首页 > 最新文献

2014 IEEE Computers, Communications and IT Applications Conference最新文献

英文 中文
A video sensing oriented speed adjustable fast multimedia encryption scheme and embedded system 一种面向视频传感的高速可调多媒体加密方案及嵌入式系统
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017202
Chen Xiao, Wendong Wang, Nan Yang, Lifeng Wang
In embedded video sensing system, real-time video data is high-volume. Meanwhile, the computation and energy resources are very limited, which restricts the usage of complex encryption process on video data. Therefore the confidentiality of video data under limited resources needs to be addressed. Firstly, dissymmetry with its trend between data volume and limited resources has been studied, while a strategy of resources optimization is given. Secondly, an all-purpose speed adjustable fast encryption scheme with its improved version is proposed. Thirdly, a DSP and ARM based embedded secure video sensing system is designed, and the fast encryption scheme and the improved version have been implemented in secure video data storage and transmission of system respectively. Experimental analyses show that the encryption schemes can meet the system's real-time requirements under the tight resource constraints.
在嵌入式视频传感系统中,实时视频数据量很大。同时,由于计算量和能量有限,限制了复杂加密过程在视频数据上的应用。因此,在资源有限的情况下,视频数据的保密性问题需要得到解决。首先,研究了数据量与有限资源之间的不对称性及其变化趋势,并给出了资源优化策略。其次,提出了一种通用的速度可调快速加密方案及其改进版本。第三,设计了基于DSP和ARM的嵌入式安全视频传感系统,并分别在系统的安全视频数据存储和传输中实现了快速加密方案和改进版本。实验分析表明,在较紧的资源约束下,该加密方案能够满足系统的实时性要求。
{"title":"A video sensing oriented speed adjustable fast multimedia encryption scheme and embedded system","authors":"Chen Xiao, Wendong Wang, Nan Yang, Lifeng Wang","doi":"10.1109/ComComAp.2014.7017202","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017202","url":null,"abstract":"In embedded video sensing system, real-time video data is high-volume. Meanwhile, the computation and energy resources are very limited, which restricts the usage of complex encryption process on video data. Therefore the confidentiality of video data under limited resources needs to be addressed. Firstly, dissymmetry with its trend between data volume and limited resources has been studied, while a strategy of resources optimization is given. Secondly, an all-purpose speed adjustable fast encryption scheme with its improved version is proposed. Thirdly, a DSP and ARM based embedded secure video sensing system is designed, and the fast encryption scheme and the improved version have been implemented in secure video data storage and transmission of system respectively. Experimental analyses show that the encryption schemes can meet the system's real-time requirements under the tight resource constraints.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116770813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cross-layer optimization schemes based on HARQ for Device-to-Device communication 基于HARQ的设备间通信跨层优化方案
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017173
M. Miao, J. Sun, S. Shao
The introduction of device-to-device(D2D) technology into LTE system could bring such mutual interferences between cellular users and D2D users that the instantaneous channel quality become worse in D2D communication. In this paper, with the purpose to make up for the link loss that caused by serious interferences and to optimize the performance of Device-to-Device communication, we consider a cross-layer framework which combines hybrid automatic repeat request(HARQ) protocol at the data link layer with the adaptive modulation and coding(AMC) technique at physical layer under the prescribed packet rate and average delay. At the same time, we compare the three types HARQ schemes in terms of throughput. Numerical simulation results illustrate that the application of type III HARQ could achieve the highest throughput and the performance of overall system is better than conventional scheme.
