首页 > 最新文献

2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)最新文献

英文 中文
A System for Supporting Migration to Overlay OpenFlow Network Using OpenStack 一种支持通过OpenStack迁移到OpenFlow覆盖网络的系统
Keita Nomura, Y. Taniguchi, N. Iguchi, Kenzi Watanabe
OpenFlow network technologies has attracted attention along with popularization of cloud environment and server virtualization since it enables flexible network configuration. It is expected that existing networks of many organizations will migrate to OpenFlow networks in the future. Since it takes a huge cost to replace all existing network devices to OpenFlow switches, many organizations consider to employ overlay OpenFlow networks where virtual OpenFlow devices are introduced at endpoint servers. In overlay OpenFlow networks, the cost for migration increases according to the number of servers. In this paper, we propose a system for supporting migration to an overlay OpenFlow network. Our proposed system acquires settings of servers in the existing network endpoints and reflects them to the overlay OpenFlow network. Through experimental evaluations, we confirm the behavior of the configuration acquisition function of our proposed system.
随着云环境和服务器虚拟化的普及,OpenFlow网络技术因其能够实现灵活的网络配置而备受关注。预计未来许多组织的现有网络将迁移到OpenFlow网络。由于将所有现有网络设备替换为OpenFlow交换机需要巨大的成本,许多组织考虑采用覆盖OpenFlow网络,在端点服务器上引入虚拟OpenFlow设备。在覆盖OpenFlow网络中,迁移成本随着服务器数量的增加而增加。在本文中,我们提出了一个支持迁移到覆盖OpenFlow网络的系统。我们提出的系统获取现有网络端点中的服务器设置,并将其反映到覆盖的OpenFlow网络中。通过实验评估,我们证实了所提出系统的组态获取函数的行为。
{"title":"A System for Supporting Migration to Overlay OpenFlow Network Using OpenStack","authors":"Keita Nomura, Y. Taniguchi, N. Iguchi, Kenzi Watanabe","doi":"10.1109/CISIS.2016.83","DOIUrl":"https://doi.org/10.1109/CISIS.2016.83","url":null,"abstract":"OpenFlow network technologies has attracted attention along with popularization of cloud environment and server virtualization since it enables flexible network configuration. It is expected that existing networks of many organizations will migrate to OpenFlow networks in the future. Since it takes a huge cost to replace all existing network devices to OpenFlow switches, many organizations consider to employ overlay OpenFlow networks where virtual OpenFlow devices are introduced at endpoint servers. In overlay OpenFlow networks, the cost for migration increases according to the number of servers. In this paper, we propose a system for supporting migration to an overlay OpenFlow network. Our proposed system acquires settings of servers in the existing network endpoints and reflects them to the overlay OpenFlow network. Through experimental evaluations, we confirm the behavior of the configuration acquisition function of our proposed system.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131839644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services 在云服务之上建立安全功能的安全sla驱动方法
V. Casola, Alessandra De Benedictis, Madalina Erascu, M. Rak, Umberto Villano
The extensive use of cloud services by both individual users and organizations induces several security risks. The risk perception is higher when Cloud Service Providers (CSPs) do not clearly state their security policies and/or when such policies do not directly match user-defined requirements. Security-oriented Service Level Agreements (Security SLAs) represent a fundamental means to encourage the adoption of cloud services in contexts where security is mandatory. Nevertheless, despite the number of existing initiatives aimed at formalizing Security SLAs and at representing security guarantees by taking into account both customers' and providers' perspectives, they are far from being commonly adopted in practice by CSPs, due to the difficulty in automatically enforcing and monitoring the security capabilities agreed with customers. In this paper we illustrate, through a case study, a methodology to set-up a catalogue of security capabilities that can be offered as-a-service, on top of which specific guarantees can be specified through a Security SLA. Such a methodology, which explicitly takes into account the constraints behind the definition of formal guarantees related to security, is meant to serve as a guideline for providers willing to offer for their services specific security features that can be monitored and assessed by customers during operation.
