2010 International Conference on Intelligent Systems, Modelling and Simulation最新文献

筛选
英文 中文
Context-Aware Pervasive Service Composition 上下文感知的普适服务组合
Jiehan Zhou, J. Riekki
{"title":"Context-Aware Pervasive Service Composition","authors":"Jiehan Zhou, J. Riekki","doi":"10.1109/ISMS.2010.85","DOIUrl":"https://doi.org/10.1109/ISMS.2010.85","url":null,"abstract":"Incorporating service composition and pervasive computing into managing user’s complex everyday activities envisions the paradigm of Pervasive Service Composition for everyday life. Context-Aware Pervasive Service Composition (CAPSC) enables a pervasive system to provide a user with service compositions that are relevant to the user’s context. Moreover, CAPSC enables composition applications that are flexible and adaptive to changes. To identify the nature of CAPSC and approach it, this paper investigates CAPSC requirements, categorizes context-aware pervasive service compositions, and designs CAPSC architecture. Terminology is given to Context-Aware Pervasive Service Composition and a design process for building CAPSC application is investigated. An analysis is given for examining the requirements of CAPSC architecture. CAPSC architecture is designed by taking into account context aware peer coordination, context-aware process service adaptation, and context-aware utility service adaptation.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132601018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Quantifying Distributed System Stability through Simulation: A Case Study of an Agent-Based System for Flow Reconstruction of DDoS Attacks 通过仿真量化分布式系统的稳定性:以基于agent的DDoS攻击流重构系统为例
Omer Demir, B. Khan
{"title":"Quantifying Distributed System Stability through Simulation: A Case Study of an Agent-Based System for Flow Reconstruction of DDoS Attacks","authors":"Omer Demir, B. Khan","doi":"10.1109/ISMS.2010.90","DOIUrl":"https://doi.org/10.1109/ISMS.2010.90","url":null,"abstract":"We investigate the stability properties of a novel agent-based system for the detection of network bandwidth-based distributed denial of service (DDoS) attacks. The proposed system provides a description of the structure of flows which comprise the DDoS attack. In doing so, it facilitates DDoS mitigation at or near attack traffic sources. The constituent agents within the system operate at the inter autonomous system (AS) level, comprising a distributed collection of IP-layer network taps which self-organize in response to attack flows. We formalize the notion of stability for the proposed system, and show how we can use simulation to identify regions of instability within the system’s parameter space. We then modify our system design to circumvent the uncovered singularities, and demonstrate the efficacy and tradeoffs implicit in our redesigned system.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of Time and Distance Delays in Car Following Models 汽车跟随模型中的时间和距离延迟分析
V. Naumov
{"title":"Analysis of Time and Distance Delays in Car Following Models","authors":"V. Naumov","doi":"10.1109/ISMS.2010.62","DOIUrl":"https://doi.org/10.1109/ISMS.2010.62","url":null,"abstract":"In this paper we consider two types of car following models: models where the follower maintain safe distance headway and models where the follower maintains safe time headway. We analyze distance delays and time delays, caused by influence of the leading vehicle to the follower. We show that delays satisfy an equation similar to the Lindley equation for the waiting time in the single server queue. This equation is well studied in queueing theory and in many important cases has explicit solution. It opens up possibilities to apply many available results on single server queues for the analysis shock wave propagation in time and space.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131697532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Solving Ceramic Grinding Optimization Problem by Adaptive Quantum Evolutionary Algorithm 自适应量子进化算法求解陶瓷磨削优化问题
Ashish Mani, C. Patvardhan
{"title":"Solving Ceramic Grinding Optimization Problem by Adaptive Quantum Evolutionary Algorithm","authors":"Ashish Mani, C. Patvardhan","doi":"10.1109/ISMS.2010.19","DOIUrl":"https://doi.org/10.1109/ISMS.2010.19","url":null,"abstract":"Advanced structural ceramics are widely used in engineering applications. They are useful due to high chemical inertness and sublimation temperature. Optimization of ceramic grinding process is essential as ceramics have high hardness and low surface toughness which can lead to large number of defects. The ceramic grinding optimization problem is formulated as non-linear constrained optimization problem. This paper proposes to solve the optimization problem by using a recently proposed real coded Adaptive Quantum inspired Evolutionary Algorithm. It is free from user selectable parameters in evolutionary operators as the same is determined adaptively. The proposed algorithm does not require mutation for maintaining diversity. The results also show that the proposed algorithm is fast and robust in comparison to the known state of art methods available for solving such problems.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123327517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
CODESL: A Framework for System-Level Modelling, Co-simulation and Design-Space Exploration of Embedded Systems Based on System-on-Chip CODESL:基于片上系统的嵌入式系统系统级建模、协同仿真和设计空间探索框架
Y. Hau, M. Khalil-Hani, M. N. Marsono
{"title":"CODESL: A Framework for System-Level Modelling, Co-simulation and Design-Space Exploration of Embedded Systems Based on System-on-Chip","authors":"Y. Hau, M. Khalil-Hani, M. N. Marsono","doi":"10.1109/ISMS.2010.87","DOIUrl":"https://doi.org/10.1109/ISMS.2010.87","url":null,"abstract":"This paper presents CODESL, a SystemC-based hardware-software co-design and co-simulation framework for embedded systems based on System-on-Chip (SoC). This modelling platform, which works at Electronic System Level (ESL), enables early system functionality verification, as well as algorithm exploration before the final implementation prototype is available. It can validate the behaviour for both the hardware and the software modules of the embedded SoC, as well as the interaction between them with timed/cycleaccuracy. In addition, the platform also facilitates architecture exploration that assists the system designer in finding the best hardware-software partitioning. Results show that the proposed platform is capable of estimating the system execution cycle count within 5% deviation compared to the RTL deployment model for complex SoC embedded systems.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117323378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Synthesizing Clustered, Secured, and Hierarchical Networks through Genetic Algorithms 通过遗传算法合成聚类、安全、分层网络
