首页 > 最新文献

International Journal of Software Engineering and Computer Systems最新文献

英文 中文
Bitcoin and Blockchain: Characteristics, Links and Implicit Potential for People and Markets 比特币和区块链:人与市场的特征、联系和隐含潜力
Pub Date : 2019-07-27 DOI: 10.15344/2456-4451/2019/149
Sílvia C. Fernandes
Named as the currency that would lead the monetary revolution, Bitcoin allows financial transactions without intermediation of banks that often charge high rates and are conducive to corruption threats. In Bitcoin, the intermediary is eliminated and with it its weaknesses. This perspective responds to the influence that corruption and mismanagement of banks and governments have on the economy (e.g. inflation).
比特币被称为将引领货币革命的货币,它允许在没有银行中介的情况下进行金融交易,而银行往往收取高额利率,有利于腐败威胁。在比特币中,中介被消除了,它的弱点也随之消失。这一观点回应了银行和政府的腐败和管理不善对经济的影响(例如通货膨胀)。
{"title":"Bitcoin and Blockchain: Characteristics, Links and Implicit Potential for People and Markets","authors":"Sílvia C. Fernandes","doi":"10.15344/2456-4451/2019/149","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/149","url":null,"abstract":"Named as the currency that would lead the monetary revolution, Bitcoin allows financial transactions without intermediation of banks that often charge high rates and are conducive to corruption threats. In Bitcoin, the intermediary is eliminated and with it its weaknesses. This perspective responds to the influence that corruption and mismanagement of banks and governments have on the economy (e.g. inflation).","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79282979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alzheimer's Disease: New Challenges for Speech Analysis 阿尔茨海默病:语音分析的新挑战
Pub Date : 2019-06-29 DOI: 10.15344/2456-4451/2019/147
J. B. Alonso, M. L. B. Pulido
One of the first AD symptoms is memory loss, as well as others as language difficulties or temporal and spatial disorientation. In more advanced stages, those skills for carrying out the daily tasks or, even, basic bodily functions such as walking or swallowing [1], decrease or disappear. In any case, when the first symptoms are clear and subsequently diagnosed, the damage produced is already irreparable and chronic. Today, the diagnosis process as a screening method is limited since it is long in time, expensive and highly invasive.
阿尔茨海默病的最初症状之一是记忆丧失,以及其他语言障碍或时间和空间定向障碍。在更高级的阶段,那些执行日常任务的技能,甚至是基本的身体功能,如行走或吞咽[1],会减少或消失。无论如何,当最初的症状很明显并随后被诊断出来时,所造成的损害已经是不可弥补的和慢性的。今天,诊断过程作为一种筛查方法是有限的,因为它的时间长,昂贵和高侵入性。
{"title":"Alzheimer's Disease: New Challenges for Speech Analysis","authors":"J. B. Alonso, M. L. B. Pulido","doi":"10.15344/2456-4451/2019/147","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/147","url":null,"abstract":"One of the first AD symptoms is memory loss, as well as others as language difficulties or temporal and spatial disorientation. In more advanced stages, those skills for carrying out the daily tasks or, even, basic bodily functions such as walking or swallowing [1], decrease or disappear. In any case, when the first symptoms are clear and subsequently diagnosed, the damage produced is already irreparable and chronic. Today, the diagnosis process as a screening method is limited since it is long in time, expensive and highly invasive.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76355237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Assessment of an Efficient Search and Realization Technique of the S-Box in the AES Cryptosystem AES密码系统中S-Box高效搜索与实现技术的性能评估
Pub Date : 2019-05-25 DOI: 10.15344/2456-4451/2019/146
M. Abd-El-Barr
The speed and area performance of the byte-substitution (S-Box) impose a correlated impact on the speed and area of the Advanced Encryption System (AES) cryptosystem. In this paper, we present an efficient realization technique of the S-Box in the AES cryptosystem. We start by classifying the S-Box byte-substitution design techniques. We then provide a brief coverage of the hardware, software, and hybrid S-Box realization techniques. We then present an efficient S-Box realization technique that replaces the search needed in the 16 ×16 S-Box by four simpler searches two of them can be conducted in parallel and in a way that reduces the final search into searching within a set consisting of only four 2×2 cells which in turn leads to a faster search strategy. We also provide a simple hardware to carry out the search. A performance comparison among five realization techniques is conducted. The comparison is based in terms of the area (A) and the delay (T). It is shown that the technique due to Bertoni is the fastest followed by the technique due to Abd-El-Barr. In terms of area, it was found out that the technique due to Abd-El-Barr consumes the least area followed by the technique due to Canright. The technique due to Abd-El-Barr achieves the best normalized O(AT2) where A is the area and T is the critical path delay.
