Evolving Future Information Systems: Challenges, Perspectives and Applications
-
Upload
geographical-analysis-urban-modeling-spatial-statistics -
Category
Technology
-
view
610 -
download
2
description
Transcript of Evolving Future Information Systems: Challenges, Perspectives and Applications
![Page 1: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/1.jpg)
![Page 2: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/2.jpg)
Presentation OutlinePresentation Outline
• Smart systems of the future - ApplicationsSmart systems of the future - Applications
• The need for soft approachesThe need for soft approaches
• Application examplesApplication examples
• ConclusionsConclusions
Presentation OutlinePresentation Outline
• Smart systems of the future - ApplicationsSmart systems of the future - Applications
• The need for soft approachesThe need for soft approaches
• Application examplesApplication examples
• ConclusionsConclusions
![Page 3: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/3.jpg)
• With the Internet as driving factor, socio-technical and industrial e-Networked ecosystems are about to change our lives again!
• Rocketing speed of technological ICT advances.
• As technology is getting ahead of society - the new ways disrupt the way we used to do things and even the way we used to think about the world.
• Digital Convergence
• Change the way we work, and we learn, and we live
![Page 4: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/4.jpg)
• In current medicine (the discipline) professional care is encouraged. Through access to information, this model may be changed.
• Body Sensor Networks !
• ICT will play an increasingly important for curative and preventative medicine.
![Page 5: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/5.jpg)
• Teachers - leave the students alone!
• E-Learning is fueling one of the most radical revolutions in education, by focused student-driven environment leveraging web-based individualized content.
• Is learning to be regarded as a universal right and accessible irrespective of geography with open educational resources accessible to everyone from everywhere?
![Page 6: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/6.jpg)
• The roaring successes of e-Bay, Amazon, and Google and others who broke the traditional models for commerce.
• Web 2.0, P2P, Social Networks, Blogs have fuelled the developments.
• The future only gets interesting as we dare to solve problems that were unsolvable at the scale we are seeing before in terms of infrastructure, platforms, data, and applications, with participatory resources like people and computing.
• Nature of e-Commerce of the future?
![Page 7: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/7.jpg)
• Paradigm shift from silo-oriented to service-oriented architectures
• From directly accessing local computers to accessing remote computing and application services.
• Grid and Cloud infrastructures available could enhance the Internet by seamlessly integrating computers, storage, sensor networks, digital experiments and instruments.
• Users could access these resources and services through a simple Web browser, remotely, securely, transparently!
• Just as another utility, from the wall socket.
![Page 8: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/8.jpg)
• Devices and machines will be able to discover each others with no previous knowledge on each other's type and collaborate towards the resolution of a common goal.
• They will use dynamic architectures allowing autonomous re/configuration of hardware and software structures, deploying software agents that can intelligently use web services in order to build adaptive systems.
• Semantic web services, embedded systems, wireless networks, sensor networks etc.
![Page 9: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/9.jpg)
• Social networks have taken the lead to push the world from a traditional closed competitive environment to an open, loosely coupled, collaborative environment.
•Value by making connections through the pervasive use of the modern infrastructure and collaborative IT frameworks.
![Page 10: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/10.jpg)
• Ubiquitous Technology allowing internet connection anytime, anywhere -- A new world where anyone can freely connect to computer networks regardless of time and place.
• Multifunctional Administrative City, Innovation City, Enterprise City
![Page 11: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/11.jpg)
• ICT systems in all domains of society has opened the door to entirely new forms of social organization characterized by a high degree of decentralization.
• Myriads of artifacts and humans, connected via networks and computing elements, exhibit self-organization and unpredictability that fundamentally challenge traditional systems engineering--based upon requirements and top-down management.
• This spontaneous trend has preceded our ability as designers to comprehend and control it, while also opening new opportunities for exploiting the formidable potential of ICT advances.
