首页 > 最新文献

2014 International Conference on Computer, Communications, and Control Technology (I4CT)最新文献

英文 中文
Forensic challenges in mobile cloud computing 移动云计算中的取证挑战
Suleman Khan, Ejaz Ahmad, M. Shiraz, A. Gani, Ainuddin Wahid Abdul Wahab, M. Bagiwa
Mobile cloud computing (MCC) is fast becoming one of the most essential research topics for distributed resource networks. Users can easily access cloud while offloading their mobile applications from anywhere anytime. Being easy to access, intruder attacks mobile networks to acquire credential from mobile applications inside and outside the cloud computing. To investigate intruder's attacks, digital investigator has to identify the root cause of the attack. However, investigating MCC infrastructure is difficult due to its characteristics of virtualization, dispersion of data, multi tenancy, interoperability, and mobility. In this paper, we present an overview of MCC and digital forensics, focusing on its key aspects and significant forensic challenges faced by digital investigators in MCC. The purpose of this paper is to provide a comprehensive understanding about forensic research challenges and re-direct researchers towards new research areas.
移动云计算(MCC)正迅速成为分布式资源网络最重要的研究课题之一。用户可以随时随地轻松访问云,同时卸载他们的移动应用程序。由于易于访问,入侵者攻击移动网络,从云计算内部和外部的移动应用程序获取凭证。为了调查入侵者的攻击,数字调查员必须确定攻击的根本原因。然而,由于MCC基础设施具有虚拟化、数据分散、多租户、互操作性和移动性等特点,因此调查MCC基础设施很困难。在本文中,我们概述了MCC和数字取证,重点关注其关键方面和MCC数字调查员面临的重大法医挑战。本文的目的是提供一个全面的了解法医研究的挑战和重新引导研究人员向新的研究领域。
{"title":"Forensic challenges in mobile cloud computing","authors":"Suleman Khan, Ejaz Ahmad, M. Shiraz, A. Gani, Ainuddin Wahid Abdul Wahab, M. Bagiwa","doi":"10.1109/I4CT.2014.6914202","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914202","url":null,"abstract":"Mobile cloud computing (MCC) is fast becoming one of the most essential research topics for distributed resource networks. Users can easily access cloud while offloading their mobile applications from anywhere anytime. Being easy to access, intruder attacks mobile networks to acquire credential from mobile applications inside and outside the cloud computing. To investigate intruder's attacks, digital investigator has to identify the root cause of the attack. However, investigating MCC infrastructure is difficult due to its characteristics of virtualization, dispersion of data, multi tenancy, interoperability, and mobility. In this paper, we present an overview of MCC and digital forensics, focusing on its key aspects and significant forensic challenges faced by digital investigators in MCC. The purpose of this paper is to provide a comprehensive understanding about forensic research challenges and re-direct researchers towards new research areas.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132171536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Analysis of retrieval result on ontology-based query reformulation 基于本体的查询重构检索结果分析
A. Azizan, Zainab Binti Abu Bakar, S. Noah
Users normally facing difficulties to expresses their information needs into a query format that the search system can use to process. Therefore users frequently modify their query with intention to retrieve better results. The goal of this experiment is to compare the precision of the retrieved results by employing domain ontology to reformulate the user query. We proposed to reformulate the query (initially in natural language) by replacing it with the terms retrieved from ontology. Then we improve the approach by combining the terms from ontology with keyword/s extracted from the initial user's natural language query. Precision measure had been conducted for six queries and the results showed that the idea of combining ontology terms with keyword from query gave a promising result. It achieved higher precision in comparison when using ontology terms alone. This experimental result indicates that query reformulation is more efficient when ontology term/s combined with key element from the user's query.
