首页 > 最新文献

2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

英文 中文
Transient Fault Tolerance for ccNUMA Architecture ccNUMA体系结构的瞬态容错
Xingjun Zhang, Endong Wang, F. Tang, Meishun Yang, Hengyi Wei, Xiaoshe Dong
Transient fault is a critical concern in the reliability of microprocessors system. The software fault tolerance is more flexible and lower cost than the hardware fault tolerance. And also, as architectural trends point toward multi core designs, there is substantial interest in adapting parallel and redundancy hardware resources for transient fault tolerance. The paper proposes a process-level fault tolerance technique, a software centric approach, which efficiently schedule and synchronize of redundancy processes with ccNUMA processors redundancy. So it can improve efficiency of redundancy processes running, and reduce time and space overhead. The paper focuses on the researching of redundancy processes error detection and handling method. A real prototype is implemented that is designed to be transparent to the application. The test results show that the system can timely detect soft errors of CPU and memory that cause the redundancy processes exception, and meanwhile ensure that the services of application is uninterrupted and delay shortly.
暂态故障是影响微处理器系统可靠性的关键问题。软件容错比硬件容错更灵活,成本更低。而且,随着架构趋势指向多核设计,人们对采用并行和冗余硬件资源来实现瞬态容错性非常感兴趣。本文提出了一种以软件为中心的进程级容错技术,以ccNUMA处理器的冗余度有效地调度和同步冗余进程。这样可以提高冗余进程的运行效率,减少时间和空间开销。本文重点研究了冗余过程的错误检测与处理方法。实现了一个对应用程序透明的真实原型。测试结果表明,该系统能够及时检测出导致冗余进程异常的CPU和内存软错误,同时保证应用程序的业务不中断、时延短。
{"title":"Transient Fault Tolerance for ccNUMA Architecture","authors":"Xingjun Zhang, Endong Wang, F. Tang, Meishun Yang, Hengyi Wei, Xiaoshe Dong","doi":"10.1109/IMIS.2012.188","DOIUrl":"https://doi.org/10.1109/IMIS.2012.188","url":null,"abstract":"Transient fault is a critical concern in the reliability of microprocessors system. The software fault tolerance is more flexible and lower cost than the hardware fault tolerance. And also, as architectural trends point toward multi core designs, there is substantial interest in adapting parallel and redundancy hardware resources for transient fault tolerance. The paper proposes a process-level fault tolerance technique, a software centric approach, which efficiently schedule and synchronize of redundancy processes with ccNUMA processors redundancy. So it can improve efficiency of redundancy processes running, and reduce time and space overhead. The paper focuses on the researching of redundancy processes error detection and handling method. A real prototype is implemented that is designed to be transparent to the application. The test results show that the system can timely detect soft errors of CPU and memory that cause the redundancy processes exception, and meanwhile ensure that the services of application is uninterrupted and delay shortly.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133264129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrating Internet of Things and Cloud Computing for Health Services Provisioning: The Virtual Cloud Carer Project 整合物联网和云计算的医疗服务供应:虚拟云护理项目
Diego Gachet, M. Rodríguez, Fernando Aparicio, Víctor Padrón
The demographic and social changes are causing a gradual increase of the population in situation of dependency. The main concern of the elder people is their health and its consequences in terms of dependence and also is the primary cause of suffering and self-rated ill health. Since elder people have different health problems that the rest of the population, we need a deep change in national's health policy to get adapted to population aging. This paper describes the preliminary advances of "Virtual Cloud Carer" (VCC), a Spanish national R&D project, whose primary purpose is the creation of new health services for dependents and chronics elder lies, using technologies associated with internet of things and cloud computing.
