首页 > 最新文献

Int. J. Grid Util. Comput.最新文献

英文 中文
Winning the war on terror: using social networking tools and GTD to analyse the regularity of terrorism activities 赢得反恐战争:利用社交网络工具和GTD分析恐怖活动的规律性
Pub Date : 2019-06-25 DOI: 10.1504/IJGUC.2019.10022137
Xuan Guo, Fei Xu, Zhiting Xiao, Hongguo Yuan, Xiao-ling Yang
In order to study the spatiotemporal characteristics and activity patterns of terrorism attacks in China, so as to make effective counter-terrorism strategies, two kinds of different intelligence sources were analysed by means of social network analysis and mathematical statistics. Firstly, using the social network analysis tool ORA, we build a terrorists' activity meta-network for the text information, extracting the four categories of person, places, organisations and time, and analyse the characteristics of the key nodes of the network, then the meta-network is decomposed into person-organisation and person-location, organisation-location, organisation-time four binary subnets to analyse the temporal and spatial characteristics of terrorist activities. Then, using GTD data set to analyse the characteristics of China's terrorist attacks from 1989 to 2015, the geo-spatial distribution and time distribution of terrorist events are summarised. Combined with the data visualisation method, the previous results of social network analysis using open source text are verified and compared; finally we put forward some suggestions on counter-terrorism prevention strategy in China.
为了研究中国恐怖袭击的时空特征和活动模式,从而制定有效的反恐战略,采用社会网络分析和数理统计的方法对两种不同的情报来源进行了分析。首先,利用社会网络分析工具ORA对文本信息构建恐怖分子活动元网络,提取人物、地点、组织和时间四类,分析网络关键节点的特征,然后将元网络分解为人-组织和人-地点、组织-地点、组织-时间四个二元子网,分析恐怖活动的时空特征。然后,利用GTD数据集分析了1989 - 2015年中国恐怖袭击事件的特征,总结了恐怖事件的地理空间分布和时间分布。结合数据可视化方法,对以往使用开源文本进行社交网络分析的结果进行验证和比较;最后提出了中国反恐防范战略的建议。
{"title":"Winning the war on terror: using social networking tools and GTD to analyse the regularity of terrorism activities","authors":"Xuan Guo, Fei Xu, Zhiting Xiao, Hongguo Yuan, Xiao-ling Yang","doi":"10.1504/IJGUC.2019.10022137","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022137","url":null,"abstract":"In order to study the spatiotemporal characteristics and activity patterns of terrorism attacks in China, so as to make effective counter-terrorism strategies, two kinds of different intelligence sources were analysed by means of social network analysis and mathematical statistics. Firstly, using the social network analysis tool ORA, we build a terrorists' activity meta-network for the text information, extracting the four categories of person, places, organisations and time, and analyse the characteristics of the key nodes of the network, then the meta-network is decomposed into person-organisation and person-location, organisation-location, organisation-time four binary subnets to analyse the temporal and spatial characteristics of terrorist activities. Then, using GTD data set to analyse the characteristics of China's terrorist attacks from 1989 to 2015, the geo-spatial distribution and time distribution of terrorist events are summarised. Combined with the data visualisation method, the previous results of social network analysis using open source text are verified and compared; finally we put forward some suggestions on counter-terrorism prevention strategy in China.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129673540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A review on intrusion detection approaches in cloud security systems 云安全系统中入侵检测方法综述
Pub Date : 2019-06-25 DOI: 10.1504/IJGUC.2019.10022139
Satyapal Singh, Mohan Kubendiran, A. K. Sangaiah
Cloud computing is a technology that allows the conveyance of services, storage, network, computing power, etc., over the internet. The on-demand and ubiquitous nature of this technology allows for its ease of use and availability. However, due to this very reason, the cloud services, platform or infrastructure remain to be a target for attackers. The most common attack is the one that tries to take control of one or more virtual machine instances running on the cloud. Since cloud and networking technologies go side by side, it is inevitable to keep such malicious attempts at bay. Nevertheless, Intrusion Detection Systems (IDS) are software that can detect potential intrusions within or outside a secure cloud environment. In this paper, a study of different IDS that have been previously proposed in order to mitigate or in best case eliminate the possible threats posed by such intrusions has been done.
