By Topic

Computer Systems and Industrial Informatics (ICCSII), 2012 International Conference on

Date 18-20 Dec. 2012

Filter Results

Displaying Results 1 - 25 of 60
  • [Front and back cover]

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (107 KB)  
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (110 KB)  

    Presents the table of contents of the proceedings record. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual Single Cluster of multidimensional data

    Publication Year: 2012 , Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1469 KB) |  | HTML iconHTML  

    The rapid development of computer tools allows the computer system to stoke very large amount of data with many parameters such as electronic payment systems, sensors and monitoring systems and other. We talk about large data bases along both dimensions: number of recordings and number of dimensions "attribute, variable". Analysis of these data becomes very important and difficult in the same time. The visual data analysis has great potential applications because it facilitates the analysis, interpretation, validation and also increases the cognitive aspect among analysts. However, the traditional techniques of visualization of multidimensional data, such as parallel coordinates, glyphs, and scatter plot matrices, do not scale well to a very large data set. The increasing size and complexity of data sets is a new challenge and a key motivation for our works. In this article, we present our proposal approach VSCDR (Visual Single Cluster Dimension Reduction Approach) that can handle with big data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrent monitoring environment for obtaining IPFIX flow and signature based IDS alert data

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (261 KB) |  | HTML iconHTML  

    The aim of this paper is to introduce and untangle the operating model of a network monitoring environment that handles flow and signature based techniques side by side on a large-scale campus network. This paper introduces one approach for solving the problematic creation of standard-based flow information and signature alarms in tandem from large-scale network traffic. The operating model takes into account cost efficiency, trustworthy and privacy protection. Due to the Privacy Protection Act and local laws, data analysis is made after traffic anonymization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On understanding software quality evolution from a defect perspective: A case study on an open source software system

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (352 KB) |  | HTML iconHTML  

    Software systems need to continually evolve during their life cycle. It is, therefore, important to monitor how their quality evolves so that quality assurance activities can be properly planned. In this paper, we analyze empirically the quality evolution of an open source software system (Apache Tomcat). We address software quality from an external perspective. We used the number of defects as a quality indicator. We wanted to investigate if the Qi (Quality Assurance Indicator) metric, which we proposed in a previous work, can be used to observe how quality, measured in terms of defects, evolves in the presence of changes. We performed an empirical analysis using historical data collected from the subject system covering a period of more than seven years (thirty-one versions). Results are reported and discussed in the paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for automatic tuning the memristance of memristive devices with the capacity of applying to memristive memories

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (283 KB) |  | HTML iconHTML  

    Memristor is the fourth fundamental passive circuit element which has potential applications in development of analog memristive memories, neuroscience, and brain simulation. In all of these applications the memristance of the device should be adjusted to the desired value, which is currently performed by trial and error. The aim of this paper is to propose a new method and develop a circuit for automatic adjustment of the memristance of memristive devices. The proposed method is based on the sliding mode control and numerical simulations show that it can be used for tuning the memristance of such devices with a high accuracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightpath rerouting scheme for dynamic traffic in WDM all-optical networks

    Publication Year: 2012 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2685 KB) |  | HTML iconHTML  

    This paper considers rerouting and minimization of incurred disruption due to rerouting in all-optical wavelength division multiplexed (WDM) network with dynamic (random) traffic arrivals and departures. One limitation of such a network is the wavelength continuity constraint imposed by the all-optical cross-connect switches which do not allow a circuit to be placed on a non wavelength-continuous route. Rerouting is proposed to rearrange certain existing lightpaths to create a wavelength-continuous route in order to accommodate a new connection request. Recently, a wavelength rerouting scheme called “Parallel Move-To-Vacant Wavelength Retuning (MTV-WR)” with many attractive features such as shorter disruption period and simple switching control has been proposed. In this paper, we propose a new lightpath rerouting scheme based on the “Parallel MTV-WR” rerouting scheme minimizing the rejection ratio whilst keeping a little service disruption period due to rerouting. We assume that a new random lightpath demand (RLD) arrives at time t and that its routing phase fails to set up it. To establish the new RLD the proposed algorithm tries to reroute one or several RLDs by only changing the used wavelength whilst keeping the same physical path in order to reduce the disruption period. If it fails, it tries to reroute a minimum number of active RLDs by changing the physical path and then possibly the used wavelengths. Simulation results show that our proposed algorithm computes a better rejection ratio than the rerouting algorithms previously presented in the literature while keeping a minimum number of rerouted lightpaths and a very small service disruption period. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eye tracking analysis of browser security indicators

