801 research outputs found

    Intégration de l’analyse prédictive dans des systèmes auto-adaptatifs

    Get PDF
    In this thesis we proposed a proactive self-adaptation by integrating predictive analysis into two phases of the software process. At design time, we propose a predictive modeling process, which includes the activities: define goals, collect data, select model structure, prepare data, build candidate predictive models, training, testing and cross-validation of the candidate models and selection of the ''best'' models based on a measure of model goodness. At runtime, we consume the predictions from the selected predictive models using the running system actual data. Depending on the input data and the time allowed for learning algorithms, we argue that the software system can foresee future possible input variables of the system and adapt proactively in order to accomplish middle and long term goals and requirements.Au cours des dernières années, il y a un intérêt croissant pour les systèmes logiciels capables de faire face à la dynamique des environnements en constante évolution. Actuellement, les systèmes auto-adaptatifs sont nécessaires pour l’adaptation dynamique à des situations nouvelles en maximisant performances et disponibilité. Les systèmes ubiquitaires et pervasifs fonctionnent dans des environnements complexes et hétérogènes et utilisent des dispositifs à ressources limitées où des événements peuvent compromettre la qualité du système. En conséquence, il est souhaitable de s’appuyer sur des mécanismes d’adaptation du système en fonction des événements se produisant dans le contexte d’exécution. En particulier, la communauté du génie logiciel pour les systèmes auto-adaptatif (Software Engineering for Self-Adaptive Systems - SEAMS) s’efforce d’atteindre un ensemble de propriétés d’autogestion dans les systèmes informatiques. Ces propriétés d’autogestion comprennent les propriétés dites self-configuring, self-healing, self-optimizing et self-protecting. Afin de parvenir à l’autogestion, le système logiciel met en œuvre un mécanisme de boucle de commande autonome nommé boucle MAPE-K [78]. La boucle MAPE-K est le paradigme de référence pour concevoir un logiciel auto-adaptatif dans le contexte de l’informatique autonome. Cet modèle se compose de capteurs et d’effecteurs ainsi que quatre activités clés : Monitor, Analyze, Plan et Execute, complétées d’une base de connaissance appelée Knowledge, qui permet le passage des informations entre les autres activités [78]. L’étude de la littérature récente sur le sujet [109, 71] montre que l’adaptation dynamique est généralement effectuée de manière réactive, et que dans ce cas les systèmes logiciels ne sont pas en mesure d’anticiper des situations problématiques récurrentes. Dans certaines situations, cela pourrait conduire à des surcoûts inutiles ou des indisponibilités temporaires de ressources du système. En revanche, une approche proactive n’est pas simplement agir en réponse à des événements de l’environnement, mais a un comportement déterminé par un but en prenant par anticipation des initiatives pour améliorer la performance du système ou la qualité de service

    Design and evaluation of wireless dense networks : application to in-flight entertainment systems

