• Home
  • Naser Nematbakhsh
Naser Nematbakhsh

Naser Nematbakhsh
  • PhD
  • Professor (Assistant) at Shahid Ashrafi Esfahani University, Esfahan, Iran

About

101
Publications
14,827
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
520
Citations
Current institution
Shahid Ashrafi Esfahani University, Esfahan, Iran
Current position
  • Professor (Assistant)

Publications

Publications (101)
Preprint
Full-text available
In this work, we show how to discover a semantic web service among a repository of web services. A new approach for web service discovery based on calculating the functions similarity. We define the Web service functions with Ontology Web Language (OWL). We wrote some rules for comparing two web services` parameters. Our algorithm compares the para...
Preprint
Full-text available
In this work we propose a new approach for semantic web matching to improve the performance of Web Service replacement. Because in automatic systems we should ensure the self-healing, self-configuration, self-optimization and self-management, all services should be always available and if one of them crashes, it should be replaced with the most sim...
Conference Paper
The recommender system's performance needs to be improved more than ever by increasing computer systems' usage in various applications. Recommender systems are a valuable tool in e-commerce websites. Their primary purpose is to generate accurate forecasts to access information in less time and energy for end-users. Classification optimizes informat...
Presentation
Full-text available
The recommender system's performance needs to be improved more than ever by increasing computer systems' usage in various applications. Recommender systems are a valuable tool in e-commerce websites. Their primary purpose is to generate accurate forecasts to access information in less time and energy for end-users. Classification optimizes informat...
Presentation
Full-text available
Cardiovascular disease is one of the most common causes of mortality in the world. Among the different types of this disease, the coronary artery is the most important, which the correct and timely diagnosis of which is vital. Diagnostic and treatment methods of this disease have many side effects and costs. The best and most accurate diagnostic me...
Conference Paper
Cardiovascular disease is one of the most common causes of mortality in the world. Among the different types of this disease, the coronary artery is the most important, which the correct and timely diagnosis of which is vital. Diagnostic and treatment methods of this disease have many side effects and costs. The best and most accurate diagnostic me...
Conference Paper
Full-text available
The primary focus of academic centers is on their students' performance. They are attempting to identify affecting factors on the performance of students and provide an approach to improve the students' academic levels. Educational data mining is an emerging field of study. It helps academic centers to predict and evaluate their students' statuses...
Article
Full-text available
In social networks, preserving privacy and preserving correlation among sensitive labels are a matter of trade-off. This paper presents a supervised anonymization technique, SNI (social network immunization), to publish social networks having multiple sensitive labels with correlation. SNI publishes all sensitive labels without distorting them. It...
Article
له: امروزه با پيشرفت علم و تكنولوژي يكي از دغدغه هاي آموزش و پرورش، ايجاد بستري مناسب جهت ايجاد محيط آموزشي و يادگيري هوشمند مطابق با فناوري هاي روز دنيا براي تربيت دانش آموزان در مدارس كه خانه دوم دانش آموزان است، مي باشد. هوشمندسازي مدارس بالاخص در مقطع پايه و ابتدايي و بهره گيري مدارس از فناوري اطلاعات مي تواند در سطح پيشرفت دانش آموزان تاثير ب...
Conference Paper
Full-text available
Biological Data Mining presents comprehensive data mining concepts, theories, and applications in current biological and medical research. A potential disadvantage of data mining is volume and complexity of the results that can often be overwhelming. The construction of physical three-dimensional (3D) models of biomolecules can uniquely contribute...
Conference Paper
Full-text available
Machine learning methods are often used to classify objects described by hundreds of attributes; however, as the dimensionality of the data rises, the amount of data required to provide a reliable analysis grows exponentially. A popular approach to this problem of high-dimensional datasets is to search for a projection of the data onto a smaller nu...
Conference Paper
Full-text available
Biological networks provide a natural representation of complex biological systems and thus have been used in a variety of applications, from gene function prediction to identifying disease genes. Many biological research areas such as drug design require gene regulatory networks to provide clear insight and understanding of the cellular process in...