在LTE系统中引入设备对设备(device-to-device, D2D)技术,会带来蜂窝用户与D2D用户之间的相互干扰,导致D2D通信中瞬时信道质量变差。为了弥补严重干扰造成的链路丢失和优化设备间通信性能,在规定的分组速率和平均时延下,考虑了一种数据链路层混合自动重复请求(HARQ)协议和物理层自适应调制编码(AMC)技术相结合的跨层框架。同时,我们比较了三种类型的HARQ方案在吞吐量方面的差异。数值仿真结果表明,III型HARQ的应用可以获得最高的吞吐量,系统整体性能优于常规方案。
{"title":"Cross-layer optimization schemes based on HARQ for Device-to-Device communication","authors":"M. Miao, J. Sun, S. Shao","doi":"10.1109/ComComAp.2014.7017173","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017173","url":null,"abstract":"The introduction of device-to-device(D2D) technology into LTE system could bring such mutual interferences between cellular users and D2D users that the instantaneous channel quality become worse in D2D communication. In this paper, with the purpose to make up for the link loss that caused by serious interferences and to optimize the performance of Device-to-Device communication, we consider a cross-layer framework which combines hybrid automatic repeat request(HARQ) protocol at the data link layer with the adaptive modulation and coding(AMC) technique at physical layer under the prescribed packet rate and average delay. At the same time, we compare the three types HARQ schemes in terms of throughput. Numerical simulation results illustrate that the application of type III HARQ could achieve the highest throughput and the performance of overall system is better than conventional scheme.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129416302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Rake receiver for the multi-path DS-UWB system 多径DS-UWB系统Rake接收机的设计
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017174
Pingyan Shi, Zhenguo Shi, Xiaofeng Tao, Jianchao Ji, Xiaohui Liu
This paper studies the Rake receiver for the direct sequence ultra-wideband (DS-UWB) system. SRake receiver and PRake receiver are employed to receive the UWB signal in the indoor dense multi-path UWB channel (IEEE P802.15.TG3a). In order to study how to improve the performance of receivers, different order of Gaussian pulses are discussed firstly. And then, the ML estimation algorithm is used to get the channel timing delay and the weighted value of the Rake receiver. The effect of the performance influenced by different assisted-pilot numbers is discussed with different SNR. Finally, the influence of different branch numbers of the SRake receiver and PRake receiver are given. The simulation results show that the fifth order Gaussian pulse could achieve better performance for the SRake considering the limits of FCC, while the waveforms will not affect the performance greatly for the PRAke receiver. Furthermore, more numbers of assisted-pilot and branches of receiver will improve the system performance. All of these results provide a basis for Rake receiver design of DS-UWB system.
本文研究了直接序列超宽带(DS-UWB)系统中的Rake接收机。采用SRake接收机和PRake接收机在室内密集多径UWB信道(IEEE P802.15.TG3a)中接收UWB信号。为了研究如何提高接收机的性能,首先讨论了不同阶次的高斯脉冲。然后,利用ML估计算法得到Rake接收机的信道时延和加权值。在不同信噪比下,讨论了不同辅助导频数对系统性能的影响。最后给出了接收端和接收端不同支路数的影响。仿真结果表明,考虑到FCC的限制,五阶高斯脉冲可以获得更好的性能,而波形对PRAke接收机的性能影响不大。此外,增加辅助导频和接收分支的数量将提高系统的性能。这些结果为DS-UWB系统的Rake接收机设计提供了依据。
{"title":"Design of Rake receiver for the multi-path DS-UWB system","authors":"Pingyan Shi, Zhenguo Shi, Xiaofeng Tao, Jianchao Ji, Xiaohui Liu","doi":"10.1109/ComComAp.2014.7017174","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017174","url":null,"abstract":"This paper studies the Rake receiver for the direct sequence ultra-wideband (DS-UWB) system. SRake receiver and PRake receiver are employed to receive the UWB signal in the indoor dense multi-path UWB channel (IEEE P802.15.TG3a). In order to study how to improve the performance of receivers, different order of Gaussian pulses are discussed firstly. And then, the ML estimation algorithm is used to get the channel timing delay and the weighted value of the Rake receiver. The effect of the performance influenced by different assisted-pilot numbers is discussed with different SNR. Finally, the influence of different branch numbers of the SRake receiver and PRake receiver are given. The simulation results show that the fifth order Gaussian pulse could achieve better performance for the SRake considering the limits of FCC, while the waveforms will not affect the performance greatly for the PRAke receiver. Furthermore, more numbers of assisted-pilot and branches of receiver will improve the system performance. All of these results provide a basis for Rake receiver design of DS-UWB system.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125949728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A checkpointing and instant-on mechanism for a embedded system based on non-volatile memories 基于非易失性存储器的嵌入式系统的检查点和即时开启机制
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017191
Jianwen Sun, Xiang Long, Han Wan, Jingwei Yang
Checkpointing is the act of saving the state of a running program so that it may be recovered later, which is a general idea that enables various functionalities in computer systems, including fault tolerance, system recovery, and process migration. Checkpointing mechanisms in traditional systems normally save the state of process running on volatile memory to a checkpoint file stored on non-volatile disks. However, moving checkpoint data between decoupled memory and storage levels can be significantly inefficient. Emerging non-volatile memory technology with their large, fast and persistent properties has the potential to finalize this traditional decoupled memory/storage model. Implementing checkpointing mechanism in a system based on non-volatile memories can largely improve the performance of checkpointing. We have implemented an embedded platform based on magnetic random access memories and a checkpointing mechanism in this system. Our results show that checkpointing performance based on non-volatile memories can be order of magnitudes faster than traditional disk-based (or flash-based) approaches and that it is possible to conduct checkpointing operation in a shorter period. Restarting procedure in our platform can be done instantaneously, which shows possibilities of implementing instant-on.
