首页 > 最新文献

17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.最新文献

英文 中文
Towards error-free and personalized Web-based courses 迈向无差错和个性化的网络课程
Hui-Huang Hsu, Chun-Jung Chen, Wen-Pin Tai
Providing appropriate learning content to each student is a key to the success of a Web-based distance learning system. Student test results can be an important feedback for the instructor to re-evaluate the course content. A test result feedback (TRF) model that analyzes the relationship between student learning time and corresponding test result is developed The model can give the instructor crucial information for course content refinement. It can also suggest the student with a personalized make-up course or appropriate advanced courses for further study. All these can be done automatically without interfering the student learning and/or increasing the instructor working load In our design, all Web courses are dynamically assembled with selected course units.
为每个学生提供合适的学习内容是基于网络的远程学习系统成功的关键。学生的测试结果可以作为教师重新评估课程内容的重要反馈。建立了一个测试结果反馈模型,分析了学生学习时间与相应测试结果之间的关系,该模型可以为教师改进课程内容提供重要信息。它还可以为学生提供个性化的补习课程或适当的高级课程以供进一步学习。所有这些都可以自动完成,而不会干扰学生的学习和/或增加教师的工作量。在我们的设计中,所有Web课程都与选定的课程单元动态地组合在一起。
{"title":"Towards error-free and personalized Web-based courses","authors":"Hui-Huang Hsu, Chun-Jung Chen, Wen-Pin Tai","doi":"10.1109/AINA.2003.1192850","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192850","url":null,"abstract":"Providing appropriate learning content to each student is a key to the success of a Web-based distance learning system. Student test results can be an important feedback for the instructor to re-evaluate the course content. A test result feedback (TRF) model that analyzes the relationship between student learning time and corresponding test result is developed The model can give the instructor crucial information for course content refinement. It can also suggest the student with a personalized make-up course or appropriate advanced courses for further study. All these can be done automatically without interfering the student learning and/or increasing the instructor working load In our design, all Web courses are dynamically assembled with selected course units.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121724870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Signature schemes based on two hard problems simultaneously 同时基于两个难题的签名方案
Ching-Te Wang, Chu-Hsing Lin, Chinchen Chang
Harn (1994) proposed a signature scheme based on the modified ElGamal scheme and claimed that the security relies on both the factorization and the discrete logarithm. That is, his scheme cannot be broken unless both of the above two problems can be solved simultaneously. Lee and Hwang (1996) showed that an attacker could generate a forged signature on the assumption when the discrete logarithm is solved. Recently, Shao (1998) proposed another two signature schemes, which the security rests on the two problems. In this paper, we propose two improved signature schemes that are really based on two hard problems simultaneously. In addition, the numbers of parameters and computations are reduced in comparison with those of Shao.
Harn(1994)在改进的ElGamal方案的基础上提出了一种签名方案,认为其安全性既依赖于因式分解,也依赖于离散对数。也就是说,除非上述两个问题同时得到解决,否则他的方案是不可能被打破的。Lee和Hwang(1996)表明,攻击者可以在求解离散对数的假设下生成伪造签名。最近,Shao(1998)提出了另外两种签名方案,其安全性建立在这两个问题之上。本文提出了两种改进的签名方案,这两种方案实际上是同时基于两个难题的。此外,与Shao的方法相比,该方法的参数和计算量都有所减少。
{"title":"Signature schemes based on two hard problems simultaneously","authors":"Ching-Te Wang, Chu-Hsing Lin, Chinchen Chang","doi":"10.1109/AINA.2003.1192943","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192943","url":null,"abstract":"Harn (1994) proposed a signature scheme based on the modified ElGamal scheme and claimed that the security relies on both the factorization and the discrete logarithm. That is, his scheme cannot be broken unless both of the above two problems can be solved simultaneously. Lee and Hwang (1996) showed that an attacker could generate a forged signature on the assumption when the discrete logarithm is solved. Recently, Shao (1998) proposed another two signature schemes, which the security rests on the two problems. In this paper, we propose two improved signature schemes that are really based on two hard problems simultaneously. In addition, the numbers of parameters and computations are reduced in comparison with those of Shao.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129290671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Activity attack on Rijndael 对里因达尔的攻击
Baodian Wei, Dongsu Liu, Xinmei Wang
There have not been many successful attacks against the AES algorithm Rijndael so far, of which the best known and effective attack is the Square Attack. It takes advantage of the balance property of the algorithm. A new type of attack which makes use of the activity property is proposed. The consuming time and chosen plaintexts necessary are both reduced to one tenth of the original ones. The analysis principle is described.
