SlideShare una empresa de Scribd logo
1 de 94
 
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Web Services  and Quality of Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Service Level Agreements Negotiation Client Provider Can you do X for me for Y in return? No SLA SLA Can you do Z for me for Y in return? Negotiation Phase (Single or Multi-Round) SLA-Offer SLA-CounterOffer SLA-Offer
SLA Variations  Client Providers SLA SLA Multi-provider SLA Single SLA is divided across multiple providers SLA dependencies For an SLA to be valid,  Another SLA has to be  agreed Client Providers SLA
Future Information Systems System has to be autonomous and able to continuously adapt, providing the required quality of service levels according to different service level agreements, without requiring the need of much human intervention.  The challenge is to design intelligent machines and networks that could communicate and adapt according to critic or error information, self organize and resilient in case of a system, service or component failure due to natural cause or a malicious attack.
Problem Complexity
Parking a Car Generally, a car can be parked rather easily. If it were specified to within, say, a fraction of a millimeter, it would take hours of maneuvering and precise measurements of distance and angular position to solve the problem.    High precision carries a high cost    The challenge is to exploit the tolerance for imprecision by devising methods of computation which lead to an acceptable solution at low cost. This, in essence, is the guiding principle of modern intelligent computing.
Traditional Approaches ,[object Object],[object Object]
In nature it works… Why not for our digital ecosystem?
Artificial Neural Network Artificial neuron Mammalian neuron
[object Object],A = Set of Old People Multi-Valued Logic --  Jan Łukasiewicz
Rough Set –  Zdzisław Pawlak The rough set concept overlaps—to some extent—with many other mathematical tools developed to deal with vagueness and uncertainty, in particular with the Dempster-Shafer theory of evidence. Rough set does not compete with fuzzy set theory, with which it is frequently contrasted, but rather complements it. One of the main advantages of rough set theory is that it does not need any preliminary or additional information about data, such as probability distribution in statistics, basic probability assignment in the Dempster-Shafer theory, or grade of membership or the value of possibility in fuzzy set theory.
Computational Theory of Perceptions  (Zadeh) ,[object Object],[object Object],Provides capability to compute and reason with  perception based information
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Perceptions are described by propositions drawn from a natural language
Evolutionary Algorithms Evolutionary Algorithms can be described by x [ t  + 1] =  s ( v ( x [ t ])) ,[object Object],[object Object],[object Object],Evolution  strategies  Evolutionary Algorithms  Genetic  Programming Evolutionary Programming Genetic Algorithm
Hybrid Approaches
Ant Colony Optimization
ACO in Real Life TSP  Scheduling Clustering
Particle Swarm Optimization x p g p i v P best G best
Some Pitfalls of PSO ,[object Object],[object Object],[object Object]
Turbulent PSO (TPSO)
FATPSO – Griewank Function - 100 D
FATPSO – Levy Function - 100 D
FATPSO – Schwefel Function - 100 D
Smart System Application Example Improving the delivery of health care in geriatric residences
The Problem.. Over the past 30 years, the number of Europeans over 60 years of age has risen by about 50 percent, and now represents more than 25 percent of the population.  Within 20 years, experts estimate that this percentage will rise to one-third of the population. Creating secure, unobtrusive, and adaptable environments for monitoring and optimizing healthcare will become vital in the near future. Dynamic:  New patients arrive and others pass away! While the staff rotation is also relatively high and they normally work in shifts of eight hours.
The Solution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Environment Alzheimer Santísima Trinidad Residence of Salamanca, Spain The Residence is for  Alzheimer’s patients  over 65 years old.  Its services and facilities include medical service, including occupational therapy and technical assistance Comprises of : a terrace and a garden; laundry and tailoring services; a hairdressing salon; a chapel and religious services; a cafeteria and various rooms, including a geriatric bathroom, a multipurpose room, and separate rooms for reading, socializing, visiting with guests, and watching TV.
Technologies Used Multi-agent system, which is a dynamic system for the management of different aspects of the geriatric center. Radio Frequency Identification (RFID) technology for ascertaining patients’ location. Mobile devices and Wi-Fi technology to provide the personnel of the residence with updated information about the center and the patients, to provide the working plan, information about alarms or potential problems and to keep track of their movements and actions within the center.  From the user’s point of view the complexity of the solution has been reduced with the help of friendly user interfaces and a robust and easy to use multi-agent system.
Technologies Used System  uses microchips mounted on bracelets worn on the patient ’ s wrist or ankle, and sensors installed over protected zones, with an adjustable capture range up to 2 meters.  The microchips or transponders use a 125 kHz signal to locate the patients, which can be identified by consulting the  software  agents  installed in PDA’s.
Software Architecture Patient :  monitoring, location, daily tasks, and anomalies  Doctor:  treats patients Nurse:  schedules the nurse ’ s working day obtaining dynamic plans depending on the tasks needed for each assigned patient Security:  controls the patients ’  location and manages locks and alarms Manager:  manages the medical record database and the doctor-patient and nurse-patient assignment
Software Architecture
Patient Agent The beliefs that were seen to define a general patient state: weight, temperature, blood pressure, feeding (diet characteristics and next time to eat), medication, posture change, toileting, personal hygiene, and exercise. The beliefs and goals for every patient depend on the plan or plans corresponding to the treatments or medicine that the doctors prescribe. The patient agent must have periodic communication with the doctor and nurse agent.  Must ensure that all the actions indicated in the treatment are fullfiled.
Patient Agent Manager and Patient agents run in a central computer, but GerAg agents run on mobile devices, so a robust wireless network has been installed as an extension to the existing wired LAN.  With respect to the question of failure recovery, a continuous monitoring of the system is carried out. Every agent saves its memory (personal data) onto a data base. The most sensitive agents are patient agents, so these agents save their state every hour. When an agent fails, another instance can be easily created from the latest backup
Agent System Manager and Patient agents run in a central computer, but other agents run on mobile devices Every agent saves its memory (personal data) onto a data base. The most sensitive agents are patient agents, so these agents save their state every hour.  When an agent fails, another instance can be easily created from the latest backup
System Interfaces Manager Nurse
How Effective?
Automatic Design of Fuzzy Systems   As a way to overcome the curse-of-dimensionality, it was suggested to arrange several low-dimensional rule base in a hierarchical structure, i.e., a tree, causing the number of possible rules to grow in a linear way according to the number of inputs. Building a hierarchical fuzzy system is a difficult task. This is because we need to define the architecture of the system (the modules, the input variables of each module, and the interactions between modules), as well as the rules of each modules.
Automatic Design of Hierarchical Takagi-Sugeno Type Fuzzy Systems   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Automatic Design of Hierarchical Takagi-Sugeno Type Fuzzy Systems  
  ,[object Object],[object Object],[object Object],[object Object],Encoding
Encoding   Assume that the used instruction set is I={+2, +3, x1, x2, x3, x4, where +2 and +3 denote non-leaf nodes' instructions taking 2 and 3 arguments, respectively. x1, x2, x3, x4 are leaf nodes' instructions taking zero arguments each.
Comparison of the incremental type multilevel FRS (IFRS), aggregated type mutilevel FRS (AFRS), and the hierarchical TS-FS for Mackey-Glass time-series prediction  Model    layer  No. of rules  No. of para.  RMSE(train)  RMSE(Test)   IFRS    4   25  58  0.0240  0.0253  AFRS    5  36  78  0.0267  0.0256  HTS-FS  3  24  33  0.0179  0.0167
The structure of the evolved hierarchical TS-FS model for predicting of Mackey-Glass time-series The importance degree of each input variables for Mackey-Glass time-series  xi  x 0  x 1  x 2  x 3  x 4  x 5  Impo ( xi )  0.247  0.332  0.072  0.113  0.056  0.180
 
