{"title":"The Chinese Conceptual Graph Matching Algorithm Based on Conceptual Sub-graph Weight Self-Adjustment","authors":"Hui Zeng, Liyan Xiong, Jianjun Chen","doi":"10.1109/3PGCIC.2014.59","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.59","url":null,"abstract":"Semantic computing is an important task in the research of natural language processing. For the problem of the inaccurate conceptual graph matching, this paper proposed the algorithm based on Conceptual sub-Graph weight self-adjustment. Based on the in tensional logic model of Chinese concept connotation, using Recursive Conceptual Graph as knowledge representation method and combining with the computation method of E-A-V structures similarity, the algorithm computed the similarity of conceptual graphs. When using this algorithm to compute the Conceptual Graph similarity, it can give the homologous weight to the sub graph based on the proportion of how much information the sub graph contains in the whole Conceptual Graph. The experiment results show that this new algorithm achieve better results.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124853773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"'NoSQL' and Electronic Patient Record Systems: Opportunities and Challenges","authors":"P. Moore, T. Qassem, F. Xhafa","doi":"10.1109/3PGCIC.2014.81","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.81","url":null,"abstract":"Research into electronic health record systems can be traced back over four decades however the penetration of records which incorporate more than simply basic information into healthcare organizations is relatively limited. There is a great (and largely unsatisfied) demand for effective health record systems, such systems are very difficult to build with data generally stored in highly distributed states in a diverse range of formats as unstructured data with access and updating achieved over online systems. Internet application design must reflect three trends in the computing landscape: (1) growing numbers of users applications must support (along with growing user performance expectations), (2) growth in the volume and range and diversity in the data that developers accommodate, and (3) and the rise of Cloud Computing (which relies on a distributed three-tier Internet architecture). The traditional approach to data storage has generally employed Relational Database Systems however to address the evolving paradigm interest has been shown in alternative database systems including 'NoSQL' technologies which are gaining traction in Internet based enterprise systems. This paper considers the requirements of distributed health record systems in online applications and database systems. The analysis supports the conclusion that 'NoSQL' database systems provide a potentially useful approach to the implementation of HR systems in online applications.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ling-Ling Xia, Guoping Jiang, B. Song, Guanhua Zhu
{"title":"Rumor Spreading Model Considering the Importance and Fuzziness of Information","authors":"Ling-Ling Xia, Guoping Jiang, B. Song, Guanhua Zhu","doi":"10.1109/3PGCIC.2014.51","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.51","url":null,"abstract":"In this paper, to study rum or spreading model for the web forum of which the topological structure has a strong heterogeneity, we propose a novel susceptible-exposed-infected-removed (SEIR) model by introducing the importance and fuzziness of the content of the rum or. We derive mean-field equations characterizing the dynamics of the SEIR model on heterogeneous network. Then a steady-state analysis is conducted to investigate the critical threshold and the final size of the rum or spreading. The simulation results demonstrate that small fuzziness can effectively reduce the maximum rumor influence. In addition, the critical threshold is independent of the stifling rate. We also get a conclusion that whether a rum or can spread is related to the fuzziness of rum or itself.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116081383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hang Yang, Fuzheng Zhang, Aidong Xu, Cai Yuan, Chuanlin Chen
{"title":"A Method to Predict the Intermittent Power by Classification Model","authors":"Hang Yang, Fuzheng Zhang, Aidong Xu, Cai Yuan, Chuanlin Chen","doi":"10.1109/3PGCIC.2014.33","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.33","url":null,"abstract":"More and more power plants have been constructed and generated by intermittent energy. As a clean and renewable energy, such sources as wind and solar are favored in the new generation of power grid system. However, influenced by factors of geography, circumstance and climates, the renewable energy has the characteristics of intermittency, volatility and uncontrollability, which reduce the efficient utilization of intermittent energy. This paper uses data mining methods to predict the level of power generation from solar energy, by analyzing the information collected from distributed power plants. Investigating the real-world power grid dataset, the experimental result verifies the feasibility of the proposed method for improving the utilization of intermittent energy.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121672491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modeling Profile for Availability Analysis of Composite Cloud Services","authors":"F. Amato, Francesco Moscato","doi":"10.1109/3PGCIC.2014.85","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.85","url":null,"abstract":"Service Oriented Architectures and service-centric models arose in the last years as a standard de-facto in IT enterprises for offering practically any kind of services to users world-wide. Heterogeneity (of operating systems, programming languages, software and hardware infrastructures etc.) and transparency (for users) are the key issues of the actual trends in developing and providing services. In particular Cloud-based models provide means for realizing and distributing everything-as-a-service, including infrastructures, hardware and software platforms and services. Even if at the moment Service-centric models and technologies are mature in the IT scenario, Composition, analysis and validation of Cloud services is an open research challenge. In this work we describe a methodology based on Multi-Agent Models which allows for description, composition and verification of requirements of Cloud-based services. The methodology uses a modeling profile able to describe services as agents in a multi-agent environment and it is based on Model Driven Engineering (MDE) techniques. The proposed methodology includes a verification process for requirements that exploits formal methods during the whole life cycle of services. An example of the application of the proposed techniques will be reported also.