首页 > 最新文献

2014 10th International Conference on Communications (COMM)最新文献

英文 中文
Combined use of pattern recognition algorithms for keystroke-based continuous authentication system 结合模式识别算法实现基于击键的连续认证系统
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866686
E. Popovici, Liviu A. Stancu, Ovidiu G. Guta, Stefan Arseni, O. Fratu
In this paper we propose several solutions to combine the use of two algorithms for patterns recognition and user validation, both intended to be used in the same time to improve the overall performance of the validation process in a continuous authentication system based on keystroke dynamics. The first one is based on a Multi Layer Perceptron (MLP) Neural Network and the second one relies on a trust algorithm that uses the Bhattacharyya coefficient. For both we present some new evaluation result and conclusions.
在本文中,我们提出了几种解决方案来结合使用两种算法进行模式识别和用户验证,这两种算法旨在同时使用,以提高基于击键动力学的连续身份验证系统中验证过程的整体性能。第一个基于多层感知器(MLP)神经网络,第二个依赖于使用Bhattacharyya系数的信任算法。本文给出了一些新的评价结果和结论。
{"title":"Combined use of pattern recognition algorithms for keystroke-based continuous authentication system","authors":"E. Popovici, Liviu A. Stancu, Ovidiu G. Guta, Stefan Arseni, O. Fratu","doi":"10.1109/ICCOMM.2014.6866686","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866686","url":null,"abstract":"In this paper we propose several solutions to combine the use of two algorithms for patterns recognition and user validation, both intended to be used in the same time to improve the overall performance of the validation process in a continuous authentication system based on keystroke dynamics. The first one is based on a Multi Layer Perceptron (MLP) Neural Network and the second one relies on a trust algorithm that uses the Bhattacharyya coefficient. For both we present some new evaluation result and conclusions.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114984831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multitemporal Satellite Image Time Series analysis of urban development in Bucharest and Ilfov areas 布加勒斯特和伊尔福夫地区城市发展的多时相卫星图像时间序列分析
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866702
T. Costachioiu, R. Constantinescu, M. Datcu
In this paper we focus on the extraction and analysis of long-term satellite image time series, and on applications in urban development monitoring. A Satellite Image Time Series (SITS) comprised of more than 100 data sets, covering a time span of over 25 years is extracted from the current Landsat data archives, Then we create stacks of intra-annual images, which are analyzed by applying a series of direct multidate classifications in order to extract the annual built-up surface. The evolution of the built-up areas is then compared against population dynamics for the studied area.
本文主要研究了长期卫星影像时间序列的提取与分析,以及在城市发展监测中的应用。从目前的Landsat数据档案中提取了超过25年的100多个数据集的卫星图像时间序列(sit),然后我们创建了年度内图像堆栈,通过应用一系列直接多日期分类对其进行分析,以提取年度建筑表面。然后将建成区的演变与研究区域的人口动态进行比较。
{"title":"Multitemporal Satellite Image Time Series analysis of urban development in Bucharest and Ilfov areas","authors":"T. Costachioiu, R. Constantinescu, M. Datcu","doi":"10.1109/ICCOMM.2014.6866702","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866702","url":null,"abstract":"In this paper we focus on the extraction and analysis of long-term satellite image time series, and on applications in urban development monitoring. A Satellite Image Time Series (SITS) comprised of more than 100 data sets, covering a time span of over 25 years is extracted from the current Landsat data archives, Then we create stacks of intra-annual images, which are analyzed by applying a series of direct multidate classifications in order to extract the annual built-up surface. The evolution of the built-up areas is then compared against population dynamics for the studied area.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124807725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Convergence study of IPv6 tunneling techniques IPv6隧道技术收敛性研究
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866678
Poussy A. Amr, Nashwa Abdelbaki
IPv4 address exhaustion pushed IETF to create IPv6, the improved substitute of IPv4. The Internet complexity and its enormous size prolong the transition from IPv4 to IPv6 process. This means that both versions will necessarily co-exist. Meanwhile, tunneling appears as a solution trend. The tunneling is a transition technique that is considered temporary till all ISPs would support IPv6. At this paper, we compare the routing convergence of two tunnel types, 6to4 and Manually Configured versus the conventional IPv4 and IPv6 protocols. We analyze the network resources consumed during cold start phase. Bandwidths occupied by routing traffic and convergence duration are measured. Finally we propose tunnel recommendations for different range of network resources.
