首页 > 最新文献

2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)最新文献

英文 中文
A Novel Ontology-based Approach for Describing Cloud Services 一种新的基于本体的云服务描述方法
Soumia Zertal, Zakaria Laboudi, Slimene Bechoua
The development of Cloud computing led to an increase in the number of services ready for use and therefore the number of consumers’ requests. Cloud providers advertise the description of their offered services in different formats on the Internet. This makes the discovery and selection of services more difficult for users. Thus, a uniform description of Cloud services would be needed. The aim of this study is to provide a new ontology for uniform description of Cloud services coming from heterogeneous sources. The proposed model takes into account the different relationships and dependencies between services across Cloud’s layers. These dependencies are represented by the different constraints of composition and deployment. To validate our proposal, qualitative and quantitative evaluations are conducted. The qualitative evaluation is carried out by making comparisons with both state-of-the-art works and the Bitnami platform according to some criteria. For the quantitative evaluation, comparisons are performed with the output results specified by users. Globally, the results are promising and encouraging.
云计算的发展导致了可供使用的服务数量的增加,因此也增加了消费者请求的数量。云提供商在Internet上以不同的格式宣传其提供的服务的描述。这使得用户发现和选择服务变得更加困难。因此,需要对云服务进行统一描述。本研究的目的是为异构云服务的统一描述提供一种新的本体。提出的模型考虑了云的各层服务之间的不同关系和依赖关系。这些依赖关系由组合和部署的不同约束表示。为了验证我们的建议,进行了定性和定量评估。根据一些标准,通过与最先进的工程和Bitnami平台进行比较,进行定性评价。定量评价是与用户指定的输出结果进行比较。从全球来看,结果是令人鼓舞的。
{"title":"A Novel Ontology-based Approach for Describing Cloud Services","authors":"Soumia Zertal, Zakaria Laboudi, Slimene Bechoua","doi":"10.1109/ICTAACS48474.2019.8988129","DOIUrl":"https://doi.org/10.1109/ICTAACS48474.2019.8988129","url":null,"abstract":"The development of Cloud computing led to an increase in the number of services ready for use and therefore the number of consumers’ requests. Cloud providers advertise the description of their offered services in different formats on the Internet. This makes the discovery and selection of services more difficult for users. Thus, a uniform description of Cloud services would be needed. The aim of this study is to provide a new ontology for uniform description of Cloud services coming from heterogeneous sources. The proposed model takes into account the different relationships and dependencies between services across Cloud’s layers. These dependencies are represented by the different constraints of composition and deployment. To validate our proposal, qualitative and quantitative evaluations are conducted. The qualitative evaluation is carried out by making comparisons with both state-of-the-art works and the Bitnami platform according to some criteria. For the quantitative evaluation, comparisons are performed with the output results specified by users. Globally, the results are promising and encouraging.","PeriodicalId":406766,"journal":{"name":"2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127245734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A development process for component software with crosscutting and dynamic features 具有横切和动态特性的组件软件开发过程
Abdelhakim Hannousse
Traditional development processes fail to be applied effectively to the development of component software. Some features in the design need to be (un)plugged dynamically to software systems and their implementations may require to crosscut the code of components. This is often not possible in component systems due to the nature of used components (black box, signed or encrypted components). In this paper we propose an appropriate process for the development of component software with explicit support for crosscutting and dynamic features. The proposed process covers all software lifecycle activities, follows a top-down approach and stimulates the reuse of pre-existing components. In the proposal, crosscutting and dynamic features are identified earlier in the process and modeled separately using aspect-orientation concepts for reusablity and maintainability purposes. The identification of crosscutting and dynamic features at early stages allows making proper design decisions to improve software modularity and reusability, manage feature conflicts and ensure better maintainability of component software. The proposed process is validated through modeling a case study.
