首页 > 最新文献

J. Ubiquitous Syst. Pervasive Networks最新文献

英文 中文
The Multi-Agent System Solutions for Big Multi-sensor Data Management 大型多传感器数据管理的多智能体系统解决方案
Pub Date : 2019-06-10 DOI: 10.5383/JUSPN.11.02.004
Zakarya Elaggoune, R. Maamri, I. Boussebough
This research realizes the multi-agent community to handle the rinsing challenges in smart cities by the combined use of multi-fuzzy-agent systems for extracting relevant data from big noisy data, and the multi-agent systems-of-systems for adaptive big data processing. A multi-agent-based large wireless sensor network is used to show the approach used by the multi-fuzzy-agent systems, it exploits sensors as autonomous fuzzy agents that measure the relevance of the collected data and eliminate irrelevant ones. The aim of the multi-agent systems-of-systems is to handle the super velocity of big data flood in an adaptive way, which break down the rigidity of current big data systems that are forced to restart the data analysis process periodically to integrate the newly generated data into the analytical cycle.
本研究通过多模糊智能体系统从大噪声数据中提取相关数据,以及多智能体系统的自适应大数据处理,实现了多智能体社区应对智慧城市面临的挑战。利用基于多智能体的大型无线传感器网络来展示多模糊智能体系统所使用的方法,它利用传感器作为自主模糊智能体来测量收集数据的相关性并消除不相关的数据。多智能体系统的目标是以自适应的方式处理超大速度的大数据洪流,打破了当前大数据系统的刚性,即被迫定期重新启动数据分析过程,将新生成的数据整合到分析周期中。
{"title":"The Multi-Agent System Solutions for Big Multi-sensor Data Management","authors":"Zakarya Elaggoune, R. Maamri, I. Boussebough","doi":"10.5383/JUSPN.11.02.004","DOIUrl":"https://doi.org/10.5383/JUSPN.11.02.004","url":null,"abstract":"This research realizes the multi-agent community to handle the rinsing challenges in smart cities by the combined use of multi-fuzzy-agent systems for extracting relevant data from big noisy data, and the multi-agent systems-of-systems for adaptive big data processing. A multi-agent-based large wireless sensor network is used to show the approach used by the multi-fuzzy-agent systems, it exploits sensors as autonomous fuzzy agents that measure the relevance of the collected data and eliminate irrelevant ones. The aim of the multi-agent systems-of-systems is to handle the super velocity of big data flood in an adaptive way, which break down the rigidity of current big data systems that are forced to restart the data analysis process periodically to integrate the newly generated data into the analytical cycle.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Practical Defense-in-depth Solution for Microservice Systems 微服务系统的实用纵深防御解决方案
Pub Date : 2019-05-01 DOI: 10.5383/JUSPN.11.01.003
Kai Jander, L. Braubach, A. Pokahr
Microservices are a widely deployed pattern for implementing large-scale distributed systems. However, in order to harden the overall system and when crossing datacenter boundaries, the authenticity and confidentiality of microservice calls have to be secured even for internal calls. In practice, however, in many cases no internal security mechanisms are employed mainly due to the increased complexity on backend side. This complexity arises as result of standard security mechanisms like TLS requiring secrets for each involved microservice. Building on previous work [19], in this paper we present a novel communication architecture based on roles that on the one hand guarantees a high level of security and on the other hand remains easy to manage. The approach provides encryption, forward secrecy and protection against replay attacks even for out-of-order communication.