The developed optimal H-TS-FS architectures (Irisdata)
 
The developed optimal H-TS-FS architectures (Wine data)
Flexible Neural Trees
Flexible Neural Trees
Flexible Neural Trees
Flexible Neural Trees
Flexible Neural Trees
Intrusion Detection
Flexible Neural Trees - IDS
FNT– Colon Cancer / Leukemia
FNT– Colon Cancer / Leukemia
MIMO - FNT
Flexible Radial Basis Function Trees
Flexible Radial Basis Function Trees Breast Cancer Detection
What is Risk? ,[object Object],[object Object],[object Object],[object Object]
Enterprise Risk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why risk modelling is complex? ,[object Object],[object Object],[object Object]
Establish the Context Identify Analyze Evaluate Treatment Monitoring and Review Communication and Consultation Risk Management in Practice
Risk Components Threat Vulnerability Asset Value
What is Threat? Threat  is anything that is capable of acting against an asset in a manner that can result in harm.  A tornado is a threat, as is a hacker.  The key consideration is that threats apply the force (eg: exploit code) against an asset that can cause a loss event to occur. Threat level depends on many factors: (1)  frequency of attacks  (2)  probability that attack being successful  (3)  Type and severity of attack.
What is Vulnerability? Weakness that may be exploited! A condition in which threat capability (force) is greater than the ability to resist that force. Vulnerability is always dependent upon the type and level of force being applied Vulnerability depends upon: (1) threat capability and (2) system threat resistance
What is Asset? Asset  can be any data, device, or other component of the environment that supports information-related activities, which can be illicitly accessed, used, disclosed, altered, destroyed, and/or stolen, resulting in loss.  Even ‘’reputation’ is an asset Asset value/loss depends upon:  (1) cost (2) criticality (3) sensitivity and (4) recovery.
Risk Assessment – A Soft Approach There is no such thing as an “exact” value of risk.  The advantage of the  fuzzy  approach is that it enables processing of vaguely defined variables, and variables whose relationships cannot be defined by mathematical relationships.  Fuzzy logic can incorporate expert human judgement to define those variable and their relationships. The model can be closer to reality and network specific than that by some of the other methods.
Risk Assessment ,[object Object],[object Object],[object Object],[object Object]
Fuzzy modeling of Risk
Takagi-Sugeno Neuro-Fuzzy  System
Hierarchical Takagi-Sugeno Type Fuzzy Systems  
  ,[object Object],[object Object],[object Object],Encoding
Developed Fuzzy Risk Assessment Model
Genetic Programming ,[object Object],[object Object],? Input Output
Program obtained by the best individual is as follows: (cos(exp(1 / (log10( x[5] )) +  x[0] ))) * (tan(1 / (exp(cos((tan( x[5] )) *  x[0] ))))) It is to be noted that, not all variables are required for building the risk assessment models. For example, the best individual used only 3 input variables, while the worst individual required just 2 input variables. What Genetic Programming Can Do?
How Can We Teach Things to Computers? In order for a program to be capable of learning something, it must first be capable of being told it. John McCarthy Easy:  If dogs are mammals and mammals are animals, are dogs mammals? Difficult:  If most Canadians have brown eyes, and most brown eyed people have good eyesight, then do most Canadians have good eyesight?  We Divide Things Into Concepts
 
