首页 > 最新文献

Proceedings of the The International Conference on Engineering & MIS 2015最新文献

英文 中文
Proceedings of the The International Conference on Engineering & MIS 2015 工程与管理信息系统国际会议论文集2015
Shadi A. Aljawarneh, Bassam Al-Shargabi
Welcome to the ICEMIS 2015, our International Conference on Engineering and MIS. We are delighted that this conference, is organized by the International Association of Researchers (IARES), technically sponsored by ICPS at ACM, USA and hosted by the Istanbul Kemerburgaz University, Turkey. The ICEMIS 2015 includes participation by professionals from 30 countries, presenting 120 papers, together with 3 key-note speakers who will look at the academia's responsibility to acknowledge the engineering and MIS groups and labs over world.
欢迎参加ICEMIS 2015,我们的工程和管理信息系统国际会议。我们很高兴这次会议由国际研究人员协会(IARES)组织,由美国ACM的ICPS提供技术赞助,由土耳其伊斯坦布尔Kemerburgaz大学主办。ICEMIS 2015包括来自30个国家的专业人士的参与,将发表120篇论文,以及3位主题演讲者,他们将关注学术界对世界各地的工程和管理信息系统小组和实验室的责任。
{"title":"Proceedings of the The International Conference on Engineering & MIS 2015","authors":"Shadi A. Aljawarneh, Bassam Al-Shargabi","doi":"10.1145/2832987","DOIUrl":"https://doi.org/10.1145/2832987","url":null,"abstract":"Welcome to the ICEMIS 2015, our International Conference on Engineering and MIS. We are delighted that this conference, is organized by the International Association of Researchers (IARES), technically sponsored by ICPS at ACM, USA and hosted by the Istanbul Kemerburgaz University, Turkey. The ICEMIS 2015 includes participation by professionals from 30 countries, presenting 120 papers, together with 3 key-note speakers who will look at the academia's responsibility to acknowledge the engineering and MIS groups and labs over world.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123633647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Approach for Mining Similarity Profiled Temporal Association Patterns Using Venn Diagrams 一种利用维恩图挖掘相似时序关联模式的新方法
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833071
V. Radhakrishna, Puligadda Veereswara Kumar, V. Janaki
The problem of mining frequent patterns in a static database is studied extensively in the literature by many researchers. Conventional frequent pattern algorithms are not applicable to find frequent patterns from the temporal database. Temporal database is a database which can store past, present and future information. A temporal relation may be viewed as a database of time invariant and time variant relation instances. The objective of this research is to come up with a novel approach so as to find the temporal association patterns similar to a given reference support sequence and user defined threshold using the concept of Venn diagrams. The proposed approach scans the temporal database only once to find the temporal association patterns and hence reduces the huge overhead incurred when the database is scanned multiple times.
