首页 > 最新文献

2012 IEEE Conference on Open Systems最新文献

英文 中文
Derivation of aerosol loading from visibility range in Penang Island using atmospheric model 利用大气模式推导槟城岛能见度范围的气溶胶负荷
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417624
A. Asmat, W. Manan, N. Ahmad
Atmospheric aerosol has influenced many atmospheric processes including cloud formation, visibility variation and solar radiation transfer. Atmospheric aerosol plays as an important indicator of visibility distance range because it will obscure the objects that can be seen. Visibility degradation has become an environmental topic of community concern in most urban areas because of low visibility range will lead to the deterioration of air quality. In this study, the atmospheric aerosol loading from the image was retrieved by using urban and maritime with visibility range at the distance of 10 km up to 50 km which are later converted into (%) reflectance. Later the works is established the relationship between aerosol loading and visibility was produced using urban and maritime models. To accommodate with the intention research works, Penang Island has been chosen. This is because of the strategic location of Penang Island which located close to the sea and recognized as one of main urbanized city in Malaysia. Results were indicated that visibility was inversely correlated with aerosol loading, the farthest the visibility range, the lower the aerosol loading. Result also showed that the urban aerosol loading estimated is higher than maritime aerosol. This may influence by meteorological factor such as the higher temperatures in urban could lead to higher rate of smog formation. Lower wind speeds will contribute which it may tend to keep pollutants concentrated over urban areas. Atmospheric urban model can derive the estimated minimum aerosol loading (12.1%) when the visibility range is about 30 km can be used to determine the minimum.
大气气溶胶影响了许多大气过程,包括云的形成、能见度变化和太阳辐射传输。大气气溶胶是一个重要的可见距离指标,因为它会使可以看到的物体变得模糊。能见度下降已经成为大多数城市社会关注的环境话题,因为低能见度范围会导致空气质量的恶化。在本研究中,利用城市和海上能见度范围在10公里至50公里的图像检索大气气溶胶载荷,然后将其转换为(%)反射率。后来的工作是建立气溶胶负荷和能见度之间的关系是利用城市和海洋模式。为了配合意向研究工作,槟城岛已被选中。这是因为槟城岛的战略位置靠近大海,是马来西亚公认的主要城市化城市之一。结果表明,能见度与气溶胶负荷呈负相关,能见度范围越远,气溶胶负荷越低。结果还表明,城市气溶胶负荷估计高于海洋气溶胶负荷。这可能受到气象因素的影响,比如城市温度的升高会导致雾霾的形成速度加快。较低的风速可能会使污染物集中在城市地区。大气城市模式可以推算出能见度在30 km左右时的最小气溶胶负荷值(12.1%)。
{"title":"Derivation of aerosol loading from visibility range in Penang Island using atmospheric model","authors":"A. Asmat, W. Manan, N. Ahmad","doi":"10.1109/ICOS.2012.6417624","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417624","url":null,"abstract":"Atmospheric aerosol has influenced many atmospheric processes including cloud formation, visibility variation and solar radiation transfer. Atmospheric aerosol plays as an important indicator of visibility distance range because it will obscure the objects that can be seen. Visibility degradation has become an environmental topic of community concern in most urban areas because of low visibility range will lead to the deterioration of air quality. In this study, the atmospheric aerosol loading from the image was retrieved by using urban and maritime with visibility range at the distance of 10 km up to 50 km which are later converted into (%) reflectance. Later the works is established the relationship between aerosol loading and visibility was produced using urban and maritime models. To accommodate with the intention research works, Penang Island has been chosen. This is because of the strategic location of Penang Island which located close to the sea and recognized as one of main urbanized city in Malaysia. Results were indicated that visibility was inversely correlated with aerosol loading, the farthest the visibility range, the lower the aerosol loading. Result also showed that the urban aerosol loading estimated is higher than maritime aerosol. This may influence by meteorological factor such as the higher temperatures in urban could lead to higher rate of smog formation. Lower wind speeds will contribute which it may tend to keep pollutants concentrated over urban areas. Atmospheric urban model can derive the estimated minimum aerosol loading (12.1%) when the visibility range is about 30 km can be used to determine the minimum.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115481780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Field programmable gate array system for real-time IRIS recognition 现场可编程门阵列系统的实时虹膜识别
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417657
A. Hematian, A. Manaf, S. Chuprat, R. Khaleghparast, S. Yazdani
Iris recognition is one of the most flawless recognition methods in biometrics. However, most of iris recognition algorithms are implemented based on sequential operations running on central processing units (CPUs). In this article we propose a prototype design for iris recognition based on field-programmable gate array (FPGA) in order to improve iris recognition performance by parallel computing. Time-consuming iris recognition sub-processes are fully implemented in parallel to achieve optimum performance. Unlike commonly used iris recognition methods that first capture a single image of an eye and then start the recognition process, we achieved to speed up the iris recognition process by localizing the pupil and the iris boundaries, unwrapping the iris image and extracting features of the iris image while image capturing was in progress. Consequently, live images from human eye can be processed continuously without any delay. We conclude that iris recognition acceleration by parallel computing can be a complete success when it is implemented on low-cost FPGAs.
