Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on

Date 20-23 April 2010

Filter Results

Displaying Results 1 - 25 of 190
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (410 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (86 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (138 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (197 KB)  
    Freely Available from IEEE
  • Message from AINA 2010 General Chairs

    Publication Year: 2010 , Page(s): xix - xx
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from AINA 2010 Program Chairs

    Publication Year: 2010 , Page(s): xxi
    Save to Project icon | Request Permissions | PDF file iconPDF (118 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • AINA 2010 Organization Committee

    Publication Year: 2010 , Page(s): xxii - xxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • AINA 2010 PC Members/Reviewer List

    Publication Year: 2010 , Page(s): xxiv - xxxiv
    Save to Project icon | Request Permissions | PDF file iconPDF (147 KB)  
    Freely Available from IEEE
  • The Crucial Role of Information Communication Technology in Western Australia

    Publication Year: 2010 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (84 KB) |  | HTML iconHTML  

    Western Australia relies heavily on information communication technology to underpin the resources sector, from exploration to mining, refining and restoration. Continual sophisticated monitoring is also required to monitor ocean currents, as predictors of our climate and longer term monitoring of climate change. Protection of our unique biodiversity requires close observation of the environment, with data bases to record location of species and events such as movements of migratory species, of introduced predators and of fire events. Information communication technology will also be crucial to the success of the extensive radio-astronomy research program being undertaken in Western Australia, associated with Australia's bid to host the Square Kilometre Array, a project to build the largest network of radio-telescopes in the world. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Integration at Scale: From Relational Data Integration to Information Ecosystems

    Publication Year: 2010 , Page(s): 2 - 3
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (100 KB)  

    Our world is increasingly data-driven. The growth and value of data continue to exceed all predictions. Potential for business opportunity, economic growth, scientific discovery, and even national security lie hidden in the vast and growing data collections distributed across our Digital Universe. Harvesting the value of data requires finding, integrating, and analyzing data distributed across our Digital Universe. Failing to integrate data could be as mild as losing business through a lack of an integrated view of relevant business opportunities and threats or as serious as not anticipating the most serious terrorist attack on America through an inability to integrate relevant information distributed across 17 US intelligence agencies and 28 intelligence databases. Due to data being distributed across both entities and data repositories, data integration has become perhaps the most important data operation but certainly the most costly accounting for up to 40% of data processing budgets. Data integration requirements are growing dramatically due to astounding growth in semantics (i.e., increasingly sophisticated application and data modeling requirements) and scale (i.e., web-scale data and transaction types, volumes, and distribution). Since the mid-1980's the Relational Data Model has been the bedrock of business data processing providing a simple, elegant, and powerful basis for storing, finding, and integrating data based on simplifying assumptions. First, business data is naturally tabular; second, tabular business data follows relational principles; and third, assuming that there is a single source of truth, data views can be integrated into a single view under a global schema and that views of the same information are mutually consistent. To the extent that application data and operations fit naturally and meaningfully into the relational model and follow the three assumptions, Relational Database Management Systems (RDBMSs) provide the most efficient and c- - ost effective data integration solution on the planet and will continue to do so through hardware and engineering advances. As semantic and scale requirements of business data grew in the 1990's relational integration had to be extended ideally internal to the relational database engine, otherwise externally in data integration tools. This led to a plethora of data integration tools and supporting infrastructures with sales exceeding $3.3 billion in 2009 with an expected annual grow rate of 8%. These integration solutions are typically less efficient than relational integration and considerably more costly to acquire and more complex to deploy, yet respond to genuine, if esoteric, data integration requirements. While relational integration in RDBMSs augmented by integration tools meet the requirements of many large-scale applications, they are increasingly less applicable to a growing class of very-large-scale Information Ecosystems that can involve thousands of information systems and databases. Most Fortune 500 companies have ten or more major organizations Corporate Management, Sales, Marketing, Engineering, Product Development, etc. each requiring it's own view of the enterprise from it's unique perspective. Such views are often derived (i.e., integrated) from 5,000-10,000 databases. The Information Ecosystem is the information systems, databases, workflows, people, and infrastructure required to build, maintain, and dynamically update (i.e., integrate) the myriad organizational views. While the relational model and some combination of the three simplifying assumptions may apply to each component information system or database, the Information Ecosystem does not. While an individual information system may be designed to simplify the semantics of the real world application that it represents, the complexity of the real world or of the interactions between 1,000's of information systems cannot be as readily simplified. That is, relational integration and int View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Network Based Software

