{"title":"Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR Sequences","authors":"Lishan Ke, Zhiqiang Lin","doi":"10.1109/3PGCIC.2014.134","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.134","url":null,"abstract":"In this paper, the stop-and-go clock-controlled generator based on feedback with carry shift register (FCSR) is considered. The elementary statistical properties of its sequences are investigated. We prove that some d-decimation sequences are of ideal arithmetic correlation under certain conditions. Moreover, the upper and lower bounds of the 2-adic complexity of an output sequence are obtained when the control register sequence and the generating register sequence are both l-sequences.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124670183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Schema Conversion Model of SQL Database to NoSQL","authors":"Gansen Zhao, Qiaoying Lin, Libo Li, Zijing Li","doi":"10.1109/3PGCIC.2014.137","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.137","url":null,"abstract":"With the increasing maturity of NoSQL databases as well as the situation of reading more than writing on large volumes of data, many applications turn to NoSQL and pick it as data storage system. Migrating from SQL database to NoSQL and providing efficient query become growing imperative. However, join operation is not supported in NoSQL database and read separately for multiple times which brings poor performance is unavoidable. This paper proposes a schema conversion model for transforming SQL database to NoSQL which can provide high performance of join query with nesting relevant tables, and a graph transforming algorithm for containing all required content of join query in a table by offering correctly nested sequence. A rigorous proof about the transform algorithm has been conducted and the experiment has verified the correctness of the conversion model and the high performance of join operation.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125982246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MOMC: Multi-objective and Multi-constrained Scheduling Algorithm of Many Tasks in Hadoop","authors":"Cristian Voicu, Florin Pop, C. Dobre, F. Xhafa","doi":"10.1109/3PGCIC.2014.40","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.40","url":null,"abstract":"Even though scheduling in a distributed system was debated for many years, the platforms and the job types are changing everyday. This is why we need special algorithms based on new applications requirements, especially when a application is deployed in a Cloud environment. One of the most important framework used for large-scale data processing in Clouds is Hadoop and its extensions. Hadoop framework comes with default algorithms like FIFO, Fair Scheduler or Capacity Scheduler, and Hadoop on Demand. These scheduling algorithms are focused on a different and single constraint. It is hard to satisfy multiple constraints and to have a lot of objectives in the same time. After summarizing the most common schedulers, showing the need of each one in the moment it appeared on the market, this paper presents MOMC, a multi-objective and multi-constrained scheduling algorithm of many tasks in Hadoop. MOMC implementation focuses on two objectives: avoiding resource contention and having an optimal workload of the cluster, and two constraints: deadline and budget. To compare the algorithms based on different metrics, we use Scheduling Load Simulator, which is integrated in Hadoop framework and helps the developers to spend less time on testing. As killer application that generate many tasks we have chosen processing task for the Million Song Dataset, which is a set of data contains metadata for one million commercially-available songs.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127761780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-input Functional Encryption Based Electronic Voting Scheme","authors":"Yang Chen, You Lin","doi":"10.1109/3PGCIC.2014.32","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.32","url":null,"abstract":"As voting plays an important role in democratic society, both the privacy and verifiability of voting are particularly important in computer-supported voting system. In this paper, we propose a secret voting scheme that based on multi-input functional encryption. Compared with other traditional voting systems, our scheme not only can keep anonymity and receipt freeness while voting proceedings, but also can publicly verify the result of the voting for every voter. In addition, we prove that our scheme can keep secrecy and achieve verifiability by using a multi-input functional encryption.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Cloud Bandwidth Rental and Allocation Strategy","authors":"Hongli Chen, Shanguo Lv","doi":"10.1109/3PGCIC.2014.141","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.141","url":null,"abstract":"The cloud acceleration gives user's high-speed download experience. The factors that affect cloud acceleration rate in the process of user file retrieval are the free download of the target file, the download task start time and the user's network connection type. Based on this discovery, combined cycle system can adjust cloud bandwidth in the period of lease. In this paper, the author proposes a suitable cloud collaboration file sharing system that can achieve cloud bandwidth rental and allocation strategy. The experimental results of the actual operational data show that the system based on the auxiliary nodes and two acceleration feature of cloud collaboration synergy can substantially reduce cloud bandwidth overhead.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129026613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xianglin Wei, Jianhua Fan, Ming Chen, Guomin Zhang