个人用户和组织对云服务的广泛使用会带来一些安全风险。当云服务提供商(csp)没有明确说明其安全策略和/或这些策略与用户定义的需求不直接匹配时,风险感知会更高。面向安全的服务水平协议(Security sla)是一种基本手段,可以鼓励在强制要求安全性的环境中采用云服务。然而,尽管有许多现有的计划旨在将安全sla正式化,并通过考虑客户和提供商的观点来表示安全保证,但由于在自动执行和监视与客户商定的安全功能方面存在困难,因此它们远未被csp在实践中普遍采用。在本文中,我们通过一个案例研究说明了一种方法,该方法可以设置可以作为服务提供的安全功能目录,在此基础上,可以通过安全SLA指定特定的保证。这种方法明确地考虑了与安全性相关的正式保证定义背后的约束,旨在为愿意为其服务提供可由客户在操作期间监视和评估的特定安全特性的提供商提供指导。
{"title":"A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services","authors":"V. Casola, Alessandra De Benedictis, Madalina Erascu, M. Rak, Umberto Villano","doi":"10.1109/CISIS.2016.116","DOIUrl":"https://doi.org/10.1109/CISIS.2016.116","url":null,"abstract":"The extensive use of cloud services by both individual users and organizations induces several security risks. The risk perception is higher when Cloud Service Providers (CSPs) do not clearly state their security policies and/or when such policies do not directly match user-defined requirements. Security-oriented Service Level Agreements (Security SLAs) represent a fundamental means to encourage the adoption of cloud services in contexts where security is mandatory. Nevertheless, despite the number of existing initiatives aimed at formalizing Security SLAs and at representing security guarantees by taking into account both customers' and providers' perspectives, they are far from being commonly adopted in practice by CSPs, due to the difficulty in automatically enforcing and monitoring the security capabilities agreed with customers. In this paper we illustrate, through a case study, a methodology to set-up a catalogue of security capabilities that can be offered as-a-service, on top of which specific guarantees can be specified through a Security SLA. Such a methodology, which explicitly takes into account the constraints behind the definition of formal guarantees related to security, is meant to serve as a guideline for providers willing to offer for their services specific security features that can be monitored and assessed by customers during operation.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131109437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Fuzzy-Based System for Improving Node Security in MANET Clusters 基于模糊的MANET集群节点安全改进系统
Mirjeta Alinci, Takaaki Inaba, Donald Elmazi, Evjola Spaho, Vladi Koliçi, L. Barolli
A Mobile Ad hoc Network (MANET) is a multi-hop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped into clusters to achieve better stability and scalability. Grouping the mobile nodes is called clustering, in which a leader node is elected to manage the entire network. In this paper, first we introduce various approaches for clustering focus on different performance metrics. Then, we show some clustering schemes such as Mobility-based clustering, Energy-efficient clustering, Connectivity-based clustering, Weighted-based clustering. Finally, we present a Fuzzy based approach for improving the security of cluster nodes in MANETs. From the simulation results, we found that by selecting nodes with high SC rate, the nodes are more secure and the system performance is improved.
