{"title":"Analysis of Heterogeneous Complex Networks Using the Degree of Diffusion","authors":"Eman AlDwaisan, Maytham Safar, Khaled Mahdi","doi":"10.1109/NBiS.2013.12","DOIUrl":"https://doi.org/10.1109/NBiS.2013.12","url":null,"abstract":"Diffusion is the process of spreading information throughout a network. The degree of diffusion a has been used to measure the diffusion and the adoption rates of different complex networks. It is defined as the percentage between the adopters and non-adopters in a network during the diffusion process. In our previous work [1], we only studied the degree of diffusion for directed networks. In this paper, we extend our previous work by using the degree of diffusion to calculate the adoption rate and applied it on two different directed real networks, Caenorhabditis elegans worm's neural network and Positive sentiment social network, then we compared our results with the results obtained in [1]. In addition, we extended the work by applying the same technique on generated undirected networks: random network, scale-free network, and small-world network. They were also applied on three undirected real networks, dolphin social network, yeast protein-protein network, and US power grid network. The results showed that the degree of diffusion a of undirected networks is different than directed networks. For instance, the average number of degree of diffusion was 148 for directed random network where it was 1.9705 for undirected random network. All the obtained results showed that in real networks, randomization does not exist. The behavior of these networks is determined based on the network's members and the interactions between them. Therefore, most of the real networks should be classified as small-world, scale-free networks, or what we defined as small-world random, small-world scale-free networks.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115336270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Healthcare Based on Cloud Computing","authors":"Tamara Luarasi, M. Durresi, A. Durresi","doi":"10.1109/NBiS.2013.20","DOIUrl":"https://doi.org/10.1109/NBiS.2013.20","url":null,"abstract":"Patient's health history is very important during emergency interventions. The ubiquitous smart phones combined with the cloud resources could play an important role in providing such health history and data when needed the most. In this paper we present an architecture and an application bases on the use of Android smart phones and cloud computing that can be used in emergency situations. The application can be used especially by elderly people living alone or in assisted living centers. The application enables the retrieve of data remotely from the doctors' database. Taking in consideration the emergency situation we consider that the patient can send only voice messages. Then the message is converted in text, which is sent as a request into a servlet connected to the doctor's database. Furthermore, the testing of our shows its applicability in health emergency situations.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126019629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Smaller Final Exponentiation for Tate and Ate Pairings with Barreto-Naehrig Curve","authors":"Yuki Kono, T. Sumo, Y. Nogami","doi":"10.1109/NBiS.2013.86","DOIUrl":"https://doi.org/10.1109/NBiS.2013.86","url":null,"abstract":"This paper shows an approach for reducing the size of the exponent of final exponentiation with multiplying some extra terms. In the case of Tate and Ate pairings with Barreto-Naehrig curve whose embedding degree is 12, the exponent is reduced to (p4 - p2+ 1)/r, where p is the characteristic of the base field and r is the order of pairing.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"311 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124425719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilizing Security Risk Approach in Managing Cloud Computing Services","authors":"D. Bernardo","doi":"10.1109/NBiS.2013.21","DOIUrl":"https://doi.org/10.1109/NBiS.2013.21","url":null,"abstract":"There is no doubt that Cloud Computing (CC) introduces opportunities that mobilize new strategic ICT agenda across organizations. Like the Internet when it was first introduced, the introduction of Cloud Computing unveils the creation of enormous possibilities in information sharing. Unlike the Internet, Cloud Computing allows organizations to transfer ICT assets externally to meet their cost reduction agenda in predefined contractual terms. However, both the Internet and Cloud Computing only highlight security challenges, prevalent undoubtedly, especially at the time when the popularity of Cloud Computing continues to mount. In this article, common security threats to Cloud Computing are explored. These threats are addressed through acceptable measures, through governance and effective risk management using a tailored Security Risk Approach (SRA).","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"39 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124377176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuo Zhang, Baosheng Wang, Bao-kang Zhao, Z. Gong, Jing Tao
{"title":"A Novel Resource Allocation Heuristic for a Power Constrained Data Center","authors":"Shuo Zhang, Baosheng Wang, Bao-kang Zhao, Z. Gong, Jing Tao","doi":"10.1109/NBiS.2013.40","DOIUrl":"https://doi.org/10.1109/NBiS.2013.40","url":null,"abstract":"Nowadays Internet-scale data centers are facing a severe issue, huge energy consumption, which not only increases operational cost, but also causes environment problem. For data center providers, putting power constraint on a data center may be a feasible way to keep energy consumption within an acceptable range. Hence it is commonly believed that, for a given power budget, maximizing the performance becomes an important goal for a data center, which can be achieved with well-designed resource allocation algorithm. In this paper, we discuss the resource allocation problem in a power-constrained data center, where the power consumption of whole cluster should not exceed a threshold that is set by data center provider. Then, we propose a novel resource allocation heuristic based on preference and fair allocation policy to this problem, and present further discussion and conclusion at the end.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114320890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Redundant Execution Algorithm for Reducing Total Power Consumption of Server Clusters by Differentiating the Starting Time of Processes","authors":"T. Enokido, A. Aikebaier, M. Takizawa","doi":"10.1109/NBiS.2013.6","DOIUrl":"https://doi.org/10.1109/NBiS.2013.6","url":null,"abstract":"In order to realize reliable and energy-aware server clusters, application processes have to be reliably and energy-efficiently performed in presence of server faults. In one way, an application process can be redundantly performed on multiple servers. In the improved redundant power consumption laxity-based (IRPCLB) algorithm which is proposed in our previous studies, since each application process is redundantly performed on more than one server, the reliability and availability of the cluster increase. However, the larger amount of electric power is consumed than non-redundant execution. In the IRPCLB algorithm, once a process terminates on a server, meaningless redundant processes on the other servers are forced to terminate in order to reduce the total power consumption. In this paper, we newly discuss the extended IRPCLB (EIRPCLB) algorithm to furthermore reduce the total power consumption of a server cluster. Here, in addition to forcing meaningless processes to terminate, each server is made reduce the consumption of computation resource to perform a redundant process by differentiating starting time of each redundant process. We evaluate the EIRPCLB algorithm in terms of total power consumption of a cluster and the average response time and number of servers to perform each process compared with the IRPCLB algorithm.