Cloud computing paradigm has been driving the cloud-leveraged refactoring of existing ICT services including VoIP. In this paper, we design and prototype secured mobile VoIP services with open-source Asterisk PBX software by employing Docker lightweight virtualization for mobile devices. We also experimentally verify the quality of secured voice and the associated communication delay over distributed global connectivity environment.
{"title":"Experimental Verification of Docker-Based Distributed Cloud Applications for Secured Mobile VoIP","authors":"Byung-Rae Cha, Sun Park, JongWon Kim","doi":"10.1109/CISIS.2016.100","DOIUrl":"https://doi.org/10.1109/CISIS.2016.100","url":null,"abstract":"Cloud computing paradigm has been driving the cloud-leveraged refactoring of existing ICT services including VoIP. In this paper, we design and prototype secured mobile VoIP services with open-source Asterisk PBX software by employing Docker lightweight virtualization for mobile devices. We also experimentally verify the quality of secured voice and the associated communication delay over distributed global connectivity environment.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123424817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khayyam Pervaiz, Abdul Wahid, M. Sajid, Malik Khizar, Z. Khan, U. Qasim, N. Javaid
In Underwater Wireless Sensor Networks (UWSNs), reliability is one of the major concerns for large number of applications. The underwater environment is very harsh and noisy. Fading is common and unavoidable, therefore achieving reliable data transfer requires innovative routing solutions. This paper presents a energy efficient cooperative routing with varying Depth threshold (Dth) called Depth and Energy Aware Cooperative Routing Protocol for UWSNs (DEAC). DEAC utilizes the broadcast nature of sensor nodes by performing cooperative routing. Optimised value of Dth is selected for a source node and varied according to the number of alive neighbors of that source node. Potential destination node is selected from outside of Dth and a potential relay node is selected from inside. Destination and relay are selected on the basis of depth, residual energy and link quality between sensor nodes. Source node forwards a data packet to destination node from two ways, directly from source node to destination node and via relay to destination node. At destination, two data packets received from source node and relay node are combined using Maximum Ratio Combining Technique (MRC). Simulation results show that DEAC achieves better performance over some existing depth based routing protocols in terms of throughput, packet Acceptance ratio, packet drop and energy consumption.
{"title":"DEAC: Depth and Energy Aware Cooperative Routing Protocol for Underwater Wireless Sensor Networks","authors":"Khayyam Pervaiz, Abdul Wahid, M. Sajid, Malik Khizar, Z. Khan, U. Qasim, N. Javaid","doi":"10.1109/CISIS.2016.108","DOIUrl":"https://doi.org/10.1109/CISIS.2016.108","url":null,"abstract":"In Underwater Wireless Sensor Networks (UWSNs), reliability is one of the major concerns for large number of applications. The underwater environment is very harsh and noisy. Fading is common and unavoidable, therefore achieving reliable data transfer requires innovative routing solutions. This paper presents a energy efficient cooperative routing with varying Depth threshold (Dth) called Depth and Energy Aware Cooperative Routing Protocol for UWSNs (DEAC). DEAC utilizes the broadcast nature of sensor nodes by performing cooperative routing. Optimised value of Dth is selected for a source node and varied according to the number of alive neighbors of that source node. Potential destination node is selected from outside of Dth and a potential relay node is selected from inside. Destination and relay are selected on the basis of depth, residual energy and link quality between sensor nodes. Source node forwards a data packet to destination node from two ways, directly from source node to destination node and via relay to destination node. At destination, two data packets received from source node and relay node are combined using Maximum Ratio Combining Technique (MRC). Simulation results show that DEAC achieves better performance over some existing depth based routing protocols in terms of throughput, packet Acceptance ratio, packet drop and energy consumption.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shinya Kudo, Keisuke Nishijima, Shingo Uenohara, K. Furuya
While heart disease is one of the three major diseases, only well-qualified doctors can evaluate phonocardiographic signals. This calls for an easily available system that can automatically diagnose phonocardiographic signals. When recording in a room, suppression is required as these signals are heavily contaminated by noise from various sources such as air conditioners and fans. Wavelet transform is one method for denoising phonocardiographic signals, but appropriate parameters are required. In this study, we investigated both normal and abnormal phonocardiographic signals to determine the appropriate use of single and multilevel thresholds and the best types of wavelet functions. The experiment results show that the most appropriate wavelet function is Symlet14 and multilevel thresholding is best for low SNRs.