IPv4地址耗尽促使IETF创建IPv6,即IPv4的改进替代品。互联网的复杂性及其巨大的规模延长了从IPv4到IPv6的过渡过程。这意味着两个版本必然共存。同时,隧道掘进也成为一种解决趋势。隧道是一种过渡技术,被认为是暂时的,直到所有的isp都支持IPv6。在本文中,我们比较了两种隧道类型的路由收敛,6to4和手动配置与传统的IPv4和IPv6协议。分析了冷启动阶段所消耗的网络资源。测量路由流量占用的带宽和收敛时间。最后针对不同的网络资源范围提出了隧道建议。
{"title":"Convergence study of IPv6 tunneling techniques","authors":"Poussy A. Amr, Nashwa Abdelbaki","doi":"10.1109/ICCOMM.2014.6866678","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866678","url":null,"abstract":"IPv4 address exhaustion pushed IETF to create IPv6, the improved substitute of IPv4. The Internet complexity and its enormous size prolong the transition from IPv4 to IPv6 process. This means that both versions will necessarily co-exist. Meanwhile, tunneling appears as a solution trend. The tunneling is a transition technique that is considered temporary till all ISPs would support IPv6. At this paper, we compare the routing convergence of two tunnel types, 6to4 and Manually Configured versus the conventional IPv4 and IPv6 protocols. We analyze the network resources consumed during cold start phase. Bandwidths occupied by routing traffic and convergence duration are measured. Finally we propose tunnel recommendations for different range of network resources.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123525754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Steganalysis of a chaos-based steganographic method 一种基于混沌的隐写分析方法
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866665
Dalia Battikh, S. E. Assad, B. Bakhache, O. Déforges, Mohamad Khalil
Hiding information in a cover image can be regarded as introducing some stego-noise. These alterations may produce some form of degradation or some unusual characteristics and can then be exploited for the sake of detecting the hidden message. In this paper, we analyze the security of a chaos-based steganographic method, namely the Chaotic Edge adaptive Least Significant Bit Matching Revisited (Chaotic EA-LSBMR). We focus on the universal image steganalysis method which uses the higher-order statistics as features taken from the wavelet multiresolution approach. A Fisher Linear Discriminant classifier is used to classify cover and stego images.
在封面图像中隐藏信息可以看作是引入了一些隐写噪声。这些改变可能会产生某种形式的退化或一些不寻常的特征,然后可以利用它们来检测隐藏的信息。本文分析了一种基于混沌的隐写方法——混沌边缘自适应最小有效位匹配重访(Chaotic - lsbmr)的安全性。本文重点研究了一种通用的图像隐写分析方法,该方法利用小波多分辨率方法中的高阶统计量作为特征。采用Fisher线性判别分类器对覆盖图像和隐写图像进行分类。
{"title":"Steganalysis of a chaos-based steganographic method","authors":"Dalia Battikh, S. E. Assad, B. Bakhache, O. Déforges, Mohamad Khalil","doi":"10.1109/ICCOMM.2014.6866665","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866665","url":null,"abstract":"Hiding information in a cover image can be regarded as introducing some stego-noise. These alterations may produce some form of degradation or some unusual characteristics and can then be exploited for the sake of detecting the hidden message. In this paper, we analyze the security of a chaos-based steganographic method, namely the Chaotic Edge adaptive Least Significant Bit Matching Revisited (Chaotic EA-LSBMR). We focus on the universal image steganalysis method which uses the higher-order statistics as features taken from the wavelet multiresolution approach. A Fisher Linear Discriminant classifier is used to classify cover and stego images.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123682199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High-order modes in high permittivity cylindrical dielectric resonator antenna excited by a wide microstrip line 宽微带线激励下高介电常数圆柱形介质谐振器天线的高阶模
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866688
O. Avadanei, M. Banciu, L. Nedelcu
The aim of the paper is to identify the modes that can be excited by a wide microstrip line, in a cylindrical DRA situated symmetrically above it, to study the radiating performances of these modes and to present their radiating patterns. We managed to identify thirteen high-order modes; among these modes, four of them: HEM112, TMme311, TEme112, and TEme121 have high transmission performances.
