Int. J. Networked Distributed Comput.最新文献

筛选
英文 中文
On Design-time Modelling and Verification of Safety-critical Component-based Systems 基于安全关键部件的系统设计时建模与验证研究
Int. J. Networked Distributed Comput. Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.7
N. Kajtazovic, C. Preschern, Andrea Höller, Christian Kreiner
{"title":"On Design-time Modelling and Verification of Safety-critical Component-based Systems","authors":"N. Kajtazovic, C. Preschern, Andrea Höller, Christian Kreiner","doi":"10.2991/ijndc.2014.2.3.7","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.7","url":null,"abstract":"Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safetycritical systems. It provides a fundamental means to master systems complexity, by allowing to design systems parts (i.e., components) for reuse and by allowing to develop those parts independently. One of the main challenges of introducing CBSE in this area is to ensure the integrity of the overall system after building it from individual components, since safety-critical systems require a rigorous development and qualification process to be released for the operation. Although the topic of compositional modelling and verification in the context of component-based systems has been studied intensively in the last decade, there is currently still a lack of tools and methods that can be applied practically and that consider major related systems quality attributes such as usability and scalability. In this paper, we present a novel approach for design-time modelling and verification of safety-critical systems, based on data semantics of components. We describe the composition, i.e., the systems design, and the underlying properties of components as a Constraint Satisfaction Problem (CSP) and perform the verification by solving that problem. We show that CSP can be successfully applied for the verification of compositions for many types of properties. In our experimental setup we also show how the proposed verification scales with regard to the complexity of different system configurations.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree) 简单加权生成树(SWST)与能量感知生成树(EAST)的比较研究
Int. J. Networked Distributed Comput. Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.4
L. McLauchlan, Soumya Saha, R. Challoo
{"title":"Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)","authors":"L. McLauchlan, Soumya Saha, R. Challoo","doi":"10.2991/ijndc.2014.2.3.4","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.4","url":null,"abstract":"Wireless Sensors Networks (WSNs) are utilized in many diverse applications ranging from security, environmental monitoring, landslide detection, patient monitoring, reconnaissance operations, structural health monitoring and smart buildings. Since in many applications the WSN nodes are randomly deployed, WSNs need to be able to arrange and self-organize. Nodes in WSNs generally possess low or limited power resources such as batteries. Energy utilization thus is an important design consideration for WSN deployment. There have been many energy aware protocols proposed in the literature to increase the longevity of the network. Recently, two novel Connected Dominating Set (CDS) based topology construction (TC) protocols- SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree), have been proposed which aim to balance the load among the nodes of the network and thus to reduce the probability of dying for a particular node. The SWST and EAST protocols aim to reduce the number of broken links that may have been caused by a single node becoming dead or comatose in the communication backbone of the network. In this paper, a comparative study of the SWST and EAST algorithms is conducted to evaluate the performance of the two algorithms. From the MATLAB simulations it was observed that the EAST protocol generally performs better than the SWST algorithms in delivering messages to the sink node.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Security and Privacy Protection for Emerging Smart RFID Communications 新兴智能RFID通信的高效安全和隐私保护
Int. J. Networked Distributed Comput. Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.5
M. Sadikin, M. Kyas
{"title":"Efficient Security and Privacy Protection for Emerging Smart RFID Communications","authors":"M. Sadikin, M. Kyas","doi":"10.2991/ijndc.2014.2.3.5","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.5","url":null,"abstract":"Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges in the constrained nature of RFID applications by applying a light-weight cryptographic method with advanced-level 128 bit security protection. Thus, IMAKA-Tate protects the RFID system from various security and privacy threats (e.g. unauthorized tracking, cloning attack, etc.).","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133839609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Test Image Generation using Segmental Symbolic Evaluation 使用分段符号求值的测试图像生成
Int. J. Networked Distributed Comput. Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.3
Tahir Jameel, Mengxiang Lin
