While recommender systems have shown success in many fields, accurate recommendations in industrial settings remain challenging. In maintenance, existing techniques often struggle with the “cold start” problem and fail to consider differences in the target population's characteristics. To address this, additional user information can be incorporated into the recommendation process. This paper proposes a recommender system for recommending repair actions to technicians based on an ontology (knowledge base) and a sequential model. The approach utilizes two ontologies, one representing failure knowledge and the other representing asset attributes. The proposed method involves two steps: i) calculating score similarity based on ontology domain knowledge to make predictions for targeted failures and ii) generating Top-N repair actions through collaborative filtering recommendations for targeted failures. An additional module was implemented to evaluate the recommender system, and results showed improved performance.
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTIONijcsit
This document proposes a new heuristic approach for web service discovery and selection using an algorithm inspired by honey bee behavior called the Bees Algorithm. The approach structures service registries by domain to simplify discovery. It uses the Bees Algorithm as an intelligent search method to efficiently find the optimal service matching a client's request and quality of service requirements from the relevant registry in least time.
Improving the quality of information in strategic scanning system network app...ijaia
Integrating Business Intelligence (BI) processes in an information system requires a form of strategic
scanning system for which the information is the main source of efficiency and decision support. A process
of strategic scanning system network is primarily a cooperative approach to sharing knowledge that actors
are "producers" of information. The dynamics of the actor’s interactions allow gradual building of shared
knowledge. This paper proposes Multi Agent System (MAS) architecture which facilitates the integration of
a process of strategic scanning system network in the information system, to emerge relevant information
from simple information while ensuring the quality and safety information. In particular, this approach is
geared towards supporting system properties specially focused on cooperative multi-agent system. It gives
finally an overview of implementation of a prototype of the proposed solution limited for the moment to the
integration of processes most used in the majority of information systems.
IRJET- Automated Health Care Management System using Big Data TechnologyIRJET Journal
This document discusses an automated healthcare management system using big data technology. It proposes using Apache HIVE and MapReduce on Hadoop to analyze patient data at large scale. The system would help analyze which patients are spending more money than others. It discusses challenges with existing systems and how distributed computing using Hadoop could help process large volumes of healthcare data.
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...IOSR Journals
This document discusses using interpretive structural modeling (ISM) to analyze the interrelationships between prospects of information and communication technology (ICT) enabled process control systems. Nine prospects were identified through expert interviews, including that ICT process control could be highly innovative, reduce costs by using fewer instruments, and allow remote control from one location using secret codes. ISM analysis included creating a structural self-interaction matrix, initial and final reachability matrices, and a diagraph. This identified that prospects like reduced costs and remote control have high driving power and dependence. An action plan was developed based on expert discussions to enhance important prospects like these. In conclusion, ISM provides an effective model for studying how to improve the potential of ICT process control
Monitoring and Visualisation Approach for Collaboration Production Line Envir...Waqas Tariq
In this paper, a tool, called SPMonitor, to monitor and visualize of run-time execution productive processes is proposed. SPMonitor enables dynamically visualizing and monitoring workflows running in a system. It displays versatile information about currently executed workflows providing better understanding about processes and the general functionality of the domain. Moreover, SPMonitor enhances cooperation between different stakeholders by offering extensive communication and problem solving features that allow actors concerned to react more efficiently to different anomalies that may occur during a workflow execution. The ideas discussed are validated through the study of real case related to airbus assembly lines.
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...idescitation
Information Technology (IT) is one of the most emerging
fields in today’s Internet world. IT can be defined in various ways,
but is broadly considered to encompass the use of computers and
telecommunications equipment to store, retrieve, transmit and
manipulate data. Infrastructure is the base for everything. IT also
has an infrastructure, which can be managed and maintained
properly. For an organization’s Information Technology,
Infrastructure Management (IM) is the management of essential
operation components, such as policies, processes, equipment,
data, human resources and external contacts, for overall
effectiveness.
In this paper, we propose a methodology to manage the IT
Infrastructure in a better way. Our methodology uses the tree-
structure based architecture to manage the infrastructure with less
manual power. The process of how to manage the infrastructure is
discussed with efficient methodology and necessary steps with
algorithm, in this paper. Also, in this paper, the process of workflow
management on IT infrastructure management has been provided.
MULTI-AGENT BASED SMART METERING AND MONITORING OF POWER DISTRIBUTION SYSTEM:...ijaia
One of the problems faced by the Electricity Power consumers is the issue of charging higher than their consumption. The extended framework presented in this work provides a lasting solution by developing a Multi-agent Based System, which allows a Meter Agent to detect a case of bypassing a prepaid meter and report the case to the distribution company. Similarly, the system should be able monitor the amount in which the customer is being charged based on their power consumption. This will solve the problem of overcharging power consumers. Multi-Agent System Engineering (MaSE) methodology was used to establish how agents are able to accomplish the stated challenge encountered in the Nigerian Electricity Distribution System. The proposed platform shows that Multi-Agent Systems can play a vital role in addressing the challenges facing the power distribution sector.
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...ijaia
In the era of the fourth industrial revolution, measuring and ensuring the reliability, efficiency and safety of the industrial systems and components are one of the uppermost key concern. In addition, predicting performance degradation or remaining useful life (RUL) of an equipment over time based on its historical sensor data enables companies to greatly reduce their maintenance cost. In this way, companies can prevent costly unexpected breakdown and become more profitable and competitive in the marketplace. This paper introduces a deep learning-based method by combining CNN(Convolutional Neural Networks) and LSTM (Long Short-Term Memory)neural networks to predict RUL for industrial equipment. The proposed method does not depend upon any degradation trend assumptions and it can learn complex temporal representative and distinguishing patterns in the sensor data. In order to evaluate the efficiency and effectiveness of the proposed method, we evaluated it on two different experiment: RUL estimation and predicting the status of the IoT devices in 2-week period. Experiments are conducted on a publicly available NASA’s turbo fan-engine dataset. Based on the experiment results, the deep learning-based approach achieved high prediction accuracy. Moreover, the results show that the method outperforms standard well-accepted machine learning algorithms and accomplishes competitive performance when compared to the state-of-the art methods
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTIONijcsit
This document proposes a new heuristic approach for web service discovery and selection using an algorithm inspired by honey bee behavior called the Bees Algorithm. The approach structures service registries by domain to simplify discovery. It uses the Bees Algorithm as an intelligent search method to efficiently find the optimal service matching a client's request and quality of service requirements from the relevant registry in least time.
Improving the quality of information in strategic scanning system network app...ijaia
Integrating Business Intelligence (BI) processes in an information system requires a form of strategic
scanning system for which the information is the main source of efficiency and decision support. A process
of strategic scanning system network is primarily a cooperative approach to sharing knowledge that actors
are "producers" of information. The dynamics of the actor’s interactions allow gradual building of shared
knowledge. This paper proposes Multi Agent System (MAS) architecture which facilitates the integration of
a process of strategic scanning system network in the information system, to emerge relevant information
from simple information while ensuring the quality and safety information. In particular, this approach is
geared towards supporting system properties specially focused on cooperative multi-agent system. It gives
finally an overview of implementation of a prototype of the proposed solution limited for the moment to the
integration of processes most used in the majority of information systems.
IRJET- Automated Health Care Management System using Big Data TechnologyIRJET Journal
This document discusses an automated healthcare management system using big data technology. It proposes using Apache HIVE and MapReduce on Hadoop to analyze patient data at large scale. The system would help analyze which patients are spending more money than others. It discusses challenges with existing systems and how distributed computing using Hadoop could help process large volumes of healthcare data.
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...IOSR Journals
This document discusses using interpretive structural modeling (ISM) to analyze the interrelationships between prospects of information and communication technology (ICT) enabled process control systems. Nine prospects were identified through expert interviews, including that ICT process control could be highly innovative, reduce costs by using fewer instruments, and allow remote control from one location using secret codes. ISM analysis included creating a structural self-interaction matrix, initial and final reachability matrices, and a diagraph. This identified that prospects like reduced costs and remote control have high driving power and dependence. An action plan was developed based on expert discussions to enhance important prospects like these. In conclusion, ISM provides an effective model for studying how to improve the potential of ICT process control
Monitoring and Visualisation Approach for Collaboration Production Line Envir...Waqas Tariq
In this paper, a tool, called SPMonitor, to monitor and visualize of run-time execution productive processes is proposed. SPMonitor enables dynamically visualizing and monitoring workflows running in a system. It displays versatile information about currently executed workflows providing better understanding about processes and the general functionality of the domain. Moreover, SPMonitor enhances cooperation between different stakeholders by offering extensive communication and problem solving features that allow actors concerned to react more efficiently to different anomalies that may occur during a workflow execution. The ideas discussed are validated through the study of real case related to airbus assembly lines.
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...idescitation
Information Technology (IT) is one of the most emerging
fields in today’s Internet world. IT can be defined in various ways,
but is broadly considered to encompass the use of computers and
telecommunications equipment to store, retrieve, transmit and
manipulate data. Infrastructure is the base for everything. IT also
has an infrastructure, which can be managed and maintained
properly. For an organization’s Information Technology,
Infrastructure Management (IM) is the management of essential
operation components, such as policies, processes, equipment,
data, human resources and external contacts, for overall
effectiveness.
