2016 Sixth International Conference on Innovative Computing Technology (INTECH)最新文献

筛选
英文 中文
Message from the chairs 来自椅子的信息
Imran Sarwar Bajwa
{"title":"Message from the chairs","authors":"Imran Sarwar Bajwa","doi":"10.1109/DICTA.2005.54","DOIUrl":"https://doi.org/10.1109/DICTA.2005.54","url":null,"abstract":"The 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2015) is being held in Firenze, Italy on 18-19 May 2015. Welcome to the proceedings! Many more domains are requiring software systems to be adaptive to changing contexts, environments and requirements, to be resilient in the face of uncertainty and error, and to be composed and managed at run time. SEAMS provides a venue to present novel self-adaptive applications and domains, and to formulate and discuss methods for engineering such systems in a methodical and assurable way.","PeriodicalId":183101,"journal":{"name":"2016 Sixth International Conference on Innovative Computing Technology (INTECH)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132036848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International program committee 国际项目委员会
M. Iwashita, Atsushi Shimoda, Y. Manabe, Hien Nguyen, Ton Duc Thang, K. Nishimatsu, Kazuya Odagiri, Richa Sharma, Michael Sheng, Haruaki Tamada
{"title":"International program committee","authors":"M. Iwashita, Atsushi Shimoda, Y. Manabe, Hien Nguyen, Ton Duc Thang, K. Nishimatsu, Kazuya Odagiri, Richa Sharma, Michael Sheng, Haruaki Tamada","doi":"10.1109/CCGRID.2006.64","DOIUrl":"https://doi.org/10.1109/CCGRID.2006.64","url":null,"abstract":"Committee Members Hirohisa Aman Ehime University, Japan Sousuke Amasaki Okayama Prefectural University, Japan George Anderson University of Botswana, Botswana Amin Beheshti Macquarie University, Australia Nikos Bikakis University of Ioannina, Greece Alberto Cano Virginia Commonwealth University, USA Dickson K.W. Chiu The University of Hong Kong, Hong Kong Elshrif Elmurng ETS, Canada Lorena Gonzalez Universidad Carlos III de Madrid, Spain Kohei Ichikawa Nara Institute of Science and Technology, Japan Masatsugu Ichino The University of Electro-Communications, Japan Akiya Inoue Chiba Institute of Technology, Japan Naohiro Ishii Aichi Institute of Technology, Japan Kazunori Iwata Aichi University, Japan Hiroshi Koide Kyushu University, Japan Takeshi Kurosawa Tokyo University of Science, Japan Man-Fung Lo The Hong Kong Polytechnic University, Hong Kong Maria Mahfoud CWI, Netherlands Yuki Manabe Kumamoto University, Japan Akito Monden Okayama University, Japan Masataka Nagura Nanzan University, Japan Hien Nguyen Ton Duc Thang University, Viet Nam Ken Nishimatsu NTT, Japan Kazuya Odagiri Sugiyama Jyogakuen University, Japan Athanasios Paraskelidis University of Portsmouth, United Kingdom, UK","PeriodicalId":183101,"journal":{"name":"2016 Sixth International Conference on Innovative Computing Technology (INTECH)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122141536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lightweight software write-blocker for virtual machine forensics 用于虚拟机取证的轻量级软件写拦截器
2016 Sixth International Conference on Innovative Computing Technology (INTECH) Pub Date : 2016-08-26 DOI: 10.1109/INTECH.2016.7845141
Patrick Tobin, Nhien-An Le-Khac, Mohand Tahar Kechadi
{"title":"A lightweight software write-blocker for virtual machine forensics","authors":"Patrick Tobin, Nhien-An Le-Khac, Mohand Tahar Kechadi","doi":"10.1109/INTECH.2016.7845141","DOIUrl":"https://doi.org/10.1109/INTECH.2016.7845141","url":null,"abstract":"The integrity of any original evidence is fundamental to a forensic examination. Preserving the integrity of digital evidence is vitally important as changing just one bit among perhaps gigabits of data, will irrevocably alter that data and cast doubt on any evidence extracted. In traditional digital forensics write-blockers are used to preserve the integrity of that evidence and prevent changes from occurring, but virtual machine forensics presents more difficult challenges to address. Access to the digital storage device will probably not be possible, typically the only accessible storage will be a virtual hard disk drive. This will have the same integrity issues as those of a real device, but with the added complication that it is not possible to use a hardware write-blocker to prevent changes to those data. For this reason it is important to explore how to implement write-blocking mechanisms on a virtual device. In this paper we present an implementation of a software write-blocker and show how we can use it to be compliant with the 2nd ACPO principle on digital evidence.","PeriodicalId":183101,"journal":{"name":"2016 Sixth International Conference on Innovative Computing Technology (INTECH)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129169704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing cloud security and privacy: Time for a new approach? 增强云安全和隐私:是时候采用新方法了?
