{"title":"A Distributed Framework for Event Detection in Video Surveillance Context","authors":"Fabio Persia, D. D’Auria","doi":"10.1109/3PGCIC.2015.113","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.113","url":null,"abstract":"In latest years modern world's needs of safety caused a speed spreading of video surveillance systems, more and more frequently collocated in the most crowded places. Thus, a lot of theoretical approaches working with data coming from heterogeneous sources and defining some very complex event detection algorithms have been proposed in the literature. In this paper, we present a distributed framework for event detection in video surveillance context. The overall process is described, starting from the video frames captured by different kinds of sensors and cameras till at the end some high-level event detection algorithms performed in a distributed environment for finding potentially dangerous activities are applied. The conducted experiments confirm the efficiency achieved by our distributed framework.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116220958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Macri, A. Rango, D. Spataro, D. D'Ambrosio, W. Spataro
{"title":"Efficient Lava Flows Simulations with OpenCL: A Preliminary Application for Civil Defence Purposes","authors":"M. Macri, A. Rango, D. Spataro, D. D'Ambrosio, W. Spataro","doi":"10.1109/3PGCIC.2015.107","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.107","url":null,"abstract":"GPGPU (General Purpose computing on Graphics Processing Units) has marked a revolution in the field of Parallel Computing allowing to achieve computational performance unimaginable until a few years ago. This hardware has proven to be extremely reliable and suitable to simulate Cellular Automata (CA) models for modeling complex systems whose evolution can be described in terms of local interactions. Starting from previous GPGPU implementations of CA models with CUDA, this paper presents an effective implementation of a well-known numerical model for simulating lava flows on Graphical Processing Units (GPU) based on the OpenCL (Open Computing Language) standard. In addition, a preliminary Civil Defence application related Hazard maps of an area located at Mt. Etna volcano (South Italy), confirms the validity of OpenCL and both low-cost and high-end graphics hardware as an alternative to expensive solutions for the simulation of CA models.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128281476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The HtComp Research Project: An Overview","authors":"A. Cilardo","doi":"10.1109/3PGCIC.2015.135","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.135","url":null,"abstract":"This contribution reviews the main results of the HtComp project, a two-year research programme aiming at facilitating the integration of FPGA-based accelerators into general-purpose computing. The project covered the automated generation of HDL code from parallel applications written in traditional high-level software languages, as well as the customization of the processing, memory, and on-chip interconnect subsystems tailored on the application requirements. The ultimate outcome of the research was the introduction of methods and tools allowing software developers, particularly from the HPC domain, to access hardware-accelerated platforms incurring significantly reduced design complexity and overheads.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128340875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Entity-Attribute-Value Data Model in a Multi-tenant Shared Data Environment","authors":"Torben Jastrow, T. Preuss","doi":"10.1109/3PGCIC.2015.189","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.189","url":null,"abstract":"Service providers in the Software as a Service (SaaS) Business offer the same or similar services to multiple tenants. Presentation, business logic and persistence layer are shared by all tenants. However, in many cases tenants have a great need to customize their application. In this paper we investigate the use of Entity-Attribute-Value (EAV) databases for multi tenant applications. In the EAV design attributes are not recorded as columns in a table but in rows. Since databases are designed for changing the number of rows rather than columns in tables this improves the performance of the customization process.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124757683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Yoshihisa, Yoshimasa Ishi, Kodai Mako, Tomoya Kawakami, Y. Teranishi
{"title":"A Sensor Data Stream Delivery System with Different Delivery Cycles for IoT Environments","authors":"T. Yoshihisa, Yoshimasa Ishi, Kodai Mako, Tomoya Kawakami, Y. Teranishi","doi":"10.1109/3PGCIC.2015.87","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.87","url":null,"abstract":"Due to the recent attraction for IoT (Internet of Things) environments, some sensor data stream delivery systems have been proposed. In IoT environments, clients have different computational and communication performances. If servers deliver sensor data stream with a shorter delivery cycle than the limit of the clients' performance, the client losses the data or the delay lengthens. These causes unexpected system behaviors. However, most of conventional systems do not consider the clients' performances. In this research, we propose a sensor data stream delivery system with different delivery cycles for IoT environments. In the proposed system, the clients select their appropriate delivery cycles based on their performances. We also developed our proposed system and confirmed that our proposed system can reduce data loss and delay.