In this paper, we propose a methodology to manage the IT
Infrastructure in a better way. Our methodology uses the tree-
structure based architecture to manage the infrastructure with less
manual power. The process of how to manage the infrastructure is
discussed with efficient methodology and necessary steps with
algorithm, in this paper. Also, in this paper, the process of workflow
management on IT infrastructure management has been provided.
MULTI-AGENT BASED SMART METERING AND MONITORING OF POWER DISTRIBUTION SYSTEM:...ijaia
One of the problems faced by the Electricity Power consumers is the issue of charging higher than their consumption. The extended framework presented in this work provides a lasting solution by developing a Multi-agent Based System, which allows a Meter Agent to detect a case of bypassing a prepaid meter and report the case to the distribution company. Similarly, the system should be able monitor the amount in which the customer is being charged based on their power consumption. This will solve the problem of overcharging power consumers. Multi-Agent System Engineering (MaSE) methodology was used to establish how agents are able to accomplish the stated challenge encountered in the Nigerian Electricity Distribution System. The proposed platform shows that Multi-Agent Systems can play a vital role in addressing the challenges facing the power distribution sector.
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...ijaia
In the era of the fourth industrial revolution, measuring and ensuring the reliability, efficiency and safety of the industrial systems and components are one of the uppermost key concern. In addition, predicting performance degradation or remaining useful life (RUL) of an equipment over time based on its historical sensor data enables companies to greatly reduce their maintenance cost. In this way, companies can prevent costly unexpected breakdown and become more profitable and competitive in the marketplace. This paper introduces a deep learning-based method by combining CNN(Convolutional Neural Networks) and LSTM (Long Short-Term Memory)neural networks to predict RUL for industrial equipment. The proposed method does not depend upon any degradation trend assumptions and it can learn complex temporal representative and distinguishing patterns in the sensor data. In order to evaluate the efficiency and effectiveness of the proposed method, we evaluated it on two different experiment: RUL estimation and predicting the status of the IoT devices in 2-week period. Experiments are conducted on a publicly available NASA’s turbo fan-engine dataset. Based on the experiment results, the deep learning-based approach achieved high prediction accuracy. Moreover, the results show that the method outperforms standard well-accepted machine learning algorithms and accomplishes competitive performance when compared to the state-of-the art methods
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...gerogepatton
In the era of the fourth industrial revolution, measuring and ensuring the reliability, efficiency and safety of the industrial systems and components are one of the uppermost key concern. In addition, predicting performance degradation or remaining useful life (RUL) of an equipment over time based on its historical sensor data enables companies to greatly reduce their maintenance cost. In this way, companies can prevent costly unexpected breakdown and become more profitable and competitive in the marketplace. This paper introduces a deep learning-based method by combining CNN(Convolutional Neural Networks) and LSTM (Long Short-Term Memory)neural networks to predict RUL for industrial equipment. The proposed method does not depend upon any degradation trend assumptions and it can learn complex temporal representative and distinguishing patterns in the sensor data. In order to evaluate the efficiency and effectiveness of the proposed method, we evaluated it on two different experiment: RUL estimation and predicting the status of the IoT devices in 2-week period. Experiments are conducted on a publicly available NASA’s turbo fan-engine dataset. Based on the experiment results, the deep learning-based approach achieved high prediction accuracy. Moreover, the results show that the method outperforms standard well-accepted machine learning algorithms and accomplishes competitive performance when compared to the state-of-the art methods
A Brief Survey on Recommendation System for a Gradient Classifier based Inade...Christo Ananth
Recommender systems are a common and successful feature of modern internet services. (RS). A service that connects users to tasks is known as a recommendation system. Making it simpler for customers and project providers to identify and receive projects and other solutions achieves this. A recommendation system is a strong device that may be advantageous to a business or organisation. This study explores whether recommender systems may be utilised to solve cold-start and data-sparsely issues with recommender systems, as well as delays and business productivity. Recommender systems make it easier and more convenient for people to get information. Over the years, several different methods have been created. We employ a potent predictive regression method known as the slope classifier algorithm, which minimises a loss function by repeatedly choosing a function that points in the direction of the weak hypothesis or the negative gradient. A group that is experiencing trouble handling cold beginnings and data sparsity will send enormous datasets to the suggested systems team. The users have to finish their job by the deadline in order to overcome these challenges.
Finding new framework for resolving problems in various dimensions by the use...Alexander Decker
This document provides an overview of expert systems, including their components, development lifecycle, applications, advantages, and limitations. It describes the basic modules of an expert system including the knowledge acquisition subsystem, knowledge base, inference engine, explanation subsystem, and user interface. It also discusses expert system tools, characteristics, and some examples of expert system applications in domains like monitoring, diagnosis, design, and more. Overall, the document presents a broad introduction to expert systems, their architecture and uses.
Development of Intelligence Process Tracking System for Job SeekersIJMIT JOURNAL
At the present time to getting a good job is very intricate task for any job seekers. The same problem also a company can face to acquire intelligent and qualified employees. Therefore, to minimize the problem, there are many management systems were applied and out of them, computer based management system is one of an appropriate elucidation for this problem. In the computer management system, software are made for jobseekers to find their suitable companies and as well as made for companies for finding their suitable employees. However, the available software in the market are not intelligent based, and to make privacy, security and robustness, the software should made with the application of expert system. In this proposed study, an attempt has been made for finding the solution for job seekers and the companies with the application of expert systems.
IRJET- Comparison of Classification Algorithms using Machine LearningIRJET Journal
This document compares several machine learning classification algorithms. It first provides background on machine learning and describes common algorithms like linear regression, support vector machines, and decision trees. It then outlines an experimental framework in Python using libraries like Pandas, Scikit-Learn, and Matplotlib. Various classification algorithms are applied to a dataset and their test and train errors are calculated and compared to determine the most accurate algorithm. The proposed algorithm is found to have the lowest test and train errors compared to other algorithms like ridge regression, KNN, Bayesian regression, decision trees, and SVM.
Multiagent Based Methodologies have become an
important subject of research in advance Software Engineering.
Several methodologies have been proposed as, a theoretical
approach, to facilitate and support the development of complex
distributed systems. An important question when facing the
construction of Agent Applications is deciding which
methodology to follow. Trying to answer this question, a
framework with several criteria is applied in this paper for the
comparative analysis of existing multiagent system
methodologies. The results of the comparative over two of them,
conclude that those methodologies have not reached a sufficient
maturity level to be used by the software industry. The
framework has also proved its utility for the evaluation of any
kind of Multiagent Based Software Engineering Methodology
With the emergence of virtualization and cloud computing technologies, several services are housed on virtualization platform. Virtualization is the technology that many cloud service providers rely on for efficient management and coordination of the resource pool. As essential services are also housed on cloud platform, it is necessary to ensure continuous availability by implementing all necessary measures. Windows Active Directory is one such service that Microsoft developed for Windows domain networks. It is included in Windows Server operating systems as a set of processes and services for authentication and authorization of users and computers in a Windows domain type network. The service is required to run continuously without downtime. As a result, there are chances of accumulation of errors or garbage leading to software aging which in turn may lead to system failure and associated consequences. This results in software aging. In this work, software aging patterns of Windows active directory service is studied. Software aging of active directory needs to be predicted properly so that rejuvenation can be triggered to ensure continuous service delivery. In order to predict the accurate time, a model that uses time series forecasting technique is built.
The adoption of cloud environment for various application uses has led to security and privacy concern of user’s data. To protect user data and privacy on such platform is an area of concern.
Many cryptography strategy has been presented to provide secure sharing of resource on cloud platform. These methods tries to achieve a secure authentication strategy to realize feature such as self-blindable access tickets, group signatures, anonymous access tickets, minimal disclosure of tickets and revocation but each one varies in realization of these features. Each feature requires different cryptography mechanism for realization. Due to this it induces computation complexity which affects the deployment of these models in practical application. Most of these techniques are designed for a particular application environment and adopt public key cryptography which incurs high cost due to computation complexity.
To address these issues this work present an secure and efficient privacy preserving of mining data on public cloud platform by adopting party and key based authentication strategy. The proposed SCPPDM (Secure Cloud Privacy Preserving Data Mining) is deployed on Microsoft azure cloud platform. Experiment is conducted to evaluate computation complexity. The outcome shows the proposed model achieves significant performance interm of computation overhead and cost.
Agent-SSSN: a strategic scanning system network based on multiagent intellige...IJERA Editor
The document describes an Agent-SSSN system that uses a multi-agent approach and ontology to develop a strategic scanning system for business intelligence. The system aims to integrate expert knowledge through cooperative information gathering from the web. It uses various agent roles like information retrieval agents, mediator agents, and notification agents. Ontologies are used to represent shared domain concepts and expert knowledge to enable knowledge sharing between agents. The system is modeled using the O-MaSE methodology, with goals, roles, and capabilities defined for each agent.
An Overview of Workflow Management on Mobile Agent TechnologyIJERA Editor
This document discusses mobile agent technology for workflow management. It provides an overview of current research on using mobile agents to automate business processes across distributed systems. The document summarizes several related works on topics like inter-organizational workflows, mobile agent communication, coordination techniques, and workflow partitioning and scheduling algorithms. It aims to improve methods for designing and implementing prototype models for mobile agent-based workflow management systems.