微服务是一种广泛部署的模式,用于实现大规模分布式系统。然而,为了加强整个系统以及在跨越数据中心边界时,必须确保微服务调用的真实性和机密性,甚至对于内部调用也是如此。然而,在实践中,在许多情况下,由于后端复杂性的增加,没有采用内部安全机制。这种复杂性是由于标准安全机制(如TLS)需要为每个涉及的微服务提供秘密而产生的。在之前的工作[19]的基础上,本文提出了一种新的基于角色的通信架构,一方面保证了高级别的安全性,另一方面仍然易于管理。该方法提供了加密、前向保密和防止重放攻击的保护,即使是无序通信。
{"title":"Practical Defense-in-depth Solution for Microservice Systems","authors":"Kai Jander, L. Braubach, A. Pokahr","doi":"10.5383/JUSPN.11.01.003","DOIUrl":"https://doi.org/10.5383/JUSPN.11.01.003","url":null,"abstract":"Microservices are a widely deployed pattern for implementing large-scale distributed systems. However, in order to harden the overall system and when crossing datacenter boundaries, the authenticity and confidentiality of microservice calls have to be secured even for internal calls. In practice, however, in many cases no internal security mechanisms are employed mainly due to the increased complexity on backend side. This complexity arises as result of standard security mechanisms like TLS requiring secrets for each involved microservice. Building on previous work [19], in this paper we present a novel communication architecture based on roles that on the one hand guarantees a high level of security and on the other hand remains easy to manage. The approach provides encryption, forward secrecy and protection against replay attacks even for out-of-order communication.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114141403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
N Hop a Kind Resource Assignment Method for Optical WDM Networks N跳一种WDM光网络的资源分配方法
Pub Date : 2019-05-01 DOI: 10.5383/JUSPN.11.01.004
Yashar Fazili, B. Robertson, W. Phillips
This paper introduces a new resource allocation mechanism for Wavelength Division Multiplexing (WDM) networks. The simple yet effective method introduced in this paper assigns the resources of a dynamically calculated route without needing an optimization solver. By minimizing the number of Lambda conversions at each node using this method, up to 8% more success rate can be achieved compared to assigning the resources using First Fit (FF) with continuity constraint. This method also results in up to 35% less energy usage compared to assigning the resources using First Fit without continuity constraint. The name of N Hop A Kind is after a winning combination of the game of Poker in which a hand with “n of a kind” wins.
介绍了一种新的波分复用(WDM)网络资源分配机制。本文介绍的方法简单有效,不需要优化求解器就可以对动态计算的路线进行资源分配。通过使用此方法最小化每个节点上的Lambda转换数量,与使用具有连续性约束的First Fit (FF)分配资源相比,成功率可提高8%。与使用没有连续性约束的First Fit分配资源相比,该方法最多可减少35%的能源消耗。“N Hop A Kind”的名字来源于扑克游戏中的一种获胜组合,即拥有“N of A Kind”的手牌获胜。
{"title":"N Hop a Kind Resource Assignment Method for Optical WDM Networks","authors":"Yashar Fazili, B. Robertson, W. Phillips","doi":"10.5383/JUSPN.11.01.004","DOIUrl":"https://doi.org/10.5383/JUSPN.11.01.004","url":null,"abstract":"This paper introduces a new resource allocation mechanism for Wavelength Division Multiplexing (WDM) networks. The simple yet effective method introduced in this paper assigns the resources of a dynamically calculated route without needing an optimization solver. By minimizing the number of Lambda conversions at each node using this method, up to 8% more success rate can be achieved compared to assigning the resources using First Fit (FF) with continuity constraint. This method also results in up to 35% less energy usage compared to assigning the resources using First Fit without continuity constraint. The name of N Hop A Kind is after a winning combination of the game of Poker in which a hand with “n of a kind” wins.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Home Automation using EMOTIV: Controlling TV by Brainwaves 使用EMOTIV的家庭自动化:通过脑电波控制电视
Pub Date : 2018-03-07 DOI: 10.5383/JUSPN.10.01.004
M. Zaki, Ali Alquraini, T. Sheltami
In this paper, our goal is to prove the possibility of controlling a home device by solely using neural pattern recognition interface captured by Emotiv EPOC. The neuroheadset EPOC is a personal interface for human interaction with computer through the acquisition of electrical signals produced by the brain, via techniques of electroencephalography (EEG), in order to identify thoughts, feelings and facial expressions in real time. The pattern is then fed to a client, which communicates it to the server side where it is received by a Raspberry Pi microcontroller. The microcontroller sends the appropriate response based on what is received from the client, which turns on or off a TV. This application will have a great potential especially for people with Amyotrophic Lateral Sclerosis (ALS) or special needs in general.
