2,150 research outputs found

    The 2-Tuple Linguistic Representation Approach for Learning Competence Evaluation

    Get PDF

    KLAIM: A Kernel Language for Agents Interaction and Mobility

    Get PDF
    We investigate the issue of designing a kernel programming language for mobile computing and describe KLAIM, a language that supports a programming paradigm where processes, like data, can be moved from one computing environment to another. The language consists of a core Linda with multiple tuple spaces and of a set of operators for building processes. KLAIM naturally supports programming with explicit localities. Localities are first-class data (they can be manipulated like any other data), but the language provides coordination mechanisms to control the interaction protocols among located processes. The formal operational semantics is useful for discussing the design of the language and provides guidelines for implementations. KLAIM is equipped with a type system that statically checks access rights violations of mobile agents. Types are used to describe the intentions (read, write, execute, etc.) of processes in relation to the various localities. The type system is used to determine the operations that processes want to perform at each locality, and to check whether they comply with the declared intentions and whether they have the necessary rights to perform the intended operations at the specific localities. Via a series of examples, we show that many mobile code programming paradigms can be naturally implemented in our kernel language. We also present a prototype implementaton of KLAIM in Java

    Temporal fuzzy association rule mining with 2-tuple linguistic representation

    Get PDF
    This paper reports on an approach that contributes towards the problem of discovering fuzzy association rules that exhibit a temporal pattern. The novel application of the 2-tuple linguistic representation identifies fuzzy association rules in a temporal context, whilst maintaining the interpretability of linguistic terms. Iterative Rule Learning (IRL) with a Genetic Algorithm (GA) simultaneously induces rules and tunes the membership functions. The discovered rules were compared with those from a traditional method of discovering fuzzy association rules and results demonstrate how the traditional method can loose information because rules occur at the intersection of membership function boundaries. New information can be mined from the proposed approach by improving upon rules discovered with the traditional method and by discovering new rules

    On a Formal and User-friendly Linguistic Approach to Access Control of Electronic Health Data

    Get PDF
    The importance of the exchange of Electronic Health Records (EHRs) between hospitals has been recognized by governments and institutions. Due to the sensitivity of data exchanged, only mature standards and implementations can be chosen to operate. This exchange process is of course under the control of the patient, who decides who has the rights to access her personal healthcare data and who has not, by giving her personal privacy consent. Patients’ privacy consent is regulated by local legislations, which can vary frequently from region to region. The technology implementing such privacy aspects must be highly adaptable, often resulting in complex security scenarios that cannot be easily managed by patients and software designers. To overcome such security problems, we advocate the use of a linguistic approach that relies on languages for expressing policies with solid mathematical foundations. Our approach bases on FACPL, a policy language we have intentionally designed by taking inspiration from OASIS XACML, the de-facto standard used in all projects covering secure EHRs transmission protected by patients’ privacy consent. FACPL can express policies similar to those expressible by XACML but, differently from XACML, it has an intuitive syntax, a formal semantics and easy to use software tools supporting policy development and enforcement. In this paper, we present the potentialities of our approach and outline ongoing work

    Architecture value mapping: using fuzzy cognitive maps as a reasoning mechanism for multi-criteria conceptual design evaluation

    Get PDF
    The conceptual design phase is the most critical phase in the systems engineering life cycle. The design concept chosen during this phase determines the structure and behavior of the system, and consequently, its ability to fulfill its intended function. A good conceptual design is the first step in the development of a successful artifact. However, decision-making during conceptual design is inherently challenging and often unreliable. The conceptual design phase is marked by an ambiguous and imprecise set of requirements, and ill-defined system boundaries. A lack of usable data for design evaluation makes the problem worse. In order to assess a system accurately, it is necessary to capture the relationships between its physical attributes and the stakeholders\u27 value objectives. This research presents a novel conceptual architecture evaluation approach that utilizes attribute-value networks, designated as \u27Architecture Value Maps\u27, to replicate the decision makers\u27 cogitative processes. Ambiguity in the system\u27s overall objectives is reduced hierarchically to reveal a network of criteria that range from the abstract value measures to the design-specific performance measures. A symbolic representation scheme, the 2-Tuple Linguistic Representation is used to integrate different types of information into a common computational format, and Fuzzy Cognitive Maps are utilized as the reasoning engine to quantitatively evaluate potential design concepts. A Linguistic Ordered Weighted Average aggregation operator is used to rank the final alternatives based on the decision makers\u27 risk preferences. The proposed methodology provides systems architects with the capability to exploit the interrelationships between a system\u27s design attributes and the value that stakeholders associate with these attributes, in order to design robust, flexible, and affordable systems --Abstract, page iii

    Study on Evaluating Wireless Sensor Network Security Based on Uncertain Linguistic Information

    Get PDF
    Wireless sensor network (WSN), as an integrated network which can perform information gathering, processing and delivering, can connect the real world and logistic information world. It is greatly changing the interaction between people and nature. There are wide potential applications for wireless sensor network, such as industry, agriculture, military affairs, environment monitoring, biomedicine, city managing and disaster succoring. The problem of evaluating security of Wireless Sensor Network (WSN) with uncertain linguistic information is the multiple attribute group decision making (MAGDM). In this paper, we investigate the multiple attribute group decision making (MAGDM) problems for evaluating the wireless sensor network (WSN) security with uncertain linguistic information. We utilize the uncertain linguistic weighted averaging (ULWA) operator to aggregate the uncertain linguistic information corresponding to each alternative and get the overall value of the alternatives, then rank the alternatives and select the most desirable one(s) by using the formula of the degree of possibility for the comparison between two uncertain linguistic variables. Finally, an illustrative example is given

    Dynamic Federated Learning Model for Identifying Adversarial Clients

    Get PDF
    Federated learning, as a distributed learning that conducts the training on the local devices without accessing to the training data, is vulnerable to dirty-label data poisoning adversarial attacks. We claim that the federated learning model has to avoid those kind of adversarial attacks through filtering out the clients that manipulate the local data. We propose a dynamic federated learning model that dynamically discards those adversarial clients, which allows to prevent the corruption of the global learning model. We evaluate the dynamic discarding of adversarial clients deploying a deep learning classification model in a federated learning setting, and using the EMNIST Digits and Fashion MNIST image classification datasets. Likewise, we analyse the capacity of detecting clients with poor data distribution and reducing the number of rounds of learning by selecting the clients to aggregate. The results show that the dynamic selection of the clients to aggregate enhances the performance of the global learning model, discards the adversarial and poor clients and reduces the rounds of learning.Comment: 11 pages, 6 figure
    corecore