A. DeFrance, S. Vialle, M. Wauquier, P. Akim, D. Dewnarain, R. Loutou, A. Methari
{"title":"A Generic Distributed Architecture for Business Computations. Application to Financial Risk Analysis","authors":"A. DeFrance, S. Vialle, M. Wauquier, P. Akim, D. Dewnarain, R. Loutou, A. Methari","doi":"10.1109/DFMA.2006.296915","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296915","url":null,"abstract":"This paper introduces a generic n-tier distributed architecture for business applications, and its basic component: a computing server distributed on a PC cluster. Design of this distributed server is relevant of both cluster programming and business standards: it mixes TCP client-server mechanisms, MPI programming and database accesses from cluster nodes. The main topics investigated in this paper are the design of a generic distributed TCP server based on the MPI paradigm, and the experimentation and optimization of concurrent accesses to databases from cluster nodes. Finally, this new distributed architecture has been integrated in the industrial Summit environment, and a Hedge application (a famous risk analysis computation) has been implemented and performances have been measured on laboratory and industrial testbeds. They have validated the architecture, exhibiting interesting speed up","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126724901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Light P2P platform of computing for DAG","authors":"F. Hantz","doi":"10.1109/DFMA.2006.296894","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296894","url":null,"abstract":"HiPoP is a P2P platform of computing specialized in the execution of applications as DAG (directed acyclic graph). This platform works in an heterogeneous environment and relies on the portability of the JAVA language. HiPoP performances are compared to Condor and show an ease of use and good performances. The security of our system is based on the concept of sandboxing","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133474027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Dynamic Programming Based Sequence Alignment Algorithm","authors":"N. Rashid, R. Abdullah, A. Talib, Z. Ali","doi":"10.1109/DFMA.2006.296909","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296909","url":null,"abstract":"Protein sequence alignment is basic operation mostly used in protein sequence analysis. The most optimal algorithm used in sequence alignment is based on the dynamic programming method. Smith-Waterman algorithm is the most commonly used dynamic programming based sequence alignment algorithm. However the algorithm uses quadratic time and space. Heuristic algorithm such as FASTA and BLAST were introduced to speed up the sequence alignment algorithm. FASTA is based on word search whereas BLAST is based on maximum segment pairs. In word search algorithm, lists of words from the query and database sequence are being compared to determine if two sequences have a region of sufficient similarity to merit further alignment using the Smith-Waterman Algorithm. All the different algorithms use the substitutions matrix based on the twenty alphabet amino acids. However research shows that reducing the number of amino acids to 10 does not affect the similarity measure. Our proposed algorithm uses the reduced amino acids alphabet to transform the protein sequences into a sequence of integer and uses n-gram to reduce the length of the sequence. Then the Smith-Waterman algorithm is used to get the similarity measure between two sequences. Result shows that the new proposed algorithm is as sensitive as the Smith-Waterman algorithm yet uses less space and performs better","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"224 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133112146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Java: From \"Hard Coding\" to Using an Integrated Development Environment","authors":"Ali Kattan, R. Abdullah, R. A. Salam","doi":"10.1109/DFMA.2006.296905","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296905","url":null,"abstract":"Being a Java developer the decision of starting to use an integrated development environment (IDE) instead of a set of discrete programming tools, is to be taken sooner or later. This paper identifies the favorite features to opt for, in selecting a suitable IDE, what should be used and by whom with plethora of such IDEs. Though IDEs are meant to facilitate program development and increase productivity, migrating developers might fall into a set of common pitfalls that could hinder productivity. Such pitfalls are indicated and discussed in the view of available IDE features","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121245482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fragile Watermarking for medical Image Authentication","authors":"I.F. Kallel, M. Kallel, E. Garcia, M. Bouhlel","doi":"10.1109/DFMA.2006.296919","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296919","url":null,"abstract":"The ease and extensive use of digital imaging systems raise serious questions about integrity and authenticity of digital images particularly in medical applications. A medical image requires great integrity of content since any change in the image might affect the diagnosis even if it is of small amount. Fragile watermark could be the best technique to provide efficient image authentication tool for medical images, in this paper we present different methods developed in image watermarking used in order to verify integrity and authenticity of images. We will present after that our proposed method and validated the embedding and extracting procedures","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121708562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. S. Lee, M. Rajeswari, D. Ramachandram, B. Shaharuddin
