N. Kajtazovic, C. Preschern, Andrea Höller, Christian Kreiner
{"title":"On Design-time Modelling and Verification of Safety-critical Component-based Systems","authors":"N. Kajtazovic, C. Preschern, Andrea Höller, Christian Kreiner","doi":"10.2991/ijndc.2014.2.3.7","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.7","url":null,"abstract":"Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safetycritical systems. It provides a fundamental means to master systems complexity, by allowing to design systems parts (i.e., components) for reuse and by allowing to develop those parts independently. One of the main challenges of introducing CBSE in this area is to ensure the integrity of the overall system after building it from individual components, since safety-critical systems require a rigorous development and qualification process to be released for the operation. Although the topic of compositional modelling and verification in the context of component-based systems has been studied intensively in the last decade, there is currently still a lack of tools and methods that can be applied practically and that consider major related systems quality attributes such as usability and scalability. In this paper, we present a novel approach for design-time modelling and verification of safety-critical systems, based on data semantics of components. We describe the composition, i.e., the systems design, and the underlying properties of components as a Constraint Satisfaction Problem (CSP) and perform the verification by solving that problem. We show that CSP can be successfully applied for the verification of compositions for many types of properties. In our experimental setup we also show how the proposed verification scales with regard to the complexity of different system configurations.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)","authors":"L. McLauchlan, Soumya Saha, R. Challoo","doi":"10.2991/ijndc.2014.2.3.4","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.4","url":null,"abstract":"Wireless Sensors Networks (WSNs) are utilized in many diverse applications ranging from security, environmental monitoring, landslide detection, patient monitoring, reconnaissance operations, structural health monitoring and smart buildings. Since in many applications the WSN nodes are randomly deployed, WSNs need to be able to arrange and self-organize. Nodes in WSNs generally possess low or limited power resources such as batteries. Energy utilization thus is an important design consideration for WSN deployment. There have been many energy aware protocols proposed in the literature to increase the longevity of the network. Recently, two novel Connected Dominating Set (CDS) based topology construction (TC) protocols- SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree), have been proposed which aim to balance the load among the nodes of the network and thus to reduce the probability of dying for a particular node. The SWST and EAST protocols aim to reduce the number of broken links that may have been caused by a single node becoming dead or comatose in the communication backbone of the network. In this paper, a comparative study of the SWST and EAST algorithms is conducted to evaluate the performance of the two algorithms. From the MATLAB simulations it was observed that the EAST protocol generally performs better than the SWST algorithms in delivering messages to the sink node.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Security and Privacy Protection for Emerging Smart RFID Communications","authors":"M. Sadikin, M. Kyas","doi":"10.2991/ijndc.2014.2.3.5","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.5","url":null,"abstract":"Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges in the constrained nature of RFID applications by applying a light-weight cryptographic method with advanced-level 128 bit security protection. Thus, IMAKA-Tate protects the RFID system from various security and privacy threats (e.g. unauthorized tracking, cloning attack, etc.).","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133839609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Test Image Generation using Segmental Symbolic Evaluation","authors":"Tahir Jameel, Mengxiang Lin","doi":"10.2991/ijndc.2014.2.3.3","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.3","url":null,"abstract":"Image processing applications have played a vital role in modern life and they are required to be well tested due to their significance and human dependence on them. Testing of image processing application is difficult due to complex nature of images in terms of their generation and evaluation. The presented technique is first of its type to generate test images based on symbolic evaluation of program under test. The idea is based on the fact that, neighboring image operations are applied by selecting a segment of image pixels called a window, and iterated by sliding window over entire image. We imitate neighboring operations using symbolic values for the pixels rather than concrete values. The path constraint is extracted for each path in the program under test and solved for concrete solutions. Test images are generated based on solution of path constraints for each identified path. We have tested the proposed scheme on different programs and the results show that test images are successfully generated for each path to ensure the path coverage of the program under test and identifying infeasible paths.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Kuremoto, T. Otani, S. Mabu, M. Obayashi, Kunikazu Kobayashi
{"title":"One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System","authors":"T. Kuremoto, T. Otani, S. Mabu, M. Obayashi, Kunikazu Kobayashi","doi":"10.2991/ijndc.2014.2.3.6","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.6","url":null,"abstract":"In this paper, a novel self-organizing map (SOM) named “One-D-R-A-G-SOM” is proposed. It is a kind of one dimensional ring type growing SOM using asymmetric neighborhood function. As the topology of one dimensional ring type feature map is more suitable to increase or decrease the number of units, and the disorder of the map is available to be solved by the asymmetric neighborhood function, the proposed model gives priority of learning performance to the conventional two dimensional growing SOM. Additionally, One-D-R-A-G-SOM is introduced to a hand shape recognition and instruction learning system. Experiment results showed the effectiveness of the novel system comparing with systems using the conventional SOMs.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132018311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Issues in Efficiency for Distributed and Networking Systems","authors":"Jung-Yeon Jo","doi":"10.2991/ijndc.2014.2.3.1","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.1","url":null,"abstract":"","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. McLauchlan, Soumya Saha, C. Montiel, R. Challoo
