J. Ubiquitous Syst. Pervasive Networks最新文献

筛选
英文 中文
The Multi-Agent System Solutions for Big Multi-sensor Data Management 大型多传感器数据管理的多智能体系统解决方案
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2019-06-10 DOI: 10.5383/JUSPN.11.02.004
Zakarya Elaggoune, R. Maamri, I. Boussebough
{"title":"The Multi-Agent System Solutions for Big Multi-sensor Data Management","authors":"Zakarya Elaggoune, R. Maamri, I. Boussebough","doi":"10.5383/JUSPN.11.02.004","DOIUrl":"https://doi.org/10.5383/JUSPN.11.02.004","url":null,"abstract":"This research realizes the multi-agent community to handle the rinsing challenges in smart cities by the combined use of multi-fuzzy-agent systems for extracting relevant data from big noisy data, and the multi-agent systems-of-systems for adaptive big data processing. A multi-agent-based large wireless sensor network is used to show the approach used by the multi-fuzzy-agent systems, it exploits sensors as autonomous fuzzy agents that measure the relevance of the collected data and eliminate irrelevant ones. The aim of the multi-agent systems-of-systems is to handle the super velocity of big data flood in an adaptive way, which break down the rigidity of current big data systems that are forced to restart the data analysis process periodically to integrate the newly generated data into the analytical cycle.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Practical Defense-in-depth Solution for Microservice Systems 微服务系统的实用纵深防御解决方案
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2019-05-01 DOI: 10.5383/JUSPN.11.01.003
Kai Jander, L. Braubach, A. Pokahr
{"title":"Practical Defense-in-depth Solution for Microservice Systems","authors":"Kai Jander, L. Braubach, A. Pokahr","doi":"10.5383/JUSPN.11.01.003","DOIUrl":"https://doi.org/10.5383/JUSPN.11.01.003","url":null,"abstract":"Microservices are a widely deployed pattern for implementing large-scale distributed systems. However, in order to harden the overall system and when crossing datacenter boundaries, the authenticity and confidentiality of microservice calls have to be secured even for internal calls. In practice, however, in many cases no internal security mechanisms are employed mainly due to the increased complexity on backend side. This complexity arises as result of standard security mechanisms like TLS requiring secrets for each involved microservice. Building on previous work [19], in this paper we present a novel communication architecture based on roles that on the one hand guarantees a high level of security and on the other hand remains easy to manage. The approach provides encryption, forward secrecy and protection against replay attacks even for out-of-order communication.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114141403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
N Hop a Kind Resource Assignment Method for Optical WDM Networks N跳一种WDM光网络的资源分配方法
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2019-05-01 DOI: 10.5383/JUSPN.11.01.004
Yashar Fazili, B. Robertson, W. Phillips
{"title":"N Hop a Kind Resource Assignment Method for Optical WDM Networks","authors":"Yashar Fazili, B. Robertson, W. Phillips","doi":"10.5383/JUSPN.11.01.004","DOIUrl":"https://doi.org/10.5383/JUSPN.11.01.004","url":null,"abstract":"This paper introduces a new resource allocation mechanism for Wavelength Division Multiplexing (WDM) networks. The simple yet effective method introduced in this paper assigns the resources of a dynamically calculated route without needing an optimization solver. By minimizing the number of Lambda conversions at each node using this method, up to 8% more success rate can be achieved compared to assigning the resources using First Fit (FF) with continuity constraint. This method also results in up to 35% less energy usage compared to assigning the resources using First Fit without continuity constraint. The name of N Hop A Kind is after a winning combination of the game of Poker in which a hand with “n of a kind” wins.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Home Automation using EMOTIV: Controlling TV by Brainwaves 使用EMOTIV的家庭自动化:通过脑电波控制电视
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2018-03-07 DOI: 10.5383/JUSPN.10.01.004
M. Zaki, Ali Alquraini, T. Sheltami
{"title":"Home Automation using EMOTIV: Controlling TV by Brainwaves","authors":"M. Zaki, Ali Alquraini, T. Sheltami","doi":"10.5383/JUSPN.10.01.004","DOIUrl":"https://doi.org/10.5383/JUSPN.10.01.004","url":null,"abstract":"In this paper, our goal is to prove the possibility of controlling a home device by solely using neural pattern recognition interface captured by Emotiv EPOC. The neuroheadset EPOC is a personal interface for human interaction with computer through the acquisition of electrical signals produced by the brain, via techniques of electroencephalography (EEG), in order to identify thoughts, feelings and facial expressions in real time. The pattern is then fed to a client, which communicates it to the server side where it is received by a Raspberry Pi microcontroller. The microcontroller sends the appropriate response based on what is received from the client, which turns on or off a TV. This application will have a great potential especially for people with Amyotrophic Lateral Sclerosis (ALS) or special needs in general.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Architectural Model for Fog Computing 雾计算的体系结构模型
