{"title":"P2P-based Mobile Social Networks","authors":"S. Cho","doi":"10.1109/3PGCIC.2015.52","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.52","url":null,"abstract":"Contact information sharing is a fundamental aspect of establishing social networks, which have already been implemented using Web technologies. Users can be notified when their friends update their contact information. The Web-based social networks already extend to the mobile social networks. By using smart phone applications, such as Facebook or Twitter, individuals with similar interests can converse and connect with one another closely. Normally, these mobile social network applications adopt Web-based friend relationships and do not provide a mobile peer-to-peer connection directly. Additionally, social networks are tightly connected through user interests or groups to facilitate a more efficient relationship. Therefore, each user can belong to more close and diverse groups based on their preferences. However, there is no well-defined solution for a mobile social network protocol, as well as a distributed database for contact information synchronization. Contact information synchronizing can be performed through Google or Yahoo accounts. However, this would only work well if the users are used the accounts with the same company, and would not work if the users had accounts from different service providers. Thus, it makes sense for smartphones to update the contact information through a P2P approach through a centralized server. This paper presents a mobile WAN P2P platform. In addition to this platform, contact information synchronization is implemented as well as researched by UDP hole punching. As a result, data synchronization between two Android smartphones was shown by Wireshark with a public IP and private IP. The test results indicate that mobile P2P in WAN helps current client-server architecture develop different P2P architectures. Moreover, regarding IPv6 use, hybrid IPv4/IPv6 architecture is recommended for implementing in the future.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Tentative Study on MOOC-based Strategies of College Stuents' Self-Learning Ability","authors":"L. Fang","doi":"10.1109/3PGCIC.2015.45","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.45","url":null,"abstract":"As a new online teaching method, MOOC has its own traits, such as: personalize learning, independent learning, Virtual team cooperative learning, online operation and tests, which make up the shortcomings of traditional teaching methods. The paper explores the strategies of MOOC-based college students' self-learning ability from the following aspects: changing the teachers' roles, stimulating students' motivation, strengthening policy guidance, enhancing the learning environment.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124355353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Massimiliano De Benedetti, Fabio D'Urso, F. Messina, G. Pappalardo, C. Santoro
{"title":"UAV-based Aerial Monitoring: A Performance Evaluation of a Self-Organising Flocking Algorithm","authors":"Massimiliano De Benedetti, Fabio D'Urso, F. Messina, G. Pappalardo, C. Santoro","doi":"10.1109/3PGCIC.2015.78","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.78","url":null,"abstract":"This paper describes an algorithm aiming at coordinating of a set of multirotor UAVs to self-organise in order to create a flock performing a monitoring mission. The aim of the flock is to acquire data relevant to a certain area of the terrain and transmit them to a Base Station. Two basic aspects are taken into account: (i) to plan a proper path which minimises mission time, and (ii) to identify possible faults in one or more multirotors, taking care of performing a re-scouting of terrain regions in order to avoid loss of data. The algorithm uses same rules to ensure flocking formation and area coverage. It is validated using a software simulator to measure and report some parameters useful to understand the performances and effectiveness of the approach.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115195144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bert Van Acker, J. Denil, H. Vangheluwe, P. D. Meulenaere
{"title":"Managing Heterogeneity in Model-Based Systems Engineering of Cyber-Physical Systems","authors":"Bert Van Acker, J. Denil, H. Vangheluwe, P. D. Meulenaere","doi":"10.1109/3PGCIC.2015.29","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.29","url":null,"abstract":"Model-based Systems Engineering plays a pivotal role in the design of distributed embedded systems by enabling early virtual integration of the different parts of the system. Traditionally, the system model is composed of subsystem models at the same level of abstraction and with one particular view. However, in some cases the system model may comprise sub-system models at different levels of abstraction. Integration of these different abstraction level models imposes some important drawbacks which hinder the overall system simulations. These drawbacks need to be addressed to facilitate the simulation of systems composed with multi-level subsystem models. In this paper we report on modelling techniques for embedded and distributed systems to deal with this heterogeneity. We describe a methodology to (semi-)automatically generate an executable multi-level system simulation model starting from an abstract system architecture of the system. A platooning system example is used to demonstrate the new modelling techniques.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130848108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Soft Error Protection in Safety Critical Embedded Applications: An Overview","authors":"J. Vankeirsbilck, H. Hallez, J. Boydens","doi":"10.1109/3PGCIC.2015.89","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.89","url":null,"abstract":"The past decade, embedded systems are being used extensively. Although the power consumption has been decreased by lowering the supply voltage and size of the embedded system, consequentially these systems have become more susceptible to soft errors. This paper presents an overview of existing software implemented tolerance techniques that allow to protect the system against soft errors. Those techniques are then associated with the software requirements imposed by EN 50128, the software standard of the railway domain, and those imposed by IEC 60601-1, the general medical standard. It is shown that the detection techniques ease compliance for all both EN 50128 and IEC 60601-1.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131270260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Radio Interference Aware Dynamic Channel Utilization Method on Software Defined WMN","authors":"Yuzo Taenaka, K. Tsukamoto","doi":"10.1109/3PGCIC.2015.5","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.5","url":null,"abstract":"This paper proposes a dynamic channel utilization method enabling to consider the effect of radio interference on software defined multi-channel wireless mesh network (SD-WMN). In our SD-WMN, a set of APs, each of which uses a single and different channel, is connected by Ethernet each other and thus constructs a VAP handling multiple channels. The OpenFlow technology, which enables us to programmably control traffic, is employed to effectively utilize multiple channels in SD-WMN for improvement of the network capacity. Although we already proposed several channel utilization methods, either channel may be saturated even if other channels still have residual capacity. This is because the radio interference inevitably occurs inside WMN due to multi-hop transmission nature. Thus, to avoid the saturation of either channel while utilizing all channels effectively, we propose a new method that can consider the effect of radio interference inside WMN. In the method, all interfered APs can be reliably detected and the network load is balanced in conjunction with the interfered APs by considering the radio interference. From the experimental results, the proposed method can avoid the saturation of either channel successfully, thereby increasing the network capacity drastically.