人口和社会的变化使处于依赖状态的人口逐渐增加。老年人的主要关切是他们的健康及其在依赖方面的后果,这也是痛苦和自认为健康不佳的主要原因。由于老年人有不同于其他人群的健康问题,我们需要对国家的健康政策进行深刻的改变,以适应人口老龄化。本文描述了“虚拟云护理者”(VCC)的初步进展,这是一个西班牙国家研发项目,其主要目的是利用与物联网和云计算相关的技术,为受赡养者和慢性老年人创造新的健康服务。
{"title":"Integrating Internet of Things and Cloud Computing for Health Services Provisioning: The Virtual Cloud Carer Project","authors":"Diego Gachet, M. Rodríguez, Fernando Aparicio, Víctor Padrón","doi":"10.1109/IMIS.2012.25","DOIUrl":"https://doi.org/10.1109/IMIS.2012.25","url":null,"abstract":"The demographic and social changes are causing a gradual increase of the population in situation of dependency. The main concern of the elder people is their health and its consequences in terms of dependence and also is the primary cause of suffering and self-rated ill health. Since elder people have different health problems that the rest of the population, we need a deep change in national's health policy to get adapted to population aging. This paper describes the preliminary advances of \"Virtual Cloud Carer\" (VCC), a Spanish national R&D project, whose primary purpose is the creation of new health services for dependents and chronics elder lies, using technologies associated with internet of things and cloud computing.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131290368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Web of Things as a Product Improvement tool: Furniture as Case Study 物联网作为产品改进工具:家具案例研究
Andrés L. Bleda, Rafael Maestre, Guadalupe Santa, A. Jara, A. Gómez-Skarmeta
Sensors integrated within a product can provide lots of information about how the product is used and its status. Easy to extract information, such as hours used per day, temperature or humidity could be very valuable to the manufacturer in order to improve its product for real use. The manufacturer may realize that his/her initial estimations do not match reality and may decide to select different materials or design based on real data. For non-technological products the integration of sensors is not trivial and has not been analyzed prior to this work. The selection of suitable sensors is critical in order to achieve an accurate description about product use. This paper analyzes this problem focusing on a furniture product, more specifically a sofa, as a case study of a non-technological product. First, we compare different kinds of suitable sensors in relation to furniture integration, how good they describe the product usage and other important variables such as material degradation. We later describe the experiments that have been used to validate the previous assumptions. The experimental results summarize the usefulness and accuracy of each sensor data for describing the product use and/or degradation. Finally, the paper proposes an architecture for a complete "web of things" system capable of gathering the information from the WSN and sending it to a remote server. This architecture has been implemented with a ZigBee WSN and a coordinator node with Ethernet connectivity.
集成在产品中的传感器可以提供关于产品如何使用及其状态的大量信息。易于提取的信息,例如每天使用的小时数,温度或湿度对于制造商来说非常有价值,以便改进其产品以供实际使用。制造商可能会意识到他/她的初步估计与现实不符,并可能根据实际数据决定选择不同的材料或设计。对于非技术产品,传感器的集成不是微不足道的,在此工作之前没有分析过。为了实现对产品使用的准确描述,选择合适的传感器至关重要。本文以一个家具产品,更具体地说是一个沙发,作为一个非技术产品的案例来分析这个问题。首先,我们比较了与家具集成相关的不同类型的合适传感器,它们如何很好地描述产品使用和其他重要变量,如材料降解。稍后我们将描述用于验证先前假设的实验。实验结果总结了描述产品使用和/或退化的每个传感器数据的有用性和准确性。最后,本文提出了一个完整的“物联网”系统架构,该系统能够从WSN收集信息并将其发送到远程服务器。该体系结构已通过ZigBee WSN和具有以太网连接的协调器节点实现。
{"title":"Web of Things as a Product Improvement tool: Furniture as Case Study","authors":"Andrés L. Bleda, Rafael Maestre, Guadalupe Santa, A. Jara, A. Gómez-Skarmeta","doi":"10.1109/IMIS.2012.111","DOIUrl":"https://doi.org/10.1109/IMIS.2012.111","url":null,"abstract":"Sensors integrated within a product can provide lots of information about how the product is used and its status. Easy to extract information, such as hours used per day, temperature or humidity could be very valuable to the manufacturer in order to improve its product for real use. The manufacturer may realize that his/her initial estimations do not match reality and may decide to select different materials or design based on real data. For non-technological products the integration of sensors is not trivial and has not been analyzed prior to this work. The selection of suitable sensors is critical in order to achieve an accurate description about product use. This paper analyzes this problem focusing on a furniture product, more specifically a sofa, as a case study of a non-technological product. First, we compare different kinds of suitable sensors in relation to furniture integration, how good they describe the product usage and other important variables such as material degradation. We later describe the experiments that have been used to validate the previous assumptions. The experimental results summarize the usefulness and accuracy of each sensor data for describing the product use and/or degradation. Finally, the paper proposes an architecture for a complete \"web of things\" system capable of gathering the information from the WSN and sending it to a remote server. This architecture has been implemented with a ZigBee WSN and a coordinator node with Ethernet connectivity.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Application-Aware Virtual Machine Placement in Data Centers 数据中心中应用感知的虚拟机布局
Fei Song, Daochao Huang, Huachun Zhou, I. You
Based on the convex optimization theory, the energy-efficient and scalability problems of modern data centers are studied. Then a novel application-aware virtual machine (VM) placement algorithm is proposed to cope with these problems. Firstly, the definition of VM placement fairness and utility function are given, and the basic algorithm of VM placement which fulfills server constraints of physical machines is con-ducted. Secondly, we formulate the VM placement as an optimization problem. A two-tier algorithm that efficiently solves the VM placement problem in large scale was designed. Comparing to existing methods, we illustrate the performance improvement such as reducing the number of physical machines efficiently, decreasing communication distance between VMs, improving energy-efficient and scalability of data centers.
