首页 > 最新文献

2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)最新文献

英文 中文
Addressing self-disclosure in social media: An instructional awareness approach 解决社交媒体中的自我表露:一种教学意识方法
N. E. D. Ferreyra, Johanna Schäwel, M. Heisel, Christian Meske
Nowadays the information flowing across the different Social Network Sites (SNSs) like Facebook is highly diverse and rich in its content. It is precisely the diversity of the users' contributions to SNSs that makes these platforms attractive and interesting to engage with. Nevertheless, there is a high amount of private and sensitive information being disclosed permanently by these users in order to take full advantage of the services offered by such sites. Current privacy-protection approaches (like the one provided by Facebook) allow users to restrict the audience of their contributions and hide particular pieces of information; however, they are still far from being widely adopted and put proactively into practice. For this reason, we propose to analyze and address different aspects of online self-disclosure in Social Media from a pedagogical and self-adaptive perspective. In this work we introduce the architecture of an Instructional Awareness System (IAS) based on the MAPE-K blueprint for autonomic systems, and provide a definition of its feedback mechanism using principles of Constraint-Based Modeling (CBM).
如今,在Facebook等不同的社交网站(sns)上流动的信息是高度多样化和内容丰富的。正是用户对sns的贡献的多样性使得这些平台具有吸引力和趣味性。然而,为了充分利用这些网站提供的服务,这些用户会永久披露大量的私人和敏感信息。当前的隐私保护方法(如Facebook提供的方法)允许用户限制他们的贡献的受众,并隐藏特定的信息片段;然而,它们还远远没有被广泛采用和积极付诸实践。出于这个原因,我们建议从教学和自我适应的角度来分析和解决社交媒体中在线自我披露的不同方面。在这项工作中,我们介绍了基于自主系统MAPE-K蓝图的教学意识系统(IAS)的架构,并使用基于约束的建模(CBM)原则定义了其反馈机制。
{"title":"Addressing self-disclosure in social media: An instructional awareness approach","authors":"N. E. D. Ferreyra, Johanna Schäwel, M. Heisel, Christian Meske","doi":"10.1109/AICCSA.2016.7945815","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945815","url":null,"abstract":"Nowadays the information flowing across the different Social Network Sites (SNSs) like Facebook is highly diverse and rich in its content. It is precisely the diversity of the users' contributions to SNSs that makes these platforms attractive and interesting to engage with. Nevertheless, there is a high amount of private and sensitive information being disclosed permanently by these users in order to take full advantage of the services offered by such sites. Current privacy-protection approaches (like the one provided by Facebook) allow users to restrict the audience of their contributions and hide particular pieces of information; however, they are still far from being widely adopted and put proactively into practice. For this reason, we propose to analyze and address different aspects of online self-disclosure in Social Media from a pedagogical and self-adaptive perspective. In this work we introduce the architecture of an Instructional Awareness System (IAS) based on the MAPE-K blueprint for autonomic systems, and provide a definition of its feedback mechanism using principles of Constraint-Based Modeling (CBM).","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125697659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
QLAR: A Q-learning based adaptive routing for MANETs 基于q学习的自适应路由
Abdellatif Serhani, N. Naja, A. Jamali
Mobile Ad-hoc Networks are highly reconfigurable networks of mobile nodes which communicate by wireless links. The main issues in MANETs include the mobility of the network nodes, energy limitations and bandwidth. Thus, routing protocols should explicitly consider network changes into the algorithm design. In order to support service requirements of multimedia and real-time applications, the routing protocol must provide Quality of Service (QoS) in terms of packets loss and average End-to-End Delay (ETED). This work proposes a Q-Learning based Adaptive Routing model (QLAR), developed via Reinforcement Learning (RL) techniques, which has the ability to detect the level of mobility at different points of time so that each individual node can update routing metric accordingly. The proposed protocol introduces: (i) new model, developed via Q-Learning technique, to detect the level of mobility at each node in the network; (ii) a new metric, called Qmetric, which account for the static and dynamic routing metrics, and which are combined and updated to the changing network topologies. The proposed metric and routing model in this paper are deployed on the Optimized Link State Routing (OLSR) protocol. Extensive simulations validate the effectiveness of the proposed model, through comparisons with the standard OLSR protocols.