{"title":"Comparative Study of Various Wireless Sensor Network (WSN) Topology Construction Protocols","authors":"L. McLauchlan, Soumya Saha, C. Montiel, R. Challoo","doi":"10.2991/ijndc.2014.2.3.8","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.8","url":null,"abstract":"As the cost for wireless sensors and wireless sensor networks (WSNs) have decreased, they have become more ubiquitous; they are increasingly being used in many applications such as security, structural monitoring and environmental monitoring. Many WSN applications employ a random sensor deployment to provide sensor coverage. The choice of the Topology Construction (TC) and Topology Maintenance (TM) protocols will affect WSN lifetime. In this paper, two new load balancing TC protocols, SWST (Simple Weighted Spanning Tree), EAST (Energy Aware Spanning Tree) as well as three well known TC protocols, Simple Tree, Random Nearest Neighbor Tree (Random NNT) and Euclidean Minimum Spanning Tree (Euclidian MST), are studied using MATLAB and TC protocols such as A3 (A tree), A3 Coverage, Connected Dominating Set under Rule K (CDS Rule K), Energy Efficient Connected Dominating Set (EECDS), Simple Tree and K Neighbor (KNeigh) Tree, are simulated using Atarraya. Comparisons are performed between many of the TC protocols.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129220944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li-Bao An, Peiqing Yang, Hong Zhang, Ming-Ying Chen
{"title":"Multi-Objective Optimization for Milling Operations using Genetic Algorithms under Various Constraints","authors":"Li-Bao An, Peiqing Yang, Hong Zhang, Ming-Ying Chen","doi":"10.2991/ijndc.2014.2.2.5","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.2.5","url":null,"abstract":"In this paper, the parameter optimization problem for face-milling operations is studied. A multi-objective mathematical model is developed with the purpose to minimize the unit production cost and total machining time while maximize the profit rate. The unwanted material is removed by one finishing pass and at least one roughing passes depending on the total depth of cut. Maximum and minimum allowable cutting speeds, feed rates and depths of cut, as well as tool life, surface roughness, cutting force and cutting power consumption are constraints of the model. Optimal values of objective function and corresponding machining parameters are found by Genetic Algorithms. An example is presented to illustrate the model and solution method.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116493979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shin-Ya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, T. Shintani
{"title":"On a Drawing-Frequency based Layered Canvas Mechanism for Collaborative Paper Editing Support Systems","authors":"Shin-Ya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, T. Shintani","doi":"10.2991/ijndc.2014.2.2.3","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.2.3","url":null,"abstract":"We propose a Drawing-Frequency based Layered (DFL) Canvas approach to reduce a synchronization delay in collaborative web applications. The synchronization delay consists of a network delay and a drawing delay. The network delay is well-argued topic by various researches. We focus on the drawing delay, which is a primary bottleneck of Canvas objects synchronizations. We introduce the DFL Canvas approach in order to solve the drawing problem. The DFL Canvas divides Canvas objects by drawingfrequency. We implemented a collaborative paper editing support system with the DFL Canvas. Users can edit the same document and share Canvas objects on papers in real-time on web browsers. We present an evaluation result that indicates the approach is suited for collaborative paper editing support systems.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128286125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Dynamic Multicast Traffic Provisioning with Grooming Capabilities Support in Light-Trail Networks","authors":"Chingfang Hsu, T. Tang","doi":"10.2991/ijndc.2013.1.4.5","DOIUrl":"https://doi.org/10.2991/ijndc.2013.1.4.5","url":null,"abstract":"In recent years, because of the popularity of Internet and the rapid growth of multimedia applications, the requirements of bandwidth from users increase violently in optical networks. Various multicast multimedia services also bring challenges to next generation optical networks. As the rapid advance of DWDM, the bandwidth of a single fiber link is significantly improved. However, the traditional circuit switching architecture, lightpath, has the disadvantage with lower bandwidth utilization of a single wavelength. Light-trail has been proposed as an efficient solution to support optical networks. Compared with lightpath approach, a light-trail can achieve fast provisioning for multiple connections without optical switching. The support of sub-wavelength granularity in light-trial network increases the utilization of wavelength bandwidth effectively. The most distinctive feature is that light-trail allows multiple node access, so it possesses natural multicasting capability inherently. In a light-trail, the single send by one node will be received by the downstream nodes. In other words, light-trail has the advantage of natural multicasting. Furthermore, incorporating traffic grooming into light-trail, it can obviously become a strong candidate to support multicasting and multi-granularity bandwidth demands in the future. In this article, we propose a dynamic multicast routing algorithm with traffic grooming consideration in light-trail networks, named Dynamic Light-Trail-based Multicast Routing algorithm (DLTMR). For static traffic, we use a set of ILP formulations to calculate the optimal solution for minimizing the number of established light-trails. In the simulation, we use various network topologies and variant limitation of network resource to verify that DLTMR can efficiently improve blocking performance in the light-trail networks.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122748427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}