Building Smart Systems: Some Challenges ,[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object]
Q A & Thank You [email_address]
 

Más contenido relacionado

La actualidad más candente

Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2
fphart
 
OW2 A presentation pierre_chatel
OW2 A presentation pierre_chatelOW2 A presentation pierre_chatel
OW2 A presentation pierre_chatel
choreos
 
Radterror Spb Oct04 Paper
Radterror Spb Oct04 PaperRadterror Spb Oct04 Paper
Radterror Spb Oct04 Paper
martindudziak
 
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
IJNSA Journal
 
Social networks based on amit sharma report
Social networks  based on amit sharma reportSocial networks  based on amit sharma report
Social networks based on amit sharma report
chizhovka
 
Costs and Benefits of a Shared Digital Long-Term Preservation System
Costs and Benefits of a Shared Digital Long-Term Preservation SystemCosts and Benefits of a Shared Digital Long-Term Preservation System
Costs and Benefits of a Shared Digital Long-Term Preservation System
Esa-Pekka Keskitalo
 

La actualidad más candente (20)

Smart Cities, Smart Citizens and Smart Decisions
Smart Cities, Smart Citizens and Smart DecisionsSmart Cities, Smart Citizens and Smart Decisions
Smart Cities, Smart Citizens and Smart Decisions
 
Smart Workspaces
Smart WorkspacesSmart Workspaces
Smart Workspaces
 
Visualizing Transformative Networks in Innovation Ecosystems
Visualizing Transformative Networks in Innovation EcosystemsVisualizing Transformative Networks in Innovation Ecosystems
Visualizing Transformative Networks in Innovation Ecosystems
 
Simpler, Gentler Design Priorities That Benefit Human-Centered Design: The re...
Simpler, Gentler Design Priorities That Benefit Human-Centered Design: The re...Simpler, Gentler Design Priorities That Benefit Human-Centered Design: The re...
Simpler, Gentler Design Priorities That Benefit Human-Centered Design: The re...
 
SHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCE
SHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCESHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCE
SHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCE
 
Trends in technology in South Africa (for ICT RDI Roadmap team)
Trends in technology in South Africa (for ICT RDI Roadmap team)Trends in technology in South Africa (for ICT RDI Roadmap team)
Trends in technology in South Africa (for ICT RDI Roadmap team)
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2
 
PERSONALIZATION IN SENSOR-RICH ENVIRONMENTS
PERSONALIZATION IN SENSOR-RICH ENVIRONMENTSPERSONALIZATION IN SENSOR-RICH ENVIRONMENTS
PERSONALIZATION IN SENSOR-RICH ENVIRONMENTS
 
Rethinking Technology Edge - Valgeo 2011
Rethinking Technology Edge - Valgeo 2011Rethinking Technology Edge - Valgeo 2011
Rethinking Technology Edge - Valgeo 2011
 
Valgeo2011 rethinking tech edge
Valgeo2011 rethinking tech edgeValgeo2011 rethinking tech edge
Valgeo2011 rethinking tech edge
 
OW2 A presentation pierre_chatel
OW2 A presentation pierre_chatelOW2 A presentation pierre_chatel
OW2 A presentation pierre_chatel
 
Radterror Spb Oct04 Paper
Radterror Spb Oct04 PaperRadterror Spb Oct04 Paper
Radterror Spb Oct04 Paper
 
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
 
Digital ethnography
Digital ethnographyDigital ethnography
Digital ethnography
 
Social networks based on amit sharma report
Social networks  based on amit sharma reportSocial networks  based on amit sharma report
Social networks based on amit sharma report
 
Costs and Benefits of a Shared Digital Long-Term Preservation System
Costs and Benefits of a Shared Digital Long-Term Preservation SystemCosts and Benefits of a Shared Digital Long-Term Preservation System
Costs and Benefits of a Shared Digital Long-Term Preservation System
 
Workshop distributed cognition
Workshop distributed cognitionWorkshop distributed cognition
Workshop distributed cognition
 
NATIONAL INFORMATION SYSTEMS (NIS): Brazilian NIS developed according Lattes ...
NATIONAL INFORMATION SYSTEMS (NIS): Brazilian NIS developed according Lattes ...NATIONAL INFORMATION SYSTEMS (NIS): Brazilian NIS developed according Lattes ...
NATIONAL INFORMATION SYSTEMS (NIS): Brazilian NIS developed according Lattes ...
 
