Computer Engineering and Applications最新文献

筛选
英文 中文
A Modified Black Hole-Based Task Scheduling Technique for Cloud Computing Environment 一种改进的基于黑洞的云计算环境任务调度技术
Computer Engineering and Applications Pub Date : 2016-06-23 DOI: 10.18495/COMENGAPP.V5I2.172
F. Ebadifard, Zeinab Borhanifard
{"title":"A Modified Black Hole-Based Task Scheduling Technique for Cloud Computing Environment","authors":"F. Ebadifard, Zeinab Borhanifard","doi":"10.18495/COMENGAPP.V5I2.172","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V5I2.172","url":null,"abstract":"The issue of scheduling is one of the most important ones to be considered by providers of the cloud computing in the data center. Using a suitable solution lets the providers of cloud computing use the available resources more. Additionally, the satisfaction of clients is met through provision of service quality parameters. Most of the solutions for this problem aim at one of the service quality factors and in order to achieve this goal, variety of methods are used. Using the algorithm of modified black hole in this paper, a proper solution is presented to tackle the problem of scheduling the affairs in cloud environment. The proposed method reduces makespan, increases degree of load balancing, and improves the resource`s utilization by considering the capability of each virtual machine. We have compared the proposed algorithm with existing task scheduling algorithms. Simulation results indicate that the proposed algorithm makes a good improvement regarding the makespan and amount of resource utilization compared to schedulers based on Random assignment and particle swarm optimization Algorithms.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Proposed Software as a Service (SaaS) Toolkit for Cloud Multi- Tenancy 一个针对云多租户的软件即服务(SaaS)工具包
Computer Engineering and Applications Pub Date : 2016-06-22 DOI: 10.18495/COMENGAPP.V5I2.170
Mohamed Osman Imam, A. Yousif, M. Bashir
{"title":"A Proposed Software as a Service (SaaS) Toolkit for Cloud Multi- Tenancy","authors":"Mohamed Osman Imam, A. Yousif, M. Bashir","doi":"10.18495/COMENGAPP.V5I2.170","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V5I2.170","url":null,"abstract":"Cloud computing is a general term for anything that involves delivering hosted services over the Internet. It is a construct that allows you to access applications that actually reside at locations other than your computer or other Internet-connected devices. Software as a Service (SaaS) is a software delivery model in which software resources are accessed remotely by users over the internet. Enterprises prefer using SaaS because of its low cost. SaaS requires sharing of application servers among multiple tenants for low operational costs. Several SaaS Toolkits are available and used to develop cloud SaaS applications. However, most of these Toolkits are very complex. This paper aims to build a new simple and easy SaaS Toolkit to develop SaaS applications and to avoid the difficulties and complexity in the current cloud SaaS Toolkits. The proposed Toolkit is based on java virtual machine and the popular web programming languages HTML and PHP. To evaluate the proposed Toolkit an empirical study has been conducted. The result of the empirical study revealed that the proposed Toolkit outperforms the current Toolkits in terms of complexity, understandability and learnability.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133902033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Balancing and Lucas-Balancing Numbers and their Application to Cryptography 平衡数和卢卡斯平衡数及其在密码学中的应用
Computer Engineering and Applications Pub Date : 2016-03-02 DOI: 10.18495/comengapp.v5i1.46
Sujata Swain, Chidananda Pratihary, P. Ray
{"title":"Balancing and Lucas-Balancing Numbers and their Application to Cryptography","authors":"Sujata Swain, Chidananda Pratihary, P. Ray","doi":"10.18495/comengapp.v5i1.46","DOIUrl":"https://doi.org/10.18495/comengapp.v5i1.46","url":null,"abstract":"It is well known that, a recursive relation for the sequence  is an equation that relates  to certain of its preceding terms . Initial conditions for the sequence  are explicitly given values for a finite number of the terms of the sequence. The recurrence relation is useful in certain counting problems like Fibonacci numbers, Lucas numbers, balancing numbers, Lucas-balancing numbers etc. In this study, we use the recurrence relations for both balancing and Lucas-balancing numbers and examine their application to cryptography.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud-Based Retrieval Information System Using Concept for Multi-Format Data 基于多格式数据概念的云检索信息系统
Computer Engineering and Applications Pub Date : 2016-01-31 DOI: 10.18495/COMENGAPP.V5I1.165
Ibrahim A. Alghamdi, D. A. Alshehri, A. Alghamdi, B. Kerim, R. Budiarto