Article
Full-text available
A significant aspect of Cloud-computing is scheduling of a large number of real-time concurrent workflow instances. Most of the existing scheduling algorithms are designed for a single complex workflow instance. This study examined instance-intensive workflows bounded by SLA constraints, including user-defined deadlines. The scheduling method for t...
Article
A workflow model is the computerized representation of a business or scientific process. It defines the starting and ending conditions of the process, the activities in the process, control flow and data flow among these activities, etc. A partitioning method creates workflow fragments that group some of the workflow model elements (activities, con...
Article
Data mining has been used as a public utility in extracting knowledge from databases during recent years. Developments in data mining and availability of data and private information are the biggest challenge in this regard. Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in ter...
Article
Full-text available
Although most research in density-based clustering algorithms focused on finding distinct clusters, many real-world applications (such as gene functions in a gene regulatory network) have inherently overlapping clusters. Even with overlapping features, density-based clustering methods do not define a probabilistic model of data. Therefore, it is ha...
Article
In Wireless Sensor Networks (WSNs), the most important challenges are the bandwidth and energy limitations, network topology changes, and lack of fixed infrastructures. Flooding is a broadcasting method which is used in almost all existing routing protocols and suffers from the broadcast storm problem. It may result in excessive redundancy, content...
Article
Full-text available
Using microarray techniques, it is possible to measure the expression levels of thousands of genes under several experimental conditions. Extracting information from microarray data is an important problem in Bioinformatics scope. Producing overlapping clusters is a major issue in clustering methods. While most of the research in this area has focu...
Article
Full-text available
Increased intrusions into computer networks and cyber-attacks have rendered the immunization of cyberspace one of the most important issues of managers and experts in the recent years. Since cyber-attacks have become more sophisticated and hackers have become more professional, mere use techniques such as firewall, cryptography, biometrics, and ant...
Article
Full-text available
Today, many tools for fast and easy access to information in social network have been introduced. The most important and popular tool of these tools is tag cloud. One of the most important issues that put up about tag clouds is how choose tag for tag cloud. Three approaches for determining how choosing tags have been proposed yet. One approach is b...
Article
Full-text available
2014 © The author(s) 2013. Published with open access at www.questjournals.org ABSTRACT:-Nowadays, some special attributes of web services such as being independent from platform, reusability, having a loosely coupled architecture and the ability to compose together in contrast to other applications have made them as components enjoying the capabil...
Article
Full-text available
Service-oriented architecture is an approach for making distributed systems that provide their services in the form of software applications. These services are called by other software and are used to make new services as well. Therefore, service quality is one of important issues in service-oriented architecture, whereas this issue has a consider...
Article
Full-text available
ABSTRACT:-The value of quality parameters plays an important role in the customer's decision making when choosing a service. Monitoring of the parameters is carried out for achieving accurate and actual values of parameters. Because of monitoring carried out in every service callout, an overhead on the web service could be seen so that the values o...
Conference Paper
Abstract Mobile cloud computing has been created on mobile devices due to preexisting problems such as low ram memory, high consumption of batteries and low power of processor. By using the cloud technology mobile users are able to use heavy files, large applications and complex processing. Lack of bandwidth, it is necessary to invent a new system...
Article
Full-text available
In large-scale pervasive computing environments, a huge amount of context is continuously created by context sources and as required by context consumers. Scalability is a challenge for managing and distributing this amount of data. In this research, a new scheme for context distribution is proposed which is based on forming context consumer commun...
Article
Recently, a lot of research has been dedicated to optimizing the QoS-aware service composition. This aims at selecting the optimal composed service from all possible service combinations regarding user's end-to-end quality requirements. Existing solutions often employ the global optimization approach, which does not show promising performance. Also...
