Web of Data, Semantic Web, and Linked Data offer a set of dataset to exploit it in the different domain especially in smart cities. In this paper we illustrate the methodology used to extract data from different datasets, enrich them and publish them under the Linked Open Data paradigm to resolve the problem that exists in cities. The citizen helps public administer to declare the problems and fault. In order to test our methodology, we have chosen the dataset DBpedia among the set of Linked Open Data. Finally the tool SPARQL enables to launch queries to extract, publish and enrich Linked Open Data on the web.
{"title":"Using Semantic Web and Linked Data for Integrating and Publishing Data in Smart Cities","authors":"T. Abid, Mohamed Ridda Laouar","doi":"10.1145/3330089.3330132","DOIUrl":"https://doi.org/10.1145/3330089.3330132","url":null,"abstract":"Web of Data, Semantic Web, and Linked Data offer a set of dataset to exploit it in the different domain especially in smart cities. In this paper we illustrate the methodology used to extract data from different datasets, enrich them and publish them under the Linked Open Data paradigm to resolve the problem that exists in cities. The citizen helps public administer to declare the problems and fault. In order to test our methodology, we have chosen the dataset DBpedia among the set of Linked Open Data. Finally the tool SPARQL enables to launch queries to extract, publish and enrich Linked Open Data on the web.","PeriodicalId":251275,"journal":{"name":"Proceedings of the 7th International Conference on Software Engineering and New Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124876051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 7th International Conference on Software Engineering and New Technologies","authors":"","doi":"10.1145/3330089","DOIUrl":"https://doi.org/10.1145/3330089","url":null,"abstract":"","PeriodicalId":251275,"journal":{"name":"Proceedings of the 7th International Conference on Software Engineering and New Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129010681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The separation of concerns as a conceptual paradigm, aims to manage the complexity of the software systems by dividing them into different concerns and aspects. The benefits of this paradigm such as adaptability, reuse and maintenance, have been key drivers of its adoption and usability. These quality attributes have been discussed in aspect-oriented programming (AOP) which is a complement to traditional programming methods, whether object-oriented programming or procedural programming. The main concept of AOP is to gather the treatments related to a specific concern (problem) in a centralized unit called aspect. In this paper, two case studies of AOP are conducted with AspectJ: i) through three different implementations, addressing three distinct issues: Logging, Adding features and Using the Observer design pattern, and ii) through the design of aspect mobile application that is easy to use and quickly accessible and especially through Android devices. Also, the different technologies of AspectJ are used to design our application and illustrate the modularity and the composition of components (database manager, development software, and plugins). For each case study, we present the advantages and disadvantages to better understand and decompose the applications using this programming paradigm. Potential implementation examples are provided to support the explanation of the different situations and justify the use of the AOP to solve these issues. OSGi framework can also be used in the future work to offer dynamic manner of mobile applications.
{"title":"Designing and implementing different use cases of aspect-oriented programming with AspectJ for developing mobile applications","authors":"H. Mcheick, Steve Godmaire","doi":"10.1145/3330089.3330108","DOIUrl":"https://doi.org/10.1145/3330089.3330108","url":null,"abstract":"The separation of concerns as a conceptual paradigm, aims to manage the complexity of the software systems by dividing them into different concerns and aspects. The benefits of this paradigm such as adaptability, reuse and maintenance, have been key drivers of its adoption and usability. These quality attributes have been discussed in aspect-oriented programming (AOP) which is a complement to traditional programming methods, whether object-oriented programming or procedural programming. The main concept of AOP is to gather the treatments related to a specific concern (problem) in a centralized unit called aspect. In this paper, two case studies of AOP are conducted with AspectJ: i) through three different implementations, addressing three distinct issues: Logging, Adding features and Using the Observer design pattern, and ii) through the design of aspect mobile application that is easy to use and quickly accessible and especially through Android devices. Also, the different technologies of AspectJ are used to design our application and illustrate the modularity and the composition of components (database manager, development software, and plugins). For each case study, we present the advantages and disadvantages to better understand and decompose the applications using this programming paradigm. Potential implementation examples are provided to support the explanation of the different situations and justify the use of the AOP to solve these issues. OSGi framework can also be used in the future work to offer dynamic manner of mobile applications.","PeriodicalId":251275,"journal":{"name":"Proceedings of the 7th International Conference on Software Engineering and New Technologies","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129272811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud Computing is a model for enabling on-demand network access to a shared pool of computing resources that can be dynamically allocated and released with minimal effort. However, this task can be complex in highly dynamic environments with various resources to allocate for an increasing number of different users requirements. In this work, we propose Cloud architecture based on a multi-agent and constraint programming (CP), system exhibiting new strategy of allocation resources, with intelligent management of resources. Our approach verified by formal approach to address the dynamic resource allocation. In addition, we validate our proposed Cloud architecture by simulation. Results show that it can properly allocate resources to reduce energy consumption, while satisfying the users demanded QoS.