PhD dissertation
PhD dissertationPhD dissertation
PhD dissertation
 
The Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart EnvironmentsThe Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart Environments
 

Destacado

Global challenges in information systems Spring 2009, BIS 221 Mr ...
Global challenges in information systems Spring 2009, BIS 221 Mr ...Global challenges in information systems Spring 2009, BIS 221 Mr ...
Global challenges in information systems Spring 2009, BIS 221 Mr ...
butest
 
Challenges in Implementing Information Systems Abroad
Challenges in Implementing Information Systems AbroadChallenges in Implementing Information Systems Abroad
Challenges in Implementing Information Systems Abroad
Steven Mairs, MPA
 
Global Information Systems Presentation
Global Information Systems PresentationGlobal Information Systems Presentation
Global Information Systems Presentation
James Corne
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital Firms
Pulkit Sharma
 
Globalisation, its challenges and advantages
Globalisation, its challenges and advantagesGlobalisation, its challenges and advantages
Globalisation, its challenges and advantages
fathima habeeb
 

Destacado (13)

Global challenges in information systems Spring 2009, BIS 221 Mr ...
Global challenges in information systems Spring 2009, BIS 221 Mr ...Global challenges in information systems Spring 2009, BIS 221 Mr ...
Global challenges in information systems Spring 2009, BIS 221 Mr ...
 
Hotel Industry
Hotel IndustryHotel Industry
Hotel Industry
 
Presentacion Final
Presentacion FinalPresentacion Final
Presentacion Final
 
Challenges in information systems and research in global health. The case of ...
Challenges in information systems and research in global health. The case of ...Challenges in information systems and research in global health. The case of ...
Challenges in information systems and research in global health. The case of ...
 
Challenges in Implementing Information Systems Abroad
Challenges in Implementing Information Systems AbroadChallenges in Implementing Information Systems Abroad
Challenges in Implementing Information Systems Abroad
 
Hotel Industry
Hotel IndustryHotel Industry
Hotel Industry
 
Global Information Systems Presentation
Global Information Systems PresentationGlobal Information Systems Presentation
Global Information Systems Presentation
 
Managing the digital firm
Managing the digital firmManaging the digital firm
Managing the digital firm
 
Essay Sample on Management of Information Systems
Essay Sample on Management of Information SystemsEssay Sample on Management of Information Systems
Essay Sample on Management of Information Systems
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital Firms
 
Globalisation, its challenges and advantages
Globalisation, its challenges and advantagesGlobalisation, its challenges and advantages
Globalisation, its challenges and advantages
 
Globalisation ppt 2
Globalisation ppt 2Globalisation ppt 2
Globalisation ppt 2
 
Management information system
Management information systemManagement information system
Management information system
 

Similar a Evolving Future Information Systems: Challenges, Perspectives and Applications

Similar a Evolving Future Information Systems: Challenges, Perspectives and Applications (20)

Essay On Chaos Engineering
Essay On Chaos EngineeringEssay On Chaos Engineering
Essay On Chaos Engineering
 
Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...
Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...
Cognitive Technologies_ Simplifying Complex Network Solutions to Usher in a T...
 
10 New Modern Technologies PPT [Computer Project]
10 New Modern Technologies PPT [Computer Project]10 New Modern Technologies PPT [Computer Project]
10 New Modern Technologies PPT [Computer Project]
 
F017624449
F017624449F017624449
F017624449
 
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
Comparative Analysis of Computational Intelligence Paradigms in WSN: ReviewComparative Analysis of Computational Intelligence Paradigms in WSN: Review
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
 
Ambient intelligence
Ambient intelligence Ambient intelligence
Ambient intelligence
 
Evanta 2018 msp big 3 tech
Evanta 2018 msp big 3 techEvanta 2018 msp big 3 tech
Evanta 2018 msp big 3 tech
 
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeHow Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van Tol
 
Latest advancement in computer
Latest advancement in computerLatest advancement in computer
Latest advancement in computer
 
Cyber Physical System
Cyber Physical SystemCyber Physical System
Cyber Physical System
 
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
 
Artificial intelligene (1)
Artificial intelligene (1)Artificial intelligene (1)
Artificial intelligene (1)
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Convergence of Transitioning Technologies
Convergence of Transitioning TechnologiesConvergence of Transitioning Technologies
Convergence of Transitioning Technologies
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient Intelligence
 
Eric van tol
Eric van tolEric van tol
Eric van tol
 
Artificial Intelligence Master at UPC: some experience on applying AI to real...
Artificial Intelligence Master at UPC: some experience on applying AI to real...Artificial Intelligence Master at UPC: some experience on applying AI to real...
Artificial Intelligence Master at UPC: some experience on applying AI to real...
 
p9-riliskis
p9-riliskisp9-riliskis
p9-riliskis
 

Más de Beniamino Murgante

GeoSDI: una piattaforma social di dati geografici basata sui principi di INSP...
GeoSDI: una piattaforma social di dati geografici basata sui principi di INSP...GeoSDI: una piattaforma social di dati geografici basata sui principi di INSP...
GeoSDI: una piattaforma social di dati geografici basata sui principi di INSP...
Beniamino Murgante
 

Más de Beniamino Murgante (20)

Analyzing and assessing ecological transition in building sustainable cities
Analyzing and assessing ecological transition in building sustainable citiesAnalyzing and assessing ecological transition in building sustainable cities
Analyzing and assessing ecological transition in building sustainable cities
 
Smart Cities: New Science for the Cities
Smart Cities: New Science for the CitiesSmart Cities: New Science for the Cities
Smart Cities: New Science for the Cities
 
The evolution of spatial analysis and modeling in decision processes
The evolution of spatial analysis and modeling in decision processesThe evolution of spatial analysis and modeling in decision processes
The evolution of spatial analysis and modeling in decision processes
 
Smart City or Urban Science?
Smart City or Urban Science?Smart City or Urban Science?
Smart City or Urban Science?
 
