Zeitschriften und Ausgaben

Volumen 22 (2022): Heft 3 (September 2022)

Volumen 22 (2022): Heft 2 (June 2022)

Volumen 22 (2022): Heft 1 (March 2022)

Volumen 21 (2021): Heft 4 (December 2021)

Volumen 21 (2021): Heft 3 (September 2021)

Volumen 21 (2021): Heft 2 (June 2021)

Volumen 21 (2021): Heft 1 (March 2021)

Volumen 20 (2020): Heft 6 (December 2020)
Special Heft on New Developments in Scalable Computing

Volumen 20 (2020): Heft 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volumen 20 (2020): Heft 4 (November 2020)

Volumen 20 (2020): Heft 3 (September 2020)

Volumen 20 (2020): Heft 2 (June 2020)

Volumen 20 (2020): Heft 1 (March 2020)

Volumen 19 (2019): Heft 4 (November 2019)

Volumen 19 (2019): Heft 3 (September 2019)

Volumen 19 (2019): Heft 2 (June 2019)

Volumen 19 (2019): Heft 1 (March 2019)

Volumen 18 (2018): Heft 5 (May 2018)
Special Thematic Heft on Optimal Codes and Related Topics

Volumen 18 (2018): Heft 4 (November 2018)

Volumen 18 (2018): Heft 3 (September 2018)

Volumen 18 (2018): Heft 2 (June 2018)

Volumen 18 (2018): Heft 1 (March 2018)

Volumen 17 (2017): Heft 5 (December 2017)
Special Heft With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volumen 17 (2017): Heft 4 (November 2017)

Volumen 17 (2017): Heft 3 (September 2017)

Volumen 17 (2017): Heft 2 (June 2017)

Volumen 17 (2017): Heft 1 (March 2017)

Volumen 16 (2016): Heft 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volumen 16 (2016): Heft 5 (October 2016)
Heft Title: Special Heft on Application of Advanced Computing and Simulation in Information Systems

Volumen 16 (2016): Heft 4 (December 2016)

Volumen 16 (2016): Heft 3 (September 2016)

Volumen 16 (2016): Heft 2 (June 2016)

Volumen 16 (2016): Heft 1 (March 2016)

Volumen 15 (2015): Heft 7 (December 2015)
Special Heft on Information Fusion

Volumen 15 (2015): Heft 6 (December 2015)
Special Heft on Logistics, Informatics and Service Science

Volumen 15 (2015): Heft 5 (April 2015)
Special Heft on Control in Transportation Systems

Volumen 15 (2015): Heft 4 (November 2015)

Volumen 15 (2015): Heft 3 (September 2015)

Volumen 15 (2015): Heft 2 (June 2015)

Volumen 15 (2015): Heft 1 (March 2015)

Volumen 14 (2014): Heft 5 (December 2014)
Special Heft

Volumen 14 (2014): Heft 4 (December 2014)

Volumen 14 (2014): Heft 3 (September 2014)

Volumen 14 (2014): Heft 2 (June 2014)

Volumen 14 (2014): Heft 1 (March 2014)

Volumen 13 (2013): Heft Special-Heft (December 2013)

Volumen 13 (2013): Heft 4 (December 2013)
The publishing of the present issue (Volumen 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volumen 13 (2013): Heft 3 (September 2013)

Volumen 13 (2013): Heft 2 (June 2013)

Volumen 13 (2013): Heft 1 (March 2013)

Volumen 12 (2012): Heft 4 (December 2012)

Volumen 12 (2012): Heft 3 (September 2012)

Volumen 12 (2012): Heft 2 (June 2012)

Volumen 12 (2012): Heft 1 (March 2012)

Zeitschriftendaten
Format
Zeitschrift
eISSN
1314-4081
Erstveröffentlichung
13 Mar 2012
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch

Suche

Volumen 14 (2014): Heft 3 (September 2014)