基于凸优化理论,研究了现代数据中心的节能和可扩展性问题。针对这些问题,提出了一种新的应用感知虚拟机(VM)布局算法。首先,给出了虚拟机放置公平性和效用函数的定义,给出了满足物理机服务器约束的虚拟机放置的基本算法;其次,我们将虚拟机放置表述为一个优化问题。设计了一种有效解决大规模虚拟机放置问题的两层算法。通过与现有方法的比较,说明了该方法在有效减少物理机数量、缩短虚拟机之间的通信距离、提高数据中心的能效和可扩展性等方面的性能改进。
{"title":"Application-Aware Virtual Machine Placement in Data Centers","authors":"Fei Song, Daochao Huang, Huachun Zhou, I. You","doi":"10.1109/IMIS.2012.119","DOIUrl":"https://doi.org/10.1109/IMIS.2012.119","url":null,"abstract":"Based on the convex optimization theory, the energy-efficient and scalability problems of modern data centers are studied. Then a novel application-aware virtual machine (VM) placement algorithm is proposed to cope with these problems. Firstly, the definition of VM placement fairness and utility function are given, and the basic algorithm of VM placement which fulfills server constraints of physical machines is con-ducted. Secondly, we formulate the VM placement as an optimization problem. A two-tier algorithm that efficiently solves the VM placement problem in large scale was designed. Comparing to existing methods, we illustrate the performance improvement such as reducing the number of physical machines efficiently, decreasing communication distance between VMs, improving energy-efficient and scalability of data centers.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116973988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Requirement-Based Socket API for a Transition to Future Internet Architectures 面向未来互联网架构过渡的基于需求的套接字API
A. Siddiqui, P. Müller
The existing application programming interface (API) between applications and the network architecture is one reason that it is hard to deploy novel protocols into the network architecture. Coupling between applications and underlying protocols makes it almost impossible to change one without changing the other. Coupling can be loosened or resolved by not involving applications in protocols implementation details but, only in functionality necessary to establish a communication. This way underlying network can deploy novel or updated implementations of a functionality without needing to change the applications. Using intermediate abstraction layers is an approach to break the dependency between applications and network protocols. One of the major goals in future internet architectures is to be flexible enough to adapt to application's requirements. In this paper, a requirement-based API is presented as an abstraction layer to make applications independent of network mechanisms, which also helps in the transition to future internet architectures.
