This document discusses modeling real-time interaction between a user and a ubiquitous system using dynamic Petri net models. It proposes using Petri nets to model a user's activity as a set of elementary actions. Elementary actions are modeled as Petri net structures that are then composed together through techniques like sequence, parallelism, etc. to form an overall model of user-system interaction. The models can be dynamically adapted based on changes to the user's context. OWL-S ontology is used to describe the dynamic aspects of the Petri net models, especially real-time composition of models. Simulation results validate the approach of dynamically modeling user-system interaction through mutation of Petri net models.
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
Nowadays, cities around the world intend to use information technology to improve the lives of their citizens.
Future smart cities will incorporate digital data and technology to interact differently with their human
inhabitants.
Among the key component of a smart city, we find the smart home component. It is an autonomic environment
that can provide various smart services by considering the user’s context information. Several methods are used
in context-aware system to provide such services. In this paper, we propose an approach to offer the most
relevant services to the user according to any significant change of his context environment. The proposed
approach is based on the use of context history information together with user profiling and machine learning
techniques. Experimentations show that the proposed solution can efficiently provide the most useful services to
the user in an intelligent home environment.
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
The wide development of mobile applications provides a considerable amount of data of all types (images, texts, sounds, videos, etc.). In this sense, Mobile Context-aware Recommender Systems (MCRS) suggest the user suitable information depending on her/his situation and interests. Two key questions have to be considered 1) how to recommend the user information that follows his/her interests evolution? 2) how to model the user’s situation and its related interests? To the best of our knowledge, no existing work proposing a MCRS tries to answer both questions as we do. This paper describes an ongoing work on the implementation of a MCRS based on the hybrid-ε-greedy algorithm we propose, which combines the standard ε-greedy algorithm and both content-based filtering and case-based reasoning techniques.
A survey on context aware system & intelligent Middleware’sIOSR Journals
Abstract: Context aware system or Sentient system is the most profound concept in the ubiquitous computing.
In the cloud system or in distributed computing building a context aware system is difficult task and
programmer should use more generic programming framework. On the basis of layered conceptual design, we
introduce Context aware systems with Context aware middleware’s. On the basis of presented system we will
analyze different approaches of context aware computing. There are many components in the distributed system
and these components should interact with each other because it is the need of many applications. Plenty
Context middleware’s have been made but they are giving partial solutions. In this paper we are giving analysis
of different middleware’s and comprehensive application of it in context caching.
Keywords: Context aware system, Context aware Middleware’s, Context Cache
Learning Process Interaction Aided by an Adapter Agentpaperpublications3
Abstract: Computational models have played an important role in the discovery and understanding of the complexities during the learning process. One complexity is the distraction factor on educator-learner interaction affecting the quality of the learning process.
We model an adaptive system model able to dynamically adapt considering user’s performance, simulating the learner as a museum user and the educator as an exhibition module using BDI agents; we adapt the BDI architecture using Type-2 fuzzy inference system to add perceptual human-like capability on agents in order to describe the interaction on user's experience. The resulting model allows content adaptation by creating a personalized interaction environment.
SVHsIEVs for Navigation in Virtual Urban Environmentcsandit
Many virtual reality applications, such as training, urban design or gaming are based on a rich
semantic description of the environment. This paper describes a new representation of semantic
virtual worlds. Our model, called SVHsIEVs1
should provide a consistent representation of the
following aspects: the simulated environment, its structure, and the knowledge items using
ontology, interactions and tasks that virtual humans can perform in the environment. Our first
main contribution is to show the influence of semantic virtual objects on the environment. Our
second main contribution is to use these semantic informations to manage he tasks of each
virtual object. We propose to define each task by a set of attributes and relationships, which
determines the links between attributes in tasks, and links between other tasks. The architecture
has been successfully tested in 3D dynamic environments for navigation in virtual urban
environments.
An ontology for semantic modelling of virtual worldijaia
This article presents a new representation of semantic virtual environments. We propose to use the ontology as a tool for implementation. Our model, called SVHsIEVs1 provides a consistent representation of the following aspects: the simulated environment, its structure, and the knowledge items using ontology, interactions and tasks that virtual humans can perform in the environment. In SVHsIEVs, we find two type of ontology: the global ontology and the local ontology for Virtual Human. Our architecture has been successfully tested in 3D dynamic environments.
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
This paper offers a survey of ubiquitous computing research which is the developing a scope that
gears communication technologies into routine life accomplishments. This study paper affords a types of the
studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles
of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting,
this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed
for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for
researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide
a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary
for exceptional-of-provider assertion of ubiquitous computing..
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
As an answer of long growing frustration of waterfall Software development life cycle concepts,
agile software development concept was evolved in 90’s. The most popular agile methodologies is the Extreme
Programming (XP). Most software companies nowadays aim to produce efficient, flexible and valuable
Software in short time period with minimal costs, and within unstable, changing environments. This complex
problem can be modeled as a multi-agent based system, where agents negotiate resources. Agents can be used to
represent projects and resources. Crucial for the multi-agent based system in project scheduling model, is the
availability of an effective algorithm for prioritizing and scheduling of task. To evaluate the models, simulations
were carried out with real life and several generated data sets. The developed model (Multi-agent based System)
provides an optimized and flexible agile process scheduling and reduces overheads in the software process as it
responds quickly to changing requirements without excessive work in project scheduling.
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
Nowadays, cities around the world intend to use information technology to improve the lives of their citizens.
Future smart cities will incorporate digital data and technology to interact differently with their human
inhabitants.
Among the key component of a smart city, we find the smart home component. It is an autonomic environment
that can provide various smart services by considering the user’s context information. Several methods are used
in context-aware system to provide such services. In this paper, we propose an approach to offer the most
relevant services to the user according to any significant change of his context environment. The proposed
approach is based on the use of context history information together with user profiling and machine learning
techniques. Experimentations show that the proposed solution can efficiently provide the most useful services to
the user in an intelligent home environment.
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
The wide development of mobile applications provides a considerable amount of data of all types (images, texts, sounds, videos, etc.). In this sense, Mobile Context-aware Recommender Systems (MCRS) suggest the user suitable information depending on her/his situation and interests. Two key questions have to be considered 1) how to recommend the user information that follows his/her interests evolution? 2) how to model the user’s situation and its related interests? To the best of our knowledge, no existing work proposing a MCRS tries to answer both questions as we do. This paper describes an ongoing work on the implementation of a MCRS based on the hybrid-ε-greedy algorithm we propose, which combines the standard ε-greedy algorithm and both content-based filtering and case-based reasoning techniques.
A survey on context aware system & intelligent Middleware’sIOSR Journals
Abstract: Context aware system or Sentient system is the most profound concept in the ubiquitous computing.
In the cloud system or in distributed computing building a context aware system is difficult task and
programmer should use more generic programming framework. On the basis of layered conceptual design, we
introduce Context aware systems with Context aware middleware’s. On the basis of presented system we will
analyze different approaches of context aware computing. There are many components in the distributed system
and these components should interact with each other because it is the need of many applications. Plenty
Context middleware’s have been made but they are giving partial solutions. In this paper we are giving analysis
of different middleware’s and comprehensive application of it in context caching.
Keywords: Context aware system, Context aware Middleware’s, Context Cache
Learning Process Interaction Aided by an Adapter Agentpaperpublications3
Abstract: Computational models have played an important role in the discovery and understanding of the complexities during the learning process. One complexity is the distraction factor on educator-learner interaction affecting the quality of the learning process.
We model an adaptive system model able to dynamically adapt considering user’s performance, simulating the learner as a museum user and the educator as an exhibition module using BDI agents; we adapt the BDI architecture using Type-2 fuzzy inference system to add perceptual human-like capability on agents in order to describe the interaction on user's experience. The resulting model allows content adaptation by creating a personalized interaction environment.
SVHsIEVs for Navigation in Virtual Urban Environmentcsandit
Many virtual reality applications, such as training, urban design or gaming are based on a rich
semantic description of the environment. This paper describes a new representation of semantic
virtual worlds. Our model, called SVHsIEVs1
should provide a consistent representation of the
following aspects: the simulated environment, its structure, and the knowledge items using
ontology, interactions and tasks that virtual humans can perform in the environment. Our first
main contribution is to show the influence of semantic virtual objects on the environment. Our
second main contribution is to use these semantic informations to manage he tasks of each
virtual object. We propose to define each task by a set of attributes and relationships, which
determines the links between attributes in tasks, and links between other tasks. The architecture
has been successfully tested in 3D dynamic environments for navigation in virtual urban
environments.
An ontology for semantic modelling of virtual worldijaia
This article presents a new representation of semantic virtual environments. We propose to use the ontology as a tool for implementation. Our model, called SVHsIEVs1 provides a consistent representation of the following aspects: the simulated environment, its structure, and the knowledge items using ontology, interactions and tasks that virtual humans can perform in the environment. In SVHsIEVs, we find two type of ontology: the global ontology and the local ontology for Virtual Human. Our architecture has been successfully tested in 3D dynamic environments.
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
This paper offers a survey of ubiquitous computing research which is the developing a scope that
gears communication technologies into routine life accomplishments. This study paper affords a types of the
studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles
of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting,
this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed
for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for
researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide
a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary
for exceptional-of-provider assertion of ubiquitous computing..
