TCP-nets are graphical tools for modeling user's preference and relative importance statements. We propose the Prob-abilistic TCP-net (PTCP-net) model that can aggregate a set of TCP-nets, in a compact form, sharing the same set of variables and their domains but having different preference and relative importance statements. In particular, the PTCP-net is able to aggregate the choices of multiple users such as, in recommender systems. The PTCP-net can also be seen as an extension of the TCP-net with uncertainty on preference and relative importance statements. We adopt the Bayesian Network as the reasoning tool for PTCP-nets especially when answering the following two queries (1) finding the most probable TCP-net and (2) finding the most probable optimal outcome. We also show that the PTCP-net is applicable in collaborative filtering type recommender systems.
{"title":"Representation and Reasoning with Probabilistic TCP-nets","authors":"Sultan Ahmed, Malek Mouhoub","doi":"10.5539/cis.v11n4p9","DOIUrl":"https://doi.org/10.5539/cis.v11n4p9","url":null,"abstract":"TCP-nets are graphical tools for modeling user's preference and relative importance statements. We propose the Prob-abilistic TCP-net (PTCP-net) model that can aggregate a set of TCP-nets, in a compact form, sharing the same set of variables and their domains but having different preference and relative importance statements. In particular, the PTCP-net is able to aggregate the choices of multiple users such as, in recommender systems. The PTCP-net can also be seen as an extension of the TCP-net with uncertainty on preference and relative importance statements. We adopt the Bayesian Network as the reasoning tool for PTCP-nets especially when answering the following two queries (1) finding the most probable TCP-net and (2) finding the most probable optimal outcome. We also show that the PTCP-net is applicable in collaborative filtering type recommender systems.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"1 1","pages":"9-28"},"PeriodicalIF":0.0,"publicationDate":"2018-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90269396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The key to improve the precision of location fingerprinting algorithm is to reduce the errors between the position vectors in online locating process and the tag vector of the database in offline process. In view of the large errors caused by the construction of locating tags built from a single vector in traditional offline database, this paper proposed a kind of locating mapping tags for establishing the multi-mapping data structure and the offline database, which adapt better the distribution characteristics of RSSI signals in WIFI. Experiments showed that the offline database constructed by the methods effectively match the current actual position, reduce errors, and significantly improve the matching accuracy.
{"title":"Location Fingerprint Database Filter Algorithm Based on Multi-Mapping Data Structure","authors":"Xun Li, Zegang Xie","doi":"10.5539/cis.v11n4p29","DOIUrl":"https://doi.org/10.5539/cis.v11n4p29","url":null,"abstract":"The key to improve the precision of location fingerprinting algorithm is to reduce the errors between the position vectors in online locating process and the tag vector of the database in offline process. In view of the large errors caused by the construction of locating tags built from a single vector in traditional offline database, this paper proposed a kind of locating mapping tags for establishing the multi-mapping data structure and the offline database, which adapt better the distribution characteristics of RSSI signals in WIFI. Experiments showed that the offline database constructed by the methods effectively match the current actual position, reduce errors, and significantly improve the matching accuracy.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"8 1","pages":"29-35"},"PeriodicalIF":0.0,"publicationDate":"2018-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79016807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smart Grid introduces intelligent infrastructure to the existing power grid. Energy production is no longer confined just to large power plants, but is becoming geographically distributed on small renewable energy plants that can inject electricity directly into the grid. IoT proposes a good solution to connect the producers to the consumers and to propose a reactive balancing of power production and consumption. The ReDy architecture, which is intended for IoT applications, provides a base to implement a scalable, reliable, and dynamic IoT network ready to meet Smart Grid needs. The different producers and consumers represent nodes of a decentralized network managed with a dynamic membership management algorithm. Each node is a centralized sub-network composed of one gateway making decisions and several sensors and actuators.
