852 research outputs found

    Development of domestic and international computer forensics

    Get PDF
    With the increasing of computer crime, instant emergence of new digital product, new computer technology and computer forensics technology is promoted, developed constantly. This paper described basic information/content of computer forensics, and elaborated the development of current computer forensics at domestic and overseas market. The trends of computer forensics are pointed out and recent hot topics of research are introduced. ยฉ 2011 IEEE.published_or_final_versionThe 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2011), Dalian, China, 14-16 October 2011. In Proceedings of the 7th IIH-MSP, 2011, p. 388-39

    Cloud-based data-intensive framework towards fault diagnosis in large-scale petrochemical plants

    Get PDF
    Industrial Wireless Sensor Networks (IWSNs) are expected to offer promising monitoring solutions to meet the demands of monitoring applications for fault diagnosis in large-scale petrochemical plants, however, involves heterogeneity and Big Data problems due to large amounts of sensor data with high volume and velocity. Cloud Computing is an outstanding approach which provides a flexible platform to support the addressing of such heterogeneous and data-intensive problems with massive computing, storage, and data-based services. In this paper, we propose a Cloud-based Data-intensive Framework (CDF) for on-line equipment fault diagnosis system that facilitates the integration and processing of mass sensor data generated from Industrial Sensing Ecosystem (ISE). ISE enables data collection of interest with topic-specific industrial monitoring systems. Moreover, this approach contributes the establishment of on-line fault diagnosis monitoring system with sensor streaming computing and storage paradigms based on Hadoop as a key to the complex problems. Finally, we present a practical illustration referred to this framework serving equipment fault diagnosis systems with the ISE

    Asymmetric Peer Influence in Smartphone Adoption in a Large Mobile Network

    Get PDF
    Understanding adoption patterns of smartphones is of vital importance to telecommunication managers in todayโ€™s highly dynamic mobile markets. In this paper, we leverage the network structure and specific position of each individual in the social network to account for and measure the potential heterogeneous role of peer influence in the adoption of the iPhone 3G. We introduce the idea of coreperiphery as a meso-level organizational principle to study the social network, which complements the use of centrality measures derived from either global network properties (macro-level) or from each individual\u27s local social neighbourhood (micro-level). Using millions of call detailed records from a mobile network operator in one country for a period of eleven months, we identify overlapping social communities as well as core and periphery individuals in the network. Our empirical analysis shows that core users exert more influence on periphery users than vice versa. Our findings provide important insights to help identify influential members in the social network, which is potentially useful to design optimal targeting strategies to improve current network-based marketing practices