{"title":"Formal approach to validated allocation process based on MAS and CP system","authors":"Soltane Merzoug, Souraya Hamida, O. Kazar","doi":"10.1145/3330089.3330104","DOIUrl":"https://doi.org/10.1145/3330089.3330104","url":null,"abstract":"Cloud Computing is a model for enabling on-demand network access to a shared pool of computing resources that can be dynamically allocated and released with minimal effort. However, this task can be complex in highly dynamic environments with various resources to allocate for an increasing number of different users requirements. In this work, we propose Cloud architecture based on a multi-agent and constraint programming (CP), system exhibiting new strategy of allocation resources, with intelligent management of resources. Our approach verified by formal approach to address the dynamic resource allocation. In addition, we validate our proposed Cloud architecture by simulation. Results show that it can properly allocate resources to reduce energy consumption, while satisfying the users demanded QoS.","PeriodicalId":251275,"journal":{"name":"Proceedings of the 7th International Conference on Software Engineering and New Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129183054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mouhamadou Saliou Diallo, Moustapha Cissé, M. N'diaye, O. Sall
With the exponential growth in the volume of data and the heterogeneity of information, users are facing increasing difficulties in identifying relevant information, irrelevant information, or even noise. To overcome these issues, mechanisms for customizing information have emerged. The personalization of information consists in adapting the information according to the preferences and/or access context of the user. Context can be seen as any information that describes an entity. The user's preferences are combined in a profile. The user profile can be seen as a setting in factor of the invariant part of the user's preferences. The mechanisms for personalizing information are mainly based on the user profile and the user's access context. The personalization of information cannot be seen as a domain in itself because it is used in various technological fields, namely: the field of information retrieval, the field of databases and the field of human-machine interfaces. The objective of this work is to provide an overview of the mechanisms of information personalization by presenting their foundations and showing you how information personalization is used in the various technological areas mentioned above.
{"title":"State of the art on mechanisms for personalization of information","authors":"Mouhamadou Saliou Diallo, Moustapha Cissé, M. N'diaye, O. Sall","doi":"10.1145/3330089.3330106","DOIUrl":"https://doi.org/10.1145/3330089.3330106","url":null,"abstract":"With the exponential growth in the volume of data and the heterogeneity of information, users are facing increasing difficulties in identifying relevant information, irrelevant information, or even noise. To overcome these issues, mechanisms for customizing information have emerged. The personalization of information consists in adapting the information according to the preferences and/or access context of the user. Context can be seen as any information that describes an entity. The user's preferences are combined in a profile. The user profile can be seen as a setting in factor of the invariant part of the user's preferences. The mechanisms for personalizing information are mainly based on the user profile and the user's access context. The personalization of information cannot be seen as a domain in itself because it is used in various technological fields, namely: the field of information retrieval, the field of databases and the field of human-machine interfaces. The objective of this work is to provide an overview of the mechanisms of information personalization by presenting their foundations and showing you how information personalization is used in the various technological areas mentioned above.","PeriodicalId":251275,"journal":{"name":"Proceedings of the 7th International Conference on Software Engineering and New Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128969288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The document binarization is a primary processing step toward document recognition system. It goals to separate the foreground from the document background. In this paper, we propose an algorithm for the binarization of document images degraded by using the clustering algorithm K-Means with automatic parameter tuning. It uses the K-Means algorithm to classify the document image into three classes as background, foreground and noise labels. Experimental results show that our method is more robust to the state of the art on recent benchmarks on the H-DIBCO 2016 dataset.
