... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security最新文献

筛选
英文 中文
Analysis and Simulink Modeling of the Performance of Dynamic Web Server Using JSP and PHP 基于JSP和PHP的动态Web服务器性能分析与Simulink建模
Fontaine Rafamantanantsoa, Paulson Ravomampiandra
{"title":"Analysis and Simulink Modeling of the Performance of Dynamic Web Server Using JSP and PHP","authors":"Fontaine Rafamantanantsoa, Paulson Ravomampiandra","doi":"10.4236/CN.2018.104016","DOIUrl":"https://doi.org/10.4236/CN.2018.104016","url":null,"abstract":"In recent years, web technology carried on growing and at same time, the number of internet users increased significantly in number. Today, a Web server is capable of processing millions of requests per day, but during the peak period may collapse and becomes critical causing unavailability of the services offered by the servers. That is why Web server performance is a topic of great interest to many researchers. In this paper, we evaluate experimentally the impact of JSP and PHP dynamic content technology: JSP and PHP with access to a database of performance data of Apache Web server. Using the “ApacheBench” performance measurement tool, the approach is to compare the performances of four different configurations of a Web server, such as: Apache Web server implementing JSP technology with access to PostgreSQL database, Apache using PHP technology with the PostgreSQL as database, Apache Web server using the JSP technology with access to MySQL database, finally Apache and PHP with DBMS MySQL. At the end of this article, we also present a Simulink model of Web server performance based on the simple M/M/1 queue. During the modeling, the MATLAB software was used.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"56 1","pages":"196-210"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90317153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latency Aware and Service Delay with Task Scheduling in Mobile Edge Computing 基于任务调度的移动边缘计算延迟感知和服务延迟
Dileep Kumar Sajnani, Abdul Rasheed Mahesar, A. Lakhan, Irfan Ali Jamali
{"title":"Latency Aware and Service Delay with Task Scheduling in Mobile Edge Computing","authors":"Dileep Kumar Sajnani, Abdul Rasheed Mahesar, A. Lakhan, Irfan Ali Jamali","doi":"10.4236/CN.2018.104011","DOIUrl":"https://doi.org/10.4236/CN.2018.104011","url":null,"abstract":"In a traditional Mobile Cloud Computing (MCC), a stream of data produced by mobile users (MUs) is uploaded to the remote cloud for additional processing throughout the Internet. Though, due to long WAN distance it causes high End to End latency. With the intention of minimize the average response time and key constrained Service Delay (network and cloudlet Delay) for mobile users (MUs), offload their workloads to the geographically distributed cloudlets network, we propose the Multi-layer Latency Aware Workload Assignment Strategy (MLAWAS) to allocate MUs workloads into optimal cloudlets, Simulation results demonstrate that MLAWAS earns the minimum average response time as compared with two other existing strategies.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"33 1","pages":"127-141"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87261539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Modelling Conceptual Framework for Private Cloud Infrastructure Deployment in the ICT Centre of Tertiary Institutions 专上院校资讯及通讯科技中心部署私人云基础设施的概念架构建模
E. Ekwonwune, Chukwuma D. Anyiam, O. Osuagwu
{"title":"Modelling Conceptual Framework for Private Cloud Infrastructure Deployment in the ICT Centre of Tertiary Institutions","authors":"E. Ekwonwune, Chukwuma D. Anyiam, O. Osuagwu","doi":"10.4236/CN.2018.103010","DOIUrl":"https://doi.org/10.4236/CN.2018.103010","url":null,"abstract":"This research work aims at modelling a framework for Private Cloud infrastructure Deployment for Information and Communication Technology Centres (ICTs) in tertiary institutions in Nigeria. Recent researches have indicated that cloud computing will become the mainstream in computing technology and very effective for businesses. All Tertiary Institutions have ICT units, and are generally charged with the responsibilities of deploying ICT infrastructure and services for administration, teaching, research and learning in higher institution at large. The Structured System Analysis and Design Methodology (SSADM) is used in this research and a six-step framework for a cost effective and scalable Private cloud infrastructure using server virtualization is presented as an alternative that can guarantee total and independent control of data flow in the institutions, while ensuring adequate security of vital information.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"11 1","pages":"117-125"},"PeriodicalIF":0.0,"publicationDate":"2018-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91248307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Parameter Optimization in Collaborative Filtering Algorithm 协同过滤算法参数优化研究
Zijiang Zhu
