{"title":"Emergent properties and requirements evolution in engineering systems and a roadmap","authors":"Jia-xiang Luo, A. Sahraoui, A. Hessami","doi":"10.1109/ICOCS.2015.7483236","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483236","url":null,"abstract":"Emergence and emergent properties have been a popular subject in systems of systems design. This work is an extension of Hinton's work on \"under-specification\". Even though emergence is a universal phenomenon that can hardly be modeled, there are still attempts to understand, propose solution what is known by non-desired emergent properties in industrial systems design. This paper focuses also on under specification and impact of requirement evolution. Some approaches even appear to be infeasible as in natural systems; however industrial systems are designed following various methods and techniques and the interface to user is often poorly specified and developed. In that respect, interfaces between systems and human are very hard to model as emergent behavior is hardly predicted and hence largely unknown. The paper attempts at characterising such properties and initiate the debate on a roadmap for such research to support case studies and applications.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maria Zrikem, Abdeslam Jakjoud, Amal Rochd, C. Baron
{"title":"Extending SysPEM's orchestration engine with decision support: Relaxing resources constraints","authors":"Maria Zrikem, Abdeslam Jakjoud, Amal Rochd, C. Baron","doi":"10.1109/ICOCS.2015.7483241","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483241","url":null,"abstract":"The ability to control engineering process execution is of vital importance for the success of an engineering project. Thus many studies have been focusing on capitalizing knowledge and practices of systems engineering processes. We proposed in a former work a complete solution (SysPEM: System Process Engineering Metamodel) to this problem starting from the engineering process models to process orchestration and execution control. One of the main components of this solution is a scheduling engine able to reach balance between time consumption and the respective interest of each resource. But, as we implemented our solution in the context of a real-life case study, we noticed its inability to provide high quality schedules when the available resources are severely reduced, this limitation is due to the fact that the scheduling engine is limited to using the available resources given as input as an absolute constraint. In this paper we will provide a solution to this problem through the proposition of additional resources in a cost optimization context. Our work is strongly linked to our former publications, conveniently cited in this paper, as the completion of the original solution and, as we shall see at the end of the paper, shall be considered in the context of the same case study in order to review execution results.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116744696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Iris recognition to secure medical images on the cloud","authors":"Heba M. Sabri, Nashaat Elkhameesy, H. Hefny","doi":"10.1109/ICOCS.2015.7483215","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483215","url":null,"abstract":"Sharing images via Internet is very important and widely used nowadays especially medical images. Medical Image Sharing is a term for the electronic exchange of medical images between hospitals, physicians and patients. Rather than using traditional media, such as a CD or DVD, and either shipping it out or having patients carry it with them, technology now allows sharing of these images using the internet. In this research paper, the proposed approach is to secure medical images stored in the cloud by using Iris recognition as a human biometrics to check identity of the user who has the authorization to access the medical images. Experiments using well know benchmark CASIA-Iris V4 data sets show that the obtained results is more efficient in protecting the data on the cloud compared to the approach presented in [24] by 20%.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117184790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward a generic access control model","authors":"Samira Haguouche, Zahi Jarir","doi":"10.1109/ICOCS.2015.7483257","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483257","url":null,"abstract":"Organizations in a collaborative environment expose their services to an external usage which requires more preoccupation with security issues. Access control is one of these required security concerns. Several access control models are defined in the literature and this multitude of models creates heterogeneity of access control systems between the collaborating organizations. And this is manifested in the policy definition languages as well as in the enforcement mechanisms. In this paper, we propose a generic model of access control that allows defining each authorization rule in an abstract manner (high level language). These abstract policies can be mapped into low level concrete policies written according to the model adopted by the organization. The abstraction of the access control will involve elements of access control systems that are: models, policies and mechanisms.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imane Dbibih, Imad Iala, D. Aboutajdine, O. Zytoune