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...AM Publications
This paper proposes the use of design patterns in a marine research general information platform. The development of the platform refers to a design of complicated system architecture. Creation and execution of the research workflow nodes and designing of visualization library suited for marine users play an important role in the whole software architecture. This paper studies the requirements characteristic in marine research fields and has implemented a series of framework to solve these problems based on object-oriented and design patterns techniques. These frameworks make clear the relationship in all directions between modules and layers of software, which communicate through unified abstract interface and reduce the coupling between modules and layers. The building of these frameworks is importantly significant in advancing the reusability of software and strengthening extensibility and maintainability of the system.
Human safety in the Middle East is a crucial aspect especially when working on critical mission systems. Any trivial error may result in inevitable dangerous causalities that lead to loss of innocent souls. The main objective of this paper is to introduce a complete study of a system that automates the currently adopted manual process of having dedicated men to control the barriers at the railway crossings when trains pass, the main objective is to reduce the possible human errors resulting from manual control. This study aims to provide a robust solution that adheres to a formal, systematic and new procedure to enhance the overall quality of requirements gathered for critical systems. In addition, it reflects how effective is the usage of goal oriented modelling in requirements elicitation stage for critical systems to define a clear scope and validate requirements against any missing, inconsistent or vague requirements at early stage.
FROM PLM TO ERP : A SOFTWARE SYSTEMS ENGINEERING INTEGRATIONijseajournal
The present paper on three related issues and their integration Product lifecycle management , Enterprise Planning resources and Manufacturing execution systems. Our work is how to integrate all these in a unified systems engineering framework. As most company about two third claim to have integrate ERP to PLM, ; we still observe some related problems as also mentioned by Aberdeen group. In actual global data sharing, we have some options to also integrate systems best practices towards such objective. Such critical study come with solution by reverse engineering, revisiting requirement engineering steps and propose a validation and verification for the success factors of such integration.
Multi-Agent System (MAS) monitoring solutions are designed for a plethora of usage topics. Existing approach mostly used cloned back-end architectures while front-end monitoring interface tends to constitute the real specificity of the solution. These interfaces are recurrently structured around three dimensions: access to informed knowledge, agent’s behavioural rules, and restitution of real-time states of specific system sector. In this paper, we propose prototyping a sector-agnostic MAS platform (Smart-X) which gathers in an integrated and independent platform all the functionalities required to monitor and to govern a wide range of sector specific environments. For illustration and validation purposes, the use of Smart-X is introduced and explained with a smart-mobility case study.
Predicting the Maintenance of Aircraft Engines using LSTMijtsrd
What if apart of aircraft could let you know when the aircraft component needed to be replaced or repaired It can be done with continuous data collection, monitoring, and advanced analytics. In the aviation industry, predictive maintenance promises increased reliability as well as improved supply chain and operational performance. The main goal is to ensure that the engines work correctly under all conditions and there is no risk of failure. If an effective method for predicting failures is applied, maintenance may be improved. The main source of data regarding the health of the engines is measured during the flights. Several variables are calculated, including fan speed, core speed, quantity and oil pressure and, environmental variables such as outside temperature, aircraft speed, altitude, and so on. Sensor data obtained in real time can be used to model component deterioration. To predict the maintenance of an aircraft engine, LSTM networks is used in this paper. A sequential input file is dealt with by the LSTM model. The training of LSTM networks was carried out on a high performance large scale processing engine. Machines, data, ideas, and people must all be brought together to understand the importance of predictive maintenance and achieve business results that matter. Nitin Prasad | Dr. A Rengarajan "Predicting the Maintenance of Aircraft Engines using LSTM" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41288.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/41288/predicting-the-maintenance-of-aircraft-engines-using-lstm/nitin-prasad
This document discusses a mobile ad hoc network (MANET) system. It begins with an introduction to MANETs, noting that they allow for wireless communication without centralized infrastructure by having each mobile node function as a router. It then discusses challenges with intrusion response in MANETs, as incorrect countermeasures to malicious nodes could harm the network topology. The proposed system aims to provide a more flexible risk-aware response by modifying the concept of risk evaluation and using Dempster-Shafer evidence theory with importance factors and weighted combination. It outlines the system architecture, data flow diagram, and testing of the system using programming languages like Python and Java.
IRJET - Hostel Management System using Ensemble LearningIRJET Journal
This document summarizes a research paper on developing a hostel management system using ensemble learning algorithms. It proposes creating an integrated system to manage hostel accommodations in an efficient, user-friendly manner. The current traditional hostel management techniques have limitations like difficulty in record keeping, data updating and recovery.
The proposed system is developed using Visual Basic for the front-end and Microsoft Access for the backend database. It automates administrative processes like student data management, room allocation, bill generation to reduce manual efforts. Authentication algorithms are included to prevent unauthorized access. Various modules help with functions like transport scheduling, inventory management and visitor monitoring.
The system aims to overcome drawbacks of conventional methods by providing a centralized database, access
REGULARIZED FUZZY NEURAL NETWORKS TO AID EFFORT FORECASTING IN THE CONSTRUCTI...ijaia
Predicting the time to build software is a very complex task for software engineering managers. There are complex factors that can directly interfere with the productivity of the development team. Factors directly related to the complexity of the system to be developed drastically change the time necessary for the completion of the works with the software factories. This work proposes the use of a hybrid system based on artificial neural networks and fuzzy systems to assist in the construction of an expert system based on rules to support in the prediction of hours destined to the development of software according to the complexity of the elements present in the same. The set of fuzzy rules obtained by the system helps the management and control of software development by providing a base of interpretable estimates based on fuzzy rules. The model was submitted to tests on a real database, and its results were promissory in the construction of an aid mechanism in the predictability of the software construction
EVALUATING THE PREDICTED RELIABILITY OF MECHATRONIC SYSTEMS: STATE OF THE ARTmeijjournal
Reliability analysis of mechatronic systems is one of the most young field and dynamic branches of research. It is addressed whenever we want reliable, available, and safe systems. The studies of reliability must be conducted earlier during the design phase, in order to reduce costs and the number of prototypes required in the validation of the system. The process of reliability is then deployed throughout the full cycle of development; this process is broken down into three major phases: the predictive reliability, the experimental reliability and operational reliability. The main objective of this article is a kind of portrayal of the various studies enabling a noteworthy mastery of the predictive reliability. The weak points are highlighted, in addition presenting an overview of all approaches existing in quantitative and qualitative modeling and evaluating the reliability prediction is so important for the futures reliability studies, and for academic researches to innovate other new methods and tools. the Mechatronic system is a hybrid system; it is dynamic, reconfigurable, and interactive. The modeling carried out of reliability prediction must take into account these criteria. Several methodologies have been developed in this track of research. In this article, we will try to handle them from a critical angle.
EVALUATING THE PREDICTED RELIABILITY OF MECHATRONIC SYSTEMS: STATE OF THE ARTmeijjournal
Reliability analysis of mechatronic systems is one of the most young field and dynamic branches of research. It is addressed whenever we want reliable, available, and safe systems. The studies of reliability must be conducted earlier during the design phase, in order to reduce costs and the number of prototypes required in the validation of the system. The process of reliability is then deployed throughout the full cycle of development; this process is broken down into three major phases: the predictive reliability, the experimental reliability and operational reliability. The main objective of this article is a kind of portrayal of the various studies enabling a noteworthy mastery of the predictive reliability. The weak points are highlighted, in addition presenting an overview of all approaches existing in quantitative and qualitative modeling and evaluating the reliability prediction is so important for the futures reliability studies, and for academic researches to innovate other new methods and tools. the Mechatronic system is a hybrid system; it is dynamic, reconfigurable, and interactive. The modeling carried out of reliability prediction must take into account these criteria. Several methodologies have been developed in this track of research. In this article, we will try to handle them from a critical angle.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
More Related Content
Similar to Implementing sharing platform based on ontology using a sequential recommender system
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...gerogepatton
In the era of the fourth industrial revolution, measuring and ensuring the reliability, efficiency and safety of the industrial systems and components are one of the uppermost key concern. In addition, predicting performance degradation or remaining useful life (RUL) of an equipment over time based on its historical sensor data enables companies to greatly reduce their maintenance cost. In this way, companies can prevent costly unexpected breakdown and become more profitable and competitive in the marketplace. This paper introduces a deep learning-based method by combining CNN(Convolutional Neural Networks) and LSTM (Long Short-Term Memory)neural networks to predict RUL for industrial equipment. The proposed method does not depend upon any degradation trend assumptions and it can learn complex temporal representative and distinguishing patterns in the sensor data. In order to evaluate the efficiency and effectiveness of the proposed method, we evaluated it on two different experiment: RUL estimation and predicting the status of the IoT devices in 2-week period. Experiments are conducted on a publicly available NASA’s turbo fan-engine dataset. Based on the experiment results, the deep learning-based approach achieved high prediction accuracy. Moreover, the results show that the method outperforms standard well-accepted machine learning algorithms and accomplishes competitive performance when compared to the state-of-the art methods
A Brief Survey on Recommendation System for a Gradient Classifier based Inade...Christo Ananth
Recommender systems are a common and successful feature of modern internet services. (RS). A service that connects users to tasks is known as a recommendation system. Making it simpler for customers and project providers to identify and receive projects and other solutions achieves this. A recommendation system is a strong device that may be advantageous to a business or organisation. This study explores whether recommender systems may be utilised to solve cold-start and data-sparsely issues with recommender systems, as well as delays and business productivity. Recommender systems make it easier and more convenient for people to get information. Over the years, several different methods have been created. We employ a potent predictive regression method known as the slope classifier algorithm, which minimises a loss function by repeatedly choosing a function that points in the direction of the weak hypothesis or the negative gradient. A group that is experiencing trouble handling cold beginnings and data sparsity will send enormous datasets to the suggested systems team. The users have to finish their job by the deadline in order to overcome these challenges.