云计算是一种允许通过互联网传输服务、存储、网络、计算能力等的技术。该技术的随需应变和无处不在的特性使其易于使用和可用性。然而,正是由于这个原因,云服务、平台或基础设施仍然是攻击者的目标。最常见的攻击是试图控制在云上运行的一个或多个虚拟机实例。由于云和网络技术是并行的,因此不可避免地要阻止此类恶意尝试。然而,入侵检测系统(IDS)是一种可以检测安全云环境内外潜在入侵的软件。本文对之前提出的不同入侵检测系统进行了研究,以减轻或在最好的情况下消除此类入侵可能造成的威胁。
{"title":"A review on intrusion detection approaches in cloud security systems","authors":"Satyapal Singh, Mohan Kubendiran, A. K. Sangaiah","doi":"10.1504/IJGUC.2019.10022139","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022139","url":null,"abstract":"Cloud computing is a technology that allows the conveyance of services, storage, network, computing power, etc., over the internet. The on-demand and ubiquitous nature of this technology allows for its ease of use and availability. However, due to this very reason, the cloud services, platform or infrastructure remain to be a target for attackers. The most common attack is the one that tries to take control of one or more virtual machine instances running on the cloud. Since cloud and networking technologies go side by side, it is inevitable to keep such malicious attempts at bay. Nevertheless, Intrusion Detection Systems (IDS) are software that can detect potential intrusions within or outside a secure cloud environment. In this paper, a study of different IDS that have been previously proposed in order to mitigate or in best case eliminate the possible threats posed by such intrusions has been done.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133740330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A dynamic cloud service selection model based on trust and SLA in cloud computing 云计算中基于信任和SLA的动态云服务选择模型
Pub Date : 2019-06-25 DOI: 10.1504/IJGUC.2019.10022134
Yubiao Wang, Junhao Wen, Quanwang Wu, Lei Guo, Bamei Tao
For high quality and trusted service selection problem, we propose a Dynamic Cloud Services Selection Model (DCSSM). Cloud service resources are divided into different service levels by Service-Level Agreement Management (SLAM). Each SLAM manages some cloud service registration information. In order to make the final trust evaluation values more practical, the model performs a comprehensive trust, which consists of direct trust and indirect trust. Firstly, combining weights consist of subjective weight and objective weight. Using rough sets to calculate objective weight, an Analytic Hierarchy Process (AHP) method is used to calculate subjective weight. The direct trust also considers transaction time and transaction amount, and then gets an accurate direct trust. Secondly, indirect trust considers user trust evaluation similarity, and it contains indirect trust of friends and indirect trust of strangers. Finally, when the transaction was completed, a direct trust dynamic update was proposed. The model is simulated using CloudSim. It was compared with three other methods, and the experimental results showed that the DCSSM performs better than the other three methods.
针对高质量可信的服务选择问题,提出了一种动态云服务选择模型(DCSSM)。通过服务水平协议管理(service - level Agreement Management, SLAM)将云服务资源划分为不同的服务级别。每个SLAM管理一些云服务注册信息。为了使最终的信任评估值更加实用,该模型进行了综合信任,包括直接信任和间接信任。首先,组合权值包括主观权值和客观权值。在粗糙集计算客观权重的基础上,采用层次分析法计算主观权重。直接信任还考虑了交易时间和交易金额,从而得到准确的直接信任。其次,间接信任考虑用户信任评价相似性,它包含朋友的间接信任和陌生人的间接信任。最后,在事务完成后,提出直接信任动态更新。使用CloudSim对模型进行仿真。与其他三种方法进行了比较,实验结果表明,DCSSM的性能优于其他三种方法。
{"title":"A dynamic cloud service selection model based on trust and SLA in cloud computing","authors":"Yubiao Wang, Junhao Wen, Quanwang Wu, Lei Guo, Bamei Tao","doi":"10.1504/IJGUC.2019.10022134","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022134","url":null,"abstract":"For high quality and trusted service selection problem, we propose a Dynamic Cloud Services Selection Model (DCSSM). Cloud service resources are divided into different service levels by Service-Level Agreement Management (SLAM). Each SLAM manages some cloud service registration information. In order to make the final trust evaluation values more practical, the model performs a comprehensive trust, which consists of direct trust and indirect trust. Firstly, combining weights consist of subjective weight and objective weight. Using rough sets to calculate objective weight, an Analytic Hierarchy Process (AHP) method is used to calculate subjective weight. The direct trust also considers transaction time and transaction amount, and then gets an accurate direct trust. Secondly, indirect trust considers user trust evaluation similarity, and it contains indirect trust of friends and indirect trust of strangers. Finally, when the transaction was completed, a direct trust dynamic update was proposed. The model is simulated using CloudSim. It was compared with three other methods, and the experimental results showed that the DCSSM performs better than the other three methods.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132481770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel test case generation method based on program structure diagram 一种新的基于程序结构图的测试用例生成方法
Pub Date : 2019-06-25 DOI: 10.1504/IJGUC.2019.10022133
Xianghu Wu, M. Qu, Yongchao Tao, Guannan Wang, Ziyu Dong
At present, embedded software has the problems of test lag, non-visual and low efficiency, depending on the test design of testers. It cannot guarantee the quality of the test cases and cannot guarantee the quality of the test. In this paper, a software program structure diagram model is established to verify the model, and the test points are planned manually. Finally, fill in the contents of the test items, and generate the corresponding set of test cases according to the algorithm, and save them into the database for management. This method can improve the reliability and efficiency of test, ensure the visual tracking and management of the use case, and have a strong auxiliary function to the planning and generation of the test case.
