Int. J. Softw. Sci. Comput. Intell.最新文献

筛选
英文 中文
Multi-Objective Adaptive Manta-Ray Foraging Optimization for Workflow Scheduling with Selected Virtual Machines Using Time-Series-Based Prediction 基于时间序列预测的选择虚拟机工作流调度多目标自适应蝠鲼觅食优化
Int. J. Softw. Sci. Comput. Intell. Pub Date : 2022-01-01 DOI: 10.4018/ijssci.312559
Sweta Singh, R. Kumar, U. P. Rao
{"title":"Multi-Objective Adaptive Manta-Ray Foraging Optimization for Workflow Scheduling with Selected Virtual Machines Using Time-Series-Based Prediction","authors":"Sweta Singh, R. Kumar, U. P. Rao","doi":"10.4018/ijssci.312559","DOIUrl":"https://doi.org/10.4018/ijssci.312559","url":null,"abstract":"Optimization problems are challenging, but the larger challenge is to deal with the energy issue of the cloud, with continuous dynamic load and fluctuating VM performance. The optimization technique aids in efficient task-resource mapping ensuring optimal resource utilization with minimum active hosts and energy consumption. Existing works focused on time-invariant and bounded VM performance with major concentration on minimizing the execution cost and time. A multi-objective adaptive manta-ray foraging optimization (MAMFO) has been proposed in the paper for efficient scheduling with optimum resource utilization and energy consumption. The paper contributes by considering the time-varying VM performance and performance prediction using a dynamic time-series based ARIMA model, filtering out the VMs with larger fluctuating possibility, and employing only the selected VMs to be scheduled using MAMFO to meet the optimization goal with minimum SLA violations. The experimental analysis improves the work efficiency (e.g., energy consumption attained to be 0.405 kWh, and 5.97% of SLA violations).","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132233103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GIS-Based Multi-Criteria Decision-Support System and Machine Learning for Hospital Site Selection: Case Study Oran, Algeria 基于gis的多标准决策支持系统和医院选址的机器学习:案例研究奥兰,阿尔及利亚
Int. J. Softw. Sci. Comput. Intell. Pub Date : 2022-01-01 DOI: 10.4018/ijssci.285592
Khadidja Benmoussa, D. Hamdadou, Zine El Abidine Roukh
{"title":"GIS-Based Multi-Criteria Decision-Support System and Machine Learning for Hospital Site Selection: Case Study Oran, Algeria","authors":"Khadidja Benmoussa, D. Hamdadou, Zine El Abidine Roukh","doi":"10.4018/ijssci.285592","DOIUrl":"https://doi.org/10.4018/ijssci.285592","url":null,"abstract":"The selection of hospital sites is one of the most important choice a decision maker has to take so as to resist the pandemic. The decision may considerably affect the outbreak transmission in terms of efficiency , budget, etc. The main targeted objective of this study is to find the ideal location where to set up a hospital in the willaya of Oran Alg. For this reason, we have used a geographic information system coupled to the multi-criteria analysis method AHP in order to evaluate diverse criteria of physiological positioning , environmental and economical. Another objective of this study is to evaluate the advanced techniques of the automatic learning . the method of the random forest (RF) for the patterning of the hospital site selection in the willaya of Oran. The result of our study may be useful to decision makers to know the suitability of the sites as it provides a high level of confidence and consequently accelerate the power to control the COVID19 pandemic.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"1040 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123140251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Systematic Review of Fingerprint Recognition System Development 指纹识别系统发展综述
Int. J. Softw. Sci. Comput. Intell. Pub Date : 2022-01-01 DOI: 10.4018/ijssci.300358
J. K. Appati, Prince Kofi Nartey, Winfred Yaokumah, J. Abdulai
{"title":"A Systematic Review of Fingerprint Recognition System Development","authors":"J. K. Appati, Prince Kofi Nartey, Winfred Yaokumah, J. Abdulai","doi":"10.4018/ijssci.300358","DOIUrl":"https://doi.org/10.4018/ijssci.300358","url":null,"abstract":"Biometric authentication is gaining ground in security-related issues in business, corporate management, and other settings. A considerable amount of research has been conducted in this area, yet further research into its betterment is still an emerging trend. This article presents a study of the published empirical research on some fingerprint recognition techniques widely in use. The study is limited to articles that explicitly discuss techniques used in recognizing a person's fingerprint. It employs a systematic mapping design, which proposes a categorical system to classify the research results based on the selected articles' topics. The categories include work distribution by year of publication, datasets used, fingerprint recognition approaches, metrics, and evaluation. This study shows the direction of currently performed empirical research on fingerprint recognition by comparing the selected published work to the classification criteria and evaluating them.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine-Learning-Based White-Hat Worm Launcher in Botnet Defense System 僵尸网络防御系统中基于机器学习的白帽蠕虫启动器
Int. J. Softw. Sci. Comput. Intell. Pub Date : 2022-01-01 DOI: 10.4018/ijssci.291713
Xiangnan Pan, S. Yamaguchi, Takumi Kageyama, Mohd Hafizuddin Bin Kamilin