字节替换(S-Box)的速度和面积性能对高级加密系统(AES)密码系统的速度和面积有相关的影响。本文提出了AES密码系统中S-Box的一种有效实现技术。我们首先对S-Box字节替换设计技术进行分类。然后,我们简要介绍了硬件、软件和混合S-Box实现技术。然后,我们提出了一种高效的S-Box实现技术,该技术将16个×16 S-Box中所需的搜索替换为四个更简单的搜索,其中两个可以并行进行,并且以一种将最终搜索减少到在仅由四个2×2单元格组成的集合中进行搜索的方式,从而导致更快的搜索策略。我们还提供了一个简单的硬件来进行搜索。对五种实现技术进行了性能比较。比较是基于面积(A)和延迟(T)。结果表明,由于Bertoni的技术是最快的,其次是由于Abd-El-Barr的技术。在面积方面,我们发现由于Abd-El-Barr的技术消耗的面积最小,其次是由于Canright的技术。由于Abd-El-Barr技术实现了最佳归一化O(AT2),其中A是面积,T是关键路径延迟。
{"title":"Performance Assessment of an Efficient Search and Realization Technique of the S-Box in the AES Cryptosystem","authors":"M. Abd-El-Barr","doi":"10.15344/2456-4451/2019/146","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/146","url":null,"abstract":"The speed and area performance of the byte-substitution (S-Box) impose a correlated impact on the speed and area of the Advanced Encryption System (AES) cryptosystem. In this paper, we present an efficient realization technique of the S-Box in the AES cryptosystem. We start by classifying the S-Box byte-substitution design techniques. We then provide a brief coverage of the hardware, software, and hybrid S-Box realization techniques. We then present an efficient S-Box realization technique that replaces the search needed in the 16 ×16 S-Box by four simpler searches two of them can be conducted in parallel and in a way that reduces the final search into searching within a set consisting of only four 2×2 cells which in turn leads to a faster search strategy. We also provide a simple hardware to carry out the search. A performance comparison among five realization techniques is conducted. The comparison is based in terms of the area (A) and the delay (T). It is shown that the technique due to Bertoni is the fastest followed by the technique due to Abd-El-Barr. In terms of area, it was found out that the technique due to Abd-El-Barr consumes the least area followed by the technique due to Canright. The technique due to Abd-El-Barr achieves the best normalized O(AT2) where A is the area and T is the critical path delay.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87596524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Message Forwarding Scheme with Epidemic Routing Considering the Number of Stopover Nodes in Delay Tolerant Network Environment 延迟容忍网络环境下考虑中途站节点数量的流行路由高效消息转发方案
Pub Date : 2019-04-25 DOI: 10.15344/2456-4451/2019/145
Yusuke Ishibayashi, S. Sugawara
This paper proposes an efficient message transmission method by direct short-range communications with mobile terminals based on epidemic routing. In a previous study, when a message packet arrives at its destination node, it floods the network with packets called “anti-packets,” and deletes packets with the same message in an effort to enhance the efficiency of the buffer memories of the other terminals. Because anti-packets are not issued until the message arrives at its destination, there is not an efficient termination process. In this paper, the timing to issue anti-packets is accelerated by observing the number of nodes that a message packets has gone through, allowing wasted message packets to be eliminated earlier. Computer simulations show that the proposed method improves the messagearrival rate and reduces the average time required for message arrival.