虹膜识别是生物识别技术中最完美的识别方法之一。然而,大多数虹膜识别算法都是基于在中央处理器(cpu)上运行的顺序操作来实现的。本文提出了一种基于现场可编程门阵列(FPGA)的虹膜识别原型设计,以期通过并行计算提高虹膜识别性能。耗时的虹膜识别子过程完全并行实现,以达到最佳性能。不同于常用的虹膜识别方法先捕获眼睛的单幅图像然后开始识别过程,我们通过在图像捕获过程中对瞳孔和虹膜边界进行定位,解开虹膜图像的包裹并提取虹膜图像的特征来加快虹膜识别过程。因此,人眼的实时图像可以无延迟地连续处理。我们的结论是,当并行计算在低成本fpga上实现时,虹膜识别加速可以获得完全的成功。
{"title":"Field programmable gate array system for real-time IRIS recognition","authors":"A. Hematian, A. Manaf, S. Chuprat, R. Khaleghparast, S. Yazdani","doi":"10.1109/ICOS.2012.6417657","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417657","url":null,"abstract":"Iris recognition is one of the most flawless recognition methods in biometrics. However, most of iris recognition algorithms are implemented based on sequential operations running on central processing units (CPUs). In this article we propose a prototype design for iris recognition based on field-programmable gate array (FPGA) in order to improve iris recognition performance by parallel computing. Time-consuming iris recognition sub-processes are fully implemented in parallel to achieve optimum performance. Unlike commonly used iris recognition methods that first capture a single image of an eye and then start the recognition process, we achieved to speed up the iris recognition process by localizing the pupil and the iris boundaries, unwrapping the iris image and extracting features of the iris image while image capturing was in progress. Consequently, live images from human eye can be processed continuously without any delay. We conclude that iris recognition acceleration by parallel computing can be a complete success when it is implemented on low-cost FPGAs.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Prototype selection for training artificial neural networks based on Fast Condensed Nearest Neighbor rule 基于快速凝聚最近邻规则的人工神经网络训练原型选择
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417625
A. Abroudi, F. Farokhi
This paper presents new method for training intelligent networks such as Multi-Layer Perceptron (MLP) and Neuro-Fuzzy Networks (NFN) with prototypes selected via Fast Condensed Nearest Neighbor (FCNN) rule. By applying FCNN, condensed subsets with instances close to the decision boundary are obtained. We call these points High-Priority Prototypes (HPPs) and the network is trained by them. The main objective of this approach is to improve the performance of the classification by boosting the quality of the training-set. The experimental results on several standard classification databases illustrated the power of the proposed method. In comparison to previous approaches which select prototypes randomly, training with HPPs performs better in terms of classification accuracy.