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2018-03-07 DOI: 10.5383/juspn.10.01.003
Jabril Abdelaziz, Mehdi Adda, H. Mcheick
{"title":"An Architectural Model for Fog Computing","authors":"Jabril Abdelaziz, Mehdi Adda, H. Mcheick","doi":"10.5383/juspn.10.01.003","DOIUrl":"https://doi.org/10.5383/juspn.10.01.003","url":null,"abstract":"The adoption of the Internet of Things raises many challenges. A variety of its applications require widespread distribution and high mobility support. In addition to low latency and real time services. To meet these challenges, the Fog Computing is arguably a suitable solution to leverage the Internet of Things with such requirements. Indeed, we believe that the nearness of Fog nodes to the edge of the network provides an environment for critical preemptive and proactive applications and services (e.g., predicting natural disasters). Thus, this paper proposes an architectural model for Fog Computing. First, it presents a middleware to abstract the underlying devices and to unify the sensed data. Second, it describes an Operational Layer intended for service presentation, management and transformation. An environment embracing such model will provide means for early data analysis, hence low latency and real time responses. In addition, to providing an ecosystem for direct collaboration between services leading to more sophisticated applications. A flood warning system exemplifies a use case scenario to illustrate the potential adaption and application of the presented model.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132683612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Agent-based Modeling of Social Behavioral Challenges in Transportation 基于agent的交通社会行为挑战模型
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2018-03-07 DOI: 10.5383/juspn.10.01.005
Samar El-Amine, S. Galland, Abderraffiaa Koukam
{"title":"Agent-based Modeling of Social Behavioral Challenges in Transportation","authors":"Samar El-Amine, S. Galland, Abderraffiaa Koukam","doi":"10.5383/juspn.10.01.005","DOIUrl":"https://doi.org/10.5383/juspn.10.01.005","url":null,"abstract":"Agent-Based modeling has been around us for reasonably some time now and has thus developed a vital factor for performing prediction-based scheduling, such as the transportation models for municipal cities. This paper assumes the important understanding of the agent-based modelling and imitation and its application to the transportation models while deliberating the possibility of its applications and advantages too. The paper then presents the ideas recognised to the social behaviours in combination with the agent-based modelling procedures useful so far. The literature review showed in lieu of this work has caused in agreement with the fact that the applicability of agent-based modelling is by far superior than ever due to the ever-improving computing speeds and abilities, while the understanding of complex human behaviour will endure to be a challenge for imitations and mechanisation methods developed so far.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanism for Privacy Management Based on Data History (UbiPri-His) 基于数据历史的隐私管理机制(UbiPri-His)
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2018-03-07 DOI: 10.5383/JUSPN.10.01.002
V. Leithardt, L. H. A. Correia, Guilherme A. Borges, A. Rossetto, C. O. Rolim, C. Geyer, J. Silva
{"title":"Mechanism for Privacy Management Based on Data History (UbiPri-His)","authors":"V. Leithardt, L. H. A. Correia, Guilherme A. Borges, A. Rossetto, C. O. Rolim, C. Geyer, J. Silva","doi":"10.5383/JUSPN.10.01.002","DOIUrl":"https://doi.org/10.5383/JUSPN.10.01.002","url":null,"abstract":"Privacy control and management in ubiquitous environments is not a trivial task. Especially in heterogeneous environments with different criteria and parameters related to communication, devices, users, and features of the environment itself. This work presents a study related to the algorithms that best fit the criteria, parameter, and information for the treatment of data privacy based on the user's history in the ubiquitous environment. For this, a prototype adapted to the UbiPri middleware was developed with the necessary characteristics for the historical control called UbiPri-His. They were tested, identified and identified for the mechanism for the management of data privacy related to the user's usage history, according to the environment and its location. An implementation carried out in a taxonomy, in the UbiPri middleware, and as a solution for comparison and definition of the algorithm with the best performance for the historical data file.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131766119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Software Quality Assessment Algorithm Based on Fuzzy Logic 基于模糊逻辑的软件质量评价算法
