Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377268
Nur Fasihah Abdul Kadir, Shukor Abd Razak, Hassan Chizari
Identifying fragmented and deleted files from scattered digital storage become crucial needs in computer forensic. Storage media experience regular space fragmentation which gives direct consequence to the files system series. This paper specifies a case where the jpeg files are heavily fragmented with absent file header which contains maximum information for the stored data can be easily retrieved. The problem is formulated using statistical byte frequency analysis for identifying the group of jpeg file fragments. Several related works have addressed the issue of classifying variety types of file format with high occurrence of being fragmented such as avi, doc, wav file and etc. These files have been tagged as among the larger file format. We provide techniques for identifying the pattern of file fragments distribution and describe roles of selected clustering attributes. Finally, we provide experimental results presenting that the jpeg fragments distribution can be retrieved with quite small gap differences between the groups.
{"title":"Identification of fragmented JPEG files in the absence of file systems","authors":"Nur Fasihah Abdul Kadir, Shukor Abd Razak, Hassan Chizari","doi":"10.1109/ICOS.2015.7377268","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377268","url":null,"abstract":"Identifying fragmented and deleted files from scattered digital storage become crucial needs in computer forensic. Storage media experience regular space fragmentation which gives direct consequence to the files system series. This paper specifies a case where the jpeg files are heavily fragmented with absent file header which contains maximum information for the stored data can be easily retrieved. The problem is formulated using statistical byte frequency analysis for identifying the group of jpeg file fragments. Several related works have addressed the issue of classifying variety types of file format with high occurrence of being fragmented such as avi, doc, wav file and etc. These files have been tagged as among the larger file format. We provide techniques for identifying the pattern of file fragments distribution and describe roles of selected clustering attributes. Finally, we provide experimental results presenting that the jpeg fragments distribution can be retrieved with quite small gap differences between the groups.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128431787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377269
Diaa M. Uliyan, H. Jalab, A. W. A. Abdul Wahab
Region duplication has become common in image forgery owing to the availability of advanced editing software and fully equipped digital cameras. Most existing block-based copy-move detection techniques struggle to detect such tampering under postprocessing operations, such as scaling and JPEG compression. This study proposes a copy-move image forgery detection algorithm using Hessian features and a center-symmetric local binary pattern (CSLBP). The proposed method consists of four steps: (1) detecting the object based on normalized cut segmentation, (2) localizing the local interest points of each object based on the Hessian method, (3) extracting CSLBP features, and (4) detecting duplicated regions in image forgeries. Experiment results show that the method is robust to postprocessed copy-move forgery under scaling, and JPEG compression.
{"title":"Copy move image forgery detection using Hessian and center symmetric local binary pattern","authors":"Diaa M. Uliyan, H. Jalab, A. W. A. Abdul Wahab","doi":"10.1109/ICOS.2015.7377269","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377269","url":null,"abstract":"Region duplication has become common in image forgery owing to the availability of advanced editing software and fully equipped digital cameras. Most existing block-based copy-move detection techniques struggle to detect such tampering under postprocessing operations, such as scaling and JPEG compression. This study proposes a copy-move image forgery detection algorithm using Hessian features and a center-symmetric local binary pattern (CSLBP). The proposed method consists of four steps: (1) detecting the object based on normalized cut segmentation, (2) localizing the local interest points of each object based on the Hessian method, (3) extracting CSLBP features, and (4) detecting duplicated regions in image forgeries. Experiment results show that the method is robust to postprocessed copy-move forgery under scaling, and JPEG compression.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116413033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377288
P. Teh, Paul Rayson, Irina Pak, S. Piao
We hypothesise that it is possible to determine a fine-grained set of sentiment values over and above the simple three-way positive/neutral/negative or binary Like/Dislike distinctions by examining textual formatting features. We show that this is possible for online comments about ten different categories of products. In the context of online shopping and reviews, one of the ways to analyse consumers' feedback is by analysing comments. The rating of the “like” button on a product or a comment is not sufficient to understand the level of expression. The expression of opinion is not only identified by the meaning of the words used in the comments, nor by simply counting the number of “thumbs up”, but it also includes the usage of capital letters, the use of repeated words, and the usage of emoticons. In this paper, we investigate whether it is possible to expand up to seven levels of sentiment by extracting such features. Five hundred questionnaires were collected and analysed to verify the level of “like” and “dislike” value. Our results show significant values on each of the hypotheses. For consumers, reading reviews helps them make better purchase decisions but we show there is also value to be gained in a finer-grained sentiment analysis for future commercial website platforms.