    Publication Year: 2012 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (844 KB) |  | HTML iconHTML  

    Understanding the natural human behavior when people interact with Web browsers is essential for building more user-centric interface design that is customized based on user's perception and experience. This paper presents the first empirical study of users' interaction with security indicators in Web browsers in a controlled real life security risk. The work focuses on the natural and spontaneous behavior of the victim's eyes on several predetermined area of interest, and empirically presents users' evaluation of several online logon pages. The experiment and its results provide a quantitative evidence of the usability of visual security indicators in Internet Explorer (IE8). We first categorized a set of Websites and created phishing Web Pages using most known phishing techniques, and then a group of users from different backgrounds and age groups took the controlled experiment on an eye tracking machine. We found that the simplicity approach in Web design causes more damage rather than helping in online security, and that the current sleek design of Web pages helps users find the logon area and overlook the security indicators instead. We also found that the security certificate cue was not used by the participants to determine the legitimacy of the presented Websites. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design pattern selection: A solution strategy method

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (460 KB) |  | HTML iconHTML  

    Design patterns represent a highly effective way to improve the quality of software system, due to its ability to capture the best practices and design knowledge; this enable software engineer to develop their applications. Unfortunately, choosing suitable patterns to specific design problems are difficult task for novice. Over the past years of research in the field of software engineering several conferences and workshops are focused on writing and publishing patterns; this increases the degree of challenges that face the developer in determining the suitable design patterns. This paper presents method to facilitate and assist the designers in selecting the suitable patterns for their problems. We propose a strategy method to obtain the appropriate recommendation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study on different moduli sets in residue number system

    Publication Year: 2012 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (349 KB) |  | HTML iconHTML  

    This paper presents a comparative study on different moduli sets that are used in the Residue Number System (RNS). Choosing a proper moduli set is one of the most important issues in RNS. It greatly affects the performance of the whole system. Many moduli sets have been introduced recently, each of them has its own advantages and disadvantages. Therefore, the necessity to a survey and a comparison between these sets is obvious. This paper demonstrates a detailed study on time and hardware requirements of residue-to-binary converters (RC) and residue arithmetic units (RAU), based on each of the studied sets, categorized by the dynamic range (DR) they provide. Then, the most efficient moduli set for each DR is suggested. The effect of moduli number on the system's performance and complexity is also discussed. Our research is aimed for designs whose main goal and strategy is balanced. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can Android be used for real-time purposes?

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (779 KB) |  | HTML iconHTML  

    Android is thought as being yet another operating system! In reality, it is a software platform rather than just an OS; in practical terms, it is an application framework on top of Linux, which facilitates its rapid deployment in many domains. Android was originally designed to be used in mobile computing applications, from handsets to tablets to e-books. But developers are also looking to employ Android in a variety of other embedded systems that have traditionally relied on the benefits of true real-time operating systems performance, boot-up time, real-time response, reliability, and no hidden maintenance costs. In this paper, we present a preliminary conclusion about Android's real-time behavior and performance based on experimental measurements such as thread switch latency, interrupt latency, sustained interrupt frequency, and finally the behavior of mutex and semaphore. All these measurements were done on the same ARM platform (Beagleboard-XM). Our testing results showed that Android in its current state cannot be qualified to be used in real-time environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An InfoStation-based context-aware on-street parking system

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (431 KB) |  | HTML iconHTML  

    This paper presents a novel vehicle ad hoc network (VANET) based on an on-street parking system that exploits the concept of InfoStations (ISs) and context-aware systems to locate and reserve a parking space. All parking zones have an assigned IS that provides wireless coverage to that parking zone. Thus, the parking details are available over dedicated short-range communication (DSRC) via the IS. Vehicles can request and reserve a preferred parking space using wireless capabilities while still moving. Because parking zones are generally distributed according to street (area) names, the architecture in this paper recommends centralised IS, which monitors and controls the geographically intermittent area-wise parking zones. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifying Web Services compositions using UPPAAL

