Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914154
H. M. Nasir, M. Aminuddin
This paper presents a storage system design based on energy harvesting to achieve battery-less for Wireless Sensor Network (WSN) application. The storage system is part of the Wireless Sensor Energy Harvesting to store and amplify the energy harvested from the surroundings. The proposed method must be consumes very little power and suitable for ambient environmental sources such as vibration, wind and RF energy and be able to boost up the energy for storage system. The output of the harvested voltage is insufficient for most applications, therefore the system will boost up the input voltage level using DC to DC converter topology to higher dc voltage. The DC to DC converter shall be designed to suit the types of storage required. The output voltage of this DC converter should be sufficient to charge either capacitor or supercapacitor that will be use in this system as the energy storage system. The supercapacitor will provide power to energize any system such as in this case wireless sensor network [1]. In the case of wireless sensor network for example, the node would require the energy during transmitting and receiving data only whereas during standby mode or sleep mode, the amount of energy required would be very small [2]. Therefore the storage system will make use of this standby time or sleep mode of the sensor node to store as much energy as possible. The presented DC to DC converter in this paper has high efficiency upto 85.4% with input voltage between range 300mV to 600mV.
{"title":"Efficient low voltage amplification using self starting voltage regulator for storage system","authors":"H. M. Nasir, M. Aminuddin","doi":"10.1109/I4CT.2014.6914154","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914154","url":null,"abstract":"This paper presents a storage system design based on energy harvesting to achieve battery-less for Wireless Sensor Network (WSN) application. The storage system is part of the Wireless Sensor Energy Harvesting to store and amplify the energy harvested from the surroundings. The proposed method must be consumes very little power and suitable for ambient environmental sources such as vibration, wind and RF energy and be able to boost up the energy for storage system. The output of the harvested voltage is insufficient for most applications, therefore the system will boost up the input voltage level using DC to DC converter topology to higher dc voltage. The DC to DC converter shall be designed to suit the types of storage required. The output voltage of this DC converter should be sufficient to charge either capacitor or supercapacitor that will be use in this system as the energy storage system. The supercapacitor will provide power to energize any system such as in this case wireless sensor network [1]. In the case of wireless sensor network for example, the node would require the energy during transmitting and receiving data only whereas during standby mode or sleep mode, the amount of energy required would be very small [2]. Therefore the storage system will make use of this standby time or sleep mode of the sensor node to store as much energy as possible. The presented DC to DC converter in this paper has high efficiency upto 85.4% with input voltage between range 300mV to 600mV.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128017394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914180
R. Hans
The access and exit of motorists at Tshwane University of Technology (TUT)'s South Campus is controlled by the use of staff cards, student cards, or visitors' log book. Staff members or students of TUT are required to swipe their cards at the gate to open it when entering or leaving TUT's South Campus. Many research studies have shown that this form of identification for authentication called token-based identification poses a number of risks and challenges. It is on the basis of these risks and challenges caused by the current token-based identification system that has prompted this research study to propose the usage of a fingerprint biometric system for authentication to access or exit TUT Soshanguve South Campus by motorists. The proposed system would ensure that no criminal elements enter or exit TUT's campus under false identification, as it has happened in other South African universities, such as University of Johannesburg. There are some limitations in implementing the proposed biometric system. One such limitation is the approval of using such a system for controlling access and exit of motorists at TUT South Campus. Biometric systems deal with people's private sensitive information which should be safely guarded.
{"title":"Using a biometric system to control access and exit of vehicles at Tshwane University of Technology","authors":"R. Hans","doi":"10.1109/I4CT.2014.6914180","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914180","url":null,"abstract":"The access and exit of motorists at Tshwane University of Technology (TUT)'s South Campus is controlled by the use of staff cards, student cards, or visitors' log book. Staff members or students of TUT are required to swipe their cards at the gate to open it when entering or leaving TUT's South Campus. Many research studies have shown that this form of identification for authentication called token-based identification poses a number of risks and challenges. It is on the basis of these risks and challenges caused by the current token-based identification system that has prompted this research study to propose the usage of a fingerprint biometric system for authentication to access or exit TUT Soshanguve South Campus by motorists. The proposed system would ensure that no criminal elements enter or exit TUT's campus under false identification, as it has happened in other South African universities, such as University of Johannesburg. There are some limitations in implementing the proposed biometric system. One such limitation is the approval of using such a system for controlling access and exit of motorists at TUT South Campus. Biometric systems deal with people's private sensitive information which should be safely guarded.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914176
R. Hans, Ernest Ledwaba
The South African government faces a situation where a lot of information and knowledge relating to service delivery is continuously being accumulated. The challenge is that there is no systematic way of capturing, organizing, storing, sharing and using this knowledge to enhance innovation and service delivery in some of the government departments. To address this, there are a number of knowledge management (KM) initiatives across all government spheres, namely, national, provincial and local. One such initiative was a KM audit project by Sonjana Business Solutions in one of South African government departments. The department is currently experiencing serious challenges with respect to knowledge management issues. The KM audit was to establish a better picture of KM limitations. This research paper is a result of that KM audit project. The KM audit found that there were challenges and hurdles that would need to be overcome in order to develop an effective KM assimilation and permeation in the department. These hurdles are: Change management, Culture of knowledge sharing, Staff training, IT support, and Stakeholder management. From the KM audit results, recommendations on how to address the identified challenges were provided.