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122867688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A4SDN - Adaptive Alienated Ant Algorithm for Software-Defined Networking","authors":"A. Stefano, G. Cammarata, G. Morana, D. Zito","doi":"10.1109/3PGCIC.2015.120","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.120","url":null,"abstract":"This paper introduces A4SDN, a distributed, adaptive, load-balancing algorithm for traffic engineering on Software-Defined Networks. A4SDN, i.e. the Adaptive Alienated Ant Algorithm for Software-Defined Networking, is based on the Alienated Ant Algorithm (AAA), a stochastic-based, heuristic approach used to solve combinatorial and multi-constraint optimisation problems. Based on a non natural ants' behaviour, the AAA forces the ants in searching for food to distribute themselves over all the available paths rather than converge to a single one. This strategy, applied to the packets to route, supplies an autonomic dynamic routing and leads to a better exploitation of the network bandwidth, enforcing best effort traffic and improving network performance. A comparison between A4SDN with two Dijkstra-based routing solutions clearly shows that A4SDN is able to guarantee a higher throughput associated with a lower delay and packet loss rate.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128184317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Replacement Strategy of Web Cache Based on Data Mining","authors":"Jing Zhang","doi":"10.1109/3PGCIC.2015.75","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.75","url":null,"abstract":"RFS model is established by the application of RFM data mining theory to Web cache replacement policy, Using K-Means clustering algorithm to analyze RFS model we obtained the value of segmentation of the Web access, and ordered the worst access value web pages of the segmentation data by RFS. When the Web cache replacement occurs, the last web file order was eliminated, and all the Web pages in the buffer re-executed the strategic positioning of access value. Finally, a contrast between the new strategy (in this paper) and the old one (LRU, LFU, SIZE, GDSF) was conducted so as to prove the new one better.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"57 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114016341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Chilipirea, Andreea-Cristina Petre, C. Dobre, M. Steen
{"title":"Filters for Wi-Fi Generated Crowd Movement Data","authors":"C. Chilipirea, Andreea-Cristina Petre, C. Dobre, M. Steen","doi":"10.1109/3PGCIC.2015.36","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.36","url":null,"abstract":"Cities represent large groups of people that share a common infrastructure, common social groups and/or common interests. With the development of new technologies current cities aim to become what is known as smart cities, in which all the small details of these large constructs are controlled to better improve the quality of life of its inhabitants. One of the important gears that powers a city is given by traffic, be it vehicular or pedestrian. As such traffic is closely related to all other activities that take place inside of a city. Understanding traffic is still a difficult process as we have to be able to not only measure it in the sense of how many people are using a particular path but also in analyzing where people are going and when, while still maintaining individual privacy. And all this has to be done at a scale that would cover most if not all individuals in a city. With the high increase in smartphones adoption we can reliably assume that a large part of the population in cities are carrying with them, at all times, at least one Wi-Fi enabled device. Because Wi-Fi devices are regularly transmitting signals we can rely on these devices to detect individual's movements unobtrusively without identifying or tracking any particular individual. Special sensors that monitor Wi-Fi frequencies can be placed around a city to gather data that can later be used to identify patterns in the traffic flows. We present a set of filters that can be used to minimize the amount of data needed for processing and without negatively impacting the result or the information that can be extracted from this data. Part of the filters we present can be deployed at the sensor level, making the entire system more scalable, while a different part can be executed before data processing thus enabling real time information extraction and a broader temporal and spatial range for data analysis. Some of these filters are particular to Wi-Fi but some of them can be applied to any detection system.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116039133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gianluca Zangara, D. Terrana, P. P. Corso, M. Ughetti, Guido Montalbano
{"title":"A Cloud Federation Architecture","authors":"Gianluca Zangara, D. Terrana, P. P. Corso, M. Ughetti, Guido Montalbano","doi":"10.1109/3PGCIC.2015.183","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.183","url":null,"abstract":"Cloud Computing is the state of the art computation paradigm enabling providers to offer computing resources to customers in a pay-per-use fashion. Nowadays public Cloud providers offer similar services within few service models, mainly IaaS and PaaS. Cloud providers give to the user the feeling to dispose of infinite resources, thus having to predict the user requirements in order to provide services with minimal costs, maintaining at the same time high levels of SLAs. In order to achieve this goal, Cloud providers can cooperate together to bring new business opportunities, such as expanding available resources, achieving cost effective asset optimization and adopting power saving policies. Cloud Federation allows different Cloud providers the opportunity to work collaboratively to offer best services to customers and contemporary to improve their productivity. Customers can advantage from Cloud Federation for a larger offer of available services, the capability of price comparison and the removal of vendor lock-in. In this paper we describe a platform that enables the federation of several heterogeneous Cloud Providers to allow the customers choosing and activating Cloud services from a central platform, bringing more attractive price policy to customers. The authors introduce a prototype of Cloud Federation platform based on a central infrastructure tested to manage OpenStack, CloudStack and Amazon EC2 providers, thus allowing the user to select the best services in terms of either technical requirements or price policy and activate them without having to explicitly register to each of the federated providers. The prototype is designed to accept different types of Cloud service models by means of transparent interfaces developed around a billing and a metering module, respectively to bill the service to the customer and to collect information about the health status of the federated platforms.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123819225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}