传统的开发流程不能有效地应用于组件软件的开发。设计中的一些特性需要动态地插入到软件系统中,它们的实现可能需要横切组件的代码。由于所使用组件的性质(黑盒、签名或加密组件),这在组件系统中通常是不可能的。本文提出了一种适合组件软件开发的流程,明确支持横切和动态特性。所建议的过程涵盖了所有的软件生命周期活动,遵循自顶向下的方法,并促进对已有组件的重用。在建议中,横切和动态特性在流程的早期被确定,并使用面向方面的概念分别建模,以实现可重用性和可维护性。在早期阶段对横切和动态特性的识别允许做出适当的设计决策,以改进软件的模块化和可重用性,管理特性冲突,并确保组件软件的更好的可维护性。通过案例研究建模验证了所提出的流程。
{"title":"A development process for component software with crosscutting and dynamic features","authors":"Abdelhakim Hannousse","doi":"10.1109/ICTAACS48474.2019.8988133","DOIUrl":"https://doi.org/10.1109/ICTAACS48474.2019.8988133","url":null,"abstract":"Traditional development processes fail to be applied effectively to the development of component software. Some features in the design need to be (un)plugged dynamically to software systems and their implementations may require to crosscut the code of components. This is often not possible in component systems due to the nature of used components (black box, signed or encrypted components). In this paper we propose an appropriate process for the development of component software with explicit support for crosscutting and dynamic features. The proposed process covers all software lifecycle activities, follows a top-down approach and stimulates the reuse of pre-existing components. In the proposal, crosscutting and dynamic features are identified earlier in the process and modeled separately using aspect-orientation concepts for reusablity and maintainability purposes. The identification of crosscutting and dynamic features at early stages allows making proper design decisions to improve software modularity and reusability, manage feature conflicts and ensure better maintainability of component software. The proposed process is validated through modeling a case study.","PeriodicalId":406766,"journal":{"name":"2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125030649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach for Computing the Matching Degree in the Paper-to-Reviewer Assignment Problem 论文-审稿人分配问题中匹配度计算的新方法
Abdeldjaouad Nusayr Medakene, Khadra Bouanane, Mohammed Abdelhadi Eddoud
The Paper-to-Reviewer Assignment Problem is a prevalent and challenging problem within the scientific community and scientific conferences. The large number of reviewers and submitted papers, as well as constraints on reviewers’ loads and papers’ coverage needs, make difficult and very tedious for the committee chair to manually assign submitted papers to suitable reviewers. Any automation of this task must tackle three main issues: modeling reviewers’ and papers’ profiles, estimating the relevance between a paper and a reviewer and finally finding an appropriate assignment.In this paper, we are interested in the two first issues. We propose to build the reviewers profiles on the basis of both pedagogical and research documents, then a formula that takes into account both topics similarity and common references is proposed. Experimental results compared to ground-truth values extracted from ICA2IT’19 data show a good performance of this approach.
论文审稿人分配问题是科学界和科学会议中普遍存在的一个具有挑战性的问题。审稿人和提交的论文数量众多,以及审稿人工作量和论文覆盖范围的限制,使得委员会主席手动将提交的论文分配给合适的审稿人非常困难和繁琐。这项任务的任何自动化都必须解决三个主要问题:为审稿人和论文的概要建模,估计论文和审稿人之间的相关性,最后找到合适的任务。在本文中,我们对前两个问题感兴趣。我们建议在教学和研究文献的基础上建立审稿人档案,然后提出一个考虑主题相似性和共同参考文献的公式。实验结果与ICA2IT’19数据提取的真值进行了比较,表明了该方法的良好性能。
{"title":"A New Approach for Computing the Matching Degree in the Paper-to-Reviewer Assignment Problem","authors":"Abdeldjaouad Nusayr Medakene, Khadra Bouanane, Mohammed Abdelhadi Eddoud","doi":"10.1109/ICTAACS48474.2019.8988127","DOIUrl":"https://doi.org/10.1109/ICTAACS48474.2019.8988127","url":null,"abstract":"The Paper-to-Reviewer Assignment Problem is a prevalent and challenging problem within the scientific community and scientific conferences. The large number of reviewers and submitted papers, as well as constraints on reviewers’ loads and papers’ coverage needs, make difficult and very tedious for the committee chair to manually assign submitted papers to suitable reviewers. Any automation of this task must tackle three main issues: modeling reviewers’ and papers’ profiles, estimating the relevance between a paper and a reviewer and finally finding an appropriate assignment.In this paper, we are interested in the two first issues. We propose to build the reviewers profiles on the basis of both pedagogical and research documents, then a formula that takes into account both topics similarity and common references is proposed. Experimental results compared to ground-truth values extracted from ICA2IT’19 data show a good performance of this approach.","PeriodicalId":406766,"journal":{"name":"2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114513253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
