2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)最新文献

筛选
英文 中文
A System for Supporting Migration to Overlay OpenFlow Network Using OpenStack 一种支持通过OpenStack迁移到OpenFlow覆盖网络的系统
Keita Nomura, Y. Taniguchi, N. Iguchi, Kenzi Watanabe
{"title":"A System for Supporting Migration to Overlay OpenFlow Network Using OpenStack","authors":"Keita Nomura, Y. Taniguchi, N. Iguchi, Kenzi Watanabe","doi":"10.1109/CISIS.2016.83","DOIUrl":"https://doi.org/10.1109/CISIS.2016.83","url":null,"abstract":"OpenFlow network technologies has attracted attention along with popularization of cloud environment and server virtualization since it enables flexible network configuration. It is expected that existing networks of many organizations will migrate to OpenFlow networks in the future. Since it takes a huge cost to replace all existing network devices to OpenFlow switches, many organizations consider to employ overlay OpenFlow networks where virtual OpenFlow devices are introduced at endpoint servers. In overlay OpenFlow networks, the cost for migration increases according to the number of servers. In this paper, we propose a system for supporting migration to an overlay OpenFlow network. Our proposed system acquires settings of servers in the existing network endpoints and reflects them to the overlay OpenFlow network. Through experimental evaluations, we confirm the behavior of the configuration acquisition function of our proposed system.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131839644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services 在云服务之上建立安全功能的安全sla驱动方法
V. Casola, Alessandra De Benedictis, Madalina Erascu, M. Rak, Umberto Villano
{"title":"A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services","authors":"V. Casola, Alessandra De Benedictis, Madalina Erascu, M. Rak, Umberto Villano","doi":"10.1109/CISIS.2016.116","DOIUrl":"https://doi.org/10.1109/CISIS.2016.116","url":null,"abstract":"The extensive use of cloud services by both individual users and organizations induces several security risks. The risk perception is higher when Cloud Service Providers (CSPs) do not clearly state their security policies and/or when such policies do not directly match user-defined requirements. Security-oriented Service Level Agreements (Security SLAs) represent a fundamental means to encourage the adoption of cloud services in contexts where security is mandatory. Nevertheless, despite the number of existing initiatives aimed at formalizing Security SLAs and at representing security guarantees by taking into account both customers' and providers' perspectives, they are far from being commonly adopted in practice by CSPs, due to the difficulty in automatically enforcing and monitoring the security capabilities agreed with customers. In this paper we illustrate, through a case study, a methodology to set-up a catalogue of security capabilities that can be offered as-a-service, on top of which specific guarantees can be specified through a Security SLA. Such a methodology, which explicitly takes into account the constraints behind the definition of formal guarantees related to security, is meant to serve as a guideline for providers willing to offer for their services specific security features that can be monitored and assessed by customers during operation.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131109437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Fuzzy-Based System for Improving Node Security in MANET Clusters 基于模糊的MANET集群节点安全改进系统
Mirjeta Alinci, Takaaki Inaba, Donald Elmazi, Evjola Spaho, Vladi Koliçi, L. Barolli
{"title":"A Fuzzy-Based System for Improving Node Security in MANET Clusters","authors":"Mirjeta Alinci, Takaaki Inaba, Donald Elmazi, Evjola Spaho, Vladi Koliçi, L. Barolli","doi":"10.1109/CISIS.2016.54","DOIUrl":"https://doi.org/10.1109/CISIS.2016.54","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a multi-hop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped into clusters to achieve better stability and scalability. Grouping the mobile nodes is called clustering, in which a leader node is elected to manage the entire network. In this paper, first we introduce various approaches for clustering focus on different performance metrics. Then, we show some clustering schemes such as Mobility-based clustering, Energy-efficient clustering, Connectivity-based clustering, Weighted-based clustering. Finally, we present a Fuzzy based approach for improving the security of cluster nodes in MANETs. From the simulation results, we found that by selecting nodes with high SC rate, the nodes are more secure and the system performance is improved.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey on Fuzzy Logic Applications in Wireless and Mobile Communication for LTE Networks 模糊逻辑在LTE网络无线和移动通信中的应用综述
Ahmad Mudassir, S. Akhtar, Hesham Kamel, N. Javaid
