首页 > 最新文献

2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)最新文献

英文 中文
An opportunistic burst cloning scheme for star OBS networks 星型OBS网络的机会性突发克隆方案
S. Riadi, D. El Ghanami, A. Maach
In optical burst switched (OBS) networks contention is the main source of burst loss. Burst cloning scheme is a proactive loss recovery mechanism that attempts to prevent burst loss at core nodes. However, at high load, burst cloning scheme leads to a significant burst loss at edge nodes due to burst queue saturation. In this paper, we adopt the burst cloning scheme with star topology, and we propose an enhancement for burst cloning scheme, called opportunistic burst cloning scheme, which aims to control the extra load of burst cloning through a simple technique to disable/enable burst cloning mechanism. We analytically analyze conventional OBS, basic burst cloning scheme and opportunistic burst cloning scheme over star networks. The results obtained from simulation confirm that our analytical model exhibits a good accuracy. The both analytical and simulation results confirm that opportunistic burst cloning scheme achieves better overall network performance than the other approaches.
在光突发交换(OBS)网络中,争用是造成突发损耗的主要原因。突发克隆方案是一种主动的损失恢复机制,旨在防止核心节点的突发损失。但是,在高负载情况下,由于突发队列饱和,突发克隆方案在边缘节点上造成了严重的突发损失。本文采用星型拓扑的突发克隆方案,并提出了一种突发克隆方案的改进方案——机会突发克隆方案,该方案旨在通过一种简单的技术来禁用/启用突发克隆机制,从而控制突发克隆带来的额外负载。对星型网络上的常规OBS、基本突发克隆方案和机会突发克隆方案进行了分析。仿真结果表明,该分析模型具有较好的精度。分析和仿真结果表明,机会突发克隆方案比其他方法具有更好的整体网络性能。
{"title":"An opportunistic burst cloning scheme for star OBS networks","authors":"S. Riadi, D. El Ghanami, A. Maach","doi":"10.1109/SITA.2013.6560787","DOIUrl":"https://doi.org/10.1109/SITA.2013.6560787","url":null,"abstract":"In optical burst switched (OBS) networks contention is the main source of burst loss. Burst cloning scheme is a proactive loss recovery mechanism that attempts to prevent burst loss at core nodes. However, at high load, burst cloning scheme leads to a significant burst loss at edge nodes due to burst queue saturation. In this paper, we adopt the burst cloning scheme with star topology, and we propose an enhancement for burst cloning scheme, called opportunistic burst cloning scheme, which aims to control the extra load of burst cloning through a simple technique to disable/enable burst cloning mechanism. We analytically analyze conventional OBS, basic burst cloning scheme and opportunistic burst cloning scheme over star networks. The results obtained from simulation confirm that our analytical model exhibits a good accuracy. The both analytical and simulation results confirm that opportunistic burst cloning scheme achieves better overall network performance than the other approaches.","PeriodicalId":145244,"journal":{"name":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125562289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural networks approach for solving the Maximal Constraint Satisfaction Problems 求解最大约束满足问题的神经网络方法
M. Ettaouil, K. Haddouch, Youssef Hami, Loqman Chakir
In this paper, we propose a new approach to solve the maximal constraint satisfaction problems (Max-CSP) using the continuous Hopfield network. This approach is divided into two steps: the first step involves modeling the maximal constraint satisfaction problem as 0-1 quadratic programming subject to linear constraints (QP). The second step concerns applying the continuous Hopfield network (CHN) to solve the QP problem. Therefore, the generalized energy function associated to the CHN and an appropriate parameter-setting procedure about Max-CSP problems are given in detail. Finally, the proposed algorithm and some computational experiments solving the Max-CSP are shown.