{"title":"Machine-Learning-Based White-Hat Worm Launcher in Botnet Defense System","authors":"Xiangnan Pan, S. Yamaguchi, Takumi Kageyama, Mohd Hafizuddin Bin Kamilin","doi":"10.4018/ijssci.291713","DOIUrl":"https://doi.org/10.4018/ijssci.291713","url":null,"abstract":"This article proposes a white-hat worm launcher based on machine learning (ML) adaptable to large-scale IoT network for Botnet Defense System (BDS). BDS is a cyber-security system that uses white-hat worms to exterminate malicious botnets. White-hat worms defend an IoT system against malicious bots, the BDS decides the number of white-hat worms, but there is no discussion on the white-hat worms' deployment in IoT network. Therefore, the authors propose a machine-learning-based launcher to launch the white-hat worms effectively along with a divide and conquer algorithm to deploy the launcher to large-scale IoT networks. Then the authors modeled BDS and the launcher with agent-oriented Petri net and confirmed the effect through the simulation of the PN2 model. The result showed that the proposed launcher can reduce the number of infected devices by about 30-40%.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121044162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Model-Based Method for Optimisation of an Adaptive System 基于模型的自适应系统优化方法
Int. J. Softw. Sci. Comput. Intell. Pub Date : 2022-01-01 DOI: 10.4018/ijssci.301269
Magagi Ali Bachir, Ismail Jellouli, E. Said, Souad Amjad
{"title":"Model-Based Method for Optimisation of an Adaptive System","authors":"Magagi Ali Bachir, Ismail Jellouli, E. Said, Souad Amjad","doi":"10.4018/ijssci.301269","DOIUrl":"https://doi.org/10.4018/ijssci.301269","url":null,"abstract":"In a modern information system adaptation, optimization is a crucial aspect. Systems adaptation problematics have been explored in a large set of research, which have not been able to fix every single issue, leaving therefore so many challenges to be explored. It for this reason this paper presents a method, through a UML profile, to ensure the optimization of the performance of a production system. In the first place, a state of the art is presented to clarify the context of the study. This method consists in setting up a UML profile which will allow the real value of the production to be constantly assessed, the reaction take place when production is not satisfactory. The productivity assessment performs through the application of the simple algorithm, the simplex constraints are integrated through the OCL language. A code generator, based on acceleo, has been developed to propose code generation.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Core Industrial Maintenance Ontology Development Process 核心工业维护本体开发流程
Int. J. Softw. Sci. Comput. Intell. Pub Date : 2022-01-01 DOI: 10.4018/ijssci.312555
Leila Zemmouchi-Ghomari, Badreddine Midoune, Nadhir Djamiai
{"title":"A Core Industrial Maintenance Ontology Development Process","authors":"Leila Zemmouchi-Ghomari, Badreddine Midoune, Nadhir Djamiai","doi":"10.4018/ijssci.312555","DOIUrl":"https://doi.org/10.4018/ijssci.312555","url":null,"abstract":"Operational safety is at the center of all companies' concerns because increasing productivity is the top priority. Moreover, the high cost of breakdowns invests in a maintenance strategy, one of the most critical aspects of a manufacturing system. In the digital age, e-maintenance platforms can interoperate technically but fail to achieve semantic interoperability. The results are ambiguities and misunderstandings that can lead to equipment shutdowns or inefficient use of material resources. However, as formal knowledge specifications, ontologies have successfully integrated heterogeneous systems for some time. Therefore, the authors developed a core industrial maintenance ontology that is both generic and capable of extending and refining to meet semantic information repository requirements. Ontologies can unite and merge different datasets without adapting new ontologies. Only the core ontology needs to be modified according to the new semantics. A detailed description of the development process is provided, beginning with the definition of requirements and ending with the evaluation.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128376511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks on Resource-Constrained IoT Devices and Security Solutions 资源受限物联网设备的攻击与安全解决方案
Int. J. Softw. Sci. Comput. Intell. Pub Date : 2022-01-01 DOI: 10.4018/ijssci.310943
Ravi Sharma, Nonita Sharma
{"title":"Attacks on Resource-Constrained IoT Devices and Security Solutions","authors":"Ravi Sharma, Nonita Sharma","doi":"10.4018/ijssci.310943","DOIUrl":"https://doi.org/10.4018/ijssci.310943","url":null,"abstract":"An IoT is a complex system of interconnected electronic devices that exchange data over the network. Due to the sensitive nature of the data involved in this new technological paradigm, security measures must be taken with great care. Researchers can better understand the threats and weaknesses of the IoT if attacks are categorized to facilitate the development of a more robust defense system. This study discusses various attacks and statistical data related to IoT. These attacks are divided into two categories: physical and cyber-attacks. Based on the literature review, the authors found that social engineering and DoS are the most common attacks in the physical and cyber categories. This study demonstrates the security solutions inherent to securing the IoT environment. Cryptography, blockchain, software-defined networks, and machine learning techniques were reviewed. They also discussed steps that should be taken to make a safe IoT environment.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security of Cloud-Based Medical Internet of Things (MIoTs): A Survey 基于云的医疗物联网(MIoTs)安全性调查