Presentation
Full-text available
فایل پاورپوینت (اسلاید) جلسه دفاع کارشناسی ارشد رشته مهندسی نرم افزار دانشجو: بهزاد سلیمانی نیسیانی (Behzad Soleimani Neysiani) عنوان پایان نامه: ارزيابي کارايي چند پخشی جریان های ویدئویی زنده در شبکه های بزرگ مقیاس نظیر به نظیر Title: Performance analysis of video stream broadcasting in large scale peer to peer networks استاد راهنما: دکتر ناصر...
Article
Full-text available
To realize smart home vision in an equipped domain, several types of context-aware applications should be deployed. Because of complex tasks of context gathering and processing, designing context-aware applications requires middleware support. Designing a context-aware middleware is a challenging issue because of specific characteristics of context...
Article
Full-text available
UB ˙ ITAK doi:10.3906/elk-1105-49 Turkish Journal of Electrical Engineering & Computer Sciences h t t p : / / j o u r n a l s . t u b i t a k . g o v . t r / e l e k t r i k / Abstract: This paper addresses coalition formation, based on agent capabilities, centered on task allocation in emergency-response environments (EREs). EREs are environments...
Article
Full-text available
In real pervasive computing environments, a huge amount of context is continuously created by context sources and required by context consumers. Scalability is a challenge for managing and distributing this amount of data. In this research, a new scheme for context management and distribution is proposed which is based on forming context consumer c...
Article
Full-text available
Data integration is one of the main problems in distributed data sources. An approach is to provide an integrated mediated schema for various data sources. This research work aims at developing a framework for defining an integrated schema and querying on it. The basic idea is to employ recent standard languages and tools to provide a unified data...
Article
Full-text available
In the recent years, multimedia streaming has been really popular among end users, especially live video streaming over the Internet. However, video streaming applications need efficient and reliable methods for disseminating video frames in the networks. Although Mesh-based Peer-to-Peer (P2P) networks make the system more robustness against link f...
Conference Paper
Full-text available
پخش فیلم زنده در اینترنت برای جشنواره‌ها، مسابقات ورزشی و یا شبکه‌های تلویزیونی از اهمیت زیادی برخودار است. از طرفی به دلیل حجم زیاد اطلاعاتی که باید در اینترنت تبادل شود، متدها و ساختارهایی برای این منظور معرفی شده است که مهم‌ترین ساختارهای معرفی شده درختی و توری شکل برای توپولوژی شبکه می‌باشند. همچنین متدهای پوش و پول و یا ترکیب آنها برای پخش جری...
Conference Paper
Full-text available
در سیستم‌های جریان نظیر به نظیر، روش پوش به سختی در توپولوژی نامنظم عمل می‌کند؛ گر چه انتقال داده‌ها سریع‌تر از روش پول انجام می‌شود اما چون گره‌ها به صورت تصادفی توزیع شده‌اند، روش پوش معمولی موجب افزونگی بیشتری می‌شود. برای بهبود توانایی انتقال سیستم جریان نظیر به نظیر، طرح بررسی شده به بهبود برنامه کاربردی معمولی روش پوش در توپولوژی نامنظم می‌پر...
Article
Full-text available
Web service technology (WST) is a service-oriented architecture implementation framework that makes designing component-based internet applications possible. At present, many providers offer their services as web services. Current WST suffers from the lack of an integrated tool to assist web service developers. In WST, the services are published pu...
Article
Service-oriented architecture (SOA) is an important, flexible, and widely used software architecture. Web service technology (WST) is an SOA implementation framework that has attracted much attention. In WST, consumers find required services by means of service directories. Current service directories are mainly based on UDDI and suffer from a lack...
Conference Paper
Full-text available
امروزه با رشد تکنولوژی و ظهور امکانات جدیدی از قبیل پخش زنده فیلم، مصاحبه آنلاین و سرویس‌های مشابه، مدیریت ترافیک موجود در شبکه اینترنت به یکی از چالش های مهم تبدیل شده است. ارسال فیلم بصورت زنده در اینترنت و شبکه های بزرگ مقیاس از اهمیت زیادی برخوردار است بنابراین ارزیابی کارایی روش های چند پخشی فیلم در اینترنت یک چالش به حساب آمده که باید بتوان د...
