This research realizes the multi-agent community to handle the rinsing challenges in smart cities by the combined use of multi-fuzzy-agent systems for extracting relevant data from big noisy data, and the multi-agent systems-of-systems for adaptive big data processing. A multi-agent-based large wireless sensor network is used to show the approach used by the multi-fuzzy-agent systems, it exploits sensors as autonomous fuzzy agents that measure the relevance of the collected data and eliminate irrelevant ones. The aim of the multi-agent systems-of-systems is to handle the super velocity of big data flood in an adaptive way, which break down the rigidity of current big data systems that are forced to restart the data analysis process periodically to integrate the newly generated data into the analytical cycle.
{"title":"The Multi-Agent System Solutions for Big Multi-sensor Data Management","authors":"Zakarya Elaggoune, R. Maamri, I. Boussebough","doi":"10.5383/JUSPN.11.02.004","DOIUrl":"https://doi.org/10.5383/JUSPN.11.02.004","url":null,"abstract":"This research realizes the multi-agent community to handle the rinsing challenges in smart cities by the combined use of multi-fuzzy-agent systems for extracting relevant data from big noisy data, and the multi-agent systems-of-systems for adaptive big data processing. A multi-agent-based large wireless sensor network is used to show the approach used by the multi-fuzzy-agent systems, it exploits sensors as autonomous fuzzy agents that measure the relevance of the collected data and eliminate irrelevant ones. The aim of the multi-agent systems-of-systems is to handle the super velocity of big data flood in an adaptive way, which break down the rigidity of current big data systems that are forced to restart the data analysis process periodically to integrate the newly generated data into the analytical cycle.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Microservices are a widely deployed pattern for implementing large-scale distributed systems. However, in order to harden the overall system and when crossing datacenter boundaries, the authenticity and confidentiality of microservice calls have to be secured even for internal calls. In practice, however, in many cases no internal security mechanisms are employed mainly due to the increased complexity on backend side. This complexity arises as result of standard security mechanisms like TLS requiring secrets for each involved microservice. Building on previous work [19], in this paper we present a novel communication architecture based on roles that on the one hand guarantees a high level of security and on the other hand remains easy to manage. The approach provides encryption, forward secrecy and protection against replay attacks even for out-of-order communication.
{"title":"Practical Defense-in-depth Solution for Microservice Systems","authors":"Kai Jander, L. Braubach, A. Pokahr","doi":"10.5383/JUSPN.11.01.003","DOIUrl":"https://doi.org/10.5383/JUSPN.11.01.003","url":null,"abstract":"Microservices are a widely deployed pattern for implementing large-scale distributed systems. However, in order to harden the overall system and when crossing datacenter boundaries, the authenticity and confidentiality of microservice calls have to be secured even for internal calls. In practice, however, in many cases no internal security mechanisms are employed mainly due to the increased complexity on backend side. This complexity arises as result of standard security mechanisms like TLS requiring secrets for each involved microservice. Building on previous work [19], in this paper we present a novel communication architecture based on roles that on the one hand guarantees a high level of security and on the other hand remains easy to manage. The approach provides encryption, forward secrecy and protection against replay attacks even for out-of-order communication.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114141403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces a new resource allocation mechanism for Wavelength Division Multiplexing (WDM) networks. The simple yet effective method introduced in this paper assigns the resources of a dynamically calculated route without needing an optimization solver. By minimizing the number of Lambda conversions at each node using this method, up to 8% more success rate can be achieved compared to assigning the resources using First Fit (FF) with continuity constraint. This method also results in up to 35% less energy usage compared to assigning the resources using First Fit without continuity constraint. The name of N Hop A Kind is after a winning combination of the game of Poker in which a hand with “n of a kind” wins.
