首页 > 最新文献

2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)最新文献

英文 中文
Hybrid Curvelet Transform and Least Significant Bit for image steganography 图像隐写的混合曲波变换和最小有效位
Heba Mostafa, A. Ali, Ghada El Taweal
In this paper, we propose a new hybrid method for image steganography by using discrete curvelet transform and least significant bit (LSB). The proposed method is called Hybrid Curvelet Transform and Least Significant Bit (HCTLSB). In HCTLSB, the curvelet denoising is applied as a preprocessing step in order to remove the noise from the cover image. The cover image is transformed by applying the discreet curvelet transform before embedding the secret data by using LSB technique. Invoking the curvelet transform in the proposed method can handle the curve discontinuities in the cover image to obtain a better quality and robustness image. The LSB technique is applied on the obtained discrete curvelet coefficients image to embed the secret data without making noticeable changes to the cover image. The general performance of the proposed method is tested on 10 cover and secret images and compared against two benchmark methods. The experimental results show that the proposed method is a promising method and can obtain results better than the other compared methods.
本文提出了一种利用离散曲线变换和最低有效位(LSB)进行图像隐写的混合方法。该方法被称为混合曲波变换和最低有效位(HCTLSB)。在hcttlsb中,采用曲波去噪作为预处理步骤,以去除封面图像中的噪声。在利用LSB技术嵌入秘密数据之前,先对封面图像进行离散曲线变换。在该方法中调用曲线变换可以处理封面图像中的曲线不连续,从而获得更好的图像质量和鲁棒性。在得到的离散曲线系数图像上应用LSB技术,在不明显改变封面图像的情况下嵌入秘密数据。在10幅封面和秘密图像上测试了该方法的总体性能,并与两种基准方法进行了比较。实验结果表明,该方法是一种有前途的方法,可以获得比其他比较方法更好的结果。
{"title":"Hybrid Curvelet Transform and Least Significant Bit for image steganography","authors":"Heba Mostafa, A. Ali, Ghada El Taweal","doi":"10.1109/INTELCIS.2015.7397238","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397238","url":null,"abstract":"In this paper, we propose a new hybrid method for image steganography by using discrete curvelet transform and least significant bit (LSB). The proposed method is called Hybrid Curvelet Transform and Least Significant Bit (HCTLSB). In HCTLSB, the curvelet denoising is applied as a preprocessing step in order to remove the noise from the cover image. The cover image is transformed by applying the discreet curvelet transform before embedding the secret data by using LSB technique. Invoking the curvelet transform in the proposed method can handle the curve discontinuities in the cover image to obtain a better quality and robustness image. The LSB technique is applied on the obtained discrete curvelet coefficients image to embed the secret data without making noticeable changes to the cover image. The general performance of the proposed method is tested on 10 cover and secret images and compared against two benchmark methods. The experimental results show that the proposed method is a promising method and can obtain results better than the other compared methods.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"25 1","pages":"300-305"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86087442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A comparative study into swarm intelligence algorithms for dynamic tasks scheduling in cloud computing 云计算中动态任务调度的群智能算法比较研究
Gamal F. Elhady, Medhat A. Tawfeek
Cloud computing are becoming the major source of computing. The core idea of this environment is managing and scheduling the available resources to provide service's needs. Servers in cloud may be physical or virtual machines accessed across the network. Selecting machines for executing a task in the cloud computing must be considered. They have to be selected according to its status and submitted tasks properties to exploit the efficiency of the resources. Cloud task scheduling is considered an NP-hard optimization problem, and many meta-heuristic algorithms are suitable to solve it. This paper investigates three possible approaches proposed for dynamic task scheduling in cloud computing. The three approaches are belonging to the field of swarm intelligence that is used to find solutions for difficult or impossible combinatorial problems. These approaches are inspired by ant colony behavior, the behavior of particle swarm and honeybee foraging behavior. The main goal is to provide an evaluation and comparative study of these approaches that are used to minimize the makespan of a given tasks set. Performance of the algorithms is simulated using toolkit package of CloudSim. Algorithms have been compared with each other and with the well-known existed algorithms for dynamic task scheduling problem. The results of the experiments are presented and the strengths of each algorithm are investigated. Experimental results show that the proposed approaches satisfy expectation, also proved that ABC algorithm is the superior than other algorithms.