移动自组织网络是由移动节点组成的高度可重构网络,通过无线链路进行通信。manet的主要问题包括网络节点的移动性、能量限制和带宽。因此,路由协议在算法设计中应明确考虑网络变化。为了支持多媒体和实时应用的业务需求,路由协议必须提供QoS (Quality of service),即丢包率和平均端到端时延。这项工作提出了一种基于q学习的自适应路由模型(QLAR),该模型通过强化学习(RL)技术开发,能够检测不同时间点的移动水平,以便每个单独的节点可以相应地更新路由度量。提出的协议引入:(i)通过Q-Learning技术开发的新模型来检测网络中每个节点的移动水平;(ii)一种新的度量,称为Qmetric,它考虑静态和动态路由度量,并根据不断变化的网络拓扑进行组合和更新。本文提出的度量和路由模型部署在优化链路状态路由(OLSR)协议上。通过与标准OLSR协议的比较,广泛的仿真验证了所提出模型的有效性。
{"title":"QLAR: A Q-learning based adaptive routing for MANETs","authors":"Abdellatif Serhani, N. Naja, A. Jamali","doi":"10.1109/AICCSA.2016.7945679","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945679","url":null,"abstract":"Mobile Ad-hoc Networks are highly reconfigurable networks of mobile nodes which communicate by wireless links. The main issues in MANETs include the mobility of the network nodes, energy limitations and bandwidth. Thus, routing protocols should explicitly consider network changes into the algorithm design. In order to support service requirements of multimedia and real-time applications, the routing protocol must provide Quality of Service (QoS) in terms of packets loss and average End-to-End Delay (ETED). This work proposes a Q-Learning based Adaptive Routing model (QLAR), developed via Reinforcement Learning (RL) techniques, which has the ability to detect the level of mobility at different points of time so that each individual node can update routing metric accordingly. The proposed protocol introduces: (i) new model, developed via Q-Learning technique, to detect the level of mobility at each node in the network; (ii) a new metric, called Qmetric, which account for the static and dynamic routing metrics, and which are combined and updated to the changing network topologies. The proposed metric and routing model in this paper are deployed on the Optimized Link State Routing (OLSR) protocol. Extensive simulations validate the effectiveness of the proposed model, through comparisons with the standard OLSR protocols.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114866942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On the road to the Internet of Biometric Things: A survey of fingerprint acquisition technologies and fingerprint databases 在通往生物识别物联网的道路上:指纹采集技术和指纹数据库综述
Fatimah A. Al-alem, M. Alsmirat, M. Al-Ayyoub
Since security vulnerabilities represent one of the grand challenges of the Internet of Things (IoT), researchers have proposed what is known as the Internet of Biometric Things (IoBT), which mixes traditional biometric technologies with context-aware authentication techniques. One of the most famous biometric technologies is electronic fingerprint recognition, which acquire fingerprints using different technologies, some of which are more suitable for IoBT than others. Moreover, different fingerprint databases have been built to study the impact of different factors on the accuracy of different fingerprint recognition algorithms and systems. In this paper, we survey the available fingerprint acquisition technologies and the available fingerprint databases. We also identify the advantages and disadvantages of each technology and database.
由于安全漏洞是物联网(IoT)面临的重大挑战之一,研究人员提出了所谓的生物识别物联网(IoBT),它将传统的生物识别技术与上下文感知认证技术相结合。最著名的生物识别技术之一是电子指纹识别,它使用不同的技术获取指纹,其中一些技术比其他技术更适合IoBT。此外,还建立了不同的指纹数据库,研究了不同因素对不同指纹识别算法和系统准确性的影响。本文综述了现有的指纹采集技术和现有的指纹数据库。我们还确定了每种技术和数据库的优缺点。
{"title":"On the road to the Internet of Biometric Things: A survey of fingerprint acquisition technologies and fingerprint databases","authors":"Fatimah A. Al-alem, M. Alsmirat, M. Al-Ayyoub","doi":"10.1109/AICCSA.2016.7945810","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945810","url":null,"abstract":"Since security vulnerabilities represent one of the grand challenges of the Internet of Things (IoT), researchers have proposed what is known as the Internet of Biometric Things (IoBT), which mixes traditional biometric technologies with context-aware authentication techniques. One of the most famous biometric technologies is electronic fingerprint recognition, which acquire fingerprints using different technologies, some of which are more suitable for IoBT than others. Moreover, different fingerprint databases have been built to study the impact of different factors on the accuracy of different fingerprint recognition algorithms and systems. In this paper, we survey the available fingerprint acquisition technologies and the available fingerprint databases. We also identify the advantages and disadvantages of each technology and database.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Metamodeling approach for creating an abstract representation of simulation tools concepts 元建模方法,用于创建仿真工具概念的抽象表示
Bassim Chabibi, A. Anwar, M. Nassar
Models have always been adopted in trades implemented in Systems Engineering (SE). Those models go from concrete representations, such as reduced plans or models, to abstract ones like equations systems. In this context, SysML became an SE standard because of its capabilities of supporting the specification, analysis, design, verification and validation of a broad range of systems and systems-of-systems. However, SysML descriptive models are insufficient to perform system behavior verifications. This lack can be handled by simulation process that allows performing experiments on models to eliminate poor design alternatives, and ensures that a preferred alternative meets the stakeholders' objectives. As design process efficiency is considerably reduced by the fact that both system modeling and simulation tools are often used separately, several research works aim combining and integrating both approaches in a common framework. This paper proposes a study of common constructs, semantics and modeling methodologies of simulation tools on the basis of whom we define a modeling language that we name: Simulation Modeling Language. This latter is aimed to bridge the gap between SysML modeling and various simulation tools.
