首页 > 最新文献

Journal of Internet Technology最新文献

英文 中文
Further Analysis on Smart TV Forensics 智能电视取证的再分析
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-07-01 DOI: 10.3966/160792642018081904009
Minsu Park, Hee-soo Kang, Seungsoo Baek, Seungjoo Kim
Smart devices have become an important part of our life due to improvements in IT technology and corresponding increase in demand for smart devices. In particular, smart TVs represent a convergence of computers and TV and have become popular. Therefore, many researchers conduct smart TV forensics to accurately and seamlessly investigate a suspect’s actions. However, previous works have focused not on critical information, such as viewing history, but on minor information such as web surfing history and system configuration information in smart TVs. To make matters worse, minor information is irrelevant to time or order. Therefore, it is inadequate to use previous methods to investigate and rearrange the order of a suspect’s action. We therefore propose a novel method to obtain time relevant information in smart TVs. We find additional information, such as the list of TV channels that are watched, the last viewing time, recent service history,  information on recently played video and recent camera usage information.
由于IT技术的进步和对智能设备需求的相应增长,智能设备已成为我们生活的重要组成部分。特别是,智能电视代表了计算机和电视的融合,并变得流行起来。因此,许多研究人员进行智能电视取证,以准确无缝地调查嫌疑人的行为。然而,以前的工作并没有关注关键信息,如观看历史,而是关注次要信息,如智能电视中的网络冲浪历史和系统配置信息。更糟糕的是,次要信息与时间或顺序无关。因此,使用以前的方法来调查和重新安排嫌疑人的行动顺序是不够的。因此,我们提出了一种在智能电视中获取时间相关信息的新方法。我们可以找到其他信息,如观看的电视频道列表、上次观看时间、最近的服务历史记录、最近播放的视频信息和最近的相机使用信息。
{"title":"Further Analysis on Smart TV Forensics","authors":"Minsu Park, Hee-soo Kang, Seungsoo Baek, Seungjoo Kim","doi":"10.3966/160792642018081904009","DOIUrl":"https://doi.org/10.3966/160792642018081904009","url":null,"abstract":"Smart devices have become an important part of our life due to improvements in IT technology and corresponding increase in demand for smart devices. In particular, smart TVs represent a convergence of computers and TV and have become popular. Therefore, many researchers conduct smart TV forensics to accurately and seamlessly investigate a suspect’s actions. However, previous works have focused not on critical information, such as viewing history, but on minor information such as web surfing history and system configuration information in smart TVs. To make matters worse, minor information is irrelevant to time or order. Therefore, it is inadequate to use previous methods to investigate and rearrange the order of a suspect’s action. We therefore propose a novel method to obtain time relevant information in smart TVs. We find additional information, such as the list of TV channels that are watched, the last viewing time, recent service history,  information on recently played video and recent camera usage information.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"19 1","pages":"1055-1061"},"PeriodicalIF":1.6,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49065833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Clustering Scheme for Wireless Sensor Networks Based on Genetic Algorithm and Dominating Set 一种基于遗传算法和支配集的无线传感器网络聚类方案
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-07-01 DOI: 10.3966/160792642018081904014
Jeng-Shyang Pan, Lingping Kong, Tien-Wen Sung, Pei-wei Tsai, V. Snás̃el
The basic K-center problem is a fundamental facility location problem. Given n vertices with some distances, one wants to build k facilities in different vertices, so as to minimize the maximum distance from a vertex to its corresponding facility. This problem is known as the NP-hard problem, and grouping sensor nodes into a cluster is an important mechanism in large multi-hop wireless sensor networks for obtaining scalability, reducing energy consumption, and achieving better network performance. This study proposed a new method for solving the K-center problem based on the Genetic algorithm and dominating (GADO) set, and it is called the GADO method for wireless sensor network. An evaluation of the proposed GADO shows a decrease in the number of the centers compared to the well-known Farthest-first traversal method and dominating set only-based methods. Not only is the total distance from the centers to the sink node less than the other two algorithms, but the proposed GADO also diminishes the data delay and increases the lifetime of the centers.