{"title":"Exploring fine-grained sentiment values in online product reviews","authors":"P. Teh, Paul Rayson, Irina Pak, S. Piao","doi":"10.1109/ICOS.2015.7377288","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377288","url":null,"abstract":"We hypothesise that it is possible to determine a fine-grained set of sentiment values over and above the simple three-way positive/neutral/negative or binary Like/Dislike distinctions by examining textual formatting features. We show that this is possible for online comments about ten different categories of products. In the context of online shopping and reviews, one of the ways to analyse consumers' feedback is by analysing comments. The rating of the “like” button on a product or a comment is not sufficient to understand the level of expression. The expression of opinion is not only identified by the meaning of the words used in the comments, nor by simply counting the number of “thumbs up”, but it also includes the usage of capital letters, the use of repeated words, and the usage of emoticons. In this paper, we investigate whether it is possible to expand up to seven levels of sentiment by extracting such features. Five hundred questionnaires were collected and analysed to verify the level of “like” and “dislike” value. Our results show significant values on each of the hypotheses. For consumers, reading reviews helps them make better purchase decisions but we show there is also value to be gained in a finer-grained sentiment analysis for future commercial website platforms.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115561952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377280
M. Zainudin, M. N. Sulaiman, N. Mustapha, Thinagaran Perumal
In recent years, people nowadays easily to contact each other by using smartphone. Most of the smartphone now embedded with inertial sensors such accelerometer, gyroscope, magnetic sensors, GPS and vision sensors. Furthermore, various researchers now dealing with this kind of sensors to recognize human activities incorporate with machine learning algorithm not only in the field of medical diagnosis, forecasting, security and for better live being as well. Activity recognition using various smartphone sensors can be considered as a one of the crucial tasks that needs to be studied. In this paper, we proposed various combination classifiers models consists of J48, Multi-layer Perceptron and Logistic Regression to capture the smoothest activity with higher frequency of the result using vote algorithmn. The aim of this study is to evaluate the performance of recognition the six activities using ensemble approach. Publicly accelerometer dataset obtained from Wireless Sensor Data Mining (WISDM) lab has been used in this study. The result of classification was validated using 10-fold cross validation algorithm in order to make sure all the experiments perform well.
{"title":"Activity recognition based on accelerometer sensor using combinational classifiers","authors":"M. Zainudin, M. N. Sulaiman, N. Mustapha, Thinagaran Perumal","doi":"10.1109/ICOS.2015.7377280","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377280","url":null,"abstract":"In recent years, people nowadays easily to contact each other by using smartphone. Most of the smartphone now embedded with inertial sensors such accelerometer, gyroscope, magnetic sensors, GPS and vision sensors. Furthermore, various researchers now dealing with this kind of sensors to recognize human activities incorporate with machine learning algorithm not only in the field of medical diagnosis, forecasting, security and for better live being as well. Activity recognition using various smartphone sensors can be considered as a one of the crucial tasks that needs to be studied. In this paper, we proposed various combination classifiers models consists of J48, Multi-layer Perceptron and Logistic Regression to capture the smoothest activity with higher frequency of the result using vote algorithmn. The aim of this study is to evaluate the performance of recognition the six activities using ensemble approach. Publicly accelerometer dataset obtained from Wireless Sensor Data Mining (WISDM) lab has been used in this study. The result of classification was validated using 10-fold cross validation algorithm in order to make sure all the experiments perform well.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131873440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377279
Eu Jin Wong, K. Yap, Jason Alexander, Abhijit Karnik
As more and more retailers offer their products for sale online, their web-based content is becoming increasingly visual and complex for visually impaired persons to access, navigate, and interpret when using current accessibility technologies such as screen reader, voice browser and Braille display. This hindered their independence to go online to shop. In this paper, a study on whether visually impaired people can shop online independently is presented. An online store prototype which has shopping features such as shopping cart, product catalogue, online forms and payment system was developed for this purpose. The shopping features were designed to enrich the web-based data with haptic and audio properties. This paper examined and reported results on a website design which could enable the visually impaired to navigate, access, interpret and haptically interact with the web content; and on a product catalogue system which could enable the visually impaired to shop without assistance. Some of our qualitative analysis suggests that a consistent three-section webpage design with static content along with the aid of directional cues and audio information are feasible to design online shopping website for visually impaired. Also, for effective haptic evaluation of online products, the complete model and different parts of the model should be rendered separately in order to provide the user with a better perception about the product.
