Network traffic monitoring system design based on the unconstrained

Size: px
Start display at page:

Download "Network traffic monitoring system design based on the unconstrained"

Transcription

1 Networ traffic monitoring system design based on the unconstrained clustering queuing School of Telecommunications and Information Engineering, Xi'an University of Posts & Telecommunications, Xi an Shaanxi, Abstract Networ traffic monitoring system is an important way to realize networ performance analysis and monitor. This paper puts forward the networ traffic monitoring model based on unconstrained clustering queuing theory. It constructs the networ flow estimation model to effectively monitor and analyze the networ flows which are according to the analysis of the high-flow areas in the networ with unconstrained clustering queuing theory based on the comprehensive generalize on the basis of networ traffic characteristics. The simulation shows the proposed networ traffic monitoring system based on unconstrained clustering queuing theory can effectively control the flow distribution in the networ, ensure the networ flow balance and data validity, improve the efficiency of the networ traffic transmission, and restrain the networ congestion phenomenon. Keywords: Unconstrained Clustering, Queuing Theory, Networ Flow, Monitoring System 1. Introduction With the development of computer networ and Internet technology, the demands for networ resources are increasing. Intrusion detection is extremely beneficial to the supplement of the firewalls. Intrusion Detection System (IDS) can examine the attac before it causes any destruction, and also use the alert and protection system to get rid of the intrusion. In this process, the loss caused by intrusion can be reduced. After the intrusion, related information can be collected for later use as the protection system nowledge. This nowledge can be ept in nowledge library so that this ind of intrusion will no more happen. However, the increasing expansion of the networ scale and the increasing renewal of the intrusion method require Intrusion Detection System with higher quality. Based on the research of IDS developing status and direction at home and abroad, the author discusses the status of the networing security, networ intrusion methods and measures, the importance of networ security and introduced a networ intrusion detection system definition, function and component modules. To effectively monitor the networ flow and ensure the networ data high-speed transmission is current hot research area. The networ flow monitoring system can reasonably plan the networ flow distribution and low the networ communication congestion to increase the efficiency and stability of the networ transmission [1~2]. The traditional monitoring system normally applies port method, depth pacage detection method, flow statistical method and a machine learning method to monitor the networ flows [3~5]. The post method is easy to implement, but it s constrained to statistic port analysis. The depth pacage detection method is based on the distribution situations of the pacage loading in the networ [6~13]. However, this method can t effectively analyze the encrypted channels and detection cost lots of energy. This paper proposes the networ flow monitoring model based on unconstrained clustering queuing theory in order to solve the problems in traditional networ monitoring system, which is according to the comprehensive generalize on the basis of networ traffic characteristics. The simulation shows the proposed networ traffic monitoring system based on unconstrained clustering queuing theory can effectively control the flow distribution in the networ, ensure the networ flow balance and data validity, improve the efficiency of the networ traffic transmission, and restrain the networ congestion phenomenon. Journal of Convergence Information Technology(JCIT) Volume8, Number5,Mar 2013 doi: /jcit.vol8.issue

2 2. Analysis of high-flow areas in the networ In order to monitor the networ flow effectively, this paper mainly analyzes the high-flow areas in which ( x, y) represents the two-dimension coordinates of the area [14-18]. According to the multi-iteration principle, the coordinates of the nodes in large-scale networ with high flow can be attained. Assuming the area consisted of three ernel nodes is represented by EsGU s s the strategy ; area consisted of the ernel nodes with strategy capabilities are represented as Fs 1KsRs. EsGU s s and Fs 1KsRs are different strategy areas with different ernel nodes. When the lines between the ernel node F s and the node Fs 1 in some high-flow area Fs 1KsRs are intersected while mapping to the 2-dimension surface, and the corresponding central line through some strategy area EsGU s s, these nodes are located in high-flow area which have high probability for congestion happen. The effective flow monitoring method can effectively adjust the nodes. 3. High-flow areas optimization with unconstrained clustering association method After acquiring the high-flow areas, due to the interior factors in the networ and exterior interference effects, some corresponding interference nodes will appear which will affect the accurate characteristic expression of normal flow nodes. Thus, this paper applies unconstrained clustering association method to analyze the association among the networ flow data, classify the interference nodes and extract effective networ flow data. Assume e describes the amount of anomalous nodes, s in the t ( 0,1,, e) interference characteristic. Then the local interference characteristics should be classified to W classes, and ( r1, r2,..., rn ) describes different interference characteristics, n describe the amount of local interference and local interference are s( r1, r2,..., rn) in which h 0,1,, n. s ( r1, r2,..., rn) describes all the networ interference nodes. The unconstrained clustering association method can segment the local interferences based on different nodes characteristics. The local interference c j belongs to some media class of w l. The probability is s( w c ) and there are j s( w c ) ( s( w ) s( w ))/ s( c ) 0,1,, e (1) j l t j In the equation, s( c j ) describes the priori probability of the anomalous networ node monitoring; s( w cj) 用 describes the priori probability of the nodes segments. The monitoring results with same local infection characteristic probabilities sw ( ) are constant. If the local interferences are independent for each other, there are: s s( wc ) src ( ) src ( ) src ( ) src ( ) s( cj ) s( w)/ s( cj w) (2) j 1 j 2 j m j j 2 Through equation (3), the association probability among different nodes interference is: 2 j j r e 2 sc ( w) Uec ( ( ) w)/ U (3) 805

