首页 > 最新文献

2015 5th World Congress on Information and Communication Technologies (WICT)最新文献

英文 中文
A regulation model of urban traffic congestion: Algorithm and implementation 城市交通拥堵调控模型:算法与实现
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489649
Abdallah Lakhouili, E. Essoufi, H. Medromi
This study aims at calculating, the road urban traffic congestion using a suggested adapted CRONOS model. For the model simulation we propose adapted algorithm. We compare our adaptive system results to others given by urban traffic systems based on fixed pattern lights. The system is designed to make equilibrium between the length queue and the states of lights to search optimal strategy guarantying the fluidity of traffic and minimizing the total delay. The proposed real-time urban traffic control model was implemented on a simple intersection presenting two roads. We have chosen a simple intersection to validate our method which will be applied afterwards on a complicated intersection. We have used traffic evaluation criteria to test the accuracy of the model. The results show benefits of the suggested model on the total delay compared to that of the fixed pattern lights system. All traffic situations, whether they are peak or low are concerned by these results.
本研究的目的是使用建议的自适应CRONOS模型来计算道路城市交通拥堵。对于模型仿真,我们提出了自适应算法。我们将我们的自适应系统结果与基于固定模式灯的城市交通系统给出的其他结果进行比较。该系统设计在队列长度和交通灯状态之间进行平衡,以寻找保证交通流动性和最小化总延迟的最优策略。所提出的实时城市交通控制模型是在一个具有两条道路的简单交叉口上实现的。我们选择了一个简单的交叉点来验证我们的方法,然后将其应用于一个复杂的交叉点。我们使用流量评价标准来检验模型的准确性。结果表明,与固定模式光系统相比,该模型在总延迟方面具有优势。所有的交通状况,无论是高峰还是低谷,都与这些结果有关。
{"title":"A regulation model of urban traffic congestion: Algorithm and implementation","authors":"Abdallah Lakhouili, E. Essoufi, H. Medromi","doi":"10.1109/WICT.2015.7489649","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489649","url":null,"abstract":"This study aims at calculating, the road urban traffic congestion using a suggested adapted CRONOS model. For the model simulation we propose adapted algorithm. We compare our adaptive system results to others given by urban traffic systems based on fixed pattern lights. The system is designed to make equilibrium between the length queue and the states of lights to search optimal strategy guarantying the fluidity of traffic and minimizing the total delay. The proposed real-time urban traffic control model was implemented on a simple intersection presenting two roads. We have chosen a simple intersection to validate our method which will be applied afterwards on a complicated intersection. We have used traffic evaluation criteria to test the accuracy of the model. The results show benefits of the suggested model on the total delay compared to that of the fixed pattern lights system. All traffic situations, whether they are peak or low are concerned by these results.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115115619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A quantification model of internal control impact on banking risks using FMECA 内部控制对银行风险影响的FMECA量化模型
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489642
M. Ndaw, S. Ouya, G. Mendy
In this paper, we propose an optimal assessment of internal control impact on banking risks by making automatic the residual risk estimation step of FMECA which is based on an inductive reasoning to study causes, effects of failures and their criticality. For this we defined three equations based on maturity and type of controls then we have obtain a mathematical model which is applied on 333 risks and 491 controls. This model is a new approach which reduce time for obtaining residuals risks likelihood and severity and decrease estimation error rate of residual criticality by harmonizing the evaluation method. Test results are satisfactory for all banking processes and types of risk.
本文提出了一种内部控制对银行风险影响的最优评估方法,即通过基于归纳推理的FMECA剩余风险估计步骤来自动评估银行内部控制失效的原因、影响及其临界程度。为此,我们根据成熟度和控制类型定义了三个方程,然后我们获得了一个应用于333个风险和491个控制的数学模型。该模型通过统一评价方法,减少了残差风险可能性和严重程度的获取时间,降低了残差临界性的估计错误率。测试结果对所有银行流程和风险类型都是令人满意的。
{"title":"A quantification model of internal control impact on banking risks using FMECA","authors":"M. Ndaw, S. Ouya, G. Mendy","doi":"10.1109/WICT.2015.7489642","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489642","url":null,"abstract":"In this paper, we propose an optimal assessment of internal control impact on banking risks by making automatic the residual risk estimation step of FMECA which is based on an inductive reasoning to study causes, effects of failures and their criticality. For this we defined three equations based on maturity and type of controls then we have obtain a mathematical model which is applied on 333 risks and 491 controls. This model is a new approach which reduce time for obtaining residuals risks likelihood and severity and decrease estimation error rate of residual criticality by harmonizing the evaluation method. Test results are satisfactory for all banking processes and types of risk.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128101665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A comparative study of four metaheuristics applied for solving the flow-shop scheduling problem 四种元启发式方法在求解流水车间调度问题中的比较研究
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489661
A. Bouzidi, M. Riffi, M. Barkatou
The Flow shop-scheduling problem is NP-hard combinatorial optimization problem, thus, it requires using the computational intelligence to solve it. This paper describes an experimental comparison study of four metaheuristics which are the hybrid genetic algorithm, particle swarm optimization (by and without using local search), and the cat swarm optimization algorithm, in order to analyze their performance in term of solution. The four algorithms has been applied to some benchmark Flow shop problems. The results show that the Cat swarm optimization algorithm is more efficient than other methods to solve the flow shop-scheduling problem.