本文提出了一种基于快速凝聚最近邻(FCNN)规则选择原型的多层感知器(MLP)和神经模糊网络(NFN)等智能网络的训练新方法。通过应用FCNN,得到实例靠近决策边界的压缩子集。我们称这些点为高优先级原型(High-Priority prototype, HPPs),网络由它们来训练。这种方法的主要目标是通过提高训练集的质量来提高分类的性能。在多个标准分类数据库上的实验结果表明了该方法的有效性。与之前随机选择原型的方法相比,HPPs训练在分类精度方面表现更好。
{"title":"Prototype selection for training artificial neural networks based on Fast Condensed Nearest Neighbor rule","authors":"A. Abroudi, F. Farokhi","doi":"10.1109/ICOS.2012.6417625","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417625","url":null,"abstract":"This paper presents new method for training intelligent networks such as Multi-Layer Perceptron (MLP) and Neuro-Fuzzy Networks (NFN) with prototypes selected via Fast Condensed Nearest Neighbor (FCNN) rule. By applying FCNN, condensed subsets with instances close to the decision boundary are obtained. We call these points High-Priority Prototypes (HPPs) and the network is trained by them. The main objective of this approach is to improve the performance of the classification by boosting the quality of the training-set. The experimental results on several standard classification databases illustrated the power of the proposed method. In comparison to previous approaches which select prototypes randomly, training with HPPs performs better in terms of classification accuracy.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
All-pass digital system design using second-order cone programming 全通数字系统的二次锥规划设计
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417623
T. Deng
In this paper, we propose a new approach for designing an all-pass (AP) digital filter that approximates a given ideal phase response in the minimax error sense. Originally, such a design problem is highly non-linear and difficult to solve. This paper formulates the non-linear problem as a second-order-cone programming (SOCP) problem and then solves the design problem using any SOCP-solver (software). After the SOCP-based design is formulated, the AP filter coefficients can be easily found through solving the SOCP problem. As compared with the existing linear programming (LP) design, the SOCP-based design method achieves more accurate fitting. A design example is given for illustrating the performance improvement of the SOCP-based design approach.
在本文中,我们提出了一种设计全通(AP)数字滤波器的新方法,该滤波器在最小最大误差意义上近似于给定的理想相位响应。本来,这样的设计问题是高度非线性的,很难解决。本文将非线性问题表述为二阶锥规划(SOCP)问题,然后利用任意SOCP求解器(软件)求解设计问题。在制定了基于SOCP的设计方案后,通过求解SOCP问题可以很容易地找到AP滤波器系数。与现有的线性规划(LP)设计相比,基于sopp的设计方法实现了更精确的拟合。最后给出了一个设计实例,说明了基于soc的设计方法的性能改进。
{"title":"All-pass digital system design using second-order cone programming","authors":"T. Deng","doi":"10.1109/ICOS.2012.6417623","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417623","url":null,"abstract":"In this paper, we propose a new approach for designing an all-pass (AP) digital filter that approximates a given ideal phase response in the minimax error sense. Originally, such a design problem is highly non-linear and difficult to solve. This paper formulates the non-linear problem as a second-order-cone programming (SOCP) problem and then solves the design problem using any SOCP-solver (software). After the SOCP-based design is formulated, the AP filter coefficients can be easily found through solving the SOCP problem. As compared with the existing linear programming (LP) design, the SOCP-based design method achieves more accurate fitting. A design example is given for illustrating the performance improvement of the SOCP-based design approach.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Evaluation of virtual machine scalability on distributed multi/many-core processors for big data analytics 面向大数据分析的分布式多核/多核处理器虚拟机可扩展性评估
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417617
A. Nazir, Y. M. Yassin, C. P. Kit, E. Karuppiah
Cloud computing makes data analytics an attractive preposition for small and medium organisations that need to process large datasets and perform fast queries. The remarkable aspect of cloud system is that a nonexpert user can provision resources as virtual machines (VMs) of any size on the cloud within minutes to meet his/her data-processing needs. In this paper, we demonstrate the applicability of running large-scale distributed data analysis in virtualised environment. In achieving this, a series of experiments are conducted to measure and analyze performance of the virtual machine scalability on multi/many-core processors using realistic financial workloads. Our experimental results demonstrate it is crucial to minimise the number of VMs deployed for each application due to high overhead of running parallel tasks on VMs on multicore machines. We also found out that our applications perform significantly better when equipped with sufficient memory and reasonable number of cores.