QoS based Safety Message Dissemination Protocol For VSN in Smart City 基于QoS的智慧城市VSN安全消息发布协议
Soumia Bellaouar, M. Guerroumi, S. Moussaoui
In Vehicular Sensor Networks (VSNs), road safety applications are important to ensure the safety of motorists by broadcasting alert messages in this network. The dissemination process is the use of adaptive broadcasting algorithms that make efficient use of vehicular communications avoiding the problem of broadcast storms. Therefore, an effective warning message broadcast protocol should represent the appropriate transmission node for each message, maximizing the number of vehicles informed by the hazard of the situation, while simultaneously reducing the time needed to inform them and the amount of traffic generated in the wireless channel. In this work, we propose safety messages dissemination protocol based on QoS metrics as delay, link quality and flow for the choice of a reliable, fast and efficient broadcaster. Our experiments proved the efficiency of our proposal compared to other existing solutions in the literature and using the OMNETT ++ simulator.
在车辆传感器网络(VSNs)中,道路安全应用程序通过在该网络中广播警报信息来确保驾驶者的安全。传播过程采用自适应广播算法,有效利用车载通信,避免广播风暴问题。因此,有效的警告消息广播协议应该代表每条消息的适当传输节点,最大限度地使车辆获知危险情况的数量最大化,同时减少通知车辆所需的时间和无线信道中产生的通信量。在这项工作中,我们提出了基于QoS指标的安全消息传播协议,如延迟、链路质量和流量,以选择可靠、快速和高效的广播器。我们的实验证明了与文献中其他现有解决方案和使用omnet++模拟器相比,我们的建议是有效的。
{"title":"QoS based Safety Message Dissemination Protocol For VSN in Smart City","authors":"Soumia Bellaouar, M. Guerroumi, S. Moussaoui","doi":"10.1109/ICTAACS48474.2019.8988136","DOIUrl":"https://doi.org/10.1109/ICTAACS48474.2019.8988136","url":null,"abstract":"In Vehicular Sensor Networks (VSNs), road safety applications are important to ensure the safety of motorists by broadcasting alert messages in this network. The dissemination process is the use of adaptive broadcasting algorithms that make efficient use of vehicular communications avoiding the problem of broadcast storms. Therefore, an effective warning message broadcast protocol should represent the appropriate transmission node for each message, maximizing the number of vehicles informed by the hazard of the situation, while simultaneously reducing the time needed to inform them and the amount of traffic generated in the wireless channel. In this work, we propose safety messages dissemination protocol based on QoS metrics as delay, link quality and flow for the choice of a reliable, fast and efficient broadcaster. Our experiments proved the efficiency of our proposal compared to other existing solutions in the literature and using the OMNETT ++ simulator.","PeriodicalId":406766,"journal":{"name":"2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126426096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Online Adversarial Planning in μRTS : A Survey μRTS中的在线对抗计划研究
Abdessamed Ouessai, M. Salem, Antonio M. Mora
Online planning is an important research area focusing on the problem of real-time decision making, using information extracted from the environment. The aim is to compute, at each decision point, the best decision possible that contributes to the realization of a fixed objective. Relevant application domains include robotics, control engineering and computer games. Real-time strategy (RTS) games pose considerable challenges to artificial intelligence techniques, due to their dynamic, complex and adversarial aspects, where online planning plays a prominent role. They also constitute an ideal research platform and test-bed for online planning. μRTS is an open-source AI research platform that features a minimalistic, yet complete RTS implementation, used by AI researchers for developing and testing intelligent RTS game-playing agents. The unique characteristics of μRTS helped for the emergence of interesting online adversarial planning techniques, dealing with multiple levels of abstraction. This paper presents the major μRTS online planning approaches to date, categorized by the degree of abstraction, in fully and partially observable environments.
