首页 > 最新文献

2012 IEEE Conference on Open Systems最新文献

英文 中文
An encrypted trust-based routing protocol 加密的基于信任的路由协议
Pub Date : 2015-12-10 DOI: 10.1109/ICOS.2012.6417643
Youssef Gahi, M. Guennoun, Z. Guennoun, K. El-Khatib
The interest in trust-based routing protocols has grown with the advancements achieved in ad-hoc wireless networks. However, regardless of the many security approaches and trust metrics available, trust-based routing still faces some security challenges, especially with respect to privacy. In this paper, we propose a novel trust-based routing protocol based on a fully homomorphic encryption scheme. The new protocol allows nodes, which collaborate in a dynamic environment, to evaluate their knowledge on the trustworthiness of specific routes and securely share this knowledge.
随着自组织无线网络的进步,对基于信任的路由协议的兴趣也在增长。然而,尽管有许多可用的安全方法和信任度量,基于信任的路由仍然面临一些安全挑战,特别是在隐私方面。本文提出了一种基于全同态加密方案的基于信任的路由协议。新协议允许在动态环境中协作的节点对特定路由的可信度进行评估,并安全地共享这些知识。
{"title":"An encrypted trust-based routing protocol","authors":"Youssef Gahi, M. Guennoun, Z. Guennoun, K. El-Khatib","doi":"10.1109/ICOS.2012.6417643","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417643","url":null,"abstract":"The interest in trust-based routing protocols has grown with the advancements achieved in ad-hoc wireless networks. However, regardless of the many security approaches and trust metrics available, trust-based routing still faces some security challenges, especially with respect to privacy. In this paper, we propose a novel trust-based routing protocol based on a fully homomorphic encryption scheme. The new protocol allows nodes, which collaborate in a dynamic environment, to evaluate their knowledge on the trustworthiness of specific routes and securely share this knowledge.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129237665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Congestion and latency in symmetric interconnection topology 对称互连拓扑中的拥塞和延迟
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417616
T. O. Barayyan, Hanan Dakheel Al-Alwni, A. Azmi, R. Tuli
Interconnection network topologies are those networks which are used in parallel, distributed system or cluster system to provide the communication among multiple processors or nodes. Interconnection network topologies play a big rule in performance of the system. There are many issues regarding interconnection network topologies. In this paper, congestion and latency point of view have been discussed among three different topologies that are Mesh/Torus, Hypercube and Chordal Ring interconnection topology.
互连网络拓扑结构是指在并行、分布式或集群系统中用于提供多个处理器或节点之间通信的网络。互连网络拓扑结构对系统性能的影响很大。在互连网络拓扑方面存在许多问题。本文从拥塞和延迟的角度讨论了网格/环面互连拓扑、超立方体互连拓扑和弦环互连拓扑三种不同的拓扑结构。
{"title":"Congestion and latency in symmetric interconnection topology","authors":"T. O. Barayyan, Hanan Dakheel Al-Alwni, A. Azmi, R. Tuli","doi":"10.1109/ICOS.2012.6417616","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417616","url":null,"abstract":"Interconnection network topologies are those networks which are used in parallel, distributed system or cluster system to provide the communication among multiple processors or nodes. Interconnection network topologies play a big rule in performance of the system. There are many issues regarding interconnection network topologies. In this paper, congestion and latency point of view have been discussed among three different topologies that are Mesh/Torus, Hypercube and Chordal Ring interconnection topology.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114715715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On link availability probability of routing protocols for urban scenario in VANETs VANETs中城市场景下路由协议链路可用性概率研究
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417632
Sanjay Kumar, N. Javaid, Z. Yousuf, Haresh Kumar, Z. Khan, U. Qasim
This paper presents the link availability probability. We evaluate and compare the link availability probability for routing protocols; Ad hoc On-demand Distance vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) for different number of connections and node density. A novel contribution of this work is enhancement in existing parameters of routing protocols; AODV, DSR and FSR as MOD-AODV, MOD-DSR and MOD-FSR. From the results, we observe that MOD-DSR and DSR outperform MOD-AODV, AODV, MOD-OLSR and OLSR in terms of Packet Delivery Ratio (PDR), Average End-to End Delay (AE2ED), link availability probability at the cost of high value of Normalized Routing Overhead (NRO).