本文提出一种利用连续Hopfield网络求解最大约束满足问题(Max-CSP)的新方法。该方法分为两步:第一步将最大约束满足问题建模为线性约束下的0-1二次规划(QP)。第二步是应用连续Hopfield网络(CHN)求解QP问题。因此,详细地给出了与CHN相关的广义能量函数和Max-CSP问题的适当的参数设置过程。最后给出了求解Max-CSP问题的算法和一些计算实验。
{"title":"Neural networks approach for solving the Maximal Constraint Satisfaction Problems","authors":"M. Ettaouil, K. Haddouch, Youssef Hami, Loqman Chakir","doi":"10.1109/SITA.2013.6560794","DOIUrl":"https://doi.org/10.1109/SITA.2013.6560794","url":null,"abstract":"In this paper, we propose a new approach to solve the maximal constraint satisfaction problems (Max-CSP) using the continuous Hopfield network. This approach is divided into two steps: the first step involves modeling the maximal constraint satisfaction problem as 0-1 quadratic programming subject to linear constraints (QP). The second step concerns applying the continuous Hopfield network (CHN) to solve the QP problem. Therefore, the generalized energy function associated to the CHN and an appropriate parameter-setting procedure about Max-CSP problems are given in detail. Finally, the proposed algorithm and some computational experiments solving the Max-CSP are shown.","PeriodicalId":145244,"journal":{"name":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125912579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient light model for securing IMS network IMS网络安全的高效轻型模型
E. Belmekki, M. Bellafkih, N. Bouaouda
The security in IMS network is a big challenge for both users and service providers over IMS. Many research works are interested in this field to build more secure networks and to deal with security problems. This paper aims to present firstly a synthesis of the most important existing model used to secure IMS network. Secondly, the paper introduces our approach to address security in IMS. This approach defines light model for IMS network, identifies and focuses in the most vulnerable components of IMS network. It gives more importance to secure these components in order to build a safety network.
IMS网络的安全性对IMS用户和服务提供商来说都是一个巨大的挑战。为了构建更安全的网络和解决安全问题,许多研究工作都对这一领域感兴趣。本文首先综合了现有用于IMS网络安全的最重要的模型。其次,介绍了我们在IMS中解决安全问题的方法。该方法定义了IMS网络的轻量级模型,识别并重点关注了IMS网络中最脆弱的组件。为了构建一个安全的网络,对这些组件进行安全保护显得尤为重要。
{"title":"Efficient light model for securing IMS network","authors":"E. Belmekki, M. Bellafkih, N. Bouaouda","doi":"10.1109/SITA.2013.6560823","DOIUrl":"https://doi.org/10.1109/SITA.2013.6560823","url":null,"abstract":"The security in IMS network is a big challenge for both users and service providers over IMS. Many research works are interested in this field to build more secure networks and to deal with security problems. This paper aims to present firstly a synthesis of the most important existing model used to secure IMS network. Secondly, the paper introduces our approach to address security in IMS. This approach defines light model for IMS network, identifies and focuses in the most vulnerable components of IMS network. It gives more importance to secure these components in order to build a safety network.","PeriodicalId":145244,"journal":{"name":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132380782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid network selection strategy by using M-AHP/E-TOPSIS for heterogeneous networks 基于M-AHP/E-TOPSIS的异构网络混合网络选择策略
M. Lahby, L. Cherkaoui, A. Adib
The most challenging problem in the heterogeneous wireless networks is ensuring seamless network selection. For that reason, a large variety of algorithms based on multi attribute decision making (MADM) have been proposed to deal with this issue. The analytic hierarchy process (AHP) and the technique for order preference by similarity to an ideal solution (TOPSIS) represent two MADM methods which are exhaustively used in the literature to cope with the network selection problem. However both of these methods still suffer from the ranking abnormality and the number of handoffs. Thus, we aim to propose a hybrid network selection strategy based multiple analytic hierarchy process (M-AHP) and the enhanced technique for order preference by similarity to an ideal solution (E-TOPSIS). The M-AHP method represents an extension of AHP which is used to weigh each criterion. While the E-TOPSIS method represents an extension of TOPSIS which is used to rank the alternatives. Simulation results demonstrate that our hybrid strategy for network selection can dealing with the limitations of MADM methods.