用户通常难以将他们的信息需求表达为搜索系统可以使用的查询格式。因此,用户经常修改他们的查询,以获得更好的结果。本实验的目的是利用领域本体对用户查询进行重新表述,比较检索结果的精度。我们建议用从本体中检索到的术语来替换查询(最初使用自然语言)。然后,我们通过将本体中的术语与从初始用户的自然语言查询中提取的关键字相结合来改进该方法。对6个查询进行了精度度量,结果表明,将本体术语与查询关键字相结合的思想取得了良好的效果。与单独使用本体术语相比,获得了更高的精度。实验结果表明,当本体术语与用户查询中的关键元素相结合时,查询重构的效率更高。
{"title":"Analysis of retrieval result on ontology-based query reformulation","authors":"A. Azizan, Zainab Binti Abu Bakar, S. Noah","doi":"10.1109/I4CT.2014.6914183","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914183","url":null,"abstract":"Users normally facing difficulties to expresses their information needs into a query format that the search system can use to process. Therefore users frequently modify their query with intention to retrieve better results. The goal of this experiment is to compare the precision of the retrieved results by employing domain ontology to reformulate the user query. We proposed to reformulate the query (initially in natural language) by replacing it with the terms retrieved from ontology. Then we improve the approach by combining the terms from ontology with keyword/s extracted from the initial user's natural language query. Precision measure had been conducted for six queries and the results showed that the idea of combining ontology terms with keyword from query gave a promising result. It achieved higher precision in comparison when using ontology terms alone. This experimental result indicates that query reformulation is more efficient when ontology term/s combined with key element from the user's query.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Enhancing group activities with multidimensional communication in collaborative workspace 通过协作工作空间中的多维沟通加强小组活动
Norzilah Musa, S. Z. Abidin, N. Omar
In collaborative workspaces, users of a group communicate with other group members through information artefacts in their activities. While they are working, they can create additional small groups for inter and intra communications based on their preferences. Hence, at any specific time, a collaborative user is associated with more than one group and activity for single and multi-dimensional communication. The relationships between users, groups and activities are very complex and become a barrier to any group activities in having seamless communications. In this paper, we identify important features for single dimension and multi-dimensional communications in five domains of collaborative applications. Then, we analyze the important factors for designing mechanism to support the multi-dimensional communication based on user preference. The findings emphasize eight crucial parameters for a multi-dimensional communication in collaborative workspaces. Thus, the user-based multi-dimensional communication is significant in promoting flexible coordinating mechanism for group activities.
在协作工作空间中,组的用户通过其活动中的信息工件与其他组成员进行通信。当他们工作时,他们可以根据自己的喜好创建额外的小组进行内部和内部通信。因此,在任何特定时间,协作用户都与多个组和活动相关联,以进行单一和多维通信。用户、群组和活动之间的关系非常复杂,成为任何群组活动实现无缝通信的障碍。在本文中,我们确定了五个协作应用领域中单维和多维通信的重要特征。然后,分析了基于用户偏好的多维通信支持机制设计的重要因素。研究结果强调了协作工作空间中多维沟通的八个关键参数。因此,基于用户的多维沟通对于促进灵活的群体活动协调机制具有重要意义。
{"title":"Enhancing group activities with multidimensional communication in collaborative workspace","authors":"Norzilah Musa, S. Z. Abidin, N. Omar","doi":"10.1109/I4CT.2014.6914156","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914156","url":null,"abstract":"In collaborative workspaces, users of a group communicate with other group members through information artefacts in their activities. While they are working, they can create additional small groups for inter and intra communications based on their preferences. Hence, at any specific time, a collaborative user is associated with more than one group and activity for single and multi-dimensional communication. The relationships between users, groups and activities are very complex and become a barrier to any group activities in having seamless communications. In this paper, we identify important features for single dimension and multi-dimensional communications in five domains of collaborative applications. Then, we analyze the important factors for designing mechanism to support the multi-dimensional communication based on user preference. The findings emphasize eight crucial parameters for a multi-dimensional communication in collaborative workspaces. Thus, the user-based multi-dimensional communication is significant in promoting flexible coordinating mechanism for group activities.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123199718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Markov-modulated Bernoulli-based performance analysis for BLUE algorithm under bursty and correlated traffics 突发和关联流量下基于马尔可夫调制伯努利的BLUE算法性能分析
A. Saaidah, M. Z. Jali, M. F. Marhusin, Hussein Abdel-jaber
In this study, the discrete-time performance of BLUE algorithms under bursty and correlated traffics is analyzed using two-state Markov-modulated Bernoulli arrival process (BLUE-MMBP-2). A two-dimensional discrete-time Markov chain is used to model the BLUE algorithm for two traffic classes, in which each dimension corresponds to a traffic class and the parameters of that traffic class. The MMBP is used to replace the conventional and widely-used Bernoulli process (BP) in evaluating and proposing analytical models based on the BLUE algorithm. The BP captures neither the traffic correlation nor the burstiness. The proposed approach is simulated, and the obtained results are compared with that of the BLUE-BP, which can modulate a single traffic class only. The comparison is performed in terms of mean queue length (mql), average queuing delay (D), throughput, packet loss, and dropping probability (DP). The results show that during congestion, particularly heavy congestion under bursty and correlated traffics, the BLUE-MMBP-2 algorithm provides better mql, D, and DP than the BLUE-BP.
