首页 > 最新文献

2013 3rd IEEE International Advance Computing Conference (IACC)最新文献

英文 中文
Trust and reliability based load balancing algorithm for cloud IaaS 基于信任和可靠性的云IaaS负载均衡算法
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514196
P. Gupta, M. Goyal, P. Kumar
Load balancing algorithm is used to distribute the load among various nodes in the distributed system to improve the resource utilization and request response time of the system. These algorithms are mainly used to overcome the situation where a node is heavily loaded and other nodes are idle and because of which the request fails. Many load balancing algorithms are being proposed in distributed and grid environment, but they do not take into consideration the trust and the reliability of the datacenter. In this paper, a suitable trust model is proposed based on the existing model that is suitable for trust value management for the cloud IaaS parameters. Based on the above achieved trust values, a suitable load balancing algorithm is proposed for better distribution of load which further enhance the QOS of services being provided to the users.
采用负载均衡算法将负载在分布式系统的各个节点之间进行分配,以提高系统的资源利用率和请求响应时间。这些算法主要用于克服一个节点负载过重而其他节点空闲而导致请求失败的情况。在分布式和网格环境下提出了许多负载均衡算法,但它们都没有考虑数据中心的信任和可靠性。本文在现有模型的基础上,提出了适合于云IaaS参数信任值管理的合适的信任模型。在此基础上,提出了一种合适的负载均衡算法,以更好地分配负载,进一步提高提供给用户的服务的QOS。
{"title":"Trust and reliability based load balancing algorithm for cloud IaaS","authors":"P. Gupta, M. Goyal, P. Kumar","doi":"10.1109/IADCC.2013.6514196","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514196","url":null,"abstract":"Load balancing algorithm is used to distribute the load among various nodes in the distributed system to improve the resource utilization and request response time of the system. These algorithms are mainly used to overcome the situation where a node is heavily loaded and other nodes are idle and because of which the request fails. Many load balancing algorithms are being proposed in distributed and grid environment, but they do not take into consideration the trust and the reliability of the datacenter. In this paper, a suitable trust model is proposed based on the existing model that is suitable for trust value management for the cloud IaaS parameters. Based on the above achieved trust values, a suitable load balancing algorithm is proposed for better distribution of load which further enhance the QOS of services being provided to the users.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123287460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A translinear-based implementation of digital logic gates using only CMOS in current-mode 电流模式下仅使用CMOS的数字逻辑门的跨线性实现
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514446
J. Singh
The implementation of basic logic functions based on current-mode techniques is proposed in this paper. By expanding the logic function in power series expression, using adder, sub-tractor and multipliers realization of the basic logic functions are simplified. To illustrate the proposed technique, a CMOS circuit for simultaneous realization of the basic logic functions NOT, AND, OR, NAND and XOR is considered. In this paper digital logic gates are realized at low voltage using analog current-mode techniques. The circuit can be operated with ± 3.1V supplies. PSPICE simulation and experimental results show good agreement with the theoretical predictions.
本文提出了基于电流模式技术的基本逻辑功能的实现。通过展开幂级数表达式中的逻辑函数,利用加法器、子拖法器和乘法器实现基本逻辑函数的简化。为了说明所提出的技术,考虑了同时实现基本逻辑功能的CMOS电路NOT, AND, OR, NAND和XOR。本文采用模拟电流模式技术实现了低电压下的数字逻辑门。该电路可在±3.1V电源下工作。PSPICE仿真和实验结果与理论预测吻合较好。
{"title":"A translinear-based implementation of digital logic gates using only CMOS in current-mode","authors":"J. Singh","doi":"10.1109/IADCC.2013.6514446","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514446","url":null,"abstract":"The implementation of basic logic functions based on current-mode techniques is proposed in this paper. By expanding the logic function in power series expression, using adder, sub-tractor and multipliers realization of the basic logic functions are simplified. To illustrate the proposed technique, a CMOS circuit for simultaneous realization of the basic logic functions NOT, AND, OR, NAND and XOR is considered. In this paper digital logic gates are realized at low voltage using analog current-mode techniques. The circuit can be operated with ± 3.1V supplies. PSPICE simulation and experimental results show good agreement with the theoretical predictions.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123844648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of optimum addition algorithm using modified parallel hybrid signed digit (MPHSD) technique 基于改进并行混合符号数(MPHSD)技术的最优加法算法的开发
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514450
V. Awasthi, K. Raj
Signed digit (SD) number systems provide the possibility of constant-time addition, where interdigit carry propagation is eliminated. In this paper, two classes of parallel adder are surveyed with an asynchronous adder based on their delay, area and power characteristics. With the development of high speed processors, a tradeoff is always required between area and execution time to yield the most suitable implementation with low power consumption. In this paper, we proposed an optimum high speed fast adder algorithm by using signed and hybrid signed digit algorithms. This modified parallel hybrid signed digit (MPHSD) adder has high speed and less area as compare to conventional adders like ripple carry adder and carry lookahead adder. The MPHSD adder require few more configuration logic blocks (CLB's) because of redundant logic to optimize execution time with area and power. A relative merits and demerits is also evaluated by performing a detailed analysis in terms of its cost and performance.
