Journal of Advanced Computer Science and Technology最新文献

筛选
英文 中文
A four-phase data replication algorithm for data grid 数据网格的四阶段数据复制算法
Journal of Advanced Computer Science and Technology Pub Date : 2015-04-12 DOI: 10.14419/JACST.V4I1.4009
Ali Saleh, R. Javidan, Mohammad Taghi FatehiKhajeh
{"title":"A four-phase data replication algorithm for data grid","authors":"Ali Saleh, R. Javidan, Mohammad Taghi FatehiKhajeh","doi":"10.14419/JACST.V4I1.4009","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4009","url":null,"abstract":"Nowadays, scientific applications generate a huge amount of data in terabytes or petabytes. Data grids currently proposed solutions to large scale data management problems including efficient file transfer and replication. Data is typically replicated in a Data Grid to improve the job response time and data availability. A reasonable number and right locations for replicas has become a challenge in the Data Grid. In this paper, a four-phase dynamic data replication algorithm based on Temporal and Geographical locality is proposed. It includes: 1) evaluating and identifying the popular data and triggering a replication operation when the popularity data passes a dynamic threshold; 2) analyzing and modeling the relationship between system availability and the number of replicas, and calculating a suitable number of new replicas; 3) evaluating and identifying the popular data in each site, and placing replicas among them; 4) removing files with least cost of average access time when encountering insufficient space for replication. The algorithm was tested using a grid simulator, OptorSim developed by European Data Grid Projects. The simulation results show that the proposed algorithm has better performance in comparison with other algorithms in terms of job execution time, effective network usage and percentage of storage filled.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129189820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using the interestingness measure lift to generate association rules 利用兴趣度度量lift生成关联规则
Journal of Advanced Computer Science and Technology Pub Date : 2015-04-06 DOI: 10.14419/JACST.V4I1.4398
Nada Hussein, A. Alashqur, Bilal I. Sowan
{"title":"Using the interestingness measure lift to generate association rules","authors":"Nada Hussein, A. Alashqur, Bilal I. Sowan","doi":"10.14419/JACST.V4I1.4398","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4398","url":null,"abstract":"In this digital age, organizations have to deal with huge amounts of data, sometimes called Big Data. In recent years, the volume of data has increased substantially. Consequently, finding efficient and automated techniques for discovering useful patterns and relationships in the data becomes very important. In data mining, patterns and relationships can be represented in the form of association rules. Current techniques for discovering association rules rely on measures such as support for finding frequent patterns and confidence for finding association rules. A shortcoming of confidence is that it does not capture the correlation that exists between the left-hand side (LHS) and the right-hand side (RHS) of an association rule. On the other hand, the interestingness measure lift captures such as correlation in the sense that it tells us whether the LHS influences the RHS positively or negatively. Therefore, using Lift instead of confidence as a criteria for discovering association rules can be more effective. It also gives the user more choices in determining the kind of association rules to be discovered. This in turn helps to narrow down the search space and consequently, improves performance. In this paper, we describe a new approach for discovering association rules that is based on Lift and not based on confidence.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129555000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
New method for rapid diagnosis of Hepatitis disease based on reduction feature and machine learning 基于约简特征和机器学习的肝炎快速诊断新方法
Journal of Advanced Computer Science and Technology Pub Date : 2015-03-31 DOI: 10.14419/JACST.V4I1.4353
Nahid Khorashadizade, H. Rezaei
{"title":"New method for rapid diagnosis of Hepatitis disease based on reduction feature and machine learning","authors":"Nahid Khorashadizade, H. Rezaei","doi":"10.14419/JACST.V4I1.4353","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4353","url":null,"abstract":"Hepatitis disease is caused by liver injury. Rapid diagnosis of this disease prevents its development and suffering to cirrhosis of the liver. Data mining is a new branch of science that helps physicians for proper decision making. In data mining using reduction feature and machine learning algorithms are useful for reducing the complexity of the problem and method of disease diagnosis, respectively. In this study, a new algorithm is proposed for hepatitis diagnosis according to Principal Component Analysis (PCA) and Error Minimized Extreme Learning Machine (EMELM). The algorithm includes two stages; in reduction feature phase, missing records were deleted and hepatitis dataset was normalized in [0,1] range. Thereafter, analysis of the principal component was applied for reduction feature. In classification phase, the reduced dataset is classified using EMELM. For evaluation of the algorithm, hepatitis disease dataset from UCI Machine Learning Repository (University of California) was selected. The features of this dataset reduced from 19 to 6 using PCA and the accuracy of the reduced dataset was obtained using EMELM. The results revealed that the proposed hybrid intelligent diagnosis system reached the higher classification accuracy and shorter time compared with other methods.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129430210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data integration of cost materials needs through a service oriented architecture (study case: pt x garment ungaran) 通过面向服务的体系结构对成本材料需求进行数据集成(研究案例:pt x garment ungaran)