检查点是一种保存正在运行的程序的状态以便日后恢复的行为,它是计算机系统中实现容错、系统恢复和进程迁移等各种功能的一般想法。传统系统中的检查点机制通常会将易失性内存上运行的进程状态保存到存储在非易失性磁盘上的检查点文件中。然而,在解耦内存和存储层之间移动检查点数据的效率会大大降低。新兴的非易失性内存技术具有容量大、速度快和持久性强的特点,有可能终结这种传统的解耦内存/存储模式。在基于非易失性存储器的系统中实施检查点机制,可以在很大程度上提高检查点的性能。我们实施了一个基于磁随机存取存储器的嵌入式平台,并在该系统中实施了检查点机制。我们的研究结果表明,与传统的基于磁盘(或闪存)的方法相比,基于非易失性存储器的检查点性能要快很多数量级,而且可以在更短的时间内进行检查点操作。在我们的平台上,重启程序可以瞬间完成,这显示了实现即时启动的可能性。
{"title":"A checkpointing and instant-on mechanism for a embedded system based on non-volatile memories","authors":"Jianwen Sun, Xiang Long, Han Wan, Jingwei Yang","doi":"10.1109/ComComAp.2014.7017191","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017191","url":null,"abstract":"Checkpointing is the act of saving the state of a running program so that it may be recovered later, which is a general idea that enables various functionalities in computer systems, including fault tolerance, system recovery, and process migration. Checkpointing mechanisms in traditional systems normally save the state of process running on volatile memory to a checkpoint file stored on non-volatile disks. However, moving checkpoint data between decoupled memory and storage levels can be significantly inefficient. Emerging non-volatile memory technology with their large, fast and persistent properties has the potential to finalize this traditional decoupled memory/storage model. Implementing checkpointing mechanism in a system based on non-volatile memories can largely improve the performance of checkpointing. We have implemented an embedded platform based on magnetic random access memories and a checkpointing mechanism in this system. Our results show that checkpointing performance based on non-volatile memories can be order of magnitudes faster than traditional disk-based (or flash-based) approaches and that it is possible to conduct checkpointing operation in a shorter period. Restarting procedure in our platform can be done instantaneously, which shows possibilities of implementing instant-on.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125761295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
3D simulation of primary thrombus formation based on Level Set Methods 基于水平集方法的原发性血栓形成三维模拟
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017208
Chaoqing Ma, O. Gwun, Seung-Han Jeong
The simulation of thrombosis is a popular research topic recently. Since Level Set Methods have well developed in fluid flow simulation, this paper presents a 3D simulation of primary thrombus formation based on Level Set Methods. A hybrid model including a macroscale model and a microscale model is built to simulate the flow, adhesion, and aggregation of platelets. The macroscale model is based on Navier-Stokes equations and the microscale model is described as external force and viscosity increase of platelets. By this simulation we observe the process of primary thrombus formation and analyze the effect of Reynolds Number (Re) to the formation rate. The results show that the formation rate increases with Re rise and this phenomenon becomes significant when Re is larger than the normal average Re of vessels which is a threshold value.
