首页 > 最新文献

ISC Int. J. Inf. Secur.最新文献

英文 中文
Virtualized Network Management Laboratory for Educational Purposes 教育用虚拟化网络管理实验室
Pub Date : 2019-08-01 DOI: 10.22042/isecure.2019.11.3.24
Oula L. Abdulsattar, E. Al-Hemiary
In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college campus network for educational purposes. This laboratory is created using Virtualbox virtualizer and GNS3 on Linux UBUNTU single HP DL380 G7 server platform. A total of 35 virtual devices (Routers, Switches and Virtual Machines) are created and distributed over virtualized campus network with seven network management tools configured and run. The proposed laboratory is aimed to overcome the limitations of network hardware existence in any educational facility teach network management subject in their curriculum. The other advantages include ease of managing the laboratory and overrides physical location setup within the same geographical area.
在本文中,我们实现了一个与高校校园网相连接的虚拟网络管理实验室(VNML)。本实验室使用Virtualbox virtualizer和GNS3在Linux UBUNTU单HP DL380 G7服务器平台上创建。共创建35个虚拟设备(路由器、交换机和虚拟机),分布在虚拟化的校园网上,配置并运行7个网络管理工具。该实验室旨在克服网络硬件存在于任何教育设施的局限性,在其课程中教授网络管理学科。其他优点包括易于管理实验室,并且在同一地理区域内覆盖物理位置设置。
{"title":"Virtualized Network Management Laboratory for Educational Purposes","authors":"Oula L. Abdulsattar, E. Al-Hemiary","doi":"10.22042/isecure.2019.11.3.24","DOIUrl":"https://doi.org/10.22042/isecure.2019.11.3.24","url":null,"abstract":"In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college campus network for educational purposes. This laboratory is created using Virtualbox virtualizer and GNS3 on Linux UBUNTU single HP DL380 G7 server platform. A total of 35 virtual devices (Routers, Switches and Virtual Machines) are created and distributed over virtualized campus network with seven network management tools configured and run. The proposed laboratory is aimed to overcome the limitations of network hardware existence in any educational facility teach network management subject in their curriculum. The other advantages include ease of managing the laboratory and overrides physical location setup within the same geographical area.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance 提出ST-Slotted-CS-ALOHA协议以节省时间和避免碰撞
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.9
E. Khatter, Dina M. Ibrahim
Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC protocols performance in UWSNs, particularly enhancing the effectiveness of ALOHA Protocol. In this paper, a time-saving Aloha protocol with slotted carrier sense proposed which we called, ST-Slotted-CS-ALOHA protocol. The results of thesimulation demonstrate that our proposed protocol can save time and decrease the average delay when it compared with the other protocols. Moreover, it decreased energy consumption and raised the ratio of throughput. However, the number of dropped nodes does not give better results compared to other protocols.
节约时间和能耗已成为水下无线传感器网络(UWSNs)领域研究人员关注的重要问题。因此,在uwsn中,需要提高MAC协议的性能,特别是提高ALOHA协议的有效性。本文提出了一种具有开槽载波感知的节省时间的Aloha协议,我们称之为ST-Slotted-CS-ALOHA协议。仿真结果表明,与其他协议相比,我们提出的协议可以节省时间,降低平均延迟。降低了能耗,提高了处理率。然而,与其他协议相比,丢弃节点的数量并不能提供更好的结果。
{"title":"Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance","authors":"E. Khatter, Dina M. Ibrahim","doi":"10.22042/ISECURE.2019.11.0.9","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.9","url":null,"abstract":"Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC protocols performance in UWSNs, particularly enhancing the effectiveness of ALOHA Protocol. In this paper, a time-saving Aloha protocol with slotted carrier sense proposed which we called, ST-Slotted-CS-ALOHA protocol. The results of thesimulation demonstrate that our proposed protocol can save time and decrease the average delay when it compared with the other protocols. Moreover, it decreased energy consumption and raised the ratio of throughput. However, the number of dropped nodes does not give better results compared to other protocols.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase 大型软件系统实施阶段项目管理过程的度量研究
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.21
Wajdi Al Jedaibi, Sufian Khamis
Project management is an important factor to accomplish the decision to implement large-scale software systems (LSS) in a successful manner. The effective project management comes into play to plan, coordinate and control such a complex project. Project management factor has been argued as one of the important Critical Success Factor (CSF), which need to be measured and monitored carefully during the implementation of Enterprise Resource Planning(ERP) systems. The goal of this article is to develop âAœCSF-Live!âAI which is a method for measuring, monitoring, and controlling critical success factors of large-scale software systems. To achieve such goal, we apply CSF-Live for the project management CSF. The CSF-Live uses the Goal/Question/Metric paradigm (GQM) to yield a flexible framework containing several metrics that we used it to develop a formulation to enable the measurement of the project management CSF. The formulation that we developed for the project management CSF implies that the significance of having proper project management when conducting an ERP system implementation, since it is positively associated with the success of the ERP.