在静态数据库中挖掘频繁模式的问题被许多研究者广泛地研究。传统的频繁模式算法不适用于从时态数据库中发现频繁模式。时态数据库是一种能够存储过去、现在和未来信息的数据库。时间关系可以看作时不变和时变关系实例的数据库。本研究的目的是利用维恩图的概念,提出一种新的方法来寻找与给定的参考支持序列和用户自定义阈值相似的时间关联模式。该方法只需扫描一次时态数据库即可找到时态关联模式,从而减少了多次扫描数据库时产生的巨大开销。
{"title":"A Novel Approach for Mining Similarity Profiled Temporal Association Patterns Using Venn Diagrams","authors":"V. Radhakrishna, Puligadda Veereswara Kumar, V. Janaki","doi":"10.1145/2832987.2833071","DOIUrl":"https://doi.org/10.1145/2832987.2833071","url":null,"abstract":"The problem of mining frequent patterns in a static database is studied extensively in the literature by many researchers. Conventional frequent pattern algorithms are not applicable to find frequent patterns from the temporal database. Temporal database is a database which can store past, present and future information. A temporal relation may be viewed as a database of time invariant and time variant relation instances. The objective of this research is to come up with a novel approach so as to find the temporal association patterns similar to a given reference support sequence and user defined threshold using the concept of Venn diagrams. The proposed approach scans the temporal database only once to find the temporal association patterns and hence reduces the huge overhead incurred when the database is scanned multiple times.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Performance Evaluation of AG Block Turbo Codes over Fading Channels Using BPSK 基于BPSK的AG分组Turbo码衰落信道性能评价
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833044
Omar A. Alzubi
This paper will present in details the concept of block turbo design in Algebraic Geometric (AG) codes constructed from Hermitian curves defined over finite fields, and the iterative decoding of the constructed block turbo codes using a High Input-High Output (HIHO) decoding technique based on Sakata's algorithm with Majority Voting (MV) technique and Chase-Pyndiah's Algorithm to extract a soft output from the hard output of the AG decoder. Then will present the simulation results of Bit-Error-Rate (BER) performance of Algebraic Geometric- Block Turbo Codes (AG-BTCs) compared with the BER performance of Reed Solomon- Block Turbo Codes (RS-BTCs) of about same size and relatively similar rate over different finite fields using Binary Phase Shift Keying (BPSK) modulation scheme.
本文将详细介绍在有限域上定义的埃尔米曲线构造的代数几何(AG)码中的块turbo设计概念,并使用基于Sakata算法的高输入-高输出(HIHO)解码技术,结合多数投票(MV)技术和Chase-Pyndiah算法对构造的块turbo码进行迭代解码,从AG解码器的硬输出中提取软输出。然后给出了代数几何块Turbo码(ag - btc)和Reed Solomon块Turbo码(rs - btc)的误码率(BER)性能的仿真结果,比较了使用二进制相移键控(BPSK)调制方案的相同大小和相对相似速率的代数几何块Turbo码(ag - btc)在不同有限域上的误码率性能。
{"title":"Performance Evaluation of AG Block Turbo Codes over Fading Channels Using BPSK","authors":"Omar A. Alzubi","doi":"10.1145/2832987.2833044","DOIUrl":"https://doi.org/10.1145/2832987.2833044","url":null,"abstract":"This paper will present in details the concept of block turbo design in Algebraic Geometric (AG) codes constructed from Hermitian curves defined over finite fields, and the iterative decoding of the constructed block turbo codes using a High Input-High Output (HIHO) decoding technique based on Sakata's algorithm with Majority Voting (MV) technique and Chase-Pyndiah's Algorithm to extract a soft output from the hard output of the AG decoder. Then will present the simulation results of Bit-Error-Rate (BER) performance of Algebraic Geometric- Block Turbo Codes (AG-BTCs) compared with the BER performance of Reed Solomon- Block Turbo Codes (RS-BTCs) of about same size and relatively similar rate over different finite fields using Binary Phase Shift Keying (BPSK) modulation scheme.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128238413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Approach for Clustering Text Data Streams Using K-means and Ternary Feature Vector Based Similarity Measure 基于k均值和三元特征向量的文本数据流聚类方法
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833081
M. PhridviRaj, C. V. Rao
Clustering text data streams is an unsupervised learning process which requires handling data streams. In the current work, we find the pair wise distance between customer transactions using the transaction similarity measure and obtain corresponding pair wise distance matrix. This pair wise distance matrix is then used to cluster the data streams such as customer transactions which are generated continuously in super markets and stored in to the database. For clustering, customer transactions, we use the k-means clustering algorithm. The input to k-means algorithm is the distance matrix in contrast to conventional approach which does not use the distance matrix. Finally, we define the proposed distance measure and validate it using the case study. We compare the results obtained using this approach with the one obtained using conventional k-means.
