首页 > 最新文献

J. Chem. Inf. Comput. Sci.最新文献

英文 中文
Performability of Retransmission of Loss Packets in Wireless Sensor Networks 无线传感器网络中丢包重传的性能研究
Pub Date : 2019-03-28 DOI: 10.5539/CIS.V12N2P71
Imeh J. Umoren, D. Asuquo, Onukwugha Gilean, Mfon Esang
Latest progress in wireless communication technology has enabled the development of low-cost sensor networks with major concern on quality of service (QoS) provisioning. Wireless sensor networks (WSNs) can be adopted in various application domains but each use is likely to pose peculiar technical issues. Basically, we demonstrate that congestion, packet loss and delay have strong influence on the performance of WSNs. In order to implement a realistic sensor network policy to resolve the problem of data delay and avoidance of collisions that lead to packet losses, we develop a system that guarantees QoS in WSNs using Fuzzy Logic Controller (FLC) for sensitivity analysis of the effect of adaptive forward error correction (AFEC). The AFEC approach improves the throughput by dynamically tuning FEC subject to the nature of wireless channel loss thereby optimizing throughput, sensor power utilization, while minimizing traffic retransmission, bit error rate (BER), and energy consumption. Basically, parameters such as packet delivery ratio, packet loss, delay, error rate, and throughput are appraised. The system has a spread procedure which is able to schedule the transmission of the nodes in order to have a data flow that converges from the furthest nodes toward the fusion centre. The key benefit of the scenario showed that, after extensive simulation using realistic field data, the procedure permits a practical approach to obtaining optimal solution to loss packets retransmission problem in WSNs giving a strong improvement on QoS provisioning.
无线通信技术的最新进展使低成本传感器网络的发展成为可能,主要关注服务质量(QoS)的提供。无线传感器网络(WSNs)可用于各种应用领域,但每种应用都可能带来特殊的技术问题。基本上,我们证明了拥塞、丢包和延迟对WSNs的性能有很大的影响。为了实现一个现实的传感器网络策略,以解决数据延迟和避免导致丢包的碰撞问题,我们开发了一个系统,以保证在WSNs中的QoS使用模糊逻辑控制器(FLC)的灵敏度分析自适应前向纠错(AFEC)的效果。AFEC方法通过根据无线信道损耗的性质动态调整FEC来提高吞吐量,从而优化吞吐量、传感器功率利用率,同时最大限度地减少流量重传、误码率(BER)和能耗。基本上,评估的参数包括包的传输率、丢包率、延迟、错误率和吞吐量。该系统具有能够对节点的传输进行调度的扩展程序,以便具有从最远节点向融合中心收敛的数据流。该方案的主要优点是,经过使用实际现场数据的广泛模拟,该过程允许一种实用的方法来获得wsn中丢包重传问题的最优解,从而大大改善了QoS提供。
{"title":"Performability of Retransmission of Loss Packets in Wireless Sensor Networks","authors":"Imeh J. Umoren, D. Asuquo, Onukwugha Gilean, Mfon Esang","doi":"10.5539/CIS.V12N2P71","DOIUrl":"https://doi.org/10.5539/CIS.V12N2P71","url":null,"abstract":"Latest progress in wireless communication technology has enabled the development of low-cost sensor networks with major concern on quality of service (QoS) provisioning. Wireless sensor networks (WSNs) can be adopted in various application domains but each use is likely to pose peculiar technical issues. Basically, we demonstrate that congestion, packet loss and delay have strong influence on the performance of WSNs. In order to implement a realistic sensor network policy to resolve the problem of data delay and avoidance of collisions that lead to packet losses, we develop a system that guarantees QoS in WSNs using Fuzzy Logic Controller (FLC) for sensitivity analysis of the effect of adaptive forward error correction (AFEC). The AFEC approach improves the throughput by dynamically tuning FEC subject to the nature of wireless channel loss thereby optimizing throughput, sensor power utilization, while minimizing traffic retransmission, bit error rate (BER), and energy consumption. Basically, parameters such as packet delivery ratio, packet loss, delay, error rate, and throughput are appraised. The system has a spread procedure which is able to schedule the transmission of the nodes in order to have a data flow that converges from the furthest nodes toward the fusion centre. The key benefit of the scenario showed that, after extensive simulation using realistic field data, the procedure permits a practical approach to obtaining optimal solution to loss packets retransmission problem in WSNs giving a strong improvement on QoS provisioning.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"7 1","pages":"71-86"},"PeriodicalIF":0.0,"publicationDate":"2019-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91349232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Service Packaging: A Pattern Based Approach Towards Service Delivery 服务打包:面向服务交付的基于模式的方法
Pub Date : 2019-03-25 DOI: 10.5539/cis.v12n2p14
M. A. Talib, M. N. Talib, Madiha Akhtar
