Haining Yu, Binxing Fang, Xiang-Zhan Yu, Juan Chen
{"title":"Semantic surface representation of physical entity in the WEB of things","authors":"Haining Yu, Binxing Fang, Xiang-Zhan Yu, Juan Chen","doi":"10.1109/CCIS.2012.6664538","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664538","url":null,"abstract":"The Web of Things is a refinement of the Internet of Things, which reuses existing web technologies, standards, languages and tools to integrate the physical world and virtual world seamlessly. Architectures enabling a Web of Things have been proposed, but machine-readable and machine-interpretable approach to provision trillions of heterogeneous available physical entities in virtual world has not acquired its due emphasis. We focus on semantic surface representations of physical entities which are created using HTML, described using a metadata model and formatted using microformat, RDFa and microdata. The interlinked metadata model we proposed consists of three components: physical entity, resource and service. We analyze their relationships and present important attributes in the form of 2-tuple “metadata, value type” to construct the metadata model. In order to make heterogeneous physical entities searchable and accessible on a large scale and guarantee surface representations machine-readable and machine-interpretable, we introduce microformat, RDFa and microdata to format and add semantics to surface representations. Moreover, a comparison of them is presented to help developers to choose between them.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114940410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianying Liu, Wendong Wang, Xiangyang Gong, Xirong Que, Hao Yang
{"title":"A hybrid model based on Kalman Filter and neutral network for traffic prediction","authors":"Jianying Liu, Wendong Wang, Xiangyang Gong, Xirong Que, Hao Yang","doi":"10.1109/CCIS.2012.6664231","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664231","url":null,"abstract":"In this paper, a hybrid model based on Kalman Filter and Neural Network is introduced for traffic prediction to make our travel more convenient. The proposed model, taking both the real-time data and the historical data, can predict the link travel time in near future more accurately and thus increase the user service quality of APTS. The performance of evaluation is demonstrated on the real link travel time from Wenhui Bridge to Mingguang Bridge collected by mobile phone supporting GPS. Finally MAPE is used to calculate the prediction error and the result shows that the hybrid model performs well than both the two separate models. Based on our proposed model for traffic prediction, the APTS, which is one of the most important applications of ITS, would attract much more people to use the public transportation system and greatly reliever the burden of the urban traffic pressure.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117028517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic aware-feedback system for service replica management","authors":"Hui Zhang, Ke Xu","doi":"10.1109/CCIS.2012.6664449","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664449","url":null,"abstract":"Cloud service provides a new model of distributed computing. The virtualization technology makes it easy to manage the computing unit, the service, as a data file block. So the optimization to a data network, such as P2P, CDN, etc. can be reused in service network. However, since software service is not a static data file but dynamic running instruction set, there will be a lot more factors to be taken into account than pure data circumstance. This paper discusses the technology of service network optimization, and proposes a new method and system of service replica management to improve the service oriented distributed software performance.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123629962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiao Li, Hui He, Binxing Fang, Zhaoxin Zhang, Juan Chen
{"title":"A content delivery strategy based on resource popularity for P4P architecture","authors":"Qiao Li, Hui He, Binxing Fang, Zhaoxin Zhang, Juan Chen","doi":"10.1109/CCIS.2012.6664236","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664236","url":null,"abstract":"Peer-to-peer (P2P) traffic engineering is a key problem for Internet Service Provider (ISP). ISP can obtain benefits from operating the inter-domain traffic. In order to reduce the negative impression of the P2P applications on the network, Provider Portal for Application (P4P) strategy has been propose recently. In this paper, we propose a novel content delivery scheme for ISP in P4P architecture, which consider the resource popularity to decrease the inter-domain traffic generated by p2p applications. We compare our scheme with the method based on non-popularity by simulation. The experiments results show that our method can reduce the inter-domain traffic efficiently.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129724736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel privacy protection scheme for participatory sensing with incentives","authors":"Junsong Zhang, Jian Ma, Wendong Wang, Yazhi Liu","doi":"10.1109/CCIS.2012.6664535","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664535","url":null,"abstract":"With the increasing popularity of smart phones, a new collaborative sensing application, named participatory sensing, gradually appeared. The key idea of participatory sensing is to employ so many users to collect and share sensed data using their mobile phones. Current relevant applications are mainly focused on how to collect sensed data. Few methods have been proposed for user privacy in participatory sensing applications. We proposed a novel privacy protection scheme for participatory sensing applications. In this scheme, we use the pseudonym, encryption function and hash function to protect the user's privacy and meanwhile to carry out incentives. Finally, we present an analysis of our protocol to show that our protocol meets the security requirements of participatory sensing application.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129630320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chongchong Yu, L. Shang, L. Tan, Xuyan Tu, Yang Yang