流车间调度问题是NP-hard组合优化问题,需要运用计算智能来求解。本文对混合遗传算法、粒子群算法(使用局部搜索和不使用局部搜索)和猫群算法这四种元启发式算法进行了实验比较研究,以分析它们在求解方面的性能。这四种算法已应用于一些基准流水车间问题。结果表明,Cat群优化算法比其他方法更有效地解决了流水车间调度问题。
{"title":"A comparative study of four metaheuristics applied for solving the flow-shop scheduling problem","authors":"A. Bouzidi, M. Riffi, M. Barkatou","doi":"10.1109/WICT.2015.7489661","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489661","url":null,"abstract":"The Flow shop-scheduling problem is NP-hard combinatorial optimization problem, thus, it requires using the computational intelligence to solve it. This paper describes an experimental comparison study of four metaheuristics which are the hybrid genetic algorithm, particle swarm optimization (by and without using local search), and the cat swarm optimization algorithm, in order to analyze their performance in term of solution. The four algorithms has been applied to some benchmark Flow shop problems. The results show that the Cat swarm optimization algorithm is more efficient than other methods to solve the flow shop-scheduling problem.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131550686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiagent based model for urban traffic congestion measuring 基于多智能体的城市交通拥堵测量模型
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489647
Abdallah Lakhouili, E. Essoufi, H. Medromi
In order to measure the urban traffic congestion, a multiagent system that consists of several locally operating agents each achieving a specific task is proposed. The traffic light patterns are calculated by considering different constraints so as to minimize an evaluation criterion. The proposed system aims at managing the gradual congestion of the traffic. As one section of the intersection becomes more congested, the duration of the green traffic lights of the other sections are reduced by the specific agent while the global state of the traffic in the intersection is observed by the other agent. Functionality of the proposed system is examined using initial random data that will be improved by the system.
为了测量城市交通拥堵,提出了一个由多个局部运行的智能体组成的多智能体系统,每个智能体完成一个特定的任务。通过考虑不同的约束条件来计算交通灯模式,使评价准则最小化。拟议的系统旨在管理逐渐拥挤的交通。当交叉路口的某一路段变得更加拥挤时,该特定智能体将减少其他路段的绿灯持续时间,同时由另一个智能体观察交叉路口的整体交通状态。使用系统将改进的初始随机数据来检查拟议系统的功能。
{"title":"Multiagent based model for urban traffic congestion measuring","authors":"Abdallah Lakhouili, E. Essoufi, H. Medromi","doi":"10.1109/WICT.2015.7489647","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489647","url":null,"abstract":"In order to measure the urban traffic congestion, a multiagent system that consists of several locally operating agents each achieving a specific task is proposed. The traffic light patterns are calculated by considering different constraints so as to minimize an evaluation criterion. The proposed system aims at managing the gradual congestion of the traffic. As one section of the intersection becomes more congested, the duration of the green traffic lights of the other sections are reduced by the specific agent while the global state of the traffic in the intersection is observed by the other agent. Functionality of the proposed system is examined using initial random data that will be improved by the system.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Toward resilience management in critical information infrastructure 关键信息基础设施的弹性管理
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489653
Yaou Hamida, Baina Amine, Bellafkih Mostafa
In the information age, critical infrastructure have become largely computerized and interconnected throughout the world, and their scope has grown more and more. Indeed, a failure in one critical infrastructure could lead to serious consequences on national security, economic well-being, public health, safety, or any combination thereof, producing then cascading effects because of their synergies. Consequently, the reliability, performance, continuous operation, safety, and protection of these so-called critical infrastructures is essential toward society and its economy. Nevertheless, the protection of critical infrastructure is a classical method that opens the question on the situation of these infrastructures in case of failure. In response to this, several studies necessitate a further strengthening in terms of resilience of these infrastructures. The items explored in this paper discuss different aspects related to resilience that gives the foundation of resilience strategy. We present in one hand the state of the art regarding resilience view in Critical Infrastructures and gives a systematic approach that can be applied on it, introducing then the applicability of resilience policy on these infrastructures.
