for Journals by Title or ISSN
for Articles by Keywords
help
Followed Journals
Journal you Follow: 0
 
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Jurnals are published.
Already have an account? Sign In to see the journals you follow.
Journal Cover   ADCAIJ : Advances in Distributed Computing and Artificial Intelligence Journal
  [6 followers]  Follow
    
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2255-2863
   Published by Universidad de Salamanca Homepage  [3 journals]
  • Mobility Integration of ERP systems

    • Authors: Álvaro LOZANO, Gabriel VILLARRUBIA, Alberto LÓPEZ
      Abstract: Nowadays a lot of enterprises work with ERP systems. It usefulness is generally used in office environments and different enterprises which offer this software are developing mobile applications. These mobile applications work with their own system and they don’t usually work in other platforms. Currently any mobile application can communicate with more than one ERP system because each one has its own communications methods. This article presents a system that expect unify the communication between different ERP systems and allows mobile applications to communicate with them in a homogeneous way.
      PubDate: 2014-12-17
      Issue No: Vol. 3 (2014)
       
  • Picture models for 2-scene comics creating system

    • Authors: Miki UENO, Naoki MORI, Keinosuke MATSUMOTO
      Abstract: Recently, computer understanding pictures and stories becomes one of the most important research topics in computer science. However, there are few researches about human like understanding by computers because pictures have not certain format and contain more lyric aspect than that of natural language. For picture understanding, a comic is the suitable target because it is consisted by clear and simple plot of stories and separated scenes.
      In this paper, we propose 2 different types of picture models for 2-scene comics creating system. We also show the method of the application of 2-scene comics creating system by means of proposed picture model.
      PubDate: 2014-12-17
      Issue No: Vol. 3 (2014)
       
  • Service-Oriented Architectures: from Design to Production exploiting
           Workflow Patterns

    • Authors: Saverio GIALLORENZO, Maurizio GABBRIELLI, Fabrizio MONTESI
      Abstract: In Service-Oriented Architectures (SOA) services are composed by coordinating their communications into a flow of interactions. Coloured Petri nets (CPN) offer a formal yet easy tool for modelling abstract SOAs. Still, mapping abstract SOAs into executable ones requires a non-trivial and time-costly analysis. Here, we propose a methodology that maps CPN-modelled SOAs into executable Jolie SOAs (our target language). To this end, we employ a collection of recurring control-flow patterns, called Workflow Patterns, as composable blocks of the translation. Following our methodology, we discuss how the Workflow Patterns we consider are translated in Jolie. Finally, we validate our methodology with a realistic use case. As additional result of our research, we could pragmatically assess the expressiveness of Jolie with relation to the considered Workflow Patterns.
      PubDate: 2014-12-17
      Issue No: Vol. 3 (2014)
       
  • Android Malware Detection Using Kullback-Leibler Divergence

    • Authors: Vanessa N. COOPER, Hisham M. HADDAD, Hossain SHAHRIAR
      Abstract: Many recent reports suggest that malware applications cause high billing to victims by sending and receiving hidden SMS messages. Given that, there is a need to develop necessary technique to identify malicious SMS operations as well as differentiate between good and bad SMS operations within applications.
      In this paper, we apply Kullback-Leibler Divergence (KLD) as a distance metric to identify the difference between good and bad SMS operations. We develop a set of elements that represent sending or receiving of SMS messages, both legitimately and maliciously. Then, we compare the divergence of the trained set of elements. Our evaluation shows that the divergence between good and bad applications remains significantly high, whereas between two applications performing the same SMS operations remain low. We evaluate the proposed KLD-based concept for identifying a set of malware applications. The initial results show that our approach can identify all known malware and has less false positive warning.
      PubDate: 2014-12-17
      Issue No: Vol. 3 (2014)
       
  • A multiagent system to assist elder people by TV communication

    • Authors: Víctor PARRA, Vivian LÓPEZ, Mohd Saberi MOHAMAD
      Abstract: This paper presents a model that assist seniors requiring care. This system is based on a multiagent platform in order to facilitate the communication of the modules composing the model. The application allows independence for the elderly, as he is moving in a secure environment. Besides, it provides different facilities through a platform accessible to everyone, by using the TV.
      PubDate: 2014-12-17
      Issue No: Vol. 3 (2014)
       
  • Using multi-objective optimization to design parameters in
           electro-discharge machining by wire

    • Authors: Carlos Alberto OCHOA, Lourdes Yolanda MARGAIN, Francisco Javier ORNELAS, Sandra Guadalupe JIMÉNEZ, Teresa Guadalupe PADILLA
      Abstract: The following paper describes the main objective to follow the methodology used and proposed to obtain the optimal values of WEDM process operation on the machine Robofil 310 by robust parameter design (RPD) of Dr. G. Taguichi [TAGUCHI, G. 1993], through controllable factors which result in more inferences regarding the problem to noise signal (S / N), which for this study is the variability of the hardness of samples from 6061, also studied the behaviour of the output parameters as the material removal rate (MRR) and surface roughness (Ra), subsequently took the RPD orthogonal array and characterized the individuals in the population, each optimal value is a gene and each possible solution is a chromosome, used multi-objective optimization using Non-dominated Sorting Genetic Algorithm to cross and mutate this population to generate better results MRR and Ra.
      PubDate: 2014-12-17
      Issue No: Vol. 3 (2014)
       
  • Index Vol 3 Num 9

    • Authors: María Navarro Cáceres
      PubDate: 2014-12-17
      Issue No: Vol. 3 (2014)
       
  • The awareness of Privacy issues in Ambient Intelligence

    • Authors: Mar LÓPEZ, Juanita PEDRAZA, Javier CARBÓ, José M. MOLINA
      Abstract: Ambient Intelligence (AmI) involves extensive and invisible integration of computer technologies in people´s daily lives: Smart Sensors, Smart Phones, Tablets, Wireless Sensor Network (Wi-Fi, Bluetooth, NFC, RFID, etc.), Internet (Facebook, WhatsApp, Twitter, You Tube, Blogs, Cloud Computing, etc.). The Intelligent Environments (IE) collect and process a massive amount of person-related and sensitive information.
      The aim of this work is to show the awareness of privacy issues in AmI and to identify the relevant design issues that should be addressed in order to provide privacy in the design of Ambient Intelligence’s applications focused in the user´s domain and involved technologies. We propose a conceptual framework in order to enforce privacy that takes care of interaction between technologies and devices, users and application´s domain with different modules that contain different steps relating to the privacy policies.
      PubDate: 2014-12-17
      Issue No: Vol. 3 (2014)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2015