2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)最新文献

筛选
英文 中文
Numerical Analysis of Transmission Spectrum of X-shaped Photonic Crystal Waveguide for WDM System WDM系统中x形光子晶体波导透射谱的数值分析
H. Maeda, M. Čada, Yuting Bao, Jianming Jin, Kazuya Tomiura
{"title":"Numerical Analysis of Transmission Spectrum of X-shaped Photonic Crystal Waveguide for WDM System","authors":"H. Maeda, M. Čada, Yuting Bao, Jianming Jin, Kazuya Tomiura","doi":"10.1109/CISIS.2016.87","DOIUrl":"https://doi.org/10.1109/CISIS.2016.87","url":null,"abstract":"Frequency filtering characteristics by cavities of three different lengths situated in X-shaped photonic crystal waveguide with triangular lattice was simulated by constrained interpolated profile (CIP) method. From analysisi by fast Fourier transform of output signal, the resonant peak frequencies of filtered spectrum by microwave experiment and those by the simulation coincided each other in difference of order of 1%.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Fast Classification Method of Isomorphic Polygons in Design Data of Large Scale Integrated Circuit 大型集成电路设计数据中同构多边形的快速分类方法
S. Shoji, A. Koyama
{"title":"A Fast Classification Method of Isomorphic Polygons in Design Data of Large Scale Integrated Circuit","authors":"S. Shoji, A. Koyama","doi":"10.1109/CISIS.2016.65","DOIUrl":"https://doi.org/10.1109/CISIS.2016.65","url":null,"abstract":"A large number of isomorphic polygons are included in design data of large scale integrated circuit. Fast search and classification for isomorphic polygons in these design data are expected to apply to compactification of design data and fast pattern search. A pattern matching method was proposed to reduce a large amounts of design data efficiently. In this method, feature of polygon shape is expressed by an angle-segment sequence called contour signature. So, this method realizes fast processing by efficient comparison using the contour signature. Furthermore, this method realizes compactification of the design data by hashing of classification results. However, there is a problem that feature amounts increase with increase of the number of vertices of polygons. As a result, computation amounts and memory usage amounts are increased. To solve this problem, in this paper, we propose a high speed and high accuracy classification method of isomorphic polygons. The proposed method can reduce a shape comparison process significantly by using a geometric invariant feature value for a polygon. The feature value is calculated by summation of distance from each vertex to center of gravity, and a polygon contour length. This value does not be affected by parallel shift, rotation and reduced scale. The feature value is same for isomorphic polygons and it is possible to fast access an isomorphic polygon group. From evaluation results of the proposed method, we verified that the proposed method can realize fast classification for isomorphic polygons, and compactification of design data.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DemoGRAPE: Managing Scientific Applications in a Cloud-Federated Environment DemoGRAPE:在云联合环境中管理科学应用程序
A. Scionti, P. Ruiu, O. Terzo, L. Spogli, L. Alfonsi, V. Romano
{"title":"DemoGRAPE: Managing Scientific Applications in a Cloud-Federated Environment","authors":"A. Scionti, P. Ruiu, O. Terzo, L. Spogli, L. Alfonsi, V. Romano","doi":"10.1109/CISIS.2016.95","DOIUrl":"https://doi.org/10.1109/CISIS.2016.95","url":null,"abstract":"There is a strong relationship between scientific research and technology advancement. The former generally focuses on studying phenomena happening in the real world, the latter improves tools that are at the basis of this research. From this perspective, information and communication technologies allow the implementation of ever faster tools for analyzing data generated by experiments. The aim of DemoGRAPE project is to study the interaction of the upper earth atmosphere and the GNSS (Global Navigation Satellite Systems) signals received at ground, in critical environments such as the polar regions. This paper describes the ICT infrastructure used to manage the software applications used to analyzed data collected during project experimental campaigns, taking into account the following constraints: (i) the intellectual property of the applications must be protected, (ii) the underlying infrastructure resembles a cloud-federation, (iii) data are over-sized, (iv) provide a unified vision of the available resources to the user (i.e., what are the available applications, and where experimental data reside). Leveraging on a lightweight virtualization system, we proposed a management system that copes with all these four constraints. A case study is used to show the process of deploying an application through the proposed system on a specific node where data of interest reside.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129080912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experimental Verification of Docker-Based Distributed Cloud Applications for Secured Mobile VoIP 基于docker的安全移动VoIP分布式云应用实验验证
