首页 > 最新文献

Journal of Innovation in Digital Ecosystems最新文献

英文 中文
Mining online political opinion surveys for suspect entries: An interdisciplinary comparison 从可疑条目中挖掘在线政治民意调查:跨学科比较
Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.11.003
Costantinos Djouvas , Fernando Mendez , Nicolas Tsapatsoulis

Filtering data generated by so-called Voting Advice Applications (VAAs) in order to remove entries that exhibit unrealistic behavior (i.e., cannot correspond to a real political view) is of primary importance. If such entries are significantly present in VAA generated datasets, they can render conclusions drawn from VAA data analysis invalid. In this work we investigate approaches that can be used for automating the process of identifying entries that appear to be suspicious in terms of a users’ answer patterns. We utilize two unsupervised data mining techniques and compare their performance against a well established psychometric approach. Our results suggest that the performance of data mining approaches is comparable to those drawing on psychometric theory with a fraction of the complexity. More specifically, our simulations show that data mining techniques as well as psychometric approaches can be used to identify truly ‘rogue’ data (i.e., completely random data injected into the dataset under investigation). However, when analysing real datasets the performance of all approaches dropped considerably. This suggests that ‘suspect’ entries are neither random nor clustered. This finding poses some limitations on the use of unsupervised techniques, suggesting that the latter can only complement rather than substitute existing methods to identifying suspicious entries.

过滤由所谓的投票建议应用程序(VAAs)生成的数据,以删除那些表现出不现实行为(即不能符合真实政治观点)的条目,这是至关重要的。如果这些条目在VAA生成的数据集中大量存在,它们会使VAA数据分析得出的结论无效。在这项工作中,我们研究了可用于自动识别在用户回答模式方面似乎可疑的条目的过程的方法。我们利用两种无监督数据挖掘技术,并将其性能与一种成熟的心理测量方法进行比较。我们的研究结果表明,数据挖掘方法的性能可以与那些利用心理测量理论的方法相媲美,只是复杂性的一小部分。更具体地说,我们的模拟表明,数据挖掘技术以及心理测量方法可以用来识别真正的“流氓”数据(即,完全随机的数据注入到正在调查的数据集中)。然而,当分析真实数据集时,所有方法的性能都大幅下降。这表明“可疑”条目既不是随机的,也不是聚集的。这一发现对使用无监督技术提出了一些限制,表明后者只能补充而不是替代现有的方法来识别可疑条目。
{"title":"Mining online political opinion surveys for suspect entries: An interdisciplinary comparison","authors":"Costantinos Djouvas ,&nbsp;Fernando Mendez ,&nbsp;Nicolas Tsapatsoulis","doi":"10.1016/j.jides.2016.11.003","DOIUrl":"10.1016/j.jides.2016.11.003","url":null,"abstract":"<div><p>Filtering data generated by so-called Voting Advice Applications (VAAs) in order to remove entries that exhibit unrealistic behavior (i.e., cannot correspond to a real political view) is of primary importance. If such entries are significantly present in VAA generated datasets, they can render conclusions drawn from VAA data analysis invalid. In this work we investigate approaches that can be used for automating the process of identifying entries that appear to be suspicious in terms of a users’ answer patterns. We utilize two unsupervised data mining techniques and compare their performance against a well established psychometric approach. Our results suggest that the performance of data mining approaches is comparable to those drawing on psychometric theory with a fraction of the complexity. More specifically, our simulations show that data mining techniques as well as psychometric approaches can be used to identify truly ‘rogue’ data (i.e., completely random data injected into the dataset under investigation). However, when analysing real datasets the performance of all approaches dropped considerably. This suggests that ‘suspect’ entries are neither random nor clustered. This finding poses some limitations on the use of unsupervised techniques, suggesting that the latter can only complement rather than substitute existing methods to identifying suspicious entries.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 172-182"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.11.003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121070336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
QoS-Aware approach to monitor violations of SLAs in the IoT 在物联网中监控违反sla的qos感知方法
Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.010
Mohammed Alodib