介绍了一种新的波分复用(WDM)网络资源分配机制。本文介绍的方法简单有效,不需要优化求解器就可以对动态计算的路线进行资源分配。通过使用此方法最小化每个节点上的Lambda转换数量,与使用具有连续性约束的First Fit (FF)分配资源相比,成功率可提高8%。与使用没有连续性约束的First Fit分配资源相比,该方法最多可减少35%的能源消耗。“N Hop A Kind”的名字来源于扑克游戏中的一种获胜组合,即拥有“N of A Kind”的手牌获胜。
{"title":"N Hop a Kind Resource Assignment Method for Optical WDM Networks","authors":"Yashar Fazili, B. Robertson, W. Phillips","doi":"10.5383/JUSPN.11.01.004","DOIUrl":"https://doi.org/10.5383/JUSPN.11.01.004","url":null,"abstract":"This paper introduces a new resource allocation mechanism for Wavelength Division Multiplexing (WDM) networks. The simple yet effective method introduced in this paper assigns the resources of a dynamically calculated route without needing an optimization solver. By minimizing the number of Lambda conversions at each node using this method, up to 8% more success rate can be achieved compared to assigning the resources using First Fit (FF) with continuity constraint. This method also results in up to 35% less energy usage compared to assigning the resources using First Fit without continuity constraint. The name of N Hop A Kind is after a winning combination of the game of Poker in which a hand with “n of a kind” wins.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, our goal is to prove the possibility of controlling a home device by solely using neural pattern recognition interface captured by Emotiv EPOC. The neuroheadset EPOC is a personal interface for human interaction with computer through the acquisition of electrical signals produced by the brain, via techniques of electroencephalography (EEG), in order to identify thoughts, feelings and facial expressions in real time. The pattern is then fed to a client, which communicates it to the server side where it is received by a Raspberry Pi microcontroller. The microcontroller sends the appropriate response based on what is received from the client, which turns on or off a TV. This application will have a great potential especially for people with Amyotrophic Lateral Sclerosis (ALS) or special needs in general.
{"title":"Home Automation using EMOTIV: Controlling TV by Brainwaves","authors":"M. Zaki, Ali Alquraini, T. Sheltami","doi":"10.5383/JUSPN.10.01.004","DOIUrl":"https://doi.org/10.5383/JUSPN.10.01.004","url":null,"abstract":"In this paper, our goal is to prove the possibility of controlling a home device by solely using neural pattern recognition interface captured by Emotiv EPOC. The neuroheadset EPOC is a personal interface for human interaction with computer through the acquisition of electrical signals produced by the brain, via techniques of electroencephalography (EEG), in order to identify thoughts, feelings and facial expressions in real time. The pattern is then fed to a client, which communicates it to the server side where it is received by a Raspberry Pi microcontroller. The microcontroller sends the appropriate response based on what is received from the client, which turns on or off a TV. This application will have a great potential especially for people with Amyotrophic Lateral Sclerosis (ALS) or special needs in general.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The adoption of the Internet of Things raises many challenges. A variety of its applications require widespread distribution and high mobility support. In addition to low latency and real time services. To meet these challenges, the Fog Computing is arguably a suitable solution to leverage the Internet of Things with such requirements. Indeed, we believe that the nearness of Fog nodes to the edge of the network provides an environment for critical preemptive and proactive applications and services (e.g., predicting natural disasters). Thus, this paper proposes an architectural model for Fog Computing. First, it presents a middleware to abstract the underlying devices and to unify the sensed data. Second, it describes an Operational Layer intended for service presentation, management and transformation. An environment embracing such model will provide means for early data analysis, hence low latency and real time responses. In addition, to providing an ecosystem for direct collaboration between services leading to more sophisticated applications. A flood warning system exemplifies a use case scenario to illustrate the potential adaption and application of the presented model.
{"title":"An Architectural Model for Fog Computing","authors":"Jabril Abdelaziz, Mehdi Adda, H. Mcheick","doi":"10.5383/juspn.10.01.003","DOIUrl":"https://doi.org/10.5383/juspn.10.01.003","url":null,"abstract":"The adoption of the Internet of Things raises many challenges. A variety of its applications require widespread distribution and high mobility support. In addition to low latency and real time services. To meet these challenges, the Fog Computing is arguably a suitable solution to leverage the Internet of Things with such requirements. Indeed, we believe that the nearness of Fog nodes to the edge of the network provides an environment for critical preemptive and proactive applications and services (e.g., predicting natural disasters). Thus, this paper proposes an architectural model for Fog Computing. First, it presents a middleware to abstract the underlying devices and to unify the sensed data. Second, it describes an Operational Layer intended for service presentation, management and transformation. An environment embracing such model will provide means for early data analysis, hence low latency and real time responses. In addition, to providing an ecosystem for direct collaboration between services leading to more sophisticated applications. A flood warning system exemplifies a use case scenario to illustrate the potential adaption and application of the presented model.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132683612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agent-Based modeling has been around us for reasonably some time now and has thus developed a vital factor for performing prediction-based scheduling, such as the transportation models for municipal cities. This paper assumes the important understanding of the agent-based modelling and imitation and its application to the transportation models while deliberating the possibility of its applications and advantages too. The paper then presents the ideas recognised to the social behaviours in combination with the agent-based modelling procedures useful so far. The literature review showed in lieu of this work has caused in agreement with the fact that the applicability of agent-based modelling is by far superior than ever due to the ever-improving computing speeds and abilities, while the understanding of complex human behaviour will endure to be a challenge for imitations and mechanisation methods developed so far.