Byung-Rae Cha, Sun Park, JongWon Kim
{"title":"Experimental Verification of Docker-Based Distributed Cloud Applications for Secured Mobile VoIP","authors":"Byung-Rae Cha, Sun Park, JongWon Kim","doi":"10.1109/CISIS.2016.100","DOIUrl":"https://doi.org/10.1109/CISIS.2016.100","url":null,"abstract":"Cloud computing paradigm has been driving the cloud-leveraged refactoring of existing ICT services including VoIP. In this paper, we design and prototype secured mobile VoIP services with open-source Asterisk PBX software by employing Docker lightweight virtualization for mobile devices. We also experimentally verify the quality of secured voice and the associated communication delay over distributed global connectivity environment.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123424817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gene Ontology Based Clustering Analysis for Functionally Linked Genes and Cross-Species Comparison for SSR Biomarkers 基于基因本体的功能连锁基因聚类分析及SSR生物标记的跨物种比较
Yang-Chun Chang, Chien-Ming Chen, Tun-Wen Pai, Ronshan Cheng, Ming-Hsiung Chiu
{"title":"Gene Ontology Based Clustering Analysis for Functionally Linked Genes and Cross-Species Comparison for SSR Biomarkers","authors":"Yang-Chun Chang, Chien-Ming Chen, Tun-Wen Pai, Ronshan Cheng, Ming-Hsiung Chiu","doi":"10.1109/CISIS.2016.71","DOIUrl":"https://doi.org/10.1109/CISIS.2016.71","url":null,"abstract":"Molecular biomarkers are important and commonly used as classification features for detecting function performances of target genes and distinguishing characteristics of different species or strains. As expeditious development in Next Generation Sequencing technologies, whole genome sequencing delivers a comprehensive view and new insights for novel species. However, utilization of whole genome sequences to discover genetic biomarkers for specific functional gene groups still possess many challenges. To solve this problem, we utilized Gene Ontology definitions and Ensembl orthologous information to decide a set of associated functional genes according to user's query keywords. Then, previously assembled NGS contigs were matched against the selected gene set from model species, and an SSR searching algorithm and a cross-species comparison mechanism were performed to reveal potential polymorphic SSR biomarkers. Each identified SSR would be annotated and classified by important attributes, such as lengths, genetic locations, fundamental repeat patterns, tolerant rates of retrieved SSRs. The developed system could identify novel SSR biomarkers for a specified functional gene group regarding conserved and unique features between the query and the target model species, and which could facilitate biologists in finding potential markers for elucidating biological functions and distinguishable features of a novel species.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"1817 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124961584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Core Point Paradigm and Evolution with Water Ripple Model 核心点范式与水波纹模型的演化
Zhibing Yu, Kun Ma, Bo Yang
{"title":"Core Point Paradigm and Evolution with Water Ripple Model","authors":"Zhibing Yu, Kun Ma, Bo Yang","doi":"10.1109/CISIS.2016.131","DOIUrl":"https://doi.org/10.1109/CISIS.2016.131","url":null,"abstract":"Based on core point evolution using water ripplemodel, the thought of software development methodology is thatthe development of a complex system is translated into the waterripple sustainable evolution of core point. However, the corepoint is defined from three levels, which are domain, feature andfunction. And it does not give a general definition of the corepoint. In addition, the evolution of the core point only gives asimple evolutionary model, and there is no evolutionary algorithmbetween the core points. To address these problems, this paperfurther improves the feature and function core points, and putforward the framework and level core points. Then, this paperalso give the corresponding evolutionary algorithm. Based onthese two points, this paper developed a prototype system inorder to demonstrate the water ripple evolution of the varioustypes of core points.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130325893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable Group Communication Protocols in the Peer-to-Peer Model of Topic-Based Publish/Subscribe Systems 基于主题的发布/订阅系统对等模型中的可扩展组通信协议
Hiroki Nakayama, Shigenari Nakamura, T. Enokido, M. Takizawa
