Zeitschriften und Ausgaben

Volumen 22 (2022): Heft 3 (September 2022)

Volumen 22 (2022): Heft 2 (June 2022)

Volumen 22 (2022): Heft 1 (March 2022)

Volumen 21 (2021): Heft 4 (December 2021)

Volumen 21 (2021): Heft 3 (September 2021)

Volumen 21 (2021): Heft 2 (June 2021)

Volumen 21 (2021): Heft 1 (March 2021)

Volumen 20 (2020): Heft 6 (December 2020)
Special Heft on New Developments in Scalable Computing

Volumen 20 (2020): Heft 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volumen 20 (2020): Heft 4 (November 2020)

Volumen 20 (2020): Heft 3 (September 2020)

Volumen 20 (2020): Heft 2 (June 2020)

Volumen 20 (2020): Heft 1 (March 2020)

Volumen 19 (2019): Heft 4 (November 2019)

Volumen 19 (2019): Heft 3 (September 2019)

Volumen 19 (2019): Heft 2 (June 2019)

Volumen 19 (2019): Heft 1 (March 2019)

Volumen 18 (2018): Heft 5 (May 2018)
Special Thematic Heft on Optimal Codes and Related Topics

Volumen 18 (2018): Heft 4 (November 2018)

Volumen 18 (2018): Heft 3 (September 2018)

Volumen 18 (2018): Heft 2 (June 2018)

Volumen 18 (2018): Heft 1 (March 2018)

Volumen 17 (2017): Heft 5 (December 2017)
Special Heft With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volumen 17 (2017): Heft 4 (November 2017)

Volumen 17 (2017): Heft 3 (September 2017)

Volumen 17 (2017): Heft 2 (June 2017)

Volumen 17 (2017): Heft 1 (March 2017)

Volumen 16 (2016): Heft 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volumen 16 (2016): Heft 5 (October 2016)
Heft Title: Special Heft on Application of Advanced Computing and Simulation in Information Systems

Volumen 16 (2016): Heft 4 (December 2016)

Volumen 16 (2016): Heft 3 (September 2016)

Volumen 16 (2016): Heft 2 (June 2016)

Volumen 16 (2016): Heft 1 (March 2016)

Volumen 15 (2015): Heft 7 (December 2015)
Special Heft on Information Fusion

Volumen 15 (2015): Heft 6 (December 2015)
Special Heft on Logistics, Informatics and Service Science

Volumen 15 (2015): Heft 5 (April 2015)
Special Heft on Control in Transportation Systems

Volumen 15 (2015): Heft 4 (November 2015)

Volumen 15 (2015): Heft 3 (September 2015)

Volumen 15 (2015): Heft 2 (June 2015)

Volumen 15 (2015): Heft 1 (March 2015)

Volumen 14 (2014): Heft 5 (December 2014)
Special Heft

Volumen 14 (2014): Heft 4 (December 2014)

Volumen 14 (2014): Heft 3 (September 2014)

Volumen 14 (2014): Heft 2 (June 2014)

Volumen 14 (2014): Heft 1 (March 2014)

Volumen 13 (2013): Heft Special-Heft (December 2013)

Volumen 13 (2013): Heft 4 (December 2013)
The publishing of the present issue (Volumen 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volumen 13 (2013): Heft 3 (September 2013)

Volumen 13 (2013): Heft 2 (June 2013)

Volumen 13 (2013): Heft 1 (March 2013)

Volumen 12 (2012): Heft 4 (December 2012)

Volumen 12 (2012): Heft 3 (September 2012)

Volumen 12 (2012): Heft 2 (June 2012)

Volumen 12 (2012): Heft 1 (March 2012)

Zeitschriftendaten
Format
Zeitschrift
eISSN
1314-4081
Erstveröffentlichung
13 Mar 2012
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch

Suche

Volumen 14 (2014): Heft 4 (December 2014)

Zeitschriftendaten
Format
Zeitschrift
eISSN
1314-4081
Erstveröffentlichung
13 Mar 2012
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch

Suche

10 Artikel
Uneingeschränkter Zugang

On Finding All Reducts of Consistent Decision Tables

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 3 - 10

Zusammenfassung

Abstract

The problem of finding reducts plays an important role in processing information on decision tables. The objective of the attribute reduction problem is to reject a redundant attribute in order to find a core attribute for data processing. The attribute reduction in decision tables is the process of finding a minimal subset of conditional attributes which preserve the classification ability of decision tables. In this paper we present the time complexity of the problem of finding all reducts of a consistent decision table. We prove that this time complexity is exponential with respect to the number of attributes of the decision tables. Our proof is performed in two steps. The first step is to show that there exists an exponential algorithm which finds all reducts. The other step is to prove that the time complexity of the problem of finding all reducts of a decision table is not less than exponential.