在线规划是利用从环境中提取的信息进行实时决策的一个重要研究领域。其目的是在每个决策点计算有助于实现固定目标的最佳决策。相关的应用领域包括机器人、控制工程和电脑游戏。实时战略(RTS)游戏对人工智能技术构成了相当大的挑战,因为它们具有动态性、复杂性和对抗性,其中在线规划起着突出的作用。它们也构成了在线规划的理想研究平台和试验台。μRTS是一个开源的人工智能研究平台,其特点是极简,但完整的RTS实现,用于人工智能研究人员开发和测试智能RTS游戏代理。μRTS的独特特性有助于出现有趣的在线对抗计划技术,处理多个抽象层次。本文介绍了迄今为止主要的μRTS在线规划方法,根据抽象程度,在完全可观察环境和部分可观察环境中进行了分类。
{"title":"Online Adversarial Planning in μRTS : A Survey","authors":"Abdessamed Ouessai, M. Salem, Antonio M. Mora","doi":"10.1109/ICTAACS48474.2019.8988124","DOIUrl":"https://doi.org/10.1109/ICTAACS48474.2019.8988124","url":null,"abstract":"Online planning is an important research area focusing on the problem of real-time decision making, using information extracted from the environment. The aim is to compute, at each decision point, the best decision possible that contributes to the realization of a fixed objective. Relevant application domains include robotics, control engineering and computer games. Real-time strategy (RTS) games pose considerable challenges to artificial intelligence techniques, due to their dynamic, complex and adversarial aspects, where online planning plays a prominent role. They also constitute an ideal research platform and test-bed for online planning. μRTS is an open-source AI research platform that features a minimalistic, yet complete RTS implementation, used by AI researchers for developing and testing intelligent RTS game-playing agents. The unique characteristics of μRTS helped for the emergence of interesting online adversarial planning techniques, dealing with multiple levels of abstraction. This paper presents the major μRTS online planning approaches to date, categorized by the degree of abstraction, in fully and partially observable environments.","PeriodicalId":406766,"journal":{"name":"2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards a time editor for orchestrating connected objects in the Web of Things 朝着在物联网中编排连接对象的时间编辑器的方向发展
Imene Mezenner, Samia Bouyakoub, F. M. Bouyakoub
Web of Things is a new paradigm, it constitutes the heart of a great research activity. However, most of this work does not take into account its temporal aspect, whereas it is a critical dimension directly related to customer satisfaction, optimization and is considered as a very effective strategy for cost reduction. For this matter, we propose a tool to edit and verify the time constraints added to an abstract BPEL specification. Furthermore, the editor allows the user to edit abstract BPEL specification that orchestrates Web services offered by objects connected to the Web of Things. Through the latter, the input specification is enriched with constraints and time attributes. Then, a temporal verification and validation process is applied to detect any temporal errors or conflicts.