在系统工程(SE)中实现的交易中总是采用模型。这些模型从具体的表示,如简化的计划或模型,到抽象的表示,如方程组。在这种情况下,SysML成为了一个SE标准,因为它支持广泛的系统和系统的系统的规范、分析、设计、验证和确认的能力。然而,SysML描述性模型不足以执行系统行为验证。这种缺失可以通过模拟过程来处理,该过程允许在模型上执行实验,以消除不良的设计替代方案,并确保首选替代方案满足涉众的目标。由于系统建模和仿真工具经常单独使用,大大降低了设计过程的效率,一些研究工作旨在将这两种方法结合和集成在一个共同的框架中。本文对仿真工具的通用结构、语义和建模方法进行了研究,并在此基础上定义了一种建模语言:仿真建模语言。后者旨在弥合SysML建模和各种仿真工具之间的差距。
{"title":"Metamodeling approach for creating an abstract representation of simulation tools concepts","authors":"Bassim Chabibi, A. Anwar, M. Nassar","doi":"10.1109/AICCSA.2016.7945702","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945702","url":null,"abstract":"Models have always been adopted in trades implemented in Systems Engineering (SE). Those models go from concrete representations, such as reduced plans or models, to abstract ones like equations systems. In this context, SysML became an SE standard because of its capabilities of supporting the specification, analysis, design, verification and validation of a broad range of systems and systems-of-systems. However, SysML descriptive models are insufficient to perform system behavior verifications. This lack can be handled by simulation process that allows performing experiments on models to eliminate poor design alternatives, and ensures that a preferred alternative meets the stakeholders' objectives. As design process efficiency is considerably reduced by the fact that both system modeling and simulation tools are often used separately, several research works aim combining and integrating both approaches in a common framework. This paper proposes a study of common constructs, semantics and modeling methodologies of simulation tools on the basis of whom we define a modeling language that we name: Simulation Modeling Language. This latter is aimed to bridge the gap between SysML modeling and various simulation tools.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hidden Markov Models for feature-level fusion of biometrics on mobile devices 移动设备生物特征融合的隐马尔可夫模型
M. Gofman, S. Mitra, Nicholas Smith
Although biometrics have forayed into the mobile world, most current approaches rely on a single biometric modality. This limits their recognition accuracy in uncontrolled conditions. For example, performance of face and voice recognition systems may suffer in poorly lit and noisy settings, respectively. Integration of identifying information from multiple biometric modalities can help solve this problem; high-quality identifying information in one modality can compensate for the absence of such information in a modality affected by uncontrolled conditions. In this paper, we present a novel multimodal biometric scheme that uses Hidden Markov Models to consolidate data from face and voice biometrics at the feature level. An implementation on the Samsung Galaxy S5 (SG5) phone using a dataset of face and voice samples captured using SG5 in real-world operating conditions, yielded 4.18% and 9.71% higher recognition accuracy than face and voice single-modality systems, respectively.