Zeitschriftendaten
Format
Zeitschrift
eISSN
1314-4081
Erstveröffentlichung
13 Mar 2012
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch

Suche

10 Artikel
Uneingeschränkter Zugang

Software Reliability Estimate with Duplicated Components Based on Connection Structure

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 3 - 13

Zusammenfassung

Abstract

Reliability testing of complex software at the system level is impossible due to the environmental constraint or the time limitation, so its reliability estimate is often obtained based on the reliability of subsystems or components. The connection structure was defined and the component-based software reliability was estimated based on it. For the present popular software with duplicated components, an approach to variance estimation of software reliability for complex structure systems was proposed, which has improved the hierarchical decomposition approach of variance estimation just for series-parallel systems. Experimental results indicated that the approach to variance estimation for reliability of software with duplicated components has advantages, such as the simple calculation process, small error result, and suitability for complex structure systems. Finally, the sensitivity analysis, used to identify critical components for resource allocation, could better improve the software reliability

Schlüsselwörter

  • Component-based software
  • reliability
  • duplicated components
  • variance estimation
  • complex structure
Uneingeschränkter Zugang

Stability and Fractal Patterns of Complex Logistic Map

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 14 - 24

Zusammenfassung

Abstract

The intent of this paper is to study the fractal patterns of one dimensional complex logistic map by finding the optimum values of the control parameter using Ishikawa iterative scheme. The logistic map is shown to have bounded and stable behaviour for larger values of the control parameter. This is well depicted via time series analysis and interesting fractal patterns as well are presented

Keywords

  • Complex logistic map
  • Ishikawa iteration
  • fractals
  • Julia set
Uneingeschränkter Zugang

Clustering of Authors’ Texts of English Fiction in the Vector Space of Semantic Fields

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 25 - 36

Zusammenfassung

Abstract

This paper describes the analysis of possible differentiation of the author’s idiolect in the space of semantic fields; it also analyzes the clustering of text documents in the vector space of semantic fields and in the semantic space with orthogonal basis. The analysis showed that using the vector space model on the basis of semantic fields is efficient in cluster analysis algorithms of author’s texts in English fiction. The study of the distribution of authors' texts in the cluster structure showed the presence of the areas of semantic space that represent the idiolects of individual authors. Such areas are described by the clusters where only one author dominates. The clusters, where the texts of several authors dominate, can be considered as areas of semantic similarity of author’s styles. SVD factorization of the semantic fields matrix makes it possible to reduce significantly the dimension of the semantic space in the cluster analysis of author’s texts. Using the clustering of the semantic field vector space can be efficient in a comparative analysis of author's styles and idiolects. The clusters of some authors' idiolects are semantically invariant and do not depend on any changes in the basis of the semantic space and clustering method.

Keywords

  • Text mining
  • text clustering
  • semantic fields
Uneingeschränkter Zugang

Face Recognition Based on Wavelet Kernel Non-Negative Matrix Factorization

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 37 - 45

Zusammenfassung

Abstract

In this paper a novel face recognition algorithm, based on wavelet kernel non-negative matrix factorization (WKNMF), is proposed. By utilizing features from multi-resolution analysis, the nonlinear mapping capability of kernel nonnegative matrix factorization could be improved by the method proposed. The proposed face recognition method combines wavelet kernel non-negative matrix factorization and RBF network. Extensive experimental results on ORL and YALE face database show that the suggested method possesses much stronger analysis capability than the comparative methods. Compared with PCA, non-negative matrix factorization, kernel PCA and independent component analysis, the proposed face recognition method with WKNMF and RBF achieves over 10 % improvement in recognition accuracy.

