Journal of Innovation in Digital Ecosystems最新文献

筛选
英文 中文
Mining online political opinion surveys for suspect entries: An interdisciplinary comparison 从可疑条目中挖掘在线政治民意调查:跨学科比较
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.11.003
Costantinos Djouvas , Fernando Mendez , Nicolas Tsapatsoulis
{"title":"Mining online political opinion surveys for suspect entries: An interdisciplinary comparison","authors":"Costantinos Djouvas ,&nbsp;Fernando Mendez ,&nbsp;Nicolas Tsapatsoulis","doi":"10.1016/j.jides.2016.11.003","DOIUrl":"10.1016/j.jides.2016.11.003","url":null,"abstract":"<div><p>Filtering data generated by so-called Voting Advice Applications (VAAs) in order to remove entries that exhibit unrealistic behavior (i.e., cannot correspond to a real political view) is of primary importance. If such entries are significantly present in VAA generated datasets, they can render conclusions drawn from VAA data analysis invalid. In this work we investigate approaches that can be used for automating the process of identifying entries that appear to be suspicious in terms of a users’ answer patterns. We utilize two unsupervised data mining techniques and compare their performance against a well established psychometric approach. Our results suggest that the performance of data mining approaches is comparable to those drawing on psychometric theory with a fraction of the complexity. More specifically, our simulations show that data mining techniques as well as psychometric approaches can be used to identify truly ‘rogue’ data (i.e., completely random data injected into the dataset under investigation). However, when analysing real datasets the performance of all approaches dropped considerably. This suggests that ‘suspect’ entries are neither random nor clustered. This finding poses some limitations on the use of unsupervised techniques, suggesting that the latter can only complement rather than substitute existing methods to identifying suspicious entries.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 172-182"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.11.003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121070336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
QoS-Aware approach to monitor violations of SLAs in the IoT 在物联网中监控违反sla的qos感知方法
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.010
Mohammed Alodib
{"title":"QoS-Aware approach to monitor violations of SLAs in the IoT","authors":"Mohammed Alodib","doi":"10.1016/j.jides.2016.10.010","DOIUrl":"10.1016/j.jides.2016.10.010","url":null,"abstract":"<div><p>The Internet of Things (IoT) is an ecosystem comprising interrelated wireless devices. Web services developed over Service oriented Architectures (SoA) are among the most promising solution to facilitate the communication of things in the IoT. Web services interact with each other, irrespective of features such as operating system, or programming language. One of the main challenges facing such a platform is the declaration of SLAs, and the monitoring of violations. This is because the IoT allows users to build large, distributed, and complex applications. Therefore, it critical to develop a method to facilitate the supervision and management of SLAs. The method proposed in this paper aims to automate the generation of a QoS-Aware service, providing real-time monitoring. The algorithm used to produce the service is inspired by the diagnosability theory of Discrete Event System (DES). In this approach, the SLAs defined by users are automatically mapped into a UML QoS model. The SoA composite application for each site is then mapped into a Petri net. The UML QoS model is then transferred and combined with the Petri net model. An algorithm to compute the QoS-Aware service is then applied to the Petri net model, and the service produced finally incorporated into the system.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 197-207"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134220354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
CogWatch: Automatic prompting system for stroke survivors during activities of daily living CogWatch:中风幸存者日常生活活动的自动提示系统
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.003
Emilie M.D. Jean-Baptiste , Pia Rotshtein , Martin Russell
{"title":"CogWatch: Automatic prompting system for stroke survivors during activities of daily living","authors":"Emilie M.D. Jean-Baptiste ,&nbsp;Pia Rotshtein ,&nbsp;Martin Russell","doi":"10.1016/j.jides.2016.10.003","DOIUrl":"10.1016/j.jides.2016.10.003","url":null,"abstract":"<div><p>This paper presents CogWatch - an automatic prompting system designed to guide stroke survivors during activities of daily living, such as tea-making. In order to provide guidance during such activities, CogWatch needs to plan which optimal action should be done by users at each step of the task, and detect potential errors in their behavior. This paper focuses on the CogWatch Task Manager, which contains the modules responsible for action planning and human’s error detection under uncertainty. We first give an overview of the global assistive system where the Task Manager is implemented, and explain how it can interact with a user during the tea-making task. We then analyze how novel algorithms allow the Task Manager to increase the system’s performance.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 48-56"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131909875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Wavelet decomposition of software entropy reveals symptoms of malicious code 软件熵的小波分解揭示了恶意代码的症状
Journal of Innovation in Digital Ecosystems Pub Date : 2016-12-01 DOI: 10.1016/j.jides.2016.10.009
Michael Wojnowicz, Glenn Chisholm, Matt Wolff, Xuan Zhao