Int. J. Softw. Sci. Comput. Intell. Pub Date : 2022-01-01 DOI: 10.4018/ijssci.285593
Akshat Gaurav, Konstantinos E. Psannis, D. Peraković
{"title":"Security of Cloud-Based Medical Internet of Things (MIoTs): A Survey","authors":"Akshat Gaurav, Konstantinos E. Psannis, D. Peraković","doi":"10.4018/ijssci.285593","DOIUrl":"https://doi.org/10.4018/ijssci.285593","url":null,"abstract":"In this digital era expectations for medical quality have increased. As the number of patients continues to increase, conventional health care methods are having to deal with new complications. In light of these observations, researchers suggested a hybrid combination of conventional health care methods with IoT technology and develop MIoT. The goal of IoMT is to ensure that patients can respond more effectively and efficiently to their treatment. But preserving user privacy is a critical issue when it comes to collecting and handling highly sensitive personal health data. However, IoMTs have limited processing power; hence, they can only implement minimal security techniques. Consequently, throughout the health data transfer through MIoT, patient’s data is at risk of data leakage. This manuscript per the authors emphasizes the need of implementing suitable security measures to increase the IoMT's resilience to cyberattacks. Additionally, this manuscript per the authors discusses the main security and privacy issues associated with IoMT and provide an overview of existing techniques.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Deep Reinforcement Learning-Based Pedestrian and Independent Vehicle Safety Fortification Using Intelligent Perception 基于深度强化学习的智能感知行人与自主车辆安全防御
Int. J. Softw. Sci. Comput. Intell. Pub Date : 2022-01-01 DOI: 10.4018/ijssci.291712
P. Vijayakumar, L. Deborah, S. Rajkumar
{"title":"Deep Reinforcement Learning-Based Pedestrian and Independent Vehicle Safety Fortification Using Intelligent Perception","authors":"P. Vijayakumar, L. Deborah, S. Rajkumar","doi":"10.4018/ijssci.291712","DOIUrl":"https://doi.org/10.4018/ijssci.291712","url":null,"abstract":"The Light Detection and Ranging (LiDAR) sensor is utilized to track each sensed obstructions at their respective locations with their relative distance, speed, and direction; such sensitive information forwards to the cloud server to predict the vehicle-hit, traffic congestion and road damages. Learn the behaviour of the state to produce an appropriate reward as the recommendation to avoid tragedy. Deep Reinforcement Learning and Q-network predict the complexity and uncertainty of the environment to generate optimal reward to states. Consequently, it activates automatic emergency braking and safe parking assistance to the vehicles. In addition, the proposed work provides safer transport for pedestrians and independent vehicles. Compared to the newer methods, the proposed system experimental results achieved 92.15% higher prediction rate accuracy. Finally, the proposed system saves many humans, animal lives from the vehicle hit, suggests drivers for rerouting to avoid unpredictable traffic, saves fuel consumption, and avoids carbon emission.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-Objective Energy-Efficient Virtual Machine Consolidation Using Dynamic Double Threshold-Enhanced Search and Rescue-Based Optimization 基于动态双阈值增强搜索和救援优化的多目标节能虚拟机整合
Int. J. Softw. Sci. Comput. Intell. Pub Date : 2022-01-01 DOI: 10.4018/ijssci.315006
Sweta Singh, R. Kumar, U. P. Rao
{"title":"Multi-Objective Energy-Efficient Virtual Machine Consolidation Using Dynamic Double Threshold-Enhanced Search and Rescue-Based Optimization","authors":"Sweta Singh, R. Kumar, U. P. Rao","doi":"10.4018/ijssci.315006","DOIUrl":"https://doi.org/10.4018/ijssci.315006","url":null,"abstract":"The popularization of the cloud and its need to solve complex engineering application have alarmed energy and environmental concerns among the researchers. Achieving energy efficiency has become one of the most essential aims of the data center, offering more services with minimal energy consumption (EC). VM consolidation aims at adjusting the VMs to fewer PMs by live migration of VMs and then switching off the inactive servers, achieving energy efficiency. However, uncontrolled consolidation could violate the SLA. The paper contributes by considering the optimization problem targeting the EC and the number of VM migrations. Dynamic double threshold with enhanced search and rescue (DDT-ESAR) optimization has been introduced utilizing two thresholds; the first value defines the upper and lower bound for host classification, whereas the other is used to make migration decision. For migration, ESAR has been adopted for the most appropriate PM- VM mapping. The experimental analysis proves the efficiency where EC is computed to be 0.384kWh, SLA violations to be 6.33% and 64 number of migrations.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133727297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信