在本文中,我们的目标是证明仅使用Emotiv EPOC捕获的神经模式识别接口来控制家用设备的可能性。神经耳机EPOC是人类与计算机交互的个人接口,通过脑电图(EEG)技术获取大脑产生的电信号,以实时识别思想、感觉和面部表情。然后将模式馈送到客户机,客户机将其通信到服务器端,在服务器端由树莓派微控制器接收。微控制器根据从客户端接收到的内容发送适当的响应,从而打开或关闭电视。这一应用将具有巨大的潜力,特别是对于患有肌萎缩侧索硬化症(ALS)或一般特殊需要的人。
{"title":"Home Automation using EMOTIV: Controlling TV by Brainwaves","authors":"M. Zaki, Ali Alquraini, T. Sheltami","doi":"10.5383/JUSPN.10.01.004","DOIUrl":"https://doi.org/10.5383/JUSPN.10.01.004","url":null,"abstract":"In this paper, our goal is to prove the possibility of controlling a home device by solely using neural pattern recognition interface captured by Emotiv EPOC. The neuroheadset EPOC is a personal interface for human interaction with computer through the acquisition of electrical signals produced by the brain, via techniques of electroencephalography (EEG), in order to identify thoughts, feelings and facial expressions in real time. The pattern is then fed to a client, which communicates it to the server side where it is received by a Raspberry Pi microcontroller. The microcontroller sends the appropriate response based on what is received from the client, which turns on or off a TV. This application will have a great potential especially for people with Amyotrophic Lateral Sclerosis (ALS) or special needs in general.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Architectural Model for Fog Computing 雾计算的体系结构模型
Pub Date : 2018-03-07 DOI: 10.5383/juspn.10.01.003
Jabril Abdelaziz, Mehdi Adda, H. Mcheick
The adoption of the Internet of Things raises many challenges. A variety of its applications require widespread distribution and high mobility support. In addition to low latency and real time services. To meet these challenges, the Fog Computing is arguably a suitable solution to leverage the Internet of Things with such requirements. Indeed, we believe that the nearness of Fog nodes to the edge of the network provides an environment for critical preemptive and proactive applications and services (e.g., predicting natural disasters). Thus, this paper proposes an architectural model for Fog Computing. First, it presents a middleware to abstract the underlying devices and to unify the sensed data. Second, it describes an Operational Layer intended for service presentation, management and transformation. An environment embracing such model will provide means for early data analysis, hence low latency and real time responses. In addition, to providing an ecosystem for direct collaboration between services leading to more sophisticated applications. A flood warning system exemplifies a use case scenario to illustrate the potential adaption and application of the presented model.
物联网的采用带来了许多挑战。它的各种应用需要广泛的分布和高移动性的支持。除了低延迟和实时服务。为了应对这些挑战,雾计算可以说是利用具有此类要求的物联网的合适解决方案。事实上,我们相信雾节点靠近网络边缘为关键的先发制人和主动应用和服务(例如,预测自然灾害)提供了一个环境。因此,本文提出了一种雾计算的体系结构模型。首先,提出了一个中间件来抽象底层设备并统一感知数据。其次,它描述了用于服务表示、管理和转换的操作层。采用这种模型的环境将为早期数据分析提供手段,从而实现低延迟和实时响应。此外,为服务之间的直接协作提供一个生态系统,从而产生更复杂的应用程序。一个洪水预警系统举例说明了一个用例场景,以说明所提出模型的潜在适应和应用。
{"title":"An Architectural Model for Fog Computing","authors":"Jabril Abdelaziz, Mehdi Adda, H. Mcheick","doi":"10.5383/juspn.10.01.003","DOIUrl":"https://doi.org/10.5383/juspn.10.01.003","url":null,"abstract":"The adoption of the Internet of Things raises many challenges. A variety of its applications require widespread distribution and high mobility support. In addition to low latency and real time services. To meet these challenges, the Fog Computing is arguably a suitable solution to leverage the Internet of Things with such requirements. Indeed, we believe that the nearness of Fog nodes to the edge of the network provides an environment for critical preemptive and proactive applications and services (e.g., predicting natural disasters). Thus, this paper proposes an architectural model for Fog Computing. First, it presents a middleware to abstract the underlying devices and to unify the sensed data. Second, it describes an Operational Layer intended for service presentation, management and transformation. An environment embracing such model will provide means for early data analysis, hence low latency and real time responses. In addition, to providing an ecosystem for direct collaboration between services leading to more sophisticated applications. A flood warning system exemplifies a use case scenario to illustrate the potential adaption and application of the presented model.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132683612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Agent-based Modeling of Social Behavioral Challenges in Transportation 基于agent的交通社会行为挑战模型
Pub Date : 2018-03-07 DOI: 10.5383/juspn.10.01.005
Samar El-Amine, S. Galland, Abderraffiaa Koukam
Agent-Based modeling has been around us for reasonably some time now and has thus developed a vital factor for performing prediction-based scheduling, such as the transportation models for municipal cities. This paper assumes the important understanding of the agent-based modelling and imitation and its application to the transportation models while deliberating the possibility of its applications and advantages too. The paper then presents the ideas recognised to the social behaviours in combination with the agent-based modelling procedures useful so far. The literature review showed in lieu of this work has caused in agreement with the fact that the applicability of agent-based modelling is by far superior than ever due to the ever-improving computing speeds and abilities, while the understanding of complex human behaviour will endure to be a challenge for imitations and mechanisation methods developed so far.