    Get PDF
    Le réseau sans fil est l'un des domaines de réseautage les plus prometteurs avec des caractéristiques uniques qui peuvent fournir la connectivité dans les situations où il est difficile d'utiliser un réseau filaire, ou lorsque la mobilité des nœuds est nécessaire. Cependant, le milieu de travail impose généralement diverses contraintes, où les appareils sans fil font face à différents défis lors du partage des moyens de communication. De plus, le problème s'aggrave avec l'augmentation du nombre de nœuds. Différentes solutions ont été introduites pour faire face aux réseaux très denses. D'autre part, un nœud avec une densité très faible peut créer un problème de connectivité et peut conduire à l'optension de nœuds isolés et non connectes au réseau. La densité d'un réseau est définit en fonction du nombre de nœuds voisins directs au sein de la portée de transmission du nœud. Cependant, nous croyons que ces métriques ne sont pas suffisants et nous proposons une nouvelle mesure qui considère le nombre de voisins directs et la performance du réseau. Ainsi, la réponse du réseau, respectant l'augmentation du nombre de nœuds, est considérée lors du choix du niveau de la densité. Nous avons défini deux termes: l'auto-organisation et l'auto-configuration, qui sont généralement utilisés de façon interchangeable dans la littérature en mettant en relief la différence entre eux. Nous estimons qu'une définition claire de la terminologie peut éliminer beaucoup d'ambiguïté et aider à présenter les concepts de recherche plus clairement. Certaines applications, telles que Ies systèmes "In-Flight Entertainment (IFE)" qui se trouvent à l'intérieur des cabines d'avions, peuveut être considérées comme des systèmes sans fil de haute densité, même si peu de nœuds sont relativement présents. Pour résoudre ce problème, nous proposons une architecture hétérogène de différentes technologies à fin de surmonter les contraintes spécifiques de l'intérieur de la cabine. Chaque technologie vise à résoudre une partie du problème. Nous avons réalisé diverses expérimentations et simulations pour montrer la faisabilité de l'architecture proposée. Nous avons introduit un nouveau protocole d'auto-organisation qui utilise des antennes intelligentes pour aider certains composants du système IFE; à savoir les unités d'affichage et leurs systèmes de commande, à s'identifier les uns les autres sans aucune configuration préliminaire. Le protocole a été conçu et vérifié en utilisant le langage UML, puis, un module de NS2 a été créé pour tester les différents scénarios.Wireless networking is one of the most challenging networking domains with unique features that can provide connectivity in situations where it is difficult to use wired networking, or when ! node mobility is required. However, the working environment us! ually im poses various constrains, where wireless devices face various challenges when sharing the communication media. Furthermore, the problem becomes worse when the number of nodes increase. Different solutions were introduced to cope with highly dense networks. On the other hand, a very low density can create a poor connectivity problem and may lead to have isolated nodes with no connection to the network. It is common to define network density according to the number of direct neighboring nodes within the node transmission range. However, we believe that such metric is not enough. Thus, we propose a new metric that encompasses the number of direct neighbors and the network performance. In this way, the network response, due to the increasing number of nodes, is considered when deciding the density level. Moreover, we defined two terms, self-organization and self-configuration, which are usually used interchangeably in the literature through highlighting the difference ! between them. We believe that having a clear definition for terminology can eliminate a lot of ambiguity and help to present the research concepts more clearly. Some applications, such as In-Flight Entertainment (IFE) systems inside the aircraft cabin, can be considered as wirelessly high dense even if relatively few nodes are present. To solve this problem, we propose a heterogeneous architecture of different technologies to overcome the inherited constrains inside the cabin. Each technology aims at solving a part of the problem. We held various experimentation and simulations to show the feasibility of the proposed architecture

    Exploring Resilience

    Get PDF
    Resilience has become an important topic on the safety research agenda and in organizational practice. Most empirical work on resilience has been descriptive, identifying characteristics of work and organizing activity which allow organizations to cope with unexpected situations. Fewer studies have developed testable models and theories that can be used to support interventions aiming to increase resilience and improve safety. In addition, the absent integration of different system levels from individuals, teams, organizations, regulatory bodies, and policy level in theory and practice imply that mechanisms through which resilience is linked across complex systems are not yet well understood. Scientific efforts have been made to develop constructs and models that present relationships; however, these cannot be characterized as sufficient for theory building. There is a need for taking a broader look at resilience practices as a foundation for developing a theoretical framework that can help improve safety in complex systems. This book does not advocate for one definition or one field of research when talking about resilience; it does not assume that the use of resilience concepts is necessarily positive for safety. We encourage a broad approach, seeking inspiration across different scientific and practical domains for the purpose of further developing resilience at a theoretical and an operational level of relevance for different high-risk industries. The aim of the book is twofold: 1. To explore different approaches for operationalization of resilience across scientific disciplines and system levels. 2. To create a theoretical foundation for a resilience framework across scientific disciplines and system levels. By presenting chapters from leading international authors representing different research disciplines and practical fields we develop suggestions and inspiration for the research community and practitioners in high-risk industries. This book is Open Access under a CC-BY licence. ; Explores different approaches for operationalization of resilience across scientific disciplines and system levels Creates a theoretical foundation for a resilience framework across scientific disciplines and system levels Develops suggestions and inspiration for the research community and practitioners in high-risk industries Presents chapters from leading international authors representing different research disciplines and practical field

    Using phase space attractors to evaluate system safety constraint enforcement : case study in space shuttle mission control procedure rework