本文提出了链路可用性概率。我们评估和比较了路由协议的链路可用性概率;针对不同的连接数和节点密度,采用了自组织按需距离矢量(AODV)、动态源路由(DSR)和鱼眼状态路由(FSR)。该工作的一个新贡献是增强了现有路由协议的参数;AODV、DSR和FSR分别为MOD-AODV、MOD-DSR和MOD-FSR。结果表明,MOD-DSR和DSR在包投递率(PDR)、端到端平均延迟(AE2ED)、链路可用性概率方面优于MOD-AODV、AODV、MOD-OLSR和OLSR,但代价是标准化路由开销(NRO)值较高。
{"title":"On link availability probability of routing protocols for urban scenario in VANETs","authors":"Sanjay Kumar, N. Javaid, Z. Yousuf, Haresh Kumar, Z. Khan, U. Qasim","doi":"10.1109/ICOS.2012.6417632","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417632","url":null,"abstract":"This paper presents the link availability probability. We evaluate and compare the link availability probability for routing protocols; Ad hoc On-demand Distance vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) for different number of connections and node density. A novel contribution of this work is enhancement in existing parameters of routing protocols; AODV, DSR and FSR as MOD-AODV, MOD-DSR and MOD-FSR. From the results, we observe that MOD-DSR and DSR outperform MOD-AODV, AODV, MOD-OLSR and OLSR in terms of Packet Delivery Ratio (PDR), Average End-to End Delay (AE2ED), link availability probability at the cost of high value of Normalized Routing Overhead (NRO).","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132521568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Android-based automotive middleware architecture for plug-and-play of applications 一个基于android的汽车中间件架构,用于即插即用的应用程序
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417614
Jong-Woon Yoo, Youngwoo Lee, Dae-Jin Kim, KyoungSoo Park
Modern vehicles are getting increasingly smarter and evolving to become new mobile computing platforms. As the software platformization of vehicles advances, the demands for reconfigurable cars, installing and upgrading vehicle software as plug-and-play have also grown. However, the existing automotive software platforms are not designed for dynamic reconfiguration and plug-and-play. This paper addresses the plug-and-play challenge in the recent automotive systems. Drawing from recent advancements in the mobile phone operating systems, we propose an Android-based software architecture which supports the play-and-play in automotive systems. In our architecture, an application can be downloaded from cloud services and executed on ECUs in a distributed fashion. Before installing an application, our system performs schedulability analysis to check real-time performance requirements for recent vehicles. We also present a model-based development tool for designing a workflow of automotive applications for our system. We implement a prototype and demonstrate the feasibility of our approach.
现代汽车正变得越来越智能,并演变成新的移动计算平台。随着汽车软件平台化的推进,对可重构汽车、即插即用式安装和升级汽车软件的需求也在增长。然而,现有的汽车软件平台并没有为动态重构和即插即用而设计。本文解决了当前汽车系统中即插即用的挑战。根据手机操作系统的最新进展,我们提出了一种基于android的软件架构,该架构支持汽车系统中的play-and-play。在我们的架构中,应用程序可以从云服务下载,并以分布式方式在ecu上执行。在安装应用程序之前,我们的系统执行可调度性分析,以检查最近车辆的实时性能需求。我们还提出了一个基于模型的开发工具,用于为我们的系统设计汽车应用程序的工作流。我们实现了一个原型,并证明了我们的方法的可行性。
{"title":"An Android-based automotive middleware architecture for plug-and-play of applications","authors":"Jong-Woon Yoo, Youngwoo Lee, Dae-Jin Kim, KyoungSoo Park","doi":"10.1109/ICOS.2012.6417614","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417614","url":null,"abstract":"Modern vehicles are getting increasingly smarter and evolving to become new mobile computing platforms. As the software platformization of vehicles advances, the demands for reconfigurable cars, installing and upgrading vehicle software as plug-and-play have also grown. However, the existing automotive software platforms are not designed for dynamic reconfiguration and plug-and-play. This paper addresses the plug-and-play challenge in the recent automotive systems. Drawing from recent advancements in the mobile phone operating systems, we propose an Android-based software architecture which supports the play-and-play in automotive systems. In our architecture, an application can be downloaded from cloud services and executed on ECUs in a distributed fashion. Before installing an application, our system performs schedulability analysis to check real-time performance requirements for recent vehicles. We also present a model-based development tool for designing a workflow of automotive applications for our system. We implement a prototype and demonstrate the feasibility of our approach.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134165998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Elements of application security in the cloud computing environment 云计算环境中应用程序安全的要素