Conference Paper
Full-text available
Non-functional properties play an important role in all web service related tasks, especially in selection and composition of services. To select a service according to the user business policies, it is necessary to find a mechanism for matching the user business policies with the web service policies. To do this, exploiting semantic matching is ef...
Article
Full-text available
In this paper a binary decision tree, based on Neural Networks, Support Vector Machine and K-Nearest Neighbor is employed and presented for recognition of Persian handwritten isolated digits and characters. In the proposed method, a part of the training data is divided into two clustersusing a clustering algorithm, and this process continues until...
Conference Paper
Full-text available
در شبکه‌های کامپیوتری از متدهای پوش و پول جهت چند پخشی جریان‌های ویدئویی استفاده می‌شود که متد پوش، نسبت به متد پول، جدیدتر می‌باشد اما باعث افزایش بار کاری شبکه و ترافیک شبکه در موارد خاص می‌شود بنابراین می‌توان در برخی از ساختارهای شبکه مانند ساختار درختی، از روش پوش استفاده کرد و در ساختارهای دارای دور مانند مش، از روش پوش استفاده کرد. استفاده ا...
Article
Full-text available
To realize smart home vision in an equipped domain, several types of context-aware applications should be deployed. Because of complex tasks of context gathering and processing, designing context-aware applications requires middleware support. Designing a context-aware middleware is a challenging issue because of specific characteristics of context...
Article
Full-text available
Service is the core concept of future Internet that named Internet of Services. This concept refers to software components as well as processing capacity and any other resources that can be offered through the Internet. There is a need for a third party that make registering and searching services easy and feasible. Web Service Technology (WST) is...
Conference Paper
Full-text available
يکي از مسائل پايه مدلسازي قابليت اطمينان، تناسب دادن بين مفاهيم انتراعي مسائل فني دنياي واقعي با مفاهيم کليدي سناريوهاي قابليت اطمينان و امنيت مي‌باشد که با تعريف کامپوننت‌ها و نقص‌هاي سطوح مختلف سيستم سروکار دارد. با توجه به اين شرايط، هر مدلسازي به عمليات منطقي، تأخيرها و اغلب برخي از شمارش‌ها احتياج دارد. تمامي اين عمليات‌هاي پايه بوسيله يک نوع...
Conference Paper
Full-text available
مدل‌های قابليت اطمينان نرم افزار براي تخمين و پيش بيني قابلیت اطمينان نرم‌افزار استفاده مي‌شوند. ابزارها و تکنيک‌ها براي انتخاب مدل قابليت اطمينان نرم افزار موجود در نوشته‌های علمي، نمي‌توانند با سطح بالايي از اطمينان استفاده شوند زيرا آن‌ها تعداد محدودي از ملاک‌های انتخاب مدل را استفاده مي‌کنند. در اين مقاله، مدل‌هاي قابليت اطمينان نرم افزار طبق چ...
Article
Full-text available
Recently, a lot of research works have attempted to model the choreography of services by different languages. Each language models the choreography on the basis of different view and level of abstraction. The features of each language demonstrate how much it is suitable for service choreography modeling. Among all languages, WS-CDL is a popular la...
Article
Full-text available
One of the important issues in computer networks is "Load Balancing" which leads to efficient use of the network resources. To achieve a balanced network it is necessary to find different routes between the source and destination. In the current paper we propose a new approach to find different routes using swarm intelligence techniques and multi c...
Article
Full-text available
Business corporations usually require choreography of services to be dynamic and adaptable. One way for answering this demand is to develop the services having dynamic behaviours. However, it is not enough and their behaviours must be composed dynamically too. The current model such as WS-CDL has a static structure to specify choreography and is no...
Article
Full-text available
In this paper, we addressed the problem of modelling complex cooperative multi-agent organizations. Proposed team-based model is inspired from the Schwaninger's model of intelligent human organizations. Considering time and agents' identity features is the main important factor in the mentioned model. In our considered problem domain, rescue system...