在信息时代,全球范围内的关键基础设施已经在很大程度上实现了计算机化和互联化,其范围也越来越大。事实上,一个关键基础设施的故障可能会对国家安全、经济福祉、公共卫生、安全或其任何组合造成严重后果,并由于其协同作用而产生级联效应。因此,这些所谓的关键基础设施的可靠性、性能、连续运行、安全性和保护对社会及其经济至关重要。然而,关键基础设施的保护是一种经典的方法,它提出了这些基础设施在发生故障时的情况。针对这一点,有几项研究需要进一步加强这些基础设施的复原力。本文探讨的项目讨论了与弹性相关的各个方面,为弹性策略奠定了基础。我们一方面介绍了关键基础设施中弹性观点的最新进展,并给出了一种系统的方法,可以应用于它,然后介绍了弹性政策在这些基础设施中的适用性。
{"title":"Toward resilience management in critical information infrastructure","authors":"Yaou Hamida, Baina Amine, Bellafkih Mostafa","doi":"10.1109/WICT.2015.7489653","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489653","url":null,"abstract":"In the information age, critical infrastructure have become largely computerized and interconnected throughout the world, and their scope has grown more and more. Indeed, a failure in one critical infrastructure could lead to serious consequences on national security, economic well-being, public health, safety, or any combination thereof, producing then cascading effects because of their synergies. Consequently, the reliability, performance, continuous operation, safety, and protection of these so-called critical infrastructures is essential toward society and its economy. Nevertheless, the protection of critical infrastructure is a classical method that opens the question on the situation of these infrastructures in case of failure. In response to this, several studies necessitate a further strengthening in terms of resilience of these infrastructures. The items explored in this paper discuss different aspects related to resilience that gives the foundation of resilience strategy. We present in one hand the state of the art regarding resilience view in Critical Infrastructures and gives a systematic approach that can be applied on it, introducing then the applicability of resilience policy on these infrastructures.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115881850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Interdependencies modeling for the purpose of critical infrastructures protection 用于关键基础设施保护的相互依赖关系建模
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489651
Lamiae Chtioui, A. Baina, M. Bellafkih
Critical Infrastructures are the systems that ensure the ease of use of crucial goods and services which are vital for the well-being of a society and the prosperity of an economy. However, the protection of these infrastructures is a difficult challenge, and must include many factors such as risks, resilience, control access, and interdependency. This paper focuses on Critical Infrastructures interdependencies. Thus networks are becoming tightly interdependent, especially for communication and computing systems that are firmly coupled with other networks, because of their current growing use and necessity for all sectors. Our objective is to study interdependencies in order to reduce their impacts and establish an effective procedure to prepare for future risks. This paper presents an overview on some modeling approaches and models used to analyze critical infrastructures interdependencies. Then it explains the idea of our future work that consists of conceiving application software to notify all nodes of interdependent networks of a failure emerging in a critical node, basing on the Implicative Interdependency Model.
关键基础设施是确保对社会福祉和经济繁荣至关重要的关键商品和服务易于使用的系统。然而,保护这些基础设施是一项艰巨的挑战,必须包括许多因素,如风险、弹性、控制访问和相互依赖性。本文的重点是关键基础设施的相互依赖性。因此,网络正变得紧密地相互依赖,特别是与其他网络紧密结合的通讯和计算系统,因为它们目前的使用日益增加,对所有部门都是必要的。我们的目标是研究相互依存关系,以减少其影响,并建立一个有效的程序,为未来的风险做好准备。本文概述了用于分析关键基础设施相互依赖性的一些建模方法和模型。然后,它解释了我们未来工作的想法,包括构思应用软件,以通知所有节点的相互依赖网络的故障出现在一个关键节点,基于隐含的相互依赖模型。
{"title":"Interdependencies modeling for the purpose of critical infrastructures protection","authors":"Lamiae Chtioui, A. Baina, M. Bellafkih","doi":"10.1109/WICT.2015.7489651","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489651","url":null,"abstract":"Critical Infrastructures are the systems that ensure the ease of use of crucial goods and services which are vital for the well-being of a society and the prosperity of an economy. However, the protection of these infrastructures is a difficult challenge, and must include many factors such as risks, resilience, control access, and interdependency. This paper focuses on Critical Infrastructures interdependencies. Thus networks are becoming tightly interdependent, especially for communication and computing systems that are firmly coupled with other networks, because of their current growing use and necessity for all sectors. Our objective is to study interdependencies in order to reduce their impacts and establish an effective procedure to prepare for future risks. This paper presents an overview on some modeling approaches and models used to analyze critical infrastructures interdependencies. Then it explains the idea of our future work that consists of conceiving application software to notify all nodes of interdependent networks of a failure emerging in a critical node, basing on the Implicative Interdependency Model.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115280726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forming the multi-modal situation context in ambient intelligence systems on the basis of self-organizing cognitive architectures 在自组织认知架构的基础上形成环境智能系统中的多模态情境
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489658
P. Ivanov, Z. Nagoev, I. Pshenokova, D. Tokmakova
The article provides a theoretical basis of multi-agent recursive cognitive architectures as a distributed intelligent system of decision-making and control of an ambient intelligence system. It is dealt with the formalization of such cognitive architectures based on recursive deterministic abstract automata. The work introduces a method of automatic contexts formation in systems of ambient security based on the formal representation of semantics. Attempts are made to model and visualize semantic primitives and contexts. Successful experiments on the multi-agent representation of the subset of natural language limited by the domain of ambient assisted living systems for elderly people were conducted.