Keywords:

  • Consistent decision table
  • attribute reduction
  • reduct
  • time complexity
  • relation
  • relation scheme
  • minimal key
  • antikey
Uneingeschränkter Zugang

Dynamic Multi-Attribute Group Decision Making Model Based on Generalized Interval-Valued Trapezoidal Fuzzy Numbers

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 11 - 28

Zusammenfassung

Abstract

In this paper we investigate the dynamic multi-attribute group decision making problems, in which all the attribute values are provided by multiple decision makers at different periods. In order to increase the level of overall satisfaction for the final decision and deal with uncertainty, the attribute values are enhanced with generalized interval-valued trapezoidal fuzzy numbers to cope with the vagueness and indeterminacy. We first define the Dynamic Generalized Interval-valued Trapezoidal Fuzzy Numbers Weighted Geometric Aggregation (DGITFNWGA) operator and give an approach to determine the weights of periods, using the probability density function of Gamma distribution, and then a dynamic multi-attribute group decision making method is developed. The method proposed employs the Generalized Interval-valued Trapezoidal Fuzzy Numbers Hybrid Geometric Aggregation (GITFNHGA) operator to aggregate all individual decision information into the collective attribute values corresponding to each alternative at the same time period, and then utilizes the DGITFNWGA operator to aggregate the collective attribute values at different periods into the overall attribute values corresponding to each alternative and obtains the alternatives ranking, by which the optimal alternative can be determined. Finally, an illustrative example is given to verify the approach developed.

Keywords:

  • Dynamic multi-attribute group decision making, generalized interval-valued trapezoidal fuzzy numbers
  • probability density function
Uneingeschränkter Zugang

Equivalent Transformations and Regularization in Context-Free Grammars

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 29 - 44

Zusammenfassung

Abstract

Regularization of translational context-free grammar via equivalent transformations is a mandatory step in developing a reliable processor of a formal language defined by this grammar. In the 1970-ies, the multi-component oriented graphs with basic equivalent transformations were proposed to represent a formal grammar of ALGOL-68 in a compiler for IBM/360 compatibles. This paper describes a method of grammar regularization with the help of an algorithm of eliminating the left/right-hand side recursion of nonterminals which ultimately converts a context-free grammar into a regular one. The algorithm is based on special equivalent transformations of the grammar syntactic graph: elimination of recursions and insertion of iterations. When implemented in the system SynGT, it has demonstrated over 25% reduction of the memory size required to store the respective intermediate control tables, compared to the algorithm used in Flex/Bison parsers.

Keywords:

  • CFR-grammar
  • a syntactic flow-chart (graph-scheme)
  • equivalent transformations of grammars
Uneingeschränkter Zugang

Network Actual Traffic Prediction Algorithm Based on α-stable Distribution and Wavelet Transformation

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 45 - 55

Zusammenfassung

Abstract

In order to improve the prediction precision of wireless sensor network traffic, a new prediction algorithm (State Prediction algorithm based on α-stable distribution α, SP-α) is proposed, combined with α-stable distribution and wavelet transformation. The algorithm proposed first defines the characteristics of α-stable distribution and then gives the judge basis that obeys α-stable distribution. At the same time, it reduces the prediction error of the actual traffic by fusion of the prediction results of α-stable distribution with wavelet transformation. Finally, the paper thoroughly researches the key factors impacting on the new algorithm through simulations in OPNET and MATLAB. Compared with the performance of FARIMA model, the simulation results proved that SP-α algorithm has better adaptability.

Keywords:

  • Wireless sensor network, prediction, α-stable distribution, wavelet transformation
  • error
Uneingeschränkter Zugang

Control of Traffic Driven Epidemics in Weighted Networks by Immunizing Edges

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 56 - 65

Zusammenfassung

Abstract

Many immunization strategies have been proposed to control the epidemic spreading which mainly focus on how to immunize the nodes. A novel and efficient strategy to control the traffic driven epidemic spreading in weighted networks is proposed in this paper. By immunizing the edges according to different weights, our control strategies cannot only reduce the epidemic spreading velocity and enhance the critical epidemic threshold, but also maintain the integrity of the weighted networks. Simulations show that the control strategy by immunizing edges according to the product of the strengths of two nodes of the edge proved to be more efficient.