{"title":"Agent-based Modeling of Social Behavioral Challenges in Transportation","authors":"Samar El-Amine, S. Galland, Abderraffiaa Koukam","doi":"10.5383/juspn.10.01.005","DOIUrl":"https://doi.org/10.5383/juspn.10.01.005","url":null,"abstract":"Agent-Based modeling has been around us for reasonably some time now and has thus developed a vital factor for performing prediction-based scheduling, such as the transportation models for municipal cities. This paper assumes the important understanding of the agent-based modelling and imitation and its application to the transportation models while deliberating the possibility of its applications and advantages too. The paper then presents the ideas recognised to the social behaviours in combination with the agent-based modelling procedures useful so far. The literature review showed in lieu of this work has caused in agreement with the fact that the applicability of agent-based modelling is by far superior than ever due to the ever-improving computing speeds and abilities, while the understanding of complex human behaviour will endure to be a challenge for imitations and mechanisation methods developed so far.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Leithardt, L. H. A. Correia, Guilherme A. Borges, A. Rossetto, C. O. Rolim, C. Geyer, J. Silva
Privacy control and management in ubiquitous environments is not a trivial task. Especially in heterogeneous environments with different criteria and parameters related to communication, devices, users, and features of the environment itself. This work presents a study related to the algorithms that best fit the criteria, parameter, and information for the treatment of data privacy based on the user's history in the ubiquitous environment. For this, a prototype adapted to the UbiPri middleware was developed with the necessary characteristics for the historical control called UbiPri-His. They were tested, identified and identified for the mechanism for the management of data privacy related to the user's usage history, according to the environment and its location. An implementation carried out in a taxonomy, in the UbiPri middleware, and as a solution for comparison and definition of the algorithm with the best performance for the historical data file.
{"title":"Mechanism for Privacy Management Based on Data History (UbiPri-His)","authors":"V. Leithardt, L. H. A. Correia, Guilherme A. Borges, A. Rossetto, C. O. Rolim, C. Geyer, J. Silva","doi":"10.5383/JUSPN.10.01.002","DOIUrl":"https://doi.org/10.5383/JUSPN.10.01.002","url":null,"abstract":"Privacy control and management in ubiquitous environments is not a trivial task. Especially in heterogeneous environments with different criteria and parameters related to communication, devices, users, and features of the environment itself. This work presents a study related to the algorithms that best fit the criteria, parameter, and information for the treatment of data privacy based on the user's history in the ubiquitous environment. For this, a prototype adapted to the UbiPri middleware was developed with the necessary characteristics for the historical control called UbiPri-His. They were tested, identified and identified for the mechanism for the management of data privacy related to the user's usage history, according to the environment and its location. An implementation carried out in a taxonomy, in the UbiPri middleware, and as a solution for comparison and definition of the algorithm with the best performance for the historical data file.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131766119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper an attempt has been made to provide a new global evaluation approach of a specified software quality model extracted from a generic software quality model using an instantiation procedure. The evaluation is based on data extracted from an ambient distributed system composed of fusion and fission agents connected to input/output services. These data are linked to the appropriate metrics of our software quality model and we use quality factors stated in ISO standards and different models of researchers represented under an ontology. We use equivalent relations to link criteria that have the same meaning and fuzzy logic approach to evaluate the entire software quality model. Our work presents the following contributions: (i) creating a generic software quality model based on several existing software quality standards and formalized under ontology concepts (ii) proposing an instantiation algorithm to extract specified software quality model from a generic software quality models (iii) proposing a new global evaluation approach of the specified software quality model using two processes, the first one executes metrics related to sensors data and the second one uses the result of the first process using fuzzy logic approach evaluating the entire specified software quality model and end up with a final numerical result (iv) adding the variability of metric variables algorithm to determine the impact of a possible variation of one criterion on others and avoid their penalization. This can help to conduct a trade-off-analysis in the proposed quality evaluation approach.