到目前为止,针对AES Rijndael算法的成功攻击还不多,其中最著名和有效的攻击是Square攻击。它利用了算法的平衡特性。提出了一种利用活动特性的新型攻击方法。消耗的时间和选择的明文都减少到原来的十分之一。阐述了分析原理。
{"title":"Activity attack on Rijndael","authors":"Baodian Wei, Dongsu Liu, Xinmei Wang","doi":"10.1109/AINA.2003.1193004","DOIUrl":"https://doi.org/10.1109/AINA.2003.1193004","url":null,"abstract":"There have not been many successful attacks against the AES algorithm Rijndael so far, of which the best known and effective attack is the Square Attack. It takes advantage of the balance property of the algorithm. A new type of attack which makes use of the activity property is proposed. The consuming time and chosen plaintexts necessary are both reduced to one tenth of the original ones. The analysis principle is described.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126856248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance comparison of adaptation approaches for mobile information system 移动信息系统自适应方法的性能比较
Qingguo Shen, Li Wang
We analyze the access behavior and traffic characteristics of typical mobile services, study and compare the performance of different adaptation approaches. For a typical unified Web site, 10% of access requests are from mobile users, 90% from PC users. The heterogeneity in the communicating devices and networks QoS characteristics need to be handled through different forms of software-supported adaptation. The two main adaptation models are server-based model and proxy-based model. The processing load of server or proxy carrying out the adaptation may increase by about 10 times or more. In order to provide differential services and increase the scalability, the server-adaptation and proxy-adaptation should coexist. They are suitable for paid and free services respectively. Paid services account for about 80% of mobile traffic, and free services account for 20%. Server and proxy processing capability should be increased by more than 2 times. Thus traffic and processing load is divided rationally.
分析了典型移动业务的接入行为和流量特征,研究并比较了不同自适应方法的性能。对于一个典型的统一Web站点,10%的访问请求来自移动用户,90%来自PC用户。通信设备和网络QoS特性的异构性需要通过不同形式的软件支持适应来处理。两种主要的适配模型是基于服务器的适配模型和基于代理的适配模型。执行适配的服务器或代理的处理负载可能增加约10倍或更多。为了提供不同的服务并增加可伸缩性,服务器适应和代理适应应该共存。它们分别适用于付费和免费服务。付费服务约占移动流量的80%,免费服务约占20%。服务器和代理处理能力应提高2倍以上。从而合理划分流量和处理负荷。
{"title":"Performance comparison of adaptation approaches for mobile information system","authors":"Qingguo Shen, Li Wang","doi":"10.1109/AINA.2003.1192874","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192874","url":null,"abstract":"We analyze the access behavior and traffic characteristics of typical mobile services, study and compare the performance of different adaptation approaches. For a typical unified Web site, 10% of access requests are from mobile users, 90% from PC users. The heterogeneity in the communicating devices and networks QoS characteristics need to be handled through different forms of software-supported adaptation. The two main adaptation models are server-based model and proxy-based model. The processing load of server or proxy carrying out the adaptation may increase by about 10 times or more. In order to provide differential services and increase the scalability, the server-adaptation and proxy-adaptation should coexist. They are suitable for paid and free services respectively. Paid services account for about 80% of mobile traffic, and free services account for 20%. Server and proxy processing capability should be increased by more than 2 times. Thus traffic and processing load is divided rationally.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128997945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Active dispatching schemes for Web caches in mobile networks 移动网络中Web缓存的主动调度方案
Jui-Ming Chen, Li-Der Chou
The caching technology is now commonly used to reduce the response time and save the bandwidth for hot Web accesses. The performance can be further improved by clustering several caches together, where a dispatcher is adopted to select a suitable cache from the cache cluster for each request. Therefore, ways to appropriately configure the cache cluster and design the dispatching scheme become important issues. The architecture of distributed dispatchers using the active networking technology is proposed to adaptively dispatch each request to an appropriate cache, according to network conditions and cache loads. The concept of virtual clusters, that distant caches can belong to the same cluster and a cache can belong to more than one cluster, is also proposed to balance the loads of caches globally.
