, the credibility of the information shared by its devices is essentially depending on the criticality of the application. Our goal is to treat the problem of reliability of information exchanged by WSN to make sense of the credibility of this information. The result of this approach is to be able at any moment to give a confidence level to that information exchanged by the WSN. We are implementing a set of mathematical theories to generate an algorithm to characterize the notion of credibility. To validate this study, we conducted a simulation platform.
无线传感器网络(WSN)技术正日益渗透到我们的日常生活中,考虑到当今已有的许多应用(测量、监控等)。在这种类型的网络的许多应用程序中,其设备共享的信息的可信度基本上取决于应用程序的临界性。我们的目标是处理WSN交换的信息的可靠性问题,以理解这些信息的可信度。这种方法的结果是能够在任何时候为WSN交换的信息提供一个置信度。我们正在实现一套数学理论,以生成一种算法来表征可信度的概念。为了验证这一研究,我们进行了一个仿真平台。
{"title":"Study of the credibility of the information shared by a wireless sensor network","authors":"Lahma Karim, H. Mohamed, Belhaddaoui Hicham","doi":"10.1109/WICT.2015.7489655","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489655","url":null,"abstract":"The technology of the wireless sensor networks (WSN) is increasingly invading our daily life, taking into account a plenty of existing applications to nowadays (measurements, supervision ...). In many applications of this type of network, the credibility of the information shared by its devices is essentially depending on the criticality of the application. Our goal is to treat the problem of reliability of information exchanged by WSN to make sense of the credibility of this information. The result of this approach is to be able at any moment to give a confidence level to that information exchanged by the WSN. We are implementing a set of mathematical theories to generate an algorithm to characterize the notion of credibility. To validate this study, we conducted a simulation platform.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114613593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Perspectives on the implementation of standardization within the UK library RFID market 对英国图书馆RFID市场实施标准化的看法
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489662
Ian Pratt, Shiyun Zhong
Implementation of RFID technology within the library sector has taken great strides forward over the last decade. ISO 28560 is a recent standard aimed at providing a common platform to an industry that has initially evolved with a number of implementers formulating their own RFID data storage models. Although RFID standards such as ISO 14223, 14443 & 15693, relating to air interface protocols largely predate their implementation, standards such as ISO 28560 which pertain to standardisation of tag data models have been introduced at a stage when implementations have reached a certain level of maturity. This paper provides a critique of the applicability of ISO 28560 through direct experience in applying it to the UK library market.
RFID技术在图书馆领域的应用在过去十年中取得了长足的进步。ISO 28560是最近的一项标准,旨在为行业提供一个通用平台,该行业最初发展为许多实现者制定自己的RFID数据存储模型。尽管RFID标准,如ISO 14223, 14443和15693,与空中接口协议有关,在很大程度上早于其实施,标准,如ISO 28560,与标签数据模型的标准化有关,已经在实施达到一定成熟度的阶段引入。本文通过将ISO 28560应用于英国图书馆市场的直接经验,对其适用性进行了批评。
{"title":"Perspectives on the implementation of standardization within the UK library RFID market","authors":"Ian Pratt, Shiyun Zhong","doi":"10.1109/WICT.2015.7489662","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489662","url":null,"abstract":"Implementation of RFID technology within the library sector has taken great strides forward over the last decade. ISO 28560 is a recent standard aimed at providing a common platform to an industry that has initially evolved with a number of implementers formulating their own RFID data storage models. Although RFID standards such as ISO 14223, 14443 & 15693, relating to air interface protocols largely predate their implementation, standards such as ISO 28560 which pertain to standardisation of tag data models have been introduced at a stage when implementations have reached a certain level of maturity. This paper provides a critique of the applicability of ISO 28560 through direct experience in applying it to the UK library market.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134638079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward a multi-tenant college sustained team seeking system 向着多租户高校持续寻人系统的方向发展
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489638
Shuwei Yao, Kun Ma, Zhe Yang, A. Abraham
College students often collaborate in some projects or contests with other students from different majors, but current team seeking system has some limitations on finding teammates. In this paper, we design a multi-tenant college sustained team seeking system, aiming at establishing a sustained team among college students who have similar interest. We present the architecture, core modules, and some emerging techniques to design such a system. The evaluation of query efficiency and page loading speed are present at last.
