首页 > 最新文献

2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)最新文献

英文 中文
Performance improvement of cloud storage using a genetic algorithm based placement 利用遗传算法改进云存储的性能
Kanatorn Jindarak, P. Uthayopas
Cloud storage is a massive and public accessible storage available for use on internet. Since the number of users and data access request will be massive, a good performance improvement algorithm is needed. In this work, a technique of using a smart object placement is presented. The model for cloud storage and object placement are discussed. Then, genetic algorithm is used to optimize the placement function to gain a better average access speed for any storage object. The experimental results show an obvious performance increases due to a better object placement. The result of this work can be applied to enhance performance of both private and public storage cloud.
云存储是一种可在互联网上使用的大规模公共可访问存储。由于用户数量和数据访问请求数量巨大,因此需要一种良好的性能改进算法。在这项工作中,提出了一种使用智能对象放置的技术。讨论了云存储和对象放置的模型。然后,利用遗传算法对放置函数进行优化,以获得对任意存储对象的更好的平均访问速度。实验结果表明,由于物体放置位置较好,性能有明显提高。这项工作的结果可以应用于增强私有和公共存储云的性能。
{"title":"Performance improvement of cloud storage using a genetic algorithm based placement","authors":"Kanatorn Jindarak, P. Uthayopas","doi":"10.1109/JCSSE.2011.5930093","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930093","url":null,"abstract":"Cloud storage is a massive and public accessible storage available for use on internet. Since the number of users and data access request will be massive, a good performance improvement algorithm is needed. In this work, a technique of using a smart object placement is presented. The model for cloud storage and object placement are discussed. Then, genetic algorithm is used to optimize the placement function to gain a better average access speed for any storage object. The experimental results show an obvious performance increases due to a better object placement. The result of this work can be applied to enhance performance of both private and public storage cloud.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121165962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A weak mutation testing framework for WS-BPEL 用于WS-BPEL的弱突变测试框架
Panya Boonyakulsrirung, T. Suwannasart
Web Services Business Process Execution Language (WS-BPEL) is as an XML-based Web Services composition language for more complex business processes. Mutation Testing is error-based software testing in unit level which indicates efficiency of test suites. Weak mutation testing can reduce execution cost more than typical mutation testing. A few empirical studies identify its test effiectiveness which was also closely to traditional mutation testing. Recently, there is a research which proposes definition of expression mutation operators for WS-BPEL, while the definitions are not completed for WS-BPEL language. Thereafter an investigation had presented more three mutation operators (Identifier replace operators, Activity operators, as well as Exceptional and event operators) which completely cover for WS-BPEL language. This paper provides a comprehensive analysis by using some mutation operators for WS-BPEL that can apply for weak mutation testing and also proposes a framework for generating mutants by using weak mutation technique. The framework can identify dead mutants and live mutants. Moreover the framework can present execution time, mutation score, and test cases effectiveness.