{"title":"A Survey on Fuzzy Logic Applications in Wireless and Mobile Communication for LTE Networks","authors":"Ahmad Mudassir, S. Akhtar, Hesham Kamel, N. Javaid","doi":"10.1109/CISIS.2016.106","DOIUrl":"https://doi.org/10.1109/CISIS.2016.106","url":null,"abstract":"This paper conducts a comprehensive survey on fuzzy logic applications in wireless and mobile communication area in general and of growing LTE communication networks in particular. The survey aims to highlight the principles of fuzzy logic applications in the area of channel estimation, channel equalization, handover management, QoS management. Furthermore, in LTE advanced heterogeneous networks fuzzy logic applications in the area of interference management are also spotlighted.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131528573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Web Service for C Programming Learning and Teaching 一个面向C语言编程学习与教学的Web服务
Yu Yan, Hiroto Nakano, Kohei Hara, Takenobu Kazuma, A. He
{"title":"A Web Service for C Programming Learning and Teaching","authors":"Yu Yan, Hiroto Nakano, Kohei Hara, Takenobu Kazuma, A. He","doi":"10.1109/CISIS.2016.70","DOIUrl":"https://doi.org/10.1109/CISIS.2016.70","url":null,"abstract":"C is a basic computer language widely used in both industry and education. Many computer programming beginners choose C as the first computer language to learn. But it is difficult for the beginners, especially for high-school students, to learn C programming because the learning supporting environment is not enough. This research proposes PROVIT(PROgramming VIsualization Tool) for Web, an e-Learning supporting environment for C programming education. PROVIT for Web has many features:(1) It can be used to write, run and check C programs without installing any IDE, (2) It especially can be used at lecture to show the execution of C program step by step, and (3) It can detect more run time error often seen in beginner's program. Web PROVIT has been used in a C programming course in author's university. This paper reports the design, implementation and the result of experimental use of PROVIT for Web.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126494079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fuzzy-Based Approach for Classifying Students' Emotional States in Online Collaborative Work 基于模糊的在线协同作业中学生情绪状态分类方法
Marta Arguedas, Luis A. Casillas, F. Xhafa, T. Daradoumis, Adriana Peña Pérez Negrón, S. Caballé
{"title":"A Fuzzy-Based Approach for Classifying Students' Emotional States in Online Collaborative Work","authors":"Marta Arguedas, Luis A. Casillas, F. Xhafa, T. Daradoumis, Adriana Peña Pérez Negrón, S. Caballé","doi":"10.1109/CISIS.2016.141","DOIUrl":"https://doi.org/10.1109/CISIS.2016.141","url":null,"abstract":"Emotion awareness is becoming a key aspect in collaborative work at academia, enterprises and organizations that use collaborative group work in their activity. Due to pervasiveness of ICT's, most of collaboration can be performed through communication media channels such as discussion forums, social networks, etc. The emotive state of the users while they carry out their activity such as collaborative learning at Universities or project work at enterprises and organizations influences very much their performance and can actually determine the final learning or project outcome. Therefore, monitoring the users' emotive states and using that information for providing feedback and scaffolding is crucial. To this end, automated analysis over data collected from communication channels is a useful source. In this paper, we propose an approach to process such collected data in order to classify and assess emotional states of involved users and provide them feedback accordingly to their emotive states. In order to achieve this, a fuzzy approach is used to build the emotive classification system, which is fed with data from ANEW dictionary, whose words are bound to emotional weights and these, in turn, are used to map Fuzzy sets in our proposal. The proposed fuzzy-based system has been evaluated using real data from collaborative learning courses in an academic context.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Demand Side Management Using Hybrid Bacterial Foraging and Genetic Algorithm Optimization Techniques 基于混合细菌觅食和遗传算法优化技术的需求侧管理
Adia Khalid, N. Javaid, Abdul Mateen, B. Khalid, Z. Khan, U. Qasim
{"title":"Demand Side Management Using Hybrid Bacterial Foraging and Genetic Algorithm Optimization Techniques","authors":"Adia Khalid, N. Javaid, Abdul Mateen, B. Khalid, Z. Khan, U. Qasim","doi":"10.1109/CISIS.2016.128","DOIUrl":"https://doi.org/10.1109/CISIS.2016.128","url":null,"abstract":"Today, energy is the most valuable resource, new methods and techniques are being discovered to fulfill the demand of energy. However, energy demand growth causes a serious energy crisis, especially when demand is comparatively high and creates the peak load. This problem can be handled by integrating Demand Side Management (DSM) with traditional Smart Grid (SG) through two way communication between utility and customers. The main objective of DSM is peak load reduction where SG targets cost minimization and user comfort maximization. In this study, our emphasis is on cost minimization and load management by shifting the load from peak hours toward the off peak hours. In this underlying study, we adapt hybridization of two optimization approaches, Bacterial Foraging (BFA) and Genetic Algorithm (GA). Simulation results verify that the adapted approach reduces the total cost and peak average ratio by shifting the load on off peak hours with very little difference between minimum and maximum 95% confidence interval.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Avoiding Energy Holes in Underwater Wireless Sensor Networks with Balanced Load Distribution 平衡负载分布水下无线传感器网络中能量空洞的避免