缓存技术现在通常用于减少响应时间和节省热Web访问的带宽。通过将几个缓存聚在一起,可以进一步提高性能,其中采用调度程序从缓存集群中为每个请求选择合适的缓存。因此,如何合理配置缓存集群和设计调度方案就成为重要的问题。提出了采用主动网络技术的分布式调度程序体系结构,根据网络条件和缓存负载自适应地将每个请求分配到合适的缓存中。为了实现全局缓存负载均衡,还提出了虚拟集群的概念,即远程缓存可以属于同一个集群,一个缓存可以属于多个集群。
{"title":"Active dispatching schemes for Web caches in mobile networks","authors":"Jui-Ming Chen, Li-Der Chou","doi":"10.1109/AINA.2003.1192905","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192905","url":null,"abstract":"The caching technology is now commonly used to reduce the response time and save the bandwidth for hot Web accesses. The performance can be further improved by clustering several caches together, where a dispatcher is adopted to select a suitable cache from the cache cluster for each request. Therefore, ways to appropriately configure the cache cluster and design the dispatching scheme become important issues. The architecture of distributed dispatchers using the active networking technology is proposed to adaptively dispatch each request to an appropriate cache, according to network conditions and cache loads. The concept of virtual clusters, that distant caches can belong to the same cluster and a cache can belong to more than one cluster, is also proposed to balance the loads of caches globally.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132320115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation of modified IEEE 802.11 MAC for multi-channel multi-hop ad hoc network 改进的IEEE 802.11 MAC在多通道多跳自组织网络中的性能评估
Jiandong Li, Z. Haas, Min Sheng, Yanhui Chen
The IEEE 802.11 multiple access control protocol was modified for use in multi-channel, multi-hop ad hoc network, through the use of a new channel-status indicator. In particular, we have evaluated the improvement due to the multi-channel use. We report in this paper on the results of the throughput per node and the end-to-end delay for the modified IEEE 802.11 protocol for different network sizes. Using these results, we were able to propose a number of throughput scaling laws. Our simulation results show that the throughputs per node with multiple channels for the line and the grid ad hoc network topologies will increase by 47.89%, and by 1.39-163%, respectively, for networks with 16 to 64 nodes, as compared with that of single channel.