2016 Sixth International Conference on Innovative Computing Technology (INTECH) Pub Date : 2016-08-24 DOI: 10.1109/INTECH.2016.7845113
B. Duncan, Alfred Bratterud, A. Happe
{"title":"Enhancing cloud security and privacy: Time for a new approach?","authors":"B. Duncan, Alfred Bratterud, A. Happe","doi":"10.1109/INTECH.2016.7845113","DOIUrl":"https://doi.org/10.1109/INTECH.2016.7845113","url":null,"abstract":"Achieving cloud security is not a trivial problem and developing and enforcing good cloud security controls is a fundamental requirement if this is to succeed. The very nature of cloud computing can add additional problem layers for cloud security to an already complex problem area. We discuss why this is such an issue, consider what desirable characteristics should be aimed for and propose a novel means of effectively and efficiently achieving these goals through the use of unikernel based systems. The main thrust of this paper is to discuss the key issues which need to be addressed, noting which of those might be covered by our proposed approach. We discuss how our proposed approach may help better address the key security issues we have identified.","PeriodicalId":183101,"journal":{"name":"2016 Sixth International Conference on Innovative Computing Technology (INTECH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130777190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Mobile agent based network management applications and fault-tolerance mechanisms 基于移动代理的网络管理应用和容错机制
2016 Sixth International Conference on Innovative Computing Technology (INTECH) Pub Date : 2016-08-01 DOI: 10.1109/INTECH.2016.7845118
M. Zubair, U. Manzoor
{"title":"Mobile agent based network management applications and fault-tolerance mechanisms","authors":"M. Zubair, U. Manzoor","doi":"10.1109/INTECH.2016.7845118","DOIUrl":"https://doi.org/10.1109/INTECH.2016.7845118","url":null,"abstract":"One of the advancements in mobile agent technology in recent decades is their usage in network management applications because of their distributed and scalable nature. However, one of the key concerns in practical implementation of these approaches is lack of fault tolerance mechanisms. There are several generalized fault-tolerance techniques which can be adapted in the mobile agent based network management models to meet the fault-tolerance requirements. In this paper, we presented a survey of existing fault-tolerance techniques and different mobile agent based network management architecture models where these techniques can be applied.","PeriodicalId":183101,"journal":{"name":"2016 Sixth International Conference on Innovative Computing Technology (INTECH)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121030321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multimedia security perspectives in IoT 物联网中的多媒体安全视角
2016 Sixth International Conference on Innovative Computing Technology (INTECH) Pub Date : 2016-08-01 DOI: 10.1109/INTECH.2016.7845081
Amna Shifa, M. Asghar, M. Fleury
{"title":"Multimedia security perspectives in IoT","authors":"Amna Shifa, M. Asghar, M. Fleury","doi":"10.1109/INTECH.2016.7845081","DOIUrl":"https://doi.org/10.1109/INTECH.2016.7845081","url":null,"abstract":"The Internet of Things (IoT) is an emerging paradigm in which physical objects are connected to each other and user via the Internet in order to share information between devices and systems. In the IoT environment, smart devices are deployed to monitor, control and analyze business, personal, and social activities. The pervasive nature of the IoT may well be beneficial but it also presents a risk from malware, hacker intrusion, viruses and the like. The consequent security and privacy issues may cause physical damage and even threaten human lives. This paper targets two areas; initially, the paper provides a review of the IoT layered architecture with the security challenges/attacks to setting up an IoT environment. After that, the paper proposes a solution which can preserve the privacy of multimedia data within an IoT environment atits perception layer. The proposed security solution will support the multimedia to function effectively, while at the same time preserving the confidentiality of the information transmitted and the privacy of individuals.","PeriodicalId":183101,"journal":{"name":"2016 Sixth International Conference on Innovative Computing Technology (INTECH)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121047004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
BPMN process model checking using traceability 使用可追溯性检查BPMN流程模型
2016 Sixth International Conference on Innovative Computing Technology (INTECH) Pub Date : 2016-08-01 DOI: 10.1109/INTECH.2016.7845098
Ghias-ul-din Bulbun, Hafiz Muhammad Anwar Shahzada
{"title":"BPMN process model checking using traceability","authors":"Ghias-ul-din Bulbun, Hafiz Muhammad Anwar Shahzada","doi":"10.1109/INTECH.2016.7845098","DOIUrl":"https://doi.org/10.1109/INTECH.2016.7845098","url":null,"abstract":"Model transformation is a method for transforming elements of one Meta model into other Meta model elements. System like software or business model checking is significant research domain. Question is that when Model Transformation is performed for transforming a model to another model how much accurately it was performed. There is a method that I have used is Traceability to find out that natural language specifications accurately transformed to proposed business process model. Traceability is a method to find out that any specifications of natural language accurately transformed to proposed business process model. Traceability makes easy for users to trace the weight between different software engineering artifacts. Typically technique used for model checking very helpful to verify the correctness and accuracy of properties in a model. Our presented work presents an implementation of Traceability, a mechanism used to keep record between the Source model and Target model elements in model transformation framework. Traceability is a mechanism that can be used for instance level reverse transformation automatically. This type of applications for Traceability is essential for model transformation such as Semantics of Business Vocabulary and Rules (SBVR) to Business Process Modeling Notation (BPMN)· Our presented approach is inspired by Query View Transformation (QVT) that is formulated as an algorithm. This paper also reports on a case study that is based on model transformation in SBVR to BPMN, which uses new version of SiTra.","PeriodicalId":183101,"journal":{"name":"2016 Sixth International Conference on Innovative Computing Technology (INTECH)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design & simulation of fuzzy PID for hydro power plant 水电厂模糊PID的设计与仿真