The Internet of Things (IoT) is an ecosystem comprising interrelated wireless devices. Web services developed over Service oriented Architectures (SoA) are among the most promising solution to facilitate the communication of things in the IoT. Web services interact with each other, irrespective of features such as operating system, or programming language. One of the main challenges facing such a platform is the declaration of SLAs, and the monitoring of violations. This is because the IoT allows users to build large, distributed, and complex applications. Therefore, it critical to develop a method to facilitate the supervision and management of SLAs. The method proposed in this paper aims to automate the generation of a QoS-Aware service, providing real-time monitoring. The algorithm used to produce the service is inspired by the diagnosability theory of Discrete Event System (DES). In this approach, the SLAs defined by users are automatically mapped into a UML QoS model. The SoA composite application for each site is then mapped into a Petri net. The UML QoS model is then transferred and combined with the Petri net model. An algorithm to compute the QoS-Aware service is then applied to the Petri net model, and the service produced finally incorporated into the system.

物联网(IoT)是一个由相互关联的无线设备组成的生态系统。基于面向服务的体系结构(SoA)开发的Web服务是促进物联网中事物通信的最有前途的解决方案之一。Web服务彼此交互,而不考虑操作系统或编程语言等特性。这种平台面临的主要挑战之一是sla的声明和违反的监视。这是因为物联网允许用户构建大型、分布式和复杂的应用程序。因此,开发一种便于sla监督和管理的方法至关重要。本文提出的方法旨在自动生成qos感知服务,提供实时监控。产生服务的算法受到离散事件系统(DES)可诊断性理论的启发。在这种方法中,用户定义的sla被自动映射到UML QoS模型中。然后将每个站点的SoA组合应用程序映射到Petri网中。UML QoS模型随后被转移并与Petri网模型相结合。然后将计算qos感知服务的算法应用于Petri网模型,并最终将生成的服务合并到系统中。
{"title":"QoS-Aware approach to monitor violations of SLAs in the IoT","authors":"Mohammed Alodib","doi":"10.1016/j.jides.2016.10.010","DOIUrl":"10.1016/j.jides.2016.10.010","url":null,"abstract":"<div><p>The Internet of Things (IoT) is an ecosystem comprising interrelated wireless devices. Web services developed over Service oriented Architectures (SoA) are among the most promising solution to facilitate the communication of things in the IoT. Web services interact with each other, irrespective of features such as operating system, or programming language. One of the main challenges facing such a platform is the declaration of SLAs, and the monitoring of violations. This is because the IoT allows users to build large, distributed, and complex applications. Therefore, it critical to develop a method to facilitate the supervision and management of SLAs. The method proposed in this paper aims to automate the generation of a QoS-Aware service, providing real-time monitoring. The algorithm used to produce the service is inspired by the diagnosability theory of Discrete Event System (DES). In this approach, the SLAs defined by users are automatically mapped into a UML QoS model. The SoA composite application for each site is then mapped into a Petri net. The UML QoS model is then transferred and combined with the Petri net model. An algorithm to compute the QoS-Aware service is then applied to the Petri net model, and the service produced finally incorporated into the system.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 197-207"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134220354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
CogWatch: Automatic prompting system for stroke survivors during activities of daily living CogWatch:中风幸存者日常生活活动的自动提示系统
Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.003
Emilie M.D. Jean-Baptiste , Pia Rotshtein , Martin Russell

This paper presents CogWatch - an automatic prompting system designed to guide stroke survivors during activities of daily living, such as tea-making. In order to provide guidance during such activities, CogWatch needs to plan which optimal action should be done by users at each step of the task, and detect potential errors in their behavior. This paper focuses on the CogWatch Task Manager, which contains the modules responsible for action planning and human’s error detection under uncertainty. We first give an overview of the global assistive system where the Task Manager is implemented, and explain how it can interact with a user during the tea-making task. We then analyze how novel algorithms allow the Task Manager to increase the system’s performance.