聚类文本数据流是一种需要处理数据流的无监督学习过程。在目前的工作中,我们使用交易相似度度量来找到客户交易之间的对距离,并得到相应的对距离矩阵。然后使用这种对距离矩阵对数据流进行聚类,例如在超市中连续生成并存储在数据库中的客户交易。对于聚类,客户交易,我们使用k-means聚类算法。与不使用距离矩阵的传统方法相比,k-means算法的输入是距离矩阵。最后,我们定义了所提出的距离度量,并通过案例研究对其进行了验证。我们将使用这种方法获得的结果与使用传统k-means获得的结果进行比较。
{"title":"An Approach for Clustering Text Data Streams Using K-means and Ternary Feature Vector Based Similarity Measure","authors":"M. PhridviRaj, C. V. Rao","doi":"10.1145/2832987.2833081","DOIUrl":"https://doi.org/10.1145/2832987.2833081","url":null,"abstract":"Clustering text data streams is an unsupervised learning process which requires handling data streams. In the current work, we find the pair wise distance between customer transactions using the transaction similarity measure and obtain corresponding pair wise distance matrix. This pair wise distance matrix is then used to cluster the data streams such as customer transactions which are generated continuously in super markets and stored in to the database. For clustering, customer transactions, we use the k-means clustering algorithm. The input to k-means algorithm is the distance matrix in contrast to conventional approach which does not use the distance matrix. Finally, we define the proposed distance measure and validate it using the case study. We compare the results obtained using this approach with the one obtained using conventional k-means.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128364595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Performance Impact of Texture Features on MRI Image Classification 纹理特征对MRI图像分类性能的影响
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833063
A. Al-Badarneh, Ali Alrazqi, Hassan M. Najadat
The MR image texture contains a rich source of information which consists of entities that characterize brightness, color, slope, size and other characteristics. Features extraction are identifying relevant features leads to faster, easier, and better to understand images. Feature extraction process affects significantly the quality of the classification process. Accordingly, select representative features effect on classification accuracy. So, principle component analysis (PCA) used to reduce number of features. MRI classification is a computational method used to find patterns and develop classification schemes for data in very huge datasets. In this paper, we use two well-known algorithms neural network (NN) and support vector machine (SVM) for classification of MRI of the human brain. The extracted texture features passed to NN and SVM. The classifiers have been used to classify MRI as abnormal or normal. We use a large benchmark dataset of 710 MRI brain images obtained from Harvard medical school. The experimental results show that our approach achieved was 99.29 % classification accuracy achieved by NN and 97.32 % by SVM with cross-validation 10. And 99.58 % achieved by NN and 97.09 % SVM by with percentage split with 66%.
磁共振图像纹理包含丰富的信息源,这些信息源由表征亮度、颜色、斜率、大小等特征的实体组成。特征提取是识别相关特征,从而更快、更容易、更好地理解图像。特征提取过程对分类过程的质量影响很大。相应地,选取具有代表性的特征对分类精度的影响。因此,采用主成分分析(PCA)来减少特征的数量。MRI分类是一种用于在非常庞大的数据集中寻找模式和开发分类方案的计算方法。本文采用神经网络(NN)和支持向量机(SVM)两种著名的算法对人脑MRI图像进行分类。提取的纹理特征传递给神经网络和支持向量机。分类器已被用于将MRI分类为异常或正常。我们使用了从哈佛医学院获得的710张MRI脑图像的大型基准数据集。实验结果表明,经交叉验证,该方法的分类准确率分别为99.29%和97.32%。其中,神经网络和支持向量机分别达到99.58%和97.09%,其中百分比分割为66%。
{"title":"Performance Impact of Texture Features on MRI Image Classification","authors":"A. Al-Badarneh, Ali Alrazqi, Hassan M. Najadat","doi":"10.1145/2832987.2833063","DOIUrl":"https://doi.org/10.1145/2832987.2833063","url":null,"abstract":"The MR image texture contains a rich source of information which consists of entities that characterize brightness, color, slope, size and other characteristics. Features extraction are identifying relevant features leads to faster, easier, and better to understand images. Feature extraction process affects significantly the quality of the classification process. Accordingly, select representative features effect on classification accuracy. So, principle component analysis (PCA) used to reduce number of features. MRI classification is a computational method used to find patterns and develop classification schemes for data in very huge datasets. In this paper, we use two well-known algorithms neural network (NN) and support vector machine (SVM) for classification of MRI of the human brain. The extracted texture features passed to NN and SVM. The classifiers have been used to classify MRI as abnormal or normal. We use a large benchmark dataset of 710 MRI brain images obtained from Harvard medical school. The experimental results show that our approach achieved was 99.29 % classification accuracy achieved by NN and 97.32 % by SVM with cross-validation 10. And 99.58 % achieved by NN and 97.09 % SVM by with percentage split with 66%.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122428323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Cross Project Vulnerability Prediction in Open Source Web Applications 开源Web应用跨项目漏洞预测研究
