40,287 research outputs found
Evoplex: A platform for agent-based modeling on networks
Agent-based modeling and network science have been used extensively to
advance our understanding of emergent collective behavior in systems that are
composed of a large number of simple interacting individuals or agents. With
the increasing availability of high computational power in affordable personal
computers, dedicated efforts to develop multi-threaded, scalable and
easy-to-use software for agent-based simulations are needed more than ever.
Evoplex meets this need by providing a fast, robust and extensible platform for
developing agent-based models and multi-agent systems on networks. Each agent
is represented as a node and interacts with its neighbors, as defined by the
network structure. Evoplex is ideal for modeling complex systems, for example
in evolutionary game theory and computational social science. In Evoplex, the
models are not coupled to the execution parameters or the visualization tools,
and there is a user-friendly graphical interface which makes it easy for all
users, ranging from newcomers to experienced, to create, analyze, replicate and
reproduce the experiments.Comment: 6 pages, 5 figures; accepted for publication in SoftwareX [software
available at https://evoplex.org
Modeling, Simulation and Emulation of Intelligent Domotic Environments
Intelligent Domotic Environments are a promising approach, based on semantic models and commercially off-the-shelf domotic technologies, to realize new intelligent buildings, but such complexity requires innovative design methodologies and tools for ensuring correctness. Suitable simulation and emulation approaches and tools must be adopted to allow designers to experiment with their ideas and to incrementally verify designed policies in a scenario where the environment is partly emulated and partly composed of real devices. This paper describes a framework, which exploits UML2.0 state diagrams for automatic generation of device simulators from ontology-based descriptions of domotic environments. The DogSim simulator may simulate a complete building automation system in software, or may be integrated in the Dog Gateway, allowing partial simulation of virtual devices alongside with real devices. Experiments on a real home show that the approach is feasible and can easily address both simulation and emulation requirement
Introduction to the special issue āPerspectives on Social Cognitionā\ud
Introduction to the special issue āPerspectives on Social Cognitionā\u
Cloud Security : A Review of Recent Threats and Solution Models
The most significant barrier to the wide adoption of cloud services has been attributed to perceived cloud insecurity (Smitha, Anna and Dan, 2012). In an attempt to review this subject, this paper will explore some of the major security threats to the cloud and the security models employed in tackling them. Access control violations, message integrity violations, data leakages, inability to guarantee complete data deletion, code injection, malwares and lack of expertise in cloud technology rank the major threats. The European Union invested ā¬3m in City University London to research into the certification of Cloud security services. This and more recent developments are significant in addressing increasing public concerns regarding the confidentiality, integrity and privacy of data held in cloud environments. Some of the current cloud security models adopted in addressing cloud security threats were ā Encryption of all data at storage and during transmission. The Cisco IronPort S-Series web security appliance was among security solutions to solve cloud access control issues. 2-factor Authentication with RSA SecurID and close monitoring appeared to be the most popular solutions to authentication and access control issues in the cloud. Database Active Monitoring, File Active Monitoring, URL Filters and Data Loss Prevention were solutions for detecting and preventing unauthorised data migration into and within clouds. There is yet no guarantee for a complete deletion of data by cloud providers on client requests however; FADE may be a solution (Yang et al., 2012)
- ā¦