{"title":"Cloud-Based Retrieval Information System Using Concept for Multi-Format Data","authors":"Ibrahim A. Alghamdi, D. A. Alshehri, A. Alghamdi, B. Kerim, R. Budiarto","doi":"10.18495/COMENGAPP.V5I1.165","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V5I1.165","url":null,"abstract":"The need of effective and efficient method to retrieving non-Web-enabled and Web-enabled information entities is essential, due to the fact of inaccuracy of the existing search engines that still use traditional term-based indexing for text documents and annotation text for images, audio and video files. Previous works showed that incorporating the knowledge in the form of concepts into an information retrieval system may increase the effectiveness of the retrieving method. Unfortunately, most of the works that implemented the concept-based information retrieval system still focused on one information format. This paper proposes a multi-format (text, image, video and, audio) concept-based information retrieval method for Cloud environment. The proposed method is implemented in a laboratory-scale heterogeneous cloud environment using Eucalyptus middleware.  755 multi-format information is experimented and the performance of the proposed method is measured.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116347335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison Jaccard similarity, Cosine Similarity and Combined Both of the Data Clustering With Shared Nearest Neighbor Method 比较Jaccard相似度、余弦相似度及二者结合的共享近邻聚类方法
Computer Engineering and Applications Pub Date : 2016-01-31 DOI: 10.18495/COMENGAPP.V5I1.160
L. Zahrotun
{"title":"Comparison Jaccard similarity, Cosine Similarity and Combined Both of the Data Clustering With Shared Nearest Neighbor Method","authors":"L. Zahrotun","doi":"10.18495/COMENGAPP.V5I1.160","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V5I1.160","url":null,"abstract":"Text Mining is the excavations carried out by the computer to get something new that comes from information extracted automatically from data sources of different text. Clustering technique itself is a grouping technique that is widely used in data mining. The aim of this study was to find the most optimum value similarity. Jaccard similarity method used similarity, cosine similarity and a combination of Jaccard similarity and cosine similarity. By combining the two similarity is expected to increase the value of the similarity of the two titles. While the document is used only in the form of a title document of practical work in the Department of Informatics Engineering University of Ahmad Dahlan. All these articles have been through the process of preprocessing beforehand. And the method used is the method of document clustering with Shared Nearest Neighbor (SNN). Results from this study is the cosine similarity method gives the best value of proximity or similarity compared to Jaccard similarity and a combination of both","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125952969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload Web对攻击的漏洞分析——不受限制的图像文件上传
Computer Engineering and Applications Pub Date : 2016-01-31 DOI: 10.18495/COMENGAPP.V5I1.161
I. Riadi, Eddy Irawan Aristianto
{"title":"An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload","authors":"I. Riadi, Eddy Irawan Aristianto","doi":"10.18495/COMENGAPP.V5I1.161","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V5I1.161","url":null,"abstract":"The development of computer security technology is very rapidly. Web security is one of the areas that require particular attention related to the abundance of digital crimes conducted over the web. Unrestricted file upload image is a condition in the process of uploading pictures is not restricted. This can be used to make the attacker retrieve the information that is contained in a system. This research developed with several stages, such as, data collection, analysis of the current conditions, designing improvements to the program code, testing and implementation of the results of patch. Security testing is performed to find out the difference between before and after conditions applied patch unrestricted image file upload. Based on the results of testing done by the method of penetration testing results obtained before the application of patch unrestricted image file upload results respondents said 15% strongly disagree, 85% did not agree. Testing after applying patch unrestricted image file upload results respondents said 7.5% strongly agree, 92.5% agree, so it can be concluded that the development of the patch that has been done has been running smoothly as expected.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130715745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Improving the reliability of Ciphertext on Vigenere Cipher Algorithm Using Recurrence Random Key 利用递归随机密钥提高Vigenere密码算法上密文的可靠性
Computer Engineering and Applications Pub Date : 2016-01-31 DOI: 10.18495/COMENGAPP.V5I1.162
Haodudin Nurkifli, M. Jajuli, Muhamad Miftah