Involving citizens in smart energy approaches: the experience of an energy pa...
Involving citizens in smart energy approaches: the experience of an energy pa...Involving citizens in smart energy approaches: the experience of an energy pa...
Involving citizens in smart energy approaches: the experience of an energy pa...
 
Programmazione per la governance territoriale in tema di tutela della biodive...
Programmazione per la governance territoriale in tema di tutela della biodive...Programmazione per la governance territoriale in tema di tutela della biodive...
Programmazione per la governance territoriale in tema di tutela della biodive...
 
Involving Citizens in a Participation Process for Increasing Walkability
Involving Citizens in a Participation Process for Increasing WalkabilityInvolving Citizens in a Participation Process for Increasing Walkability
Involving Citizens in a Participation Process for Increasing Walkability
 
Presentation of ICCSA 2019 at the University of Saint petersburg
Presentation of ICCSA 2019 at the University of Saint petersburg Presentation of ICCSA 2019 at the University of Saint petersburg
Presentation of ICCSA 2019 at the University of Saint petersburg
 
RISCHIO TERRITORIALE NEL GOVERNO DEL TERRITORIO: Ricerca e formazione nelle s...
RISCHIO TERRITORIALE NEL GOVERNO DEL TERRITORIO: Ricerca e formazione nelle s...RISCHIO TERRITORIALE NEL GOVERNO DEL TERRITORIO: Ricerca e formazione nelle s...
RISCHIO TERRITORIALE NEL GOVERNO DEL TERRITORIO: Ricerca e formazione nelle s...
 
Presentation of ICCSA 2017 at the University of trieste
Presentation of ICCSA 2017 at the University of triestePresentation of ICCSA 2017 at the University of trieste
Presentation of ICCSA 2017 at the University of trieste
 
GEOGRAPHIC INFORMATION – NEED TO KNOW (GI-N2K) Towards a more demand-driven g...
GEOGRAPHIC INFORMATION – NEED TO KNOW (GI-N2K) Towards a more demand-driven g...GEOGRAPHIC INFORMATION – NEED TO KNOW (GI-N2K) Towards a more demand-driven g...
GEOGRAPHIC INFORMATION – NEED TO KNOW (GI-N2K) Towards a more demand-driven g...
 
Focussing Energy Consumers’ Behaviour Change towards Energy Efficiency and Lo...
Focussing Energy Consumers’ Behaviour Change towards Energy Efficiency and Lo...Focussing Energy Consumers’ Behaviour Change towards Energy Efficiency and Lo...
Focussing Energy Consumers’ Behaviour Change towards Energy Efficiency and Lo...
 
Socio-Economic Planning profiles: Sciences VS Daily activities in public sector 
Socio-Economic Planning profiles: Sciences VS Daily activities in public sector Socio-Economic Planning profiles: Sciences VS Daily activities in public sector 
Socio-Economic Planning profiles: Sciences VS Daily activities in public sector 
 
GEOGRAPHIC INFORMATION – NEED TO KNOW (GI-N2K) Towards a more demand-driven g...
GEOGRAPHIC INFORMATION – NEED TO KNOW (GI-N2K) Towards a more demand-driven g...GEOGRAPHIC INFORMATION – NEED TO KNOW (GI-N2K) Towards a more demand-driven g...
GEOGRAPHIC INFORMATION – NEED TO KNOW (GI-N2K) Towards a more demand-driven g...
 
Garden in motion. An experience of citizens involvement in public space regen...
Garden in motion. An experience of citizens involvement in public space regen...Garden in motion. An experience of citizens involvement in public space regen...
Garden in motion. An experience of citizens involvement in public space regen...
 
Planning and Smartness: the true challenge
Planning and Smartness: the true challengePlanning and Smartness: the true challenge
Planning and Smartness: the true challenge
 
GeoSDI: una piattaforma social di dati geografici basata sui principi di INSP...
GeoSDI: una piattaforma social di dati geografici basata sui principi di INSP...GeoSDI: una piattaforma social di dati geografici basata sui principi di INSP...
GeoSDI: una piattaforma social di dati geografici basata sui principi di INSP...
 