本文介绍了CogWatch——一个自动提示系统,旨在指导中风幸存者进行日常生活活动,如泡茶。为了在这些活动中提供指导,CogWatch需要计划用户在任务的每个步骤中应该执行哪些最佳操作,并检测他们行为中的潜在错误。本文重点研究了CogWatch任务管理器,该任务管理器包含了行动计划和不确定情况下人为错误检测两个模块。我们首先概述了任务管理器实现的全局辅助系统,并解释了它如何在泡茶任务期间与用户交互。然后,我们分析了新的算法如何允许任务管理器提高系统的性能。
{"title":"CogWatch: Automatic prompting system for stroke survivors during activities of daily living","authors":"Emilie M.D. Jean-Baptiste ,&nbsp;Pia Rotshtein ,&nbsp;Martin Russell","doi":"10.1016/j.jides.2016.10.003","DOIUrl":"10.1016/j.jides.2016.10.003","url":null,"abstract":"<div><p>This paper presents CogWatch - an automatic prompting system designed to guide stroke survivors during activities of daily living, such as tea-making. In order to provide guidance during such activities, CogWatch needs to plan which optimal action should be done by users at each step of the task, and detect potential errors in their behavior. This paper focuses on the CogWatch Task Manager, which contains the modules responsible for action planning and human’s error detection under uncertainty. We first give an overview of the global assistive system where the Task Manager is implemented, and explain how it can interact with a user during the tea-making task. We then analyze how novel algorithms allow the Task Manager to increase the system’s performance.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 48-56"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131909875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Wavelet decomposition of software entropy reveals symptoms of malicious code 软件熵的小波分解揭示了恶意代码的症状
Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.009
Michael Wojnowicz, Glenn Chisholm, Matt Wolff, Xuan Zhao

Sophisticated malware authors can sneak hidden malicious contents into portable executable files, and this contents can be hard to detect, especially if encrypted or compressed. However, when an executable file switches between contents regimes (e.g., native, encrypted, compressed, text, and padding), there are corresponding shifts in the file’s representation as an entropy signal. In this paper, we develop a method for automatically quantifying the extent to which patterned variations in a file’s entropy signal make it “suspicious”. In Experiment 1, we use wavelet transforms to define a Suspiciously Structured Entropic Change Score (SSECS), a scalar feature that quantifies the suspiciousness of a file based on its distribution of entropic energy across multiple levels of spatial resolution. Based on this single feature, it was possible to raise predictive accuracy on a malware detection task from 50.0% to 68.7%, even though the single feature was applied to a heterogeneous corpus of malware discovered “in the wild”. In Experiment 2, we describe how wavelet-based decompositions of software entropy can be applied to a parasitic malware detection task involving large numbers of samples and features. By extracting only string and entropy features (with wavelet decompositions) from software samples, we are able to obtain almost 99% detection of parasitic malware with fewer than 1% false positives on good files. Moreover, the addition of wavelet-based features uniformly improved detection performance across plausible false positive rates, both in a strings-only model (e.g., from 80.90% to 82.97%) and a strings-plus-entropy model (e.g. from 92.10% to 94.74%, and from 98.63% to 98.90%). Overall, wavelet decomposition of software entropy can be useful for machine learning models for detecting malware based on extracting millions of features from executable files.