Web服务业务流程执行语言(WS-BPEL)是一种基于xml的Web服务组合语言,用于更复杂的业务流程。突变测试是一种基于错误的单元级软件测试,它反映了测试套件的效率。弱突变测试比典型突变测试更能降低执行成本。一些实证研究表明,该方法的检测有效性也接近传统的突变检测。最近,有研究提出了用于WS-BPEL的表达式突变操作符的定义,但是WS-BPEL语言的表达式突变操作符的定义还没有完成。此后,一项调查提出了三种突变操作符(标识符替换操作符、活动操作符以及异常和事件操作符),它们完全覆盖了WS-BPEL语言。本文对WS-BPEL中适用于弱突变测试的一些突变算子进行了综合分析,并提出了一个利用弱突变技术生成突变的框架。该框架可以识别死突变体和活突变体。此外,框架可以显示执行时间、突变得分和测试用例的有效性。
{"title":"A weak mutation testing framework for WS-BPEL","authors":"Panya Boonyakulsrirung, T. Suwannasart","doi":"10.1109/JCSSE.2011.5930140","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930140","url":null,"abstract":"Web Services Business Process Execution Language (WS-BPEL) is as an XML-based Web Services composition language for more complex business processes. Mutation Testing is error-based software testing in unit level which indicates efficiency of test suites. Weak mutation testing can reduce execution cost more than typical mutation testing. A few empirical studies identify its test effiectiveness which was also closely to traditional mutation testing. Recently, there is a research which proposes definition of expression mutation operators for WS-BPEL, while the definitions are not completed for WS-BPEL language. Thereafter an investigation had presented more three mutation operators (Identifier replace operators, Activity operators, as well as Exceptional and event operators) which completely cover for WS-BPEL language. This paper provides a comprehensive analysis by using some mutation operators for WS-BPEL that can apply for weak mutation testing and also proposes a framework for generating mutants by using weak mutation technique. The framework can identify dead mutants and live mutants. Moreover the framework can present execution time, mutation score, and test cases effectiveness.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An efficient approach for data-duplication detection based on RDBMS 一种基于RDBMS的数据重复检测方法
Kiettisak Chanhom, J. Natwichai
Data-duplication is one of the most important issues in the context of information system management. Instead of storing a single real-world object as an entity in an information system, the duplication, storing more than one entity representing a single object, can be occurred. This problem can decrease the quality of service of information systems. In this paper, we propose an efficient approach to detect the duplication based on the RDBMS foundation. Our approach is based on the assumption that the data to be processed have been stored in the RDBMS at the first place. Thus, the proposed approach does not require the data to be imported/exported from the storage. Also, such approach will benefit from the query optimizer of the RDBMS. The experiment results on the TPC-H dataset have been presented to validate such proposed work.
数据重复是信息系统管理中的一个重要问题。代替在信息系统中存储单个现实世界对象作为实体,可以发生复制,即存储多个代表单个对象的实体。这个问题会降低信息系统的服务质量。在本文中,我们提出了一种基于RDBMS基础的有效的重复检测方法。我们的方法基于要处理的数据首先存储在RDBMS中的假设。因此,建议的方法不需要从存储中导入/导出数据。此外,这种方法还将受益于RDBMS的查询优化器。在TPC-H数据集上的实验结果验证了所提出的工作。
{"title":"An efficient approach for data-duplication detection based on RDBMS","authors":"Kiettisak Chanhom, J. Natwichai","doi":"10.1109/JCSSE.2011.5930142","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930142","url":null,"abstract":"Data-duplication is one of the most important issues in the context of information system management. Instead of storing a single real-world object as an entity in an information system, the duplication, storing more than one entity representing a single object, can be occurred. This problem can decrease the quality of service of information systems. In this paper, we propose an efficient approach to detect the duplication based on the RDBMS foundation. Our approach is based on the assumption that the data to be processed have been stored in the RDBMS at the first place. Thus, the proposed approach does not require the data to be imported/exported from the storage. Also, such approach will benefit from the query optimizer of the RDBMS. The experiment results on the TPC-H dataset have been presented to validate such proposed work.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134069255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Honeypot log management and visualization of attacker geographical distribution 分布式蜜罐日志管理和攻击者地理分布可视化
V. Visoottiviseth, Uttapol Jaralrungroj, Ekkachai Phoomrungraungsuk, Pongpak Kultanon
Honeypot is a prominent technology that helps us learn new hacking techniques from attackers and intruders. The much information from multiple Honeypot servers, the more appropriate signatures we can generate. To ease the administrator to manage and monitor trace files from multiple Honeypot servers that are distributed in various locations at the same time, in this paper we design and implement a prototype of log management server to automatically and periodically collect log files from them. Information reported by each Honeypot server will be sent in secure manner to the log management server. The log management server then parses the information into the database server, where users can search for specific information through the web interface, such as searching based on one or two Honeypot servers. Moreover, the geographical distribution of attackers is visualized in the world map by utilizing the WHOIS database and GeoPlot software.