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
As an answer of long growing frustration of waterfall Software development life cycle concepts,
agile software development concept was evolved in 90’s. The most popular agile methodologies is the Extreme
Programming (XP). Most software companies nowadays aim to produce efficient, flexible and valuable
Software in short time period with minimal costs, and within unstable, changing environments. This complex
problem can be modeled as a multi-agent based system, where agents negotiate resources. Agents can be used to
represent projects and resources. Crucial for the multi-agent based system in project scheduling model, is the
availability of an effective algorithm for prioritizing and scheduling of task. To evaluate the models, simulations
were carried out with real life and several generated data sets. The developed model (Multi-agent based System)
provides an optimized and flexible agile process scheduling and reduces overheads in the software process as it
responds quickly to changing requirements without excessive work in project scheduling.
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013Vincenzo De Florio
Seminarie Computernetwerken is a course given at Universiteit Antwerpen, Belgium
A series of seminars focusing on various themes changing from year to year.
This year's themes are: resilience, behaviour, evolvability; in systems, networks, and organizations
In what follows we describe:
themes of the course
view to the seminars
rules of the game
Our research aims to propose a global approach for specification, design and verification of context awareness Human Computer Interface (HCI). This is a Model Based Design approach (MBD). This methodology describes the ubiquitous environment by ontologies. OWL is the standard used for this purpose. The specification and modeling of Human-Computer Interaction are based on Petri nets (PN). This raises the question of representation of Petri nets with XML. We use for this purpose, the standard of modeling PNML. In this paper, we propose an extension of this standard for specification, generation and verification of HCI. This extension is a methodological approach for the construction of PNML with Petri nets. The design principle uses the concept of composition of elementary structures of Petri nets as PNML Modular. The objective is to obtain a valid interface through verification of properties of elementary Petri nets represented with PNML.
Observer/Controller and Ontology/Rule-based Architecture:
A Design Approach for Context-aware Pervasive Computing Systems.
By:
Amina HAMEURLAINE
January 21st, 2016
University of Constantine 2 -Abdelhamid Mehri
Faculty of New Technologies of Information and Communication
Department of Computer Sciences and Applications
MISC Laboratory
CONSIDERATION OF HUMAN COMPUTER INTERACTION IN ROBOTIC FIELD ijcsit
Technological progress leads the apparition of robot in human environment; we began to find them in hospitals, museums, and homes. However these situations require an interaction of robots with humans and an adoption of social behaviors. We have shown in this paper how disciplines like computer science in general and human computer interaction in particular are used to improve human robot interaction. Then we indicated how we can use action theory into design of interaction between human and Robot. Finally we proposed some practical scenarios for illustrations.
Symbolic-Connectionist Representational Model for Optimizing Decision Making ...IJECEIAES
Modeling higher order cognitive processes like human decision making come in three representational approaches namely symbolic, connectionist and symbolic-connectionist. Many connectionist neural network models are evolved over the decades for optimizing decision making behaviors and their agents are also in place. There had been attempts to implement symbolic structures within connectionist architectures with distributed representations. Our work was aimed at proposing an enhanced connectionist approach of optimizing the decisions within the framework of a symbolic cognitive model. The action selection module of this framework is forefront in evolving intelligent agents through a variety of soft computing models. As a continous effort, a Connectionist Cognitive Model (CCN) had been evolved by bringing a traditional symbolic cognitive process model proposed by LIDA as an inspiration to a feed forward neural network model for optimizing decion making behaviours in intelligent agents. Significanct progress was observed while comparing its performance with other varients.
An Extensible Web Mining Framework for Real KnowledgeIJEACS
With the emergence of Web 2.0 applications that bestow rich user experience and convenience without time and geographical restrictions, web usage logs became a goldmine to researchers across the globe. User behavior analysis in different domains based on web logs has its utility for enterprises to have strategic decision making. Business growth of enterprises depends on customer-centric approaches that need to know the knowledge of customer behavior to succeed. The rationale behind this is that customers have alternatives and there is intense competition. Therefore business community needs business intelligence to have expert decisions besides focusing customer relationship management. Many researchers contributed towards this end. However, the need for a comprehensive framework that caters to the needs of businesses to ascertain real needs of web users. This paper presents a framework named eXtensible Web Usage Mining Framework (XWUMF) for discovering actionable knowledge from web log data. The framework employs a hybrid approach that exploits fuzzy clustering methods and methods for user behavior analysis. Moreover the framework is extensible as it can accommodate new algorithms for fuzzy clustering and user behavior analysis. We proposed an algorithm known as Sequential Web Usage Miner (SWUM) for efficient mining of web usage patterns from different data sets. We built a prototype application to validate our framework. Our empirical results revealed that the framework helps in discovering actionable knowledge.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
Understanding interaction context for development interactive modelspaperpublications3
Abstract: We present ongoing research concerning to understand interaction context, its elements and factors emerging during HCI. This paper describes the components during HCI; we analyzed a case study an interactive exhibition in a museum where children are immersed on interaction context. Therefore, in this paper we studied the process of users’ interaction based on user-exhibition interactivity. It gives a general idea, in order to understand how immersed elements can change people’s way interaction negatively or positively.
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room SystemEditor IJMTER
Due to the exponential growth of wireless network based miniaturized device and
sensors, the dream of context aware ubiquitous computing world is becoming realistic. In this
ubiquitous world of context aware applications the users can get the information and share the
information elsewhere instantaneously. Context aware meeting room is one of the interesting context
aware systems where in the meeting of a given set of users will be organized as per the situation of
users. In this paper we present the conceptual design and development of service recommendation
system for prototypical context aware meeting room using Fuzzy Rules .The proposed
recommendation system for context aware meeting room recommends the services by considering
the users contextual parameters like role, priority and environmental conditions. The fuzzy rule is
constructed using history database and knowledge base of the meeting.
A contextual bandit algorithm for mobile context-aware recommender systemBouneffouf Djallel
Most existing approaches in Mobile Context-Aware Recommender Systems focus on recommending relevant items to users taking into account contextual information, such as time, location, or social aspects. However, none of them has considered the problem of user’s content evolution. We introduce in this paper an algorithm that tackles this dynamicity. It is based on dynamic exploration/exploitation and can adaptively balance the two aspects by deciding which user’s situation is most relevant for exploration or exploitation. Within a deliberately designed offline simulation framework we conduct evaluations with real online event log data. The experimental results demonstrate that our algorithm outperforms surveyed algorithms.
Exploration exploitation trade off in mobile context-aware recommender systemsBouneffouf Djallel
Most existing approaches in Context-Aware Recommender Systems (CRS) focus on recommending relevant items to users taking into account contextual information, such as time, loca-tion, or social aspects. However, none of them have considered the problem of user’s content dynamicity. This problem has been studied in the reinforcement learning community, but without paying much attention to the contextual aspect of the recommendation. We introduce in this paper an algorithm that tackles the user’s content dynamicity by modeling the CRS as a contextual bandit algorithm. It is based on dynamic explora-tion/exploitation and it includes a metric to decide which user’s situation is the most relevant to exploration or exploitation. Within a deliberately designed offline simulation framework, we conduct extensive evaluations with real online event log data. The experimental results and detailed analysis demon-strate that our algorithm outperforms surveyed algorithms.
Vision Based Gesture Recognition Using Neural Networks Approaches: A ReviewWaqas Tariq
The aim of gesture recognition researches is to create system that easily identifies gestures, and use them for device control, or convey in formations. In this paper we are discussing researches done in the area of hand gesture recognition based on Artificial Neural Networks approaches. Several hand gesture recognition researches that use Neural Networks are discussed in this paper, comparisons between these methods were presented, advantages and drawbacks of the discussed methods also included, and implementation tools for each method were presented as well.
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESSIJNSA Journal
The emerging need for qualitative approaches in context-aware information processing calls for proper modelling of context information and efficient handling of its inherent uncertainty resulted from human interpretation and usage. Many of the current approaches to context-awareness either lack a solid theoretical basis for modelling or ignore important requirements such as modularity, high-order uncertainty management and group-based context-awareness. Therefore, their real-world application and extendibility remains limited. In this paper, we present f-Context as a service-based contextawareness framework, based on language-action perspective (LAP) theory for modelling. Then we identify some of the complex, informational parts of context which contain high-order uncertainties due to differences between members of the group in defining them. An agent-based perceptual computer architecture is proposed for implementing f-Context that uses computing with words (CWW) for handling uncertainty. The feasibility of f-Context is analyzed using a realistic scenario involving a group of mobile users. We believe that the proposed approach can open the door to future research on context-awareness by offering a theoretical foundation based on human communication, and a service-based layered architecture which exploits CWW for context-aware, group-based and platform-independent access to information systems.
Mining knowledge graphs to map heterogeneous relations between the internet o...IJECEIAES
Patterns for the internet of things (IoT) which represent proven solutions used to solve design problems in the IoT are numerous. Similar to objectoriented design patterns, these IoT patterns contain multiple mutual heterogeneous relationships. However, these pattern relationships are hidden and virtually unidentified in most documents. In this paper, we use machine learning techniques to automatically mine knowledge graphs to map these relationships between several IoT patterns. The end result is a semantic knowledge graph database which outlines patterns as vertices and their relations as edges. We have identified four main relationships between the IoT patterns-a pattern is similar to another pattern if it addresses the same use case problem, a large-scale pattern uses a small- scale pattern in a lower level layer, a large pattern is composed of multiple smaller scale patterns underneath it, and patterns complement and combine with each other to resolve a given use case problem. Our results show some promising prospects towards the use of machine learning techniques to generate an automated repository to organise the IoT patterns, which are usually extracted at various levels of abstraction and granularity.