在本研究中,使用双状态马尔可夫调制伯努利到达过程(BLUE- mmbp -2)分析了BLUE算法在突发和相关流量下的离散时间性能。采用二维离散马尔可夫链对两个流量类的BLUE算法进行建模,其中每个维度对应一个流量类及其参数。MMBP被用来取代传统的、广泛使用的伯努利过程(BP)来评估和提出基于BLUE算法的分析模型。BP既没有捕捉到流量相关性,也没有捕捉到突发性。对该方法进行了仿真,并将仿真结果与BLUE-BP算法进行了比较,BLUE-BP算法只能调制单一流量类。比较是根据平均队列长度(mql)、平均队列延迟(D)、吞吐量、数据包丢失和丢弃概率(DP)进行的。结果表明,在拥塞情况下,特别是在突发和相关流量下的严重拥塞情况下,BLUE-MMBP-2算法比BLUE-BP提供更好的mql、D和DP。
{"title":"Markov-modulated Bernoulli-based performance analysis for BLUE algorithm under bursty and correlated traffics","authors":"A. Saaidah, M. Z. Jali, M. F. Marhusin, Hussein Abdel-jaber","doi":"10.1109/I4CT.2014.6914136","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914136","url":null,"abstract":"In this study, the discrete-time performance of BLUE algorithms under bursty and correlated traffics is analyzed using two-state Markov-modulated Bernoulli arrival process (BLUE-MMBP-2). A two-dimensional discrete-time Markov chain is used to model the BLUE algorithm for two traffic classes, in which each dimension corresponds to a traffic class and the parameters of that traffic class. The MMBP is used to replace the conventional and widely-used Bernoulli process (BP) in evaluating and proposing analytical models based on the BLUE algorithm. The BP captures neither the traffic correlation nor the burstiness. The proposed approach is simulated, and the obtained results are compared with that of the BLUE-BP, which can modulate a single traffic class only. The comparison is performed in terms of mean queue length (mql), average queuing delay (D), throughput, packet loss, and dropping probability (DP). The results show that during congestion, particularly heavy congestion under bursty and correlated traffics, the BLUE-MMBP-2 algorithm provides better mql, D, and DP than the BLUE-BP.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130802215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using molecular algorithm in keystroke dynamics 分子算法在击键动力学中的应用
Alquine Roy F. Taculin, Denmar M. Abuhan, J. Cruz, M. L. Santos, Renato V. Crisostomo
Previous studies on keystroke dynamics confirmed that the use of biometric technologies provides a significantly high level of reliability especially in situations where security is paramount. Most of these studies use genetic algorithms and k-nearest neighbor as their model of computation. In this paper, we explore an algorithmic solution based on an alternative model patterned after the process of chemical reactions of molecules. We invited several respondents to participate in our testing. Multiple keystroke samples were taken from each respondent and their keystroke values were stored in our databank. Samples collected in this paper were modeled using periodic tables and molecular bonding of keystrokes as data representations. In performing the computation, a molecular algorithm was introduced. A molecular bonding was constructed to stimulate chemical reactions such as synthesis, decomposition and displacement. These molecular reactions enhance the pattern matching process of a keystroke against the collection of samples. Experiments show that the algorithm demonstrates 92% correctness in authenticating a keystroke pattern, while it can fairly recognize impostors during the identification process.
