首页 > 最新文献

2015 International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
A Novel Detection Scheme Based on D-S Evidence Theory in Wireless Sensor Networks 一种基于D-S证据理论的无线传感器网络检测方案
Kai Yang, Shuguang Liu, Xiuguang Li
Wireless sensor networks (WSNs) is a key technology which is deployed under the assumption that participating sensors are cooperative in forwarding each other's packets. However, some nodes may behave selfishly by dropping other's packets or refusing to provide services in an attempt to maximize its throughput with minimum expense. In this paper, we present a novel detection scheme based on Dempster-Shafer (D-S) evidence theory in WSN to detect and isolate misbehavior sensors. However, when the scheme is operated, counter-intuitive results may appear. To overcome this problem, this paper improves the original D-S evidence theory, which defines a new variable to modify the collected evidence before combination and then combines these evidences according to Dempster combination rule. Simulation results show that this scheme can detect and isolate misbehavior sensors effectively and accurately, suppress nodes collusion and improve network performance. Compared with other existing detection scheme, this scheme has more security, robustness and accuracy.
无线传感器网络(WSNs)是一项关键技术,它是在参与的传感器相互协作转发数据包的前提下部署的。然而,有些节点可能表现得很自私,比如丢弃其他节点的数据包或拒绝提供服务,试图以最小的代价最大化自己的吞吐量。本文提出了一种基于Dempster-Shafer (D-S)证据理论的WSN检测方案,用于检测和隔离不良行为传感器。然而,当该方案被操作时,可能会出现反直觉的结果。为了克服这一问题,本文对原来的D-S证据理论进行了改进,定义了一个新的变量来修改合并前收集到的证据,然后根据Dempster合并规则对这些证据进行合并。仿真结果表明,该方案能够有效、准确地检测和隔离异常传感器,抑制节点合谋,提高网络性能。与现有的检测方案相比,该方案具有更高的安全性、鲁棒性和准确性。
{"title":"A Novel Detection Scheme Based on D-S Evidence Theory in Wireless Sensor Networks","authors":"Kai Yang, Shuguang Liu, Xiuguang Li","doi":"10.1109/INCoS.2015.64","DOIUrl":"https://doi.org/10.1109/INCoS.2015.64","url":null,"abstract":"Wireless sensor networks (WSNs) is a key technology which is deployed under the assumption that participating sensors are cooperative in forwarding each other's packets. However, some nodes may behave selfishly by dropping other's packets or refusing to provide services in an attempt to maximize its throughput with minimum expense. In this paper, we present a novel detection scheme based on Dempster-Shafer (D-S) evidence theory in WSN to detect and isolate misbehavior sensors. However, when the scheme is operated, counter-intuitive results may appear. To overcome this problem, this paper improves the original D-S evidence theory, which defines a new variable to modify the collected evidence before combination and then combines these evidences according to Dempster combination rule. Simulation results show that this scheme can detect and isolate misbehavior sensors effectively and accurately, suppress nodes collusion and improve network performance. Compared with other existing detection scheme, this scheme has more security, robustness and accuracy.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Estimating Harvestable Solar Energy from Atmospheric Pressure Using Support Vector Regression 利用支持向量回归估计大气压力下可收获的太阳能
P. Krömer, P. Musílek, J. Rodway, M. Reformat, Michal Prauzek
Energy neutrality is the desired mode of operation of many sensor networks used for environmental monitoring. Intelligent energy harvesting networks, composed of nodes equipped with solar panels and other types of power-scavenging devices, can plan and manage their operations according to short and long-term predictions of ambient energy availability. This paper introduces a novel method for next-day solar energy prediction based on atmospheric pressure and support vector regression. A location-specific support vector regression model is in this approach created using a collection of geospatially correlated atmospheric pressure and solar intensity measurements. The trained model is used to estimate next day solar energy availability from a time series of recent atmospheric pressure values and their differences. The ability of the proposed system to estimate daily solar energy is compared to a recent evolutionary-fuzzy prediction scheme and traditional analytical estimates.