{"title":"A study on application of semi-supervised collaborative classification algorithm","authors":"Chongchong Yu, L. Shang, L. Tan, Xuyan Tu, Yang Yang","doi":"10.1109/CCIS.2012.6664244","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664244","url":null,"abstract":"The treatment method of Tri-Training algorithm in classifier selection and confidence estimation breaks through the limitation of Co-training algorithm. In order to further improve the classifiers' performance, a semi-supervised collaborative classification algorithm with enhanced difference makes some improvement respectively on classifier diversity, model update strategy and unlabeled sample prediction method. Because of the use of different classifiers and consideration of classifier diversity, this algorithm has good performance in unbalanced sample set classification. Establish classification model based on the above algorithm, and use it to do experiment with bridge structural health monitoring data, the results of which demonstrate the validity and applicability.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127204381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of distributed LDoS attack based on one-dimensional random walk algorithm","authors":"Xiaoming Liu, Miao Zhang, Guoai Xu","doi":"10.1109/CCIS.2012.6664262","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664262","url":null,"abstract":"This paper designs a distributed low-rate DoS (LDoS) attack using random walk algorithm; random walk algorithm can be used in generating power-law distribution which complies with normal network behavior feature. In this attack pattern, the behavior of each distributed attack flows are normal and nonperiodic, while the superposed effect has the same damage degree as traditional square wave LDoS attacks. As the distributed attack flow satisfies the network traffic behavior feature, it is more difficult to detect and trace attack sources. The study on the feature of this attack provides reference for distributed low-rate DoS attack countermeasures.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Micro-blog category based on feature-words category dispersion","authors":"Yingyou Chen, Qing Wu","doi":"10.1109/CCIS.2012.6664377","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664377","url":null,"abstract":"The micro-blog information classification is an important pretreatment in micro-blog data processing work. Due to the unique properties of the micro-blog text, there are some limitations when use traditional classification to deal with it. Consider to a single microblog text brief which contains less effective feature-words, and the content compare spoken of the features, this paper proposed to use similar words and collocations to extend the text feature-words, reducing the possibility of feature loss. For the feature of information selection and weight calculation, proposed one kind text classification methods which based on the feature-words category dispersion and dispersion degree. The experiments show that the propose classification method achieves good effects in the classification of micro-blog text, and has better applicability in microblog text classification scene.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128880672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated runtime monitoring method for Internet-Based Virtual Computing Environment","authors":"Hong Zhang, Xinran Liu, Chunge Zhu, Qian Liu","doi":"10.1109/CCIS.2012.6664452","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664452","url":null,"abstract":"This paper designs a new integrated runtime monitoring method for the Internet-Based Virtual Computing Environment (iVCE). This method consolidates basic state monitoring of virtual resources and application state monitoring of virtual tasks. To validate our methodology, we developed a monitoring system for an iVCE testbed of more than 1000 nodes.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"19 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133014216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on intelligent vehicle autonomous overtaking based on single neuron PID control","authors":"Yuan-xian Zhu, M. Feng, Xiao Wang, Xinxi Xu","doi":"10.1109/CCIS.2012.6664572","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664572","url":null,"abstract":"Based on the non-linearities and time-varying property of lateral kinematics model for intelligent vehicles, an improved overtaking model based on Bezier curve was proposed and a single neuron PID tracking control strategy was designed for overtaking. Compared with conventional path tracking methods, this controller only needs the angle between the horizontal plane and the vertical plane and the horizontal distance without considering the strict curve tracking, which is more similar to human driving. Of the 120km's test, the total overtaking count was 25, success rate was 92%. Test results show that the improved model could reflect the overtaking process, and prove the correctness and feasibility of this controller.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130293129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}