ebook img

Advanced Computer Science and Information Technology: Second International Conference, AST 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings PDF

204 Pages·2010·4.776 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Advanced Computer Science and Information Technology: Second International Conference, AST 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings

Communications in Computer and Information Science 74 G.S. Tomar Ruay-Shiung Chang Osvaldo Gervasi Tai-hoon Kim Samir Kumar Bandyopadhyay (Eds.) Advanced Computer Science and Information Technology Second International Conference,AST 2010 Miyazaki, Japan, June 23-25, 2010 Proceedings 1 3 VolumeEditors G.S.Tomar VITM,Indore,India E-mail:[email protected] Ruay-ShiungChang NationalDongHwaUniversity,Taiwan E-mail:[email protected] OsvaldoGervasi UniversityofPerugia,Italy E-mail:[email protected] Tai-hoonKim HannamUniversity,Daejeon,SouthKorea E-mail:[email protected] SamirKumarBandyopadhyay UniversityofCalcutta,India E-mail:[email protected] LibraryofCongressControlNumber:2010928115 CRSubjectClassification(1998):D.2,C.2,H.4,H.3,F.2,I.2,J.3 ISSN 1865-0929 ISBN-10 3-642-13345-2SpringerBerlinHeidelbergNewYork ISBN-13 978-3-642-13345-9SpringerBerlinHeidelbergNewYork Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. springer.com ©Springer-VerlagBerlinHeidelberg2010 PrintedinGermany Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper 06/3180 543210 Foreword Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Applica- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and mul- timedia applications. This co-located event included the following conferences: AST 2010 (The second International Conference on Advanced Science and Technology), ACN 2010 (The second International Conference on Advanced Communication and Networking), ISA 2010 (The 4th International Conference on Information Security and Assurance) and UCMA 2010 (The 2010 International Conference on Ubiquitous Computing and Multimedia Applications). We would like to express our gratitude to all of the authors of submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future. We acknowledge the great effort of all the Chairs and the members of advisory boards and Program Committees of the above-listed events, who selected 15% of over 1,000 submissions, following a rigorous peer-review process. Special thanks go to SERSC (Science & Engineering Research Support soCiety) for supporting these co- located conferences. We are grateful in particular to the following speakers who kindly accepted our in- vitation and, in this way, helped to meet the objectives of the conference: Hojjat Adeli (The Ohio State University), Ruay-Shiung Chang (National Dong Hwa Univer- sity), Adrian Stoica (NASA Jet Propulsion Laboratory), Tatsuya Akutsu (Kyoto Uni- versity) and Tadashi Dohi (Hiroshima University). We would also like to thank Rosslin John Robles and Maricel O. Balitanas, gradu- ate students of Hannam University, who helped in editing the material with great passion. April 2010 Tai-hoon Kim Preface We would like to welcome you to the proceedings of the Second International Con- ference on Advanced Science and Technology (AST 2010), which was held on June 23–25, 2010, at Sheraton Grande Ocean Resort, in Miyazaki, Japan. AST 2010 focused on various aspects of advances in advanced science and tech- nology with computational sciences, mathematics and information technology. It provided a chance for academic and industry professionals to discuss recent progress in the related areas. We expect that the conference and its publications will be a trig- ger for further related research and technology improvements in this important sub- ject. We would like to acknowledge the great effort of all the Chairs and members of the Program Committee. Out of around 220 submissions to AST 2010, we accepted 33 papers to be included in the proceedings and presented during the conference. This gives an acceptance ratio firmly below 15%. Seventeen of the papers accepted for