基于agent的建模已经存在了相当长的一段时间,因此为执行基于预测的调度开发了一个重要因素,例如市政城市的运输模型。本文对基于智能体的建模与模仿及其在交通运输模型中的应用有了重要的认识,并对其应用的可能性和优势进行了探讨。然后,本文结合迄今为止有用的基于主体的建模程序,提出了公认的社会行为的想法。文献综述表明,由于计算速度和能力的不断提高,基于代理的建模的适用性比以往任何时候都要好,而对复杂人类行为的理解将是迄今为止开发的模仿和机械化方法的挑战。
{"title":"Agent-based Modeling of Social Behavioral Challenges in Transportation","authors":"Samar El-Amine, S. Galland, Abderraffiaa Koukam","doi":"10.5383/juspn.10.01.005","DOIUrl":"https://doi.org/10.5383/juspn.10.01.005","url":null,"abstract":"Agent-Based modeling has been around us for reasonably some time now and has thus developed a vital factor for performing prediction-based scheduling, such as the transportation models for municipal cities. This paper assumes the important understanding of the agent-based modelling and imitation and its application to the transportation models while deliberating the possibility of its applications and advantages too. The paper then presents the ideas recognised to the social behaviours in combination with the agent-based modelling procedures useful so far. The literature review showed in lieu of this work has caused in agreement with the fact that the applicability of agent-based modelling is by far superior than ever due to the ever-improving computing speeds and abilities, while the understanding of complex human behaviour will endure to be a challenge for imitations and mechanisation methods developed so far.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanism for Privacy Management Based on Data History (UbiPri-His) 基于数据历史的隐私管理机制(UbiPri-His)
Pub Date : 2018-03-07 DOI: 10.5383/JUSPN.10.01.002
V. Leithardt, L. H. A. Correia, Guilherme A. Borges, A. Rossetto, C. O. Rolim, C. Geyer, J. Silva
Privacy control and management in ubiquitous environments is not a trivial task. Especially in heterogeneous environments with different criteria and parameters related to communication, devices, users, and features of the environment itself. This work presents a study related to the algorithms that best fit the criteria, parameter, and information for the treatment of data privacy based on the user's history in the ubiquitous environment. For this, a prototype adapted to the UbiPri middleware was developed with the necessary characteristics for the historical control called UbiPri-His. They were tested, identified and identified for the mechanism for the management of data privacy related to the user's usage history, according to the environment and its location. An implementation carried out in a taxonomy, in the UbiPri middleware, and as a solution for comparison and definition of the algorithm with the best performance for the historical data file.