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833051
I. Abunadi, Mamdouh Alenezi
Building secure software is challenging, time-consuming, and expensive. Software vulnerability prediction models that identify vulnerable software components are usually used to focus security efforts, with the aim of helping to reduce the time and effort needed to secure software. Existing vulnerability prediction models use process or product metrics and machine learning techniques to identify vulnerable software components. Cross project vulnerability prediction plays a significant role in appraising the most likely vulnerable software components, specifically for new or inactive projects. Little effort has been spent to deliver clear guidelines on how to choose the training data for project vulnerability prediction. In this work, we present an empirical study aiming at clarifying how useful cross project prediction techniques in predicting software vulnerabilities. Our study employs the classification provided by different machine learning techniques to improve the detection of vulnerable components. We have elaborately compared the prediction performance of five well-known classifiers. The study is conducted on a publicly available dataset of several PHP open source web applications and in the context of cross project vulnerability prediction, which represents one of the main challenges in the vulnerability prediction field.
构建安全软件具有挑战性、耗时且昂贵。识别易受攻击的软件组件的软件漏洞预测模型通常用于集中安全工作,目的是帮助减少保护软件所需的时间和精力。现有的漏洞预测模型使用过程或产品度量和机器学习技术来识别易受攻击的软件组件。跨项目漏洞预测在评估最可能的漏洞软件组件方面起着重要的作用,特别是对于新的或不活跃的项目。对于如何选择用于项目脆弱性预测的训练数据,很少有人致力于提供明确的指导方针。在这项工作中,我们提出了一项实证研究,旨在阐明跨项目预测技术在预测软件漏洞方面的作用。我们的研究采用不同机器学习技术提供的分类来改进对脆弱组件的检测。我们详细比较了五种知名分类器的预测性能。本研究基于多个PHP开源web应用程序的公开数据集,并在跨项目漏洞预测的背景下进行,这代表了漏洞预测领域的主要挑战之一。
{"title":"Towards Cross Project Vulnerability Prediction in Open Source Web Applications","authors":"I. Abunadi, Mamdouh Alenezi","doi":"10.1145/2832987.2833051","DOIUrl":"https://doi.org/10.1145/2832987.2833051","url":null,"abstract":"Building secure software is challenging, time-consuming, and expensive. Software vulnerability prediction models that identify vulnerable software components are usually used to focus security efforts, with the aim of helping to reduce the time and effort needed to secure software. Existing vulnerability prediction models use process or product metrics and machine learning techniques to identify vulnerable software components. Cross project vulnerability prediction plays a significant role in appraising the most likely vulnerable software components, specifically for new or inactive projects. Little effort has been spent to deliver clear guidelines on how to choose the training data for project vulnerability prediction. In this work, we present an empirical study aiming at clarifying how useful cross project prediction techniques in predicting software vulnerabilities. Our study employs the classification provided by different machine learning techniques to improve the detection of vulnerable components. We have elaborately compared the prediction performance of five well-known classifiers. The study is conducted on a publicly available dataset of several PHP open source web applications and in the context of cross project vulnerability prediction, which represents one of the main challenges in the vulnerability prediction field.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133361032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Cost Anaylsis of Interoperable Based E-Procurement System in the Republic of Turkey 土耳其共和国基于互操作的电子采购系统成本分析
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2832999
M. Imamoglu, M. Rehan
Approximately 15% of the government's Gross Domestic Products (GDP) is spent on public procurement [1]. Therefore, accountability and transparency in public procurement is very important. For the regulation of public expenditures and effective use of the budget, not only public procurements but also efficient use of infrastructure that make up the system for public procurements should be considered. As a result, the importance of the electronic procurement processes is emphasized in this thesis. Public Procurement Authority (PPA) and the State Procurement and Supply Office (SPSO) responsible for public tenders in the Republic of Turkey are two foundations affiliated to the Ministry of Finance. However, in public procurement, both institutions have their own system, own business processes and legal obligations. Yet is it a privilege to have two different systems? To find the answer to this question, interoperable based Public electronic Procurement (PeP) system and current PeP system are compared with the cost analysis study for the Republic of Turkey.