目前,嵌入式软件存在测试滞后、非可视化、效率低等问题,主要取决于测试人员的测试设计。它不能保证测试用例的质量,也不能保证测试的质量。本文建立了软件程序结构图模型对模型进行验证,并手工规划了测试点。最后,填写测试项的内容,并根据算法生成相应的测试用例集,并保存到数据库中进行管理。该方法可以提高测试的可靠性和效率,保证对用例的可视化跟踪和管理,对测试用例的规划和生成有较强的辅助作用。
{"title":"A novel test case generation method based on program structure diagram","authors":"Xianghu Wu, M. Qu, Yongchao Tao, Guannan Wang, Ziyu Dong","doi":"10.1504/IJGUC.2019.10022133","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022133","url":null,"abstract":"At present, embedded software has the problems of test lag, non-visual and low efficiency, depending on the test design of testers. It cannot guarantee the quality of the test cases and cannot guarantee the quality of the test. In this paper, a software program structure diagram model is established to verify the model, and the test points are planned manually. Finally, fill in the contents of the test items, and generate the corresponding set of test cases according to the algorithm, and save them into the database for management. This method can improve the reliability and efficiency of test, ensure the visual tracking and management of the use case, and have a strong auxiliary function to the planning and generation of the test case.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132507335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient pathfinding system in FPGA for edge/fog computing
Pub Date : 2019-05-15 DOI: 10.1504/IJGUC.2019.099687
A. S. Nery, A. Sena, Leandro S. Guedes
Pathfinding algorithms are at the heart of several classes of applications, such as network appliances (routing) and autonomous vehicle navigation. Thus, this work aims at designing and evaluating an efficient pathfinding FPGA accelerator based on Dijkstra's shortest path algorithm to mitigate the increasing network traffic problem at the edge of the network. The system is designed using Xilinx High-Level Synthesis (HLS) compiler and is implemented in the programming logic of a Xilinx Zynq FPGA, embedded with an ARM microprocessor which is not only in charge of controlling the co-processor but also in charge of lightweight TCP/IP network communication. Extensive performance, circuit-area, and energy consumption results show that the co-processor can find the shortest path about 2.5 times faster than the system's ARM microprocessor, on a simulation scenario test case based on touristic locations in the city of Rio de Janeiro, acquired from the OpenStreetMap database.