Finding new framework for resolving problems in various dimensions by the use...Alexander Decker
This document provides an overview of expert systems, including their components, development lifecycle, applications, advantages, and limitations. It describes the basic modules of an expert system including the knowledge acquisition subsystem, knowledge base, inference engine, explanation subsystem, and user interface. It also discusses expert system tools, characteristics, and some examples of expert system applications in domains like monitoring, diagnosis, design, and more. Overall, the document presents a broad introduction to expert systems, their architecture and uses.
Development of Intelligence Process Tracking System for Job SeekersIJMIT JOURNAL
At the present time to getting a good job is very intricate task for any job seekers. The same problem also a company can face to acquire intelligent and qualified employees. Therefore, to minimize the problem, there are many management systems were applied and out of them, computer based management system is one of an appropriate elucidation for this problem. In the computer management system, software are made for jobseekers to find their suitable companies and as well as made for companies for finding their suitable employees. However, the available software in the market are not intelligent based, and to make privacy, security and robustness, the software should made with the application of expert system. In this proposed study, an attempt has been made for finding the solution for job seekers and the companies with the application of expert systems.
IRJET- Comparison of Classification Algorithms using Machine LearningIRJET Journal
This document compares several machine learning classification algorithms. It first provides background on machine learning and describes common algorithms like linear regression, support vector machines, and decision trees. It then outlines an experimental framework in Python using libraries like Pandas, Scikit-Learn, and Matplotlib. Various classification algorithms are applied to a dataset and their test and train errors are calculated and compared to determine the most accurate algorithm. The proposed algorithm is found to have the lowest test and train errors compared to other algorithms like ridge regression, KNN, Bayesian regression, decision trees, and SVM.
Multiagent Based Methodologies have become an
important subject of research in advance Software Engineering.
Several methodologies have been proposed as, a theoretical
approach, to facilitate and support the development of complex
distributed systems. An important question when facing the
construction of Agent Applications is deciding which
methodology to follow. Trying to answer this question, a
framework with several criteria is applied in this paper for the
comparative analysis of existing multiagent system
methodologies. The results of the comparative over two of them,
conclude that those methodologies have not reached a sufficient
maturity level to be used by the software industry. The
framework has also proved its utility for the evaluation of any
kind of Multiagent Based Software Engineering Methodology
With the emergence of virtualization and cloud computing technologies, several services are housed on virtualization platform. Virtualization is the technology that many cloud service providers rely on for efficient management and coordination of the resource pool. As essential services are also housed on cloud platform, it is necessary to ensure continuous availability by implementing all necessary measures. Windows Active Directory is one such service that Microsoft developed for Windows domain networks. It is included in Windows Server operating systems as a set of processes and services for authentication and authorization of users and computers in a Windows domain type network. The service is required to run continuously without downtime. As a result, there are chances of accumulation of errors or garbage leading to software aging which in turn may lead to system failure and associated consequences. This results in software aging. In this work, software aging patterns of Windows active directory service is studied. Software aging of active directory needs to be predicted properly so that rejuvenation can be triggered to ensure continuous service delivery. In order to predict the accurate time, a model that uses time series forecasting technique is built.
The adoption of cloud environment for various application uses has led to security and privacy concern of user’s data. To protect user data and privacy on such platform is an area of concern.
Many cryptography strategy has been presented to provide secure sharing of resource on cloud platform. These methods tries to achieve a secure authentication strategy to realize feature such as self-blindable access tickets, group signatures, anonymous access tickets, minimal disclosure of tickets and revocation but each one varies in realization of these features. Each feature requires different cryptography mechanism for realization. Due to this it induces computation complexity which affects the deployment of these models in practical application. Most of these techniques are designed for a particular application environment and adopt public key cryptography which incurs high cost due to computation complexity.
To address these issues this work present an secure and efficient privacy preserving of mining data on public cloud platform by adopting party and key based authentication strategy. The proposed SCPPDM (Secure Cloud Privacy Preserving Data Mining) is deployed on Microsoft azure cloud platform. Experiment is conducted to evaluate computation complexity. The outcome shows the proposed model achieves significant performance interm of computation overhead and cost.
Agent-SSSN: a strategic scanning system network based on multiagent intellige...IJERA Editor
The document describes an Agent-SSSN system that uses a multi-agent approach and ontology to develop a strategic scanning system for business intelligence. The system aims to integrate expert knowledge through cooperative information gathering from the web. It uses various agent roles like information retrieval agents, mediator agents, and notification agents. Ontologies are used to represent shared domain concepts and expert knowledge to enable knowledge sharing between agents. The system is modeled using the O-MaSE methodology, with goals, roles, and capabilities defined for each agent.
An Overview of Workflow Management on Mobile Agent TechnologyIJERA Editor
This document discusses mobile agent technology for workflow management. It provides an overview of current research on using mobile agents to automate business processes across distributed systems. The document summarizes several related works on topics like inter-organizational workflows, mobile agent communication, coordination techniques, and workflow partitioning and scheduling algorithms. It aims to improve methods for designing and implementing prototype models for mobile agent-based workflow management systems.
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...AM Publications
This paper proposes the use of design patterns in a marine research general information platform. The development of the platform refers to a design of complicated system architecture. Creation and execution of the research workflow nodes and designing of visualization library suited for marine users play an important role in the whole software architecture. This paper studies the requirements characteristic in marine research fields and has implemented a series of framework to solve these problems based on object-oriented and design patterns techniques. These frameworks make clear the relationship in all directions between modules and layers of software, which communicate through unified abstract interface and reduce the coupling between modules and layers. The building of these frameworks is importantly significant in advancing the reusability of software and strengthening extensibility and maintainability of the system.
Human safety in the Middle East is a crucial aspect especially when working on critical mission systems. Any trivial error may result in inevitable dangerous causalities that lead to loss of innocent souls. The main objective of this paper is to introduce a complete study of a system that automates the currently adopted manual process of having dedicated men to control the barriers at the railway crossings when trains pass, the main objective is to reduce the possible human errors resulting from manual control. This study aims to provide a robust solution that adheres to a formal, systematic and new procedure to enhance the overall quality of requirements gathered for critical systems. In addition, it reflects how effective is the usage of goal oriented modelling in requirements elicitation stage for critical systems to define a clear scope and validate requirements against any missing, inconsistent or vague requirements at early stage.
FROM PLM TO ERP : A SOFTWARE SYSTEMS ENGINEERING INTEGRATIONijseajournal
The present paper on three related issues and their integration Product lifecycle management , Enterprise Planning resources and Manufacturing execution systems. Our work is how to integrate all these in a unified systems engineering framework. As most company about two third claim to have integrate ERP to PLM, ; we still observe some related problems as also mentioned by Aberdeen group. In actual global data sharing, we have some options to also integrate systems best practices towards such objective. Such critical study come with solution by reverse engineering, revisiting requirement engineering steps and propose a validation and verification for the success factors of such integration.
Multi-Agent System (MAS) monitoring solutions are designed for a plethora of usage topics. Existing approach mostly used cloned back-end architectures while front-end monitoring interface tends to constitute the real specificity of the solution. These interfaces are recurrently structured around three dimensions: access to informed knowledge, agent’s behavioural rules, and restitution of real-time states of specific system sector. In this paper, we propose prototyping a sector-agnostic MAS platform (Smart-X) which gathers in an integrated and independent platform all the functionalities required to monitor and to govern a wide range of sector specific environments. For illustration and validation purposes, the use of Smart-X is introduced and explained with a smart-mobility case study.
Predicting the Maintenance of Aircraft Engines using LSTMijtsrd
What if apart of aircraft could let you know when the aircraft component needed to be replaced or repaired It can be done with continuous data collection, monitoring, and advanced analytics. In the aviation industry, predictive maintenance promises increased reliability as well as improved supply chain and operational performance. The main goal is to ensure that the engines work correctly under all conditions and there is no risk of failure. If an effective method for predicting failures is applied, maintenance may be improved. The main source of data regarding the health of the engines is measured during the flights. Several variables are calculated, including fan speed, core speed, quantity and oil pressure and, environmental variables such as outside temperature, aircraft speed, altitude, and so on. Sensor data obtained in real time can be used to model component deterioration. To predict the maintenance of an aircraft engine, LSTM networks is used in this paper. A sequential input file is dealt with by the LSTM model. The training of LSTM networks was carried out on a high performance large scale processing engine. Machines, data, ideas, and people must all be brought together to understand the importance of predictive maintenance and achieve business results that matter. Nitin Prasad | Dr. A Rengarajan "Predicting the Maintenance of Aircraft Engines using LSTM" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41288.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/41288/predicting-the-maintenance-of-aircraft-engines-using-lstm/nitin-prasad
This document discusses a mobile ad hoc network (MANET) system. It begins with an introduction to MANETs, noting that they allow for wireless communication without centralized infrastructure by having each mobile node function as a router. It then discusses challenges with intrusion response in MANETs, as incorrect countermeasures to malicious nodes could harm the network topology. The proposed system aims to provide a more flexible risk-aware response by modifying the concept of risk evaluation and using Dempster-Shafer evidence theory with importance factors and weighted combination. It outlines the system architecture, data flow diagram, and testing of the system using programming languages like Python and Java.