![Page 12: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/12.jpg)
• From the rise of global identity theft; to nation sponsored cyber attacks and the realities of combined warfare, the safety and security of a nation, its people and its place in the global market is becoming more difficult.
• Can governments successfully fulfill their obligation to protect?
• Requires complex and integrated solutions and novel approaches.
![Page 13: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/13.jpg)
Web Services and Quality of Service
– Application QoS–User perception, response time, Security, etc.– Middleware QoS–Computation, Memory and Storage– Network QoS–Band width, Packet loss, Delay, Jitter etc.
![Page 14: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/14.jpg)
Service Level Agreements Negotiation
Client Provider
Can youdo X for mefor Y in return?
No
SLASLA
Can youdo Z for mefor Y in return?
NegotiationPhase(Single orMulti-Round)
SLA-Offer
SLA-CounterOffer
SLA-Offer
![Page 15: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/15.jpg)
SLA Variations
Client
Providers
SLA
ClientProviders
SLA SLA
Multi-provider SLA
Single SLA is dividedacross multiple providers
SLA dependencies
For an SLA to be valid, Another SLA has to be agreed
![Page 16: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/16.jpg)
Future Information SystemsFuture Information Systems
System has to be autonomous and able to continuously adapt, providing the required quality of service levels according to different service level agreements, without requiring the need of much human intervention.
The challenge is to design intelligent machines and networks that could communicate and adapt according to critic or error information, self organize and resilient in case of a system, service or component failure due to natural cause or a malicious attack.
![Page 17: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/17.jpg)
Problem Complexity
![Page 18: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/18.jpg)
Parking a CarGenerally, a car can be parked rather easily. If it were specified to within, say, a fraction of a millimeter, it would take hours of maneuvering and precise measurements of distance and angular position to solve the problem.
High precision carries a high cost
The challenge is to exploit the tolerance for imprecision by devising methods of computation which lead to an acceptable solution at low cost. This, in essence, is the guiding principle of modern intelligent computing.
![Page 19: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/19.jpg)
Traditional Approaches
Mathematical models, Black boxes, number crunching.
Rule-based systems (crisp and bivalent): Large rule bases
![Page 20: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/20.jpg)
In nature it works…In nature it works…
Why not for our digital ecosystem?Why not for our digital ecosystem?
![Page 21: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/21.jpg)
Artificial Neural NetworkArtificial Neural Network
Artificial neuronMammalian neuron
![Page 22: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/22.jpg)
Fuzzy Logic
A = Set of Old People
Multi-Valued Logic -- Jan Łukasiewicz
![Page 23: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/23.jpg)
Rough Set – Zdzisław Pawlak
The rough set concept overlaps—to some extent—with many other mathematical tools developed to deal with vagueness and uncertainty, in particular with the Dempster-Shafer theory of evidence.
Rough set does not compete with fuzzy set theory, with which it is frequently contrasted, but rather complements it.
One of the main advantages of rough set theory is that it does not need any preliminary or additional information about data, such as probability distribution in statistics, basic probability assignment in the Dempster-Shafer theory, or grade of membership or the value of possibility in fuzzy set theory.
The rough set concept overlaps—to some extent—with many other mathematical tools developed to deal with vagueness and uncertainty, in particular with the Dempster-Shafer theory of evidence.
Rough set does not compete with fuzzy set theory, with which it is frequently contrasted, but rather complements it.
One of the main advantages of rough set theory is that it does not need any preliminary or additional information about data, such as probability distribution in statistics, basic probability assignment in the Dempster-Shafer theory, or grade of membership or the value of possibility in fuzzy set theory.
![Page 24: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/24.jpg)
Computational Theory of Perceptions (Zadeh)
Humans have remarkable capability to perform a wide variety of physical and mental tasks without any measurement and computations.
Reflecting the finite ability of the sensory organs and (finally the brain) to resolve details, Perceptions are inherently imprecise.
