首页 > 最新文献

2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)最新文献

英文 中文
Reliable web services approaches of Mobile Cloud Computing: A comparative study 移动云计算的可靠web服务方法:比较研究
Amr S. Abdelfattah, T. Abdelkader, El-Sayed M. El-Horbaty
The Mobile intermittent wireless connectivity limits the evolution of the mobile landscape, such that this progress coupled with the ubiquitous nature of the Internet and the web services. The web service Reliability achieves the low overhead communication and retrieves the appropriate state response from the web service consumption. This paper discusses and analyzes the most recent approaches that achieve the reliability of web services consumed by mobile devices. Achieving the reliable web service consumption is tended to two approaches: Middleware approach and Mobile Agent (MA) approach. Both of them focus on ensuring the request execution under the communication limitations and services temporary unavailability.
移动断断续续的无线连接限制了移动领域的发展,使得这种发展与无处不在的互联网和网络服务相结合。web服务可靠性实现了低开销的通信,并从web服务消费中检索适当的状态响应。本文讨论并分析了实现移动设备所使用的web服务可靠性的最新方法。实现可靠的web服务消费倾向于两种方法:中间件方法和移动代理(MA)方法。它们都关注在通信限制和服务暂时不可用的情况下,保证请求的执行。
{"title":"Reliable web services approaches of Mobile Cloud Computing: A comparative study","authors":"Amr S. Abdelfattah, T. Abdelkader, El-Sayed M. El-Horbaty","doi":"10.1109/IntelCIS.2015.7397224","DOIUrl":"https://doi.org/10.1109/IntelCIS.2015.7397224","url":null,"abstract":"The Mobile intermittent wireless connectivity limits the evolution of the mobile landscape, such that this progress coupled with the ubiquitous nature of the Internet and the web services. The web service Reliability achieves the low overhead communication and retrieves the appropriate state response from the web service consumption. This paper discusses and analyzes the most recent approaches that achieve the reliability of web services consumed by mobile devices. Achieving the reliable web service consumption is tended to two approaches: Middleware approach and Mobile Agent (MA) approach. Both of them focus on ensuring the request execution under the communication limitations and services temporary unavailability.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"52 1","pages":"217-223"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90821391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of the relationship between Saudi twitter posts and the Saudi stock market 分析沙特twitter帖子与沙特股市之间的关系
Hamed Al-Rubaiee, Renxi Qiu, Dayou Li
Sentiment analysis has become the heart of social media research and many studies have been applied to obtain users' opinion in fields such as electronic commerce and trade, management and also regarding political figures. Social media has recently become a rich resource in mining user sentiments. Social opinion has been analysed using sentiment analysis and some studies show that sentiment analysis of news, documents, quarterly reports, and blogs can be used as part of trading strategies. In this paper, Twitter has been chosen as a platform for opinion mining in trading strategy with the Saudi stock market in order to carry out and illustrate the relationship between Saudi tweets (that is standard and Arabian Gulf dialects) and the Saudi market index. To the best of our knowledge, this is the first study performed on Saudi tweets and the Saudi stock market.