复杂的恶意软件作者可以将隐藏的恶意内容潜入可移植的可执行文件中,并且这些内容很难检测到,特别是在加密或压缩的情况下。然而,当一个可执行文件在内容体系之间切换时(例如,原生的、加密的、压缩的、文本的和填充的),在文件的表示中有相应的变化作为熵信号。在本文中,我们开发了一种方法来自动量化文件的熵信号中的模式变化使其“可疑”的程度。在实验1中,我们使用小波变换来定义可疑结构熵变化评分(SSECS),这是一个标量特征,根据文件在多个空间分辨率上的熵能分布来量化文件的可疑性。基于这一单一特征,可以将恶意软件检测任务的预测准确率从50.0%提高到68.7%,即使该单一特征应用于“在野外”发现的恶意软件的异构语料库。在实验2中,我们描述了如何将基于小波的软件熵分解应用于涉及大量样本和特征的寄生恶意软件检测任务。通过仅从软件样本中提取字符串和熵特征(使用小波分解),我们能够获得几乎99%的寄生恶意软件检测,并且在良好文件上的误报率低于1%。此外,基于小波的特征的添加均匀地提高了在可能的假阳性率下的检测性能,无论是在纯字符串模型(例如,从80.90%到82.97%)还是字符串加熵模型(例如,从92.10%到94.74%,从98.63%到98.90%)。总的来说,软件熵的小波分解可以用于机器学习模型,用于检测基于从可执行文件中提取数百万个特征的恶意软件。
{"title":"Wavelet decomposition of software entropy reveals symptoms of malicious code","authors":"Michael Wojnowicz,&nbsp;Glenn Chisholm,&nbsp;Matt Wolff,&nbsp;Xuan Zhao","doi":"10.1016/j.jides.2016.10.009","DOIUrl":"10.1016/j.jides.2016.10.009","url":null,"abstract":"<div><p>Sophisticated malware authors can sneak hidden malicious contents into portable executable files, and this contents can be hard to detect, especially if encrypted or compressed. However, when an executable file switches between contents regimes (e.g., native, encrypted, compressed, text, and padding), there are corresponding shifts in the file’s representation as an entropy signal. In this paper, we develop a method for automatically quantifying the extent to which patterned variations in a file’s entropy signal make it “suspicious”. In Experiment 1, we use wavelet transforms to define a Suspiciously Structured Entropic Change Score (SSECS), a scalar feature that quantifies the suspiciousness of a file based on its distribution of entropic energy across multiple levels of spatial resolution. Based on this single feature, it was possible to raise predictive accuracy on a malware detection task from 50.0% to 68.7%, even though the single feature was applied to a heterogeneous corpus of malware discovered “in the wild”. In Experiment 2, we describe how wavelet-based decompositions of software entropy can be applied to a parasitic malware detection task involving large numbers of samples and features. By extracting only string and entropy features (with wavelet decompositions) from software samples, we are able to obtain almost 99% detection of parasitic malware with fewer than 1% false positives on good files. Moreover, the addition of wavelet-based features uniformly improved detection performance across plausible false positive rates, both in a strings-only model (e.g., from 80.90% to 82.97%) and a strings-plus-entropy model (e.g. from 92.10% to 94.74%, and from 98.63% to 98.90%). Overall, wavelet decomposition of software entropy can be useful for machine learning models for detecting malware based on extracting millions of features from executable files.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 130-140"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.009","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114737383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Cooperation between Intelligent Autonomous Vehicles to enhance container terminal operations 智能自动驾驶汽车之间的合作,以提高集装箱码头的运营
Pub Date : 2016-06-01 DOI: 10.1016/j.jides.2016.05.002
Nacera Bahnes, Bouabdellah Kechar, Hafid Haffaf

Intelligent Autonomous Vehicles (IAVs) constitute one of the component systems of Intelligent Transportation System (ITS) that can operate in confined private spaces, as well as in open and public spaces. The seaports or container terminals are one of the important confined spaces that have attracted extensive research interests over the last decade in the use of information communication technology to improve the operation of ITS. The main goal of research works undertaken so far in this area was to improving the efficiency and cost-effectiveness of the indoor traffic, by transporting optimally and sustainably freight from ship to the logistics and unloading areas. The use of a team of IAVs with wireless communication capabilities by rearranging efficiently all operations of handling, routing,…is a strategic objective for seaport authorities and their customers. In this paper, we consider inter-Vehicles communication system in which IAVs can communicate and cooperate to avoid collision problem in the predetermined intersection areas in the yard. We investigate the performance of our solution through simulations using Omnet++/Veins Simulation framework. We show that the implemented cooperation mechanism can significantly reduce the unloading time in the seaport.

