Distributed Systems

2018


  1. The Web Was Done by Amateurs: A Reflection on One of the Largest Collective Systems Ever Engineered (), Springer, .

    BibTeX



  2. The non-existent average individual: Automated personalization in psychopathology research by leveraging the capabilities of data science (), University of Groningen, .

    BibTeX



    url
  3. Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research (, and ), In Journal of Network and Computer Applications, Elsevier, volume 114, .

    Abstract

    Anonymity services have seen high growth rates with increased usage in the past few years. Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In this survey paper, we summarize, analyze, classify and quantify 26 years of research on the Tor network. Our research shows that ‘security’ and ‘anonymity’ are the most frequent keywords associated with Tor research studies. Quantitative analysis shows that the majority of research studies on Tor focus on ‘deanonymization’ the design of a breaching strategy. The second most frequent topic is analysis of path selection algorithms to select more resilient paths. Analysis shows that the majority of experimental studies derived their results by deploying private testbeds while others performed simulations by developing custom simulators. No consistent parameters have been used for Tor performance analysis. The majority of authors performed throughput and latency analysis.


    BibTeX



    urldoi
  4. A Formal Model for Compliance Verification of Service Compositions (, and ), In Ieee transactions on services computing, volume 11, .

    Abstract

    Business processes design and execution environments increasingly need support from modular services in service compositions to offer the flexibility required by rapidly changing requirements. With each evolution, however, the service composition must continue to adhere to laws and regulations, resulting in a demand for automated compliance checking. Existing approaches, if at all, either offer only verification after the fact or linearize models to such an extent that parallel information is lost. We propose a mapping of service compositions to Kripke structures by using colored Petri nets. The resulting model allows preventative compliance verification using well-known temporal logics and model checking techniques while providing full insight into parallel executing branches and the local next invocation. Furthermore, the mapping causes limited state explosion, and allows for significant further model reduction. The approach is validated on a case study from a telecom company in Australia and evaluated with respect to performance and expressiveness. We demonstrate that the proposed mapping has increased expressiveness while being less vulnerable to state explosion than existing approaches, and show that even large service compositions can be verified preventatively with existing model checking techniques.


    Keywords: Service Composition, Business process, Compliance, Verification, Temporal Logic, Colored Petri net, Kripke structure, COMPLIANCE-CHECKING, BUSINESS, SPECIFICATION, SUPPORT


    BibTeX



    urlpdfdoi
  5. Fast and Energy-Efficient CNFET Adders with CDM and Sensitivity-Based Device-Circuit Co-Optimization (, and ), In IEEE Transactions on Nanotechnology, volume 17, .

    Abstract

    Since integrated circuit technology entered into the nanoscale regime, energy efficiency has become one of the most significant challenges. The carbon nanotube field effect transistor (CNFET) is one of the highly appreciated nanoscale devices for replacement due to its similar process to the current CMOS technology. The big question in this paper is what are the other specific controllable parameters in CNFET technology for designers to design high-performance and energy-efficient circuits and how much these parameters impact the circuit characteristics? In this regard, two energy-efficient full adders, as the crucial building blocks of digital systems, in 32 nm CNFET technology are designed. Cell design methodology as an efficient logic style is used for the new designs, and CNFET-SEA is used for the optimization. The CNFET-SEA, which is a modification of simple exact algorithm (SEA), is proposed as an appropriate sizing algorithm for circuits in CNFET technology. The sensitivity analysis, as a new approach, is used in the CNFET-SEA algorithm to obtain better sizing results in shorter runtime. The number of tubes, the diameter of tubes, and pitch are considered as the three specific device parameters in the CNFET technology for device-circuit co-optimization, and their effect on the circuit characteristics is investigated. The simulation results show a 15-97% delay, 8-87% power-delay product (PDP), and 22-99% energy-delay product improvement for the proposed full adders compared with the referenced ones. The PDP optimization with CNFET-SEA in comparison with SEA shows 11-20% improvement with a significant runtime reduction for selected adders.


    BibTeX



    urldoi
  6. Zero-queue ethernet congestion control protocol based on available bandwidth estimation (, and ), In Journal of Network and Computer Applications, Elsevier, volume 105, .

    BibTeX



  7. Multi-User Low Intrusive Occupancy Detection (, , and ), In Sensors, MDPI, volume 18, .

    BibTeX



    urldoi
  8. Topological Considerations on Decentralised Energy Exchange in the Smart Grid ( and ), In Procedia Computer Science, volume 130, .

    BibTeX



    urldoi
  9. Learning behind glass walls: learning style and partition-room, is there a correlation? (, , and ), In International Journal of Innovation Science, .

    Abstract

    © 2018, Emerald Publishing Limited. Purpose: This study aims to investigate how a very particular learning environment, namely, partition rooms, affect students’ teaching experience and further explore if students’ learning styles is a pertinent determinant. Partition rooms are very common in Saudi Arabia when lectures are held by male instructors for female students. The male instructor delivers his lesson behind a glass wall, creating an environment of limited visual and auditory interaction. Various digital tools are present, meant to overcome the gap caused by the lack of direct student–teacher contact. Design/methodology/approach: The researchers collected data from a sample of 109 female students who are studying at Level 4 Computer Science Department, College of Computer Sciences and Information Technology, at a public university in Saudi Arabia. All of them experienced a minimum of two courses undertaken in a partition room. The survey consists of two parts with a total of 53 questions. The first 20 questions were adopted from the perceptual learning style preference questionnaire (PLSP). Findings: Research findings reveal that students are affected differently by the various dimensions of the partition room depending on their learning style. Originality/value: There are fewer results in the literature that study learners of our particular group, namely, Saudi females. The study focuses on students studying IT and related fields. This study is almost unique, as most studies of the kind are related to the experience of females learning English as a foreign language. Therefore, the authors’ research gives much-needed insight into the conditions and perceptions of female students studying toward their degree in a technical field.