本文为多智能体递归认知体系结构作为环境智能系统的分布式决策和控制智能系统提供了理论基础。研究了基于递归确定性抽象自动机的认知体系结构的形式化问题。本文介绍了一种基于语义形式化表示的环境安全系统自动上下文生成方法。尝试建模和可视化语义原语和上下文。对老年人环境辅助生活系统领域限制的自然语言子集的多智能体表示进行了成功的实验。
{"title":"Forming the multi-modal situation context in ambient intelligence systems on the basis of self-organizing cognitive architectures","authors":"P. Ivanov, Z. Nagoev, I. Pshenokova, D. Tokmakova","doi":"10.1109/WICT.2015.7489658","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489658","url":null,"abstract":"The article provides a theoretical basis of multi-agent recursive cognitive architectures as a distributed intelligent system of decision-making and control of an ambient intelligence system. It is dealt with the formalization of such cognitive architectures based on recursive deterministic abstract automata. The work introduces a method of automatic contexts formation in systems of ambient security based on the formal representation of semantics. Attempts are made to model and visualize semantic primitives and contexts. Successful experiments on the multi-agent representation of the subset of natural language limited by the domain of ambient assisted living systems for elderly people were conducted.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128632637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using EBIOS for risk management in critical information infrastructure 使用EBIOS进行关键信息基础设施的风险管理
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489654
W. Abbass, A. Baina, M. Bellafkih
The business services of organizations depend widely on information systems. IT risks can harm these systems and thus affect the success of business goals. Therefore, the importance of security technologies in IT systems has received increased attention. These technologies require monetary investment. Risk management is used to justify this investment. Risk management is a strategic activity in the design of an organization: it is a systematic process of identifying, assessing and responding to events that may potentially affect business objectives. The objective of this paper is to address the challenges of protecting the business services of organizations. For this purpose, a concrete application will be detailed using EBIOS.
组织的业务服务广泛依赖于信息系统。IT风险可能会损害这些系统,从而影响业务目标的成功。因此,安全技术在IT系统中的重要性越来越受到重视。这些技术需要资金投入。风险管理被用来证明这项投资的合理性。风险管理是组织设计中的一项战略活动:它是识别、评估和响应可能潜在影响业务目标的事件的系统过程。本文的目标是解决保护组织的业务服务的挑战。为此,将使用EBIOS详细介绍一个具体的应用程序。
{"title":"Using EBIOS for risk management in critical information infrastructure","authors":"W. Abbass, A. Baina, M. Bellafkih","doi":"10.1109/WICT.2015.7489654","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489654","url":null,"abstract":"The business services of organizations depend widely on information systems. IT risks can harm these systems and thus affect the success of business goals. Therefore, the importance of security technologies in IT systems has received increased attention. These technologies require monetary investment. Risk management is used to justify this investment. Risk management is a strategic activity in the design of an organization: it is a systematic process of identifying, assessing and responding to events that may potentially affect business objectives. The objective of this paper is to address the challenges of protecting the business services of organizations. For this purpose, a concrete application will be detailed using EBIOS.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Actor network theory as a collaborative mode: The contribution of game theory in the interessement phase 作为协作模式的行动者网络理论:博弈理论在交互阶段的贡献
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489646
Mohammed Salim Benqatla, Chikhaoui Dikra, B. Bounabat
Global Governance of projects requires cooperation between several actors. In general, such cooperation is ensured by building network collaboration between entities who want to collaborate. In spite of the existence of a number of works interested in collaboration network, only few of them were focused on how to construct a network. In this paper, we address this topic through Actor Network Theory. In particular way, we analyze interessement phase of ANT from a cooperative game point of view. Indeed, it's about negotiations between actors involved in business project. Our objective is to propose an approach of network establishment, by inciting actors through cost savings. For that, we use Shapley Value to answer the question: Which coalitions are likely to form in order to ensure best cost-saving objectives in ANT mode of collaboration? We propose also a graphical tool for visualizing networks and simulating their evolution.