无处不在的环境中的隐私控制和管理不是一项简单的任务。特别是在具有与通信、设备、用户和环境本身的特征相关的不同标准和参数的异构环境中。这项工作提出了一项与算法相关的研究,该算法最适合基于用户在无处不在的环境中的历史处理数据隐私的标准、参数和信息。为此,开发了一个适应于UbiPri中间件的原型,该原型具有历史控制所需的特征,称为UbiPri- his。根据环境及其位置,对与用户使用历史相关的数据隐私管理机制进行了测试、识别和识别。在一个分类法中执行的实现,在UbiPri中间件中,作为对历史数据文件具有最佳性能的算法进行比较和定义的解决方案。
{"title":"Mechanism for Privacy Management Based on Data History (UbiPri-His)","authors":"V. Leithardt, L. H. A. Correia, Guilherme A. Borges, A. Rossetto, C. O. Rolim, C. Geyer, J. Silva","doi":"10.5383/JUSPN.10.01.002","DOIUrl":"https://doi.org/10.5383/JUSPN.10.01.002","url":null,"abstract":"Privacy control and management in ubiquitous environments is not a trivial task. Especially in heterogeneous environments with different criteria and parameters related to communication, devices, users, and features of the environment itself. This work presents a study related to the algorithms that best fit the criteria, parameter, and information for the treatment of data privacy based on the user's history in the ubiquitous environment. For this, a prototype adapted to the UbiPri middleware was developed with the necessary characteristics for the historical control called UbiPri-His. They were tested, identified and identified for the mechanism for the management of data privacy related to the user's usage history, according to the environment and its location. An implementation carried out in a taxonomy, in the UbiPri middleware, and as a solution for comparison and definition of the algorithm with the best performance for the historical data file.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131766119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Software Quality Assessment Algorithm Based on Fuzzy Logic 基于模糊逻辑的软件质量评价算法
Pub Date : 2017-11-01 DOI: 10.5383/JUSPN.08.01.001
M. Kara, Olfa Lamouchi, A. Ramdane-Cherif
In this paper an attempt has been made to provide a new global evaluation approach of a specified software quality model extracted from a generic software quality model using an instantiation procedure. The evaluation is based on data extracted from an ambient distributed system composed of fusion and fission agents connected to input/output services. These data are linked to the appropriate metrics of our software quality model and we use quality factors stated in ISO standards and different models of researchers represented under an ontology. We use equivalent relations to link criteria that have the same meaning and fuzzy logic approach to evaluate the entire software quality model. Our work presents the following contributions: (i) creating a generic software quality model based on several existing software quality standards and formalized under ontology concepts (ii) proposing an instantiation algorithm to extract specified software quality model from a generic software quality models (iii) proposing a new global evaluation approach of the specified software quality model using two processes, the first one executes metrics related to sensors data and the second one uses the result of the first process using fuzzy logic approach evaluating the entire specified software quality model and end up with a final numerical result (iv) adding the variability of metric variables algorithm to determine the impact of a possible variation of one criterion on others and avoid their penalization. This can help to conduct a trade-off-analysis in the proposed quality evaluation approach.
本文试图通过实例化过程,从通用软件质量模型中提取出一种特定软件质量模型的全局评价方法。评估基于从连接到输入/输出服务的聚变和裂变剂组成的环境分布式系统中提取的数据。这些数据与我们的软件质量模型的适当度量相关联,我们使用ISO标准和在本体下表示的不同研究人员模型中声明的质量因素。我们使用等价关系将具有相同含义的准则连接起来,并使用模糊逻辑方法对整个软件质量模型进行评价。我们的工作有以下贡献:(i)基于几个现有的软件质量标准创建一个通用的软件质量模型,并在本体概念下形式化;(ii)提出一种实例化算法,从通用的软件质量模型中提取指定的软件质量模型;(iii)提出一种新的全局评估方法,使用两个过程来评估指定的软件质量模型。第一个执行与传感器数据相关的度量,第二个使用第一个过程的结果,使用模糊逻辑方法评估整个指定的软件质量模型,并以最终的数值结果结束(iv)添加度量变量的可变性算法,以确定一个标准的可能变化对其他标准的影响,并避免它们的惩罚。这有助于在建议的质量评估方法中进行权衡分析。
{"title":"Software Quality Assessment Algorithm Based on Fuzzy Logic","authors":"M. Kara, Olfa Lamouchi, A. Ramdane-Cherif","doi":"10.5383/JUSPN.08.01.001","DOIUrl":"https://doi.org/10.5383/JUSPN.08.01.001","url":null,"abstract":"In this paper an attempt has been made to provide a new global evaluation approach of a specified software quality model extracted from a generic software quality model using an instantiation procedure. The evaluation is based on data extracted from an ambient distributed system composed of fusion and fission agents connected to input/output services. These data are linked to the appropriate metrics of our software quality model and we use quality factors stated in ISO standards and different models of researchers represented under an ontology. We use equivalent relations to link criteria that have the same meaning and fuzzy logic approach to evaluate the entire software quality model. Our work presents the following contributions: (i) creating a generic software quality model based on several existing software quality standards and formalized under ontology concepts (ii) proposing an instantiation algorithm to extract specified software quality model from a generic software quality models (iii) proposing a new global evaluation approach of the specified software quality model using two processes, the first one executes metrics related to sensors data and the second one uses the result of the first process using fuzzy logic approach evaluating the entire specified software quality model and end up with a final numerical result (iv) adding the variability of metric variables algorithm to determine the impact of a possible variation of one criterion on others and avoid their penalization. This can help to conduct a trade-off-analysis in the proposed quality evaluation approach.