{"title":"Automatic Parameter Tuning of K-Means Algorithm for Document Binarization","authors":"A. Gattal, Faycel Abbas, Mohamed Ridda Laouar","doi":"10.1145/3330089.3330124","DOIUrl":"https://doi.org/10.1145/3330089.3330124","url":null,"abstract":"The document binarization is a primary processing step toward document recognition system. It goals to separate the foreground from the document background. In this paper, we propose an algorithm for the binarization of document images degraded by using the clustering algorithm K-Means with automatic parameter tuning. It uses the K-Means algorithm to classify the document image into three classes as background, foreground and noise labels. Experimental results show that our method is more robust to the state of the art on recent benchmarks on the H-DIBCO 2016 dataset.","PeriodicalId":251275,"journal":{"name":"Proceedings of the 7th International Conference on Software Engineering and New Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127886632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The fog computing-based radio access networks work at the same time as capable worldview commencing to 5G remote transmitting framework give elevated unearthly along with vitality effectiveness. In center thought obtain complete points to interest of neighborhood radio flag preparing, consistent on radio asset administration and disseminated putting away abilities in edge gadgets, which can diminish the substantial weight on front haul. In light of fog computing, the cooperation radio flag handling (CRSP) cannot exclusively accomplish during the unified baseband unit into cloud radio access networks. Unfasten concern into the condition of software defined networking, network function virtualization and edge caching recognized. This paper attempts to minimize the security issues in the performance of edge cashing by using Markov chain model. Simulation results are able to reduce the bandwidth consumption of F_RAN through edge caching in between remote radio heads and user equipment's.
{"title":"Optimization of Fog Computing Based Radio Access Networks","authors":"A. Mateen, Qingsheng Zhu, S. Awan, Warda Rashid","doi":"10.1145/3330089.3330120","DOIUrl":"https://doi.org/10.1145/3330089.3330120","url":null,"abstract":"The fog computing-based radio access networks work at the same time as capable worldview commencing to 5G remote transmitting framework give elevated unearthly along with vitality effectiveness. In center thought obtain complete points to interest of neighborhood radio flag preparing, consistent on radio asset administration and disseminated putting away abilities in edge gadgets, which can diminish the substantial weight on front haul. In light of fog computing, the cooperation radio flag handling (CRSP) cannot exclusively accomplish during the unified baseband unit into cloud radio access networks. Unfasten concern into the condition of software defined networking, network function virtualization and edge caching recognized. This paper attempts to minimize the security issues in the performance of edge cashing by using Markov chain model. Simulation results are able to reduce the bandwidth consumption of F_RAN through edge caching in between remote radio heads and user equipment's.","PeriodicalId":251275,"journal":{"name":"Proceedings of the 7th International Conference on Software Engineering and New Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116063140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Scene classification problem is one of the major fields of research in artificial vision. The ability to assign the correct label to a scene can provide a significant advantage to automatic processes in order to achieve their task. This paper explores the possibility to classify a scene using objects as attributes and a discrete spatial envelope theory. The challenge is to be able to distinguish among all the existing objects the most discriminative ones in the scene using a proposed background knowledge and sorting functions. The classification process is then guided by a proposed discrete spatial envelope theory in order to provide an accurate and coherent category of scene. The proposed approach offers very satisfying results going up to 69.92% of well classified scenes on the very challenging SUN397 dataset. Compared to some existing state of the art methods, the proposed approach distinguishes itself by proposing a higher rate of classification.