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128027942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved EAP-AKA Protocol Based on Redirection Defense","authors":"Binbin Yu, Jianwu Zhang, Zhendong Wu","doi":"10.1109/3PGCIC.2014.106","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.106","url":null,"abstract":"With the substantial popularity of smartphones and the increasing development of wireless technology, users have higher and higher demands for seamless data connection, which involves the vertical handover and unified authentication between heterogeneous networks. 3G-WLAN network is the most widely studied and used scheme which uses EAP-AKA protocol as its authentication protocol. However, EAP-AKA protocol contains a number of security vulnerabilities of AKA. The most serious problem of them is the complete trust in APs. This paper analyzes the security flaws of EAP-AKA protocol, and presents a kind of redirection attack based on the complete trust in APs, and then simulates it. Finally we propose an improved EAP-AKA protocol to prevent redirection attack.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Program Crash Analysis Based on Taint Analysis","authors":"Puhan Zhang, Jianxiong Wu, Wang Xin, Zehui Wu","doi":"10.1109/3PGCIC.2014.100","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.100","url":null,"abstract":"Software exception analysis can not only improve software stability before putting into commercial, but also could optimize the priority of patch updates subsequently. We propose a more practical software exception analysis approach based on taint analysis, from the view that whether an exception of the software can be exploited by an attacker. It first identifies the type of exceptions, then do taint analysis on the trace that between the program entry point to exception point, and recording taint information of memory set and registers. It finally gives the result by integrating the above recording and the subsequent instructions analysis. We implement this approach to our exception analysis framework ExpTracer, and do the evaluation with some exploitable/un-exploitable exceptions which shows that our approach is more accurate in identifying exceptions compared with current tools.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134083377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qinshu Xiao, Wen’an Zhou, Baojiang Cui, Lingrong Li
{"title":"An Enhancement for Key Management in LTE/SAE X2 Handover Based on Ciphering Key Parameters","authors":"Qinshu Xiao, Wen’an Zhou, Baojiang Cui, Lingrong Li","doi":"10.1109/3PGCIC.2014.73","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.73","url":null,"abstract":"The security of handover key management in Long Term Evolution (LTE) /System Architecture Evolution (SAE) has been a popular topic in recent years. In this paper we first describe the security architecture and key hierarchy of LTE/SAE, clarifying security requirements of key management in handover. Next, we analyze security of key management in X2 handover (intra-MME handover), and point out the current key management mechanism in X2 handover only satisfy two-hops forward security and one-hop backward security, but not one-hop security. And then, aimed at the security vulnerability of lacking one-hop forward security in current X2 handover key management, we proposed a new scheme for key management in X2 handover based on ciphering some key parameters with the local master root key. At last, the proposed new scheme is analyzed under three adversary models. The analysis shows that one-hop forward security and one-hop backward security could be maintained in our new proposal.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133074853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Overhead of Xen on Linux 3.13 on ARM Cortex-A7","authors":"Xiaoli Gong, Qi Du, Xu Li, Jin Zhang, Y. Lu","doi":"10.1109/3PGCIC.2014.92","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.92","url":null,"abstract":"A number of simple performance measurements on disk speed, CPU, memory and network throughput were done on a dual ARM Cortex-A7 machine running Linux inside a Xen virtual machine that communicate with the outside through fronted-driver and backend-driver. The average performance overhead of Xen virtual machine is between 3 and 7 percent when the host is lightly loaded (running only the system software and the necessary xenstored demon and so on).","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127866057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Network Gene-Based Framework for Detecting Advanced Persistent Threats","authors":"Y. Wang, Yongjun Wang, J. Liu, Zhijian Huang","doi":"10.1109/3PGCIC.2014.41","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.41","url":null,"abstract":"Advanced Persistent Threat (APT) poses a serious threat to cyber security, and its unique high unpredictability, deep concealment and grave harmfulness make the traditional network monitoring technology facing unprecedented challenges in the background of massive and complicated network traffic. This paper aimed for the urgent demand of APT network monitoring. Relying on the rapid development of big data analysis and cloud computing technology, to draw lessons from biology gene concept, we put forward a new connotation of the network gene to depict the semantic-rich behavior characteristics pattern of network applications. Through the organic combination of network protocol reverse analysis and the network data stream processing technology, we established a set of basic theories and technical architecture of network gene construction and calculation, forming a new detection framework for APTs to support the construction of intrusion-tolerant network ecological environment.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127383876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}