能量中性是许多用于环境监测的传感器网络的理想运行模式。智能能量收集网络由配备太阳能电池板和其他类型的能量收集设备的节点组成,可以根据对环境能源可用性的短期和长期预测来规划和管理其运行。提出了一种基于大气压力和支持向量回归的次日太阳能量预测新方法。在这种方法中,使用地理空间相关的大气压力和太阳强度测量值的集合创建了特定位置的支持向量回归模型。经过训练的模型用于从最近的大气压力值及其差异的时间序列中估计第二天的太阳能可用性。将该系统估计日太阳能的能力与最近的进化模糊预测方案和传统的分析估计进行了比较。
{"title":"Estimating Harvestable Solar Energy from Atmospheric Pressure Using Support Vector Regression","authors":"P. Krömer, P. Musílek, J. Rodway, M. Reformat, Michal Prauzek","doi":"10.1109/INCoS.2015.58","DOIUrl":"https://doi.org/10.1109/INCoS.2015.58","url":null,"abstract":"Energy neutrality is the desired mode of operation of many sensor networks used for environmental monitoring. Intelligent energy harvesting networks, composed of nodes equipped with solar panels and other types of power-scavenging devices, can plan and manage their operations according to short and long-term predictions of ambient energy availability. This paper introduces a novel method for next-day solar energy prediction based on atmospheric pressure and support vector regression. A location-specific support vector regression model is in this approach created using a collection of geospatially correlated atmospheric pressure and solar intensity measurements. The trained model is used to estimate next day solar energy availability from a time series of recent atmospheric pressure values and their differences. The ability of the proposed system to estimate daily solar energy is compared to a recent evolutionary-fuzzy prediction scheme and traditional analytical estimates.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Knowledge Management Process to Enhance Trustworthiness-based Security in On-line Learning Teams 一个知识管理过程,以提高在线学习团队基于信任的安全性
Jorge Miguel, S. Caballé, F. Xhafa
Both information and communication technologies and computer-supported collaborative learning have been widely adopted in many educational institutions. Likewise, general e-assessment processes offer enormous opportunities to enhance student's learning experience. In this context, e-Learning stakeholders are increasingly demanding new requirements and, among them, information security in e-Learning stands out as a key factor. One of the key strategies in information security is that security drawbacks cannot be solved with technology solutions alone. Thus we have proposed a functional approach based on trustworthiness, namely, a trustworthiness security methodology. Since this methodology proposes processes and methods, which are closely related to knowledge management, in this paper, we will endow our methodology with current knowledge management processes. For this reason, we analyse the current models and techniques used for general knowledge management to be applied to trustworthy data from e-Learning systems. Moreover, we discuss several issues that arise when managing large data sets that span a rather long period of time. Hence, the main goal of this paper is to analyse existing knowledge management processes to endow our trustworthiness security methodology with a suitable set of knowledge management techniques and models. Finally, we exemplify the approach with trustworthy data of the on-line activity of virtual classrooms in our Virtual Campus of Open University of Catalonia.
信息通信技术和计算机支持的协作学习在许多教育机构中被广泛采用。同样,一般的电子评估过程为提高学生的学习体验提供了巨大的机会。在此背景下,电子学习的利益相关者提出了越来越多的新要求,其中,电子学习的信息安全是一个关键因素。信息安全的关键策略之一是,安全缺陷不能仅靠技术解决方案来解决。因此,我们提出了一种基于可信度的功能方法,即可信度安全方法。由于该方法提出的过程和方法与知识管理密切相关,因此在本文中,我们将赋予我们的方法以当前的知识管理过程。出于这个原因,我们分析了当前用于一般知识管理的模型和技术,以便将其应用于来自电子学习系统的可靠数据。此外,我们还讨论了在管理跨越相当长时间的大型数据集时出现的几个问题。因此,本文的主要目标是分析现有的知识管理流程,为我们的可信安全方法论提供一套合适的知识管理技术和模型。最后,我们用加泰罗尼亚开放大学虚拟校园中虚拟教室在线活动的可信数据举例说明了这种方法。
{"title":"A Knowledge Management Process to Enhance Trustworthiness-based Security in On-line Learning Teams","authors":"Jorge Miguel, S. Caballé, F. Xhafa","doi":"10.1109/INCoS.2015.70","DOIUrl":"https://doi.org/10.1109/INCoS.2015.70","url":null,"abstract":"Both information and communication technologies and computer-supported collaborative learning have been widely adopted in many educational institutions. Likewise, general e-assessment processes offer enormous opportunities to enhance student's learning experience. In this context, e-Learning stakeholders are increasingly demanding new requirements and, among them, information security in e-Learning stands out as a key factor. One of the key strategies in information security is that security drawbacks cannot be solved with technology solutions alone. Thus we have proposed a functional approach based on trustworthiness, namely, a trustworthiness security methodology. Since this methodology proposes processes and methods, which are closely related to knowledge management, in this paper, we will endow our methodology with current knowledge management processes. For this reason, we analyse the current models and techniques used for general knowledge management to be applied to trustworthy data from e-Learning systems. Moreover, we discuss several issues that arise when managing large data sets that span a rather long period of time. Hence, the main goal of this paper is to analyse existing knowledge management processes to endow our trustworthiness security methodology with a suitable set of knowledge management techniques and models. Finally, we exemplify the approach with trustworthy data of the on-line activity of virtual classrooms in our Virtual Campus of Open University of Catalonia.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive Serious Games for Emergency Evacuation Training 紧急疏散训练的自适应严肃游戏