移动自组网(MANET)是一种多跳无线网络,其移动节点本质上是动态的,具有有限的带宽和最小的电池电量。由于这种具有挑战性的环境,可以将移动节点分组到集群中,以获得更好的稳定性和可伸缩性。将移动节点分组称为集群,在集群中选出一个领导节点来管理整个网络。在本文中,我们首先介绍针对不同性能指标的各种聚类方法。然后给出了基于移动性的聚类、基于能效的聚类、基于连通性的聚类和基于加权的聚类。最后,我们提出了一种基于模糊的方法来提高manet中集群节点的安全性。仿真结果表明,选择SC率高的节点可以提高节点的安全性,提高系统性能。
{"title":"A Fuzzy-Based System for Improving Node Security in MANET Clusters","authors":"Mirjeta Alinci, Takaaki Inaba, Donald Elmazi, Evjola Spaho, Vladi Koliçi, L. Barolli","doi":"10.1109/CISIS.2016.54","DOIUrl":"https://doi.org/10.1109/CISIS.2016.54","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a multi-hop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped into clusters to achieve better stability and scalability. Grouping the mobile nodes is called clustering, in which a leader node is elected to manage the entire network. In this paper, first we introduce various approaches for clustering focus on different performance metrics. Then, we show some clustering schemes such as Mobility-based clustering, Energy-efficient clustering, Connectivity-based clustering, Weighted-based clustering. Finally, we present a Fuzzy based approach for improving the security of cluster nodes in MANETs. From the simulation results, we found that by selecting nodes with high SC rate, the nodes are more secure and the system performance is improved.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey on Fuzzy Logic Applications in Wireless and Mobile Communication for LTE Networks 模糊逻辑在LTE网络无线和移动通信中的应用综述
Ahmad Mudassir, S. Akhtar, Hesham Kamel, N. Javaid
This paper conducts a comprehensive survey on fuzzy logic applications in wireless and mobile communication area in general and of growing LTE communication networks in particular. The survey aims to highlight the principles of fuzzy logic applications in the area of channel estimation, channel equalization, handover management, QoS management. Furthermore, in LTE advanced heterogeneous networks fuzzy logic applications in the area of interference management are also spotlighted.
本文对模糊逻辑在无线和移动通信领域,特别是LTE通信网络中的应用进行了全面的综述。本文旨在重点介绍模糊逻辑在信道估计、信道均衡、切换管理、QoS管理等方面的应用原理。此外,在LTE高级异构网络中,模糊逻辑在干扰管理领域的应用也得到了重视。
{"title":"A Survey on Fuzzy Logic Applications in Wireless and Mobile Communication for LTE Networks","authors":"Ahmad Mudassir, S. Akhtar, Hesham Kamel, N. Javaid","doi":"10.1109/CISIS.2016.106","DOIUrl":"https://doi.org/10.1109/CISIS.2016.106","url":null,"abstract":"This paper conducts a comprehensive survey on fuzzy logic applications in wireless and mobile communication area in general and of growing LTE communication networks in particular. The survey aims to highlight the principles of fuzzy logic applications in the area of channel estimation, channel equalization, handover management, QoS management. Furthermore, in LTE advanced heterogeneous networks fuzzy logic applications in the area of interference management are also spotlighted.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131528573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Web Service for C Programming Learning and Teaching 一个面向C语言编程学习与教学的Web服务
Yu Yan, Hiroto Nakano, Kohei Hara, Takenobu Kazuma, A. He
C is a basic computer language widely used in both industry and education. Many computer programming beginners choose C as the first computer language to learn. But it is difficult for the beginners, especially for high-school students, to learn C programming because the learning supporting environment is not enough. This research proposes PROVIT(PROgramming VIsualization Tool) for Web, an e-Learning supporting environment for C programming education. PROVIT for Web has many features:(1) It can be used to write, run and check C programs without installing any IDE, (2) It especially can be used at lecture to show the execution of C program step by step, and (3) It can detect more run time error often seen in beginner's program. Web PROVIT has been used in a C programming course in author's university. This paper reports the design, implementation and the result of experimental use of PROVIT for Web.