智能自动驾驶汽车(IAVs)是智能交通系统(ITS)的组成系统之一,既可以在封闭的私人空间运行,也可以在开放和公共空间运行。海港或集装箱码头是过去十年来在利用信息通信技术改善ITS运行方面吸引了广泛研究兴趣的重要密闭空间之一。到目前为止,在这一领域进行的研究工作的主要目标是通过以最佳和可持续的方式将货物从船上运送到物流和卸货区,提高室内交通的效率和成本效益。使用具有无线通信能力的IAVs团队,通过有效地重新安排所有操作,处理,路由……是海港当局及其客户的战略目标。在本文中,我们考虑了车辆间通信系统,在该系统中,车辆之间可以进行通信和协作,以避免在庭院中预定的交叉区域发生碰撞问题。我们通过使用omnet++ / vein Simulation框架进行仿真来研究我们的解决方案的性能。研究表明,合作机制的实施可以显著缩短港口的卸货时间。
{"title":"Cooperation between Intelligent Autonomous Vehicles to enhance container terminal operations","authors":"Nacera Bahnes,&nbsp;Bouabdellah Kechar,&nbsp;Hafid Haffaf","doi":"10.1016/j.jides.2016.05.002","DOIUrl":"10.1016/j.jides.2016.05.002","url":null,"abstract":"<div><p>Intelligent Autonomous Vehicles (IAVs) constitute one of the component systems of Intelligent Transportation System (ITS) that can operate in confined private spaces, as well as in open and public spaces. The seaports or container terminals are one of the important confined spaces that have attracted extensive research interests over the last decade in the use of information communication technology to improve the operation of ITS. The main goal of research works undertaken so far in this area was to improving the efficiency and cost-effectiveness of the indoor traffic, by transporting optimally and sustainably freight from ship to the logistics and unloading areas. The use of a team of IAVs with wireless communication capabilities by rearranging efficiently all operations of handling, routing,…is a strategic objective for seaport authorities and their customers. In this paper, we consider inter-Vehicles communication system in which IAVs can communicate and cooperate to avoid collision problem in the predetermined intersection areas in the yard. We investigate the performance of our solution through simulations using Omnet++/Veins Simulation framework. We show that the implemented cooperation mechanism can significantly reduce the unloading time in the seaport.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 1","pages":"Pages 22-29"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.05.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122439979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Challenge of validation in requirements engineering 需求工程中验证的挑战
Pub Date : 2016-06-01 DOI: 10.1016/j.jides.2016.05.001
Sourour Maalem , Nacereddine Zarour

This paper will review the evolution of validation techniques and their current status in Requirements Engineering (RE). We start by answering the following questions: What validate? Why the benefits of having the requirements validation activities during the RE process? Who are the stakeholders involved in the requirements validation process? Where applied the validation in the RE process? and How the techniques and the approaches of requirements validation?

本文将回顾验证技术的发展及其在需求工程(RE)中的现状。我们首先回答以下问题:验证什么?在RE过程中进行需求验证活动的好处是什么?谁是参与需求验证过程的涉众?在RE过程中验证应用于何处?需求验证的技术和方法是怎样的?
{"title":"Challenge of validation in requirements engineering","authors":"Sourour Maalem ,&nbsp;Nacereddine Zarour","doi":"10.1016/j.jides.2016.05.001","DOIUrl":"10.1016/j.jides.2016.05.001","url":null,"abstract":"<div><p>This paper will review the evolution of validation techniques and their current status in Requirements Engineering (RE). We start by answering the following questions: What validate? Why the benefits of having the requirements validation activities during the RE process? Who are the stakeholders involved in the requirements validation process? Where applied the validation in the RE process? and How the techniques and the approaches of requirements validation?</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 1","pages":"Pages 15-21"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.05.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128569892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
The path planning of cleaner robot for coverage region using Genetic Algorithms 基于遗传算法的清扫机器人覆盖区域路径规划
Pub Date : 2016-06-01 DOI: 10.1016/j.jides.2016.05.004
Mohamed Amine Yakoubi, Mohamed Tayeb Laskri