Article
Software engineering is known as a problem solving activity and modeling. All the principles in software engineering are emphasized on the conditions for software producers are unpredictable because of the interactions and mutual relationships between all the factors involved in creating and those conditions never allow full control over this proce...
Article
Postal code recognition can be an important step in the post offices automation. In this paper, a recognition system based on statistical and template matching approaches to recognize Persian handwritten postal codes on postal envelopes is presented. The system consists of pre-processing, feature extraction, and classification stages. Pre-processin...
Article
In the past decade, significant advances have been gained in e-learning systems; nonetheless, learning management systems are not free of difficulties. As the most important of these problems it can be pointed out that there is no guaranty whether the actual student is present in the virtual classroom or not and also there is no way to track the st...
Conference Paper
Full-text available
Proper organizational modelling is a challenging issue in complex cooperative multi-agent systems. In this paper, we propose a team-based multi-agent organizational model, based on the Schwaninger's model of intelligent human organizations. It provides an integrative framework to rapid task handling, the main effectiveness requirement in many appli...
Article
Full-text available
Inter-organization business corporations demands applications and services to be dynamic and adaptable. One approach to cope with the increase changing in service-oriented application is developing the services having adaptive behaviors. However, just having such services is not enough and their behaviors must be tuned and configured when they comp...
Article
Full-text available
WS-CDL is a very rich language that is specially designed to describe choreography of services. However it is very poor to adopt reusability mechanisms for making the choreography easy to design and confident to use. The main challenge is that there is no mechanism to make a reusable sub choreography which is able to expose an interface. Therefore,...
Article
Several semantic image search schemes have been recently proposed to retrieve images from the web. However, the query context is regularly ignored in these techniques and hence, many of the returned images are not adequately relevant. In this paper, we make use of context to further confine the outcome of the semantic search engines. For this purpo...
Article
In this paper, a complete system for detection and recognition of free format Persian handwritten zip codes was developed. Firstly, zip code localization includes of baselines detection, connected components segmentation and components' feature extraction, classification, and a novel algorithm presentation to detect zip code's place is performed. I...
Article
Full-text available
In a multi-agent environment, the accomplishment of a task may necessitate the co-operation of a number of agents. In order to allocate a task to a group of agents, methods of coalition formation in multi-agent systems can be used. In multi-agents systems, the formation of an optimal coalition is one of the main challenges to be overcome. With incr...
Article
Full-text available
With an expanding of Web services giving same functionalities, Quality of Service (QoS) is becoming an important criterion for selection of the best available service. So users need to know QoS information and the reliability of this information. This article presents a new model of reputation improved Web services discovery considering the quality...
Article
In this work, we show how to discover a semantic web service among a repository of web services. A new approach for web service discovering based on calculating the functions similarity. We define the Web service functions with Ontology Web Language (OWL). We wrote some rules for comparing two web services parameters. Our algorithm compares the par...
Article
Both Distributed Software Development (DSD) and eXtreme Programming (XP) approaches have gained significant Popularity. Both DSD and XP method are growing trends as software business requires quicker quality production at a cheaper price. Requirement Management (RM) is not easy to perform even under the best of circumstances and it becomes more dif...
Conference Paper
Keyword based information retrieval has difficulties in retrieving relevant information because it is not able to include the semantics of queries. In this paper, we present a novel method for query expansion based on semantic relations. In our proposed algorithm, semantically related words to the query are extracted from WordNet. Valuable words am...
Conference Paper
The main advantage of the web services technology is the possibility of preparing a compound web service with the existing to perform a proper task, but a service may be presented by several producers which one different in the quality of services. An adaptive process should select the elements of a compound web service in a way to answer effective...
Conference Paper
Service-Oriented Applications (SOA) are being regarded as the main pragmatic solution for distributed environments. In such systems, however each service can response the user request independently, it is essential to compose them for supplying a compound value-added service. Since, there may be a number of compositions to create the requested serv...
