Proceedings of the Asia-Pacific Advanced Network
Not a member yet
    134 research outputs found

    Relocatable Service Composition based on Microservice Architecture for Cloud-Native IoT-Cloud Services

    Get PDF
    With the development of the cloud, the Internet of Things (IoT) and artificial intelligence (AI) technologies, the demand for services that utilize these infrastructure technologies is explosively increasing. In recent years, to develop and verify services quickly and efficiently, traditional monolithic service has evolved to a service composition that is based on a container-based microservice architecture (MSA). In particular, IoT-Cloud services that combine the internet of Things and the cloud are appropriate to make the functions based on cloud-native computing because it requires to connect with IoT, Cloud, and AI functions flexibly. In this paper, we design relocatable service composition to develop and compose intelligent IoT-Cloud service in the cloud-native computing environment based on IoT-Cloud pattern. In addition, to verify the feasibility of the proposed approach of service composition, we apply the specific IoT-Cloud service on multi-site playground to verify mobility and usefulness. We show the proposed approach can be proved that cloud-native based service is partially adaptable to the service environment and can be operated flexibly

    Meaningful Information Extraction from Unstructured Clinical Documents

    Get PDF
    Medical concept and entity extraction from the medical narrative unstructured documents is the crucial step in most of the contemporary health systems. For the extraction of medical concepts and entities, the Unified Medical Language System (UMLS) Metathesaurus is a big source of biomedical and health-related concepts. Recently various tools like Sophia, MetaMap and cTAKES, and many other rules-based methods and algorithm like Quick UMLS etc. have been developed which are performing a successful role in the process of medical concept extraction. The goal of this paper is to design a generic algorithm to identify a package consisting of standard concepts, their semantic types, and entity types on the basis of medical phrases and terms used in the clinical unstructured documents. The proposed algorithm implements the UMLS terminology service (UTS) and customizes to extract concepts for all the meaningful phrases and terms used in the narratives and determine their semantic and entity types in order to find exact categorization of the concepts. The proposed algorithm has produced a very useful set of results to use for labeling the biomedical data, which could in term be used for training data-driven approaches such asmachine learning

    A journey from Cure to Care- Wellness management for healthy lifestyle: Diabetes management a case study

    Get PDF
    Smart ubiquitous computing has a vital role to avoid and indicate the preventable lifestyle-based chronic diseases. It is focusing to adopt a healthy lifestyle by converging science and technology in this digital world for improving health and quality of life. From the last decade, the development of wellness applications has supported personalization and self-quantification. These applications facilitate the users through activity tracking and monitoring, based on the raw sensory data to adopt healthy behavior. The challenge of behavior change is not only to indicate the issues but also provides step-by-step coaching and guidance at real time. The realization of behavior change theories through digital technology has revolutionized the lifestyle change in a systematic and measurable manner. We have proposed a methodology to understand the behavior for generating just-in-time intervention for adopting a healthy lifestyle. Wellness platform based behavior analysis is performed using unbiased life-log and questionnaire for qualitative assessment of behavior. Behavior stage wise intervention is provided to adapt behavior for enhancing the quality of life and boost the socio-economic conditions. Personalized education is provided to understand the importance of healthy behavior and motivate the users, whereas just-in-time context-based recommendations have supported the stage-wise adaptation of unhealthy behavior. These capabilities require status evaluation of the activities and an efficient way to portray the comprehensive index of lifestyle habits. The real focus is to correlate the primarily linked habits in appropriate proportion through healthy behavior index (HBI) for personalized wellness support services. The healthy behavior index and behavior change theories through smart technologies

    Analyzing Cybersecurity-related Articles in Japan's English Language Online Newspapers

    Get PDF
    Globalization has connected the nations of the world in a way never seen before. Happenings or events in one nation has the potential to impact other nations also. By collecting and analyzing cybersecurity-related articles from three major national newspapers of Japan, this research is trying to find out and understand Japan’s newspaper reporting on the cybersecurity issue. Content analysis of those cybersecurity-related articles is used to find critical themes and patterns. The content analysis found that the contention over 5G between the U.S. and China is the most critical issue in Japanese newspapers. From an international relations perspective, the issue between the U.S. and China over 5G is an adverse event represented in newspapers with words such as tussle, tech-war, and contention, but by performing sentiment analysis (content-based analysis) on the articles only related to Huawei, this research tried to find how machine categorize this issue. Then this research critically analyzed the whole 5G war between the U.S. and China and what is Japan’s perspective on it

    Proceedings of the 16th APAN Research Workshop 2019

    Get PDF
    Teck Chaw Ling, Yoshiaki Kasahar

    SDN-based Coordination for IoT-Cloud Connectivity employing Wired/Wireless Multi-Access SmartX Boxes