    Keywords: Cultural specific education, Educational technology, Female education, Learning environment, Partition room, Saudi education, Technology efficacy


    BibTeX



    doi
  10. A smarter electricity grid for the Eastern Province of Saudi Arabia: Perceptions and policy implications (, , and ), In Utilities Policy, volume 50, .

    Abstract

    © 2017 Elsevier Ltd Saudi Arabia aspires to transition toward a smarter electricity grid with increased reliance on renewable energy, where customers will use or produce green energy and where smart meters will enable customers to tailor their behavior and decrease their carbon footprint. The success of the transition is dependent on householder acceptance. This research studies the public's disposition toward a smarter grid. The Eastern Province of Saudi Arabia is taken as a case study through a field questionnaire to assess public knowledge about energy sources and environmental impacts on the environments, people's disposition toward a smarter electric grid, and the main motivations for undergoing this transition. A logit model is used to investigate determinants. Stated willingness is taken as a variable representing an individual's disposition. We found that the public is willing to use green energy, accept smart meters, or become co-producers. However, their fear of unknown technologies and perceptions about their high cost are major obstacles to their adoption. Enhancive knowledge, especially about ecological sensitivity, and governmental incentives will help to win public acceptance. Also, government subsidies that lower prices should be cut and dynamic pricing should be implemented to motivate electricity saving behavior.


    Keywords: Kingdom of Saudi Arabia, Renewable energy, Residential area, Smart grid, Smart metering, Social acceptance, Solar energy


    BibTeX



    doi
  11. Exploring the emotional dynamics of subclinically depressed individuals with and without anhedonia: An experience sampling study (, , , , and ), In Journal of Affective Disorders, volume 228, .

    BibTeX



    urldoi
  12. Topological Considerations on the Use of Batteries to Enhance the Reliability of HV-Grids (, , and ), In Journal of Energy Storage, volume 18, .

    BibTeX



    urldoi
  13. A task-based greedy scheduling algorithm for minimizing energy of mapreduce jobs ( and ), In Journal of grid computing, Springer NetherlandsHadadianNejadYousefi, volume 16, .

    BibTeX



  14. Adaptive Provisioning of Heterogeneous Cloud Resources for Big Data Processing (, , , and ), In Big Data and Cognitive Computing, volume 2, .

    BibTeX



    doi
  15. The impact of digital technology on female students' learning experience in partition-rooms: Conditioned by social context (, , and ), In IEEE Transactions on Education, volume 61, .

    Abstract

    Contribution: As expected, a partition-room environment negatively affects students' learning. An unexpected result of this study is that female students occasionally choose not to use the technology available in partition-rooms, to avoid undesirable facial exposure. Background: The main purpose of partition-rooms is to prevent male instructors from seeing female students' faces. In learning environments where instructors and students are physically separated, technology is expected to play an integral role in bridging the gap. In one side of partition-rooms, female students use their own mobile devices, such as laptops, tablets and mobile phones, for course activities and communication; in the other side, the instructor has various digital teaching equipment provided by the institution. Research Question: What effect does a partition-room's physical environment have on female students' academic performance, satisfaction, technology efficacy, and perceived learning? What effect does a partition-room's social environment have on female students' academic performance, satisfaction, technology efficacy, and perceived learning? Methodology: Both quantitative and qualitative approaches were followed. Quantitative results were obtained from a student questionnaire. Qualitative data was gathered in a focus group session. Findings: The communication benefits offered by technology are impaired by both the physical context and the cultural-social context. The latter emerged during focus group discussions where students said that their faces might by revealed in the light emitted by their devices. Thus, local culture and social context limit the benefits of using digital technology in the classroom.


    BibTeX



    doi
  16. Personalized Physical Activity Coaching: A Machine Learning Approach (, , , and ), In Sensors, volume 18, .

    BibTeX



    urldoi
  17. Robustness of reconfigurable complex systems by a multi-agent simulation: Application on power distribution systems (, , , and ), In 2018 Annual IEEE International Systems Conference (SysCon), .

    BibTeX



    doi
  18. Low-power Appliance Recognition using Recurrent Neural Networks (, , and ), In Applications of Intelligent Systems, .

    BibTeX



  19. A remotely piloted aerial system for a faster processing of traffic collisions towards reducing the resulting road congestion (, and ), In , .

    Abstract

    This paper presents the motivation, design, implementation, and testing of a remotely piloted aerial system, designed to facilitate police officers processing traffic collisions. A drone remotely controlled by the police officer can reach faster the accident scene and act as the police officer's eye, ear, and voice in the sky. A complete system prototype has been constructed and tested to validate the proposed system. The results show that the system performance is promising in terms of system functionality, safety, and cost.


    BibTeX



    doi
  20. Household CO2-efficient energy management ( and ), In Energy Informatics, Springer, .

    BibTeX



  21. Mining Sequential Patterns for Appliance Usage Prediction (, , , and ), In International Conference on Smart Cities and Green ICT Systems, .

    BibTeX



  22. Modeling 911 emergency events in Cuenca-Ecuador using geo-spatial data (, , and ), In International Conference on Technology Trends, .

    BibTeX



  23. LOD-GF: an integral linked open data generation framework (, , , , , and ), In Conference on Information Technologies and Communication of Ecuador, .

    BibTeX



  24. One for All, All for One: A Heterogeneous Data Plane for Flexible P4 Processing ( and ), In IEEE 26th International Conference on Network Protocols (ICNP), IEEE, .

    BibTeX



    doi