Irfan Azam, Abdul Majid, Tanveer Khan, Sajjad, Z. Khan, U. Qasim, N. Javaid
{"title":"Avoiding Energy Holes in Underwater Wireless Sensor Networks with Balanced Load Distribution","authors":"Irfan Azam, Abdul Majid, Tanveer Khan, Sajjad, Z. Khan, U. Qasim, N. Javaid","doi":"10.1109/CISIS.2016.109","DOIUrl":"https://doi.org/10.1109/CISIS.2016.109","url":null,"abstract":"In this paper, we overcome the problem of energy holes in UWSNs while considering the unique characteristics of underwater communication. In proposed scheme we consider UWSNs where nodes are manually deployed according to the defined deployment pattern to satisfy our application requirements in terms of energy saving. We used mixed routing technique i.e. direct transmission and hop-by-hop transmission for energy balancing in continuous monitoring applications for UWSNs. Sensor nodes forward the total data traffic (generated plus received) periodically to the sink with calculated load weights using variable communication ranges. The transmission ranges for 1-hop, 2-hop and direct transmission to the sink are used for data transmission to achieve load balancing for balanced energy consumption of all sensor nodes in the network. We prove that our scheme outperforms the existing selected schemes in terms of network lifetime and energy conservation. We select an optimal result from the simulation results for different possible combinations of transmissions.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of an Ambient Intelligence Testbed for Improving Quality of Life: Evaluation Using Clustering Approach 提高生活质量的环境智能试验台性能评估:基于聚类方法的评估
Ryoichiro Obukata, Tetsuya Oda, Donald Elmazi, L. Barolli, Keita Matsuo, I. Woungang
{"title":"Performance Evaluation of an Ambient Intelligence Testbed for Improving Quality of Life: Evaluation Using Clustering Approach","authors":"Ryoichiro Obukata, Tetsuya Oda, Donald Elmazi, L. Barolli, Keita Matsuo, I. Woungang","doi":"10.1109/CISIS.2016.59","DOIUrl":"https://doi.org/10.1109/CISIS.2016.59","url":null,"abstract":"Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as homes, offices, meeting rooms, schools, hospitals, control centers, vehicles, tourist attractions, stores, sports facilities, and music devices. In this paper, we present the design and implementation of a testbed for AmI using Raspberry Pi mounted on Raspbian OS. We analyze the performance of k-means clustering algorithm. For evaluation we considered respiratory rate and heart rate metrics. The simulation results show that the k-means clustering algorithm has a good performance.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125358969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EEIRA: An Energy Efficient Interference and Route Aware Protocol for Underwater WSNs EEIRA:一种高效的水下无线传感器网络干扰和路由感知协议
A. Khan, N. Javaid, Hassan Mahmood, Sangeen, Z. Khan, U. Qasim
{"title":"EEIRA: An Energy Efficient Interference and Route Aware Protocol for Underwater WSNs","authors":"A. Khan, N. Javaid, Hassan Mahmood, Sangeen, Z. Khan, U. Qasim","doi":"10.1109/CISIS.2016.129","DOIUrl":"https://doi.org/10.1109/CISIS.2016.129","url":null,"abstract":"In this paper, an energy efficient, interference and route aware (EEIRA) protocol is proposed for underwater wireless sensor networks (UWSNs). The protocol combines the direct and relay forwarding mechanisms in transmitting the packets from source to destination. The relaying process involves selection of the best relay from a set of relay nodes. A relay node having the least distance from source to destination and the minimum number of neighbor nodes qualifies the criterion of the best relay. The direct transmission is used when the best relay is not within the transmission range of the source node. From top to bottom, the network is divided into three different zones, destination, relay and source zone, respectively. The relay zone has the greatest area to have maximum choices of selecting the best relay from the relay nodes residing in it. Nodes in all the three regions can sense the attribute and send the data to the sink. The destination nodes send data directly to sink. The relay nodes send the packets to the sink either directly or through the relaying process. The source nodes in the bottom send the data to sink via the best relay node or directly. Based on simulation results, the proposed protocol outperforms the depth based routing (DBR) scheme in terms of energy efficiency by selecting the best relay, reducing number of hops and following the shortest path to reduce channel losses.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信