2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery最新文献

筛选
英文 中文
A New Approach for Estimating the Infrared Radiative and Simulation 一种估算红外辐射的新方法及仿真
Chengpo Mu, Chao Han, Xianlei Zhang, Jiyuan Wang
{"title":"A New Approach for Estimating the Infrared Radiative and Simulation","authors":"Chengpo Mu, Chao Han, Xianlei Zhang, Jiyuan Wang","doi":"10.1109/CyberC.2013.45","DOIUrl":"https://doi.org/10.1109/CyberC.2013.45","url":null,"abstract":"The infrared radiation characteristic of target mainly depends on the temperature distribution and the surface radiation. Therefore, the analysis of surface temperature and the infrared radiation of the target are very important for Infrared simulation. In this paper, based on the finite element analysis software, we focus on the calculation method of the target surface temperature, considering all kinds of boundary conditions, including convection, radiation, and friction to heat and so on, and calculate the infrared radiation of the target. Take automobile tires for example, we establish its finite element analysis model, calculate its temperature distribution, and then obtain its infrared gray image based on radial brightness, thereby we demonstrate the feasibility of the proposed method.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124501937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Homomorphic ElGamal Variant Based on BGN's Method 基于BGN方法的同态ElGamal变异体
Zhiwei Chen, Ruoqing Zhang, Yatao Yang, Zichen Li
{"title":"A Homomorphic ElGamal Variant Based on BGN's Method","authors":"Zhiwei Chen, Ruoqing Zhang, Yatao Yang, Zichen Li","doi":"10.1109/CyberC.2013.10","DOIUrl":"https://doi.org/10.1109/CyberC.2013.10","url":null,"abstract":"Homomorphic encryption has numerous applications, which can directly calculate on encrypted data. In this paper, a simple variant of ElGamal is presented which supports arbitrary additions and one multiplication, similarly to the cryptosystem of Boneh, Goh, and Nissim (BGN). The construction adopts a bilinear pairing map to meet the multiplicative homomorphism. A confirmatory example is given to prove this cryptosystems homomorphism. In the additive homomorphic operation aspect, our scheme possesses a higher security than BGN's method. Obviously, it also offers a way of multiplying two cipher texts. Finally, a security analysis is shown to demonstrate that this variant of ElGamal cryptosystem satisfy CPA and IND-CCA security.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121795310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blending SQL and NewSQL Approaches: Reference Architectures for Enterprise Big Data Challenges 混合SQL和NewSQL方法:企业大数据挑战的参考架构
K. Doshi, Tao Zhong, Zhongyan Lu, Xi Tang, Ting Lou, Gang Deng
{"title":"Blending SQL and NewSQL Approaches: Reference Architectures for Enterprise Big Data Challenges","authors":"K. Doshi, Tao Zhong, Zhongyan Lu, Xi Tang, Ting Lou, Gang Deng","doi":"10.1109/CyberC.2013.34","DOIUrl":"https://doi.org/10.1109/CyberC.2013.34","url":null,"abstract":"As it becomes ever more pervasively engaged in data driven commerce, a modern enterprise becomes increasingly dependent upon reliable and high speed transaction services. At the same time it aspires to capitalize upon large inflows of information to draw timely business insights and improve business results. These two imperatives are frequently in conflict because of the widely divergent strategies that must be pursued: the need to bolster on-line transactional processing generally drives a business towards a small cluster of high-end servers running a mature, ACID compliant, SQL relational database, while high throughput analytics on massive and growing volumes of data favor the selection of very large clusters running non-traditional (NoSQL/NewSQL) databases that employ softer consistency protocols for performance and availability. This paper describes an approach in which the two imperatives are addressed by blending the two types (scale-up and scale-out) of data processing. It breaks down data growth that enterprises experience into three classes-Chronological, Horizontal, and Vertical, and picks out different approaches for blending SQL and NewSQL platforms for each class. To simplify application logic that must comprehend both types of data platforms, the paper describes two new capabilities: (a) a data integrator to quickly sift out updates that happen in an RDBMS and funnel them into a NewSQL database, and (b) extensions to the Hibernate-OGM framework that reduce the programming sophistication required for integrating HBase and Hive back ends with application logic designed for relational front ends. Finally the paper details several instances in which these approaches have been applied in real-world, at a number of software vendors with whom the authors have collaborated on design, implementation and deployment of blended solutions.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122048341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