N. Capuano, Richard King
The preparation of evacuation plans for public buildings and the related training is mandated by law in many countries. The traditional approaches for providing people with the correct emergency information tend to be based on long, written instructions, posted on doors and walls that are not necessarily read by occupants and on evacuation drills that are costly, rarely performed and focused on specific scenarios. To overcome these limits we propose an engaging approach for evacuation training, targeted towards primary and secondary school students and based on adaptive serious games. The student is immersed in a virtual environment representing his/her school during an emergency with the aim of evacuating and adopting the correct behaviour. Any performed action is evaluated by the system, feedback is provided immediately and also when the game ends. Recovery training material is automatically arranged and provided to the student to explain any errors he/she made and to help reach better subsequent performances. Ontologies have been used to represent emergency skills and to relate them to possible actions within the game environment. Action-based assessment and sequencing techniques have been applied to arrange useful training material.
在许多国家,制定公共建筑疏散计划和相关培训都是法律规定的。向人们提供正确的紧急信息的传统方法往往是基于张贴在门上和墙上的冗长的书面说明,居住者不一定会阅读这些说明,以及昂贵的疏散演习,这些演习很少进行,并且集中在特定的情况下。为了克服这些限制,我们提出了一种引人入胜的疏散训练方法,针对中小学生,基于自适应严肃游戏。在紧急情况下,学生沉浸在代表他/她学校的虚拟环境中,目的是疏散并采取正确的行为。任何执行的动作都将由系统进行评估,并在游戏结束时立即提供反馈。恢复训练材料会自动安排并提供给学生,以解释他/她所犯的任何错误,并帮助他/她达到更好的后续表现。本体被用来表示紧急技能,并将它们与游戏环境中的可能行动联系起来。已采用基于行动的评估和排序技术来安排有用的培训材料。
{"title":"Adaptive Serious Games for Emergency Evacuation Training","authors":"N. Capuano, Richard King","doi":"10.1109/INCoS.2015.32","DOIUrl":"https://doi.org/10.1109/INCoS.2015.32","url":null,"abstract":"The preparation of evacuation plans for public buildings and the related training is mandated by law in many countries. The traditional approaches for providing people with the correct emergency information tend to be based on long, written instructions, posted on doors and walls that are not necessarily read by occupants and on evacuation drills that are costly, rarely performed and focused on specific scenarios. To overcome these limits we propose an engaging approach for evacuation training, targeted towards primary and secondary school students and based on adaptive serious games. The student is immersed in a virtual environment representing his/her school during an emergency with the aim of evacuating and adopting the correct behaviour. Any performed action is evaluated by the system, feedback is provided immediately and also when the game ends. Recovery training material is automatically arranged and provided to the student to explain any errors he/she made and to help reach better subsequent performances. Ontologies have been used to represent emergency skills and to relate them to possible actions within the game environment. Action-based assessment and sequencing techniques have been applied to arrange useful training material.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131421567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Fundamental Study on Coded Aperture Design for Depth from Projector Defocus Based on Evolutionary Multi-objective Optimization 基于进化多目标优化的投影离焦深度编码孔径设计基础研究
Yudai Mido, Yuuki Horita, Kentaro Nakai, Taishi Megano, S. Ono, Hiroshi Kawasaki
It is a reasonable idea to solve a problem whose property has not been clarified yet using evolutionary multiobjective optimization (EMO) because EMO does not require domain specific knowledge and analysis for obtained pareto solution set may reveal relationships between design variables and objective functions. This paper focuses on designing a coded aperture (CA), one of the hot topics in computer photography; CA is used in a camera or a projector for deblurring, constructing all-focus image, depth estimation and so on. Since little knowledge has been accumulated for designing CA, this paper proposes a CA design method using EMO. Experiments on designing projector aperture have shown relationships between the performance of depth estimation, aperture ratio, and noise robustness.