情感分析已经成为社交媒体研究的核心,在电子商务和贸易、管理以及政治人物等领域,许多研究都被应用于获取用户的意见。社交媒体最近成为挖掘用户情感的丰富资源。社会舆论已经使用情绪分析进行分析,一些研究表明,新闻,文件,季度报告和博客的情绪分析可以用作交易策略的一部分。在本文中,选择Twitter作为与沙特股票市场交易策略的意见挖掘平台,以执行和说明沙特推文(即标准和阿拉伯海湾方言)与沙特市场指数之间的关系。据我们所知,这是第一次对沙特的推文和沙特股市进行研究。
{"title":"Analysis of the relationship between Saudi twitter posts and the Saudi stock market","authors":"Hamed Al-Rubaiee, Renxi Qiu, Dayou Li","doi":"10.1109/INTELCIS.2015.7397193","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397193","url":null,"abstract":"Sentiment analysis has become the heart of social media research and many studies have been applied to obtain users' opinion in fields such as electronic commerce and trade, management and also regarding political figures. Social media has recently become a rich resource in mining user sentiments. Social opinion has been analysed using sentiment analysis and some studies show that sentiment analysis of news, documents, quarterly reports, and blogs can be used as part of trading strategies. In this paper, Twitter has been chosen as a platform for opinion mining in trading strategy with the Saudi stock market in order to carry out and illustrate the relationship between Saudi tweets (that is standard and Arabian Gulf dialects) and the Saudi market index. To the best of our knowledge, this is the first study performed on Saudi tweets and the Saudi stock market.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"42 1","pages":"660-665"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86612699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
New trends of resource provisioning in multi-tier Cloud computing 多层云计算中资源配置的新趋势
Marwah Hashim Eawna, Salma Hamdy, El-Sayed M. El-Horbaty
Cloud Computing is an emerging trend in the outsourced information technology (OIT) and provides a lot of functions as services. However, it suffers from many challenges such as resource provisioning, integrity, federation, and security. This paper focuses on the major problem, resource provisioning, that explored by many companies and researchers as a critical problem. Such researches are attempted to find method that minimizes provisioning time and reduces the number of resources in the cloud environment. Consequently, this paper proposes a dynamic resources provisioning algorithm by using Artificial Bees Colony (ABC) and Ant Colony Optimization (ACO) and focus on time optimization in multi-tier clouds. Accordingly, the obtained results show that the ACO faster than other meta-heuristic algorithm such as ABC, Particle Swarm Optimization (PSO), Simulated Annealing (SA) and hybrid Particle Swarm Optimization-Simulated Annealing (PSO-SA).
云计算是外包信息技术(OIT)的一个新兴趋势,它以服务的形式提供了许多功能。然而,它面临着许多挑战,例如资源供应、完整性、联合和安全性。本文重点讨论了许多公司和研究人员都在探讨的一个关键问题——资源配置问题。这些研究试图找到最小化配置时间和减少云环境中资源数量的方法。为此,本文提出了一种基于人工蜂群(Artificial Bees Colony, ABC)和蚁群算法(Ant Colony Optimization, ACO)的动态资源分配算法,并重点研究了多层云环境下的时间优化问题。结果表明,蚁群优化算法比ABC、粒子群优化算法(PSO)、模拟退火算法(SA)和粒子群优化-模拟退火混合算法(PSO-SA)的求解速度更快。
{"title":"New trends of resource provisioning in multi-tier Cloud computing","authors":"Marwah Hashim Eawna, Salma Hamdy, El-Sayed M. El-Horbaty","doi":"10.1109/INTELCIS.2015.7397226","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397226","url":null,"abstract":"Cloud Computing is an emerging trend in the outsourced information technology (OIT) and provides a lot of functions as services. However, it suffers from many challenges such as resource provisioning, integrity, federation, and security. This paper focuses on the major problem, resource provisioning, that explored by many companies and researchers as a critical problem. Such researches are attempted to find method that minimizes provisioning time and reduces the number of resources in the cloud environment. Consequently, this paper proposes a dynamic resources provisioning algorithm by using Artificial Bees Colony (ABC) and Ant Colony Optimization (ACO) and focus on time optimization in multi-tier clouds. Accordingly, the obtained results show that the ACO faster than other meta-heuristic algorithm such as ABC, Particle Swarm Optimization (PSO), Simulated Annealing (SA) and hybrid Particle Swarm Optimization-Simulated Annealing (PSO-SA).","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"21 1","pages":"224-230"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75995607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on trajectory similarity measures 轨迹相似性测度综述
Nehal Magdy, M. Sakr, T. Mostafa, Khaled El-Bahnasy
The availability of devices that can be used to track moving objects has increased dramatically leading to a great growth in movement data from almost every application domain. Therefore, there has been an increasing interest in proposing new methodologies for indexing, classifying, clustering, querying and measuring similarity between moving objects' data. One of the main functions for a wide range of application domains is to measure the similarity between two moving objects' trajectories. In this paper, we present a comparative study between widely used trajectory similarity measures observing the advantages and disadvantages of these measures.
