Modern modelling languages provide dedicated features to support the detailed design of complex systems from different domains. Nevertheless, especially general-purpose languages provide extensive syntactical expressiveness that, in some cases, may be hard to align with well-defined semantics. This is often inevitable due to the fact that, in order for model-driven approaches to be fruitful, modelling activities should require a lower effort than code-based approaches. In the case of UML and component-based design, precise syntactical definition of the number of component and port instances building up the system is provided. How component instances are explicitly connected to each other via ports is left as a semantic variation point in order for the modeller to freely interpret the related metamodel semantics. On the one hand, in order to allow model analysability, simulation and generation of target code, ad-hoc choices regarding this semantics need to be taken. On the other hand, leaving the burden of this task to the developers is often unthinkable for complex industrial systems (composed by a number of components and connections in the magnitude of 10^4 and above). Therefore we propose a set of semantic rules for the establishment of explicit links between component instances and provide a solution for the automatic generation of these links by applying the defined rules.
{"title":"Exploiting UML Semantic Variation Points to Generate Explicit Component Interconnections in Complex Systems","authors":"Federico Ciccozzi, A. Cicchetti, Mikael Sjödin","doi":"10.1109/ITNG.2013.37","DOIUrl":"https://doi.org/10.1109/ITNG.2013.37","url":null,"abstract":"Modern modelling languages provide dedicated features to support the detailed design of complex systems from different domains. Nevertheless, especially general-purpose languages provide extensive syntactical expressiveness that, in some cases, may be hard to align with well-defined semantics. This is often inevitable due to the fact that, in order for model-driven approaches to be fruitful, modelling activities should require a lower effort than code-based approaches. In the case of UML and component-based design, precise syntactical definition of the number of component and port instances building up the system is provided. How component instances are explicitly connected to each other via ports is left as a semantic variation point in order for the modeller to freely interpret the related metamodel semantics. On the one hand, in order to allow model analysability, simulation and generation of target code, ad-hoc choices regarding this semantics need to be taken. On the other hand, leaving the burden of this task to the developers is often unthinkable for complex industrial systems (composed by a number of components and connections in the magnitude of 10^4 and above). Therefore we propose a set of semantic rules for the establishment of explicit links between component instances and provide a solution for the automatic generation of these links by applying the defined rules.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116577666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is well-documented that low birth weight (LBW) is the most significant factor influencing Neonatal mortality rate (NMR). Over recent decades, accumulating evidence around the world has suggested that LBW may be associated with an increased risk of subsequent development of a variety of complications in adulthood including cardiovascular disease, non-insulin-dependent diabetes mellitus, hypertension, and dyslipidemia. Neonatal birth weight is determined by several criteria such as, maternal age, pre-pregnancy Body Mass Index (BMI), gestation age and neonatal gender. This paper deploys regression analysis to explore the effect of pre-pregnancy BMI and other characteristics on the weight of low birth weight babies. The results indicate that the inclusion of the BMI in the regression model can improve the coefficient of the determination significantly.
{"title":"The Impact of Body Mass Index on Low Birth Weight","authors":"M. Abdollahian","doi":"10.1109/ITNG.2013.71","DOIUrl":"https://doi.org/10.1109/ITNG.2013.71","url":null,"abstract":"It is well-documented that low birth weight (LBW) is the most significant factor influencing Neonatal mortality rate (NMR). Over recent decades, accumulating evidence around the world has suggested that LBW may be associated with an increased risk of subsequent development of a variety of complications in adulthood including cardiovascular disease, non-insulin-dependent diabetes mellitus, hypertension, and dyslipidemia. Neonatal birth weight is determined by several criteria such as, maternal age, pre-pregnancy Body Mass Index (BMI), gestation age and neonatal gender. This paper deploys regression analysis to explore the effect of pre-pregnancy BMI and other characteristics on the weight of low birth weight babies. The results indicate that the inclusion of the BMI in the regression model can improve the coefficient of the determination significantly.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128789501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Knowledge systems are a suitable computational approach to solve complex problems and to provide decision support. Ontologies are an approach for knowledge representation and Ontology Population looks for instantiating the constituent elements of an ontology, like properties and non-taxonomic relationships. Manual population by domain experts and knowledge engineers is an expensive and time consuming task. Thus, automatic or semi-automatic approaches are needed. This paper discusses the problem of Automatic Ontology Population and proposes a generic process specifying its phases and what kind of techniques can be used to perform the activities of each phase. Some techniques representing the state of the art of this field are also described along with the solutions they adopt for each phase of the AOP process with their advantages and limitations. This work is part of HERMES, a Brazil/Portugal research cooperation project looking for techniques and tools for automating the process of ontology learning and population.