基本的k中心问题是一个基本的设施选址问题。给定n个具有一定距离的顶点,人们希望在不同的顶点上建立k个设施,以便最小化从顶点到其相应设施的最大距离。这个问题被称为np困难问题,在大型多跳无线传感器网络中,将传感器节点分组成集群是获得可扩展性、降低能耗和获得更好网络性能的重要机制。本文提出了一种基于遗传算法和支配集(GADO)的求解k中心问题的新方法,称为无线传感器网络的GADO方法。对所提出的GADO的评估表明,与众所周知的最远优先遍历方法和仅基于支配集的方法相比,该方法的中心数量有所减少。该算法不仅从中心到汇聚节点的总距离小于其他两种算法,而且还减少了数据延迟,增加了中心的生存期。
{"title":"A Clustering Scheme for Wireless Sensor Networks Based on Genetic Algorithm and Dominating Set","authors":"Jeng-Shyang Pan, Lingping Kong, Tien-Wen Sung, Pei-wei Tsai, V. Snás̃el","doi":"10.3966/160792642018081904014","DOIUrl":"https://doi.org/10.3966/160792642018081904014","url":null,"abstract":"The basic K-center problem is a fundamental facility location problem. Given n vertices with some distances, one wants to build k facilities in different vertices, so as to minimize the maximum distance from a vertex to its corresponding facility. This problem is known as the NP-hard problem, and grouping sensor nodes into a cluster is an important mechanism in large multi-hop wireless sensor networks for obtaining scalability, reducing energy consumption, and achieving better network performance. This study proposed a new method for solving the K-center problem based on the Genetic algorithm and dominating (GADO) set, and it is called the GADO method for wireless sensor network. An evaluation of the proposed GADO shows a decrease in the number of the centers compared to the well-known Farthest-first traversal method and dominating set only-based methods. Not only is the total distance from the centers to the sink node less than the other two algorithms, but the proposed GADO also diminishes the data delay and increases the lifetime of the centers.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"19 1","pages":"1111-1118"},"PeriodicalIF":1.6,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42917038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Distributed and Load Adaptive Energy Management Algorithm for Ethernet Green Routers 以太网绿色路由器的分布式和负载自适应能量管理算法
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-05-01 DOI: 10.6138/JIT.2018.19.6.20161017
M. Awad, P. Lin, Gi-Ren Liu
The existing Ethernet networks are designed with high redundancy and over-dimensioning so they can provide reliable services during peak traffic demand periods. However, this has increased the total energy consumption and operational cost. In this paper, we propose an energy saving algorithm (ESA) to reduce the energy consumption of green routers by considering the buffer status and the traffic load. We develop a Network Simulator, version 2, (NS-2)–based simulation model for ESA to evaluate its performance with respect to real traffic traces. Performance bounds of the proposed algorithm are derived. Numerical evaluations are conducted to verify the accuracy of the simulation model against derived bounds. Performance evaluations demonstrate that the proposed algorithm outperforms candidate algorithms, thereby providing greater energy savings with an acceptable packet delay and loss. We show that the introduced delay is bounded by an upper bound that is slightly larger than half of the sleep timer. Furthermore, performance comparisons are extensive and detailed, thus providing insights into the performance of different energy saving functions considered by the candidate algorithms.