蜜罐是一项杰出的技术,可以帮助我们从攻击者和入侵者那里学习新的黑客技术。来自多个蜜罐服务器的信息越多,我们可以生成的签名就越合适。为了方便管理员管理和监控同时分布在不同位置的多个蜜罐服务器的跟踪文件,本文设计并实现了一个日志管理服务器的原型,用于自动定期收集这些服务器上的日志文件。各蜜罐服务器上报的信息将被安全发送到日志管理服务器。日志管理服务器将查询到的信息解析到数据库服务器,用户可以通过web界面对数据库服务器上的特定信息进行搜索,例如通过一个或两个Honeypot服务器进行搜索。利用WHOIS数据库和GeoPlot软件,将攻击者的地理分布可视化到世界地图上。
{"title":"Distributed Honeypot log management and visualization of attacker geographical distribution","authors":"V. Visoottiviseth, Uttapol Jaralrungroj, Ekkachai Phoomrungraungsuk, Pongpak Kultanon","doi":"10.1109/JCSSE.2011.5930083","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930083","url":null,"abstract":"Honeypot is a prominent technology that helps us learn new hacking techniques from attackers and intruders. The much information from multiple Honeypot servers, the more appropriate signatures we can generate. To ease the administrator to manage and monitor trace files from multiple Honeypot servers that are distributed in various locations at the same time, in this paper we design and implement a prototype of log management server to automatically and periodically collect log files from them. Information reported by each Honeypot server will be sent in secure manner to the log management server. The log management server then parses the information into the database server, where users can search for specific information through the web interface, such as searching based on one or two Honeypot servers. Moreover, the geographical distribution of attackers is visualized in the world map by utilizing the WHOIS database and GeoPlot software.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116091779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Conslide: A Thai soft keyboard for mobile text input Conslide:用于移动文本输入的泰国软键盘
Silpol Sukswai, K. Piromsopa
We propose Conslide, a new Thai input method for compact mobile devices. To address the complexity of Thai language, our design adopts drawing approach for text input. This results in a smaller keyboard (more area for applications). With appropriate layout, users can input words without lifting finger from the screen, hence the better efficiency. Empirical result shows that the average movement distance and minimal movement time required for each Thai word are comparable to those of the quasi-Kedmanee keyboards such as Droidsans Thai keyboard.
我们提出Conslide,一种新的泰语输入法,适用于小型移动设备。为了解决泰语的复杂性,我们的设计采用绘图的方式进行文本输入。这导致一个更小的键盘(更多的区域用于应用程序)。通过适当的布局,用户无需从屏幕上抬起手指就可以输入文字,从而提高了效率。实验结果表明,每个泰语单词的平均移动距离和最小移动时间与Droidsans泰语键盘等准基德曼尼键盘相当。
{"title":"Conslide: A Thai soft keyboard for mobile text input","authors":"Silpol Sukswai, K. Piromsopa","doi":"10.1109/JCSSE.2011.5930119","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930119","url":null,"abstract":"We propose Conslide, a new Thai input method for compact mobile devices. To address the complexity of Thai language, our design adopts drawing approach for text input. This results in a smaller keyboard (more area for applications). With appropriate layout, users can input words without lifting finger from the screen, hence the better efficiency. Empirical result shows that the average movement distance and minimal movement time required for each Thai word are comparable to those of the quasi-Kedmanee keyboards such as Droidsans Thai keyboard.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123432224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new objective visual fatigue measurement system by using a remote infrared camera 一种基于红外远红外相机的视觉疲劳测量系统
Jinman Kim, E. Lee, Jao Sang Lim
This paper presents a new objective visual fatigue measurement system by using one remote camera. In captured image, eye and pupil regions are sequentially detected using some image processing methods. Based on the pupil region, pupil size, pupil accommodation speed, blink frequency, and eye closed duration can be determined. Because more frequent blinks and slower pupil accommodation indicate an increased level of visual fatigue, our system can objectively measure visual fatigue. Also, since there is no need to wear any device, inconvenience may be minimized. Experimental results showed the blink detection accuracy was 98.9% and pupil localization error was 1.9%.