尽管生物识别技术已经涉足移动世界,但目前大多数方法都依赖于单一的生物识别模式。这限制了它们在非受控条件下的识别准确性。例如,面部和声音识别系统的性能可能分别在光线不足和嘈杂的环境中受到影响。整合来自多种生物识别模式的识别信息可以帮助解决这一问题;一种模态中的高质量识别信息可以弥补受不受控制条件影响的模态中此类信息的缺失。在本文中,我们提出了一种新的多模态生物识别方案,该方案使用隐马尔可夫模型在特征级别整合面部和语音生物识别数据。在三星Galaxy S5 (SG5)手机上使用SG5在真实操作条件下捕获的面部和语音样本数据集实现,识别准确率分别比面部和语音单模态系统高4.18%和9.71%。
{"title":"Hidden Markov Models for feature-level fusion of biometrics on mobile devices","authors":"M. Gofman, S. Mitra, Nicholas Smith","doi":"10.1109/AICCSA.2016.7945755","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945755","url":null,"abstract":"Although biometrics have forayed into the mobile world, most current approaches rely on a single biometric modality. This limits their recognition accuracy in uncontrolled conditions. For example, performance of face and voice recognition systems may suffer in poorly lit and noisy settings, respectively. Integration of identifying information from multiple biometric modalities can help solve this problem; high-quality identifying information in one modality can compensate for the absence of such information in a modality affected by uncontrolled conditions. In this paper, we present a novel multimodal biometric scheme that uses Hidden Markov Models to consolidate data from face and voice biometrics at the feature level. An implementation on the Samsung Galaxy S5 (SG5) phone using a dataset of face and voice samples captured using SG5 in real-world operating conditions, yielded 4.18% and 9.71% higher recognition accuracy than face and voice single-modality systems, respectively.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128487898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Developing Turkish sentiment lexicon for sentiment analysis using online news media 开发土耳其语情感词典,用于在线新闻媒体的情感分析
Fatih Saglam, H. Sever, Burkay Genç
Internet is a very rich resource of documents that need to be analysed to extract their sentimental values. Sentiment Analysis which is a subfield of Natural Language Processing discipline focuses on this issue. The existence of sentiment lexicons in their own language is a very important resource for scientists studying in sentiment analysis field. Since many studies of sentiment analysis have been conducted on text written in English language, developed methods and resources for English may not produce the desired results in other languages. In Turkish, a rich sentiment lexicon does not exists, such as SentiWordNet for English. In this study, we aimed to develop Turkish sentiment lexicon, and we enhanced an existing lexicon which has 27K Turkish words to 37K words. For quantifying the performance of this enhanced lexicon, we tested both lexicons on domain independent news texts. The accuracy of determining the polarity of news written in Turkish has been increased from 60.6% to 72.2%.
互联网是一个非常丰富的文件资源,需要分析以提取其情感价值。情感分析是自然语言处理学科的一个分支领域。母语中情感词汇的存在是情感分析领域科学家研究的重要资源。由于许多情感分析的研究都是针对英语文本进行的,因此针对英语开发的方法和资源在其他语言中可能无法产生预期的结果。在土耳其语中,不存在丰富的情感词典,如英语的SentiWordNet。在本研究中,我们的目标是开发土耳其语情感词汇,我们将一个已有的27K土耳其语词汇扩充到37K。为了量化这个增强的词典的性能,我们在独立于领域的新闻文本上测试了这两个词典。判断土耳其语新闻极性的准确率从60.6%提高到72.2%。
{"title":"Developing Turkish sentiment lexicon for sentiment analysis using online news media","authors":"Fatih Saglam, H. Sever, Burkay Genç","doi":"10.1109/AICCSA.2016.7945670","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945670","url":null,"abstract":"Internet is a very rich resource of documents that need to be analysed to extract their sentimental values. Sentiment Analysis which is a subfield of Natural Language Processing discipline focuses on this issue. The existence of sentiment lexicons in their own language is a very important resource for scientists studying in sentiment analysis field. Since many studies of sentiment analysis have been conducted on text written in English language, developed methods and resources for English may not produce the desired results in other languages. In Turkish, a rich sentiment lexicon does not exists, such as SentiWordNet for English. In this study, we aimed to develop Turkish sentiment lexicon, and we enhanced an existing lexicon which has 27K Turkish words to 37K words. For quantifying the performance of this enhanced lexicon, we tested both lexicons on domain independent news texts. The accuracy of determining the polarity of news written in Turkish has been increased from 60.6% to 72.2%.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134100552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A classification methodology for security patterns to help fix software weaknesses 用于帮助修复软件弱点的安全模式的分类方法
Loukmen Regainia, S. Salva, Cedric Ecuhcurs
Security patterns are generic solutions that can be applied since early stages of software life to overcome recurrent security weaknesses. Their generic nature and growing number make their choice difficult, even for experts in system design. To help them on the pattern choice, this paper proposes a semi-automatic methodology of classification and the classification itself, which exposes relationships among software weaknesses, security principles and security patterns. It expresses which patterns remove a given weakness with respect to the security principles that have to be addressed to fix the weakness. The methodology is based on seven steps, which anatomize patterns and weaknesses into set of more precise sub-properties that are associated through a hierarchical organization of security principles. These steps provide the detailed justifications of the resulting classification and allow its upgrade. Without loss of generality, this classification has been established for Web applications and covers 185 software weaknesses, 26 security patterns and 66 security principles. Research supported by the industrial chair on Digital Confidence (http://confiance-numerique.clermont-universite.fr/index-en.html).