项目管理是成功实施大型软件系统(LSS)的重要因素。有效的项目管理对这样一个复杂的项目进行计划、协调和控制。项目管理因素被认为是重要的关键成功因素之一,在企业资源规划(ERP)系统实施过程中需要对其进行仔细的测量和监控。本文的目标是开发一个“CSF-Live!”ai是一种测量、监控和控制大型软件系统关键成功因素的方法。为了实现这一目标,我们将CSF- live应用于项目管理CSF。CSF- live使用目标/问题/度量范式(GQM)来生成一个包含若干度量的灵活框架,我们使用它来开发一个公式来实现项目管理CSF的度量。我们为项目管理CSF开发的公式暗示了在实施ERP系统时进行适当的项目管理的重要性,因为它与ERP的成功呈正相关。
{"title":"Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase","authors":"Wajdi Al Jedaibi, Sufian Khamis","doi":"10.22042/ISECURE.2019.11.0.21","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.21","url":null,"abstract":"Project management is an important factor to accomplish the decision to implement large-scale software systems (LSS) in a successful manner. The effective project management comes into play to plan, coordinate and control such a complex project. Project management factor has been argued as one of the important Critical Success Factor (CSF), which need to be measured and monitored carefully during the implementation of Enterprise Resource Planning(ERP) systems. The goal of this article is to develop âAœCSF-Live!âAI which is a method for measuring, monitoring, and controlling critical success factors of large-scale software systems. To achieve such goal, we apply CSF-Live for the project management CSF. The CSF-Live uses the Goal/Question/Metric paradigm (GQM) to yield a flexible framework containing several metrics that we used it to develop a formulation to enable the measurement of the project management CSF. The formulation that we developed for the project management CSF implies that the significance of having proper project management when conducting an ERP system implementation, since it is positively associated with the success of the ERP.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Critical Success Factors for Data Virtualization: A Literature Review 数据虚拟化的关键成功因素:文献综述
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.17
Matthias Gottlieb, Marwin Shraideh, Isabel Fuhrmann, M. Böhm, H. Krcmar
Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach in the first stage to get a state of the art of DV regarding data integration and to present a concept matrix. We extend the knowledge base with a systematic literature review resulting in 15 critical success factors for DV. Practitioners can use these critical success factors to decide between DV and Extract, Transform, Load (ETL) as data integration approach.
数据虚拟化(DV)已成为一种经济高效地存储和处理数据的重要方法。但是,不清楚什么类型的数据以及何时应该虚拟化数据。我们在第一阶段应用了设计科学方法,以获得有关数据集成的DV的最新状态,并提出了一个概念矩阵。我们通过系统的文献综述扩展了知识库,得出了DV的15个关键成功因素。从业者可以使用这些关键的成功因素来决定是DV还是提取、转换、加载(ETL)作为数据集成方法。
{"title":"Critical Success Factors for Data Virtualization: A Literature Review","authors":"Matthias Gottlieb, Marwin Shraideh, Isabel Fuhrmann, M. Böhm, H. Krcmar","doi":"10.22042/ISECURE.2019.11.0.17","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.17","url":null,"abstract":"Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach in the first stage to get a state of the art of DV regarding data integration and to present a concept matrix. We extend the knowledge base with a systematic literature review resulting in 15 critical success factors for DV. Practitioners can use these critical success factors to decide between DV and Extract, Transform, Load (ETL) as data integration approach.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115820239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Considering Uncertainty in Modeling Historical Knowledge 考虑历史知识建模中的不确定性
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.8
F. Zendaoui, Walid-Khaled Hidouci
Simplifying and structuring qualitatively complex knowledge, quantifying it in a certain way to make it reusable and easily accessible are all aspects that are not new to historians. Computer science is currently approaching a solution to some of these problems, or at least making it easier to work with historical data. In this paper, we propose a historical knowledge representation model taking into consideration the quality of imperfection of historical data in terms of uncertainty. To do this, our model design is based on a multilayer approach in which we distinguish three informational levels: information, source, and belief whose combination allows modeling and modulating historical knowledge. The basic principle of this model is to allow multiple historical sources to represent several versions of the history of a historical event with associated degrees of belief. In our model, we differentiated three levels of granularity (attribute, object, relation) to express belief and defined 11 degrees of uncertainty in belief. The proposed model can be the object of various exploitations that fall within the historian’s decision-making support for the plausibility of the history of historical events.