云计算正在成为计算的主要来源。该环境的核心思想是管理和调度可用资源以提供服务需求。云中的服务器可以是通过网络访问的物理机或虚拟机。必须考虑在云计算中为执行任务选择机器。必须根据其状态和提交的任务属性来选择它们,以利用资源的效率。云任务调度被认为是一个NP-hard优化问题,许多元启发式算法都适合解决这个问题。本文研究了云计算中动态任务调度的三种可能方法。这三种方法属于群体智能领域,用于寻找困难或不可能组合问题的解决方案。这些方法受到蚁群行为、粒子群行为和蜜蜂觅食行为的启发。主要目标是对这些用于最小化给定任务集的完工时间的方法进行评估和比较研究。利用CloudSim工具包对算法的性能进行了仿真。针对动态任务调度问题,对算法进行了比较,并与已有的知名算法进行了比较。给出了实验结果,并分析了每种算法的优点。实验结果表明,所提方法满足预期,也证明了ABC算法优于其他算法。
{"title":"A comparative study into swarm intelligence algorithms for dynamic tasks scheduling in cloud computing","authors":"Gamal F. Elhady, Medhat A. Tawfeek","doi":"10.1109/INTELCIS.2015.7397246","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397246","url":null,"abstract":"Cloud computing are becoming the major source of computing. The core idea of this environment is managing and scheduling the available resources to provide service's needs. Servers in cloud may be physical or virtual machines accessed across the network. Selecting machines for executing a task in the cloud computing must be considered. They have to be selected according to its status and submitted tasks properties to exploit the efficiency of the resources. Cloud task scheduling is considered an NP-hard optimization problem, and many meta-heuristic algorithms are suitable to solve it. This paper investigates three possible approaches proposed for dynamic task scheduling in cloud computing. The three approaches are belonging to the field of swarm intelligence that is used to find solutions for difficult or impossible combinatorial problems. These approaches are inspired by ant colony behavior, the behavior of particle swarm and honeybee foraging behavior. The main goal is to provide an evaluation and comparative study of these approaches that are used to minimize the makespan of a given tasks set. Performance of the algorithms is simulated using toolkit package of CloudSim. Algorithms have been compared with each other and with the well-known existed algorithms for dynamic task scheduling problem. The results of the experiments are presented and the strengths of each algorithm are investigated. Experimental results show that the proposed approaches satisfy expectation, also proved that ABC algorithm is the superior than other algorithms.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"362-369"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91107366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Artificial immune system based intrusion detection 基于人工免疫系统的入侵检测
Eman Abd El Raoof Abas, H. Abdelkader, A. Keshk
Due to the growing of internet applications, the needs of internet security are increasing. Intrusion detection system is the primary approaches used for saving systems from internal and external intruders. Several techniques have been applied to intrusion detection system such as artificial neural Network, genetic algorithms, artificial immune system. Most researchers suggested improving the intrusion detection performance and accuracy. In this paper, we used artificial immune system network based intrusion detection. In our framework we suggest using GureKddcup database set for intrusion detection and apply R-chunk algorithm of artificial immune system technique, it is used for anomaly detection .An optimized feature selection of rough set theory used for enhancing time consuming.