{"title":"Software Quality Assessment Algorithm Based on Fuzzy Logic","authors":"M. Kara, Olfa Lamouchi, A. Ramdane-Cherif","doi":"10.5383/JUSPN.08.01.001","DOIUrl":"https://doi.org/10.5383/JUSPN.08.01.001","url":null,"abstract":"In this paper an attempt has been made to provide a new global evaluation approach of a specified software quality model extracted from a generic software quality model using an instantiation procedure. The evaluation is based on data extracted from an ambient distributed system composed of fusion and fission agents connected to input/output services. These data are linked to the appropriate metrics of our software quality model and we use quality factors stated in ISO standards and different models of researchers represented under an ontology. We use equivalent relations to link criteria that have the same meaning and fuzzy logic approach to evaluate the entire software quality model. Our work presents the following contributions: (i) creating a generic software quality model based on several existing software quality standards and formalized under ontology concepts (ii) proposing an instantiation algorithm to extract specified software quality model from a generic software quality models (iii) proposing a new global evaluation approach of the specified software quality model using two processes, the first one executes metrics related to sensors data and the second one uses the result of the first process using fuzzy logic approach evaluating the entire specified software quality model and end up with a final numerical result (iv) adding the variability of metric variables algorithm to determine the impact of a possible variation of one criterion on others and avoid their penalization. This can help to conduct a trade-off-analysis in the proposed quality evaluation approach.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a new methodology to master models transformation from CIM to PIM in accord with MDA approach. Our improved approach is founded on creation a good CIM level, through well-chosen rules, for facilitating models transformation to PIM level. However, we establish a rich PIM models via use case diagram, state diagram, class and package diagram. Next, we describe a set of transformation rules to ensure a semi-automatic transformation from CIM to PIM. Our method conform MDA approach by taking into consideration the business dimension in the CIM level, since, we present this level by using activity diagram who is a standard of business process modeling. Nevertheless, we use UML into PIM in our proposal, because UML is recommended by MDA in this level
{"title":"A Model Transformation from Computing Independent Model to Platform Independent Model in Model Driven Architecture","authors":"Yassine Rhazali, Youssef Hadi, A. Mouloudi","doi":"10.5383/JUSPN.08.01.003","DOIUrl":"https://doi.org/10.5383/JUSPN.08.01.003","url":null,"abstract":"This paper presents a new methodology to master models transformation from CIM to PIM in accord with MDA approach. Our improved approach is founded on creation a good CIM level, through well-chosen rules, for facilitating models transformation to PIM level. However, we establish a rich PIM models via use case diagram, state diagram, class and package diagram. Next, we describe a set of transformation rules to ensure a semi-automatic transformation from CIM to PIM. Our method conform MDA approach by taking into consideration the business dimension in the CIM level, since, we present this level by using activity diagram who is a standard of business process modeling. Nevertheless, we use UML into PIM in our proposal, because UML is recommended by MDA in this level","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122089803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is aimed towards studying, compiling, and analyzing the recent advances and risks of the current ambient technology that is present in modern day cars. The progression of sophisticated technologies inside cars make them an even more comfortable and entertaining place to be in especially during commutes to work, but recent security threats and distractions have been uncovered with the upsurge usage of new technologies. The future of car’s interfaces is an issue since driverless cars are taking the scene by storm. This study also includes a survey that senses the people’s use of car technologies when driving.
{"title":"Ambient Technology in Vehicles: The Risks and Benefits","authors":"Ahmad Bennakhi, Maytham Safar","doi":"10.5383/JUSPN.08.01.002","DOIUrl":"https://doi.org/10.5383/JUSPN.08.01.002","url":null,"abstract":"This paper is aimed towards studying, compiling, and analyzing the recent advances and risks of the current ambient technology that is present in modern day cars. The progression of sophisticated technologies inside cars make them an even more comfortable and entertaining place to be in especially during commutes to work, but recent security threats and distractions have been uncovered with the upsurge usage of new technologies. The future of car’s interfaces is an issue since driverless cars are taking the scene by storm. This study also includes a survey that senses the people’s use of car technologies when driving.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125522508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}