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (233 KB) |  | HTML iconHTML  

    A service composition consists of multiple interacting Web Services that provide a functionality to meet a specific set of requirements. It is essential to verify that the functional behavior of the service composition meets the published functionality of the service. Instead of defining a new verification tool to verify the service composition we follow a transformation approach. In this approach, a service composition can be automatically transformed into a model understood by an available verification tool that can then be used to perform the formal verification. The goal in our research is to use different verification tools in order to verify a wide range of properties and target different kinds of systems. This is because different verification tools differ in their requirements and abilities. In this paper, we define the transformation rules to generate a model that can be verified using UPPAAL [1] model checking tool. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient switch for fat tree Network-on-Chip interconnection architecture

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (338 KB) |  | HTML iconHTML  

    This paper describes a fat tree based Network-on-Chip (NOC) system. The fat tree includes processing nodes and communication switches. IP node has a message generator unit which randomly generates messages to different destinations with different packet lengths and buffering. Switches use wormhole routing with virtual channel mechanism. The switch consists of the following units: router, input/output link controllers and arbitration units. A simulator has been developed in C++ to analyze the proposed architecture. Moreover, a VHDL model for the employed algorithms has been simulated and prototyped (partially) in FPGA technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monte Carlo-based Bi-directional pedestrian counting with compound-eye sensor

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (384 KB) |  | HTML iconHTML  

    In this paper, we propose a method for estimating the number of pedestrians walking in opposite directions, as in the case of a corridor. The proposed method utilizes a ceiling-mounted compound-eye sensor composed of two binary sensors with partially overlapping sensing regions. The output of the compound-eye sensor is sent to a monitoring server, where a number of Monte Carlo simulations are conducted. The simulation scenario with the smallest difference from the output history of the compound-eye sensor is selected as an estimate of the number of pedestrians. Simulations show that in crowded situations the relative error in the proposed method decreases by up to 45% compared to an existing method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A use case map as a visual approach to reduce the degree of inconsistency

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (641 KB) |  | HTML iconHTML  

    Extracting excellent requirements is one of the challenges that face the software developers. The characteristics of excellent requirements are concise, complete, necessary, unambiguous and consistent. Within a context where there is a lack of common understanding of what must be traced especially in generating consistency requirements, a number of methods have been proposed to software requirements consistency and traceability. Many of these dealing with requirements consistency using inconsistency rules given by software customer which may inadequate. This paper provides a guideline approach based on a visual technique that helps to reduce the degree of inconsistency which may appear by redundancy of tasks in more than one requirements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial Neural Network-based electricity price forecasting for smart grid deployment

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (654 KB) |  | HTML iconHTML  

    A deregulated electricity market is one of the keystones of up-and-coming smart grid deployments. In such a market, forecasting electricity prices is essential to helping stakeholders with the decision making process. Electricity price forecasting is an inherently difficult problem due to its special characteristics of dynamicity and nonstationarity. In our research, we use an Artificial Neural Network (ANN) model on carefully crafted input features for forecasting hourly electricity prices for the next 24 hours. The input features are selected from a pool of features derived from information such as past electricity price data, weather data, and calendar data. A wrapper method for feature selection is used in which the ANN model is continuously trained and updated in order to select the best feature set. The performance of the proposed method is evaluated and compared with the published results of the state-of-the-art Pattern Sequence-based Forecasting (PSF) method on the same data sets and our method is observed to provide superior results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-contiguous processor allocation in the mesh-connected multicomputers using compaction

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (473 KB) |  | HTML iconHTML  

    In non-contiguous allocation, a job request can be split into smaller parts that are allocated possibly non-adjacent free sub-meshes rather than always waiting until a single sub-mesh of the requested size and shape is available. Lifting the contiguity condition is expected to reduce processor fragmentation and increase system utilization. However, the distances traversed by messages can be long, and as a result the communication overhead, especially contention, is increased. The extra communication overhead depends on how the allocation request is partitioned and assigned to free sub-meshes. In this paper, a new non-contiguous processor allocation strategy, referred to as A Compacting Non-Contiguous Processor Allocation Strategy (CNCPA), is suggested for the 2D mesh networks. In the proposed strategy, a single job is compacting into more than one free location within the allocated processors, where the remaining available processors (free processors) form a large sub-mesh in the system. To evaluate the performance improvement achieved by the proposed strategy and compare it against well-known existing non-contiguous allocation strategies, we conduct extensive simulation experiments under the assumption of wormhole routing and the one-to-all and near neighbor communication patterns. The results show that the proposed strategy can eliminate both the internal and external fragmentation and reduce the communication overhead and hence improve performance in terms of job turnaround time and system utilization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abstraction approach for developing and delivering cloud-based services