有符号数字(SD)数字系统提供了恒定时间加法的可能性,消除了数字间进位传播。本文用异步加法器对两类并行加法器的时延、面积和功率特性进行了研究。随着高速处理器的发展,总是需要在面积和执行时间之间进行权衡,以产生具有低功耗的最合适的实现。本文提出了一种采用有符号和混合有符号数算法的最优高速快速加法器算法。与传统的纹波进位加法器和进位前移加法器相比,这种改进的并行混合符号数加法器具有速度快、面积小的优点。由于冗余逻辑,MPHSD加法器需要更多的配置逻辑块(CLB)来优化执行时间、面积和功率。通过对其成本和性能进行详细分析,还可以评估其相对优点和缺点。
{"title":"Development of optimum addition algorithm using modified parallel hybrid signed digit (MPHSD) technique","authors":"V. Awasthi, K. Raj","doi":"10.1109/IADCC.2013.6514450","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514450","url":null,"abstract":"Signed digit (SD) number systems provide the possibility of constant-time addition, where interdigit carry propagation is eliminated. In this paper, two classes of parallel adder are surveyed with an asynchronous adder based on their delay, area and power characteristics. With the development of high speed processors, a tradeoff is always required between area and execution time to yield the most suitable implementation with low power consumption. In this paper, we proposed an optimum high speed fast adder algorithm by using signed and hybrid signed digit algorithms. This modified parallel hybrid signed digit (MPHSD) adder has high speed and less area as compare to conventional adders like ripple carry adder and carry lookahead adder. The MPHSD adder require few more configuration logic blocks (CLB's) because of redundant logic to optimize execution time with area and power. A relative merits and demerits is also evaluated by performing a detailed analysis in terms of its cost and performance.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127563427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Searching Methodology for finding relevant Paths between nodes using Qualified Bi-Directional BFS algorithm on Graph database 在图数据库中使用限定双向BFS算法寻找节点间相关路径的有效搜索方法
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514311
R. Goel, N. Srivastava, H. Chandola, B. Rohilla, S. Srivastava, R. Goudar
With the advancement of time, technology is in its booming phase. In the present era, data whether accessed over internet or the data used by any application needs to be searched effectively and then presented to the naive i.e. end user. Searching plays a vital role in fetching the data. The search by specialization and generalization are in wide practice. The linking and associations between entities are elusive. The result of searching over the entities may engender to obtain multifarious relationships between the entities. So, it is important to make a note of all the important and meaningful relations. There arises a possibility of relationship between two entities which consist of several intermediate entities. So, to distill out the essential paths, user may specify one or more intermediate entities. Learning, optimizing and analyzing existing examples aggrandizes the research scope. Backward search, Bi-Directional search, Bi-Directional breadth first search are such existing examples where relevant path is extracted between source and destination entities. In this paper, we are proposing a qualified bi-directional BFS algorithm to discover the relevant path between the two entities which passes through the intermediate node as specified by the user. Unlike the typical searching methodologies where the all the possible paths between the two entities are discovered and then later, the paths which are relevant to user are filtered out and ranked according to user's requirement, the qualified bi-directional BFS algorithm reduces the time in finding the resultant relevant path between the two entities as it considers only those nodes which contains user specified intermediate node. When the system will be developed and after its empirical evaluation, our proposed algorithm will ameliorate the searching and will also be time efficient.