{"title":"HABOS: Towards a platform of haptic-audio based online shopping for the visually impaired","authors":"Eu Jin Wong, K. Yap, Jason Alexander, Abhijit Karnik","doi":"10.1109/ICOS.2015.7377279","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377279","url":null,"abstract":"As more and more retailers offer their products for sale online, their web-based content is becoming increasingly visual and complex for visually impaired persons to access, navigate, and interpret when using current accessibility technologies such as screen reader, voice browser and Braille display. This hindered their independence to go online to shop. In this paper, a study on whether visually impaired people can shop online independently is presented. An online store prototype which has shopping features such as shopping cart, product catalogue, online forms and payment system was developed for this purpose. The shopping features were designed to enrich the web-based data with haptic and audio properties. This paper examined and reported results on a website design which could enable the visually impaired to navigate, access, interpret and haptically interact with the web content; and on a product catalogue system which could enable the visually impaired to shop without assistance. Some of our qualitative analysis suggests that a consistent three-section webpage design with static content along with the aid of directional cues and audio information are feasible to design online shopping website for visually impaired. Also, for effective haptic evaluation of online products, the complete model and different parts of the model should be rendered separately in order to provide the user with a better perception about the product.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377289
T. Dirgahayu, Novi Setiani, F. Wijayanto
Location-based services (LBS) provide users with customized information or functionality by considering users' current geographical locations. In this paper, we present an LBS architecture for facilitating information provisioning from multiple providers based on users' locations. The architecture includes a central component called service router whose main task is to forward information requests from the users' mobile applications to target information providers. The architecture assumes that information is stored in content management systems (CMSs). The architecture requires that the CMSs provide the same service interface as one in the service router. This interface is to allow programmable access to the information. This architecture offers three main benefits: (i) natural fit to real-world situation, in which an area is administered by an authority, (ii) consistent presentation by allowing the mobile applications to restructure and reformat information from the providers, and (iii) scalability by delegating the routing tasks to a composition of service routers in a hierarchical architecture.
{"title":"An architecture for location-based service with multiple information providers","authors":"T. Dirgahayu, Novi Setiani, F. Wijayanto","doi":"10.1109/ICOS.2015.7377289","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377289","url":null,"abstract":"Location-based services (LBS) provide users with customized information or functionality by considering users' current geographical locations. In this paper, we present an LBS architecture for facilitating information provisioning from multiple providers based on users' locations. The architecture includes a central component called service router whose main task is to forward information requests from the users' mobile applications to target information providers. The architecture assumes that information is stored in content management systems (CMSs). The architecture requires that the CMSs provide the same service interface as one in the service router. This interface is to allow programmable access to the information. This architecture offers three main benefits: (i) natural fit to real-world situation, in which an area is administered by an authority, (ii) consistent presentation by allowing the mobile applications to restructure and reformat information from the providers, and (iii) scalability by delegating the routing tasks to a composition of service routers in a hierarchical architecture.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121369245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377271
Siti Hazyanti Mohd Hashim, Norizan Mat Diah
Developing games is such a tedious task for Non-Programming background. They need assistance from a game engine to provide them with some elements so that they can easily develop the games despite not having any programming background. Currently game engine are full of programming and coding. So, although to help Non-programming background develop their game, the elements of game engine are improvise. The methodology involved are conducting preliminary research, identifying game engine elements, identifying research model, and obtaining research findings. This research will focus on game engine elements that help Non-programming background in developing games. The outcome will formulate a framework of game engine elements for Non-programming background.
