Shigenari Nakamura, Dilawaer Duolikun, T. Enokido, M. Takizawa
{"title":"A write abortion-based protocol in role-based access control systems","authors":"Shigenari Nakamura, Dilawaer Duolikun, T. Enokido, M. Takizawa","doi":"10.1504/ijais.2015.072139","DOIUrl":"https://doi.org/10.1504/ijais.2015.072139","url":null,"abstract":"In information systems, data in an object may illegally flow into another object if transactions manipulate the objects. In our previous studies, the read-abortion-based role-based synchronisation (RA-RBS) and object-based synchronisation (RA-OBS) protocols are discussed to prevent illegal information flow in the role-based access control (RBAC) model. Illegal read operations mean read operations which might imply illegal information flow. Here, transactions which issue illegal read operations are aborted. In this paper, we consider a unique object whose data is not allowed to flow to another object. An illegal write is defined to be a write operation which a transaction issues after reading a unique object or illegally reading an object. Each transaction reads objects but is aborted if the transaction illegally writes an object. Two types of write-abortion (WA)-based synchronisation protocols WA-RBS and WA-OBS are discussed based on abortions of transactions issuing illegal write operations. In the evaluation, the number of transactions aborted can be more reduced in the WA protocols than the RA protocols.","PeriodicalId":383612,"journal":{"name":"International Journal of Adaptive and Innovative Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126329678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient matching of services with users in opportunistic network environments","authors":"Anthony Smith, Stuart Berry, Richard Hill","doi":"10.1504/IJAIS.2015.072144","DOIUrl":"https://doi.org/10.1504/IJAIS.2015.072144","url":null,"abstract":"Opportunistic networks are a specific type of wireless ad hoc network where there is an absence of a continuous end-to-end path. The proliferation of mobile devices with Wi-Fi capability creates opportunities to forward packets by utilising nodes as they present themselves. Such a dynamic networking environment enables services to be advertised by propagating from device to device, in order that all users in an area receive them. However, excessive propagation of service advertisements consumes energy from mobile devices, whilst also degrading the users' experience if they receive adverts for services that are misaligned with their personal interests. In this article, we propose an architecture for a protocol and an algorithm that facilitates the matching of relevant service adverts with interested recipients in an opportunistic networking environment, whilst serving to minimise energy consumption.","PeriodicalId":383612,"journal":{"name":"International Journal of Adaptive and Innovative Systems","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115443469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A machine learning system for automatic detection of preterm activity using artificial neural networks and uterine electromyography data","authors":"P. Fergus, A. Hussain, D. Al-Jumeily, H. Hamdan","doi":"10.1504/IJAIS.2015.072143","DOIUrl":"https://doi.org/10.1504/IJAIS.2015.072143","url":null,"abstract":"Preterm births are babies born before 37 weeks of gestation. The premature delivery of babies is a major global health issue with those affected at greater risk of developing short and long-term complications. Therefore, a better understanding of why preterm births occur is needed. Electromyography is used to capture electrical activity in the uterus to help treat and understand the condition, which is time consuming and expensive. This has led to a recent interest in automated detection of the electromyography correlates of preterm activity. This paper explores this idea further using artificial neural networks to classify term and preterm records, using an open dataset containing 300 records of uterine electromyography signals. Our approach shows an improvement on existing studies with 94.56% for sensitivity, 87.83% for specificity, and 94% for the area under the curve with 9% global error when using the multilayer perceptron neural network trained using the Levenberg-Marquardt algorithm.","PeriodicalId":383612,"journal":{"name":"International Journal of Adaptive and Innovative Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133590779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid clock group communication protocol","authors":"Dilawaer Duolikun, A. Aikebaier, M. Takizawa","doi":"10.1504/IJAIS.2014.061048","DOIUrl":"https://doi.org/10.1504/IJAIS.2014.061048","url":null,"abstract":"In distributed systems, a group of multiple processes are required to cooperate with each other. Here, each process is peer and directly exchanges messages with other processes without centralised coordination. Each process has to causally deliver messages in a scalable group. Messages can be causally delivered to every process in linear clock (LC) and vector (VC) protocols. Here, some pair of messages ordered in the LC protocol may not be causally related, i.e., unnecessarily ordered. In this paper, we discuss a hybrid clock (HC) protocol to causally deliver messages in a scalable group in order to reduce the number of unnecessarily ordered messages. The HC protocol takes advantage of the LC and physical clock (PC) protocols. We show unnecessarily ordered messages can be reduced in the HC protocol compared with the LC protocol through experimentation.","PeriodicalId":383612,"journal":{"name":"International Journal of Adaptive and Innovative Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123670969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced spray and wait DTN routing protocol based on node mobility and maximum number of replications","authors":"Kenta Henmi, A. Koyama","doi":"10.1504/IJAIS.2014.061045","DOIUrl":"https://doi.org/10.1504/IJAIS.2014.061045","url":null,"abstract":"Spray and wait protocol, which is a typical routing protocol in delay/disruption/disconnection tolerant network (DTN), sets a maximum number of replications per message for restricting a number of replications. However, it is difficult to set a maximum number of appropriate replications in advance. Moreover, there is possibility to replicate to nodes that do not contribute to the data arrival, because appropriate replicated nodes are not selected. In this paper, we propose a routing method to dynamically set the maximum number of appropriate replications depending on network states and to select appropriate relay nodes. We verified by simulation that the proposed method has high packet delivery rate compared with conventional methods.","PeriodicalId":383612,"journal":{"name":"International Journal of Adaptive and Innovative Systems","volume":"188 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114027192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthesis of k-th Order Fault-Tolerant Kinematically Redundant Manipulator Designs using Relative Kinematic