{"title":"A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer Systems","authors":"Xianglin Wei, Jianhua Fan, Ming Chen, Guomin Zhang","doi":"10.1109/3PGCIC.2014.95","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.95","url":null,"abstract":"Constructing an efficient and trustable content delivery community with low cost is the general target for the designers of the Peer-to-Peer (P2P) systems. To achieve this goal, many reputation mechanisms are introduced in recent years to alleviate the blindness during peer selection in distributed P2P environment where malicious peers coexist with honest ones. They indeed provide incentives for peers to contribute more resources to the system, and thus, promote the whole system performance. However, little attention has been paid on how to identify the malicious peers in this situation. In this paper, a general framework is presented for detecting malicious peers in Reputation-based P2P systems. Firstly, the malicious peers are divided into various categories and the problem is formulated. Secondly, the general framework is put forward which mainly contains four steps, i.e. Data collection, data processing, malicious peers detection and malicious peers clustering. Thirdly, an algorithm implementation of this general framework is shown. Finally, the framework's application and its performance evaluation are shown.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128024662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a New EPON Connection Automatic Protection System","authors":"Li-Xia Lei, Yuejin Zhang","doi":"10.1109/3PGCIC.2014.121","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.121","url":null,"abstract":"Automatic protection mechanism designed a new type of connection-oriented Ethernet passive optical networks (EPON), including functional architecture, fault management, and build a network of automatic protection mechanism to test the function of the simulation tests, and the protection of its original programs and compared to overcome known problems, the application of this novel method can provide a fast fiber-optic Ethernet automatic Protection Switching to meet the requirements of the transmission network survivability, has some practical value and application prospect.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122447122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Amato, A. Elia, Alessandro Maisto, A. Mazzeo, Serena Pelosi
{"title":"Automatic Population of Italian Medical Thesauri: A Morphosemantic Approach","authors":"F. Amato, A. Elia, Alessandro Maisto, A. Mazzeo, Serena Pelosi","doi":"10.1109/3PGCIC.2014.89","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.89","url":null,"abstract":"In the age of Semantic Web, one of the most valuable challenges is the one connected with the information extraction from raw data. Information must be managed with sophisticated linguistic and computational architectures, which are able to approach the semantic dimension of words and sentences. In this paper we propose a morphosemantic method for the automatic creation and population of medical lexical resources. Our approach is grounded on a list of neoclassical formative elements pertaining to the medical domain an on a large sized corpus of medical diagnoses. The outcomes of this work are automatically built electronic dictionaries and thesauri and an annotated corpus for the NLP in the medical domain.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124194486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Framework for Application of Cloud Computing in Wireless Mesh Networks","authors":"Ran Li, Qingqing Liu, Mingqiang Wang, Xianglin We","doi":"10.1109/3PGCIC.2014.91","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.91","url":null,"abstract":"Cloud computing is an effective approach for organizing computing resource which can improve service capability of WMNs remarkably. However, some drawbacks of wireless networks exist inherently make the cloud computing in WMNs insecure with various threats. In this paper, a novel hierarchical framework which is more compatible for cloud computing in WMNs is proposed, a completed security architecture and relevant key techniques guarantee service of cloud computing provision.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128725011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong Hu, Kang Liu, Bin Feng, Lijun Su, Xiangzhou Zhang, Weiqi Chen, Yuran Zeng
{"title":"Concept Drift Mining of Fundamental Variables in China Stock Market","authors":"Yong Hu, Kang Liu, Bin Feng, Lijun Su, Xiangzhou Zhang, Weiqi Chen, Yuran Zeng","doi":"10.1109/3PGCIC.2014.37","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.37","url":null,"abstract":"We adopt the classical Fama and French (1992) [E.F. Fama, K.R. French, The Cross-Section of Expected Stock Returns, The Journal of Finance, 47 (1992) 427 - 465.] approach to investigate the effect of Beta, size, leverage, book value to market value (B/P), and earnings to price (E/P) ratio on the average monthly returns in the China Stock Market (CSM) from July 1998 to June 2011. The phenomenon of concept drift was found in this research. Our results indicate that the B/P has a significant negative correlation with the monthly average returns during this period, in contrast to the positive correlation found by a previous study by Wang and Di Iorio (2007) [Y. Wang, A. Di Iorio, The cross section of expected stock returns in the Chinese A-share market, Global Finance Journal, 17 (2007) 335 - 349.] that covered from July 1996 to June 2002. Meanwhile the small-firm effect remains significant. Thus, while the behavioral or institutional factors may account for the counter-intuitive finding of the effect of value in the transitional economy, the relationship between fundamental characteristics and stock returns is more complex in China and warrants more rigorous investigation. Further, we suggest that autonomic and cloud computing system has a number of potential applications in stock market concept drift mining.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116977412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}