可用于跟踪移动对象的设备的可用性急剧增加,导致几乎每个应用领域的移动数据都有很大的增长。因此,人们对提出索引、分类、聚类、查询和测量移动对象数据之间相似性的新方法越来越感兴趣。在广泛的应用领域中,测量两个运动物体轨迹之间的相似性是主要功能之一。在本文中,我们对广泛使用的轨迹相似度量进行了比较研究,观察了这些度量的优缺点。
{"title":"Review on trajectory similarity measures","authors":"Nehal Magdy, M. Sakr, T. Mostafa, Khaled El-Bahnasy","doi":"10.1109/INTELCIS.2015.7397286","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397286","url":null,"abstract":"The availability of devices that can be used to track moving objects has increased dramatically leading to a great growth in movement data from almost every application domain. Therefore, there has been an increasing interest in proposing new methodologies for indexing, classifying, clustering, querying and measuring similarity between moving objects' data. One of the main functions for a wide range of application domains is to measure the similarity between two moving objects' trajectories. In this paper, we present a comparative study between widely used trajectory similarity measures observing the advantages and disadvantages of these measures.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"32 1","pages":"613-619"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91522716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
A novel adaptive learning management system using ontology 一种基于本体的自适应学习管理系统
S. M. Nafea, L. Maglaras, F. Siewe, M. E. Shehab
The success of web technologies has prompted a developing consideration on e-learning activities. Notwithstanding, most current e-Learning systems give static web-based learning with the goal that learners get to the same learning contents through the web, regardless of individual learners profiles. These learners may have altogether different learning foundations, information levels, learning styles, and capacities. The `one size fit all' in an e-Learning frameworks is unmistakably a commonplace issue. To defeat this impediment and build powerful learning, versatile and customized learning is as of now a dynamic examination range. This paper propose a novel approach for designing and implementing adaptive learning management system based on ontology and semantic web technologies by offering a tailored model which represents the different activities that should be completed by learner. It offers a framework that is based on both learning styles and ontology to address the impact of student behavior.
网络技术的成功促使人们对电子学习活动的思考不断发展。尽管如此,大多数当前的电子学习系统提供静态的基于网络的学习,其目标是学习者通过网络获得相同的学习内容,而不考虑个人学习者的概况。这些学习者可能有完全不同的学习基础、信息水平、学习风格和能力。电子学习框架中的“一刀切”无疑是一个老生常谈的问题。为了克服这一障碍,建立强大的学习,多功能和定制学习是目前一个动态的考试范围。本文提出了一种基于本体和语义web技术的自适应学习管理系统设计与实现的新方法,该方法通过定制模型来表示学习者应该完成的不同活动。它提供了一个基于学习风格和本体的框架来解决学生行为的影响。
{"title":"A novel adaptive learning management system using ontology","authors":"S. M. Nafea, L. Maglaras, F. Siewe, M. E. Shehab","doi":"10.1109/INTELCIS.2015.7397242","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397242","url":null,"abstract":"The success of web technologies has prompted a developing consideration on e-learning activities. Notwithstanding, most current e-Learning systems give static web-based learning with the goal that learners get to the same learning contents through the web, regardless of individual learners profiles. These learners may have altogether different learning foundations, information levels, learning styles, and capacities. The `one size fit all' in an e-Learning frameworks is unmistakably a commonplace issue. To defeat this impediment and build powerful learning, versatile and customized learning is as of now a dynamic examination range. This paper propose a novel approach for designing and implementing adaptive learning management system based on ontology and semantic web technologies by offering a tailored model which represents the different activities that should be completed by learner. It offers a framework that is based on both learning styles and ontology to address the impact of student behavior.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"11 1","pages":"328-335"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87062705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Perspectives on M2M protocols M2M协议的观点
Mohamed H. Elgazzar
In the last years, the Machine-to-Machine (M2M) communications evolved as one of the major trends shaping the development of services in the future Internet. The use of M2M technologies is rapidly increasing in different fields such as Health Care, Automotive, Energy, Consumer Electronics, manufacturing, security and Banking. With that rapid increase different protocols had been developed for M2M communications and device management such as CoAP, MQTT and LwM2M. The objective of the paper is to provide synopsis of the different M2M protocols. The paper discusses the pros and cons of each of the protocols and identify their open problems. Up to our knowledge, it is the first study to provide such comparison between the different M2M protocol. The comparison is based on supported functions, network overhead, network reliability and security beside highlighting the different protocol architectures. The paper works as a start point for producing efficient M2M protocols.