异构无线网络中最具挑战性的问题是如何保证网络的无缝选择。为此,人们提出了多种基于多属性决策(MADM)的算法来解决这个问题。层次分析法(AHP)和理想解相似性排序偏好法(TOPSIS)是文献中广泛使用的两种MADM方法,用于解决网络选择问题。但这两种方法都存在排序异常和切换次数过多的问题。因此,我们的目标是提出一种基于多重层次分析法(M-AHP)的混合网络选择策略和基于与理想解相似度的增强排序偏好技术(E-TOPSIS)。M-AHP法是AHP法的一种扩展,用于对各指标进行加权。而E-TOPSIS方法代表了TOPSIS的扩展,用于对备选方案进行排名。仿真结果表明,本文提出的混合网络选择策略能够克服MADM方法的局限性。
{"title":"Hybrid network selection strategy by using M-AHP/E-TOPSIS for heterogeneous networks","authors":"M. Lahby, L. Cherkaoui, A. Adib","doi":"10.1109/SITA.2013.6560784","DOIUrl":"https://doi.org/10.1109/SITA.2013.6560784","url":null,"abstract":"The most challenging problem in the heterogeneous wireless networks is ensuring seamless network selection. For that reason, a large variety of algorithms based on multi attribute decision making (MADM) have been proposed to deal with this issue. The analytic hierarchy process (AHP) and the technique for order preference by similarity to an ideal solution (TOPSIS) represent two MADM methods which are exhaustively used in the literature to cope with the network selection problem. However both of these methods still suffer from the ranking abnormality and the number of handoffs. Thus, we aim to propose a hybrid network selection strategy based multiple analytic hierarchy process (M-AHP) and the enhanced technique for order preference by similarity to an ideal solution (E-TOPSIS). The M-AHP method represents an extension of AHP which is used to weigh each criterion. While the E-TOPSIS method represents an extension of TOPSIS which is used to rank the alternatives. Simulation results demonstrate that our hybrid strategy for network selection can dealing with the limitations of MADM methods.","PeriodicalId":145244,"journal":{"name":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114235537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Multilevel diversification and intensification in metaheuristics 元启发式的多层次多样化和集约化
N. Bouhmala
The performance of metaheuristics deteriorates very rapidly because the complexity of the problem usually increases with its size and the solution space of the problem increases exponentially with the problem size. Because of these two issues, optimization search techniques tend to spend most of the time exploring a restricted area of the search space preventing the search to visit more promising areas, and thus leading to solutions of poor quality. Designing efficient optimization search techniques requires a tactical interplay between diversification and intensification. The former refers to the ability to explore many different regions of the search space, whereas the latter refers to the ability to obtain high quality solutions within those regions. In this paper, three well known metaheuristics (Tabu Search, Memetic Algorithm and Walksat) are used with the multilevel context. The multilevel strategy involves looking at the search as a process evolving from a k-flip neighborhood to the standard I-flip neighborhood-based structure in order to achieve a tactical interplay between diversification and intensification. Benchmark results exhibit good prospects of multilevel metaheuristics.
由于问题的复杂性通常会随着问题规模的增加而增加,而问题的解空间也会随着问题规模的增加而呈指数增长,因此元启发式算法的性能会迅速下降。由于这两个问题,优化搜索技术往往花费大部分时间探索搜索空间的受限区域,从而阻止搜索访问更有希望的区域,从而导致解决方案质量差。设计有效的优化搜索技术需要多样化和集约化之间的战术相互作用。前者指的是探索搜索空间中许多不同区域的能力,而后者指的是在这些区域内获得高质量解决方案的能力。本文将禁忌搜索、模因算法和Walksat三种著名的元启发式算法应用于多层次上下文。多层策略包括将搜索视为从k-翻转邻域到标准i -翻转邻域结构的演变过程,以实现多样化和集约化之间的战术相互作用。基准测试结果显示了多层次元启发式的良好前景。