寻路算法是几类应用的核心,例如网络设备(路由)和自动车辆导航。因此,本工作旨在设计和评估基于Dijkstra最短路径算法的高效寻路FPGA加速器,以缓解网络边缘日益增加的网络流量问题。该系统采用Xilinx High-Level Synthesis (HLS)编译器设计,在Xilinx Zynq FPGA的编程逻辑中实现,并嵌入ARM微处理器,该微处理器不仅负责控制协处理器,还负责轻量级TCP/IP网络通信。广泛的性能、电路面积和能耗结果表明,协处理器找到最短路径的速度比系统的ARM微处理器快2.5倍,该模拟场景测试用例基于从OpenStreetMap数据库中获取的里约热内卢市的旅游地点。
{"title":"An efficient pathfinding system in FPGA for edge/fog computing","authors":"A. S. Nery, A. Sena, Leandro S. Guedes","doi":"10.1504/IJGUC.2019.099687","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.099687","url":null,"abstract":"Pathfinding algorithms are at the heart of several classes of applications, such as network appliances (routing) and autonomous vehicle navigation. Thus, this work aims at designing and evaluating an efficient pathfinding FPGA accelerator based on Dijkstra's shortest path algorithm to mitigate the increasing network traffic problem at the edge of the network. The system is designed using Xilinx High-Level Synthesis (HLS) compiler and is implemented in the programming logic of a Xilinx Zynq FPGA, embedded with an ARM microprocessor which is not only in charge of controlling the co-processor but also in charge of lightweight TCP/IP network communication. Extensive performance, circuit-area, and energy consumption results show that the co-processor can find the shortest path about 2.5 times faster than the system's ARM microprocessor, on a simulation scenario test case based on touristic locations in the city of Rio de Janeiro, acquired from the OpenStreetMap database.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dataflow runtime environment and static scheduler for edge, fog and in-situ computing 一个数据流运行环境和静态调度的边缘,雾和原位计算
Pub Date : 2019-05-15 DOI: 10.1504/IJGUC.2019.099685
Caio B. G. Carvalho, V. C. Ferreira, F. França, C. Bentes, G. Mencagli, Tiago A. O. Alves, A. Sena, L. A. J. Marzulo
In the dataflow computation model, tasks are executed according to data dependencies, instead of following program order, enabling natural parallelism exploitation. Sucuri is a dataflow library for Python that allows transparent execution of applications on clusters of multicores, while taking care of scheduling issues. Recent trends in edge/fog/In-situ computing assume that storage and network devices will have processing elements with lower power consumption and performance, which would make a good case for runtime environments that deal with the data versus computation movements trade-off in a more transparent and automated way. This work presents a study on different factors that should be considered when running dataflow applications in in-situ environments, using Sucuri to conduct experiments in a small system emulating a smart storage (in-situ device) utilisation. A static scheduling solution is also presented, allowing Sucuri to choose the most suited approach regarding this in-situ trade-off.
在数据流计算模型中,任务是根据数据依赖关系执行的,而不是遵循程序顺序,从而支持自然的并行性利用。Sucuri是Python的一个数据流库,它允许在多核集群上透明地执行应用程序,同时处理调度问题。边缘/雾/原位计算的最新趋势假设存储和网络设备将具有更低功耗和性能的处理元素,这将为运行时环境提供一个很好的案例,以更透明和自动化的方式处理数据与计算运动之间的权衡。这项工作提出了在原位环境中运行数据流应用程序时应考虑的不同因素的研究,使用Sucuri在模拟智能存储(原位设备)利用的小型系统中进行实验。还提出了一种静态调度解决方案,允许Sucuri选择最适合的方法来进行就地权衡。
{"title":"A dataflow runtime environment and static scheduler for edge, fog and in-situ computing","authors":"Caio B. G. Carvalho, V. C. Ferreira, F. França, C. Bentes, G. Mencagli, Tiago A. O. Alves, A. Sena, L. A. J. Marzulo","doi":"10.1504/IJGUC.2019.099685","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.099685","url":null,"abstract":"In the dataflow computation model, tasks are executed according to data dependencies, instead of following program order, enabling natural parallelism exploitation. Sucuri is a dataflow library for Python that allows transparent execution of applications on clusters of multicores, while taking care of scheduling issues. Recent trends in edge/fog/In-situ computing assume that storage and network devices will have processing elements with lower power consumption and performance, which would make a good case for runtime environments that deal with the data versus computation movements trade-off in a more transparent and automated way. This work presents a study on different factors that should be considered when running dataflow applications in in-situ environments, using Sucuri to conduct experiments in a small system emulating a smart storage (in-situ device) utilisation. A static scheduling solution is also presented, allowing Sucuri to choose the most suited approach regarding this in-situ trade-off.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114822712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimised dataflow engine for GPGPU stream processing GPGPU流处理的优化数据流引擎
Pub Date : 2019-05-15 DOI: 10.1504/IJGUC.2019.099689
Marcos Paulo Rocha, F. França, A. S. Nery, Leandro S. Guedes
Stream processing applications have high-demanding performance requirements that are hard to tackle using traditional parallel models on modern many-core architectures, such as GPUs. On the other hand, recent dataflow computing models can naturally expose and facilitate the parallelism exploitation for a wide class of applications. Thus, instead of following the program order, different operations can be run in parallel as soon as their input operands become available. This work presents an extension to an existing dataflow library for Java. The library extension implements high-level constructs with multiple command queues to enable the superposition of memory operations and kernel executions on GPUs. Experimental results show that significant speedup can be achieved for a subset of well-known stream processing applications: Volume Ray-Casting, Path-Tracing and Sobel Filter. Moreover, new contributions in respect to concurrency analysis and the Stream processing parallel model in dataflow are presented.