本文介绍了一种新的单摄像机视觉疲劳测量系统。在捕获的图像中,使用一些图像处理方法对眼睛和瞳孔区域进行顺序检测。根据瞳孔区域、瞳孔大小、瞳孔调节速度、眨眼频率和闭眼时间可以确定。因为更频繁的眨眼和更慢的瞳孔适应表明视觉疲劳程度的增加,我们的系统可以客观地测量视觉疲劳。此外,由于不需要佩戴任何设备,不便可以最小化。实验结果表明,眨眼检测准确率为98.9%,瞳孔定位误差为1.9%。
{"title":"A new objective visual fatigue measurement system by using a remote infrared camera","authors":"Jinman Kim, E. Lee, Jao Sang Lim","doi":"10.1109/JCSSE.2011.5930117","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930117","url":null,"abstract":"This paper presents a new objective visual fatigue measurement system by using one remote camera. In captured image, eye and pupil regions are sequentially detected using some image processing methods. Based on the pupil region, pupil size, pupil accommodation speed, blink frequency, and eye closed duration can be determined. Because more frequent blinks and slower pupil accommodation indicate an increased level of visual fatigue, our system can objectively measure visual fatigue. Also, since there is no need to wear any device, inconvenience may be minimized. Experimental results showed the blink detection accuracy was 98.9% and pupil localization error was 1.9%.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123005568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An improved bound for multiple source-sink linear network coding 一种改进的多源-汇线性网络编码界
Munin Eamopas, Jittat Fakcharoenphol
This paper considers the linear network coding problem when there are k independent source-sink pairs. The problem when k is not bounded, this problem is NP-hard. Recently Iwama, Nishimura, Peterson, Raymond, and Yamashita show that when k is fixed and the field F is fixed, the problem can be solved in polynomial time. One of their key lemmas shows that the number of vertices in the network performing the K encoding operations is at most |F|3k This paper improves the k bound exponentially to k2 |F|2k Since their algorithm's running time depends on this bound exponentially, our bound implies an improved running time.
研究了有k个独立源汇对时的线性网络编码问题。当k无界时,这个问题是np困难的。最近Iwama, Nishimura, Peterson, Raymond, and Yamashita证明当k固定且场F固定时,问题可以在多项式时间内解决。他们的一个关键引理表明,网络中执行K编码操作的顶点数最多为|F|3k。本文将K界指数地改进为k2 |F|2k,因为他们的算法的运行时间指数地依赖于这个界,我们的界暗示了一个改进的运行时间。
{"title":"An improved bound for multiple source-sink linear network coding","authors":"Munin Eamopas, Jittat Fakcharoenphol","doi":"10.1109/JCSSE.2011.5930078","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930078","url":null,"abstract":"This paper considers the linear network coding problem when there are k independent source-sink pairs. The problem when k is not bounded, this problem is NP-hard. Recently Iwama, Nishimura, Peterson, Raymond, and Yamashita show that when k is fixed and the field F is fixed, the problem can be solved in polynomial time. One of their key lemmas shows that the number of vertices in the network performing the K encoding operations is at most |F|3k This paper improves the k bound exponentially to k2 |F|2k Since their algorithm's running time depends on this bound exponentially, our bound implies an improved running time.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wi-Fi access point discovery system for mobile users 用于移动用户的Wi-Fi接入点发现系统
Yuto Nakai, Kohta Ohshima, Koji Tajima, M. Terada
Wi-Fi access provides a very convenient way for mobile terminals to connect the Internet. However, locating points where connections can be made is not always easy. In this paper, we propose a Neighbor Wi-Fi Access Point Advertisement System. The features of our system are as follows: (1) A personal access point function operates on mobile terminals that continuously detect and collect information on nearby WiFi access points (APs) within its radio detection range. (2) Detected and collected Wi-Fi AP information, such as locations and network names, are shared between mobile terminals in proximity with each other. (3) Neighbor Wi-Fi AP information can then be advertised to clients through their personal access points. In our system, a client is a mobile terminal that does not have access privileges for nearby APs. In such cases, clients will not connect to the Internet through the restricted APs; they will simply obtain information regarding APs that are available nearby, yet outside their normal detection range. We developed a prototype system and have confirmed the usability of its basic functions by experiment.