Provides capability to compute and reason with perception based information
![Page 25: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/25.jpg)
How to Model Perceptions
Perceptions are both fuzzy and granularBoundaries of perceived classes are un-sharpValues of attributes are granulated
Example:
Granules in age: very young, young, not so old,…
Perceptions are described by propositions drawn from a natural language
Perceptions are described by propositions drawn from a natural language
![Page 26: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/26.jpg)
Evolutionary AlgorithmsEvolutionary Algorithms
Evolution strategies
Evolutionary Algorithms
Genetic Programming
EvolutionaryProgramming
GeneticAlgorithm
Evolutionary Algorithms can be described by
x[t + 1] = s(v(x[t]))
x[t] : the population at time t under representation x
v : is the reproduction operator (s)
s : is the selection operator
![Page 27: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/27.jpg)
Hybrid Approaches
![Page 28: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/28.jpg)
Ant Colony Optimization
![Page 29: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/29.jpg)
ACO in Real Life
TSP
SchedulingClustering
![Page 30: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/30.jpg)
Particle Swarm Optimization
x pg
pi
v
PbestPbest
GbestGbest
![Page 31: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/31.jpg)
Some Pitfalls of PSO
Particles tend to cluster, i.e., converge too fast and get stuck at local optimum
Movement of particle carried it into infeasible region
Inappropriate mapping of particle space into solution space
![Page 32: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/32.jpg)
Turbulent PSO (TPSO)
![Page 33: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/33.jpg)
FATPSO – Griewank Function - 100 D
![Page 34: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/34.jpg)
FATPSO – Levy Function - 100 D
![Page 35: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/35.jpg)
FATPSO – Schwefel Function - 100 D
![Page 36: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/36.jpg)
Smart System Application Example
Improving the delivery of health care in geriatric residences
![Page 37: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/37.jpg)
The Problem..Over the past 30 years, the number of Europeans over 60 years of age has risen by about 50 percent, and now represents more than 25 percent of the population.
Within 20 years, experts estimate that this percentage will rise to one-third of the population.
Creating secure, unobtrusive, and adaptable environments for monitoring and optimizing healthcare will become vital in the near future.
Dynamic: New patients arrive and others pass away! While the staff rotation is also relatively high and they normally work in shifts of eight hours.
![Page 38: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/38.jpg)
The SolutionAmbient Intelligence is the vision of an environment
• filled with smart and communicating devices• which are naturally embedded in the environment and in common objects • while their presence is kept as seamless as possible
When coupled with RFID, Wi-Fi technologies, and handheld devices, such systems offer many new possibilities.
Our system aims to support elderly and Alzheimer patients in all aspects of daily life, predicting potential hazardous situations and delivering physical and cognitive support.
![Page 39: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/39.jpg)
The Environment
Alzheimer Santísima Trinidad Residence of Salamanca, Spain
The Residence is for Alzheimer’s patients over 65 years old.
Its services and facilities include medical service, including occupational therapy and technical assistance
Comprises of: a terrace and a garden; laundry and tailoring services; a hairdressing salon; a chapel and religious services; a cafeteria and various rooms, including a geriatric bathroom, a multipurpose room, and separate rooms for reading, socializing, visiting with guests, and watching TV.
![Page 40: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/40.jpg)
Technologies UsedMulti-agent system, which is a dynamic system for the management of different aspects of the geriatric center.
Radio Frequency Identification (RFID) technology for ascertaining patients’ location.
Mobile devices and Wi-Fi technology to provide the personnel of the residence with updated information about the center and the patients, to provide the working plan, information about alarms or potential problems and to keep track of their movements and actions within the center.
From the user’s point of view the complexity of the solution has been reduced with the help of friendly user interfaces and a robust and easy to use multi-agent system.
![Page 41: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/41.jpg)
Technologies UsedSystem uses microchips mounted on bracelets worn on the patient’s wrist or ankle, and sensors installed over protected zones, with an adjustable capture range up to 2 meters.
The microchips or transponders use a 125 kHz signal to locate the patients, which can be identified by consulting the software agents installed in PDA’s.
