2009 International Conference for Internet Technology and Secured Transactions, (ICITST)最新文献

筛选
英文 中文
A comparative study on client server technology and web technology in design and implementation of an embedded system used for monitoring and controlling of physical parameters 客户端服务器技术与web技术在嵌入式物理参数监控系统设计与实现中的比较研究
S. Baruah, A. Mahanta, K. Sarma
{"title":"A comparative study on client server technology and web technology in design and implementation of an embedded system used for monitoring and controlling of physical parameters","authors":"S. Baruah, A. Mahanta, K. Sarma","doi":"10.1109/ICITST.2009.5402544","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402544","url":null,"abstract":"System developed for the stated study is a microcontroller based embedded system for monitoring and controlling of parameters like temperature and humidity. It can be implemented using simple client server technology as well as web technology. Users belong to the organizational domain can use their own Intranet for monitoring and controlling of parameters designed on simple client server technology whereas users beyond the scope of Intranet can use Internet interface designed using web technology. Both the technologies are having its own advantages as well as disadvantages. This paper explores the technological implications of the system using client server as well as web technology. Embedded hardware circuit is fabricated in to two separate digital circuits connecting two COM ports of Embedded server. First circuit will monitor temperature and humidity and display same in LCD. Application program executed in computer reads COM port and display the same in monitor and store in database. Second digital circuit will provide necessary hardware control of devices for controlling of temperature and humidity automatically. It is implemented through relay based on the user entered set value of temperature and humidity which is stored in database of computer. Developed system enable its both Intranet as well as or Internet users for monitoring and setting new values of temperature and humidity through the respective front end.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131786465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Server virtualization by user behaviour model using a data mining technique — A preliminary study 服务器虚拟化中使用用户行为模型的数据挖掘技术的初步研究
D. Prangchumpol, S. Sanguansintukul, P. Tantasanawong
{"title":"Server virtualization by user behaviour model using a data mining technique — A preliminary study","authors":"D. Prangchumpol, S. Sanguansintukul, P. Tantasanawong","doi":"10.1109/ICITST.2009.5402611","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402611","url":null,"abstract":"Server virtualization is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users. However, the problem of tuning dynamic resource allocation is a novelty. Managing heterogeneous workloads running within virtual machines is an interesting and challenging topic of server virtualization. This research applied association rule discovery, which is one of the data mining techniques to predict level of user access. The results illustrate that performance of the predictive model for a proxy server is 86.86%. The performance of the predictive model for a web server is 87.18%. Additionally, user behaviors for proxy and web servers are visualized. The results suggest that user behaviors are different in term of workload, day and time usage. This preliminary study may be an approach to improve management of data centers running heterogeneous workloads using server virtualization.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cross-domain classification: Trade-off between complexity and accuracy 跨领域分类:复杂性和准确性之间的权衡
E. Lex, C. Seifert, M. Granitzer, A. Juffinger
{"title":"Cross-domain classification: Trade-off between complexity and accuracy","authors":"E. Lex, C. Seifert, M. Granitzer, A. Juffinger","doi":"10.1109/ICITST.2009.5402559","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402559","url":null,"abstract":"Text classification is one of the core applications in data mining due to the huge amount of not categorized digital data available. Training a text classifier generates a model that reflects the characteristics of the domain. However, if no training data is available, labeled data from a related but different domain might be exploited to perform cross-domain classification. In our work, we aim to accurately classify unlabeled blogs into commonly agreed newspaper categories using labeled data from the news domain. The labeled news and the unlabeled blog corpus are highly dynamic and hourly growing with a topic drift, so a trade-off between accuracy and performance is required. Our approach is to apply a fast novel centroid-based algorithm, the Class-Feature-Centroid Classifier (CFC), to perform efficient cross-domain classification. Experiments showed that this algorithm achieves a comparable accuracy than k-NN and is slightly better than Support Vector Machines (SVM), yet at linear time cost for training and classification. The benefit of this approach is that the linear time complexity enables us to efficiently generate an accurate classifier, reflecting the topic drift, several times per day on a huge dataset.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121151892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Metrics for network forensics conviction evidence 网络取证定罪证据指标
A. Amran, R. Phan, D. Parish
{"title":"Metrics for network forensics conviction evidence","authors":"A. Amran, R. Phan, D. Parish","doi":"10.1109/ICITST.2009.5402640","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402640","url":null,"abstract":"Evaluation of forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to any network. This paper takes a step forward showing how security metrics can be used to sustain a sense of credibility to network evidence gathered as an elaboration and extension to an embedded feature of Network Forensic Readiness (NFR) — Redress that is defined as holding intruders responsible. We propose a procedure of evidence acquisition in network forensics where we then analyse sample of packet data in order to extract useful information as evidence through a formalised intuitive model, based on capturing adversarial behaviour and layer analysis. We then apply the Common Vulnerability Scoring System (CVSS) metrics to show that a forensics metrics system could assess the severity of network attacks committed, thus giving a degree of credibility to the evidence gathered. This way, hard evidence could be objectively collected to lend support to the resource-intensive process of investigation and litigation, leading to successful conviction, while reducing effort expended on the process.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128979572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans 用于优化跨世界查询执行计划的扩展多层黑板方法
P. Beran, E. Schikuta