AST 2010 were published in a special volume, LNCS 6059, by Springer. The remain- ing 16 accepted papers can be found in this CCIS volume. We would like to express our gratitude to all of the authors of submitted papers and to all the attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future. Once more, we would like to thank all the organizations and individuals who sup- ported this event as a whole and, in particular, helped in the success of AST 2010. April 2010 G.S. Tomar Ruay-Shiung Chang Osvaldo Gervasi Tai-hoon Kim Samir Kumar Bandyopadhyay Organization Organizing Committee Honorary Chair Hojjat Adeli (The Ohio State University, USA) General Co-chairs G.S. Tomar (VITM, India) Ruay-Shiung Chang (National Dong Hwa University, Taiwan) Program Co-chairs Osvaldo Gervasi (University of Perugia, Italy) Tai-hoon Kim (Hannam University, Korea) Samir Kumar Bandyopadhyay (University of Calcutta, India) International Advisory Board Byeong-Ho Kang (University of Tasmania, Australia) N. Jaisankar (VIT University, India) Muhammad Khurram Khan (King Saud University, Kingdom of Saudi Arabia) Seok-soo Kim (Hannam University, Korea) Wai Chi Fang (National Chiao Tung University, Taiwan) Xiaohua Hu (Drexel University, USA) Peter M.A. Sloot (University of Amsterdam, The Netherlands) Carlos Ramos (GECAD/ISEP, Portugal) Publicity Co-chairs Purnendu Das (Heritage Institute of Technology, India) Haeng-kon Kim (Catholic University of Daegu, Korea) Timothy K. Shih (Tamkang University, Taiwan) Ching-Hsien Hsu (Chung Hua University, Taiwan) Houcine Hassan (Universidad Politecnica de Valencia, Spain) Deepak Laxmi Narasimha (University of Malaya, Malaysia) Prabhat K. Mahanti (University of New Brunswick, Canada) Publication Chair Bongen Gu (Chungju National University, Korea) Local Arrangements Co-chairs Debnath Bhattacharyya (Heritage Institute of Technology, India) X Organization Program Committee Agustinus Borgy Waluyo Hironori Washizaki Luigi Buglione Ami Marowka Hyeong-Ok Lee Peter Baumann Carlos Becker Westphall Hyun Sung Kim R.Ponalagusamy Chih-Heng Ke Jemal Abawajy Ramin Yahyapour Dong-Yup Lee Jonathan Lee Robert C. Seacord El-Sayed El-Alfy Jose Alfredo F. Costa Suat Ozdemir Eric Renault José Manuel Molina Swee-Huay Heng Fangguo Zhang López Tatsuya Akutsu Farook Sattar Kaiqi Xiong Vladimir B. Kropotov Farzin Deravi Kendra M.L. Cooper Wei Zhong Fionn Murtagh Kwon S. Lee Yali Liu George Bosilca Kyung-Hyune Rhee Yang Li George A. Gravvanis Lucian N. Vintan Yannis Stamatiou Table of Contents ParallelProcessingPerformanceonMulti-CorePCClusterDistributing Communication Load to Multiple Paths ............................ 1 Takafumi Fukunaga Modeling Real-Time Applications with Reusable Design Patterns ...... 12 Saoussen Rekhis, Nadia Bouassida, and Rafik Bouaziz Optimal Total Exchange in Anonymous Cayley Graphs ............... 26 Sanghoun Oh, Adnan Mohamed, and Moongu Jeon A Variant of Naor-Pinkas Oblivious Transfer for More Efficient Authentication .................................................. 32 Yongsoo Hwang, Hyochul Chae, and Moongu Jeon Wireless Network of Collaborative Physiological Signal Devices in a U-Healthcare System ............................................. 39 Joonyoung Jung and Daeyoung Kim An Encryption Scheme for Communication Internet SCADA Components..................................................... 56 Rosslin John Robles and Tai-hoon Kim Context-Aware Based Efficient Training System Using Augmented Reality and Gravity Sensor for Healthcare Services................... 65 Seoksoo Kim, Sungmo Jung, Jae-gu Song, and Byong-Ho Kang XMDR-DAI Based on GQBP and LQBP for Business Process ......... 72 SeokJae Moon, GyeDong Jung, and YoungKeun Choi DynamicRelationManagementofHierarchicalDataforInteroperability in Distributed Environments ...................................... 86 Youn-Gyou Kook, Joon Lee, Ki-Seok Choi, and Jae-Soo Kim Change-Point Modeling with an Environmental Factor for Software Reliability Assessment and Its Application .......................... 