![Page 42: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/42.jpg)
Software ArchitecturePatient : monitoring, location, daily tasks, and anomalies
Doctor: treats patients
Nurse: schedules the nurse’s working day obtaining dynamic plans depending on the tasks needed for each assigned patient
Security: controls the patients’ location and manages locks and alarms
Manager: manages the medical record database and the doctor-patient and nurse-patient assignment
![Page 43: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/43.jpg)
Software Architecture
![Page 44: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/44.jpg)
Patient Agent
The beliefs that were seen to define a general patient state: weight, temperature, blood pressure, feeding (diet characteristics and next time to eat), medication, posture change, toileting, personal hygiene, and exercise.
The beliefs and goals for every patient depend on the plan or plans corresponding to the treatments or medicine that the doctors prescribe.
The patient agent must have periodic communication with the doctor and nurse agent.
Must ensure that all the actions indicated in the treatment are fullfiled.
![Page 45: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/45.jpg)
Patient AgentManager and Patient agents run in a central computer, but GerAg agents run on mobile devices, so a robust wireless network has been installed as an extension to the existing wired LAN.
With respect to the question of failure recovery, a continuous monitoring of the system is carried out. Every agent saves its memory (personal data) onto a data base. The most sensitive agents are patient agents, so these agents save their state every hour. When an agent fails, another instance can be easily created from the latest backup
![Page 46: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/46.jpg)
Agent SystemManager and Patient agents run in a central computer, but other agents run on mobile devices
Every agent saves its memory (personal data) onto a data base. The most sensitive agents are patient agents, so these agents save their state every hour.
When an agent fails, another instance can be easily created from the latest backup
![Page 47: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/47.jpg)
System Interfaces
Manager
Nurse
![Page 48: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/48.jpg)
How Effective?
![Page 49: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/49.jpg)
49
Automatic Design of Fuzzy Systems
As a way to overcome the curse-of-dimensionality, it was suggested to arrange several low-dimensional rule base in a hierarchical structure, i.e., a tree, causing the number of possible rules to grow in a linear way according to the number of inputs.
Building a hierarchical fuzzy system is a difficult task. This is because we need to define the architecture of the system (the modules, the input variables of each module, and the interactions between modules), as well as the rules of each modules.
![Page 50: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/50.jpg)
50
Automatic Design of Hierarchical Takagi-Sugeno Type Fuzzy Systems
The problems in designing a hierarchical fuzzy logic system includes the following:
• Selecting an appropriate hierarchical structure; • Selecting the inputs for each fuzzy TS sub-model• Determining the rule base for each fuzzy TS sub-model• Optimizing the parameters in the antecedent parts and the linear weights in the consequent parts.
![Page 51: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/51.jpg)
51
Automatic Design of Hierarchical Takagi-Sugeno Type Fuzzy Systems
![Page 52: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/52.jpg)
52
A tree-structural based encoding method.
The reasons for choosing this representation:
(1) the tree has a natural and typical hierarchical layer;
(2) with pre-defined instruction sets, the tree can be created and evolved using the existing tree-structure-based approaches, i.e., Genetic Programming (GP) and PIPE algorithms.
Encoding
![Page 53: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/53.jpg)
53
Encoding
Assume that the used instruction set is I={+2, +3, x1, x2, x3, x4, where +2 and +3 denote non-leaf nodes' instructions taking 2 and 3 arguments, respectively. x1, x2, x3, x4 are leaf nodes' instructions taking zero arguments each.