物联网是一种新的研究范式,它构成了一项伟大研究活动的核心。然而,大多数的工作并没有考虑到它的时间方面,而它是一个关键的维度直接关系到客户满意度,优化,并被认为是一个非常有效的策略,以降低成本。对于这个问题,我们建议使用一个工具来编辑和验证添加到抽象BPEL规范中的时间约束。此外,编辑器允许用户编辑抽象BPEL规范,以编排连接到物联网的对象提供的Web服务。通过后者,输入规范丰富了约束和时间属性。然后,应用时间验证和确认过程来检测任何时间错误或冲突。
{"title":"Towards a time editor for orchestrating connected objects in the Web of Things","authors":"Imene Mezenner, Samia Bouyakoub, F. M. Bouyakoub","doi":"10.1109/ICTAACS48474.2019.8988132","DOIUrl":"https://doi.org/10.1109/ICTAACS48474.2019.8988132","url":null,"abstract":"Web of Things is a new paradigm, it constitutes the heart of a great research activity. However, most of this work does not take into account its temporal aspect, whereas it is a critical dimension directly related to customer satisfaction, optimization and is considered as a very effective strategy for cost reduction. For this matter, we propose a tool to edit and verify the time constraints added to an abstract BPEL specification. Furthermore, the editor allows the user to edit abstract BPEL specification that orchestrates Web services offered by objects connected to the Web of Things. Through the latter, the input specification is enriched with constraints and time attributes. Then, a temporal verification and validation process is applied to detect any temporal errors or conflicts.","PeriodicalId":406766,"journal":{"name":"2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131963162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection system for SDN network using deep learning approach 针对SDN网络采用深度学习方法的入侵检测系统
Sarra Boukria, M. Guerroumi
Software Defined Network (SDN) is considered as the main component of the next generation network. Security, in this environment, has very challenges and risks. Attacking SDN controller or injecting false flow rules could affect the network and block the entire services. To enhance the SDN network security, we propose an anomaly-based intrusion detection system using deep learning approach. This solution aims to protect the communication channel between the SDN control layer and the SDN infrastructure layer against false data injection attack, and to detect any attempt of attack in SND southbound side. We analyze the flows that circulate in the SDN network, we use the logarithm function followed by the Min/Max scalar technique to normalize the flows features. For the flow classification, we exploit the Relu and Softmax functions. We test the proposed system with CICIDS2017 dataset on an experimental platform combining Mininet environment and ONOS controller. The evaluation results demonstrate the effectiveness and efficiency of the proposed security solution.
软件定义网络(SDN)被认为是下一代网络的主要组成部分。在这种环境下,安全问题面临着很大的挑战和风险。攻击SDN控制器或注入虚假流量规则,可能会影响网络,导致整个业务阻塞。为了提高SDN网络的安全性,我们提出了一种基于异常的深度学习入侵检测系统。该方案旨在保护SDN控制层和SDN基础架构层之间的通信通道免受虚假数据注入攻击,并检测SND南向的任何攻击企图。我们分析了在SDN网络中循环的流量,我们使用对数函数和最小/最大标量技术来归一化流量特征。对于流分类,我们利用了Relu和Softmax函数。我们在Mininet环境和ONOS控制器相结合的实验平台上使用CICIDS2017数据集对所提出的系统进行了测试。评价结果证明了该安全方案的有效性和高效性。
{"title":"Intrusion detection system for SDN network using deep learning approach","authors":"Sarra Boukria, M. Guerroumi","doi":"10.1109/ICTAACS48474.2019.8988138","DOIUrl":"https://doi.org/10.1109/ICTAACS48474.2019.8988138","url":null,"abstract":"Software Defined Network (SDN) is considered as the main component of the next generation network. Security, in this environment, has very challenges and risks. Attacking SDN controller or injecting false flow rules could affect the network and block the entire services. To enhance the SDN network security, we propose an anomaly-based intrusion detection system using deep learning approach. This solution aims to protect the communication channel between the SDN control layer and the SDN infrastructure layer against false data injection attack, and to detect any attempt of attack in SND southbound side. We analyze the flows that circulate in the SDN network, we use the logarithm function followed by the Min/Max scalar technique to normalize the flows features. For the flow classification, we exploit the Relu and Softmax functions. We test the proposed system with CICIDS2017 dataset on an experimental platform combining Mininet environment and ONOS controller. The evaluation results demonstrate the effectiveness and efficiency of the proposed security solution.","PeriodicalId":406766,"journal":{"name":"2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116198024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Geometry-aware Compressive Dictionary Learning based Rendering 基于几何感知压缩字典学习的渲染
M. E. Djebbar, Mustapha Réda Senouci, M. E. Boudaren
Compressive Sensing (CS) is a new sampling theory. It states that we can reconstruct a signal from very few measurements taken by projecting the signal rather than point sampling it. The signal can be reconstructed if it is sparse or sparse in some domain. This theory was employed recently in [1] to accelerate the rendering of ray-traced images, by rendering just a subset of pixels then applying the CS reconstruction to fill the missing ones using wavelet as a transform domain to seek the signal sparsity condition. In this paper, we use a learned dictionary rather than standard wavelet to better sparsify our images and hence improve the CS reconstruction. We also inject cheap geometry information (depth) to accurately reconstruct our images. Finally, we post-process our images by applying a modified version of the bilateral filter to improve the overall quality. Obtained results show a clear improvement in the quality of the image reconstruction while accelerating the rendering time as compared to [1].