Schlüsselwörter

  • Face recognition
  • non-negative matrix factorization
  • RBF network
  • kernel method.
Uneingeschränkter Zugang

A Prevention Model for Session Hijack Attacks in Wireless Networks Using Strong and Encrypted Session ID

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 46 - 60

Zusammenfassung

Abstract

Most of the web applications are establishing the web session with the client. It is very important to protect the wireless networks against session hijacking attack. Session Hijack attack is easy to execute and difficult to detect. Wireless networks do not have specific boundary regions for the packets to be transferred. As the data packets are transferred in air, the chances of sniffing the network packets by the hackers or attackers are high by using the network sniffing tools. In this paper, we have proposed the Strong and Encrypted Session ID to prevent the session hijack attacks in web applications. Session ID is generated and the generated Session ID is encrypted, using a Secret Key Sharing algorithm and decrypted at the client side. We have tested the integrity of the session ID of length 32, 92 and 212 characters in a web application. Attacks are executed to capture the session ID of a web application. Our experimental results proved that 212 characters encrypted session ID completely prevents the session hijack attacks in web applications of wireless networks.

Keywords

  • Wireless networks
  • session Hijack attacks
  • network sniffing
  • encrypted session ID
  • SKS algorithm
Uneingeschränkter Zugang

A Large-Scale MIMO Precoding Algorithm Based on Iterative Interference Alignment

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 61 - 70

Zusammenfassung

Abstract

The performance of Large-scale MIMO system is degraded by Pilot Contamination. In order to reduce Pilot Contamination, a downlink precoding algorithm is put forward, based on Interference Alignment (IA). The main idea of this algorithm is aligning the pilot contamination and inter-cell interference to the same null space in order to acquire the maximal degrees of freedom. Then the downlink receiving precoding matrix is solved with respect to a maximal SINR (Signal Interference Noise Ratio) criterion. Exploiting the channel reciprocity and an iterative process, Base station and User Equipment switch transmitting and receiving roles in the uplink and downlink, the precoding matrices of the Base station and User Equipment is gradually updated until convergence. Finally, the simulation results have shown that the algorithm proposed can efficiently mitigate the impact of pilot contamination and outperform some popular precoding algorithms, e.g., MF precoding algorithm and MMSE precoding algorithm. When the number of antennas increases, the performance of the proposed algorithm will be greatly improved.

Keywords

  • Massive MIMO
  • large-scale MIMO
  • precoding
  • pilot contamination
  • interference alignment
Uneingeschränkter Zugang

A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 71 - 85

Zusammenfassung

Abstract

Cloud is not exempted from the vulnerability of Distributed Denial of Service (DDoS) attack, a serious threat to any distributed network and has considerably less effective solutions to deploy in the network. This paper introduces a novel mechanism to protect and prevent the cloud from the spurious packets targeting the depletion of server resources. The army nodes called “Cloud DDoS Attack Protection” (CDAP) nodes are installed at the cloud server farm/ Datacenter (DC). These army nodes act as virtual firewall without destroying the Cloud Infrastructure and improve the availability of DC, even at the time of DDoS attack. By continuously monitoring the incoming packets, CDAP filters the attack packets intruding the Cloud DC. Availability is further improved by handing over the threat detection and attack mitigation to CDAP nodes and by redirecting the malicious user requests to the dump network. The simulation results prove that the introduction of CDAP nodes improve the availability and reduce the response time and the cost incurred.

Keywords

  • DDoS
  • CDAP
  • Datacenter
  • Virtual Firewall
  • Cloud computing
Uneingeschränkter Zugang

Landmark Sequence Data Association for Simultaneous Localization and Mapping of Robots

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 86 - 95

Zusammenfassung

Abstract

The paper proposes landmark sequence data association for Simultaneous Localization and Mapping (SLAM) for data association problem under conditions of noise uncertainty increase. According to the space geometric information of the environment landmarks, the information correlations between the landmarks are constructed based on the graph theory. By observing the variations of the innovation covariance using the landmarks of the adjacent two steps, the problem is converted to solve the landmark TSP problem and the maximum correlation function of the landmark sequences, thus the data association of the observation landmarks is established. Finally, the experiments prove that our approach ensures the consistency of SLAM under conditions of noise uncertainty increase.