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417637
G. Mathew
Cloud services can be interweaved as modular building blocks to a multi-component application. This is very appealing because of ready-to-use specialized services and supporting integration APIs from cloud service providers. However, securing and integrating the cloud-based services add challenges compared to having all components within the boundaries of the corporate network. These services can be user-centric, application-centric or machine-centric. The security issues range from channel protection to services chaining. Combining cloud services calls for building transactional interconnects of on-the-shelf services that are secure end-to-end in the wild. Using services from different providers and integrating them securely can be a challenge. An assessment framework for evaluating risks in moving a service to the cloud is also presented. We focus on the security issues in building a cloud application by loosely coupled services designed for transparency in drop-n-replacement of a component service. Security patterns and approaches are presented to realize this transparency.
云服务可以作为多组件应用程序的模块化构建块交织在一起。这非常吸引人,因为有现成的专用服务和来自云服务提供商的支持集成api。然而,与将所有组件置于公司网络边界内相比,保护和集成基于云的服务增加了挑战。这些服务可以以用户为中心、以应用程序为中心或以机器为中心。安全问题包括从通道保护到服务链。结合云服务需要构建现成服务的事务性互连,这些服务在野外是安全的端到端。使用来自不同提供者的服务并安全地集成它们可能是一项挑战。还提出了一个评估将服务迁移到云中的风险的评估框架。我们将重点关注通过松散耦合服务构建云应用程序时的安全问题,这些服务旨在使组件服务的替换变得透明。本文介绍了实现这种透明性的安全模式和方法。
{"title":"Elements of application security in the cloud computing environment","authors":"G. Mathew","doi":"10.1109/ICOS.2012.6417637","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417637","url":null,"abstract":"Cloud services can be interweaved as modular building blocks to a multi-component application. This is very appealing because of ready-to-use specialized services and supporting integration APIs from cloud service providers. However, securing and integrating the cloud-based services add challenges compared to having all components within the boundaries of the corporate network. These services can be user-centric, application-centric or machine-centric. The security issues range from channel protection to services chaining. Combining cloud services calls for building transactional interconnects of on-the-shelf services that are secure end-to-end in the wild. Using services from different providers and integrating them securely can be a challenge. An assessment framework for evaluating risks in moving a service to the cloud is also presented. We focus on the security issues in building a cloud application by loosely coupled services designed for transparency in drop-n-replacement of a component service. Security patterns and approaches are presented to realize this transparency.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133797029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Recognition of geological rocks at the bedded-infiltration uranium fields by using neural networks 层状渗透铀矿田地质岩石的神经网络识别
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417622
R. Muhamedyev, Y. Kuchin, P. Gricenko, Z. Nurushev, K. Yakunin, E. Muhamedyeva
Interpretation geophysical data is one of the important factors affecting the economic indicators of mining process. The mining process depend on the speed and accuracy of geophysical data interpretation, but the process of logging data interpretation can not be strictly formalized. Therefore, computer interpretation methods on the basis of expert estimates are necessary. The method is based on expert opinion are widely used in weakly formalized tasks. Mention may be made of the system based on rules, fuzzy logic, Bayesian decision-making systems, artificial neural networks (ANN). ANN have already been used for solving a wide range of recognition problems. The paper analyzes the quality of network's data interpretation essentially depending on its configuration parameters, methods of data preprocessing and learning samples. About 2000 calculation experiments have been made, software and templates for preprocessing of data and interpretation findings have been developed. These experiments showed the effectiveness of neural network approach to solving the problem of geological rocks recognition in stratum-infiltration uranium deposits. Further research in this area will raise the recognition process automation and its accuracy.