对历史学家来说,简化和结构化定性复杂的知识,以某种方式对其进行量化以使其可重用和易于访问,这些方面都并不新鲜。计算机科学目前正在接近解决其中一些问题,或者至少使处理历史数据变得更容易。在本文中,我们提出了一个考虑历史数据在不确定性方面的缺陷质量的历史知识表示模型。为了做到这一点,我们的模型设计基于多层方法,其中我们区分了三个信息层次:信息、来源和信念,它们的组合允许建模和调制历史知识。该模型的基本原则是允许多个历史来源代表具有相关可信度的历史事件的几个版本。在我们的模型中,我们区分了三个层次的粒度(属性、对象、关系)来表达信念,并定义了信念的11个不确定性度。所提出的模型可以成为各种利用的对象,这些利用属于历史学家对历史事件的历史合理性的决策支持。
{"title":"Considering Uncertainty in Modeling Historical Knowledge","authors":"F. Zendaoui, Walid-Khaled Hidouci","doi":"10.22042/ISECURE.2019.11.0.8","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.8","url":null,"abstract":"Simplifying and structuring qualitatively complex knowledge, quantifying it in a certain way to make it reusable and easily accessible are all aspects that are not new to historians. Computer science is currently approaching a solution to some of these problems, or at least making it easier to work with historical data. In this paper, we propose a historical knowledge representation model taking into consideration the quality of imperfection of historical data in terms of uncertainty. To do this, our model design is based on a multilayer approach in which we distinguish three informational levels: information, source, and belief whose combination allows modeling and modulating historical knowledge. The basic principle of this model is to allow multiple historical sources to represent several versions of the history of a historical event with associated degrees of belief. In our model, we differentiated three levels of granularity (attribute, object, relation) to express belief and defined 11 degrees of uncertainty in belief. The proposed model can be the object of various exploitations that fall within the historian’s decision-making support for the plausibility of the history of historical events.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127971101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) 基于Mamdani模糊推理系统(MFIS)的云和物联网智能停车系统
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.20
T. Alyas, Gulzar Ahmad, Yousaf Saeed, Muhammad Asif, Umer Farooq, Asma Kanwal
Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much potential to solve thechallenges of urban areas around the globe to facilitate the citizens. A framework model that enables the integration of sensor’s data and analysis of the data in the context of smart parking is proposed. These technologies use sensors anddevices deployed around the city parking areas sending real time data through the edge computers to the main cloud servers. Mobil-Apps are developed that used real time data, set from servers of the parking facilities in the city. Fuzzification is shown to be a capable mathematical approach for modeling city parking issues. To solve the city parking problems in cities a detailed analysis of fuzzy logic proposed systems is developed. This paper presents the resultsachieved using Mamdani Fuzzy Inference System to model complex smart parking system. These results are verified using MATLAB simulation.
物联网(IoT)和云计算技术连接了城市的基础设施,使城市具有上下文感知和更智能,以利用其主要资源。这些技术有很大的潜力来解决全球城市地区的挑战,为市民提供便利。提出了一种在智能停车环境下实现传感器数据集成和数据分析的框架模型。这些技术使用部署在城市停车场周围的传感器和设备,通过边缘计算机向主云服务器发送实时数据。移动应用程序的开发使用了实时数据,这些数据来自城市停车设施的服务器。模糊化是模拟城市停车问题的一种有效的数学方法。为了解决城市停车问题,对模糊逻辑提出的系统进行了详细的分析。本文介绍了利用Mamdani模糊推理系统对复杂智能停车系统进行建模的结果。通过MATLAB仿真验证了上述结果。
{"title":"Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)","authors":"T. Alyas, Gulzar Ahmad, Yousaf Saeed, Muhammad Asif, Umer Farooq, Asma Kanwal","doi":"10.22042/ISECURE.2019.11.0.20","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.20","url":null,"abstract":"Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much potential to solve thechallenges of urban areas around the globe to facilitate the citizens. A framework model that enables the integration of sensor’s data and analysis of the data in the context of smart parking is proposed. These technologies use sensors anddevices deployed around the city parking areas sending real time data through the edge computers to the main cloud servers. Mobil-Apps are developed that used real time data, set from servers of the parking facilities in the city. Fuzzification is shown to be a capable mathematical approach for modeling city parking issues. To solve the city parking problems in cities a detailed analysis of fuzzy logic proposed systems is developed. This paper presents the resultsachieved using Mamdani Fuzzy Inference System to model complex smart parking system. These results are verified using MATLAB simulation.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114077612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluating Multipath TCP Resilience against Link Failures 评估多路径TCP对链路故障的弹性
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.15
Mohammed J. F. Alenazi
Standard TCP is the de facto reliable transfer protocol for the Internet. It is designed to establish a reliable connection using only a single network interface. However, standard TCP with single interfacing performs poorly due to intermittent node connectivity. This requires the re-establishment of connections as the IP addresses change. Multi-path TCP (MPTCP) has emerged to utilize multiple network interfaces in order to deliver higher throughput. Resilience to link failures can be better supported in MPTCP as the segments’ communication are maintained via alternative interfaces. In this paper, the resilience of MPTCP to link failures against several challenges is evaluated. Several link failure scenarios are applied to examine all aspects of MPTCP including congestion algorithms, path management, and subflow scheduling. In each scenario, the behavior of MPTCP is studied by observing and analyzing the throughput and delay. The evaluation of the results indicates MPTCP resilience to a low number of failed links. However, as the number of failed links increases, MPTCP can only recover full throughput if the link failure occurs on the server side. In addition, in the presence of link failures, the lowestRTT MPTCP scheduler yields the shortest delivery time while providing the minimum application jitter.