{"title":"Multilevel diversification and intensification in metaheuristics","authors":"N. Bouhmala","doi":"10.1109/SITA.2013.6560793","DOIUrl":"https://doi.org/10.1109/SITA.2013.6560793","url":null,"abstract":"The performance of metaheuristics deteriorates very rapidly because the complexity of the problem usually increases with its size and the solution space of the problem increases exponentially with the problem size. Because of these two issues, optimization search techniques tend to spend most of the time exploring a restricted area of the search space preventing the search to visit more promising areas, and thus leading to solutions of poor quality. Designing efficient optimization search techniques requires a tactical interplay between diversification and intensification. The former refers to the ability to explore many different regions of the search space, whereas the latter refers to the ability to obtain high quality solutions within those regions. In this paper, three well known metaheuristics (Tabu Search, Memetic Algorithm and Walksat) are used with the multilevel context. The multilevel strategy involves looking at the search as a process evolving from a k-flip neighborhood to the standard I-flip neighborhood-based structure in order to achieve a tactical interplay between diversification and intensification. Benchmark results exhibit good prospects of multilevel metaheuristics.","PeriodicalId":145244,"journal":{"name":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122263329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review of Web services description approaches 回顾Web服务描述方法
Ibrahim El Bitar, Fatima-Zahra Belouadha, O. Roudiès
The WS (Web services) description is an important step in the services consumption's cycle. Semantic WS extends the capabilities of a WS by associating semantic concepts in order to enable better search, discovery, selection, composition and integration. Several WS description approaches have been proposed to present a detailed description exceeding the limitations of the syntactic standard WSDL. Our analysis of these works leads us to group them into two classes: Annotations Based Description Approaches and Semantic Language Based Approaches. In this paper, we provide a comparative evaluation of these approaches based on a set of criteria that can be qualified as performance indicators. The identified comparison criteria are the following: ontology dependence, service description adaptation, expressiveness and the capacity of the description.
WS (Web服务)描述是服务消费周期中的重要步骤。语义WS通过关联语义概念来扩展WS的功能,从而实现更好的搜索、发现、选择、组合和集成。已经提出了几种WS描述方法来提供超出语法标准WSDL限制的详细描述。通过对这些工作的分析,我们将它们分为两类:基于注释的描述方法和基于语义语言的方法。在本文中,我们基于一套可以作为绩效指标的标准,对这些方法进行了比较评估。确定的比较标准如下:本体依赖性、服务描述适应性、表达性和描述能力。
{"title":"Review of Web services description approaches","authors":"Ibrahim El Bitar, Fatima-Zahra Belouadha, O. Roudiès","doi":"10.1109/SITA.2013.6560813","DOIUrl":"https://doi.org/10.1109/SITA.2013.6560813","url":null,"abstract":"The WS (Web services) description is an important step in the services consumption's cycle. Semantic WS extends the capabilities of a WS by associating semantic concepts in order to enable better search, discovery, selection, composition and integration. Several WS description approaches have been proposed to present a detailed description exceeding the limitations of the syntactic standard WSDL. Our analysis of these works leads us to group them into two classes: Annotations Based Description Approaches and Semantic Language Based Approaches. In this paper, we provide a comparative evaluation of these approaches based on a set of criteria that can be qualified as performance indicators. The identified comparison criteria are the following: ontology dependence, service description adaptation, expressiveness and the capacity of the description.","PeriodicalId":145244,"journal":{"name":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Components-based software architecture for secure mobile agents via two strategies of adaptation 基于组件的安全移动代理软件体系结构的两种适应策略
Hassan Razouki, Abdellatif Hair
Security presents a crucial point in mobile agent systems and may hinder the expansion and use of this paradigm. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechauisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms. The first is a static adaptation performed by the MSAS (the Management System of Agents Security). The second is a reflexive structural dynamic adaptation performed by the mobile agent itself. These two adaptations take into account the dynamic security requirements in systems based on mobile agent.