2016 Sixth International Conference on Innovative Computing Technology (INTECH) Pub Date : 2016-08-01 DOI: 10.1109/INTECH.2016.7845077
Abdus Sami, M. Kadri, Nasir Aziz, Zaid Pirwani
{"title":"Design & simulation of fuzzy PID for hydro power plant","authors":"Abdus Sami, M. Kadri, Nasir Aziz, Zaid Pirwani","doi":"10.1109/INTECH.2016.7845077","DOIUrl":"https://doi.org/10.1109/INTECH.2016.7845077","url":null,"abstract":"Hydro electric power plant is usually built on mountainous areas and are isolated from the main power distribution system. It requires very efficient control strategy to control the speed of the machine in sudden variations and disturbances (such as different types of temporary faults) in the system. This paper proposes the idea of using fuzzy PID control strategy for controlling the governor of hydro power plant during different fault schemes. In the proposed scheme fuzzy PID controller is used to control the servo motor position through wicket gates or valves in order to control the flow of water that hits the turbine's blade. The different types of fault models such as single phase ground fault, double phase ground fault, three phase ground fault and phase to phase fault are applied to fuzzy PID and conventional PID controllers. The simulation results and performance indices such as RMSE (Root mean square value) clearly demonstrates the effectiveness and feasibility of the fuzzy PID control strategy as compared to the conventional PID. The purposed controller has fast response in recovering the speed of the machine during fault occurrences.","PeriodicalId":183101,"journal":{"name":"2016 Sixth International Conference on Innovative Computing Technology (INTECH)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122341226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Domain specific query generation from natural language text 从自然语言文本生成领域特定查询
2016 Sixth International Conference on Innovative Computing Technology (INTECH) Pub Date : 2016-08-01 DOI: 10.1109/INTECH.2016.7845105
Anum Iftikhar, Erum Iftikhar, Muhammad Khalid Mehmood
{"title":"Domain specific query generation from natural language text","authors":"Anum Iftikhar, Erum Iftikhar, Muhammad Khalid Mehmood","doi":"10.1109/INTECH.2016.7845105","DOIUrl":"https://doi.org/10.1109/INTECH.2016.7845105","url":null,"abstract":"This paper presents an approach to automate the generation of Structure Query Language from Natural Language Text. Software requirements specifications are most important part of Natural Language Processing, as little mistake in this phase results in absurd software design. Software Specifications are used in software industry. When we automatic translate these Natural Language Text into Structured Query Text we find Many issues because Software Specification is not an independent sentence they have many module related to each other. so when we translate these English text we have found many issues such as discourse, semantic and negation problem. The evaluation method for Natural Language texts is to test against a list of sentences, each of which is paired with yes or no. For this case I have study Natural Language text and their problems in my MS thesis. What Natural Language Texts are and what issues are found when we automatic translate these Texts into SQL. We used Stanford dependency parser for text translation.","PeriodicalId":183101,"journal":{"name":"2016 Sixth International Conference on Innovative Computing Technology (INTECH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128756447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Data level conflicts resolution for multi-sources heterogeneous databases 多源异构数据库的数据级冲突解决
2016 Sixth International Conference on Innovative Computing Technology (INTECH) Pub Date : 2016-08-01 DOI: 10.1109/INTECH.2016.7845088
Ali Mirza, I. Siddiqi
{"title":"Data level conflicts resolution for multi-sources heterogeneous databases","authors":"Ali Mirza, I. Siddiqi","doi":"10.1109/INTECH.2016.7845088","DOIUrl":"https://doi.org/10.1109/INTECH.2016.7845088","url":null,"abstract":"Integration of data from multiple, heterogeneous databases is a commonly encountered scenario in information retrieval systems where the user is to be provided with a unified view of information. These data sources may be from different vendors, may comprise different schemas and, could be physically at different locations. A number of techniques have been developed to merge schemas of multiple databases and address the resulting conflicts. While schema integration and resolution of schema conflicts has been an active area of research, relatively lesser attention is paid to the issue of data level conflicts. These conflicts may arise while merging the actual data that is retrieved from multiple databases. A dedicated mechanism needs to be implemented to identify and resolve the conflicts encountered during data integration which makes the subject of our study. This paper identifies few major and frequently occurring data level conflicts which are likely to arise while integrating data. We propose a framework that identifies and resolves these conflicts. The framework is implemented as a software system which we call DHResol. The system evaluated to merge two different databases successfully identified and resolved the discussed conflicts.","PeriodicalId":183101,"journal":{"name":"2016 Sixth International Conference on Innovative Computing Technology (INTECH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130590274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信