By Topic

Networked Computing (INC), 2011 The 7th International Conference on

Date 26-28 Sept. 2011

Filter Results

Displaying Results 1 - 25 of 33
  • [Front and back cover]

    Publication Year: 2011 , Page(s): c1 - c4
    Save to Project icon | Request Permissions | PDF file iconPDF (817 KB)  
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2011 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (83 KB)  
    Freely Available from IEEE
  • Research on generic multi agent simulators

    Publication Year: 2011 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (103 KB) |  | HTML iconHTML  

    Multi Agent Simulation is a research approach for complexity science which is based on the Multi Agent System theory and Modeling & Simulation theory. Distributed processing is a hot issue in the research and applications of Multi Agent Simulation. This paper presents a design for Generic Distributed Multi Agent Simulator while it is still in an experimental phase of this research area. The targets of this simulator are the high parallelism, generic utilization and distributed processing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure AODV against maliciously packet dropping

    Publication Year: 2011 , Page(s): 5 - 10
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (539 KB) |  | HTML iconHTML  

    Due to the open shared medium of wireless communications; wireless Ad hoc networks are more vulnerable toward attacks like black hole, which is a kind of packet dropping attack. It is a dangerous type of DOS attacks which try to harm routing protocols. In black hole, the malicious nodes try to absorb all packets in the networks by advertising themselves as having shortest path to the destination. We present a novel approach to detect this attack based on the neighbor's information. In this scheme, we show that the right place to validate route reply and prevent propagation of forged information in the network is the first node in the reverse path. Analysis and simulation results in ns2 show that using the proposed approach, we can successfully detect the black hole attack with a slightly delay on the network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive algorithm for task scheduling in the distributed heterogeneous systems using harmony search

    Publication Year: 2011 , Page(s): 11 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (192 KB) |  | HTML iconHTML  

    Task scheduling for a heterogeneous distributed system is one of the most important problems that affects the system performance. We propose an adaptive harmony search algorithm called AHS that has not need to exactly tune the initialization parameters while has high convergence speed. The algorithm adjusts the parameters adaptively and linearly. Moreover, we are presented a method improvise the new solution. This method seeks the best experience of each musician. If experience is repeated several times and it reaches to the good results, it will perform again. Simulation results with random graph and real application graph show that AHS outperforms the mostly used algorithms, IHS and NGHS algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QClock: An interposed scheduling algorithm for performance virtualization in shared storage systems

    Publication Year: 2011 , Page(s): 17 - 21
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (321 KB) |  | HTML iconHTML  

    I/O consolidation is a growing trend in production environments due to increasing complexity in tuning and managing storage systems. A consequence of this trend is the need to serve multiple applications simultaneously. It is imperative to ensure that these applications are insulated from each other by virtualization in order to meet any service-level objective (SLO) which represent application requirements in terms of the average throughput, latency and maximum burst size. Most previous approaches basically providing only the throughput guarantees; approaches which provide latency guarantee penalized applications for using spare resources or may not always exploit the full bandwidth offered by the storage system. This article presents an interposed I/O scheduling algorithm QClock which can provide performance virtualization without any support from the storage itself. Using real I/O trace and a detailed storage simulator, we demonstrate two important features of QClock: (1) benefits over existing algorithms by avoiding punish the applications which used the spare capacity; (2) the ability to exploit more capacity offered by the storage system to meet the performance requirement better. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping service concept and enterprise ontology in service identification

    Publication Year: 2011 , Page(s): 22 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (164 KB) |  | HTML iconHTML  

    One of the main issues in Service Identification is comprehensive understanding of service concept. Service in SOA contains a lot of elements and concepts. This paper has tried to provide a semantic context of service in service identification phase by using existing knowledge in different service identification methods and definitions about services in SOA. Then using enterprise ontology, as a tool for modeling enterprise, we display concepts and aspects of service that can be mapped to concepts of enterprise ontology. Here we use IDEAS ontology as an enterprise ontology case. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of automatic energy saving-monitor for reducing the waste of PC electricity

    Publication Year: 2011 , Page(s): 28 - 31
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (264 KB) |  | HTML iconHTML  

    Due to the advancements in Information Technology, the use of PC and monitor has been increasing substantially and has become an important tool in our society. However, these two products use the power on `working state' even during unused time, such as break time or meal time. This is the waste of power. To reduce the waste of power, the time period for power saving mode can be controlled by PC power management options. But this is difficult method for a beginner. Therefore, this paper proposes a new efficient system to control the power management by a monitor, not by PC. We combine PIR(Pyroelectric Infrared Ray)sensor, USB Keyboard Controller and USB Hub into the monitor. It provides an alternative method to save power consumption by detecting human movement. This system can automatically send a command to PC to go into the sleeping state when user leaves from the seat. And when user comes back to the seat, it can automatically return to the working state. Finally, the power consumption for PC and monitor has been measured. The proposed system can be widely applied to the energy saving product. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The initiative design to combine real bats and balls with online baseball contents