安全模式是通用的解决方案,可以在软件生命周期的早期阶段应用,以克服反复出现的安全弱点。它们的通用性和不断增长的数量使它们的选择变得困难,即使对系统设计专家来说也是如此。为了帮助他们进行模式选择,本文提出了一种半自动的分类方法和分类本身,它揭示了软件弱点、安全原则和安全模式之间的关系。它表示哪些模式可以根据必须解决的安全原则消除给定的弱点。该方法基于七个步骤,这些步骤将模式和弱点分解为一组更精确的子属性,这些子属性通过安全原则的分层组织相关联。这些步骤为所得到的分类提供了详细的理由,并允许对其进行升级。在不失一般性的前提下,为Web应用程序建立了这种分类,涵盖了185个软件弱点、26个安全模式和66个安全原则。由数字信心工业主席支持的研究(http://confiance-numerique.clermont-universite.fr/index-en.html)。
{"title":"A classification methodology for security patterns to help fix software weaknesses","authors":"Loukmen Regainia, S. Salva, Cedric Ecuhcurs","doi":"10.1109/AICCSA.2016.7945693","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945693","url":null,"abstract":"Security patterns are generic solutions that can be applied since early stages of software life to overcome recurrent security weaknesses. Their generic nature and growing number make their choice difficult, even for experts in system design. To help them on the pattern choice, this paper proposes a semi-automatic methodology of classification and the classification itself, which exposes relationships among software weaknesses, security principles and security patterns. It expresses which patterns remove a given weakness with respect to the security principles that have to be addressed to fix the weakness. The methodology is based on seven steps, which anatomize patterns and weaknesses into set of more precise sub-properties that are associated through a hierarchical organization of security principles. These steps provide the detailed justifications of the resulting classification and allow its upgrade. Without loss of generality, this classification has been established for Web applications and covers 185 software weaknesses, 26 security patterns and 66 security principles. Research supported by the industrial chair on Digital Confidence (http://confiance-numerique.clermont-universite.fr/index-en.html).","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An efficient hybrid prediction approach for predicting cloud consumer resource needs 一种用于预测云消费者资源需求的高效混合预测方法
A. Erradi, H. Kholidy
The prediction of cloud consumer resource needs is a vital step for several cloud deployment applications such as capacity planning, workload management, and dynamic allocation of cloud resources. In this paper, we develop a new prediction model for predicting cloud consumer resource needs. The new model uses a new hybrid prediction approach that combines the Multiple Support Vector Regression (MSVR) model and the Autoregressive Integrated Moving Average (ARIMA) model to predict with higher accuracy the resource needs of a cloud consumer in terms of CPU, memory, and disk storage utilization. The new model is also able to predict the response time and throughput which in turn enable the cloud consumers to make a better scaling decision. The new model elucidated a better prediction accuracy than the current prediction models. In terms of CPU utilization prediction, it outperforms the accuracy of the existing cloud consumer prediction models that uses Linear Regression, Neural Network, and Support Vector Machines approaches by 72.66%, 44.24%, and 56.78% respectively according to MAPE and 56.95%, 80.42%, and 63.86% according to RMSE. The analysis, architecture, and experiment results of the new model are discussed in details in this paper.