利用进化多目标优化(EMO)来解决性质尚未明确的问题是一种合理的思路,因为EMO不需要特定领域的知识,而且对得到的pareto解集的分析可以揭示设计变量与目标函数之间的关系。本文重点研究了编码光圈(CA)的设计,这是计算机摄影领域的热点之一;CA应用于相机或投影仪中,用于去模糊、构建全焦图像、深度估计等。由于CA设计方面的知识积累较少,本文提出了一种基于EMO的CA设计方法。设计投影仪孔径的实验证明了深度估计性能、孔径比和噪声鲁棒性之间的关系。
{"title":"A Fundamental Study on Coded Aperture Design for Depth from Projector Defocus Based on Evolutionary Multi-objective Optimization","authors":"Yudai Mido, Yuuki Horita, Kentaro Nakai, Taishi Megano, S. Ono, Hiroshi Kawasaki","doi":"10.1109/INCoS.2015.91","DOIUrl":"https://doi.org/10.1109/INCoS.2015.91","url":null,"abstract":"It is a reasonable idea to solve a problem whose property has not been clarified yet using evolutionary multiobjective optimization (EMO) because EMO does not require domain specific knowledge and analysis for obtained pareto solution set may reveal relationships between design variables and objective functions. This paper focuses on designing a coded aperture (CA), one of the hot topics in computer photography; CA is used in a camera or a projector for deblurring, constructing all-focus image, depth estimation and so on. Since little knowledge has been accumulated for designing CA, this paper proposes a CA design method using EMO. Experiments on designing projector aperture have shown relationships between the performance of depth estimation, aperture ratio, and noise robustness.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122423508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ontology about Emotion Awareness and Affective Feedback in Elearning 网络学习中情感意识与情感反馈的本体
Marta Arguedas, F. Xhafa, T. Daradoumis
In this paper, we propose designing a specific ontology for representing relevant aspects of affective phenomena in e-learning. The ontology is aimed to include the different types of emotions, moods and behaviors that students experience in the e-learning environments, the different types of feedback that teachers can provide to their students and the different effects in students' behavior during the e-learning process. Once the ontology is formalized, it will be used to design a virtual Affective Pedagogical Tutor (APT) based on an Event-Condition-Action rule system to provide affective feedback, aiming to provide a positive change in students' behavior and performance. The ultimate goal is to provide means for effective emotion management in a collaborative learning environment.
在本文中,我们建议设计一个特定的本体来表示电子学习中情感现象的相关方面。本体论旨在包括学生在电子学习环境中体验到的不同类型的情绪、情绪和行为,教师提供给学生的不同类型的反馈,以及在电子学习过程中对学生行为的不同影响。在本体形式化之后,利用本体设计一个基于事件-条件-动作规则系统的虚拟情感教学导师(APT),提供情感反馈,旨在为学生的行为和表现提供积极的改变。最终目标是在协作学习环境中提供有效的情绪管理方法。
{"title":"An Ontology about Emotion Awareness and Affective Feedback in Elearning","authors":"Marta Arguedas, F. Xhafa, T. Daradoumis","doi":"10.1109/INCoS.2015.78","DOIUrl":"https://doi.org/10.1109/INCoS.2015.78","url":null,"abstract":"In this paper, we propose designing a specific ontology for representing relevant aspects of affective phenomena in e-learning. The ontology is aimed to include the different types of emotions, moods and behaviors that students experience in the e-learning environments, the different types of feedback that teachers can provide to their students and the different effects in students' behavior during the e-learning process. Once the ontology is formalized, it will be used to design a virtual Affective Pedagogical Tutor (APT) based on an Event-Condition-Action rule system to provide affective feedback, aiming to provide a positive change in students' behavior and performance. The ultimate goal is to provide means for effective emotion management in a collaborative learning environment.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130382203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Parallel NoSQL Entity Resolution Approach with MapReduce 基于MapReduce的并行NoSQL实体解析方法
Kun Ma, Bo Yang
To address the limitation of entity resolution of NoSQL documents, we propose a new parallel NoSQL entity resolution approach with MapReduce. Although current MapReduce framework enables efficient parallel execution of entity resolution, it cannot find duplicates in adjacent block easily. Therefore, we investigate possible solutions called Partition-Sort-Map-Reduce to find duplicates by overlapping boundary objects in adjacent blocks. Finally, our experimental evaluation based on NoSQL breeding data and the analysis of time complexity show the high effectiveness and efficiency of the proposed entity resolution approaches.
