Luis Carlos Coronado García, Jesús Alejandro González-Fuentes, Pedro Josué Hernández-Torres, C. P. Leguízamo
{"title":"An Autonomous Decentralized Service Oriented Architecture for High Reliable Service Provision","authors":"Luis Carlos Coronado García, Jesús Alejandro González-Fuentes, Pedro Josué Hernández-Torres, C. P. Leguízamo","doi":"10.1109/ISADS.2011.49","DOIUrl":"https://doi.org/10.1109/ISADS.2011.49","url":null,"abstract":"Service Oriented Architecture (SOA) represents a new model in the traditional way of designing systems, this is due to frequent change of requirements and high integration of the applications of organizations around the world. Although the use of SOA has increased, certain features of applications do not allow its use. This is the case of mission critical applications, whose characteristics are high availability, continuous operation, high flexibility, high performance, etc. On the other hand, these features have been covered in Autonomous Decentralized Systems (ADS). This article presents a SOA-ADS modeling novel approach called Autonomous Decentralized Service Oriented Architecture (ADSOA). Additionally it is presented the Loosely Coupling Synchronization and Transactional Delivery Technology that provides consistency and high availability. To show the viability of the proposal a prototype is presented.","PeriodicalId":221833,"journal":{"name":"2011 Tenth International Symposium on Autonomous Decentralized Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131721661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Store-Carry-Forward-Based Data Transfer Scheme Using Positions and Moving Direction of Vehicles for VANETs","authors":"Y. Ohta, T. Ohta, Eitaro Kohno, Y. Kakuda","doi":"10.1109/ISADS.2011.22","DOIUrl":"https://doi.org/10.1109/ISADS.2011.22","url":null,"abstract":"VANET (Vehicular Ad-hoc Network) that is used for vehicular-to-vehicular and vehicular-to-roadside communication is well known as one of the representative application of ad hoc networks. One of the representative mechanisms is Epidemic Routing that adopts the concept of Store-Carry-Forward. However, in Store-Carry-Forward mechanism, each node stores data packets in the buffer, and whenever the node meets at another node, it forwards the duplicated data packets. Therefore, this paper proposes a new reliable data forwarding mechanism that combines Epidemic routing, and the positioning information and moving direction of a node obtained from Global Positioning System (GPS) to reduce widespread forwarded data packets. The proposed scheme forwards data packets using the Store-Carry-Forward mechanism to the neighboring nodes that are determined by the positioning information and moving direction of a node. As a result, we confirmed that the proposed scheme has better performance than Epidemic routing with respect to the total volume of forwarded packets and consumed packet buffer through simulation experiments.","PeriodicalId":221833,"journal":{"name":"2011 Tenth International Symposium on Autonomous Decentralized Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127605841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assuring Mobile Physical Services for the New Generation of Networks","authors":"Yinong Chen","doi":"10.1109/ISADS.2011.83","DOIUrl":"https://doi.org/10.1109/ISADS.2011.83","url":null,"abstract":"The development of computing and communication systems has gone through a spiral cycle of centralization and decentralization schemas. The earliest telephone network used decentralized point-to-point connections. It moved to centralized switching system as the number of devices increased. The centralized computing and communication systems further moved into a decentralized paradigm, as devices expand and dependability of large systems becomes a dominating factor. The current cloud computing and communication systems appear to be a centralized system where computing and communication resources are not in the client computers but in an integrated infrastructure. Nevertheless, the implementation of the centralized infrastructure is equipped with decentralized and redundant resources, which makes the system more dependable as any internal failures can be tolerated internally. However, the terminal devices and their interfaces to the centralized infrastructure remain vulnerable to the single-point-of-failures. This paper focuses on terminal devices and their interfaces to the new generation of assurance network and presents the challenges of making the devices and the interfaces as dependable as the assurance network. The idea of achieving the goal is through a pool of Mobile Physical Services (MPS) that can connect to multiple networks and can be shared by neighboring users.","PeriodicalId":221833,"journal":{"name":"2011 Tenth International Symposium on Autonomous Decentralized Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134388071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction of Ubiquitous Service Platform Project CUBIQ","authors":"M. Ohashi","doi":"10.1109/ISADS.2011.66","DOIUrl":"https://doi.org/10.1109/ISADS.2011.66","url":null,"abstract":"The CUBIQ (Cross UBIQuitous platform) project is a national R&D project in Japan for establishing a multi-domain context-aware service platform from 2008 to 2010. It involves setting up a common service platform environment on which many sensors, devices, mobile phones and actuators can be universally handled and connected to ubiquitous networks even in the autonomous distributed environment. Six companies and three universities are involved. All members work cooperatively on a framework for horizontal collaboration. A field trial with CUBIQ was conducted from Nov.-Dec. 2010 in Kashiwanoha, Japan to verify the effectiveness of the service platform and acceptability of context-aware services from the users’ points of view.","PeriodicalId":221833,"journal":{"name":"2011 Tenth International Symposium on Autonomous Decentralized Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116066278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Razzaq, Ali Hur, M. Masood, K. Latif, H. F. Ahmad, Hironao Takahashi
{"title":"Foundation of Semantic Rule Engine to Protect Web Application Attacks","authors":"A. Razzaq, Ali Hur, M. Masood, K. Latif, H. F. Ahmad, Hironao Takahashi","doi":"10.1109/ISADS.2011.19","DOIUrl":"https://doi.org/10.1109/ISADS.2011.19","url":null,"abstract":"The exponentially increasing cyber threats with the expansion of web applications have become the biggest security concern for e-business and information sharing communities. Current survey shows that application layer is more prone to web attacks. Recent survey carried out by Nation Vulnerability Database shows that, on average 15 new vulnerabilities are released per day, thus proved that existing application security mechanisms are ineffective to provide complete security solution. We have proposed an intelligent intrusion detection system (IDS) base on ontology that specifying the different categories of attacks, different encoding schemes used by the hacker, location of attack, system component affected by attack, specification of protocols used and policies/rules for mitigating these attacks. The proposed ontology base system can be refined and expanded over time. The system semantically analyzes the specific field of payload and headers where attack is possible. Inference ability of the system provide the capability for detecting the zero day and complex web application attacks that easily eludes packet level inspection. Proposed system is time efficient by analyzing the specified field of protocol, would be able to provide significant search space reduction as well as low false positive rate. For describing the semantic concepts, Prottege tool is used. OWL-DL used for describing logical class with restrictions. For consistency and inference purpose, Pallet tool is used as inference engine and rules are specified by using Jena API which also provide the reasoning ability.","PeriodicalId":221833,"journal":{"name":"2011 Tenth International Symposium on Autonomous Decentralized Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123857634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Error-Tolerance in Quantifying Traffic States Using Mobile Phones","authors":"Q. Minh, E. Kamioka","doi":"10.1109/ISADS.2011.78","DOIUrl":"https://doi.org/10.1109/ISADS.2011.78","url":null,"abstract":"This paper analyzes the effect of penetration rate to the estimation error in mobile phone based traffic state estimation systems. More concretely, the error-tolerance is analyzed based upon the penetration rate of participating mobile phones. In addition, a hybrid model by which not only real-time data but also the historical data utilized under a suitable data mining technique is introduced. This work also introduces an effective method for dynamically creating the historical dataset which is especially adequate for the aforementioned data mining model. This approach improves not only the effectiveness, robustness and the accuracy but also the scalability of the system. The evaluation reveals that the estimation error is sensitive to the penetration rate while the existing work did not mention.","PeriodicalId":221833,"journal":{"name":"2011 Tenth International Symposium on Autonomous Decentralized Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130391306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Titichaya Thanamitsomboon, Hiroyuki Endo, Xiaodong Lu, K. Mori