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013Vincenzo De Florio
Seminarie Computernetwerken is a course given at Universiteit Antwerpen, Belgium
A series of seminars focusing on various themes changing from year to year.
This year's themes are: resilience, behaviour, evolvability; in systems, networks, and organizations
In what follows we describe:
themes of the course
view to the seminars
rules of the game
Our research aims to propose a global approach for specification, design and verification of context awareness Human Computer Interface (HCI). This is a Model Based Design approach (MBD). This methodology describes the ubiquitous environment by ontologies. OWL is the standard used for this purpose. The specification and modeling of Human-Computer Interaction are based on Petri nets (PN). This raises the question of representation of Petri nets with XML. We use for this purpose, the standard of modeling PNML. In this paper, we propose an extension of this standard for specification, generation and verification of HCI. This extension is a methodological approach for the construction of PNML with Petri nets. The design principle uses the concept of composition of elementary structures of Petri nets as PNML Modular. The objective is to obtain a valid interface through verification of properties of elementary Petri nets represented with PNML.
Observer/Controller and Ontology/Rule-based Architecture:
A Design Approach for Context-aware Pervasive Computing Systems.
By:
Amina HAMEURLAINE
January 21st, 2016
University of Constantine 2 -Abdelhamid Mehri
Faculty of New Technologies of Information and Communication
Department of Computer Sciences and Applications
MISC Laboratory
CONSIDERATION OF HUMAN COMPUTER INTERACTION IN ROBOTIC FIELD ijcsit
Technological progress leads the apparition of robot in human environment; we began to find them in hospitals, museums, and homes. However these situations require an interaction of robots with humans and an adoption of social behaviors. We have shown in this paper how disciplines like computer science in general and human computer interaction in particular are used to improve human robot interaction. Then we indicated how we can use action theory into design of interaction between human and Robot. Finally we proposed some practical scenarios for illustrations.
Symbolic-Connectionist Representational Model for Optimizing Decision Making ...IJECEIAES
Modeling higher order cognitive processes like human decision making come in three representational approaches namely symbolic, connectionist and symbolic-connectionist. Many connectionist neural network models are evolved over the decades for optimizing decision making behaviors and their agents are also in place. There had been attempts to implement symbolic structures within connectionist architectures with distributed representations. Our work was aimed at proposing an enhanced connectionist approach of optimizing the decisions within the framework of a symbolic cognitive model. The action selection module of this framework is forefront in evolving intelligent agents through a variety of soft computing models. As a continous effort, a Connectionist Cognitive Model (CCN) had been evolved by bringing a traditional symbolic cognitive process model proposed by LIDA as an inspiration to a feed forward neural network model for optimizing decion making behaviours in intelligent agents. Significanct progress was observed while comparing its performance with other varients.
An Extensible Web Mining Framework for Real KnowledgeIJEACS
With the emergence of Web 2.0 applications that bestow rich user experience and convenience without time and geographical restrictions, web usage logs became a goldmine to researchers across the globe. User behavior analysis in different domains based on web logs has its utility for enterprises to have strategic decision making. Business growth of enterprises depends on customer-centric approaches that need to know the knowledge of customer behavior to succeed. The rationale behind this is that customers have alternatives and there is intense competition. Therefore business community needs business intelligence to have expert decisions besides focusing customer relationship management. Many researchers contributed towards this end. However, the need for a comprehensive framework that caters to the needs of businesses to ascertain real needs of web users. This paper presents a framework named eXtensible Web Usage Mining Framework (XWUMF) for discovering actionable knowledge from web log data. The framework employs a hybrid approach that exploits fuzzy clustering methods and methods for user behavior analysis. Moreover the framework is extensible as it can accommodate new algorithms for fuzzy clustering and user behavior analysis. We proposed an algorithm known as Sequential Web Usage Miner (SWUM) for efficient mining of web usage patterns from different data sets. We built a prototype application to validate our framework. Our empirical results revealed that the framework helps in discovering actionable knowledge.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
Understanding interaction context for development interactive modelspaperpublications3
Abstract: We present ongoing research concerning to understand interaction context, its elements and factors emerging during HCI. This paper describes the components during HCI; we analyzed a case study an interactive exhibition in a museum where children are immersed on interaction context. Therefore, in this paper we studied the process of users’ interaction based on user-exhibition interactivity. It gives a general idea, in order to understand how immersed elements can change people’s way interaction negatively or positively.
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room SystemEditor IJMTER
Due to the exponential growth of wireless network based miniaturized device and
sensors, the dream of context aware ubiquitous computing world is becoming realistic. In this
ubiquitous world of context aware applications the users can get the information and share the
information elsewhere instantaneously. Context aware meeting room is one of the interesting context
aware systems where in the meeting of a given set of users will be organized as per the situation of
users. In this paper we present the conceptual design and development of service recommendation
system for prototypical context aware meeting room using Fuzzy Rules .The proposed
recommendation system for context aware meeting room recommends the services by considering
the users contextual parameters like role, priority and environmental conditions. The fuzzy rule is
constructed using history database and knowledge base of the meeting.
A contextual bandit algorithm for mobile context-aware recommender systemBouneffouf Djallel
Most existing approaches in Mobile Context-Aware Recommender Systems focus on recommending relevant items to users taking into account contextual information, such as time, location, or social aspects. However, none of them has considered the problem of user’s content evolution. We introduce in this paper an algorithm that tackles this dynamicity. It is based on dynamic exploration/exploitation and can adaptively balance the two aspects by deciding which user’s situation is most relevant for exploration or exploitation. Within a deliberately designed offline simulation framework we conduct evaluations with real online event log data. The experimental results demonstrate that our algorithm outperforms surveyed algorithms.
Exploration exploitation trade off in mobile context-aware recommender systemsBouneffouf Djallel
Most existing approaches in Context-Aware Recommender Systems (CRS) focus on recommending relevant items to users taking into account contextual information, such as time, loca-tion, or social aspects. However, none of them have considered the problem of user’s content dynamicity. This problem has been studied in the reinforcement learning community, but without paying much attention to the contextual aspect of the recommendation. We introduce in this paper an algorithm that tackles the user’s content dynamicity by modeling the CRS as a contextual bandit algorithm. It is based on dynamic explora-tion/exploitation and it includes a metric to decide which user’s situation is the most relevant to exploration or exploitation. Within a deliberately designed offline simulation framework, we conduct extensive evaluations with real online event log data. The experimental results and detailed analysis demon-strate that our algorithm outperforms surveyed algorithms.
Vision Based Gesture Recognition Using Neural Networks Approaches: A ReviewWaqas Tariq
The aim of gesture recognition researches is to create system that easily identifies gestures, and use them for device control, or convey in formations. In this paper we are discussing researches done in the area of hand gesture recognition based on Artificial Neural Networks approaches. Several hand gesture recognition researches that use Neural Networks are discussed in this paper, comparisons between these methods were presented, advantages and drawbacks of the discussed methods also included, and implementation tools for each method were presented as well.
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESSIJNSA Journal
The emerging need for qualitative approaches in context-aware information processing calls for proper modelling of context information and efficient handling of its inherent uncertainty resulted from human interpretation and usage. Many of the current approaches to context-awareness either lack a solid theoretical basis for modelling or ignore important requirements such as modularity, high-order uncertainty management and group-based context-awareness. Therefore, their real-world application and extendibility remains limited. In this paper, we present f-Context as a service-based contextawareness framework, based on language-action perspective (LAP) theory for modelling. Then we identify some of the complex, informational parts of context which contain high-order uncertainties due to differences between members of the group in defining them. An agent-based perceptual computer architecture is proposed for implementing f-Context that uses computing with words (CWW) for handling uncertainty. The feasibility of f-Context is analyzed using a realistic scenario involving a group of mobile users. We believe that the proposed approach can open the door to future research on context-awareness by offering a theoretical foundation based on human communication, and a service-based layered architecture which exploits CWW for context-aware, group-based and platform-independent access to information systems.
Mining knowledge graphs to map heterogeneous relations between the internet o...IJECEIAES
Patterns for the internet of things (IoT) which represent proven solutions used to solve design problems in the IoT are numerous. Similar to objectoriented design patterns, these IoT patterns contain multiple mutual heterogeneous relationships. However, these pattern relationships are hidden and virtually unidentified in most documents. In this paper, we use machine learning techniques to automatically mine knowledge graphs to map these relationships between several IoT patterns. The end result is a semantic knowledge graph database which outlines patterns as vertices and their relations as edges. We have identified four main relationships between the IoT patterns-a pattern is similar to another pattern if it addresses the same use case problem, a large-scale pattern uses a small- scale pattern in a lower level layer, a large pattern is composed of multiple smaller scale patterns underneath it, and patterns complement and combine with each other to resolve a given use case problem. Our results show some promising prospects towards the use of machine learning techniques to generate an automated repository to organise the IoT patterns, which are usually extracted at various levels of abstraction and granularity.