{"title":"Game engine framework for Non-Programming background","authors":"Siti Hazyanti Mohd Hashim, Norizan Mat Diah","doi":"10.1109/ICOS.2015.7377271","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377271","url":null,"abstract":"Developing games is such a tedious task for Non-Programming background. They need assistance from a game engine to provide them with some elements so that they can easily develop the games despite not having any programming background. Currently game engine are full of programming and coding. So, although to help Non-programming background develop their game, the elements of game engine are improvise. The methodology involved are conducting preliminary research, identifying game engine elements, identifying research model, and obtaining research findings. This research will focus on game engine elements that help Non-programming background in developing games. The outcome will formulate a framework of game engine elements for Non-programming background.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"308 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114103828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377276
Ahasanul Haque, A. W. Reza, Narendra Kumar, H. Ramiah
Recent years has observed a remarkable progress in the field of energy harvesting via nano antenna which is nowday's most challenging aspects to reduce the excessive use of fossil fuel. This paper presents a circular edged bow-tie shaped nano antenna used for solar energy harvesting. The performance of the designed nano antenna has been investigated without slot, and also with single and double slots. An optimum performance comparison of the designed nano-antenna with different slot structure is studied via FDTD (Finite difference time domain) method to generate electricity from the radiated maximum solar and earth energy. The results demonstrate that the bow-tie nano antenna having double slot in the circular edge provides better electric field than nano-antenna with single slot or without slot. Moreover, highly localized electric fields are found in the gap between bow-tie tips through the characterization of surface Plasmon resonance. Compared to the other structures, the double slotted circular edged bow-tie nano antenna provides broader antenna bandwidth. The electric field of the bow-tie antenna can also be improved with the array coupling of more bow-tie elements.
{"title":"Slotting effect in designing circular edge bow-tie nano antenna for energy harvesting","authors":"Ahasanul Haque, A. W. Reza, Narendra Kumar, H. Ramiah","doi":"10.1109/ICOS.2015.7377276","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377276","url":null,"abstract":"Recent years has observed a remarkable progress in the field of energy harvesting via nano antenna which is nowday's most challenging aspects to reduce the excessive use of fossil fuel. This paper presents a circular edged bow-tie shaped nano antenna used for solar energy harvesting. The performance of the designed nano antenna has been investigated without slot, and also with single and double slots. An optimum performance comparison of the designed nano-antenna with different slot structure is studied via FDTD (Finite difference time domain) method to generate electricity from the radiated maximum solar and earth energy. The results demonstrate that the bow-tie nano antenna having double slot in the circular edge provides better electric field than nano-antenna with single slot or without slot. Moreover, highly localized electric fields are found in the gap between bow-tie tips through the characterization of surface Plasmon resonance. Compared to the other structures, the double slotted circular edged bow-tie nano antenna provides broader antenna bandwidth. The electric field of the bow-tie antenna can also be improved with the array coupling of more bow-tie elements.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130566444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377286
Nurazzah Abd Rahman, Zainab Binti Abu Bakar, Nurul Syeilla Syazhween Zulkefli
Finding useful and relevant information is a very challenging task to the user. The retrieval system usually responded with a long listed documents which are not necessarily relevant to the user's need. Document clustering is a special technique that can sort out the documents effectively so that documents in the same cluster are similar to each other and documents in different cluster are dissimilar to each other. This paper focuses on document clustering for Malay test collection. It consists of 2028 Malay translated Hadith documents from book Sahih Bukhari. This paper presents the results using Complete Linkage Clustering algorithm with Cosine Coefficient on Malay translated Hadith documents. The evaluation of the experiments uses Recall (R), Precision (P) and Effectiveness (E) measure. The experiments is conducted on 100 clusters, 50 clusters and 20 clusters. It shows that the smaller the size of clusters, Recall (R) will increase, but Precision (P) will decrease. Results for Effectiveness (E) measure compared to the non-clustered documents show that applying clustering algorithm will improved the effectiveness of searching process. For this experiment 20 clusters is rather effective compared to the others.