随着时代的进步,科技正处于蓬勃发展的阶段。在当今时代,无论是通过互联网访问的数据还是任何应用程序使用的数据,都需要进行有效的搜索,然后呈现给幼稚的最终用户。搜索在获取数据中起着至关重要的作用。专门化和泛化的搜索正在广泛的实践中。实体之间的联系和关联是难以捉摸的。对实体进行搜索的结果可能导致实体之间产生各种各样的关系。因此,重要的是要记下所有重要和有意义的关系。由多个中间实体组成的两个实体之间可能存在关系。因此,为了提炼出必要的路径,用户可以指定一个或多个中间实体。学习、优化和分析已有的例子扩大了研究范围。反向搜索、双向搜索、双向广度优先搜索就是在源实体和目标实体之间提取相关路径的例子。在本文中,我们提出了一种合格的双向BFS算法来发现两个实体之间的相关路径,该路径经过用户指定的中间节点。典型的搜索方法是先发现两个实体之间的所有可能路径,然后根据用户的要求过滤掉与用户相关的路径并进行排序,而合格双向BFS算法只考虑包含用户指定的中间节点的节点,从而减少了寻找两个实体之间最终相关路径的时间。当系统将被开发并经过实证评估后,我们提出的算法将改进搜索,并且具有时间效率。
{"title":"Effective Searching Methodology for finding relevant Paths between nodes using Qualified Bi-Directional BFS algorithm on Graph database","authors":"R. Goel, N. Srivastava, H. Chandola, B. Rohilla, S. Srivastava, R. Goudar","doi":"10.1109/IADCC.2013.6514311","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514311","url":null,"abstract":"With the advancement of time, technology is in its booming phase. In the present era, data whether accessed over internet or the data used by any application needs to be searched effectively and then presented to the naive i.e. end user. Searching plays a vital role in fetching the data. The search by specialization and generalization are in wide practice. The linking and associations between entities are elusive. The result of searching over the entities may engender to obtain multifarious relationships between the entities. So, it is important to make a note of all the important and meaningful relations. There arises a possibility of relationship between two entities which consist of several intermediate entities. So, to distill out the essential paths, user may specify one or more intermediate entities. Learning, optimizing and analyzing existing examples aggrandizes the research scope. Backward search, Bi-Directional search, Bi-Directional breadth first search are such existing examples where relevant path is extracted between source and destination entities. In this paper, we are proposing a qualified bi-directional BFS algorithm to discover the relevant path between the two entities which passes through the intermediate node as specified by the user. Unlike the typical searching methodologies where the all the possible paths between the two entities are discovered and then later, the paths which are relevant to user are filtered out and ranked according to user's requirement, the qualified bi-directional BFS algorithm reduces the time in finding the resultant relevant path between the two entities as it considers only those nodes which contains user specified intermediate node. When the system will be developed and after its empirical evaluation, our proposed algorithm will ameliorate the searching and will also be time efficient.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131168017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach for accessing data from hidden web using intelligent agent technology 一种利用智能代理技术访问隐藏web数据的方法
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514329
Lohit Singh, Dilip Kumar Sharma
There is large amount of information available on web, which is hidden from users. This is because such information is not able to be accessed or indexed by traditional search engines. These search engines are only able to crawl information by following hypertext links. The forms which require login or any authorization process can be ignored by them. Hidden web refers to that deepest part of the Web which is not available for traditional Web crawlers. Obtaining the content from Hidden web is a challenging task. Today many web sites are containing pages that are dynamic in nature. This dynamic nature of web pages creates a problem for retrieving information for traditional web crawlers. The effort done to solve the given problem is discussed in brief. Then, a comparative study among the earlier defined architecture, considering various parameters, is also shown. By analyzing above methods a framework is proposed which uses an intelligent agent technology for accessing the hidden web.
网络上有大量的信息,这些信息对用户来说是隐藏的。这是因为这些信息不能被传统的搜索引擎访问或索引。这些搜索引擎只能通过跟踪超文本链接来抓取信息。需要登录或任何授权过程的表单可以被他们忽略。隐藏网络指的是网络最深处,传统网络爬虫无法访问的部分。从隐网中获取内容是一项具有挑战性的任务。今天,许多网站都包含动态的页面。网页的这种动态特性给传统的网络爬虫程序检索信息带来了问题。简要地讨论了为解决给定问题所做的努力。然后,在考虑各种参数的情况下,对早期定义的体系结构进行了比较研究。通过对上述方法的分析,提出了一种利用智能代理技术访问隐藏web的框架。
{"title":"An approach for accessing data from hidden web using intelligent agent technology","authors":"Lohit Singh, Dilip Kumar Sharma","doi":"10.1109/IADCC.2013.6514329","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514329","url":null,"abstract":"There is large amount of information available on web, which is hidden from users. This is because such information is not able to be accessed or indexed by traditional search engines. These search engines are only able to crawl information by following hypertext links. The forms which require login or any authorization process can be ignored by them. Hidden web refers to that deepest part of the Web which is not available for traditional Web crawlers. Obtaining the content from Hidden web is a challenging task. Today many web sites are containing pages that are dynamic in nature. This dynamic nature of web pages creates a problem for retrieving information for traditional web crawlers. The effort done to solve the given problem is discussed in brief. Then, a comparative study among the earlier defined architecture, considering various parameters, is also shown. By analyzing above methods a framework is proposed which uses an intelligent agent technology for accessing the hidden web.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132793568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel techniques to reduce PAPR in OFDM systems using threshold SLM 利用阈值SLM降低OFDM系统PAPR的新技术
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514279
Bahubali K. Shiragapur, U. Wali, S. Bidwai
Orthogonal Frequency Division Multiplexing (OFDM) is proven technology in modern wireless communication because of its high data rate, more immunity to delay spread. In this paper, we proposed probabilistic threshold Selective Mapping Technique which has low PAPR. The simulation result shows that modified technique has better PAPR reduction performance.