    Publication Year: 2011 , Page(s): 32 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (261 KB) |  | HTML iconHTML  

    It is very challenging issue to utilize human-being's behaviors or reactions as a way of interacting to virtual world. Indoor baseball simulation system is one of good candidates to combine real equipment and actions with virtual contents. As one of experimental approach to break a barrier between virtual game space and human-being's real behavior, we mapped out an experiment on seamless gaming between 3D virtual game space and human-being's real behavioral space, where real balls and bats are augmented with online baseball contents through computer vision and sensor technologies. The Simulation Engine, the key part of our proposal, consists of 6 components: Pitch Recognizer, Toss Controller, Swing Detector, Vehicle Recognizer, Vehicle Tracker and Trajectory Calculator. This approach, utilizing human-being's behaviors as input event, will open the new field of digital interfaces. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of cooperative spectrum sensing and sharing techniques in cognitive radio networks

    Publication Year: 2011 , Page(s): 36 - 41
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (255 KB) |  | HTML iconHTML  

    Cognitive radio networks consist of primary and secondary networks. Primary networks are usually licensed to access a spectrum band. The secondary networks sense available opportunity to access in licensed band in absence of primary users. For a network designer, designing a cognitive radio network is complex process and need to consider many aspects. There exist several issues to be addressed in these kinds of networks. We present our comparative study on design issues in cognitive radio networks. First, we discuss in brief about some of prominent design issues. We then talk about an important issue in designing cognitive networks, cooperation. The cooperation is presented in terms of spectrum sensing and spectrum sharing. We have tried to categorize these aspects and then finally provide qualitative comparison with discussion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component-based Functional Integrated Circuit System design and its straight implementation

    Publication Year: 2011 , Page(s): 42 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (178 KB) |  | HTML iconHTML  

    Component-based Functional Integrated Circuit System (FICS) refers to the design and implementation of FICS using the Integrated Circuit system components. This paper discusses two parts: the Component-based Services Framework (CSF), or rather, the FICS framework for component-based application services, and Functional Integrated Circuit System Architecture Description Language (FICSADL), or rather, the application layer language for FICS service framework. The paper defines the FICSADL language elements, descriptive methods and formal specification by means of mapping the components of the service layer onto the connectors of the semantic layer. Various FICS business and system requirements are met by adjusting the connector glue parts on the semantic layer. Finally, the paper demonstrates the FICSADL π-calculus. This component-based FICS design and implementation is a design and implementation straight and directly from the algorithm to chip. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving broadcast processes in peer-to-peer systems

    Publication Year: 2011 , Page(s): 48 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (229 KB) |  | HTML iconHTML  

    Broadcasting in peer-to-peer (P2P) systems is challenging because of the lack of a central server and network dynamic characteristic. Peers usually waste unnecessary effort forwarding duplicated messages. In this paper, we provide a theoretical basis for P2P broadcasting processes and utilize the theoretical model to design the broadcasting framework. The main idea of the framework is to provide preliminary knowledge for each peer. Based on the preliminary knowledge, peers can give directions for broadcasting and eliminate duplicated transmissions. Our experimental results show that our method can achieve maximum performance that balances delivery time and traffic overhead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple lock manager for distributed heterogeneous systems

    Publication Year: 2011 , Page(s): 54 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (125 KB) |  | HTML iconHTML  

    Distributed systems require an efficient way to manage access to shared data and using lock management system is a software-based solution to it. Current locks a re mostly special purpose locks and do not consider the heterogeneity needed for these systems. In this paper, we use the concept of semaphore as a basic structure to manage critical regions in a distributed heterogeneous system. We propose a distributed lock mechanism that is implemented with the aim of simplicity and ability to run on heterogeneous systems. The comparison of this lock mechanism with other comparable mechanisms indicates that it has the necessary and sufficient locking facilities and supports heterogeneous distribution. Besides, we report different average operation times of our implemented lock. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security risk analysis of software architecture based on AHP

    Publication Year: 2011 , Page(s): 60 - 67
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (539 KB) |  | HTML iconHTML  

    Many organizations and companies around the world are currently facing major security risks that threaten assets and valuable information system resources. Numerous security concerns are caused by the lack of sufficient and effective software security risk evaluation processes. Regardless of the technique used in security attacks, which change rapidly, many of these threats can be avoided. This paper presents an effective model for discovering software security risks at an early stage of the software development cycle and reports on the ongoing development of a security trust metrics of software architecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-dimensional visualization for network forensic analysis