南非政府面临着大量与服务提供相关的信息和知识不断积累的局面。目前的挑战是,在一些政府部门,没有系统的方法来收集、组织、储存、分享和使用这些知识,以加强创新和提供服务。为了解决这个问题,在所有政府领域,即国家、省和地方,都有许多知识管理(KM)举措。其中一个倡议是Sonjana Business Solutions在南非一个政府部门开展的知识管理审计项目。该部门目前在知识管理问题上面临着严峻的挑战。知识管理审核是为了更好地了解知识管理的局限性。本文的研究是在该知识管理审计项目的基础上进行的。知识管理审核发现,为了在部门内发展有效的知识管理同化和渗透,需要克服一些挑战和障碍。这些障碍是:变更管理、知识共享文化、员工培训、IT支持和涉众管理。根据知识管理审计结果,提出了如何解决已确定的挑战的建议。
{"title":"Knowledge management health status assessment: a South African government department case study","authors":"R. Hans, Ernest Ledwaba","doi":"10.1109/I4CT.2014.6914176","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914176","url":null,"abstract":"The South African government faces a situation where a lot of information and knowledge relating to service delivery is continuously being accumulated. The challenge is that there is no systematic way of capturing, organizing, storing, sharing and using this knowledge to enhance innovation and service delivery in some of the government departments. To address this, there are a number of knowledge management (KM) initiatives across all government spheres, namely, national, provincial and local. One such initiative was a KM audit project by Sonjana Business Solutions in one of South African government departments. The department is currently experiencing serious challenges with respect to knowledge management issues. The KM audit was to establish a better picture of KM limitations. This research paper is a result of that KM audit project. The KM audit found that there were challenges and hurdles that would need to be overcome in order to develop an effective KM assimilation and permeation in the department. These hurdles are: Change management, Culture of knowledge sharing, Staff training, IT support, and Stakeholder management. From the KM audit results, recommendations on how to address the identified challenges were provided.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124594448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914178
M. Sarbini, S. B. Hassan, Tan Soon Jiann, P. M. N. P. H. Ahmad
A vehicle average speed monitoring system (ASMoS) design is proposed for speed management in Brunei Darussalam. This paper explains the principle of a RFID (Radio Frequency Identification)-based speed monitoring system, including all hardware and software considerations. Off-the-shelf industry standard RFID development kit is integrated with a Raspberry-Pi board as the Central Controller Unit (CCU). We adopt a two-point interrogation detection scheme for the calculation of speed over a known distance. Ultra high frequency (UHF) RFID transponders have been used for the proposed design as the key vehicle identifier. The CCU is responsible for establishing a Secure Sockets Layer (SSL) connection with a remote administration server for data storage. The aim of ASMoS is to assist road safety enforcement authorities to monitor and record speeding-related road traffic offences.
{"title":"Design of a RFID-based speed monitoring system for road vehicles in Brunei Darussalam","authors":"M. Sarbini, S. B. Hassan, Tan Soon Jiann, P. M. N. P. H. Ahmad","doi":"10.1109/I4CT.2014.6914178","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914178","url":null,"abstract":"A vehicle average speed monitoring system (ASMoS) design is proposed for speed management in Brunei Darussalam. This paper explains the principle of a RFID (Radio Frequency Identification)-based speed monitoring system, including all hardware and software considerations. Off-the-shelf industry standard RFID development kit is integrated with a Raspberry-Pi board as the Central Controller Unit (CCU). We adopt a two-point interrogation detection scheme for the calculation of speed over a known distance. Ultra high frequency (UHF) RFID transponders have been used for the proposed design as the key vehicle identifier. The CCU is responsible for establishing a Secure Sockets Layer (SSL) connection with a remote administration server for data storage. The aim of ASMoS is to assist road safety enforcement authorities to monitor and record speeding-related road traffic offences.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125465486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914161
Y. Taniguchi
Under regular or heavy traffic conditions, contention-free mechanisms such as time division multiple access (TDMA) are considered as under layer mechanisms in wireless networks. In TDMA mechanisms, links are scheduled by assigning different time slots for links that interfere each other. In this paper, we propose a self-organizing link scheduling mechanism for single-hop wireless networks considering traffic load of each wireless link. The proposed mechanism is based on a conventional desynchronization-based TDMA mechanism. Through simulation evaluations, it is shown that our proposed mechanism can schedule links in a self-organizing manner in accordance with traffic load of each link.