{"title":"Parameters of Noise Suppression Based on Wavelet Transform for Phonocardiographic Signals","authors":"Shinya Kudo, Keisuke Nishijima, Shingo Uenohara, K. Furuya","doi":"10.1109/CISIS.2016.50","DOIUrl":"https://doi.org/10.1109/CISIS.2016.50","url":null,"abstract":"While heart disease is one of the three major diseases, only well-qualified doctors can evaluate phonocardiographic signals. This calls for an easily available system that can automatically diagnose phonocardiographic signals. When recording in a room, suppression is required as these signals are heavily contaminated by noise from various sources such as air conditioners and fans. Wavelet transform is one method for denoising phonocardiographic signals, but appropriate parameters are required. In this study, we investigated both normal and abnormal phonocardiographic signals to determine the appropriate use of single and multilevel thresholds and the best types of wavelet functions. The experiment results show that the most appropriate wavelet function is Symlet14 and multilevel thresholding is best for low SNRs.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115500629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Maeda, M. Čada, Yuting Bao, Jianming Jin, Kazuya Tomiura
Frequency filtering characteristics by cavities of three different lengths situated in X-shaped photonic crystal waveguide with triangular lattice was simulated by constrained interpolated profile (CIP) method. From analysisi by fast Fourier transform of output signal, the resonant peak frequencies of filtered spectrum by microwave experiment and those by the simulation coincided each other in difference of order of 1%.
{"title":"Numerical Analysis of Transmission Spectrum of X-shaped Photonic Crystal Waveguide for WDM System","authors":"H. Maeda, M. Čada, Yuting Bao, Jianming Jin, Kazuya Tomiura","doi":"10.1109/CISIS.2016.87","DOIUrl":"https://doi.org/10.1109/CISIS.2016.87","url":null,"abstract":"Frequency filtering characteristics by cavities of three different lengths situated in X-shaped photonic crystal waveguide with triangular lattice was simulated by constrained interpolated profile (CIP) method. From analysisi by fast Fourier transform of output signal, the resonant peak frequencies of filtered spectrum by microwave experiment and those by the simulation coincided each other in difference of order of 1%.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Molecular biomarkers are important and commonly used as classification features for detecting function performances of target genes and distinguishing characteristics of different species or strains. As expeditious development in Next Generation Sequencing technologies, whole genome sequencing delivers a comprehensive view and new insights for novel species. However, utilization of whole genome sequences to discover genetic biomarkers for specific functional gene groups still possess many challenges. To solve this problem, we utilized Gene Ontology definitions and Ensembl orthologous information to decide a set of associated functional genes according to user's query keywords. Then, previously assembled NGS contigs were matched against the selected gene set from model species, and an SSR searching algorithm and a cross-species comparison mechanism were performed to reveal potential polymorphic SSR biomarkers. Each identified SSR would be annotated and classified by important attributes, such as lengths, genetic locations, fundamental repeat patterns, tolerant rates of retrieved SSRs. The developed system could identify novel SSR biomarkers for a specified functional gene group regarding conserved and unique features between the query and the target model species, and which could facilitate biologists in finding potential markers for elucidating biological functions and distinguishable features of a novel species.
{"title":"Gene Ontology Based Clustering Analysis for Functionally Linked Genes and Cross-Species Comparison for SSR Biomarkers","authors":"Yang-Chun Chang, Chien-Ming Chen, Tun-Wen Pai, Ronshan Cheng, Ming-Hsiung Chiu","doi":"10.1109/CISIS.2016.71","DOIUrl":"https://doi.org/10.1109/CISIS.2016.71","url":null,"abstract":"Molecular biomarkers are important and commonly used as classification features for detecting function performances of target genes and distinguishing characteristics of different species or strains. As expeditious development in Next Generation Sequencing technologies, whole genome sequencing delivers a comprehensive view and new insights for novel species. However, utilization of whole genome sequences to discover genetic biomarkers for specific functional gene groups still possess many challenges. To solve this problem, we utilized Gene Ontology definitions and Ensembl orthologous information to decide a set of associated functional genes according to user's query keywords. Then, previously assembled NGS contigs were matched against the selected gene set from model species, and an SSR searching algorithm and a cross-species comparison mechanism were performed to reveal potential polymorphic SSR biomarkers. Each identified SSR would be annotated and classified by important attributes, such as lengths, genetic locations, fundamental repeat patterns, tolerant rates of retrieved SSRs. The developed system could identify novel SSR biomarkers for a specified functional gene group regarding conserved and unique features between the query and the target model species, and which could facilitate biologists in finding potential markers for elucidating biological functions and distinguishable features of a novel species.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"1817 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124961584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on core point evolution using water ripplemodel, the thought of software development methodology is thatthe development of a complex system is translated into the waterripple sustainable evolution of core point. However, the corepoint is defined from three levels, which are domain, feature andfunction. And it does not give a general definition of the corepoint. In addition, the evolution of the core point only gives asimple evolutionary model, and there is no evolutionary algorithmbetween the core points. To address these problems, this paperfurther improves the feature and function core points, and putforward the framework and level core points. Then, this paperalso give the corresponding evolutionary algorithm. Based onthese two points, this paper developed a prototype system inorder to demonstrate the water ripple evolution of the varioustypes of core points.