在移动代理系统中,安全性是一个至关重要的问题,可能会阻碍这种范例的扩展和使用。移动代理的保护被认为是最大的安全挑战之一,因为执行平台可以访问移动代理的所有组件。在本文中,我们提出了一种新的移动代理架构范式,它允许代理的实现任务与其安全机制的分离。我们的方法是基于使用两种适应策略来适应运行时移动代理的安全性,这取决于执行代理职责所需服务的敏感性和访问平台的置信度。第一种是由MSAS(代理安全管理系统)执行的静态适应。第二种是由移动代理自身执行的自反性结构动态适应。这两种调整考虑了基于移动代理的系统的动态安全需求。
{"title":"Components-based software architecture for secure mobile agents via two strategies of adaptation","authors":"Hassan Razouki, Abdellatif Hair","doi":"10.1109/SITA.2013.6560821","DOIUrl":"https://doi.org/10.1109/SITA.2013.6560821","url":null,"abstract":"Security presents a crucial point in mobile agent systems and may hinder the expansion and use of this paradigm. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechauisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms. The first is a static adaptation performed by the MSAS (the Management System of Agents Security). The second is a reflexive structural dynamic adaptation performed by the mobile agent itself. These two adaptations take into account the dynamic security requirements in systems based on mobile agent.","PeriodicalId":145244,"journal":{"name":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130129799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards an approach to improve business process models using risk management techniques 朝着使用风险管理技术改进业务流程模型的方向发展
Hanane Lhannaoui, M. Kabbaj, Z. Bakkoury
Business process management aims to create and develop value inside organizations. Though, business processes are exposed to different risks that may cause failures in their execution. In order to preserve this value, applying risk management principles in Business process management discipline has become a field that takes a lot of attention. Risk-aware Business Process Management (R-BPM) is an area that combines the advantages of Business Process Management and Risk Management. Some works tried to propose approaches for mitigating risks but only in the execution phase. Our research work aims to mitigate risks by design using a method based on a risk analysis technique HAZOP (HA-Zard OP-erability). In this paper, our objective is twofold. We will firstly introduce an approach for analyzing business process models using an adaptation of HAZOP, propose recommendations for reducing risks and we will then plan actions to implement those recommendations by design. Afterward, we will propose a redesign for the business process model and consequently get an improvement for the original model.
业务流程管理的目标是在组织内部创造和发展价值。但是,业务流程暴露于可能导致其执行失败的不同风险中。为了保持这一价值,在业务流程管理规程中应用风险管理原则已成为一个备受关注的领域。风险感知业务流程管理(R-BPM)是一个结合了业务流程管理和风险管理优点的领域。一些作品试图提出降低风险的方法,但只在执行阶段。我们的研究工作旨在通过设计基于风险分析技术HAZOP (HA-Zard op - operability)的方法来降低风险。在本文中,我们的目标是双重的。我们将首先介绍一种使用HAZOP的改编来分析业务流程模型的方法,提出降低风险的建议,然后我们将计划行动,通过设计来实现这些建议。之后,我们将建议对业务流程模型进行重新设计,从而对原始模型进行改进。
{"title":"Towards an approach to improve business process models using risk management techniques","authors":"Hanane Lhannaoui, M. Kabbaj, Z. Bakkoury","doi":"10.1109/SITA.2013.6560815","DOIUrl":"https://doi.org/10.1109/SITA.2013.6560815","url":null,"abstract":"Business process management aims to create and develop value inside organizations. Though, business processes are exposed to different risks that may cause failures in their execution. In order to preserve this value, applying risk management principles in Business process management discipline has become a field that takes a lot of attention. Risk-aware Business Process Management (R-BPM) is an area that combines the advantages of Business Process Management and Risk Management. Some works tried to propose approaches for mitigating risks but only in the execution phase. Our research work aims to mitigate risks by design using a method based on a risk analysis technique HAZOP (HA-Zard OP-erability). In this paper, our objective is twofold. We will firstly introduce an approach for analyzing business process models using an adaptation of HAZOP, propose recommendations for reducing risks and we will then plan actions to implement those recommendations by design. Afterward, we will propose a redesign for the business process model and consequently get an improvement for the original model.","PeriodicalId":145244,"journal":{"name":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132417418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Stereo vision-based road obstacles detection 基于立体视觉的道路障碍物检测
Zebbara Khalid, EL-Ansari Mohamed, Mazoul Abdenbi
This paper presents a fast road obstacle detection system based on stereo vision. The algorithm contains three main components: road detection, obstacle detection and obstacles tracking. The road detection is achieved by using a small rectangular shape at bottom center of disparity image to extract the disparities of the road. The roadsides are located by using morphological processing and Hough transform. In the obstacle detection process, the objects can be easily located by the segmentation process. The obstacles' tracking is achieved by the discrete Kalman filter. The proposed approach has been tested on different images. The provided results demonstrate the effectiveness of the proposed method.