3 In the equation, Uec (( ) w) describe the networ local interference of class w. U r j describes the corresponding nodes of local interference in the pending detection samples. If zsin / cos l,the node is interference one. 4. Networ flow data analysis by queuing theory After unconstrained clustering association method filtering the interference factors in the high-flow areas, the queuing theory can analyze the congestion issue in the networ flow area to ensure the balance and validity of the networ flows, which can increase the networ transmission efficiency and stability Mathematical model of queuing theory A queue is a waiting line which is familiar with the customers waiting at a supermaret checout counter. The queuing theory applies mathematical model to analyze the waiting lines. More generally speaing, the queuing theory is concerned with the mathematical modeling and analysis of systems that provide service to random amounts of customers. The model is an abstract description of such a server-customer system which has physical meaning. Typically, a queuing model represents (1) the physical configurations of the system in which the specific amounts of servers provide service to the customers, and (2) the demands is stochastic (that is, probabilistic or statistical). The variability in the arrival process and in the service process should be specified. Queuing system is also called service system which includes service module and service objects. For networ communication, the data send, transmission, and receive can build a simple queuing model which is shown in figure 1. Figure1. Queuing system model The input module mainly analyzes the networ flow change characteristics. Normally, it s the flow appeared in some specific time or the time interval between two contiguous flows. The movement of networ flows is complex with random characteristic. Assume the flow is n(t)in t time periods and follow Poison distribution, the probability of L flows appear in time t in the queuing system is: l z ( t) El () t ( l 0,1,2,... L) (4) l! If the contiguous flow appearance interval time T follows negative exponential distribution, there is E( T t) 1 z t (5) 806

4 In the equation, represents the flow expectation in unit time; 1 describes the average time interval. Figure2. Using queuing theory to solve the problem with flow model 4.2. Networ flow prediction with queuing theory If there are large amounts of data pacages in the networ, the networ will be congested and the networ transmission efficiency will be reduced. Even more badly, the networ will be collapsed. This paper analyzed the router data processing capabilities in the networ data lin layer intend to solve the congestion problem. If the data outflow probability of the data segments in some data lin layer is G, the average processing time of the router for each segment is 1/W, the buffer size of the router is D, when some segment appears, the pending segment are saturated, then the segment will be discarded. The segment will be resent after Tn time. The average of the segment exceeding Tn is 1/W. Si(t) represents the appearance probability of the router length with i at time t, there are: St () ( s(), t s(),..., t s ()), t i 0,1,... d n1 (6) 4.3. Networ congestion rate analysis Networ congestion rate has random characteristic and normally the networ flow is analyzed by transient congestion rate and stable congestion rate. The transient congestion rate BD(t) represents the congestion probability at time t, which can be described by system queue probability distribution sn-1(t). Based on Marov characteristic, the transient congestion rate can be attained as equation (7). B t S t g ( ) 0() 1() (1 t ) (7) The stable networ congestion rate can analyze the networ stable operation situation which means when the system is stable; the congestion rate can eep unchanged. The expression is: B () t lim B () t (8) d x d 807

5 Assume the system stable queue is represented as R lim st ( ), according to Marov process characteristics, the stable congestion rate is: SE 0 d 1 (9) Si 1 in x In the equations, s=(s0,s1,,,sd+1) When d=0, the equation (9) can be solved as B S 0 1 (10) When d=1, the equation (9) can be solved as B ( 1) S ( 1) ( ) (11) 0 2 When d=2, the equation (9) can be solved as ( n) B3S41 ( 2 nb ) ( n )(1 B ) B (12) Similarly, when the system buffer d is larger than 2, the stable congestion rate can be shown in equation (13). BdSd 11 / ( dn) Bd 1 ( ( d 1) (1 B d 1 )) (13) Figure3. Cluster model unconstrained clustering correlation method 808

