首页 > 最新文献

International Journal of Space-Based and Situated Computing最新文献

英文 中文
A fast search and classification method of isomorphic polygons in LSI design data using geometric invariant feature value 基于几何不变特征值的LSI设计数据同构多边形快速搜索与分类方法
Pub Date : 2016-01-01 DOI: 10.1504/IJSSC.2016.082760
S. Shoji, A. Koyama
A large number of isomorphic polygons are included in design data of LSI. Fast search and classification for isomorphic polygons are expected for compactness and fast pattern search of design data. In this paper, we propose a high speed and high accuracy classification method of isomorphic polygons. The proposed method can reduce a shape comparison process significantly by using a geometric invariant feature value for a polygon. The feature value is calculated by summation of distance from centre of gravity to each vertex, and a polygon contour length. This value does not be affected by parallel shift, rotation and reduced scale. The feature value is same among isomorphic polygons and it is possible to access an isomorphic polygon group quickly by using this value. From evaluation results, we verified that the proposed method can realise fast classification for isomorphic polygons, and compactness of design data.
大规模集成电路的设计数据中包含了大量的同构多边形。对同构多边形的快速搜索和分类是设计数据的紧凑性和快速模式搜索的要求。本文提出了一种高速、高精度的同构多边形分类方法。该方法利用多边形的几何不变特征值,大大减少了形状比较过程。特征值由重心到每个顶点的距离和多边形轮廓长度的总和计算得到。该值不受平行移动、旋转和缩小比例的影响。同构多边形之间的特征值是相同的,利用该值可以快速访问同构多边形群。从评价结果来看,该方法能够实现同构多边形的快速分类和设计数据的紧凑性。
{"title":"A fast search and classification method of isomorphic polygons in LSI design data using geometric invariant feature value","authors":"S. Shoji, A. Koyama","doi":"10.1504/IJSSC.2016.082760","DOIUrl":"https://doi.org/10.1504/IJSSC.2016.082760","url":null,"abstract":"A large number of isomorphic polygons are included in design data of LSI. Fast search and classification for isomorphic polygons are expected for compactness and fast pattern search of design data. In this paper, we propose a high speed and high accuracy classification method of isomorphic polygons. The proposed method can reduce a shape comparison process significantly by using a geometric invariant feature value for a polygon. The feature value is calculated by summation of distance from centre of gravity to each vertex, and a polygon contour length. This value does not be affected by parallel shift, rotation and reduced scale. The feature value is same among isomorphic polygons and it is possible to access an isomorphic polygon group quickly by using this value. From evaluation results, we verified that the proposed method can realise fast classification for isomorphic polygons, and compactness of design data.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76894194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A metaphorical house of Facebook: usage based on space syntax Facebook的隐喻之家:基于空间句法的用法
Pub Date : 2016-01-01 DOI: 10.1504/IJSSC.2016.082770
Po-Yu Chen, Li-Pei Peng, Herng-Dar Bih, Cheng-Fu Chou
Online social networks are an increasingly popular means of making new friends or maintaining existing friendships. These social networks have replaced some traditional spaces in the real world, but few studies have examined what these new spaces look like in terms of virtual geographies. Facebook is the world's largest online social network, with billions of users sharing content and messages every day. This huge amount of traffic attracts researchers' interest in the behaviour of Facebook users. Facebook can also adjust their policies based on the user behaviour. While previous studies of Facebook user behaviour have relied on questionnaires which are subject to potential risks and limitations. This study directly analyses Facebook user behaviour by designing a model to predict how various types of users analogise their use of Facebook to everyday spaces.