{"title":"Core Point Paradigm and Evolution with Water Ripple Model","authors":"Zhibing Yu, Kun Ma, Bo Yang","doi":"10.1109/CISIS.2016.131","DOIUrl":"https://doi.org/10.1109/CISIS.2016.131","url":null,"abstract":"Based on core point evolution using water ripplemodel, the thought of software development methodology is thatthe development of a complex system is translated into the waterripple sustainable evolution of core point. However, the corepoint is defined from three levels, which are domain, feature andfunction. And it does not give a general definition of the corepoint. In addition, the evolution of the core point only gives asimple evolutionary model, and there is no evolutionary algorithmbetween the core points. To address these problems, this paperfurther improves the feature and function core points, and putforward the framework and level core points. Then, this paperalso give the corresponding evolutionary algorithm. Based onthese two points, this paper developed a prototype system inorder to demonstrate the water ripple evolution of the varioustypes of core points.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130325893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiroki Nakayama, Shigenari Nakamura, T. Enokido, M. Takizawa
A distributed system is considered in an event-driven model composed of processes which are sequences of events. In this paper, we discuss a peer-to-peer (P2P) model of a topic-based publish/subscribe system (P2PPS model) where each peer process (peer) can both subscribe interesting topics and publish event messages. Since each peer can both publish and receive event messages, a peer may publish an event message e1 after receiving an event message e2. In the P2PPS system, event messages have to be notified to every common target peer in the causal order. In the TBC (topicbased causally delivery) protocol, event messages are causally delivered by taking advantage of physical time in addition to linear time and topic vector. Physical time is used to reduce pairs of event messages unnecessarily ordered. In this paper, we discuss the relation among the clock offset and delay time in the evaluation.
{"title":"Scalable Group Communication Protocols in the Peer-to-Peer Model of Topic-Based Publish/Subscribe Systems","authors":"Hiroki Nakayama, Shigenari Nakamura, T. Enokido, M. Takizawa","doi":"10.1109/CISIS.2016.123","DOIUrl":"https://doi.org/10.1109/CISIS.2016.123","url":null,"abstract":"A distributed system is considered in an event-driven model composed of processes which are sequences of events. In this paper, we discuss a peer-to-peer (P2P) model of a topic-based publish/subscribe system (P2PPS model) where each peer process (peer) can both subscribe interesting topics and publish event messages. Since each peer can both publish and receive event messages, a peer may publish an event message e1 after receiving an event message e2. In the P2PPS system, event messages have to be notified to every common target peer in the causal order. In the TBC (topicbased causally delivery) protocol, event messages are causally delivered by taking advantage of physical time in addition to linear time and topic vector. Physical time is used to reduce pairs of event messages unnecessarily ordered. In this paper, we discuss the relation among the clock offset and delay time in the evaluation.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114076404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In previous work it has been shown that volume registration can be used to generate dense 3D maps from RGBD video data with various advantages over feature matching approaches. This paper presents preliminary work in applying this technique to general monocular video data. This approach does not require additional RGB-D hardware and generates dense 3D models with similar complexity.