{"title":"An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans","authors":"P. Beran, E. Schikuta","doi":"10.1109/ICITST.2009.5402518","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402518","url":null,"abstract":"New application domains ranging from the area of computational science (e.g. CERN Datagrid) to international business processes (e.g. Wal-Mart logistics) demand ever increasing storage capacities on a global scale. Therefore the ability to query and access data efficiently is one of the major challenges that drive research and development in the area of wide distributed data management. Due to the situation of a huge variety of underlying heterogeneous and homogenous infrastructures, where each showing specific hard- and software resources and a number of possible data sources, the optimization of the access process to the desired data is a challenging task. Hence, this paper introduces a novel heuristic approach for the optimization of query execution plans (QEP) on a global scale based on an extended multi-layered blackboard mechanism to determine which available (1) data, (2) resources, and (3) operations to use. The proposed method is illustrated by an application scenario of finding an optimal QEP for the retrieval of music information from an online music store.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network and content aware information management 网络和内容感知信息管理
S. Boldyrev, I. Oliver, Ronald Brown, Juha-Matti Tuupola, A. Palin, Antti Lappeteläinen
{"title":"Network and content aware information management","authors":"S. Boldyrev, I. Oliver, Ronald Brown, Juha-Matti Tuupola, A. Palin, Antti Lappeteläinen","doi":"10.1109/ICITST.2009.5402569","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402569","url":null,"abstract":"The presented approach addresses the problem of query and persistent query (subscription) resolution, taking into consideration distribution across multi-domains, network infrastructure and content management. This approach is particularly suitable for information-centric and cloud computing applications based around a mobile-device infrastructure.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115521610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An integrated framework For modelling the adoptive behaviour of online product recommendations 为在线产品推荐的采用行为建模的集成框架
W. Lin
{"title":"An integrated framework For modelling the adoptive behaviour of online product recommendations","authors":"W. Lin","doi":"10.1109/ICITST.2009.5402552","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402552","url":null,"abstract":"A new-product recommendation system supports users in making buying decisions. The method representing recommending results in accordance with users' preferences is one of the crucial technologies for persuading users to adopt the recommendations. A body of literature proposes technical improvements in recommendation systems (RS). However, the research that investigates users' behaviour toward adopting results presented by the RS is scarce. This paper targets the online scenario that customers provide post-purchase opinions; in this case, e-word-of-mouth (eWOMs). It investigates the choice model in terms of adoptive and evaluative behaviour of the eWOMs receivers (users of the recommendation systems). This paper presents ongoing research that proposes an integrated framework that links literature on the use of product recommendation systems.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126148525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simplified link reliability enhancement schemes for wireless networks 简化的无线网络链路可靠性增强方案
Boon Hoi Lim, C. Tan
{"title":"Simplified link reliability enhancement schemes for wireless networks","authors":"Boon Hoi Lim, C. Tan","doi":"10.1109/ICITST.2009.5402599","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402599","url":null,"abstract":"Today's Internet uses the IP protocol suite that was primarily designed for the transport of data and provides best-effort data delivery. Thus, it does not guarantee the quality of voice transmission that is highly sensitive to error and delay. The situation is even more severe in wireless networks which experience even more distortion and attenuation. Therefore, enhancing the voice traffic quality in the wireless network is essentials for users to experience the lowest erroneous voice traffic. The objective of this paper is to propose an enhanced link reliability scheme and a low level frame prioritize scheme where they are able to improve the QoS in voice traffic especially in wireless networks. Each scheme utilized the wireless environment to tackle the time sensitive traffic. The two schemes have been proven to be able to performance well in enhancing voice quality under specified circumstances via network simulations.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123418084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Yet another approach for dynamic web service composition 这是动态web服务组合的另一种方法
Kaouthar Boumhamdi, Zahi Jarir
{"title":"Yet another approach for dynamic web service composition","authors":"Kaouthar Boumhamdi, Zahi Jarir","doi":"10.1109/ICITST.2009.5435098","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5435098","url":null,"abstract":"Web services have received much interest due to their potential to design and build complex interenterprise business applications. A particular interest concerns dynamic web services composition that offers the opportunity for creating new web services at runtime from those already published in uddi registry. However, this composition requires necessarily quantifying criteria for web service selection to build a more appropriated one. The objective of this paper is to suggest an answer of this challenge by proposing a flexible architecture for dynamic web services composition related to user's requirements and to the availability of critical resources. In addition, this architecture has the ability to re-configure at runtime the created composite service, if some failures happen, in order to maintain a better quality of composite service.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
How does politics affect electronic healthcare adoption 政治如何影响电子医疗保健的采用
Zanifa Omary, F. Mtenzi, Bing Wu
{"title":"How does politics affect electronic healthcare adoption","authors":"Zanifa Omary, F. Mtenzi, Bing Wu","doi":"10.1109/ICITST.2009.5402502","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402502","url":null,"abstract":"In the 21 century, the term e-healthcare has become the common buzzword in the world. Its popularity is directly related to the rate of its adoption and benefits that it offers to individuals and governments. Among the common benefits include reduction in medical errors, improvements on physician efficiency, improvement in physician-patient relationship and an increase in the quality of care delivered. Despite all these benefits, politics is one among the obstacles hindering its adoption. In this paper we analyse how politics at local, national and international levels affect e-healthcare adoption and thereafter we suggest appropriate alternatives to overcome these obstacles.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信