提出了一种基于流行路由的移动终端直接短距离通信的高效信息传输方法。在之前的一项研究中,当一个消息包到达其目标节点时,它会向网络中填充称为“反包”的数据包,并删除具有相同消息的数据包,以提高其他终端缓冲存储器的效率。因为直到消息到达目的地才发出反数据包,所以没有一个有效的终止过程。在本文中,通过观察消息数据包经过的节点数量来加速发送反数据包的时间,从而允许更早地消除浪费的消息数据包。计算机仿真结果表明,该方法提高了消息到达率,缩短了消息到达所需的平均时间。
{"title":"An Efficient Message Forwarding Scheme with Epidemic Routing Considering the Number of Stopover Nodes in Delay Tolerant Network Environment","authors":"Yusuke Ishibayashi, S. Sugawara","doi":"10.15344/2456-4451/2019/145","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/145","url":null,"abstract":"This paper proposes an efficient message transmission method by direct short-range communications with mobile terminals based on epidemic routing. In a previous study, when a message packet arrives at its destination node, it floods the network with packets called “anti-packets,” and deletes packets with the same message in an effort to enhance the efficiency of the buffer memories of the other terminals. Because anti-packets are not issued until the message arrives at its destination, there is not an efficient termination process. In this paper, the timing to issue anti-packets is accelerated by observing the number of nodes that a message packets has gone through, allowing wasted message packets to be eliminated earlier. Computer simulations show that the proposed method improves the messagearrival rate and reduces the average time required for message arrival.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90190696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Functional Angels and Quality Devils: Incorporating Quality Scenarios into Functional Scenarios for Software-intensive System Architecture 功能天使与质量魔鬼:将质量场景整合到软件密集型系统架构的功能场景中
Pub Date : 2019-04-04 DOI: 10.15344/2456-4451/2019/144
A. Tomer
Software architecture design is intended to propose a software-intensive architectural solution for a required system. As such, the architecture needs to address all the required functionality while satisfying all the required quality attributes, which are usually referred to as the non-functional requirements. Therefore, a major concern of the software architecture is its behavior, besides its structure. Softwareintensive system specifications tend to be functional in nature, focusing on its behavior, i.e. what is expected to be done by the system, whereas quality attributes, which usually describe other properties of the system (e.g. performance, availability, safety, etc.) are, in many cases, described in general terms, and sometimes even being overlooked. The immediate result is that the software architecture, both behavioral and structural, fails to address quality issues whose absence is discovered only in late stages of system verification, validation or operation. This paper introduces a two-phase process by which a software-intensive architecture is constructed, satisfying both functional and non-functional requirements. In the first phase an initial architecture is constructed, comprising its physical, functional, combined and behavioral views. In the second phase a systematic approach is introduced to discover overlooked quality attributes of a system which might be violated during its operational (functional) scenarios. In this approach, quality attributes play the role of "devil's advocates", challenging the functionality by suggesting what can go wrong while the system performs its functional scenarios. Such challenges yield two results: (1) new "quality scenarios", which describe how the system should behave in order to prohibit a fault from causing a failure, and (2) modifications to the entire architecture needed to support the newly-derived functionality. 1In common parlance, the term devil's advocate describes someone who, given a certain point of view, takes a position he or she does not necessarily agree with (or simply an alternative position from the accepted norm), for the sake of debate or to explore the thought further [Wikipedia]. Special Issue: Software Architecture