{"title":"Dense 3D Mapping Using Volume Reigstration from Monocular View","authors":"Luke Lincoln, R. González","doi":"10.1109/CISIS.2016.99","DOIUrl":"https://doi.org/10.1109/CISIS.2016.99","url":null,"abstract":"In previous work it has been shown that volume registration can be used to generate dense 3D maps from RGBD video data with various advantages over feature matching approaches. This paper presents preliminary work in applying this technique to general monocular video data. This approach does not require additional RGB-D hardware and generates dense 3D models with similar complexity.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takaaki Inaba, Donald Elmazi, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli
Several schemes have been proposed for handover in wireless cellular networks. However, during the complexity of handover in wireless environment, many simplified models and assumptions are made. Also, the handover algorithms operating in real time have to make decisions without the luxury of repeated uncorrelated measurements or the future signal strength information. It should be noted that some of handover criteria information can be inherently imprecise, or the precise information is difficult to obtain. For this reason, we propose a Fuzzy Logic (FL) based approach for handover for wireless cellular networks (Secure-aware Fuzzy-based Handover System: S-FBHS) considering the security parameter for the FBHS. The simulation results show that the S-FBHS has a good behavior.
{"title":"Application of Fuzzy Logic for Secure Handover in Wireless Cellular Networks","authors":"Takaaki Inaba, Donald Elmazi, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1109/CISIS.2016.72","DOIUrl":"https://doi.org/10.1109/CISIS.2016.72","url":null,"abstract":"Several schemes have been proposed for handover in wireless cellular networks. However, during the complexity of handover in wireless environment, many simplified models and assumptions are made. Also, the handover algorithms operating in real time have to make decisions without the luxury of repeated uncorrelated measurements or the future signal strength information. It should be noted that some of handover criteria information can be inherently imprecise, or the precise information is difficult to obtain. For this reason, we propose a Fuzzy Logic (FL) based approach for handover for wireless cellular networks (Secure-aware Fuzzy-based Handover System: S-FBHS) considering the security parameter for the FBHS. The simulation results show that the S-FBHS has a good behavior.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128450188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A publish/subscribe (PS) model is an event-driven model of a distributed system. In this paper, we consider a peer-to-peer (P2P) type of PS model where each peer (process) can publish and subscribe events. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event. Publications and subscriptions are specified in terms of topics as discussed in topic-based PS systems. In this paper, we newly discuss a topic-based access control (TBAC) model to prevent illegal information flow among peers in PS systems. Here, an access right is a pair "t, op" of a topic t and an operation op which is publish or subscribe. A peer is allowed to publish an event message with topics and subscribe topics only if the topics are granted to the peer. An event message e is notified to a peer pi if the publication of e and subscription of pi include some common topic. If a peer pi publishes an event message e2 after receiving an event message e1, the event message e2 may bring the event of e1, which the peer pi is not allowed to publish. Here, information in the peer pi illegally flow to another peer. We define the legal flow relation among the peers. Then, we newly propose a subscription-based synchronization (SBS) protocol to prevent illegal information flow. Here, a notification is banned if the notification may cause illegal information flow. We evaluate the SBS protocol in terms of number of notifications banned.
{"title":"Information Flow Control Models in Peer-to-Peer Publish/Subscribe Systems","authors":"Shigenari Nakamura, T. Enokido, M. Takizawa","doi":"10.1109/CISIS.2016.122","DOIUrl":"https://doi.org/10.1109/CISIS.2016.122","url":null,"abstract":"A publish/subscribe (PS) model is an event-driven model of a distributed system. In this paper, we consider a peer-to-peer (P2P) type of PS model where each peer (process) can publish and subscribe events. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event. Publications and subscriptions are specified in terms of topics as discussed in topic-based PS systems. In this paper, we newly discuss a topic-based access control (TBAC) model to prevent illegal information flow among peers in PS systems. Here, an access right is a pair \"t, op\" of a topic t and an operation op which is publish or subscribe. A peer is allowed to publish an event message with topics and subscribe topics only if the topics are granted to the peer. An event message e is notified to a peer pi if the publication of e and subscription of pi include some common topic. If a peer pi publishes an event message e2 after receiving an event message e1, the event message e2 may bring the event of e1, which the peer pi is not allowed to publish. Here, information in the peer pi illegally flow to another peer. We define the legal flow relation among the peers. Then, we newly propose a subscription-based synchronization (SBS) protocol to prevent illegal information flow. Here, a notification is banned if the notification may cause illegal information flow. We evaluate the SBS protocol in terms of number of notifications banned.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}