Murgante smart energy
Murgante smart energyMurgante smart energy
Murgante smart energy
 
Informazione Geografica, Città, Smartness
Informazione Geografica, Città, Smartness Informazione Geografica, Città, Smartness
Informazione Geografica, Città, Smartness
 
Tecnologie, Territorio, Smartness
Tecnologie, Territorio, SmartnessTecnologie, Territorio, Smartness
Tecnologie, Territorio, Smartness
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Evolving Future Information Systems: Challenges, Perspectives and Applications

  • 1.  
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Service Level Agreements Negotiation Client Provider Can you do X for me for Y in return? No SLA SLA Can you do Z for me for Y in return? Negotiation Phase (Single or Multi-Round) SLA-Offer SLA-CounterOffer SLA-Offer
  • 15. SLA Variations Client Providers SLA SLA Multi-provider SLA Single SLA is divided across multiple providers SLA dependencies For an SLA to be valid, Another SLA has to be agreed Client Providers SLA
  • 16. Future Information Systems System has to be autonomous and able to continuously adapt, providing the required quality of service levels according to different service level agreements, without requiring the need of much human intervention. The challenge is to design intelligent machines and networks that could communicate and adapt according to critic or error information, self organize and resilient in case of a system, service or component failure due to natural cause or a malicious attack.
  • 18. Parking a Car Generally, a car can be parked rather easily. If it were specified to within, say, a fraction of a millimeter, it would take hours of maneuvering and precise measurements of distance and angular position to solve the problem.  High precision carries a high cost  The challenge is to exploit the tolerance for imprecision by devising methods of computation which lead to an acceptable solution at low cost. This, in essence, is the guiding principle of modern intelligent computing.
  • 19.
  • 20. In nature it works… Why not for our digital ecosystem?
  • 21. Artificial Neural Network Artificial neuron Mammalian neuron
  • 22.
  • 23. Rough Set – Zdzisław Pawlak The rough set concept overlaps—to some extent—with many other mathematical tools developed to deal with vagueness and uncertainty, in particular with the Dempster-Shafer theory of evidence. Rough set does not compete with fuzzy set theory, with which it is frequently contrasted, but rather complements it. One of the main advantages of rough set theory is that it does not need any preliminary or additional information about data, such as probability distribution in statistics, basic probability assignment in the Dempster-Shafer theory, or grade of membership or the value of possibility in fuzzy set theory.
  • 24.
  • 25.
  • 26.
  • 29. ACO in Real Life TSP Scheduling Clustering
  • 30. Particle Swarm Optimization x p g p i v P best G best
  • 31.
  • 33. FATPSO – Griewank Function - 100 D
  • 34. FATPSO – Levy Function - 100 D
  • 35. FATPSO – Schwefel Function - 100 D
  • 36. Smart System Application Example Improving the delivery of health care in geriatric residences
  • 37. The Problem.. Over the past 30 years, the number of Europeans over 60 years of age has risen by about 50 percent, and now represents more than 25 percent of the population. Within 20 years, experts estimate that this percentage will rise to one-third of the population. Creating secure, unobtrusive, and adaptable environments for monitoring and optimizing healthcare will become vital in the near future. Dynamic: New patients arrive and others pass away! While the staff rotation is also relatively high and they normally work in shifts of eight hours.
  • 38.
  • 39. The Environment Alzheimer Santísima Trinidad Residence of Salamanca, Spain The Residence is for Alzheimer’s patients over 65 years old. Its services and facilities include medical service, including occupational therapy and technical assistance Comprises of : a terrace and a garden; laundry and tailoring services; a hairdressing salon; a chapel and religious services; a cafeteria and various rooms, including a geriatric bathroom, a multipurpose room, and separate rooms for reading, socializing, visiting with guests, and watching TV.
  • 40. Technologies Used Multi-agent system, which is a dynamic system for the management of different aspects of the geriatric center. Radio Frequency Identification (RFID) technology for ascertaining patients’ location. Mobile devices and Wi-Fi technology to provide the personnel of the residence with updated information about the center and the patients, to provide the working plan, information about alarms or potential problems and to keep track of their movements and actions within the center. From the user’s point of view the complexity of the solution has been reduced with the help of friendly user interfaces and a robust and easy to use multi-agent system.
  • 41. Technologies Used System uses microchips mounted on bracelets worn on the patient ’ s wrist or ankle, and sensors installed over protected zones, with an adjustable capture range up to 2 meters. The microchips or transponders use a 125 kHz signal to locate the patients, which can be identified by consulting the software agents installed in PDA’s.
  • 42. Software Architecture Patient : monitoring, location, daily tasks, and anomalies Doctor: treats patients Nurse: schedules the nurse ’ s working day obtaining dynamic plans depending on the tasks needed for each assigned patient Security: controls the patients ’ location and manages locks and alarms Manager: manages the medical record database and the doctor-patient and nurse-patient assignment