正交频分复用(OFDM)技术以其高数据速率、抗时延传播能力等优点在现代无线通信中得到了广泛的应用。本文提出了一种具有低PAPR的概率阈值选择性映射技术。仿真结果表明,改进后的方法具有更好的PAPR抑制性能。
{"title":"Novel techniques to reduce PAPR in OFDM systems using threshold SLM","authors":"Bahubali K. Shiragapur, U. Wali, S. Bidwai","doi":"10.1109/IADCC.2013.6514279","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514279","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is proven technology in modern wireless communication because of its high data rate, more immunity to delay spread. In this paper, we proposed probabilistic threshold Selective Mapping Technique which has low PAPR. The simulation result shows that modified technique has better PAPR reduction performance.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132798967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Simulation and analysis of performance prediction in Distributed Database design using OO approach 面向对象方法在分布式数据库设计中的性能预测仿真与分析
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514420
S. Jagannatha, S. Reddy, T. Kumar, K. R. Kanth
Distributed databases have become necessity in the organizations, as applications are require data locally rather than remote locations. It is important to place data where the applications are required to process data. Data fragmentation and placement becomes a critical performance issue in Distributed Database design that has to be placed at different sites based on the usage of data. The performance of the application would become assessed and improved if it is properly fragment and allocate data during early design stages. In this paper, we proposed an algorithm by performing vertical fragmentation technique for the Distributed Database design for assessing the performance during early design stages. We simulated the algorithm with the case study. We used the proposed algorithm, Attribute Usage Matrix, and Random Number Generation technique for generating the values of Request Query, Arrival of Request, and Query generation. The Simulation results which helps the DBA to assess the performance of the proposed Distributed Database Design. The tool which helps the DBA to select the optimum design.
分布式数据库在组织中已经变得必不可少,因为应用程序需要本地而不是远程位置的数据。将数据放在应用程序需要处理数据的地方是很重要的。数据碎片和放置成为分布式数据库设计中的一个关键性能问题,必须根据数据的使用情况将数据放置在不同的站点。如果在早期设计阶段正确分割和分配数据,应用程序的性能将得到评估和改进。在本文中,我们提出了一种算法,通过执行垂直碎片技术为分布式数据库设计在早期设计阶段的性能评估。我们通过案例研究模拟了该算法。我们使用提出的算法、属性使用矩阵和随机数生成技术来生成请求查询、请求到达和查询生成的值。仿真结果有助于DBA评估所提出的分布式数据库设计的性能。帮助DBA选择最优设计的工具。
{"title":"Simulation and analysis of performance prediction in Distributed Database design using OO approach","authors":"S. Jagannatha, S. Reddy, T. Kumar, K. R. Kanth","doi":"10.1109/IADCC.2013.6514420","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514420","url":null,"abstract":"Distributed databases have become necessity in the organizations, as applications are require data locally rather than remote locations. It is important to place data where the applications are required to process data. Data fragmentation and placement becomes a critical performance issue in Distributed Database design that has to be placed at different sites based on the usage of data. The performance of the application would become assessed and improved if it is properly fragment and allocate data during early design stages. In this paper, we proposed an algorithm by performing vertical fragmentation technique for the Distributed Database design for assessing the performance during early design stages. We simulated the algorithm with the case study. We used the proposed algorithm, Attribute Usage Matrix, and Random Number Generation technique for generating the values of Request Query, Arrival of Request, and Query generation. The Simulation results which helps the DBA to assess the performance of the proposed Distributed Database Design. The tool which helps the DBA to select the optimum design.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134154619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TxFlowGen: Generation of Failure Atomic transactional workflows for B2B applications TxFlowGen: B2B应用程序的故障原子事务工作流的生成
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514425
K. Rajaram, C. Babu, K. S. Murali Krishnan
The Business Process Management Notation (BPMN) is a standard for business process modeling which provides notation for expressing complex business process semantics in the form of a workflow. The workflow represents an abstraction of real work as a sequence of connected steps. When multiple organizations are involved in offering a service to the consumers, workflow can be used to define the execution order of the processes. Whenever, a workflow involves a composition of multiple services offered by different organizations, the behaviour of any given service may affect other services and the overall reliability of the workflow. A transactional workflow is considered reliable, if its execution satisfies the Failure Atomicity Requirements (FAR). For example, failure of a payment service requires undoing the order processing service that has been completed already. Thus, it is necessary to represent behavioural dependencies among the constituent services of the workflow and generate its FAR which is useful for checking the reliability of the workflow. However, existing workflow generation tools and methodologies do not model the transactional workflows which depict the transactional dependencies among the services involved in the workflows. Towards fulfilling this need, the present work proposes a pattern based modeling approach to construct transactional workflows. This approach involves the identification of FAR of each service in the workflow.