{"title":"Test Image Generation using Segmental Symbolic Evaluation","authors":"Tahir Jameel, Mengxiang Lin","doi":"10.2991/ijndc.2014.2.3.3","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.3","url":null,"abstract":"Image processing applications have played a vital role in modern life and they are required to be well tested due to their significance and human dependence on them. Testing of image processing application is difficult due to complex nature of images in terms of their generation and evaluation. The presented technique is first of its type to generate test images based on symbolic evaluation of program under test. The idea is based on the fact that, neighboring image operations are applied by selecting a segment of image pixels called a window, and iterated by sliding window over entire image. We imitate neighboring operations using symbolic values for the pixels rather than concrete values. The path constraint is extracted for each path in the program under test and solved for concrete solutions. Test images are generated based on solution of path constraints for each identified path. We have tested the proposed scheme on different programs and the results show that test images are successfully generated for each path to ensure the path coverage of the program under test and identifying infeasible paths.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System One-D-R-A-G-SOM及其在手部造型教学系统中的应用
Int. J. Networked Distributed Comput. Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.6
T. Kuremoto, T. Otani, S. Mabu, M. Obayashi, Kunikazu Kobayashi
{"title":"One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System","authors":"T. Kuremoto, T. Otani, S. Mabu, M. Obayashi, Kunikazu Kobayashi","doi":"10.2991/ijndc.2014.2.3.6","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.6","url":null,"abstract":"In this paper, a novel self-organizing map (SOM) named “One-D-R-A-G-SOM” is proposed. It is a kind of one dimensional ring type growing SOM using asymmetric neighborhood function. As the topology of one dimensional ring type feature map is more suitable to increase or decrease the number of units, and the disorder of the map is available to be solved by the asymmetric neighborhood function, the proposed model gives priority of learning performance to the conventional two dimensional growing SOM. Additionally, One-D-R-A-G-SOM is introduced to a hand shape recognition and instruction learning system. Experiment results showed the effectiveness of the novel system comparing with systems using the conventional SOMs.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132018311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Issues in Efficiency for Distributed and Networking Systems 分布式和网络系统的效率问题
Int. J. Networked Distributed Comput. Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.1
Jung-Yeon Jo
{"title":"Issues in Efficiency for Distributed and Networking Systems","authors":"Jung-Yeon Jo","doi":"10.2991/ijndc.2014.2.3.1","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.1","url":null,"abstract":"","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of Various Wireless Sensor Network (WSN) Topology Construction Protocols 各种无线传感器网络(WSN)拓扑构建协议的比较研究
Int. J. Networked Distributed Comput. Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.8
L. McLauchlan, Soumya Saha, C. Montiel, R. Challoo
{"title":"Comparative Study of Various Wireless Sensor Network (WSN) Topology Construction Protocols","authors":"L. McLauchlan, Soumya Saha, C. Montiel, R. Challoo","doi":"10.2991/ijndc.2014.2.3.8","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.8","url":null,"abstract":"As the cost for wireless sensors and wireless sensor networks (WSNs) have decreased, they have become more ubiquitous; they are increasingly being used in many applications such as security, structural monitoring and environmental monitoring. Many WSN applications employ a random sensor deployment to provide sensor coverage. The choice of the Topology Construction (TC) and Topology Maintenance (TM) protocols will affect WSN lifetime. In this paper, two new load balancing TC protocols, SWST (Simple Weighted Spanning Tree), EAST (Energy Aware Spanning Tree) as well as three well known TC protocols, Simple Tree, Random Nearest Neighbor Tree (Random NNT) and Euclidean Minimum Spanning Tree (Euclidian MST), are studied using MATLAB and TC protocols such as A3 (A tree), A3 Coverage, Connected Dominating Set under Rule K (CDS Rule K), Energy Efficient Connected Dominating Set (EECDS), Simple Tree and K Neighbor (KNeigh) Tree, are simulated using Atarraya. Comparisons are performed between many of the TC protocols.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129220944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-Objective Optimization for Milling Operations using Genetic Algorithms under Various Constraints 基于遗传算法的多种约束条件下铣削作业多目标优化
Int. J. Networked Distributed Comput. Pub Date : 2014-04-01 DOI: 10.2991/ijndc.2014.2.2.5
Li-Bao An, Peiqing Yang, Hong Zhang, Ming-Ying Chen