  • 44. Patient Agent The beliefs that were seen to define a general patient state: weight, temperature, blood pressure, feeding (diet characteristics and next time to eat), medication, posture change, toileting, personal hygiene, and exercise. The beliefs and goals for every patient depend on the plan or plans corresponding to the treatments or medicine that the doctors prescribe. The patient agent must have periodic communication with the doctor and nurse agent. Must ensure that all the actions indicated in the treatment are fullfiled.
  • 45. Patient Agent Manager and Patient agents run in a central computer, but GerAg agents run on mobile devices, so a robust wireless network has been installed as an extension to the existing wired LAN. With respect to the question of failure recovery, a continuous monitoring of the system is carried out. Every agent saves its memory (personal data) onto a data base. The most sensitive agents are patient agents, so these agents save their state every hour. When an agent fails, another instance can be easily created from the latest backup
  • 46. Agent System Manager and Patient agents run in a central computer, but other agents run on mobile devices Every agent saves its memory (personal data) onto a data base. The most sensitive agents are patient agents, so these agents save their state every hour. When an agent fails, another instance can be easily created from the latest backup
  • 49. Automatic Design of Fuzzy Systems   As a way to overcome the curse-of-dimensionality, it was suggested to arrange several low-dimensional rule base in a hierarchical structure, i.e., a tree, causing the number of possible rules to grow in a linear way according to the number of inputs. Building a hierarchical fuzzy system is a difficult task. This is because we need to define the architecture of the system (the modules, the input variables of each module, and the interactions between modules), as well as the rules of each modules.
  • 50.
  • 51. Automatic Design of Hierarchical Takagi-Sugeno Type Fuzzy Systems  
  • 52.
  • 53. Encoding   Assume that the used instruction set is I={+2, +3, x1, x2, x3, x4, where +2 and +3 denote non-leaf nodes' instructions taking 2 and 3 arguments, respectively. x1, x2, x3, x4 are leaf nodes' instructions taking zero arguments each.
  • 54. Comparison of the incremental type multilevel FRS (IFRS), aggregated type mutilevel FRS (AFRS), and the hierarchical TS-FS for Mackey-Glass time-series prediction Model layer No. of rules No. of para. RMSE(train) RMSE(Test) IFRS 4 25 58 0.0240 0.0253 AFRS 5 36 78 0.0267 0.0256 HTS-FS 3 24 33 0.0179 0.0167
  • 55. The structure of the evolved hierarchical TS-FS model for predicting of Mackey-Glass time-series The importance degree of each input variables for Mackey-Glass time-series xi x 0 x 1 x 2 x 3 x 4 x 5 Impo ( xi ) 0.247 0.332 0.072 0.113 0.056 0.180
  • 56.  
  • 57. The developed optimal H-TS-FS architectures (Irisdata)
  • 58.  
  • 59. The developed optimal H-TS-FS architectures (Wine data)
  • 67. FNT– Colon Cancer / Leukemia
  • 68. FNT– Colon Cancer / Leukemia
  • 70. Flexible Radial Basis Function Trees
  • 71. Flexible Radial Basis Function Trees Breast Cancer Detection
  • 72.
  • 73.
  • 74.
  • 75. Establish the Context Identify Analyze Evaluate Treatment Monitoring and Review Communication and Consultation Risk Management in Practice
  • 76. Risk Components Threat Vulnerability Asset Value
  • 77. What is Threat? Threat is anything that is capable of acting against an asset in a manner that can result in harm. A tornado is a threat, as is a hacker. The key consideration is that threats apply the force (eg: exploit code) against an asset that can cause a loss event to occur. Threat level depends on many factors: (1) frequency of attacks (2) probability that attack being successful (3) Type and severity of attack.
  • 78. What is Vulnerability? Weakness that may be exploited! A condition in which threat capability (force) is greater than the ability to resist that force. Vulnerability is always dependent upon the type and level of force being applied Vulnerability depends upon: (1) threat capability and (2) system threat resistance
  • 79. What is Asset? Asset can be any data, device, or other component of the environment that supports information-related activities, which can be illicitly accessed, used, disclosed, altered, destroyed, and/or stolen, resulting in loss. Even ‘’reputation’ is an asset Asset value/loss depends upon: (1) cost (2) criticality (3) sensitivity and (4) recovery.
  • 80. Risk Assessment – A Soft Approach There is no such thing as an “exact” value of risk. The advantage of the fuzzy approach is that it enables processing of vaguely defined variables, and variables whose relationships cannot be defined by mathematical relationships. Fuzzy logic can incorporate expert human judgement to define those variable and their relationships. The model can be closer to reality and network specific than that by some of the other methods.
  • 81.
  • 85.
  • 86. Developed Fuzzy Risk Assessment Model
  • 87.
  • 88. Program obtained by the best individual is as follows: (cos(exp(1 / (log10( x[5] )) + x[0] ))) * (tan(1 / (exp(cos((tan( x[5] )) * x[0] ))))) It is to be noted that, not all variables are required for building the risk assessment models. For example, the best individual used only 3 input variables, while the worst individual required just 2 input variables. What Genetic Programming Can Do?
  • 89. How Can We Teach Things to Computers? In order for a program to be capable of learning something, it must first be capable of being told it. John McCarthy Easy: If dogs are mammals and mammals are animals, are dogs mammals? Difficult: If most Canadians have brown eyes, and most brown eyed people have good eyesight, then do most Canadians have good eyesight? We Divide Things Into Concepts
  • 90.  
  • 91.
  • 92.
  • 93. Q A & Thank You [email_address]
  • 94.  