通过使用新的通道状态指示器,IEEE 802.11多路访问控制协议被修改以用于多通道、多跳的自组织网络。特别是,我们已经评估了由于多渠道使用而带来的改善。在本文中,我们报告了改进后的IEEE 802.11协议在不同网络规模下的每个节点吞吐量和端到端延迟的结果。利用这些结果,我们能够提出许多吞吐量缩放定律。我们的仿真结果表明,与单通道网络相比,对于线路和网格自组织网络拓扑结构,具有多个通道的每个节点的吞吐量将分别增加47.89%和1.39-163%,对于16至64个节点的网络。
{"title":"Performance evaluation of modified IEEE 802.11 MAC for multi-channel multi-hop ad hoc network","authors":"Jiandong Li, Z. Haas, Min Sheng, Yanhui Chen","doi":"10.1109/AINA.2003.1192896","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192896","url":null,"abstract":"The IEEE 802.11 multiple access control protocol was modified for use in multi-channel, multi-hop ad hoc network, through the use of a new channel-status indicator. In particular, we have evaluated the improvement due to the multi-channel use. We report in this paper on the results of the throughput per node and the end-to-end delay for the modified IEEE 802.11 protocol for different network sizes. Using these results, we were able to propose a number of throughput scaling laws. Our simulation results show that the throughputs per node with multiple channels for the line and the grid ad hoc network topologies will increase by 47.89%, and by 1.39-163%, respectively, for networks with 16 to 64 nodes, as compared with that of single channel.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
The multi-sharing mobile remote monitoring system - the four layer object management model and practical system 多共享移动远程监控系统——四层对象管理模型及实用系统
Y. Murata, Katsuhisa Sugiura, S. Ishihara, F. Sato, T. Mizuno
A remote monitoring of various device distributed over wide area is strongly demanded to cut down their maintenance cost. With the introduction of wireless packet systems, the mobile remote monitoring system has started to propagate, because of a less limit to establish remote monitoring devices and its characteristic of always connectivity. Many small to medium sized corporations have been hesitating, although they understand this necessity, because of high investment costs involved in the maintenance of monitoring systems. One solution to this problem is the ASP (Application Service Provider). We developed the multi sharing mobile remote monitoring system MMRM. This paper will present the four layers object management model and the three layers application protocol stuck model that are basic design schemes of MMRM. The system structure and the function block diagram of the practical system TRM (Tokai-Remote Monitoring System) in which Toshiba Machine's TC-mini is used as a data logger will be introduced. In addition, system characteristics such as the delay period from trouble detection to sending alarm message will also be described.
为了降低设备的维护成本,需要对分布在广阔区域的各种设备进行远程监控。随着无线分组系统的引入,移动远程监控系统因其建立远程监控设备的限制较少,且具有始终连接的特点而开始普及。许多中小型公司一直犹豫不决,尽管它们理解这一必要性,因为维护监测系统所涉及的投资费用很高。这个问题的一个解决方案是ASP(应用程序服务提供者)。我们开发了多共享移动远程监控系统MMRM。本文提出了四层对象管理模型和三层应用协议卡模型这两种MMRM的基本设计方案。介绍了采用东芝机器公司的TC-mini作为数据记录仪的实际系统TRM (Tokai-Remote Monitoring system)的系统结构和功能框图。此外,还将描述从故障检测到发送报警信息的延迟时间等系统特性。
{"title":"The multi-sharing mobile remote monitoring system - the four layer object management model and practical system","authors":"Y. Murata, Katsuhisa Sugiura, S. Ishihara, F. Sato, T. Mizuno","doi":"10.1109/AINA.2003.1192950","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192950","url":null,"abstract":"A remote monitoring of various device distributed over wide area is strongly demanded to cut down their maintenance cost. With the introduction of wireless packet systems, the mobile remote monitoring system has started to propagate, because of a less limit to establish remote monitoring devices and its characteristic of always connectivity. Many small to medium sized corporations have been hesitating, although they understand this necessity, because of high investment costs involved in the maintenance of monitoring systems. One solution to this problem is the ASP (Application Service Provider). We developed the multi sharing mobile remote monitoring system MMRM. This paper will present the four layers object management model and the three layers application protocol stuck model that are basic design schemes of MMRM. The system structure and the function block diagram of the practical system TRM (Tokai-Remote Monitoring System) in which Toshiba Machine's TC-mini is used as a data logger will be introduced. In addition, system characteristics such as the delay period from trouble detection to sending alarm message will also be described.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127818714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polyphase array FFT demultiplex for broadband satellite communication networks 宽带卫星通信网络的多相阵FFT解复用
Bo Niu, K. Yi, Chun-yan Gu
A FDMA/TDM multiple access/multiplexing system based on onboard FDMA-TDM conversion is believed to be very attractive for VSAT satellite communication networks, but it has two fatal drawbacks, i.e. its on board processing equipment is too complex and it lacks flexibility in applications. This paper presents a new form of FDMA/CWTDM multiple access/multiplexing included in a Chinese patent, which can overcome the two drawbacks and suit broadband applications, where CWTDM means continuous wave time division multiplexing. In an onboard FDMA-CWTDM converter, how to implement the frequency-division demultiplexer is the most important issue. It is desired that its frequency band should be as wide as possible and the number of its channels be as great as possible. This paper emphasizes the research and design for such a demultiplexer. For the purpose, a polyphase array FFT demultiplexer module has been successfully developed based on FPGA design. Theoretical analysis and experimental results show that the demultiplexer module has very good performance and can find wide application.