IRJET - Hostel Management System using Ensemble LearningIRJET Journal
This document summarizes a research paper on developing a hostel management system using ensemble learning algorithms. It proposes creating an integrated system to manage hostel accommodations in an efficient, user-friendly manner. The current traditional hostel management techniques have limitations like difficulty in record keeping, data updating and recovery.
The proposed system is developed using Visual Basic for the front-end and Microsoft Access for the backend database. It automates administrative processes like student data management, room allocation, bill generation to reduce manual efforts. Authentication algorithms are included to prevent unauthorized access. Various modules help with functions like transport scheduling, inventory management and visitor monitoring.
The system aims to overcome drawbacks of conventional methods by providing a centralized database, access
REGULARIZED FUZZY NEURAL NETWORKS TO AID EFFORT FORECASTING IN THE CONSTRUCTI...ijaia
Predicting the time to build software is a very complex task for software engineering managers. There are complex factors that can directly interfere with the productivity of the development team. Factors directly related to the complexity of the system to be developed drastically change the time necessary for the completion of the works with the software factories. This work proposes the use of a hybrid system based on artificial neural networks and fuzzy systems to assist in the construction of an expert system based on rules to support in the prediction of hours destined to the development of software according to the complexity of the elements present in the same. The set of fuzzy rules obtained by the system helps the management and control of software development by providing a base of interpretable estimates based on fuzzy rules. The model was submitted to tests on a real database, and its results were promissory in the construction of an aid mechanism in the predictability of the software construction
EVALUATING THE PREDICTED RELIABILITY OF MECHATRONIC SYSTEMS: STATE OF THE ARTmeijjournal
Reliability analysis of mechatronic systems is one of the most young field and dynamic branches of research. It is addressed whenever we want reliable, available, and safe systems. The studies of reliability must be conducted earlier during the design phase, in order to reduce costs and the number of prototypes required in the validation of the system. The process of reliability is then deployed throughout the full cycle of development; this process is broken down into three major phases: the predictive reliability, the experimental reliability and operational reliability. The main objective of this article is a kind of portrayal of the various studies enabling a noteworthy mastery of the predictive reliability. The weak points are highlighted, in addition presenting an overview of all approaches existing in quantitative and qualitative modeling and evaluating the reliability prediction is so important for the futures reliability studies, and for academic researches to innovate other new methods and tools. the Mechatronic system is a hybrid system; it is dynamic, reconfigurable, and interactive. The modeling carried out of reliability prediction must take into account these criteria. Several methodologies have been developed in this track of research. In this article, we will try to handle them from a critical angle.
EVALUATING THE PREDICTED RELIABILITY OF MECHATRONIC SYSTEMS: STATE OF THE ARTmeijjournal
Reliability analysis of mechatronic systems is one of the most young field and dynamic branches of research. It is addressed whenever we want reliable, available, and safe systems. The studies of reliability must be conducted earlier during the design phase, in order to reduce costs and the number of prototypes required in the validation of the system. The process of reliability is then deployed throughout the full cycle of development; this process is broken down into three major phases: the predictive reliability, the experimental reliability and operational reliability. The main objective of this article is a kind of portrayal of the various studies enabling a noteworthy mastery of the predictive reliability. The weak points are highlighted, in addition presenting an overview of all approaches existing in quantitative and qualitative modeling and evaluating the reliability prediction is so important for the futures reliability studies, and for academic researches to innovate other new methods and tools. the Mechatronic system is a hybrid system; it is dynamic, reconfigurable, and interactive. The modeling carried out of reliability prediction must take into account these criteria. Several methodologies have been developed in this track of research. In this article, we will try to handle them from a critical angle.
Similar to Implementing sharing platform based on ontology using a sequential recommender system (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Implementing sharing platform based on ontology using a sequential recommender system
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 13, No. 6, December 2023, pp. 6754~6763
ISSN: 2088-8708, DOI: 10.11591/ijece.v13i6.pp6754-6763 6754
Journal homepage: http://ijece.iaescore.com
Implementing sharing platform based on ontology using a
sequential recommender system
Zaynabe Ragala, Asmaâ Retbi, Samir Bennani
Rime Team-Networking, Modeling and e-learning Team-Masi Laboratory, Engineering 3S Research Center,
Mohammadia School of Engineers, Mohammed V University, Rabat, Morocco
Article Info ABSTRACT
Article history:
Received Feb 8, 2023
Revised Jul 7, 2023
Accepted Jul 9, 2023
While recommender systems have shown success in many fields, accurate
recommendations in industrial settings remain challenging. In maintenance,
existing techniques often struggle with the “cold start” problem and fail to
consider differences in the target population's characteristics. To address this,
additional user information can be incorporated into the recommendation
process. This paper proposes a recommender system for recommending repair
actions to technicians based on an ontology (knowledge base) and a sequential
model. The approach utilizes two ontologies, one representing failure
knowledge and the other representing asset attributes. The proposed method
involves two steps: i) calculating score similarity based on ontology domain
knowledge to make predictions for targeted failures and ii) generating Top-N
repair actions through collaborative filtering recommendations for targeted
failures. An additional module was implemented to evaluate the recommender
system, and results showed improved performance.
Keywords:
Knowledge acquisition
Knowledge sharing
Knowledge-based system
Ontology
Railway transport
Recommender system
This is an open access article under the CC BY-SA license.
Corresponding Author:
Zaynabe Ragala
Rime Team-Networking, Modeling and e-learning Team-Masi Laboratory, Engineering 3S Research Center,
Mohammadia School of Engineers, Mohammed V University
Rabat, Morocco
Email: zaynaberagala@research.emi.ac.ma
1. INTRODUCTION
Contemporary economic developments marked by globalization and digitalization confirm the
importance and role of knowledge, in generating innovations, maintaining a competitive advantage in an
organization, and continuously adapting to a changing market [1]. This makes knowledge sharing and uses a
key research topic within the knowledge management community [2]. Technology has played a key role in this
transition and has revolutionized the way organizations manage their knowledge. However, organizations have
always struggled to integrate it into their processes [3]. Naturally, the transfer of explicit knowledge is simpler
[4]. On the other hand, tacit knowledge whose first source is an experience [5] and is generally difficult to
share [4]. In this sense, in previous work [6] we have proposed a complete process based on the socialization,
externalization, combination, and internalization (SECI) method for the optimal collection of explicit and tacit
knowledge from each technician [7]. This knowledge base has been formalized by two ontologies, the 1st for
rolling stock and the 2nd
for failures. This sharing of knowledge via ontology allows each system to exploit all
the knowledge of the other systems [8]. Moreover, the recommendation system, which can be applied to the
ontology, brings a benefit to this knowledge while being able to generate new knowledge that the users cannot
notice [9]. An ontology-based recommendation system is a type of recommendation system that uses an
ontology to represent and organize the domain of items being recommended [10], [11]. An ontology is a formal
representation of a set of concepts within a domain, and the relationships between those concepts [12]. Using
2. Int J Elec & Comp Eng ISSN: 2088-8708
Implementing sharing platform based on ontology using a sequential recommender … (Zaynabe Ragala)
6755
an ontology in a recommendation system can help to improve the accuracy and relevance of recommendations
by allowing the system to reason about the relationships between different items and users [10], [13], [14].
Regardless of the approach used to build the ontology, an ontology-based recommendation system typically
involves the use of natural language processing (NLP) techniques to extract information from the ontology and
use it to generate recommendations [14], [15]. This may involve identifying relevant concepts and relationships
in the ontology and using them to find items that are likely to be of interest to a particular user [16]. Knowledge
transfer is a powerful lever for growth and an essential device for consolidating all of a company's knowledge
[17]. Based on this process, the company can generate several benefits including [18]: increased efficiency and
productivity leading to increased revenue, leader development across the organization, and improvement in
adaptability across individual teams and the organization as a whole.
Recommender systems are types of expert systems [19], that are used to make recommendations about
products, information, or services to users. Most existing recommender systems implicitly assume a particular
type of user behavior. However, they rarely consider interactive user recommendation scenarios in real
environments. In this paper, we propose to implement a sharing platform for railway maintenance based on an
ontology and using a sequential recommender system, following the steps shown in Figure 1.
Figure 1. The stages of construction
By following these steps, we can build a sharing platform for railway maintenance that leverages the
power of an ontology and a sequential recommender system to provide personalized recommendations to users.
The following sections of the document are presented as follows: section 2 presents the proposed method and
the case study; then section 3 presents some related work, and finally an evaluation of the system and
conclusion in the last section.
2. THE PROPOSED METHOD
2.1. Motivation
In the continuity of our work, we propose in this article to redefine the current role of knowledge as
well as its dynamics of creation and its management mechanisms by bringing out new perspectives on this
knowledge. From this perspective, maintenance assistant for rolling stock (MARS) was developed. MARS is
a recommender system that allows the exploitation and sharing of knowledge, in a framework of continuous
learning between the different technicians of the railway company. MARS will provide personalized and
automated maintenance recommendations based on historical data, past maintenance records, and current
operational conditions. This will help improve the efficiency and effectiveness of maintenance operations,
reduce maintenance costs, minimize equipment downtime, and enhance overall train performance and
reliability. By using MARS, maintenance can be proactive, data-driven, and optimized to prevent equipment
failures and prolong its lifespan.