先前对击键动力学的研究证实,生物识别技术的使用提供了非常高的可靠性,特别是在安全至关重要的情况下。这些研究大多使用遗传算法和k近邻作为其计算模型。在本文中,我们探索了一种基于分子化学反应过程的替代模型的算法解决方案。我们邀请了几位受访者参与我们的测试。从每个应答者中抽取多个击键样本,并将其击键值存储在我们的数据库中。本文收集的样品采用元素周期表和键击的分子键作为数据表示进行建模。在计算中,引入了一种分子算法。建立了分子键来刺激化学反应,如合成、分解和位移。这些分子反应增强了击键对样本收集的模式匹配过程。实验表明,该算法对击键模式的识别准确率达到92%,同时在识别过程中也能较好地识别出冒名顶替者。
{"title":"Using molecular algorithm in keystroke dynamics","authors":"Alquine Roy F. Taculin, Denmar M. Abuhan, J. Cruz, M. L. Santos, Renato V. Crisostomo","doi":"10.1109/I4CT.2014.6914173","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914173","url":null,"abstract":"Previous studies on keystroke dynamics confirmed that the use of biometric technologies provides a significantly high level of reliability especially in situations where security is paramount. Most of these studies use genetic algorithms and k-nearest neighbor as their model of computation. In this paper, we explore an algorithmic solution based on an alternative model patterned after the process of chemical reactions of molecules. We invited several respondents to participate in our testing. Multiple keystroke samples were taken from each respondent and their keystroke values were stored in our databank. Samples collected in this paper were modeled using periodic tables and molecular bonding of keystrokes as data representations. In performing the computation, a molecular algorithm was introduced. A molecular bonding was constructed to stimulate chemical reactions such as synthesis, decomposition and displacement. These molecular reactions enhance the pattern matching process of a keystroke against the collection of samples. Experiments show that the algorithm demonstrates 92% correctness in authenticating a keystroke pattern, while it can fairly recognize impostors during the identification process.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"41 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128483605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ℋ∞ filtering for networked controlled systems 网络控制系统的h∞滤波
S. Ahmed, M. Hasan, F. Subhan
Networked controlled systems comprise a team of dynamic systems which are linked together through a shared networked. From control systems perspective, the introduction of a shared networked brings its own challenges such as packet dropouts, time delays and clock synchronization. A popular application of networked controlled systems is to consider a team of collaborative mobile robots. Networked controlled robots involve a team of mobile robots working together with each other to accomplish a specific task. Each individual mobile robot has finite battery sources, which must be efficiently utilized. The efficient utilization of battery sources limits the communication capabilities of the robots. Furthermore, a shared network among the networked robots introduces time delays in the data received. This paper presents the design of an optimal ℋ∞ filter to minimize the effects of time delays in the received data. A numerical example is presented to demonstrate the effectiveness of the proposed approach.
