{"title":"Context-Aware Pervasive Service Composition","authors":"Jiehan Zhou, J. Riekki","doi":"10.1109/ISMS.2010.85","DOIUrl":"https://doi.org/10.1109/ISMS.2010.85","url":null,"abstract":"Incorporating service composition and pervasive computing into managing user’s complex everyday activities envisions the paradigm of Pervasive Service Composition for everyday life. Context-Aware Pervasive Service Composition (CAPSC) enables a pervasive system to provide a user with service compositions that are relevant to the user’s context. Moreover, CAPSC enables composition applications that are flexible and adaptive to changes. To identify the nature of CAPSC and approach it, this paper investigates CAPSC requirements, categorizes context-aware pervasive service compositions, and designs CAPSC architecture. Terminology is given to Context-Aware Pervasive Service Composition and a design process for building CAPSC application is investigated. An analysis is given for examining the requirements of CAPSC architecture. CAPSC architecture is designed by taking into account context aware peer coordination, context-aware process service adaptation, and context-aware utility service adaptation.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132601018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantifying Distributed System Stability through Simulation: A Case Study of an Agent-Based System for Flow Reconstruction of DDoS Attacks","authors":"Omer Demir, B. Khan","doi":"10.1109/ISMS.2010.90","DOIUrl":"https://doi.org/10.1109/ISMS.2010.90","url":null,"abstract":"We investigate the stability properties of a novel agent-based system for the detection of network bandwidth-based distributed denial of service (DDoS) attacks. The proposed system provides a description of the structure of flows which comprise the DDoS attack. In doing so, it facilitates DDoS mitigation at or near attack traffic sources. The constituent agents within the system operate at the inter autonomous system (AS) level, comprising a distributed collection of IP-layer network taps which self-organize in response to attack flows. We formalize the notion of stability for the proposed system, and show how we can use simulation to identify regions of instability within the system’s parameter space. We then modify our system design to circumvent the uncovered singularities, and demonstrate the efficacy and tradeoffs implicit in our redesigned system.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Time and Distance Delays in Car Following Models","authors":"V. Naumov","doi":"10.1109/ISMS.2010.62","DOIUrl":"https://doi.org/10.1109/ISMS.2010.62","url":null,"abstract":"In this paper we consider two types of car following models: models where the follower maintain safe distance headway and models where the follower maintains safe time headway. We analyze distance delays and time delays, caused by influence of the leading vehicle to the follower. We show that delays satisfy an equation similar to the Lindley equation for the waiting time in the single server queue. This equation is well studied in queueing theory and in many important cases has explicit solution. It opens up possibilities to apply many available results on single server queues for the analysis shock wave propagation in time and space.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131697532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving Ceramic Grinding Optimization Problem by Adaptive Quantum Evolutionary Algorithm","authors":"Ashish Mani, C. Patvardhan","doi":"10.1109/ISMS.2010.19","DOIUrl":"https://doi.org/10.1109/ISMS.2010.19","url":null,"abstract":"Advanced structural ceramics are widely used in engineering applications. They are useful due to high chemical inertness and sublimation temperature. Optimization of ceramic grinding process is essential as ceramics have high hardness and low surface toughness which can lead to large number of defects. The ceramic grinding optimization problem is formulated as non-linear constrained optimization problem. This paper proposes to solve the optimization problem by using a recently proposed real coded Adaptive Quantum inspired Evolutionary Algorithm. It is free from user selectable parameters in evolutionary operators as the same is determined adaptively. The proposed algorithm does not require mutation for maintaining diversity. The results also show that the proposed algorithm is fast and robust in comparison to the known state of art methods available for solving such problems.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123327517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CODESL: A Framework for System-Level Modelling, Co-simulation and Design-Space Exploration of Embedded Systems Based on System-on-Chip","authors":"Y. Hau, M. Khalil-Hani, M. N. Marsono","doi":"10.1109/ISMS.2010.87","DOIUrl":"https://doi.org/10.1109/ISMS.2010.87","url":null,"abstract":"This paper presents CODESL, a SystemC-based hardware-software co-design and co-simulation framework for embedded systems based on System-on-Chip (SoC). This modelling platform, which works at Electronic System Level (ESL), enables early system functionality verification, as well as algorithm exploration before the final implementation prototype is available. It can validate the behaviour for both the hardware and the software modules of the embedded SoC, as well as the interaction between them with timed/cycleaccuracy. In addition, the platform also facilitates architecture exploration that assists the system designer in finding the best hardware-software partitioning. Results show that the proposed platform is capable of estimating the system execution cycle count within 5% deviation compared to the RTL deployment model for complex SoC embedded systems.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117323378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shouq Al-Subaihi, Lulwa Al-Hubail, P. Marimuthu, S. Habib