{"title":"Research on Parameter Optimization in Collaborative Filtering Algorithm","authors":"Zijiang Zhu","doi":"10.4236/cn.2018.103009","DOIUrl":"https://doi.org/10.4236/cn.2018.103009","url":null,"abstract":"Collaborative filtering algorithm is the most widely used and recommended algorithm in major e-commerce recommendation systems nowadays. Concerning the problems such as poor adaptability and cold start of traditional collaborative filtering algorithms, this paper is going to come up with improvements and construct a hybrid collaborative filtering algorithm model which will possess excellent scalability. Meanwhile, this paper will also optimize the process based on the parameter selection of genetic algorithm and demonstrate its pseudocode reference so as to provide new ideas and methods for the study of parameter combination optimization in hybrid collaborative filtering algorithm.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"123 1","pages":"105-116"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80356560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benchmarking the Robustness of Cellular Up-Links in Automatic Weather Station Networks 自动气象站网络中蜂窝上行链路鲁棒性的基准测试
Emmanuel Kondela, A. Nungu, J. W. Matiko, J. S. Otim, B. Pehrson
{"title":"Benchmarking the Robustness of Cellular Up-Links in Automatic Weather Station Networks","authors":"Emmanuel Kondela, A. Nungu, J. W. Matiko, J. S. Otim, B. Pehrson","doi":"10.4236/CN.2018.103007","DOIUrl":"https://doi.org/10.4236/CN.2018.103007","url":null,"abstract":"We present a problem for benchmarking the robustness of cellular up-links, in an automatic weather station (AWS) testbed. Based on the problem, we conduct a small-scale measurement study of robustness, where the AWS is equipped with four (4) cellular modems for weather data delivery. The effectiveness of up-links is challenging because of overlapping spatial-temporal factors such as the presence of good reflectors that lead to multi-path effects, interference, network load or other reasons. We argue that, there is a strong need for independent assessments of their robustness, to perform end-to-end network measurement. However, it is yet difficult to go from a particular measurement to an assessment of the entire network. We extensively measure the variability of Radio Signal Strength (RSSI) as link metric on the cellular modems. The RSSI is one of the important link metrics that can determine the robustness of received RF signals, and explore how they differed from one another at a particular location and instant time. We also apply the statistical analysis that quantifies the level of stability by considering the robustness, referring short-term variation, and determines good up-link in comparison to weak one. The results show that the robustness of cellular up-links exists for an unpredictable period of time and lower than one could hope. More than 50% of up-links are intermittent. Therefore, we plan to extend our work by exploring RSSI thresholds, to develop a classification scheme supporting a decision whether a link is either intermittent or not. This will help in normalizing the level of stability, to design the RSSI estimation metric for the robust routing protocol in weather data networks.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"95 1","pages":"78-92"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90546377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coarse Graining Method Based on Noded Similarity in Complex Network 复杂网络中基于节点相似度的粗粒度方法
Yingying Wang, Zhen Jia, Lang Zeng
{"title":"Coarse Graining Method Based on Noded Similarity in Complex Network","authors":"Yingying Wang, Zhen Jia, Lang Zeng","doi":"10.4236/cn.2018.103005","DOIUrl":"https://doi.org/10.4236/cn.2018.103005","url":null,"abstract":"Coarse graining of complex networks is an important method to study large-scale complex networks, and is also in the focus of network science today. This paper tries to develop a new coarse-graining method for complex networks, which is based on the node similarity index. From the information structure of the network node similarity, the coarse-grained network is extracted by defining the local similarity and the global similarity index of nodes. A large number of simulation experiments show that the proposed method can effectively reduce the size of the network, while maintaining some statistical properties of the original network to some extent. Moreover, the proposed method has low computational complexity and allows people to freely choose the size of the reduced networks.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"1 1","pages":"51-64"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72516173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ICT Devices: Vital Tools for Enhancing Road Traffic Monitoring 信息通信技术设备:加强道路交通监测的重要工具
E. Ekwonwune, Nwachukwu Catherine Ada Ngozi, O. O. Eberechi
{"title":"ICT Devices: Vital Tools for Enhancing Road Traffic Monitoring","authors":"E. Ekwonwune, Nwachukwu Catherine Ada Ngozi, O. O. Eberechi","doi":"10.4236/CN.2018.103004","DOIUrl":"https://doi.org/10.4236/CN.2018.103004","url":null,"abstract":"Road Traffic monitoring involves the collection of data describing the characteristic of vehicles and their movement through road networks. Such data may be used for one of these purposes such as law enforcement, congestion and incident detection and increasing road capacity. Transportation is a requirement for every nation regardless of its economy, political stability, population size and technological development. Movement of goods and people from one place to another is crucial to maintain strong economic and political ties between the various components of any given nation among nations. However, there are different modes of transportation and the most paramount one to human beings is road transportation. Due to increase in the modes of transportation, road users encounter different problems such as road blockage and incidents. Therefore there is need to monitor users incidents and to know the causes. Road traffic monitoring can be done manually or using ICT devices. This paper focuses on how the use of ICT devices can enhance road traffic monitoring. It traces the brief history of transportation; it equally discussed road traffic and safety, tools for monitoring road traffic, Intelligent Transportation Systems (ITS) use for traffic monitoring and their benefits. The result shows that the use of ICT devices in road traffic monitoring should be a Millennium Goal for all developed and developing countries because of its numerous advantages in the reduction of the intensity of traffic and other road incidents.