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTijasa
The developpment of the Internet of Things (IoT) concept revives Responsive Environments (RE) technologies. Nowadays, the idea of a permanent connection between physical and digital world is technologically possible. The capillar Internet relates to the Internet extension into daily appliances such as they become actors of Internet like any hu-man. The parallel development of Machine-to-Machine
communications and Arti cial Intelligence (AI) technics start a new area of cybernetic. This paper presents an approach for Cybernetic Organism (Cyborg) for RE based on Organic Computing (OC). In such approach, each appli-ance is a part of an autonomic system in order to control a physical environment.The underlying idea is that such systems must have self-x properties in order to adapt their behavior to
external disturbances with a high-degree of autonomy.
Ambiences on the-fly usage of available resources through personal devicesijasuc
In smart spaces such as smart homes, computation is
embedded everywhere: in toys, appliances, or the
home’s infrastructure. Most of these devices provid
e a pool of available resources which the user can
take
advantage, interacting and creating a friendly envi
ronment. The inherent composability of these system
s
and other unique characteristics such as low-cost e
nergy, simplicity in module programming, and even
their small size, make them a suitable candidate fo
r dynamic and adaptive ambient systems. This resear
ch
work focuses on what is defined as an “ambience”, a
space with a user-defined set of computational
devices. A smart-home is modeled as a collection of
ambiences, where every ambience is capable of
providing a pool of available resources to the user
. In turn, the user is supposed to carry one or sev
eral
personal devices able to interact with the ambience
s, taking advantage of his inherent mobility. In th
is way,
the whole system can benefit from resources discove
red in the spatial proximity. A software architectu
re is
designed, which is based on the implementation of l
ow-cost algorithms able to detect and update the sy
stem
when changes in an ambience occur. Ambience middlew
are implementation works in a wide range of
architectures and OSs, while showing a negligible o
verhead in the time to perform the basic output
operations.
Software Engineering Challenges in Pervasive Computing: A reviewEditor IJCATR
Moving away from decades of machine-centric computing and making pervasive human-centric computing, the new
wave of computing, a reality revolutionizes the relationship between humans and computing systems. There is a growing interest
in the use of context-awareness as a technique for developing pervasive computing applications that are flexible, adaptable, and
capable of acting autonomously on behalf of users The software challenges to turn such pervasive or ubiquitous computing
environments into reality are enormous In this paper, we review some of the challenges of software engineering in pervasive
computing.
Acoustic event characterization for service robot using convolutional networksIJECEIAES
This paper presents and discusses the creation of a sound event classification model using deep learning. In the design of service robots, it is necessary to include routines that improve the response of both the robot and the human being throughout the interaction. These types of tasks are critical when the robot is taking care of children, the elderly, or people in vulnerable situations. Certain dangerous situations are difficult to identify and assess by an autonomous system, and yet, the life of the users may depend on these robots. Acoustic signals correspond to events that can be detected at a great distance, are usually present in risky situations, and can be continuously sensed without incurring privacy risks. For the creation of the model, a customized database is structured with seven categories that allow to categorize a problem, and eventually allow the robot to provide the necessary help. These audio signals are processed to produce graphical representations consistent with human acoustic identification. These images are then used to train three convolutional models identified as high-performing in this type of problem. The three models are evaluated with specific metrics to identify the best-performing model. Finally, the results of this evaluation are discussed and analyzed.
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTIJwest
In real environment there is a collection of many noisy and vague data, called Big Data. On the other hand,
to work on the data middleware have been developed and is now very widely used. The challenge of
working on Big Data is its processing and management. Here, integrated management system is required
to provide a solution for integrating data from multiple sensors and maximize the target success. This is in
situation that the system has constant time constrains for processing, and real-time decision-making
processes. A reliable data fusion model must meet this requirement and steadily let the user monitor data
stream. With widespread using of workflow interfaces, this requirement can be addressed. But, the work
with Big Data is also challenging. We provide a multi-agent cloud-based architecture for a higher vision to
solve this problem. This architecture provides the ability to Big Data Fusion using a workflow management
interface. The proposed system is capable of self-repair in the presence of risks and its risk is low.
Separation of Organic User Interfaces: Envisioning the Diversity of Programma...Felix Epp
Emerging technologies in nanotechnology, material science and mi- cro-robotics will make Programmable Matter possible. This creates the vision of transformable user interfaces as the successor of today’s user interfaces. This theoretical work discusses the new concepts in creating these interfaces. Instead of creating a singular device for the various use-cases and contents, future inter- faces will focus more on representing the underlying content and mental models than on a certain technique. This will lead to a vast variety of physical devices each representing one virtual entity and forming the overall user interaction in combination with each other. The concept of TiID – Time Interface Device – exemplifies such a device by including all time dependent actions and attributes in one device.
Context-aware recommender system for multi-user smart homeIJECEIAES
Smart home is one of the most important applications of the internet of things (IoT). Smart home makes life simpler, easier to control, saves energy based on user’s behavior and interaction with the home appliances. Many existing approaches have designed a smart home system using data mining algorithms. However, these approaches do not consider multiusers that exist in the same location and time (which needs a complex control). They also use centralized mining algorithm, then the system’s efficiency is reduced when datasets increase. Therefore, in this paper, we firstly build a context-aware recommender system that considers multi-user’s preferences and solves their conflicts by using unsupervised algorithms to deliver useful recommendation services. Secondly, we improve smart home’s responsive using parallel computing. The results reveal that the proposed method is better than existing approaches.
In recent times, the definition of internet of things has evolved to great extent and it means different things
to different people. However the basic idea of Internet of Things remains the same which is use of information and
communication Technologies(ICT’s) as well as Internet to provide efficient services to the mankind for their
optimum benefits. While implementing the Internet of Things itself is complex due to large of devices various link
layer technologies and services that are involved in such systems. In this paper, we specifically implement an urban
Internet of Things system which primarily gives an emphasis on smart educational institute which aims at
exploiting advanced communication technologies to support for administration of the institute and for the new
visitor who find it difficult to find their way around the institute. This paper thereby provides a comprehensive
survey of various technologies such as Android , Java, protocols and architecture for using Internet of Things in
Smart Institute. Furthermore ,this system will provide an overlook of the institute via the administration office
,playground and canteens. The user of the system will also get an static image map to roam around the institute.
Lastly the system will provide technical solutions and best practice guidelines for finding the way around the
institute and also help a new visitor in reaching his desired location.
Dynamic Semantics for the Internet of Things PayamBarnaghi
Ontology Summit 2015 : Track A Session - Ontology Integration in the Internet of Things - Thu 2015-02-05,
http://ontolog-02.cim3.net/wiki/ConferenceCall_2015_02_05
Develop a mobility model for MANETs networks based on fuzzy Logiciosrjce
The study and research in the field of networks MANETs depends alleged understand the protocols
well of the simulation process before they are applied in the real world, so that we create an environment
similar to these networks. The problem of a set of nodes connected with each other wirelessly, this requires the
development of a comprehensive model and full and real emulator for the movement of the contract on behalf of
stochastic models. Many models came to address the problems of random models that restricted the movement
of decade barriers as well as the signals exchanged between them, but these models were not receiving a lot of
light on the movement of the contract, such as direction, speed and path that is going by the node. The main
goal is to get a comprehensive model and simulator for all parts of the environment of the barriers and
obstacles to the movement of the nodes and the mobile signal between them as well as to focus on the movement
transactions for the node of the direction, speed, and best way. . This research aims to provide a realistic
mobility model for MANET networks. It also addresses the problem of imprecision in social relationships and
the location where we apply Fuzzy logic.
Similar to DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION (20)
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
2. 206 Computer Science & Information Technology (CS & IT)
progressively a set of elementary actions will be composed to construct the entire Petri-nets
model.
2. THE UBIQUITOUS COMPUTING
The ubiquitous computing is a recent area of research considered as the new generation of Human
Computer Interaction. The basic concepts of this new paradigm were founded in 1993 by Mark
Weiser in his famous paper “Some Computer Science Issues in Ubiquitous Computing” [3]. In
addition to computer science and engineering, the ubiquitous computing encompasses a wide
range of other research subjects such as mobile computing, wireless network, artificial
intelligence, as well as social and psychological sciences. This new technology deals with
incorporating various electronic devices throughout our world. It consists in hiding these devices
into our physical environment and our daily work [4][5]. The main purpose is to assist people in
their daily activities without being noticed. Ubiquitous environment is defined as any physical
space in which we integrate an important number of heterogeneous and smart devices, making a
growing ubiquitous information network. Therefore, in such space, user is in front of enormous
amount of information and heterogeneous content. Thus, he could see on his interface varied
information. However, at some moment, user could need certain information and find the others
completely useless: this choice depends necessarily on his/her preferences and his/her individual
requirements.
2.1 Ubiquitous Systems
As previously said, the ubiquitous environments are highly dynamic environments where the
context tends to evolve at runtime. Ubiquitous systems are systems that must work efficiently in
such environments while providing the suitable information relevant to the interaction between a
user and these systems. They will be able to adapt dynamically their behaviours based on the
context change of users. This ability consists in perceiving the environment and detecting its
contextual parameters. On the basis of these factors the system can react to the environment
variations and responds to the user's requirements. The most oft-cited and widely accepted
definition is given by Dey [6]: "A system is context-sensitive (i.e. ubiquitous system) if it uses
context to provide information and services relevant to the user, where relevancy depends on the
task requested by the user". For instance, a mobile phone with this ability may know that it is
currently in the meeting room, and that its owner has sat down; in addition, it may conclude that
the user is currently in a meeting and reject any unimportant calls.
