A System Architecture [SA] plays the leading role in ICT based organization. It covers the entire organization and helps to achieve the mission of organization. As other architectures, it also has set of components and the relationship (connectors) among the components. It has pre-defined life cycle that determines the duration of the system in which it should provide the services continuously. It means system should survive throughout its defined life time. Unfortunately, a system comes across to many hurdles during its life time. In this paper, we propose the reliable approach in recovering from disaster. We analysis the current state of art in disaster recovery and propose the new approach on it. We use cloud computing as a tool in managing the disaster in the system of organization. We analysis our proposed approach with Markov Model. The required attributes for a system to address disaster recovery like availability, survivability, unavailability and downtime are calculated at the end of this paper.
{"title":"Disaster Recovery for System Architecture Using Cloud Computing","authors":"M. Pokharel, Seulki Lee, Jong Sou Park","doi":"10.1109/SAINT.2010.23","DOIUrl":"https://doi.org/10.1109/SAINT.2010.23","url":null,"abstract":"A System Architecture [SA] plays the leading role in ICT based organization. It covers the entire organization and helps to achieve the mission of organization. As other architectures, it also has set of components and the relationship (connectors) among the components. It has pre-defined life cycle that determines the duration of the system in which it should provide the services continuously. It means system should survive throughout its defined life time. Unfortunately, a system comes across to many hurdles during its life time. In this paper, we propose the reliable approach in recovering from disaster. We analysis the current state of art in disaster recovery and propose the new approach on it. We use cloud computing as a tool in managing the disaster in the system of organization. We analysis our proposed approach with Markov Model. The required attributes for a system to address disaster recovery like availability, survivability, unavailability and downtime are calculated at the end of this paper.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jin Ho Kim, Rim Haw, E. Cho, C. Hong, Jongwon Choe
In this paper, we focused on the scheme which supports mobility for ZigBee sensor nodes. We adopt NEMO protocol to provide mobility for low power ZigBee sensor nodes. Therefore, we propose NEMO based ZigBee Mobile Router architecture and operations to support the network mobility of ZigBee network. Also, we present the design and implementation of the ZigBee Mobile Router for healthcare system. The architecture is particularly useful to manage patient’s mobility where each patient is equipped with ZigBee sensor nodes.
{"title":"Design and Implementation of NEMO Based ZigBee Mobile Router for Healthcare System","authors":"Jin Ho Kim, Rim Haw, E. Cho, C. Hong, Jongwon Choe","doi":"10.1109/SAINT.2010.55","DOIUrl":"https://doi.org/10.1109/SAINT.2010.55","url":null,"abstract":"In this paper, we focused on the scheme which supports mobility for ZigBee sensor nodes. We adopt NEMO protocol to provide mobility for low power ZigBee sensor nodes. Therefore, we propose NEMO based ZigBee Mobile Router architecture and operations to support the network mobility of ZigBee network. Also, we present the design and implementation of the ZigBee Mobile Router for healthcare system. The architecture is particularly useful to manage patient’s mobility where each patient is equipped with ZigBee sensor nodes.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121055324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to research global collaborative applications among nations, a high performance global network like GLORIAD is indispensable. KISTI is a member of GLORIAD and has built, operated and maintained GLORIAD-KR which is a part of GLORIAD in Korea. KRLIGHT based on GLORIAD-KR is one of the GOLEs, lambda’s exchange point of GLIF, in Korea. KRLIGHT connects to 12 international partners that are made up of three GOLEs, four NRENs and four research organizations. Researchers who request dedicated network service internationally can use global lightpaths that provisioned dynamically or manually for their advance scientific applications over GLORIAD-KR and KRLIGHT. KISTI has supported several demonstrations for advanced applications and test-beds that are using global lightpaths provisioned: HPDMnet, Astronomy Application, High Energy and Nuclear Physics, Medical Application, etc. KISTI will continuously contribute to more collaborative scientific researches and global applications.