C是一种基本的计算机语言,广泛应用于工业和教育领域。许多计算机编程初学者选择C作为学习的第一门计算机语言。但是对于初学者,特别是高中生来说,学习C语言编程是比较困难的,因为学习支持环境不够。本研究提出一种用于C程式设计教育的网路学习支援环境PROVIT(PROgramming VIsualization Tool for Web)。PROVIT for Web有许多特点:(1)它可以用来编写、运行和检查C程序,而不需要安装任何IDE;(2)它特别适合在课堂上展示C程序的逐步执行;(3)它可以检测出更多初学者程序中经常出现的运行时错误。Web PROVIT已应用于笔者所在大学的C语言编程课程中。本文报道了基于Web的PROVIT的设计、实现和实验结果。
{"title":"A Web Service for C Programming Learning and Teaching","authors":"Yu Yan, Hiroto Nakano, Kohei Hara, Takenobu Kazuma, A. He","doi":"10.1109/CISIS.2016.70","DOIUrl":"https://doi.org/10.1109/CISIS.2016.70","url":null,"abstract":"C is a basic computer language widely used in both industry and education. Many computer programming beginners choose C as the first computer language to learn. But it is difficult for the beginners, especially for high-school students, to learn C programming because the learning supporting environment is not enough. This research proposes PROVIT(PROgramming VIsualization Tool) for Web, an e-Learning supporting environment for C programming education. PROVIT for Web has many features:(1) It can be used to write, run and check C programs without installing any IDE, (2) It especially can be used at lecture to show the execution of C program step by step, and (3) It can detect more run time error often seen in beginner's program. Web PROVIT has been used in a C programming course in author's university. This paper reports the design, implementation and the result of experimental use of PROVIT for Web.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126494079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fuzzy-Based Approach for Classifying Students' Emotional States in Online Collaborative Work 基于模糊的在线协同作业中学生情绪状态分类方法
Marta Arguedas, Luis A. Casillas, F. Xhafa, T. Daradoumis, Adriana Peña Pérez Negrón, S. Caballé
Emotion awareness is becoming a key aspect in collaborative work at academia, enterprises and organizations that use collaborative group work in their activity. Due to pervasiveness of ICT's, most of collaboration can be performed through communication media channels such as discussion forums, social networks, etc. The emotive state of the users while they carry out their activity such as collaborative learning at Universities or project work at enterprises and organizations influences very much their performance and can actually determine the final learning or project outcome. Therefore, monitoring the users' emotive states and using that information for providing feedback and scaffolding is crucial. To this end, automated analysis over data collected from communication channels is a useful source. In this paper, we propose an approach to process such collected data in order to classify and assess emotional states of involved users and provide them feedback accordingly to their emotive states. In order to achieve this, a fuzzy approach is used to build the emotive classification system, which is fed with data from ANEW dictionary, whose words are bound to emotional weights and these, in turn, are used to map Fuzzy sets in our proposal. The proposed fuzzy-based system has been evaluated using real data from collaborative learning courses in an academic context.
情感意识正在成为学术界、企业和组织在其活动中使用协作小组工作的协作工作的一个关键方面。由于信息通信技术的普及,大多数协作可以通过论坛、社交网络等传播媒体渠道进行。用户在进行活动时的情绪状态,例如在大学的协作学习或在企业和组织的项目工作,对他们的绩效影响很大,实际上可以决定最终的学习或项目结果。因此,监控用户的情绪状态并使用这些信息提供反馈和脚手架是至关重要的。为此,对从通信渠道收集的数据进行自动分析是一个有用的来源。在本文中,我们提出了一种处理这些收集到的数据的方法,以便对参与用户的情绪状态进行分类和评估,并根据他们的情绪状态向他们提供反馈。为了实现这一目标,我们使用模糊方法来构建情感分类系统,该系统使用来自新词典的数据,该词典的单词被绑定到情感权重上,而这些又被用来映射我们提议中的模糊集。利用学术背景下协作学习课程的真实数据对所提出的基于模糊的系统进行了评估。
{"title":"A Fuzzy-Based Approach for Classifying Students' Emotional States in Online Collaborative Work","authors":"Marta Arguedas, Luis A. Casillas, F. Xhafa, T. Daradoumis, Adriana Peña Pérez Negrón, S. Caballé","doi":"10.1109/CISIS.2016.141","DOIUrl":"https://doi.org/10.1109/CISIS.2016.141","url":null,"abstract":"Emotion awareness is becoming a key aspect in collaborative work at academia, enterprises and organizations that use collaborative group work in their activity. Due to pervasiveness of ICT's, most of collaboration can be performed through communication media channels such as discussion forums, social networks, etc. The emotive state of the users while they carry out their activity such as collaborative learning at Universities or project work at enterprises and organizations influences very much their performance and can actually determine the final learning or project outcome. Therefore, monitoring the users' emotive states and using that information for providing feedback and scaffolding is crucial. To this end, automated analysis over data collected from communication channels is a useful source. In this paper, we propose an approach to process such collected data in order to classify and assess emotional states of involved users and provide them feedback accordingly to their emotive states. In order to achieve this, a fuzzy approach is used to build the emotive classification system, which is fed with data from ANEW dictionary, whose words are bound to emotional weights and these, in turn, are used to map Fuzzy sets in our proposal. The proposed fuzzy-based system has been evaluated using real data from collaborative learning courses in an academic context.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Demand Side Management Using Hybrid Bacterial Foraging and Genetic Algorithm Optimization Techniques 基于混合细菌觅食和遗传算法优化技术的需求侧管理