Article
Full-text available
Due to the outstanding progress in computer technology and an ever-rising demand for high-speed processing able to support the distributed mode there is an increasing trend towards the use of parallel and distributed systems. In addition, one of the important stages of any system utilizing parallel computing is the load balancing stage in which the...
Conference Paper
Web services composition based on QoS is the NP-hard problem, so the bionics optimization algorithms can solve it well. On the other hand, QoS of compound service is a key factor for satisfying the users. The users prefer different QoSs according to their desires. We have Proposed the services composition algorithm based on quality of services and...
Article
In this work we propose a new approach for semantic web matching to improve the performance of Web Service replacement. Because in automatic systems we should ensure the self-healing, self-configuration, self-optimization and self-management, all services should be always available and if one of them crashes, it should be replaced with the most sim...
Article
Since using environments that are made according to the service oriented architecture, we have more effective and dynamic applications. Semantic matchmaking process is finding valuable service candidates for substitution. It is a very important aspect of using semantic Web Services. Our proposed matchmaker algorithm performs semantic matching of We...
Conference Paper
Among many service choreography description languages, WS-CDL which has been developed by W3C is the most popular one. This language is an intermediate language mostly considered as a design language to describe the choreography, and is unable to model the choreography in high level. Regard to this issue, this paper proposes a set of notations, use...
Article
Several methods and languages have been developed to describe computer system specifications and some of them have been deployed to validate and verify the functionality of the system. No one method is equally appropriate for all application domains. Service oriented architecture and using Web services is a wide growing domain of applications in so...
Article
Web services choreography describes global model of services interactions among a set of participants. The correct description of choreography is very important, so before implementation upon choreography design description, we must be sure about correctness. Several techniques are employed to verify WS-CDL. In this paper we use a logical formal mo...
Article
Noise reduction is a major concern in digital image processing systems, which have been investigated by several techniques. One kind of important noises in images is known as Salt & Pepper, which may have different causes. In this paper a new approach for eliminating this type of noise is presented. The approach is different from all previous works...
Conference Paper
In this paper, a query planner is presented for semantic Web services. Semantic Web services represented in OWL-S format called OWL-S services. This planner converts OWL-S services to equivalent problem and domain descriptions that are specified in the planning domain description language PDDL. It invokes an efficient AI planner, fast diagonally do...
Conference Paper
Full-text available
In this paper the matching model for semantic Web services is proposed to improve the performance of Web service discovery. This matching model includes two-phase method: semantic similarity matching and qualitative filtering. Semantic similarity matching used for matching algorithm in order to finding the most proper services, and qualitative filt...
Conference Paper
The semantics-based Web service matching model is proposed in this paper to improve the performance of Web service discovery. Semantics-based Web service matching is a two-phase method including semantic similarity matching and qualitative filtering. Function-based semantic similarity matching used of matching algorithm in order to finding the most...
Article
Full-text available
Traditional schedulers in the grid environment do not support semantic description of grid resources and jobs. They do exact matching between resource requesters and providers. These mechanisms are too restrictive because there is no prior agreement on how a resource or a service or a job will be represented. In this paper, we propose an extensible...
Article
Full-text available
In this study, a formal model for specification of Access Control Policies (ACP) is represented. This model is capable of expressing several ACPs and combining them in a unified framework. We call present model Constrained Policy Graph (CPG), which is an extension of Take-Grant (TG) protection model. Although TG can be used to specify the ACPs but...
Conference Paper
Full-text available
Data integration is one of the main problems in distributed data sources. An approach is to provide an integrated mediated schema for various data sources. This research work aims at developing a framework for defining an integrated schema and querying on it. The basic idea is to employ recent standard languages and tools to provide a unified data...
Article
Full-text available
Web services are emerging technology for distributed computing and E-business interactions. A Web service represents a unit of business logic that an organization exposes on the World Wide Web. The next idea in Web service technology is the composition of Web services into complex ones and it has received much interest to support business-to-busine...