压缩感知(CS)是一种新的采样理论。它指出,我们可以通过投射信号而不是点采样,从很少的测量中重建信号。如果信号在某些域中是稀疏的或稀疏的,则可以重构信号。该理论最近在[1]中被用于加速光线跟踪图像的渲染,通过仅渲染像素子集,然后使用CS重建来填充缺失的像素,使用小波作为变换域来寻求信号稀疏性条件。在本文中,我们使用一个学习字典而不是标准小波来更好地稀疏我们的图像,从而提高CS重建。我们还注入了便宜的几何信息(深度)来准确地重建我们的图像。最后,我们对图像进行后处理,通过使用改进版本的双边滤波器来提高整体质量。获得的结果表明,与[1]相比,在加快渲染时间的同时,图像重建的质量有了明显的提高。
{"title":"Geometry-aware Compressive Dictionary Learning based Rendering","authors":"M. E. Djebbar, Mustapha Réda Senouci, M. E. Boudaren","doi":"10.1109/ICTAACS48474.2019.8988121","DOIUrl":"https://doi.org/10.1109/ICTAACS48474.2019.8988121","url":null,"abstract":"Compressive Sensing (CS) is a new sampling theory. It states that we can reconstruct a signal from very few measurements taken by projecting the signal rather than point sampling it. The signal can be reconstructed if it is sparse or sparse in some domain. This theory was employed recently in [1] to accelerate the rendering of ray-traced images, by rendering just a subset of pixels then applying the CS reconstruction to fill the missing ones using wavelet as a transform domain to seek the signal sparsity condition. In this paper, we use a learned dictionary rather than standard wavelet to better sparsify our images and hence improve the CS reconstruction. We also inject cheap geometry information (depth) to accurately reconstruct our images. Finally, we post-process our images by applying a modified version of the bilateral filter to improve the overall quality. Obtained results show a clear improvement in the quality of the image reconstruction while accelerating the rendering time as compared to [1].","PeriodicalId":406766,"journal":{"name":"2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130484915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tooled approach for formal verification of components interactions modeled in SysML 用于在SysML中建模的组件交互的形式化验证的工具方法
Mustapha Salim Ghitri, Mohamed Messabihi, A. Benamar
Software systems are becoming more complex and their implementation requires more rigorous modeling approaches, for this reason the OMG (Object Management Group) has implemented the SysML standard to model complex systems. Sequence diagram is one of the fundamental diagrams of SysML because it allows behavioral specification of systems. However, SysML still has a lack of formal semantics following his semi-formal definition, which makes it impossible to directly apply the simulation and verification methods to these diagrams. The model transformation community offers several solutions to transform the SysML specification into formal methods in order to bridge the gap between them, this community is divided into two principal’s axes, the first ones working on the formalization of structural diagrams, and the others have worked on behavioral diagrams. Our work contributes to behavioral modeling and aims to combine all the highlights of the other approaches in a single framework for formal verification of SDs, using TAN and Uppaal model checker. The proposed approach has been tested through a case study of an interaction between ATM and Bank to prove their reliability.