{"title":"GLORIAD-KR and Its Advanced Applications","authors":"Kwangjong Cho, Seon-Hwa Kim, Hyeakro Lee","doi":"10.1109/SAINT.2010.29","DOIUrl":"https://doi.org/10.1109/SAINT.2010.29","url":null,"abstract":"In order to research global collaborative applications among nations, a high performance global network like GLORIAD is indispensable. KISTI is a member of GLORIAD and has built, operated and maintained GLORIAD-KR which is a part of GLORIAD in Korea. KRLIGHT based on GLORIAD-KR is one of the GOLEs, lambda’s exchange point of GLIF, in Korea. KRLIGHT connects to 12 international partners that are made up of three GOLEs, four NRENs and four research organizations. Researchers who request dedicated network service internationally can use global lightpaths that provisioned dynamically or manually for their advance scientific applications over GLORIAD-KR and KRLIGHT. KISTI has supported several demonstrations for advanced applications and test-beds that are using global lightpaths provisioned: HPDMnet, Astronomy Application, High Energy and Nuclear Physics, Medical Application, etc. KISTI will continuously contribute to more collaborative scientific researches and global applications.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"1992 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125522947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akihiro Nakarai, Akira Sakatoku, Atsushi Takeda, G. Kitagata, D. Chakraborty, K. Hashimoto, N. Shiratori
In this paper, we propose an overlay authentication network for active utilization of private information. The proposed network realizes safe registration and usage of users' private information. In addition, the proposed network realizes the distributed management and utilization of users' private information. These features enable services which utilize users' private information. In this paper, we present implementation of the prototype system based on the proposed network, and confirm the effectiveness of the proposed network.
{"title":"An Overlay Authentication Network for Active Utilization of Private Information","authors":"Akihiro Nakarai, Akira Sakatoku, Atsushi Takeda, G. Kitagata, D. Chakraborty, K. Hashimoto, N. Shiratori","doi":"10.1109/SAINT.2010.77","DOIUrl":"https://doi.org/10.1109/SAINT.2010.77","url":null,"abstract":"In this paper, we propose an overlay authentication network for active utilization of private information. The proposed network realizes safe registration and usage of users' private information. In addition, the proposed network realizes the distributed management and utilization of users' private information. These features enable services which utilize users' private information. In this paper, we present implementation of the prototype system based on the proposed network, and confirm the effectiveness of the proposed network.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126865022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When analyzing the behaviors of an existing binary code, it is difficult because need to learn about special technologies. Moreover, static analysis is also difficult to detect the malicious behaviors if codes are encrypted by themselves. In this paper, we propose the method of dynamic change of program behavior, and avoid executing malicious codes intentionally. In order to make it possible, we plan to generalize it to separate dynamic analysis codes from dynamic analysis technologies as reusable programming approach.
{"title":"Behavior Control Based on Dynamic Code Translation","authors":"Akihiro Sakai, Y. Hori, K. Sakurai","doi":"10.1109/SAINT.2010.103","DOIUrl":"https://doi.org/10.1109/SAINT.2010.103","url":null,"abstract":"When analyzing the behaviors of an existing binary code, it is difficult because need to learn about special technologies. Moreover, static analysis is also difficult to detect the malicious behaviors if codes are encrypted by themselves. In this paper, we propose the method of dynamic change of program behavior, and avoid executing malicious codes intentionally. In order to make it possible, we plan to generalize it to separate dynamic analysis codes from dynamic analysis technologies as reusable programming approach.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127736625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ami Kadowaki, Daisuke Noguchi, Sayumi Sugimoto, Yuichi Bannai, Ken-ichi Okada
For transmitting olfactory information together with audio/visual information in the field of multimedia, it is necessary to control the scent presentation in accordance with the changing images and sounds presented to receivers. However, continuous emission of scents creates problems of lingering scent in air and human olfactory adaptation. To overcome such problems we applied repeated pulse ejections to emit a scent for short periods of time. We remodeled an olfactory display having high emission control ability. This display can control emit for a unit of 667 sec. It has been found out that the shortest time of pulse ejection which everyone can sense is 33 msec in this preliminary experiment. So we measured olfactory characteristics for 33 msec of pulse ejection. “Response time” and “Duration of scent perception” were measured for pulse ejection. Further, we defined and measured the minimum ejection interval that subject could discriminate the two individually emitted pulses of scent, which we call “Separable detection threshold”. It is expected that scent presentation based on these results can match visual and audio information and better enhance the sense of reality.