物探资料解释是影响采矿过程经济指标的重要因素之一。采矿过程取决于物探资料解释的速度和精度,而测井资料解释的过程不能严格形式化。因此,基于专家估计的计算机解释方法是必要的。该方法基于专家意见,广泛应用于弱形式化任务。可以提到基于规则、模糊逻辑、贝叶斯决策系统、人工神经网络(ANN)的系统。人工神经网络已经被用于解决广泛的识别问题。本文分析了网络的数据解释质量主要取决于其配置参数、数据预处理方法和学习样本。进行了约2000次计算实验,开发了数据预处理和解释结果的软件和模板。实验结果表明,神经网络方法在解决层渗铀矿床地质岩石识别问题中的有效性。该领域的进一步研究将提高识别过程的自动化程度和准确性。
{"title":"Recognition of geological rocks at the bedded-infiltration uranium fields by using neural networks","authors":"R. Muhamedyev, Y. Kuchin, P. Gricenko, Z. Nurushev, K. Yakunin, E. Muhamedyeva","doi":"10.1109/ICOS.2012.6417622","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417622","url":null,"abstract":"Interpretation geophysical data is one of the important factors affecting the economic indicators of mining process. The mining process depend on the speed and accuracy of geophysical data interpretation, but the process of logging data interpretation can not be strictly formalized. Therefore, computer interpretation methods on the basis of expert estimates are necessary. The method is based on expert opinion are widely used in weakly formalized tasks. Mention may be made of the system based on rules, fuzzy logic, Bayesian decision-making systems, artificial neural networks (ANN). ANN have already been used for solving a wide range of recognition problems. The paper analyzes the quality of network's data interpretation essentially depending on its configuration parameters, methods of data preprocessing and learning samples. About 2000 calculation experiments have been made, software and templates for preprocessing of data and interpretation findings have been developed. These experiments showed the effectiveness of neural network approach to solving the problem of geological rocks recognition in stratum-infiltration uranium deposits. Further research in this area will raise the recognition process automation and its accuracy.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey on success factors to design context-aware frameworks to develop mobile patient monitoring systems 设计情境感知框架以开发移动患者监测系统的成功因素调查
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417651
M. Al-Bashayreh, N. Hashim, O. T. Khorma
Design of context-aware application frameworks to develop mobile patient monitoring systems using wireless sensors (MPMS) is an emerging in the biomedical informatics domain. However, literature about this topic remains fragmented. In fact, there are no categories in the literature to characterize these frameworks. In addition, there are no success factors to identify lacks and gaps in their design. To address these gaps, this paper is a survey of the context-aware frameworks in the biomedical informatics domain to identify the categories that can be used to gain an intensive and extensive understanding of previous studies. Then, use these categories to identify the Factors of Successful Context-aware Application Frameworks (FSCAF), which are a set of designs and domain requirements that must be satisfied to design context-aware frameworks to develop MPMS. The results are expected to help researchers identify lacks and gaps in the literature to design enhanced context-aware frameworks to develop MPMS.
