{"title":"Introduce Collaboration in Methodologies of Modeling and Simulation of Complex Systems","authors":"B. Gaudou, Hô Tuòng Vinh, N. Marilleau","doi":"10.1109/INCOS.2009.43","DOIUrl":"https://doi.org/10.1109/INCOS.2009.43","url":null,"abstract":"Modeling and simulation of Complex Systems are activities where collaboration between researchers with complementary points of view, skills and knowledge is well established and constitutes the usual working way rather than an exception. To manage difficulties of traditional modeling project (how to translate informal knowledge into an implemented software, which intermediate models are needed to be created ...), lot of methodologies have been proposed. But to be well adapted to the particular case of complex systems, they need to go further. In this paper, we thus aim at providing a complete methodology taking into account the collaborative aspect of the Complex Systems Modeling and Simulation task. We thus describe collaboration between various participants and propose a minimal set of tools necessary for a modeling platform.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125647919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly Detection in Emergency Call Data The First Step to the Intelligent Emergency Call System Management","authors":"P. Klement, V. Snás̃el","doi":"10.1109/INCOS.2009.35","DOIUrl":"https://doi.org/10.1109/INCOS.2009.35","url":null,"abstract":"A collaborative Emergency call taking information system in the Czech Republic processes calls on the European 112 emergency number. Amounts of various incident records are stored in its databases. The data can be used for mining spatial and temporal anomalies. When such an anomalous situation is detected so that the system could suffer from local or temporal performance decrease, either a human, or an automatic management module could take measures to reconfigure the system traffic and balance its load. In this paper we describe a method of knowledge discovery and visualization with respect to the emergency call taking information system database characteristics. The method is based on Kohonen Self Organizing Map (SOM) algorithm. Transformations of categorical attributes into numeric values are proposed to prepare training set appropriate for successful SOM generation.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134348879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Landslide Susceptibility Assessment with Machine Learning Algorithms","authors":"M. Marjanović, B. Bajat, M. Kovačević","doi":"10.1109/INCOS.2009.25","DOIUrl":"https://doi.org/10.1109/INCOS.2009.25","url":null,"abstract":"Case study addresses NW slopes of Fruška GoraMountain, Serbia. Landslide activity is quite notorious in this region, especially along the Danube’s right river bank, and recently intensified seismicity coupled with atmospheric precipitation might be critical for triggering new landslide occurrences. Hence, it is not a moment too soon for serious landslide susceptibility assessment in this region. State-of-the-art approaches had been taken into consideration, cutting down to the Support Vector Machine (SVM) and k-Nearest Neighbor (k-NN) algorithms, trained upon expert based model of landslide susceptibility (a multi-criteria analysis). The latter involved Analytical Hierarchy Process (AHP) for weighting influences of different input parameters. These included elevation, slope angle, aspect, distance from flows, vegetation cover, lithology, and rainfall, to represent the natural factors of the slope stability. Processed in a GIS environment (as discrete or float raster layers) trough AHP, those parameters yielded susceptibility pattern, classified by the entropy model into four classes. Subsequently the susceptibility pattern has been featured as training set in SVM and k-NN algorithms. Detailed fitting involved several cases, among which SVM with Gaussian kernel over geo-dataset (coordinates and input parameters) reached the highest accuracy (88%)outperforming other considered cases by far.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133844871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Improving Fairness Among Flows in Ad Hoc Networks","authors":"C. Takano, K. Ishida, M. Aida","doi":"10.1109/INCOS.2009.19","DOIUrl":"https://doi.org/10.1109/INCOS.2009.19","url":null,"abstract":"By development and the spread of a wireless technology,the mobile ad hoc network (Manet) that can be easily constructed only with mobile nodes is getting much attention.However, it is difficult to control the performance of the entire network appropriately, as a network consists of individual communication nodes operating autonomously and there is no device that controls the entire network. Recently, a large amount of research have investigated the performance of TCP in Manet,and noted the problem of leading to a larger degree of unfairness.We have proposed diffusion-type flow control (DFC) as a solution for the extremely time-sensitive flow control required for high-speed“wired” networks. In this paper, we apply the approach of DFC to Manet, in which the exchange of information across the entire network is limited, and show a wireless traffic control scheme improving the fairness among TCP flows.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129253717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized Utility Maximization for Adaptive Management of Shared Resource Pools","authors":"E. Loureiro, P. Nixon, S. Dobson","doi":"10.1109/INCOS.2009.65","DOIUrl":"https://doi.org/10.1109/INCOS.2009.65","url":null,"abstract":"Resource pools are collections of computational resources which can be shared by different applications. The goal with that is to accommodate the workload of each application, by splitting the total amount of resources in the pool among them. In this sense, utility functions have been pointed as the main tool for enabling self-optimizing behaviour in such pools. The goal with that is to allow resources from the pool to be split among applications, in a way that the best outcome is obtained. Whereas different solutions in this context exist, it has been found that none of them tackles the problem we deal with in a total decentralized way. In this paper, we then present a decentralized utility maximization approach for adaptive and optimal management of shared resource pools.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130465825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bogdan Ghit, Octavian Voicu, Florin Pop, V. Cristea