业务流程管理符号(BPMN)是业务流程建模的标准,它提供了以工作流形式表示复杂业务流程语义的符号。工作流将实际工作抽象为一系列相连的步骤。当涉及多个组织向消费者提供服务时,可以使用工作流来定义流程的执行顺序。无论何时,工作流涉及由不同组织提供的多个服务的组合,任何给定服务的行为都可能影响其他服务和工作流的整体可靠性。如果事务工作流的执行满足故障原子性要求(FAR),则认为它是可靠的。例如,支付服务的失败需要撤销已经完成的订单处理服务。因此,有必要表示工作流组成服务之间的行为依赖关系,并生成用于检查工作流可靠性的FAR。然而,现有的工作流生成工具和方法没有对事务工作流建模,而事务工作流描述了工作流中涉及的服务之间的事务依赖关系。为了满足这一需求,本文提出了一种基于模式的建模方法来构建事务性工作流。这种方法涉及到工作流中每个服务的FAR的标识。
{"title":"TxFlowGen: Generation of Failure Atomic transactional workflows for B2B applications","authors":"K. Rajaram, C. Babu, K. S. Murali Krishnan","doi":"10.1109/IADCC.2013.6514425","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514425","url":null,"abstract":"The Business Process Management Notation (BPMN) is a standard for business process modeling which provides notation for expressing complex business process semantics in the form of a workflow. The workflow represents an abstraction of real work as a sequence of connected steps. When multiple organizations are involved in offering a service to the consumers, workflow can be used to define the execution order of the processes. Whenever, a workflow involves a composition of multiple services offered by different organizations, the behaviour of any given service may affect other services and the overall reliability of the workflow. A transactional workflow is considered reliable, if its execution satisfies the Failure Atomicity Requirements (FAR). For example, failure of a payment service requires undoing the order processing service that has been completed already. Thus, it is necessary to represent behavioural dependencies among the constituent services of the workflow and generate its FAR which is useful for checking the reliability of the workflow. However, existing workflow generation tools and methodologies do not model the transactional workflows which depict the transactional dependencies among the services involved in the workflows. Towards fulfilling this need, the present work proposes a pattern based modeling approach to construct transactional workflows. This approach involves the identification of FAR of each service in the workflow.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133079848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Change impact analysis and its regression test effort estimation 变更影响分析及其回归测试工作量估计
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514435
Prateek Khurana, Aprna Tripathi, D. S. Kushwaha
Software maintenance is the most demanding and effort-consuming phase in software development. It has been recognized as being a tedious step in software development process. Two basic activities in software maintenance are the understanding of the system and the assessment of the potential effects of a change. A change to a system, however small, can lead to several accidental effects, which are often not obvious and easy to identify. The main purpose of impact analysis is not only to find the impact set in terms of coding elements but also in terms of effort and resources required for implementing the change so that analysts could analyze the impact of the requested change in terms of budget. The objective of this paper is to find the impact set of the change requested by user or client. By using the impact set we estimate the regression test effort. We illustrate our results with a case study. As the results of this work, we get the impact set having impact element as class names with respect to the requested change, the test suite and the effort required for regression testing after the implementation of the requested change.