2.2 Overview of the Proposed Ubiquitous System
The key goal of the proposed system [7] consists mainly in developing a formal modelling of the
user’s behaviour and applies specific processing to that model in order to identify the realtime
required information. In light of this fact, the system tries to build the user’s interface on an as
needed basis; i.e. by mapping the best possible interface components (so-called widgets) with this
information to concretely perform the target interface [7]. To overcome this purpose, the retrieval
mechanism is built on a realtime and dynamic user activity modelling. Thus, the system could
have a suitable representation of the user in a particular situation on realtime. Hence, it can
deduce the suitable model or build a realtime model according to the analysis of the user-system
interaction and the current context of use. It can then adaptively offer user information concerning
what he/she is doing.
The proposed system comprises three functional phases (Figure 1) which are described in more
details in [7]. The contextual data processing is the primary phase. In fact, pervasive environment
is a greatly dynamic environment where context can evolve continually and at runtime. Therefore,
an analysis step of this environment is necessary. The output is a document describing the
3. Computer Science & Information Technology (CS & IT) 207
contextual information. It represents the context model that will be used later by the adaptation
strategy module. The gathered data which represents the context need to be stored in a suitable
form. By analyzing related work on contextual data modelling, we concluded that ontology based
languages seems to be the most appropriate candidate model [8]. In our context model, data are
expressed by ontology written in OWL (Ontology Web Language).
Figure1. The ubiquitous system functioning stages
The second phase concerns the adaptation strategy. It is divided into two modules:
User-Ubiquitous System Interaction Modelling: The user's activity must be analyzed in this
second step, which will be further discussed later. A user’s activity is composed of a set of
elementary actions. The elementary actions were, first, modelled by elementary structures of
Interpreted Petri-nets. Then, we proceed by typical compositions as sequential, parallel, choice,
iteration, etc. A global model is then constructed integrating the different evolutions of the
ubiquitous system operation. Likewise, the user’s behaviour is modelled. It expresses the
interaction of the user with the graphical interface. In this way, the user-system interaction model
is achieved. It allows, afterward, the deduction of the user requirements.
Deduction of User requirements and Identification of the required Widgets: The next step ensures
the identification of the user’s requirements in terms of information in a first stage, and in term of
interface widgets in a second stage.
The last phase consists of two steps that describe the interface generation. Once the interface
widgets have been identified in the previous phase, this step consists in specifying the interface in
terms of displays and graphical objects: this is the user interface specification phase. The final
step represents the automatic and realtime user interface generation.
3. INTERPRETED PETRI NETS FOR MODELLING THE USER’S INTERACTION
WITH UBIQUITOUS ENVIRONMENTS
3.1 The Interpreted Petri-nets
The Petri-nets technology is a formal and abstract method to specify and to model a data flow. It
was proposed by Carl Adam Petri in 1962 [9]. Generally, this method is showing an efficient and
accurate way for specifying and describing the dynamic behaviour of various systems. It includes
especially the distributed modelling of parallelism and synchronization in such systems. In
particular, Petri-nets are continuously expanding and represent an appropriate tool for modelling
4. 208 Computer Science & Information Technology (CS & IT)
the human-Machine Interaction [10]. At first they were used only for tasks description. But later,
especially with the emergence of High-Level Petri-nets, modelling human-machine dialogue
based on Petri-nets’ profits has been started. We included principally Willem and Biljon’s works.
They were the first to model Human-Machine dialogue based on Petri-nets [11].
Petri nets are a graphical method for the modelling. They are in the form of bipartite graphs based
on two types of nodes:
Represents Places (Conditions)
Represents Transitions (Discrete Event may occur)
These nodes are connected by arrows that indicate the direction of the data flow and describe
what places are pre-and / or post-conditions for each transition (Figure 2).
A Petri-net is a tuple (P, T, Pre, Post) where:
P = {p1, p2, p3, ..., Pn} is the set of places
T = {t1, t2, t3, ..., tn} is the set of transitions
• Input function: Pre: P x T N, Defines the necessary number of tokens in place Pi (input) of a
transition Tj enabling this transition.
• Output function Post: P x T N, Defines the number of tokens necessary for the place Pi
(output) of a transition Tj after firing this transition.
Petri-nets represent statements or resources in the system while transitions model the system
activities. With the emergence of the high-level Petri-nets [12], the study of a wide range of
applications becomes easier. These new models were mainly based on the basic concepts of Petri
nets; the initial model was enriched by extensions and a variant of Petri nets models. Among
these models we quote: the Coloured Petri-nets, the Synchronized Petri-nets, the Synchronized
and Timed Petri-nets, Stochastic Petri-nets and Interpreted Petri-nets.
Figure 2. Petri-nets graphical Example before and after firing transition
The Interpreted Petri-nets will be defined by the set [13]:
< P, T, E, W, Pre, Post, µ, Precond, Action, Info-Transition >
where:
• P : set of places = {P1, P2,..., Pn},
• T : set of transitions = {T1, T2,..., Tm},
• E : set of events including the event "always present" <e>,
• W : set of the interface widgets,
• Pre: P x T → N defines the weight of the bow joining a place pi of P to a transition tk of
T,
• Post: P x T → N defines the weight of the bow joining a transition tk of T to a place pi of
P,
5. Computer Science & Information Technology (CS & IT) 209
• µ: T → E associates to each transition the appropriate triggering event,
• Precond: T → Boolean Expression defines the necessary passing condition for each
transition,
• Action: T → A defines the eventual and appropriate action procedure associated to each
transition
• Info-Transition: T → W associates to each transition, the appropriate widget(s).
3.2 Interpreted Petri-nets for Human-System Interaction Modelling
Petri-nets were chosen as a formal technique for the interaction modelling. The essential reason
behind this choice is that the Petri-nets based models can reliably describe the aspects of
concurrency, parallelism and dynamism which are fundamental features of ubiquitous
environment. This extension introduces the notion of events and conditions as well as the notion
of actions. We associate a passing condition (Condj), a triggering event (Evj) and a possible action
(Actionj) to each transition (Tj) (Figure 3). To model the user’s behaviour using interpreted Petri-
nets the places represent the user’s behaviour according to the system’s evolution, in particular
the environment evolution and changes.
Figure 3. Interpreted Petri-nets modelling
The user’s activity model is composed of a set of elementary action’s sub-models. Figure 4
depicts an example of elementary action representation, where the places represent the user’s
interaction according to the system’s evolution and changes. In particular, the places Pai and Pci
model the state of the user before and after the execution of the action; whereas the place Pbi
describes a waiting state. Two main types of events trigger the end of the elementary action and
indicate that it has been successfully executed: The validation of the condition i as well as the
presence of the event “End action”. It is the user-interaction model that we wish to describe. This
model is built by composing all the required elementary actions. As per the requirements, these
elementary actions are scheduled according to typical compositions as sequential, parallel, choice,
iteration, etc.
Figure 4. Elementary activity modelling
Condition i
T2
Begin AiT1
Pbi
Pci
Pai
End Ai
Pi
Tj Actionj Evj, Condj
Pk
6. 210 Computer Science & Information Technology (CS & IT)
The sequential composition of N elementary actions is done by merging the output places of the
Petri-nets that describes the first action (Ai) and the input places of the next action (Aj). It should
be noted that this actions’ sequence is supposed to be possible. Figure 5 shows an example of
sequential composition.
Figure 5. Sequential composition of two elementary actions
The parallel composition enables two or more actions’ execution in a simultaneous manner
(Figure 6). An input place, called synchronization place, must at the same time activate all initial
places of the parallel actions. The parallel composition of n Petri-nets based-model actions
involves two particular composition structures: parallel structure 1 and 2 (resp. PS1 and PS2).
PS1 represents the starting synchronization of the n Petri-nets models (Figure 7a) whereas the
final synchronization of these models is described by the PS2 structure (Figure 7b).
Figure 6. Parallel composition of two elementary actions
PIs
P1 P2
PFs
P1’
Pbi
Pci
Pai
Pbj
Paj
P1’
Pci
Pbi
Pdij
Pai
Pbj
Pcj
Pbi
Pci
Pai
Pbj
Pcj
Paj
7. Computer Science & Information Technology (CS & IT) 211
Figure 7. (a) PS1 structure Figure 7. (b) PS2 structure
A global model is then constructed by integrating the different evolutions of the functioning states
of the ubiquitous system. Likewise, the user’s interaction is modelled. Once the user’s behaviour
has been modelled, the user requirements can be deduced. In fact, we consider a transition “Begin
Action” in the user’s behaviour model. We associated the adequate parameter(s) to these
transitions. These parameters refer to the information required at this working point within these
specified operating conditions. Once these parameters have been identified, we can deduce the
necessary components and widgets of the user interface [7].
We consider the detection, the evaluation of the situation, the decision, and the action. The
evolutions between these states are modelled by the transitions. It should be noticed here that any
change of the environment state may affect the user interface layer. In other words, it will imply a
change in the graphical display affecting the widget's parameters or the display contents
(appearance or disappearance of some widgets, etc.). This modelling technique allows us to
deduce on realtime the user requirements according to the current context of use, including the
user’s activity.