云计算使数据分析成为需要处理大型数据集和执行快速查询的中小型组织的一个有吸引力的介词。云系统的显著特点是,非专业用户可以在几分钟内将资源配置为云上任何大小的虚拟机(vm),以满足他/她的数据处理需求。本文论证了在虚拟环境下运行大规模分布式数据分析的适用性。为了实现这一目标,我们进行了一系列实验,使用实际的财务工作负载来测量和分析多核/多核处理器上虚拟机可伸缩性的性能。我们的实验结果表明,由于在多核机器上的vm上运行并行任务的高开销,为每个应用程序部署的vm数量最小化是至关重要的。我们还发现,如果配备了足够的内存和合理数量的内核,应用程序的性能会显著提高。
{"title":"Evaluation of virtual machine scalability on distributed multi/many-core processors for big data analytics","authors":"A. Nazir, Y. M. Yassin, C. P. Kit, E. Karuppiah","doi":"10.1109/ICOS.2012.6417617","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417617","url":null,"abstract":"Cloud computing makes data analytics an attractive preposition for small and medium organisations that need to process large datasets and perform fast queries. The remarkable aspect of cloud system is that a nonexpert user can provision resources as virtual machines (VMs) of any size on the cloud within minutes to meet his/her data-processing needs. In this paper, we demonstrate the applicability of running large-scale distributed data analysis in virtualised environment. In achieving this, a series of experiments are conducted to measure and analyze performance of the virtual machine scalability on multi/many-core processors using realistic financial workloads. Our experimental results demonstrate it is crucial to minimise the number of VMs deployed for each application due to high overhead of running parallel tasks on VMs on multicore machines. We also found out that our applications perform significantly better when equipped with sufficient memory and reasonable number of cores.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132347779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On critical point avoidance among mobile terminals in healthcare monitoring applications: Saving lives through reliable communication software 医疗监测应用中移动终端的关键点规避:通过可靠的通信软件挽救生命
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417658
J. Chaudhry, U. Qidwai
The advances in Microelectromechanical systems (MEMS), battery life, low powered communication standards, more capable processing units, and hybrid communication have cemented the use of mobile Wireless Body Area Networks (WBAN) in medical informatics. Although the MEMS were used in medical informatics solutions but they were highly localized, rigged, non-cooperative, and particularly non extendable. The interconnectivity of various network interfaces is the main driving force on the modern technology boom. The morphological features of mobile devices and their use in our daily lives create an opportunity to connect medical informatics systems with the main stream. It promise unobtrusive ambulatory health monitoring for a long period of time and provide real-time updates of the patient's status to the physician. When integrated with the WBAN, the mobile devices play the role of localized data diffusion, classification, and broadcast center. In this paper, the criticality of this `single point of failure' is discussed. Often the untapped flow of data to the mobile device can lead to crashing of the network. A computational model is devised in order to pre estimate the device resource availability matrix and data flow management without creating the denial of service. The speed mismatch due to resource binding violation on the part of the hand held device can be reported and capped before the data loss heeds un noticed. The techniques proposed are analyzed and tested on a test bed, specifically designed for monitoring remote patient vitals. The results obtained show marked improvement from the methods proposed in the contemporary systems.