在过去的几年中,机器对机器(M2M)通信发展成为塑造未来互联网服务发展的主要趋势之一。M2M技术在医疗保健、汽车、能源、消费电子、制造、安全和银行等不同领域的应用正在迅速增加。随着这种快速增长,为M2M通信和设备管理开发了不同的协议,如CoAP、MQTT和LwM2M。本文的目的是提供不同的M2M协议的概要。本文讨论了每种协议的优缺点,并确定了它们存在的问题。据我们所知,这是第一个在不同的M2M协议之间提供这种比较的研究。除了突出不同的协议架构外,还基于支持的功能、网络开销、网络可靠性和安全性进行比较。本文作为生成高效M2M协议的起点。
{"title":"Perspectives on M2M protocols","authors":"Mohamed H. Elgazzar","doi":"10.1109/INTELCIS.2015.7397267","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397267","url":null,"abstract":"In the last years, the Machine-to-Machine (M2M) communications evolved as one of the major trends shaping the development of services in the future Internet. The use of M2M technologies is rapidly increasing in different fields such as Health Care, Automotive, Energy, Consumer Electronics, manufacturing, security and Banking. With that rapid increase different protocols had been developed for M2M communications and device management such as CoAP, MQTT and LwM2M. The objective of the paper is to provide synopsis of the different M2M protocols. The paper discusses the pros and cons of each of the protocols and identify their open problems. Up to our knowledge, it is the first study to provide such comparison between the different M2M protocol. The comparison is based on supported functions, network overhead, network reliability and security beside highlighting the different protocol architectures. The paper works as a start point for producing efficient M2M protocols.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"501-505"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88942498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Efficient breast cancer detection using sequential feature selection techniques 使用序列特征选择技术的高效乳腺癌检测
Taha M. Mohamed
Breast cancer is one of the most dangerous cancers in the world especially in the Arab countries and Egypt. Due to the large spreading of the disease, automatic recognition systems can help physicians to classify the tumors as benign or malignant. However, performing a lot of pathological analysis consumes time and money. In this paper, we propose an algorithm for decreasing the number of features required to detect the tumor. Two classifiers are chosen to test the classification accuracy; linear and quadratic. The experimental results show that, there are strong correlations between the features in the data set. When using the sequential feature selection algorithm, results show that, discarding more than 50% of the features has no significant loss on classification accuracy when using the quadratic discriminate classifier. Additionally, only four PCA components can be used with the same accuracy as using nine components when being classified by the linear discriminate classifier. Additionally, the outliers in the data set have no notable effect on the classification accuracy. The data set is proved to be homogenous using the k-means clustering algorithm.