6 5. Simulation experiment verification The simulation comparison experiment is applied to testify the validity of the proposed networ flow monitoring system based on unconstrained clustering queuing theory. The experimental sample is 1000 access data pacages from some library management website in which there are 45 interference data pacages and average 20 pacages will share the same channel leading to networ congestion. The simulation experiment environment is: P4 3.0 CPU, 2G memory, Windows XP operation system, Visual C++ and C language. The comparison methods are port method, depth pacage detection method, flow statistical method and machine learning method. The experiment operates the proposed method and other comparison methods to monitor the same networ flow and analyzes the monitoring efficiency and error rates which are shown in figure 4, figure 5 and figure6 separately. Figure4. Networ monitoring efficiency of different methods Figure5. Monitoring error rates of different networ monitoring methods Figure6. Different networ detection miss rate of the method 809

7 By analyzing the figure 4 figure 5andfigure6 of the results from proposed method and other experimental comparison methods to monitor the same networ, the efficiency of the proposed method is higher than other methods while the error rates are lower that those. It illustrates the constructed networ flow monitoring system proposed in this paper has better performance and can effectively solve the networ congestion problem. In order to further verify the advantages of the proposed method, statistical simulation comparison experiment is operated to compare the operation time, accuracy rate, monitoring precisions, and loss rates, whose results are shown in table 1. Method Types Table 1.the data statistics of different monitoring results Operation time Accuracy rate Monitoring (s) (%) Precision Loss Rate (%) Port Method Depth pacage detection Flow statistic analysis method Machine Learning Method Proposed Method From table 1, the index of the proposed method for the networ flow monitoring is better than other comparison experimental method because the proposed method firstly applies unconstrained clustering method to filter the interference factors in the networ channels, then queuing theory is applied to solve the congestion problem in networ which greatly increase the monitoring efficiency and precisions. 6. Conclusions This paper puts forward the networ traffic monitoring model based on unconstrained clustering queuing theory. It constructs the networ flow estimation model to effectively monitor and analyze the networ flows which is according to the analysis on the high-flow areas in the networ with unconstrained clustering queuing theory based on the comprehensive generalize of the basis of networ traffic characteristics. The simulation shows the proposed networ traffic monitoring system based on unconstrained clustering queuing theory can effectively control the flow distribution in the networ, ensure the networ flow balance and data validity, improve the efficiency of the networ traffic transmission, and restrain the networ congestion phenomenon. It constructs the networ flow estimation model to effectively monitor and analyze the networ flows which is according to the analysis on the high-flow areas in the networ with unconstrained clustering queuing theory based on the comprehensive generalize of the basis of networ traffic characteristics. The simulation shows the proposed networ traffic monitoring system based on unconstrained clustering queuing theory can effectively control the flow distribution in the networ, ensure the networ flow balance and data validity, improve the efficiency of the networ traffic transmission, and restrain the networ congestion phenomenon. 7. Acnowledgements 1. Research on the method for dynamic ris security assessment of IP networ, Special Scientific Research plan of the department of education Shaanxi Province, 11JK The evaluation for dynamic ris of networ security, Natural science fund of Shaanxi Province, 2009MJ8002-3,