{"title":"Analysing the Problem and Main Approaches for Ontology Population","authors":"C. Faria, R. Girardi, P. Novais","doi":"10.1109/ITNG.2013.94","DOIUrl":"https://doi.org/10.1109/ITNG.2013.94","url":null,"abstract":"Knowledge systems are a suitable computational approach to solve complex problems and to provide decision support. Ontologies are an approach for knowledge representation and Ontology Population looks for instantiating the constituent elements of an ontology, like properties and non-taxonomic relationships. Manual population by domain experts and knowledge engineers is an expensive and time consuming task. Thus, automatic or semi-automatic approaches are needed. This paper discusses the problem of Automatic Ontology Population and proposes a generic process specifying its phases and what kind of techniques can be used to perform the activities of each phase. Some techniques representing the state of the art of this field are also described along with the solutions they adopt for each phase of the AOP process with their advantages and limitations. This work is part of HERMES, a Brazil/Portugal research cooperation project looking for techniques and tools for automating the process of ontology learning and population.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Denis Ávila Montini, P. M. Tasinaffo, L. Dias, Alvaro Augusto Neto, A. Cunha, Alessandra Avila Montini
Nowadays there are various forms for performing software design, planning, and manufacturing. To each of these it is required a proper process definition to achieve metrological forecasting goal. In this investigation, the research area is Artificial Intelligence algorithms applied to projects for Production Lines design, characterized as Manufacturing Cells. In this type of approach the design project is aimed at improving the understanding and assertiveness in the planning of the operation, through an Intelligent Agent use. The Intelligent Agent was proposed as a model-driven and was aimed at identifying the code capacity installed in a specific programming language.
{"title":"A Meta-algorithm for Planning Optimization in a software Production Line","authors":"Denis Ávila Montini, P. M. Tasinaffo, L. Dias, Alvaro Augusto Neto, A. Cunha, Alessandra Avila Montini","doi":"10.1109/ITNG.2013.139","DOIUrl":"https://doi.org/10.1109/ITNG.2013.139","url":null,"abstract":"Nowadays there are various forms for performing software design, planning, and manufacturing. To each of these it is required a proper process definition to achieve metrological forecasting goal. In this investigation, the research area is Artificial Intelligence algorithms applied to projects for Production Lines design, characterized as Manufacturing Cells. In this type of approach the design project is aimed at improving the understanding and assertiveness in the planning of the operation, through an Intelligent Agent use. The Intelligent Agent was proposed as a model-driven and was aimed at identifying the code capacity installed in a specific programming language.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Detection of the boundaries of electrocardiogram (ECG) characteristic waves with a reasonable accuracy has been a difficult task. As a classical statistical pattern recognition algorithm characterized with high accuracy and stability, KNN has been proposed for locating the waveform boundaries (the onsets and offsets of P, QRS, and T waves) in ECG signals. First, the QRS-complex of each beat is detected from the ECG signal. Next, the onset and offset of each QRS complex are located. The P wave and T wave, relative to each QRS complex along with their onset and offset points, are then identified using this algorithm. Further, QRS duration, heart rate, QT-interval, P-wave duration and PR-interval have also been computed using ECG wave fiducial points. This algorithm is tested on the ECG dataset acquired using ATRIA®6100 ECG machine in our own laboratory. The results obtained using the proposed algorithm presented for the assessment of performance, has been compared with the output of inbuilt software based detector of ATRIA machine.
