{"title":"Evaluation of Division Based Broadcasting System Considering Additional Information","authors":"Y. Gotoh, Akihiro Kimura","doi":"10.1109/3PGCIC.2014.111","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.111","url":null,"abstract":"Due to the recent popularization of IP multicast, the continuous broadcasting of audio or video media data has attracted great attention. Although servers can concurrently deliver data to many clients, clients have to wait until their data are broadcast. In division based broadcasting, many researches have proposed scheduling methods to reduce the waiting time. A division based broadcasting system has also been proposed to evaluate these schemes. However, this system does not consider such problems as additional information that increase the waiting time before playing the data as well as the interruption time while playing it. In this paper, we implement a division based broadcasting system that considers additional information. In our proposed system, we evaluate the effectiveness of reducing the interruption time using conventional methods.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Headphones for a Cloud 3D Audio Application","authors":"D. D’Auria, D. D. Mauro, D. Calandra, F. Cutugno","doi":"10.1109/3PGCIC.2014.145","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.145","url":null,"abstract":"Spatial dimensionality is one of the main features of the physical environment in which humans live. When we think about 3D, we usually refer to 3D video, even if it is not the only existing channel of natural interaction. In this paper, we present an interaction system based on spatialized sounds. We developed an innovative cloud application in the cultural heritage context, a personal guide, in 3D sound, attracting the tourists' attention toward monuments or buildings, offering sounds capes of augmented reality. The designed system interacts with smart headphones that remotely takes the orientation of the listener's head and properly generates an audio output, which also takes into account the listener's position and orientation in the environment. Thus, an innovative headphones using an inertial measurement unit for determining the orientation of a user's head have been designed and developed in open-ear mode, in order to locate the user in the real context.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126823497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Trust Model Personalized Dynamic Recommendation System Based on Auction Mechanism","authors":"Shanguo Lv, Hongli Chen","doi":"10.1109/3PGCIC.2014.144","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.144","url":null,"abstract":"Integratedly use the knowledge of the social network theory based on the traditional trust, and compute the trust of the users of online auction transactions, because of lack of Intelligence, flexibility and initiative in current recommendation system, the Auction Mechanism Based Distributed Personalized Recommendation System was proposed. In this system, intelligent agent technology was used. The various modules of the recommendation system were realized by relevant agents. in order to overcome the limitation of a single recommendation method and satisfy multiple recommendation requirements, Personalized the assessment of the online auction trust based on the social network according to the recommended information of the recommend users. and provide a ne way of thinking for the users who find the integrity of trading partners, which promote the e-commerce develops orderly and healthy.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129093213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emerging Technologies for Monitoring Behavioural and Psychological Symptoms of Dementia","authors":"T. Qassem, G. Tadros, P. Moore, F. Xhafa","doi":"10.1109/3PGCIC.2014.82","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.82","url":null,"abstract":"Behavioural and psychological symptoms of dementia (BPSD) are complex array of symptoms that have devastating impact on patients, carers and their loved ones. In this paper we argue that with the combined use of pervasive computing and big data, we could make significant progress in the diagnosis of the causes of BPSD, monitoring response to treatment and helping in the prevention of these symptoms. We review the available technologies, such as Cloud computing and context aware systems, and how they could help in managing and hopefully preventing the Behavioural and Psychological Symptoms of Dementia.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116820056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Epidemic Dynamics in Weighted Adaptive Networks","authors":"B. Song, Guoping Jiang, Yurong Song","doi":"10.1109/3PGCIC.2014.56","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.56","url":null,"abstract":"Adaptive networks are common in real world, describing networks whose links change adaptively with respect to its states, resulting in a dynamical interplay between the state and the topology of the network. Recently, it is demonstrated that the diversity in the interaction intensity is also the crucial feature that reflects the complexity. In fact, when topology alters, the strengths of the connections between nodes change accordingly. Here we propose a weighted adaptive network model, in which the network topology, nodes status and the weights interact mutually. Furthermore, we also study the epidemic dynamics in weighted adaptive networks, and two rewiring strategies based on weights are presented and proved to be well performed on preventing the spread of the disease.