软件体系结构设计旨在为所需系统提出软件密集型体系结构解决方案。因此,体系结构需要处理所有必需的功能,同时满足所有必需的质量属性,这些属性通常被称为非功能需求。因此,除了它的结构之外,软件体系结构的主要关注点是它的行为。软件密集型的系统规范在本质上倾向于功能性的,关注于它的行为,即系统期望完成什么,而质量属性,通常描述系统的其他属性(例如性能,可用性,安全性等),在许多情况下,用一般术语描述,有时甚至被忽略。直接的结果是,软件架构,无论是行为上的还是结构上的,都无法解决质量问题,而这些问题只有在系统验证、确认或操作的后期才会被发现。本文介绍了一个两阶段的过程,通过该过程构建软件密集型体系结构,同时满足功能和非功能需求。在第一阶段,构建初始架构,包括物理视图、功能视图、组合视图和行为视图。在第二阶段,引入了一种系统的方法来发现在操作(功能)场景中可能违反的系统被忽视的质量属性。在这种方法中,质量属性扮演了“魔鬼拥护者”的角色,通过建议在系统执行其功能场景时可能出现的错误来挑战功能。这样的挑战产生了两个结果:(1)新的“质量场景”,它描述了系统应该如何行为以禁止错误导致失败,以及(2)对支持新派生功能所需的整个体系结构的修改。一般来说,魔鬼提倡者(devil's advocate)一词描述的是,在给定某种观点的情况下,为了辩论或进一步探索思想而采取他或她不一定同意的立场(或只是与公认的规范不同的立场)的人[维基百科]。特刊:软件架构
{"title":"Functional Angels and Quality Devils: Incorporating Quality Scenarios into Functional Scenarios for Software-intensive System Architecture","authors":"A. Tomer","doi":"10.15344/2456-4451/2019/144","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/144","url":null,"abstract":"Software architecture design is intended to propose a software-intensive architectural solution for a required system. As such, the architecture needs to address all the required functionality while satisfying all the required quality attributes, which are usually referred to as the non-functional requirements. Therefore, a major concern of the software architecture is its behavior, besides its structure. Softwareintensive system specifications tend to be functional in nature, focusing on its behavior, i.e. what is expected to be done by the system, whereas quality attributes, which usually describe other properties of the system (e.g. performance, availability, safety, etc.) are, in many cases, described in general terms, and sometimes even being overlooked. The immediate result is that the software architecture, both behavioral and structural, fails to address quality issues whose absence is discovered only in late stages of system verification, validation or operation. This paper introduces a two-phase process by which a software-intensive architecture is constructed, satisfying both functional and non-functional requirements. In the first phase an initial architecture is constructed, comprising its physical, functional, combined and behavioral views. In the second phase a systematic approach is introduced to discover overlooked quality attributes of a system which might be violated during its operational (functional) scenarios. In this approach, quality attributes play the role of \"devil's advocates\", challenging the functionality by suggesting what can go wrong while the system performs its functional scenarios. Such challenges yield two results: (1) new \"quality scenarios\", which describe how the system should behave in order to prohibit a fault from causing a failure, and (2) modifications to the entire architecture needed to support the newly-derived functionality. 1In common parlance, the term devil's advocate describes someone who, given a certain point of view, takes a position he or she does not necessarily agree with (or simply an alternative position from the accepted norm), for the sake of debate or to explore the thought further [Wikipedia]. Special Issue: Software Architecture","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"76 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83764630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transmission Performance Improvement by Non-Linear Distortion Noise Power Control in Multi-Band Systems 多波段系统非线性失真噪声功率控制提高传输性能
Pub Date : 2019-03-06 DOI: 10.15344/2456-4451/2019/143
S. Tomisato, Jumpei Onji, K. Uehara
This paper proposes a non-linear distortion noise power control method with bandwidth control for multiple frequency band transmission which simultaneously uses plural frequency bands in wireless communication systems. The control method employs clipping and filtering, and generates out-of-band noise reduction signals using a part of used signal bands to reduce harmful interference in a primary existing system which shares frequency bands with the multi-band system. The improvement of Signalto- Noise Ratios (SNRs) in the bands used by the primary system is evaluated by computer simulations. The simulation results show that the proposed method at the band use rate of 50 % can improve them by 15 dB at the receiving power ratio of -30 dB to the spectrum sharing multi-band system.