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2017-11-01 DOI: 10.5383/JUSPN.08.01.001
M. Kara, Olfa Lamouchi, A. Ramdane-Cherif
{"title":"Software Quality Assessment Algorithm Based on Fuzzy Logic","authors":"M. Kara, Olfa Lamouchi, A. Ramdane-Cherif","doi":"10.5383/JUSPN.08.01.001","DOIUrl":"https://doi.org/10.5383/JUSPN.08.01.001","url":null,"abstract":"In this paper an attempt has been made to provide a new global evaluation approach of a specified software quality model extracted from a generic software quality model using an instantiation procedure. The evaluation is based on data extracted from an ambient distributed system composed of fusion and fission agents connected to input/output services. These data are linked to the appropriate metrics of our software quality model and we use quality factors stated in ISO standards and different models of researchers represented under an ontology. We use equivalent relations to link criteria that have the same meaning and fuzzy logic approach to evaluate the entire software quality model. Our work presents the following contributions: (i) creating a generic software quality model based on several existing software quality standards and formalized under ontology concepts (ii) proposing an instantiation algorithm to extract specified software quality model from a generic software quality models (iii) proposing a new global evaluation approach of the specified software quality model using two processes, the first one executes metrics related to sensors data and the second one uses the result of the first process using fuzzy logic approach evaluating the entire specified software quality model and end up with a final numerical result (iv) adding the variability of metric variables algorithm to determine the impact of a possible variation of one criterion on others and avoid their penalization. This can help to conduct a trade-off-analysis in the proposed quality evaluation approach.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Model Transformation from Computing Independent Model to Platform Independent Model in Model Driven Architecture 模型驱动体系结构中从计算无关模型到平台无关模型的模型转换
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2017-11-01 DOI: 10.5383/JUSPN.08.01.003
Yassine Rhazali, Youssef Hadi, A. Mouloudi
{"title":"A Model Transformation from Computing Independent Model to Platform Independent Model in Model Driven Architecture","authors":"Yassine Rhazali, Youssef Hadi, A. Mouloudi","doi":"10.5383/JUSPN.08.01.003","DOIUrl":"https://doi.org/10.5383/JUSPN.08.01.003","url":null,"abstract":"This paper presents a new methodology to master models transformation from CIM to PIM in accord with MDA approach. Our improved approach is founded on creation a good CIM level, through well-chosen rules, for facilitating models transformation to PIM level. However, we establish a rich PIM models via use case diagram, state diagram, class and package diagram. Next, we describe a set of transformation rules to ensure a semi-automatic transformation from CIM to PIM. Our method conform MDA approach by taking into consideration the business dimension in the CIM level, since, we present this level by using activity diagram who is a standard of business process modeling. Nevertheless, we use UML into PIM in our proposal, because UML is recommended by MDA in this level","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122089803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ambient Technology in Vehicles: The Risks and Benefits 车辆环境技术:风险与收益
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2017-11-01 DOI: 10.5383/JUSPN.08.01.002
Ahmad Bennakhi, Maytham Safar
{"title":"Ambient Technology in Vehicles: The Risks and Benefits","authors":"Ahmad Bennakhi, Maytham Safar","doi":"10.5383/JUSPN.08.01.002","DOIUrl":"https://doi.org/10.5383/JUSPN.08.01.002","url":null,"abstract":"This paper is aimed towards studying, compiling, and analyzing the recent advances and risks of the current ambient technology that is present in modern day cars. The progression of sophisticated technologies inside cars make them an even more comfortable and entertaining place to be in especially during commutes to work, but recent security threats and distractions have been uncovered with the upsurge usage of new technologies. The future of car’s interfaces is an issue since driverless cars are taking the scene by storm. This study also includes a survey that senses the people’s use of car technologies when driving.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125522508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信