在线社交网络是结交新朋友或维持现有友谊的一种日益流行的方式。这些社交网络已经取代了现实世界中的一些传统空间,但很少有研究从虚拟地理的角度来考察这些新空间的样子。Facebook是世界上最大的在线社交网络,每天有数十亿用户分享内容和信息。如此巨大的流量吸引了研究人员对Facebook用户行为的兴趣。Facebook也可以根据用户行为调整政策。而之前对Facebook用户行为的研究依赖于问卷调查,这些调查存在潜在的风险和局限性。这项研究通过设计一个模型来预测不同类型的用户如何将他们对Facebook的使用与日常空间进行类比,从而直接分析了Facebook用户的行为。
{"title":"A metaphorical house of Facebook: usage based on space syntax","authors":"Po-Yu Chen, Li-Pei Peng, Herng-Dar Bih, Cheng-Fu Chou","doi":"10.1504/IJSSC.2016.082770","DOIUrl":"https://doi.org/10.1504/IJSSC.2016.082770","url":null,"abstract":"Online social networks are an increasingly popular means of making new friends or maintaining existing friendships. These social networks have replaced some traditional spaces in the real world, but few studies have examined what these new spaces look like in terms of virtual geographies. Facebook is the world's largest online social network, with billions of users sharing content and messages every day. This huge amount of traffic attracts researchers' interest in the behaviour of Facebook users. Facebook can also adjust their policies based on the user behaviour. While previous studies of Facebook user behaviour have relied on questionnaires which are subject to potential risks and limitations. This study directly analyses Facebook user behaviour by designing a model to predict how various types of users analogise their use of Facebook to everyday spaces.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86434834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of a QoS-aware fuzzy-based CAC for LAN access 基于qos感知的模糊局域网接入CAC的性能评价
Pub Date : 2016-01-01 DOI: 10.1504/IJSSC.2016.082768
Takaaki Inaba, Ryoichiro Obukata, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli
With the popularisation of mobile devices such as smart phones, many device communicate over wireless local area networks (WLANs). The IEEE 802.11e standard is an important extension of the IEEE 802.11 standard focusing on QoS that works with any PHY implementation. The IEEE 802.11e standard introduces EDCA and HCCA. Both these schemes are useful for QoS provisioning to support delay-sensitive voice and video applications. The EDCA uses the contention window to differentiate between high priority and low priority services. However, it does not consider the priority of users. In this paper, in order to deal with this problem, we propose and implement a fuzzy-based admission control system (FACS). We carried out many simulations to evaluate the performance of the proposed system. The simulation results show that our proposed system has a good performance.
随着智能手机等移动设备的普及,许多设备通过无线局域网(wlan)进行通信。IEEE 802.11e标准是IEEE 802.11标准的重要扩展,重点关注与任何PHY实现一起工作的QoS。IEEE 802.11e标准引入了EDCA和HCCA。这两种方案都有助于提供QoS,以支持对延迟敏感的语音和视频应用。EDCA使用争用窗口来区分高优先级和低优先级服务。然而,它没有考虑用户的优先级。为了解决这一问题,本文提出并实现了一种基于模糊的录取控制系统。我们进行了许多仿真来评估所提出系统的性能。仿真结果表明,该系统具有良好的性能。
{"title":"Performance evaluation of a QoS-aware fuzzy-based CAC for LAN access","authors":"Takaaki Inaba, Ryoichiro Obukata, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1504/IJSSC.2016.082768","DOIUrl":"https://doi.org/10.1504/IJSSC.2016.082768","url":null,"abstract":"With the popularisation of mobile devices such as smart phones, many device communicate over wireless local area networks (WLANs). The IEEE 802.11e standard is an important extension of the IEEE 802.11 standard focusing on QoS that works with any PHY implementation. The IEEE 802.11e standard introduces EDCA and HCCA. Both these schemes are useful for QoS provisioning to support delay-sensitive voice and video applications. The EDCA uses the contention window to differentiate between high priority and low priority services. However, it does not consider the priority of users. In this paper, in order to deal with this problem, we propose and implement a fuzzy-based admission control system (FACS). We carried out many simulations to evaluate the performance of the proposed system. The simulation results show that our proposed system has a good performance.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79505413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Lightweight secure group communications for resource constrained devices 用于资源受限设备的轻量级安全组通信
Pub Date : 2015-12-17 DOI: 10.1504/IJSSC.2015.073696
Wafa Ben Jaballah, M. Mosbah, H. Youssef, A. Zemmari
Providing source authentication service in wireless sensor networks (WSNs) is still a potential stumbling block to the wide deployment of these resource constrained devices. In this paper, we present several broadcast authentication solutions that have been developed for secure group communications in WSNs, and we come up with two novel symmetric-key-based authentication schemes. Our protocols are built upon the integration of a reputation generator on each node, a key binary tree for the efficient distribution and updating of the authentication group keys. Moreover, we refer to a Bloom filter data structure to reduce the communication overhead. We assess the feasibility of our two proposed schemes with a thorough mathematical study, estimating the average number of concatenated message authentication code, the energy consumption overhead, and the probability of detection of two state-of-the-art attacks.