应用程序和网络体系结构之间现有的应用程序编程接口(API)是难以将新协议部署到网络体系结构中的原因之一。应用程序和底层协议之间的耦合使得改变其中一个而不改变另一个几乎是不可能的。通过不让应用程序参与协议实现细节,而只涉及建立通信所需的功能,可以放松或解决耦合。通过这种方式,底层网络可以部署新的或更新的功能实现,而无需更改应用程序。使用中间抽象层是一种打破应用程序和网络协议之间依赖关系的方法。未来互联网架构的主要目标之一是足够灵活以适应应用程序的需求。在本文中,基于需求的API作为一个抽象层被提出,使应用程序独立于网络机制,这也有助于向未来的互联网架构过渡。
{"title":"A Requirement-Based Socket API for a Transition to Future Internet Architectures","authors":"A. Siddiqui, P. Müller","doi":"10.1109/IMIS.2012.117","DOIUrl":"https://doi.org/10.1109/IMIS.2012.117","url":null,"abstract":"The existing application programming interface (API) between applications and the network architecture is one reason that it is hard to deploy novel protocols into the network architecture. Coupling between applications and underlying protocols makes it almost impossible to change one without changing the other. Coupling can be loosened or resolved by not involving applications in protocols implementation details but, only in functionality necessary to establish a communication. This way underlying network can deploy novel or updated implementations of a functionality without needing to change the applications. Using intermediate abstraction layers is an approach to break the dependency between applications and network protocols. One of the major goals in future internet architectures is to be flexible enough to adapt to application's requirements. In this paper, a requirement-based API is presented as an abstraction layer to make applications independent of network mechanisms, which also helps in the transition to future internet architectures.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129729838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Improved AODV Routing Protocol to Cope with High Overhead in High Mobility MANETs 改进的AODV路由协议以应对高移动manet中的高开销
Mohannad Ayash, M. Mikki, Kangbin Yim
Ad-hoc On-demand Distance Vector (AODV) routing protocol is the most popular routing protocol for mobile ad-hoc networks (MANETs). This paper enhances AODV protocol by minimizing its control messages overhead. Enhancements include developing two improved versions of AODV protocol. These two versions use Global Positioning System (GPS) to limit the routing discovery control messages. The first version (AODV-LAR) is a variation of the Location Aided Routing (LAR) protocol. The second version (AODV-Line) limits nodes participating in route discovery between source and destination based on their distance from the line connecting source and destination. We evaluate performance of the two proposed protocols using two simulation scenarios. The simulation was done using JIST/SWANS simulator. The results show that the two proposed protocols outperform the original AODV, where the results show a significant reduction of control overhead and delay compared to the original AODV. Results also show that the delivery ratio in the proposed protocols is comparable to the delivery ratio in the original AODV.
自组织按需距离矢量(AODV)路由协议是移动自组织网络(manet)中最流行的路由协议。本文通过最小化控制消息开销来增强AODV协议。增强功能包括开发AODV协议的两个改进版本。这两个版本使用全球定位系统(GPS)来限制路由发现控制消息。第一个版本(AODV-LAR)是位置辅助路由(LAR)协议的一个变体。第二个版本(AODV-Line)根据节点与连接源和目的的线路的距离来限制参与源和目的之间路由发现的节点。我们使用两个仿真场景来评估两个提议协议的性能。采用JIST/SWANS模拟器进行仿真。结果表明,这两种协议的性能都优于原始AODV,与原始AODV相比,控制开销和延迟显著降低。结果还表明,所提出协议的传输率与原始AODV的传输率相当。
{"title":"Improved AODV Routing Protocol to Cope with High Overhead in High Mobility MANETs","authors":"Mohannad Ayash, M. Mikki, Kangbin Yim","doi":"10.1109/IMIS.2012.44","DOIUrl":"https://doi.org/10.1109/IMIS.2012.44","url":null,"abstract":"Ad-hoc On-demand Distance Vector (AODV) routing protocol is the most popular routing protocol for mobile ad-hoc networks (MANETs). This paper enhances AODV protocol by minimizing its control messages overhead. Enhancements include developing two improved versions of AODV protocol. These two versions use Global Positioning System (GPS) to limit the routing discovery control messages. The first version (AODV-LAR) is a variation of the Location Aided Routing (LAR) protocol. The second version (AODV-Line) limits nodes participating in route discovery between source and destination based on their distance from the line connecting source and destination. We evaluate performance of the two proposed protocols using two simulation scenarios. The simulation was done using JIST/SWANS simulator. The results show that the two proposed protocols outperform the original AODV, where the results show a significant reduction of control overhead and delay compared to the original AODV. Results also show that the delivery ratio in the proposed protocols is comparable to the delivery ratio in the original AODV.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127047545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A Terrain-Awareness Based Mobility Model with Markov Random Disturbance for Tactical MANET 基于地形感知的战术机动网络马尔可夫随机扰动机动模型
Bowen Deng, Yujia Zhai, Yue Wang, Jinhai Huo, Jian Yuan, I. You
Terrain factors may have significant impacts on the dynamic characteristics of mobile nodes, especially in tactical MANET. However, most of the existing mobility models are probability models, which do not catch real tactical feature behaviors such as random disturbance and bypass processes. In this work, we establish a formalized process model to imitate the impact of small-scale terrain factors on the movement of nodes. In the model, we use a linear time invariant system to generate a colored noise with first-order Markov property, as a tiny random disturbance in the acceleration. Furthermore, we propose a terrain-awareness based bypass strategy to enable the nodes to perceive and bypass the area of obstacles. This strategy imitates the reaction of nodes when the nodes face large-scale terrain factors such as lakes and hills. The mobility traces show that our model realistically presents the impacts of terrain factors on the mobility of nodes. And parameters in our process model can be configured flexibly for different tactical scenarios.
