2015 Third World Conference on Complex Systems (WCCS)最新文献

筛选
英文 中文
Emergent properties and requirements evolution in engineering systems and a roadmap 工程系统和路线图中的紧急特性和需求演变
2015 Third World Conference on Complex Systems (WCCS) Pub Date : 2015-11-23 DOI: 10.1109/ICOCS.2015.7483236
Jia-xiang Luo, A. Sahraoui, A. Hessami
{"title":"Emergent properties and requirements evolution in engineering systems and a roadmap","authors":"Jia-xiang Luo, A. Sahraoui, A. Hessami","doi":"10.1109/ICOCS.2015.7483236","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483236","url":null,"abstract":"Emergence and emergent properties have been a popular subject in systems of systems design. This work is an extension of Hinton's work on \"under-specification\". Even though emergence is a universal phenomenon that can hardly be modeled, there are still attempts to understand, propose solution what is known by non-desired emergent properties in industrial systems design. This paper focuses also on under specification and impact of requirement evolution. Some approaches even appear to be infeasible as in natural systems; however industrial systems are designed following various methods and techniques and the interface to user is often poorly specified and developed. In that respect, interfaces between systems and human are very hard to model as emergent behavior is hardly predicted and hence largely unknown. The paper attempts at characterising such properties and initiate the debate on a roadmap for such research to support case studies and applications.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Extending SysPEM's orchestration engine with decision support: Relaxing resources constraints 用决策支持扩展SysPEM的编排引擎:放松资源限制
2015 Third World Conference on Complex Systems (WCCS) Pub Date : 2015-11-23 DOI: 10.1109/ICOCS.2015.7483241
Maria Zrikem, Abdeslam Jakjoud, Amal Rochd, C. Baron
{"title":"Extending SysPEM's orchestration engine with decision support: Relaxing resources constraints","authors":"Maria Zrikem, Abdeslam Jakjoud, Amal Rochd, C. Baron","doi":"10.1109/ICOCS.2015.7483241","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483241","url":null,"abstract":"The ability to control engineering process execution is of vital importance for the success of an engineering project. Thus many studies have been focusing on capitalizing knowledge and practices of systems engineering processes. We proposed in a former work a complete solution (SysPEM: System Process Engineering Metamodel) to this problem starting from the engineering process models to process orchestration and execution control. One of the main components of this solution is a scheduling engine able to reach balance between time consumption and the respective interest of each resource. But, as we implemented our solution in the context of a real-life case study, we noticed its inability to provide high quality schedules when the available resources are severely reduced, this limitation is due to the fact that the scheduling engine is limited to using the available resources given as input as an absolute constraint. In this paper we will provide a solution to this problem through the proposition of additional resources in a cost optimization context. Our work is strongly linked to our former publications, conveniently cited in this paper, as the completion of the original solution and, as we shall see at the end of the paper, shall be considered in the context of the same case study in order to review execution results.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116744696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Iris recognition to secure medical images on the cloud 使用虹膜识别来保护云上的医学图像
2015 Third World Conference on Complex Systems (WCCS) Pub Date : 2015-11-01 DOI: 10.1109/ICOCS.2015.7483215
Heba M. Sabri, Nashaat Elkhameesy, H. Hefny
{"title":"Using Iris recognition to secure medical images on the cloud","authors":"Heba M. Sabri, Nashaat Elkhameesy, H. Hefny","doi":"10.1109/ICOCS.2015.7483215","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483215","url":null,"abstract":"Sharing images via Internet is very important and widely used nowadays especially medical images. Medical Image Sharing is a term for the electronic exchange of medical images between hospitals, physicians and patients. Rather than using traditional media, such as a CD or DVD, and either shipping it out or having patients carry it with them, technology now allows sharing of these images using the internet. In this research paper, the proposed approach is to secure medical images stored in the cloud by using Iris recognition as a human biometrics to check identity of the user who has the authorization to access the medical images. Experiments using well know benchmark CASIA-Iris V4 data sets show that the obtained results is more efficient in protecting the data on the cloud compared to the approach presented in [24] by 20%.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117184790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward a generic access control model 走向通用的访问控制模型
