Vol.10 No.1&2 May
15,
2014
Advanced Computing Issues in Data and Security
Engineering
Editorial (1-2)
Tran Khanh Dang
A Path-Consistency based Algorithm for Anomaly
Detection of Spatial Constraints in GeoXACML Policies (3-15)
Tuan Anh Dang and Tran Khanh Dang
Anomaly detection in GeoXACML policies
supports policy designers in the policy definition process to save
effort, minimize errors, improve performance. Currently, there is a lot
of research focusing on anomaly detection in XACML from which GeoXACML
is extended. However, no research directly solves anomaly detection
problem in GeoXACML, especially in the spatial aspect. In this paper, we
propose an algorithm based on the path-consistency algorithm to detect
anomalies in spatial constraints of GeoXACML policies. In our approach,
when a policy designer adds a new rule or updates an existing rule, an
engine will automatically check if this rule is potentially conflicting
or redundant to others. We also present a simple example in step-by-step
to clarify how this algorithm works. Finally, to analyze the performance
of this algorithm, we will consider its computational complexity.
Fault Resolution System for Inter-Cloud
Environment(16-29)
Ha Manh Tran, Synh Viet Uyen Ha, Huynh Tu Dang, and Khoa Van
Huynh
Fault resolution in communication
networks and distributed systems is a complicated process that demands
the involvement of system administrators and supporting systems in
monitoring, diagnosing, resolving and recording faults. This process
becomes more challenging in inter-cloud environment where multiple cloud
systems coordinate in provisioning applications and services. In this
context, we propose a fault resolution system that assists system
administrators in resolving faults in inter-cloud environment. The
proposed system is characterized by the capability of sharing and
searching fault knowledge resources among cloud systems for fault
resolution. It uses a peer-to-peer network of fault managers that
provide facilities to monitor faults occurring in cloud systems and
search similar faults with solutions occurring in other cloud systems.
We have implemented several components of the proposed system including
fault monitor, fault searcher and fault updater. We have also
experimented and evaluated the prototyping system on fault databases
obtained from several fault sources, such as bug tracking systems,
online discussion forums and vendor knowledge bases.
MDRAN: Multihop Disaster Recovery Access Network
(30-42)
Quang Tran-Minh, Kien Ngyen, Eiji Kamioka, and Shigeki Yamada
This paper proposed a novel approach to
resilient wireless multihop disaster recovery access networks (MDRAN).
Both virtual access point (VAP) and wireless virtualization (WV)
techniques have been combined in an appropriate way thereby the networks
can be automatically setup on-demand using on-site commodity mobile
devices (laptops, tablet PCs, smart phones). In the proposed approach,
difficulties remained from conventional access network technologies such
as the requirements of installing special hardware (e.g. multiple
network interface cards - NICs, particular mesh routers, etc.,) and
software (e.g. network auto-configuration software including routing
protocols) on each mobile node (MN) in advance have been resolved. As a
result, users can connect to the proposed MDRAN as easily as connecting
to conventional APs. After connecting to the proposed network, users
naturally and unconsciously contribute to the network extension. This
feature improves the self-supporting capability at the disaster's local
communities. Experimental evaluations reveal the feasibility,
effectiveness as well as the scalability of the proposed approach. As a
result, the proposed scheme is ready to be realized in the actual
disaster recovery applications.
Overlay upper Clothing
Textures to Still Images based on Human Pose Estimation (43-57)
Quang-Song Le and Minh-Triet Tran
This paper proposed a novel approach to
resilient wireless multihop disaster recovery access networks (MDRAN).
Both virtual access point (VAP) and wireless virtualization (WV)
techniques have been combined in an appropriate way thereby the networks
can be automatically setup on-demand using on-site commodity mobile
devices (laptops, tablet PCs, smart phones). In the proposed approach,
difficulties remained from conventional access network technologies such
as the requirements of installing special hardware (e.g. multiple
network interface cards - NICs, particular mesh routers, etc.,) and
software (e.g. network auto-configuration software including routing
protocols) on each mobile node (MN) in advance have been resolved. As a
result, users can connect to the proposed MDRAN as easily as connecting
to conventional APs. After connecting to the proposed network, users
naturally and unconsciously contribute to the network extension. This
feature improves the self-supporting capability at the disaster's local
communities. Experimental evaluations reveal the feasibility,
effectiveness as well as the scalability of the proposed approach. As a
result, the proposed scheme is ready to be realized in the actual
disaster recovery applications.