{"title":"Scalable Group Communication Protocols in the Peer-to-Peer Model of Topic-Based Publish/Subscribe Systems","authors":"Hiroki Nakayama, Shigenari Nakamura, T. Enokido, M. Takizawa","doi":"10.1109/CISIS.2016.123","DOIUrl":"https://doi.org/10.1109/CISIS.2016.123","url":null,"abstract":"A distributed system is considered in an event-driven model composed of processes which are sequences of events. In this paper, we discuss a peer-to-peer (P2P) model of a topic-based publish/subscribe system (P2PPS model) where each peer process (peer) can both subscribe interesting topics and publish event messages. Since each peer can both publish and receive event messages, a peer may publish an event message e1 after receiving an event message e2. In the P2PPS system, event messages have to be notified to every common target peer in the causal order. In the TBC (topicbased causally delivery) protocol, event messages are causally delivered by taking advantage of physical time in addition to linear time and topic vector. Physical time is used to reduce pairs of event messages unnecessarily ordered. In this paper, we discuss the relation among the clock offset and delay time in the evaluation.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114076404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dense 3D Mapping Using Volume Reigstration from Monocular View 密集的三维映射使用体注册从单目视图
Luke Lincoln, R. González
{"title":"Dense 3D Mapping Using Volume Reigstration from Monocular View","authors":"Luke Lincoln, R. González","doi":"10.1109/CISIS.2016.99","DOIUrl":"https://doi.org/10.1109/CISIS.2016.99","url":null,"abstract":"In previous work it has been shown that volume registration can be used to generate dense 3D maps from RGBD video data with various advantages over feature matching approaches. This paper presents preliminary work in applying this technique to general monocular video data. This approach does not require additional RGB-D hardware and generates dense 3D models with similar complexity.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Fuzzy Logic for Secure Handover in Wireless Cellular Networks 模糊逻辑在无线蜂窝网络安全切换中的应用
Takaaki Inaba, Donald Elmazi, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli
{"title":"Application of Fuzzy Logic for Secure Handover in Wireless Cellular Networks","authors":"Takaaki Inaba, Donald Elmazi, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1109/CISIS.2016.72","DOIUrl":"https://doi.org/10.1109/CISIS.2016.72","url":null,"abstract":"Several schemes have been proposed for handover in wireless cellular networks. However, during the complexity of handover in wireless environment, many simplified models and assumptions are made. Also, the handover algorithms operating in real time have to make decisions without the luxury of repeated uncorrelated measurements or the future signal strength information. It should be noted that some of handover criteria information can be inherently imprecise, or the precise information is difficult to obtain. For this reason, we propose a Fuzzy Logic (FL) based approach for handover for wireless cellular networks (Secure-aware Fuzzy-based Handover System: S-FBHS) considering the security parameter for the FBHS. The simulation results show that the S-FBHS has a good behavior.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128450188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information Flow Control Models in Peer-to-Peer Publish/Subscribe Systems 点对点发布/订阅系统中的信息流控制模型
Shigenari Nakamura, T. Enokido, M. Takizawa
{"title":"Information Flow Control Models in Peer-to-Peer Publish/Subscribe Systems","authors":"Shigenari Nakamura, T. Enokido, M. Takizawa","doi":"10.1109/CISIS.2016.122","DOIUrl":"https://doi.org/10.1109/CISIS.2016.122","url":null,"abstract":"A publish/subscribe (PS) model is an event-driven model of a distributed system. In this paper, we consider a peer-to-peer (P2P) type of PS model where each peer (process) can publish and subscribe events. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event. Publications and subscriptions are specified in terms of topics as discussed in topic-based PS systems. In this paper, we newly discuss a topic-based access control (TBAC) model to prevent illegal information flow among peers in PS systems. Here, an access right is a pair \"t, op\" of a topic t and an operation op which is publish or subscribe. A peer is allowed to publish an event message with topics and subscribe topics only if the topics are granted to the peer. An event message e is notified to a peer pi if the publication of e and subscription of pi include some common topic. If a peer pi publishes an event message e2 after receiving an event message e1, the event message e2 may bring the event of e1, which the peer pi is not allowed to publish. Here, information in the peer pi illegally flow to another peer. We define the legal flow relation among the peers. Then, we newly propose a subscription-based synchronization (SBS) protocol to prevent illegal information flow. Here, a notification is banned if the notification may cause illegal information flow. We evaluate the SBS protocol in terms of number of notifications banned.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信