预测云消费者资源需求对于一些云部署应用程序(如容量规划、工作负载管理和云资源的动态分配)是至关重要的一步。在本文中,我们开发了一个新的预测模型来预测云消费者的资源需求。新模型使用了一种新的混合预测方法,该方法结合了多支持向量回归(MSVR)模型和自回归集成移动平均(ARIMA)模型,以更高的精度预测云用户在CPU、内存和磁盘存储利用率方面的资源需求。新模型还能够预测响应时间和吞吐量,从而使云用户能够做出更好的扩展决策。与现有的预测模型相比,新模型具有更好的预测精度。在CPU利用率预测方面,MAPE和RMSE分别比现有使用线性回归、神经网络和支持向量机方法的云消费者预测模型的准确率分别高出72.66%、44.24%和56.78%和56.95%、80.42%和63.86%。本文详细讨论了新模型的分析、结构和实验结果。
{"title":"An efficient hybrid prediction approach for predicting cloud consumer resource needs","authors":"A. Erradi, H. Kholidy","doi":"10.1109/AICCSA.2016.7945639","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945639","url":null,"abstract":"The prediction of cloud consumer resource needs is a vital step for several cloud deployment applications such as capacity planning, workload management, and dynamic allocation of cloud resources. In this paper, we develop a new prediction model for predicting cloud consumer resource needs. The new model uses a new hybrid prediction approach that combines the Multiple Support Vector Regression (MSVR) model and the Autoregressive Integrated Moving Average (ARIMA) model to predict with higher accuracy the resource needs of a cloud consumer in terms of CPU, memory, and disk storage utilization. The new model is also able to predict the response time and throughput which in turn enable the cloud consumers to make a better scaling decision. The new model elucidated a better prediction accuracy than the current prediction models. In terms of CPU utilization prediction, it outperforms the accuracy of the existing cloud consumer prediction models that uses Linear Regression, Neural Network, and Support Vector Machines approaches by 72.66%, 44.24%, and 56.78% respectively according to MAPE and 56.95%, 80.42%, and 63.86% according to RMSE. The analysis, architecture, and experiment results of the new model are discussed in details in this paper.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121766949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrated sensors system based on IoT and mobile cloud computing 基于物联网和移动云计算的集成传感器系统
Majed AlOtaibi, L. Tawalbeh, Y. Jararweh
The advances in IT sector, cloud computing, the wide usage of sensors and mobile devices, and the Internet-of-Things (IoT) made our world looks like a small town. These rapid developments keep us connected all the day and seven days a week. Also, the IoT enables the connection of the devices around us (including different sensors) to the internet via different wireless and wired communication technologies. These networked sensors can be used to collect different types of data from different applications (healthcare, agriculture, civil and social life) and send it for processing and extraction of appropriate decisions. The mobile cloud computing technology is an efficient solution to process different types of collected data and respond with the required answer in real time situations where the quick response is very important. In this paper, we build a multipurpose integrated sensors system. This integrated system consists of networked sensors for different purposes and applications. For example, the sensors can be health sensors to measure the pulse and blood pressure of patients, or it can be sensors to measure the temperature to indicate a fire accident. The networked sensors will transfer the sensed data through wireless technologies to a Cloud for processing and notifying the listed users to take the proper action.
信息技术(IT)、云计算、传感器和移动设备的广泛使用、物联网(IoT)的发展使我们的世界看起来像一个小镇。这些快速的发展使我们一周7天、每天都联系在一起。此外,物联网使我们周围的设备(包括不同的传感器)通过不同的无线和有线通信技术连接到互联网。这些联网传感器可用于从不同的应用(医疗保健、农业、公民和社会生活)收集不同类型的数据,并将其发送给处理和提取适当的决策。移动云计算技术是一种高效的解决方案,可以处理不同类型的收集数据,并在非常需要快速响应的实时情况下响应所需的答案。在本文中,我们构建了一个多用途集成传感器系统。这个集成系统由不同用途和应用的联网传感器组成。例如,传感器可以是用于测量患者脉搏和血压的健康传感器,也可以是用于测量温度以指示火灾事故的传感器。联网传感器将通过无线技术将感知到的数据传输到云端进行处理,并通知列出的用户采取适当的行动。
{"title":"Integrated sensors system based on IoT and mobile cloud computing","authors":"Majed AlOtaibi, L. Tawalbeh, Y. Jararweh","doi":"10.1109/AICCSA.2016.7945812","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945812","url":null,"abstract":"The advances in IT sector, cloud computing, the wide usage of sensors and mobile devices, and the Internet-of-Things (IoT) made our world looks like a small town. These rapid developments keep us connected all the day and seven days a week. Also, the IoT enables the connection of the devices around us (including different sensors) to the internet via different wireless and wired communication technologies. These networked sensors can be