血栓形成的模拟是近年来研究的热点。由于水平集方法在流体流动模拟中得到了很好的发展,本文提出了一种基于水平集方法的原发性血栓形成的三维模拟。建立了一个包括宏观模型和微观模型的混合模型来模拟血小板的流动、粘附和聚集。宏观模型基于Navier-Stokes方程,微观模型描述为血小板的外力和粘度增加。通过模拟,我们观察了原发性血栓的形成过程,并分析了雷诺数(Re)对血栓形成速率的影响。结果表明:随着Re的升高,形成速率逐渐增大,当Re大于容器的正常平均Re时,这种现象变得明显,这是一个阈值。
{"title":"3D simulation of primary thrombus formation based on Level Set Methods","authors":"Chaoqing Ma, O. Gwun, Seung-Han Jeong","doi":"10.1109/ComComAp.2014.7017208","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017208","url":null,"abstract":"The simulation of thrombosis is a popular research topic recently. Since Level Set Methods have well developed in fluid flow simulation, this paper presents a 3D simulation of primary thrombus formation based on Level Set Methods. A hybrid model including a macroscale model and a microscale model is built to simulate the flow, adhesion, and aggregation of platelets. The macroscale model is based on Navier-Stokes equations and the microscale model is described as external force and viscosity increase of platelets. By this simulation we observe the process of primary thrombus formation and analyze the effect of Reynolds Number (Re) to the formation rate. The results show that the formation rate increases with Re rise and this phenomenon becomes significant when Re is larger than the normal average Re of vessels which is a threshold value.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128646275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web service sub-chain recommendation leveraging graph searching 利用图搜索的Web服务子链推荐
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017209
Zehui Cheng, Beibei Yao, Xiaolei Wang, Zhangbing Zhou
Nowadays an increasing number of Open Geospatial Consortium Web services (OWSs) is built and being available on the Web for the accessibility and processing of geospatial information. Typically, the specific requirement specified by a certain user can be satisfied by a chain of OWSs. In this setting, retrieving and recommending sub-chains of possible service invocations is critical. Leveraging the semantic similarity between the name and text description of parameters and operations, the degree that represents the invocation possibility between operations in OWSs is calculated. Thereafter, the service network model is constructed that captures the possible invocations between operations. Given a user's requirement represented in terms of the initial and ending operations, possible sub-chains of operations are retrieved, ranked and recommended. Based on which the user can select the most appropriate sub-chain with respect to her specific requirement.
如今,越来越多的开放地理空间联盟Web服务(Open Geospatial Consortium Web services, OWSs)被构建并在Web上可用,用于地理空间信息的访问和处理。通常,某个用户指定的特定需求可以通过OWSs链来满足。在此设置中,检索和推荐可能的服务调用的子链至关重要。利用参数和操作的名称和文本描述之间的语义相似性,计算OWSs中操作之间调用可能性的程度。然后,构建服务网络模型,以捕获操作之间可能的调用。给定以初始和结束操作表示的用户需求,检索、排序和推荐可能的操作子链。在此基础上,用户可以根据自己的具体需求选择最合适的子链。
{"title":"Web service sub-chain recommendation leveraging graph searching","authors":"Zehui Cheng, Beibei Yao, Xiaolei Wang, Zhangbing Zhou","doi":"10.1109/ComComAp.2014.7017209","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017209","url":null,"abstract":"Nowadays an increasing number of Open Geospatial Consortium Web services (OWSs) is built and being available on the Web for the accessibility and processing of geospatial information. Typically, the specific requirement specified by a certain user can be satisfied by a chain of OWSs. In this setting, retrieving and recommending sub-chains of possible service invocations is critical. Leveraging the semantic similarity between the name and text description of parameters and operations, the degree that represents the invocation possibility between operations in OWSs is calculated. Thereafter, the service network model is constructed that captures the possible invocations between operations. Given a user's requirement represented in terms of the initial and ending operations, possible sub-chains of operations are retrieved, ranked and recommended. Based on which the user can select the most appropriate sub-chain with respect to her specific requirement.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114272053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A secure remote user mutual authentication scheme using smart cards 一个使用智能卡的安全远程用户相互认证方案
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017176
Xiong Li, Junguo Liao, Jiao Zhang, J. Niu, S. Kumari
Recently, Yang et al. Proposed a remote user authentication scheme using smart card. Through careful cryptanalysis, we find that Yang et al.'s scheme is not repairable, and cannot achieve mutual authentication and session key agreement. To overcome these security flaws, we propose a new remote user authentication scheme with smart card. In the proposed scheme, the user can choose his/her password freely and renew the password anytime. At the same time, the proposed scheme provides more functions and security features, such as mutual authentication, session key agreement, perfect forward secrecy and so on.