地形因素可能对移动节点的动态特性产生重大影响,特别是在战术机动网络中。然而,现有的机动性模型大多是概率模型,没有捕捉到真实的战术特征行为,如随机干扰和旁路过程。在这项工作中,我们建立了一个形式化的过程模型来模拟小尺度地形因素对节点运动的影响。在模型中,我们使用线性时不变系统产生一阶马尔可夫性质的有色噪声,作为加速度中的微小随机扰动。此外,我们提出了一种基于地形感知的绕过策略,使节点能够感知和绕过障碍物区域。这种策略模仿节点在面对湖泊、山丘等大规模地形因素时的反应。迁移轨迹表明,我们的模型真实地反映了地形因素对节点迁移的影响。我们的流程模型中的参数可以根据不同的战术场景灵活配置。
{"title":"A Terrain-Awareness Based Mobility Model with Markov Random Disturbance for Tactical MANET","authors":"Bowen Deng, Yujia Zhai, Yue Wang, Jinhai Huo, Jian Yuan, I. You","doi":"10.1109/IMIS.2012.90","DOIUrl":"https://doi.org/10.1109/IMIS.2012.90","url":null,"abstract":"Terrain factors may have significant impacts on the dynamic characteristics of mobile nodes, especially in tactical MANET. However, most of the existing mobility models are probability models, which do not catch real tactical feature behaviors such as random disturbance and bypass processes. In this work, we establish a formalized process model to imitate the impact of small-scale terrain factors on the movement of nodes. In the model, we use a linear time invariant system to generate a colored noise with first-order Markov property, as a tiny random disturbance in the acceleration. Furthermore, we propose a terrain-awareness based bypass strategy to enable the nodes to perceive and bypass the area of obstacles. This strategy imitates the reaction of nodes when the nodes face large-scale terrain factors such as lakes and hills. The mobility traces show that our model realistically presents the impacts of terrain factors on the mobility of nodes. And parameters in our process model can be configured flexibly for different tactical scenarios.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129080978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Biological Modelling in Semantic Data Analysis Systems 语义数据分析系统中的生物建模
L. Ogiela
This publication presents using modelling methods based on biological aspects by DNA cryptography to semantically analyse data. The solutions proposed are illustrated with the example of selected E-UBIAS systems which analyse medical image data in combination with the identity analysis. The use of DNA cryptography and DNA code to analyse personal data makes it possible to unanimously assign analysed data to an individual at the personal identification stage. In this publication presents also the system with semantic analysis processes conducted based on semantic interpretation and cognitive processes allows the possible lesions that the person suffers from to be identified and authorized.
