{"title":"Performance evaluation of Operating Systems in the private cloud with XenServer hypervisor using SIGAR Framework","authors":"P. V. V. Reddy, L. Rajamani","doi":"10.1109/ICCSE.2014.6926451","DOIUrl":"https://doi.org/10.1109/ICCSE.2014.6926451","url":null,"abstract":"Virtualization Technology plays prominent role in the success of cloud computing because the delivery of services is simplified by providing a platform for optimizing complex IT resources in a scalable manner, which makes cloud computing more cost effective. Hypervisors give near native performance by negating virtualization overhead. XenServer is one of the hypervisors which give near native performance using para virtualization technique. It is encouraging to study how different Operating Systems (OSes) perform in a virtualized environment in the Private Cloud with XenServer hypervisor. Guest OSes do come in Paravirtualized and Hardware Virtualized flavours and in free and commercial versions. It is innovative idea to compare them from performance perspective to give an idea about their performance variations in different tests and also to analyse the results with respect to Para versus Hardware virtualization techniques. This paper conducts different performance tests with low, medium, high workloads and results are gathered using SIGAR API (System Information Gatherer and Reporter) and explains the behaviour of each operating system and gives the reasoning of results with the help of three different virtualization techniques namely Full Virtualization, Paravirtualization and Hardware Assisted Virtualization. In the experiment, CloudStack (open source cloud computing software) is used to create a private cloud (proprietary computing architecture deployed behind a firewall with full control over infrastructure), in which management server is installed on Ubuntu 12.04 - 64 bit operating system. XenServer hypervisor is installed on bare metal as a host in the cluster. The guest operating systems are installed on XenServer hypervisor and their respective performances have been evaluated in detail by using SIGAR Framework.","PeriodicalId":275003,"journal":{"name":"2014 9th International Conference on Computer Science & Education","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126996097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new service composition method for service robot based on data-driven mechanism","authors":"Lu Fei, Lu Na, Li Jian","doi":"10.1109/ICCSE.2014.6926621","DOIUrl":"https://doi.org/10.1109/ICCSE.2014.6926621","url":null,"abstract":"In dynamic home environment, how to provide autonomous and intelligent service to people according to the environment information is an important task for service robotics. In this paper, with the data information provided by the intelligent sensors and the context-aware to the environment under smart space, a framework of automatic service composition for service robot was built. A fast service composition algorithm was designed to realize the robot's task planning. Under this framework, service robot was given the ability to dynamically compose and deliver service, service intelligence and the service quality were improved significantly. The simulation and test to the algorithm of fast service composition were done. The simulation result shows that this algorithm is reliable and effective.","PeriodicalId":275003,"journal":{"name":"2014 9th International Conference on Computer Science & Education","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123237478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reform and practice of university computer basic course teaching based on autonomous learning","authors":"He Junmei, Liu Bo-qin","doi":"10.1109/ICCSE.2014.6926595","DOIUrl":"https://doi.org/10.1109/ICCSE.2014.6926595","url":null,"abstract":"With the rapid development of information society, Social demand for talents has already changed from the original simple knowledge type to knowledge ability type. A qualified college student should have good knowledge and skills, and can continuously strengthen the personal knowledge structure and ability structure through autonomous learning. Therefore, it is very important for Colleges to culture students' autonomous learning ability. The autonomous learning in the teaching of computer basic course in University meets the need of development in epoch. This paper expounds the modular teaching design based on the autonomous learning of university basic computer course, the development of classroom teaching and autonomous learning. And the application of them into practice brings great achievements.","PeriodicalId":275003,"journal":{"name":"2014 9th International Conference on Computer Science & Education","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114937155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iterative learning control of three-phase pulse width modulation voltage source rectifier","authors":"Baobin Liu, Wei Zhou","doi":"10.1109/ICCSE.2014.6926622","DOIUrl":"https://doi.org/10.1109/ICCSE.2014.6926622","url":null,"abstract":"Iterative learning controller is studied for three-phase pulse width modulation voltage source rectifier. In any bounded initial input conditions, the designed controller can repetitively update input according to output error-tracking until it converges to zero. The controller is able to deal with dynamic systems with imperfect knowledge and has strong robustness and immunity. The convergence of the learning control rules in iteration domain is guaranteed with rigorous proof, and the simulation results demonstrate the effectiveness of the presented method.","PeriodicalId":275003,"journal":{"name":"2014 9th International Conference on Computer Science & Education","volume":"3 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115723576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smartphone landmark image retrieval based on Lucene and GPS","authors":"Kunhui Lin, Jia Li, Wei Huang, Chao Fang","doi":"10.1109/ICCSE.2014.6926487","DOIUrl":"https://doi.org/10.1109/ICCSE.2014.6926487","url":null,"abstract":"With continuous reduction of the cost of Internet-enabled smartphones and recent advances in mobile computing, the demand for content based image retrieval tools used for landmark identification on smartphones is gaining interest. We have developed a system that allows users to take photos of famous landmarks using a smartphone and receive information of landmarks from the system. This landmark image retrieval system contains an android application as the fronted client and a backend Web server. It is based on Lucene and takes advantage of GPS data. In this paper we propose our ideas, design and architecture of the system. We also propose an approach to use combined feature and GPS filtering to improve the accuracy of classifying images. The experimental results show that the accuracy of combined feature is higher than individual feature and the system works quickly and reliably.","PeriodicalId":275003,"journal":{"name":"2014 9th International Conference on Computer Science & Education","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128678751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhaoli Cui, Dan He, M. Jiang, Yaoxian Wang, Guang Zheng