2.2. Description
The functionality of MARS consists of proposing the most suitable repair actions to remedy the
failures of rolling stock on a rail network. The system will allow the collection of information and the
application of actions according to the typology of the incidents with the objectives of reducing the time of
immobilization and repair on the one hand and reducing the quantity of these in the future. MARS will make
it possible to consult the workflow at any time, record feedback from the experience, and disseminate the
information that the company wishes to take into account in the capitalization process on rolling stock failures.
MARS will have its origin in incidents reported to technicians. These incidents will have their own independent
life cycle but are interconnected with the repair life cycle through this system. The interconnection of incidents
with MARS is carried out using middleware for extract-transform-load (ETL). The ETL batch process will be
periodically configurable (time interval, in days) which will get rolling stock incidents.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 6, December 2023: 6754-6763
6756
2.3. Approach and functionalities
MARS process will go through the following different stages detailed in Figure 2, to facilitate the
repair process for rolling technicians, the system must guide them through all the necessary steps. To achieve
this, the system needs to be able to open an action sheet. The first step in this process is to analyze the
predictions. To do this, a time-series and neural network (NN) approach has been set up to predict failures,
classify them, and evaluate their impact on traffic [20].
Figure 2. MARS workflow
4. Int J Elec & Comp Eng ISSN: 2088-8708
Implementing sharing platform based on ontology using a sequential recommender … (Zaynabe Ragala)
6757
These failures will be recovered using a batch process and integrated into the recommendation system.
However, the evaluation process for predicted failures will differ from actual failures. If the recommended
action plan successfully prevents a predicted failure, it will be considered useful for future reference. On the
other hand, if it does not prevent the predicted failure, the plan will be considered ineffective. The system also
needs to address specific needs, such as incidents reported in the event management system (EMS) that require
intervention. These incidents will be individually retrieved through a daily batch process and added to the
incident list. Regardless of the origin of the failures, each will follow the same flow through the
recommendation process, from input to output. A search engine will be set up to filter the failures likely to be
processed, according to the criteria as the type, class, and location.
2.4. Recommendation engine
The recommendation process is a crucial stage that marks the beginning of a project's evaluation.
During registration, a recommendation code is assigned to the project, which serves as an identification key
for retrieving the project from the search engine of projects. This code ensures that the recommendation project
is easily accessible to the concerned parties, who can then assess its viability and make informed decisions.
Once the technician and the asset subject to the failure have been identified, the extraction of information from
the ontologies commences. This extraction is done based on the fields that have been selected from a predefined
list. The fields chosen to depend on the nature of the project and the kind of information that needs to be
extracted. The extraction process aims to provide accurate and relevant data that can be used to make informed
recommendations. The extraction of information from ontologies is a complex process that requires the use of
sophisticated tools and techniques. These tools are designed to extract information from various sources,
including databases, expert systems, and knowledge graphs. The information extracted is then analyzed to
identify patterns, trends, and relationships that can be used to generate recommendations. The use of ontologies
in the extraction process ensures that the information extracted is relevant, consistent, and accurate, thereby
enhancing the quality of the recommendations generated. At this point, the recommendation process begins,
the screen will contain 5 tabs as shown in Figure 3, which will contain the following information:
Tab 1: The data of the failure to be processed for the beginning of the recommendation process, and the list of
failures that correspond to one of the criteria.
Tab 2: The list of symptoms similar to the scope defined in tab 1.
Tab 3: The list of causes similar to the scope defined in tabs 1 and 2.
Tab 4: The top 10 repair actions.
Tab 5: The action plan generated as a result of the section in tab 4.
Figure 3. MARS screen of perimeter definition
There are many similarity metrics used in recommendation systems, and one of the most commonly
used similarity metrics Is cosine similarity [21]. Based on matrix factorization, this technique decomposes the
failure-action adaptation matrix according to the interaction of the technician into a lower-dimensional failure
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 6, December 2023: 6754-6763
6758
and action feature matrix. The predicted rating for a failure is the dot product of the failure and action feature
vectors [22], [23]. The cosine similarity score between two symptom or causes, x and y, is as (1).
𝐶𝑜𝑠𝑖𝑛𝑒 (𝑥, 𝑦) = (𝑥 ∗ 𝑦) /(|(|𝑥|) | ∗ |(|𝑦|) |) (1)
The cosine similarity score is calculated as the cosine of the angle between the two vectors, which
represents the similarity between the symptoms. A score of 1 indicates that the symptoms are completely
similar, while a score of -1 indicates that the symptoms are completely dissimilar. A score of 0 indicates that
the symptoms are orthogonal and have no similarity [22]. To calculate the cosine similarity score between two
symptoms with five features, class, type, failure, material, and model, you would first represent each symptom
as a vector in a 5-dimensional space, with each dimension corresponding to one of the five features. For Cause,
we add symptoms as the sixth feature. At this stage, the system will propose the top 10 actions to the technician
that best fit his interactions as shown in Figure 4. The system will take into account the frequency of use and
rating [24]. The rating is calculated based on technician feedback for each action.
Figure 4. MARS screen of top 10 actions
After validating the action plan, it must be executed. It will be possible to print the selected action
plan proposed by MARS. The execution of the plan will be done by the technician after the validation of the
expert. Taking into account the case to be treated: a prediction or a specific failure. The objective will be either
to avoid failure or correct the failure. This part of the workflow will be realized outside MARS.
2.5. Feedback
The technician will give his evaluation, which must be validated or completed by the expert. If it is a
prediction, the success of the action plan is to avoid failure. An additional study can be conducted by the expert
to verify the existence or not of regression on other components or the appearance of other failures related to
this intervention. For the other case, if it is a punctual failure, the expert has the possibility to define a duration
of evaluation, to allow the follow-up of the material and the impact of the action on its functioning before
judging its effectiveness. After the technician fills in his evaluation, the expert will have to validate them to
trigger the update of the ontology. The update script takes into account only the evaluated and validated actions.
6. Int J Elec & Comp Eng ISSN: 2088-8708
Implementing sharing platform based on ontology using a sequential recommender … (Zaynabe Ragala)
6759
If, after a period of inactivity of a repair plan, the system must put it in the “Unfunded” state, in order to
highlight this situation of inactivity. To do this, a batch process is defined, which will check daily the
recommended repair plans, whose feedback has not been given and for which the defined period of inactivity
has elapsed. This period of inactivity will be configurable and will be defined in the catalog management
system.
3. RESEARCH METHOD
There are various studies related to personalized recommendations. Streams are designed to improve
the accuracy of algorithms used in recommender systems. The second stream focuses on the interaction
between the recommender system and its users. In addition, some studies focus on the influence of moderating
factors, such as user characteristics and product characteristics, on recommendation performance.
Das [25] were carried out within the framework of competition 1 of the prognostics and health
management (PHM) Society Conference Data Challenge 2013 closely related to remote monitoring and
diagnosis in industrial applications. The goal of this data contest is to create an automated system capable of
recommending particular maintenance actions to mitigate failures. In response to these failures, domain experts
recommend maintenance actions based on the types of issues. Also, they describe the design of maintenance
and operational recommenders. Recommenders use information from energy management and control systems
(EMCS) and computerized maintenance management systems (CMMS) to recommend what maintenance
personnel should do in response to maintenance service requests. It compares the predicted similarity with the
similarity calculated by comparing maintenance operations. Ontology reasoning has been shown to improve
user personas; external ontology knowledge is used to successfully bootstrap recommender systems, and
persona visualization is used to improve personas accuracy [26]. Tashmetov et al. [27] determine the
malfunction of a specific node or circuit and give advice by an intelligent expert system to troubleshoot the
malfunction in railway transport. A mathematical model and an algorithm have been developed, and a program
for finding a solution to a malfunction for its elimination in the circuits of two-wire arrows has been compiled.
However, the results demonstrate that ontology-based approaches can achieve interoperability of
heterogeneous knowledge representations and lead to accurate recommendations. The use of these methods in
practical recommender systems demonstrates the applicability of the results to real environments [14], [28].
Therefore, in a recommendation, Tarus et al. [29] use ontologies to model and represent domain knowledge
about learners and learning resources. Evaluation of the proposed hybrid recommender system shows improved
performance. In the field of maintenance, we have identified a few articles that focus on the use of knowledge-
based recommender systems in the maintenance domain. Al-Najim et al. [30] used previous maintenance
reports, which included the status of errors and maintenance actions actually performed in the past, to assess
the accuracy of recommendations. They concluded that the hierarchical recommender system, where the
system starts by estimating one of the maintenance attributes, which is used as input for estimating the next
maintenance attribute in the next step outperformed the single-tier system, which is based on a one-level
recommendation of error messages and descriptions in terms of accuracy. And that the multi-tier system may
help maintenance teams respond to unexpected equipment failures by operating on the maintenance staff's
recommendations. In the same context, Huang et al. [31] design a decision support system capable of
combining prior knowledge and the past experience of experts to provide personalized maintenance documents.
Different maintenance activities are recommended for different users by taking into account different typical
utilization conditions of each product instance. Jongwook [32] proposed an ontology-based recommender
system to support the maintenance of Korean architectural heritage. They have designed the ontology which
expresses the information of the cultural heritage of Korean wooden buildings with reference to existing
heritage ontologies. Second, they have created the repair information database based on repair content and
expert interview data. Third, they have developed a system that recommends the repair method of Korean
wooden architectural heritage with the most similar phenomena and causes.