随着互联网应用的不断增长,对网络安全的需求也在不断增加。入侵检测系统是保护系统免受内部和外部入侵的主要方法。人工神经网络、遗传算法、人工免疫系统等技术已被应用于入侵检测系统中。大多数研究人员建议提高入侵检测的性能和准确性。本文采用基于人工免疫系统网络的入侵检测方法。在我们的框架中,我们建议使用GureKddcup数据库集进行入侵检测,并采用人工免疫系统技术中的R-chunk算法进行异常检测,并采用粗糙集理论的优化特征选择来提高时间消耗。
{"title":"Artificial immune system based intrusion detection","authors":"Eman Abd El Raoof Abas, H. Abdelkader, A. Keshk","doi":"10.1109/INTELCIS.2015.7397274","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397274","url":null,"abstract":"Due to the growing of internet applications, the needs of internet security are increasing. Intrusion detection system is the primary approaches used for saving systems from internal and external intruders. Several techniques have been applied to intrusion detection system such as artificial neural Network, genetic algorithms, artificial immune system. Most researchers suggested improving the intrusion detection performance and accuracy. In this paper, we used artificial immune system network based intrusion detection. In our framework we suggest using GureKddcup database set for intrusion detection and apply R-chunk algorithm of artificial immune system technique, it is used for anomaly detection .An optimized feature selection of rough set theory used for enhancing time consuming.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"39 1 1","pages":"542-546"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91035121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A proposed approach to detect and thwart previously unknown code injection attacks 提出了一种检测和阻止未知代码注入攻击的方法
Omar Hussein, Nermin Hamza, H. Hefny
This paper presents a proposed approach called VAIL System Call Monitor (YSCM) to detect and thwart previously unknown code injection attacks. The idea is based on the fact that any process needs to correctly invoke CreateProcessO system calls, otherwise child-process creation will fail. YSCM intercepts and verifies CreateProcessO system call invocations from a monitored process. In case an unknown executable is detected in the first parameter of a call, this indicates its maliciousness. In response, YSCM encrypts that parameter value to render the call invalid, thereby thwarting adversaries' attacks by preventing the operating system from loading and executing the new malicious child process. YSCM runs in a microkernel-based virtual machine in order to achieve two-fold advantages: (1) isolate security-critical information from probable adversaries' attacks; and (2) exploit security-related and performance-related advantages associated with thin virtual machine monitors. The expected effectiveness of YSCM is high since it is circumvention-proof, and precise in extracting the normal behavior of applications chosen to be monitored.
本文提出了一种名为VAIL系统调用监视器(YSCM)的方法来检测和阻止先前未知的代码注入攻击。这个想法基于这样一个事实,即任何进程都需要正确调用CreateProcessO系统调用,否则子进程的创建将失败。YSCM拦截并验证来自被监视进程的CreateProcessO系统调用。如果在调用的第一个参数中检测到未知的可执行文件,这表明它是恶意的。作为响应,YSCM加密该参数值以使调用无效,从而通过阻止操作系统加载和执行新的恶意子进程来挫败攻击者的攻击。YSCM运行在基于微内核的虚拟机上,以实现双重优势:(1)隔离安全关键信息,使其不受可能的对手攻击;(2)利用与瘦虚拟机监视器相关的安全相关和性能相关的优势。YSCM的预期有效性很高,因为它是防规避的,并且可以精确地提取要监控的应用程序的正常行为。
{"title":"A proposed approach to detect and thwart previously unknown code injection attacks","authors":"Omar Hussein, Nermin Hamza, H. Hefny","doi":"10.1109/INTELCIS.2015.7397243","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397243","url":null,"abstract":"This paper presents a proposed approach called VAIL System Call Monitor (YSCM) to detect and thwart previously unknown code injection attacks. The idea is based on the fact that any process needs to correctly invoke CreateProcessO system calls, otherwise child-process creation will fail. YSCM intercepts and verifies CreateProcessO system call invocations from a monitored process. In case an unknown executable is detected in the first parameter of a call, this indicates its maliciousness. In response, YSCM encrypts that parameter value to render the call invalid, thereby thwarting adversaries' attacks by preventing the operating system from loading and executing the new malicious child process. YSCM runs in a microkernel-based virtual machine in order to achieve two-fold advantages: (1) isolate security-critical information from probable adversaries' attacks; and (2) exploit security-related and performance-related advantages associated with thin virtual machine monitors. The expected effectiveness of YSCM is high since it is circumvention-proof, and precise in extracting the normal behavior of applications chosen to be monitored.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"15 6 1","pages":"336-342"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81046731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computational complexity for some problems of two terms unification based on concatenation 基于串联的两项统一问题的计算复杂度
N. K. Kosovskii
Tools for description of bounds for word variable values are offered. The use of these descriptions provides the conditions of a problem belonging to the class P or to the class NP. NP-completeness of an unification problem is proved. The validity of the proved bounds may make possible to create effective algorithms for unification of word terms, used in such programming language as Refal.
