2015 5th World Congress on Information and Communication Technologies (WICT)最新文献

筛选
英文 中文
A regulation model of urban traffic congestion: Algorithm and implementation 城市交通拥堵调控模型:算法与实现
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489649
Abdallah Lakhouili, E. Essoufi, H. Medromi
{"title":"A regulation model of urban traffic congestion: Algorithm and implementation","authors":"Abdallah Lakhouili, E. Essoufi, H. Medromi","doi":"10.1109/WICT.2015.7489649","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489649","url":null,"abstract":"This study aims at calculating, the road urban traffic congestion using a suggested adapted CRONOS model. For the model simulation we propose adapted algorithm. We compare our adaptive system results to others given by urban traffic systems based on fixed pattern lights. The system is designed to make equilibrium between the length queue and the states of lights to search optimal strategy guarantying the fluidity of traffic and minimizing the total delay. The proposed real-time urban traffic control model was implemented on a simple intersection presenting two roads. We have chosen a simple intersection to validate our method which will be applied afterwards on a complicated intersection. We have used traffic evaluation criteria to test the accuracy of the model. The results show benefits of the suggested model on the total delay compared to that of the fixed pattern lights system. All traffic situations, whether they are peak or low are concerned by these results.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115115619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A quantification model of internal control impact on banking risks using FMECA 内部控制对银行风险影响的FMECA量化模型
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489642
M. Ndaw, S. Ouya, G. Mendy
{"title":"A quantification model of internal control impact on banking risks using FMECA","authors":"M. Ndaw, S. Ouya, G. Mendy","doi":"10.1109/WICT.2015.7489642","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489642","url":null,"abstract":"In this paper, we propose an optimal assessment of internal control impact on banking risks by making automatic the residual risk estimation step of FMECA which is based on an inductive reasoning to study causes, effects of failures and their criticality. For this we defined three equations based on maturity and type of controls then we have obtain a mathematical model which is applied on 333 risks and 491 controls. This model is a new approach which reduce time for obtaining residuals risks likelihood and severity and decrease estimation error rate of residual criticality by harmonizing the evaluation method. Test results are satisfactory for all banking processes and types of risk.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128101665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A comparative study of four metaheuristics applied for solving the flow-shop scheduling problem 四种元启发式方法在求解流水车间调度问题中的比较研究
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489661
A. Bouzidi, M. Riffi, M. Barkatou
{"title":"A comparative study of four metaheuristics applied for solving the flow-shop scheduling problem","authors":"A. Bouzidi, M. Riffi, M. Barkatou","doi":"10.1109/WICT.2015.7489661","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489661","url":null,"abstract":"The Flow shop-scheduling problem is NP-hard combinatorial optimization problem, thus, it requires using the computational intelligence to solve it. This paper describes an experimental comparison study of four metaheuristics which are the hybrid genetic algorithm, particle swarm optimization (by and without using local search), and the cat swarm optimization algorithm, in order to analyze their performance in term of solution. The four algorithms has been applied to some benchmark Flow shop problems. The results show that the Cat swarm optimization algorithm is more efficient than other methods to solve the flow shop-scheduling problem.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131550686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiagent based model for urban traffic congestion measuring 基于多智能体的城市交通拥堵测量模型
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489647
Abdallah Lakhouili, E. Essoufi, H. Medromi
{"title":"Multiagent based model for urban traffic congestion measuring","authors":"Abdallah Lakhouili, E. Essoufi, H. Medromi","doi":"10.1109/WICT.2015.7489647","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489647","url":null,"abstract":"In order to measure the urban traffic congestion, a multiagent system that consists of several locally operating agents each achieving a specific task is proposed. The traffic light patterns are calculated by considering different constraints so as to minimize an evaluation criterion. The proposed system aims at managing the gradual congestion of the traffic. As one section of the intersection becomes more congested, the duration of the green traffic lights of the other sections are reduced by the specific agent while the global state of the traffic in the intersection is observed by the other agent. Functionality of the proposed system is examined using initial random data that will be improved by the system.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Toward resilience management in critical information infrastructure 关键信息基础设施的弹性管理
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489653
Yaou Hamida, Baina Amine, Bellafkih Mostafa
{"title":"Toward resilience management in critical information infrastructure","authors":"Yaou Hamida, Baina Amine, Bellafkih Mostafa","doi":"10.1109/WICT.2015.7489653","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489653","url":null,"abstract":"In the information age, critical infrastructure have become largely computerized and interconnected throughout the world, and their scope has grown more and more. Indeed, a failure in one critical infrastructure could lead to serious consequences on national security, economic well-being, public health, safety, or any combination thereof, producing then cascading effects because of their synergies. Consequently, the reliability, performance, continuous operation, safety, and protection of these so-called critical infrastructures is essential toward society and its economy. Nevertheless, the protection of critical infrastructure is a classical method that opens the question on the situation of these infrastructures in case of failure. In response to this, several studies necessitate a further strengthening in terms of resilience of these infrastructures. The items explored in this paper discuss different aspects related to resilience that gives the foundation of resilience strategy. We present in one hand the state of the art regarding resilience view in Critical Infrastructures and gives a systematic approach that can be applied on it, introducing then the applicability of resilience policy on these infrastructures.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115881850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Interdependencies modeling for the purpose of critical infrastructures protection 用于关键基础设施保护的相互依赖关系建模
