2015 12th International Symposium on Programming and Systems (ISPS)最新文献

筛选
英文 中文
An approach to verify SysML functional requirements using Promela/SPIN 一种使用Promela/SPIN验证SysML功能需求的方法
2015 12th International Symposium on Programming and Systems (ISPS) Pub Date : 2015-04-28 DOI: 10.1109/ISPS.2015.7245003
A. Abdulhameed, A. Hammad, H. Mountassir, Bruno Tatibouet
{"title":"An approach to verify SysML functional requirements using Promela/SPIN","authors":"A. Abdulhameed, A. Hammad, H. Mountassir, Bruno Tatibouet","doi":"10.1109/ISPS.2015.7245003","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7245003","url":null,"abstract":"Ensuring the correction of heterogeneous and complex systems is an essential stage in the process of engineering systems. In this paper, we propose an approach to verify and validate complex systems specified by SysML language. We translate SysML specifications into Promela models in order to validate the designed systems by model checking SPIN. The requirements properties are translated to Linear Temporal Logic (LTL) formulae and verified by Spin. A case study is presented to illustrate the effectiveness of our approach.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125926701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
XCLSC: Structure and content-based clustering of XML documents XML文档的基于结构和内容的聚类
2015 12th International Symposium on Programming and Systems (ISPS) Pub Date : 2015-04-28 DOI: 10.1109/ISPS.2015.7244989
Karima Bessine, A. Nehar, H. Cherroun, A. Moussaoui
{"title":"XCLSC: Structure and content-based clustering of XML documents","authors":"Karima Bessine, A. Nehar, H. Cherroun, A. Moussaoui","doi":"10.1109/ISPS.2015.7244989","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244989","url":null,"abstract":"This paper proposes a novel Clustering approach for XML documents that combines both their content and structure information using tree structural-content summaries in order to reduce the size of the document. This reduction has twofold purpose. First, it reduces the size of the XML tree by eliminating redundant nodes. Second, it gathers similaire content. The clustering is performed according to a similarity measure that takes into account the structure and the content between levels. Several experiments are performed to explore the effectiveness of using tree structural summaries and constrained content in the clustering process. Empirical analysis reveals that the designed clustering approach using content within structure and tree structural summaries gives a better solution for XML clustering while improving runtime. It is very suitable when we deal with big data sets.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards an open framework for inter-organizational workflow semantic annotation 面向组织间工作流语义标注的开放框架
2015 12th International Symposium on Programming and Systems (ISPS) Pub Date : 2015-04-28 DOI: 10.1109/ISPS.2015.7244968
Ali Abbassene, Z. Alimazighi, Moufida Aouachria
{"title":"Towards an open framework for inter-organizational workflow semantic annotation","authors":"Ali Abbassene, Z. Alimazighi, Moufida Aouachria","doi":"10.1109/ISPS.2015.7244968","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244968","url":null,"abstract":"In this paper, we propose a semantic and contextual workflow annotation framework for B2B integration. This annotation framework allows the detection of heterogeneities occurring between inter-organizational workflows and enables their correction through mediation services provided through a Cloud-based B2Bi (Business-to-Business integration) platform. This work describes also, the general architecture of the B2Bi platform, that offers mediation functionalities “as service” and takes charge of the B2B integration, from end to end, allowing collaborating partners to focus exclusively on business opportunities.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault detection in component-based models: Using BIP models 基于组件的模型中的故障检测:使用BIP模型
2015 12th International Symposium on Programming and Systems (ISPS) Pub Date : 2015-04-28 DOI: 10.1109/ISPS.2015.7245007
Smara Mounya, Aliouat Makhlouf, Aliouat Zibouda
{"title":"Fault detection in component-based models: Using BIP models","authors":"Smara Mounya, Aliouat Makhlouf, Aliouat Zibouda","doi":"10.1109/ISPS.2015.7245007","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7245007","url":null,"abstract":"In this paper, we will introduce our approach for fault detection in component-based models. We will defend that we can ensure safety property by Fail-Silent components. Fail-silent components are apt for fault detection using an Acceptance test. This later is a logical expression which can validate the component behavior correct or not. We will use BIP Framework for component based design, where the behavior design is based on transition system. In consequence, we can see that we can construct Fail-Silent models from basic BIP models. We will use Producer-FIFO-Consumer model to explain our approach.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"490 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123046022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parking access system based on face recognition 基于人脸识别的停车门禁系统