Authentication, authorization, billing and monitoring are all common service delivery functions that are generally required to be added on to core business services in order for them to be delivered online commercially. Extending core services with these service delivery functions requires considerable effort if implemented ground-up and can be subject to limitations if outsourced to a service broker or a conventional middleware platform. Because of the ubiquitous nature of these service delivery functions, we see them as reusable patterns for service delivery. In this paper we have introduce an approach to implementing and applying these patterns in business to consumer e-commerce. We name the approach Service Packaging. Through the approach, generic implementations (or service packages) of the various service delivery patterns can be incrementally applied to core services, thus enabling flexible and systematic service delivery. A core service, regardless of its business domain does not require any structural or behavioral modifications in order to conform to a specific service delivery requirement and hence can be used out of the box. We also present a prototype middleware platform for the design-time modeling and implementation of service packages as well as their runtime execution.
身份验证、授权、计费和监视都是常见的服务交付功能,通常需要将它们添加到核心业务服务中,以便在线交付。如果从头实现,使用这些服务交付功能扩展核心服务需要相当大的努力,如果外包给服务代理或传统中间件平台,则可能受到限制。由于这些服务交付功能的普遍性,我们将它们视为服务交付的可重用模式。在本文中,我们介绍了一种在商业中实现和应用这些模式到消费者电子商务的方法。我们将这种方法命名为服务打包。通过这种方法,可以将各种服务交付模式的通用实现(或服务包)增量地应用于核心服务,从而实现灵活和系统的服务交付。无论其业务领域如何,核心服务都不需要任何结构或行为修改,以符合特定的服务交付需求,因此可以开箱即用。我们还提供了一个原型中间件平台,用于服务包的设计时建模和实现以及它们的运行时执行。
{"title":"Service Packaging: A Pattern Based Approach Towards Service Delivery","authors":"M. A. Talib, M. N. Talib, Madiha Akhtar","doi":"10.5539/cis.v12n2p14","DOIUrl":"https://doi.org/10.5539/cis.v12n2p14","url":null,"abstract":"Authentication, authorization, billing and monitoring are all common service delivery functions that are generally required to be added on to core business services in order for them to be delivered online commercially. Extending core services with these service delivery functions requires considerable effort if implemented ground-up and can be subject to limitations if outsourced to a service broker or a conventional middleware platform. Because of the ubiquitous nature of these service delivery functions, we see them as reusable patterns for service delivery. In this paper we have introduce an approach to implementing and applying these patterns in business to consumer e-commerce. We name the approach Service Packaging. Through the approach, generic implementations (or service packages) of the various service delivery patterns can be incrementally applied to core services, thus enabling flexible and systematic service delivery. A core service, regardless of its business domain does not require any structural or behavioral modifications in order to conform to a specific service delivery requirement and hence can be used out of the box. We also present a prototype middleware platform for the design-time modeling and implementation of service packages as well as their runtime execution.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"1 1","pages":"14-34"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90250371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Web Credibility Evaluation Tool Using PROMETHEE Method 利用PROMETHEE方法开发网络可信度评估工具
Pub Date : 2019-03-25 DOI: 10.5539/cis.v12n2p46
Mona Alghamdi, Khalid Alomar
In recent years, the Internet has become an indispensable way for users to find information which is almost instantaneously available. However, the presence of information on different websites makes the user needs to pre-check the credibility of the selected websites. Most users find it difficult to assess website credibility in terms of its particular characteristics or factors. Accordingly, we proposed an automated evaluation tool which considers various factors to assess the credibility of different websites and rank them from the highest credibility score to the lowest in order to allow the user to select the most credible website. We used the Preference Ranking Organization Method for Enrichment Evaluations (PROMOTHEE). The latter is one of the Multi-Criteria Decision Making methods (MCDM). It combines pairwise comparison and outranking methods in order to give more accurate and superior credibility scores due to its enrichment evaluations. For the proposed tool to be acceptable, we carried out a correlation analysis to determine the coefficient of correlation between human judges and the proposed tool. We found the coefficient of correlation rho is 0.943 which indicates that there is a strong correlation between the human judges’ ranking and the ranking given by the proposed website evaluation tool.