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114323426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical Challenges for Quality Assessment of Smart Medical Devices","authors":"J. Sliwa","doi":"10.1109/3PGCIC.2015.96","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.96","url":null,"abstract":"Connected medicine, using smart (software based and networked) medical devices is frequently presented as the major disruptive trend in health care. Such devices will however be broadly used only if they are \"prescribed\" by the hospitals as a part of a therapy and are reimbursed by the insurances. For this we need the proof of their safety, medical efficacy and economic efficiency. Aside of obligatory clinical trials we need an extensive system of post-market surveillance, because: a medical device is a part of a complex cyber-physical system, with humans in the loop / the environment cannot be sufficiently defined / humans react differently to the therapy, they also behave differently / after every software upgrade the device is not the same as before In their operation such devices generate huge amounts of data that can be reused for such analysis. Technically oriented people believe it can be done using a Big Data Analytics system without a deeper understanding of the underlying processes. It is doubtful if such approach can deliver useful results. The main problems seem to be: unbalanced cohort / various patient groups with various preferences / multiple quality parameters (basic algorithm, signal propagation, battery, security & privacy, obtrusiveness, etc.) / multiple variants (operating modes, device settings) / variability of the device and of the environment. When we transform data into \"actionable knowledge\", especially if the generated decisions influence human health, utmost care has to be applied. The goal of this paper is to present the complexity of the problem, warn against hasty, purely technical solutions, raise interest among specialists in health statistics and ignite an interdisciplinary cooperation to solve it.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"23 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113971888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation","authors":"Wenting Shen, Jia Yu, Rong Hao, Xu An Wang","doi":"10.1109/3PGCIC.2015.47","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.47","url":null,"abstract":"Cloud storage is becoming more and more popular with the development of cloud computing technique. Cloud storage auditing, as one important security service, is used to check the integrity of the cloud data stored in cloud for users. However, the burden for users to generate authenticators is very huge before cloud data are outsourced to cloud in public cloud storage auditing. In order to deal with this problem, we propose a public cloud storage auditing scheme with lightweight authenticator generation. We design a new framework of public cloud storage auditing, in which an Authenticators Generation Center (AGC) is in charge of generating authenticators for users. In our proposed scheme, the AGC does not know the real cloud data of users because it only generates the authenticators for blinded cloud data. To reduce the computation burden at user side, the cloud can verify whether the authenticators generated by the AGC are correct or not. As a result, the users only consume very little computation for public authenticator generation and verification. The security analysis and the performance analysis show the proposed scheme is secure and efficient.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Numerical Simulation for the Quasilinear Elliptic Problems","authors":"Qingli Zhao, Jin Li, Juxin Chen, X. Wang","doi":"10.1109/3PGCIC.2015.71","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.71","url":null,"abstract":"With the rapid development of computing power, some efficient numerical methods are presented. In this paper, expanded mixed finite element method is introduced to solve the quasilinear elliptic problems. This method expands the traditional mixed finite element method in the sense that three variables are explicitly treated simultaneously. Existence and uniqueness of the discrete approximation are demonstrated. L2 2-error estimates for three variables are presented. Numerical examples are carried out to validate the theoretical analysis.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124101642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juha Puttonen, Samuel Olaiya Afolaranmi, Luis E. Gonzalez Moctezuma, A. Lobov, J. Lastra
{"title":"Security in Cloud-Based Cyber-Physical Systems","authors":"Juha Puttonen, Samuel Olaiya Afolaranmi, Luis E. Gonzalez Moctezuma, A. Lobov, J. Lastra","doi":"10.1109/3PGCIC.2015.30","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.30","url":null,"abstract":"Cyber-physical systems combine data processing and physical interaction. Therefore, security in cyber-physical systems involves more than traditional information security. This paper surveys recent research on security in cloud-based cyber-physical systems. In addition, this paper especially analyzes the security issues in modern production devices and smart mobility services, which are examples of cyber-physical systems from different application domains.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115752147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mak Sharma, Philip Davies, D. Newell, P. Moore, Chander Sidhu
{"title":"Text Mining Terms and Condition to Provide a Confidence Factor for the Use of Cloud Services","authors":"Mak Sharma, Philip Davies, D. Newell, P. Moore, Chander Sidhu","doi":"10.1109/3PGCIC.2015.60","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.60","url":null,"abstract":"In this paper we look at proposals to enable machine analysis of terms and conditions of cloud service providers. We begin with the investigation of cloud usage and the extent to which consumers are aware of the content of terms and conditions. We propose a terms and conditions analyzer that identifies keywords and sentences. We show how a confidence factor can be constructed to help consumers make an informed decision whether a particular cloud service should be adopted or not.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115809719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}