本文的目的是在对称地置于其上方的圆柱形DRA中,确定宽微带线可以激发的模式,研究这些模式的辐射性能并给出它们的辐射图。我们设法确定了13种高阶模态;其中,HEM112、TMme311、TEme112和TEme121四种模式具有较高的传输性能。
{"title":"High-order modes in high permittivity cylindrical dielectric resonator antenna excited by a wide microstrip line","authors":"O. Avadanei, M. Banciu, L. Nedelcu","doi":"10.1109/ICCOMM.2014.6866688","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866688","url":null,"abstract":"The aim of the paper is to identify the modes that can be excited by a wide microstrip line, in a cylindrical DRA situated symmetrically above it, to study the radiating performances of these modes and to present their radiating patterns. We managed to identify thirteen high-order modes; among these modes, four of them: HEM112, TMme311, TEme112, and TEme121 have high transmission performances.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122438655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RASSH - Reinforced adaptive SSH honeypot RASSH -增强自适应SSH蜜罐
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866707
Adrian Pauna, I. Bica
The wide spread of cyber-attacks made the need of gathering as much information as possible about them, a real demand in nowadays global context. The honeypot systems have become a powerful tool on the way to accomplish that. Researchers have already focused on the development of various honeypot systems but the fact that their administration is time consuming made clear the need of self-adaptive honeypot system capable of learning from their interaction with attackers. This paper presents a self-adaptive honeypot system we are developing that tries to overlap some of the disadvantaged that existing systems have. The proposed honeypot is a medium interaction system developed using Python and it emulates a SSH (Secure Shell) server. The system is capable of interacting with the attackers by means of reinforcement learning algorithms.
网络攻击的广泛传播使得人们需要尽可能多地收集有关它们的信息,这在当今全球背景下是一种真正的需求。蜜罐系统已经成为实现这一目标的有力工具。研究人员已经专注于各种蜜罐系统的开发,但它们的管理耗时的事实表明,需要能够从与攻击者的交互中学习的自适应蜜罐系统。本文提出了一种我们正在开发的自适应蜜罐系统,它试图弥补现有系统的一些缺点。提出的蜜罐是一个使用Python开发的介质交互系统,它模拟了SSH (Secure Shell)服务器。该系统能够通过强化学习算法与攻击者进行交互。
{"title":"RASSH - Reinforced adaptive SSH honeypot","authors":"Adrian Pauna, I. Bica","doi":"10.1109/ICCOMM.2014.6866707","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866707","url":null,"abstract":"The wide spread of cyber-attacks made the need of gathering as much information as possible about them, a real demand in nowadays global context. The honeypot systems have become a powerful tool on the way to accomplish that. Researchers have already focused on the development of various honeypot systems but the fact that their administration is time consuming made clear the need of self-adaptive honeypot system capable of learning from their interaction with attackers. This paper presents a self-adaptive honeypot system we are developing that tries to overlap some of the disadvantaged that existing systems have. The proposed honeypot is a medium interaction system developed using Python and it emulates a SSH (Secure Shell) server. The system is capable of interacting with the attackers by means of reinforcement learning algorithms.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125456434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
A performance analysis for a resource manager of a content aware network 内容感知网络资源管理器的性能分析
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866767
V. Poenaru, S. Obreja, R. Badea, E. Borcoci
This paper presents an analysis of the performance of resource management in a distributed, multi-domain, multimedia oriented network architecture, which establishes end-to-end network pipes over a virtual network of content-aware domains. Bandwidth allocation and routing is done using a QoS optimizing algorithm with the network topology given as input, in a distributed, on-demand, manner by the other resource managers. The analysis is done in a simulated environment with all the domain managers running on one machine, but without the other elements of the complete system architecture. The purpose of the analysis is to determine if such a system is scalable over bigger networks, and how much, if the processing is in line with the amount of possible resource reservation requests of a real life usage situation, all that while discussing the current limitations of the implementation and suggesting possibilities for improvement. The resource manager, as analyzed in the paper, was designed and implemented in FP7 European project, ALICANTE.