Wi-Fi接入为移动终端接入互联网提供了一种非常便捷的方式。然而,找到可以连接的点并不总是那么容易。本文提出了一种邻居Wi-Fi接入点通告系统。本系统的特点如下:(1)个人接入点功能在移动终端上运行,在其无线电探测范围内持续探测并收集附近WiFi接入点的信息。(2)检测和采集到的Wi-Fi AP位置、网络名称等信息在相邻的移动终端之间共享。(3)邻居Wi-Fi AP信息可以通过客户端的个人接入点发布到客户端。在我们的系统中,客户端是对附近ap没有访问权限的移动终端。在这种情况下,客户端不会通过受限制的ap连接到Internet;它们将简单地获取附近可用的ap的信息,但在其正常检测范围之外。我们开发了一个原型系统,并通过实验验证了其基本功能的可用性。
{"title":"Wi-Fi access point discovery system for mobile users","authors":"Yuto Nakai, Kohta Ohshima, Koji Tajima, M. Terada","doi":"10.1109/JCSSE.2011.5930097","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930097","url":null,"abstract":"Wi-Fi access provides a very convenient way for mobile terminals to connect the Internet. However, locating points where connections can be made is not always easy. In this paper, we propose a Neighbor Wi-Fi Access Point Advertisement System. The features of our system are as follows: (1) A personal access point function operates on mobile terminals that continuously detect and collect information on nearby WiFi access points (APs) within its radio detection range. (2) Detected and collected Wi-Fi AP information, such as locations and network names, are shared between mobile terminals in proximity with each other. (3) Neighbor Wi-Fi AP information can then be advertised to clients through their personal access points. In our system, a client is a mobile terminal that does not have access privileges for nearby APs. In such cases, clients will not connect to the Internet through the restricted APs; they will simply obtain information regarding APs that are available nearby, yet outside their normal detection range. We developed a prototype system and have confirmed the usability of its basic functions by experiment.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123979058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Passive monitoring method for analysis Quantum Key Distribution performance statistics 被动监控方法分析量子密钥分配性能统计
Montida Pattaranantaku, Kanyalag Phodong, C. Issariyapat, P. Sangwongngam, R. Kongkachandra
This paper emphasizes the development of network monitoring appliance for monitoring network health, network resources and for further analysis of Quantum Key Distribution (QKD) performance where QKD devices located in different locations. It provides tools and services for end users who enable to view real time QKD performance statistics on the network. As it is very important to keep track of each key parameter involved with device status and QKD temporal evolution to perform traffic analysis and to determine the error probability during the phase of key generation. The system has been developed from a Network Health Analysis and Monitoring system (NetHAM) [1] implemented under an open source platform, offered more features both graphical statistics display and user friendly interface. In addition, this paper proposed a conformance passive monitoring method to analysis the QKD performance. The log from QKD layer has been converted to well organized database format before storing it in the database server. The relevant information will be invoked for network topology display, link and device status that would be helpful for end user can easily view the QKD performance with frequently updated through the dynamic graphical display and for further historical data analysis.