8 8 References [1] Chen-xu Liu, Yun Liu, Zhen-jiang Zhang, "Analytical Research on the Efficiency of Smart Grid with Delay Performance of Wireless Sensor Networ Based on Queuing Theory", JCIT, Vol. 7, No. 1, pp. 448 ~ 456, 2012 [2] Peng Han, Jinuan Wang, Yinghua Han, Lei Tan, "Assessment of Smart Grid PEV Charging Management Mechanism in Grid Safety and Environmental Impact", AISS, Vol. 4, No. 13, pp. 144 ~ 152, 2012 [3] Xi Ning, Shen Yulong, Zhang ZhiWei, Ma Jianfeng, "MADA: A Multi Application Domain Architecture for Home Networ", IJACT, Vol. 4, No. 11, pp. 66 ~ 76, 2012 [4] Li Meng, Hui Xiaofeng, Feng Wei, "Research on the Gold Prediction Base on Particle Filter Maximum Entropy Algorithm", IJACT, Vol. 4, No. 18, pp. 633 ~ 639, 2012 [5] Jing Gao, Jinuan Wang, Bin Wang, Xin Song, "Networ Flow Prediction by Genetic-Relevance Vector Regression Algorithm", JCIT, Vol. 7, No. 20, pp. 481 ~ 487, 2012 [6] Xiaoqian Song, Zhongxue Li, "Modified Index System for Eco-Efficiency Evaluation of Circular Economy in Economy in Coal Mining Area Based on Networ Flow Analysis", JCIT, Vol. 7, No. 13, pp. 1 ~ 9, 2012 [7] Wang Juan, Zhang Chunsheng, Niu Xiaohua, Mei Qiang, Zhang Fengxian, Wang Yuling, "Design and Performance Simulation Analysis of High Real-time IP-based Networ", JDCTA, Vol. 6, No. 18, pp. 294 ~ 300, 2012 [8] Dan-dan LI, Run-tong ZHANG, Xiao-pu SHANG, "A New Application in Neural Networ", AISS, Vol. 3, No. 6, pp. 151 ~ 159, 2011 [9] Lansheng Han, Ming Liu, Qiwen Liu, Mengsong Zou, "Sub-connection Based Isolation Against Networ Virus", JDCTA, Vol. 3, No. 1, pp. 110 ~ 122, 2009 [10] Yanhong Zhou, Dong Wen, Fuyong Yuan, Jianye Li, Mingwei Li, "Research of Online Water Quality Monitoring System Based on Zigbee Networ", AISS, Vol. 4, No. 5, pp. 255 ~ 261, 2012 [11] Ting YOU, Peijiang LI, Yumin chen, Hong Ye, "Structural Health Monitoring of Bridge Using an Adaptive Real-Time Wireless Sensor Networ", JCIT, Vol. 7, No. 5, pp. 28 ~ 35, 2012 [12] Shunzhou Yu, Xiaodong Xu, "An Input and Output Monitoring System for FPGA-based Hardware PLC", IJEI, Vol. 3, No. 1, pp. 34 ~ 44, 2012 [13] Sang Boem Lim, Kyoungro Yoon, Yang Dam Eo, "Ubiquitous Air Quality Monitoring System with Service Oriented Architecture Middleware", JCIT, Vol. 7, No. 6, pp. 193 ~ 201, 2012 [14] Mei-Yu Wu, Wen-Yen Huang, "WSN-based Health Care Management Platform for Long-Term Care Institutions", JCIT, Vol. 7, No. 7, pp. 303 ~ 311, 2012 [15] Chao Yang, "Optimized Design and Research of The Intelligent Residential Security Systems Based on Lonwors", JCIT, Vol. 7, No. 8, pp. 9 ~ 18, 2012 [16] Gang Li, XiLong Che, "The Remote Monitoring System Based on GPRS for the Health State of Civil Engineering ", JDCTA, Vol. 6, No. 8, pp. 26 ~ 33, 2012 [17] Xu Bing, Zhang Ying, Li Jing, "Dynamic Monitoring System of Sea Area Utilization based on 3S Technology", JCIT, Vol. 7, No. 9, pp. 413 ~ 421, 2012 [18] Sang Boem Lim, Mu Woo Pyeon, Nam Gyu Kim, "U-Subway: A Smart Monitoring and Control System", JDCTA, Vol. 6, No. 9, pp. 270 ~ 278,

Design call center management system of e-commerce based on BP neural network and multifractal

Design call center management system of e-commerce based on BP neural network and multifractal Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

Research on the UHF RFID Channel Coding Technology based on Simulink

Research on the UHF RFID Channel Coding Technology based on Simulink Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Capability Service Management System for Manufacturing Equipments in

Capability Service Management System for Manufacturing Equipments in Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan

More information

The QoS of the Edge Router based on DiffServ

The QoS of the Edge Router based on DiffServ The QoS of the Edge Router based on DiffServ Zhang Nan 1, Mao Pengxuan 1, Xiao Yang 1, Kiseon Kim 2 1 Institute of Information and Science, Beijing Jiaotong University, Beijing 100044, China 2 Dept. of

More information

Development of cloud computing system based on wireless sensor network protocol and routing

Development of cloud computing system based on wireless sensor network protocol and routing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 204, 6(7):680-684 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Development of cloud computing system based on wireless

More information

Based on the Introduction of Chaos Theory of Web Server Performance

Based on the Introduction of Chaos Theory of Web Server Performance Based on the Introduction of Chaos Theory of Web Server Performance Computer Science Department, Suqian college, Jiangsu Suqian 223800, China Abstract Web is currently widely developed service, and the

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

The monitoring of the network traffic based on queuing theory

The monitoring of the network traffic based on queuing theory The 7th International Symposium on Operations Research and Its Applications (ISORA 08) Lijiang, China, October 31 Novemver 3, 2008 Copyright 2008 ORSC & APORC, pp. 60 65 The monitoring of the network traffic

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

Research on Digital Agricultural Information Resources Sharing Plan Based on Cloud Computing *