2015 12th International Symposium on Programming and Systems (ISPS) Pub Date : 2015-04-28 DOI: 10.1109/ISPS.2015.7244982
Imène Taleb, Madani Ould Mammar
{"title":"Parking access system based on face recognition","authors":"Imène Taleb, Madani Ould Mammar","doi":"10.1109/ISPS.2015.7244982","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244982","url":null,"abstract":"The human face plays an important role in our social interaction, conveying people's identity. Using the human face as a key to security, biometric face recognition technology has received significant attention. Face recognition technology, is very popular and it is used more widely because it does not require any kind of physical contact between the users and the device. Camera scans the user face and match it to a database for verification. Furthermore, it is easy to install and does not require any expensive hardware. Facial recognition technology is used widely in a variety of security systems such as physical access control or computer user accounts. In this paper, we present an access control vehicle system to the park based on camera installed at theparking entry. First, we use the nonadaptive method to detect the moving object, and we propose an algorithm to detect and recognize the face of the driver who wants to enter to the parking and verify if he is allowed. We use Viola-Jones method for face detection and we propose a new technique based on PCA, and LDA algorithm for face recognition.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122845897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bat algorithm for fingerprint image enhancement 基于Bat算法的指纹图像增强
2015 12th International Symposium on Programming and Systems (ISPS) Pub Date : 2015-04-28 DOI: 10.1109/ISPS.2015.7244999
Amira Bouaziz, A. Draa, S. Chikhi
{"title":"Bat algorithm for fingerprint image enhancement","authors":"Amira Bouaziz, A. Draa, S. Chikhi","doi":"10.1109/ISPS.2015.7244999","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244999","url":null,"abstract":"Fingerprint biometric systems performance is affected by the quality of fingerprint images. To overtake the low quality fingerprint images as well as overmaster the traditional image enhancers, the paper proposes a Bat algorithm for gray scale fingerprint image contrast enhancement. The purpose is for the Bat algorithm to map the gray level distributions for contrast enhancement ends. To assess the approach, the enhancement process is evaluated on low quality images from the FVC 2000 and compared to one of the traditional related-work contrast-based enhancers. The results show that the proposed Bat algorithm has proven to qualitatively and numerically improve the fingerprint image quality through contrast manipulation on the general level of noise eradication and quality metrics in addition to ridge structure clarification and minutiae detection specificities.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130361970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
New algorithm of scheduling based on prioriry rules on machines to solve bi-criteria blocking job shop scheduling problem 基于优先级规则的机器调度新算法解决双标准阻塞作业车间调度问题
2015 12th International Symposium on Programming and Systems (ISPS) Pub Date : 2015-04-28 DOI: 10.1109/ISPS.2015.7244978
Moahmed Lakehal, Amar Aissani, Karima Bouibede
{"title":"New algorithm of scheduling based on prioriry rules on machines to solve bi-criteria blocking job shop scheduling problem","authors":"Moahmed Lakehal, Amar Aissani, Karima Bouibede","doi":"10.1109/ISPS.2015.7244978","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244978","url":null,"abstract":"In this paper we study the bi-criteria blocking job shop scheduling problem. The objective is to simultaneously minimize two criteria: the Makespan and the maximum lateness. The blocking occurs when the intermediate buffer for storing completed operations between machines does not exist. We have proposed two Metaheuristics so as to find a set of non-dominated solutions. The first one is the tabu search which consists in the minimization of one criterion while the second criterion is bounded, and the second one is the tabu search based on the minimization of a linear combination of criteria. To assure the assignment of operations to their machines, we propose a new method which is based on application of priority rules on machines. This work is tested on benchmark instances from job shop literature and the results are presented and discussed.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133450568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analytical evaluation of the impacts of Sybil attacks against RPL under mobility 机动条件下Sybil攻击对RPL影响的分析评价