used to collect different types of data from different applications (healthcare, agriculture, civil and social life) and send it for processing and extraction of appropriate decisions. The mobile cloud computing technology is an efficient solution to process different types of collected data and respond with the required answer in real time situations where the quick response is very important. In this paper, we build a multipurpose integrated sensors system. This integrated system consists of networked sensors for different purposes and applications. For example, the sensors can be health sensors to measure the pulse and blood pressure of patients, or it can be sensors to measure the temperature to indicate a fire accident. The networked sensors will transfer the sensed data through wireless technologies to a Cloud for processing and notifying the listed users to take the proper action.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121773117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Mobility support over RPL using sensor nodes speed classification 使用传感器节点速度分类的RPL移动支持
Fatma Somaa, I. Korbi, L. Saïdane
The interest for wireless sensor networks (WSNs) is continuously growing especially with the emergence of applications such as smart grids, smart cities, e-health, etc. where billions of objets (sensors) will be permanently connected to the Internet. In this context, the IPv6 Routing Protocol for Low power and Lossy Networks (RPL) is placed as the routing standard for the next generation multi-hop WSNs. The RPL scheme fits the sensor nodes characteristics since the protocol was originally designed for energy efficiency. Nevertheless, in the case of sensor nodes' movement, RPL poorly adapts to such scenarios which rapidly alters the network performance. In this paper, we investigate the problem of mobility support over RPL. Therefore, we propose a new Sensor Nodes' Speed Classifier (SNSC) to predict the sensor nodes' movement in the network. Then, we exploit the speed values-predicted by the SNSC model-to enhance the behavior of the native RPL in the mobility context. Our modified RPL scheme is called Mobility Prediction based RPL (MP-RPL). To evaluate the performance of MP-RPL, we first validate the SNSC model using the Cooja/Contiki simulation environment. Then, we compare MP-RPL to the native RPL in terms of Packet Loss Rate (PLR) and Packet Delivery Delay (PDD).
对无线传感器网络(wsn)的兴趣不断增长,特别是随着智能电网、智能城市、电子医疗等应用的出现,数十亿物体(传感器)将永久连接到互联网。在这种情况下,IPv6 RPL (Routing Protocol for Low power and Lossy Networks)被作为下一代多跳wsn的路由标准。RPL方案符合传感器节点的特性,因为该协议最初是为了提高能效而设计的。然而,在传感器节点移动的情况下,RPL对这种快速改变网络性能的场景的适应能力较差。本文研究了RPL上的机动性支持问题。因此,我们提出了一种新的传感器节点速度分类器(SNSC)来预测网络中传感器节点的运动。然后,我们利用SNSC模型预测的速度值来增强原生RPL在移动环境中的行为。我们改进的RPL方案被称为基于迁移预测的RPL (MP-RPL)。为了评估MP-RPL的性能,我们首先使用Cooja/Contiki仿真环境验证SNSC模型。然后,我们将MP-RPL与本地RPL在丢包率(PLR)和包传递延迟(PDD)方面进行比较。
{"title":"Mobility support over RPL using sensor nodes speed classification","authors":"Fatma Somaa, I. Korbi, L. Saïdane","doi":"10.1109/AICCSA.2016.7945688","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945688","url":null,"abstract":"The interest for wireless sensor networks (WSNs) is continuously growing especially with the emergence of applications such as smart grids, smart cities, e-health, etc. where billions of objets (sensors) will be permanently connected to the Internet. In this context, the IPv6 Routing Protocol for Low power and Lossy Networks (RPL) is placed as the routing standard for the next generation multi-hop WSNs. The RPL scheme fits the sensor nodes characteristics since the protocol was originally designed for energy efficiency. Nevertheless, in the case of sensor nodes' movement, RPL poorly adapts to such scenarios which rapidly alters the network performance. In this paper, we investigate the problem of mobility support over RPL. Therefore, we propose a new Sensor Nodes' Speed Classifier (SNSC) to predict the sensor nodes' movement in the network. Then, we exploit the speed values-predicted by the SNSC model-to enhance the behavior of the native RPL in the mobility context. Our modified RPL scheme is called Mobility Prediction based RPL (MP-RPL). To evaluate the performance of MP-RPL, we first validate the SNSC model using the Cooja/Contiki simulation environment. Then, we compare MP-RPL to the native RPL in terms of Packet Loss Rate (PLR) and Packet Delivery Delay (PDD).","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127766485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1