网络化控制系统由一组动态系统组成,这些动态系统通过共享网络连接在一起。从控制系统的角度来看,共享网络的引入带来了其自身的挑战,如数据包丢失、时间延迟和时钟同步。网络控制系统的一个流行应用是考虑一组协作移动机器人。网络化控制机器人是指一组移动机器人相互协作完成一项特定任务。每个单独的移动机器人都有有限的电池源,必须有效利用。电池的有效利用限制了机器人的通信能力。此外,联网机器人之间的共享网络引入了接收数据的时间延迟。本文设计了一种最优的h∞滤波器,使接收数据的时延影响最小。最后通过数值算例验证了该方法的有效性。
{"title":"ℋ∞ filtering for networked controlled systems","authors":"S. Ahmed, M. Hasan, F. Subhan","doi":"10.1109/I4CT.2014.6914155","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914155","url":null,"abstract":"Networked controlled systems comprise a team of dynamic systems which are linked together through a shared networked. From control systems perspective, the introduction of a shared networked brings its own challenges such as packet dropouts, time delays and clock synchronization. A popular application of networked controlled systems is to consider a team of collaborative mobile robots. Networked controlled robots involve a team of mobile robots working together with each other to accomplish a specific task. Each individual mobile robot has finite battery sources, which must be efficiently utilized. The efficient utilization of battery sources limits the communication capabilities of the robots. Furthermore, a shared network among the networked robots introduces time delays in the data received. This paper presents the design of an optimal ℋ∞ filter to minimize the effects of time delays in the received data. A numerical example is presented to demonstrate the effectiveness of the proposed approach.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126580363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0 dB coupler employing slot technique on planar microstrip 采用平面微带槽技术的0db耦合器
N. Arshad, S. Yaacob, S. Ibrahim, M. S. Razalli
Realization of crossovers is always a problem in the design of microwave integrated circuits. In many cases, when a high isolation between crossing strips is required in a rather large frequency band, it is preferable to avoid a trivial separation of the strips by a dielectric layer. This paper focuses on designing and developing a wideband 0 dB coupler on planar microstrip. in In this paper, the proposed 0 dB coupler is designed using square patch with slotted lines. To compare the performances of the proposed design, a conventional 0 dB coupler using double section branch line coupler is presented as well. A substrate Rogers RO4003C with dielectric constant of 3.38 and thickness of 0.508 mm at center frequency 2.4 GHz are used in both designs. They are compared in terms of the size, and their s-parameter performance. Both couplers developed with the aid of design tool CST Microwave Studio and fabricated using microstrip technology.
交叉电路的实现一直是微波集成电路设计中的一个难题。在许多情况下,当在相当大的频带中需要交叉条之间的高度隔离时,最好避免用介电层将条分开。本文的重点是设计和研制一种基于平面微带的宽带0db耦合器。本文提出的0db耦合器采用带开槽线的方形贴片设计。为了比较所提出的设计的性能,还提出了一种采用双段分支线耦合器的传统0 dB耦合器。两种设计均采用了介电常数为3.38、中心频率为2.4 GHz时厚度为0.508 mm的Rogers RO4003C衬底。它们在大小和s参数性能方面进行了比较。这两个耦合器都是在CST Microwave Studio设计工具的帮助下开发的,并使用微带技术制造的。
{"title":"0 dB coupler employing slot technique on planar microstrip","authors":"N. Arshad, S. Yaacob, S. Ibrahim, M. S. Razalli","doi":"10.1109/I4CT.2014.6914192","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914192","url":null,"abstract":"Realization of crossovers is always a problem in the design of microwave integrated circuits. In many cases, when a high isolation between crossing strips is required in a rather large frequency band, it is preferable to avoid a trivial separation of the strips by a dielectric layer. This paper focuses on designing and developing a wideband 0 dB coupler on planar microstrip. in In this paper, the proposed 0 dB coupler is designed using square patch with slotted lines. To compare the performances of the proposed design, a conventional 0 dB coupler using double section branch line coupler is presented as well. A substrate Rogers RO4003C with dielectric constant of 3.38 and thickness of 0.508 mm at center frequency 2.4 GHz are used in both designs. They are compared in terms of the size, and their s-parameter performance. Both couplers developed with the aid of design tool CST Microwave Studio and fabricated using microstrip technology.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122871690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
DSP techniques for reducing chromatic dispersion in optical communication systems 减少光通信系统色散的DSP技术
M. Abdullah, B. Das, N. S. Mohd Shah
In this paper the chromatic dispersion is reduced for enhancement in the performance of optical communication system. For this an analog test signal is generated and converted into digital domain and modulated with 16 QAM by gray code mapping. Through Split Step Fourier technique the signal is propagated in the optical fiber link for 15 km of simulated distance. At the end of this distance the chromatic dispersion is observed and to reduce Chromatic Dispersion (CD) signal is converted in electrical form at end of optical fiber link. Digital Signal Processing techniques are applied on dispersed signal to reduce the CD. Analysis is based on Bit Error Rate that are compared before and after the induction of chromatic dispersion. In this research CD is reduced electronically so it will save the requirement of optical amplifiers.