Schlüsselwörter

  • Landmark sequence
  • data association
  • simultaneous localization and mapping
  • robots
Uneingeschränkter Zugang

Feedback Linearization Control of the Inertia Wheel Pendulum

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 96 - 109

Zusammenfassung

Abstract

In this paper, two feedback linearizing control laws for the stabilization of the Inertia Wheel Pendulum are derived: a full-state linearizing controller, generalizing the existing results in literature, with friction ignored in the description and an inputoutput linearizing control law, based on a physically motivated definition of the system output. Experiments are carried out on a laboratory test bed with significant friction in order to test and verify the suggested performance and the results are presented and discussed. The main point to be made as a consequence of the experimental evaluation is the fact that actually the asymptotic stabilization was not achieved, but rather a limit cycling behavior was observed for the full-state linearizing controller. The input-output linearizing controller was able to drive the pendulum to the origin, with the wheel speed settling at a finite value

Keywords

  • Feedback linearization
  • inertia wheel pendulum
  • unstable systems control.
Uneingeschränkter Zugang

A Teaching Quality Evaluation Model Based on a Wavelet Neural Network Improved by Particle Swarm Optimization

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 110 - 120

Zusammenfassung

Abstract

In order to improve the teaching quality of higher education, the paper constructed a teaching quality evaluation index system with five first level indicators and twenty two second level indicators according to the teaching level evaluation index system of ordinary higher education. For the complex nonlinear relationships between the evaluation indices, a mathematical model for evaluating the teaching quality based on WNN, whose parameters were optimized by PSO, was presented in the paper. The experimental results showed that the method proposed could better improve the accuracy of the teaching quality evaluation target by making the mean square error of the actual output value and the desired output value smaller. Simultaneously, the method has been widely used in teaching quality evaluation of our college.

Schlüsselwörter

  • Teaching quality
  • evaluation index
  • Wavelet neural network
  • Particle swarm optimization
  • evaluation model
10 Artikel
Uneingeschränkter Zugang

Software Reliability Estimate with Duplicated Components Based on Connection Structure

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 3 - 13

Zusammenfassung

Abstract

Reliability testing of complex software at the system level is impossible due to the environmental constraint or the time limitation, so its reliability estimate is often obtained based on the reliability of subsystems or components. The connection structure was defined and the component-based software reliability was estimated based on it. For the present popular software with duplicated components, an approach to variance estimation of software reliability for complex structure systems was proposed, which has improved the hierarchical decomposition approach of variance estimation just for series-parallel systems. Experimental results indicated that the approach to variance estimation for reliability of software with duplicated components has advantages, such as the simple calculation process, small error result, and suitability for complex structure systems. Finally, the sensitivity analysis, used to identify critical components for resource allocation, could better improve the software reliability

Schlüsselwörter

  • Component-based software
  • reliability
  • duplicated components
  • variance estimation
  • complex structure
Uneingeschränkter Zugang

Stability and Fractal Patterns of Complex Logistic Map

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 14 - 24

Zusammenfassung

Abstract

The intent of this paper is to study the fractal patterns of one dimensional complex logistic map by finding the optimum values of the control parameter using Ishikawa iterative scheme. The logistic map is shown to have bounded and stable behaviour for larger values of the control parameter. This is well depicted via time series analysis and interesting fractal patterns as well are presented

Keywords

  • Complex logistic map
  • Ishikawa iteration
  • fractals
  • Julia set
Uneingeschränkter Zugang

Clustering of Authors’ Texts of English Fiction in the Vector Space of Semantic Fields