近年来,互联网已成为用户查找信息的不可或缺的方式,几乎是即时可用的。然而,不同网站上信息的存在使得用户需要预先检查所选网站的可信度。大多数用户发现很难根据其特定的特征或因素来评估网站的可信度。因此,我们提出了一种自动评估工具,该工具考虑各种因素来评估不同网站的可信度,并将其从可信度得分最高到最低进行排名,以便用户选择最可信的网站。我们使用偏好排序组织法进行富集评价(PROMOTHEE)。后者是多准则决策方法(MCDM)之一。它结合了两两比较和超越排名方法,由于其丰富的评估,以提供更准确和优越的可信度评分。为了使建议的工具是可接受的,我们进行了相关分析,以确定人类法官与建议工具之间的相关系数。我们发现相关系数rho为0.943,这表明人类评委的排名与所提出的网站评价工具给出的排名之间存在很强的相关性。
{"title":"Developing a Web Credibility Evaluation Tool Using PROMETHEE Method","authors":"Mona Alghamdi, Khalid Alomar","doi":"10.5539/cis.v12n2p46","DOIUrl":"https://doi.org/10.5539/cis.v12n2p46","url":null,"abstract":"In recent years, the Internet has become an indispensable way for users to find information which is almost instantaneously available. However, the presence of information on different websites makes the user needs to pre-check the credibility of the selected websites. Most users find it difficult to assess website credibility in terms of its particular characteristics or factors. Accordingly, we proposed an automated evaluation tool which considers various factors to assess the credibility of different websites and rank them from the highest credibility score to the lowest in order to allow the user to select the most credible website. We used the Preference Ranking Organization Method for Enrichment Evaluations (PROMOTHEE). The latter is one of the Multi-Criteria Decision Making methods (MCDM). It combines pairwise comparison and outranking methods in order to give more accurate and superior credibility scores due to its enrichment evaluations. For the proposed tool to be acceptable, we carried out a correlation analysis to determine the coefficient of correlation between human judges and the proposed tool. We found the coefficient of correlation rho is 0.943 which indicates that there is a strong correlation between the human judges’ ranking and the ranking given by the proposed website evaluation tool.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"61 8","pages":"46-57"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91473335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Multi-User k-Means Clustering Based on Encrypted IoT Data 基于加密物联网数据的安全多用户k-均值聚类
Pub Date : 2019-03-25 DOI: 10.5539/cis.v12n2p35
Yanling Li, Chuansheng Wang, Qi Wang, Jieling Dai, Yushan Zhao
IoT technology collects information from a lot of clients, which may relate to personal privacy. To protect the privacy, the clients would like to encrypt the raw data with their own keys before uploading. However, to make use of the information, the data mining technology with cloud computing is used for the knowledge discovery. Hence, it is an emergent issue of how to effectively performing data mining algorithm on the encrypted data. In this paper, we present a k-means clustering scheme with multi-user based on the IoT data. Although, there are many privacy-preserving k-means clustering protocols, they rarely focus on the situation of encrypting with different public keys. Besides, the existing works are inefficient and impractical. The scheme we propose in this paper not only solves the problem of evaluation on the encrypted data under different public keys but also improves the efficiency of the algorithm. It is semantic security under the semi-honest model according to our theoretical analysis. At last, we evaluate the experiment based on a real dataset, and comparing with previous works, the result shows that our scheme is more efficient and practical.