{"title":"Spatial envelope and background knowledge for scene classification problem","authors":"Benrais Lamine, N. Baha","doi":"10.1145/3330089.3330118","DOIUrl":"https://doi.org/10.1145/3330089.3330118","url":null,"abstract":"Scene classification problem is one of the major fields of research in artificial vision. The ability to assign the correct label to a scene can provide a significant advantage to automatic processes in order to achieve their task. This paper explores the possibility to classify a scene using objects as attributes and a discrete spatial envelope theory. The challenge is to be able to distinguish among all the existing objects the most discriminative ones in the scene using a proposed background knowledge and sorting functions. The classification process is then guided by a proposed discrete spatial envelope theory in order to provide an accurate and coherent category of scene. The proposed approach offers very satisfying results going up to 69.92% of well classified scenes on the very challenging SUN397 dataset. Compared to some existing state of the art methods, the proposed approach distinguishes itself by proposing a higher rate of classification.","PeriodicalId":251275,"journal":{"name":"Proceedings of the 7th International Conference on Software Engineering and New Technologies","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132797301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdelhafid Chadli, E. Tranvouez, A. Hamrouni, F. Bendella
In this paper we present a general idea of a participatory training environment in a context of multi-agent participatory simulation applied to rodent control. In a first step, we focus on the agent-based simulation tool that embeds ecosystem models such as rodent dynamics, weather variation and land occupation. The general idea of our training environment is based on (1) an agent based ecosystems simulation as well as actor's avatar interacting with the simulation; and (2) a negotiation based skill evaluation of the actors' behaviors during the simulation. This paper is a key piece of how the combination of these two approaches can help improving rodent control efficiency.
{"title":"An agent-based simulation tool for participatory training environment: Application to rodent control campaign","authors":"Abdelhafid Chadli, E. Tranvouez, A. Hamrouni, F. Bendella","doi":"10.1145/3330089.3330109","DOIUrl":"https://doi.org/10.1145/3330089.3330109","url":null,"abstract":"In this paper we present a general idea of a participatory training environment in a context of multi-agent participatory simulation applied to rodent control. In a first step, we focus on the agent-based simulation tool that embeds ecosystem models such as rodent dynamics, weather variation and land occupation. The general idea of our training environment is based on (1) an agent based ecosystems simulation as well as actor's avatar interacting with the simulation; and (2) a negotiation based skill evaluation of the actors' behaviors during the simulation. This paper is a key piece of how the combination of these two approaches can help improving rodent control efficiency.","PeriodicalId":251275,"journal":{"name":"Proceedings of the 7th International Conference on Software Engineering and New Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133668301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Smart Grid advanced metering infrastructure (AMI) is one of the key components of the smart grid. It provides a two-way communication network between smart meters and utility systems, offering interactive services for managing billing and energy consumption. However, connecting the smart grid distributed elements, also introduces new vectors for fraud and cyberattacks. In this paper, we propose a novel approach for detecting energy fraud in AMI. The proposed approach leverages the predictability property of the consumption data by applying artificial neural network to profile normal energy consumption enabling the detection of fraudulent behavior. The evaluation of the proposed system on a real publicly available dataset of smart meter consumption data shows a high performance.
{"title":"Energy Fraud Detection in Advanced Metering Infrastructure AMI","authors":"Abdelaziz Amara Korba","doi":"10.1145/3330089.3330127","DOIUrl":"https://doi.org/10.1145/3330089.3330127","url":null,"abstract":"The Smart Grid advanced metering infrastructure (AMI) is one of the key components of the smart grid. It provides a two-way communication network between smart meters and utility systems, offering interactive services for managing billing and energy consumption. However, connecting the smart grid distributed elements, also introduces new vectors for fraud and cyberattacks. In this paper, we propose a novel approach for detecting energy fraud in AMI. The proposed approach leverages the predictability property of the consumption data by applying artificial neural network to profile normal energy consumption enabling the detection of fraudulent behavior. The evaluation of the proposed system on a real publicly available dataset of smart meter consumption data shows a high performance.","PeriodicalId":251275,"journal":{"name":"Proceedings of the 7th International Conference on Software Engineering and New Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128851402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}