提供了描述词变量值边界的工具。这些描述的使用提供了问题属于类P或类NP的条件。证明了一类统一问题的np完备性。证明边界的有效性可能使创建统一词项的有效算法成为可能,在诸如Refal之类的编程语言中使用。
{"title":"Computational complexity for some problems of two terms unification based on concatenation","authors":"N. K. Kosovskii","doi":"10.1109/INTELCIS.2015.7397196","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397196","url":null,"abstract":"Tools for description of bounds for word variable values are offered. The use of these descriptions provides the conditions of a problem belonging to the class P or to the class NP. NP-completeness of an unification problem is proved. The validity of the proved bounds may make possible to create effective algorithms for unification of word terms, used in such programming language as Refal.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"56-57"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79113582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated analysis for basketball free throw 篮球罚球自动分析
A. M. Rahma, May A. S. Rahma, Maryam A. S. Rahma
Kinetic analysis of the sport player performance is a very important operation for players and coaches, in order to fully understand player development and abilities. Commonly this operation is done by human observation and reviewing a large amount of recorded video. Problems with the traditional way are that this is time-consuming, inaccurate, mostly neither the players nor the coaches will be able to review the whole video content or part of the recorded video, and in some cases the reviewer may overlook some important details. This paper proposes a suggested computerized kinetic analysis for basketball free throw, the paper first detects the main positions of the free throw, then analyses the player performance based on the calculated Hu moment.
运动员运动表现的动力学分析对运动员和教练员来说是一项非常重要的操作,以便全面了解运动员的发展和能力。通常这种操作是通过人工观察和查看大量录制的视频来完成的。传统方法的问题在于耗时,不准确,大多数情况下球员和教练都无法审查整个视频内容或部分录制的视频,并且在某些情况下审稿人可能会忽略一些重要的细节。本文提出了一种篮球罚球的计算机动力学分析方法,首先对罚球的主要位置进行检测,然后根据计算得到的胡力矩对球员的罚球表现进行分析。
{"title":"Automated analysis for basketball free throw","authors":"A. M. Rahma, May A. S. Rahma, Maryam A. S. Rahma","doi":"10.1109/INTELCIS.2015.7397259","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397259","url":null,"abstract":"Kinetic analysis of the sport player performance is a very important operation for players and coaches, in order to fully understand player development and abilities. Commonly this operation is done by human observation and reviewing a large amount of recorded video. Problems with the traditional way are that this is time-consuming, inaccurate, mostly neither the players nor the coaches will be able to review the whole video content or part of the recorded video, and in some cases the reviewer may overlook some important details. This paper proposes a suggested computerized kinetic analysis for basketball free throw, the paper first detects the main positions of the free throw, then analyses the player performance based on the calculated Hu moment.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"22 12 1","pages":"447-453"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82918143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fuzzy assessment processes 模糊评价过程
M. Voskoglou
In this paper we use the Triangular and Trapezoidal Fuzzy Numbers as assessment tools. Fuzzy Numbers play a fundamental role in fuzzy mathematics analogous to the role played by the ordinary numbers in classical mathematics. Our results are illustrated by three examples, through which the effectiveness of our new fuzzy assessment approach is validated compared to already established in earlier author's works assessment methods of the classical logic (calculation of the means, GPA index) and of the fuzzy logic (Trapezoidal Model).