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489651
Lamiae Chtioui, A. Baina, M. Bellafkih
{"title":"Interdependencies modeling for the purpose of critical infrastructures protection","authors":"Lamiae Chtioui, A. Baina, M. Bellafkih","doi":"10.1109/WICT.2015.7489651","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489651","url":null,"abstract":"Critical Infrastructures are the systems that ensure the ease of use of crucial goods and services which are vital for the well-being of a society and the prosperity of an economy. However, the protection of these infrastructures is a difficult challenge, and must include many factors such as risks, resilience, control access, and interdependency. This paper focuses on Critical Infrastructures interdependencies. Thus networks are becoming tightly interdependent, especially for communication and computing systems that are firmly coupled with other networks, because of their current growing use and necessity for all sectors. Our objective is to study interdependencies in order to reduce their impacts and establish an effective procedure to prepare for future risks. This paper presents an overview on some modeling approaches and models used to analyze critical infrastructures interdependencies. Then it explains the idea of our future work that consists of conceiving application software to notify all nodes of interdependent networks of a failure emerging in a critical node, basing on the Implicative Interdependency Model.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115280726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forming the multi-modal situation context in ambient intelligence systems on the basis of self-organizing cognitive architectures 在自组织认知架构的基础上形成环境智能系统中的多模态情境
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489658
P. Ivanov, Z. Nagoev, I. Pshenokova, D. Tokmakova
{"title":"Forming the multi-modal situation context in ambient intelligence systems on the basis of self-organizing cognitive architectures","authors":"P. Ivanov, Z. Nagoev, I. Pshenokova, D. Tokmakova","doi":"10.1109/WICT.2015.7489658","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489658","url":null,"abstract":"The article provides a theoretical basis of multi-agent recursive cognitive architectures as a distributed intelligent system of decision-making and control of an ambient intelligence system. It is dealt with the formalization of such cognitive architectures based on recursive deterministic abstract automata. The work introduces a method of automatic contexts formation in systems of ambient security based on the formal representation of semantics. Attempts are made to model and visualize semantic primitives and contexts. Successful experiments on the multi-agent representation of the subset of natural language limited by the domain of ambient assisted living systems for elderly people were conducted.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128632637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using EBIOS for risk management in critical information infrastructure 使用EBIOS进行关键信息基础设施的风险管理
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489654
W. Abbass, A. Baina, M. Bellafkih
{"title":"Using EBIOS for risk management in critical information infrastructure","authors":"W. Abbass, A. Baina, M. Bellafkih","doi":"10.1109/WICT.2015.7489654","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489654","url":null,"abstract":"The business services of organizations depend widely on information systems. IT risks can harm these systems and thus affect the success of business goals. Therefore, the importance of security technologies in IT systems has received increased attention. These technologies require monetary investment. Risk management is used to justify this investment. Risk management is a strategic activity in the design of an organization: it is a systematic process of identifying, assessing and responding to events that may potentially affect business objectives. The objective of this paper is to address the challenges of protecting the business services of organizations. For this purpose, a concrete application will be detailed using EBIOS.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Actor network theory as a collaborative mode: The contribution of game theory in the interessement phase 作为协作模式的行动者网络理论:博弈理论在交互阶段的贡献
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489646
Mohammed Salim Benqatla, Chikhaoui Dikra, B. Bounabat
{"title":"Actor network theory as a collaborative mode: The contribution of game theory in the interessement phase","authors":"Mohammed Salim Benqatla, Chikhaoui Dikra, B. Bounabat","doi":"10.1109/WICT.2015.7489646","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489646","url":null,"abstract":"Global Governance of projects requires cooperation between several actors. In general, such cooperation is ensured by building network collaboration between entities who want to collaborate. In spite of the existence of a number of works interested in collaboration network, only few of them were focused on how to construct a network. In this paper, we address this topic through Actor Network Theory. In particular way, we analyze interessement phase of ANT from a cooperative game point of view. Indeed, it's about negotiations between actors involved in business project. Our objective is to propose an approach of network establishment, by inciting actors through cost savings. For that, we use Shapley Value to answer the question: Which coalitions are likely to form in order to ensure best cost-saving objectives in ANT mode of collaboration? We propose also a graphical tool for visualizing networks and simulating their evolution.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fairness and differentiation of services in wireless mesh network 无线网状网络中业务的公平性与差异化
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489645
S. Jounaidi, B. Nassereddine, Y. Saadi, A. Haqiq
{"title":"Fairness and differentiation of services in wireless mesh network","authors":"S. Jounaidi, B. Nassereddine, Y. Saadi, A. Haqiq","doi":"10.1109/WICT.2015.7489645","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489645","url":null,"abstract":"The complex data transfer applications, such as the telephony, video on demand and multimedia conferencing, have become a fundamental requirement. The aim of these applications is to accelerate the information transfer as audio and image packets flows format, comparing to other data formats. The architecture of services' differentiation was suggested as a simple solution to provide different quality services for the different types of packets. Hence, the quality service's (QoS) goal is to ensurea regular transfer rate of packets with a high priority, on one hand, and a preservation of packets that can produce an information distortion on the other hand. In this work, we put forward a protocol that guarantees, firstly, a differentiation of service for the different type of flows, and then, a fair sharing of the bandwidth. This protocol will work in collaboration with the token bucket mechanism.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信