物联网技术从很多客户端收集信息,这可能涉及到个人隐私。为了保护隐私,客户端希望在上传原始数据之前使用自己的密钥进行加密。然而,为了利用这些信息,利用云计算的数据挖掘技术进行知识发现。因此,如何对加密后的数据有效地执行数据挖掘算法是一个亟待解决的问题。本文提出了一种基于物联网数据的多用户k均值聚类方案。虽然有许多保护隐私的k-means聚类协议,但它们很少关注使用不同公钥加密的情况。此外,现有的工作效率低下,不切实际。本文提出的方案不仅解决了不同公钥下加密数据的评估问题,而且提高了算法的效率。根据我们的理论分析,它是半诚实模型下的语义安全。最后,我们在一个真实数据集上对实验进行了评价,并与以往的工作进行了比较,结果表明我们的方案更加高效和实用。
{"title":"Secure Multi-User k-Means Clustering Based on Encrypted IoT Data","authors":"Yanling Li, Chuansheng Wang, Qi Wang, Jieling Dai, Yushan Zhao","doi":"10.5539/cis.v12n2p35","DOIUrl":"https://doi.org/10.5539/cis.v12n2p35","url":null,"abstract":"IoT technology collects information from a lot of clients, which may relate to personal privacy. To protect the privacy, the clients would like to encrypt the raw data with their own keys before uploading. However, to make use of the information, the data mining technology with cloud computing is used for the knowledge discovery. Hence, it is an emergent issue of how to effectively performing data mining algorithm on the encrypted data. In this paper, we present a k-means clustering scheme with multi-user based on the IoT data. Although, there are many privacy-preserving k-means clustering protocols, they rarely focus on the situation of encrypting with different public keys. Besides, the existing works are inefficient and impractical. The scheme we propose in this paper not only solves the problem of evaluation on the encrypted data under different public keys but also improves the efficiency of the algorithm. It is semantic security under the semi-honest model according to our theoretical analysis. At last, we evaluate the experiment based on a real dataset, and comparing with previous works, the result shows that our scheme is more efficient and practical.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"19 1","pages":"35-45"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75591323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Portrait Extraction Algorithm Based on Face Detection and Image Segmentation 基于人脸检测和图像分割的人像提取算法
Pub Date : 2019-03-25 DOI: 10.5539/cis.v12n2p1
Chongyi Yang, Wanyu Huang, Ruoqi Zhang, Rui Kong
Aiming to solve a series of problems in photo collection over citizen’s license, this paper proposes Portrait Extraction Algorithm over our face based on facial detection technology and state-of-the-art image segmentation algorithm. Considering an input image where the foreground stands a man with unfixed size and its background is all sorts of complicated background, firstly we use Haar&Adaboost facial detection algorithm as a preprocessing method so as to divide the image into different sub-systems, and we get a fix-sized image of human face. Then we use GrabCut and closed-form algorithm to segment the preprocessed image and output an image which satisfies our requirements (i.e. the fixed size and fixed background). Up to now the GrabCut and closed-form algorithm has been realized, both of which have its own advantages and shortages.
针对公民执照照片采集中的一系列问题,本文提出了基于人脸检测技术和最先进的图像分割算法的人脸肖像提取算法。针对一幅输入图像,其前景是一个大小不固定的人,背景是各种复杂的背景,我们首先使用Haar&Adaboost人脸检测算法作为预处理方法,将图像分成不同的子系统,得到一个大小固定的人脸图像。然后我们使用GrabCut和closed-form算法对预处理后的图像进行分割,输出满足我们要求的图像(即固定尺寸和固定背景)。目前已经实现了GrabCut和闭形算法,两者都有各自的优点和不足。
{"title":"Portrait Extraction Algorithm Based on Face Detection and Image Segmentation","authors":"Chongyi Yang, Wanyu Huang, Ruoqi Zhang, Rui Kong","doi":"10.5539/cis.v12n2p1","DOIUrl":"https://doi.org/10.5539/cis.v12n2p1","url":null,"abstract":"Aiming to solve a series of problems in photo collection over citizen’s license, this paper proposes Portrait Extraction Algorithm over our face based on facial detection technology and state-of-the-art image segmentation algorithm. Considering an input image where the foreground stands a man with unfixed size and its background is all sorts of complicated background, firstly we use Haar&Adaboost facial detection algorithm as a preprocessing method so as to divide the image into different sub-systems, and we get a fix-sized image of human face. Then we use GrabCut and closed-form algorithm to segment the preprocessed image and output an image which satisfies our requirements (i.e. the fixed size and fixed background). Up to now the GrabCut and closed-form algorithm has been realized, both of which have its own advantages and shortages.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"117 1","pages":"1-13"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79395057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-Channel Digital Oscilloscope Implementation over Android Device 基于Android设备的多通道数字示波器实现
Pub Date : 2019-03-25 DOI: 10.5539/cis.v12n2p58
Chongyi Yang, Chanpin Chen, Zhenhao Wu, Jiashun Jiang, Sicheng Su, Xue Kang, Qingping Dou
Signal monitoring and waveform analysis play a significant role in state-of-the-art signal processing and electronic measurement. Traditional oscilloscopes tend to be heavy and huge, which makes it impossible for outdoor signal measurement. In addition, most of those oscilloscopes can measure merely two signals simultaneously. This article proposes the design of multi-channel digital oscilloscope over common Android mobile device. In our system we use STM32 development board to implement up to eight input channels, data processing and wireless transmission. In addition, an Android application is designed for Wi-Fi data reception, respective waveform demonstration and derivation of each signal’s amplitude and frequency. In order to transmit up to eight digital signals simultaneously as fast as possible, we designed an algorithm where all signals’ data can be transmitted within a surprisingly small amount of wireless data. In our system test, wireless data transmission is implemented and each waveform can be recovered and demonstrated basically.