![Page 54: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/54.jpg)
Comparison of the incremental type multilevel FRS (IFRS), aggregated type mutilevel FRS (AFRS), and the hierarchical TS-FS for Mackey-Glass time-series prediction Model layer No. of rules No. of para. RMSE(train) RMSE(Test) IFRS 4 25 58 0.0240 0.0253 AFRS 5 36 78 0.0267 0.0256 HTS-FS 3 24 33 0.0179 0.0167
![Page 55: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/55.jpg)
The structure of the evolved hierarchical TS-FS model for predicting of Mackey-Glass time-series
The importance degree of each input variables for Mackey-Glass time-series xi x0 x1 x2 x3 x4 x5 Impo(xi) 0.247 0.332 0.072 0.113 0.056 0.180
![Page 56: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/56.jpg)
![Page 57: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/57.jpg)
The developed optimal H-TS-FS architectures (Irisdata)
![Page 58: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/58.jpg)
![Page 59: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/59.jpg)
The developed optimal H-TS-FS architectures (Wine data)
![Page 60: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/60.jpg)
Flexible Neural TreesFlexible Neural Trees
![Page 61: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/61.jpg)
Flexible Neural TreesFlexible Neural Trees
![Page 62: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/62.jpg)
Flexible Neural TreesFlexible Neural Trees
![Page 63: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/63.jpg)
Flexible Neural TreesFlexible Neural Trees
![Page 64: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/64.jpg)
Flexible Neural TreesFlexible Neural Trees
![Page 65: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/65.jpg)
Intrusion DetectionIntrusion Detection
![Page 66: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/66.jpg)
Flexible Neural Trees - IDSFlexible Neural Trees - IDS
![Page 67: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/67.jpg)
FNT– Colon Cancer / LeukemiaFNT– Colon Cancer / Leukemia
![Page 68: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/68.jpg)
FNT– Colon Cancer / LeukemiaFNT– Colon Cancer / Leukemia
![Page 69: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/69.jpg)
MIMO - FNTMIMO - FNT
![Page 70: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/70.jpg)
Flexible Radial Basis Function TreesFlexible Radial Basis Function Trees
![Page 71: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/71.jpg)
Flexible Radial Basis Function TreesBreast Cancer DetectionFlexible Radial Basis Function TreesBreast Cancer Detection
![Page 72: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/72.jpg)
What is Risk?
Risk is the potential that a chosen action or activity (or inaction) will lead to a loss (or an undesirable outcome).
Risk – The probable frequency and probable magnitude of future loss
Risk analysis is fundamentally all about establishing probabilities!
Uncertainty is the central issue of IT risk!
![Page 73: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/73.jpg)
Enterprise Risk
Internal:
Activities range from storage of data to providing information to employees
External:
Networks and the Internet for many activities related to customers/clients, vendors, competitors, etc.
Traditional models of risk management:
Financial planning and insurance - Do they work in IT?
IT risks are more challenging to quantify than traditional risks because “the data on the likelihood and costs associated with information security risk factors are often more limited and because risk factors are constantly changing.
![Page 74: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/74.jpg)
Why risk modelling is complex?
It affects us at the personal, corporate and government levels.
It is cross-disciplinary. The subject has been further complicated by the development of diverse approaches of varying reliability.
Is grounded on the need to make trade-offs among all relevant and important cost, benefits, and risks in a multi-object framework, without assignment weights with which to commensurate risks costs and benefits.
![Page 75: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/75.jpg)
Establish the ContextEstablish the Context
IdentifyIdentify
AnalyzeAnalyze
EvaluateEvaluate
TreatmentTreatment
Monitoring and ReviewMonitoring and Review
Communication and ConsultationCommunication and Consultation
Risk Management in Practice
![Page 76: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/76.jpg)
Risk Components
Threat
Vulnerability
Asset Value
![Page 77: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/77.jpg)
What is Threat?
Threat is anything that is capable of acting against an asset in a manner that can result in harm.
A tornado is a threat, as is a hacker.
The key consideration is that threats apply the force (eg: exploit code) against an asset that can cause a loss event to occur.
Threat level depends on many factors:(1) frequency of attacks (2) probability that attack being successful (3) Type and severity of attack.
![Page 78: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/78.jpg)
What is Vulnerability?
Weakness that may be exploited!
A condition in which threat capability (force) isgreater than the ability to resist that force.