软件系统正变得越来越复杂,它们的实现需要更严格的建模方法,因此OMG(对象管理组)实现了SysML标准来对复杂系统建模。序列图是SysML的基本图之一,它允许对系统进行行为规范。然而,SysML仍然缺乏遵循其半形式化定义的形式化语义,这使得不可能直接将模拟和验证方法应用于这些图。模型转换社区提供了几种将SysML规范转换为形式化方法的解决方案,以便弥合它们之间的差距,该社区分为两个主要的轴,第一个轴致力于结构图的形式化,而其他轴则致力于行为图。我们的工作有助于行为建模,并旨在使用TAN和Uppaal模型检查器,将其他方法的所有亮点结合在一个框架中,用于SDs的正式验证。提出的方法已通过ATM和银行交互的案例研究进行了测试,以证明其可靠性。
{"title":"Tooled approach for formal verification of components interactions modeled in SysML","authors":"Mustapha Salim Ghitri, Mohamed Messabihi, A. Benamar","doi":"10.1109/ICTAACS48474.2019.8988134","DOIUrl":"https://doi.org/10.1109/ICTAACS48474.2019.8988134","url":null,"abstract":"Software systems are becoming more complex and their implementation requires more rigorous modeling approaches, for this reason the OMG (Object Management Group) has implemented the SysML standard to model complex systems. Sequence diagram is one of the fundamental diagrams of SysML because it allows behavioral specification of systems. However, SysML still has a lack of formal semantics following his semi-formal definition, which makes it impossible to directly apply the simulation and verification methods to these diagrams. The model transformation community offers several solutions to transform the SysML specification into formal methods in order to bridge the gap between them, this community is divided into two principal’s axes, the first ones working on the formalization of structural diagrams, and the others have worked on behavioral diagrams. Our work contributes to behavioral modeling and aims to combine all the highlights of the other approaches in a single framework for formal verification of SDs, using TAN and Uppaal model checker. The proposed approach has been tested through a case study of an interaction between ATM and Bank to prove their reliability.","PeriodicalId":406766,"journal":{"name":"2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123661892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge Detection in Range Images Using a Modified Canny Filter 使用改进的Canny滤波器对距离图像进行边缘检测
Cheribet Mohamed, M. Smaine
Image segmentation is a crucial step in any image analysis process. It consists in preparing the image to make it more usable by an automatic process, such interpreting and understanding its content. In this paper, we introduce a novel method for range image segmentation. The proposed method proceeds by adapting the principle of the Canny filter, commonly utilized for greyscale and colour images, to be applied for range images, where depths in these images should be differently handled. Instead of using raw image data, a new image of angles between normal vectors according some given directions is computed and then used to compute a new gradient image. Canny steps are then applied on the latter image, producing precise and well located edges. Experimentation on real images from the ABW database shows that edges in range images are correctly detected.
图像分割是任何图像分析过程中至关重要的一步。它包括准备图像,使其更可用的自动过程,如解释和理解其内容。本文提出了一种新的距离图像分割方法。该方法将通常用于灰度和彩色图像的Canny滤波器的原理应用于范围图像,其中这些图像中的深度应该进行不同的处理。该方法不使用原始图像数据,而是根据给定的方向计算法向量之间的夹角的新图像,然后使用该图像计算新的梯度图像。精明的步骤,然后应用在后一个图像,产生精确和定位良好的边缘。在ABW数据库的真实图像上进行的实验表明,该方法能够正确地检测出距离图像中的边缘。
{"title":"Edge Detection in Range Images Using a Modified Canny Filter","authors":"Cheribet Mohamed, M. Smaine","doi":"10.1109/ICTAACS48474.2019.8988126","DOIUrl":"https://doi.org/10.1109/ICTAACS48474.2019.8988126","url":null,"abstract":"Image segmentation is a crucial step in any image analysis process. It consists in preparing the image to make it more usable by an automatic process, such interpreting and understanding its content. In this paper, we introduce a novel method for range image segmentation. The proposed method proceeds by adapting the principle of the Canny filter, commonly utilized for greyscale and colour images, to be applied for range images, where depths in these images should be differently handled. Instead of using raw image data, a new image of angles between normal vectors according some given directions is computed and then used to compute a new gradient image. Canny steps are then applied on the latter image, producing precise and well located edges. Experimentation on real images from the ABW database shows that edges in range images are correctly detected.","PeriodicalId":406766,"journal":{"name":"2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132712525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1