信号监测和波形分析在现代信号处理和电子测量中占有重要地位。传统的示波器往往笨重、庞大,无法用于室外信号测量。此外,大多数示波器只能同时测量两个信号。本文提出了一种基于普通Android移动设备的多通道数字示波器的设计。在我们的系统中,我们使用STM32开发板来实现多达8个输入通道,数据处理和无线传输。此外,设计了一个Android应用程序,用于Wi-Fi数据接收,各自的波形演示和推导每个信号的幅度和频率。为了尽可能快地同时传输多达8个数字信号,我们设计了一种算法,在这种算法中,所有信号的数据都可以在非常少的无线数据中传输。在我们的系统测试中,实现了无线数据传输,基本可以恢复和演示各个波形。
{"title":"Multi-Channel Digital Oscilloscope Implementation over Android Device","authors":"Chongyi Yang, Chanpin Chen, Zhenhao Wu, Jiashun Jiang, Sicheng Su, Xue Kang, Qingping Dou","doi":"10.5539/cis.v12n2p58","DOIUrl":"https://doi.org/10.5539/cis.v12n2p58","url":null,"abstract":"Signal monitoring and waveform analysis play a significant role in state-of-the-art signal processing and electronic measurement. Traditional oscilloscopes tend to be heavy and huge, which makes it impossible for outdoor signal measurement. In addition, most of those oscilloscopes can measure merely two signals simultaneously. This article proposes the design of multi-channel digital oscilloscope over common Android mobile device. In our system we use STM32 development board to implement up to eight input channels, data processing and wireless transmission. In addition, an Android application is designed for Wi-Fi data reception, respective waveform demonstration and derivation of each signal’s amplitude and frequency. In order to transmit up to eight digital signals simultaneously as fast as possible, we designed an algorithm where all signals’ data can be transmitted within a surprisingly small amount of wireless data. In our system test, wireless data transmission is implemented and each waveform can be recovered and demonstrated basically.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"17 1","pages":"58-70"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87090760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Maturity Model for Assessing IS Risk Management Activity Considering the Dependencies Between Its Elements 考虑要素间依赖关系的信息系统风险管理活动成熟度评估模型
Pub Date : 2019-01-27 DOI: 10.5539/cis.v12n1p98
Mina Elmaallam, Hicham Bensaid, A. Kriouile
The information systems (IS) are a key asset for organizations. Therefore, managing IS risks becomes more and more important especially within a world in perpetual change. Since IS risk management creates added-value, it must follow a process of continuous improvement orchestrated by a maturity model that figures out available pathways for a better improvement. The studied literature shows the lack of an IS risk management maturity model that considers all IS components and specificities of risk management activity. The present article shows first this lack in the section related to the comparative analysis of the existing models. Then, it proposes a maturity model to address this issue. The proposed model aims to assess the information system risk management activity while considering the dependencies between its elements.