{"title":"Delineation of ECG Wave Components Using K-Nearest Neighbor (KNN) Algorithm: ECG Wave Delineation Using KNN","authors":"I. Saini, Dilbag Singh, A. Khosla","doi":"10.1109/ITNG.2013.76","DOIUrl":"https://doi.org/10.1109/ITNG.2013.76","url":null,"abstract":"Detection of the boundaries of electrocardiogram (ECG) characteristic waves with a reasonable accuracy has been a difficult task. As a classical statistical pattern recognition algorithm characterized with high accuracy and stability, KNN has been proposed for locating the waveform boundaries (the onsets and offsets of P, QRS, and T waves) in ECG signals. First, the QRS-complex of each beat is detected from the ECG signal. Next, the onset and offset of each QRS complex are located. The P wave and T wave, relative to each QRS complex along with their onset and offset points, are then identified using this algorithm. Further, QRS duration, heart rate, QT-interval, P-wave duration and PR-interval have also been computed using ECG wave fiducial points. This algorithm is tested on the ECG dataset acquired using ATRIA®6100 ECG machine in our own laboratory. The results obtained using the proposed algorithm presented for the assessment of performance, has been compared with the output of inbuilt software based detector of ATRIA machine.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123962161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Supervisory Control and Data Acquisition (SCADA) systems are widely used in automated manufacturing and in all areas of our nation's infrastructure. Current research on SCADA security focuses on the primary SCADA components and targets network centric attacks. Security risks via attacks against the peripheral devices such as the Programmable Logic Controllers (PLCs) have not been sufficiently addressed. Since PLCs dictate the functionality of the processes it is crucial that they function correctly and securely. In this paper we study the problem of providing safety and security for ladder logic code. We argue that general purpose safety and security methods are insufficient for PLCs due to the specific context and the unique processing logic of ladder logic applications. We present a PLC Security Framework (PLC-SF) that is compatible with the current PLC compilers, detects and classifies incorrect and unsafe ladder logic code. After the classification of the vulnerabilities, PLC-SF recommends appropriate design-patterns to eliminate the problems.
{"title":"Software Safety and Security for Programmable Logic Controllers","authors":"C. Farkas, Sidney Valentine","doi":"10.1109/ITNG.2013.98","DOIUrl":"https://doi.org/10.1109/ITNG.2013.98","url":null,"abstract":"Supervisory Control and Data Acquisition (SCADA) systems are widely used in automated manufacturing and in all areas of our nation's infrastructure. Current research on SCADA security focuses on the primary SCADA components and targets network centric attacks. Security risks via attacks against the peripheral devices such as the Programmable Logic Controllers (PLCs) have not been sufficiently addressed. Since PLCs dictate the functionality of the processes it is crucial that they function correctly and securely. In this paper we study the problem of providing safety and security for ladder logic code. We argue that general purpose safety and security methods are insufficient for PLCs due to the specific context and the unique processing logic of ladder logic applications. We present a PLC Security Framework (PLC-SF) that is compatible with the current PLC compilers, detects and classifies incorrect and unsafe ladder logic code. After the classification of the vulnerabilities, PLC-SF recommends appropriate design-patterns to eliminate the problems.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114624693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The popularity of mobile application platforms like IOS, Android or Windows Phone 7 increases from day to day. Affiliated app stores offer thousands of different applications (so called apps) for nearly any imaginable purpose. From a software developer's point of view these app stores provide high potential: developers have the chance to reach the general public, thus having a much broader audience than with any other channel of distribution. Nevertheless, the increased amount of potential customers also increases expectations related to user experience. The user interface as the main interaction hub in mobile environments attracts a lot more attention. The success or failure of an app is often related to its user interface. Furthermore, users often demand the same user experience on different platforms. In order to allow for high quality in user interface development and to enable development for different platforms, a framework is presented that provides a platform independent definition of a user interface backed by constraints in form of rules. Using model driven development, the framework allows the creation of user interfaces that are not related to a specific target technology. Furthermore, it provides the ability to define a user interface and transform it into a destination user interface, whether this will be Android, iPhone or Windows Phone 7, with respect to given rules.
{"title":"Rule-Based Generation of Mobile User Interfaces","authors":"Andreas Schuler, Barbara Franz","doi":"10.1109/ITNG.2013.43","DOIUrl":"https://doi.org/10.1109/ITNG.2013.43","url":null,"abstract":"The popularity of mobile application platforms like IOS, Android or Windows Phone 7 increases from day to day. Affiliated app stores offer thousands of different applications (so called apps) for nearly any imaginable purpose. From a software developer's point of view these app stores provide high potential: developers have the chance to reach the general public, thus having a much broader audience than with any other channel of distribution. Nevertheless, the increased amount of potential customers also increases expectations related to user experience. The user interface as the main interaction hub in mobile environments attracts a lot more attention. The success or failure of an app is often related to its user interface. Furthermore, users often demand the same user experience on different platforms. In order to allow for high quality in user interface development and to enable development for different platforms, a framework is presented that provides a platform independent definition of a user interface backed by constraints in form of rules. Using model driven development, the framework allows the creation of user interfaces that are not related to a specific target technology. Furthermore, it provides the ability to define a user interface and transform it into a destination user interface, whether this will be Android, iPhone or Windows Phone 7, with respect to given rules.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121605541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Burgos-Amador, Jesus Martinez Cruz, Sergio Recio-Perez
Games are on the Internet to stay. Their popularity and use are growing every day, and some genres such as the Massive Multiplayer Online Role-Playing Games (MMORPGs) have become an important source of network traffic having several thousands of simultaneous players at any one time. These kinds of games constitute a real challenge for developers but also for Internet service providers due to their high requirements of bandwidth and hardware resources. Therefore, it is really important for MMORPGs to be supported by high-performance network code. We show how these games can benefit from the new transport protocol in the TCP/IP stack, the Stream Control Transmission Protocol (SCTP) which can increase the overall efficiency of a game protocol in terms of latency and jitter, along with extra savings in processing time for packet management. Both of these are important details for player's game experience and for server resource provisioning, respectively.