The vacuum cleaner robot should have a mechanism such as the artificial intelligence to solve the problem of cleaning the entire environment areas taking into account some factors such as the number of turns and the length of the trajectory. This robot’s mechanism or task is known as the path planning of coverage region (PPCR). In this paper, to resolve the problem of PPCR in a room environment, we propose an evolutionary approach. The latter is based on Genetic Algorithms (GA) which, consist of several steps to get the solutions. Each gene represents the robot position and some of chromosomes represent also the mini-path. In addition, this algorithm helps the robot to pass through every part of the environment by avoiding obstacles using different sensors. The results of simulation and comparison studies demonstrate the effectiveness and efficiency of the proposed approach.

真空吸尘器机器人应具有人工智能等机制来解决整个环境区域的清洁问题,同时考虑到旋转次数和轨迹长度等因素。这种机器人的机制或任务被称为覆盖区域路径规划(PPCR)。在本文中,为了解决PPCR在房间环境中的问题,我们提出了一个进化的方法。后者是基于遗传算法(GA),由几个步骤组成的解决方案。每个基因代表机器人的位置,一些染色体也代表迷你路径。此外,该算法通过使用不同的传感器避开障碍物,帮助机器人通过环境的每个部分。仿真和对比研究的结果证明了该方法的有效性和高效性。
{"title":"The path planning of cleaner robot for coverage region using Genetic Algorithms","authors":"Mohamed Amine Yakoubi,&nbsp;Mohamed Tayeb Laskri","doi":"10.1016/j.jides.2016.05.004","DOIUrl":"10.1016/j.jides.2016.05.004","url":null,"abstract":"<div><p>The vacuum cleaner robot should have a mechanism such as the artificial intelligence to solve the problem of cleaning the entire environment areas taking into account some factors such as the number of turns and the length of the trajectory. This robot’s mechanism or task is known as the path planning of coverage region (PPCR). In this paper, to resolve the problem of PPCR in a room environment, we propose an evolutionary approach. The latter is based on Genetic Algorithms (GA) which, consist of several steps to get the solutions. Each gene represents the robot position and some of chromosomes represent also the mini-path. In addition, this algorithm helps the robot to pass through every part of the environment by avoiding obstacles using different sensors. The results of simulation and comparison studies demonstrate the effectiveness and efficiency of the proposed approach.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 1","pages":"Pages 37-43"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.05.004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Reasoning over decomposing fuzzy description logic 基于模糊描述逻辑分解的推理
Pub Date : 2016-06-01 DOI: 10.1016/j.jides.2016.05.003
Mohamed Gasmi, Mustapha Bourahla

A DF-ALC (Decomposing fuzzy ALC) is proposed in this paper to satisfy the need for representing and reasoning with fuzzy ontologies in the context of semantic Web. A DF-ALC is also proposed to satisfy the need for seeing the necessity of decomposing ontology into several sub-ontologies in order to optimize the fuzzy reasoning process.

The main contribution of this work is to decompose the axioms of the ontology into sub-axioms according to a degree of certainty which is assigned to the fuzzy concepts and roles. It is also to define the syntax and semantics and to propose a local reasoning algorithm and a way of using gateways to infer between local TBox.