标准TCP是因特网事实上可靠的传输协议。它被设计为仅使用单个网络接口建立可靠连接。但是,由于节点连接断断续续,单接口的标准TCP性能很差。这需要在IP地址发生变化时重新建立连接。多路径TCP (MPTCP)的出现是为了利用多个网络接口来提供更高的吞吐量。MPTCP可以更好地支持链路故障的弹性,因为段的通信是通过替代接口维护的。在本文中,MPTCP对几种挑战下链路故障的弹性进行了评估。应用几个链路故障场景来检查MPTCP的所有方面,包括拥塞算法、路径管理和子流调度。在每种情况下,通过观察和分析吞吐量和延迟来研究MPTCP的行为。结果表明,MPTCP对故障链路的恢复能力较低。但是,随着故障链路数量的增加,MPTCP只能在服务器端发生链路故障时恢复全吞吐量。此外,在存在链路故障的情况下,最低strtt MPTCP调度器产生最短的交付时间,同时提供最小的应用程序抖动。
{"title":"Evaluating Multipath TCP Resilience against Link Failures","authors":"Mohammed J. F. Alenazi","doi":"10.22042/ISECURE.2019.11.0.15","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.15","url":null,"abstract":"Standard TCP is the de facto reliable transfer protocol for the Internet. It is designed to establish a reliable connection using only a single network interface. However, standard TCP with single interfacing performs poorly due to intermittent node connectivity. This requires the re-establishment of connections as the IP addresses change. Multi-path TCP (MPTCP) has emerged to utilize multiple network interfaces in order to deliver higher throughput. Resilience to link failures can be better supported in MPTCP as the segments’ communication are maintained via alternative interfaces. In this paper, the resilience of MPTCP to link failures against several challenges is evaluated. Several link failure scenarios are applied to examine all aspects of MPTCP including congestion algorithms, path management, and subflow scheduling. In each scenario, the behavior of MPTCP is studied by observing and analyzing the throughput and delay. The evaluation of the results indicates MPTCP resilience to a low number of failed links. However, as the number of failed links increases, MPTCP can only recover full throughput if the link failure occurs on the server side. In addition, in the presence of link failures, the lowestRTT MPTCP scheduler yields the shortest delivery time while providing the minimum application jitter.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Access and Mobility Policy Control at the Network Edge 网络边缘的访问和移动策略控制
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.14
E. Pencheva, I. Atanasov, Ivaylo Asenov
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications may provide intelligence in the vicinity of end users which improves network performance and enhances user experience. In this paper, we propose new mobile edge API to access and control the mobility at the network edge. The application logic for provisioning access and mobility policies may be based on considerations like load level information per radio network slice instance, user location, accumulated usage, local policy, etc. We describe the basic API functionality by typical use cases and provide the respective data model, which represents the resource structure and data types. Some implementation aspects, related to modeling the resource states as seen by a mobile edge application and by the network, are discussed.