大学生经常与其他来自不同专业的学生在一些项目或比赛中合作,但目前的团队寻找系统在寻找队友方面存在一些局限性。本文设计了一个多租户高校持续寻人系统,旨在建立兴趣相近的大学生持续寻人团队。本文介绍了该系统的体系结构、核心模块和一些新兴技术。最后给出了查询效率和页面加载速度的评价。
{"title":"Toward a multi-tenant college sustained team seeking system","authors":"Shuwei Yao, Kun Ma, Zhe Yang, A. Abraham","doi":"10.1109/WICT.2015.7489638","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489638","url":null,"abstract":"College students often collaborate in some projects or contests with other students from different majors, but current team seeking system has some limitations on finding teammates. In this paper, we design a multi-tenant college sustained team seeking system, aiming at establishing a sustained team among college students who have similar interest. We present the architecture, core modules, and some emerging techniques to design such a system. The evaluation of query efficiency and page loading speed are present at last.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123245843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using cloud SaaS to ensure interoperability and standardization in heterogeneous Cloud based environment 使用云SaaS来确保异构云环境中的互操作性和标准化
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489640
Elhozmari Majda, Ettalbi Ahmed
During the last years, because of the evolution of Cloud applications and the attractive advantages given to consumers, many companies outsource their data and Information Technology (IT) system to the Cloud based technology. With the growth in the number of Cloud Service Providers, many enterprises and organizations can use and associate services from multiple providers. There may be many Internet protocols for service access standards that are used to ensure interoperability between users browser and Web server, such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP). Each service has its specific characteristics such as authentication and security requirements. Hence, Cloud providers attempt to lock customers into proprietary interfaces so consumers can find themselves at not expects inevitable vendor lock-in. Therefore, the focus of our paper is to propose a solution to this problem by using Cloud intermediate between Cloud providers and consumer in heterogeneous Cloud environments interfaces. This is to achieve benefits such as standardization and interoperability, minimizing lock-in of Cloud providers. To reach such benefits, we propose a Cloud SaaS based on two interfaces and an internet component. These interfaces are used in Cloud Consumer and Provider sides and therefore guarantee communication between Cloud Consumer and Provider using different Internet protocols for Web service access such as REST and SOAP. Our approach guarantees interoperability and standardization in heterogeneous Cloud based environments because in this case Cloud Consumer and Provider using REST interface can communicate easily with Cloud Provider and Consumer using SOAP interface.
在过去几年中,由于云应用程序的发展和给消费者带来的诱人优势,许多公司将其数据和信息技术(IT)系统外包给基于云的技术。随着云服务提供商数量的增长,许多企业和组织可以使用和关联来自多个提供商的服务。服务访问标准可能有许多Internet协议,用于确保用户浏览器和Web服务器之间的互操作性,例如具象状态传输(Representational State Transfer, REST)和简单对象访问协议(Simple Object access Protocol, SOAP)。每个服务都有其特定的特征,例如身份验证和安全需求。因此,云提供商试图将客户锁定在专有接口中,这样消费者就会发现自己不会被不可避免的供应商锁定。因此,本文的重点是通过在异构云环境接口中使用云提供商和消费者之间的云中介来提出解决这个问题的方案。这是为了实现标准化和互操作性等好处,最大限度地减少云提供商的锁定。为了实现这些好处,我们提出了一个基于两个接口和一个互联网组件的云SaaS。这些接口在云消费者和提供者端使用,因此保证云消费者和提供者之间使用不同的互联网协议进行Web服务访问,如REST和SOAP。我们的方法保证了异构云环境中的互操作性和标准化,因为在这种情况下,使用REST接口的云消费者和提供者可以轻松地与使用SOAP接口的云提供者和消费者进行通信。
{"title":"Using cloud SaaS to ensure interoperability and standardization in heterogeneous Cloud based environment","authors":"Elhozmari Majda, Ettalbi Ahmed","doi":"10.1109/WICT.2015.7489640","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489640","url":null,"abstract":"During the last years, because of the evolution of Cloud applications and the attractive advantages given to consumers, many companies outsource their data and Information Technology (IT) system to the Cloud based technology. With the growth in the number of Cloud Service Providers, many enterprises and organizations can use and associate services from multiple providers. There may be many Internet protocols for service access standards that are used to ensure interoperability between users browser and Web server, such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP). Each service has its specific characteristics such as authentication and security requirements. Hence, Cloud providers attempt to lock customers into proprietary interfaces so consumers can find themselves at not expects inevitable vendor lock-in. Therefore, the focus of our paper is to propose a solution to this problem by using Cloud intermediate between Cloud providers and consumer in