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132353733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fast Adaptation Scheme for TFRC over Vertical Handovers","authors":"Dagang Li, Wenpeng Sha","doi":"10.1109/NBiS.2013.35","DOIUrl":"https://doi.org/10.1109/NBiS.2013.35","url":null,"abstract":"The next generation of mobile communication systems will be an integration of complementary wired and wireless network technologies. A mobile user equipped with multiple interfaces that support different technologies should be able to switch between them when needed without losing its connection to the system. This is called a vertical handover. A vertical handover may cause abrupt changes in the throughput and delay experienced by the mobile user because of the differences in the characteristics and conditions on the old and new networks. This is an issue for all rate/congestion control mechanisms, especially slow responsive ones such as TFRC. TFRC was designed for a smooth transmission rate, therefore it can not follow closely the sudden change in the available bandwidth. Significant change in the end-to-end delay may also cause false no feedback timeout or packet reordering and affect the sending rate calculation. In this paper we propose a fast adaptation mechanism that tries to solve all these problems in a systematic and unified way. We show that our mechanism can greatly reduce the adaptation time and packet loss during TFRC vertical handover between any technologies, while preserving the original TFRC behavior otherwise. It is also designed to be robust in a lossy environment, in case of bad wireless link quality or network congestion.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128303575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Florian Puersch, J. Rahayu, T. Torabi, L. I. Rusu, Karl Reed, Andrew Taylor-Harris
{"title":"Towards the New Era of Global Aviation Electronic Data Exchange: Ensuring Completeness, Consistency and Quality in Data Migration","authors":"Florian Puersch, J. Rahayu, T. Torabi, L. I. Rusu, Karl Reed, Andrew Taylor-Harris","doi":"10.1109/NBiS.2013.14","DOIUrl":"https://doi.org/10.1109/NBiS.2013.14","url":null,"abstract":"Due to the increasing reliance on electronic data exchange in the transportation industry, there is a real need for a standard representation to ensure data consistency and correctness. The Aeronautical Information Exchange Model (AIXM) is an international XML-based emerging standard for aviation data, endorsed by the Open Geospatial Consortium, which has been adopted by Air Navigation organisations around the world including Euro control, FAA, and Air services Australia. The AIXM schema provides a structural framework for data representation. However, in order to support global and flexible data interoperability, local extensions and optional elements must be included. This necessary flexibility makes it difficult to ensure completeness and quality. In this paper, we propose an approach for ensuring data consistency and completeness during a global standard adoption process in which an existing aviation legacy database system is translated into AIXM. We have used our approach to design an automated testing application which can be used to compare values of an existing data representation with any XML-based standard, using simple mapping rules defined in a spreadsheet or XML file. We have evaluated the effectiveness and performance of this tool on a very large, operational database, validating the quality of data in both the relational database (source) and AIXM XML instances (destination).","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130976724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Kinect to Develop a Smart Meeting Room","authors":"Hui-Huang Hsu, Yi Chiou, Yu-Ren Chen, T. Shih","doi":"10.1109/NBiS.2013.66","DOIUrl":"https://doi.org/10.1109/NBiS.2013.66","url":null,"abstract":"Observe the most progressive conference system in the market, a higher meeting quality is always being pursued with better equipment, no matter on the personalized laptop, touch pad, direct microphone, or other high quality recording video equipment. It is known that to establish this system with low price is difficult. This paper aims to solve this predicament and contributes a higher quality to the smart meeting room. Hence, we combine Microsoft Kinect and Bluetooth techniques to build an smart conference system with personalized Bluetooth supported equipment to identify each participant's identity, and use these IDs to search the central database in order to retrieve his/her contact information (phone number, email, web storage space and text, or meeting records). Consequently, the system uses Kinect as a gesture recognition device to detect each person's skeletons with multi functions (Controlling the computer, sending information, auto-uploading files, or recording personal meeting records in database). Smart meeting room can be established with simplified equipment in this way. In this smart meeting room, participants don't need to bring additional equipment but only to use his/her Bluetooth supported cell phone. As for the arrangement of the meeting room, besides the central computer, we only need Kinect to provide the gesture recognizing and detecting works, and to record the meeting records (text and video). This simplified smart conference room can provide great benefits for the users, this is the main purpose of this paper.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Efficient Questionnaire Survey of Video Contents with Different QoS Parameters","authors":"Kaoru Sugita, M. Yokota","doi":"10.1109/NBiS.2013.50","DOIUrl":"https://doi.org/10.1109/NBiS.2013.50","url":null,"abstract":"In our previous work, we already proposed a new concept of 'universal multimedia access' to support some switching functions such as user interface switching, media switching and QoS (quality of service) switching. Also, we have considered some effectiveness of media switching and QoS control functions through self-evaluation. However, the evaluation is difficult for a big number of people, because a long time is needed for playing many video contents with many types of QoS parameters (frame rate and size). In this paper, we discuss how to reduce the evaluation time of QoS control function.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116494321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}