提出了一种多频带传输的带宽控制非线性失真噪声功率控制方法,该方法在无线通信系统中同时使用多个频带。该控制方法采用裁剪和滤波,利用部分已使用的信号频带产生带外降噪信号,以减少与多频带系统共享频带的主要现有系统中的有害干扰。通过计算机仿真对主系统所用频带的信噪比(SNRs)进行了评价。仿真结果表明,在频带利用率为50%的情况下,该方法对频谱共享多频带系统的接收功率比为-30 dB时提高了15 dB。
{"title":"Transmission Performance Improvement by Non-Linear Distortion Noise Power Control in Multi-Band Systems","authors":"S. Tomisato, Jumpei Onji, K. Uehara","doi":"10.15344/2456-4451/2019/143","DOIUrl":"https://doi.org/10.15344/2456-4451/2019/143","url":null,"abstract":"This paper proposes a non-linear distortion noise power control method with bandwidth control for multiple frequency band transmission which simultaneously uses plural frequency bands in wireless communication systems. The control method employs clipping and filtering, and generates out-of-band noise reduction signals using a part of used signal bands to reduce harmful interference in a primary existing system which shares frequency bands with the multi-band system. The improvement of Signalto- Noise Ratios (SNRs) in the bands used by the primary system is evaluated by computer simulations. The simulation results show that the proposed method at the band use rate of 50 % can improve them by 15 dB at the receiving power ratio of -30 dB to the spectrum sharing multi-band system.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"299 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77050402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PREDICTION OF TRAFFIC ACCIDENT SEVERITY USING DATA MINING TECHNIQUES IN IBB PROVINCE, YEMEN 利用数据挖掘技术预测也门ibb省交通事故严重程度
Pub Date : 2019-02-01 DOI: 10.15282/IJSECS.5.1.2019.6.0056
M. S. Hazaa, Redhwan M. A. Saad, Mohammed A. Alnaklani
Traffic accidents are the leading causes beyond death; it is the concern of most countries that strive for finding radical solutions to this problem. There are several methods used in the process of forecasting traffic accidents such as classification, assembly, association, etc. This paper surveyed the latest studies in the field of traffic accident prediction; the most important tools and algorithms were used in the prediction process such as Back- propagation Neural Networks and the decision tree. In addition, this paper proposed a model for predicting traffic accidents based on dataset obtained from the Directorate General of Traffic Statistics, Ibb, Yemen.