流处理应用程序具有高要求的性能要求,很难在现代多核架构(如gpu)上使用传统的并行模型来解决。另一方面,最近的数据流计算模型可以自然地暴露并促进对广泛应用程序的并行性利用。因此,只要输入操作数可用,不同的操作就可以并行运行,而不是遵循程序顺序。这项工作提供了对现有Java数据流库的扩展。该库扩展实现了具有多个命令队列的高级结构,以便在gpu上实现内存操作和内核执行的叠加。实验结果表明,对于一些众所周知的流处理应用,如体射线投射、路径跟踪和索贝尔滤波,该算法可以实现显著的加速。此外,本文还在并发分析和数据流处理并行模型方面做出了新的贡献。
{"title":"An optimised dataflow engine for GPGPU stream processing","authors":"Marcos Paulo Rocha, F. França, A. S. Nery, Leandro S. Guedes","doi":"10.1504/IJGUC.2019.099689","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.099689","url":null,"abstract":"Stream processing applications have high-demanding performance requirements that are hard to tackle using traditional parallel models on modern many-core architectures, such as GPUs. On the other hand, recent dataflow computing models can naturally expose and facilitate the parallelism exploitation for a wide class of applications. Thus, instead of following the program order, different operations can be run in parallel as soon as their input operands become available. This work presents an extension to an existing dataflow library for Java. The library extension implements high-level constructs with multiple command queues to enable the superposition of memory operations and kernel executions on GPUs. Experimental results show that significant speedup can be achieved for a subset of well-known stream processing applications: Volume Ray-Casting, Path-Tracing and Sobel Filter. Moreover, new contributions in respect to concurrency analysis and the Stream processing parallel model in dataflow are presented.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117042340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A web platform for oral exam of programming class 程序设计类口语考试的网络平台
Pub Date : 2019-05-15 DOI: 10.1504/IJGUC.2019.099665
Masaki Kohana, S. Okamoto
We develop a system to help an oral exam for a programming class. Our programming class has a problem about the waiting time for the students. We assume that the waiting time can be reduced when a teacher can check a source code and a result of the program smoothly. A student uploads C++ source codes and registers to a waiting list. The system compiles the code to an HTML and a JavaScript file using Emscripten. The compiled program can run on a web browser. A teacher can check the order of the students for the oral exam. At this time, the teacher also can see the source code and the result. Our system provides a waiting list of the oral exam to keep fairness. Also, the teacher does not overlook an invalid code. It helps a teacher to grade a student correctly.
我们开发了一个系统来帮助编程课的口试。我们的编程课有一个学生等待时间的问题。我们假设,当教师能够顺利地检查源代码和程序结果时,等待时间可以减少。一个学生上传c++源代码并注册到等待列表。系统使用Emscripten将代码编译成HTML和JavaScript文件。编译后的程序可以在web浏览器上运行。老师可以为口试检查学生的顺序。这时,老师也可以看到源代码和结果。我们的系统提供了口试的等候名单,以保持公平。此外,老师不会忽略无效代码。它可以帮助老师正确地给学生打分。
{"title":"A web platform for oral exam of programming class","authors":"Masaki Kohana, S. Okamoto","doi":"10.1504/IJGUC.2019.099665","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.099665","url":null,"abstract":"We develop a system to help an oral exam for a programming class. Our programming class has a problem about the waiting time for the students. We assume that the waiting time can be reduced when a teacher can check a source code and a result of the program smoothly. A student uploads C++ source codes and registers to a waiting list. The system compiles the code to an HTML and a JavaScript file using Emscripten. The compiled program can run on a web browser. A teacher can check the order of the students for the oral exam. At this time, the teacher also can see the source code and the result. Our system provides a waiting list of the oral exam to keep fairness. Also, the teacher does not overlook an invalid code. It helps a teacher to grade a student correctly.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125016721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A network coding protocol for wireless sensor fog computing 无线传感器雾计算的网络编码协议
Pub Date : 2019-05-15 DOI: 10.1504/IJGUC.2019.099688
B. Marques, I. M. Coelho, A. Sena, M. D. Castro
A communication protocol for fog computing should be efficient, lightweight and customisable, enabling the computing results on the edges to be passed easily through the network. In this work, we focus on a communication protocol for fog nodes in a network composed of wireless sensors, which are autonomous and spatially distributed for monitoring physical or environmental conditions. Problems with data congestion and limited physical resources are common in these networks. For the optimisation of data flow, it is important to apply techniques that reduce the transmitted data. We propose a network coding technique and study its efficiency for data transmission protocols. The experiments were performed through a wireless sensors programming framework with TinyOS operating system, NesC language and TOSSIM simulator. Experimental results demonstrate a better performance when the network coding technique is applied to the data communication protocol, for different scenarios. Further results demonstrate the network coding efficiency for fog computing, with around 80% of the total messages exchanged compared to a traditional protocol.