在无线传感器网络(wsn)中提供源认证服务仍然是这些资源受限设备广泛部署的潜在障碍。本文介绍了针对无线传感器网络中安全组通信而开发的几种广播认证方案,并提出了两种新的基于对称密钥的认证方案。我们的协议建立在每个节点上的信誉生成器的集成之上,这是一个用于有效分发和更新身份验证组密钥的密钥二叉树。此外,我们引用了Bloom过滤器数据结构来减少通信开销。我们通过彻底的数学研究评估了我们提出的两种方案的可行性,估计了连接消息认证代码的平均数量、能耗开销以及检测到两种最先进攻击的概率。
{"title":"Lightweight secure group communications for resource constrained devices","authors":"Wafa Ben Jaballah, M. Mosbah, H. Youssef, A. Zemmari","doi":"10.1504/IJSSC.2015.073696","DOIUrl":"https://doi.org/10.1504/IJSSC.2015.073696","url":null,"abstract":"Providing source authentication service in wireless sensor networks (WSNs) is still a potential stumbling block to the wide deployment of these resource constrained devices. In this paper, we present several broadcast authentication solutions that have been developed for secure group communications in WSNs, and we come up with two novel symmetric-key-based authentication schemes. Our protocols are built upon the integration of a reputation generator on each node, a key binary tree for the efficient distribution and updating of the authentication group keys. Moreover, we refer to a Bloom filter data structure to reduce the communication overhead. We assess the feasibility of our two proposed schemes with a thorough mathematical study, estimating the average number of concatenated message authentication code, the energy consumption overhead, and the probability of detection of two state-of-the-art attacks.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74694649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Investigation of airplanes effects on VSAT satellite communication systems 飞机对VSAT卫星通信系统影响的研究
Pub Date : 2015-12-17 DOI: 10.1504/IJSSC.2015.073719
K. Fujisaki, M. Tateiba
Satellite communication is playing an important role in the communication infrastructure supporting multi-media services. Nowadays, satellite communication networks using very small aperture terminals (VSAT) are useful communication infrastructures supporting various application demands. To make more reliable communication link by using VSAT, it is important to accumulate certain knowledge concerned with transmission characteristics via satellite communication channels through experimental research. In this paper, we collect the measured data on bit errors due to airplanes by using four VSAT satellite communication systems, and present effective countermeasures against airplane effects on satellite channels when airplanes fly over a town at a low altitude of less than 1,000 m and cross an antenna beam.