2015 12th International Symposium on Programming and Systems (ISPS) Pub Date : 2015-04-28 DOI: 10.1109/ISPS.2015.7244960
Faiza Medjek, Djamel Tandjaoui, Mohammed Riyadh Abdmeziem, Nabil Djedjig
{"title":"Analytical evaluation of the impacts of Sybil attacks against RPL under mobility","authors":"Faiza Medjek, Djamel Tandjaoui, Mohammed Riyadh Abdmeziem, Nabil Djedjig","doi":"10.1109/ISPS.2015.7244960","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244960","url":null,"abstract":"The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standardized routing protocol for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT), However, this protocol is subject to several attacks that have been analyzed on static case. Nevertheless, IoT will likely present dynamic and mobile applications. In this paper, we introduce potential security threats on RPL, in particular Sybil attack when the Sybil nodes are mobile. In addition, we present an analytical analysis and a discussion on how network performances can be affected. Our analysis shows, under Sybil attack while nodes are mobile, that the performances of RPL are highly affected compared to the static case. In fact, we notice a decrease in the rate of packet delivery, and an increase in control messages overhead. As a result, energy consumption at constrained nodes increases. Our proposed attack demonstrate that a Sybil mobile node can easily disrupt RPL and overload the network with fake messages making it unavailable.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"104 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131433694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Ontology-based facilitation support tool for group decision making 基于本体的群体决策促进支持工具
2015 12th International Symposium on Programming and Systems (ISPS) Pub Date : 2015-04-28 DOI: 10.1109/ISPS.2015.7244979
Bakhta Nachet, Adla Abdelkader
{"title":"Ontology-based facilitation support tool for group decision making","authors":"Bakhta Nachet, Adla Abdelkader","doi":"10.1109/ISPS.2015.7244979","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244979","url":null,"abstract":"The need for Group Decision Making (GDM) techniques and support is greater than ever before. In the group decision making process, the alternatives amongst which a decision must be made can range from a few to a few thousand; the facilitator (or the decision makers) need(s) to narrow the possibilities down to a reasonable number, and categorize and classify alternatives. Even when this is not the case, facilitation support, such as ontology-based frameworks potentially offer these capabilities and can assist the decision-maker in presenting the alternatives in a form that facilitates the decision. In this research an ontology base approach is developed to facilitate organizing alternatives. The resulting alternatives organizing tool is based on two ontologies. These two ontologies are supplementary and each one ensures an aspect of the decision organizing. They have been built using the Web Ontology Language (OWL) which facilitates the sharing and integration of decision-making information between multiple decision makers.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient feature selection scheme based on genetic algorithm for ear biometrics authentication 基于遗传算法的高效耳部特征选择方案
2015 12th International Symposium on Programming and Systems (ISPS) Pub Date : 2015-04-28 DOI: 10.1109/ISPS.2015.7244991
Lamis Ghoualmi, A. Draa, S. Chikhi
{"title":"An efficient feature selection scheme based on genetic algorithm for ear biometrics authentication","authors":"Lamis Ghoualmi, A. Draa, S. Chikhi","doi":"10.1109/ISPS.2015.7244991","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244991","url":null,"abstract":"Human ear recognition is a new biometric technology which competes with other powerful biometrics modalities such as fingerprint, face and iris. Ear has small size, a uniform distribution color and does not need much collaboration from the user. Feature extraction is a crucial stage for biometric identification. However, the extracted features might contain redundant and irrelevant features which can lead to the problem of dimension and even to degradation of performances of biometric systems. In this paper, we present a new efficient feature selection scheme based on Genetic Algorithm for ear biometrics. The proposed approach has been tested on an ear biometrics database and compared with the full feature system, Principal Components Analysis (PCA) based approach and a combination of the proposed GA and PCA. Experimental results show that the proposed approach outperforms the full-feature based system in terms of accuracy, FRR and FAR.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"61 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133510808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信