为了满足语义Web环境下模糊本体表示和推理的需要,提出了一种分解模糊本体的DF-ALC (decomposition fuzzy ALC)。为了优化模糊推理过程,需要将本体分解为若干子本体,提出了一种DF-ALC。本工作的主要贡献是将本体的公理按照一定程度的确定性分解为子公理,并将其分配给模糊概念和角色。定义了语法和语义,提出了一种局部推理算法和一种使用网关在局部TBox之间进行推理的方法。
{"title":"Reasoning over decomposing fuzzy description logic","authors":"Mohamed Gasmi,&nbsp;Mustapha Bourahla","doi":"10.1016/j.jides.2016.05.003","DOIUrl":"10.1016/j.jides.2016.05.003","url":null,"abstract":"<div><p>A DF-ALC (Decomposing fuzzy ALC) is proposed in this paper to satisfy the need for representing and reasoning with fuzzy ontologies in the context of semantic Web. A DF-ALC is also proposed to satisfy the need for seeing the necessity of decomposing ontology into several sub-ontologies in order to optimize the fuzzy reasoning process.</p><p>The main contribution of this work is to decompose the axioms of the ontology into sub-axioms according to a degree of certainty which is assigned to the fuzzy concepts and roles. It is also to define the syntax and semantics and to propose a local reasoning algorithm and a way of using gateways to infer between local TBox.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 1","pages":"Pages 30-36"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.05.003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123662231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Boundary and holes recognition in wireless sensor networks 无线传感器网络中的边界和孔洞识别
Pub Date : 2016-06-01 DOI: 10.1016/j.jides.2016.04.001
Rachid Beghdad, Amar Lamraoui

In this paper, a distributed solution is proposed for detecting boundaries and holes in the WSN using only the nodes connectivity information. The run of our protocol is divided imto three main steps. In the first step, each node collects connectivity information of its one-hop neighbors and constructs its one-hop neighbors’ graph. In the second step, independent sets are constructed. In the last step, the independent sets are connected in order to find the closed path. Therefore, the node can make its own decision to be an internal or a boundary node. Simulation results show that our algorithm can detect fine-grained boundaries with high accuracy, low energy consumption and less communication overhead compared to some former works. In addition, this algorithm performs better than some exiting approaches (BCP, THD, and SDBR).

本文提出了一种仅利用节点连通性信息检测WSN中边界和漏洞的分布式解决方案。我们的协议的运行分为三个主要步骤。第一步,每个节点收集其单跳邻居的连通性信息,并构造其单跳邻居图。第二步,构造独立集。最后一步,将独立集连接起来,寻找闭合路径。因此,节点可以自行决定是内部节点还是边界节点。仿真结果表明,该算法能够较好地检测出细粒度边界,且检测精度高、能耗低、通信开销小。此外,该算法的性能优于现有的一些方法(BCP、THD和SDBR)。
{"title":"Boundary and holes recognition in wireless sensor networks","authors":"Rachid Beghdad,&nbsp;Amar Lamraoui","doi":"10.1016/j.jides.2016.04.001","DOIUrl":"10.1016/j.jides.2016.04.001","url":null,"abstract":"<div><p>In this paper, a distributed solution is proposed for detecting boundaries and holes in the WSN using only the nodes connectivity information. The run of our protocol is divided imto three main steps. In the first step, each node collects connectivity information of its one-hop neighbors and constructs its one-hop neighbors’ graph. In the second step, independent sets are constructed. In the last step, the independent sets are connected in order to find the closed path. Therefore, the node can make its own decision to be an internal or a boundary node. Simulation results show that our algorithm can detect fine-grained boundaries with high accuracy, low energy consumption and less communication overhead compared to some former works. In addition, this algorithm performs better than some exiting approaches (BCP, THD, and SDBR).</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 1","pages":"Pages 1-14"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.04.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130327665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Security architecture metamodel for Model Driven security 模型驱动安全性的安全体系结构元模型
Pub Date : 2015-12-01 DOI: 10.1016/j.jides.2015.12.001
Makhlouf Derdour , Adel Alti , Mohamed Gasmi , Philippe Roose