微机电系统(MEMS)、电池寿命、低功耗通信标准、更有能力的处理单元和混合通信的进步巩固了移动无线体域网络(WBAN)在医疗信息学中的应用。虽然MEMS被用于医疗信息解决方案,但它们高度本地化,操纵,非合作,特别是不可扩展。各种网络接口的互联互通是现代技术繁荣的主要动力。移动设备的形态特征及其在我们日常生活中的使用为将医疗信息系统与主流系统连接起来创造了机会。它承诺在很长一段时间内不引人注目的门诊健康监测,并向医生提供患者状态的实时更新。移动设备与无线宽带网络相结合,起到了本地化的数据扩散、分类和广播中心的作用。本文讨论了这种“单点故障”的临界性。通常,未开发的移动设备数据流会导致网络崩溃。为了在不产生拒绝服务的情况下预估设备资源可用性矩阵和数据流管理,设计了一个计算模型。由于手持设备的资源绑定违反而导致的速度不匹配可以在数据丢失未被注意到之前进行报告和限制。所提出的技术在专门为监测远程患者生命体征而设计的试验台上进行了分析和测试。所得结果与现有系统中提出的方法相比有明显的改进。
{"title":"On critical point avoidance among mobile terminals in healthcare monitoring applications: Saving lives through reliable communication software","authors":"J. Chaudhry, U. Qidwai","doi":"10.1109/ICOS.2012.6417658","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417658","url":null,"abstract":"The advances in Microelectromechanical systems (MEMS), battery life, low powered communication standards, more capable processing units, and hybrid communication have cemented the use of mobile Wireless Body Area Networks (WBAN) in medical informatics. Although the MEMS were used in medical informatics solutions but they were highly localized, rigged, non-cooperative, and particularly non extendable. The interconnectivity of various network interfaces is the main driving force on the modern technology boom. The morphological features of mobile devices and their use in our daily lives create an opportunity to connect medical informatics systems with the main stream. It promise unobtrusive ambulatory health monitoring for a long period of time and provide real-time updates of the patient's status to the physician. When integrated with the WBAN, the mobile devices play the role of localized data diffusion, classification, and broadcast center. In this paper, the criticality of this `single point of failure' is discussed. Often the untapped flow of data to the mobile device can lead to crashing of the network. A computational model is devised in order to pre estimate the device resource availability matrix and data flow management without creating the denial of service. The speed mismatch due to resource binding violation on the part of the hand held device can be reported and capped before the data loss heeds un noticed. The techniques proposed are analyzed and tested on a test bed, specifically designed for monitoring remote patient vitals. The results obtained show marked improvement from the methods proposed in the contemporary systems.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130144530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bio-inspired trust management in distributed systems — A critical review 分布式系统中受生物启发的信任管理
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417615
M. Firdhous, S. Hassan, O. Ghazali, M. Mahmuddin
Distributed computing has grown rapidly in the recent years. In addition to the increase in the size of individual networks, new types of networks have also emerged providing different types of services to clients. While these systems provide an invaluable service, they also face certain practical issues. Security is one of the most important issues, that must be dealt with by the implementers in order to provide a satisfactory service. Trust and trust management have been drawing the attention of security researchers in order to identify the malicious nodes and separate them from good benevolent nodes and also to quantify the quality of services provided by the nodes in a system. Several trust computing models have been proposed for distributed systems by various researchers. These models are based on different approaches from fuzzy logic, Bayesian model, social networking to bio-inspired mechanisms. In this paper, the authors take a critical look at the bio-inspired trust models reported in the literature with respect to their principles, advantages and disadvantages.
分布式计算近年来发展迅速。除了个别网络的规模增加外,还出现了新型网络,为客户提供不同类型的服务。虽然这些系统提供了宝贵的服务,但它们也面临着一些实际问题。安全性是最重要的问题之一,为了提供令人满意的服务,实现者必须处理它。信任和信任管理已经引起了安全研究人员的关注,以便识别恶意节点并将其与良好的善意节点区分开来,并量化系统中节点提供的服务质量。不同的研究者针对分布式系统提出了几种信任计算模型。这些模型基于不同的方法,从模糊逻辑、贝叶斯模型、社会网络到仿生机制。在本文中,作者对文献中报道的生物启发信任模型的原理,优点和缺点进行了批判性的研究。
{"title":"Bio-inspired trust management in distributed systems — A critical review","authors":"M. Firdhous, S. Hassan, O. Ghazali, M. Mahmuddin","doi":"10.1109/ICOS.2012.6417615","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417615","url":null,"abstract":"Distributed computing has grown rapidly in the recent years. In addition to the increase in the size of individual networks, new types of networks have also emerged providing different types of services to clients. While these systems provide an invaluable service, they also face certain practical issues. Security is one of the most important issues, that must be dealt with by the implementers in order to provide a satisfactory service. Trust and trust management have been drawing the attention of security researchers in order to identify the malicious nodes and separate them from good benevolent nodes and also to quantify the quality of services provided by the nodes in a system. Several trust computing models have been proposed for distributed systems by various researchers. These models are based on different approaches from fuzzy logic, Bayesian model, social networking to bio-inspired mechanisms. In this paper, the authors take a critical look at the bio-inspired trust models reported in the literature with respect to their principles, advantages and disadvantages.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116068810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fuzzy logic-based information security control assessment for organizations 基于模糊逻辑的组织信息安全控制评估
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417640
A. R. Otero, G. Tejay, L. D. Otero, A. Ruiz-Torres
For organizations, security of information is eminent as threats of information security incidents that could impact the information continue to increase. Alarming facts within the literature support the current lack of adequate information security practices and prompt for identifying additional methods to help organizations in protecting their sensitive and critical information. Research efforts shows inadequacies within traditional ISC assessment methodologies that do not promote an effective assessment, prioritization, and, therefore, implementation of ISC in organizations. This research-in-progress relates to the development of a tool that can accurately prioritize ISC in organizations. The tool uses fuzzy set theory to allow for a more accurate assessment of imprecise parameters than traditional methodologies. We argue that evaluating information security controls using fuzzy set theory leads to a more detailed and precise assessment and, therefore, supports an effective selection of information security controls in organizations.