{"title":"Malay document clustering using complete linkage clustering technique with Cosine Coefficient","authors":"Nurazzah Abd Rahman, Zainab Binti Abu Bakar, Nurul Syeilla Syazhween Zulkefli","doi":"10.1109/ICOS.2015.7377286","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377286","url":null,"abstract":"Finding useful and relevant information is a very challenging task to the user. The retrieval system usually responded with a long listed documents which are not necessarily relevant to the user's need. Document clustering is a special technique that can sort out the documents effectively so that documents in the same cluster are similar to each other and documents in different cluster are dissimilar to each other. This paper focuses on document clustering for Malay test collection. It consists of 2028 Malay translated Hadith documents from book Sahih Bukhari. This paper presents the results using Complete Linkage Clustering algorithm with Cosine Coefficient on Malay translated Hadith documents. The evaluation of the experiments uses Recall (R), Precision (P) and Effectiveness (E) measure. The experiments is conducted on 100 clusters, 50 clusters and 20 clusters. It shows that the smaller the size of clusters, Recall (R) will increase, but Precision (P) will decrease. Results for Effectiveness (E) measure compared to the non-clustered documents show that applying clustering algorithm will improved the effectiveness of searching process. For this experiment 20 clusters is rather effective compared to the others.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122318247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.1109/ICOS.2015.7377273
S. Abdullah, M. F. M. Nadzri, Z. H. C. Soh, K. Z. Zamli
Increasing cost and complexity of maintaining physical computers have caused large organization to consider alternative solution such as implementing Virtual Desktop Infrastructure (VDI) in their enterprise network. However, before deploying VDI solution in a large scale, it is essential to evaluate the sufficiency of the solution first. As a result, User Workload Simulator was developed. The simulator was used to evaluate two VDI solutions that are named VDI A and VDI B. The objective of the evaluation is to compare which solution can be a better VDI server host. From the result, VDI A is sufficiently better than VDI B for VM density per host. But in terms of network bandwidth utilization and Input/Output Operations Per Second (IOPS) consumption per host, VDI B is sufficiently better as it utilized less network bandwidth and consumed less IOPS on most of the user profiles evaluated.
{"title":"Evaluation of Virtual Desktop Infrastructure host using User Workload Simulator","authors":"S. Abdullah, M. F. M. Nadzri, Z. H. C. Soh, K. Z. Zamli","doi":"10.1109/ICOS.2015.7377273","DOIUrl":"https://doi.org/10.1109/ICOS.2015.7377273","url":null,"abstract":"Increasing cost and complexity of maintaining physical computers have caused large organization to consider alternative solution such as implementing Virtual Desktop Infrastructure (VDI) in their enterprise network. However, before deploying VDI solution in a large scale, it is essential to evaluate the sufficiency of the solution first. As a result, User Workload Simulator was developed. The simulator was used to evaluate two VDI solutions that are named VDI A and VDI B. The objective of the evaluation is to compare which solution can be a better VDI server host. From the result, VDI A is sufficiently better than VDI B for VM density per host. But in terms of network bandwidth utilization and Input/Output Operations Per Second (IOPS) consumption per host, VDI B is sufficiently better as it utilized less network bandwidth and consumed less IOPS on most of the user profiles evaluated.","PeriodicalId":422736,"journal":{"name":"2015 IEEE Conference on Open Systems (ICOS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129316998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}