卫星通信在支持多媒体业务的通信基础设施中发挥着重要作用。目前,采用甚小孔径终端(VSAT)的卫星通信网络是满足各种应用需求的有用通信基础设施。为了利用VSAT建立更可靠的通信链路,通过实验研究积累一定的卫星通信信道传输特性知识是非常重要的。本文收集了四种VSAT卫星通信系统中飞机对卫星信道的误码测量数据,并提出了飞机在低于1000 m的低空飞越城镇上空并穿过天线波束时飞机对卫星信道影响的有效对策。
{"title":"Investigation of airplanes effects on VSAT satellite communication systems","authors":"K. Fujisaki, M. Tateiba","doi":"10.1504/IJSSC.2015.073719","DOIUrl":"https://doi.org/10.1504/IJSSC.2015.073719","url":null,"abstract":"Satellite communication is playing an important role in the communication infrastructure supporting multi-media services. Nowadays, satellite communication networks using very small aperture terminals (VSAT) are useful communication infrastructures supporting various application demands. To make more reliable communication link by using VSAT, it is important to accumulate certain knowledge concerned with transmission characteristics via satellite communication channels through experimental research. In this paper, we collect the measured data on bit errors due to airplanes by using four VSAT satellite communication systems, and present effective countermeasures against airplane effects on satellite channels when airplanes fly over a town at a low altitude of less than 1,000 m and cross an antenna beam.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79222003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Training system for endoscopic surgery with haptic guide function and augmented reality 具有触觉引导功能和增强现实的内窥镜手术训练系统
Pub Date : 2015-12-17 DOI: 10.1504/IJSSC.2015.073700
T. Tokuyasu, Wakou Okamura, T. Kusano, M. Inomata, N. Shiraishi, S. Kitanou
Presently, the number of cases of endoscopic surgery which can reduce both physical and mental burdens of a patient has been increasing. Although a variety of training environments has been prepared, more effective training methods have been expected from the doctors who are engaging in medical education. This study is focused on an approach for teaching calligraphy, where a teacher grasps both an ink brush and the student's hand and moves them to an appropriate direction with befitting force. In order to streamline the training efficiency of endoscopic surgery, we propose a function of haptic guidance for the operation of endoscopic forceps. We develop the experimental devices which dynamically control the movement of endoscopic forceps in order to realise the haptic guide function. This paper introduces the system structure and its software, and we discuss about the training effects through the experimental results.
目前,内窥镜手术可以减轻患者的身体和精神负担的案例越来越多。虽然已经准备了各种培训环境,但对从事医学教育的医生来说,更有效的培训方法是值得期待的。本研究的重点是一种书法教学方法,即教师同时抓住毛笔和学生的手,用适当的力量将它们移动到适当的方向。为了提高内窥镜手术的培训效率,我们提出了内窥镜钳操作的触觉指导功能。为了实现内窥镜钳的触觉引导功能,我们研制了动态控制内窥镜钳运动的实验装置。本文介绍了系统的结构和软件,并通过实验结果对训练效果进行了讨论。
{"title":"Training system for endoscopic surgery with haptic guide function and augmented reality","authors":"T. Tokuyasu, Wakou Okamura, T. Kusano, M. Inomata, N. Shiraishi, S. Kitanou","doi":"10.1504/IJSSC.2015.073700","DOIUrl":"https://doi.org/10.1504/IJSSC.2015.073700","url":null,"abstract":"Presently, the number of cases of endoscopic surgery which can reduce both physical and mental burdens of a patient has been increasing. Although a variety of training environments has been prepared, more effective training methods have been expected from the doctors who are engaging in medical education. This study is focused on an approach for teaching calligraphy, where a teacher grasps both an ink brush and the student's hand and moves them to an appropriate direction with befitting force. In order to streamline the training efficiency of endoscopic surgery, we propose a function of haptic guidance for the operation of endoscopic forceps. We develop the experimental devices which dynamically control the movement of endoscopic forceps in order to realise the haptic guide function. This paper introduces the system structure and its software, and we discuss about the training effects through the experimental results.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77103384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A construction-from-parts-type 3D modeller for digital fabrication 面向数字制造的零件构造型三维建模器
Pub Date : 2015-12-17 DOI: 10.1504/IJSSC.2015.073737
Jiaqing Lin, Hiroaki Nishino
Rapid progresses of 3D depth sensing and 3D printing technologies make digital fabrication an affordable technology for general public on daily life. Both experienced and novice users, who want to design and create new 3D geometric models, can readily acquire 3D object data by capturing their surrounding environments with consumer depth sensors, and produce physical prototypes by using desktop 3D printers. Although 3D modelling is a key technology to bridge a gap between the 3D acquisition with the depth sensors and the 3D printing, there is technically a deep valley preventing the novices from readily practicing the digital fabrication. We designed and developed a system enabling novices to edit the acquired 3D models with a set of simple operations for producing original 3D models. The system supports them to perform all phases, acquiring, modelling, and printing 3D models, through an integrated graphical user interface (GUI). We describe basic principle, architecture, implementation method, and some experiments conducted for verifying the effectiveness of the proposed system.