使用无线传感器(MPMS)设计上下文感知应用框架来开发移动患者监测系统是生物医学信息学领域的一个新兴领域。然而,关于这个话题的文献仍然是碎片化的。事实上,在文献中没有任何类别来描述这些框架。此外,没有成功的因素来识别其设计中的不足和差距。为了解决这些差距,本文对生物医学信息学领域的上下文感知框架进行了调查,以确定可用于获得对先前研究的深入和广泛理解的类别。然后,使用这些类别来确定成功的上下文感知应用程序框架(FSCAF)的因素,这些因素是设计上下文感知框架以开发MPMS必须满足的一组设计和领域需求。研究结果有望帮助研究人员发现文献中的不足和空白,从而设计增强的上下文感知框架来开发MPMS。
{"title":"A survey on success factors to design context-aware frameworks to develop mobile patient monitoring systems","authors":"M. Al-Bashayreh, N. Hashim, O. T. Khorma","doi":"10.1109/ICOS.2012.6417651","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417651","url":null,"abstract":"Design of context-aware application frameworks to develop mobile patient monitoring systems using wireless sensors (MPMS) is an emerging in the biomedical informatics domain. However, literature about this topic remains fragmented. In fact, there are no categories in the literature to characterize these frameworks. In addition, there are no success factors to identify lacks and gaps in their design. To address these gaps, this paper is a survey of the context-aware frameworks in the biomedical informatics domain to identify the categories that can be used to gain an intensive and extensive understanding of previous studies. Then, use these categories to identify the Factors of Successful Context-aware Application Frameworks (FSCAF), which are a set of designs and domain requirements that must be satisfied to design context-aware frameworks to develop MPMS. The results are expected to help researchers identify lacks and gaps in the literature to design enhanced context-aware frameworks to develop MPMS.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127901027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards integrating information of service level agreement and resources as a services (RaaS) for cloud computing environment 面向云计算环境整合服务水平协议信息和资源即服务(RaaS)
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417613
Rusli Abdullah, A. M. Talib
Cloud computing describes services and applications that are extended to be accessible through the Internet. Service Level Agreement (SLA) is a contractual agreement that has been established between the members of Cloud Service Provider (CSP) that consists of the service provider and its recipient for a specific application of services based on its allocating and sharing Resources as a Service (RaaS). In this context, there are many parties who are very concerning about it, but unfortunately there is lack of a common mapping of SLA information and RaaS of best practice as a guideline that can be used by CSP in making decision for the future purposes in engaging with services in the cloud computing environment. Therefore, the main goal of this paper is to integrate information of SLA and RaaS in order to ensure everybody who are providing and receiving the services in the cloud particularly will be satisfied and getting the best maximum Return Of the Investment (ROI) in allocating and sharing resources among the providers and recipients in cloud computing environment. As a result, some attributes such as reliability, readability and standardization of Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) are found to be high.
云计算描述了被扩展为可通过Internet访问的服务和应用程序。服务水平协议(SLA)是在云服务提供商(CSP)成员之间建立的契约性协议,由服务提供商及其接收方组成,针对基于其分配和共享资源即服务(RaaS)的特定服务应用。在这种情况下,有很多人都非常关心它,但不幸的是,缺乏SLA信息和最佳实践的RaaS的通用映射,作为CSP在为云计算环境中服务的未来目的做出决策时可以使用的指导方针。因此,本文的主要目标是整合SLA和RaaS的信息,以确保云计算环境中提供和接收服务的每个人都满意,并在云计算环境中在提供者和接受者之间分配和共享资源时获得最佳的最大投资回报(ROI)。因此,发现软件即服务(SaaS)、平台即服务(PaaS)和基础设施即服务(IaaS)的可靠性、可读性和标准化等一些属性很高。
{"title":"Towards integrating information of service level agreement and resources as a services (RaaS) for cloud computing environment","authors":"Rusli Abdullah, A. M. Talib","doi":"10.1109/ICOS.2012.6417613","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417613","url":null,"abstract":"Cloud computing describes services and applications that are extended to be accessible through the Internet. Service Level Agreement (SLA) is a contractual agreement that has been established between the members of Cloud Service Provider (CSP) that consists of the service provider and its recipient for a specific application of services based on its allocating and sharing Resources as a Service (RaaS). In this context, there are many parties who are very concerning about it, but unfortunately there is lack of a common mapping of SLA information and RaaS of best practice as a guideline that can be used by CSP in making decision for the future purposes in engaging with services in the cloud computing environment. Therefore, the main goal of this paper is to integrate information of SLA and RaaS in order to ensure everybody who are providing and receiving the services in the cloud particularly will be satisfied and getting the best maximum Return Of the Investment (ROI) in allocating and sharing resources among the providers and recipients in cloud computing environment. As a result, some attributes such as reliability, readability and standardization of Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) are found to be high.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123390947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modular dynamic RBF neural network for face recognition 面向人脸识别的模块化动态RBF神经网络
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417629
S. I. Ch'ng, K. Seng, L. Ang
Over the years, we have seen an increase in the use of RBF neural networks for the task of face recognition. However, the use of second order algorithms as the learning algorithm for all the adjustable parameters in such networks are rare due to the high computational complexity of the calculation of the Jacobian and Hessian matrix. Hence, in this paper, we propose a modular structural training architecture to adapt the Levenberg-Marquardt based RBF neural network for the application of face recognition. In addition to the proposal of the modular structural training architecture, we have also investigated the use of different front-end processors to reduce the dimension size of the feature vectors prior to its application to the LM-based RBF neural network. The investigative study was done on three standard face databases; ORL, Yale and AR databases.