为了解决NoSQL文档实体解析的局限性,我们提出了一种新的基于MapReduce的并行NoSQL实体解析方法。虽然当前的MapReduce框架能够有效地并行执行实体解析,但它不能很容易地找到相邻块中的重复项。因此,我们研究了可能的解决方案,称为Partition-Sort-Map-Reduce,通过在相邻块中重叠边界对象来查找重复项。最后,基于NoSQL育种数据的实验评估和时间复杂度分析表明,本文提出的实体解析方法具有较高的有效性和高效性。
{"title":"Parallel NoSQL Entity Resolution Approach with MapReduce","authors":"Kun Ma, Bo Yang","doi":"10.1109/INCoS.2015.16","DOIUrl":"https://doi.org/10.1109/INCoS.2015.16","url":null,"abstract":"To address the limitation of entity resolution of NoSQL documents, we propose a new parallel NoSQL entity resolution approach with MapReduce. Although current MapReduce framework enables efficient parallel execution of entity resolution, it cannot find duplicates in adjacent block easily. Therefore, we investigate possible solutions called Partition-Sort-Map-Reduce to find duplicates by overlapping boundary objects in adjacent blocks. Finally, our experimental evaluation based on NoSQL breeding data and the analysis of time complexity show the high effectiveness and efficiency of the proposed entity resolution approaches.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126784374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Collaborative Composition of Production Services in Multi-agent Systems Based on Auctions 基于拍卖的多智能体系统生产服务协同组合
Fu-Shiung Hsieh
Although computer aided design (CAD) and computer-aided manufacturing (CAM) tools have been widely adopted in industry, it still takes a lot of time for the partners to coordinate to create a good solution. To respond to business opportunities, it calls for the development of a methodology to support and automate composition of production processes dynamically. The goal of this paper is to propose a methodology to link process specification models, negotiation mechanism and optimization methods to achieve the desired cycle time and generate processes dynamically. We exploit recent advancements in artificial intelligence and optimization theories to develop a solution methodology for dynamic composition of production processes in multi-agent systems (MAS). To develop such a design methodology relies on an appropriate process specification model to describe the tasks and a mechanism to allocate resources to production processes. Petri nets have been widely applied in modeling of workflows. Combinatorial reverse auctions provide an effective mechanism to select the resources to perform the required operations in workflows. Therefore, we combine Petri net models with combinatorial reverse auctions to dynamically plan the production processes based on MAS and construct a model to control the operations at the shop floor. Our design methodology automates the dynamic composition of production processes. An application scenario has also been provided to verify our solution methodology. We also conduct experiments to illustrate the computational efficiency and scalability of our proposed method.