大约15%的政府国内生产总值(GDP)用于公共采购。因此,公共采购的问责制和透明度非常重要。为了规范公共支出和有效利用预算,不仅要考虑公共采购,而且要考虑有效利用构成公共采购系统的基础设施。因此,本文强调了电子采购流程的重要性。负责土耳其共和国公开招标的公共采购局(PPA)和国家采购和供应办公室(SPSO)是隶属于财政部的两个基金会。然而,在公共采购中,这两个机构都有自己的制度、自己的业务流程和法律义务。然而,拥有两种不同的制度是一种特权吗?为了找到这个问题的答案,将基于互操作的公共电子采购(PeP)系统和当前的PeP系统与土耳其共和国的成本分析研究进行比较。
{"title":"Cost Anaylsis of Interoperable Based E-Procurement System in the Republic of Turkey","authors":"M. Imamoglu, M. Rehan","doi":"10.1145/2832987.2832999","DOIUrl":"https://doi.org/10.1145/2832987.2832999","url":null,"abstract":"Approximately 15% of the government's Gross Domestic Products (GDP) is spent on public procurement [1]. Therefore, accountability and transparency in public procurement is very important. For the regulation of public expenditures and effective use of the budget, not only public procurements but also efficient use of infrastructure that make up the system for public procurements should be considered. As a result, the importance of the electronic procurement processes is emphasized in this thesis. Public Procurement Authority (PPA) and the State Procurement and Supply Office (SPSO) responsible for public tenders in the Republic of Turkey are two foundations affiliated to the Ministry of Finance. However, in public procurement, both institutions have their own system, own business processes and legal obligations. Yet is it a privilege to have two different systems? To find the answer to this question, interoperable based Public electronic Procurement (PeP) system and current PeP system are compared with the cost analysis study for the Republic of Turkey.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134125754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLBS-3: A Three-Tier Load Balancer for ensuring Fault-Tolerance of Software running in Open-Source Cloud CLBS-3:一种三层负载均衡器,用于保证开源云环境下软件的容错
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833068
M. Shamsuddoha, Md. Shariful Alam, Syed Ali Asif, Shadi A. Aljawarneh, K. Sakib, A. Imran
High availability and low service expenditure has enabled cloud computing to become popular to be used in providing large number of software services. However, supporting a large collection of software together with data storage present new threats to the cloud in terms load imbalance and service failures. This paper proposes CLBS-3, a threetier Load balancing Schema (LBS) for the cloud preserving low communication overhead and fault tolerance. Next, it provides a mechanism to recover from a failed condition and excessive load within short time and low network traffic. Performance analysis reveal desirable service delivery speed of 11.40 to 84.43 seconds. Also the less time taken to recover from a failure ensures that the service is consistent and reliable. The experimentation of the proposed framework on cloud platform with web enabled software services yield desirable performance.