用于雾计算的通信协议应该是高效、轻量级和可定制的,使边缘的计算结果能够轻松地通过网络传递。在这项工作中,我们专注于无线传感器组成的网络中雾节点的通信协议,这些无线传感器是自主和空间分布的,用于监测物理或环境条件。数据拥塞和物理资源有限的问题在这些网络中很常见。为了优化数据流,应用减少传输数据的技术是很重要的。提出了一种网络编码技术,并研究了其在数据传输协议中的效率。实验采用TinyOS操作系统、NesC语言和TOSSIM模拟器搭建无线传感器编程框架。实验结果表明,在不同场景下,将网络编码技术应用于数据通信协议具有较好的性能。进一步的结果证明了雾计算的网络编码效率,与传统协议相比,大约有80%的消息交换。
{"title":"A network coding protocol for wireless sensor fog computing","authors":"B. Marques, I. M. Coelho, A. Sena, M. D. Castro","doi":"10.1504/IJGUC.2019.099688","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.099688","url":null,"abstract":"A communication protocol for fog computing should be efficient, lightweight and customisable, enabling the computing results on the edges to be passed easily through the network. In this work, we focus on a communication protocol for fog nodes in a network composed of wireless sensors, which are autonomous and spatially distributed for monitoring physical or environmental conditions. Problems with data congestion and limited physical resources are common in these networks. For the optimisation of data flow, it is important to apply techniques that reduce the transmitted data. We propose a network coding technique and study its efficiency for data transmission protocols. The experiments were performed through a wireless sensors programming framework with TinyOS operating system, NesC language and TOSSIM simulator. Experimental results demonstrate a better performance when the network coding technique is applied to the data communication protocol, for different scenarios. Further results demonstrate the network coding efficiency for fog computing, with around 80% of the total messages exchanged compared to a traditional protocol.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127292181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Enriching folksonomy for online videos 丰富网络视频民间经济
Pub Date : 2019-05-15 DOI: 10.1504/IJGUC.2019.099664
Hiroki Sakaji, Masaki Kohana, Akio Kobayashi, Hiroyuki Sakai
We propose a method that enriches folksonomy by using user comments on online videos. Folksonomy is a process in which users tag videos so that they can be searched for easily. On some videos, users can post tags and comments. A tag corresponds to folksonomy. One such online sharing website is Nico Nico Douga; however, users cannot post more than 12 tags on a video. Therefore, there are some important tags that could be posted but are sometimes not. We present a method for acquiring some of these missing tags by choosing new tags that score well in a scoring method developed by us. The method is based on information theory and a novel algorithm for estimating new tags by using distributed databases constructed by us.
我们提出了一种利用在线视频中的用户评论来丰富大众分类法的方法。大众分类法是用户标记视频以便于搜索的过程。在一些视频中,用户可以发布标签和评论。标签对应于大众分类法。Nico Nico Douga就是这样一个在线分享网站;然而,用户不能在一个视频上发布超过12个标签。因此,有一些重要的标签可以张贴,但有时没有。我们提出了一种方法,通过选择在我们开发的评分方法中得分较高的新标签来获取这些缺失的一些标签。该方法基于信息论,利用我们构建的分布式数据库,提出了一种新的标签估计算法。
{"title":"Enriching folksonomy for online videos","authors":"Hiroki Sakaji, Masaki Kohana, Akio Kobayashi, Hiroyuki Sakai","doi":"10.1504/IJGUC.2019.099664","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.099664","url":null,"abstract":"We propose a method that enriches folksonomy by using user comments on online videos. Folksonomy is a process in which users tag videos so that they can be searched for easily. On some videos, users can post tags and comments. A tag corresponds to folksonomy. One such online sharing website is Nico Nico Douga; however, users cannot post more than 12 tags on a video. Therefore, there are some important tags that could be posted but are sometimes not. We present a method for acquiring some of these missing tags by choosing new tags that score well in a scoring method developed by us. The method is based on information theory and a novel algorithm for estimating new tags by using distributed databases constructed by us.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114550428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Grid Util. Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1