Adia Khalid, N. Javaid, Abdul Mateen, B. Khalid, Z. Khan, U. Qasim
Today, energy is the most valuable resource, new methods and techniques are being discovered to fulfill the demand of energy. However, energy demand growth causes a serious energy crisis, especially when demand is comparatively high and creates the peak load. This problem can be handled by integrating Demand Side Management (DSM) with traditional Smart Grid (SG) through two way communication between utility and customers. The main objective of DSM is peak load reduction where SG targets cost minimization and user comfort maximization. In this study, our emphasis is on cost minimization and load management by shifting the load from peak hours toward the off peak hours. In this underlying study, we adapt hybridization of two optimization approaches, Bacterial Foraging (BFA) and Genetic Algorithm (GA). Simulation results verify that the adapted approach reduces the total cost and peak average ratio by shifting the load on off peak hours with very little difference between minimum and maximum 95% confidence interval.
今天,能源是最宝贵的资源,人们不断发现新的方法和技术来满足能源的需求。然而,能源需求的增长导致了严重的能源危机,特别是当需求相对较高并产生峰值负荷时。通过电力公司和用户之间的双向通信,将需求侧管理(DSM)与传统智能电网(SG)相结合,可以解决这一问题。DSM的主要目标是降低峰值负荷,而SG的目标是成本最小化和用户舒适度最大化。在本研究中,我们的重点是通过将负荷从高峰时段转移到非高峰时段来实现成本最小化和负荷管理。在这项基础研究中,我们采用了细菌觅食(BFA)和遗传算法(GA)两种优化方法的杂交。仿真结果表明,该方法通过将负荷转移到非高峰时段,降低了总成本和峰值平均比,且最小和最大95%置信区间相差很小。
{"title":"Demand Side Management Using Hybrid Bacterial Foraging and Genetic Algorithm Optimization Techniques","authors":"Adia Khalid, N. Javaid, Abdul Mateen, B. Khalid, Z. Khan, U. Qasim","doi":"10.1109/CISIS.2016.128","DOIUrl":"https://doi.org/10.1109/CISIS.2016.128","url":null,"abstract":"Today, energy is the most valuable resource, new methods and techniques are being discovered to fulfill the demand of energy. However, energy demand growth causes a serious energy crisis, especially when demand is comparatively high and creates the peak load. This problem can be handled by integrating Demand Side Management (DSM) with traditional Smart Grid (SG) through two way communication between utility and customers. The main objective of DSM is peak load reduction where SG targets cost minimization and user comfort maximization. In this study, our emphasis is on cost minimization and load management by shifting the load from peak hours toward the off peak hours. In this underlying study, we adapt hybridization of two optimization approaches, Bacterial Foraging (BFA) and Genetic Algorithm (GA). Simulation results verify that the adapted approach reduces the total cost and peak average ratio by shifting the load on off peak hours with very little difference between minimum and maximum 95% confidence interval.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Avoiding Energy Holes in Underwater Wireless Sensor Networks with Balanced Load Distribution 平衡负载分布水下无线传感器网络中能量空洞的避免
Irfan Azam, Abdul Majid, Tanveer Khan, Sajjad, Z. Khan, U. Qasim, N. Javaid
In this paper, we overcome the problem of energy holes in UWSNs while considering the unique characteristics of underwater communication. In proposed scheme we consider UWSNs where nodes are manually deployed according to the defined deployment pattern to satisfy our application requirements in terms of energy saving. We used mixed routing technique i.e. direct transmission and hop-by-hop transmission for energy balancing in continuous monitoring applications for UWSNs. Sensor nodes forward the total data traffic (generated plus received) periodically to the sink with calculated load weights using variable communication ranges. The transmission ranges for 1-hop, 2-hop and direct transmission to the sink are used for data transmission to achieve load balancing for balanced energy consumption of all sensor nodes in the network. We prove that our scheme outperforms the existing selected schemes in terms of network lifetime and energy conservation. We select an optimal result from the simulation results for different possible combinations of transmissions.