高可用性和低服务支出使得云计算变得流行,用于提供大量软件服务。然而,支持大量的软件集合和数据存储给云带来了负载不平衡和服务故障方面的新威胁。本文提出了一种基于云的三层负载均衡模式CLBS-3,以保持低通信开销和容错性。其次,它提供了一种机制,可以在短时间和低网络流量中从故障状态和过度负载中恢复。性能分析显示,理想的服务交付速度为11.40至84.43秒。此外,从故障中恢复所需的时间更少,确保了服务的一致性和可靠性。本文提出的框架在支持web软件服务的云平台上进行了实验,获得了理想的性能。
{"title":"CLBS-3: A Three-Tier Load Balancer for ensuring Fault-Tolerance of Software running in Open-Source Cloud","authors":"M. Shamsuddoha, Md. Shariful Alam, Syed Ali Asif, Shadi A. Aljawarneh, K. Sakib, A. Imran","doi":"10.1145/2832987.2833068","DOIUrl":"https://doi.org/10.1145/2832987.2833068","url":null,"abstract":"High availability and low service expenditure has enabled cloud computing to become popular to be used in providing large number of software services. However, supporting a large collection of software together with data storage present new threats to the cloud in terms load imbalance and service failures. This paper proposes CLBS-3, a threetier Load balancing Schema (LBS) for the cloud preserving low communication overhead and fault tolerance. Next, it provides a mechanism to recover from a failed condition and excessive load within short time and low network traffic. Performance analysis reveal desirable service delivery speed of 11.40 to 84.43 seconds. Also the less time taken to recover from a failure ensures that the service is consistent and reliable. The experimentation of the proposed framework on cloud platform with web enabled software services yield desirable performance.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134346583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Effect of the Addition of Biopolymers in Micellar Systems 生物聚合物加入胶束体系的影响
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2832991
Safia Djedri, D. Le Cerf, A. Boucherit, R. Issaadi
The importance of the formulation of emulsions in the various industries is steadily increasing, while it affected only the area of cosmetics. It is now in the pharmaceutical, petroleum, paint and others. Surfactants and polymers are the two most important additives in the formulation of emulsions (water in oil or oil in water). Their interactions modify significantly the surface properties and rheology of these systems. The control of these properties has become a major sauced of researcher laboratories Our study is related to the petroleum field, where we intend to develop stable emulsions (microemulsion) with interfacial tensions as low as possible with appropriate rheological properties. We have been able to prepare microemulsions with interfacial tensions of the order of 10−4 mN /m but the viscosities were comparable to that of water [1]. To improve the rheological properties, we undertook to study the influence of the addition of the biopolymer in these microemulsions in order to achieve viscosities in the range of 200 mPa in a way to conserve the values of interfacial tension. In this work, we present the results obtained with the following biopolymers hydroxyethyl cellulose and hydroxyethyl hydrophobic modified, discussing particularly the mode of introduction of these biopolymers.