heterogeneous Cloud environments interfaces. This is to achieve benefits such as standardization and interoperability, minimizing lock-in of Cloud providers. To reach such benefits, we propose a Cloud SaaS based on two interfaces and an internet component. These interfaces are used in Cloud Consumer and Provider sides and therefore guarantee communication between Cloud Consumer and Provider using different Internet protocols for Web service access such as REST and SOAP. Our approach guarantees interoperability and standardization in heterogeneous Cloud based environments because in this case Cloud Consumer and Provider using REST interface can communicate easily with Cloud Provider and Consumer using SOAP interface.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123256123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Model-to-model transformation in approach by modeling: From UML model to Model-View-Presenter and Dependency Injection patterns 通过建模的方法中的模型到模型转换:从UML模型到模型-视图-表示器和依赖注入模式
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489648
R. Esbai, M. Erramdani
The continuing evolution of business needs and technology makes Web applications more demanding in terms of development, usability and interactivity of their user interfaces. The complexity and diversity of these applications emerges the need of flexibility and combining operations with existing models to create other new, more complex models. As more complex models are used, the importance of transformations between models grows. This paper presents the application of the MDA (Model Driven Architecture) to generate, from the UML model, the code following the MVP (Model-View-Presenter), DI (Dependency Injection) and DAO (Data Access Object) patterns for a RIA (Rich Internet Application) using the standard MOF 2.0 QVT (Meta-Object Facility 2.0 Query-View-Transformation) as a transformation language. We adopt GWT (Google web Toolkit), Spring and Hibernate as a Frameworks for creating a target meta-model to generate an entire GWT-based N-tiers web application. That is why we have developed two meta-models handling UML class diagrams and N-tiers Web applications, then we have to set up transformation rules. The transformation rules defined in this paper can generate, from the class diagram, an XML file containing the Presentation, the Business, and the Data Access package. This file can be used to generate the necessary code of a RIA N-tiers web application.
业务需求和技术的不断发展使得Web应用程序在用户界面的开发、可用性和交互性方面要求更高。这些应用程序的复杂性和多样性产生了灵活性的需求,并需要将操作与现有模型结合起来,以创建其他新的、更复杂的模型。随着越来越复杂的模型被使用,模型之间转换的重要性也在增长。本文介绍了使用标准的MOF 2.0 QVT(元对象设施2.0查询-视图-转换)作为转换语言,从UML模型生成遵循MVP(模型-视图-呈现器)、DI(依赖注入)和DAO(数据访问对象)模式的RIA(富互联网应用程序)代码的MDA(模型驱动体系结构)的应用。我们采用GWT (Google web Toolkit)、Spring和Hibernate作为框架来创建目标元模型,从而生成一个完整的基于GWT的n层web应用程序。这就是为什么我们开发了两个处理UML类图和n层Web应用程序的元模型,然后我们必须设置转换规则。本文中定义的转换规则可以从类图中生成一个包含表示、业务和数据访问包的XML文件。该文件可用于生成RIA n层web应用程序所需的代码。
{"title":"Model-to-model transformation in approach by modeling: From UML model to Model-View-Presenter and Dependency Injection patterns","authors":"R. Esbai, M. Erramdani","doi":"10.1109/WICT.2015.7489648","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489648","url":null,"abstract":"The continuing evolution of business needs and technology makes Web applications more demanding in terms of development, usability and interactivity of their user interfaces. The complexity and diversity of these applications emerges the need of flexibility and combining operations with existing models to create other new, more complex models. As more complex models are used, the importance of transformations between models grows. This paper presents the application of the MDA (Model Driven Architecture) to generate, from the UML model, the code following the MVP (Model-View-Presenter), DI (Dependency Injection) and DAO (Data Access Object) patterns for a RIA (Rich Internet Application) using the standard MOF 2.0 QVT (Meta-Object Facility 2.0 Query-View-Transformation) as a transformation language. We adopt GWT (Google web Toolkit), Spring and Hibernate as a Frameworks for creating a target meta-model to generate an entire GWT-based N-tiers web application. That is why we have developed two meta-models handling UML class diagrams and N-tiers Web applications, then we have to set up transformation rules. The transformation rules defined in this paper can generate, from the class diagram, an XML file containing the Presentation, the Business, and the Data Access package. This file can be used to generate the necessary code of a RIA N-tiers web application.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 5th World Congress on Information and Communication Technologies (WICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1