{"title":"Wavelet decomposition of software entropy reveals symptoms of malicious code","authors":"Michael Wojnowicz,&nbsp;Glenn Chisholm,&nbsp;Matt Wolff,&nbsp;Xuan Zhao","doi":"10.1016/j.jides.2016.10.009","DOIUrl":"10.1016/j.jides.2016.10.009","url":null,"abstract":"<div><p>Sophisticated malware authors can sneak hidden malicious contents into portable executable files, and this contents can be hard to detect, especially if encrypted or compressed. However, when an executable file switches between contents regimes (e.g., native, encrypted, compressed, text, and padding), there are corresponding shifts in the file’s representation as an entropy signal. In this paper, we develop a method for automatically quantifying the extent to which patterned variations in a file’s entropy signal make it “suspicious”. In Experiment 1, we use wavelet transforms to define a Suspiciously Structured Entropic Change Score (SSECS), a scalar feature that quantifies the suspiciousness of a file based on its distribution of entropic energy across multiple levels of spatial resolution. Based on this single feature, it was possible to raise predictive accuracy on a malware detection task from 50.0% to 68.7%, even though the single feature was applied to a heterogeneous corpus of malware discovered “in the wild”. In Experiment 2, we describe how wavelet-based decompositions of software entropy can be applied to a parasitic malware detection task involving large numbers of samples and features. By extracting only string and entropy features (with wavelet decompositions) from software samples, we are able to obtain almost 99% detection of parasitic malware with fewer than 1% false positives on good files. Moreover, the addition of wavelet-based features uniformly improved detection performance across plausible false positive rates, both in a strings-only model (e.g., from 80.90% to 82.97%) and a strings-plus-entropy model (e.g. from 92.10% to 94.74%, and from 98.63% to 98.90%). Overall, wavelet decomposition of software entropy can be useful for machine learning models for detecting malware based on extracting millions of features from executable files.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 2","pages":"Pages 130-140"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.10.009","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114737383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Cooperation between Intelligent Autonomous Vehicles to enhance container terminal operations 智能自动驾驶汽车之间的合作,以提高集装箱码头的运营
Journal of Innovation in Digital Ecosystems Pub Date : 2016-06-01 DOI: 10.1016/j.jides.2016.05.002
Nacera Bahnes, Bouabdellah Kechar, Hafid Haffaf
{"title":"Cooperation between Intelligent Autonomous Vehicles to enhance container terminal operations","authors":"Nacera Bahnes,&nbsp;Bouabdellah Kechar,&nbsp;Hafid Haffaf","doi":"10.1016/j.jides.2016.05.002","DOIUrl":"10.1016/j.jides.2016.05.002","url":null,"abstract":"<div><p>Intelligent Autonomous Vehicles (IAVs) constitute one of the component systems of Intelligent Transportation System (ITS) that can operate in confined private spaces, as well as in open and public spaces. The seaports or container terminals are one of the important confined spaces that have attracted extensive research interests over the last decade in the use of information communication technology to improve the operation of ITS. The main goal of research works undertaken so far in this area was to improving the efficiency and cost-effectiveness of the indoor traffic, by transporting optimally and sustainably freight from ship to the logistics and unloading areas. The use of a team of IAVs with wireless communication capabilities by rearranging efficiently all operations of handling, routing,…is a strategic objective for seaport authorities and their customers. In this paper, we consider inter-Vehicles communication system in which IAVs can communicate and cooperate to avoid collision problem in the predetermined intersection areas in the yard. We investigate the performance of our solution through simulations using Omnet++/Veins Simulation framework. We show that the implemented cooperation mechanism can significantly reduce the unloading time in the seaport.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 1","pages":"Pages 22-29"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.05.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122439979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Challenge of validation in requirements engineering 需求工程中验证的挑战
Journal of Innovation in Digital Ecosystems Pub Date : 2016-06-01 DOI: 10.1016/j.jides.2016.05.001
Sourour Maalem , Nacereddine Zarour
{"title":"Challenge of validation in requirements engineering","authors":"Sourour Maalem ,&nbsp;Nacereddine Zarour","doi":"10.1016/j.jides.2016.05.001","DOIUrl":"10.1016/j.jides.2016.05.001","url":null,"abstract":"<div><p>This paper will review the evolution of validation techniques and their current status in Requirements Engineering (RE). We start by answering the following questions: What validate? Why the benefits of having the requirements validation activities during the RE process? Who are the stakeholders involved in the requirements validation process? Where applied the validation in the RE process? and How the techniques and the approaches of requirements validation?</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 1","pages":"Pages 15-21"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.05.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128569892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
The path planning of cleaner robot for coverage region using Genetic Algorithms 基于遗传算法的清扫机器人覆盖区域路径规划
Journal of Innovation in Digital Ecosystems Pub Date : 2016-06-01 DOI: 10.1016/j.jides.2016.05.004
Mohamed Amine Yakoubi, Mohamed Tayeb Laskri