    Publication Year: 2010 , Page(s): 4 - 10
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (395 KB) |  | HTML iconHTML  

    With the increase of Internet bandwidth the World Wide Web is changing the approach for software development. Traditionally, most of the software was developed for one particular platform such as DOS, Windows, Mac, Unix or Linux and it was not portable from one system to another. Usually the user interface is system dependent and it has to be developed individually for every system. It is, however, possible to standardize web browsers to use interface and such interface can be moved easily from one platform to another. At the same time the software can run on the same computer or run remotely on a network computer. Interestingly, such software is very portable and can be easily recompiled on various systems. Several examples of such network based software were developed in order to test the concept such as: SIP - Spice Internet Package which let users to run the unlimited version of SPICE program over internet, ICP - Internet Compilers Package where many compilers were implemented for various computer languages such as C, C++, Fortran, Pascal and JAVA; and Neural network simulation tool running over the network are demonstrated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Photonics Based Intelligent Airport Surveillance and Tracking System

    Publication Year: 2010 , Page(s): 11 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (589 KB) |  | HTML iconHTML  

    Airport terminals will increasingly require ubiquitous communications systems with high levels of computational power to provide the necessary intelligent automation to provide high quality services to passengers, stringent levels of safety and security that is as unobtrusive as possible, efficient processing of commercial goods and luggage, high quality information systems, airport transportation systems and appropriate support for in-house commercial ventures. These requirements will involve both fixed and mobile appliances, and hence an intelligent, adaptive, self-organizing and self-managing wired and wireless infrastructure will become an essential asset. This paper describes how The INtelligent Airport (TINA) project is therefore seeking to develop a new seamless wireless/wired ubiquitous infrastructure able to meet the above requirements. It will concentrate on how a passive RFID, using a radio over fiber-fed distributed antenna system can be used to provide location and tracking information on tagged assets over a wide area. By using the distributed antenna system, it is possible to suppress fading and nulls of the narrowband RFID channel and this allows the accuracy of RFID reads to be greatly improved and the area over which they can be read to be greatly increased. It also allows the use of the received signal strength indicator (RSSI) to provide a good measure of tag position. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next Decade of Social, Economical and Ethical Challenges Perspectives of a Networked World

    Publication Year: 2010 , Page(s): 17 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (98 KB) |  | HTML iconHTML  

    In his seminal book "The New Asian Hemisphere - The irreversible shift of global power to the East" Kishore Mahbubani, the famous Singaporean diplomat and professor at the National University of Singapore gave an in-depth analysis about the changes which are implied by the use of mobile phones in developing countries. Three of his examples should illustrate this: (1) "The Bangladesh economy has gone up because of mobile phones by 2 percent. That surpasses the money given to Bangladesh through aid" , (2) "For less than one penny per minute the world cheapest cell phone call ratesIndian farmers in remote areas can check prices for their produce. They also track global trends using cell phones-based Internet services that show the price of pumpkins and bananas in London and Chicago." and as a third example (3) "Indian farmers use camera phones to snap pictures of crop pests, then send the photos by cell phone to biologists who can identify the bug" . He cited also the famous Indian born business professor C.K. Prahalad at the University of Michigan that one element of poverty is the lack of information and that cell phones give s poor people as much information as the middleman. For many fishermen in India who work off India's 4,350 miles of coastline monthly income has been tripled to average 150 US-Dollars since 2000 when cell phones began booming in India. The dealers are now forced to give more money because of competition. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Socio-Natural Thought Semantic Link Network: A Method of Semantic Networking in the Cyber Physical Society

    Publication Year: 2010 , Page(s): 19 - 26
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (203 KB) |  | HTML iconHTML  