信息系统(IS)是组织的关键资产。因此,管理IS风险变得越来越重要,尤其是在一个不断变化的世界里。由于IS风险管理创造了附加值,它必须遵循一个由成熟度模型策划的持续改进过程,该模型找出了更好改进的可用途径。研究文献表明,缺乏一个考虑风险管理活动的所有信息系统组成部分和特殊性的信息系统风险管理成熟度模型。本文首先在与现有模型的比较分析相关的部分中表明了这一不足。然后,它提出了一个成熟度模型来解决这个问题。该模型旨在评估信息系统风险管理活动,同时考虑其要素之间的依赖关系。
{"title":"A Maturity Model for Assessing IS Risk Management Activity Considering the Dependencies Between Its Elements","authors":"Mina Elmaallam, Hicham Bensaid, A. Kriouile","doi":"10.5539/cis.v12n1p98","DOIUrl":"https://doi.org/10.5539/cis.v12n1p98","url":null,"abstract":"The information systems (IS) are a key asset for organizations. Therefore, managing IS risks becomes more and more important especially within a world in perpetual change. Since IS risk management creates added-value, it must follow a process of continuous improvement orchestrated by a maturity model that figures out available pathways for a better improvement. The studied literature shows the lack of an IS risk management maturity model that considers all IS components and specificities of risk management activity. The present article shows first this lack in the section related to the comparative analysis of the existing models. Then, it proposes a maturity model to address this issue. The proposed model aims to assess the information system risk management activity while considering the dependencies between its elements.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"42 1","pages":"98-111"},"PeriodicalIF":0.0,"publicationDate":"2019-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77517887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ant Colony Optimization (ACO) Based MANET Routing Protocols: A Comprehensive Review 基于蚁群优化(ACO)的MANET路由协议:综述
Pub Date : 2019-01-27 DOI: 10.5539/cis.v12n1p82
A. Habboush
Application of mobile ad hoc networks (MANETs) has gained significant popularity among researchers in the field of data communication networks. However, a MANET operating in a wireless environment imposes a number of challenges for the implementers so far as routing of packets across it is concerned. There is a wide range of research contributions are available in the literature wherein authors propose various solutions to overcome the problems and bottleneck related to routing in MANET. Especially soft computing techniques and Ant Colony Optimization (ACO) in particular has been significantly popular among the researchers to resolve MANET routing issues. This technique plays a vital role in route discovery in particular. In this paper, we have conducted a comprehensive review of this technique applied to routing in MANET with respect to various criteria. Hopefully this paper serves to a perfect document for researchers in this field.
移动自组网(manet)的应用受到数据通信网络研究人员的广泛关注。然而,在无线环境中运行的MANET给实现者带来了许多挑战,因为涉及到跨它的数据包路由。文献中有广泛的研究贡献,其中作者提出了各种解决方案来克服与MANET路由相关的问题和瓶颈。特别是软计算技术和蚁群优化(蚁群优化)在解决MANET路由问题方面受到了研究人员的广泛欢迎。该技术尤其在路由发现中起着至关重要的作用。在本文中,我们根据各种标准对该技术应用于MANET中的路由进行了全面审查。希望本文能为这一领域的研究者提供一份完善的文献。
{"title":"Ant Colony Optimization (ACO) Based MANET Routing Protocols: A Comprehensive Review","authors":"A. Habboush","doi":"10.5539/cis.v12n1p82","DOIUrl":"https://doi.org/10.5539/cis.v12n1p82","url":null,"abstract":"Application of mobile ad hoc networks (MANETs) has gained significant popularity among researchers in the field of data communication networks. However, a MANET operating in a wireless environment imposes a number of challenges for the implementers so far as routing of packets across it is concerned. There is a wide range of research contributions are available in the literature wherein authors propose various solutions to overcome the problems and bottleneck related to routing in MANET. Especially soft computing techniques and Ant Colony Optimization (ACO) in particular has been significantly popular among the researchers to resolve MANET routing issues. This technique plays a vital role in route discovery in particular. In this paper, we have conducted a comprehensive review of this technique applied to routing in MANET with respect to various criteria. Hopefully this paper serves to a perfect document for researchers in this field.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"65 1","pages":"82-92"},"PeriodicalIF":0.0,"publicationDate":"2019-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78587355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Multi-Stage Image Restoration in High Noise and Blur Settings 多阶段图像恢复在高噪点和模糊设置
Pub Date : 2019-01-27 DOI: 10.5539/cis.v12n1p72
S. Voronin
We describe a simple approach useful for improving noisy, blurred images. Our approach is based on the use of a parallel block-based low rank factorization technique for projection based reduction of matrix dimensions and on a customized iteratively reweighted CG approach followed by the use of a Fourier Wiener filter. The regularization scheme with a transform basis offers variable residual penalty and increased per-iteration performance. The outlined approach is particularly aimed at high blur and noise settings.