Shouq Al-Subaihi, Lulwa Al-Hubail, P. Marimuthu, S. Habib
{"title":"Synthesizing Clustered, Secured, and Hierarchical Networks through Genetic Algorithms","authors":"Shouq Al-Subaihi, Lulwa Al-Hubail, P. Marimuthu, S. Habib","doi":"10.1109/ISMS.2010.75","DOIUrl":"https://doi.org/10.1109/ISMS.2010.75","url":null,"abstract":"We have formulated and combined three problems: clustering, firewall placement and network hierarchy into one optimization problem, where the objective function is to minimize the total design cost of the synthesized network, while maximizing its security and scalability. Due to the computational complexity of the combined three problems, we have developed a custom-made intelligent algorithm based on the genetic algorithms (GA) to search the design space for good solutions. We have conducted five experiments with different mutation rates for three different network scenarios comprising of 50, 70, and 100 clients respectively. Our results show that the custom-made GA has converged and optimized the cost of network by 60% from its initial design.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121474126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electric Field and Ultrasonic Sensor Based Security System 基于电场和超声波传感器的安防系统
Rohit Sharma, Karandeep Singh Dhingra, Nikhil Pandey, Rahul Garg, Rohit Singhal
{"title":"Electric Field and Ultrasonic Sensor Based Security System","authors":"Rohit Sharma, Karandeep Singh Dhingra, Nikhil Pandey, Rahul Garg, Rohit Singhal","doi":"10.1109/ISMS.2010.82","DOIUrl":"https://doi.org/10.1109/ISMS.2010.82","url":null,"abstract":"This paper proposes an inexpensive solution towards the safe-keeping of the precious artifacts in museums, art galleries and private collections by employing an innovative non-contact based sensing mechanism clubbed with some of the previously used, well tested and efficient sensor-networks based on physical parameters. Such security standards are met by covertly deploying a low level electric field, with intent to perceive any intrusion by the trespasser for a visual or audio alert. Further, it explains how this system incorporates with other sensing devices such as ultrasonic sensors and the control units like micro controllers and processors to deliver a fail-safe security system.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130415359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Beck Depression Inventory Test Assessment Using Fuzzy Inference System 用模糊推理系统评价贝克抑郁量表测验
Retno Dina Ariyanti, S. Kusumadewi, I. V. Paputungan
{"title":"Beck Depression Inventory Test Assessment Using Fuzzy Inference System","authors":"Retno Dina Ariyanti, S. Kusumadewi, I. V. Paputungan","doi":"10.1109/ISMS.2010.12","DOIUrl":"https://doi.org/10.1109/ISMS.2010.12","url":null,"abstract":"In this paper, the fuzzy takagi-sugeno method, one of fuzzy inference system, is proposed to evaluate Beck Depression Inventory II Test (BDI II-Test). BDI II-Test is an assessment tool by healthcare professionals and researchers to diagnose someone’s depression level in the fields of psychology and psychiatry. In this case, all the depressed factors; emotional, cognitive, motivational, physical, and delusional; are compiled as fuzzy rules input variables. The sample test case has shown that the Fuzzy Inference System may help in diagnosing all the components resulted by BDI II Test, 21 questions to get membership values, to support the medical treatment decision","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133185447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Log Analyzer for Network Forensics and Incident Reporting 用于网络取证和事件报告的日志分析器
J. Nehinbe
{"title":"Log Analyzer for Network Forensics and Incident Reporting","authors":"J. Nehinbe","doi":"10.1109/ISMS.2010.71","DOIUrl":"https://doi.org/10.1109/ISMS.2010.71","url":null,"abstract":"Network Intrusion Detection Systems are used in network forensics and network auditing to log suspicious activities that potentially signify security violations on the networks as alerts. However, the efficacies of intrusion aggregations to succinctly process audit logs that are gaining wider acceptability in computer security are flawed because the methods frequently require high level of expertise to validate each alert and the methods only focus on interesting events. Thus, deceptive attacks that are intentionally launched to be uninteresting events frequently elude detections. Consequently, aggregated alerts are not seriously considered for litigation and incident handling exercises. Therefore, this paper presents extensive investigations of these problems. We deployed Snort to sniff offline datasets in intrusion detection mode and we clustered the alerts of each dataset with several filtering criteria. Furthermore, the results obtained have established how to detect various kinds of interesting and uninteresting attacks that frequently elude detections.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133226282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Energy Efficient Cluster-Head Selection for Wireless Sensor Networks 一种无线传感器网络的高效簇头选择方法
Ma Chaw Mon Thein, T. Thein
{"title":"An Energy Efficient Cluster-Head Selection for Wireless Sensor Networks","authors":"Ma Chaw Mon Thein, T. Thein","doi":"10.1109/ISMS.2010.60","DOIUrl":"https://doi.org/10.1109/ISMS.2010.60","url":null,"abstract":"Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Clustering is a key routing technique used to reduce energy consumption. Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolonging network lifetime. In this paper, we propose an energy efficient cluster-head selection algorithm for adapting clusters and rotating cluster head positions to evenly distribute the energy load among all the nodes. Our proposed model is extended to the LEACH’s stochastic cluster-head selection algorithm by modifying the probability of each node to become cluster-head based on remaining energy level of sensor nodes for transmission. Simulation results show that our proposed model could better implement load balance and prolong the lifetime of the network.","PeriodicalId":434315,"journal":{"name":"2010 International Conference on Intelligent Systems, Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130638164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 113
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信