Inter-Vehicular Communications
Technologies, Protocols, and Applications
Editorial (58-59)
Driss El Ouadghiri, Mohamed Bakhouya, and Salim Bitam
Routing Optimization for VANET Communication (60-77)
My Driss Laanaoul and Said Raghay
Numerous efforts are currently
under progress to enhance the safety and efficiency of vehicular traffic
through intelligent transportation systems. In addition, the growing
demand for access to data and information from human users on the go has
created the need for advanced vehicle-to-vehicle and vehicle to roadside
communication systems capable of high data rates and amenable to high
degrees of node mobility. The importance of inter-vehicle communication
is increasing due to its role in organizing road. In this paper we
present our proposition witch consisting of a new routing protocol VANET
(vehicle AdHoc Network). This protocol is based on the localization of
the node, and also the score assigned to each vehicle and the cost for
each junction. We evaluate the performance of our protocol IRUV by
comparing it with the VANET protocols: LAR and GyTAR in terms of: End to
End Delay, and Delivery Ratio. To demonstrate the performance of our
proposal, we used a traffic simulator VanetMobiSim to generate a
realistic traffic. The trace of this traffic will be integrated into the
simulation of the proposed protocol using the network simulator NS2.
Study of VDTN Routing Protocols Performances in
Sparse and Dense Traffic in the Presence of Relay Nodes
(78-93)
Maria Benamar, Sara Ahnana, Fatima Zahrae Saiyari, Nabil
Benamar, Moulay Driss El Ouadghiri, and Jean-Marie Bonnin
Vehicular Delay Tolerant Networks
(VDTN) are growing challenging field of Delay Tolerant Networks (DTN)
containing mobile nodes (vehicles) that communicate using the paradigm
of store carry and forward. In this model, nodes store the bundle
waiting for the opportunity to transfer it to another node in the same
transmission range, and in a limited duration. VDTN enables
communications in a sparse network characterized by low density, high
mobility of nodes, intermittent connectivity, no end-to-end
communication and no information on the path of nodes, which make
routing in such cases difficult and challenging. This paper studies the
performances of some well-known VDTN routing protocols in sparse and
dense traffic. The proposed scenario considers stationary nodes
representing sensors measuring different types of data to be transferred
to stationary destination nodes through the VDTN network (vehicles). The
destination nodes are the only part of the network that is connected to
the Internet. The transmission of collected data is also made by fixed
nodes representing stationary relays such as audio-signal traffic
lights, placed in the crossroads of Rennes city streets. The map of
Rennes has been used and the position of the stoplights has been carried
out using Open Data. The aim of our simulation is to study the impact of
mobile nodes and stationary relays on the routing protocols performances
in dense and sparse traffic.
Improving Delay Performance for Time-Critical
Communications in VANET (94-106)
Dong Lai Sun, Hafssa Benaboud, Jianhua Li, and Noufissa Mikou
To ensure the functionality of intelligent transportation, time-critical
information is of great importance in Vehicular Ad-hoc Network (VANET).
Meanwhile, non-time-critical information still exists in the network,
with which regular services can be provided. A key problem in VANET is
to guarantee delay performance for time-critical traffic while still
satisfying demand of non-time-critical traffic. To achieve this object,
a multiple threshold policy derived from TEOS (Threshold Enabled
Opportunistic Scheduling) is studied in this paper. With this policy,
overall channel efficiency is optimized while a throughput requirement
from the non-time-critical traffic is still considered. Thus, two
objects can be achieved simultaneously: time-critical packets can have a
better channel access probability as a result of a more free channel;
and non-time-critical traffic can be transmitted as required. Numerical
results and simulations show that this approach can provide smaller
delay for time-critical transmissions in VANET.