乳腺癌是世界上最危险的癌症之一,尤其是在阿拉伯国家和埃及。由于这种疾病的广泛传播,自动识别系统可以帮助医生将肿瘤分类为良性或恶性。然而,进行大量的病理分析需要耗费时间和金钱。在本文中,我们提出了一种算法来减少检测肿瘤所需的特征数量。选择两种分类器来测试分类精度;线性的和二次的。实验结果表明,数据集中的特征之间存在很强的相关性。当使用顺序特征选择算法时,结果表明,使用二次判别分类器时,丢弃50%以上的特征对分类精度没有明显损失。此外,当被线性判别分类器分类时,仅使用四个PCA分量就可以获得与使用九个分量相同的精度。此外,数据集中的异常值对分类精度没有显著影响。利用k均值聚类算法证明了数据集是齐次的。
{"title":"Efficient breast cancer detection using sequential feature selection techniques","authors":"Taha M. Mohamed","doi":"10.1109/INTELCIS.2015.7397261","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397261","url":null,"abstract":"Breast cancer is one of the most dangerous cancers in the world especially in the Arab countries and Egypt. Due to the large spreading of the disease, automatic recognition systems can help physicians to classify the tumors as benign or malignant. However, performing a lot of pathological analysis consumes time and money. In this paper, we propose an algorithm for decreasing the number of features required to detect the tumor. Two classifiers are chosen to test the classification accuracy; linear and quadratic. The experimental results show that, there are strong correlations between the features in the data set. When using the sequential feature selection algorithm, results show that, discarding more than 50% of the features has no significant loss on classification accuracy when using the quadratic discriminate classifier. Additionally, only four PCA components can be used with the same accuracy as using nine components when being classified by the linear discriminate classifier. Additionally, the outliers in the data set have no notable effect on the classification accuracy. The data set is proved to be homogenous using the k-means clustering algorithm.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"11 1","pages":"458-464"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86139010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An optimized scheme for vertical fragmentation, allocation and replication of a distributed database 分布式数据库垂直分片、分配和复制的优化方案
Ahmed E. Abdel Raouf, N. Badr, M. Tolba
Distributed databases have become the most essential technology for recent business organizations. One of the main issues of the distributed database management system (DDBMS) is the distributed database design. The performance and efficiency of a distributed database design largely depend on the fragmentation of global relations. It also depends on the allocation and replication of those fragments to several sites of the network. Earlier approaches suggest vertical fragmentation solutions based on the frequency of the user queries. However, these approaches have the limitation of higher complexity and availability of the frequency of user queries at the initial stage of the database design, iterative binary partitioning in case of n-ary partitioning which will increase the complexity and predetermined threshold value that is used to enhance the results, as well as the problem of more computation. Consequently in this paper, we present a vertical fragmentation, allocation and replication scheme of a distributed database called (VFAR). The proposed scheme partitions the distributed database relations vertically at the initial stage of distributed database design, without the need for the frequency of user queries which are not available at this stage. It also allocates and replicates the resulted fragments to the sites of the distributed database, using manipulates and read operations of each site to each fragment. Experimental results showed that firstly; the proposed scheme reduces the overheads and the complexity of complicated computations of previous vertical partitioning approaches. Secondly, it solves the problem of the frequency of the user queries that are not available at the initial stage. Thirdly, it solves the problem of iterative binary partitioning in the case of n-ary partitioning by generating all fragments of one iteration. Finally, it gets the optimal results without the need to determine a threshold value that is used to enhance the results.