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 25 - 36

Zusammenfassung

Abstract

This paper describes the analysis of possible differentiation of the author’s idiolect in the space of semantic fields; it also analyzes the clustering of text documents in the vector space of semantic fields and in the semantic space with orthogonal basis. The analysis showed that using the vector space model on the basis of semantic fields is efficient in cluster analysis algorithms of author’s texts in English fiction. The study of the distribution of authors' texts in the cluster structure showed the presence of the areas of semantic space that represent the idiolects of individual authors. Such areas are described by the clusters where only one author dominates. The clusters, where the texts of several authors dominate, can be considered as areas of semantic similarity of author’s styles. SVD factorization of the semantic fields matrix makes it possible to reduce significantly the dimension of the semantic space in the cluster analysis of author’s texts. Using the clustering of the semantic field vector space can be efficient in a comparative analysis of author's styles and idiolects. The clusters of some authors' idiolects are semantically invariant and do not depend on any changes in the basis of the semantic space and clustering method.

Keywords

  • Text mining
  • text clustering
  • semantic fields
Uneingeschränkter Zugang

Face Recognition Based on Wavelet Kernel Non-Negative Matrix Factorization

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 37 - 45

Zusammenfassung

Abstract

In this paper a novel face recognition algorithm, based on wavelet kernel non-negative matrix factorization (WKNMF), is proposed. By utilizing features from multi-resolution analysis, the nonlinear mapping capability of kernel nonnegative matrix factorization could be improved by the method proposed. The proposed face recognition method combines wavelet kernel non-negative matrix factorization and RBF network. Extensive experimental results on ORL and YALE face database show that the suggested method possesses much stronger analysis capability than the comparative methods. Compared with PCA, non-negative matrix factorization, kernel PCA and independent component analysis, the proposed face recognition method with WKNMF and RBF achieves over 10 % improvement in recognition accuracy.

Schlüsselwörter

  • Face recognition
  • non-negative matrix factorization
  • RBF network
  • kernel method.
Uneingeschränkter Zugang

A Prevention Model for Session Hijack Attacks in Wireless Networks Using Strong and Encrypted Session ID

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 46 - 60

Zusammenfassung

Abstract

Most of the web applications are establishing the web session with the client. It is very important to protect the wireless networks against session hijacking attack. Session Hijack attack is easy to execute and difficult to detect. Wireless networks do not have specific boundary regions for the packets to be transferred. As the data packets are transferred in air, the chances of sniffing the network packets by the hackers or attackers are high by using the network sniffing tools. In this paper, we have proposed the Strong and Encrypted Session ID to prevent the session hijack attacks in web applications. Session ID is generated and the generated Session ID is encrypted, using a Secret Key Sharing algorithm and decrypted at the client side. We have tested the integrity of the session ID of length 32, 92 and 212 characters in a web application. Attacks are executed to capture the session ID of a web application. Our experimental results proved that 212 characters encrypted session ID completely prevents the session hijack attacks in web applications of wireless networks.

Keywords

  • Wireless networks
  • session Hijack attacks
  • network sniffing
  • encrypted session ID
  • SKS algorithm
Uneingeschränkter Zugang

A Large-Scale MIMO Precoding Algorithm Based on Iterative Interference Alignment

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 61 - 70

Zusammenfassung

Abstract

The performance of Large-scale MIMO system is degraded by Pilot Contamination. In order to reduce Pilot Contamination, a downlink precoding algorithm is put forward, based on Interference Alignment (IA). The main idea of this algorithm is aligning the pilot contamination and inter-cell interference to the same null space in order to acquire the maximal degrees of freedom. Then the downlink receiving precoding matrix is solved with respect to a maximal SINR (Signal Interference Noise Ratio) criterion. Exploiting the channel reciprocity and an iterative process, Base station and User Equipment switch transmitting and receiving roles in the uplink and downlink, the precoding matrices of the Base station and User Equipment is gradually updated until convergence. Finally, the simulation results have shown that the algorithm proposed can efficiently mitigate the impact of pilot contamination and outperform some popular precoding algorithms, e.g., MF precoding algorithm and MMSE precoding algorithm. When the number of antennas increases, the performance of the proposed algorithm will be greatly improved.