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"47 1 1","pages":"43-50"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77775299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Influence of Topological Properties of Complex Networks on the Effect of Spectral Coarse-Grained Network 复杂网络拓扑特性对谱粗粒度网络效果的影响
Lang Zeng, Zhen Jia, Yingying Wang
{"title":"Influence of Topological Properties of Complex Networks on the Effect of Spectral Coarse-Grained Network","authors":"Lang Zeng, Zhen Jia, Yingying Wang","doi":"10.4236/CN.2018.103008","DOIUrl":"https://doi.org/10.4236/CN.2018.103008","url":null,"abstract":"Recently, some coarse-graining methods based on network synchronization have been proposed to reduce the network size while preserving the synchronizability of the original network. In this paper, we investigate the effects of the coarse graining process on synchronizability over complex networks under different average path lengths and different degrees of distribution. A large amount of experiments demonstrate a close correlation between the average path length, the heterogeneity of the degree distribution and the ability of spectral coarse-grained scheme in preserving the network synchronizability. We find that synchronizability can be well preserved in spectral coarse-grained networks when the considered networks have a longer average path length or a larger degree of variance.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"37 1","pages":"93-104"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79166967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Heuristic Topology Generation Algorithm in Multi-Domain Optical Networks 多域光网络中启发式拓扑生成算法的设计
Lei Wang, Hua Feng, Li Lin, Li Du
{"title":"Design of a Heuristic Topology Generation Algorithm in Multi-Domain Optical Networks","authors":"Lei Wang, Hua Feng, Li Lin, Li Du","doi":"10.4236/CN.2018.103006","DOIUrl":"https://doi.org/10.4236/CN.2018.103006","url":null,"abstract":"Designing an excellent original topology not only improves the accuracy of routing, but also improves the restoring rate of failure. In this paper, we propose a new heuristic topology generation algorithm—GA-PODCC (Genetic Algorithm based on the Pareoto Optimality of Delay, Configuration and Consumption), which utilizes a genetic algorithm to optimize the link delay and resource configuration/consumption. The novelty lies in designing the two stages of genetic operation: The first stage is to pick the best population by means of the crossover, mutation, and selection operation; The second stage is to select an excellent individual from the best population. The simulation results show that, using the same number of nodes, GA-PODCC algorithm improves the balance of all the three optimization objectives, maintaining a low level of distortion in topology aggregation.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"130 1","pages":"65-77"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87679517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Mathematical Model for Managing the Distribution of Information Flows for MPLS-TE Networks under Critical Conditions 关键条件下MPLS-TE网络信息流分布管理的数学模型
Hani H. Attar, Mohammad Alhihi, Mohammad Samour, A. Solyman, Shmatkov Sergiy Igorovich, Kuchuk Nina Georgievna, Fawaz Khalil
{"title":"A Mathematical Model for Managing the Distribution of Information Flows for MPLS-TE Networks under Critical Conditions","authors":"Hani H. Attar, Mohammad Alhihi, Mohammad Samour, A. Solyman, Shmatkov Sergiy Igorovich, Kuchuk Nina Georgievna, Fawaz Khalil","doi":"10.4236/CN.2018.102003","DOIUrl":"https://doi.org/10.4236/CN.2018.102003","url":null,"abstract":"The optimal load distribution over a set of independent paths for Multi-Protocol Label Switching for Traffic Engineering (MPLS-TE) networks is regarded as important issue; accordingly, this paper has developed a mathematical method of optimal procedures for choosing the shortest path. As a criterion for choosing the number of paths, a composite criterion is used that takes into account several parameters such as total path capacity and maximum path delay. The mathematical analysis of using the developed method is carried out, and the simulation results show that there are a limited number of the most significant routes that can maximize the composite quality of service indicator, which depends on the network connectivity and the amount of the traffic. The developed technological proposals allow increasing the utilization factor of the network by 20%.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"42 1","pages":"31-42"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76480989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信