本文分析了分布式、多域、面向多媒体的网络体系结构中的资源管理性能,该体系结构在内容感知域的虚拟网络上建立了端到端网络管道。带宽分配和路由使用QoS优化算法完成,网络拓扑作为输入,由其他资源管理器以分布式的、按需的方式提供。分析是在模拟环境中完成的,所有域管理器都在一台机器上运行,但没有完整系统体系结构的其他元素。分析的目的是确定这样的系统是否可以在更大的网络上扩展,以及在多大程度上,如果处理与实际使用情况下可能的资源保留请求的数量一致,所有这些都是在讨论实现的当前限制并建议改进的可能性的同时进行的。本文所分析的资源管理器是在FP7欧洲项目ALICANTE中设计和实现的。
{"title":"A performance analysis for a resource manager of a content aware network","authors":"V. Poenaru, S. Obreja, R. Badea, E. Borcoci","doi":"10.1109/ICCOMM.2014.6866767","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866767","url":null,"abstract":"This paper presents an analysis of the performance of resource management in a distributed, multi-domain, multimedia oriented network architecture, which establishes end-to-end network pipes over a virtual network of content-aware domains. Bandwidth allocation and routing is done using a QoS optimizing algorithm with the network topology given as input, in a distributed, on-demand, manner by the other resource managers. The analysis is done in a simulated environment with all the domain managers running on one machine, but without the other elements of the complete system architecture. The purpose of the analysis is to determine if such a system is scalable over bigger networks, and how much, if the processing is in line with the amount of possible resource reservation requests of a real life usage situation, all that while discussing the current limitations of the implementation and suggesting possibilities for improvement. The resource manager, as analyzed in the paper, was designed and implemented in FP7 European project, ALICANTE.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127708011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A low-complexity bit error rate estimation algorithm for wireless digital receivers 一种低复杂度的无线数字接收机误码率估计算法
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866735
A. Enescu, Bogdan-Mihai Sandoi, Cosmin-Gabriel Dinu
This paper deals with the estimation of the bit error rate inside a WCDMA digital receiver. We propose a hybrid algorithm which primarily is based on a simple signal to noise estimator and whose performance is enhanced by using an estimator of the probability density function. Our algorithm proves to have performances required by the specifications, while still maintaining a low complexity, making it suitable for implementation on a digital signal processor.
本文研究了WCDMA数字接收机内部误码率的估计问题。我们提出了一种混合算法,该算法主要基于简单的信噪估计量,并通过使用概率密度函数的估计量来增强其性能。我们的算法被证明具有规范要求的性能,同时仍然保持较低的复杂度,使其适合在数字信号处理器上实现。
{"title":"A low-complexity bit error rate estimation algorithm for wireless digital receivers","authors":"A. Enescu, Bogdan-Mihai Sandoi, Cosmin-Gabriel Dinu","doi":"10.1109/ICCOMM.2014.6866735","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866735","url":null,"abstract":"This paper deals with the estimation of the bit error rate inside a WCDMA digital receiver. We propose a hybrid algorithm which primarily is based on a simple signal to noise estimator and whose performance is enhanced by using an estimator of the probability density function. Our algorithm proves to have performances required by the specifications, while still maintaining a low complexity, making it suitable for implementation on a digital signal processor.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A digital watermarking algorithm based on Chinese remainder theorem 一种基于中国剩余定理的数字水印算法
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866675
Xiao Luo, Qiaozhi Xu, Junxing Zhang
Digital watermarking is a technique of embedding special information into media data. It is often used in the copyright protection and integrity verification of digital images, audio, video, and other media data. Based on the Chinese remainder theorem, we propose an image watermarking algorithm that embedding secret information into an image. We have implemented the algorithm in Matlab. Our experiment results show that the algorithm has high robustness against common modifications or attacks, such as JPEG compression, adding noise, median filtering, and cutting.