    ๋ชจ๋ฐ”์ผ ์†Œ์…œ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž๊ฐ„ ๊ธฐํšŒ์ ์ธ ๊ณต์œ ๊ธฐ๋ฐ˜ํŠธ๋ž˜ํ”ฝ ์˜คํ”„๋กœ๋”ฉ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2013. 8. ์ตœ์–‘ํฌ.์ตœ๊ทผ ๋ชจ๋ฐ”์ผ ํŠธ๋ž˜ํ”ฝ์˜ ๋น ๋ฅธ ์ฆ๊ฐ€๋Š” ์ด๋™ํ†ต์‹  ์‚ฌ์—…์ž์—๊ฒŒ ์‹ฌ๊ฐํ•œ ๋ฌธ์ œ๊ฐ€ ๋˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋‹จ๊ฑฐ๋ฆฌ ํ†ต์‹  ๊ธฐ์ˆ  ๋ฐ ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ ๋“ฑ์„ ์ด์šฉํ•˜์—ฌ ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ๋ฐ์ดํ„ฐ๋ฅผ ์ฃผ๊ณ  ๋ฐ›๋Š” ์˜คํ”„๋กœ๋”ฉ ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๊ฐ€ ์ด๋ฃจ์–ด์ง€๊ณ  ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ํ†ต์‹ ์„ ํ†ตํ•œ ํšจ์œจ์ ์ธ ์ฝ˜ํ…์ธ  ๊ณต์œ  ๋ฐ ์˜คํ”„๋กœ๋”ฉ ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•˜๊ณ ์ž ํ•œ๋‹ค. ์ฒซ๋ฒˆ์งธ ์—ฐ๊ตฌ๋กœ, ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ์ „์†ก๊ธฐํšŒ๋ฅผ ํ™œ์šฉํ•ด ๋ฐ์ดํ„ฐ๋ฅผ ๊ณต์œ ํ•˜๋Š” ๋ชจ๋ฐ”์ผ ํŠธ๋ž˜ํ”ฝ ์˜คํ”„๋กœ๋”ฉ์˜ ํ•ต์‹ฌ ๊ธฐ์ˆ ์ธ TOSS๋ฅผ ์ œ์•ˆ ํ•˜์˜€๋‹ค. TOSS์—์„œ๋Š” ์…€๋ฃฐ๋Ÿฌ ๋„คํŠธ์›Œํฌ์—์„œ ๊ธ‰์†ํžˆ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ๋Š” ํŠธ๋ž˜ํ”ฝ์œผ๋กœ ์ธํ•œ ๋„คํŠธ์›Œํฌ ๊ณผ๋ถ€ํ•˜๋ฅผ ๊ฒฝ๊ฐ์‹œํ‚ค๊ธฐ ์œ„ํ•ด ์˜จ๋ผ์ธ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž์˜ ์—ฐ๊ฒฐ์„ฑ ๋ฐ ์˜คํ”„๋ผ์ธ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž์˜ ์ด๋™์„ฑ์„ ๊ณ ๋ คํ•˜์—ฌ ์ฝ˜ํ…์ธ ๋ฅผ ์ „๋‹ฌํ•  ์‚ฌ์šฉ์ž๋ฅผ ๊ฒฐ์ •ํ•˜๊ณ  ๋ธ”๋ฃจํˆฌ์Šค๋‚˜ ์™€์ดํŒŒ์ด ๋‹ค์ด๋ ‰ํŠธ ๋“ฑ์˜ ๊ธฐ์ˆ ์„ ์ด์šฉํ•ด ์ฝ˜ํ…์ธ ๋ฅผ ์ง์ ‘ ์ „๋‹ฌ ํ•˜์˜€๋‹ค. ๋˜ํ•œ ์†Œ์…œ๋„คํŠธ์›Œํฌ ์„œ๋น„์Šค ์‚ฌ์šฉ์ž์˜ ์„œ๋กœ ๋‹ค๋ฅธ ์ฝ˜ํ…์ธ  ์ ‘๊ทผ ํŒจํ„ด, ์ฆ‰ ๊ฐ ์‚ฌ์šฉ์ž๊ฐ€ ์ฝ˜ํ…์ธ  ์ƒ์„ฑ์œผ๋กœ๋ถ€ํ„ฐ ์˜คํ”„๋กœ๋”ฉ์„ ์œ„ํ•ด ์ฝ˜ํ…์ธ ์— ์ ‘๊ทผํ•˜๊ธฐ๊นŒ์ง€์˜ ์‹œ๊ฐ„์„ ๊ณ ๋ ค ํ•˜์˜€๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์ด๋Ÿฌํ•œ ์š”๊ฑด์„ ๊ณ ๋ คํ•˜์—ฌ ํŠธ๋ž˜ํ”ฝ ์˜คํ”„๋กœ๋”ฉ๊ณผ ์ฝ˜ํ…์ธ  ํ™•์‚ฐ์„ ๋ชจ๋ธ๋งํ•˜๊ณ  ๋ถ„์„ ํ•˜์˜€๋‹ค. ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์˜ ๋ฐ์ดํƒ€ ์…‹์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๋ถ„์„ ๊ฒฐ๊ณผ์—์„œ TOSS๋Š” ๋ชจ๋“  ์‚ฌ์šฉ์ž์˜ ๋”œ๋ ˆ์ด ์š”๊ตฌ์กฐ๊ฑด์„ ๋งŒ์กฑ์‹œํ‚ค๋ฉด์„œ ์ตœ๋Œ€ 86.5์˜ ์…€๋ฃฐ๋Ÿฌ ํŠธ๋ž˜ํ”ฝ์„ ๊ฒฝ๊ฐ์‹œํ‚ค๋Š” ๊ฒƒ์„ ๋ณด์˜€๋‹ค. ๋‘๋ฒˆ์งธ์˜ ์—ฐ๊ตฌ์—์„œ๋Š” ๋ชจ๋ฐ”์ผ ๋„คํŠธ์›Œํฌ์—์„œ ๋ฉ€ํ‹ฐ์…€์„ ๊ณ ๋ คํ•˜์—ฌ ์ฝ˜ํ…์ธ ๋ฅผ ๋ฐฐํฌํ•˜๋Š” ํ”„๋ ˆ์ž„์›Œํฌ์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋ฅผ ์ง„ํ–‰ ํ•˜์˜€๋‹ค. ํ•ด๋‹น ํ”„๋ ˆ์ž„์›Œํฌ์—์„œ ์ฝ˜ํ…์ธ ๋Š” ์…€๋ฃฐ๋Ÿฌ ๋งํฌ์™€ ๋ชจ๋ฐ”์ผ ์‚ฌ์šฉ์ž๊ฐ„ ๋กœ์ปฌ ๋งํฌ๋ฅผ ํ†ตํ•ด ํ‘ธ์‹œ-๊ณต์œ  ๊ธฐ๋ฐ˜์˜ ํ†ต์‹ ์œผ๋กœ ์ „๋‹ฌ ๋˜์˜€๋‹ค. ์ด๋Ÿฌํ•œ ๊ธฐ๋ฒ•์„ ๋ฐ”ํƒ•์œผ๋กœ multi-compartment ๋ชจ๋ธ์„ ์ด์šฉํ•˜์—ฌ ์…€ ๊ฐ„ ํ•ธ๋“œ์˜ค๋ฒ„ ๋ฐ ์ฝ˜ํ…์ธ  ์ „๋‹ฌ์„ ๋ชจ๋ธ๋ง ๋ฐ ๋ถ„์„ํ•˜๊ณ , ์ฝ˜ํ…์ธ  ์ „๋‹ฌ ๋”œ๋ ˆ์ด์™€ ์—๋„ˆ์ง€ ์†Œ๋ชจ ์‚ฌ์ด์˜ trade-off๋ฅผ ์ˆ˜ํ•™์ ์ธ ์ตœ์ ํ™” ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•˜์—ฌ ํ•ด๊ฒฐ ํ•˜์˜€๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ด์™€ ๊ฐ™์ด ๊ธฐ์กด์˜ ์ธก์ • ์—ฐ๊ตฌ์— ๊ธฐ๋ฐ˜ํ•œ trace-driven ๋ถ„์„, ๋ชจ๋ธ๋ง ๋ฐ ์‹œ์Šคํ…œ ์ตœ์ ํ™”์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ์ „์†ก์„ ํ†ตํ•œ ์˜คํ”„๋กœ๋”ฉ ๊ธฐ๋ฒ•์ด ๊ณ ํšจ์œจ์ ์ž„์„ ๋ณด์˜€๋‹ค. ๋˜ํ•œ ๋ณธ ๋…ผ๋ฌธ์€ ์ œ์•ˆ๋œ ๊ธฐ๋ฒ•์˜ ์ƒ์šฉํ™” ์ „๋ง ๋ฐ ์ด๋ฅผ ์œ„ํ•œ ์ด์Šˆ๋“ค์— ๋Œ€ํ•œ ๋…ผ์˜๋„ ํฌํ•จ ํ•˜์˜€๋‹ค.The fast increasing traffic demand becomes a serious concern of mobile network operators. To solve this traffic explosion problem, there have been efforts to offload the traffic from cellular links to local short-range communications among mobile users that are moving around and forming mobile social networks. In my thesis, I mainly focus on the user-to-user opportunistic sharing and try to elaborate its effectiveness and efficiency for to offload mobile traffic. In the first work, I propose the Traffic Offloading assisted by