Keywords:

  • Traffic driven
  • epidemic spreading
  • weighted networks
  • SI model
  • SIR model
Uneingeschränkter Zugang

Quantitative Comparison of Deformable Models in Range Segmentation

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 66 - 79

Zusammenfassung

Abstract

In this paper we segment range images by applying three deformable models (the classical Active Contour, the adaptive active contour and the Level Set method). These three methods are used to segment images with planar and curved surface scenes. Then the numerical results obtained are compared in order to find the best technique of deformable models adapted to segmentation of range images. Despite of the good experimental results on simple objects, we have noted that the adaptive and classical snake methods have a few limitations and cannot detect discontinuities in curvatures and some items do not always converge. However, the level set method is very efficient for segmenting range images with curvature and complex forms.

Keywords:

  • Range image
  • segmentation
  • deformable model
  • active contour
  • snake
  • level set
Uneingeschränkter Zugang

From Gamification to Gameful Design and Gameful Experience in Learning

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 80 - 100

Zusammenfassung

Abstract

Learning is a goal driven social activity determined by motivational factors. To be able to efficiently gamify learning for improved student motivation and engagement, the educators have to understand the related aspects studied in games, motivational psychology and pedagogy. This will help them to identify the factors that drive and explain desired learning behaviors. This paper presents a survey of the main approaches employed in gamification and the emerging new directions in the context of the relevant motivational psychology and pedagogy. The focus is on the motivational factors that impact learning and understanding of behavior change. The purpose of the paper is two-fold: on one side, to provide analysis and guide to relevant works related to gamification along with outlining the emerging trends, and on the other, to provide foundation for evaluation and identification of the areas of possible improvements.

Keywords:

  • Learning process
  • gamification
  • motivational factors
  • gameful experience
Uneingeschränkter Zugang

Evaluation of the Software Industry Competitiveness in Jilin Province Based on Factor Analysis

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 101 - 108

Zusammenfassung

Abstract

In this paper 12 economic indices of the software industry in 30 cities/provinces in China are used to set up an evaluation system for the competitiveness of the regional software industry. By using the statistical analysis method of factor analysis, an evaluation model of the comprehensive competitiveness of the software industry for each city/province is built. Taking Beijing and Shanghai as examples, the comprehensive competitiveness and problems of the software industry in Jilin province are compared and analyzed.

Keywords:

  • Software industry
  • competitiveness
  • factor analysis
Uneingeschränkter Zugang

Best Suitable Cogeneration Power for Factories from Multi-Objective Data Analysis

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 109 - 120

Zusammenfassung

Abstract

The cogeneration systems in the industrial sector have become an essential part due to their global efficiency and reduced pollution. These systems may operate from conventional fuel sources, as well as from renewable energy sources (biomass, solar, fuel cell).

Cogeneration systems could be installed as a distributed generation and on-site generation source in order to take advantage from the produced heat. The utility can motivate factories to install such systems by permitting them to link and sell their residual production capacity to the electrical grid. This work presents a new technique to find the best solution from multi-objective optimization results, using a sensitivity and data analysis method. Genetic Algorithm (GA) optimization method is used with the data analysis method: Multiple Linear Regression (MLR).

Keywords:

  • Combined Heat and Power (CHP)
  • energy management
  • Genetic Algorithm (GA)
  • sensitivity analysis
  • multiple linear regression
Uneingeschränkter Zugang

RFID Tag Ownership Transfer Protocol with Retrospective Ability

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 121 - 130

Zusammenfassung

Abstract

Tag ownership transfer is an important process for RFID system. Besides the user needs to obtain the information concerning the quality of products in some scenarios, which are attached by tags. In this paper, we proposed an ownership transfer protocol with retrospective ability and analyzed its security level by using GNY logic. The results indicate that the ownership transfer protocol provides high-quality security to RFID systems. It provides an authentication between the tag and owners and location privacy of the tag. The protocol enables to resist a replay attack, man-in-the-middle attack and desynchronization attack. It also protects forward security and backward security. Moreover, it provides the information concerning the quality of the product attached by tags. We analyzed the performance of the protocol and implemented it. The results of the empirical study show that the cost time of a tag is less than some other protocols and suitable for low-cost tags.

Keywords:

  • RFID
  • ownership transfer
  • protocol
  • retrospective ability
  • GNY logic
10 Artikel
Uneingeschränkter Zugang

On Finding All Reducts of Consistent Decision Tables

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 3 - 10

Zusammenfassung

Abstract

The problem of finding reducts plays an important role in processing information on decision tables. The objective of the attribute reduction problem is to reject a redundant attribute in order to find a core attribute for data processing. The attribute reduction in decision tables is the process of finding a minimal subset of conditional attributes which preserve the classification ability of decision tables. In this paper we present the time complexity of the problem of finding all reducts of a consistent decision table. We prove that this time complexity is exponential with respect to the number of attributes of the decision tables. Our proof is performed in two steps. The first step is to show that there exists an exponential algorithm which finds all reducts. The other step is to prove that the time complexity of the problem of finding all reducts of a decision table is not less than exponential.