{"title":"Screening of Diabetic Retinopathy - Automatic Segmentation of Optic Disc in Colour Fundus Images","authors":"S. S. Lee, M. Rajeswari, D. Ramachandram, B. Shaharuddin","doi":"10.1109/DFMA.2006.296892","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296892","url":null,"abstract":"In this paper, a novel approach to automatically segment the optic disc contour using the center point of an optic disc candidate is proposed. The optic disc segmentation algorithm consists of 2 stages. The first stage involves the removal of blood vessels that obscure the optic disc. The blood vessel structures are detected using morphological operations. These detected structures are then removed by anisotropic diffusion smoothing. The second stage involves the detection of edge points belonging to the optic disc-contour. A number of one dimensional intensity profiles which pass through the center point of optic disc region are then obtained at multiple angles with fixed angular intervals. The modulus maxima of each intensity profile are identified as a contour point for the optic disc. Among these contour points, some of the outliers are removed by re-positioning to a new position which complies with optic disc's shape using spline interpolation. Using these contour points, a coarse contour of the optic disc is constructed. Testing the approach on 23 colour fundus images demonstrates that the proposed algorithm is able to detect the optic disc contour to an accuracy of 92% to that drawn by a human expert","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132048547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Singh, A.K. Singh, S. Balasubramanian, A. Mohan
{"title":"Minimizing Security Threats in Multimedia Systems","authors":"H. Singh, A.K. Singh, S. Balasubramanian, A. Mohan","doi":"10.1109/DFMA.2006.296907","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296907","url":null,"abstract":"This paper describes security enhancement of multimedia data using steganography. The proposed method is based on a new method of embedding ASCII text characters into moderatory bits of IEEE standard multimedia images, which are used as cover media. Simulation results for peak signal to noise ratio (PSNR) and mean square error (MSE) for text data embedding into different moderatory bit positions are presented. It is shown that the proposed method of data embedding offers superior robustness against external attacks as compared to LSB insertion technique without compromising the perceptual quality of the host multimedia image. Therefore our proposed method can find potential use in security enhancement of multimedia image","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123485895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of Burst Assembly Algorithms using Real IPv4 Data Traces","authors":"N. M. Garcia, P. Monteiro, M. Freire","doi":"10.1109/DFMA.2006.296912","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296912","url":null,"abstract":"This paper describes the generation of data bursts using real IPv4 data as input, compares the performance of the three aggregation algorithms and suggests a novel mechanism to adjust the burst assembly algorithm thresholds. The generated bursts are studied, in particular average packet delay per burst, burst inter-arrival time, and average burst size and average number of packets per burst. Performance optimization of burst assembly algorithms is defined as a function of the network offered load","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Brahma, Martine Chaudier, Éric Garcia, Jean-Patrick Gelas, H. Guyennet, F. Hantz, L. Lefèvre, Pascal Lorenz, H. Tobiet
{"title":"TEMIC: a New Cooperative Platform for Industrial Tele-Maintenance","authors":"M. Brahma, Martine Chaudier, Éric Garcia, Jean-Patrick Gelas, H. Guyennet, F. Hantz, L. Lefèvre, Pascal Lorenz, H. Tobiet","doi":"10.1109/DFMA.2006.296902","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296902","url":null,"abstract":"Since the year 2000, the performances that are obtained from the point of view of the networks processors make it possible to use real distribution applications. Particularly, in remote maintenance domain, the network quality makes it possible to have several expertises readily available. As a result, the quality of maintenance increases as it becomes faster, more reliable and highly efficient. The TEMIC tele-maintenance application connects mobile users (via their PDA terminal) to information systems in order to perform activities in areas such as corrective, preventive and conditional maintenance. The TEMIC tele-maintenance platform is based on a three-level architecture: collection and surveillance, intervention and reporting, diagnosis and collaboration. The use of wireless networks is one of the TEMIC distinctive characteristics, which allows connection between mobile tele-maintenance qualified actors. Another distinction is the design of active and autonomous industrial network devices that are easily and efficiently deployable in an industrial setup","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126102081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Consistency Management Protocols Over a Communication Management Protocol","authors":"J. Henriet","doi":"10.1109/DFMA.2006.296897","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296897","url":null,"abstract":"In collaborative environments, sharing notion is everywhere. Concurrency management protocols become very important. We have defined the Chameleon protocol which allows us to obtain a dynamic management of the collaborative architecture on the one hand, and on the other hand, we have improved our consistency management protocol and rendered it optimistic: the Pilgrim and the Optimistic Pilgrim. The originality of the Chameleon is to allow the virtual topology to be reconfigured dynamically Pilgrim protocol and its optimistic version Optimistic Pilgrim protocol manage shared data consistency over our CSCW platform. They are based on a token over a logical ring of sites and ownership mechanisms: each shared parameter has one site which is its owner. Nevertheless, problems may appear when one site becomes inactive according to the Chameleon. Indeed, if this site is the owner of a shared parameter according to one of the versions of the Pilgrim protocol, there may be ownerless shared parameters. Consequently, we have studied and analyzed the cases in which that kind of problem may occurs through a coloured Petri net model. Thus, all the protocols have been modified in order to work well together","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}