3D深度传感和3D打印技术的快速发展,使得数字制造成为普通大众日常生活中负担得起的技术。无论是经验丰富的用户还是新手,如果想要设计和创建新的3D几何模型,都可以通过使用消费者深度传感器捕获周围环境来轻松获取3D对象数据,并使用桌面3D打印机生成物理原型。尽管3D建模是弥合深度传感器3D采集和3D打印之间差距的关键技术,但技术上存在一个深谷,阻止新手轻易地实践数字制造。我们设计并开发了一个系统,使新手能够通过一套简单的操作来编辑获取的3D模型,从而生成原始的3D模型。该系统通过集成的图形用户界面(GUI)支持他们执行所有阶段,包括获取、建模和打印3D模型。我们描述了基本原理、架构、实现方法,并进行了一些实验来验证所提出系统的有效性。
{"title":"A construction-from-parts-type 3D modeller for digital fabrication","authors":"Jiaqing Lin, Hiroaki Nishino","doi":"10.1504/IJSSC.2015.073737","DOIUrl":"https://doi.org/10.1504/IJSSC.2015.073737","url":null,"abstract":"Rapid progresses of 3D depth sensing and 3D printing technologies make digital fabrication an affordable technology for general public on daily life. Both experienced and novice users, who want to design and create new 3D geometric models, can readily acquire 3D object data by capturing their surrounding environments with consumer depth sensors, and produce physical prototypes by using desktop 3D printers. Although 3D modelling is a key technology to bridge a gap between the 3D acquisition with the depth sensors and the 3D printing, there is technically a deep valley preventing the novices from readily practicing the digital fabrication. We designed and developed a system enabling novices to edit the acquired 3D models with a set of simple operations for producing original 3D models. The system supports them to perform all phases, acquiring, modelling, and printing 3D models, through an integrated graphical user interface (GUI). We describe basic principle, architecture, implementation method, and some experiments conducted for verifying the effectiveness of the proposed system.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91297103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying relations between frequent patterns mined at two collaborative websites 识别在两个协作网站上挖掘的频繁模式之间的关系
Pub Date : 2015-12-17 DOI: 10.1504/IJSSC.2015.073718
Jiahong Wang, Eiichiro Kodama, T. Takata
In modern business world, very often two companies collaborate with each other for their mutual benefit in such a way that, the one starts a transaction and processes a part of it, then the other processes the remainder. Similarly, in cloud computing, as a means to avoid leakage of secret information, a company may use two independent cloud management domains to store separate partitions of its database. For many users in such application environment, it would be beneficial and important to discover the relations between frequent patterns mined at respective site, and share the frequent pattern relation identifiers. The frequent pattern relation mining should be conducted without disclosing any other private data to each other site. This paper identifies a new data mining problem called pattern relation mining, introduces a new computing model called IF-THEN computing to capture the problem, and proposes a privacy-preserving pattern relation mining algorithm called CPRM. Extensive experiments were conducted to demonstrate the effectiveness of CPRM.