Research on Digital Agricultural Information Resources Sharing Plan Based on Cloud Computing * Research on Digital Agricultural Information Resources Sharing Plan Based on Cloud Computing * Guifen Chen 1,**, Xu Wang 2, Hang Chen 1, Chunan Li 1, Guangwei Zeng 1, Yan Wang 1, and Peixun Liu 1 1 College

More information

The Remote Monitoring System Based on GPRS for the Health State of

The Remote Monitoring System Based on GPRS for the Health State of The Remote Monitoring System Based on GPRS for the Health State of Civil Engineering 1 Gang Li, 2 XiLong Che *1, First Author and Corresponding Author School of Information Engineering,Chang an University,

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

Build the College Network Teaching System Based on Cloud Computing

Build the College Network Teaching System Based on Cloud Computing Build the College Network Teaching System Based on Cloud Computing College of Mathematics and Computer Science, Shanxi Normal University Linfen, 041004, China E-mail: wjlkt@163.com Abstract Cloud computing

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology

More information

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

A Hybrid Load Balancing Policy underlying Cloud Computing Environment A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China shuwanneng@yahoo.com.cn

More information

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,

More information

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System , pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing

More information

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

Open Access Research and Design for Mobile Terminal-Based on Smart Home System Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System

More information

Design and Implementation of the Self-Management Travel System

Design and Implementation of the Self-Management Travel System Design and Implementation of the Self-Management Travel System Dongbei University of Finance and Economics School of Tourism and Hotel Management,Dalian, China 116025 Abstract Through skeleton system,

More information

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the

More information

On Cloud Computing Technology in the Construction of Digital Campus

On Cloud Computing Technology in the Construction of Digital Campus 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Identifying Peer-to-Peer Traffic Based on Traffic Characteristics

Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India srp.sit@sinhgad.edu Suraj Sanjay Dangat

More information

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,

More information

The study on the Coal Mine Safety Integrated Monitoring and Early Warning System DesignUsing the S-MAC Protocol

The study on the Coal Mine Safety Integrated Monitoring and Early Warning System DesignUsing the S-MAC Protocol The study on the Coal Mine Safety Integrated Monitoring and Early Warning System DesignUsing the S-MAC Protocol School of Economics and Management, Hebei University of Science and Technology, Shijiazhuang

More information

Game Theory Based Iaas Services Composition in Cloud Computing

Game Theory Based Iaas Services Composition in Cloud Computing Game Theory Based Iaas Services Composition in Cloud Computing Environment 1 Yang Yang, *2 Zhenqiang Mi, 3 Jiajia Sun 1, First Author School of Computer and Communication Engineering, University of Science

More information

Computer&Radioengineering

Computer&Radioengineering Computer&Radioengineering Computer&Radioengineering Bauhaus International Science press www. bhssci.com The Design and Research of the Monitoring System for Library Alliance Based on Cloud Computing Model

More information

A Cloud Computing-Based ERP System under The Cloud Manufacturing

A Cloud Computing-Based ERP System under The Cloud Manufacturing A Cloud Computing-Based ERP System under The Cloud Manufacturing Environment 1 Nan Yang, 2 Dongbo Li, 3 Yifei Tong 1, First Author Department of Industry Engineering,Nanjing University of Science and Technology,Nanjing210094,People

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

Presentation of Multi Level Data Replication Distributed Decision Making Strategy for High Priority Tasks in Real Time Data Grids

Presentation of Multi Level Data Replication Distributed Decision Making Strategy for High Priority Tasks in Real Time Data Grids Presentation of Multi Level Data Replication Distributed Decision Making Strategy for High Priority Tasks in Real Time Data Grids Naghmeh Esmaieli Esmaily.naghmeh@gmail.com Mahdi Jafari Ser_jafari@yahoo.com

More information

Research on the Course of Network Performance Testing and Analysis

Research on the Course of Network Performance Testing and Analysis 2012 International Conference on Education Technology and Computer (ICETC2012) IPCSIT vol.43 (2012) (2012) IACSIT Press, Singapore Research on the Course of Network Performance Testing and Analysis Xiurong

More information

Blog Post Extraction Using Title Finding

Blog Post Extraction Using Title Finding Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School

More information

Study on Human Performance Reliability in Green Construction Engineering

Study on Human Performance Reliability in Green Construction Engineering Study on Human Performance Reliability in Green Construction Engineering Xiaoping Bai a, Cheng Qian b School of management, Xi an University of Architecture and Technology, Xi an 710055, China a xxpp8899@126.com,

More information

Research of Sales Contract Management System Based on WEB

Research of Sales Contract Management System Based on WEB Computer and Information Science February, 2009 Research of Sales Contract Management System Based on WEB Hualun Lai Business School Tel:86-21-5527-1343 E-mail: laihl@usst.edu.cn Liangwei Zhong CAD center

