20,387 research outputs found
Semantic Support for Log Analysis of Safety-Critical Embedded Systems
Testing is a relevant activity for the development life-cycle of Safety
Critical Embedded systems. In particular, much effort is spent for analysis and
classification of test logs from SCADA subsystems, especially when failures
occur. The human expertise is needful to understand the reasons of failures,
for tracing back the errors, as well as to understand which requirements are
affected by errors and which ones will be affected by eventual changes in the
system design. Semantic techniques and full text search are used to support
human experts for the analysis and classification of test logs, in order to
speedup and improve the diagnosis phase. Moreover, retrieval of tests and
requirements, which can be related to the current failure, is supported in
order to allow the discovery of available alternatives and solutions for a
better and faster investigation of the problem.Comment: EDCC-2014, BIG4CIP-2014, Embedded systems, testing, semantic
discovery, ontology, big dat
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
Wireless sensor networks monitor dynamic environments that change rapidly
over time. This dynamic behavior is either caused by external factors or
initiated by the system designers themselves. To adapt to such conditions,
sensor networks often adopt machine learning techniques to eliminate the need
for unnecessary redesign. Machine learning also inspires many practical
solutions that maximize resource utilization and prolong the lifespan of the
network. In this paper, we present an extensive literature review over the
period 2002-2013 of machine learning methods that were used to address common
issues in wireless sensor networks (WSNs). The advantages and disadvantages of
each proposed algorithm are evaluated against the corresponding problem. We
also provide a comparative guide to aid WSN designers in developing suitable
machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial
Toward Network-based DDoS Detection in Software-defined Networks
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential. To accomplish this, three main tasks for an effective intrusion detection system have been identified: monitor network traffic, categorize and identify anomalous behavior in near real time, and take appropriate action against the identified threat. This system leverages distributed SDN architecture and the principles of Artificial Immune Systems and Self-Organizing Maps to build a network-based intrusion detection system capable of detecting and terminating DDoS attacks in progress
Clustering-based analysis of semantic concept models for video shots
In this paper we present a clustering-based method for representing semantic concepts on multimodal low-level feature spaces and study the evaluation of the goodness of such models with entropy-based methods. As different semantic concepts in video are most accurately represented with different features and modalities, we utilize the relative model-wise confidence values of the feature extraction techniques in weighting them automatically. The method also provides a natural way of measuring the similarity of different concepts in a multimedia lexicon. The experiments of the paper are conducted using the development set of the TRECVID 2005 corpus together with a common annotation for 39 semantic concept
Giving Neurons to Sensors: An Approach to QoS Management Through Artificial Intelligence in Wireless Networks
For the latest ten years, many authors have focused their investigations
in wireless sensor networks. Different researching issues have
been extensively developed: power consumption, MAC protocols, selforganizing
network algorithms, data-aggregation schemes, routing protocols,
QoS management, etc. Due to the constraints on data processing
and power consumption, the use of artificial intelligence has been historically
discarded. However, in some special scenarios the features of
neural networks are appropriate to develop complex tasks such as path
discovery. In this paper, we explore the performance of two very well
known routing paradigms, directed diffusion and Energy-Aware Routing,
and our routing algorithm, named SIR, which has the novelty of being
based on the introduction of neural networks in every sensor node. Extensive
simulations over our wireless sensor network simulator, OLIMPO,
have been carried out to study the efficiency of the introduction of neural
networks. A comparison of the results obtained with every routing protocol
is analyzed. This paper attempts to encourage the use of artificial
intelligence techniques in wireless sensor nodes
Using Artificial Intelligence in Wireless Sensor Routing Protocols
This paper represents a dissertation about how an artificial
intelligence technique can be applied to wireless sensor networks. Due
to the constraints on data processing and power consumption, the use
of artificial intelligence has been historically discarded in these kind of
networks. However, in some special scenarios the features of neural networks
are appropriate to develop complex tasks such as path discovery.
In this paper, we explore the performance of two very well known routing
paradigms, directed diffusion and Energy-Aware Routing, and our
routing algorithm, named SIR, which has the novelty of being based
on the introduction of neural networks in every sensor node. Extensive
simulations over our wireless sensor network simulator, OLIMPO, have
been carried out to study the efficiency of the introduction of neural networks.
A comparison of the results obtained with every routing protocol
is analyzed
- …