FPGA Acceleration for Intersection Computation in Frequent Itemset Mining 频繁项集挖掘中交集计算的FPGA加速
Shaobo Shi, Yue Qi, Qin Wang
{"title":"FPGA Acceleration for Intersection Computation in Frequent Itemset Mining","authors":"Shaobo Shi, Yue Qi, Qin Wang","doi":"10.1109/CyberC.2013.95","DOIUrl":"https://doi.org/10.1109/CyberC.2013.95","url":null,"abstract":"Frequent item set mining is an important researching area in data mining and Eclat is a typical and high performance frequent item set mining algorithm. However, the large numbers of sorted-set intersection computation in the algorithm limit the performance of the algorithm seriously. FPGA is a low-power and high-performance computing platform that has been applied to accelerate parallel data mining successfully. To deal with the problem of the large number intersection computation in Eclat, this paper proposed a FPGA solution to accelerate the intersection computation. And a full comparator matrix structure is provided to perform the parallel intersection computation. The experiment results show that our solution can achieve a speedup of 26.7x on intersection computation comparing to the best software implementation existed, and the full comparator matrix have a better scalability, thus the entire running time of the Eclat algorithm can be decreased extremely.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125967931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Matrix-Query: A Distributed SQL-Like Query Processing Model for Large Database Clusters 矩阵查询:一种面向大型数据库集群的分布式类sql查询处理模型
Qiao Liu, P. Ji, Y. Zuo
{"title":"Matrix-Query: A Distributed SQL-Like Query Processing Model for Large Database Clusters","authors":"Qiao Liu, P. Ji, Y. Zuo","doi":"10.1109/CyberC.2013.36","DOIUrl":"https://doi.org/10.1109/CyberC.2013.36","url":null,"abstract":"Along with the development of distributed computation and the rapid growth of data, scientific research increasingly requires the support of high-efficiency relational data processing framework. According to the characteristics of scientific data, for example bulk inserts and unfrequented change, this paper proposes a streaming processing model called Matrix-Query with the matching data storage architecture for relational query. Through transforming the original relational schema to entities and key-value indexing, the data storage solution provides more localization operation and data positioning. Compare to traditional Map-Reduce model, the Matrix-Query isolates the influence between subtasks to ensure execution in a streaming and parallel manner and reduces negative impacts of writing intermediate file. We also optimize the data structure and subtask management to improve the performance of Matrix-Query. The experimental results demonstrate performance advantage of Matrix-query compared to two famous data processing systems, Hive and HadoopDB, which build on the top of Map-Reduce model.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127204559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message Collision and CSMA/CA Modeling and Simulation by Means of Petri Net 基于Petri网的消息冲突与CSMA/CA建模与仿真
Jieyu Liu, E. Schnieder, Z. Miao
{"title":"Message Collision and CSMA/CA Modeling and Simulation by Means of Petri Net","authors":"Jieyu Liu, E. Schnieder, Z. Miao","doi":"10.1109/CyberC.2013.77","DOIUrl":"https://doi.org/10.1109/CyberC.2013.77","url":null,"abstract":"The messages sending process, especially caused by the monolithic function correlations defined in the application layer of Open Systems Interconnection (OSI) field bus system used in building and home automation, results in a message peak in the Data Link Layer (DLL), which has been seen as the new feature challenging the Quality of Service (QoS) of the field bus system bottom layers. Therefore a formal approach is carried out to model the message burst scenario including the message scheduling mechanism of the field bus system by Petri net, the new feature due to the function correlations among these layers is revealed and analyzed by the log file generated and sorted from one office with the field bus based building and home automation system, therefore the model of message collision scenario with stochastic input is parameterized and simulated by the Pi-Tool.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130451619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applications of Data Mining to an Asynchronous Argumentation Based Learning Assistance Platform 数据挖掘在异步论证学习辅助平台中的应用
Chao-Yi Chen, Heng-Ming Chen, Jui-Jiun Jian, Chenn-Jung Huang, S. Chang, Yu-Wu Wang, Jhe-Hao Tseng