Conference Paper
Full-text available
Web services are self-contained, modular units of application logic which provide business functionality to other applications via Internet connections. Several models have been used to compose Web services which are mainly served at specification level and provide static data dependent coordination processes. Hence they can not support reconfigura...
Article
Full-text available
Software testing is one of the most important phases in the software development procedure which ensures the accordance of the software and its description. Testing is mainly a manual task accomplished by the human operators. This results in increasing the cost and time of the software development process. Also, due to the uncertain nature of the h...
Article
Many definitive and approximate methods have been so far proposed for the construction of an optimal binary search tree. One such method is the use of evolutionary algorithms with satisfactorily improved cost efficiencies. This paper will propose a new genetic algorithm for making a near-optimal binary search tree. In this algorithm, a new greedy m...
Conference Paper
Product line software engineering is an emerging software engineering paradigm, which guides organizations towards the development of products from core assets rather than from scratch. Various methods have been made to apply on the development of software product lines. However, using of them can be difficult and time-consuming without the aid of...
Article
Full-text available
IP multicasting is a key technology for many existing and emerging applications on the Internet. Furthermore, with increasing popularity of wireless devices and mobile equipment, it is necessary to determine the best way to provide this service in a wireless environment. IETF Mobile IP, that provides mobility for hosts in IP networks, proposes two...
Conference Paper
Full-text available
Multi-agent systems are used as a solution for complex and distributed systems. Since agents are autonomous they can be coordinated exogenously by a coordination language Reo. Reo coordinates agents without having any knowledge about agents. We apply organizational concepts to analyze and design such systems. In this paper, we propose a formal mode...
Conference Paper
Full-text available
The area of agent-oriented methodologies is maturing rapidly and the time has come to begin drawing together the work of various research groups with the aim of developing the next generation of agent-oriented software engineering methodologies. An important step is to understand the differences between the various key methodologies, and to underst...
Conference Paper
Full-text available
Multiagent systems are applied as a solution for distributed IT systems. Organizational concepts are usually applied to analyze and design such systems. Thus, a multiagent system can be seen as an organization which coordinates agent interactions. In this paper, we propose a formal model to specify the coordination behavior of a multiagent system o...
Article
Full-text available
Numerous methodologies for developing agent based systems have been proposed in the literature. However, their application is still limited due to their lack of sufficient documents, tools and maturity. Tropos is one of the most accurate and complete agent oriented methodologies that have been proposed in recent years. Several developing tools are...
Conference Paper
Classification of internet packets is a common task for internet routers. More rapid information transformation in communication links requires better processing and classifying algorithms. This paper presents a novel classification algorithm for internet packets profits parallel processing of neural networks. It is based on an extended able design...
Article
Estimation of values of interval availability and associated uncertainties is becoming increasingly important with regard to high capital items of production such as off-shore oil production platforms. In the present paper earlier research using exponential distributions for both failure and repair is now extended to enable calculations to be carri...
Chapter
Two models which enable availability to be calculated using observed data are given. The first is classical in nature and is appropriate for the calculation of interval availability. The second model is Bayesian and has particular relevance in assessing uncertainties involved with the prediction of instantaneous and asymptotic availability. Monte C...
Chapter
Evaluation of performance of equipments or entire complexes of components assembled into systems has become increasingly important as a result of rapid technological progress and the need to evaluate reliability of such systems. In the present paper a method for calculation of availability based on renewal theory is proposed. The availability is ex...
Article
Full-text available
Dynamic service composition aims to create value-added services by selecting and combining existing services properly on demand. Basically, this research intends to select web services taking part in composition attention to both user query and service provider policy. The policy of service providers is represented and reasoned by SWRL language.
Article
Full-text available
Most of the works done for specifying and analyzing the Access Control Polices (ACPs) consider the security policies per system while it is required to unify the security policies in an integrated system with several subsystems. Moreover, an important problem in web service composition is that the partners contributed in a combination may have inco...

Network

Cited By