尽管计算机辅助设计(CAD)和计算机辅助制造(CAM)工具在工业中得到了广泛的应用,但合作伙伴之间的协调仍然需要花费大量的时间来创建一个好的解决方案。为了响应业务机会,它要求开发一种方法来动态地支持和自动化生产过程的组合。本文的目标是提出一种将过程规范模型、协商机制和优化方法联系起来的方法,以实现期望的周期时间和动态生成过程。我们利用人工智能和优化理论的最新进展来开发多智能体系统(MAS)中生产过程动态组成的解决方案方法。开发这样的设计方法依赖于一个适当的过程规范模型来描述任务,以及一个将资源分配给生产过程的机制。Petri网在工作流建模中得到了广泛应用。组合反向拍卖提供了一种有效的机制来选择资源来执行工作流中所需的操作。因此,我们将Petri网模型与组合逆向拍卖相结合,在MAS的基础上对生产过程进行动态规划,并构建了车间操作控制模型。我们的设计方法使生产过程的动态组成自动化。还提供了一个应用程序场景来验证我们的解决方案方法。我们还进行了实验来说明我们提出的方法的计算效率和可扩展性。
{"title":"Collaborative Composition of Production Services in Multi-agent Systems Based on Auctions","authors":"Fu-Shiung Hsieh","doi":"10.1109/INCoS.2015.17","DOIUrl":"https://doi.org/10.1109/INCoS.2015.17","url":null,"abstract":"Although computer aided design (CAD) and computer-aided manufacturing (CAM) tools have been widely adopted in industry, it still takes a lot of time for the partners to coordinate to create a good solution. To respond to business opportunities, it calls for the development of a methodology to support and automate composition of production processes dynamically. The goal of this paper is to propose a methodology to link process specification models, negotiation mechanism and optimization methods to achieve the desired cycle time and generate processes dynamically. We exploit recent advancements in artificial intelligence and optimization theories to develop a solution methodology for dynamic composition of production processes in multi-agent systems (MAS). To develop such a design methodology relies on an appropriate process specification model to describe the tasks and a mechanism to allocate resources to production processes. Petri nets have been widely applied in modeling of workflows. Combinatorial reverse auctions provide an effective mechanism to select the resources to perform the required operations in workflows. Therefore, we combine Petri net models with combinatorial reverse auctions to dynamically plan the production processes based on MAS and construct a model to control the operations at the shop floor. Our design methodology automates the dynamic composition of production processes. An application scenario has also been provided to verify our solution methodology. We also conduct experiments to illustrate the computational efficiency and scalability of our proposed method.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126646037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analytic Information Systems in the Context of Higher Education: Expectations, Reality and Trends 高等教育背景下的分析信息系统:期望、现实与趋势
I. Guitart, J. Conesa
Competitive organizations have implemented systems of business intelligence in order to help employees in the process of evidence-based decision-making. Using these systems in university will provide a set of analytical tools that support decision-making of academics focused to the improvement of their research and teaching activities. In the case of teachers, for example, it may help to better understand students, how they learn and how to improve the learning processes according to evidences. To implement these systems efficiently it is necessary to gather data about the activities students and teachers perform during the learning-teaching process. Currently, most universities provide virtual learning environments (VLE) where students perform most of their learning activities. These environments may store data about the interaction of their users and, therefore, gather information of all the agents during the teaching-learning process. Our proposal is to adopt the strategies of business intelligence, which resulted useful in organizations, to universities. By applying analytic techniques on the large volume of data stored in the VLE, we propose to build dashboards for teachers and academic program managers in order to help them to take decisions that improve teaching in the short, medium and long term.
竞争性组织已经实施了商业智能系统,以帮助员工在循证决策的过程中。在大学中使用这些系统将提供一套分析工具,以支持专注于改进其研究和教学活动的学者的决策。例如,就教师而言,它可能有助于更好地了解学生,了解他们如何学习以及如何根据证据改进学习过程。为了有效地实施这些系统,有必要收集学生和教师在学习-教学过程中进行的活动的数据。目前,大多数大学都提供虚拟学习环境(VLE),学生可以在其中进行大部分学习活动。这些环境可能存储有关其用户交互的数据,因此,在教学过程中收集所有代理的信息。我们的建议是采用商业智能的策略,这在组织和大学中都很有用。通过对VLE中存储的大量数据应用分析技术,我们建议为教师和学术项目经理构建仪表板,以帮助他们做出改善短期、中期和长期教学的决策。