本文在考虑水下通信的独特特性的同时,克服了UWSNs中的能量空穴问题。在该方案中,我们考虑了uwsn,其中节点按照定义的部署模式进行手动部署,以满足我们在节能方面的应用需求。在UWSNs连续监测应用中,采用直接传输和逐跳传输的混合路由技术实现能量平衡。传感器节点使用可变通信范围,定期将总数据流量(生成和接收)转发到具有计算负载权重的接收器。数据传输采用1跳、2跳和直接传输到sink的传输范围,以实现网络中所有传感器节点能量消耗均衡的负载均衡。我们证明了我们的方案在网络寿命和节能方面优于现有的选择方案。针对不同可能的传输组合,从仿真结果中选择最优结果。
{"title":"Avoiding Energy Holes in Underwater Wireless Sensor Networks with Balanced Load Distribution","authors":"Irfan Azam, Abdul Majid, Tanveer Khan, Sajjad, Z. Khan, U. Qasim, N. Javaid","doi":"10.1109/CISIS.2016.109","DOIUrl":"https://doi.org/10.1109/CISIS.2016.109","url":null,"abstract":"In this paper, we overcome the problem of energy holes in UWSNs while considering the unique characteristics of underwater communication. In proposed scheme we consider UWSNs where nodes are manually deployed according to the defined deployment pattern to satisfy our application requirements in terms of energy saving. We used mixed routing technique i.e. direct transmission and hop-by-hop transmission for energy balancing in continuous monitoring applications for UWSNs. Sensor nodes forward the total data traffic (generated plus received) periodically to the sink with calculated load weights using variable communication ranges. The transmission ranges for 1-hop, 2-hop and direct transmission to the sink are used for data transmission to achieve load balancing for balanced energy consumption of all sensor nodes in the network. We prove that our scheme outperforms the existing selected schemes in terms of network lifetime and energy conservation. We select an optimal result from the simulation results for different possible combinations of transmissions.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of an Ambient Intelligence Testbed for Improving Quality of Life: Evaluation Using Clustering Approach 提高生活质量的环境智能试验台性能评估:基于聚类方法的评估
Ryoichiro Obukata, Tetsuya Oda, Donald Elmazi, L. Barolli, Keita Matsuo, I. Woungang
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation of a testbed for AmI using Raspberry Pi mounted on Raspbian OS. We analyze the performance of k-means clustering algorithm. For evaluation we considered respiratory rate and heart rate metrics. The simulation results show that the k-means clustering algorithm has a good performance.