本文采用三角模糊数和梯形模糊数作为评价工具。模糊数在模糊数学中所起的基础性作用,类似于普通数在经典数学中所起的作用。通过三个实例验证了本文所提出的模糊评价方法的有效性,并与前人的经典逻辑评价方法(计算均值、GPA指数)和模糊逻辑评价方法(梯形模型)进行了比较。
{"title":"Fuzzy assessment processes","authors":"M. Voskoglou","doi":"10.1109/INTELCIS.2015.7397233","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397233","url":null,"abstract":"In this paper we use the Triangular and Trapezoidal Fuzzy Numbers as assessment tools. Fuzzy Numbers play a fundamental role in fuzzy mathematics analogous to the role played by the ordinary numbers in classical mathematics. Our results are illustrated by three examples, through which the effectiveness of our new fuzzy assessment approach is validated compared to already established in earlier author's works assessment methods of the classical logic (calculation of the means, GPA index) and of the fuzzy logic (Trapezoidal Model).","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"272-280"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88801322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Partial deduction in predicate calculus as a tool for artificial intelligence problem complexity decreasing 部分演绎在谓词演算中作为人工智能问题复杂性降低的工具
T. Kosovskaya
Many artificial intelligence problems are NP-complete ones. To decrease the needed time of such a problem solving a method of extraction of sub-formulas characterizing the common features of objects under consideration is suggested. This method is based on the offered by the author notion of partial deduction. Repeated application of this procedure allows to form a level description of an object and of classes of objects. A model example of such a level description and the degree of steps number increasing is presented in the paper.
许多人工智能问题都是np完全问题。为了减少求解此类问题所需的时间,提出了一种提取表征所考虑对象的共同特征的子公式的方法。该方法基于作者提出的部分演绎概念。重复应用这个过程可以形成一个对象和对象类的层次描述。文中给出了这种层次描述和阶数递增程度的一个模型实例。
{"title":"Partial deduction in predicate calculus as a tool for artificial intelligence problem complexity decreasing","authors":"T. Kosovskaya","doi":"10.1109/INTELCIS.2015.7397199","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397199","url":null,"abstract":"Many artificial intelligence problems are NP-complete ones. To decrease the needed time of such a problem solving a method of extraction of sub-formulas characterizing the common features of objects under consideration is suggested. This method is based on the offered by the author notion of partial deduction. Repeated application of this procedure allows to form a level description of an object and of classes of objects. A model example of such a level description and the degree of steps number increasing is presented in the paper.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"73-76"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72859461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A knowledge-in-the-loop approach to integrated safety&security for cooperative system-of-systems 协作系统集成安全与安保的知识在环方法
Dejiu Chen, K. Meinke, Kenneth Ostberg, F. Asplund, Christoph Baumann
A system-of-systems (SoS) is inherently open in configuration and evolutionary in lifecycle. For the next generation of cooperative cyber-physical system-of-systems, safety and security constitute two key issues of public concern that affect the deployment and acceptance. In engineering, the openness and evolutionary nature also entail radical paradigm shifts. This paper presents one novel approach to the development of qualified cyber-physical system-of-systems, with Cooperative Intelligent Transport Systems (C-ITS) as one target. The approach, referred to as knowledge-in-the-loop, aims to allow a synergy of well-managed lifecycles, formal quality assurance, and smart system features. One research goal is to enable an evolutionary development with continuous and traceable flows of system rationale from design-time to post-deployment time and back, supporting automated knowledge inference and enrichment. Another research goal is to develop a formal approach to risk-aware dynamic treatment of safety and security as a whole in the context of system-of-systems. Key base technologies include: (1) EAST-ADL for the consolidation of system-wide concerns and for the creation of an ontology for advanced run-time decisions, (2) Learning Based-Testing for run-time and post-deployment model inference, safety monitoring and testing, (3) Provable Isolation for run-time attack detection and enforcement of security in real-time operating systems.