交通事故是除死亡以外的主要原因;这是大多数国家所关心的问题,它们努力寻求彻底解决这一问题的办法。在交通事故预测过程中,常用的方法有分类法、集合法、关联法等。本文综述了交通事故预测领域的最新研究进展;在预测过程中使用了最重要的工具和算法,如反向传播神经网络和决策树。此外,本文还提出了一个基于也门交通统计总局数据集的交通事故预测模型。
{"title":"PREDICTION OF TRAFFIC ACCIDENT SEVERITY USING DATA MINING TECHNIQUES IN IBB PROVINCE, YEMEN","authors":"M. S. Hazaa, Redhwan M. A. Saad, Mohammed A. Alnaklani","doi":"10.15282/IJSECS.5.1.2019.6.0056","DOIUrl":"https://doi.org/10.15282/IJSECS.5.1.2019.6.0056","url":null,"abstract":"Traffic accidents are the leading causes beyond death; it is the concern of most countries that strive for finding radical solutions to this problem. There are several methods used in the process of forecasting traffic accidents such as classification, assembly, association, etc. This paper surveyed the latest studies in the field of traffic accident prediction; the most important tools and algorithms were used in the prediction process such as Back- propagation Neural Networks and the decision tree. In addition, this paper proposed a model for predicting traffic accidents based on dataset obtained from the Directorate General of Traffic Statistics, Ibb, Yemen.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84428145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
AN EFFICIENT FAULT TOLERANCE MODEL FOR SINGLE AND MULTIFAULT IN MPLS NETWORKS 一种有效的MPLS网络单故障和多故障容错模型
Pub Date : 2019-02-01 DOI: 10.15282/IJSECS.5.1.2019.2.0052
Belal A. Al-fuhaidi, H. Asaad, Sadik A. M. Al-Taweel
The ever increasing demands for the performance improvement in Multiprotocol Label Switching (MPLS) network have motivated to develop a resistant MPLS network to the failures at link, node and software of the MPLS network devices. The occurrence fault at link degrades the network performance due to data packets loss. This paper proposes an efficient model for rerouting traffic in MPLS network when a single and multi-fault occur in working link based on the protection switching and rerouting algorithms. In this model three algorithms are developed for fast fault recovery in MPLS network based on ingress LSR, alert LSR and core LSR. The proposed model has been simulated using Network Simulator (NS2) version 2.34, simulation results show that the proposed model significantly improves the network performance such that eliminates packet disorder, reduces the packets loss, get better PDR, decreases end to end delay and enhance throughput. The proposed model has less space complexity compared to other methods that reached to 13.33% in single fault and 33.33% in multi-fault and has a fast recovery time compared to other methods.     Keywords: MPLS; Single-fault; Multi-fault; TAP; LSR
随着对多协议标签交换(MPLS)网络性能提高要求的不断提高,对MPLS网络设备的链路故障、节点故障和软件故障的抵抗成为发展MPLS网络的动力。链路发生故障,会导致数据包丢失,导致网络性能下降。本文提出了一种基于保护交换和重路由算法的MPLS网络中工作链路发生单故障和多故障时流量重路由的有效模型。在该模型中,提出了三种基于入口LSR、告警LSR和核心LSR的MPLS网络快速故障恢复算法。利用Network Simulator (NS2) 2.34版对该模型进行了仿真,仿真结果表明,该模型显著改善了网络性能,消除了数据包混乱,减少了数据包丢失,获得了更好的PDR,降低了端到端延迟,提高了吞吐量。与其他方法相比,该模型具有较低的空间复杂度,单故障和多故障的空间复杂度分别为13.33%和33.33%,恢复时间也较其他方法快。关键词:MPLS;单故障;故障;构成利用;光敏电阻
{"title":"AN EFFICIENT FAULT TOLERANCE MODEL FOR SINGLE AND MULTIFAULT IN MPLS NETWORKS","authors":"Belal A. Al-fuhaidi, H. Asaad, Sadik A. M. Al-Taweel","doi":"10.15282/IJSECS.5.1.2019.2.0052","DOIUrl":"https://doi.org/10.15282/IJSECS.5.1.2019.2.0052","url":null,"abstract":"The ever increasing demands for the performance improvement in Multiprotocol Label Switching (MPLS) network have motivated to develop a resistant MPLS network to the failures at link, node and software of the MPLS network devices. The occurrence fault at link degrades the network performance due to data packets loss. This paper proposes an efficient model for rerouting traffic in MPLS network when a single and multi-fault occur in working link based on the protection switching and rerouting algorithms. In this model three algorithms are developed for fast fault recovery in MPLS network based on ingress LSR, alert LSR and core LSR. The proposed model has been simulated using Network Simulator (NS2) version 2.34, simulation results show that the proposed model significantly improves the network performance such that eliminates packet disorder, reduces the packets loss, get better PDR, decreases end to end delay and enhance throughput. The proposed model has less space complexity compared to other methods that reached to 13.33% in single fault and 33.33% in multi-fault and has a fast recovery time compared to other methods.   \u0000  \u0000Keywords: MPLS; Single-fault; Multi-fault; TAP; LSR","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80207623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