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Engineering Systems Division, 2009.Vita. Cataloged from PDF version of thesis.Includes bibliographical references (p. 390-409).As the complexity and influence of engineering systems in modern society increases, so too does their potential to create counterintuitive and catastrophic accidents. Increasingly, the accidents encountered in these systems are defying the linearized notions of accident causality that-though developed for the simpler engineered systems of the past-are prevalently used for accident prevention today. In this dissertation, an alternative approach to accident prevention based on systems theory-the Systems-Theoretic Accident Model and Processes (STAMP) and STAMP-based hazard analysis (STPA)-is augmented with the notion of using phase space attractors to evaluate how well STAMP safety control structures enforce system safety constraints. Phase space attractors are mathematical results that emerge from the behavior of systems with dynamic structures that draw or constrain these systems to specific regions of their phase space in spite of a range of conditions. Accordingly, the goal in using this notion for the evaluation of safety constraint enforcement is to identify and analyze the attractors produced by a safety control structure to determine if it will adequately "attract" the system to safe states in spite of a range of unforeseeable conditions. Support for this approach to evaluating STAMP safety control structures is provided through the study of a safety control structure in an existing complex, socio-technical system. This case study is focused on a safety control process-referred to as Procedure Rework-used in Space Shuttle Mission Control to update procedures during in-flight operations as they are invalidated by changes in the state of the Space Shuttle and its environment.(cont.) Simulation models of procedure rework are developed through physical and human factors principles and calibrated with data from five Space Shuttle missions; producing simulation results with deviations from the historical data that are-as characterized by Theil Inequality Statistics-small and primarily due to cycles and noise that are not relevant to the models' purpose. The models are used to analyze the attractor produced by the Procedure Rework Process across varied conditions, including a notional crewed spacecraft mission to a distant celestial body. A detrimental effect in the process is identified-and shown to be potentially far more severe than light delay on a mission to a distant celestial body-and approaches to mitigating the effect are explored. Finally, the analysis conducted is described as a generalizeable process for using phase space attractors to evaluate system safety constraint enforcement in engineering systems.by Brandon D. Owens.Ph.D

    A framework for robust control of uncertainty in self-adaptive software connectors

    Get PDF
    Context and motivations. The desired behavior of a system in ubiquitous environments considers not only its correct functionality, but also the satisfaction of its non-functional properties, i.e., its quality of service. Given the heterogeneity and dynamism characterizing the ubiquitous environments and the need for continuous satisfaction of non-functional properties, self-adaptive solutions appear to be an appropriate approach to achieve interoperability. In this work, self-adaptation is adopted to enable software connectors to adapt the interaction protocols run by the connected components to let them communicate in a timely manner and with the required level of quality. However, this self-adaptation should be dependable, reliable and resilient to be adopted in dynamic, unpredictable environments with different sources of uncertainty. The majority of current approaches for the construction of self-adaptive software ignore the uncertainty underlying non-functional requirement verification and adaptation reasoning. Consequently, these approaches jeopardize system reliability and hinder the adoption of self-adaptive software in areas where dependability is of utmost importance. Objective. The main objective of this research is to properly handle the uncertainties in the non-functional requirement verification and the adaptation reasoning part of the self-adaptive feedback control loop of software connectors. This will enable a robust and runtime efficient adaptation in software connectors and make them reliable for usage in uncertain environments. Method. In the context of this thesis, a framework has been developed with the following functionalities: 1) Robust control of uncertainty in runtime requirement verification. The main activity in runtime verification is fine-tuning of the models that are adopted for runtime reasoning. The proposed stochastic approach is able to update the unknown parameters of the models at runtime even in the presence of incomplete and noisy observations. 2) Robust control of uncertainty in adaptation reasoning. A general methodology based on type-2 fuzzy logic has been introduced for the control of adaptation decision-making that adjusts the configuration of component connectors to the appropriate mode. The methodology enables a systematic development of fuzzy logic controllers that can derive the right mode for connectors even in the presence of measurement inaccuracy and adaptation policy conflicts. Results. The proposed model evolution mechanism is empirically evaluated, showing a significant precision of parameter estimation with an acceptable overhead at runtime. In addition, the fuzzy based controller, generated by the methodology, has been shown to be robust against uncertainties in the input data, efficient in terms of runtime overhead even in large-scale knowledge bases and stable in terms of control theory properties. We also demonstrate the applicability of the developed framework in a real-world domain. Thesis statement. We enable reliable and dependable self-adaptations of component connectors in unreliable environments with imperfect monitoring facilities and conflicting user opinions about adaptation policies by developing a framework which comprises: (a) mechanisms for robust model evolution, (b) a method for adaptation reasoning, and (c) tool support that allows an end-to-end application of the developed techniques in real-world domains