Social network services via opportunistic Sharing in mobile social networks, TOSS. In TOSS, initially a subset of mobile users are selected as initial seeds depending on their content spreading impact in online social network services (SNSs) and their mobility patterns in offline mobile social networks (MSNs). Then users share the content via opportunistic local connectivity (e.g., Bluetooth, Wi-Fi Direct) with each other. Due to the distinct access patterns of individual SNS users, TOSS further exploits the user-dependent access delay between the content generation time and each user's access time for the purpose of traffic offloading. I model and analyze process of the traffic offloading and content spreading by taking into account various options in linking SNS and MSN data sets. The trace-driven evaluation shows that TOSS can reduce up to 86.5% of the cellular traffic while satisfying the access delay requirements of all users. In the second work, I focus on the analytical research on Push-Share framework for content disseminating in mobile networks. One content is firstly pushed the to a subset of subscribers via cellular links, and mobile users spread the content via opportunistic local connectivity. I theoretically model and analyze how the content can be disseminated, where handovers are modeled based on the multi-compartment model. I also formulate the mathematical optimization framework, by which the trade-off between the dissemination delay and the energy cost is explored. Based on the measurement study, trace-driven analysis, theoretical modeling and system optimization in above papers, the traffic offloading by user-to-user opportunistic sharing in mobile social networks is proved to be effective and efficient. Additionally, further discussions on the practical deployment, future vision, and open issues are discussed as well.Abstract i I. Introduction 1 II. RelatedWork 7 2.1 Opportunistic Sharing in DTNs/MSNs 7 2.2 Mobile Traffic Offloading 9 2.3 Information/Content Spreading in SNSs 10 III. TOSS 13 3.1 Framework Details 13 3.1.1 Preliminaries 13 3.1.2 Spreading Impact in the Online SNS 16 3.1.3 Access Delays of Users in the SNS 18 3.1.4 Mobility Impact in the Offline MSN 21 3.2 System Optimization 25 3.3 Trace-Driven Measurement 26 3.3.1 Measurement of the Online SNS 26 3.3.2 Measurement of Offline MSNs, ฮปi j and IM 33 3.3.3 Content Obtaining Delays 36 3.3.4 How C Impacts the Obtaining Delay 38 3.4 Performance Evaluation 39 3.4.1 How C Impacts the Total Access Utility 39 3.4.2 Satisfying 100%, 90%, and 80% of Users 44 3.4.3 On-Demand Delivery 47 3.5 Conclusion 48 IV. Push-Share 50 4.1 Framework Details 50 4.2 System Model 53 4.3 Content Dissemination in Single Cell 56 4.3.1 Content Dissemination by Sharing Only 57 4.3.2 Content Dissemination with Initial Push and Final Push 59 4.3.3 Content Dissemination Energy Cost 62 4.4 Content Dissemination in Multiple Cells 63 4.4.1 Non-steady-state Modeling of MSs in Multiple Cells 66 4.4.2 Steady-State Modeling of MSs in Multiple Cells 66 4.4.3 How Handovers Affect the Content Dissemination 67 4.5 Optimization Framework 69 4.5.1 Minimum Dissemination Completion Delay 69 4.5.2 Minimum Dissemination Completion Cost 70 4.5.3 Conjunctive Minimization of Delay and Cost 71 4.6 Evaluation Results 73 4.6.1 Content Dissemination within One Single Cell 74 4.6.2 Content Dissemination within Multiple Cells 77 4.6.3 Optimization Framework 80 4.7 Conclusion 82 V. Summary and Future Work 84 5.1 A Comparison with Traffic Offloading based on Wi-Fi APs 85 5.2 Practical Deployment and Application 86 5.3 Future Work and Vision 88 Bibliography 90Docto