Notas del editor

  1. 06/28/11
  2. 06/28/11
  3. 06/28/11
  4. 06/28/11
  5. 06/28/11
  6. 06/28/11
  7. 06/28/11
  8. 06/28/11
  9. 06/28/11
  10. 06/28/11
  11. 06/28/11
  12. 06/28/11
  13. 06/28/11
  14. 06/28/11
  15. We want to talk in depth about how the algorithm works here
  16. With a change in the environment, swarm intelligent systems will adapt to this change and find the new optimal solution. This is achieved because ants choose to follow a path withcertain probability, therefore ants are always re-testing paths that were previously found to ineffiecient.
  17. 06/28/11
  18. 06/28/11
  19. 06/28/11
  20. 06/28/11
  21. 06/28/11
  22. 06/28/11
  23. 06/28/11
  24. 06/28/11
  25. 06/28/11
  26. 06/28/11
  27. 06/28/11
  28. 06/28/11
  29. 06/28/11
  30. 06/28/11 9
  31. 06/28/11 9
  32. 06/28/11 9
  33. 06/28/11 9
  34. 06/28/11 9
  35. 06/28/11
  36. This figure shows the architecture of the proposed DIPS. As mentioned on earlier slides the IDS system is a basis for the DIPS. They will send alarms to the HMM module that try to determine the state of the network. Information about very serious attacks will also be sent to the local controller, so immediate actions can be taken. The HMM module will have one HMM model for each IDS agent, used to estimate the system state based on alarms from that particular IDS Agent. Information from the HMM module is used to predict Intrusion and together with information about assets in the network used to do online risk assessment. If the intrusion prediction module believe there is an ongoing attack, it will be reported to the local controller and necessary action will be taken to stop the intrusion. The local controller will also take actions based on input from the traffic rate monitor, and give an overview of current network status through the Administrative Console. More than one DIPS may exchange information through a central controller.
  37. This figure shows the architecture of the proposed DIPS. As mentioned on earlier slides the IDS system is a basis for the DIPS. They will send alarms to the HMM module that try to determine the state of the network. Information about very serious attacks will also be sent to the local controller, so immediate actions can be taken. The HMM module will have one HMM model for each IDS agent, used to estimate the system state based on alarms from that particular IDS Agent. Information from the HMM module is used to predict Intrusion and together with information about assets in the network used to do online risk assessment. If the intrusion prediction module believe there is an ongoing attack, it will be reported to the local controller and necessary action will be taken to stop the intrusion. The local controller will also take actions based on input from the traffic rate monitor, and give an overview of current network status through the Administrative Console. More than one DIPS may exchange information through a central controller.
  38. This figure shows the architecture of the proposed DIPS. As mentioned on earlier slides the IDS system is a basis for the DIPS. They will send alarms to the HMM module that try to determine the state of the network. Information about very serious attacks will also be sent to the local controller, so immediate actions can be taken. The HMM module will have one HMM model for each IDS agent, used to estimate the system state based on alarms from that particular IDS Agent. Information from the HMM module is used to predict Intrusion and together with information about assets in the network used to do online risk assessment. If the intrusion prediction module believe there is an ongoing attack, it will be reported to the local controller and necessary action will be taken to stop the intrusion. The local controller will also take actions based on input from the traffic rate monitor, and give an overview of current network status through the Administrative Console. More than one DIPS may exchange information through a central controller.
  39. This figure shows the architecture of the proposed DIPS. As mentioned on earlier slides the IDS system is a basis for the DIPS. They will send alarms to the HMM module that try to determine the state of the network. Information about very serious attacks will also be sent to the local controller, so immediate actions can be taken. The HMM module will have one HMM model for each IDS agent, used to estimate the system state based on alarms from that particular IDS Agent. Information from the HMM module is used to predict Intrusion and together with information about assets in the network used to do online risk assessment. If the intrusion prediction module believe there is an ongoing attack, it will be reported to the local controller and necessary action will be taken to stop the intrusion. The local controller will also take actions based on input from the traffic rate monitor, and give an overview of current network status through the Administrative Console. More than one DIPS may exchange information through a central controller.
  40. There is no such thing as an “exact” value of risk. Results of traditional quantitative risk assessments are usually qualified with a statement of uncertainties. Fuzzy logic is used to characterise the robustness of the SMS as the variable, which determines the likelihood of incidents. The advantage of the fuzzy approach is that it enables processing of vaguely defined variables, and variables whose relationships cannot be defined by mathematical relationships. Fuzzy logic can incorporate expert human judgement to define those variable and their relationships. The model can be closer to reality and network specific than that by some of the other methods.
  41. We propose to use hierarchical fuzzy modeling in the risk assessment. In the DIPS framework, we model the risk analysis using threat levels, vulnerability and asset Threat level: is modeled as frequency of attacks or intrusions obtained from HMM predications described on earlier slides, probability of an attack being successful in overcoming protective controls and gaining access to the organization or assets, and the severity of the attacks. Vulnerability: My be described as the probability that an asset may be unable to resist the actions of an intruder. We have modeled the vulnerability as threat resistance and threat capability Asset value: To determine the asset loss may be one of the hardest parts in the task of analyzing the risk. We model the asset value as cost, criticality, sensitivity and recovery.
  42. This slide shows the fuzzy rules used by the Risk assessment Master FLC, it illustrates the if then rules.
  43. 06/28/11 9
  44. 06/28/11 9
  45. Quoted by Push Singh in Open Mind paper
  46. 06/28/11
  47. 06/28/11