现有的以太网采用了高冗余和超大尺寸的设计,可以在流量高峰期提供可靠的服务。然而,这增加了总能耗和运营成本。在本文中,我们提出了一种节能算法(ESA),通过考虑缓冲状态和流量负载来降低绿色路由器的能耗。我们为ESA开发了一个基于网络模拟器版本2 (NS-2)的仿真模型,以评估其在真实流量轨迹方面的性能。推导了该算法的性能边界。通过数值计算验证了仿真模型与推导出的边界的准确性。性能评估表明,所提出的算法优于候选算法,从而在可接受的数据包延迟和丢失的情况下提供更大的节能。我们证明了引入的延迟有一个上界,这个上界略大于睡眠定时器的一半。此外,性能比较是广泛而详细的,从而提供了对候选算法所考虑的不同节能功能的性能的见解。
{"title":"Distributed and Load Adaptive Energy Management Algorithm for Ethernet Green Routers","authors":"M. Awad, P. Lin, Gi-Ren Liu","doi":"10.6138/JIT.2018.19.6.20161017","DOIUrl":"https://doi.org/10.6138/JIT.2018.19.6.20161017","url":null,"abstract":"The existing Ethernet networks are designed with high redundancy and over-dimensioning so they can provide reliable services during peak traffic demand periods. However, this has increased the total energy consumption and operational cost. In this paper, we propose an energy saving algorithm (ESA) to reduce the energy consumption of green routers by considering the buffer status and the traffic load. We develop a Network Simulator, version 2, (NS-2)–based simulation model for ESA to evaluate its performance with respect to real traffic traces. Performance bounds of the proposed algorithm are derived. Numerical evaluations are conducted to verify the accuracy of the simulation model against derived bounds. Performance evaluations demonstrate that the proposed algorithm outperforms candidate algorithms, thereby providing greater energy savings with an acceptable packet delay and loss. We show that the introduced delay is bounded by an upper bound that is slightly larger than half of the sleep timer. Furthermore, performance comparisons are extensive and detailed, thus providing insights into the performance of different energy saving functions considered by the candidate algorithms.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"19 1","pages":"781-794"},"PeriodicalIF":1.6,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48246087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Control of IoT Wireless Networks in Shadowed Fading Channels 阴影衰落信道下物联网无线网络的自适应控制
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-05-01 DOI: 10.3966/160792642018051903025
Minseok Kim, Jong‐Moon Chung
In this paper, a distributed transmission power control (TPC) scheme that jointly addresses the hidden and exposed terminal problem to enhance the spatial reuse and fairness performance of multi-hop wireless networks is proposed. Unlike other previous transmission power control schemes where the two-ray ground reflection (TRG) model is adopted, the proposed scheme is designed based on a log-normal shadowing (LNS) channel model. In addition, transmission power selection strategies to further compensate the influences of shadowing are presented. Results demonstrate that the proposed scheme outperforms the other TPC schemes in terms of spatial reuse and power consumption, resulting in an improved throughput and energy efficiency.
本文提出了一种分布式传输功率控制(TPC)方案,该方案联合解决隐藏和暴露的终端问题,以提高多跳无线网络的空间重用和公平性能。与之前采用两射线地面反射(TRG)模型的其他发射功率控制方案不同,所提出的方案是基于对数正态阴影(LNS)信道模型设计的。此外,还提出了进一步补偿阴影影响的传输功率选择策略。结果表明,该方案在空间重用和功耗方面优于其他TPC方案,从而提高了吞吐量和能效。
{"title":"Adaptive Control of IoT Wireless Networks in Shadowed Fading Channels","authors":"Minseok Kim, Jong‐Moon Chung","doi":"10.3966/160792642018051903025","DOIUrl":"https://doi.org/10.3966/160792642018051903025","url":null,"abstract":"In this paper, a distributed transmission power control (TPC) scheme that jointly addresses the hidden and exposed terminal problem to enhance the spatial reuse and fairness performance of multi-hop wireless networks is proposed. Unlike other previous transmission power control schemes where the two-ray ground reflection (TRG) model is adopted, the proposed scheme is designed based on a log-normal shadowing (LNS) channel model. In addition, transmission power selection strategies to further compensate the influences of shadowing are presented. Results demonstrate that the proposed scheme outperforms the other TPC schemes in terms of spatial reuse and power consumption, resulting in an improved throughput and energy efficiency.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"19 1","pages":"897-904"},"PeriodicalIF":1.6,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45057698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New Security Concurrent Signature Design 新型安全并发签名设计
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-05-01 DOI: 10.6138/JIT.2018.19.6.20160902
S. Liaw, E. Lu, H. Chang, Pin-Chang Su
The rapid growth of the Internet has accelerated e-commerce application development. Numerous problems involving Internet trade transaction security remain. Therefore, security and transaction fairness establishment in e-commerce applications is a crucial research topic. A fair exchange protocol enables users to securely obtain information from each other. This has become a widely applied research topic in e-commerce. A concurrent signature eliminates the need for a trusted third party (TTP) or substantial mutual communication between two parties, to provide fair exchange protocol with e-commerce ideas. The concurrent signature concept was proposed by Chen et al. in 2004 EUROCRYPT. Some researchers improved the concurrent signature susceptibility to the message substitution attack defect, but there are still identify authentication and information exchange procedure security issues. This paper proposes a concurrent signature scheme based on elliptic curve cryptography (ECC) that uses the same security strength shorter key length, reduces public storage costs and the calculation and management risks. We strengthen the identity authentication mechanisms to prevent the counterfeiting identity attacks and provide a more confidential protocol through a self-certified mechanism.