More information

Load Balancing of Web Server System Using Service Queue Length

Load Balancing of Web Server System Using Service Queue Length Load Balancing of Web Server System Using Service Queue Length Brajendra Kumar 1, Dr. Vineet Richhariya 2 1 M.tech Scholar (CSE) LNCT, Bhopal 2 HOD (CSE), LNCT, Bhopal Abstract- In this paper, we describe

More information

Knowledge Acquisition Approach Based on Rough Set in Online Aided Decision System for Food Processing Quality and Safety

Knowledge Acquisition Approach Based on Rough Set in Online Aided Decision System for Food Processing Quality and Safety , pp. 381-388 http://dx.doi.org/10.14257/ijunesst.2014.7.6.33 Knowledge Acquisition Approach Based on Rough Set in Online Aided ecision System for Food Processing Quality and Safety Liu Peng, Liu Wen,

More information

Design and Realization of Internet of Things Based on Embedded System

Design and Realization of Internet of Things Based on Embedded System Design and Realization of Internet of Things Based on Embedded System Used in Intelligent Campus Department of Computer and Information Engineering, Heze University, Shandong,274015,China,kanghyhy@126.com

More information

The Design and Application of Water Jet Propulsion Boat Weibo Song, Junhai Jiang3, a, Shuping Zhao, Kaiyan Zhu, Qihua Wang

The Design and Application of Water Jet Propulsion Boat Weibo Song, Junhai Jiang3, a, Shuping Zhao, Kaiyan Zhu, Qihua Wang International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) The Design and Application of Water Jet Propulsion Boat Weibo Song, Junhai Jiang3, a, Shuping Zhao,

More information

Network Design and Implementation of Synchronization Software

Network Design and Implementation of Synchronization Software , pp. 121-130 http://dx.doi.org/10.14257/ijfgcn.2015.8.4.12 Network Design and Implementation of Synchronization Software Peng Hai-yun and Liu Xin Department of computer science and technology, Zhou Kou

More information

Analysis of China Motor Vehicle Insurance Business Trends

Analysis of China Motor Vehicle Insurance Business Trends Analysis of China Motor Vehicle Insurance Business Trends 1 Xiaohui WU, 2 Zheng Zhang, 3 Lei Liu, 4 Lanlan Zhang 1, First Autho University of International Business and Economic, Beijing, wuxiaohui@iachina.cn

More information

Big Data Collection and Utilization for Operational Support of Smarter Social Infrastructure

Big Data Collection and Utilization for Operational Support of Smarter Social Infrastructure Hitachi Review Vol. 63 (2014), No. 1 18 Big Data Collection and Utilization for Operational Support of Smarter Social Infrastructure Kazuaki Iwamura Hideki Tonooka Yoshihiro Mizuno Yuichi Mashita OVERVIEW:

More information

Research on Network Attack-Defense Training Based on Virtual Machine

Research on Network Attack-Defense Training Based on Virtual Machine Research on Network Attack-Defense Training Based on Virtual Machine 1 Zhang Hui, 2 Sun Yanwei *1, School of Computer Science and Technology, HuBei University of Education, zhanghuiwuhan@sina.com 2, College

More information

A QoS-driven Resource Allocation Algorithm with Load balancing for

A QoS-driven Resource Allocation Algorithm with Load balancing for A QoS-driven Resource Allocation Algorithm with Load balancing for Device Management 1 Lanlan Rui, 2 Yi Zhou, 3 Shaoyong Guo State Key Laboratory of Networking and Switching Technology, Beijing University

More information

Research of Railway Wagon Flow Forecast System Based on Hadoop-Hazelcast

Research of Railway Wagon Flow Forecast System Based on Hadoop-Hazelcast International Conference on Civil, Transportation and Environment (ICCTE 2016) Research of Railway Wagon Flow Forecast System Based on Hadoop-Hazelcast Xiaodong Zhang1, a, Baotian Dong1, b, Weijia Zhang2,

More information

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of

More information

Abstract. 1. Introduction

Abstract. 1. Introduction A REVIEW-LOAD BALANCING OF WEB SERVER SYSTEM USING SERVICE QUEUE LENGTH Brajendra Kumar, M.Tech (Scholor) LNCT,Bhopal 1; Dr. Vineet Richhariya, HOD(CSE)LNCT Bhopal 2 Abstract In this paper, we describe

More information

A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique

A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj

More information

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1463-1467 1463 Open Access Research on Database Massive Data Processing and Mining Method