Journal of Advanced Computer Science and Technology Pub Date : 2015-03-18 DOI: 10.14419/JACST.V4I1.4309
Erwien Christianto, W. H. Utomo, Wiwin Sulistyo
{"title":"Data integration of cost materials needs through a service oriented architecture (study case: pt x garment ungaran)","authors":"Erwien Christianto, W. H. Utomo, Wiwin Sulistyo","doi":"10.14419/JACST.V4I1.4309","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4309","url":null,"abstract":"Data processing is an important part of a garment company. With increasingly complex and developing a garment company, data processing and integration became a very important requirement. The need for data integration in determining the cost of materials becomes a very important part in the garment industry. Data distribution or dissemination from one to another section gives results in data duplication, so that it may cause the data to be inconsistent. In addition, the efficiency of the process in determining the cost of materials is highly needed to achieve the selling price determination target. Nowadays, there is web-based technology, which is capable of handle data integration service, called SOA (Service Oriented Architecture). Business processes (work flows) involving the supplier need to go back to the supplier with the output price that has been determined by the system, can be integrated with Web service with concentration of BPELSOA. By utilizing the SOA technology then data processing and integration problems that occurred in the garment industry could be made into an integrated information system, so that the problems in the garment industry can be solved.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"76 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121200030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel authentication and access control framework in wireless sensor networks 一种新的无线传感器网络认证和访问控制框架
Journal of Advanced Computer Science and Technology Pub Date : 2015-03-09 DOI: 10.14419/JACST.V4I1.4307
Babak Nouri-Moghaddam, H. Naji
{"title":"A novel authentication and access control framework in wireless sensor networks","authors":"Babak Nouri-Moghaddam, H. Naji","doi":"10.14419/JACST.V4I1.4307","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4307","url":null,"abstract":"Wireless Sensor Networking continues to evolve as one of the most challenging research areas. Considering the insecure nature of these networks and the fact that sensor nodes are distributed in a hostile environment, having a well-implemented security scheme is absolutely essential. Bearing in mind the important security services like authentication and access control, we have proposed a novel security framework for these networks. The new framework is based on Kerberos authentication and access control system. The Kerberos has been adopted for WSNs by utilizing Bloom Filter data structure and Elliptic Curve cryptography. In the proposed scheme, Bloom Filter data structure is used in a novel way; we have used this data structure to get rid of Public Key’s certificates. By combining Bloom Filter data structure and Elliptic Curve cryptography, we achieved a very light robust security framework that offers Authentication, Access Control, and key sharing services. The analysis results showed that our scheme provides more security services and is more robust in the presence of attacks compared to the previous schemes. In contrast, simulation results indicated that our system had significant improvements over the other schemes in many aspects such as power and time expenditure.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126632390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategies for enhancing the accuracy and security in ad hoc networks 提高自组织网络的准确性和安全性的策略
Journal of Advanced Computer Science and Technology Pub Date : 2015-03-04 DOI: 10.14419/JACST.V4I1.4156
Behnam Rahmani Delijani, H. Tavakoli
{"title":"Strategies for enhancing the accuracy and security in ad hoc networks","authors":"Behnam Rahmani Delijani, H. Tavakoli","doi":"10.14419/JACST.V4I1.4156","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4156","url":null,"abstract":"Ad Hoc networks are a type of mobile wireless networks composed of mobile and stationary nodes which are moving freely and independently or they are stable. Setting up Ad Hoc networks is very simple and as these networks do not need a standard fixed infrastructure and central legal license, their setting up cost is very low. So, in specials, temporary or short-term situations such as flood, earthquake and fire as well as in military environments where all telecommunication platforms are destroyed, these networks are used as a new solution for creating communications between network elements. As Ad Hoc networks have a limited energy and nodes are continuously displacing, consequently, the accuracy of these networks is important. Nodes can be easily added to the network at any time or leave the network. It not only leads to easy creation of a network and its fast, easy and low-cost expansion, but also makes it possible for an enemy to enter the network. Therefore, the security of these networks must also be considered. In this paper, using a new method and imposing limitations on some network nodes, we created a more reliable network with higher accuracy and security.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128963799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An evaluation of business models in e-mobile payment by using multiple criteria decision making 基于多准则决策的电子移动支付商业模式评价
Journal of Advanced Computer Science and Technology Pub Date : 2015-02-28 DOI: 10.14419/JACST.V4I1.4149
Abdolghader Pourali, Elham Hashempour