2015 Third World Conference on Complex Systems (WCCS) Pub Date : 2015-11-01 DOI: 10.1109/ICOCS.2015.7483257
Samira Haguouche, Zahi Jarir
{"title":"Toward a generic access control model","authors":"Samira Haguouche, Zahi Jarir","doi":"10.1109/ICOCS.2015.7483257","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483257","url":null,"abstract":"Organizations in a collaborative environment expose their services to an external usage which requires more preoccupation with security issues. Access control is one of these required security concerns. Several access control models are defined in the literature and this multitude of models creates heterogeneity of access control systems between the collaborating organizations. And this is manifested in the policy definition languages as well as in the enforcement mechanisms. In this paper, we propose a generic model of access control that allows defining each authorization rule in an abstract manner (high level language). These abstract policies can be mapped into low level concrete policies written according to the model adopted by the organization. The abstraction of the access control will involve elements of access control systems that are: models, policies and mechanisms.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Service differentiation based medium access control protocol for real-time application 实时应用中基于业务差异化的介质访问控制协议
2015 Third World Conference on Complex Systems (WCCS) Pub Date : 2015-11-01 DOI: 10.1109/ICOCS.2015.7483255
Imane Dbibih, Imad Iala, D. Aboutajdine, O. Zytoune
{"title":"Service differentiation based medium access control protocol for real-time application","authors":"Imane Dbibih, Imad Iala, D. Aboutajdine, O. Zytoune","doi":"10.1109/ICOCS.2015.7483255","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483255","url":null,"abstract":"Today Wireless Sensor Networks are increasingly used for real-time applications, which leads to take up scientist focus as a promising technology in the field of embedded systems. The toughest challenge of these networks is the energy conservation. So, most of MAC protocols designed for WSNs, aim to reduce energy consumption, which affects negatively the latency, especially if these networks are deployed in emergency response applications. In this paper we present a strategy that respects energy constraint and, in the same time, aims to manage the medium access according to the priority of messages. Our results prove that our algorithm enhances the quality of service (QoS) in terms of prioritized message latency, as well in other performance criteria.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125000046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Basic concept for the selection of an appropriate “software failure prediction model” 选择合适的“软件故障预测模型”的基本概念
2015 Third World Conference on Complex Systems (WCCS) Pub Date : 2015-11-01 DOI: 10.1109/ICOCS.2015.7483233
Jamal Krini, J. Borcsok
{"title":"Basic concept for the selection of an appropriate “software failure prediction model”","authors":"Jamal Krini, J. Borcsok","doi":"10.1109/ICOCS.2015.7483233","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483233","url":null,"abstract":"Software is nowadays used in almost all systems. Therefore, the reliability of the software is a crucial aspect in safety engineering. Software errors can cause life-threatening situations. To counter this, software reliability models are used. Currently, there are a great number of software reliability models existing. The model that will be considered as the most appropriate is depending on the respective project. That is why it cannot always be decided in advance which model would be the most suitable. In this paper a method is presented that serves to show how the most appropriate model for a project can be selected.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123785583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A secure algorithm for executing queries over encrypted data 对加密数据执行查询的安全算法
2015 Third World Conference on Complex Systems (WCCS) Pub Date : 2015-11-01 DOI: 10.1109/ICOCS.2015.7483217
Rasha Refaie, A. Ahmed, Nermin Hamza, Mahmood Al-monem, H. Hefny