More information

A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm

A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm Journal of Information & Computational Science 9: 16 (2012) 4801 4809 Available at http://www.joics.com A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm

More information

A Resilient Device Monitoring System in Collaboration Environments

A Resilient Device Monitoring System in Collaboration Environments , pp.103-114 http://dx.doi.org/10.14257/ijsh.2014.8.5.10 A Resilient Device Monitoring System in Collaboration Environments KeeHyun Park 1 and JongHwi Lee 1 Department of Computer Engineering, Keimyung

More information

Study on Secure File Transfer Scheme on ARM9-based Security

Study on Secure File Transfer Scheme on ARM9-based Security Study on Secure File Transfer Scheme on ARM9-based Security Authentication Platform * (School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201) * Email:idlink@163.com

More information

Study on Cloud Service Mode of Agricultural Information Institutions

Study on Cloud Service Mode of Agricultural Information Institutions Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud

More information

Application of Virtual Instrumentation for Sensor Network Monitoring

Application of Virtual Instrumentation for Sensor Network Monitoring Application of Virtual Instrumentation for Sensor etwor Monitoring COSTATI VOLOSECU VICTOR MALITA Department of Automatics and Applied Informatics Politehnica University of Timisoara Bd. V. Parvan nr.

More information

Design of Electronic Medical Record System Based on Cloud Computing Technology

Design of Electronic Medical Record System Based on Cloud Computing Technology TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based

More information

SCHEDULING IN CLOUD COMPUTING

SCHEDULING IN CLOUD COMPUTING SCHEDULING IN CLOUD COMPUTING Lipsa Tripathy, Rasmi Ranjan Patra CSA,CPGS,OUAT,Bhubaneswar,Odisha Abstract Cloud computing is an emerging technology. It process huge amount of data so scheduling mechanism

More information

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Sarhan M. Musa Mahamadou Tembely Matthew N. O. Sadiku Pamela H. Obiomon

More information

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 , pp. 331-342 http://dx.doi.org/10.14257/ijfgcn.2015.8.2.27 Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 Changming Li, Jie Shen and

More information

Flexible Architecture for Internet of Things Utilizing an Local Manager

Flexible Architecture for Internet of Things Utilizing an Local Manager , pp.235-248 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.24 Flexible Architecture for Internet of Things Utilizing an Local Manager Patrik Huss, Niklas Wigertz, Jingcheng Zhang, Allan Huynh, Qinzhong Ye

More information

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM Mr.S.Iyyappan 1, Mr.V.Nandagopal 2 P.G Scholar, Dept. of EEE, Ganadipathy Tulis s Jain Engineering College, Vellore,

More information

Group Based Load Balancing Algorithm in Cloud Computing Virtualization

Group Based Load Balancing Algorithm in Cloud Computing Virtualization Group Based Load Balancing Algorithm in Cloud Computing Virtualization Rishi Bhardwaj, 2 Sangeeta Mittal, Student, 2 Assistant Professor, Department of Computer Science, Jaypee Institute of Information

More information

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on heterogeneous network architecture between

More information

Research on Trust Management Strategies in Cloud Computing Environment

Research on Trust Management Strategies in Cloud Computing Environment Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING

More information

Research for the Data Transmission Model in Cloud Resource Monitoring Zheng Zhi yun, Song Cai hua, Li Dun, Zhang Xing -jin, Lu Li-ping

Research for the Data Transmission Model in Cloud Resource Monitoring Zheng Zhi yun, Song Cai hua, Li Dun, Zhang Xing -jin, Lu Li-ping Research for the Data Transmission Model in Cloud Resource Monitoring 1 Zheng Zhi-yun, Song Cai-hua, 3 Li Dun, 4 Zhang Xing-jin, 5 Lu Li-ping 1,,3,4 School of Information Engineering, Zhengzhou University,

More information

The Application and Development of Software Testing in Cloud Computing Environment

The Application and Development of Software Testing in Cloud Computing Environment 2012 International Conference on Computer Science and Service System The Application and Development of Software Testing in Cloud Computing Environment Peng Zhenlong Ou Yang Zhonghui School of Business

More information

Network congestion, its control and avoidance

Network congestion, its control and avoidance MUHAMMAD SALEH SHAH*, ASIM IMDAD WAGAN**, AND MUKHTIAR ALI UNAR*** RECEIVED ON 05.10.2013 ACCEPTED ON 09.01.2014 ABSTRACT Recent years have seen an increasing interest in the design of AQM (Active Queue

More information

Optimization of PID parameters with an improved simplex PSO

Optimization of PID parameters with an improved simplex PSO Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng

More information

Workshop on Internet and BigData Finance (WIBF)