第五代(5G)系统架构被定义为基于服务,核心网络功能被描述为可通过应用程序编程接口(API)访问的服务集。5G的组成部分之一是多接入边缘计算(MEC),它通过API提供对无线网络功能的开放访问。使用移动边缘API第三方分析应用程序可以在终端用户附近提供智能,从而提高网络性能并增强用户体验。在本文中,我们提出了新的移动边缘API来访问和控制网络边缘的移动性。提供访问和移动性策略的应用程序逻辑可能基于诸如每个无线网络切片实例的负载级别信息、用户位置、累计使用情况、本地策略等考虑因素。我们通过典型用例描述基本API功能,并提供相应的数据模型,该模型表示资源结构和数据类型。讨论了与移动边缘应用程序和网络所看到的资源状态建模相关的一些实现方面。
{"title":"Access and Mobility Policy Control at the Network Edge","authors":"E. Pencheva, I. Atanasov, Ivaylo Asenov","doi":"10.22042/ISECURE.2019.11.0.14","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.14","url":null,"abstract":"The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications may provide intelligence in the vicinity of end users which improves network performance and enhances user experience. In this paper, we propose new mobile edge API to access and control the mobility at the network edge. The application logic for provisioning access and mobility policies may be based on considerations like load level information per radio network slice instance, user location, accumulated usage, local policy, etc. We describe the basic API functionality by typical use cases and provide the respective data model, which represents the resource structure and data types. Some implementation aspects, related to modeling the resource states as seen by a mobile edge application and by the network, are discussed.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116320591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hand Gestures Classification with Multi-Core DTW 基于多核DTW的手势分类
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.12
Ayman Atia, Nada Shorim
Classifications of several gesture types are very helpful in several applications. This paper tries to address fast classifications of hand gestures using DTW over multi-core simple processors. We presented a methodology to distribute templates over multi-cores and then allow parallel execution of the classification. The results were presented to voting algorithm in which the majority vote was used for the classification purpose. The speed of processing has increased dramatically due to using multi-core processors and DTW.
几种手势类型的分类在一些应用程序中非常有用。本文尝试在多核简单处理器上使用DTW解决手势的快速分类问题。我们提出了一种方法,将模板分布在多核上,然后允许并行执行分类。结果提交给投票算法,其中多数投票用于分类目的。由于使用了多核处理器和DTW,处理速度得到了显著提高。
{"title":"Hand Gestures Classification with Multi-Core DTW","authors":"Ayman Atia, Nada Shorim","doi":"10.22042/ISECURE.2019.11.0.12","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.12","url":null,"abstract":"Classifications of several gesture types are very helpful in several applications. This paper tries to address fast classifications of hand gestures using DTW over multi-core simple processors. We presented a methodology to distribute templates over multi-cores and then allow parallel execution of the classification. The results were presented to voting algorithm in which the majority vote was used for the classification purpose. The speed of processing has increased dramatically due to using multi-core processors and DTW.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124370623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain 功率域中非正交多址的公平功率分配
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.16
Joel E. Cordeiro Junior, M. Alencar, J. V. S. Filho, K. Assis
This paper presents an investigation on the performance of the Non-Orthogonal Multiple Access (NOMA) in the power domain scheme. A Power Allocation (PA) method is proposed from NOMA throughput expression analysis. This method aims to provide fair opportunities for users to improve their performance. Thus, NOMA users can achieve rates higher than, or equal to, the rates obtained with the conventional Orthogonal Multiple Access (OMA) in the frequency domain schemes. The proposed method is evaluated and compared with others PA techniques by computer system level simulations. The results obtained indicate that the proposed method increases the average cell spectral efficiency andmaintains a good fairness level with regard to the resource allocation among the users within a cell.
研究了非正交多址(NOMA)在功率域方案下的性能。从NOMA吞吐量表达式分析出发,提出了一种功率分配方法。这种方法旨在为用户提供公平的机会来提高他们的性能。因此,NOMA用户可以在频域方案中获得高于或等于传统正交多址(OMA)获得的速率。通过计算机系统级仿真,对该方法进行了评价,并与其他PA技术进行了比较。结果表明,该方法提高了小区平均频谱效率,并保持了小区内用户资源分配的良好公平性。
{"title":"A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain","authors":"Joel E. Cordeiro Junior, M. Alencar, J. V. S. Filho, K. Assis","doi":"10.22042/ISECURE.2019.11.0.16","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.16","url":null,"abstract":"This paper presents an investigation on the performance of the Non-Orthogonal Multiple Access (NOMA) in the power domain scheme. A Power Allocation (PA) method is proposed from NOMA throughput expression analysis. This method aims to provide fair opportunities for users to improve their performance. Thus, NOMA users can achieve rates higher than, or equal to, the rates obtained with the conventional Orthogonal Multiple Access (OMA) in the frequency domain schemes. The proposed method is evaluated and compared with others PA techniques by computer system level simulations. The results obtained indicate that the proposed method increases the average cell spectral efficiency andmaintains a good fairness level with regard to the resource allocation among the users within a cell.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130177971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ISC Int. J. Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1