最近,Yang等人。提出了一种基于智能卡的远程用户认证方案。通过仔细的密码分析,我们发现Yang等人的方案是不可修复的,无法实现相互认证和会话密钥协议。为了克服这些安全漏洞,我们提出了一种新的智能卡远程用户认证方案。在该方案中,用户可以自由选择自己的密码,并可以随时更新密码。同时,该方案提供了更多的功能和安全特性,如相互认证、会话密钥协议、完善的前向保密等。
{"title":"A secure remote user mutual authentication scheme using smart cards","authors":"Xiong Li, Junguo Liao, Jiao Zhang, J. Niu, S. Kumari","doi":"10.1109/ComComAp.2014.7017176","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017176","url":null,"abstract":"Recently, Yang et al. Proposed a remote user authentication scheme using smart card. Through careful cryptanalysis, we find that Yang et al.'s scheme is not repairable, and cannot achieve mutual authentication and session key agreement. To overcome these security flaws, we propose a new remote user authentication scheme with smart card. In the proposed scheme, the user can choose his/her password freely and renew the password anytime. At the same time, the proposed scheme provides more functions and security features, such as mutual authentication, session key agreement, perfect forward secrecy and so on.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Designing a self-adaptive and context-aware service composition system 设计一个自适应和上下文感知的服务组合系统
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017188
Boxue Wang, Xinhuai Tang
Web service compositions run in changing environment where different context events can arise to affect the execution of services. In order not to make service execution affected by context events, context-aware service composition becomes one of the major research trends. Service providers can develop context-aware services which can adapt their behaviors dynamically to execution contexts. However, it burdens service providers because they have to keep in mind different execution contexts where their services could be used. In this paper, we design and implement a self-adaptive and context-aware service composition system which can adapt to changing execution contexts and make adjustments according to context events and user-defined personalized policies. It frees service providers from context handling which in turn becomes a task of our system. We use OWL to model context ontologies and extend the OWL-S service model to support context information. Policy is a user-defined adjustment strategy to guide the dynamic adaptation. Service consumers can submit their requests and get context-aware services. Our system can composite services according to service consumers' requests, execute services, monitor execution contexts and adjust its action when contexts change.
Web服务组合在不断变化的环境中运行,在这种环境中可能会出现影响服务执行的不同上下文事件。为了使服务的执行不受上下文事件的影响,上下文感知的服务组合成为主要的研究趋势之一。服务提供者可以开发上下文感知的服务,这些服务可以动态地调整其行为以适应执行上下文。然而,这给服务提供者带来了负担,因为他们必须牢记可能使用其服务的不同执行上下文。本文设计并实现了一个自适应、上下文感知的服务组合系统,该系统能够适应不断变化的执行上下文,并根据上下文事件和用户自定义的个性化策略进行调整。它将服务提供者从上下文处理中解放出来,而上下文处理反过来又成为我们系统的任务。我们使用OWL对上下文本体进行建模,并扩展OWL- s服务模型以支持上下文信息。策略是用户自定义的调整策略,用于指导动态适应。服务消费者可以提交他们的请求并获得上下文感知的服务。我们的系统可以根据服务使用者的请求组合服务,执行服务,监视执行上下文,并在上下文更改时调整其操作。
{"title":"Designing a self-adaptive and context-aware service composition system","authors":"Boxue Wang, Xinhuai Tang","doi":"10.1109/ComComAp.2014.7017188","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017188","url":null,"abstract":"Web service compositions run in changing environment where different context events can arise to affect the execution of services. In order not to make service execution affected by context events, context-aware service composition becomes one of the major research trends. Service providers can develop context-aware services which can adapt their behaviors dynamically to execution contexts. However, it burdens service providers because they have to keep in mind different execution contexts where their services could be used. In this paper, we design and implement a self-adaptive and context-aware service composition system which can adapt to changing execution contexts and make adjustments according to context events and user-defined personalized policies. It frees service providers from context handling which in turn becomes a task of our system. We use OWL to model context ontologies and extend the OWL-S service model to support context information. Policy is a user-defined adjustment strategy to guide the dynamic adaptation. Service consumers can submit their requests and get context-aware services. Our system can composite services according to service consumers' requests, execute services, monitor execution contexts and adjust its action when contexts change.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124820257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An automated method of penetration testing 一种自动化的渗透测试方法
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017198
Xue Qiu, Shuguang Wang, Qiong Jia, Chunhe Xia, Qingxin Xia
An automated method of penetration testing was proposed, which is deigned to solve the problems such as high cost and low efficiency in the traditional penetration testing. This method consists of two parts: the automatic generating method of the penetration testing scheme and the automatic executing method of penetration testing scheme. We design and implement an original system which can execute penetration testing automatically, it was named AEPT (automatic executing penetration testing). The system integrates the necessary functions of penetration testing and can execute the penetration testing automatically. The experimental results showed that this method can overcome the problems exist in traditional penetration testing and can dramatically improve the efficiency and the accuracy of penetration testing, greatly reduce the cost of penetration testing.