我们描述了一个简单的方法,用于改善噪声,模糊的图像。我们的方法是基于使用并行的基于块的低秩分解技术,用于基于投影的矩阵维数降维,以及使用傅里叶维纳滤波器之后的自定义迭代重加权CG方法。具有变换基的正则化方案提供可变的残差惩罚和提高的每次迭代性能。概述的方法是特别针对高模糊和噪声设置。
{"title":"Multi-Stage Image Restoration in High Noise and Blur Settings","authors":"S. Voronin","doi":"10.5539/cis.v12n1p72","DOIUrl":"https://doi.org/10.5539/cis.v12n1p72","url":null,"abstract":"We describe a simple approach useful for improving noisy, blurred images. Our approach is based on the use of a parallel block-based low rank factorization technique for projection based reduction of matrix dimensions and on a customized iteratively reweighted CG approach followed by the use of a Fourier Wiener filter. The regularization scheme with a transform basis offers variable residual penalty and increased per-iteration performance. The outlined approach is particularly aimed at high blur and noise settings.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"76 2 1","pages":"72-81"},"PeriodicalIF":0.0,"publicationDate":"2019-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89711085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applicability Analysis of Semi-Network Operating System 半网络操作系统的适用性分析
Pub Date : 2019-01-27 DOI: 10.5539/cis.v12n1p93
Yin Sheng Zhang
Innovation of computing technology is either to improve the security and performance, or to improve  the convenience of user operation of system, networking and device, but sometimes it’s hard to get a very good balance between the two, in particular, the traditional localized OS and computing devices are inherently incompatible  in some respects with today's network environment,  therefore, although many innovations help to improve the safety, autonomy and controllability of system and device, but they are still always lacking the trustworthiness of users, one of the reasons is that their performance is lower than  user's expectation, but their operation become more complicated than before. The semi-network operating system is designed according to user's actual experience, which not only utilizes the shared attributes of network to increase the flexibility of OS, but also utilizes the stability and user-autonomy attributes of local platform ensure the base functions of OS, in addition, it can greatly reduce the burden on user’s operation and maintenance of computing system, so which will be a trustworthy system architecture for users.
计算技术的创新要么是为了提高安全性和性能,要么是为了提高系统、网络和设备的用户操作的便利性,但有时很难在两者之间取得很好的平衡,特别是传统的本地化操作系统和计算设备在某些方面与当今的网络环境具有内在的不兼容性,因此,尽管许多创新有助于提高系统和设备的安全性、自主性和可控性,但是他们仍然总是缺乏用户的信任,原因之一是他们的表现低于用户的期望,但他们的操作变得比以前更复杂。根据用户的实际体验设计半网络操作系统,既利用了网络的共享属性,增加了操作系统的灵活性,又利用了本地平台的稳定性和用户自治属性,保证了操作系统的基本功能,大大减轻了用户对计算系统运维的负担,是一种值得用户信赖的系统架构。
{"title":"Applicability Analysis of Semi-Network Operating System","authors":"Yin Sheng Zhang","doi":"10.5539/cis.v12n1p93","DOIUrl":"https://doi.org/10.5539/cis.v12n1p93","url":null,"abstract":"Innovation of computing technology is either to improve the security and performance, or to improve  the convenience of user operation of system, networking and device, but sometimes it’s hard to get a very good balance between the two, in particular, the traditional localized OS and computing devices are inherently incompatible  in some respects with today's network environment,  therefore, although many innovations help to improve the safety, autonomy and controllability of system and device, but they are still always lacking the trustworthiness of users, one of the reasons is that their performance is lower than  user's expectation, but their operation become more complicated than before. \u0000 \u0000The semi-network operating system is designed according to user's actual experience, which not only utilizes the shared attributes of network to increase the flexibility of OS, but also utilizes the stability and user-autonomy attributes of local platform ensure the base functions of OS, in addition, it can greatly reduce the burden on user’s operation and maintenance of computing system, so which will be a trustworthy system architecture for users.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"60 1","pages":"93-97"},"PeriodicalIF":0.0,"publicationDate":"2019-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84471178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
J. Chem. Inf. Comput. Sci.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1