{"title":"Development of a High-Performance Olfactory Display and Measurement of Olfactory Characteristics for Pulse Ejections","authors":"Ami Kadowaki, Daisuke Noguchi, Sayumi Sugimoto, Yuichi Bannai, Ken-ichi Okada","doi":"10.1109/SAINT.2010.39","DOIUrl":"https://doi.org/10.1109/SAINT.2010.39","url":null,"abstract":"For transmitting olfactory information together with audio/visual information in the field of multimedia, it is necessary to control the scent presentation in accordance with the changing images and sounds presented to receivers. However, continuous emission of scents creates problems of lingering scent in air and human olfactory adaptation. To overcome such problems we applied repeated pulse ejections to emit a scent for short periods of time. We remodeled an olfactory display having high emission control ability. This display can control emit for a unit of 667 sec. It has been found out that the shortest time of pulse ejection which everyone can sense is 33 msec in this preliminary experiment. So we measured olfactory characteristics for 33 msec of pulse ejection. “Response time” and “Duration of scent perception” were measured for pulse ejection. Further, we defined and measured the minimum ejection interval that subject could discriminate the two individually emitted pulses of scent, which we call “Separable detection threshold”. It is expected that scent presentation based on these results can match visual and audio information and better enhance the sense of reality.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126193195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
the small form-factor of mobile handsets and the longer, variable latency of cellular networks are major hindrances to good user experience in mobile web related activities. Existing approaches have yet to adequately address the usability concerns caused by them. This paper describes the design and prototype implementation of MIntOS (Mobile Interaction Optimization System), a system for improving mobile interaction in web-based activities. MIntOS monitors users’ interactions both for gathering interaction history and for the runtime construction of interaction context. A simple approach based on interaction burstiness is used to break interaction sequences into Trails, which approximates user tasks. Such Trails are then used to generate rules for online, context-sensitive prediction of future interaction sequences. Predicted user interaction sequences are then optimized to reduce the amount of user input and user wait time using techniques such as interaction short-cuts, automatic text copying and form-filling, as well as page pre-fetching. Such optimized interaction sequences are, at real-time, recommended to the user through UI enhancements in a non-intrusive manner. MIntOS also uses content and structure based techniques to generalize prediction rules to extend to new but similar user tasks. Several sample applications are used to demonstrate the benefits of MIntOS.
{"title":"Optimizing User Interaction for Web-Based Mobile Tasks","authors":"Dong Zhou, Ajay Chander, H. Inamura","doi":"10.1145/1772690.1772915","DOIUrl":"https://doi.org/10.1145/1772690.1772915","url":null,"abstract":"the small form-factor of mobile handsets and the longer, variable latency of cellular networks are major hindrances to good user experience in mobile web related activities. Existing approaches have yet to adequately address the usability concerns caused by them. This paper describes the design and prototype implementation of MIntOS (Mobile Interaction Optimization System), a system for improving mobile interaction in web-based activities. MIntOS monitors users’ interactions both for gathering interaction history and for the runtime construction of interaction context. A simple approach based on interaction burstiness is used to break interaction sequences into Trails, which approximates user tasks. Such Trails are then used to generate rules for online, context-sensitive prediction of future interaction sequences. Predicted user interaction sequences are then optimized to reduce the amount of user input and user wait time using techniques such as interaction short-cuts, automatic text copying and form-filling, as well as page pre-fetching. Such optimized interaction sequences are, at real-time, recommended to the user through UI enhancements in a non-intrusive manner. MIntOS also uses content and structure based techniques to generalize prediction rules to extend to new but similar user tasks. Several sample applications are used to demonstrate the benefits of MIntOS.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127021707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}