    Get PDF
    Diversified Internet of Things (IoT) -related services typically require networking to the cloud/edge-cloud resources to process and store data from distributed IoT device boxes. In addition, various IoT-related services encourage leveraging different access networking, so IoT device boxes having multiple interfaces are becoming typical configuration. In order to efficiently provide IoT-cloud connectivity via multiple interfaces, multi-access networking is becoming a popular research keyword. And supporting reliable data transmission  of IoT data to the cloud is an important feature of multi-access networking. In this paper, to cope with the emerging multi-access networking, we propose SmartX miniBox and SDN-based coordination functionality. SmartX miniBox is a physical box designed to support multi-access networking with SDN-enabled wired interface and OVS-integrated WiFi interfaces. And SDN-based Coordination functionality coordinates SmartX miniBox and IoT device boxes in order to enhance reliability in data transmission. The coordination includes alternating access interfaces in IoT devices boxes and changing networking paths in multi-path wired topology when networking failures occur

    Evaluation of wide-area distributed services by SDN-FIT system

    Get PDF
    A wide area distributed application is affected by network failure due to natural disasters because the servers on which the application operates are distributed geographically in a wide area. Failure Injection Testing (FIT) is a method for verifying fault tolerance of widely distributed applications. In this paper, by limiting network failures to the connection line, whole FIT scenarios are generated and exhaustive evaluation of fault tolerance is performed. Authors evaluate the visualization method of performance data obtained from this evaluation and the reduction of the fault tolerance evaluation cost by the proposed method

    A Modified Deficit Weighted Round Robin traffic Scheduling Algorithm for GPON Networks

    Get PDF
    In this paper, we propose the modified deficit weighted round robin (MDWRR) traffic scheduling algorithm for Gigabit Passive Optical Network (GPON), which guarantees the real-time priority traffic. The proposed scheduling algorithm is a variation of the deficit weighted round robin (DWRR) algorithm and it assures the highest priority traffic transmission with minimization of delay. WRR algorithm to be aware of bandwidth and improves the fairness. But for certain traffic types, fairness is not the desired behavior. To achieve predictable service for sensitive, real-time traffic, a priority level for scheduling needs to be introduced. By enabling strict priority, or by offering several priority levels and using DWRR scheduling between queues with the same priority levels, service assurance with regards to delay and loss protection can be achieved for demanding traffic types, such as voice and real-time broadcasting. By offering several priority levels and using DWRR scheduling between queues with the same priority levels, service assurance with regards to delay and loss protection can be achieved for demanding traffic types, such as voice and real-time broadcasting

    The Advancement and the Future of SD WAN (Keynote Speech)

    No full text
    Wide Area Network technologies have evolved rapidly in the past few decades from low speed packet based protocols such as X.25 to large scale services such as MPLS that have been widely deployed by carriers as a service to enterprises looking for secure and reliable connectivity. Technologies such as MPLS however are complex, expensive and resource intensive to support. Recently there has emerged a new approach to secure branch connectivity that has taken advantage of the emergence of cloud and software defined orchestration. This is known as SD WAN or Software Defined WAN. This technology is quickly evolving with many new start up tech companies bringing new products to market in an attempt to disrupt the established secure WAN footprint. This session will walk through the evolution of WAN technologies and how SD WAN emerged. It will describe the strengths and weaknesses of this new approach. Finally there will be a short demonstration of the SD WAN solution from Aruba, a Hewlett Packard Enterprise company, to help the audience better understand how this technology is changing the WAN landscape

    Detecting Suspicious Behavior of SDN Switches by Statistics Gathering with Time

    Get PDF
    In Software Defined Network (SDN), the networks are vulnerable to attacks by compromised switches, since it often used programmable software switches are vulnerable than traditional hardware switches. Although several countermeasures against compromised switches have been proposed, the accuracy of detecting malicious behavior depends on the performance of network statistics gathering by a controller. In this paper, we propose an approach to verify the consistency of forwarding state using simultaneously network statistics gathering from the switch by accurate time scheduling. Our method enables to detect attacks by compromised switches without being influenced by the performance of statistics gathering by the controller. Our method utilizes moving average thus our method mitigates the effect on the verification accuracy from the impact of switches performance such as the error of scheduling. In addition, we implemented the proposed method with Mininet, and we confirmed that our method is able to verify without depending on the performance of statistic-gathering by the controller

    116

    full texts

    134

    metadata records
    Updated in last 30 days.
    Proceedings of the Asia-Pacific Advanced Network is based in United States
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