3.3 Motivating Example
Ambient intelligence and ubiquitous computing have large advanced application areas. Computer
science technology applied to personalized medicines benefits greatly from research done in this
area. This subsection presents a case study in the recovery room of a hospital, variously called a
post-anaesthesia care unit. It’s a space a patient is taken to after surgery to safely regain
consciousness from anaesthesia and receive appropriate post-operative care. To achieve such
objectives, the nurse (or any medical staff) may do several activities. Two specific activities were
considered to illustrate what can happen for the system functioning when a user must suddenly
change activities. The first activity is to carefully monitor patient’s state evolution right after
surgery. The second one deals with an immediate intervention when a specific type of sensor, a
pulse Oximeter, warned a very low level of oxygen saturation, indicating consequently a priority
activity to be undertaken. Regarding the former situation, two elementary actions (Ea1 and Ea2)
will have to be conducted.
A set of key information must be provided to the nurse in order to successfully perform his
current activity. First, for Ea1’s accomplishment (i.e. to update the patient’s chart) the nurse
needs to know patient’s data such as: the responsible surgeon information, the time of the
operation, the operation room (room number, floor and service) and some information about the
anaesthesia phase (anaesthetist’s details, estimated duration before recovery). Then, the nurse
must monitor carefully (Ea2) vital signs (e.g. Pulse, blood pressure, temperature, blood oxygen
levels…) as the effects of anaesthesia wear off. The model depicted by Figure 8 should govern
the system functioning to address this interaction and adequately deduce all these aforementioned
data at the appropriate moment.
PIs
P1 P2 Pn PFs
P1 P2 Pn
8. 212 Computer Science & Information Technology (CS & IT)
Figure 8. Interpreted Petri-nets Model of the first activity (Ea1 Seq Ea2)
Suppose the system detects a very low OSL threshold related to another patient in the recovery
room when no other nurses or doctors are available. This patient is in danger of losing his life
unless an urgent intervention has to be carried out. Dealing with this case is, therefore, seen as a
priority for the nurse. The Petri-nets model which represents this new activity is depicted by the
Figure 9. A nurse must perform two parallel elementary actions (for example namely Ea6 and
Ea7). The first step is to administrate supplemental oxygen through a nasal cannula or face mask.
The second action consists in administering an intravenous fluid to the patient. Nevertheless,
given the sensitive nature of this action, it must be carried out by a specialist nurse.
Another question is how the system should support the nurse when it discovered that he is not
specialist. Since any decision must be in keeping with the responsible doctor-surgeon, the nurse
needs to know the doctor and his contact details. An elementary action (Ea14) enables to meet
such objectives (Figure 10). This action requires the patient’s identity as input and provides the
doctor’s general details as outcomes. Implicitly, it gives the responsible doctor-surgeon details in
the case of recovery room (i.e. according to the user’s places).
Figure 9. Interpreted Petri-nets model of the second activity (Ea6 Par Ea7)
These, in short, are the different models which should govern the nurse’s intervention faced with
such particular conditions and circumstances and with respect to a given composition. The
suitable interpreted Petri-nets model to cope with the previous described situation is depicted by
Figure 11. This means that the execution of the PatientStatusEvaluation process should be
interrupted and turns to a sequential execution of the second process model, i.e.
AdministrateOxygen. As well, based on the nurse’s information, which has been obtained from
his online, OWL-encoded profile, the entire model should be improved by the parallel execution
OperationRoom,
SurgeonInfo,
AnesthesiaPhase
Pulse, BloodP, Tp,
BloodOxyLevel
ConditionNasalCannula
OR FaceMask
IntravFluidQt ?
9. Computer Science & Information Technology (CS & IT) 213
of the elementary action CallDoctor. Finally, the execution of the last elementary action will be
performed.
Figure 10. Interpreted Petri-nets
model of the Ea14 activity
Figure 11. Suitable Petri-nets based model describing the current situation
4. IMPLEMENTATION OF INTERPRETED PETRI-NETS MODELS MUTATION
BASED ON OWL-S SPECIFICATIONS
The proposed approach mainly refers to the variation of the user’s activities. Obviously, each
activity may apply for specific information in order to be accomplished. Thus, the models, on
which the system’s operation is based to deduce these specific data, should be built in proportion
as runtime evolving of ubiquitous environment as well as according to available information. This
means that the model can progress and change its structure, so the system can provide for
adequate controls over the management of the user-system interaction. Within this context, the
mutation of Petri-nets based modelling is addressed. Taking into account that our ontology is
described by OWL [14], the OWL-S [15] technology best fits our requirements. With OWL-S as
starting point we are going to describe the Interpreted Petri-nets model’s mutation.
4.1 Modelling Services based on OWL-S Specifications
Services or more precisely, Web services are software components that communicate using
pervasive, standards-based Web technologies including HTTP and XML-based messaging. They
DoctorNumber
OperationRoom,
SurgeonInfo,
AnesthesiaPhase
Pulse, BloodP, Tp,
BloodOxyLevel
OperationRoom,
SurgeonInfo,
AnesthesiaPhase
Pulse, BloodP, Tp,
BloodOxyLevel
DoctorNumber
10. 214 Computer Science & Information Technology (CS & IT)
are designed to be accessed by other applications and vary in complexity from simple operations
to complex processes running. The main benefit of this technology lies in the fact that it
establishes a common, vendor-neutral platform for integrating distributed computing applications.
Semantic Web Services promise to provide solutions to the challenges associated with automated
discovery, dynamic composition, enactment, and other tasks associated with managing and using
service-based systems [16]. OWL-S is OWL-based web service ontology. It supplies a core set of
markup language constructs for describing web service in computer-interpretable form [15]. Each
service is characterized by three main concepts: Profile, Process and Grounding (Figure 12).
Figure 12. Representation of the service structure
The Profile feature describes the semantic properties and capabilities of a service. It represents a
specification of what functionality is provided by the service through a certain number of
parameters. The Process represents the current composition and gives a detailed description of a
service’s operation [17]. The Grounding specifies on how to interoperate with a service via
messages [18]. There are three key properties that describe a service profile. Service Name which
refers to the name of the service, it can be used as an identifier. The Text Description which
provides a brief description of the service, including what the service requires to work. The
Contact Information that provides a mechanism of referring to humans or individuals responsible
for the service.
An OWL-S process is based on an IOPR model (Inputs, Outputs, Preconditions and Results). The
Inputs are information required for the execution of the service, whereas outputs are information
that the process returns to the requester. The preconditions are determining factors imposed over
the inputs and that must hold for the process to be successfully invoked. The result entity
specifies means to meet the process’s results with corresponding outputs. Each result can be
associated to a result condition, called inCondition, that specifies when that particular result can
occur. Therefore, an inCondition binds inputs to the corresponding outputs. It is assumed that
such conditions are mutually exclusive, so that only one result can be obtained for each possible
situation.When an inCondition is satisfied, there are properties associated to this event that
specify the corresponding output (withOutput property) and, possibly, the Effects (hasEffect
properties) produced by the execution of the process.
The execution of a process may also result in changes of the state of the world. Note that there is
a fundamental difference between effects and outputs. Effects describe conditions in the world,
while outputs describe information. OWL-S does not assume that outputs and effects are the same
for every execution of the process. Rather, it allows the specification of the set of conditions
under which the outputs or the effects may result. Because of the need for conditions, OWL-S
defines the classes of ConditionalOuput and ConditionalEffect. Both classes allow a number of
conditions to be associated with the outputs and the effects respectively. Unconditional outputs
and effects are defined by leaving the list of conditions empty implicitly saying that the condition
is always true.
Service
ServiceModel
(Process)
ServiceGrounding ServiceProfile
DescribedBy
Support
Presents
11. Computer Science & Information Technology (CS & IT) 215
Two classes of services can be identified depending on the complexity of the interaction with a
service: Atomic Services and Composite Services [15]. With the former type, a single program,
sensor or device is invoked by a request message. Then, it performs its task and produces a single
response to the requester. Thus, there is no ongoing interaction between the user and the service.
The latter type is composed of more multiple primitive services and may require an extended
interaction or conversation between the requester and the set of involved services. The atomic
process is a description of an atomic service which can be directly called while passing
appropriate messages. The composite process is decomposable into atomic processes or other
composite ones while using control constructs such as sequence, split, choice, if-then-else, iterate,
repeat-while, and repeat-until.
4.2 Interpreted Petri Nets modelling based on OWL-S processes
This subsection explains our approach for enabling an interpreted Petri-nets based model to be
dynamically executed through the OWL-S specification and properties. The goal is to improve a
method so as to adapt user-system interaction successfully and dynamically into the contingent
needs to achieve a sufficient fit between user’s requirements and the perpetual change of his/her
environment. The key idea is to formulate a Petri-nets based elementary action by using an OWL-
S atomic process, and formulate a Petri-nets based activity while composing progressively a set of
atomic processes. The idea is based on the hypothesis that the elementary action is a non-
decomposable action. The activity is composed of elementary or composite actions through well-
defined composition rules. These rules govern the ordering and conditional execution of the
action in the model.
4.2.1 Encoding IPN-based Elementary action as OWL-S Atomic Process
The basic concept of the approach is to encapsulate an elementary action by an atomic process.
Therefore, the elementary action’s parameters can be specified by the IOPR model of an atomic
process. In particular, the input parameters are information needed for the well accomplishing of
the action. The output information is information provided by the action. The precondition
parameters are the condition imposed over the inputs of the action to be successfully executed.
Local parameters are only used in atomic processes. These essential parameters are summarized
in the following table (Table1). Some other non-functional properties can be considered including
local parameters, name, category and goal [15].