COMPARATIVE ANALYSIS OF CLASSIFIERS FOR EDUCATION CASE STUDY 分类器在教育案例研究中的比较分析
Pub Date : 2019-02-01 DOI: 10.15282/ijsecs.5.1.2019.5.0055
Nurshahirah Abdul Malik, M. Othman, L. M. Yusuf
Recently, classification is becoming a very valuable tool where a large amount of data is used on a wide range of decisions for the education sector. Classification is a method that used to group data based on predetermined characteristics. It is utilized to classify the item as indicated by the features for the predefined set of classes. The main significance of classification is to classify data from large datasets to find patterns out of it. Nevertheless, it is very important to choose the best classification algorithm which is also called as the classifier. Therefore, this research aims to conduct comparative evaluation between four classifiers which are Deep Neural Network (DNN), Random Forest (RF), Support Vector Machine (SVM) and Decision Tree (DT). All these classifiers have its own efficiency and have an important role in identifying the set of populations based on the training datasets. To choose the best classifiers among the four classifiers, the classifiers performance is required to be evaluated based on the performance metrics. The performance metrics of these classifiers were determined using accuracy and sensitivity rates. This study used education case study on student’s performance data for two subjects, Mathematics and Portuguese from two Portugal secondary schools and data on the student's knowledge of Electrical DC Machines subject. After comparing the accuracy and sensitivity rates, DNN has the highest accuracy and sensitivity rate of classification and can be used to further the educationbased research in future.
最近,分类正在成为一个非常有价值的工具,其中大量的数据被用于教育部门的广泛决策。分类是一种基于预定特征对数据进行分组的方法。它用于根据预定义的类集的特征对项目进行分类。分类的主要意义是对大数据集中的数据进行分类,从中发现规律。然而,选择最好的分类算法,也就是分类器是非常重要的。因此,本研究旨在对深度神经网络(Deep Neural Network, DNN)、随机森林(Random Forest, RF)、支持向量机(Support Vector Machine, SVM)和决策树(Decision Tree, DT)四种分类器进行比较评价。所有这些分类器都有自己的效率,在识别基于训练数据集的总体集方面发挥着重要作用。为了在四个分类器中选择最佳分类器,需要根据性能指标对分类器的性能进行评估。这些分类器的性能指标是通过准确率和灵敏度来确定的。本研究采用教育案例研究,对葡萄牙两所中学学生数学和葡萄牙语两门科目的成绩数据和学生直流电机科目知识的数据进行研究。经过对准确率和灵敏度的比较,DNN具有最高的分类准确率和灵敏度,可以用于未来基于教育的研究。
{"title":"COMPARATIVE ANALYSIS OF CLASSIFIERS FOR EDUCATION CASE STUDY","authors":"Nurshahirah Abdul Malik, M. Othman, L. M. Yusuf","doi":"10.15282/ijsecs.5.1.2019.5.0055","DOIUrl":"https://doi.org/10.15282/ijsecs.5.1.2019.5.0055","url":null,"abstract":"Recently, classification is becoming a very valuable tool where a large amount of data is used on a wide range of decisions for the education sector. Classification is a method that used to group data based on predetermined characteristics. It is utilized to classify the item as indicated by the features for the predefined set of classes. The main significance of classification is to classify data from large datasets to find patterns out of it. Nevertheless, it is very important to choose the best classification algorithm which is also called as the classifier. Therefore, this research aims to conduct comparative evaluation between four classifiers which are Deep Neural Network (DNN), Random Forest (RF), Support Vector Machine (SVM) and Decision Tree (DT). All these classifiers have its own efficiency and have an important role in identifying the set of populations based on the training datasets. To choose the best classifiers among the four classifiers, the classifiers performance is required to be evaluated based on the performance metrics. The performance metrics of these classifiers were determined using accuracy and sensitivity rates. This study used education case study on student’s performance data for two subjects, Mathematics and Portuguese from two Portugal secondary schools and data on the student's knowledge of Electrical DC Machines subject. After comparing the accuracy and sensitivity rates, DNN has the highest accuracy and sensitivity rate of classification and can be used to further the educationbased research in future.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78068279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