{"title":"Applications of Data Mining to an Asynchronous Argumentation Based Learning Assistance Platform","authors":"Chao-Yi Chen, Heng-Ming Chen, Jui-Jiun Jian, Chenn-Jung Huang, S. Chang, Yu-Wu Wang, Jhe-Hao Tseng","doi":"10.1109/CyberC.2013.25","DOIUrl":"https://doi.org/10.1109/CyberC.2013.25","url":null,"abstract":"Structured argumentation support environments have been built and used in scientific discourse in the literature. These environments emphasized either on exchanging information or on constructing arguments for presentation. In this work, an intelligent online asynchronous argumentation platform that detects whether the learners address the expected discussion issues is proposed. After each learner issues an argument on the learning platform, a term weighting method is adopted to derive inputs parameters of a SVM classifier. The classifier then determines if the learners' arguments are related to the concept maps outlined by the instructor. Notably, a peer review mechanism is established in this work to improve the quality of term weighting approach. The experimental results revealed that the students in a junior high school participating in argumentation learning activities of natural science were benefited by the proposed argumentation based learning assistance platform.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Trusted Mobile RFID Network Framework 一个可信的移动RFID网络框架
Yan Sun, Lihua Yin, Licai Liu
{"title":"Towards a Trusted Mobile RFID Network Framework","authors":"Yan Sun, Lihua Yin, Licai Liu","doi":"10.1109/CyberC.2013.18","DOIUrl":"https://doi.org/10.1109/CyberC.2013.18","url":null,"abstract":"Although the mobile RFID system has various applications in Internet of Things(IoT), it has a limited communication range and raises some serious privacy and security problems. To improve the issuers above, we propose a new mobile RFID network framework based on security and privacy protection. In the framework, we design a Reader Network using ad hoc mechanism, that readers with short communication range could extend their communication distance for meeting more application service requirement. Meanwhile, we introduce TPM(Trusted Platform Module) to reader node to ensure the security and privacy of node and give the detailed trusted and privacy mechanisms based on TPM. These mechanisms ensure the node secure and privacy.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116248760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Context Aware Semantic Web Services Description and Match 上下文感知的语义Web服务描述和匹配
Hui Peng
{"title":"Context Aware Semantic Web Services Description and Match","authors":"Hui Peng","doi":"10.1109/CyberC.2013.41","DOIUrl":"https://doi.org/10.1109/CyberC.2013.41","url":null,"abstract":"First current semantic description languages which include OWL-S, WSDL-S and WSMO are introduced and compared in this paper. Then the importance of the context for service description(especially for a service requester) is analyzed. Based on the analysis we propose a new semantic service description ontology which aware context about a service request. The match chart between requested service and provided service with context description is concluded. Case study and applications in travel community show the effectiveness of this description and match in services discovery.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126405079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Analysis of High Speed Rail Wireless Communication Network 高速铁路无线通信网络性能分析
Z. Miao, T. Tang, Jieyu Liu
{"title":"Performance Analysis of High Speed Rail Wireless Communication Network","authors":"Z. Miao, T. Tang, Jieyu Liu","doi":"10.1109/CyberC.2013.89","DOIUrl":"https://doi.org/10.1109/CyberC.2013.89","url":null,"abstract":"GSM-R (Global System for Mobile Communications-Rail) is employed as the main channel to transfer safety data in high speed rail control system. Its reliability directly affects train safety. In the analysis of two different GSM-R redundant networks, we use the Alta Rica language and Markov Chain in modeling. Combined with related data, system reliability and availability are calculated through simulations respectively. Simulation results: co-sited network reliability is higher than intercross network's due to differences of redundant network structures and handoff rates, co-sited network availability is lower than intercross network due to co-sited network common failure factor. Based on these conclusions, suggestions are: the co-sited network should be used in key parts which demand high reliability in short time while the intercross network should be used in most parts along the rails.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126846412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信