    Humans have been recognizing, establishing and making use of various relations consciously and unconsciously since the formation of human society. Waving and maintaining various relations accompany everyone's life. Humans' social behaviors create or emphasize relations. Various networks evolve with the development of society. Some relational networks gradually become independent of individuals' life during evolution so that they become a part of knowledge and culture sharable cross generations. The study of social relations trace back to the age of Laozi (576-BC), Confucius (551-479 BC), Thales (624 BC-546 BC) and Socrates (469 BC-399 BC). The formal definition of general relation traces to the invention of set theory in 1874. Humans have intelligence to observe and participate in social processes, to think, and to know the effect of establishing a relation. Humans can also actively select appropriate relations and persons according to requirement, situation and social rules. Machines are obviously limited in these abilities. Various graph-based models have been used to connect resources in the cyber space. Two issues are fundamental: (1) machines know little relation in human society and the nature, data structures in machines are for machines to process not for humans to read, so it is not realistic to expect machines to discover social and natural laws and resolve relevant issues without human instruction; and, (2) machines are hard to know the effect of establishing and making use of relations, and to explain computing result according to society and nature. The cause is that machines do not have any worldview. Connecting various networks and machines with nature, society, and even human minds can create a new world where individuals have semantic images that can enhance mutual understanding. The semantic images can be constructed by a Semantic Link Network SLN consisting of nodes with rich semantics, semantic links between nodes, and rules for reasoning, inf- - luencing and evolving the network. Waving semantic link networks in the cyber physical society and exploring the laws of semantic networking are challenge issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Computing: Issues and Challenges

    Publication Year: 2010 , Page(s): 27 - 33
    Cited by:  Papers (69)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (198 KB) |  | HTML iconHTML  

    Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, we aim to pinpoint the challenges and issues of Cloud computing. We first discuss two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing. We then identify several challenges from the Cloud computing adoption perspective. Last, we will highlight the Cloud interoperability issue that deserves substantial further research and development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accountability Computing for E-society

    Publication Year: 2010 , Page(s): 34 - 41
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (693 KB) |  | HTML iconHTML  

    In the business context, accountability has become a major concern for businesses around the world in aftermath of corporate scandals and fallouts. However, accountability has not been rigorously considered in IT system technologies and solutions. The goal of this study is to provide a clear understanding of accountability concept in service-oriented computing and, more generally, e-society. We first outline the general concept of accountability and presents a review on accountability from both management and IT perspective. We also clarify the ambiguity between the accountability concern and other architectural concerns such as security, QoS, trust and reputation.We present an SOA research project, the Llama accountability framework, which is an accountable service delivery infrastructure to support the monitoring, analysis, and reconfiguration of service processes. We believe such a framework will be useful for ensuring better e-services in an e-society. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Database Designs

    Publication Year: 2010 , Page(s): 42 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (445 KB) |  | HTML iconHTML  

    In this paper we present a formal specification of a queueing network performance evaluation model for database designs. The purpose of the model is to provide what if comparisons of database designs before database system implementation. The performance model is applied to the performance evaluation of three database designs of an implementation of the TPC-C benchmark. Experimental evaluation showed that the database design queueing network model was able to give an upper bound of system response time in the steady state for the measured system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of Weighted Fair Queuing System with Multi-class Jobs

    Publication Year: 2010 , Page(s): 50 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3178 KB) |  | HTML iconHTML  

    This paper analyses the weighted fair queueing (WFQ) system subject to three classes of network applications. The arrival traffic flows follow Poisson processes. The service times is exponentially distributed. The system is modelled as a two-dimensional Markov chain and use matrix geometric technique to solve its stationary probabilities. The determination of the steady state probabilities can be used to compute the performance measures of the system, such as the mean queue length, the throughput and the mean response time. Numerical experiments corroborate the theoretical results are offered and make the developed model as an effective tool for examining the performance of WFQ systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced DR-Tree for Low Latency Filtering in Publish/Subscribe Systems

    Publication Year: 2010 , Page(s): 58 - 65
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3043 KB) |  | HTML iconHTML  

    Distributed R-tree overlays emerged as an alternative for efficiently implementing DHT-free publish/subscribe communication primitives. Overlays using R-tree index structures offer logarithmic delivery garantis, guarantee zero false negatives and considerably reduce the number of false positives. In this paper we extend the distributed R-trees (DR-trees) in order to reduce event delivery latency. Our optimizations target both the structural organization of the DR-Trees and the publication policies. The contribution of the current work steams in an extensive evaluation of the novel structure along four parameters: latency, load, scalability and the rate of false positives. The enhanced structure performs better than the traditional distributed R-tree in terms of delivery latency. Additionally, it does not alter the performances related to the scalability, nor the load balancing of the tree, and neither the rate of false positives and negatives filtered by a node. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RED and WRED Performance Analysis Based on Superposition of N MMBP Arrival Proccess

    Publication Year: 2010 , Page(s): 66 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (560 KB) |  | HTML iconHTML  