    Adaptive Response System for Distributed Denial-of-Service Attacks

    No full text
    The continued prevalence and severe damaging effects of the Distributed Denial of Service (DDoS) attacks in today’s Internet raise growing security concerns and call for an immediate response to come up with better solutions to tackle DDoS attacks. The current DDoS prevention mechanisms are usually inflexible and determined attackers with knowledge of these mechanisms, could work around them. Most existing detection and response mechanisms are standalone systems which do not rely on adaptive updates to mitigate attacks. As different responses vary in their “leniency” in treating detected attack traffic, there is a need for an Adaptive Response System. We designed and implemented our DDoS Adaptive ResponsE (DARE) System, which is a distributed DDoS mitigation system capable of executing appropriate detection and mitigation responses automatically and adaptively according to the attacks. It supports easy integrations for both signature-based and anomaly-based detection modules. Additionally, the design of DARE’s individual components takes into consideration the strengths and weaknesses of existing defence mechanisms, and the characteristics and possible future mutations of DDoS attacks. These components consist of an Enhanced TCP SYN Attack Detector and Bloom-based Filter, a DDoS Flooding Attack Detector and Flow Identifier, and a Non Intrusive IP Traceback mechanism. The components work together interactively to adapt the detections and responses in accordance to the attack types. Experiments conducted on DARE show that the attack detection and mitigation are successfully completed within seconds, with about 60% to 86% of the attack traffic being dropped, while availability for legitimate and new legitimate requests is maintained. DARE is able to detect and trigger appropriate responses in accordance to the attacks being launched with high accuracy, effectiveness and efficiency. We also designed and implemented a Traffic Redirection Attack Protection System (TRAPS), a stand-alone DDoS attack detection and mitigation system for IPv6 networks. In TRAPS, the victim under attack verifies the authenticity of the source by performing virtual relocations to differentiate the legitimate traffic from the attack traffic. TRAPS requires minimal deployment effort and does not require modifications to the Internet infrastructure due to its incorporation of the Mobile IPv6 protocol. Experiments to test the feasibility of TRAPS were carried out in a testbed environment to verify that it would work with the existing Mobile IPv6 implementation. It was observed that the operations of each module were functioning correctly and TRAPS was able to successfully mitigate an attack launched with spoofed source IP addresses

    Design, Implementation and Experiments for Moving Target Defense Framework

    Get PDF
    The traditional defensive security strategy for distributed systems employs well-established defensive techniques such as; redundancy/replications, firewalls, and encryption to prevent attackers from taking control of the system. However, given sufficient time and resources, all these methods can be defeated, especially when dealing with sophisticated attacks from advanced adversaries that leverage zero-day exploits

    Unified Role Assignment Framework For Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are made possible by the continuing improvements in embedded sensor, VLSI, and wireless radio technologies. Currently, one of the important challenges in sensor networks is the design of a systematic network management framework that allows localized and collaborative resource control uniformly across all application services such as sensing, monitoring, tracking, data aggregation, and routing. The research in wireless sensor networks is currently oriented toward a cross-layer network abstraction that supports appropriate fine or course grained resource controls for energy efficiency. In that regard, we have designed a unified role-based service paradigm for wireless sensor networks. We pursue this by first developing a Role-based Hierarchical Self-Organization (RBSHO) protocol that organizes a connected dominating set (CDS) of nodes called dominators. This is done by hierarchically selecting nodes that possess cumulatively high energy, connectivity, and sensing capabilities in their local neighborhood. The RBHSO protocol then assigns specific tasks such as sensing, coordination, and routing to appropriate dominators that end up playing a certain role in the network. Roles, though abstract and implicit, expose role-specific resource controls by way of role assignment and scheduling. Based on this concept, we have designed a Unified Role-Assignment Framework (URAF) to model application services as roles played by local in-network sensor nodes with sensor capabilities used as rules for role identification. The URAF abstracts domain specific role attributes by three models: the role energy model, the role execution time model, and the role service utility model. The framework then generalizes resource management for services by providing abstractions for controlling the composition of a service in terms of roles, its assignment, reassignment, and scheduling. To the best of our knowledge, a generic role-based framework that provides a simple and unified network management solution for wireless sensor networks has not been proposed previously

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    Water governance in the Murray-Darling Basin