Vulnerability is always dependent upon the type and level of force being applied
Vulnerability depends upon:(1) threat capability and (2) system threat resistance
![Page 79: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/79.jpg)
What is Asset?
Asset can be any data, device, or other component of the environment thatsupports information-related activities, which can be illicitly accessed, used, disclosed, altered, destroyed, and/or stolen, resulting in loss.
Even ‘’reputation’ is an asset
Asset value/loss depends upon: (1) cost (2) criticality (3) sensitivity and (4) recovery.
![Page 80: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/80.jpg)
Risk Assessment – A Soft Approach
There is no such thing as an “exact” value of risk.
The advantage of the fuzzy approach is that it enables processing of vaguely defined variables, and variables whose relationships cannot be defined by mathematical relationships.
Fuzzy logic can incorporate expert human judgement to define those variable and their relationships. The model can be closer to reality and network specific than that by some of the other methods.
![Page 81: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/81.jpg)
Risk Assessment
Fuzzy modeling of risk assessment
•Threat level
•Vulnerability
•Asset value
![Page 82: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/82.jpg)
Fuzzy modeling of Risk
![Page 83: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/83.jpg)
Takagi-Sugeno Neuro-Fuzzy System
x1x2
Layer 2(fuzzification layer)
R 1 R 2 R 3
x1
y
x2
Layer 4rule strength normalization
Layer 5rule consequent layer
Layer 6rule inference layer
Layer 1 (input layer)
Layer 3rule antecedent layer
![Page 84: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/84.jpg)
84
Hierarchical Takagi-Sugeno Type Fuzzy Systems
![Page 85: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/85.jpg)
85
A tree-structural based encoding method.
(1) the tree has a natural and typical hierarchical layer;
(2) with pre-defined instruction sets, the tree can be created and evolved using the existing tree-structure-based approaches, i.e., Genetic Programming (GP) and PIPE algorithms.
Encoding
![Page 86: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/86.jpg)
Developed Fuzzy Risk Assessment Model
![Page 87: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/87.jpg)
Genetic Programming
?Input Output
• Generation of different programs that solve the problem more or less accurately
• Improvement of better solutions
![Page 88: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/88.jpg)
Program obtained by the best individual is asfollows:
(cos(exp(1 / (log10(x[5])) + x[0]))) * (tan(1 /(exp(cos((tan(x[5])) * x[0])))))
It is to be noted that, not all variables are required for building the risk assessment models. For example, the best individual used only 3 input variables, while the worst individual required just 2 input variables.
What Genetic Programming Can Do?
![Page 89: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/89.jpg)
How Can We Teach Things to Computers?
In order for a program to be capable of learning something, it must first be capable of being told it.
John McCarthy
Easy: If dogs are mammals and mammals are animals, are dogs mammals?
Difficult: If most Canadians have brown eyes, and most brown eyed people have good eyesight, then do most Canadians have good eyesight?
We Divide Things Into Concepts
![Page 90: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/90.jpg)
![Page 91: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/91.jpg)
Building Smart Systems: Some Challenges
•Most of the existing frameworks rely on user specified parameters.
•Adaptation process could learn from success and mistakes and apply that knowledge to new problems.
•No free Lunch Theorem•Managing computational complexity: Parallel algorithms?
![Page 92: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/92.jpg)
Conclusions
• Managing Complexity: Can autonomy be planned or decentralization be controlled? Can evolution be designed? • Safety and Security: The safety and security of a nation, its people and its place in the global market is becoming more difficult. . Culture, media, ethics: Movies, television, cell phones, computer games, and the internet have all, in one way or another, collapsed the local into more international, creating a blur of perceptions, dreams and social mores.
![Page 94: Evolving Future Information Systems: Challenges, Perspectives and Applications](https://reader031.fdocuments.net/reader031/viewer/2022012918/547842c6b4af9f9c108b4bed/html5/thumbnails/94.jpg)