    Music festival motivation in China: free the mind

    Get PDF
    This paper explores the extent to which music festival attendance is โ€˜universallyโ€™ motivated or determined by the Chinese cultural and socio-political context. A novel qualitative approach was employed comprising observation of social media conversations and โ€˜chat roomโ€™ interviews with members of a festival online community. Seven motivators were identified, some similar to those in Western studies but others more specific to festival-goers in Mainland China. The culturally specific motivators were identified as โ€˜spiritual escapeโ€™ and โ€˜spiritual pursuitโ€™ and the universal motivators as โ€˜togethernessโ€™, โ€˜love of the musicโ€™, โ€˜novel experienceโ€™, โ€˜music sharingโ€™ and โ€˜educational enrichmentโ€™. This paper focuses on the two culturally embedded motivators only. The implications of the study are that, although, growing, there are still very few music festivals featuring โ€˜popโ€™ or โ€˜westernโ€™ style music and these few are relatively new to Chinese people. Their attendance at them is, therefore, motivated differently to attendees at similar festivals in western countries. These motivating factors are mediated by the particular social, political and cultural factors at work in this complex country. The findings indicate that although many of the motivational factors for attending a music festival appear to be universal, there are clearly factors which are culturally bound and therefore unique to the cultural context. These differences appear to be created by the social constraints, rapidly changing economy and the many contradictions inherent in modern Mainland China. These conditions create a greater contrast between everyday life in Mainland China and the liminal hedonistic space provided by the festival. Further research is needed to validate theses initial findings within China and to explore how rock music festival motivations differ in other non-western cultures

    Delay analysis of social group multicast-aided content dissemination in cellular system

    No full text
    Based on the common interest of mobile users (MUs) in a social group, the dissemination of content across the social group is studied as a powerful supplement to conventional cellular communication with the goal of improving the delay performance of the content dissemination process. The content popularity is modelled by a Zipf distribution in order to characterize the MUsโ€™ different interests in different contents. The Factor of Altruism (FA) terminology is introduced for quantifying the willingness of content owners to share their content. We model the dissemination process of a specific packet by a pure-birth based Markov chain and evaluate the statistical properties of both the networkโ€™s dissemination delay as well as of the individual user-delay. Compared to the conventional base station (BS)- aided multicast, our scheme is capable of reducing the average dissemination delay by about 56.5%. Moreover, in contrast to the BS-aided multicast, increasing the number of MUs in the target social group is capable of reducing the average individual userdelay by 44.1% relying on our scheme. Furthermore, our scheme is more suitable for disseminating a popular piece of content
    • โ€ฆ
    corecore