系统的系统在配置上本质上是开放的,在生命周期上是进化的。对于下一代协同网络物理系统,安全和保障是影响部署和接受的公众关注的两个关键问题。在工程领域,开放性和进化性也需要根本性的范式转变。本文以协同智能交通系统(C-ITS)为目标,提出了一种开发合格的信息物理系统的新方法。这种方法被称为循环中的知识,旨在实现管理良好的生命周期、正式的质量保证和智能系统特性的协同作用。一个研究目标是支持从设计到部署后再返回的系统基本原理的连续和可跟踪流的进化开发,支持自动化的知识推理和丰富。另一个研究目标是开发一种正式的方法,在系统的系统背景下,对整个安全和保障进行风险意识动态处理。关键基础技术包括:(1)用于整合系统范围关注和创建用于高级运行时决策的本体的EAST-ADL;(2)用于运行时和部署后模型推理、安全监控和测试的基于学习的测试;(3)用于实时操作系统中运行时攻击检测和安全实施的可证明隔离。
{"title":"A knowledge-in-the-loop approach to integrated safety&security for cooperative system-of-systems","authors":"Dejiu Chen, K. Meinke, Kenneth Ostberg, F. Asplund, Christoph Baumann","doi":"10.1109/INTELCIS.2015.7397237","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397237","url":null,"abstract":"A system-of-systems (SoS) is inherently open in configuration and evolutionary in lifecycle. For the next generation of cooperative cyber-physical system-of-systems, safety and security constitute two key issues of public concern that affect the deployment and acceptance. In engineering, the openness and evolutionary nature also entail radical paradigm shifts. This paper presents one novel approach to the development of qualified cyber-physical system-of-systems, with Cooperative Intelligent Transport Systems (C-ITS) as one target. The approach, referred to as knowledge-in-the-loop, aims to allow a synergy of well-managed lifecycles, formal quality assurance, and smart system features. One research goal is to enable an evolutionary development with continuous and traceable flows of system rationale from design-time to post-deployment time and back, supporting automated knowledge inference and enrichment. Another research goal is to develop a formal approach to risk-aware dynamic treatment of safety and security as a whole in the context of system-of-systems. Key base technologies include: (1) EAST-ADL for the consolidation of system-wide concerns and for the creation of an ontology for advanced run-time decisions, (2) Learning Based-Testing for run-time and post-deployment model inference, safety monitoring and testing, (3) Provable Isolation for run-time attack detection and enforcement of security in real-time operating systems.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"48 1","pages":"13-20"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76353186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Building data warehouse system for the tourism sector 构建旅游行业数据仓库系统
T. Abdulaziz, I. Moawad, Wesal M. Abu-Alam
Decision makers in the tourism sector face real challenges. There is no chance to access a unified data source that can supply information to meet their inquiries and expectations. In this paper, we propose a data warehouse system for supporting the decision makers in the Egyptian tourism sector. The methodology followed to build this system is descried in details to guide the other developing countries who are trying to support their decision makers in the tourism sector by building a similar data warehouse system. In addition, we evaluated the tourism data warehouse system. The results of evaluation indicated that it can meet the needs and requirements of the decision makers in the tourism sector.
旅游部门的决策者面临着真正的挑战。没有机会访问可以提供信息以满足其查询和期望的统一数据源。在本文中,我们提出了一个数据仓库系统,以支持埃及旅游部门的决策者。详细描述了建立这一系统所采用的方法,以指导其他发展中国家通过建立类似的数据仓库系统来支持其旅游部门的决策者。此外,对旅游数据仓库系统进行了评价。评价结果表明,该系统能够满足旅游部门决策者的需求和要求。
{"title":"Building data warehouse system for the tourism sector","authors":"T. Abdulaziz, I. Moawad, Wesal M. Abu-Alam","doi":"10.1109/INTELCIS.2015.7397253","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397253","url":null,"abstract":"Decision makers in the tourism sector face real challenges. There is no chance to access a unified data source that can supply information to meet their inquiries and expectations. In this paper, we propose a data warehouse system for supporting the decision makers in the Egyptian tourism sector. The methodology followed to build this system is descried in details to guide the other developing countries who are trying to support their decision makers in the tourism sector by building a similar data warehouse system. In addition, we evaluated the tourism data warehouse system. The results of evaluation indicated that it can meet the needs and requirements of the decision makers in the tourism sector.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"18 1","pages":"410-417"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74939881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1