针对传统渗透测试成本高、效率低的问题,提出了一种自动化的渗透测试方法。该方法包括两部分:渗透测试方案的自动生成方法和渗透测试方案的自动执行方法。我们设计并实现了一个可以自动执行渗透测试的系统,并将其命名为AEPT(自动执行渗透测试)。该系统集成了渗透测试的必要功能,能够自动执行渗透测试。实验结果表明,该方法克服了传统渗透测试中存在的问题,显著提高了渗透测试的效率和准确性,大大降低了渗透测试的成本。
{"title":"An automated method of penetration testing","authors":"Xue Qiu, Shuguang Wang, Qiong Jia, Chunhe Xia, Qingxin Xia","doi":"10.1109/ComComAp.2014.7017198","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017198","url":null,"abstract":"An automated method of penetration testing was proposed, which is deigned to solve the problems such as high cost and low efficiency in the traditional penetration testing. This method consists of two parts: the automatic generating method of the penetration testing scheme and the automatic executing method of penetration testing scheme. We design and implement an original system which can execute penetration testing automatically, it was named AEPT (automatic executing penetration testing). The system integrates the necessary functions of penetration testing and can execute the penetration testing automatically. The experimental results showed that this method can overcome the problems exist in traditional penetration testing and can dramatically improve the efficiency and the accuracy of penetration testing, greatly reduce the cost of penetration testing.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122992369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Scheduling jobs in computational grid using hybrid ACS and GA approach 基于混合ACS和GA方法的计算网格作业调度
Pub Date : 2014-10-01 DOI: 10.1109/ComComAp.2014.7017200
M. M. Alobaedy, K. Ku-Mahamud
Metaheuristics algorithms show very good performance in solving various job scheduling problems in computational grid systems. However, due to the complexity and heterogeneous nature of resources in grid computing, stand-alone algorithm is not capable to find a good quality solution in reasonable time. This study proposes a hybrid algorithm, specifically ant colony system and genetic algorithm to solve the job scheduling problem. The high level hybridization algorithm will keep the identity of each algorithm in performing the scheduling task. The study focuses on static grid computing environment and the metrics for optimization are the makespan and flowtime. Experiment results show that the proposed algorithm outperforms other stand-alone algorithms such as ant system, genetic algorithms, and ant colony system for makespan. However, for flowtime, ant system and genetic algorithm perform better.
元启发式算法在求解计算网格系统中各种作业调度问题方面表现出良好的性能。然而,由于网格计算中资源的复杂性和异构性,独立的算法无法在合理的时间内找到高质量的解。本文提出了一种混合算法,即蚁群算法和遗传算法来解决作业调度问题。高级杂交算法在执行调度任务时保持了各算法的同一性。研究的重点是静态网格计算环境,优化的指标是完工时间和流程时间。实验结果表明,该算法在makespan问题上优于蚂蚁系统、遗传算法和蚁群系统等单机算法。然而,对于流量时间,蚁群系统和遗传算法表现更好。
{"title":"Scheduling jobs in computational grid using hybrid ACS and GA approach","authors":"M. M. Alobaedy, K. Ku-Mahamud","doi":"10.1109/ComComAp.2014.7017200","DOIUrl":"https://doi.org/10.1109/ComComAp.2014.7017200","url":null,"abstract":"Metaheuristics algorithms show very good performance in solving various job scheduling problems in computational grid systems. However, due to the complexity and heterogeneous nature of resources in grid computing, stand-alone algorithm is not capable to find a good quality solution in reasonable time. This study proposes a hybrid algorithm, specifically ant colony system and genetic algorithm to solve the job scheduling problem. The high level hybridization algorithm will keep the identity of each algorithm in performing the scheduling task. The study focuses on static grid computing environment and the metrics for optimization are the makespan and flowtime. Experiment results show that the proposed algorithm outperforms other stand-alone algorithms such as ant system, genetic algorithms, and ant colony system for makespan. However, for flowtime, ant system and genetic algorithm perform better.","PeriodicalId":422906,"journal":{"name":"2014 IEEE Computers, Communications and IT Applications Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129328241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2014 IEEE Computers, Communications and IT Applications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1