本出版物提出使用基于生物学方面的建模方法,通过DNA密码学对数据进行语义分析。本文以所选的E-UBIAS系统为例说明了所提出的解决方案,该系统结合身份分析对医学图像数据进行分析。使用DNA密码学和DNA代码来分析个人数据,可以在个人身份识别阶段一致地将分析的数据分配给个人。在本出版物中,还介绍了基于语义解释和认知过程进行的语义分析过程的系统,允许识别和授权该人遭受的可能的病变。
{"title":"Biological Modelling in Semantic Data Analysis Systems","authors":"L. Ogiela","doi":"10.1109/IMIS.2012.81","DOIUrl":"https://doi.org/10.1109/IMIS.2012.81","url":null,"abstract":"This publication presents using modelling methods based on biological aspects by DNA cryptography to semantically analyse data. The solutions proposed are illustrated with the example of selected E-UBIAS systems which analyse medical image data in combination with the identity analysis. The use of DNA cryptography and DNA code to analyse personal data makes it possible to unanimously assign analysed data to an individual at the personal identification stage. In this publication presents also the system with semantic analysis processes conducted based on semantic interpretation and cognitive processes allows the possible lesions that the person suffers from to be identified and authorized.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130593541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identifying Restricted-Faults in Multiprocessor Meshes under the PMC Diagnostic Model 基于PMC诊断模型的多处理器网格限制故障识别
Tzu-Liang Kung, Cheng-Kuan Lin, Jimmy J. M. Tan, Hon-Chan Chen, Hsing-Chung Chen
System-level fault identification is a key subject for maintaining the reliability of a multiprocessor interconnected system. As a popular network topology, meshes have various applications to real multiprocessor systems. In this paper, a system contains only restricted-faults if every of its fault-free units has at least one fault-free neighbor. Then this paper aims to study the method for identifying restricted-faults in a multiprocessor mesh. The proposed method relies on an easily constructed architecture, and its time complexity is just proportional to the total number of processors due to the fact that multiprocessor meshes have a constant degree.
系统级故障识别是保证多处理器互联系统可靠性的关键问题。作为一种流行的网络拓扑结构,网格在实际的多处理器系统中有着多种应用。在本文中,当系统的每个无故障单元至少有一个无故障邻居时,系统才包含有限制故障。在此基础上,研究了多处理器网格中限制故障的识别方法。该方法依赖于易于构建的体系结构,由于多处理器网格具有恒定度,其时间复杂度仅与处理器总数成正比。
{"title":"Identifying Restricted-Faults in Multiprocessor Meshes under the PMC Diagnostic Model","authors":"Tzu-Liang Kung, Cheng-Kuan Lin, Jimmy J. M. Tan, Hon-Chan Chen, Hsing-Chung Chen","doi":"10.1109/IMIS.2012.87","DOIUrl":"https://doi.org/10.1109/IMIS.2012.87","url":null,"abstract":"System-level fault identification is a key subject for maintaining the reliability of a multiprocessor interconnected system. As a popular network topology, meshes have various applications to real multiprocessor systems. In this paper, a system contains only restricted-faults if every of its fault-free units has at least one fault-free neighbor. Then this paper aims to study the method for identifying restricted-faults in a multiprocessor mesh. The proposed method relies on an easily constructed architecture, and its time complexity is just proportional to the total number of processors due to the fact that multiprocessor meshes have a constant degree.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130635307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Search System for Protecting Search Word 一种保护检索词的新型检索系统
Kyungroul Lee, Eun-Ae Cho, Kangbin Yim
The rate of growth to share diverse information between users is increasing in the market of current search engine systems. However, in spite of this development, a user inputted search word is not protected, and when it is utilized by a third party for malicious purposes, this situation can cause critical damages. Therefore, in this paper, we analyze possible security threats when the search word is exposed by the third party. Also, we propose a novel search system protecting the search words using a hash operation method, and prove a security satisfaction based on the analyzed security threats.
在当前的搜索引擎市场中,用户之间信息共享的增长速度越来越快。然而,尽管有了这样的发展,用户输入的搜索词并没有受到保护,当它被第三方恶意利用时,这种情况可能会造成严重损害。因此,在本文中,我们分析了搜索词被第三方暴露时可能存在的安全威胁。在此基础上,提出了一种利用哈希运算方法保护搜索词的新型搜索系统,并在分析安全威胁的基础上证明了其安全性。
{"title":"A Novel Search System for Protecting Search Word","authors":"Kyungroul Lee, Eun-Ae Cho, Kangbin Yim","doi":"10.1109/IMIS.2012.197","DOIUrl":"https://doi.org/10.1109/IMIS.2012.197","url":null,"abstract":"The rate of growth to share diverse information between users is increasing in the market of current search engine systems. However, in spite of this development, a user inputted search word is not protected, and when it is utilized by a third party for malicious purposes, this situation can cause critical damages. Therefore, in this paper, we analyze possible security threats when the search word is exposed by the third party. Also, we propose a novel search system protecting the search words using a hash operation method, and prove a security satisfaction based on the analyzed security threats.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1