{"title":"An evaluation of business models in e-mobile payment by using multiple criteria decision making","authors":"Abdolghader Pourali, Elham Hashempour","doi":"10.14419/JACST.V4I1.4149","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4149","url":null,"abstract":"Due to the significant growth in the usage of cell phone by customers and its availability, this tool can be considered such the best tool. For e-payment for implementing the mobile payment service, other objects and players should be considered such as banks, operators, service providers and the used technology as the effective interaction role. In addition, for effective optimization of parameters for implementing the mobile payment solution a proper model of business should be used. First of all, in this experiment, different business models in the field of mobile payment and the role of each stakeholder in these models and their positive and negative points are discussed. Moreover, by using method of Multiple Criteria Decision Making, four famous business models of the world are evaluated and the result of this evaluation highlights that the cooperation model is the most Appropriate Model in terms of mobile payment methods.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133773877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cluster based approach for wormhole attack detection in wireless sensor networks 基于聚类的无线传感器网络虫洞攻击检测方法
Journal of Advanced Computer Science and Technology Pub Date : 2015-02-27 DOI: 10.14419/JACST.V4I1.4100
M. Shahryari, H. Naji
{"title":"A cluster based approach for wormhole attack detection in wireless sensor networks","authors":"M. Shahryari, H. Naji","doi":"10.14419/JACST.V4I1.4100","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4100","url":null,"abstract":"Due to the need of cooperation among nodes to relay packets, wireless sensor networks are very vulnerable to attacks in all layers of the network. One of these severe attacks is the wormhole attack. Detection of wormhole attack is hard, because it can be easily implemented by attacker without having knowledge of nodes in the network or it can be compromised by any legal node in the network. To date, the most of proposed protocols to defend against wormhole attacks are made by adopting synchronized clocks, directional antennas or strong assumptions in order to detect wormhole attacks. A method based on clustering is presented in this paper to detect this type of attacks. This method is implemented in static and mobile networks. The superiority of our protocol is that during the attack prevention or attack detection, the malicious nodes are detected and requires no additional hardware or complex calculations. Simulation results are perused with the NS-2 simulator and the protocol has been evaluated in terms of packet drop ratio, throughput, delay and energy consumption compared to a network without or under attack. Simulation results show that our protocol is practical and effective in improving resilience against wormhole attacks.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114873572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A NEW METHOD FOR COMBINING THE CHANNEL CODING WITH POLAR CODING-BASED ENCRYPTION 一种信道编码与基于极性编码的加密相结合的新方法
Journal of Advanced Computer Science and Technology Pub Date : 2015-02-25 DOI: 10.14419/JACST.V4I1.4163
Mohammad Kenarkouhi, H. Tavakoli
{"title":"A NEW METHOD FOR COMBINING THE CHANNEL CODING WITH POLAR CODING-BASED ENCRYPTION","authors":"Mohammad Kenarkouhi, H. Tavakoli","doi":"10.14419/JACST.V4I1.4163","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4163","url":null,"abstract":"In this paper, polar codes recently presented by Arikan are introduced. Polar codes have a number of channels with high capacity where information is located. In addition, these codes are composed of a number of channels with low capacity called frozen bits. In the first proposed design, we optimally use frozen and useless bits of the polar code and insert the encryption key on all the bits of the design (information bits and frozen bits). In fact, in Arkian’s proposed 8-bit design, we use 8 encryption keys. Then, in the rest of the article, a method is presented through which the number of encryption keys applied can be reduced. Because, the encryption system is effective and desired in which in addition to the high complexity and the lack of correlation between bits, the minimum number of encryption keys are used.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115371387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Forecasting about EURJPY exchange rate using hidden Markova model and CART classification algorithm 使用隐马尔可娃模型和CART分类算法对欧元日元汇率进行预测
Journal of Advanced Computer Science and Technology Pub Date : 2015-02-22 DOI: 10.14419/JACST.V4I1.4194
A. Haeri, S. M. Hatefi, K. Rezaie
{"title":"Forecasting about EURJPY exchange rate using hidden Markova model and CART classification algorithm","authors":"A. Haeri, S. M. Hatefi, K. Rezaie","doi":"10.14419/JACST.V4I1.4194","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4194","url":null,"abstract":"The goal of this paper is forecasting direction (increase or decrease) of EURJPY exchange rate in a day. For this purpose five major indicators are used. The indicators are exponential moving average (EMA), stochastic oscillator (KD), moving average convergence divergence (MACD), relative strength index (RSI) and Williams %R (WMS %R). Then a hybrid approach using hidden Markov models and CART classification algorithms is developed. Proposed approach is used for forecasting direcation (increase or decrease) of Euro-Yen exchange rates in a day. Also the approach is used for forecasting differnece between intial and maximum exchange rates in a day. As well as it is used for forecasting differnece between intial and minimum exchange rates in a day. Reslut of proposed method is compared with CART and neural network. Comparison shows that the forecasting with proposed method has higher accuracy.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"93 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126228313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信