A Bio-Inspired Self-configuring Observer/ Controller for Organic Computing Systems
Journal Title: Journal of Information Systems and Telecommunication - Year 2016, Vol 4, Issue 3
Abstract
The increase in the complexity of computer systems has led to a vision of systems that can react and adapt to changes. Organic computing is a bio-inspired computing paradigm that applies ideas from nature as solutions to such concerns. This bio-inspiration leads to the emergence of life-like properties, called self-* in general which suits them well for pervasive computing. Achievement of these properties in organic computing systems is closely related to a proposed general feedback architecture, called the observer/controller architecture, which supports the mentioned properties through interacting with the system components and keeping their behavior under control. As one of these properties, self-configuration is desirable in the application of organic computing systems as it enables by enabling the adaptation to environmental changes. However, the adaptation in the level of architecture itself has not yet been studied in the literature of organic computing systems. This limits the achievable level of adaptation. In this paper, a self-configuring observer/controller architecture is presented that takes the self-configuration to the architecture level. It enables the system to choose the proper architecture from a variety of possible observer/controller variants available for a specific environment. The validity of the proposed architecture is formally demonstrated. We also show the applicability of this architecture through a known case study.
Authors and Affiliations
Ali Tarihi, Hassan Haghighi, Fereidoon Shams Aliee
Design of Fall Detection System: A Dynamic Pattern Approach with Fuzzy Logic and Motion Estimation
Every year thousands of the elderly suffer serious damages such as articular fractures, broken bones and even death due to their fall. Automatic detection of the abnormal walking in people, especially such accidents as t...
Security Analysis of Scalar Costa Scheme Against Known Message Attack in DCT-Domain Image Watermarking
This paper proposes an accurate information-theoretic security analysis of Scalar Costa Scheme (SCS) when the SCS is employed in the embedding layer of digital image watermarking. For this purpose, Discrete Cosine Transf...
Automatic Construction of Domain Ontology Using Wikipedia and Enhancing it by Google Search Engine
The foundation of the Semantic Web are ontologies. Ontologies play the main role in the exchange of information and development of the Lexical Web to the Semantic Web. Manual construction of ontologies is time-consuming,...
Mitosis detection in breast cancer histological images based on texture features using AdaBoost
Counting mitotic figures present in tissue samples from a patient with cancer, plays a crucial role in assessing the patient’s survival chances. In clinical practice, mitotic cells are counted manually by pathologists in...
Statistical Analysis of Different Traffic Types Effect on QoS of Wireless Ad Hoc Networks
IEEE 802.11 based wireless ad hoc networks are highly appealing owing to their needless of infrastructures, ease and quick deployment and high availability. Vast variety of applications such as voice and video transmissi...