{"title":"IoT ReDy Architecture for Smart Grid Management","authors":"K. Hafdi, Abderahman Kriouile, A. Kriouile","doi":"10.5539/cis.v11n4p36","DOIUrl":"https://doi.org/10.5539/cis.v11n4p36","url":null,"abstract":"Smart Grid introduces intelligent infrastructure to the existing power grid. Energy production is no longer confined just to large power plants, but is becoming geographically distributed on small renewable energy plants that can inject electricity directly into the grid. IoT proposes a good solution to connect the producers to the consumers and to propose a reactive balancing of power production and consumption. The ReDy architecture, which is intended for IoT applications, provides a base to implement a scalable, reliable, and dynamic IoT network ready to meet Smart Grid needs. The different producers and consumers represent nodes of a decentralized network managed with a dynamic membership management algorithm. Each node is a centralized sub-network composed of one gateway making decisions and several sensors and actuators.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"57 1","pages":"36-44"},"PeriodicalIF":0.0,"publicationDate":"2018-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84877399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cover Image, Volume 41, Issue 6","authors":"Hye Lim Lee, Su Yeon Park, D. An, Dong Sun Lee","doi":"10.1111/jfpe.12929","DOIUrl":"https://doi.org/10.1111/jfpe.12929","url":null,"abstract":"","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"91 1","pages":"C1"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77984247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the positive bias property of the time of arrival(TOA) measurement error caused by the non-line-of-sight(NLOS) propagation, a simple and effective three dimensional(3D) geometrical localization algorithm was proposed, the algorithm needs no prior knowledge of time delay distribution of TOA, and only linear regression was used to estimate the parameters of the relationship between the NLOS distance error and the true distance, thus, the approximate real distance between mobile terminal (MT) and base station (BS) was reduced, then, the 3D geometric localization of mobile terminal was carried out by the least square method. The experimental results shows the effectiveness of the algorithm, and the positional accuracy is far higher than the required accuracy by E-911 in NLOS environments.
{"title":"3D Localization Algorithm Based on Linear Regression and Least Squares in NLOS Environments","authors":"Jiang Li, Lei Zhang","doi":"10.5539/cis.v11n4p1","DOIUrl":"https://doi.org/10.5539/cis.v11n4p1","url":null,"abstract":"Based on the positive bias property of the time of arrival(TOA) measurement error caused by the non-line-of-sight(NLOS) propagation, a simple and effective three dimensional(3D) geometrical localization algorithm was proposed, the algorithm needs no prior knowledge of time delay distribution of TOA, and only linear regression was used to estimate the parameters of the relationship between the NLOS distance error and the true distance, thus, the approximate real distance between mobile terminal (MT) and base station (BS) was reduced, then, the 3D geometric localization of mobile terminal was carried out by the least square method. The experimental results shows the effectiveness of the algorithm, and the positional accuracy is far higher than the required accuracy by E-911 in NLOS environments.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"36 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86611762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reading promotion in university libraries needs to consider the differences in reading behavior of different readers and adopt suitable reading promotion strategies. Here, we first review the current situation of professional reading promotion and distinguish the demand characteristics of different types of readers. Then we conduct personal interviews with graduate students in Nanjing University of Aeronautics and Astronautics, and results demonstrate that the demands of graduate students for information on professional reading promotion and reading professional books and literatures become their indispensable demands in reading. Therefore, the visible display strategy to professional reading promotion is suggested for university libraries. Finally, taking an example of the reading promotion for zero-borrowing professional books, it is proved that the proposed strategy can increase the proportion of borrowed books and promote professional reading. In summary, we use tangible display strategy as theoretical basis and testify the proposed strategy for professional reading promotion: 1) a special cabinet displaying relevant professional books, 2) resources and charts, 3) placing bookshelves of stereoscopic models, and 4) designing and distributing a reading brochure.
{"title":"Strategy to Promote Professional Reading in University Libraries","authors":"Yunxia Zhou, Xiaozhu Zou","doi":"10.5539/cis.v11n3p95","DOIUrl":"https://doi.org/10.5539/cis.v11n3p95","url":null,"abstract":"Reading promotion in university libraries needs to consider the differences in reading behavior of different readers and adopt suitable reading promotion strategies. Here, we first review the current situation of professional reading promotion and distinguish the demand characteristics of different types of readers. Then we conduct personal interviews with graduate students in Nanjing University of Aeronautics and Astronautics, and results demonstrate that the demands of graduate students for information on professional reading promotion and reading professional books and literatures become their indispensable demands in reading. Therefore, the visible display strategy to professional reading promotion is suggested for university libraries. Finally, taking an example of the reading promotion for zero-borrowing professional books, it is proved that the proposed strategy can increase the proportion of borrowed books and promote professional reading. In summary, we use tangible display strategy as theoretical basis and testify the proposed strategy for professional reading promotion: 1) a special cabinet displaying relevant professional books, 2) resources and charts, 3) placing bookshelves of stereoscopic models, and 4) designing and distributing a reading brochure.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"71 1","pages":"95-101"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82283735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The study aims to investigate the problems and drawbacks associated with the present scheduling process for courses of video-conferencing, conducted at Administration of Educational Media at KAU (King Abdul-Aziz University). In KAU, male and female campuses are almost entirely segregated. The number of male staff and the diversity of their academic specialties is higher than those of their female counter parts. Hence, some subjects are taught to female students by male faculty, while utilizing videoconferencing technology. This research investigates the main challenges, faced by the Administration of Educational Media at King Abdul-Aziz University in scheduling video conferencing courses for classrooms reservation requests. It provides a complete list of tools and features to enhance, support, and automate the scheduling process for classrooms and supervisors, following Rapid Application development (RAD) methodology. The system has been implemented as a web-based automated scheduling system to undertake the capability of technology and to create an influential scheduling system. This system might also help in the migration of traditional paper-based work to a better technological environment, satisfied employees, and faster feedbacks.