乳剂配方在各个行业中的重要性正在稳步提高,而它只影响化妆品领域。它现在应用于制药、石油、油漆等领域。表面活性剂和聚合物是乳液(油中水或油中水)配方中最重要的两种添加剂。它们的相互作用显著地改变了这些体系的表面性质和流变性。这些特性的控制已经成为实验室研究人员的主要课题。我们的研究与油田有关,我们打算开发稳定的乳液(微乳液),其界面张力尽可能低,具有适当的流变性能。我们已经能够制备界面张力为10−4 mN /m量级的微乳液,但粘度与水相当[1]。为了改善流变性能,我们开始研究在这些微乳液中加入生物聚合物的影响,以便在保持界面张力值的情况下实现200 mPa范围内的粘度。本文介绍了羟乙基纤维素和羟乙基疏水改性生物聚合物的研究结果,并讨论了这些生物聚合物的引入方式。
{"title":"Effect of the Addition of Biopolymers in Micellar Systems","authors":"Safia Djedri, D. Le Cerf, A. Boucherit, R. Issaadi","doi":"10.1145/2832987.2832991","DOIUrl":"https://doi.org/10.1145/2832987.2832991","url":null,"abstract":"The importance of the formulation of emulsions in the various industries is steadily increasing, while it affected only the area of cosmetics. It is now in the pharmaceutical, petroleum, paint and others. Surfactants and polymers are the two most important additives in the formulation of emulsions (water in oil or oil in water). Their interactions modify significantly the surface properties and rheology of these systems. The control of these properties has become a major sauced of researcher laboratories Our study is related to the petroleum field, where we intend to develop stable emulsions (microemulsion) with interfacial tensions as low as possible with appropriate rheological properties. We have been able to prepare microemulsions with interfacial tensions of the order of 10−4 mN /m but the viscosities were comparable to that of water [1]. To improve the rheological properties, we undertook to study the influence of the addition of the biopolymer in these microemulsions in order to achieve viscosities in the range of 200 mPa in a way to conserve the values of interfacial tension. In this work, we present the results obtained with the following biopolymers hydroxyethyl cellulose and hydroxyethyl hydrophobic modified, discussing particularly the mode of introduction of these biopolymers.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133543892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Experimental Study on Detecting Semantic Defects in Object-Oriented Programs using Software Reading Techniques 基于软件读取技术的面向对象程序语义缺陷检测实验研究
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833025
A. O. Mohammed, Ziad A. Abdelnabi, Abdelsalam M. Maatuk, Abdalmunam Abdalla
Software defects are categorized into two main types: Syntax and Semantic defects. Syntax defects are easily to capture using compliers (or interpreters) that programming languages have. However, compliers are incapable to detect semantic defects, and this makes programmers re-read the source code a number of times to figure out where the defects locations are. Semantic defects are unable to be detected by compilers, as they are logical errors, and need the code file to be inspected carefully to catch them. This paper presents an approach to help programmers in discovering semantic defects in object oriented programming. As software code reading techniques play the most important role in capturing semantic defects, we have conducted a number of controlled experiments using three reading techniques, in order to test their efficiency and effectiveness.
软件缺陷主要分为两类:语法缺陷和语义缺陷。使用编程语言的编译器(或解释器)很容易捕获语法缺陷。然而,编译器无法检测语义缺陷,这使得程序员多次重新阅读源代码以找出缺陷所在的位置。编译器无法检测到语义缺陷,因为它们是逻辑错误,需要仔细检查代码文件才能捕获它们。本文提出了一种帮助程序员发现面向对象编程中的语义缺陷的方法。由于软件代码阅读技术在捕获语义缺陷方面发挥着最重要的作用,我们使用三种阅读技术进行了大量的对照实验,以测试它们的效率和有效性。
{"title":"An Experimental Study on Detecting Semantic Defects in Object-Oriented Programs using Software Reading Techniques","authors":"A. O. Mohammed, Ziad A. Abdelnabi, Abdelsalam M. Maatuk, Abdalmunam Abdalla","doi":"10.1145/2832987.2833025","DOIUrl":"https://doi.org/10.1145/2832987.2833025","url":null,"abstract":"Software defects are categorized into two main types: Syntax and Semantic defects. Syntax defects are easily to capture using compliers (or interpreters) that programming languages have. However, compliers are incapable to detect semantic defects, and this makes programmers re-read the source code a number of times to figure out where the defects locations are. Semantic defects are unable to be detected by compilers, as they are logical errors, and need the code file to be inspected carefully to catch them. This paper presents an approach to help programmers in discovering semantic defects in object oriented programming. As software code reading techniques play the most important role in capturing semantic defects, we have conducted a number of controlled experiments using three reading techniques, in order to test their efficiency and effectiveness.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116281757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Proceedings of the The International Conference on Engineering & MIS 2015
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1