在现代商业世界中,经常有两家公司为了共同利益而相互合作,其中一家开始交易并处理其中的一部分,然后另一家处理其余部分。同样,在云计算中,作为避免机密信息泄露的一种手段,公司可以使用两个独立的云管理域来存储其数据库的单独分区。对于这种应用环境中的许多用户来说,发现在各自站点上挖掘的频繁模式之间的关系,并共享频繁模式关系标识符是非常有益和重要的。频繁的模式关系挖掘应该在不向彼此站点泄露任何其他私有数据的情况下进行。本文提出了一种新的数据挖掘问题——模式关系挖掘,引入了一种新的计算模型——IF-THEN计算来捕获该问题,并提出了一种保护隐私的模式关系挖掘算法——CPRM。大量的实验证明了CPRM的有效性。
{"title":"Identifying relations between frequent patterns mined at two collaborative websites","authors":"Jiahong Wang, Eiichiro Kodama, T. Takata","doi":"10.1504/IJSSC.2015.073718","DOIUrl":"https://doi.org/10.1504/IJSSC.2015.073718","url":null,"abstract":"In modern business world, very often two companies collaborate with each other for their mutual benefit in such a way that, the one starts a transaction and processes a part of it, then the other processes the remainder. Similarly, in cloud computing, as a means to avoid leakage of secret information, a company may use two independent cloud management domains to store separate partitions of its database. For many users in such application environment, it would be beneficial and important to discover the relations between frequent patterns mined at respective site, and share the frequent pattern relation identifiers. The frequent pattern relation mining should be conducted without disclosing any other private data to each other site. This paper identifies a new data mining problem called pattern relation mining, introduces a new computing model called IF-THEN computing to capture the problem, and proposes a privacy-preserving pattern relation mining algorithm called CPRM. Extensive experiments were conducted to demonstrate the effectiveness of CPRM.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72922227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Extrusion detection of illegal files in cloud-based systems 基于云的系统中非法文件的挤出检测
Pub Date : 2015-08-04 DOI: 10.1504/IJSSC.2015.070954
R. Hegarty, J. Haggerty
Cloud-based architectures have become the predominant paradigm for organisational infrastructure development due to the flexibility and scalability that these systems provide. However, issues around privacy and trust in such environments remain as has been demonstrated in recent attacks. There are two security challenges for cloud providers to resolve. First, they must ensure that only authorised downloads of potentially sensitive data can be made and they should have a means by which to detect any malicious activities. Second, any files that are uploaded to cloud providers must adhere to geographical legalities. Current security mechanisms employed in the cloud, such as firewalls and intrusion detection systems, find these issues problematic. This paper therefore presents a novel approach, XDet, for the extrusion detection of illegal files being maliciously uploaded to or downloaded from the cloud, which can be used in conjunction with other security countermeasures to ensure robust and secure cloud systems. This is achieved through the creation and detection of signatures from files of interest within the cloud network environment. The feasibility and performance study in this paper, whereby XDet has been applied to network traffic to detect files of interest, demonstrates the applicability of this approach.
基于云的架构已经成为组织基础设施开发的主要范例,因为这些系统提供了灵活性和可伸缩性。然而,在这样的环境中,围绕隐私和信任的问题仍然存在,正如最近的攻击所证明的那样。云提供商需要解决两个安全挑战。首先,他们必须确保只有经过授权的人才能下载潜在的敏感数据,而且他们应该有一种检测任何恶意活动的手段。其次,上传到云提供商的任何文件都必须遵守地理合法性。云中使用的当前安全机制(如防火墙和入侵检测系统)发现这些问题是有问题的。因此,本文提出了一种新颖的方法,XDet,用于挤压检测恶意上传或从云下载的非法文件,该方法可以与其他安全对策结合使用,以确保云系统的健壮和安全。这是通过在云网络环境中创建和检测感兴趣的文件中的签名来实现的。本文对XDet应用于网络流量以检测感兴趣的文件的可行性和性能进行了研究,证明了这种方法的适用性。
{"title":"Extrusion detection of illegal files in cloud-based systems","authors":"R. Hegarty, J. Haggerty","doi":"10.1504/IJSSC.2015.070954","DOIUrl":"https://doi.org/10.1504/IJSSC.2015.070954","url":null,"abstract":"Cloud-based architectures have become the predominant paradigm for organisational infrastructure development due to the flexibility and scalability that these systems provide. However, issues around privacy and trust in such environments remain as has been demonstrated in recent attacks. There are two security challenges for cloud providers to resolve. First, they must ensure that only authorised downloads of potentially sensitive data can be made and they should have a means by which to detect any malicious activities. Second, any files that are uploaded to cloud providers must adhere to geographical legalities. Current security mechanisms employed in the cloud, such as firewalls and intrusion detection systems, find these issues problematic. This paper therefore presents a novel approach, XDet, for the extrusion detection of illegal files being maliciously uploaded to or downloaded from the cloud, which can be used in conjunction with other security countermeasures to ensure robust and secure cloud systems. This is achieved through the creation and detection of signatures from files of interest within the cloud network environment. The feasibility and performance study in this paper, whereby XDet has been applied to network traffic to detect files of interest, demonstrates the applicability of this approach.