    Random Early Detection (RED) is recommended as the congestion avoidance mechanism in packet switched networks in RFC2309 and has become the focus of much research into congestion control. Furthermore, RED and WRED are the AQM schemes most widely deployed in commercial Internet routers, such as Cisco and Juniper routers. This paper describes an analytical approach that models RED and WRED schemes using a discrete-time queuing model with superposition of N MMBP-2 sources as arrival processes. Each MMBP-2 represents an aggregated Internet traffic flow from different traffic classes or with different precedence. Performance analysis for RED and WRED are then carried out using different dropping profiles through Matlab numerical analysis based on the proposed queuing model. Performance measures, such as throughput, mean queuing delay and loss probability, obtained from analytical analysis are studied; the trade-off between packet loss and queuing delay can then be evaluated easily for different traffic classes. In this way, the proposed analytical model facilitates fine tuning of RED and WRED parameters for the purpose of QoS provisioning and capacity planning on Internet routers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of VCP Controller on DCCP Traffic

    Publication Year: 2010 , Page(s): 74 - 81
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (385 KB) |  | HTML iconHTML  

    TCP is an important communication protocol as more and more multimedia technologies are deployed in the Internet nowadays. However, existing TCP control mechanism has some shortcomings in supporting real-time streaming traffic. Although UDP can be used as an alternative to transmit real-time application data, it lacks congestion control. Introducing a new TCP-friendly protocol that supports the multimedia applications as well as congestion control has been the aim for many researchers for a long time. The transport layer protocol DCCP was designed to reach this goal recently. Another challenge in high bandwidth-delay product networks is to achieve a fair bandwidth allocation with efficiency, while minimizing packet loss and bottleneck queue. As a simple and low-complexity protocol, VCP can meet this challenge by leveraging the two ECN bits in network congestion feedback. In this paper, we study and implement the VCP controller in a bottleneck network with DCCP traffic. We use VCP to analyze the traffic load into different congestion states in order to effect congestion avoidance and control in the presence of huge DCCP-CCID2 traffic. We perform mathematical analysis and run OPNET simulation to validate our DCCP/VCP controller. We compare the performance of DCCP/VCP with TCP/RED, DCCP/RED and TCP/VCP in a bottleneck network. Our simulation results show that VCP controller can provide DCCP flows with a smooth throughput, a small queue size and a low packet drop rate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative Analysis and Evaluation of Botnet Command and Control Models

    Publication Year: 2010 , Page(s): 82 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (699 KB) |  | HTML iconHTML  

    Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world. This paper provides a brief look at how existing botnet research, the evolution and future of botnets, as well as a comparative analysis of the various bot communication methods and investigate their associated benefits and weaknesses. We propose a contemporary Multi Server Cnc topology in which only bots with static global IP addresses are eligible as candidates for being in the peer list. This design ensures that the peer list in each bot has long life time making it geographically optimized. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation-Based Performance Evaluation of the SNDP Protocol for Infrastructure WMNs

    Publication Year: 2010 , Page(s): 90 - 97
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (918 KB) |  | HTML iconHTML  

    An Infrastructure Wireless Mesh Network (IWMN) is a multi-hop network that consists of stationary mesh routers, strategically positioned to provide a distributed wireless infrastructure for stationary or mobile mesh clients over a mesh topology. In this paper, we evaluate a scalable neighborhood discovery protocol, called SNDP, which has been specifically designed to detect the presence and status of neighbor nodes in IWMNs. SNDP adopts a hybrid, collaborative signaling strategy, in which mesh routers and clients adopt distinct signaling approaches and work together to detect neighbor nodes. The performance evaluation is conducted based on simulation results. Performance is evaluated with respect to signaling load, power consumption and neighborhood discovery time. By contrasting SNDP and OSLR, it is observed that SNDP has the potential to become a better choice than the current work in progress proposed by the IETF MANET working group. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Routing Protocol for Bus Networks

    Publication Year: 2010 , Page(s): 98 - 104
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (463 KB) |  | HTML iconHTML  

    Providing Internet access on buses allow people to read news, check emails, watch sport games, and hence can greatly improve the quality of people's life. This paper proposes an adaptive routing protocol, called R-BUS for a bus network. R-BUS selects a route based on the link's lifetime and its communication signal quality. The protocol takes the bus mobility and the radio propagation model into account. A real map scenario is employed to evaluate the performance through simulation. The simulations show that R-BUS can guarantee the communication quality and also increase the route reliability. Compared to the existing routing protocols, R-BUS can achieve higher packet delivery ratio, lower average packet delay and lower control overhead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.