    Publication Year: 2011 , Page(s): 68 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (470 KB) |  | HTML iconHTML  

    This research studies the offense on a computer network with multiple dimensions of network traffic and logs using parallel coordinates to show relationships of various parameters such as user, source ip address, time, destination ip address, destination service and domain name. The aim is to test the hypothesis that this technique is able to identify patterns of attacks and the behavior of offenders. Initially the attacks were simulated by creating text file dataset. The results of the experiment showed that (i) Attacked signatures are various depending on the situation of attack. (ii) Analyst can observe the attacks obviously in details. In addition, researchers proposed-user investigations with visualization time machine for network forensic (UIV) as a tool for analyzing the behavior on a computer network, the results also showed that (iii) it is possible to track an individual's behavior using this tool. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pseudonmization techniques for clinical data: Privacy study in Sultan Ismail Hospital Johor Bahru

    Publication Year: 2011 , Page(s): 74 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (114 KB) |  | HTML iconHTML  

    Privacy includes the right of individuals and organizations to determine for themselves when, how and to what extent information about them is communicated to others. The growing need of managing large amounts of data in hospital or clinical raises important legal and ethical challenges. This paper introduces and show the testing implementation of the privacy-protection problems, and highlights the relevance of trusted third parties and of privacy-enhancing techniques (PETs) in the context of data collection, e.g., for research. Practical approache on the pseudonymization model for batch data collection are presented. The actual application of the described techniques today proves the possible benefits for medicine that innovative privacy-enhancing techniques can provide. Technical PET solutions can unlock valuable data sources, otherwise not available. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multiple audio watermarking algorithm based on shear resisting DWT and LSB

    Publication Year: 2011 , Page(s): 78 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (420 KB) |  | HTML iconHTML  

    A robust multiple audio watermarking algorithm based on the combination of modified DWT and LSB is proposed by this paper. It is used for embed the watermark into audio signal for different purpose and different protection target since this algorithm combines the discrete wavelet transform and the least significant bit theory. The experimental results show that the algorithm achieved not only good resistance to normal attack but also to the shear attack. The robust watermark based on this algorithm reflects an excellent robustness since even under strong cropping attack it still can be extract clearly from the host audio. At the same time, the vulnerability watermark is distorted even under tiny disturbance situations that can be used as a cue for tempering the data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software architectural considerations for the development of secure software systems

    Publication Year: 2011 , Page(s): 84 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    Today, many computers are using to manage many applications, like management of bank accounts, to keep medical records, etc. With the progress of computer science and become more complicated, the amount of threats and risks is also increased strongly and attacks in this area have also been complicated and advanced. Today, with this huge amount of vast and complicated threats and attacks on computer systems, security has very important place, because at any moment the amount of threats and attacks in this area is added and these risks in some cases will have to follow heavy and irreparable damages. In the world of computer, software security is one of the important issues all the time. We are insensitive about the threats to the software that we design most of the time and consider security as a solution after the completion of design and constructing programs. In fact, to avoid creating security problems and deal with security threats and attacks properly we must be prevented about fragmented and temporary activities and our activities should have an appropriate structured process and be raised on a specific standard form in this regard. The important point here is if software should have a secure entity, this only is possible by having a secure architecture. There are various techniques that help to develop secure architecture and software systems. These techniques block hackers' ways to attack the applications. This paper tries to clarify the position and importance of software architecture in order to create secure software systems. Also in this article the role of software architecture in order to provide permanent security for software systems, has been described. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent forecast support system based on information mining

    Publication Year: 2011 , Page(s): 89 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (102 KB) |  | HTML iconHTML  

    Forecast is a nasty problem under the complicated uncertain information. First, the basic features are analyzed in this paper. The forecast elementary principles and process are also be descriptive. The collection and representation of the data of the uncertain information is also provided. And then the main models and methods of forecast are introduced. Finally the Construction of the Intelligent Forecast Support System Based on Information Mining(IFSSIM) is provided under uncertain information and the main functions are also introduced. The framework and methods in this paper provide new way to forecast under uncertain information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design technology in portable digital esophageal stethoscope

    Publication Year: 2011 , Page(s): 94 - 97
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (230 KB) |  | HTML iconHTML  