Workshop on Internet and BigData Finance (WIBF) Workshop on Internet and BigData Finance (WIBF) Central University of Finance and Economics June 11-12, 2015 In a 2013 study, IBM found that 71 percent of the banking and financial firms report that the

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING TECHNOLOGY APPLICATIONS *

A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING TECHNOLOGY APPLICATIONS * International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 1, pp. 31 41, 2016 A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING

More information

Comparative Analysis of Load Balancing Algorithms in Cloud Computing

Comparative Analysis of Load Balancing Algorithms in Cloud Computing Comparative Analysis of Load Balancing Algorithms in Cloud Computing Anoop Yadav Department of Computer Science and Engineering, JIIT, Noida Sec-62, Uttar Pradesh, India ABSTRACT Cloud computing, now a

More information

Random forest algorithm in big data environment

Random forest algorithm in big data environment Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest

More information

Simulating Optimum Design of Handling Service Center System Based on WITNESS

Simulating Optimum Design of Handling Service Center System Based on WITNESS Advances in Natural Science Vol. 6, No. 4, 2013, pp. 64-68 DOI:10.3968/j.ans.1715787020130604.2958 ISSN 1715-7862 [PRINT] ISSN 1715-7870 [ONLINE] www.cscanada.net www.cscanada.org Simulating Optimum Design

More information

Knowledge Based Context Awareness Network Security For Wireless Networks

Knowledge Based Context Awareness Network Security For Wireless Networks Knowledge Based Context Awareness Network Security For Wireless Networks Deepa U. Mishra Department of Computer Engineering Smt. Kashibai Navale College of Engineering Pune, India Abstract - Context awareness

More information

Cloud resource scheduling research based on intelligent computing

Cloud resource scheduling research based on intelligent computing Abstract Cloud resource scheduling research based on intelligent computing Xianquan Zeng * School of Information Engineering, Xuchang University, Xuchang City, Henan Province, China, 461000 Received 1

More information

Mathematical models to estimate the quality of monitoring software systems for electrical substations

Mathematical models to estimate the quality of monitoring software systems for electrical substations Mathematical models to estimate the quality of monitoring software systems for electrical substations MIHAIELA ILIESCU 1, VICTOR URSIANU 2, FLORICA MOLDOVEANU 2, RADU URSIANU 2, EMILIANA URSIANU 3 1 Faculty

More information

Cloud Security - Characteristics, Advantages and Disadvantages

Cloud Security - Characteristics, Advantages and Disadvantages The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,

More information

A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks

A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks , pp.100-104 http://dx.doi.org/10.14257/astl.2014.45.19 A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks Li Ma 1,2,3, Jingzhou Yan 1,2,Kuo Liao 3,4, Shuangshuang Yan

More information

Annual review FLORENCE 2013. WP4 Network: prototypes

Annual review FLORENCE 2013. WP4 Network: prototypes Annual review FLORENCE 2013 WP4 Network: prototypes WP4 prototypes Task 4.1 Smart SPD driven transmission P1: SPD-driven Smart Transmission Layer Task 4.2 Distributed self-x models P2: Recognizing and

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Implementing SAAS: Cloud Computing and Android Based Application Framework for.net Programming

Implementing SAAS: Cloud Computing and Android Based Application Framework for.net Programming Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,

More information

Modeling and Evaluation of Web Services in Mobile Networks Using Stochastic Colored Petri Nets

Modeling and Evaluation of Web Services in Mobile Networks Using Stochastic Colored Petri Nets Journal of Advances in Computer Research Quarterly ISSN: 2008-6148 Sari Branch, Islamic Azad University, Sari, I.R.Iran (Vol. 4, No. 4, November 2013), Pages: 37-50 www.jacr.iausari.ac.ir Modeling and

More information

An Advanced Commercial Contact Center Based on Cloud Computing

An Advanced Commercial Contact Center Based on Cloud Computing An Advanced Commercial Contact Center Based on Cloud Computing Li Pengyu, Chen Xin, Zhang Guoping, Zhang Boju, and Huang Daochao Abstract With the rapid development of cloud computing and information technology,

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

Credit Card Fraud Detection Using Self Organised Map

Credit Card Fraud Detection Using Self Organised Map International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud

More information

The Construction of Seismic and Geological Studies' Cloud Platform Using Desktop Cloud Visualization Technology

The Construction of Seismic and Geological Studies' Cloud Platform Using Desktop Cloud Visualization Technology Send Orders for Reprints to reprints@benthamscience.ae 1582 The Open Cybernetics & Systemics Journal, 2015, 9, 1582-1586 Open Access The Construction of Seismic and Geological Studies' Cloud Platform Using

More information