Geo-Social Mobility Model for
VANET Simulation (107-127)
Nardine Basta, Amal El-Nahas, Hans-Peter
Grossmann, and Slim Abdennadher
Vehicular Ad Hoc Network (VANET) is a special case of opportunistic
network where nodes are moving vehicles communicating together through
short range wireless transmission. VANET applications vary from safety
and accident avoidance to leisure and entertainment. The data
dissemination routine differs according to the delay tolerance of the
application. The bandwidth usage of the application is directly
proportional to the priority of the sent traffic and accordingly the
routing protocols vary. Simulation is a key feature in validating the
protocols dedicated for VANET applications. Since the vehicles mobility
is driven by the human mobility characteristics and is controlled by the
geographical restrictions of the roads, the work presented in this paper
is aimed to having a realistic mobility model that incorporates both the
social aspects of human mobility together with the geographical
restrictions that governs the movement of the mobile nodes. This
mobility model is for testing the protocols related to the delay
tolerant applications where unicasting/multicasting is used for data
dissemination rather than broadcasting. Thus location awareness and
destination prediction is essential. The model is based on using
realistic data sets rather than randomly generated data.
An In-Vehicle Embedded System for CAN-bus Events
Monitoring (128-140)
Shichao Cai, Mohamed Bakhouya, Mohamed Becherif, Jaafar Gaber,
and Maxime Wack
ITS applications usually involve
inter-vehicle communication as a medium to exchange information between
vehicles experiencing undesirable and/or dangerous situations (e.g.,
traffic jam, accident, or bad road conditions) and other surrounding
vehicles. For example, if the in-vehicle ABS is activated, it might
indicate bad road conditions, and if this information is shared between
vehicles, other drivers will be warned to take preventive actions before
getting into a dangerous situation. In this paper, an embedded system is
presented for in-vehicle event monitoring. The system uses a diagnostic
interface to plug into the vehicle’s existing network (i.e. CAN bus) and
a software is integrated to extract relevant information. Wireless
communication modules, mainly WLAN, ZigBee and GPS/GPRS, are integrated
into the system to communicate with other surrounding vehicles as well
as emergency/control centers. A prototype is developed and deployed in a
real vehicle, experiments are conducted, and results are reported to
show the efficiency of the system and the soundness of gathered
in-vehicle data.
Field Measurements of an Urban
Two-Tier Wireless Mesh Access Network: End-User Perspective
(141-159)
Driss Benhaddou and Julian Naranjo
Multi-tier wireless mesh networks
are promising technologies that are deployed to provide economic high
speed Internet access. In an effort to provide low-cost broadband
Internet access to a low income neighborhood in Southeast Houston, Rice
University and Technology for All (TFA) organization deployed a
multi-tier mesh Wi-Fi Network that extends a single fiber-optic channel
to serve a large coverage area. The access tier connects homes to the
nearest Wi-Fi Mesh Access Point (MAP); several MAPs are installed in
specific locations for complete coverage of the neighborhood. The MAPs
form a multi-hop wireless network to the fiber back-haul. This paper
presents an extensive in-home performance measurement of the TFA network
to characterize the network performance from user perspective. The
results show that the current design need improvement to fulfill user
expectation and implementation of wireless mesh network as an access
technology for end-users’ broadband access. In addition the paper
simulates the effect of directional antenna on the design of such
network.
Other Research Article
Design of Disaster State Presentation System Using
Ultra High Resolution Display(160-178)
Akira Sakuraba, Tomoyuki Ishida, Yasou Ebara, and Yoshitaka
Shibata
Management of disaster information is
identified as one of the important functions in disaster countermeasure
activity once large scale disaster has broken out. Since a large number
of disaster information regarding with damage state in aftermath phase
are reported to Counter Disaster headquarter (CDH), officers of CDH have
to consolidate those to understand the state and to do decision making
for quick and correct activity. In conventional, printed large maps are
used for disaster management. However, the printed maps are disadvantage
because a rapid and flexible reflection of disaster association between
the damage state and geographical location cannot be easily attained. On
the other hand, a GIS based disaster information system which represents
disaster information on a standard display device is proposed and used
for small number of disaster officers with relatively small scale of
disasters. In this paper we propose LIVEwall by tiled displayed System
based presentation and sharing platform for a large disaster case. Our
system provides aggregated functions which can visually overlay the
damage information on digital map for decision making in the disaster
case. The damage state is managed and consolidated and displayed on the
digital map on each CDH in local governments. In addition, we propose a
shared workspace on the unified shared display device to show both the
detail of indicated object and the perspicuity of whole wide area. We
consider various interactions between users and tiled display system for
both within the same CDH and inter-CDHs as design concept.
Back
to JMM Online Front Page |