{"title":"Multi-Objective Optimization for Milling Operations using Genetic Algorithms under Various Constraints","authors":"Li-Bao An, Peiqing Yang, Hong Zhang, Ming-Ying Chen","doi":"10.2991/ijndc.2014.2.2.5","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.2.5","url":null,"abstract":"In this paper, the parameter optimization problem for face-milling operations is studied. A multi-objective mathematical model is developed with the purpose to minimize the unit production cost and total machining time while maximize the profit rate. The unwanted material is removed by one finishing pass and at least one roughing passes depending on the total depth of cut. Maximum and minimum allowable cutting speeds, feed rates and depths of cut, as well as tool life, surface roughness, cutting force and cutting power consumption are constraints of the model. Optimal values of objective function and corresponding machining parameters are found by Genetic Algorithms. An example is presented to illustrate the model and solution method.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116493979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On a Drawing-Frequency based Layered Canvas Mechanism for Collaborative Paper Editing Support Systems 协同论文编辑支持系统中基于绘图频率的分层画布机制研究
Int. J. Networked Distributed Comput. Pub Date : 2014-04-01 DOI: 10.2991/ijndc.2014.2.2.3
Shin-Ya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, T. Shintani
{"title":"On a Drawing-Frequency based Layered Canvas Mechanism for Collaborative Paper Editing Support Systems","authors":"Shin-Ya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, T. Shintani","doi":"10.2991/ijndc.2014.2.2.3","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.2.3","url":null,"abstract":"We propose a Drawing-Frequency based Layered (DFL) Canvas approach to reduce a synchronization delay in collaborative web applications. The synchronization delay consists of a network delay and a drawing delay. The network delay is well-argued topic by various researches. We focus on the drawing delay, which is a primary bottleneck of Canvas objects synchronizations. We introduce the DFL Canvas approach in order to solve the drawing problem. The DFL Canvas divides Canvas objects by drawingfrequency. We implemented a collaborative paper editing support system with the DFL Canvas. Users can edit the same document and share Canvas objects on papers in real-time on web browsers. We present an evaluation result that indicates the approach is suited for collaborative paper editing support systems.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128286125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Dynamic Multicast Traffic Provisioning with Grooming Capabilities Support in Light-Trail Networks 轻轨网络中支持疏导功能的动态组播流量配置研究
Int. J. Networked Distributed Comput. Pub Date : 2013-11-01 DOI: 10.2991/ijndc.2013.1.4.5
Chingfang Hsu, T. Tang
{"title":"On Dynamic Multicast Traffic Provisioning with Grooming Capabilities Support in Light-Trail Networks","authors":"Chingfang Hsu, T. Tang","doi":"10.2991/ijndc.2013.1.4.5","DOIUrl":"https://doi.org/10.2991/ijndc.2013.1.4.5","url":null,"abstract":"In recent years, because of the popularity of Internet and the rapid growth of multimedia applications, the requirements of bandwidth from users increase violently in optical networks. Various multicast multimedia services also bring challenges to next generation optical networks. As the rapid advance of DWDM, the bandwidth of a single fiber link is significantly improved. However, the traditional circuit switching architecture, lightpath, has the disadvantage with lower bandwidth utilization of a single wavelength. Light-trail has been proposed as an efficient solution to support optical networks. Compared with lightpath approach, a light-trail can achieve fast provisioning for multiple connections without optical switching. The support of sub-wavelength granularity in light-trial network increases the utilization of wavelength bandwidth effectively. The most distinctive feature is that light-trail allows multiple node access, so it possesses natural multicasting capability inherently. In a light-trail, the single send by one node will be received by the downstream nodes. In other words, light-trail has the advantage of natural multicasting. Furthermore, incorporating traffic grooming into light-trail, it can obviously become a strong candidate to support multicasting and multi-granularity bandwidth demands in the future. In this article, we propose a dynamic multicast routing algorithm with traffic grooming consideration in light-trail networks, named Dynamic Light-Trail-based Multicast Routing algorithm (DLTMR). For static traffic, we use a set of ILP formulations to calculate the optimal solution for minimizing the number of established light-trails. In the simulation, we use various network topologies and variant limitation of network resource to verify that DLTMR can efficiently improve blocking performance in the light-trail networks.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122748427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信