{"title":"The Brilliant Scheduler: Automated Scheduling System for Video Conferencing Courses","authors":"Maram Meccawy","doi":"10.5539/cis.v11n3p82","DOIUrl":"https://doi.org/10.5539/cis.v11n3p82","url":null,"abstract":"The study aims to investigate the problems and drawbacks associated with the present scheduling process for courses of video-conferencing, conducted at Administration of Educational Media at KAU (King Abdul-Aziz University). In KAU, male and female campuses are almost entirely segregated. The number of male staff and the diversity of their academic specialties is higher than those of their female counter parts. Hence, some subjects are taught to female students by male faculty, while utilizing videoconferencing technology. This research investigates the main challenges, faced by the Administration of Educational Media at King Abdul-Aziz University in scheduling video conferencing courses for classrooms reservation requests. It provides a complete list of tools and features to enhance, support, and automate the scheduling process for classrooms and supervisors, following Rapid Application development (RAD) methodology. The system has been implemented as a web-based automated scheduling system to undertake the capability of technology and to create an influential scheduling system. This system might also help in the migration of traditional paper-based work to a better technological environment, satisfied employees, and faster feedbacks.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"19 1","pages":"82-88"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83301590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Networks facilitate the ease of communication for sharing the crucial information. Recently, most of the small and large-scale companies, educational institutions, government organizations, medical sectors, military and banking sectors are using the wireless networks. Security threats, a common term found both in wired as well as in wireless networks. However, it holds lot of importance in wireless networks because of its susceptible nature to threats. Security concerns in WLAN are studied and many organizations concluded that Wireless Intrusion Detection Systems (WIDS) is an essential element in network security infrastructure to monitor wireless activity for signs of attacks. However, it is an indisputable fact that the art of detecting attacks remains in its infancy. WIDS generally collect the activities within the protected network and analyze them to detect intrusions and generates an intrusion alarm. Irrespective of the different types of Intrusion Detection Systems, the major problems arising with WIDS is its inability to handle large volumes of alarms and more prone to false alarm attacks. Reducing the false alarms can improve the overall efficiency of the WIDS. Many techniques have been proposed in the literature to reduce the false alarm rates. However, most of the existing techniques are failed to provide desirable result and the high complexity to achieve high detection rate with less false alarm rates. This is the right time to propose a new technique for providing high detection accuracy with less false alarm rate. This paper made an extensive survey about the role of machine learning techniques to reduce the false alarm rate in WLAN IEEE 802.11. This survey proved that the substantial improvement has been achieved by reducing false alarm rate through machine learning algorithms. In addition to that, advancements specific to machine learning approaches is studied meticulously and a filtration technique is proposed.
