ebook img

Horizons in Computer Science Research PDF

170 Pages·2015·10.593 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Horizons in Computer Science Research

************************************************************************ HORIZONS IN COMPUTER SCIENCE H C ORIZONS IN OMPUTER S R CIENCE ESEARCH V 10 OLUME No part of this digital document may be reproduced, stored in a retrieval system or transmitted in any form or by any means. The publisher has taken reasonable care in the preparation of this digital document, but makes no expressed or implied warranty of any kind and assumes no responsibility for any errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of information contained herein. This digital document is sold with the clear understanding that the publisher is not engaged in rendering legal, medical or any other professional services. **************************************************************************** ************************************************************************ HORIZONS IN COMPUTER SCIENCE Additional books in this series can be found on Nova’s website under the Series tab. Additional e-books in this series can be found on Nova’s website under the e-books tab. **************************************************************************** ************************************************************************ HORIZONS IN COMPUTER SCIENCE H C ORIZONS IN OMPUTER S R CIENCE ESEARCH V 10 OLUME THOMAS S. CLARY EDITOR New York **************************************************************************** ************************************************************************ Copyright © 2015 by Nova Science Publishers, Inc. All rights reserved. No part of this book may be reproduced, stored in a retrieval system or transmitted in any form or by any means: electronic, electrostatic, magnetic, tape, mechanical photocopying, recording or otherwise without the written permission of the Publisher. For permission to use material from this book please contact us: [email protected] NOTICE TO THE READER The Publisher has taken reasonable care in the preparation of this book, but makes no expressed or implied warranty of any kind and assumes no responsibility for any errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of information contained in this book. The Publisher shall not be liable for any special, consequential, or exemplary damages resulting, in whole or in part, from the readers’ use of, or reliance upon, this material. Any parts of this book based on government reports are so indicated and copyright is claimed for those parts to the extent applicable to compilations of such works. Independent verification should be sought for any data, advice or recommendations contained in this book. In addition, no responsibility is assumed by the publisher for any injury and/or damage to persons or property arising from any methods, products, instructions, ideas or otherwise contained in this publication. This publication is designed to provide accurate and authoritative information with regard to the subject matter covered herein. It is sold with the clear understanding that the Publisher is not engaged in rendering legal or any other professional services. If legal or any other expert assistance is required, the services of a competent person should be sought. FROM A DECLARATION OF PARTICIPANTS JOINTLY ADOPTED BY A COMMITTEE OF THE AMERICAN BAR ASSOCIATION AND A COMMITTEE OF PUBLISHERS. Additional color graphics may be available in the e-book version of this book. LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA Available upon request. ISBN: (cid:28)(cid:26)(cid:27)(cid:16)(cid:20)(cid:16)(cid:25)(cid:22)(cid:23)(cid:25)(cid:22)(cid:16)(cid:26)(cid:26)(cid:22)(cid:16)(cid:21) (eBook) ISSN: 2159-2012 Published by Nova Science Publishers, Inc. † New York **************************************************************************** ************************************************************************ CONTENTS Preface vii Chapter 1 Telecommunication Network Security 1 Muhammad Adeka, Simon Shepherd and Raed Abd-Alhameed Chapter 2 Application of Cloud Computing in Preclinical Radiation 35 Treatment Planning James Chun Lam Chow Chapter 3 Computational Cryptography Based on Phase Encoding 49 and Intensity Pattern Superposition via Optics Theory J. Apolinar Muñoz-Rodríguez Chapter 4 An Agent -Based Optimized Cloud Service Discovery System 61 Manish Dixit, Jayendra Solanki, Akshay Jain and Kaushik Shandilya Chapter 5 Computing Network Reliability with Diameter Constraints: 69 Topologies and Instances with Polynomial-Time Complexity Pablo Sartor Chapter 6 A Survey on the Open Source Tools for Modelling 111 and Implementing Enterprise Application Integration Solutions Rafael Z. Frantz, Rafael Corchuelo and Fabricia Roos-Frantz Chapter 7 A Technology Proposal to Realise Enterprise Application 131 Integration Rafael Z. Frantz, Rafael Corchuelo, Fabricia Roos-Frantz and Sandro Sawicki Index 153 **************************************************************************** ************************************************************************ **************************************************************************** ************************************************************************ PREFACE This book presents original results on the leading edge of computer science research. Each article has been carefully selected in an attempt to present substantial research results across a broad spectrum. Topics discussed include telecommunication network security; application of cloud computing in preclinical radiation treatment planning; computational cryptography based on phase encoding and intensity pattern superposition via optics theory; an agent-based optimized cloud service discovery system; computing network reliability with diameter constraints; a survey on the open source tools for modelling and implementing enterprise application integration solutions; a technology proposal to realize enterprise application integration. After having been held for long in logical and physical isolation from other systems, telecommunication networks and other elements of critical infrastructure are rapidly being assimilated into the Internet, as presented in Chapter 1. This practically defines the ubiquity of Internet as an indispensable ICT (Information and Communication Technology) infrastructural facility in this age of globalisation. Nowadays, with mere clicks using a mouse, systems including electrical grids and traffic systems are now accessible to users, regardless of their location and state of equilibrium; whether static or mobile. As a research has demonstrated, such interconnectivity is not without consequences. With the bandwidth available to most cable modems, an adversary can launch attacks capable of denying voice service to cellular telecommunications networks in major cities. In times of emergency, when such networks are essential in saving lives, such attacks could be extremely dangerous. Cloud computing refers to a set of technologies on computing and storage offered as online services. This popular high performance computing system can greatly improve the efficiency of dose calculation in radiation treatment planning using Monte Carlo simulation, involving complex and intensive