From the literature reviews described above, there is little research that focuses on maintenance in rail
transport while using ontologies. In addition, rare are the systems that provide personalized maintenance
documents for each case according to their characteristics, and circumstances. The additional advantage that
we have put in our system is the evaluation module that will allow technicians to evaluate the action plans
recommended by the system. This data will be integrated into the workflows and will further improve the
system's recommendations. Most ontologies available today were created by domain experts to meet certain
domain requirements and remained static unless a change within the ontology was made by an individual [32],
[33]. However, in our evolution phase, a script was added at the end of the process to evolve our ontology and
ensure complete and correct semantics. Maintenance in general remains a very resistant activity in the face of
change and presents several constraints considering the companies, namely the age of the assets, change of the
assets and their characteristics; the departure of the experts leaving the companies to face daily challenges to
ensure this key performance indicator (KPI). The mean time to repair (MTTR) time to repair remains among
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 6, December 2023: 6754-6763
6760
the most critical indicators that need to be reduced [34]. Hence the essential added value of our project will be
an additional and essential aid to technicians in their daily lives.
4. RESULTS AND DISCUSSION
MARS has set two major objectives which are to optimize repair time (MTTR) and minimize the
number of failures. In order to evaluate the system's effectiveness, the indicators reported from the field will
be taken into consideration. The evaluation process is divided into two levels. The first level is performed by
the technician who will assess the recommended repair actions. The second level of evaluation involves
measuring the impact of using the system on business indicators, namely MTTR and the number of failures in
the long term. These evaluations are crucial to ensure that MARS is meeting its goals and providing the best
possible service.
4.1. Evaluation of MTTR
To make it happen, we built on previous work [34], in which we compared a set of regression
algorithms to predict MTTR. The results obtained showed that linear, polynomial, and Lasso outperform other
algorithms. In this phase of our work, we are going to analyze the duration of the interventions during one
month, after the use of MARS, for the same type of failure treated in [34]. We got the result presented in
Table 1.
Table 1. Average repair time in hours for different types of failure
Type Type10 Type11 Type12 Type13 Type14 Type15 Type18 Type2
Before 171.21 121.21 169.61 168.5 31.67 99.72 140.66 102.33
After 171.13 120.05 163.31 167 33.60 100.2 110 99.1
In order to analyze the effectiveness of the three regression algorithms-linear, polynomial, and
Lasso in predicting the data, the dataset used in a previous study [34] will be updated with new data. The
updated dataset will be used to apply the three algorithms and the results for mean squared error (MSE) and R²
will be recorded. These results will be presented in Table 2 to compare the performance of the regression
algorithms before and after the injection of the new data.
Table 2. Results of regression algorithms
Before [34] After
Algorithms R² MSE R² MSE
Linear regression 0.9965 0.0001 0.9975 0.0001
Polynomial Regression 0.9965 0.0001 0.9968 0.0001
Lasso Regression 0.9961 0.0002 0.9962 0.0002
The results show a slight improvement with the use of MARS, which indicates promising potential
for future applications. To further evaluate the effectiveness of MARS, future testing could involve
inexperienced recruits, rather than trained and experienced technicians, to determine its performance under
different circumstances. This could provide more significant results and insights into the system's capabilities.
4.2. Evaluation of number of failures
For the evaluation of MARS, we continued our work with the pilot site, which provided us with the
additional elements necessary for this stage. Indeed, we have recovered the history of breakdowns over the last
two years, for reasons of confidentiality, all the data has been treated in a confidentiality framework like the
rest of our work. The data retrieved includes the type of incident, the nature of the incident, the date, the place,
the material, and the severity. The results of our previous work where we predicted the number of failures per
day for each material [20], indicate that the support vector regression (SVR) model with a gamma value equal
to 0.03, allows for obtaining satisfactory results with an root mean square error (RMSE) equal to 0.879. After
the application of the SVR on the dataset of our pilot site, we applied the model for two consecutive months
before and after the use of MARS. To be able to measure the effectiveness and impact of MARS on our
prediction model, we calculated the RMSE. The results of our experiment are described in Table 3.
The SVR once again proves its effectiveness on this new dataset with an RMSE equal to 0.8563 on
M-1. After the launch of MARS on the site, the workshop managers and unit managers treated 30.77% of the
8. Int J Elec & Comp Eng ISSN: 2088-8708
Implementing sharing platform based on ontology using a sequential recommender … (Zaynabe Ragala)
6761
predicted incidents on average over the month M. Even if the figure remains low in some way, but its impact
on the number of real breakdowns remains satisfactory and visible. Our previous work has proven the
effectiveness of SVR to detect peaks and outliers, this experiment has shown that during the days when we
have a peak and the technician has not treated in advance the totality of the breakdowns predicted in MARS, it
is these days that have made the difference in the calculation of RMSE of our model, for example, the days:
12 and 24.
Table 3. The results of experiment
Day Prediction (M-1) Real (M-1) Prediction(M) Prediction(M) Prediction(M)
1 4 4 3 2 2
2 0 1 1 0 0
3 1 1 1 0 2
4 1 2 2 1 1
5 0 1 1 1 0
6 2 2 2 2 1
7 0 1 2 0 1
8 1 1 3 1 3
9 1 0 1 0 0
10 4 4 1 0 1
11 2 2 0 0 2
12 3 2 6 2 3
13 0 1 2 1 0
14 0 2 2 2 1
15 2 3 1 0 0
16 1 0 3 1 2
17 1 1 3 1 1
18 0 0 5 2 3
19 1 1 1 0 1
20 4 4 0 0 0
21 0 0 2 1 1
22 2 2 0 0 1
23 2 1 1 0 0
24 0 1 6 2 3
25 5 5 3 2 1
26 2 1 1 0 1
27 4 4 0 0 1
28 2 3 1 1 0
29 5 5 3 1 2
30 2 3 0 0 0
RMSE=0.8563 RMSE=1.354
4.3. Synthesis
Our first evaluation test discussed in the previous paragraph shows the positive impact of MARS in
the reduction of predicted failures and the improvement of repair time. These results remain promising and
encouraging to further generalize the use and exploitation of MARS by the rest. We are aware that the
implementation of predictive maintenance is very expensive and complex, but with these first results, we can
push further the work and try to integrate the preventive maintenance programs to propose action plans
combining the two and then minimize the cost of predictive by integrating the cost of preventive. Among the
very interesting comments that came back from the technicians, one of them confirmed that the system
succeeded in proposing a plan, even if the incident is not in the knowledge base, by using the recommendation
techniques used by MARS to alleviate the problems of cold start and sparse data by exploiting the knowledge
of the technicians on similar cases before the initial data is available [35].
5. CONCLUSION
In this paper, the study has progressed to the stage of evaluating and recording feedback on proposed
repair plans and the steps of integrating the feedback to readjust the recommendations as well as updating the
ontologies. The implementation of MARS is one more step towards Maintenance 4.0. The implementation of
MARS and before the construction of the ontology was the solutions decided by the top management to face a
huge departure of experts and a loss of important knowledge and know-how. In addition to its role of providing
intelligent assistance to technicians in their daily work, MARS will allow the conservation and sharing of
knowledge between different technicians. The integration of an expert profile in the validation of action plans
and the evaluation of plans will ensure the consistency and quality of the recorded data. In addition, we plan to
improve the system by integrating the logistical requirements (spare parts, material means) to improve the
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 6, December 2023: 6754-6763
6762
recommended repair plans. On the other hand, an awareness and communication campaign are essential to
make the technicians more reliable and to motivate them to integrate MARS into their daily work. Another
level of improvement is mainly related to the ontology used, indeed our system was based on a prototype of a
single maintenance center, the generalization and evolution of the ontology are essential to extend the scope of
MARS.
REFERENCES
[1] L. I. Aizpurúa, P. E. Z. Saldaña, and A. Z. Saldaña, “Learning for sharing: an empirical analysis of organizational learning and
knowledge sharing,” International Entrepreneurship and Management Journal, vol. 7, no. 4, pp. 509–518, Dec. 2011,
doi: 10.1007/s11365-011-0206-z.
[2] A. de Bem Machado, S. Secinaro, D. Calandra, and F. Lanzalonga, “Knowledge management and digital transformation for Industry
4.0: a structured literature review,” Knowledge Management Research and Practice, vol. 20, no. 2, pp. 320–338, Mar. 2022,
doi: 10.1080/14778238.2021.2015261.
[3] S. J. Barnes, “Information management research and practice in the post-COVID-19 world,” International Journal of Information
Management, vol. 55, Dec. 2020, doi: 10.1016/j.ijinfomgt.2020.102175.
[4] P. Kane and D. Twohig, “The implications of tacit and explicit knowledge for technology transfer: When it goes well and when it
goes wrong and what can digital do to help!” Tudublin, vol. 17, no. 2, 2022.
[5] C. D. Wylie and S. J. Kim, “Socialization, tacit knowledge, and conceptions of ‘experience’ among engineers,” Engineering Studies,
vol. 14, no. 1, pp. 17–33, Jan. 2022, doi: 10.1080/19378629.2022.2037617.