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85007849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
DCR-MAC: a data channel recommending MAC for multi-channel WLANs toward the higher throughput performance DCR-MAC:一个数据通道,为多通道无线局域网推荐MAC,以获得更高的吞吐量性能
Pub Date : 2015-08-04 DOI: 10.1504/IJSSC.2015.070946
Tetsuya Shigeyasu, Junko Nagamine
Recently, many MAC protocols have been proposed for effective communication in the single transceiver multi-channel environment. In these MAC protocols, however, the multi-channel hidden terminal problem degrades the throughput of the communication systems. In order to mitigate the effects of the multi-channel hidden terminals, two MAC protocols have been proposed: cooperative asynchronous multi-channel MAC (CAM-MAC), where neighbouring terminals inform a sender of its bad channel selection and virtual topology MAC (VT-MAC), where redundant channel usage information is reduced by considering the network topology. However, these MAC protocols mainly focus on avoiding bad channel selections by the sender, and not on increasing good channel selections (concurrent transmissions). Therefore, in this paper, to further improve throughput performance by concurrent transmissions, we propose new multi-channel MAC protocols in which neighbour terminals of a sender recommend a better transmission channel prior to the data transmission. The performance evaluations verify that the proposed MAC protocol effectively improves the throughput performance when compared to existing MAC protocols, especially when the channel negotiation process induces the larger overhead at the short data transmission.
近年来,为了在单收发器多通道环境下实现有效的通信,提出了许多MAC协议。然而,在这些MAC协议中,多通道隐藏终端问题降低了通信系统的吞吐量。为了减轻多通道隐藏终端的影响,提出了两种MAC协议:协作异步多通道MAC协议(CAM-MAC),相邻终端将其错误的通道选择通知发送方;虚拟拓扑MAC协议(VT-MAC),通过考虑网络拓扑减少冗余信道使用信息。然而,这些MAC协议主要关注于避免发送方选择错误的信道,而不是增加正确的信道选择(并发传输)。因此,在本文中,为了进一步提高并发传输的吞吐量性能,我们提出了新的多通道MAC协议,其中发送方的邻居终端在数据传输之前推荐更好的传输通道。性能评估表明,与现有的MAC协议相比,所提出的MAC协议有效地提高了吞吐量性能,特别是在短数据传输时信道协商过程带来较大开销的情况下。
{"title":"DCR-MAC: a data channel recommending MAC for multi-channel WLANs toward the higher throughput performance","authors":"Tetsuya Shigeyasu, Junko Nagamine","doi":"10.1504/IJSSC.2015.070946","DOIUrl":"https://doi.org/10.1504/IJSSC.2015.070946","url":null,"abstract":"Recently, many MAC protocols have been proposed for effective communication in the single transceiver multi-channel environment. In these MAC protocols, however, the multi-channel hidden terminal problem degrades the throughput of the communication systems. In order to mitigate the effects of the multi-channel hidden terminals, two MAC protocols have been proposed: cooperative asynchronous multi-channel MAC (CAM-MAC), where neighbouring terminals inform a sender of its bad channel selection and virtual topology MAC (VT-MAC), where redundant channel usage information is reduced by considering the network topology. However, these MAC protocols mainly focus on avoiding bad channel selections by the sender, and not on increasing good channel selections (concurrent transmissions). Therefore, in this paper, to further improve throughput performance by concurrent transmissions, we propose new multi-channel MAC protocols in which neighbour terminals of a sender recommend a better transmission channel prior to the data transmission. The performance evaluations verify that the proposed MAC protocol effectively improves the throughput performance when compared to existing MAC protocols, especially when the channel negotiation process induces the larger overhead at the short data transmission.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90970387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International Journal of Space-Based and Situated Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1