项目的全球治理需要几个参与者之间的合作。一般来说,这种合作是通过在想要合作的实体之间建立网络协作来保证的。尽管对协作网络有兴趣的研究有很多,但关注如何构建协作网络的研究却很少。在本文中,我们通过行动者网络理论来解决这个问题。特别地,我们从合作博弈的角度分析了ANT的交互阶段。事实上,它是关于参与商业项目的参与者之间的谈判。我们的目标是提出一种建立网络的方法,通过节省成本来激励行动者。为此,我们使用Shapley Value来回答这个问题:在ANT合作模式下,为了确保最佳的成本节约目标,可能会形成哪些联盟?我们还提出了一个可视化网络和模拟其演变的图形工具。
{"title":"Actor network theory as a collaborative mode: The contribution of game theory in the interessement phase","authors":"Mohammed Salim Benqatla, Chikhaoui Dikra, B. Bounabat","doi":"10.1109/WICT.2015.7489646","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489646","url":null,"abstract":"Global Governance of projects requires cooperation between several actors. In general, such cooperation is ensured by building network collaboration between entities who want to collaborate. In spite of the existence of a number of works interested in collaboration network, only few of them were focused on how to construct a network. In this paper, we address this topic through Actor Network Theory. In particular way, we analyze interessement phase of ANT from a cooperative game point of view. Indeed, it's about negotiations between actors involved in business project. Our objective is to propose an approach of network establishment, by inciting actors through cost savings. For that, we use Shapley Value to answer the question: Which coalitions are likely to form in order to ensure best cost-saving objectives in ANT mode of collaboration? We propose also a graphical tool for visualizing networks and simulating their evolution.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fairness and differentiation of services in wireless mesh network 无线网状网络中业务的公平性与差异化
Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489645
S. Jounaidi, B. Nassereddine, Y. Saadi, A. Haqiq
The complex data transfer applications, such as the telephony, video on demand and multimedia conferencing, have become a fundamental requirement. The aim of these applications is to accelerate the information transfer as audio and image packets flows format, comparing to other data formats. The architecture of services' differentiation was suggested as a simple solution to provide different quality services for the different types of packets. Hence, the quality service's (QoS) goal is to ensurea regular transfer rate of packets with a high priority, on one hand, and a preservation of packets that can produce an information distortion on the other hand. In this work, we put forward a protocol that guarantees, firstly, a differentiation of service for the different type of flows, and then, a fair sharing of the bandwidth. This protocol will work in collaboration with the token bucket mechanism.
复杂的数据传输应用,如电话、视频点播和多媒体会议,已经成为一种基本需求。与其他数据格式相比,这些应用程序的目的是加快音频和图像数据包流格式的信息传输速度。提出了服务差异化体系结构作为一种简单的解决方案,为不同类型的数据包提供不同质量的服务。因此,质量服务(QoS)的目标是一方面确保具有高优先级的数据包的正常传输速率,另一方面保证可能产生信息失真的数据包的保存。在这项工作中,我们提出了一个协议,该协议首先保证了不同类型流的服务区分,然后保证了带宽的公平共享。该协议将与令牌桶机制协同工作。
{"title":"Fairness and differentiation of services in wireless mesh network","authors":"S. Jounaidi, B. Nassereddine, Y. Saadi, A. Haqiq","doi":"10.1109/WICT.2015.7489645","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489645","url":null,"abstract":"The complex data transfer applications, such as the telephony, video on demand and multimedia conferencing, have become a fundamental requirement. The aim of these applications is to accelerate the information transfer as audio and image packets flows format, comparing to other data formats. The architecture of services' differentiation was suggested as a simple solution to provide different quality services for the different types of packets. Hence, the quality service's (QoS) goal is to ensurea regular transfer rate of packets with a high priority, on one hand, and a preservation of packets that can produce an information distortion on the other hand. In this work, we put forward a protocol that guarantees, firstly, a differentiation of service for the different type of flows, and then, a fair sharing of the bandwidth. This protocol will work in collaboration with the token bucket mechanism.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 5th World Congress on Information and Communication Technologies (WICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1