mathematical computation. In radiation dose calculation, Monte Carlo method is a well-known benchmark to predict accurate and precise particle transports in heterogeneous medium such as small-animal anatomy. The main drawback is that the calculation is very time-consuming. In the past when only personal computers were used, it was not practical to use Monte Carlo calculation because a high-resolution dose calculation including a huge number of computed tomography voxels of over 1000 million may take a day to complete a preclinical treatment plan. Chapter 2 will show how cloud computing can perform preclinical treatment planning for small-animal radiation therapy research. The background and algorithm of using cloud computing in treatment planning are **************************************************************************** ************************************************************************ viii Thomas S. Clary reviewed. The performance of the computing system based on compute nodes is also evaluated. Chapter 3 presents a review of the author’s computer algorithms, which perform image encryption and decryption based on optics. This technique is implemented based on trigonometric algorithms and intensity superposition. The image to be encrypted is a reflectance map, which is obtained from the light reflected by a scene. The encryption procedure is carried out by encoding the image intensity as a phase in the argument of a cosine function. This procedure generates a fringe pattern, which produces a random pattern to obtain the secrete image. The decryption procedure is performed by recovering the phase from the secrete image. This procedure is performed via intensity superposition and a discrete sequence. Thus, the decryption retrieves the original image. The proposed cryptographic technique is performed by computer and in physically via printed images. The viability of this technique is described based on decryption quality and encryption robustness. This computational performance represents a contribution in the field of visual cryptography. The technique is tested with real scenes and its results are presented computationally and in experimental form. Cloud Computing is a technology that is being widely accepted by clients over other prevailing services in the technology field. It is a landscape-altering technology with numerous advantages, of which the success depends on a deep understanding of the risks involved and why there is need to be aware of them. Customer service is key in this, as it is becoming difficult to satisfy customer needs in a stressful environment. Therefore, efficient tools are available to provide a faster discovery of optimal composition. Since cloud-to- enterprise integration involves a complicated pattern, a method is required to smooth the path of cloud-to-cloud integration along with cloud-to-enterprise amalgamation. These patterns of integration become more complex as cloud computing becomes more pervasive. Chapter 4 presents a model for service discovery and delivery with provision for the user to consider the issues like market reputation, personal usage experience, and a poor "after-services" record. If the client discards the selected service by the algorithm, there is always the proposed model search for the next optimum service from the samples. The model incorporates a blending of the Tabu Search algorithm, utilized to evaluate constraint violation and service requirement/availability matching. Computing the reliability of a network with failing sites and links is a classical problem that belongs to the NP-hard computational complexity class. The diameter-constrained network reliability (DCR) is a generalization whose computation is NP-hard too. Several sub- problems arise when imposing conditions on K (the set of sites that must keep connected), d (the maximum allowable distance between them) or the network topology. Many keep being NP-hard even under significant restrictions. Nevertheless, certain sub-problems can be solved in polynomial time. In Chapter 5 the author’s survey the complexity of computing the DCR in terms of |K| and d, and contribute a proof of polynomiality for the case where |K| is fixed and d=2. We comment on cases not yet classified into complexity classes. We also introduce a broad family of topologies and show that its source-terminal DCR can be computed in time polynomial in the number of sites. Enterprise Application Integration aims to provide methodologies and tools to integrate the many heterogeneous applications of typical companies' software ecosystems. The reuse of these applications within the ecosystem contributes to reducing software development costs and deployment time. Studies have shown that the cost of integration is usually 5-20 times the **************************************************************************** ************************************************************************ Preface ix cost of developing new functionalities. Many companies rely on Enterprise Service Buses (ESBs) to develop their integration solutions. The first generation of ESBs focused on providing many connectors and general-purpose integration languages whose focus is on communications, not on the integration problem being solved. The second generation of ESBs provides domain-specific languages inspired by enterprise integration patterns, which makes it clear that this generation is tailored to focus on the integration problem. In Chapter 6 the author’s provide a survey of Camel, Spring Integration, and Mule, which are the most successful open source second generation ESBs in the market. We report on them within a homogeneous framework that provides a clear overview of the three technologies. All over the years, enterprises have been accumulating a variety of applications in their software ecosystem to support their business processes. As a result, a software ecosystem is an heterogeneous set of IT assets (data and functionality) of the enterprise. Enterprise Application Integration (EAI) discipline aims to provide language and tools to support the development of integration solutions. Enterprises are always looking for how to optimise the use of resources, which includes their IT assets. Thus, building EAI solutions that allow to reuse actual data and functionality is mandatory to optimise the current or to provide support for the new business processes that emerge in an enterprise. The need for building EAI solutions has been pushing the development of languages and software tools, which can be used to model, implement, and run integration solutions. In the EAI community, the support for integration patterns is a trend, both in languages and software tools. In Chapter 7 the author’s introduce a software tool to support the realisation of Enterprise Application Integration. This tool is a Java-based software development kit that the author’s provide to implement and run EAI solutions based on integration patterns. We have conducted a series of experiments to evaluate the author’s proposal against real-world integration problems and the results indicate that it is viable and can be used to solve real-world integration problems. ****************************************************************************

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.