分布式数据库已经成为当今商业组织最基本的技术。分布式数据库管理系统(DDBMS)的主要问题之一是分布式数据库的设计。分布式数据库设计的性能和效率在很大程度上取决于全局关系的碎片化。它还取决于这些片段在网络的几个站点上的分配和复制。早期的方法建议基于用户查询频率的垂直碎片化解决方案。然而,这些方法在数据库设计的初始阶段具有较高的复杂性和用户查询频率的可用性,在n-ary分区情况下迭代二进制分区会增加复杂性和用于增强结果的预定阈值,以及计算量较大的问题。因此,在本文中,我们提出了一个分布式数据库(VFAR)的垂直分片、分配和复制方案。该方案在分布式数据库设计的初始阶段对分布式数据库关系进行垂直分区,而不需要用户查询的频率,这在这个阶段是不可用的。它还将结果片段分配并复制到分布式数据库的站点,使用每个站点对每个片段的操作和读取操作。实验结果表明:首先;该方案降低了以往垂直划分方法的开销和复杂计算的复杂性。其次,它解决了用户查询在初始阶段不可用的频率问题。第三,通过生成一次迭代的所有片段,解决了n元划分情况下的迭代二叉划分问题。最后,它可以获得最佳结果,而不需要确定用于增强结果的阈值。
{"title":"An optimized scheme for vertical fragmentation, allocation and replication of a distributed database","authors":"Ahmed E. Abdel Raouf, N. Badr, M. Tolba","doi":"10.1109/INTELCIS.2015.7397268","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397268","url":null,"abstract":"Distributed databases have become the most essential technology for recent business organizations. One of the main issues of the distributed database management system (DDBMS) is the distributed database design. The performance and efficiency of a distributed database design largely depend on the fragmentation of global relations. It also depends on the allocation and replication of those fragments to several sites of the network. Earlier approaches suggest vertical fragmentation solutions based on the frequency of the user queries. However, these approaches have the limitation of higher complexity and availability of the frequency of user queries at the initial stage of the database design, iterative binary partitioning in case of n-ary partitioning which will increase the complexity and predetermined threshold value that is used to enhance the results, as well as the problem of more computation. Consequently in this paper, we present a vertical fragmentation, allocation and replication scheme of a distributed database called (VFAR). The proposed scheme partitions the distributed database relations vertically at the initial stage of distributed database design, without the need for the frequency of user queries which are not available at this stage. It also allocates and replicates the resulted fragments to the sites of the distributed database, using manipulates and read operations of each site to each fragment. Experimental results showed that firstly; the proposed scheme reduces the overheads and the complexity of complicated computations of previous vertical partitioning approaches. Secondly, it solves the problem of the frequency of the user queries that are not available at the initial stage. Thirdly, it solves the problem of iterative binary partitioning in the case of n-ary partitioning by generating all fragments of one iteration. Finally, it gets the optimal results without the need to determine a threshold value that is used to enhance the results.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"44 1","pages":"506-513"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84612180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
XML summarization: A survey XML摘要:一项调查
H. ElMadany, Marco Alfonse, M. Aref
eXtensible Markup Language (XML) is one of the standard data representation nowadays. It can be used in various applications as its flexibility and easy to use so the need to summarize XML document become increasingly an important topic to save time and cost. For these reasons, there are more interest for developing tools for summarizing XML Documents. This paper surveys different approaches for summarizing XML documents regarding to both its structure and content.
可扩展标记语言(XML)是当今标准的数据表示形式之一。由于其灵活性和易用性,它可以用于各种应用程序中,因此需要对XML文档进行摘要以节省时间和成本越来越成为一个重要的主题。由于这些原因,人们对开发用于总结XML文档的工具更感兴趣。本文从结构和内容两方面考察了总结XML文档的不同方法。
{"title":"XML summarization: A survey","authors":"H. ElMadany, Marco Alfonse, M. Aref","doi":"10.1109/INTELCIS.2015.7397273","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397273","url":null,"abstract":"eXtensible Markup Language (XML) is one of the standard data representation nowadays. It can be used in various applications as its flexibility and easy to use so the need to summarize XML document become increasingly an important topic to save time and cost. For these reasons, there are more interest for developing tools for summarizing XML Documents. This paper surveys different approaches for summarizing XML documents regarding to both its structure and content.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"10 1","pages":"537-541"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72978463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LTE Authentication Protocol (EPS-AKA) weaknesses solution LTE认证协议(EPS-AKA)弱点解决方案
Mohammed Abdrabou, A. Elbayoumy, Essam Abd El-Wanis
Extensible Authentication Protocol (EAP) is an authentication framework in Long Term Evolution (LTE) networks. EAP-AKA is one of the methods of EAP which uses the Authentication and Key Agreement (AKA) mechanism based on challenge-response mechanisms, EAP-AKA is used in the 3rd generation mobile networks then modified and inherited to 4th generation mobile networks (LTE) as Evolved Packet System Authentication and Key Agreement (EPS-AKA) mechanism which is used when the user access the network through EUTRAN. EPS-AKA vulnerabilities are disclosure of the user identity, Man in the Middle attack and Denial of Services (DoS) attacks so a robust authentication mechanism must replace EPSAKA to avoid such attacks. In this paper, Modified Evolved Packet System Authentication and Key Agreement (MEPS-AKA) protocol based on Simple Password Exponential Key Exchange (SPEKE) and symmetric key cryptography is proposed to solve these problems by performing a pre-authentication procedure to generate a dynamic key every time user access to the network, also each message send or received is confidentially protected. Scyther tool is used to verify the efficiency of the proposed protocol. EPS-AKA and MEPS-AKA are simulated using C programming language to calculate the execution time for both algorithms. The proposed protocol is simulated using a client-server application program using C# programming language.