    Get PDF
    The Murray Darling Basin (MDB) is a major irrigated agricultural region known as the food bowl of Australia. Over-allocation of water rights to irrigation in the MDB has mimicked a tragedy of the commons and has led to the degradation of the ecosystem of rivers in the basin. Competition between environment and agriculture is at the heart of the problem. As water in the river systems is semicommon, where private and common rights coexist and interact due to the fluid nature of the resource, employing an exclusion strategy is difficult. Hence governance is central to the management of the river system to ensure ecosystem resilience. The key governance solutions to this problem employed by the Commonwealth government are the use of the water market to reconfigure water from irrigation to the environment, and use of the Federal Water Act 2007 to harmonize water planning across the transboundary river system which extends over four states and one territory. There exists ongoing disappointment in current market based, legal and institutional policy in the Murray Darling Basin articulated by irrigators and State governments. Significant resistance to the government water buyback program has been expressed by irrigators and the upstream state governments. The governments of Queensland and New South Wales waited until February 2014 to sign the agreement for implementation of the MDB Plan which entered into effect in November 2012. Agreement was secured after the Federal government agreed to legislate to cap buybacks at 1500 GL. As of February 2014, 1200 GL (long term average) of the 2750 GL required for the environment has been acquired by government due to resistance by upstream states and irrigators. There is an absence of comprehensive treatment of the water governance problem. Therefore this research examines the limitations of the water market, water law and public institutions to address the identified problem in the MDB. A combination international comparative water law, a qualitative survey of 41 irrigators, conducted across four jurisdictions of the MDB, documentary analysis is employed in the research, viewed through the lens of New Institutional Economics. This dissertation is concerned with two central research questions pertaining to water governance structures for addressing over-allocation and the delivery of environmental flows to build ecosystem resilience in the Murray Darling river system. The research questions are articulated as follows: (i) What are the limits of market based water governance expressed as water buybacks, as a means of reconfiguring private water rights toward environmental flows in the Murray Darling river system for building ecosystem resilience? (ii) Which public institutional and legal reforms are necessary to resolve the conflict between environmental and socio-economic uses of the Murray Darling river system in order to maintain ecosystem resilience? The analysis of the research highlights three central limits to the use of water markets for the reconfiguration and efficient management of environmental flows by the Commonwealth Enviromnental Holder. Through examination of bounded rationality articulated in New Institutional Economics Theory, three interrelated limits were identified namely, the endowment effect, free rider effect, and lack of a transition economy to overcome the contraction of the rural economy caused by reduction of irrigation activity. This dissertation is one of the few to demonstrate the presence of an endowment effect in the real world setting, outside an experimental setting. The endowment effect refers to the initial assignment of property, the effect of which has been shown to place a limitation on trading activity in numerous contexts. This occurs because the willingness to accept (WT A) payment to relinquish property owned, far exceeds the willingness to pay (WTP) to acquire the same property. The endowment effect tied to the free rider effect can be addressed by a sustainable rural economic transition strategy. Lack of viable, alternate economic development has proven to be a problem in rural and regional Australia. This dissertation highlights the importance of investment in training, research and innovation in Information Communication Technology (ICT) in the MDB as a transition strategy attached to water policy. New Institutional Economics theory informs of the importance of institutional linkages for the achievement of transition economy goals between the MDBA and relevant government departments, including Treasury, Finance, Communications, Education, Employment and Training, and AUSTRADE. These institutional linkages have the potential to convert the economy dependent on agriculture to a knowledge economy over a period of two decades. This transition has the potential to reduce the level of youth migration from the rural sector to the urban sector, increasing the possibility of service sector expansion. At every major stage of water reform in the MDB to reduce over-extraction, from the 1994 cap and trade system, to the 2004 National Water Initiative to the Water Act 2007, a sustainable rural economic transition strategy has been repeatedly missed by successive governments. However State governments post-2011 have very belatedly commenced raising the matter of structural adjustment repeatedly in negotiations with the Federal government following vocal protests by irrigators. This dissertation also highlights limitations of water law and public institutions which include the absence of effective conflict resolution rules, mistrust in government management of water, mistrust in government institutional capacity, inadequate information flow and lack of clarity over property rights and compensation rules. Reform proposals therefore concern inclusion of conflict resolution provisions at the daily operational level and the Federal and State level. Daily operation rules adapted for the MDB focus on ongoing cooperation between heterogeneous users at the regional level to minimize conflict. At the Federal and State level the reform model proposes modification of the "no significant harm rule" articulated in international law, to include cost-benefit analysis rules and compensation rules. This dissertation proposes inclusion of the substantially modified "no-significant harm" rule as an amendment to the Water Act 2007. The aim of the no significant harm rule is to ensure all parties consider the impact of their actions upon other stakeholders and to promote respectful dialogue between parties. The model proposed sought to address key concerns pertaining to institutional bias, valuation methods and mechanisms to address harm to the rural economy. Inclusion of the modified "no significant harm rule" holds the potential to improve cooperative negotiations between State and Federal governments to optimize environmental, social and economic outcomes, as required by Article 3 of the Water Act 2007
    • …
    corecore