为了提高光通信系统的性能,本文提出了降低色散的方法。为此,产生模拟测试信号,并将其转换为数字域,通过灰度码映射与16 QAM调制。通过分步傅立叶技术,信号在光纤链路中传播了15公里的模拟距离。在这段距离的末端观察到色散,为了降低色散,在光纤链路末端将色散信号转换成电形式。采用数字信号处理技术对色散信号进行处理以降低CD,并通过色散诱导前后的误码率进行分析。在本研究中,通过电子方式减少了光盘,从而节省了对光放大器的需求。
{"title":"DSP techniques for reducing chromatic dispersion in optical communication systems","authors":"M. Abdullah, B. Das, N. S. Mohd Shah","doi":"10.1109/I4CT.2014.6914194","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914194","url":null,"abstract":"In this paper the chromatic dispersion is reduced for enhancement in the performance of optical communication system. For this an analog test signal is generated and converted into digital domain and modulated with 16 QAM by gray code mapping. Through Split Step Fourier technique the signal is propagated in the optical fiber link for 15 km of simulated distance. At the end of this distance the chromatic dispersion is observed and to reduce Chromatic Dispersion (CD) signal is converted in electrical form at end of optical fiber link. Digital Signal Processing techniques are applied on dispersed signal to reduce the CD. Analysis is based on Bit Error Rate that are compared before and after the induction of chromatic dispersion. In this research CD is reduced electronically so it will save the requirement of optical amplifiers.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The cost of virtualization implementation in volunteer computing 志愿计算中虚拟化实现的成本
Mohammadfazel Anjomshoa, M. Salleh, M. Kermani
The advantages of using virtualization can be impaired if it can not deliver sufficient performance. Running applications in virtualized environment incur performance overheads regarding to the virtualization functionalities like initialization virtual machine image, the booting time of virtual machine, starting, pausing and turning off the virtual machine. Virtualization functionality has implication on the host performance and when it is mixed with volunteer computing in order to undertake the execution of jobs, it becomes a serious challenge as volunteer computing aims to use public dedicated resources in an efficient manner to maximize the work done. In order to adopt virtualization technology in volunteer computing, the performance impact of virtualization on volunteer computing middleware needs to be distinguished. In this paper, we experimentally evaluate the virtualization functionalities overhead by comparing the job application execution in two scenarios: 1) executing job application in a virtualized environment by using vboxwrapper (The latest BOINC virtualization approach) and 2) executing job application directly on the host OS. Based on the result, virtualization fashion imposed up to 5 minutes pre-execution overhead when three jobs performed in parallel. The storage overhead ranged from 13% to 26%, depending on the number of jobs that are executing in parallel. This amount of overhead for memory ranged from 6.5% to 20%.