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1122 KB) |  | HTML iconHTML  

    In this paper, we present a novel approach for developing services that can be deployed in different cloud infrastructures at the same time. The approach provides an instrument with emphasis on abstraction, inheritance and code reuse. Then, cloud-based services are developed easily by extending existing abstractions classes provided by the instrument or other developers. The interoperability between different clouds is solved by the basic abstraction classes of the instrument and all services are inherited and benefited from the advantage. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment metrics for intelligence level of human-computer interface

    Publication Year: 2012 , Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (915 KB) |  | HTML iconHTML  

    The Quality of human computer interface is increasingly getting more important as embedded computers and mobile computing are becoming an important part of our lives. The user friendly human computer interface is what trumps the commercial success of the device. Machine intelligence quotient describes the intelligence level of machines, and this intelligence is complemented with the user interface level of intelligence. This relationship arises from the position of the interface that mediates the interaction between human and machines. The intelligent interface makes it easy for users to tell the device what they want to do. This communication between the user and the device provides insights into quantitatively assess the user interface intelligence quotient. This study investigates the user interface intelligence of several Smartphone interfaces by proposing a framework for assessing the intelligence quotient. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a networked control system platform for unmanned aerial vehicles

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1481 KB) |  | HTML iconHTML  

    This paper reports a network based computer simulation and control platform for an unmanned aerial vehicle (UAV). The complete platform has been built by a complex software integration in NIST/ECMA model having user interfaces on distributed platforms, open-source and educational vertical tools accessing public domain maps, satellite images and tool libraries. Entire platform is setup to use UDP for interprocess message communication. Successful integration is illustrated for a UAV and simulation results are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perception based adaptive haptic communication protocol (PAHCP)

    Publication Year: 2012 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1387 KB) |  | HTML iconHTML  

    Packet-switched communication of haptic data telepresence systems is characterized by high packet rates on the communication channel. The quality of the internet-based telepresence systems depend on the quality of the communication channel between the operator and the remote site, and the delay jitter in the data exchange. Perceptual based data reduction for haptic data is used to reduce packet rate. It is proved and through experimental studies that the implementing the perception thresholds and additional buffering techniques can significantly reduce haptic data traffic with little or no influence on the quality of collaborative haptic-enabled (C-HE) or Tele-Operation/Tele-Presence, and Tele-Interaction (TPTA). In this paper, an adaptive size of the dead-band (Just Noticeable Difference - JND) technique for feedback forces received from remote side is presented, while keeping fixed JND for movements velocities for the transmitted haptic data from the operator side, to reduces the packet rate without perceptible disturbance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low complexity hardware architectural design for adaptive decision feedback equalizer using distributed arithmetic

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (333 KB) |  | HTML iconHTML  

    In this paper, we propose a low complex architectural design for adaptive decision feedback equalizer (ADFE). For this we recast the ADFE equations using distributed arithmetic (DA), which enables the implementation of ADFE without multipliers. The design is based on the distributed arithmetic based formulation of it. It is further shown that high order filters, which are required to implement high speed ADFEs can be realized using only look-up-tables (LUTs) and shift-accumulate operations. A novel approach was proposed to replace feed forward and feedback filters of ADFE with a single DA unit. By proper initialization, it is also shown that a low complexity ADFE architecture can be obtained. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient code-based relay algorithm for reliable cognitive radio systems

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (506 KB) |  | HTML iconHTML  

    Cooperative spectrum sensing taking into account the error effect on the sensing information reporting and increase in efficiency is studied. Employing the relay, a novel cooperative spectrum sensing algorithm based on network coding is proposed by correcting the received sensing information. In this paper we study the performance of network coding in presence of opportunistic relay selection. We conjecture that relay selection schemes should be aware of, and account for, the network coding operation in case of its presence. The efficiency of the algorithm and the method of relay selection are given. Based on system level simulation results, it is demonstrated that such an awareness provides considerable capacity gains as compared to its traditional opportunistic counterparts, in addition to increased fairness among the encoded sources. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.