本文强调了网络监控设备的开发,用于监控网络健康状况、网络资源以及进一步分析量子密钥分发(QKD)设备位于不同位置时的性能。它为终端用户提供工具和服务,使用户能够查看网络上的实时QKD性能统计数据。因为跟踪与设备状态和QKD时间演化相关的每个密钥参数对于执行流量分析和确定密钥生成阶段的错误概率非常重要。该系统是在一个开源平台下实现的网络健康分析与监控系统(NetHAM)[1]基础上开发的,提供了更多的功能,包括图形统计显示和用户友好的界面。此外,本文还提出了一种一致性被动监控方法来分析QKD性能。来自QKD层的日志在存储到数据库服务器之前已被转换为组织良好的数据库格式。相关信息将被调用用于网络拓扑显示、链路和设备状态,这将有助于最终用户可以通过动态图形显示方便地查看QKD性能并经常更新,并进行进一步的历史数据分析。
{"title":"Passive monitoring method for analysis Quantum Key Distribution performance statistics","authors":"Montida Pattaranantaku, Kanyalag Phodong, C. Issariyapat, P. Sangwongngam, R. Kongkachandra","doi":"10.1109/JCSSE.2011.5930091","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930091","url":null,"abstract":"This paper emphasizes the development of network monitoring appliance for monitoring network health, network resources and for further analysis of Quantum Key Distribution (QKD) performance where QKD devices located in different locations. It provides tools and services for end users who enable to view real time QKD performance statistics on the network. As it is very important to keep track of each key parameter involved with device status and QKD temporal evolution to perform traffic analysis and to determine the error probability during the phase of key generation. The system has been developed from a Network Health Analysis and Monitoring system (NetHAM) [1] implemented under an open source platform, offered more features both graphical statistics display and user friendly interface. In addition, this paper proposed a conformance passive monitoring method to analysis the QKD performance. The log from QKD layer has been converted to well organized database format before storing it in the database server. The relevant information will be invoked for network topology display, link and device status that would be helpful for end user can easily view the QKD performance with frequently updated through the dynamic graphical display and for further historical data analysis.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129537128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An educational game for learning wind and gravity theory on iOS: Drop donuts 关于学习风和重力理论的iOS教育游戏:Drop donuts
Kawin Wattanatchariya, Satapond Chuchuaikam, N. Dejdumrong
An educational game for learning gravity theory is developed on iOS technology, called "Drop Donuts". The goal of this game is to feed a monster on the island at the bottom of the screen by dropping donuts. While the wind speed and direction keeps changing all the time, a donut is dropped. Flowing leaves will be a hint to the players in the determination of the wind direction and speed. This will affect to the donut in following away. This game is developed using a tool called "GameSalad". The result is an edutainment game which provides both fun and physics concept. Furthermore, the wind simulation is implemented and deployed onto iPhone or iPad devices.
一款学习重力理论的教育游戏是基于iOS技术开发的,名为“Drop Donuts”。这款游戏的目标是通过扔甜甜圈来喂养屏幕底部岛屿上的怪物。当风速和风向一直在变化时,甜甜圈就会掉下来。在确定风向和风速时,飘动的树叶会给玩家一个提示。这将影响到接下来的甜甜圈。这个游戏是使用一个叫做“GameSalad”的工具开发的。结果便是一款兼具趣味性和物理概念的寓教于乐游戏。此外,在iPhone或iPad设备上实现并部署了风模拟。
{"title":"An educational game for learning wind and gravity theory on iOS: Drop donuts","authors":"Kawin Wattanatchariya, Satapond Chuchuaikam, N. Dejdumrong","doi":"10.1109/JCSSE.2011.5930152","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930152","url":null,"abstract":"An educational game for learning gravity theory is developed on iOS technology, called \"Drop Donuts\". The goal of this game is to feed a monster on the island at the bottom of the screen by dropping donuts. While the wind speed and direction keeps changing all the time, a donut is dropped. Flowing leaves will be a hint to the players in the determination of the wind direction and speed. This will affect to the donut in following away. This game is developed using a tool called \"GameSalad\". The result is an edutainment game which provides both fun and physics concept. Furthermore, the wind simulation is implemented and deployed onto iPhone or iPad devices.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124023564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1