互联网的快速发展加速了电子商务应用的发展。涉及网络贸易交易安全的问题很多。因此,建立电子商务应用中的安全性和交易公平性是一个重要的研究课题。公平的交换协议使用户能够安全地从彼此获取信息。这已经成为电子商务中应用广泛的研究课题。并发签名消除了可信第三方(TTP)或双方之间实质性的相互通信的需要,为电子商务思想提供公平的交换协议。并发签名概念由Chen等人在2004年EUROCRYPT提出。一些研究人员改进了并发签名易受消息替代攻击的缺陷,但仍然存在识别认证和信息交换过程的安全问题。本文提出了一种基于椭圆曲线密码(ECC)的并发签名方案,该方案具有相同的安全强度和较短的密钥长度,降低了公共存储成本和计算管理风险。我们加强身份认证机制,防止伪造身份攻击,并通过自我认证机制提供更机密的协议。
{"title":"New Security Concurrent Signature Design","authors":"S. Liaw, E. Lu, H. Chang, Pin-Chang Su","doi":"10.6138/JIT.2018.19.6.20160902","DOIUrl":"https://doi.org/10.6138/JIT.2018.19.6.20160902","url":null,"abstract":"The rapid growth of the Internet has accelerated e-commerce application development. Numerous problems involving Internet trade transaction security remain. Therefore, security and transaction fairness establishment in e-commerce applications is a crucial research topic. A fair exchange protocol enables users to securely obtain information from each other. This has become a widely applied research topic in e-commerce. A concurrent signature eliminates the need for a trusted third party (TTP) or substantial mutual communication between two parties, to provide fair exchange protocol with e-commerce ideas. The concurrent signature concept was proposed by Chen et al. in 2004 EUROCRYPT. Some researchers improved the concurrent signature susceptibility to the message substitution attack defect, but there are still identify authentication and information exchange procedure security issues. This paper proposes a concurrent signature scheme based on elliptic curve cryptography (ECC) that uses the same security strength shorter key length, reduces public storage costs and the calculation and management risks. We strengthen the identity authentication mechanisms to prevent the counterfeiting identity attacks and provide a more confidential protocol through a self-certified mechanism.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"19 1","pages":"741-751"},"PeriodicalIF":1.6,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42031991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting a self-learning predictor for session-based remote management systems in a large-scale environment 为大规模环境中基于会话的远程管理系统开发自学习预测器
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-05-01 DOI: 10.3966/160792642018051903004
Kuen-Min Lee, Wei-Guang Teng, M. Huang, Chih-Pin Freg, Ting-Wei Hou
Session-based remote management systems, e.g., customer premises equipment (CPE) WAN management protocol (CWMP), have predictable task counts in a session and each CPE only accesses its own data. When the systems are used in large-scale environments, a static load balancing (LB) policy can be applied with fewer session migrations. Nevertheless, unexpected crash events, e.g., software bugs or improper management, would cause the LB policy to be reassigned so as to degrade the system performance. A self-learning predictor (SLP) is thus proposed in this work to predict unexpected crash events and to achieve a better system performance in terms of resource usage and throughput. Specifically, the SLP records and monitors all crash patterns to evaluate the system stability. Moreover, the relation flags and probabilities of all crash patterns are dynamically updated for quick comparisons. If the SLP finds the current pattern is similar to a crash pattern, a migration request is raised to the load balancer to prevent performance degradation caused by the incoming crash. The simulation results indicate that a better system performance is obtained in a large-scale environment with the proposed SLP, especially as the number of servers in each cluster node increases.