基于板载FDMA-TDM转换的FDMA/TDM多址/复用系统被认为是非常有吸引力的VSAT卫星通信网络,但它有两个致命的缺点,即板载处理设备过于复杂,在应用中缺乏灵活性。本文提出了一种新型的FDMA/CWTDM多址/复用技术,该技术克服了这两个缺点,适合宽带应用,其中CWTDM意味着连续波时分复用。在板载FDMA-CWTDM转换器中,如何实现频分解复用器是最重要的问题。期望其频带尽可能宽,信道数量尽可能多。本文着重研究和设计了这样一种解复用器。为此,成功开发了一种基于FPGA设计的多相阵FFT解复用模块。理论分析和实验结果表明,该解复用模块具有良好的性能,具有广泛的应用前景。
{"title":"Polyphase array FFT demultiplex for broadband satellite communication networks","authors":"Bo Niu, K. Yi, Chun-yan Gu","doi":"10.1109/AINA.2003.1192922","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192922","url":null,"abstract":"A FDMA/TDM multiple access/multiplexing system based on onboard FDMA-TDM conversion is believed to be very attractive for VSAT satellite communication networks, but it has two fatal drawbacks, i.e. its on board processing equipment is too complex and it lacks flexibility in applications. This paper presents a new form of FDMA/CWTDM multiple access/multiplexing included in a Chinese patent, which can overcome the two drawbacks and suit broadband applications, where CWTDM means continuous wave time division multiplexing. In an onboard FDMA-CWTDM converter, how to implement the frequency-division demultiplexer is the most important issue. It is desired that its frequency band should be as wide as possible and the number of its channels be as great as possible. This paper emphasizes the research and design for such a demultiplexer. For the purpose, a polyphase array FFT demultiplexer module has been successfully developed based on FPGA design. Theoretical analysis and experimental results show that the demultiplexer module has very good performance and can find wide application.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115638732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient parity placement schemes for tolerating triple disk failures in RAID architectures 有效的奇偶放置方案,可以在RAID架构中容忍三重磁盘故障
Chih-Shing Tau, Tzone-I Wang
This paper proposes two improved triple parity placement schemes, the HDD1 (horizontal and dual diagonal) and HDD2 schemes, to enhance the reliability of a RAID system. Both schemes can tolerate up to three disk failures by using three types of parity information (horizontal, diagonal, and anti-diagonal parities) in RAID disk block partitions. The HDD1 scheme can reduce the occurrences of bottlenecks because its horizontal and anti-diagonal parities are uniformly distributed over a disk array, while diagonal parities are placed in a dedicated disk. The HDD2 scheme uses one more disk than HDD1 to store the horizontal parities and an additional diagonal parity, while the anti-diagonal and the diagonal parities are placed in the same way as in the HDD1 scheme, only with a minor difference. The encoding and decoding algorithms of both schemes are simple and effective. Many of the steps of the encoding and decoding algorithms can be executed in parallel. Both schemes enable a RAID to recover rapidly from up to three disk failures, with a single algorithm applied straightforwardly.