EAP (Extensible Authentication Protocol)是LTE (Long Term Evolution)网络中的一种认证框架。EAP-AKA是基于挑战-响应机制的认证和密钥协议(AKA)机制的EAP方法之一,EAP-AKA用于第三代移动网络,然后修改并继承到第四代移动网络(LTE)作为演进分组系统认证和密钥协议(EPS-AKA)机制,当用户通过EUTRAN访问网络时使用。EPS-AKA漏洞是用户身份泄露、中间人攻击和拒绝服务(DoS)攻击,因此必须有一个强大的身份验证机制取代EPSAKA来避免此类攻击。为了解决这些问题,本文提出了基于简单密码指数密钥交换(SPEKE)和对称密钥加密的改进进化分组系统认证与密钥协议(MEPS-AKA)协议,该协议在用户每次访问网络时执行预认证程序生成动态密钥,并对发送或接收的每条消息进行保密保护。使用Scyther工具验证了所提出协议的有效性。用C语言对EPS-AKA和MEPS-AKA进行了仿真,计算了两种算法的执行时间。采用c#编程语言,用客户端-服务器应用程序对所提出的协议进行了仿真。
{"title":"LTE Authentication Protocol (EPS-AKA) weaknesses solution","authors":"Mohammed Abdrabou, A. Elbayoumy, Essam Abd El-Wanis","doi":"10.1109/IntelCIS.2015.7397256","DOIUrl":"https://doi.org/10.1109/IntelCIS.2015.7397256","url":null,"abstract":"Extensible Authentication Protocol (EAP) is an authentication framework in Long Term Evolution (LTE) networks. EAP-AKA is one of the methods of EAP which uses the Authentication and Key Agreement (AKA) mechanism based on challenge-response mechanisms, EAP-AKA is used in the 3rd generation mobile networks then modified and inherited to 4th generation mobile networks (LTE) as Evolved Packet System Authentication and Key Agreement (EPS-AKA) mechanism which is used when the user access the network through EUTRAN. EPS-AKA vulnerabilities are disclosure of the user identity, Man in the Middle attack and Denial of Services (DoS) attacks so a robust authentication mechanism must replace EPSAKA to avoid such attacks. In this paper, Modified Evolved Packet System Authentication and Key Agreement (MEPS-AKA) protocol based on Simple Password Exponential Key Exchange (SPEKE) and symmetric key cryptography is proposed to solve these problems by performing a pre-authentication procedure to generate a dynamic key every time user access to the network, also each message send or received is confidentially protected. Scyther tool is used to verify the efficiency of the proposed protocol. EPS-AKA and MEPS-AKA are simulated using C programming language to calculate the execution time for both algorithms. The proposed protocol is simulated using a client-server application program using C# programming language.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"434-441"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75719303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
期刊
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1