{"title":"Analytic Information Systems in the Context of Higher Education: Expectations, Reality and Trends","authors":"I. Guitart, J. Conesa","doi":"10.1109/INCoS.2015.71","DOIUrl":"https://doi.org/10.1109/INCoS.2015.71","url":null,"abstract":"Competitive organizations have implemented systems of business intelligence in order to help employees in the process of evidence-based decision-making. Using these systems in university will provide a set of analytical tools that support decision-making of academics focused to the improvement of their research and teaching activities. In the case of teachers, for example, it may help to better understand students, how they learn and how to improve the learning processes according to evidences. To implement these systems efficiently it is necessary to gather data about the activities students and teachers perform during the learning-teaching process. Currently, most universities provide virtual learning environments (VLE) where students perform most of their learning activities. These environments may store data about the interaction of their users and, therefore, gather information of all the agents during the teaching-learning process. Our proposal is to adopt the strategies of business intelligence, which resulted useful in organizations, to universities. By applying analytic techniques on the large volume of data stored in the VLE, we propose to build dashboards for teachers and academic program managers in order to help them to take decisions that improve teaching in the short, medium and long term.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125875689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Critical Analysis of the Efficiencies of Emerging Wireless Security Standards Against Network Attacks 新兴无线安全标准对网络攻击效率的关键分析
Karolis Vilius, Lu Liu, John Panneerselvam, T. Stimpson
Given the emergence of the wireless technologies in the recent past, their utilities in both home and industrial applications have taken new shapes in various dimensions. Along with this progressive growth is the substantial emergence of the network attackers as they are finding new bases and platforms for launching network attacks. Existing wireless security standards are not persistent enough under the lights of the emerging malicious attackers. Since the first implementation of wireless networks, it was noticed that the original WEP encryption methods had flawed security which led to the industry searching for new solutions to secure wireless communications. Whilst enterprises were able to take advantage of these developments, many home users were unaware of the dangers posed by weak wireless encryption and are continued to employ vulnerable encryption. Thus it has become a necessity to explore and reveal the current security trends and their efficiencies against the present form of the network vulnerabilities from time to time. To this end, this paper delves into the background of weak encryption protocols and identifies the risks and countermeasures for protecting wireless networks against attacks. This research also includes the analysis on the data collected from scanning the wireless networks in the city of Derby in the United Kingdom. An important outcome of this research work is the critical evaluation of the security standards along with the recognition of the encryption protocol patterns in existence from 2006 to 2015.
鉴于无线技术在最近的出现,它们在家庭和工业应用中的效用在各个方面都呈现出新的形式。伴随着这种逐渐增长的是网络攻击者的大量出现,因为他们正在寻找新的基地和平台来发动网络攻击。在新出现的恶意攻击者的光芒下,现有的无线安全标准不够持久。自从第一次实现无线网络以来,人们注意到原来的WEP加密方法存在安全性缺陷,这导致业界寻找新的解决方案来保护无线通信。虽然企业能够利用这些发展,但许多家庭用户没有意识到弱无线加密带来的危险,并继续使用易受攻击的加密。因此,有必要不时地探索和揭示当前的安全趋势及其对当前形式的网络漏洞的有效性。为此,本文深入研究了弱加密协议的背景,识别了保护无线网络免受攻击的风险和对策。本研究还包括对扫描英国德比市无线网络收集的数据进行分析。这项研究工作的一个重要成果是对安全标准的关键评估以及对2006年至2015年存在的加密协议模式的识别。
{"title":"A Critical Analysis of the Efficiencies of Emerging Wireless Security Standards Against Network Attacks","authors":"Karolis Vilius, Lu Liu, John Panneerselvam, T. Stimpson","doi":"10.1109/INCoS.2015.56","DOIUrl":"https://doi.org/10.1109/INCoS.2015.56","url":null,"abstract":"Given the emergence of the wireless technologies in the recent past, their utilities in both home and industrial applications have taken new shapes in various dimensions. Along with this progressive growth is the substantial emergence of the network attackers as they are finding new bases and platforms for launching network attacks. Existing wireless security standards are not persistent enough under the lights of the emerging malicious attackers. Since the first implementation of wireless networks, it was noticed that the original WEP encryption methods had flawed security which led to the industry searching for new solutions to secure wireless communications. Whilst enterprises were able to take advantage of these developments, many home users were unaware of the dangers posed by weak wireless encryption and are continued to employ vulnerable encryption. Thus it has become a necessity to explore and reveal the current security trends and their efficiencies against the present form of the network vulnerabilities from time to time. To this end, this paper delves into the background of weak encryption protocols and identifies the risks and countermeasures for protecting wireless networks against attacks. This research also includes the analysis on the data collected from scanning the wireless networks in the city of Derby in the United Kingdom. An important outcome of this research work is the critical evaluation of the security standards along with the recognition of the encryption protocol patterns in existence from 2006 to 2015.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1