101 Shinji Inoue and Shigeru Yamada Reliability Analysis and Optimal Release Problem Considering Maintenance Time of Software Components for an Embedded OSS Porting Phase ................................................... 113 Yoshinobu Tamura and Shigeru Yamada Optimal Policies for Random and Periodic Garbage Collections with Tenuring Threshold .............................................. 125 Xufeng Zhao, Syouji Nakamura, and Toshio Nakagawa XII Table of Contents Optimal Checking Times of Backup Operation for a Database System ......................................................... 136 Toshio Nakagawa, Kenichiro Naruse, and Sayori Maeji Comparison of Aperiodic Checkpoint Placement Algorithms........... 145 Shunsuke Hiroyama, Tadashi Dohi, and Hiroyuki Okamura Comparative Study of Simulated Annealing Algorithms for Optimal Arrangement Problems in a Linear Consecutive-k-out-of-n:F System... 157 Koji Shingyochi and Hisashi Yamamoto Tracing Stopping Point for Remaining Distance through Multi Brake Modeling in the ATO............................................. 169 K.B. Lee, Tai-hoon Kim, and Won-seok Choi A Study on Automated Context-aware Access Control Model Using Ontology ....................................................... 179 Bokman Jang, Hyokyung Jang, and Euiin Choi Ontology Based Intelligent Monitoring-ControlSystem ............... 187 Sungdo Park, Hyosik Ahn, and Euiin Choi Author Index.................................................. 195 Parallel Processing Performance on Multi-Core PC Cluster Distributing Communication Load to Multiple Paths Takafumi Fukunaga Kumamoto Prefectural College of Technology Haramizu 4455-1, Kikuyo, Kikuchi-gun, Kumamoto 869-1102, Japan [email protected] Abstract. Due to advent of powerful Multi-Core PC cluster the computation performance of each node is dramatically increassed and this trend will continue in the future. On the other hand, the use of powerful network systems (Myrinet, Infiniband, etc.) is expensive and tends to increase difficulty of programming and degrades portability because they need dedicated libraries and protocol stacks. This paper proposes a relatively simple method to improve bandwidth-oriented parallel applications by improving the communication performance without the above dedicated hardware, libraries, protocol stacks and IEEE802.3ad (LACP). Although there are similarities between this proposal and IEEE802.3ad in respect to using multiple Ethernet ports, the proposal performs equal to or better than IEEE802.3ad without LACP switches and drivers. Moreover the performance of LACP is influenced by the environment (MAC addresses, IP addresses, etc.) because its distribution algorithm uses these parameters, the proposed method shows the same effect in spite of them. Keywords: Bandwidth, Parallel processing, Bonding driver, Multi-Core, Multi GbE port. 1 Introduction In recent years, since Multi-Core PCs have become more common and inexpensive, the use of PC clusters that use them is now widespread among the business and research world and this trend will continue in the future. The computing performance increase in direct relation with the number of cores, which are linked to Gigabit Ethernet (GbE, hereafter) connections; for more than ten years this speed haven’t improved. This dis- proportion in performance between node and network in commodity PC clusters easily causes communication bottleneck for the parallel applications that transfer a large amount of data. Most of the studies that improve communication performance in PC clusters are adopting dedicated hardware and its dedicated protocol (Myrinet [1]-[2], Infiniband [3]-[5], Quadrics Network [6], DIMMnet-2 [7], RHiNET [8]-[10], PACS-CS [11]), non standard protocol (PM [12], BIP [13], FM [14], VMMC[15]) and dedicated library [16]. They increase the costs, such as hardware prices and porting work. G.S. Tomar et al. (Eds.): AST 2010, CCIS 74, pp. 1–11, 2010. © Springer-Verlag Berlin Heidelberg 2010

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.