{"title":"The path planning of cleaner robot for coverage region using Genetic Algorithms","authors":"Mohamed Amine Yakoubi,&nbsp;Mohamed Tayeb Laskri","doi":"10.1016/j.jides.2016.05.004","DOIUrl":"10.1016/j.jides.2016.05.004","url":null,"abstract":"<div><p>The vacuum cleaner robot should have a mechanism such as the artificial intelligence to solve the problem of cleaning the entire environment areas taking into account some factors such as the number of turns and the length of the trajectory. This robot’s mechanism or task is known as the path planning of coverage region (PPCR). In this paper, to resolve the problem of PPCR in a room environment, we propose an evolutionary approach. The latter is based on Genetic Algorithms (GA) which, consist of several steps to get the solutions. Each gene represents the robot position and some of chromosomes represent also the mini-path. In addition, this algorithm helps the robot to pass through every part of the environment by avoiding obstacles using different sensors. The results of simulation and comparison studies demonstrate the effectiveness and efficiency of the proposed approach.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 1","pages":"Pages 37-43"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.05.004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Reasoning over decomposing fuzzy description logic 基于模糊描述逻辑分解的推理
Journal of Innovation in Digital Ecosystems Pub Date : 2016-06-01 DOI: 10.1016/j.jides.2016.05.003
Mohamed Gasmi, Mustapha Bourahla
{"title":"Reasoning over decomposing fuzzy description logic","authors":"Mohamed Gasmi,&nbsp;Mustapha Bourahla","doi":"10.1016/j.jides.2016.05.003","DOIUrl":"10.1016/j.jides.2016.05.003","url":null,"abstract":"<div><p>A DF-ALC (Decomposing fuzzy ALC) is proposed in this paper to satisfy the need for representing and reasoning with fuzzy ontologies in the context of semantic Web. A DF-ALC is also proposed to satisfy the need for seeing the necessity of decomposing ontology into several sub-ontologies in order to optimize the fuzzy reasoning process.</p><p>The main contribution of this work is to decompose the axioms of the ontology into sub-axioms according to a degree of certainty which is assigned to the fuzzy concepts and roles. It is also to define the syntax and semantics and to propose a local reasoning algorithm and a way of using gateways to infer between local TBox.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 1","pages":"Pages 30-36"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.05.003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123662231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Boundary and holes recognition in wireless sensor networks 无线传感器网络中的边界和孔洞识别
Journal of Innovation in Digital Ecosystems Pub Date : 2016-06-01 DOI: 10.1016/j.jides.2016.04.001
Rachid Beghdad, Amar Lamraoui
{"title":"Boundary and holes recognition in wireless sensor networks","authors":"Rachid Beghdad,&nbsp;Amar Lamraoui","doi":"10.1016/j.jides.2016.04.001","DOIUrl":"10.1016/j.jides.2016.04.001","url":null,"abstract":"<div><p>In this paper, a distributed solution is proposed for detecting boundaries and holes in the WSN using only the nodes connectivity information. The run of our protocol is divided imto three main steps. In the first step, each node collects connectivity information of its one-hop neighbors and constructs its one-hop neighbors’ graph. In the second step, independent sets are constructed. In the last step, the independent sets are connected in order to find the closed path. Therefore, the node can make its own decision to be an internal or a boundary node. Simulation results show that our algorithm can detect fine-grained boundaries with high accuracy, low energy consumption and less communication overhead compared to some former works. In addition, this algorithm performs better than some exiting approaches (BCP, THD, and SDBR).</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"3 1","pages":"Pages 1-14"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2016.04.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130327665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Security architecture metamodel for Model Driven security 模型驱动安全性的安全体系结构元模型
Journal of Innovation in Digital Ecosystems Pub Date : 2015-12-01 DOI: 10.1016/j.jides.2015.12.001
Makhlouf Derdour , Adel Alti , Mohamed Gasmi , Philippe Roose
{"title":"Security architecture metamodel for Model Driven security","authors":"Makhlouf Derdour ,&nbsp;Adel Alti ,&nbsp;Mohamed Gasmi ,&nbsp;Philippe Roose","doi":"10.1016/j.jides.2015.12.001","DOIUrl":"10.1016/j.jides.2015.12.001","url":null,"abstract":"<div><p>A key aspect of the design of any software system is its architecture. One issue for perpetually designing good and robust architectures is the new security concepts. Many new applications are running on powerful platforms that have ample rich architecture models to support multiples security techniques and to explicit several security constraints. The design of an architecture meta-model that considers security connectors is required in order to ensure a realistic secure assembly and to address the problems of vulnerability of exchanging data flow. Our research proposes a generic meta-modelling approach called SMSA (Security Meta-model for Software Architecture) for describing a software system as a collection of components that interact through security connectors. SMSA metamodel is modeled as a UML SMSA profile. We exploit UML powerful capacities (meta-models and models) to define security concepts of SMSA (e.g. security connectors, composite and domain). A major benefit of UML profile is to the faithful representation of connectors to support the definition of security connector types explicitly and to support them with the ability to associate semantic properties. We also provide a set of model transformations to fit security requirements of a system. These transformations are detailed and validated with phosphate support system (SAGE) for the company FERPHOS: a case study described in SMSA. The model is tested and validated with the semantic constraints defined by the profile using Eclipse 3.1 plug-in in this case study.</p></div>","PeriodicalId":100792,"journal":{"name":"Journal of Innovation in Digital Ecosystems","volume":"2 1","pages":"Pages 55-70"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jides.2015.12.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115964039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信