{"title":"Improving the reliability of Ciphertext on Vigenere Cipher Algorithm Using Recurrence Random Key","authors":"Haodudin Nurkifli, M. Jajuli, Muhamad Miftah","doi":"10.18495/COMENGAPP.V5I1.162","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V5I1.162","url":null,"abstract":"The weakness of vigenere cipher lies in the short key and repeated periodically, allowing the key repeatedly with the same letter in the encryption process, it is used by cryptanalysis using kasiski method to guess the key length, after the length key is known guessing done plaintext by exhaustive key search so ciphertext of this algorithm can be solved. Modifications vigenere cipher is a solution to strengthen the ciphertext. Modifications made that useing looping random keys on algoritam vigenere cipher. The methodology used by quantitative method with a descriptive approach with nonparametric statistical test through a test mark. Testing was performed using six plaintext, three plaintext using Indonesian and English. The key for that used consists of five key in English and five keys in Indonesian. The test results showed that the method kasiski can not guess the key length of the algorithm viginere modified. At vigenere unmodified algorithm shows the difference in strength of the ciphertext, so the key length can be guessed by kasiski method. The test results showed signs sig is 0.00 and if Sig <0.05 or 0.00 <0.05, significant difference in the presence vigenere modification.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126897520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A MATLAB-Based Interactive Environment for EMG Signal Decomposition Utilizing Matched Template Filters 基于matlab的基于匹配模板滤波器的肌电信号分解交互环境
Computer Engineering and Applications Pub Date : 2015-11-20 DOI: 10.18495/COMENGAPP.V4I3.145
Sarbast M. Rasheed
{"title":"A MATLAB-Based Interactive Environment for EMG Signal Decomposition Utilizing Matched Template Filters","authors":"Sarbast M. Rasheed","doi":"10.18495/COMENGAPP.V4I3.145","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V4I3.145","url":null,"abstract":"An interactive software package for analyzing and decomposing electromyographic (EMG) signals is designed, constructed, and implemented using the MATLAB high-level programming language and its interactive environment. EMG signal analysis in the form of signal decomposition into their constituent motor unit potential trains (MUPTs) is considered as a classification task. Matched template filter methods have been employed for the classification of motor unit potentials (MUPs) in which the assignment criterion used for MUPs is based on a combination of MUP shapes and motor unit firing pattern information. The developed software package consists of several graphical user interfaces used to detect individual MUP waveforms from raw EMG signals, extract relevant features, and classify MUPs into MUPTs using matched template filter classifiers. The proposed software package is useful for enhancing the analysis quality and providing a systematic approach to the EMG signal decomposition process. It also worked as a very helpful environment for testing and evaluating algorithms developed for EMG signal decomposition research.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud based Smart Irrigation for Agricultural Area of Pakistan 巴基斯坦农业区基于云的智能灌溉
Computer Engineering and Applications Pub Date : 2015-09-20 DOI: 10.18495/COMENGAPP.V4I3.152
M. Khurram
{"title":"Cloud based Smart Irrigation for Agricultural Area of Pakistan","authors":"M. Khurram","doi":"10.18495/COMENGAPP.V4I3.152","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V4I3.152","url":null,"abstract":"A beneficial product of Smart Irrigation for Agricultural Area of Pakistan has been presented in this paper. Pakistan stands in need of a participatory solution that is efficiently workable, sustainable, and profitable, to develop the way for the agricultural sector by improving crop productivity with minimum water loss. The goal of this project is to introduce Cloud support to the Smart Irrigation System for Agricultural Area of Pakistan. To achieve this objective Wireless Sensor Network (WSN) is used to determine how much water to apply and when to irrigate. The system is divided into four main modules, i.e. Sensor node, Coordinator node, Server Module and Web Application. On the basis of acquired parameters from the WSN, the software application is programmed to take intelligent decisions increase the efficiency of the agricultural system.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124206753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Analysis of Multiple Virtualized Servers 多虚拟化服务器性能分析
Computer Engineering and Applications Pub Date : 2015-09-20 DOI: 10.18495/COMENGAPP.V4I3.150
Sajad Homayoun, Ahmad Jalili, M. Keshtgari
{"title":"Performance Analysis of Multiple Virtualized Servers","authors":"Sajad Homayoun, Ahmad Jalili, M. Keshtgari","doi":"10.18495/COMENGAPP.V4I3.150","DOIUrl":"https://doi.org/10.18495/COMENGAPP.V4I3.150","url":null,"abstract":"Server virtualization is considered as one of the most significant changes in IT operations in the past decade, making it possible to manage groups of servers with a greater degree of reliability at a lower cost. It is driven by the goal of reducing the total number of physical servers in an organization by consolidating multiple applications on shared servers. In this paper we construct several x86_64 servers based on VMware vSphere, and then analyze their performances using open source analyzing tools Pylot and Curl-loader. The results show that despite the enormous potential benefits of virtualization techniques, the efficiency decreased by increasing the number of virtual machines. So, a trade-off is needed between number of virtual machines and expected efficiency of servers.","PeriodicalId":120500,"journal":{"name":"Computer Engineering and Applications","volume":"153 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120989691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信