BIOMETRIC BASED POINT OF SALE AUTHENTICATION SYSTEM 基于生物识别的销售点认证系统
Pub Date : 2019-02-01 DOI: 10.15282/IJSECS.5.1.2019.3.0053
O. Abikoye, G. K. Afolabi, T. O. Aro
Several problems are encountered by cardholders at the point of sale (POS) terminal, these include; inadequate security of automated teller machine (ATM) card through theft, not remembering personal identity number (PIN) and the problem of identifying cardholder as the owner of the card, these have caused delay process in transactions and also reduce the integrity of the POS machine. The existing POS machine uses PIN-Card as an authentication process in which the security can be easily breached. This paper proffers a solution to reduce the identified problems by applying a biometric system into POS machine. Iris scan was introduced at the authentication level of the existing POS machine. A system prototype was designed to imitate a typical PIN-card based POS system that used iris recognition to improve upon the security of the POS. The developed system demonstrated a two-tier architectural structure for recognition: the identification and verification module. The verification module which focused on the enrolment, normalization, localization, extraction of features and matching of iris images obtained from CASIA database. The experimental results showed that the developed system could significantly minimize cardholder fraud at the POS machine if not totally eradicated.
持卡人在销售点(POS)终端会遇到几个问题,包括;自动柜员机(ATM)卡的安全性不足,如被盗、不记得个人身份号码(PIN)以及识别持卡人为持卡人的问题,这些都造成了交易过程的延迟,也降低了POS机的完整性。现有的POS机使用PIN-Card作为身份验证过程,其安全性很容易被破坏。本文提出了一种将生物识别系统应用于POS机以减少识别问题的解决方案。在现有POS机的认证层引入虹膜扫描。设计了一个系统原型,模拟了一个典型的基于pin卡的POS系统,该系统使用虹膜识别来提高POS系统的安全性。开发的系统展示了识别的两层架构结构:身份识别和验证模块。验证模块主要对从CASIA数据库中获取的虹膜图像进行入组、归一化、定位、特征提取和匹配。实验结果表明,所开发的系统在不完全消除POS机持卡人欺诈的情况下,可以显著减少持卡人欺诈。
{"title":"BIOMETRIC BASED POINT OF SALE AUTHENTICATION SYSTEM","authors":"O. Abikoye, G. K. Afolabi, T. O. Aro","doi":"10.15282/IJSECS.5.1.2019.3.0053","DOIUrl":"https://doi.org/10.15282/IJSECS.5.1.2019.3.0053","url":null,"abstract":"Several problems are encountered by cardholders at the point of sale (POS) terminal, these include; inadequate security of automated teller machine (ATM) card through theft, not remembering personal identity number (PIN) and the problem of identifying cardholder as the owner of the card, these have caused delay process in transactions and also reduce the integrity of the POS machine. The existing POS machine uses PIN-Card as an authentication process in which the security can be easily breached. This paper proffers a solution to reduce the identified problems by applying a biometric system into POS machine. Iris scan was introduced at the authentication level of the existing POS machine. A system prototype was designed to imitate a typical PIN-card based POS system that used iris recognition to improve upon the security of the POS. The developed system demonstrated a two-tier architectural structure for recognition: the identification and verification module. The verification module which focused on the enrolment, normalization, localization, extraction of features and matching of iris images obtained from CASIA database. The experimental results showed that the developed system could significantly minimize cardholder fraud at the POS machine if not totally eradicated.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79817454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Software Engineering and Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1