对于组织来说,随着影响信息的信息安全事件的威胁不断增加,信息的安全性是非常重要的。文献中令人震惊的事实支持当前缺乏足够的信息安全实践,并提示确定其他方法来帮助组织保护其敏感和关键信息。研究表明,传统的ISC评估方法存在不足,不能促进有效的评估、优先排序,因此也不能促进ISC在组织中的实施。这项正在进行的研究涉及到一种工具的开发,该工具可以在组织中准确地确定ISC的优先级。该工具使用模糊集理论,允许比传统方法更准确地评估不精确的参数。我们认为,使用模糊集理论评估信息安全控制会导致更详细和精确的评估,因此,支持组织中信息安全控制的有效选择。
{"title":"A fuzzy logic-based information security control assessment for organizations","authors":"A. R. Otero, G. Tejay, L. D. Otero, A. Ruiz-Torres","doi":"10.1109/ICOS.2012.6417640","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417640","url":null,"abstract":"For organizations, security of information is eminent as threats of information security incidents that could impact the information continue to increase. Alarming facts within the literature support the current lack of adequate information security practices and prompt for identifying additional methods to help organizations in protecting their sensitive and critical information. Research efforts shows inadequacies within traditional ISC assessment methodologies that do not promote an effective assessment, prioritization, and, therefore, implementation of ISC in organizations. This research-in-progress relates to the development of a tool that can accurately prioritize ISC in organizations. The tool uses fuzzy set theory to allow for a more accurate assessment of imprecise parameters than traditional methodologies. We argue that evaluating information security controls using fuzzy set theory leads to a more detailed and precise assessment and, therefore, supports an effective selection of information security controls in organizations.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125035684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Comparative analysis of IEEE 802.11g multimedia multicast performance using RTP with an implemented test-bed 基于RTP的IEEE 802.11g多媒体组播性能与实现的测试平台的对比分析
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417645
M. Ezani, A. Pathan, S. Haseeb
In network layer protocols, the most efficient way of sending similar packets to a group of nodes is via multicast. Multicast is a profound concept that has been around for some time and has seen through its implementation in various aspects of today's network access technology. The IEEE 802.11 wireless standards, however, loosely honor IP layer multicast packets by encapsulating them in broadcast frames. This in turn degrades the 802.11 network access bandwidth capacity and further decreases its data transmission reliability. An enhancement workaround which has been devised was to encapsulate multicast packets in a unicast MAC layer frame. In addition, RTP was also observed to be an enabler to better user experience in multicast streaming. In this paper, we investigate the 802.11g multicast performance with and without the enhanced multicast mechanism. We further expand our investigation by implementing RTP during the multimedia multicast stream and without it. Our results lead us to conclude that there are significant advantages of using both the enhanced multicast mechanism and RTP during a multicast streaming via the 802.11g wireless standard.