基于会话的远程管理系统,例如客户端设备(CPE) WAN管理协议(CWMP),在会话中具有可预测的任务计数,并且每个CPE只访问自己的数据。当系统用于大规模环境时,可以应用静态负载平衡(LB)策略,减少会话迁移。然而,意外的崩溃事件,如软件错误或管理不当,会导致LB策略被重新分配,从而降低系统性能。因此,在这项工作中提出了一个自学习预测器(SLP)来预测意外崩溃事件,并在资源使用和吞吐量方面实现更好的系统性能。具体来说,SLP记录和监视所有崩溃模式,以评估系统稳定性。此外,所有崩溃模式的关系标志和概率都是动态更新的,以便快速比较。如果SLP发现当前模式与崩溃模式相似,则向负载平衡器提出迁移请求,以防止传入的崩溃导致的性能下降。仿真结果表明,在大规模环境下,采用该方法可以获得更好的系统性能,特别是当每个集群节点上的服务器数量增加时。
{"title":"Exploiting a self-learning predictor for session-based remote management systems in a large-scale environment","authors":"Kuen-Min Lee, Wei-Guang Teng, M. Huang, Chih-Pin Freg, Ting-Wei Hou","doi":"10.3966/160792642018051903004","DOIUrl":"https://doi.org/10.3966/160792642018051903004","url":null,"abstract":"Session-based remote management systems, e.g., customer premises equipment (CPE) WAN management protocol (CWMP), have predictable task counts in a session and each CPE only accesses its own data. When the systems are used in large-scale environments, a static load balancing (LB) policy can be applied with fewer session migrations. Nevertheless, unexpected crash events, e.g., software bugs or improper management, would cause the LB policy to be reassigned so as to degrade the system performance. A self-learning predictor (SLP) is thus proposed in this work to predict unexpected crash events and to achieve a better system performance in terms of resource usage and throughput. Specifically, the SLP records and monitors all crash patterns to evaluate the system stability. Moreover, the relation flags and probabilities of all crash patterns are dynamically updated for quick comparisons. If the SLP finds the current pattern is similar to a crash pattern, a migration request is raised to the load balancer to prevent performance degradation caused by the incoming crash. The simulation results indicate that a better system performance is obtained in a large-scale environment with the proposed SLP, especially as the number of servers in each cluster node increases.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"19 1","pages":"657-668"},"PeriodicalIF":1.6,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47031550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Two-Level Intelligent Web Caching Scheme with a Hybrid Extreme Learning Machine and Least Frequently Used 具有混合极限学习机和最少使用次数的两级智能Web缓存方案
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-05-01 DOI: 10.6138/JIT.2018.19.6.20160623
Phet Imtongkhum, C. So-In, S. Sanguanpong, Songyut Phoemphon
The immense increase in data traffic has created several issues for the Internet community, including long delays and low throughput. Most Internet user activity occurs via web access, thus making it a major source of Internet traffic. Due to a lack of effective management schemes, Internet usage is inefficient. Advances in caching mechanisms have led to the introduction of web proxies that have improved real-time communication and cost savings. Although several traditional caching polices have been implemented to increase speed and simplicity, cache replacement accuracy remains a key limitation due to cache storage constraints. Our contribution concerns the algorithmic investigation of intelligent soft computing schemes to enhance a web proxy system to improve precision for reproducibility. This research also proposes a two-level caching scheme; the first level is least frequently used (LFU), and an extreme learning machine (ELM) is used for the second level. A traditional ELM for web caching is further optimized with object similarity factors. The proposed scheme is evaluated and compared to a traditional caching policy and its integration with intelligent caching using a well-known dataset from IRCache. The method is shown to achieve good performance in terms of high hit and byte hit rates.