为了提高RAID系统的可靠性,本文提出了两种改进的三重奇偶放置方案:HDD1(水平和双对角线)和HDD2方案。通过在RAID磁盘块分区中使用三种类型的奇偶校验信息(水平、对角和反对角奇偶),这两种方案最多可以容忍三次磁盘故障。HDD1方案可以减少瓶颈的出现,因为它的水平和反对角偶对在磁盘阵列上均匀分布,而对角偶对则放在专用磁盘中。HDD2方案比HDD1多使用一个磁盘来存储水平奇偶校验和一个额外的对角线奇偶校验,而反对角线和对角线奇偶校验的放置方式与HDD1方案相同,只有很小的不同。两种方案的编解码算法都简单有效。编码和解码算法的许多步骤可以并行执行。这两种方案都使RAID能够从最多三个磁盘故障中快速恢复,只需直接应用一个算法。
{"title":"Efficient parity placement schemes for tolerating triple disk failures in RAID architectures","authors":"Chih-Shing Tau, Tzone-I Wang","doi":"10.1109/AINA.2003.1192855","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192855","url":null,"abstract":"This paper proposes two improved triple parity placement schemes, the HDD1 (horizontal and dual diagonal) and HDD2 schemes, to enhance the reliability of a RAID system. Both schemes can tolerate up to three disk failures by using three types of parity information (horizontal, diagonal, and anti-diagonal parities) in RAID disk block partitions. The HDD1 scheme can reduce the occurrences of bottlenecks because its horizontal and anti-diagonal parities are uniformly distributed over a disk array, while diagonal parities are placed in a dedicated disk. The HDD2 scheme uses one more disk than HDD1 to store the horizontal parities and an additional diagonal parity, while the anti-diagonal and the diagonal parities are placed in the same way as in the HDD1 scheme, only with a minor difference. The encoding and decoding algorithms of both schemes are simple and effective. Many of the steps of the encoding and decoding algorithms can be executed in parallel. Both schemes enable a RAID to recover rapidly from up to three disk failures, with a single algorithm applied straightforwardly.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A study on a spatio-temporal data structure for managing video data from monitoring cameras 用于监控摄像机视频数据管理的时空数据结构研究
Yiqun Wang, Y. Hijikata, S. Nishida
In case of emergency, we need to grasp the situation and make correct assessment quickly. The video data taken from the monitoring camera is important information in the emergent situation. In our research, we attempt to build a support system for identifying the video data of the monitoring camera by dealing with video data as spatio-temporal data. We proposed a method, which displays those video data on one virtual large wall. For this presentation, the search key in our system is the location and the size of this large screen and from which direction to look. First we developed a general algorithm to index spatio-temporal data to get an idea for developing the algorithm for this search key.
在紧急情况下,我们需要迅速掌握形势并做出正确的评估。监控摄像机采集的视频数据是紧急情况下的重要信息。在我们的研究中,我们试图通过将视频数据作为时空数据来处理,构建一个监控摄像机视频数据识别的支持系统。我们提出了一种将这些视频数据显示在一面虚拟大墙上的方法。对于这个演示,我们系统中的搜索键是这个大屏幕的位置和大小,以及从哪个方向看。首先,我们开发了一种用于索引时空数据的通用算法,以获得针对该搜索关键字开发算法的思路。
{"title":"A study on a spatio-temporal data structure for managing video data from monitoring cameras","authors":"Yiqun Wang, Y. Hijikata, S. Nishida","doi":"10.1109/AINA.2003.1192920","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192920","url":null,"abstract":"In case of emergency, we need to grasp the situation and make correct assessment quickly. The video data taken from the monitoring camera is important information in the emergent situation. In our research, we attempt to build a support system for identifying the video data of the monitoring camera by dealing with video data as spatio-temporal data. We proposed a method, which displays those video data on one virtual large wall. For this presentation, the search key in our system is the location and the size of this large screen and from which direction to look. First we developed a general algorithm to index spatio-temporal data to get an idea for developing the algorithm for this search key.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129536527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1