{"title":"Autonomous Heterogeneous Community Technology for Effective Resource Utilization","authors":"Titichaya Thanamitsomboon, Hiroyuki Endo, Xiaodong Lu, K. Mori","doi":"10.1109/ISADS.2011.45","DOIUrl":"https://doi.org/10.1109/ISADS.2011.45","url":null,"abstract":"In rapidly changing service provision system, users' requirements and resource movement are constantly changing. To effectively utilize resource and provide the non-stop service to users, autonomous decentralized community system has been proposed. Community is autonomously formed with local majority sharing among same-preference members, and each member cooperate to one another autonomously. Moreover, the resource transportations in community can be simultaneously moved to adjacent members in one step. However, if the resources are insufficient when users' requests are detected, the continuity of service flow may be interrupted. Therefore, this paper proposes autonomous heterogeneous community technology (AHCoT) to improve the service response time and the efficiency in resource utilization. In AHCoT, a subsystem that lacks in resources autonomously forms a community to ask for extra resources, and a subsystem that is surplus in resources autonomously forms a community to distribute the over-stock resources. With two ways of community constructions, the coordination in order to allocate resources to continuously serve users can be cooperated faster. Hence, the timeliness to serve users and resource utilization efficiency can be achieved.","PeriodicalId":221833,"journal":{"name":"2011 Tenth International Symposium on Autonomous Decentralized Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130488118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Method of Interoperability Test for the Onboard Equipment of CTCS-3 Train Control System of Chinese Railway","authors":"Yu Liu, T. Tang","doi":"10.1109/ISADS.2011.61","DOIUrl":"https://doi.org/10.1109/ISADS.2011.61","url":null,"abstract":"The CTCS-3 (Chinese Train Control System Level 3) technical standards system has been adopted for the train control system of railway lines with speed of 350km/h and above in China. In this paper, the requirements of the interoperability of CTCS-3 on-board equipment was firstly analyzed in depth, to definite the features of the interoperability test, secondly the testing methodology of the interoperability test of CTCS-3 were studied and compared, and the testing method suitable for independent third-party interoperability testing was discussed, in addition the structure and basic working principle of the test bench for interoperability testing of CTCS-3 on-board equipment was described. The research results of this paper can provide a guidance for how to carry out laboratory interoperability test and how to establish the third-party interoperability test laboratory.","PeriodicalId":221833,"journal":{"name":"2011 Tenth International Symposium on Autonomous Decentralized Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122822037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New SMN Configuration Method for RSR Considering Node Energy Consumption in MANETs","authors":"Mario Takeuchi, Eitaro Kohno, T. Ohta, Y. Kakuda","doi":"10.1109/ISADS.2011.77","DOIUrl":"https://doi.org/10.1109/ISADS.2011.77","url":null,"abstract":"In mobile ad hoc networks, the status of the network changes over time due to the movement of terminals, the battery level of terminals, and so on. To construct assurance networks, it is necessary to consider requirements such as dependability, security, and adaptability against changes in the network. We had proposed a routing method, which is referred to as RSR (Route-Split Routing) for mobile ad hoc networks. With RSR, serious drawbacks occur when a node exhausts its battery. In this paper, we have proposed a new SMN (Sub route Management Node) configuration scheme and a dynamic new method where the SMN role changes to adjacent nodes. To evaluate the effectiveness of our method, we have implemented our method with a simulator and have conducted simulation experiments. The results indicate that our method is effective when nodes have various levels of battery power and power consumption.","PeriodicalId":221833,"journal":{"name":"2011 Tenth International Symposium on Autonomous Decentralized Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115882749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Fault Tolerance Mechanism for On-Board Fault Early Warning System Based on ADS Theory","authors":"X. Zeng, Lei Qiu, Fan Mo, Shao-yin Wang, Zhi Chen","doi":"10.1109/ISADS.2011.102","DOIUrl":"https://doi.org/10.1109/ISADS.2011.102","url":null,"abstract":"Fault tolerance is important properties of ADS theory. To improve the safety and reliability of the system is mainly by Fault tolerance technology. The data loss and data error existed in traditional On-board fault early warning system. Taking On-board Fault Early Warning System as examples, this paper studied the fault tolerance mechanism, raised fault-tolerant technical scheme high safety and reliability.","PeriodicalId":221833,"journal":{"name":"2011 Tenth International Symposium on Autonomous Decentralized Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130933813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}