A key aspect of the design of any software system is its architecture. One issue for perpetually designing good and robust architectures is the new security concepts. Many new applications are running on powerful platforms that have ample rich architecture models to support multiples security techniques and to explicit several security constraints. The design of an architecture meta-model that considers security connectors is required in order to ensure a realistic secure assembly and to address the problems of vulnerability of exchanging data flow. Our research proposes a generic meta-modelling approach called SMSA (Security Meta-model for Software Architecture) for describing a software system as a collection of components that interact through security connectors. SMSA metamodel is modeled as a UML SMSA profile. We exploit UML powerful capacities (meta-models and models) to define security concepts of SMSA (e.g. security connectors, composite and domain). A major benefit of UML profile is to the faithful representation of connectors to support the definition of security connector types explicitly and to support them with the ability to associate semantic properties. We also provide a set of model transformations to fit security requirements of a system. These transformations are detailed and validated with phosphate support system (SAGE) for the company FERPHOS: a case study described in SMSA. The model is tested and validated with the semantic constraints defined by the profile using Eclipse 3.1 plug-in in this case study.

任何软件系统设计的一个关键方面是它的体系结构。要永远设计出良好和健壮的体系结构,一个问题是新的安全概念。许多新应用程序都运行在功能强大的平台上,这些平台拥有丰富的体系结构模型,可以支持多种安全技术并显式地支持若干安全约束。为了确保实际的安全组装和解决交换数据流的脆弱性问题,需要设计考虑安全连接器的体系结构元模型。我们的研究提出了一种称为SMSA(软件架构安全元模型)的通用元建模方法,用于将软件系统描述为通过安全连接器进行交互的组件集合。SMSA元模型被建模为UML SMSA概要文件。我们利用UML强大的功能(元模型和模型)来定义SMSA的安全概念(例如安全连接器、组合和域)。UML概要文件的一个主要好处是连接器的忠实表示,以显式地支持安全连接器类型的定义,并支持它们具有关联语义属性的能力。我们还提供了一组模型转换,以适应系统的安全需求。这些转化是用FERPHOS公司的磷酸盐支持系统(SAGE)进行详细验证的:SMSA中描述的一个案例研究。在本案例研究中,使用Eclipse 3.1插件使用概要文件定义的语义约束对模型进行测试和验证。
{"title":"Security architecture metamodel for Model Driven security","authors":"Makhlouf Derdour ,&nbsp;Adel Alti ,&nbsp;Mohamed Gasmi ,&nbsp;Philippe Roose","doi":"10.1016/j.jides.2015.12.001","DOIUrl":"10.1016/j.jides.2015.12.001","url":null,"abstract":"<div><p>A key aspect of the design of any software system is its architecture. One issue for perpetually designing good and robust architectures is the new security concepts. Many new applications are running on powerful platforms that have ample rich architecture models to support multiples security techniques and to explicit several security constraints. The design of an architecture meta-model that considers security connectors is required in order to ensure a realistic secure assembly and to address the problems of vulnerability of exchanging data flow. Our research proposes a generic meta-modelling approach called SMSA (Security Meta-model for Software Architecture) for describing a software system as a collection of components that interact through security connectors. SMSA metamodel is modeled as a UML SMSA profile. We exploit UML powerful capacities (meta-models and models) to define security concepts of SMSA (e.g. security connectors, composite and domain). A major benefit of UML profile is to the faithful representation of connectors to support the definition of security connector types explicitly and to support them with the ability to associate semantic properties. We also provide a set of model transformations to fit security requirements of a system. These transformations are detailed and validated with phosphate support system (SAGE) for the company FERPHOS: a case study described in SMSA. The model is tested and validated with the semantic constraints defined by the profile using Eclipse 3.1 plug-in in this case study.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"2 1","pages":"Pages 55-70"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.12.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115964039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Journal of Innovation in Digital Ecosystems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1