多年来,我们看到RBF神经网络在人脸识别任务中的使用有所增加。然而,由于雅可比矩阵和Hessian矩阵的计算复杂度较高,在此类网络中很少使用二阶算法作为所有可调参数的学习算法。因此,在本文中,我们提出了一种模块化结构的训练架构,以适应基于Levenberg-Marquardt的RBF神经网络在人脸识别中的应用。除了提出模块化结构训练架构外,我们还研究了在将特征向量应用于基于lm的RBF神经网络之前,使用不同的前端处理器来降低特征向量的维度大小。调查研究是在三个标准的人脸数据库上进行的;ORL,耶鲁和AR数据库。
{"title":"Modular dynamic RBF neural network for face recognition","authors":"S. I. Ch'ng, K. Seng, L. Ang","doi":"10.1109/ICOS.2012.6417629","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417629","url":null,"abstract":"Over the years, we have seen an increase in the use of RBF neural networks for the task of face recognition. However, the use of second order algorithms as the learning algorithm for all the adjustable parameters in such networks are rare due to the high computational complexity of the calculation of the Jacobian and Hessian matrix. Hence, in this paper, we propose a modular structural training architecture to adapt the Levenberg-Marquardt based RBF neural network for the application of face recognition. In addition to the proposal of the modular structural training architecture, we have also investigated the use of different front-end processors to reduce the dimension size of the feature vectors prior to its application to the LM-based RBF neural network. The investigative study was done on three standard face databases; ORL, Yale and AR databases.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125284418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Agent-based model checking verification framework 基于代理的模型检查验证框架
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417649
N. A. Bakar, Ali Selamat
Model checking is an automated formal verification technique that takes formal system design model and formal properties specifications as input to perform verification and produce system correctness result and counterexamples. Although a system has been formally verified to be correct using model checking, end users still want to know how correct the system is. As flawless system is rarely feasible, an approach for verifying the verifier is needed to measure the completeness and accuracy levels of the verification implementation. In this research, we propose a framework for evaluating agent-based model checking results with the Universiti Teknologi Malaysia on-line graduate student application system. We have designed multi-agent runtime verification and validation (MARVV) architecture that incorporates a runtime system profiles to perform the evaluation. Finally, we evaluate the applicability of the proposed model using MCMAS model checking.
模型检查是一种自动化的形式化验证技术,它以形式化系统设计模型和形式化属性规范为输入,执行验证并产生系统正确性结果和反例。尽管使用模型检查已经正式验证了系统的正确性,但最终用户仍然想知道系统的正确性。由于完美的系统很少是可行的,因此需要一种验证验证者的方法来度量验证实现的完整性和准确性级别。在这项研究中,我们提出了一个框架来评估基于代理的模型检查结果与马来西亚科技大学在线研究生申请系统。我们设计了多代理运行时验证和确认(MARVV)体系结构,该体系结构包含运行时系统配置文件来执行评估。最后,我们使用MCMAS模型检验来评估所提出模型的适用性。
{"title":"Agent-based model checking verification framework","authors":"N. A. Bakar, Ali Selamat","doi":"10.1109/ICOS.2012.6417649","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417649","url":null,"abstract":"Model checking is an automated formal verification technique that takes formal system design model and formal properties specifications as input to perform verification and produce system correctness result and counterexamples. Although a system has been formally verified to be correct using model checking, end users still want to know how correct the system is. As flawless system is rarely feasible, an approach for verifying the verifier is needed to measure the completeness and accuracy levels of the verification implementation. In this research, we propose a framework for evaluating agent-based model checking results with the Universiti Teknologi Malaysia on-line graduate student application system. We have designed multi-agent runtime verification and validation (MARVV) architecture that incorporates a runtime system profiles to perform the evaluation. Finally, we evaluate the applicability of the proposed model using MCMAS model checking.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2012 IEEE Conference on Open Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1