Table 1. Fit between OWL-S based Process’s properties and Elementary action Parameters
Elementary
action
Parameters
OWL-S based
Process’s
properties
Type
Condition i hasPrecondition EXPRESSION (KIF-Condition)
BeginAi hasInput PARAMETER : TRNSITION
Pai hasLocal PARAMETER : PLACE
EndAi hasOutput PARAMETER : TRANSITION
Pci hasLocal PARAMETER : PLACE
Requirements hasResult REQUIREMENTS_LIST
ActionName Name STRING
Pbi hasLocal PARAMETER : PLACE
12. 216 Computer Science & Information Technology (CS & IT)
The following OWL-S code gives an extract specification of the elementary action Ea1 depicted
by Figure 13 For the effective beginning, this action needs Pai and BeginEa1 as inputs, as well as
the patient identification (PatientId) as precondition on result. EndEa1 and Pc1 represent the
outputs of the action. Ea1 should provide as results the post-operative information of the given
patient; more precisely, properly tests for the existence of the patient in the database and
conducting research on patient’s information. Results include OperationRoom, SurgeonInfo,
AnesthesiaPhase which represent the nurse’s needed information to satisfactorily perform his
current activity.
Figure 13. Simplified representation of the elementary action Ea1
<!— Ea1: Service description -->
<service:Service rdf:ID="UpdatePatientChartService">
<service:presents rdf:resource="#UpdatePatientChartProfile"/>
<service:describedBy rdf:resource="#UpdatePatientChart"/>
<service:supports rdf:resource ="#UpdatePatientChartGrounding"/>
</service:Service>
<process:AtomicProcess rdf:ID="UpdatePatientChart">
<process:hasInput>
<process:Input rdf:ID="PaUpdatePatientChart"/>
</process:hasInput>
<process:hasInput>
<process:Input rdf:ID="BeginUpdatePatientChart"/>
</process:hasInput>
<process:hasOutput>
<process:Output rdf:ID="EndUpdatePatientChart"/>
</process:hasOutput>
<process:hasOutput>
<process:Output rdf:ID="PcUpdatePatientChart"/>
</process:hasOutput>
<process:hasPrecondition>
<expr:SWRL-Condition rdf:about="#SWRL-IsPatient()">
<expr:expressionObject>
<swrl:AtomList rdf:ID="AtomListID2"/>
</expr:expressionObject>
</expr:SWRL-Condition>
</process:hasPrecondition>
<process:hasLocal>
<process:Local rdf:ID="PbUpdatePatientChart"/>
</process:hasLocal>
<process:hasResult>
<process:Result rdf:ID="OperationRoom">
<process:hasResultVar>
<process:ResultVar rdf:ID="VarOperationRoom">
<process:parameterValue rdf:parseType="Literal">
</process:parameterValue>
</process:ResultVar>
</process:hasResultVar>
</process:Result>
OperationRoom,
SurgeonInfo,
AnesthesiaPhase
PaUpdatePatientChart
PbUpdatePatientChart
PcUpdatePatientChart
BeginUpdatePatientChart
EndUpdatePatientChart
IF isPatient(PatientId)
13. Computer Science & Information Technology (CS & IT) 217
</process:hasResult>
(…)
</process:AtomicProcess>
4.2.2 Encoding IPN-based Activity as OWL-S Composite Process
As previously noted, an activity is an aggregation of elementary actions scheduled according to
typical compositions as sequential, parallel, choice, iteration. Developing the runtime model of
the user’s activity is based on operational compositions of elementary actions models. Since an
elementary action is encapsulated by an atomic process, thus an activity can be modelled by a
composite process mainly thanks to the control constructs which enable the composition of
elementary actions. Examples of these constructs include sequence control which allows a list of
processes to be done in order; the split control executes a number of processes concurrently; the
execution of processes until the while Condition becomes true is done by the Iterates control, etc
[15]. As an illustration, take the example of the first activity, called “PatientStatus-Evaluation”.
This activity is composed of two sequential elementary actions, i.e. Ea1 and Ea2. Ea1,
UpdatePatientChart, consists in monitoring the patient’s state evolution right after surgery in
order to update the patient’s chart. Next is Ea2, EvaluateCriticalSign, where the nurse must
monitor carefully vital signs as the effects of anaesthesia wear off. The following is a simplified
example that illustrates the description of this composite process through OWL-S specifications:
(…)
<process:CompositeProcess rdf:ID=”PatientStatusEvaluation”>
<rdfs:label>The process for monitoring patient state after surgery
</rdfs:label>
<process:ComposedOf>
<process:Sequence>
<process:components rdf:parseType=”Collection”>
<process:AtomicProcess
rdf:about=”#UpdatePatientChart”/>
<process:AtomicProcess rdf:about=
”#EvaluateCriticalSign”/>
</process:components>
</process:Sequence>
</process:ComposedOf>
</process:CompositeProcess>
(…)
4.3. Realtime and Dynamic Composition of Interpreted Petri-nets Model
Our aims are supposed to benefit from the specified features of OWL-S specification to
dynamically create a model, notably the running, the dynamic composition, the invocation and
others particular features. Within OWL-S specification, the execution of a process may result in
the data transfer from inputs into outputs. This, while generating some new information based
both on given data as well as the environment state. Such new information is specified by the
inputs and outputs of the process. In addition, a process can produce a change of the state of the
world. This transition is described by the preconditions and effects of the process: Effects are
changes in the state of the world, and Preconditions specify conditions that should be satisfied for
a process to be executed correctly.
The ubiquitous environment changes are one of the most important information sources that the
system needs to have instantly in the course of its operation. In particular, events that are sources
of urgent intervention of the system can be specified by the parameter Effects. Therefore, the
carrying out of the model continues to be held as normal until a new event is triggered. The model
must reform itself at that time according to the new situation. With reference to the approach
above-described, the system should identify and assess the next action supposed to be executed. It
shall also control the connection conditions to the current action. Here, in particular, the data flow
specification must be defined as well as the nested control constructs from which it is composed,
14. 218 Computer Science & Information Technology (CS & IT)
and their ordering too. More precisely, a precondition must be carried out for each EndAction
transition of an elementary action. This precondition, called MutEvent will be represented by a
Boolean variable which must be set to false in order to enable this transition. This value becomes
true upon detection of a change event while the system is searching for the next necessary action
to be executed. In the proposed example, the system initiates its operation by identifying the
appropriate model required to perform the first activity: PatientStatusEvaluation. The
conditioning change of the current context, semantically specified by the MutEvent parameter of
the Ea2, makes the remainder of the current model no longer suitable. Thus, the system identifies
the more suitable action according to the new situation (Figure 14).
Figure 14. Model mutation according to the context change
5. SIMULATION AND RESULTS
For evaluation purposes, simulation work has been conducted to validate our approach. Based on
OWL-S process execution, our aim is to simulate results while highlighting the models mutation
compared to a normal execution of OWL-S processes based models. For these purposes, Live
Sequence Charts (LSCs) tool [19][20] is used to simulate the processes communication.
Furthermore, Play-Engine [21] is employed to perform automated visualization, simulation and
checking processes execution. The main intention of LSCs and the Play-Engine tools is providing
the means for monitoring scenario based behaviour in operation and direct testing of requirements
[21]. Applied to OWL-S based process, LSCs is able to describe not only the way a service will
be executed and invoked, but also the expected result and outputs.
Play-Engine supports also a mechanism that enable the specification, validation, analysis and
execution of LSCs, called “play-in” and “play-out”. Within LSC chart, two condition’s types are
distinguished: cold condition and hot one having different impacts on the process execution. The
cold condition is used in complex control structure specification in particular do-while and
Context of
Use Variation
At ti the context of the nurse
has changed
(2) Initial functional model of
PatientStatusEvaluation
According to the current
context this model is
inappropriate
(1) MutEvent of Ea2 becomes
true
(3) The system identifies the plausible next
action’s to construct the suitable model
MutEvent TRUE
15. Computer Science & Information Technology (CS & IT) 219
choice. However, to assure critical properties at certain point of execution the hot condition is
used. Thus, if any hot condition evaluated to false, a violation is caught, alternatively simulation
continues with the user’s provided events [21]. That way, a precondition of a process is identified
with a cold condition at the beginning of the chart. If the condition is false the chart terminates
and the process is not performed. The inCondition and hasResult properties are conjoined and
identified with a hot condition. The withoutput property is identified with communication after
the hot condition. An atomic process is described by a universal chart [20] represented as vertical
lines; the messages between instances are represented through horizontal lines. About composite
process, composition’s properties are translated to the appropriate communication type. For
instance, the sequence’s property is translated to sequential communication along the vertical
lines.
Figure 15. Scenario LSC to provide information about a given patient
Processes in Split correspond to multiple pre-service requests; each of them will activate an LSC
modelling the corresponding service at the right moment. Further details about other properties
are given in [17]. Figure 15 shows an LSC example that specifies the necessary interactions
between the Ea1 process and one of the system’s services PatientInformation- ProviderService.
Once the Ea1 process requests the system’s service as well as if the value PatientId is validated,
necessary information will be provided with True sign. In order to simulate process model
operation interactively, a Play-Engine aware GUI application (Figure 16) is built enabling the
manual events triggering; moreover it provides all the information required to ensure correct
interaction with the Play-Engine.