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133420347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Deployment of a Multi-channel Wireless Backbone Network Based on an Efficient Traffic Management Framework","authors":"Yuzo Taenaka, Masaki Tagawa, K. Tsukamoto","doi":"10.1109/3PGCIC.2014.112","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.112","url":null,"abstract":"This paper presents an experimental deployment of a multi-channel wireless backbone network (WBN) with an Open Flow-based traffic management framework. In a WBN, a set of APs, each of which uses a single and different channel, is connected by Ethernet and thus constructs a VAP handling multiple channels. To flexibly control traffic flow transmitted over multiple channels, we also implement a traffic management framework with a simple channel utilization method based on the Open Flow control. We then deploy a 6-hop WBN in a real environment and provide the Internet access service to conference attendees. Since the control messages are inherently transmitted with the introduction of Open Flow, the way of isolating between control plane and data plane will become critical issue. To solve this issue, we employ an additional AP, which constructs a dedicated control network for Open Flow. The results show that the proposed WBN can attain the network capacity of about 25 Mbps in 6-hop, thereby providing significant throughput performance for various applications including video streaming.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129088306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Re-encrypted Ciphertext-Policy Attributed-Based Encryption Scheme for Cloud Storage","authors":"L. Mo, F. Lin","doi":"10.1109/3PGCIC.2014.46","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.46","url":null,"abstract":"In this paper a dynamic re-encrypted ciphertext-policy attributed-based encryption (DRCP-ABE) scheme is introduced to keep the sharing data safe for cloud storage, which is designed to delegate the cloud service provider to re-encrypt the sharing data and send them to the authorized users, to relieve the data owner of the hard work of data management, especially in the process of authorization and revoking access privileges. Without revealing any information of the access control structure and plaintext, DRCP-ABE can guarantee the sharing data safety for cloud storage in an open environment.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116403492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shao Shuai, Dong Guowei, Guo Tao, Yang Tianchang, Shi Chenjie
{"title":"Analysis on Password Protection in Android Applications","authors":"Shao Shuai, Dong Guowei, Guo Tao, Yang Tianchang, Shi Chenjie","doi":"10.1109/3PGCIC.2014.102","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.102","url":null,"abstract":"Although there has been much research on the leakage of sensitive data in Android applications, most of the existing research focus on how to detect the malware or adware that are intentionally collecting user privacy. There are not much research on analyzing the vulnerabilities of apps that may cause the leakage of privacy. In this paper, we present a vulnerability analyzing method which combines taint analysis and cryptography misuse detection. The four steps of this method are decompile, taint analysis, API call record, cryptography misuse analysis, all of which steps except taint analysis can be executed by the existing tools. We develop a prototype tool PW Exam to analysis how the passwords are handled and if the app is vulnerable to password leakage. Our experiment shows that a third of apps are vulnerable to leak the users' passwords.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115454062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Alicante, M. Benerecetti, A. Corazza, Stefano Silvestri
{"title":"A Distributed Information Extraction System Integrating Ontological Knowledge and Probabilistic Classifiers","authors":"A. Alicante, M. Benerecetti, A. Corazza, Stefano Silvestri","doi":"10.1109/3PGCIC.2014.87","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.87","url":null,"abstract":"In this work we consider the problem of extracting concepts and relations between them from documents, aiming at constructing an index for a more semantically oriented search engine. While assessment is performed on a biomedical application, the proposed solutions can be also applied to different domains. With the distributed architecture proposed, we obtain an approach that can be applied also on large data sets. Experimental assessment has been performed on a standard data set, BioNLP 2013.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hang Yang, Peng Li, Xiaobin Guo, Huajun Chen, Zhiqiang Lin
{"title":"A Review: The Effects of Imperfect Data on Incremental Decision Tree","authors":"Hang Yang, Peng Li, Xiaobin Guo, Huajun Chen, Zhiqiang Lin","doi":"10.1504/IJICT.2018.10008905","DOIUrl":"https://doi.org/10.1504/IJICT.2018.10008905","url":null,"abstract":"Decision tree, as one of the most widely used methods in data mining, has been used in many realistic application. Incremental decision tree handles streaming data scenario that is applicable for big data analysis. However, imperfect data are unavoidable in real-world applications. Studying the state-of-art incremental decision tree induction using Hoeffding bound, we investigated the influence of imperfect data on decision tree model. Additionally we found the imperfect data worsen the performance of decision tree learning, resulting in worse accuracy and more consumed resource. This paper would be good reference for the future research. When thinking of a new generation of incremental decision tree, we should try to overcome the negative effects of imperfect data.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114204549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}