[6] Z. Ragala, A. Retbi, and S. Bennani, “An approach of ontology and knowledge base for railway maintenance,” International Journal
of Electrical and Computer Engineering (IJECE), vol. 13, no. 5, pp. 5282–5295, Oct. 2023, doi: 10.11591/ijece.v13i5.pp5282-
5295.
[7] P. A. Mahatmavidya, R. P. Soesanto, A. Kurniawati, and L. Andrawina, “Characteristic and competency measurement instrument
development for maintenance staff of mechanical expertise with SECI method: A case of manufacturing company,” IOP Conference
Series: Materials Science and Engineering, vol. 319, Mar. 2018, doi: 10.1088/1757-899X/319/1/012008.
[8] P. Nesi, P. Bellini, and N. Rauch, “Ontology construction and knowledge base feeding and cleaning for smart-city services,”
in IEEE 19th
International Conference on Engineering of Complex Computer Systems (ICECCS 2014), 2014.
[9] B. Zhong, H. Wu, H. Li, S. Sepasgozar, H. Luo, and L. He, “A scientometric analysis and critical review of construction related
ontology research,” Automation in Construction, vol. 101, pp. 17–31, May 2019, doi: 10.1016/j.autcon.2018.12.013.
[10] J. K. Tarus, Z. Niu, and G. Mustafa, “Knowledge-based recommendation: a review of ontology-based recommender systems for e-
learning,” Artificial Intelligence Review, vol. 50, no. 1, pp. 21–48, Jun. 2018, doi: 10.1007/s10462-017-9539-5.
[11] I. Williams, “An ontology based collaborative recommender system for security requirements elicitation,” in 2018 IEEE 26th
International Requirements Engineering Conference (RE), Aug. 2018, pp. 448–453, doi: 10.1109/RE.2018.00060.
[12] P. Bellini, P. Nesi, and N. Rauch, “Knowledge base construction process for smart-city services,” in 2014 19th
International
Conference on Engineering of Complex Computer Systems, Aug. 2014, pp. 186–189, doi: 10.1109/ICECCS.2014.33.
[13] F. Xu, X. Liu, W. Chen, C. Zhou, and B. Cao, “Ontology-based method for fault diagnosis of loaders,” Sensors, vol. 18, no. 3,
Feb. 2018, doi: 10.3390/s18030729.
[14] T. Ruotsalo, Methods and applications for ontology-based recommender systems, TKK dissertations, 2010.
[15] M. Arafeh, P. Ceravolo, A. Mourad, E. Damiani, and E. Bellini, “Ontology based recommender system using social network data,”
Future Generation Computer Systems, vol. 115, pp. 769–779, Feb. 2021, doi: 10.1016/j.future.2020.09.030.
[16] T. Thanapalasingam, F. Osborne, A. Birukou, and E. Motta, “Ontology-based recommendation of editorial products,” in The
Semantic Web – ISWC 2018: 17th
International Semantic Web Conference, Monterey, vol. 11137, 2018, pp. 341–358, doi:
10.1007/978-3-030-00668-6_21.
[17] L. O. Iheukwumere-Esotu and A. Yunusa-Kaltungo, “Knowledge management and experience transfer in major maintenance
activities: A practitioner’s perspective,” Sustainability, vol. 14, no. 1, Dec. 2021, doi: 10.3390/su14010052.
[18] K. Abdi et al., “The effect of knowledge management, organizational culture and organizational learning on innovation
inautomotive industry,” Journal of Business Economics and Management, vol. 19, no. 1, pp. 1–19, Apr. 2018,
doi: 10.3846/jbem.2018.1477.
[19] B. Walek and P. Spackova, “Content-based recommender system for online stores using expert system,” in 2018 IEEE First
International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), Sep. 2018, pp. 164–165,
doi: 10.1109/AIKE.2018.00036.
[20] Z. Ragala, A. Retbi, and S. Bennani, “An approach based on time-series and neural networks for safety railway incident prediction,”
Digital Signal Processing and Artificial Intelligence for Automatic Learning, vol. 1, no. 1, pp. 11–27, Jun. 2022,
doi: 10.6025/dspaial/2022/1/1/11-27.
[21] R. Banik, Hands-on recommendation systems with python: Start building powerful and personalized, recommendation engines with
python. Packt Publishing; 1st edition, 2018.
[22] C. Ajaegbu, “An optimized item-based collaborative filtering algorithm,” Journal of Ambient Intelligence and Humanized
Computing, vol. 12, no. 12, pp. 10629–10636, Dec. 2021, doi: 10.1007/s12652-020-02876-1.
[23] L. Jean-Baptiste, Ontologies with python: Programming OWL 2.0 ontologies with python and owlready2. Berkeley, CA: Apress,
2021, doi: 10.1007/978-1-4842-6552-9.
[24] A. Kouadria, O. Nouali, and M. Y. H. Al-Shamri, “A multi-criteria collaborative filtering recommender system using learning-to-
rank and rank aggregation,” Arabian Journal for Science and Engineering, vol. 45, no. 4, pp. 2835–2845, Apr. 2020,
doi: 10.1007/s13369-019-04180-3.
[25] S. Das, “Maintenance action recommendation using collaborative filtering,” International Journal of Prognostics and Health
Management, vol. 4, no. 2, pp. 1–7, 2013.
[26] S. E. Middleton, D. De Roure, and N. R. Shadbolt, “Ontology-based recommender systems,” in Handbook on Ontologies, S. Staab
and R. Studer, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 477–498, doi: 10.1007/978-3-540-24750-0_24.
[27] K. Tashmetov, R. Aliev, M. Aliev, and Т. Tashmetov, “Expert system for diagnosing faults railroad switch of automation and
telemechanic systems,” in AIP Conference Proceedings, 2022, doi: 10.1063/5.0089488.
[28] G. George and A. M. Lal, “Review of ontology-based recommender systems in e-learning,” Computers and Education, vol. 142,
Dec. 2019, doi: 10.1016/j.compedu.2019.103642.
10. Int J Elec & Comp Eng ISSN: 2088-8708
Implementing sharing platform based on ontology using a sequential recommender … (Zaynabe Ragala)
6763
[29] J. K. Tarus, Z. Niu, and A. Yousif, “A hybrid knowledge-based recommender system for e-learning based on ontology and
sequential pattern mining,” Future Generation Computer Systems, vol. 72, pp. 37–48, Jul. 2017, doi: 10.1016/j.future.2017.02.049.
[30] A. Al-Najim, A. Al-Amoudi, K. Ooishi, and M. Al-Nasser, “Intelligent maintenance recommender system,” in 2022 7th
International Conference on Data Science and Machine Learning Applications (CDMA), Mar. 2022, pp. 212–218,
doi: 10.1109/CDMA54072.2022.00040.
[31] Y. Huang, M. Gardoni, and A. Coulibaly, “A decision support system designed for personalized maintenance recommendation
based on proactive maintenance,” in Proceedings of ICED 09, the 17th
International Conference on Engineering Design, 2009,
vol. 4, pp. 191–202.
[32] L. Jongwook, “Ontology-based recommendation system for maintenance of Korean architectural heritage,” Journal of The Korea
Society of Computer and Information, vol. 24, no. 10, pp. 49–55, 2019.
[33] N. Ali and J.-E. Hong, “Failure detection and prevention for cyber-physical systems ising ontology-based knowledge base,”
Computers, vol. 7, no. 4, Dec. 2018, doi: 10.3390/computers7040068.
[34] Z. Ragala, A. Retbi, and S. Bennani, “MTTR prediction of railway rolling stock using regression algorithms,” in 2022 International
Conference on Intelligent Systems and Computer Vision (ISCV), May 2022, pp. 1–6, doi: 10.1109/ISCV54655.2022.9806066.
[35] N. Alghamdi and F. Assiri, “Solving the cold-start problem in recommender systems using contextual information in Arabic from
calendars,” Arabian Journal for Science and Engineering, vol. 45, no. 12, pp. 10939–10947, Dec. 2020, doi: 10.1007/s13369-020-
04890-z.
BIOGRAPHIES OF AUTHORS
Zaynabe Ragala is A Ph.D. student at Rime Team-Networking, Modeling and
e-learning Team- Masi Laboratory- Engineering.3S Research Center-Mohammadia School of
Engineers (EMI) Mohammed V University in Rabat, Morocco. Engineer degree in Computer
Science in 2009. Her research interests are maintenance predictive, railway, knowledge graph,
ontology, machine learning and deep learning. She can be contacted at email:
zaynaberagala@research.emi.ac.ma.
Asmaâ Retbi is a Full Professor at Mohammadia School of Engineers. Engineer
degree in Computer Science in 1997. DESA degree in Computer Science in 2000. Ph.D. in
Computer Science in 2015. Professor at the Computer Science Department, EMI. Ongoing
research interests: e-learning, authoring tool, MDE, and domain specific modeling. She can be
contacted at email: retbi@emi.ac.ma.
Samir Bennani is a Full Professor and Deputy Director of Students and Academic
Affairs at Mohammadia School of Engineers. Engineer degree in Computer Science in 1982.
Ph.D. in Computer Science in 2005. Professor at the Computer Science Department, EMI. He
has 34 recent publications papers between 2014 and 2017. Ongoing research interests: SI,
modeling in software engineering, information system, e-learning content engineering,
tutoring, assessment, and tracking. She can be contacted at email: sbennani@emi.ac.ma.