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Model Transformation from Computing Independent Model to Platform Independent Model in Model Driven Architecture 模型驱动体系结构中从计算无关模型到平台无关模型的模型转换
Pub Date : 2017-11-01 DOI: 10.5383/JUSPN.08.01.003
Yassine Rhazali, Youssef Hadi, A. Mouloudi
This paper presents a new methodology to master models transformation from CIM to PIM in accord with MDA approach. Our improved approach is founded on creation a good CIM level, through well-chosen rules, for facilitating models transformation to PIM level. However, we establish a rich PIM models via use case diagram, state diagram, class and package diagram. Next, we describe a set of transformation rules to ensure a semi-automatic transformation from CIM to PIM. Our method conform MDA approach by taking into consideration the business dimension in the CIM level, since, we present this level by using activity diagram who is a standard of business process modeling. Nevertheless, we use UML into PIM in our proposal, because UML is recommended by MDA in this level
本文提出了一种新的方法来掌握模型从CIM到PIM的转换。我们改进的方法是建立在通过精心选择的规则创建一个良好的CIM级别的基础上的,以促进模型向PIM级别的转换。然而,我们通过用例图、状态图、类图和包图建立了丰富的PIM模型。接下来,我们将描述一组转换规则,以确保从CIM到PIM的半自动转换。我们的方法通过考虑CIM级别中的业务维度来符合MDA方法,因为我们通过使用活动图来表示此级别,活动图是业务流程建模的标准。然而,我们在我们的提案中使用UML到PIM,因为UML是由MDA在这个级别推荐的
{"title":"A Model Transformation from Computing Independent Model to Platform Independent Model in Model Driven Architecture","authors":"Yassine Rhazali, Youssef Hadi, A. Mouloudi","doi":"10.5383/JUSPN.08.01.003","DOIUrl":"https://doi.org/10.5383/JUSPN.08.01.003","url":null,"abstract":"This paper presents a new methodology to master models transformation from CIM to PIM in accord with MDA approach. Our improved approach is founded on creation a good CIM level, through well-chosen rules, for facilitating models transformation to PIM level. However, we establish a rich PIM models via use case diagram, state diagram, class and package diagram. Next, we describe a set of transformation rules to ensure a semi-automatic transformation from CIM to PIM. Our method conform MDA approach by taking into consideration the business dimension in the CIM level, since, we present this level by using activity diagram who is a standard of business process modeling. Nevertheless, we use UML into PIM in our proposal, because UML is recommended by MDA in this level","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122089803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ambient Technology in Vehicles: The Risks and Benefits 车辆环境技术:风险与收益
Pub Date : 2017-11-01 DOI: 10.5383/JUSPN.08.01.002
Ahmad Bennakhi, Maytham Safar
This paper is aimed towards studying, compiling, and analyzing the recent advances and risks of the current ambient technology that is present in modern day cars. The progression of sophisticated technologies inside cars make them an even more comfortable and entertaining place to be in especially during commutes to work, but recent security threats and distractions have been uncovered with the upsurge usage of new technologies. The future of car’s interfaces is an issue since driverless cars are taking the scene by storm. This study also includes a survey that senses the people’s use of car technologies when driving.
本文旨在研究、汇编和分析现代汽车中当前环境技术的最新进展和风险。汽车内部先进技术的进步使汽车成为一个更舒适、更娱乐的地方,尤其是在上下班的路上,但随着新技术的激增,最近的安全威胁和干扰已经暴露出来。自从无人驾驶汽车席卷市场以来,汽车界面的未来就成了一个问题。这项研究还包括一项调查,感知人们在驾驶时使用汽车技术。
{"title":"Ambient Technology in Vehicles: The Risks and Benefits","authors":"Ahmad Bennakhi, Maytham Safar","doi":"10.5383/JUSPN.08.01.002","DOIUrl":"https://doi.org/10.5383/JUSPN.08.01.002","url":null,"abstract":"This paper is aimed towards studying, compiling, and analyzing the recent advances and risks of the current ambient technology that is present in modern day cars. The progression of sophisticated technologies inside cars make them an even more comfortable and entertaining place to be in especially during commutes to work, but recent security threats and distractions have been uncovered with the upsurge usage of new technologies. The future of car’s interfaces is an issue since driverless cars are taking the scene by storm. This study also includes a survey that senses the people’s use of car technologies when driving.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125522508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
J. Ubiquitous Syst. Pervasive Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1