{"title":"Service differentiation based medium access control protocol for real-time application","authors":"Imane Dbibih, Imad Iala, D. Aboutajdine, O. Zytoune","doi":"10.1109/ICOCS.2015.7483255","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483255","url":null,"abstract":"Today Wireless Sensor Networks are increasingly used for real-time applications, which leads to take up scientist focus as a promising technology in the field of embedded systems. The toughest challenge of these networks is the energy conservation. So, most of MAC protocols designed for WSNs, aim to reduce energy consumption, which affects negatively the latency, especially if these networks are deployed in emergency response applications. In this paper we present a strategy that respects energy constraint and, in the same time, aims to manage the medium access according to the priority of messages. Our results prove that our algorithm enhances the quality of service (QoS) in terms of prioritized message latency, as well in other performance criteria.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125000046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Basic concept for the selection of an appropriate “software failure prediction model”","authors":"Jamal Krini, J. Borcsok","doi":"10.1109/ICOCS.2015.7483233","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483233","url":null,"abstract":"Software is nowadays used in almost all systems. Therefore, the reliability of the software is a crucial aspect in safety engineering. Software errors can cause life-threatening situations. To counter this, software reliability models are used. Currently, there are a great number of software reliability models existing. The model that will be considered as the most appropriate is depending on the respective project. That is why it cannot always be decided in advance which model would be the most suitable. In this paper a method is presented that serves to show how the most appropriate model for a project can be selected.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123785583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rasha Refaie, A. Ahmed, Nermin Hamza, Mahmood Al-monem, H. Hefny
{"title":"A secure algorithm for executing queries over encrypted data","authors":"Rasha Refaie, A. Ahmed, Nermin Hamza, Mahmood Al-monem, H. Hefny","doi":"10.1109/ICOCS.2015.7483217","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483217","url":null,"abstract":"Outsourcing databases into cloud increases the need of data security. Executing queries over encrypted data preserves a certain degree of confidentiality. In this paper, we propose an efficient algorithm to run computations on data encrypted for different principals. The proposed algorithm allows users to run queries over encrypted columns directly without decrypting all records.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asmaa A. El-sayed, Mahmood A. Mahmood, N. Meguid, H. Hefny
{"title":"Handling autism imbalanced data using synthetic minority over-sampling technique (SMOTE)","authors":"Asmaa A. El-sayed, Mahmood A. Mahmood, N. Meguid, H. Hefny","doi":"10.1109/ICOCS.2015.7483267","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483267","url":null,"abstract":"The autism diagnostic interview-revised (ADI-R) is a semi-structured interview designed to assess the three core aspects of autism spectrum disorder (ASD). In this research a synthetic minority over-sampling technique (SMOT) was presented for handling autism imbalanced data to increase accuracy credibility. SMOT can potentially lead to over fitting on multiple copies of minority class examples. The autism data collected from National Research Center in Egypt (NRC). The experimental dataset applied on several machine learning algorithms and compared the accuracy before and after over-sampling techniques. The result show that over-sampling for imbalanced data making accuracy realistic and non-deceptive and can be Reliable.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122232265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient method Of QRS complex extraction using a multilevel algorithm and an adaptive thresholding technique","authors":"W. Jenkal, R. Latif, A. Toumanari, O. El B'charri","doi":"10.1109/ICOCS.2015.7483281","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483281","url":null,"abstract":"This paper propose an efficient method of QRS extraction from the ECG signal using a Multilevel Algorithm and an Adaptive Thresholding Technique. This method start from the first QRS estimation region to the extraction of the R, Q, S waves through three majors steps namely the extraction of higher peaks, the QRS region detection and the Q, R and S waves detection. Results of this method are promising compared to recently published methods. Furthermore, the detection of P, T, and U waves will be used in future works, as well as the implementation of these research works on an embedded system for a real time ECG monitoring system.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"58 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116592037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Kandoussi, Z. Boulghasoul, A. Elbacha, A. Tajer
{"title":"Fuzzy sliding mode observer based sensorless Indirect FOC for IM drives","authors":"Z. Kandoussi, Z. Boulghasoul, A. Elbacha, A. Tajer","doi":"10.1109/ICOCS.2015.7483246","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483246","url":null,"abstract":"In recent decades, several Induction Motor drives techniques without speed sensor have been proposed. In this paper, an improved Sliding Mode observer for rotor fluxes and speed estimation from measured stator terminal voltages and currents is presented. It introduces a Fuzzy logic algorithm instead on the sign function in order to reduce the chattering caused by the classical Sliding Mode observer. The stability of this observer is proved by the Lyapunov's theorem and the feasibility of the proposed method is verified by simulation under Matlab /Simulink.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117034055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}