{"title":"Desynchronization-based weighted scheduling adaptive to traffic load for wireless networks","authors":"Y. Taniguchi","doi":"10.1109/I4CT.2014.6914161","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914161","url":null,"abstract":"Under regular or heavy traffic conditions, contention-free mechanisms such as time division multiple access (TDMA) are considered as under layer mechanisms in wireless networks. In TDMA mechanisms, links are scheduled by assigning different time slots for links that interfere each other. In this paper, we propose a self-organizing link scheduling mechanism for single-hop wireless networks considering traffic load of each wireless link. The proposed mechanism is based on a conventional desynchronization-based TDMA mechanism. Through simulation evaluations, it is shown that our proposed mechanism can schedule links in a self-organizing manner in accordance with traffic load of each link.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127901009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914145
N. Ahmad, S. Zamri
The world has gone mobile. As a result, it changes the people's mindset and preferences. People tend to choose smaller and compact devices due to its mobility and started to leave the desktops and laptops behind. For that reason, many companies have engaged in taking a further step to update their services to be accessible from these kinds of device as well. However, to absolutely dispose and replace the legacy system in short time seems inappropriate, therefore having cross-platforms applications will be the best solution. With the aim to bring more convenience to the tendering services offered by a construction industry, this paper proposes a cross-platform application development environment adapted Spring framework to secure a connection between two platforms; Android and Windows. The application is able to manage requests from the front-end; the android platform devices to the Web that runs on desktop. The system architecture, the framework implementation and the application design are then presented.
{"title":"The cross platform application development adapted Spring framework to support front-end tendering services","authors":"N. Ahmad, S. Zamri","doi":"10.1109/I4CT.2014.6914145","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914145","url":null,"abstract":"The world has gone mobile. As a result, it changes the people's mindset and preferences. People tend to choose smaller and compact devices due to its mobility and started to leave the desktops and laptops behind. For that reason, many companies have engaged in taking a further step to update their services to be accessible from these kinds of device as well. However, to absolutely dispose and replace the legacy system in short time seems inappropriate, therefore having cross-platforms applications will be the best solution. With the aim to bring more convenience to the tendering services offered by a construction industry, this paper proposes a cross-platform application development environment adapted Spring framework to secure a connection between two platforms; Android and Windows. The application is able to manage requests from the front-end; the android platform devices to the Web that runs on desktop. The system architecture, the framework implementation and the application design are then presented.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129160323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914158
Sabri M. Hanshi, Yung-Wey Chong, S. Ramadass, Adel Nadhem Naeem, Khai-Chin Ooi
Traditionally, acoustic echo problem was solved by employing large scale digital signal processors. However, such system is costly and it should be implemented in advance with audio devices. With the advancement of computational speed of personal computer, researchers are exploring ways to design Acoustic Echo Cancellation (AEC) software that is able to reduced echoes resulting from the acoustic coupling between loudspeaker and microphone. Although numerous algorithms have been developed in recent years, the existing AEC algorithms are unable to tackle the issues for devices that have different sampling rate. Besides the adaptive filter that used in AEC system, re-sampling algorithms that is able to match the sampling rate of the input signals to the AEC system, and synchronization controller between speaker signal and microphone signal is also required. Therefore, in this paper a new AEC system framework has been proposed that can handle the mismatch in the sampling rate of the input signals and generate a balanced sampling rate output.