Isotropy","authors":"Frank L. Hammond","doi":"10.1504/IJAIS.2014.060994","DOIUrl":"https://doi.org/10.1504/IJAIS.2014.060994","url":null,"abstract":"Fault tolerance has become an essential capability in manipulator design methodologies as robotic manipulation systems are more frequently employed in hazardous environments and on geometrically complex or heavy duty industrial operations, where mechanical joint failures are likely to occur. This work focuses on the development of a redundant manipulator design methodology aimed at minimising the degradation in manipulator performance quality that results from k arbitrary joint failures. The relative weighted global isotropy index (RWGII) is developed for use as a manipulator design fitness metric. This metric takes into account the primary manipulation goal of maintaining kinematic dexterity, the secondary goals of collision avoidance and torque minimisation, and fault tolerance capability. The genetic algorithm search of an immense manipulator design space, conducted using the new fault-tolerant manipulator design fitness metric, yields redundant manipulator designs that effectively minimise fault susceptibility due to k joint failures while maintaining dexterous, redundancy-resolved motion on specific tasks.","PeriodicalId":383612,"journal":{"name":"International Journal of Adaptive and Innovative Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122446048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noriki Uchida, Noritaka Kawamura, Goshi Sato, Y. Shibata
{"title":"Resilient network with cognitive wireless network based on DTN for disaster information system in rural areas","authors":"Noriki Uchida, Noritaka Kawamura, Goshi Sato, Y. Shibata","doi":"10.1504/IJAIS.2014.061044","DOIUrl":"https://doi.org/10.1504/IJAIS.2014.061044","url":null,"abstract":"Although two years have already passed after the East Japan Great Earthquake in 2011, outstanding topics such as having a resilient network for disasters still remain. The rural areas are considered more likely isolated from others because of limited transportation and network resources compared with the urban areas. In this paper, we introduce the resilient network with cognitive wireless network (CWN) based on delay tolerant networking (DTN) for disaster information system (DIS) in rural areas. In the system, a proper wireless link for each mobile is selected by comparing network parameters such as throughput, jitter, and latency, and transmits data sent by the DTN routing protocol including the Epidemic, Spray and Wait, MaxProp, and PROPHET. The simulation is held according to the GIS map, and the results are ready for discussion for future studies of DTN usages for DIS in rural areas.","PeriodicalId":383612,"journal":{"name":"International Journal of Adaptive and Innovative Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124059976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid method for user location anonymisation based on road mobility model","authors":"Kenta Miura, Fumiaki Sato","doi":"10.1504/IJAIS.2014.061046","DOIUrl":"https://doi.org/10.1504/IJAIS.2014.061046","url":null,"abstract":"Highly accurate positioning devices provide various types of location-based services (LBS). Since location information may reveal private information, preserving location privacy has become a significant issue in LBS. Many different techniques for securing location privacy have been proposed, for example, the concepts of silent period, dummy node, and cloaking region. However, much of this research has not solved the problem that the quality of service (QoS) of LBS decreases when anonymity is improved, and anonymity falls when QoS is improved. In this paper, we present a node density-based location anonymisation scheme that can provide location privacy by a hybrid method using the dummy node and the cloaking region. Especially, we propose a method to keep the anonymity without reducing the QoS of the LBS by setting the cloaking region based on the road mobility model. Simulations are conducted to evaluate our proposed method from the viewpoint of location error in LBS and the probability of tracking a target node. Simulation results show that the probability of tracking a target node by an adversary is reduced and the QoS of LBS is improved.","PeriodicalId":383612,"journal":{"name":"International Journal of Adaptive and Innovative Systems","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132030148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Free and forced modes responses of fractional operators based on non-identical RLC cells","authors":"R. A. Z. Daou, C. Francis, X. Moreau","doi":"10.1504/IJAIS.2010.034807","DOIUrl":"https://doi.org/10.1504/IJAIS.2010.034807","url":null,"abstract":"In this article, we study the behaviour of the RLC cells for the four configurations that we presented earlier in Abi Zeid Daou et al. (2009a). An electric circuit is used in order to study the fractional behaviour and the robustness of these RLC operators and compare their responses to the behaviour of the fractance which is an ideal fractional operator (Moreau et al., 2003). This analysis is conducted for both natural and forced responses. In more details, the initial conditions of the capacitors and inductances are neglected in the first case and they are taken into consideration in the second one. The number of initial conditions is related to the number of RLC cells used. The robustness of all arrangements is analysed by varying the unsteady parameter value which is represented by an inductance in the electrical circuit. This inductance represents a different variable parameter in each field of application. For example, in the hydropneumatic domain, this inductance refers to the mass of the vehicle as the mass has the main influence on the dynamics and the robustness when designing the active suspension (Moreau et al., 2001). A conclusion will sum up the results for all four arrangements and a confirmation that the phase constancy and the robustness are present in both modes.","PeriodicalId":383612,"journal":{"name":"International Journal of Adaptive and Innovative Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125165444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of HMM for evaluation of maintenance activities","authors":"P. Vrignat, M. Avila, F. Duculty, F. Kratz","doi":"10.1504/IJAIS.2010.034801","DOIUrl":"https://doi.org/10.1504/IJAIS.2010.034801","url":null,"abstract":"This paper deals with a tool which may help maintenance managers to schedule maintenance activities. To help them, we show that by using events which can be observed on a process, like maintenance events, we can predict failures before they occur. Principles are based on hypothesis that failure is preceded by a typical sequence of events. We also show that hidden Markov models can be used according to the right choice of parameters.","PeriodicalId":383612,"journal":{"name":"International Journal of Adaptive and Innovative Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115526425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}