{"title":"Synthesizing Clustered, Secured, and Hierarchical Networks through Genetic Algorithms","authors":"Shouq Al-Subaihi, Lulwa Al-Hubail, P. Marimuthu, S. Habib","doi":"10.1109/ISMS.2010.75","DOIUrl":"https://doi.org/10.1109/ISMS.2010.75","url":null,"abstract":"We have formulated and combined three problems: clustering, firewall placement and network hierarchy into one optimization problem, where the objective function is to minimize the total design cost of the synthesized network, while maximizing its security and scalability. Due to the computational complexity of the combined three problems, we have developed a custom-made intelligent algorithm based on the genetic algorithms (GA) to search the design space for good solutions. We have conducted five experiments with different mutation rates for three different network scenarios comprising of 50, 70, and 100 clients respectively. Our results show that the custom-made GA has converged and optimized the cost of network by 60% from its initial design.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121474126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electric Field and Ultrasonic Sensor Based Security System","authors":"Rohit Sharma, Karandeep Singh Dhingra, Nikhil Pandey, Rahul Garg, Rohit Singhal","doi":"10.1109/ISMS.2010.82","DOIUrl":"https://doi.org/10.1109/ISMS.2010.82","url":null,"abstract":"This paper proposes an inexpensive solution towards the safe-keeping of the precious artifacts in museums, art galleries and private collections by employing an innovative non-contact based sensing mechanism clubbed with some of the previously used, well tested and efficient sensor-networks based on physical parameters. Such security standards are met by covertly deploying a low level electric field, with intent to perceive any intrusion by the trespasser for a visual or audio alert. Further, it explains how this system incorporates with other sensing devices such as ultrasonic sensors and the control units like micro controllers and processors to deliver a fail-safe security system.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130415359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Retno Dina Ariyanti, S. Kusumadewi, I. V. Paputungan
{"title":"Beck Depression Inventory Test Assessment Using Fuzzy Inference System","authors":"Retno Dina Ariyanti, S. Kusumadewi, I. V. Paputungan","doi":"10.1109/ISMS.2010.12","DOIUrl":"https://doi.org/10.1109/ISMS.2010.12","url":null,"abstract":"In this paper, the fuzzy takagi-sugeno method, one of fuzzy inference system, is proposed to evaluate Beck Depression Inventory II Test (BDI II-Test). BDI II-Test is an assessment tool by healthcare professionals and researchers to diagnose someone’s depression level in the fields of psychology and psychiatry. In this case, all the depressed factors; emotional, cognitive, motivational, physical, and delusional; are compiled as fuzzy rules input variables. The sample test case has shown that the Fuzzy Inference System may help in diagnosing all the components resulted by BDI II Test, 21 questions to get membership values, to support the medical treatment decision","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133185447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Log Analyzer for Network Forensics and Incident Reporting","authors":"J. Nehinbe","doi":"10.1109/ISMS.2010.71","DOIUrl":"https://doi.org/10.1109/ISMS.2010.71","url":null,"abstract":"Network Intrusion Detection Systems are used in network forensics and network auditing to log suspicious activities that potentially signify security violations on the networks as alerts. However, the efficacies of intrusion aggregations to succinctly process audit logs that are gaining wider acceptability in computer security are flawed because the methods frequently require high level of expertise to validate each alert and the methods only focus on interesting events. Thus, deceptive attacks that are intentionally launched to be uninteresting events frequently elude detections. Consequently, aggregated alerts are not seriously considered for litigation and incident handling exercises. Therefore, this paper presents extensive investigations of these problems. We deployed Snort to sniff offline datasets in intrusion detection mode and we clustered the alerts of each dataset with several filtering criteria. Furthermore, the results obtained have established how to detect various kinds of interesting and uninteresting attacks that frequently elude detections.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133226282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Energy Efficient Cluster-Head Selection for Wireless Sensor Networks","authors":"Ma Chaw Mon Thein, T. Thein","doi":"10.1109/ISMS.2010.60","DOIUrl":"https://doi.org/10.1109/ISMS.2010.60","url":null,"abstract":"Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Clustering is a key routing technique used to reduce energy consumption. Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolonging network lifetime. In this paper, we propose an energy efficient cluster-head selection algorithm for adapting clusters and rotating cluster head positions to evenly distribute the energy load among all the nodes. Our proposed model is extended to the LEACH’s stochastic cluster-head selection algorithm by modifying the probability of each node to become cluster-head based on remaining energy level of sensor nodes for transmission. Simulation results show that our proposed model could better implement load balance and prolong the lifetime of the network.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130638164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}