{"title":"Reducing the Impact of Massive Multiplayer Online Games on the Internet Using SCTP","authors":"David Burgos-Amador, Jesus Martinez Cruz, Sergio Recio-Perez","doi":"10.1109/ITNG.2013.9","DOIUrl":"https://doi.org/10.1109/ITNG.2013.9","url":null,"abstract":"Games are on the Internet to stay. Their popularity and use are growing every day, and some genres such as the Massive Multiplayer Online Role-Playing Games (MMORPGs) have become an important source of network traffic having several thousands of simultaneous players at any one time. These kinds of games constitute a real challenge for developers but also for Internet service providers due to their high requirements of bandwidth and hardware resources. Therefore, it is really important for MMORPGs to be supported by high-performance network code. We show how these games can benefit from the new transport protocol in the TCP/IP stack, the Stream Control Transmission Protocol (SCTP) which can increase the overall efficiency of a game protocol in terms of latency and jitter, along with extra savings in processing time for packet management. Both of these are important details for player's game experience and for server resource provisioning, respectively.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cognitive radio is a recent innovative technique to exploit the current limitations on spectrum scarcity. Defined from software defined radio, the cognitive users use the unused spectrum (spectrum holes) using various techniques to detect and efficiently allocate the unused spectrum. The process requires complex computations and many times software packages to be downloaded. This drains the battery power and panics the mobile users and other users with limited battery power. To meet the consequences, a new model called cognitive radio networks with cloud (CRNC) is introduced in this research. The proposed model eliminates the current problems in transmission of information and helps in the real-time process. Simulations were conducted with the proposed CRNC model and discussed the possible packet transfer.
{"title":"Modeling Cognitive Radio Networks for Efficient Data Transfer Using Cloud Link","authors":"Y. Reddy, Stephen Ellis","doi":"10.1109/ITNG.2013.87","DOIUrl":"https://doi.org/10.1109/ITNG.2013.87","url":null,"abstract":"Cognitive radio is a recent innovative technique to exploit the current limitations on spectrum scarcity. Defined from software defined radio, the cognitive users use the unused spectrum (spectrum holes) using various techniques to detect and efficiently allocate the unused spectrum. The process requires complex computations and many times software packages to be downloaded. This drains the battery power and panics the mobile users and other users with limited battery power. To meet the consequences, a new model called cognitive radio networks with cloud (CRNC) is introduced in this research. The proposed model eliminates the current problems in transmission of information and helps in the real-time process. Simulations were conducted with the proposed CRNC model and discussed the possible packet transfer.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130170344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The value of Artificial Neural Networks (ANNs) methods in performing complicated pattern recognition and nonlinear estimation tasks has been demonstrated across an impressive spectrum of applications. ANNs methods are also used in software development process, since it is a complex environment with many interrelated factors affecting development effort and productivity. Accurate forecasting has proved difficult since many of these interrelationships are not fully understood. This paper provides an overview on the use Artificial Neural Networks methods to estimate the development effort for software development projects. In this survey an explanation, on why those methods are used and how accurate they are.
{"title":"Software Effort Estimation Using Artificial Neural Networks: A Survey of the Current Practices","authors":"H. Hamza, Amr A. Kamel, K. M. Shams","doi":"10.1109/ITNG.2013.111","DOIUrl":"https://doi.org/10.1109/ITNG.2013.111","url":null,"abstract":"The value of Artificial Neural Networks (ANNs) methods in performing complicated pattern recognition and nonlinear estimation tasks has been demonstrated across an impressive spectrum of applications. ANNs methods are also used in software development process, since it is a complex environment with many interrelated factors affecting development effort and productivity. Accurate forecasting has proved difficult since many of these interrelationships are not fully understood. This paper provides an overview on the use Artificial Neural Networks methods to estimate the development effort for software development projects. In this survey an explanation, on why those methods are used and how accurate they are.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133541197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}