2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery最新文献

筛选
英文 中文
SOA-Based Simulation Framework: A Way to Simulation Composability 基于soa的仿真框架:实现仿真可组合性的一种方法
Yang Shi, D. Zhang, M. Xiao, Ming-hua Lu
{"title":"SOA-Based Simulation Framework: A Way to Simulation Composability","authors":"Yang Shi, D. Zhang, M. Xiao, Ming-hua Lu","doi":"10.1109/CyberC.2012.46","DOIUrl":"https://doi.org/10.1109/CyberC.2012.46","url":null,"abstract":"A novel simulation framework based on Service-Oriented Architecture(SOA) is proposed to meet the new requirements for simulation compos ability, this framework is open and is propitious to integration with other systems. A simulation platform is constructed using component-based software engineering to test the feasibility of SOA-based framework, the implementation of simulation service layer and simulation application layer of simulation platform are also expatiated in details. As a case study, a simulation context for warfare simulation is conducted and experiment results shows that this platform provides the capability of simulation compos ability and reuse ability in the level of binary code.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124766507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Delay-minimized Energy-efficient Data Aggregation in Wireless Sensor Networks 无线传感器网络中时延最小化的高能效数据聚合
Huu Nghia Le, V. Zalyubovskiy, Hyunseung Choo
{"title":"Delay-minimized Energy-efficient Data Aggregation in Wireless Sensor Networks","authors":"Huu Nghia Le, V. Zalyubovskiy, Hyunseung Choo","doi":"10.1109/CyberC.2012.73","DOIUrl":"https://doi.org/10.1109/CyberC.2012.73","url":null,"abstract":"Data aggregation is a fundamental problem in wireless sensor networks that has attracted great attention in recent years. To design a data aggregation scheme, delay and energy efficiencies are two crucial issues that require much consideration. In this paper, we propose a distributed, energy-efficient algorithm for collecting data from all sensor nodes with minimum latency called Delay-minimized Energy-efficient Data Aggregation algorithm (DEDA). The DEDA algorithm minimizes data aggregation latency by building a delay-efficient network structure. At the same time, it also considers the distances between network nodes for saving sensor transmission power and network energy. Energy consumption is also well-balanced between sensors to achieve an acceptable network lifetime. The simulation results show that the scheme could significantly decrease data aggregation delay and obtain a reasonable network lifetime compared with other approaches.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127697430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Design and Evaluation of En-LEACH Routing Protocol for Wireless Sensor Network 无线传感器网络En-LEACH路由协议的设计与评价
Suyog Pawar, Prabha Kasliwal
{"title":"Design and Evaluation of En-LEACH Routing Protocol for Wireless Sensor Network","authors":"Suyog Pawar, Prabha Kasliwal","doi":"10.1109/CyberC.2012.89","DOIUrl":"https://doi.org/10.1109/CyberC.2012.89","url":null,"abstract":"A wireless network consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments like civil and military applications. The data collected by each sensor is communicated through the network to a single processing centre called base station that uses all reported data to determine characteristics of the environment or detect an event. Clustering sensors into groups, so that sensors communicate information only to local cluster-heads and then the cluster heads communicate the aggregated information to the processing center, may save a lot of energy. LEACH is clustering based protocol that utilizes randomized rotation of local cluster-heads to evenly distribute the energy load among the sensors in the network. LEACH uses localized coordination to enable scalability and robustness for dynamic networks, and incorporates data fusion into the routing protocol to reduce the amount of information that must be transferred to the base station. But LEACH is based on the assumption that each sensor nodes contain equal amount of energy which is not valid in real scenarios Enhanced LEACH protocol (En-LEACH) has been adaptable to handle non-uniform energy distribution characteristic of a dynamic sensor network.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130205973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making 基于免疫进化和多准则决策的网络生存性评价模型
Wang Chunlei, Fang Lan, Dai Yi-qi, Ming Liang, Miao Qing, Wang Dongxia
{"title":"Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making","authors":"Wang Chunlei, Fang Lan, Dai Yi-qi, Ming Liang, Miao Qing, Wang Dongxia","doi":"10.1109/CYBERC.2012.37","DOIUrl":"https://doi.org/10.1109/CYBERC.2012.37","url":null,"abstract":"Network survivability has the characteristics of complexity, dynamic evolution and uncertainty, which has become one of the most important indicators of evaluating network performance. Network survivability evaluation is a process of confirming the degree to which the network survivability technology and mechanism can defend network threats. Firstly, it needs to extract useful information from the actual system and establish the model, then the model is analyzed and necessary information is extracted. Finally, the survivability characteristics of the network can be measured and evaluated based on the model and extracted information. Current network security research lacks of models and methods which guide network survivability evaluation effectively. In this paper, we firstly describe the elements of network survivability evaluation model and their relationships, then propose a network survivability evaluation model based on evolutionary computation which includes the immune evolutionary algorithm for network survivability metric weight solving and network survivability evaluation method based on multiple criteria decision making. Finally, the correctness and effectiveness of the proposed model is validated through experimental analysis.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117016895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Service Layer and Axioms for User Access to the Cloud by Means of Ontologies 用户通过本体访问云的服务层和公理
Lilliam N. Robinson-Oses, Miguel Vargas-Lombardo