如果不能提供足够的性能,使用虚拟化的优势就会被削弱。在虚拟化环境中运行应用程序会产生与虚拟化功能相关的性能开销,例如初始化虚拟机映像、虚拟机的引导时间、启动、暂停和关闭虚拟机。虚拟化功能对主机性能有影响,当它与志愿计算混合在一起以承担任务的执行时,它就成为一个严重的挑战,因为志愿计算旨在以有效的方式使用公共专用资源以最大限度地完成工作。为了在志愿计算中采用虚拟化技术,需要区分虚拟化对志愿计算中间件的性能影响。在本文中,我们通过比较作业应用程序在两种场景下的执行情况来实验评估虚拟化功能开销:1)使用vboxwrapper(最新的BOINC虚拟化方法)在虚拟化环境中执行作业应用程序,2)直接在主机操作系统上执行作业应用程序。根据结果,当并行执行三个作业时,虚拟化方式会造成高达5分钟的预执行开销。存储开销从13%到26%不等,具体取决于并行执行的作业数量。这种内存开销从6.5%到20%不等。
{"title":"The cost of virtualization implementation in volunteer computing","authors":"Mohammadfazel Anjomshoa, M. Salleh, M. Kermani","doi":"10.1109/I4CT.2014.6914205","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914205","url":null,"abstract":"The advantages of using virtualization can be impaired if it can not deliver sufficient performance. Running applications in virtualized environment incur performance overheads regarding to the virtualization functionalities like initialization virtual machine image, the booting time of virtual machine, starting, pausing and turning off the virtual machine. Virtualization functionality has implication on the host performance and when it is mixed with volunteer computing in order to undertake the execution of jobs, it becomes a serious challenge as volunteer computing aims to use public dedicated resources in an efficient manner to maximize the work done. In order to adopt virtualization technology in volunteer computing, the performance impact of virtualization on volunteer computing middleware needs to be distinguished. In this paper, we experimentally evaluate the virtualization functionalities overhead by comparing the job application execution in two scenarios: 1) executing job application in a virtualized environment by using vboxwrapper (The latest BOINC virtualization approach) and 2) executing job application directly on the host OS. Based on the result, virtualization fashion imposed up to 5 minutes pre-execution overhead when three jobs performed in parallel. The storage overhead ranged from 13% to 26%, depending on the number of jobs that are executing in parallel. This amount of overhead for memory ranged from 6.5% to 20%.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124938820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of S-box properties in block cipher 分组密码中s盒特性的研究
Kamsiah Mohamed, Mohd Nazran Mohammed Pauzi, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin, Nurul Huda Nik Zulkipli
In the field of cryptography, the substitution box (S-box) becomes the most widely used ciphers. The process of creating new and powerful S-boxes never end. Various methods are proposed to make the S-box becomes strongest and hard to attack. The strength or weakness of S-box will be determined through the analysis of S-box properties. However, the analysis of the properties of the S-box in block ciphers is still lacking because there is no specific guidelines and technique based on S-box properties. Hence, the cipher is easier to attack by an adversary if the S-box properties are not robust. The purpose of this paper is to describe and review of the S-box properties in block ciphers. As a result, for future work, a new model for analysis S-box properties will be proposed. The model can be used to analysis the properties to determine the strength and weakness of any S-boxes.
在密码学领域,替换盒(S-box)成为使用最广泛的密码。创造新的和强大的s -box的过程永远不会结束。提出了各种方法,使S-box变得更加坚固和难以攻击。通过对S-box特性的分析来确定S-box的强弱。但是,由于目前还没有针对分组密码中s盒特性的具体指南和技术,对s盒特性的分析还比较缺乏。因此,如果S-box属性不健壮,则密码更容易被攻击者攻击。本文的目的是描述和回顾分组密码中的s盒特性。因此,在未来的工作中,将提出一种新的分析S-box特性的模型。该模型可用于分析任意s -box的性能,确定其强度和弱点。
{"title":"Study of S-box properties in block cipher","authors":"Kamsiah Mohamed, Mohd Nazran Mohammed Pauzi, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin, Nurul Huda Nik Zulkipli","doi":"10.1109/I4CT.2014.6914206","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914206","url":null,"abstract":"In the field of cryptography, the substitution box (S-box) becomes the most widely used ciphers. The process of creating new and powerful S-boxes never end. Various methods are proposed to make the S-box becomes strongest and hard to attack. The strength or weakness of S-box will be determined through the analysis of S-box properties. However, the analysis of the properties of the S-box in block ciphers is still lacking because there is no specific guidelines and technique based on S-box properties. Hence, the cipher is easier to attack by an adversary if the S-box properties are not robust. The purpose of this paper is to describe and review of the S-box properties in block ciphers. As a result, for future work, a new model for analysis S-box properties will be proposed. The model can be used to analysis the properties to determine the strength and weakness of any S-boxes.","PeriodicalId":356190,"journal":{"name":"2014 International Conference on Computer, Communications, and Control Technology (I4CT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129180937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
2014 International Conference on Computer, Communications, and Control Technology (I4CT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1