数据流量的巨大增长给互联网社区带来了一些问题,包括长延迟和低吞吐量。大多数互联网用户活动都是通过网络访问进行的,因此成为互联网流量的主要来源。由于缺乏有效的管理方案,互联网使用效率低下。缓存机制的进步导致了web代理的引入,它改进了实时通信并节省了成本。尽管已经实现了几种传统的缓存策略来提高速度和简单性,但由于缓存存储的限制,缓存替换的准确性仍然是一个关键限制。我们的贡献涉及智能软计算方案的算法研究,以增强web代理系统,从而提高再现性的精度。本研究还提出了一种两级缓存方案;第一级别是最不频繁使用的(LFU),而极限学习机(ELM)用于第二级别。利用对象相似性因子进一步优化了用于web缓存的传统ELM。使用IRCache的知名数据集,对所提出的方案进行了评估,并将其与传统缓存策略及其与智能缓存的集成进行了比较。该方法在高命中率和字节命中率方面实现了良好的性能。
{"title":"A Two-Level Intelligent Web Caching Scheme with a Hybrid Extreme Learning Machine and Least Frequently Used","authors":"Phet Imtongkhum, C. So-In, S. Sanguanpong, Songyut Phoemphon","doi":"10.6138/JIT.2018.19.6.20160623","DOIUrl":"https://doi.org/10.6138/JIT.2018.19.6.20160623","url":null,"abstract":"The immense increase in data traffic has created several issues for the Internet community, including long delays and low throughput. Most Internet user activity occurs via web access, thus making it a major source of Internet traffic. Due to a lack of effective management schemes, Internet usage is inefficient. Advances in caching mechanisms have led to the introduction of web proxies that have improved real-time communication and cost savings. Although several traditional caching polices have been implemented to increase speed and simplicity, cache replacement accuracy remains a key limitation due to cache storage constraints. Our contribution concerns the algorithmic investigation of intelligent soft computing schemes to enhance a web proxy system to improve precision for reproducibility. This research also proposes a two-level caching scheme; the first level is least frequently used (LFU), and an extreme learning machine (ELM) is used for the second level. A traditional ELM for web caching is further optimized with object similarity factors. The proposed scheme is evaluated and compared to a traditional caching policy and its integration with intelligent caching using a well-known dataset from IRCache. The method is shown to achieve good performance in terms of high hit and byte hit rates.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"19 1","pages":"725-740"},"PeriodicalIF":1.6,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42232492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Bandwidth-Efficient MAC Scheme for Mission-Critical Applications in Industrial Wireless Sensor Networks 一种用于工业无线传感器网络关键任务应用的带宽高效MAC方案
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-05-01 DOI: 10.3966/160792642018051903015
Hongchao Wang, Jian Ma, Youzhi Xu, Dong Yang, Hongke Zhang
Industrial wireless sensor networks (IWSNs) have the potential to contribute significantly to a variety of wireless sensing endpoints, such as cable replacement, mobility, flexibility and cost reduction. However, the harsh and varied industrial environment entails addressing severe challenges, such as dust, heat, electromagnetic interference (EMI) and radio frequency interference from the other heterogeneous networks. One of the important challenges is the link burstiness in industrial wireless environments, which has not been heavily researched. In this paper, we propose a new timeslot scheduling algorithm to address this problem. The algorithm allows transmissions on the same link to be separated at least by a minimum timeslot distance. Moreover, to provide a synergistic complement to the timeslot scheduling, we also propose a timeslot reuse scheme, which facilitates improved efficiency and reliability in the bandwidth utilization and retransmission and decreases the average delay of the packet arrival. We evaluate the proposed algorithm and scheme by a real implementation, targeting a specific industrial application. The experimental results generally indicate that the proposed media access control (MAC) scheme greatly improves the reliability and decreases the packet arrival delay. Compared with the existing popular methods, the execution of our scheme indicates a minimal link burstiness influence and possesses more efficient bandwidth utilization.