在网络层协议中,向一组节点发送相似数据包的最有效方式是通过组播。组播是一个意义深远的概念,它已经存在了一段时间,并且已经在当今网络接入技术的各个方面得到了实现。然而,IEEE 802.11无线标准通过将IP层多播数据包封装在广播帧中来松散地尊重它们。这将降低802.11网络的接入带宽容量,进一步降低其数据传输的可靠性。一种改进的解决方案是将多播数据包封装在单播MAC层帧中。此外,RTP还被观察到可以在多播流中提供更好的用户体验。在本文中,我们研究了有和没有增强组播机制的802.11g组播性能。我们通过在多媒体多播流中实现RTP和不实现RTP来进一步扩展我们的研究。我们的结果使我们得出结论,在通过802.11g无线标准的多播流期间使用增强型多播机制和RTP具有显著的优势。
{"title":"Comparative analysis of IEEE 802.11g multimedia multicast performance using RTP with an implemented test-bed","authors":"M. Ezani, A. Pathan, S. Haseeb","doi":"10.1109/ICOS.2012.6417645","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417645","url":null,"abstract":"In network layer protocols, the most efficient way of sending similar packets to a group of nodes is via multicast. Multicast is a profound concept that has been around for some time and has seen through its implementation in various aspects of today's network access technology. The IEEE 802.11 wireless standards, however, loosely honor IP layer multicast packets by encapsulating them in broadcast frames. This in turn degrades the 802.11 network access bandwidth capacity and further decreases its data transmission reliability. An enhancement workaround which has been devised was to encapsulate multicast packets in a unicast MAC layer frame. In addition, RTP was also observed to be an enabler to better user experience in multicast streaming. In this paper, we investigate the 802.11g multicast performance with and without the enhanced multicast mechanism. We further expand our investigation by implementing RTP during the multimedia multicast stream and without it. Our results lead us to conclude that there are significant advantages of using both the enhanced multicast mechanism and RTP during a multicast streaming via the 802.11g wireless standard.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130250606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An investigation of packet scheduling algorithms for Long Term Evolution-Advanced 长期进化-高级分组调度算法研究
Pub Date : 2012-10-01 DOI: 10.1109/ICOS.2012.6417630
H. Ramli, M. Hasan, A. F. Ismail, A. Abdalla, K. Abdullah
Carrier Aggregation (CA) is a potential technique to increase the band width in LTE-Advanced system. However, the introduction of CA brings a number challenges to the traditional Radio Resource Management (RRM) mechanisms. This paper investigates the current algorithms of CA and packet scheduling forthe Long Term Evolution-Advanced (LTE-A). In the beginning, the evolution from third generation (3G) to fourth generation (4G) is illustrated in terms of featured performance requirements and the integration of current and future radio access technologies, is also highlighted. Additionally, this paper discusses the current technical trends and possible improvements of the packet scheduling algorithms with CA for LTE-A.
载波聚合(Carrier Aggregation, CA)技术是LTE-Advanced系统中增加带宽的一种有潜力的技术。然而,CA的引入给传统的无线电资源管理(RRM)机制带来了许多挑战。本文对LTE-A的CA和分组调度算法进行了研究。首先,从特征性能要求和当前和未来无线接入技术的集成方面说明了从第三代(3G)到第四代(4G)的演进。此外,本文还讨论了LTE-A中CA分组调度算法的当前技术趋势和可能的改进。
{"title":"An investigation of packet scheduling algorithms for Long Term Evolution-Advanced","authors":"H. Ramli, M. Hasan, A. F. Ismail, A. Abdalla, K. Abdullah","doi":"10.1109/ICOS.2012.6417630","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417630","url":null,"abstract":"Carrier Aggregation (CA) is a potential technique to increase the band width in LTE-Advanced system. However, the introduction of CA brings a number challenges to the traditional Radio Resource Management (RRM) mechanisms. This paper investigates the current algorithms of CA and packet scheduling forthe Long Term Evolution-Advanced (LTE-A). In the beginning, the evolution from third generation (3G) to fourth generation (4G) is illustrated in terms of featured performance requirements and the integration of current and future radio access technologies, is also highlighted. Additionally, this paper discusses the current technical trends and possible improvements of the packet scheduling algorithms with CA for LTE-A.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126343641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2012 IEEE Conference on Open Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1