环境智能(AmI)处理的是一个无处不在的计算设备的新世界,在这个世界中,物理环境可以智能地、不显眼地与人进行交互。AmI环境可以是多种多样的,例如家庭、办公室、会议室、学校、医院、控制中心、车辆、旅游景点、商店、体育设施和音乐设备。在本文中,我们设计并实现了一个基于树莓派的AmI测试平台。分析了k-均值聚类算法的性能。为了评估,我们考虑了呼吸率和心率指标。仿真结果表明,k-means聚类算法具有良好的性能。
{"title":"Performance Evaluation of an Ambient Intelligence Testbed for Improving Quality of Life: Evaluation Using Clustering Approach","authors":"Ryoichiro Obukata, Tetsuya Oda, Donald Elmazi, L. Barolli, Keita Matsuo, I. Woungang","doi":"10.1109/CISIS.2016.59","DOIUrl":"https://doi.org/10.1109/CISIS.2016.59","url":null,"abstract":"Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation of a testbed for AmI using Raspberry Pi mounted on Raspbian OS. We analyze the performance of k-means clustering algorithm. For evaluation we considered respiratory rate and heart rate metrics. The simulation results show that the k-means clustering algorithm has a good performance.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125358969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EEIRA: An Energy Efficient Interference and Route Aware Protocol for Underwater WSNs EEIRA:一种高效的水下无线传感器网络干扰和路由感知协议
A. Khan, N. Javaid, Hassan Mahmood, Sangeen, Z. Khan, U. Qasim
In this paper, an energy efficient, interference and route aware (EEIRA) protocol is proposed for underwater wireless sensor networks (UWSNs). The protocol combines the direct and relay forwarding mechanisms in transmitting the packets from source to destination. The relaying process involves selection of the best relay from a set of relay nodes. A relay node having the least distance from source to destination and the minimum number of neighbor nodes qualifies the criterion of the best relay. The direct transmission is used when the best relay is not within the transmission range of the source node. From top to bottom, the network is divided into three different zones, destination, relay and source zone, respectively. The relay zone has the greatest area to have maximum choices of selecting the best relay from the relay nodes residing in it. Nodes in all the three regions can sense the attribute and send the data to the sink. The destination nodes send data directly to sink. The relay nodes send the packets to the sink either directly or through the relaying process. The source nodes in the bottom send the data to sink via the best relay node or directly. Based on simulation results, the proposed protocol outperforms the depth based routing (DBR) scheme in terms of energy efficiency by selecting the best relay, reducing number of hops and following the shortest path to reduce channel losses.
针对水下无线传感器网络(UWSNs),提出了一种节能、干扰和路由感知(EEIRA)的协议。该协议结合了直接转发和中继转发机制,将数据包从源发送到目的。中继过程包括从一组中继节点中选择最佳中继。具有从源到目的距离最小和邻居节点数量最少的中继节点符合最佳中继的标准。当最佳中继不在源节点的传输范围内时,采用直接传输。从上到下,网络分为三个不同的区域,分别是目的区、中继区和源区。中继区域具有最大的面积,可以从驻留在其中的中继节点中选择最佳中继。所有三个区域中的节点都可以感知属性并将数据发送到接收器。目的节点直接向sink发送数据。中继节点直接或通过中继过程将数据包发送到接收器。底部的源节点通过最佳中继节点或直接将数据发送到sink。仿真结果表明,该协议通过选择最佳中继、减少跳数和遵循最短路径来减少信道损耗,在能效方面优于深度路由(DBR)方案。
{"title":"EEIRA: An Energy Efficient Interference and Route Aware Protocol for Underwater WSNs","authors":"A. Khan, N. Javaid, Hassan Mahmood, Sangeen, Z. Khan, U. Qasim","doi":"10.1109/CISIS.2016.129","DOIUrl":"https://doi.org/10.1109/CISIS.2016.129","url":null,"abstract":"In this paper, an energy efficient, interference and route aware (EEIRA) protocol is proposed for underwater wireless sensor networks (UWSNs). The protocol combines the direct and relay forwarding mechanisms in transmitting the packets from source to destination. The relaying process involves selection of the best relay from a set of relay nodes. A relay node having the least distance from source to destination and the minimum number of neighbor nodes qualifies the criterion of the best relay. The direct transmission is used when the best relay is not within the transmission range of the source node. From top to bottom, the network is divided into three different zones, destination, relay and source zone, respectively. The relay zone has the greatest area to have maximum choices of selecting the best relay from the relay nodes residing in it. Nodes in all the three regions can sense the attribute and send the data to the sink. The destination nodes send data directly to sink. The relay nodes send the packets to the sink either directly or through the relaying process. The source nodes in the bottom send the data to sink via the best relay node or directly. Based on simulation results, the proposed protocol outperforms the depth based routing (DBR) scheme in terms of energy efficiency by selecting the best relay, reducing number of hops and following the shortest path to reduce channel losses.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1