International Journal of Organizational and Collective Intelligence
Latest Publications


TOTAL DOCUMENTS

202
(FIVE YEARS 63)

H-INDEX

7
(FIVE YEARS 1)

Published By Igi Global

1947-9352, 1947-9344

The permanent acquisition of the technical environment state and the ability to react to changes in this environment as well as to adapt to it are nowadays crucial for any information system. In this article, the authors present a well-defined model to guarantee in a simple way the design and the realization of adaptive information systems. This model is based on the Unified Modeling Language (UML) which is a widely known modeling standard. Its coverage is limited to bringing out the graded parties in the design of adaptive information systems. A future definition of a metamodel less related to UML language is therefore possible. The authors also present a code generator based on a model transformation technique. This generator allows you to partially produce domain-specific code as needed. A more complete code generator will come to ensure automatic generation of the code.


This research proposes a tweaked scheme based on DNA fragment assembly to improve protection over insecure channel. The proposed procedure utilizes binary coding to change over an underlying plaintext into a reference DNA arrangement to deal with the fragmentation. DNA fragment key expansion is applied over the reference DNA sequence to make the short-chain fragments. The redundancy in the long-chain of reference DNA is removed using DNA fragment assembly. A look-up table is generated to store the binary values of overlapped fragments to be reassembled during the encryption and decryption processes to prevent artefacts. Also, it is used in an overlapped sequence to counteract cipher decomposition. The results and comparisons demonstrate that the proposed scheme can balance the three most important characteristics of any DNA masking scheme: payload, capacity, and BPN. Moreover, the potential for cracking the proposed tweaked method is more complex than the current strategies.


In Cloud based Big Data applications, Hadoop has been widely adopted for distributed processing large scale data sets. However, the wastage of energy consumption of data centers still constitutes an important axis of research due to overuse of resources and extra overhead costs. As a solution to overcome this challenge, a dynamic scaling of resources in Hadoop YARN Cluster is a practical solution. This paper proposes a dynamic scaling approach in Hadoop YARN (DSHYARN) to add or remove nodes automatically based on workload. It is based on two algorithms (scaling up/down) which are implemented to automate the scaling process in the cluster. This article aims to assure energy efficiency and performance of Hadoop YARN’ clusters. To validate the effectiveness of DSHYARN, a case study with sentiment analysis on tweets about covid-19 vaccine is provided. the goal is to analyze tweets of the people posted on Twitter application. The results showed improvement in CPU utilization, RAM utilization and Job Completion time. In addition, the energy has been reduced of 16% under average workload.


During the recent years, there is an increasing demand for software systems that dynamically adapt their behavior at run-time in response to changes in user preferences, execution environment, and system requirements, being thus context-aware. Authors are referring here to requirements related to both functional and non-functional aspects of system behavior since changes can also be induced by failures or unavailability of parts of the software system itself. To ensure the coherence and correctness of the proposed model, all relevant properties of system entities are precisely and formally described. This is especially true for non-functional properties, such as performance, availability, and security. This article discusses semantic concepts for the specification of non-functional requirements, taking into account the specific needs of a context-aware system. Based on these semantic concepts, we present a specification language that integrates non-functional requirements design and validation in the development process of context-aware self-adaptive systems.


Automatic environmental monitoring is a field that encompasses several scientific practices for the assessment of risks that may negatively impact a given environment, such as the forest. A forest is a natural environment that hosts various forms of plant and animal life, so preserving the forest is a top priority. To this end, the authors of this paper will focus on the development of an intelligent system for the early detection of forest fires, based on an IoT solution. This latter will thus facilitate the exploitation of the functionalities offered by the Cloud and mobile applications. Detecting and predicting forest fires with accuracy is a difficult task that requires machine learning and an in-depth analysis of environmental conditions. This leads the authors to adopt the forward neural network algorithm by highlighting its contribution through real experiments, performed on the prototype developed in this paper.


The permanent acquisition of the technical environment state and the ability to react to changes in this environment as well as to adapt to it are nowadays crucial for any information system. In this article, the authors present a well-defined model to guarantee in a simple way the design and the realization of adaptive information systems. This model is based on the Unified Modeling Language (UML) which is a widely known modeling standard. Its coverage is limited to bringing out the graded parties in the design of adaptive information systems. A future definition of a metamodel less related to UML language is therefore possible. The authors also present a code generator based on a model transformation technique. This generator allows you to partially produce domain-specific code as needed. A more complete code generator will come to ensure automatic generation of the code.


The IoT is a new concept that provides a world where smart, connected, embedded systems operate, giving rise to the amount of data from different sources that are considered to have highly useful and valuable information. Data mining would play a critical role in creating smarter IoT. Traditional care of an elderly person is a difficult and complex task. The need to have a caregiver with the elderly person almost all the time drains the human and financial resources of the health care system. The emergence of Artificial intelligence has allowed the conception of technical assistance where it helps and reduces the time spent by the caregiver with the elderly person. This work aims to focus on analyzing techniques that are used for prediction purposes of falls in the elderly. We examine the applicability of three classification algorithms for IoT data. These algorithms are analyzed and a comparative study is undertaken to find the classifier that performs the best analysis on the dataset using a set of predefined performance metrics to compare the results of each classifier.


Author(s):  
Kapil Kumar ◽  
Arvind Kumar ◽  
Vimal Kumar ◽  
Sunil Kumar

The objective of this paper is to propose and develop a hybrid intrusion detection system to handle series and non-series data by applying the two different concepts that are named clustering and autocorrelation function in a single architecture. There is a need to propose and build a system that can handle both types of data whether it is series or non-series. Therefore, the authors used two concepts to generate a robust approach to craft a hybrid intrusion detection system. The authors utilize an unsupervised clustering approach that is used to categorize the data based on domain similarity to handle non-series data and another approach is based on autocorrelation function to handle series data. The approach is consumed in single architecture where it carries data as input from both host-based intrusion detection systems and network-based intrusion detection systems. The result shows that the hybrid intrusion detection system is categorizing data based on the optimal number of clusters obtained through the elbow method in clustering.


Author(s):  
Abdelkader Khobzaoui ◽  
Kadda Benyahia ◽  
Boualem Mansouri ◽  
Sofiane Boukli-Hacene

Internet of Things (IoT) is a set of connected smart devices providing and sharing rich data in real-time without involving a human being. However, IoT is a security nightmare because like in the early computer systems, security issues are not considered in the design step. Thereby, each IoT system could be susceptible to malicious users and uses. To avoid these types of situations, many approaches and techniques are proposed by both academic and industrial researches.DNA computing is an emerging and relatively new field dealing with data encryption using a DNA computing concepts. This technique allows rapid and secure data transfer between connected objects with low power consumption. In this paper, authors propose a symmetric cryptography method based on DNA. This method consists in cutting the message to encrypt/decrypt in blocks of characters and use a symmetric key extracted from a chromosome for encryption and decryption. Implemented on the embedded platform of a Raspberry Pi, the proposed method shows good performances in terms of robustness, complexity and attack resistance.


In this article, the authors treat the problem of container storage in the export direction, exactly in the containership loading process. The authors propose an approach to the problem of container placement in a containership by describing a decision model to help decision-makers (handling operators) to minimize the total container movement. This is obtained by using a multicriteria decision method AHP (analytic hierarchy process) to identify the best location of any container. Here, the authors consider four criteria: the container destination, the container weight, the departure date of the container, and the container type.


Sign in / Sign up

Export Citation Format

Share Document