提出了一种基于立体视觉的快速道路障碍物检测系统。该算法包括三个主要部分:道路检测、障碍物检测和障碍物跟踪。道路检测是利用视差图像底部中心的小矩形提取道路的视差来实现的。利用形态处理和霍夫变换对道路进行定位。在障碍物检测过程中,通过分割过程可以方便地定位目标。采用离散卡尔曼滤波实现障碍物的跟踪。所提出的方法已经在不同的图像上进行了测试。给出的结果证明了所提方法的有效性。
{"title":"Stereo vision-based road obstacles detection","authors":"Zebbara Khalid, EL-Ansari Mohamed, Mazoul Abdenbi","doi":"10.1109/SITA.2013.6560817","DOIUrl":"https://doi.org/10.1109/SITA.2013.6560817","url":null,"abstract":"This paper presents a fast road obstacle detection system based on stereo vision. The algorithm contains three main components: road detection, obstacle detection and obstacles tracking. The road detection is achieved by using a small rectangular shape at bottom center of disparity image to extract the disparities of the road. The roadsides are located by using morphological processing and Hough transform. In the obstacle detection process, the objects can be easily located by the segmentation process. The obstacles' tracking is achieved by the discrete Kalman filter. The proposed approach has been tested on different images. The provided results demonstrate the effectiveness of the proposed method.","PeriodicalId":145244,"journal":{"name":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132112069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Conception and implementation of a computer adaptive assessment system for E-Learning based on a new measuring skills approach 基于一种新的测量技能方法的计算机自适应在线学习评估系统的构想与实现
Ali Aajli, K. Afdel
The distance learning platforms are increasingly used in universities, colleges and companies seeking effective and continuous training of their employees without constraint of time and space. The effectiveness of such a learning system depends mainly on the degree of information assimilated by the learner at the end of training. In this article, we focus on the implementation of a system for measuring competence for computer sciences. This system uses the model of item response theory. The results provided by this system are presented to the student, as a dashboard. They will allow the teacher or tutor to have the necessary elements to monitor their learning by identifying the causes blocking and checking its achievements. This system can also help to improve the recruitment process of companies using it in a near-selection process of candidates for jobs.
远程学习平台越来越多地用于寻求不受时间和空间限制的有效和持续的员工培训的大学、学院和公司。这种学习系统的有效性主要取决于学习者在训练结束时吸收信息的程度。在这篇文章中,我们着重于一个测量计算机科学能力的系统的实现。本系统采用项目反应理论模型。该系统提供的结果以仪表板的形式呈现给学生。他们将允许教师或导师有必要的元素来监控他们的学习,通过确定原因阻碍和检查其成果。该系统还可以帮助改善公司在接近选择工作候选人的过程中使用它的招聘过程。
{"title":"Conception and implementation of a computer adaptive assessment system for E-Learning based on a new measuring skills approach","authors":"Ali Aajli, K. Afdel","doi":"10.1109/SITA.2013.6560797","DOIUrl":"https://doi.org/10.1109/SITA.2013.6560797","url":null,"abstract":"The distance learning platforms are increasingly used in universities, colleges and companies seeking effective and continuous training of their employees without constraint of time and space. The effectiveness of such a learning system depends mainly on the degree of information assimilated by the learner at the end of training. In this article, we focus on the implementation of a system for measuring competence for computer sciences. This system uses the model of item response theory. The results provided by this system are presented to the student, as a dashboard. They will allow the teacher or tutor to have the necessary elements to monitor their learning by identifying the causes blocking and checking its achievements. This system can also help to improve the recruitment process of companies using it in a near-selection process of candidates for jobs.","PeriodicalId":145244,"journal":{"name":"2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125015666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2013 8th International Conference on Intelligent Systems: Theories and Applications (SITA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1