{"title":"A secure algorithm for executing queries over encrypted data","authors":"Rasha Refaie, A. Ahmed, Nermin Hamza, Mahmood Al-monem, H. Hefny","doi":"10.1109/ICOCS.2015.7483217","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483217","url":null,"abstract":"Outsourcing databases into cloud increases the need of data security. Executing queries over encrypted data preserves a certain degree of confidentiality. In this paper, we propose an efficient algorithm to run computations on data encrypted for different principals. The proposed algorithm allows users to run queries over encrypted columns directly without decrypting all records.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Handling autism imbalanced data using synthetic minority over-sampling technique (SMOTE) 利用合成少数派过采样技术(SMOTE)处理自闭症不平衡数据
2015 Third World Conference on Complex Systems (WCCS) Pub Date : 2015-11-01 DOI: 10.1109/ICOCS.2015.7483267
Asmaa A. El-sayed, Mahmood A. Mahmood, N. Meguid, H. Hefny
{"title":"Handling autism imbalanced data using synthetic minority over-sampling technique (SMOTE)","authors":"Asmaa A. El-sayed, Mahmood A. Mahmood, N. Meguid, H. Hefny","doi":"10.1109/ICOCS.2015.7483267","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483267","url":null,"abstract":"The autism diagnostic interview-revised (ADI-R) is a semi-structured interview designed to assess the three core aspects of autism spectrum disorder (ASD). In this research a synthetic minority over-sampling technique (SMOT) was presented for handling autism imbalanced data to increase accuracy credibility. SMOT can potentially lead to over fitting on multiple copies of minority class examples. The autism data collected from National Research Center in Egypt (NRC). The experimental dataset applied on several machine learning algorithms and compared the accuracy before and after over-sampling techniques. The result show that over-sampling for imbalanced data making accuracy realistic and non-deceptive and can be Reliable.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122232265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Efficient method Of QRS complex extraction using a multilevel algorithm and an adaptive thresholding technique 基于多层算法和自适应阈值技术的高效QRS复合体提取方法
2015 Third World Conference on Complex Systems (WCCS) Pub Date : 2015-11-01 DOI: 10.1109/ICOCS.2015.7483281
W. Jenkal, R. Latif, A. Toumanari, O. El B'charri
{"title":"Efficient method Of QRS complex extraction using a multilevel algorithm and an adaptive thresholding technique","authors":"W. Jenkal, R. Latif, A. Toumanari, O. El B'charri","doi":"10.1109/ICOCS.2015.7483281","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483281","url":null,"abstract":"This paper propose an efficient method of QRS extraction from the ECG signal using a Multilevel Algorithm and an Adaptive Thresholding Technique. This method start from the first QRS estimation region to the extraction of the R, Q, S waves through three majors steps namely the extraction of higher peaks, the QRS region detection and the Q, R and S waves detection. Results of this method are promising compared to recently published methods. Furthermore, the detection of P, T, and U waves will be used in future works, as well as the implementation of these research works on an embedded system for a real time ECG monitoring system.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"58 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116592037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fuzzy sliding mode observer based sensorless Indirect FOC for IM drives 基于模糊滑模观测器的IM驱动无传感器间接FOC
2015 Third World Conference on Complex Systems (WCCS) Pub Date : 2015-11-01 DOI: 10.1109/ICOCS.2015.7483246
Z. Kandoussi, Z. Boulghasoul, A. Elbacha, A. Tajer
{"title":"Fuzzy sliding mode observer based sensorless Indirect FOC for IM drives","authors":"Z. Kandoussi, Z. Boulghasoul, A. Elbacha, A. Tajer","doi":"10.1109/ICOCS.2015.7483246","DOIUrl":"https://doi.org/10.1109/ICOCS.2015.7483246","url":null,"abstract":"In recent decades, several Induction Motor drives techniques without speed sensor have been proposed. In this paper, an improved Sliding Mode observer for rotor fluxes and speed estimation from measured stator terminal voltages and currents is presented. It introduces a Fuzzy logic algorithm instead on the sign function in order to reduce the chattering caused by the classical Sliding Mode observer. The stability of this observer is proved by the Lyapunov's theorem and the feasibility of the proposed method is verified by simulation under Matlab /Simulink.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117034055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信