{"title":"Machine Learning Approach to Combat False Alarms in Wireless Intrusion Detection System","authors":"D. Vijayakumar, S. Ganapathy","doi":"10.5539/cis.v11n3p67","DOIUrl":"https://doi.org/10.5539/cis.v11n3p67","url":null,"abstract":"Wireless Networks facilitate the ease of communication for sharing the crucial information. Recently, most of the small and large-scale companies, educational institutions, government organizations, medical sectors, military and banking sectors are using the wireless networks. Security threats, a common term found both in wired as well as in wireless networks. However, it holds lot of importance in wireless networks because of its susceptible nature to threats. Security concerns in WLAN are studied and many organizations concluded that Wireless Intrusion Detection Systems (WIDS) is an essential element in network security infrastructure to monitor wireless activity for signs of attacks. However, it is an indisputable fact that the art of detecting attacks remains in its infancy. WIDS generally collect the activities within the protected network and analyze them to detect intrusions and generates an intrusion alarm. Irrespective of the different types of Intrusion Detection Systems, the major problems arising with WIDS is its inability to handle large volumes of alarms and more prone to false alarm attacks. Reducing the false alarms can improve the overall efficiency of the WIDS. Many techniques have been proposed in the literature to reduce the false alarm rates. However, most of the existing techniques are failed to provide desirable result and the high complexity to achieve high detection rate with less false alarm rates. This is the right time to propose a new technique for providing high detection accuracy with less false alarm rate. This paper made an extensive survey about the role of machine learning techniques to reduce the false alarm rate in WLAN IEEE 802.11. This survey proved that the substantial improvement has been achieved by reducing false alarm rate through machine learning algorithms. In addition to that, advancements specific to machine learning approaches is studied meticulously and a filtration technique is proposed.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"77 1","pages":"67-81"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85520640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The identity management domain is a huge research domain. The federated systems proved on theirs legibility to solve a several digital identity issues. However, the problem of interoperability between federations is the researcher first issue. The researchers final goal is creating a federation of federations which is a large meta-system composed of several different federation systems. The previous researchers’ technical interoperability approach solved a part of the above-mentioned issue. However, there are some-others problems in the communication process between federated systems. In this work, the researcher target the semantic interoperability as a solution to solve the exchange of attribute issue among heterogeneous federated systems, because there is a significant need of managing the users’ attributes coming from different federations. Therefore, the researcher proposed a semantic layer to enhance the previous technical approach with the aim to guarantee the exchange of attribute that has the same semantic signification but a different representation, all that based on a mapping and matching between different anthologies. This approach will be applied to the academic domain as the researcher application domain.
{"title":"Identity Management Systems: Techno-Semantic Interoperability for Heterogeneous Federated Systems","authors":"Hasnae L'Amrani, Y. Idrissi, R. Ajhoun","doi":"10.5539/cis.v11n3p102","DOIUrl":"https://doi.org/10.5539/cis.v11n3p102","url":null,"abstract":"The identity management domain is a huge research domain. The federated systems proved on theirs legibility to solve a several digital identity issues. However, the problem of interoperability between federations is the researcher first issue. The researchers final goal is creating a federation of federations which is a large meta-system composed of several different federation systems. The previous researchers’ technical interoperability approach solved a part of the above-mentioned issue. However, there are some-others problems in the communication process between federated systems. In this work, the researcher target the semantic interoperability as a solution to solve the exchange of attribute issue among heterogeneous federated systems, because there is a significant need of managing the users’ attributes coming from different federations. Therefore, the researcher proposed a semantic layer to enhance the previous technical approach with the aim to guarantee the exchange of attribute that has the same semantic signification but a different representation, all that based on a mapping and matching between different anthologies. This approach will be applied to the academic domain as the researcher application domain.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"23 2 1","pages":"102-111"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73031158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the analysis of the construction technology of the existing literature knowledge map, a China HowNet (CNKI) method for automatic generation of literature knowledge map. This paper according to the qualification to collect related data of the web page; Second original web data analysis, and design knowledge map structure; By determining the entity, after extracting properties and associated knowledge; And knowledge to the automatic mapping for secondary image database of Cypher code; Finally build the direction of our school language information processing of CNKI, included the literature of knowledge map. Automatic and efficient knowledge map construction in the evolution of discipline has great practical significance, methods and conclusions of this paper can provide literature research, the researchers in the field of knowledge map building and information visualization to provide enlightenment and reference.
{"title":"Design and Implementation of China HowNet Knowledge Map Generation Module Literature","authors":"L. Wei","doi":"10.5539/cis.v11n3p89","DOIUrl":"https://doi.org/10.5539/cis.v11n3p89","url":null,"abstract":"Based on the analysis of the construction technology of the existing literature knowledge map, a China HowNet (CNKI) method for automatic generation of literature knowledge map. This paper according to the qualification to collect related data of the web page; Second original web data analysis, and design knowledge map structure; By determining the entity, after extracting properties and associated knowledge; And knowledge to the automatic mapping for secondary image database of Cypher code; Finally build the direction of our school language information processing of CNKI, included the literature of knowledge map. Automatic and efficient knowledge map construction in the evolution of discipline has great practical significance, methods and conclusions of this paper can provide literature research, the researchers in the field of knowledge map building and information visualization to provide enlightenment and reference.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"53 1","pages":"89-94"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86307321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}