Play-Engine supports such application type and plays-out the corresponding LSCs. Figure 16
shows the LSC of the PatientStatusEvaluation process model. Given the PatientId value as input
and external event introduced through the UbiqHospitalSimulationApp application, the Play-
Engine interface showcases how the system operates. The first diagram describes an operation
deprived of the MutEvent precondition effects. Thus, the system continues functioning and
along these lines it persists in providing information supposed to be inappropriate for the nurse.
However, the second chart reveals how the system changes its current operation as a result of
MutEvent triggering. Hence, the provided information is indeed the required one since the
operating model is presumed to be the suitable model describing the current situation.
16. 220 Computer Science & Information Technology (CS & IT)
Figure 16. Comparison charts between normal functional modelling and dynamic functional modelling
6. RELATED WORK
In this section, we are going to be talking about the operational applications of both Petri-nets and
OWL-S concepts with a certain purpose. It should first be noted that the Petri-nets technology has
been used generally as a formal analyzing mechanism and they are mainly used as a modelling
tool, very efficient too [22]. However, combined together with OWL-S, the Petri-nets formalism
provides an operational semantics to OWL-S since it defines formal and executable specifications
to analyze, simulate check and validate OWL-S specifications [22][23]. In particular, Petri-nets
are intended to analyze model of web services composition and calculate service performance.
For example, [24] provides a translator from OWL-S description to Petri-nets that support formal
analysis of OWL-S services thanks to Petri-nets benefits. In addition to performance analyzing,
Petri-nets with objects (PNO) are used specifically for workflow service simulation and
verification [19] while providing rules to derive OWL-S specifications from PNO specifications.
Another example focuses on verifying the correctness of composite web services defined by
OWL-S. The verification is mainly based on rigid mathematical ground of Petri-nets [25].
Another type of using Petri-nets within this context is given in [26], where a Petri net-based
approach for modelling the choreography of OWL-S web services was described. Each control
construct of the OWL-S choreography is represented through a Petri net pattern that captures
formally its operational semantics. They also represent the flow of data, the outputs
transformations, the effects in the environment, in addition to the structures that control the
choreography of the services in their proposed Petri-nets models. However, to the best of our
knowledge no approach in literature makes use of the OWL-S to model man-system interaction in
ubiquitous environment in general, and modelling based on Petri-nets technology in particular.
Our objective scrutinizes more on giving a new approach to construct dynamically and at runtime
a Petri-nets based model toward deducing the user’s requirements at the appropriate moment and
according to his context of use. Many benefits of OWL-S allowed us to implement this modelling
technique i.e. model mutation including the dynamic aspect of Petri-nets models. In addition, this
17. Computer Science & Information Technology (CS & IT) 221
enables to publish the composite activity’s description thanks to OWL-S which is a semantic web
service description language.
7. CONCLUSION
The very dynamic aspect of ubiquitous environments has significantly altered the nature of
Human-System Interaction. Consequently, approaches of modelling these interactions have also
to be changed. The aims are to reflect better and more efficient models that can cope with the
dynamic aspect of such environments. A dynamic modelling approach is provided in this paper.
The main purpose is to monitor and control the realtime interaction of the users while they remain
in the ubiquitous environment. To make sure the users are provided with the most appropriate
information at runtime is the main goal of dynamically modelling their behaviours. Effective
implementation of this approach is mainly based on the web services technology specified in
OWL-S language. More precisely, a Petri-nets based model that represents an elementary action
is implemented through an atomic service. Then, we gradually compose a set of elementary
actions to formulate the whole Petri-nets based model that represents the current activity. This
mechanism is illustrated by a simulation tool suitable for the runtime visualization of OWL-S
processes in operation. Particular emphasis of the dynamic alteration of the model to provide
solution better suited to the real needs of the user is outlined. Future work will give further details
on the automatic elementary action discovery and automatic invocation of services. Besides,
future work will focus on implementing underlying data and functional system using techniques
compatible with ActiveX DLLs, e.g. ASP, .NET, Play-Engine may import the actual
implementation of the underlying system and perform the simulation. Formally, the work will
concentrate on the invocation mechanism, i.e. service-using requests service-provider while
determining whether the service meets its needs by exploring the service profile.
REFERENCES
[1] Kranz, M., Holleis, P., Schmidt, A.: Embedded Interaction: Interacting with the Internet of Things.
Internet Computing, IEEE, vol.14, no.2, pp.46-53 (2010)
[2] Tran, M.H., Han, J., Colman, A.: Social context: Supporting interaction awareness in ubiquitous
environments. In Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous, pp 1- 10
(2009)
[3] Mark Weiser, some computer science issues in ubiquitous computing. CACM, vol 36, issue 7, 1993.
[4] Noêlle Carbonell. Ambient Multimodality: an Asset for Developing Universal Access to the
Information Society. International Conference on Universal Access in Human Computer Interaction
(August 2007).
[5] G J Doherty, M D Wilson. Modelling Ubiquitous Computing Applications. In Proceedings of
Workshop on Continuity in Future Computing Systems, Porto, Portugal, April 2001.
[6] A. Dey, D. Salber, and G. Abowd: “A Conceptual Framework and a Toolkit for Supporting the Rapid
Prototyping of Context-Aware Applications”, Special issue on Context-Aware Computing in the
Human-Computer Interaction (HCI) Journal, vol. 16 (2-4), pp. 97-166, 2001
[7] I. Ismail and F. Moussa: “A Pervasive System Architecture for Smart Environments”. In International
Journal of Artificial Intelligence & Applications (IJAIA), volume 3, Number 5 (pp113-126,
September 2012
[8] I. Ismail: “Contextual Data Management in Ubiquitous Environment”. International Conference on
Computing and Information Technology. Saudi Arabia 12-14 March 2012.
[9] C. A. Petri. “Kommunikation mit Automaten”. Bonn : Institut für Instrumentelle Mathematik,
Schriften des IIM Nr. 2, 1962 ; New York : Griffiss Air Force Base, Technical Report RADC-TR-65-
-377, Vol. 1, pp. Suppl. 1. 1966.
[10] Matej, P., Matej, K., Janez, P., Gašper, M., Goran, V., Stanislav, K.: Analysis of multi-agent activity
using Petri nets. In Pattern Recognition, 43 (4), p.1491-1501, (2010)
[11] R. Williem and V. Biljon. Extending Petri Nets for specifying Man-Machine dialogues, International
journal of Man-Machine Studies, vol. 28, 1988, pp. 437-45.
18. 222 Computer Science & Information Technology (CS & IT)
[12] Decker, G., Weske, M.: Interaction-centric modelling of process choreographies. In Information
Systems Volume 36, Issue 2, (Special Issue: Semantic Integration of Data, Multimedia, and Services),
pp. 292–312 (2011)
[13] Moussa, F., Riahi, M., Kolski, C., Moalla, M.: Interpreted Petri Nets used for Human-Machine
Dialogue Specification in Process Control: principles and application to the Ergo-Conceptor+ tool. In
Integrated Computer-Aided Engineering, 9, pp. 87-98, (2002)
[14] Owl2 the Web Ontology Language: Structural Specification and Functional-Style Syntax Boris
Motik, Peter F. Patel-Schneider, Bijan Parsia, eds. W3C Recommendation, 27 October 2009, Latest
version available at http://www.w3.org/ TR/owl2-syntax/. Last consultation March 2012
[15] Owl-s: Semantic Markup for Web Services, available at: http://www.w3.org/Submission/OWL-S/.
Last update 22 November 2004. Last consultation May 2012
[16] Daniel Elenius, Grit Denker, David Martin, Fred Gilham, John Khouri, Shahin Sadaati, Rukman
Senanayake. The OWL-S Editor - A Development Tool for Semantic Web Services. In ESWC, pp 78-
92, 2005
[17] Quang, P., Tien, T.: Ontologies et Web Services. Activity Report. Institut de la Francophonie pour
l'Informatique (2005)
[18] Web Services Description Language (WSDL) 1.1 W3C Note 15 March 2001 Latest version:
http://www.w3.org/TR/wsdl Erik Christensen, Francisco Curbera, Greg Meredith and Sanjiva
Weerawarana Heidelberg. Last consultation May 2012
[19] Harel, D., Marelly R.: Specifying and Executing Behavioral Requirements: The Play In/Play-Out
Approach. In Software and System Modelling 2, 82–107 (2003)
[20] Sun, J., Li, Y., Wang, H.H.: Visualizing and Simulating Semantic Web Services Ontologies. In
ICFEM pp. 435-449 (2005)
[21] Ersoy, A. : An Evaluation of Live Sequence Charts and the Play-Engine. ; Master of Science Thesis,
Stockholm, Sweden 2006. KTH Computer Science and Communication
[22] Khadka, R., Sapkota, B.: An Evaluation of Dynamic Web Service Composition Approaches. (2010)
[23] Alonso, G.: Web services: concepts, architectures and applications. Springer Verlag (2004)
[24] Antonio Brogi, Sara Corfini and Stefano Iardella: From OWL-S Description to Petri Nets. E. Di Nitto
and M. Ripeanu (Eds.): ICSOC Workshops, pp. 427-438. Springer-Verlag (2009)
[25] Yu, B., Coll, S.: Verifying web services of OWL-S with Petri net. In: 5th IEEE International
Conference on Computer Science and Education (ICCSE), pp. 891- 896 (2010)
[26] Vidal, J.C., Lama, M., Bugarín, A. : Towards the use of Petri nets for the formalization of OWL-S
choreographies. In Knowledge and Information Systems. Springer-Ed (2011)