工业无线传感器网络(IWSN)有可能为各种无线传感端点做出重大贡献,如电缆更换、移动性、灵活性和成本降低。然而,恶劣多变的工业环境需要应对严峻的挑战,如灰尘、热量、电磁干扰(EMI)和来自其他异构网络的射频干扰。一个重要的挑战是工业无线环境中的链路突发性,这一问题尚未得到深入研究。在本文中,我们提出了一种新的时隙调度算法来解决这个问题。该算法允许同一链路上的传输至少相隔最小时隙距离。此外,为了给时隙调度提供协同补充,我们还提出了一种时隙重用方案,该方案有助于提高带宽利用和重传的效率和可靠性,并降低数据包到达的平均延迟。我们针对具体的工业应用,通过实际实现对所提出的算法和方案进行了评估。实验结果表明,所提出的媒体访问控制(MAC)方案大大提高了可靠性,降低了分组到达延迟。与现有的流行方法相比,该方案的执行表明链路突发性影响最小,并且具有更有效的带宽利用率。
{"title":"A Bandwidth-Efficient MAC Scheme for Mission-Critical Applications in Industrial Wireless Sensor Networks","authors":"Hongchao Wang, Jian Ma, Youzhi Xu, Dong Yang, Hongke Zhang","doi":"10.3966/160792642018051903015","DOIUrl":"https://doi.org/10.3966/160792642018051903015","url":null,"abstract":"Industrial wireless sensor networks (IWSNs) have the potential to contribute significantly to a variety of wireless sensing endpoints, such as cable replacement, mobility, flexibility and cost reduction. However, the harsh and varied industrial environment entails addressing severe challenges, such as dust, heat, electromagnetic interference (EMI) and radio frequency interference from the other heterogeneous networks. One of the important challenges is the link burstiness in industrial wireless environments, which has not been heavily researched. In this paper, we propose a new timeslot scheduling algorithm to address this problem. The algorithm allows transmissions on the same link to be separated at least by a minimum timeslot distance. Moreover, to provide a synergistic complement to the timeslot scheduling, we also propose a timeslot reuse scheme, which facilitates improved efficiency and reliability in the bandwidth utilization and retransmission and decreases the average delay of the packet arrival. We evaluate the proposed algorithm and scheme by a real implementation, targeting a specific industrial application. The experimental results generally indicate that the proposed media access control (MAC) scheme greatly improves the reliability and decreases the packet arrival delay. Compared with the existing popular methods, the execution of our scheme indicates a minimal link burstiness influence and possesses more efficient bandwidth utilization.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"19 1","pages":"795-805"},"PeriodicalIF":1.6,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46760692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GRDR: A Novel Data Gathering and Dissemination Scheme for WSNs GRDR:一种新的无线传感器网络数据收集和分发方案
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-03-01 DOI: 10.6138/JIT.2018.19.4.20160427
Jinhuan Zhang, J. Long, Anfeng Liu, Guihu Zhao
Data gathering and dissemination is a key issue for WSNs. Data collection should take energy efficient, reliability as well as delay into consideration. To address these problems, a novel reproduction packets routing scheme named Green, Reliability and Delay based Route (GRDR) is proposed. The GRDR scheme integrates three core phases, namely, packets reproduction, direction dispersity and multi-route. The key idea of the GRDR is to generate different number of new packet copies after certain steps according to the distance to sink, thus obviating the energy efficiency and latency minimizing for data collection. We formulate the optimization problem as to maximize lifetime under end-to-end delay and given reliability constraints by controlling the system parameters. To demonstrate the effectiveness of the scheme, we conduct extensive theoretical analysis and simulations to evaluate the performance of GRDR. The analysis and simulations show that GRDR is more energy efficient and lower delay than the existing scheme.
数据的采集和传播是无线传感器网络的关键问题。数据收集应考虑到节能、可靠和延迟。为了解决这些问题,提出了一种新的基于绿色、可靠性和延迟路由(GRDR)的复制分组路由方案。GRDR方案集成了报文复制、方向分散和多路由三个核心阶段。GRDR的核心思想是根据到sink的距离,在一定的步骤后生成不同数量的新数据包副本,从而实现数据收集的能量效率和延迟最小化。我们通过控制系统参数,将优化问题表述为在端到端延迟和给定可靠性约束下,使系统寿命最大化。为了证明该方案的有效性,我们进行了广泛的理论分析和仿真来评估GRDR的性能。分析和仿真结果表明,与现有方案相比,GRDR方案具有更高的能效和更低的时延。