{"title":"Distributed Agent Platform with Intrusion Detection Capabilities","authors":"Bogdan Ghit, Octavian Voicu, Florin Pop, V. Cristea","doi":"10.1109/INCOS.2009.72","DOIUrl":"https://doi.org/10.1109/INCOS.2009.72","url":null,"abstract":"This paper’s goal is to design an intrusion detection system for a distributed environment adapted for developing and monitoring agents. The idea is to endow the agent platform with a high level of immunity by integrating the intrusion detection system based on artificial intelligence techniques. The agent platform itself is improved with advanced mechanisms for monitoring, analyzing, discovering, learning, and detecting intruders. The most important aspect of this platform is represented by its capability of detecting and rejecting possible intruders. The paper discusses in a critical way the traditional views of intrusion detection and analyzes the more complex approach to human immune system. The proposed architecture is a layered one and the paper describes the role and capability of each layer. The novelty of this approach is proved by the monitoring agents’ activities regarding services and actions which are translated in terms of system’s resources: processor, memory and bandwidth. The monitoring process is the key of the intrusion detection mechanism.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114470132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Group Intelligence: A Distributed Cognition Perspective","authors":"Osama Mansour","doi":"10.1109/INCOS.2009.59","DOIUrl":"https://doi.org/10.1109/INCOS.2009.59","url":null,"abstract":"The question of whether intelligence can be attributed to groups or not has been raised in many scientific disciplines. In the field of computer-supported collaborative learning, this question has been examined to understand how computer-mediated environments can augment human cognition and learning on a group level. The era of social computing which represents the emergence of Web 2.0 collaborative technologies and social media has stimulated a wide discussion about collective intelligence and the global brain. This paper reviews the theory of distributed cognition in the light of these concepts in an attempt to analyze and understand the emergence process of intelligence that takes place in the context of computer-mediated collaborative and social media environments. It concludes by showing that the cognitive organization, which occurs within social interactions serves as a catalyst for intelligence to emerge on a group level. Also a process model has been developed to show the process of collaborative knowledge construction in Wikipedia that characterizes such cognitive organization.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123848903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex Routing for Temporary Information Sharing in Wireless Mesh Networks","authors":"Takeshi Koga, K. Ohnishi, K. Tsukamoto, Y. Oie","doi":"10.1109/INCOS.2009.49","DOIUrl":"https://doi.org/10.1109/INCOS.2009.49","url":null,"abstract":"This paper presents Complex Routing for temporary information sharing in a wireless mesh network built in a geographically limited area. The Complex Routing determines a route from a sender to a receiver based on operations of complex numbers held by each node. In addition, it provides an adaptation mechanism for changing the complex numbers. The temporary information sharing means that in a situation that senders and receivers freely appear in the network, information forwarding from a sender to a receiver is conducted using freely assigned identifiers of information. In simulations, we consider several basic spatial patterns for appearance of senders and receivers, and examine if the Complex Routing can provide reliable information forwarding capability. Simulation results show that the Complex Routing is better than or equal to a random walk for comparison.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125271101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Adaptation Patterns with IMS-LD Specification: A Case Study as a Proof of Concept Implementation","authors":"Ioannis Magnisalis, S. Demetriadis","doi":"10.1109/INCOS.2009.50","DOIUrl":"https://doi.org/10.1109/INCOS.2009.50","url":null,"abstract":"In this paper we present a design case study exemplifying the implementation of the core specification of an Adaptation Pattern (Input, Rules, Model and Output) on the basis of using tools compliant to the IMS-LD modeling language. Research on collaborative learning has emphasized the need for providing flexible yet supportive tools to teachers in order to design collaborative learning tasks. In our work we present a next step in our pattern-based approach demonstrating how educators’ ideas can provide the basis for adaptation patterns which, in turn, can be implemented using IMS-LD. We analyze what is necessary for implementing an adaptation pattern and discuss the benefits of the pattern-based approach. Finally, we highlight what would be important issues toward integrating the adaptation pattern capabilities in LD compliant tools for collaborative learning design.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"462 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120956292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Possibilities of Open Source Software in Developing Local Small Business","authors":"Albert Pastrana, Enric Serradell López","doi":"10.1109/INCOS.2009.70","DOIUrl":"https://doi.org/10.1109/INCOS.2009.70","url":null,"abstract":"The emergence of open source software in the last years has become a common topic of study in different fields, from the most technical characteristics to the economical aspects. This paper examines the current status about the literature dealing with economics of open source and finds that there is a need to research the effects of this technology on the microentrerprises and small businesses.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115492540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}