Keywords

  • Massive MIMO
  • large-scale MIMO
  • precoding
  • pilot contamination
  • interference alignment
Uneingeschränkter Zugang

A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 71 - 85

Zusammenfassung

Abstract

Cloud is not exempted from the vulnerability of Distributed Denial of Service (DDoS) attack, a serious threat to any distributed network and has considerably less effective solutions to deploy in the network. This paper introduces a novel mechanism to protect and prevent the cloud from the spurious packets targeting the depletion of server resources. The army nodes called “Cloud DDoS Attack Protection” (CDAP) nodes are installed at the cloud server farm/ Datacenter (DC). These army nodes act as virtual firewall without destroying the Cloud Infrastructure and improve the availability of DC, even at the time of DDoS attack. By continuously monitoring the incoming packets, CDAP filters the attack packets intruding the Cloud DC. Availability is further improved by handing over the threat detection and attack mitigation to CDAP nodes and by redirecting the malicious user requests to the dump network. The simulation results prove that the introduction of CDAP nodes improve the availability and reduce the response time and the cost incurred.

Keywords

  • DDoS
  • CDAP
  • Datacenter
  • Virtual Firewall
  • Cloud computing
Uneingeschränkter Zugang

Landmark Sequence Data Association for Simultaneous Localization and Mapping of Robots

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 86 - 95

Zusammenfassung

Abstract

The paper proposes landmark sequence data association for Simultaneous Localization and Mapping (SLAM) for data association problem under conditions of noise uncertainty increase. According to the space geometric information of the environment landmarks, the information correlations between the landmarks are constructed based on the graph theory. By observing the variations of the innovation covariance using the landmarks of the adjacent two steps, the problem is converted to solve the landmark TSP problem and the maximum correlation function of the landmark sequences, thus the data association of the observation landmarks is established. Finally, the experiments prove that our approach ensures the consistency of SLAM under conditions of noise uncertainty increase.

Schlüsselwörter

  • Landmark sequence
  • data association
  • simultaneous localization and mapping
  • robots
Uneingeschränkter Zugang

Feedback Linearization Control of the Inertia Wheel Pendulum

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 96 - 109

Zusammenfassung

Abstract

In this paper, two feedback linearizing control laws for the stabilization of the Inertia Wheel Pendulum are derived: a full-state linearizing controller, generalizing the existing results in literature, with friction ignored in the description and an inputoutput linearizing control law, based on a physically motivated definition of the system output. Experiments are carried out on a laboratory test bed with significant friction in order to test and verify the suggested performance and the results are presented and discussed. The main point to be made as a consequence of the experimental evaluation is the fact that actually the asymptotic stabilization was not achieved, but rather a limit cycling behavior was observed for the full-state linearizing controller. The input-output linearizing controller was able to drive the pendulum to the origin, with the wheel speed settling at a finite value

Keywords

  • Feedback linearization
  • inertia wheel pendulum
  • unstable systems control.
Uneingeschränkter Zugang

A Teaching Quality Evaluation Model Based on a Wavelet Neural Network Improved by Particle Swarm Optimization

Online veröffentlicht: 05 Nov 2014
Seitenbereich: 110 - 120

Zusammenfassung

Abstract

In order to improve the teaching quality of higher education, the paper constructed a teaching quality evaluation index system with five first level indicators and twenty two second level indicators according to the teaching level evaluation index system of ordinary higher education. For the complex nonlinear relationships between the evaluation indices, a mathematical model for evaluating the teaching quality based on WNN, whose parameters were optimized by PSO, was presented in the paper. The experimental results showed that the method proposed could better improve the accuracy of the teaching quality evaluation target by making the mean square error of the actual output value and the desired output value smaller. Simultaneously, the method has been widely used in teaching quality evaluation of our college.

Schlüsselwörter

  • Teaching quality
  • evaluation index
  • Wavelet neural network
  • Particle swarm optimization
  • evaluation model

Planen Sie Ihre Fernkonferenz mit Scienceendo