{"title":"To discover the Traditional Chinese Medicine techniques applied in Diabetes mellitus through data mining","authors":"Zhaoli Cui, Dan He, M. Jiang, Yaoxian Wang, Guang Zheng","doi":"10.1109/ICCSE.2014.6926546","DOIUrl":"https://doi.org/10.1109/ICCSE.2014.6926546","url":null,"abstract":"The morbidity of Diabetes mellitus (DM) is increasing at a speed of 3.2% per year globally, and involving people of all ages, especially the ones who are more than fifties. Most of the patients suffer from the Non-insulin-dependent type which is also called type 2 diabetes mellitus. Traditional Chinese Medicine (TCM) has accumulated rich experience in curing DM which is considered as “Xiaoke” in TCM theory. Both food therapy and TCM appropriate techniques such as acupuncture and Tuina can work well in symptom improvement and blood sugar control. Data mining is a novel technology; it can not only collect as many relative literatures as possible but filter and refine the information so as to obtain valuable findings for clinical physicians. The results of data mining include two parts. Part I are the lists of most frequently used food and herbs, part II are the networks of diet therapy, treatment principle and acupoints. The conclusion is data mining should be thought as a useful technology which can be applied in TCM research to explore the treatment rules, furthermore, the relevance among treatment principle, herbs and TCM appropriate techniques could be detected through network establishment.","PeriodicalId":275003,"journal":{"name":"2014 9th International Conference on Computer Science & Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blended inquiry through blended learning for computer network course","authors":"G. Zhi, Liu Zhen Ya","doi":"10.1109/ICCSE.2014.6926579","DOIUrl":"https://doi.org/10.1109/ICCSE.2014.6926579","url":null,"abstract":"This paper analyzes the problems of large difference of learning effect between students learning by inquiry through blended learning in our computer network course, and then put forward a new learning system called blended inquiry through blended learning based on learning style and blended learning. The paper presents that what constitute the learning system, how the learning system averages the learning effect of students and the applying result.","PeriodicalId":275003,"journal":{"name":"2014 9th International Conference on Computer Science & Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129947489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Gentzen system for the description logic","authors":"Yu Sun, Yuefei Sui","doi":"10.1109/ICCSE.2014.6926437","DOIUrl":"https://doi.org/10.1109/ICCSE.2014.6926437","url":null,"abstract":"The Gentzen systems for a sequent Γ⇒Δ have been proposed in the propositional logic, the predicate calculus and other logics. In this paper, based on the Gentzen system for the predicate calculus, we propose the Gentzen system for a sequent Γ⇒Δ in the description logic, where Γ and Δ are two sets of assertions in ALC: Assertions with universal qualification and inclusion assertions are decomposed as those of universal quantification formulas in the Gentzen system for the predicate calculus. It is proved that the Gentzen system for description logic is sound and complete; but it is not decidable.","PeriodicalId":275003,"journal":{"name":"2014 9th International Conference on Computer Science & Education","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127917665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tutoring model to guide students in programming courses to create complete and correct solutions","authors":"L. H. Gonzalez-Guerra, A. J. Leal-Flores","doi":"10.1109/ICCSE.2014.6926433","DOIUrl":"https://doi.org/10.1109/ICCSE.2014.6926433","url":null,"abstract":"When a student starts in a programming course, he begins to solve problems with a programming language and has to face some difficulties like programming inexperience, algorithm unawareness and, in some cases, the amateurishness of how to test a solution. The technological tools for developing programs and computer systems heavily explore the syntax and semantics of a program, but do not provide support to determine its correctness. This is where students may fail by not exploring the correct scenarios and test cases. In this paper, we present a tutoring model that helps creating entire exercises to guide students to generate not only correct, but also complete solutions. We tested this model supported by an automatic tool, which was used by 376 students of four different courses, getting excellent results. Guidelines for the model, the tool and our result are discussed in this paper.","PeriodicalId":275003,"journal":{"name":"2014 9th International Conference on Computer Science & Education","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121033524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhu Ruo-xin, Xiao-jie Cui, Shi-jun Gong, Hong-kang Ren, Ke Chen
{"title":"Model for cloud computing security assessment based on AHP and FCE","authors":"Zhu Ruo-xin, Xiao-jie Cui, Shi-jun Gong, Hong-kang Ren, Ke Chen","doi":"10.1109/ICCSE.2014.6926454","DOIUrl":"https://doi.org/10.1109/ICCSE.2014.6926454","url":null,"abstract":"As a convenient, on-demand access service model for network based, configurable shared calculation resource pool, cloud computing has many advantages. At the same time, there are many challenges in the development and application of cloud computing, especially in cloud security. For quantification demand of cloud security services, drawing on cloud computing risk control security assess framework related to the international organizations, based on China's classification protection assessment requirements, the cloud computing security evaluation index system is built using of Delphi method, and the weight of each index entry is calculated using the AHP(Analytic Hierarchy Process). The cloud security assessment model has been validated through examples, and the results show that the proposed model can make quantitative assessment on secure cloud platform effectively, with much more efficiency.","PeriodicalId":275003,"journal":{"name":"2014 9th International Conference on Computer Science & Education","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125459768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}