{"title":"GRDR: A Novel Data Gathering and Dissemination Scheme for WSNs","authors":"Jinhuan Zhang, J. Long, Anfeng Liu, Guihu Zhao","doi":"10.6138/JIT.2018.19.4.20160427","DOIUrl":"https://doi.org/10.6138/JIT.2018.19.4.20160427","url":null,"abstract":"Data gathering and dissemination is a key issue for WSNs. Data collection should take energy efficient, reliability as well as delay into consideration. To address these problems, a novel reproduction packets routing scheme named Green, Reliability and Delay based Route (GRDR) is proposed. The GRDR scheme integrates three core phases, namely, packets reproduction, direction dispersity and multi-route. The key idea of the GRDR is to generate different number of new packet copies after certain steps according to the distance to sink, thus obviating the energy efficiency and latency minimizing for data collection. We formulate the optimization problem as to maximize lifetime under end-to-end delay and given reliability constraints by controlling the system parameters. To demonstrate the effectiveness of the scheme, we conduct extensive theoretical analysis and simulations to evaluate the performance of GRDR. The analysis and simulations show that GRDR is more energy efficient and lower delay than the existing scheme.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"19 1","pages":"425-438"},"PeriodicalIF":1.6,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48077715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying Queueing Theory for the Optimization of a Banking Model 应用排队理论优化银行模型
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-03-01 DOI: 10.6138/JIT.2018.19.3.20160426
K. Cowdrey, J. D. Lange, R. Malekian, Johan Wanneburg, A. Jose
The purpose of this paper is to investigate waiting times at banking firms to design a system to optimise the overall banking experience. Queueing analysis and queuing theory will be investigated and applied in order to improve customer experience whilst maximising profits. Different queueing strategies will be implemented using waiting time as a performance measurement. In order to find the most efficient solution the following queuing methods will be investigated: First in First out (FIFO), Last in First out (LIFO), Shortest Job First (SJF), Longest Job First (LJF), most profitable job first and priority queues. After investigation, design and simulation, queuing strategies will be implemented on a real world banking scenario whilst introducing banking traffic at different times of the day as well as disturbances such as tellers going offline. A practical design includes a Field Programmable Gate Array (FPGA) in order to simulate the banking scenario. The FPGA approach will provide a mobile solution for the optimization of queueing in a banking firm which could later be implemented in a banking firm for a better banking experience. Based on results obtained, the SJF method produces the best customer satisfaction, whilst most profitable job first queues maximizes profits.
本文的目的是调查银行公司的等待时间,以设计一个系统来优化整体银行体验。排队分析和排队理论将被调查和应用,以改善客户体验,同时最大化利润。将使用等待时间作为性能度量来实现不同的排队策略。为了找到最有效的解决方案,将研究以下排队方法:先进先出(FIFO),后进先出(LIFO),最短作业优先(SJF),最长作业优先(LJF),最有利可图的作业优先和优先级队列。经过调查,设计和模拟,排队策略将在现实世界的银行场景中实施,同时引入一天中不同时间的银行流量以及出纳员离线等干扰。一个实际的设计包括一个现场可编程门阵列(FPGA)来模拟银行场景。FPGA方法将为银行公司的排队优化提供一个移动解决方案,该解决方案可以稍后在银行公司中实施,以获得更好的银行体验。根据所获得的结果,SJF方法产生最佳的客户满意度,而最有利可图的作业优先队列使利润最大化。
{"title":"Applying Queueing Theory for the Optimization of a Banking Model","authors":"K. Cowdrey, J. D. Lange, R. Malekian, Johan Wanneburg, A. Jose","doi":"10.6138/JIT.2018.19.3.20160426","DOIUrl":"https://doi.org/10.6138/JIT.2018.19.3.20160426","url":null,"abstract":"The purpose of this paper is to investigate waiting times at banking firms to design a system to optimise the overall banking experience. Queueing analysis and queuing theory will be investigated and applied in order to improve customer experience whilst maximising profits. Different queueing strategies will be implemented using waiting time as a performance measurement. In order to find the most efficient solution the following queuing methods will be investigated: First in First out (FIFO), Last in First out (LIFO), Shortest Job First (SJF), Longest Job First (LJF), most profitable job first and priority queues. After investigation, design and simulation, queuing strategies will be implemented on a real world banking scenario whilst introducing banking traffic at different times of the day as well as disturbances such as tellers going offline. A practical design includes a Field Programmable Gate Array (FPGA) in order to simulate the banking scenario. The FPGA approach will provide a mobile solution for the optimization of queueing in a banking firm which could later be implemented in a banking firm for a better banking experience. Based on results obtained, the SJF method produces the best customer satisfaction, whilst most profitable job first queues maximizes profits.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"19 1","pages":"381-389"},"PeriodicalIF":1.6,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41868778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Journal of Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1