    Auscultation of heart sound and breathing sound in anesthesia is very important, because it can provide the information of patient's cardiorespiratory system. In operating room, anesthesiologists use esophageal stethoscope, which is a device to measure heart sound or respiratory sound by inserting a catheter into the esophagus close to heart. It is not only low cost and very simple to use for anesthesiologists, but provides the clinical data such as heart sound, breathing sound, core temperature. But it cannot not quantize and analyze the various data objectively. For this reason, we designed portable digital esophageal stethoscope system(PDES). PDES is a device that can acquire the data of heart sound and breathing sound by connecting microphone to the end of esophageal catheter. Besides, it can transmit the wireless data to a PC using Bluetooth technology and display on its screen. It displays the magnitude of heart sound, heart sound waveform, core temperature by using Heart Sound 1.0, that is developed for this purpose. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classifying network attack types with machine learning approach

    Publication Year: 2011 , Page(s): 98 - 102
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (163 KB) |  | HTML iconHTML  

    The growing rate of network attacks including hacker, cracker, and criminal enterprises have been increasing, which impact to the availability, confidentiality, and integrity of critical information data. In this paper, we propose a network-based Intrusion Detection and Classification System (IDCS) using well-known machine learning technique to classify an online network data that is preprocessed to have only 12 features. The number of features affects to the detection speed and resource consumption. Unlike other intrusion detection approaches where a few attack types are classified, our IDCS can classify normal network activities and identify 17 different attack types. Hence, our detection and classification approach can greatly reduce time to diagnose and prevent the network attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process to connect client to server via proxy for cephalometric analysis program

    Publication Year: 2011 , Page(s): 103 - 108
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (761 KB) |  | HTML iconHTML  

    Internet connection between client and server for running the web applications and processing the data between clients and servers can be done without passing through the proxy. However, the security issues and the access restriction by the institutes which handle the internet access on the client side has compelled the user to make a connection to the server via the proxy. This paper will show how to make a connection via proxy by applying Indy components for C++ Builder to enable the connection between client and server using the log in, user password, and proxy address and proxy port number from the registry to along with setting the maximum connect time and maximum red time to initialize a connection via a proxy before sending the encoded data for the identification of the user to the server. After that, Indy components will check if the connection has become successful. If the connect has become successful, disconnect and clear input buffer of the Indy component and perform decoding and reading the data returned from the server to see whether the server will give the permission to run the program. The results show that this can be done with success. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview of ICT waste management: Suggestions of best practices from developed countries to developing nations (Nigeria)

    Publication Year: 2011 , Page(s): 109 - 115
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (186 KB) |  | HTML iconHTML  

    As newer technology consistently emerge from day to day and more ICT equipment are been produced, people hunger and thirst for better ICT product, there arise a neglected part of the side effect of these product known generally as ICT waste. This side effect of advance in technology has been neglected especially by developing nations and it requires urgent attention in other to save space, lives, ecology and the environment. Technology and ecology should be in harmony. This paper aims to discuss categories of e-waste, reasons for increase in ICT waste, negative effects of e-waste and e-waste drivers. In order to fulfill this aim, comparatives study of two countries that have good waste management practice was done. From the comparative study, lessons were learnt from both countries, issues in ICT waste management was coined and suggestions were given to developing nations on ways to improve their e-waste management practices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy-ART in network anomaly detection with feature-reduction dataset

    Publication Year: 2011 , Page(s): 116 - 121
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (123 KB) |  | HTML iconHTML  

    The validation of Fuzzy-Adaptive Resonance Theory (Fuzzy-ART or F-ART) was made in our work on Network Anomaly Intrusion Detection (NAID) application. Feature reduction of KDD 99 dataset was applied to the F-ART model and produced superior performance. We found the effectiveness of FART on clustering data instances into normal and anomalous traffic. The detection performance was clearly improved compare to the detection with the full-feature dataset. The results validated the capability of F-ART with one shot fast learning on the effectiveness of this adaptive learning algorithm along with the robustness and fast response that can provide a real-time network anomaly detection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed approach to mitigate wormhole attack in wireless sensor networks

    Publication Year: 2011 , Page(s): 122 - 128
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (300 KB) |  | HTML iconHTML  

    Wireless sensor network is a growing technology which is offering solution to variety of application areas such as health care, military and industry. These kinds of networks usually apply number of devices known as sensor devices. These sensors which are limited are distributed over the environment and communicate through the wireless media. As sensor devices are limited the network exposed to variety of attacks. Conventional security mechanisms are not suitable for WSNs as they are usually heavy and nodes are limited. One of the most severe attacks to detect and defend in wireless sensor network is wormhole attack which data will be forwarded from one part of the network to the other part trough the wormhole tunnel. In this paper we focused on wormhole attack and proposed distributed network discovery approach to mitigate its effect. According to the simulation our approach can mitigated almost 100% of wormhole attack overload in the environment where 54% of nodes are affected with the wormhole. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.