软件维护是软件开发中要求最高、最费力的阶段。它被认为是软件开发过程中一个乏味的步骤。软件维护中的两个基本活动是对系统的理解和对变更的潜在影响的评估。一个系统的变化,无论多么小,都可能导致一些意外的影响,这些影响往往不明显,也不容易识别。影响分析的主要目的不仅是根据编码元素找到影响集,而且要根据实现变更所需的工作量和资源找到影响集,以便分析人员可以根据预算分析所请求的变更的影响。本文的目标是找到用户或客户端请求的更改的影响集。通过使用影响集,我们估计回归测试的工作量。我们通过一个案例研究来说明我们的结果。作为这项工作的结果,我们得到了影响集,这些影响集具有作为类名的影响元素,与所请求的更改、测试套件以及在所请求的更改实现之后进行回归测试所需的工作相关。
{"title":"Change impact analysis and its regression test effort estimation","authors":"Prateek Khurana, Aprna Tripathi, D. S. Kushwaha","doi":"10.1109/IADCC.2013.6514435","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514435","url":null,"abstract":"Software maintenance is the most demanding and effort-consuming phase in software development. It has been recognized as being a tedious step in software development process. Two basic activities in software maintenance are the understanding of the system and the assessment of the potential effects of a change. A change to a system, however small, can lead to several accidental effects, which are often not obvious and easy to identify. The main purpose of impact analysis is not only to find the impact set in terms of coding elements but also in terms of effort and resources required for implementing the change so that analysts could analyze the impact of the requested change in terms of budget. The objective of this paper is to find the impact set of the change requested by user or client. By using the impact set we estimate the regression test effort. We illustrate our results with a case study. As the results of this work, we get the impact set having impact element as class names with respect to the requested change, the test suite and the effort required for regression testing after the implementation of the requested change.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133531675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cost performance analysis of intrusion detection system in mobile wireless ad-hoc network 移动无线自组网中入侵检测系统的性价比分析
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514283
A. K. Pinnaka, D. Tharashasank, V. S. K. Reddy
Like any other wireless communication settings, mobile ad-hoc network inherits potential dangerous vulnerabilities in network security. A proactive security defense such as intrusion detection system has become a recent research topic in this area. Many intrusion detection models are proposed by the researchers and most of them are promising. How-ever, the problem in mobile ad-hoc environment is that communication and power resources are very limited. Thus, any additional features which need to be implemented in this environment must be as efficient as possible. This paper presents a comparison study between the co-operative detection model and the aggregative detection model to evaluate the efficiency of resource usage. We use a sample case study of disaster recovery operations system to have a real scenario of mobile ad-hoc practice. An experiment is conducted using that scenario under different treatments. The contribution of our work is to suggest an intrusion detection model that is efficient but still reliable to use.
与任何其他无线通信设置一样,移动自组织网络继承了网络安全中的潜在危险漏洞。主动安全防御系统如入侵检测系统已成为该领域的研究热点。研究人员提出了许多入侵检测模型,其中大多数都很有前景。然而,在移动自组织环境中存在的问题是通信和电力资源非常有限。因此,需要在此环境中实现的任何附加功能都必须尽可能高效。针对资源利用效率的评价问题,对合作检测模型和聚合检测模型进行了比较研究。我们使用灾难恢复操作系统的示例案例研究来获得移动自组织实践的真实场景。利用该情景在不同处理下进行了实验。我们的工作贡献在于提出了一种高效且使用可靠的入侵检测模型。
{"title":"Cost performance analysis of intrusion detection system in mobile wireless ad-hoc network","authors":"A. K. Pinnaka, D. Tharashasank, V. S. K. Reddy","doi":"10.1109/IADCC.2013.6514283","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514283","url":null,"abstract":"Like any other wireless communication settings, mobile ad-hoc network inherits potential dangerous vulnerabilities in network security. A proactive security defense such as intrusion detection system has become a recent research topic in this area. Many intrusion detection models are proposed by the researchers and most of them are promising. How-ever, the problem in mobile ad-hoc environment is that communication and power resources are very limited. Thus, any additional features which need to be implemented in this environment must be as efficient as possible. This paper presents a comparison study between the co-operative detection model and the aggregative detection model to evaluate the efficiency of resource usage. We use a sample case study of disaster recovery operations system to have a real scenario of mobile ad-hoc practice. An experiment is conducted using that scenario under different treatments. The contribution of our work is to suggest an intrusion detection model that is efficient but still reliable to use.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133850814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2013 3rd IEEE International Advance Computing Conference (IACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1