{"title":"Service Layer and Axioms for User Access to the Cloud by Means of Ontologies","authors":"Lilliam N. Robinson-Oses, Miguel Vargas-Lombardo","doi":"10.1109/CyberC.2012.27","DOIUrl":"https://doi.org/10.1109/CyberC.2012.27","url":null,"abstract":"Cloud Computing is a model that habilitates the access to a group of computer services that are offered according to the needs of the users. Also, layers have been developed in order to sectorize and manage the offered services while maintaining the interrelation between the layers by using ontologies. Referring to the above-mentioned, we suggest creating a new layer in cloud computing that enables you to manage user log-ins to applications that are housed in the cloud. User management is developed through ontologies using the axioms that identify the privileges that users have, the axioms are represented in Ontology Web Language (OWL) and Resource Description Framework (RDF).","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126948892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting the Effect of NAND Flash-Memory SSD on Filesystem Design NAND闪存SSD对文件系统设计的影响
Jaechun No, Sung-Soon Park
{"title":"Exploiting the Effect of NAND Flash-Memory SSD on Filesystem Design","authors":"Jaechun No, Sung-Soon Park","doi":"10.1109/CyberC.2012.93","DOIUrl":"https://doi.org/10.1109/CyberC.2012.93","url":null,"abstract":"This paper focuses on I/O optimizations of N-hybrid (New-Form of hybrid), which provides a hybrid file system space constructed on SSD and HDD. Although the promising potentials of SSD, such as the absence of mechanical moving overhead and high random I/O throughput, have drawn a lot of attentions from IT enterprises, its high ratio of cost/capacity makes it less desirable to build a large-scale data storage subsystem composed of only SSDs. In this paper, we present N-hybrid that attempts to integrate the strengths of SSD and HDD, to offer a single, large hybrid file system space. Several experiments were conducted to verify the performance of N-hybrid.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121737020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Electromagnetic Wave Effect on Human Health: Challenges for Developing Countries 电磁波对人类健康的影响:发展中国家面临的挑战
B. Anyaka, U. B. Akuru
{"title":"Electromagnetic Wave Effect on Human Health: Challenges for Developing Countries","authors":"B. Anyaka, U. B. Akuru","doi":"10.1109/CyberC.2012.81","DOIUrl":"https://doi.org/10.1109/CyberC.2012.81","url":null,"abstract":"Several studies abound on electromagnetic field (EMF) radiation and its adverse impact on human health with majority of the conclusions resulting from these studies being positive. To this end, a number of sources have been identified to emit levels of EMF radiation such as power transmission lines, base transmitter stations (BTS), mobile phones and many household appliances, some of which have been classified as extremely low frequency (ELF) non-ionizing radiating devices. The global system of mobile telecommunications (GSM) revolution supports to a large extent the proliferation of mobile phones and random BTS siting in developing countries of which EMF emissions can assume very dangerous dimensions for human health. This study is undertaken to investigate the dilemma posed by wireless telecommunication devices that emit EMF radiations e.g. mobile phones and its transceivers, as against their relevance. Correlations were arrived at concerning their indirect effects on human health, from which possible safety measures were proposed and relevant suggestions made.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115149606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
File Exchange in a Private Cloud Supported by a Trust Model 私有云中信任模型支持的文件交换
E. Canedo, Rafael Timóteo de Sousa Júnior, R. D. O. Albuquerque, Fábio L. L. Mendonça
{"title":"File Exchange in a Private Cloud Supported by a Trust Model","authors":"E. Canedo, Rafael Timóteo de Sousa Júnior, R. D. O. Albuquerque, Fábio L. L. Mendonça","doi":"10.1109/CyberC.2012.23","DOIUrl":"https://doi.org/10.1109/CyberC.2012.23","url":null,"abstract":"Cloud computing is being progressively adopted in different business scenarios in order to obtain flexible and reliable computing environments, with several supporting solutions available in the market. Computing systems trust representation have been widely discussed and applied in a lot of information technology scenarios, becoming subject of scientific researches. This paper proposes the development of a trust model to ensure a reliable files exchange among nodes in a private cloud, as well as the calculation process of trust among them, according to the established metrics. The simulation result using CloudSim framework shows the effectiveness of the model in selecting more reliable node in private cloud.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Core Broking Model for E-Markets 电子市场的核心经纪模型
P. Sun, M. Odetayo, R. Iqbal, Anne E. James
{"title":"A Core Broking Model for E-Markets","authors":"P. Sun, M. Odetayo, R. Iqbal, Anne E. James","doi":"10.1109/CyberC.2012.49","DOIUrl":"https://doi.org/10.1109/CyberC.2012.49","url":null,"abstract":"Coalitions, which allow traders to form teams, can sometimes accomplish tasks more efficiently than individuals. The core has become a popular solution concept in economic applications for researchers in Computer Science, because it provides a way to find stable sets. However, its problems hinder researchers from applying it to a real world market. This paper proposes a new Core Broking Model (CBM), which is based on the core and adopts some other solution concepts to resolve group trading problems in emarkets. It involves bundle selling of composite services from several service providers, offering amount discounts in group buying in the e-marketplace. The CBM successfully creates a win-win-win situation for customers, providers and brokers in e-markets. The comparison between the results of the new model and the core shows that the CBM is superior to the core when applied in e-markets. The results of the simulation presented in this paper demonstrate that the CBM can attract customers and deal with online group trading problems in a large coalition. An extensive evaluation of the CBM has been made and shows that it is effective and efficient.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信