数字水印是在媒体数据中嵌入特殊信息的一种技术。它通常用于数字图像、音频、视频和其他媒体数据的版权保护和完整性验证。基于中国剩余定理,提出了一种将秘密信息嵌入图像的图像水印算法。我们在Matlab中实现了该算法。实验结果表明,该算法对JPEG压缩、添加噪声、中值滤波和剪切等常见的修改或攻击具有较高的鲁棒性。
{"title":"A digital watermarking algorithm based on Chinese remainder theorem","authors":"Xiao Luo, Qiaozhi Xu, Junxing Zhang","doi":"10.1109/ICCOMM.2014.6866675","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866675","url":null,"abstract":"Digital watermarking is a technique of embedding special information into media data. It is often used in the copyright protection and integrity verification of digital images, audio, video, and other media data. Based on the Chinese remainder theorem, we propose an image watermarking algorithm that embedding secret information into an image. We have implemented the algorithm in Matlab. Our experiment results show that the algorithm has high robustness against common modifications or attacks, such as JPEG compression, adding noise, median filtering, and cutting.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133549720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Business integration of industrial communications with Cloud computing 工业通信与云计算的业务集成
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866764
C. Costache, F. Sandu, T. Balan, A. Nedelcu, A. Covei
Industrial communications are influenced by the emerging Cloud trend, being more and more service-oriented. The access model to on-demand provisioned infrastructure is generic considered hereby as driven by VISA (Virtual Instrumentation Software Architecture) and being an extension of the “Measurement-as-a-Service”. Aggregation of the industrial instrumentation into the Cloud is based on the business execution logic. This paper describes a method for exposing as web services the VISA instruments, and proposes an architecture, based on BPEL (Business Process Execution Language) and ESB (Enterprise Service Bus), to integrate, at business level, the Cloud provisioned elements based on the models of virtual instrumentation extended as IaaS (Infrastructure-as-a-Service).
工业通信受到新兴的云趋势的影响,越来越面向服务。按需提供的基础设施的访问模型通常被认为是由VISA(虚拟仪器软件体系结构)驱动的,并且是“测量即服务”的扩展。工业仪器到云的聚合是基于业务执行逻辑的。本文描述了一种将VISA工具作为web服务公开的方法,并提出了一种基于BPEL(业务流程执行语言)和ESB(企业服务总线)的体系结构,以在业务级别集成基于扩展为IaaS(基础设施即服务)的虚拟工具模型的云提供元素。
{"title":"Business integration of industrial communications with Cloud computing","authors":"C. Costache, F. Sandu, T. Balan, A. Nedelcu, A. Covei","doi":"10.1109/ICCOMM.2014.6866764","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866764","url":null,"abstract":"Industrial communications are influenced by the emerging Cloud trend, being more and more service-oriented. The access model to on-demand provisioned infrastructure is generic considered hereby as driven by VISA (Virtual Instrumentation Software Architecture) and being an extension of the “Measurement-as-a-Service”. Aggregation of the industrial instrumentation into the Cloud is based on the business execution logic. This paper describes a method for exposing as web services the VISA instruments, and proposes an architecture, based on BPEL (Business Process Execution Language) and ESB (Enterprise Service Bus), to integrate, at business level, the Cloud provisioned elements based on the models of virtual instrumentation extended as IaaS (Infrastructure-as-a-Service).","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130504950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 10th International Conference on Communications (COMM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1