{"title":"Efficient Acoustic Echo Cancellation joint with noise reduction framework","authors":"Sabri M. Hanshi, Yung-Wey Chong, S. Ramadass, Adel Nadhem Naeem, Khai-Chin Ooi","doi":"10.1109/I4CT.2014.6914158","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914158","url":null,"abstract":"Traditionally, acoustic echo problem was solved by employing large scale digital signal processors. However, such system is costly and it should be implemented in advance with audio devices. With the advancement of computational speed of personal computer, researchers are exploring ways to design Acoustic Echo Cancellation (AEC) software that is able to reduced echoes resulting from the acoustic coupling between loudspeaker and microphone. Although numerous algorithms have been developed in recent years, the existing AEC algorithms are unable to tackle the issues for devices that have different sampling rate. Besides the adaptive filter that used in AEC system, re-sampling algorithms that is able to match the sampling rate of the input signals to the AEC system, and synchronization controller between speaker signal and microphone signal is also required. Therefore, in this paper a new AEC system framework has been proposed that can handle the mismatch in the sampling rate of the input signals and generate a balanced sampling rate output.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116912798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914168
V. Mezhuyev
The paper discusses the methodology of Domain-Specific Mathematical Modelling, allowing development of metamodels and their application to modelling domains with different mathematical structure. The concepts of the metamodel, the metamodelling, the domain are considered, the stages of Domain-Specific Mathematical Modelling and the architecture of implementing this methodology software tools are defined.
{"title":"Architecture of software tools for Domain-Specific Mathematical Modelling","authors":"V. Mezhuyev","doi":"10.1109/I4CT.2014.6914168","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914168","url":null,"abstract":"The paper discusses the methodology of Domain-Specific Mathematical Modelling, allowing development of metamodels and their application to modelling domains with different mathematical structure. The concepts of the metamodel, the metamodelling, the domain are considered, the stages of Domain-Specific Mathematical Modelling and the architecture of implementing this methodology software tools are defined.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115282375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914152
H. Shibasaki, R. Yusof, Takehito Fujio, Y. Ishida
In this paper, we propose simple model following control design methods for a stable and an unstable plant. Each method is based on the pole placement using model parameters. In simulation studies, we show various cases including a nominal plant and the plant with a modeling error for a stable plant, an unstable plant, and a DC motor. These results show that the proposed methods have been superior performances.
{"title":"Simple model following control design methods for a stable and an unstable plant","authors":"H. Shibasaki, R. Yusof, Takehito Fujio, Y. Ishida","doi":"10.1109/I4CT.2014.6914152","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914152","url":null,"abstract":"In this paper, we propose simple model following control design methods for a stable and an unstable plant. Each method is based on the pole placement using model parameters. In simulation studies, we show various cases including a nominal plant and the plant with a modeling error for a stable plant, an unstable plant, and a DC motor. These results show that the proposed methods have been superior performances.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115344105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/I4CT.2014.6914222
P. Kumar, S. Ramachandram
Grid computing provides collaborative sharing of resources among the peers across the world. There are various types of resources in a grid at different capacities such as computing, storage, and instruments. Security plays a vital role in setting up a grid and to preserve its resources. Further, trust also plays a vital role in building a confidence level in sharing the resources. T-Grid is the model proposed to evaluate the trust by applying fuzzy rules on direct trust and indirect trust, relatively using new approaches. One such approach in this direction is quantification of direct trust. Quantification of direct trust in this T-Grid model is assumed to be dependent on satisfaction of requester, which is based on two factors satisfaction due to availability and satisfaction due to reliability. And, indirect trust is chosen due to recommendations or feedbacks received from the user and/or recommenders in the system. This paper proposes a satisfaction based approach of quantification of direct trust in T-Grid computational model. The performance evaluation of the proposed model is done using the parameters like trustworthiness of the resources, and resource utilization. The results also indicate that, in spite of maintaining the balance in the resource utilization, highly trusted resources are selected for grid services.
{"title":"User satisfaction based quantification of direct trust in T-Grid computational model","authors":"P. Kumar, S. Ramachandram","doi":"10.1109/I4CT.2014.6914222","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914222","url":null,"abstract":"Grid computing provides collaborative sharing of resources among the peers across the world. There are various types of resources in a grid at different capacities such as computing, storage, and instruments. Security plays a vital role in setting up a grid and to preserve its resources. Further, trust also plays a vital role in building a confidence level in sharing the resources. T-Grid is the model proposed to evaluate the trust by applying fuzzy rules on direct trust and indirect trust, relatively using new approaches. One such approach in this direction is quantification of direct trust. Quantification of direct trust in this T-Grid model is assumed to be dependent on satisfaction of requester, which is based on two factors satisfaction due to availability and satisfaction due to reliability. And, indirect trust is chosen due to recommendations or feedbacks received from the user and/or recommenders in the system. This paper proposes a satisfaction based approach of quantification of direct trust in T-Grid computational model. The performance evaluation of the proposed model is done using the parameters like trustworthiness of the resources, and resource utilization. The results also indicate that, in spite of maintaining the balance in the resource utilization, highly trusted resources are selected for grid services.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133498976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}