Keywords:

  • Consistent decision table
  • attribute reduction
  • reduct
  • time complexity
  • relation
  • relation scheme
  • minimal key
  • antikey
Uneingeschränkter Zugang

Dynamic Multi-Attribute Group Decision Making Model Based on Generalized Interval-Valued Trapezoidal Fuzzy Numbers

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 11 - 28

Zusammenfassung

Abstract

In this paper we investigate the dynamic multi-attribute group decision making problems, in which all the attribute values are provided by multiple decision makers at different periods. In order to increase the level of overall satisfaction for the final decision and deal with uncertainty, the attribute values are enhanced with generalized interval-valued trapezoidal fuzzy numbers to cope with the vagueness and indeterminacy. We first define the Dynamic Generalized Interval-valued Trapezoidal Fuzzy Numbers Weighted Geometric Aggregation (DGITFNWGA) operator and give an approach to determine the weights of periods, using the probability density function of Gamma distribution, and then a dynamic multi-attribute group decision making method is developed. The method proposed employs the Generalized Interval-valued Trapezoidal Fuzzy Numbers Hybrid Geometric Aggregation (GITFNHGA) operator to aggregate all individual decision information into the collective attribute values corresponding to each alternative at the same time period, and then utilizes the DGITFNWGA operator to aggregate the collective attribute values at different periods into the overall attribute values corresponding to each alternative and obtains the alternatives ranking, by which the optimal alternative can be determined. Finally, an illustrative example is given to verify the approach developed.

Keywords:

  • Dynamic multi-attribute group decision making, generalized interval-valued trapezoidal fuzzy numbers
  • probability density function
Uneingeschränkter Zugang

Equivalent Transformations and Regularization in Context-Free Grammars

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 29 - 44

Zusammenfassung

Abstract

Regularization of translational context-free grammar via equivalent transformations is a mandatory step in developing a reliable processor of a formal language defined by this grammar. In the 1970-ies, the multi-component oriented graphs with basic equivalent transformations were proposed to represent a formal grammar of ALGOL-68 in a compiler for IBM/360 compatibles. This paper describes a method of grammar regularization with the help of an algorithm of eliminating the left/right-hand side recursion of nonterminals which ultimately converts a context-free grammar into a regular one. The algorithm is based on special equivalent transformations of the grammar syntactic graph: elimination of recursions and insertion of iterations. When implemented in the system SynGT, it has demonstrated over 25% reduction of the memory size required to store the respective intermediate control tables, compared to the algorithm used in Flex/Bison parsers.

Keywords:

  • CFR-grammar
  • a syntactic flow-chart (graph-scheme)
  • equivalent transformations of grammars
Uneingeschränkter Zugang

Network Actual Traffic Prediction Algorithm Based on α-stable Distribution and Wavelet Transformation

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 45 - 55

Zusammenfassung

Abstract

In order to improve the prediction precision of wireless sensor network traffic, a new prediction algorithm (State Prediction algorithm based on α-stable distribution α, SP-α) is proposed, combined with α-stable distribution and wavelet transformation. The algorithm proposed first defines the characteristics of α-stable distribution and then gives the judge basis that obeys α-stable distribution. At the same time, it reduces the prediction error of the actual traffic by fusion of the prediction results of α-stable distribution with wavelet transformation. Finally, the paper thoroughly researches the key factors impacting on the new algorithm through simulations in OPNET and MATLAB. Compared with the performance of FARIMA model, the simulation results proved that SP-α algorithm has better adaptability.

Keywords:

  • Wireless sensor network, prediction, α-stable distribution, wavelet transformation
  • error
Uneingeschränkter Zugang

Control of Traffic Driven Epidemics in Weighted Networks by Immunizing Edges

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 56 - 65

Zusammenfassung

Abstract

Many immunization strategies have been proposed to control the epidemic spreading which mainly focus on how to immunize the nodes. A novel and efficient strategy to control the traffic driven epidemic spreading in weighted networks is proposed in this paper. By immunizing the edges according to different weights, our control strategies cannot only reduce the epidemic spreading velocity and enhance the critical epidemic threshold, but also maintain the integrity of the weighted networks. Simulations show that the control strategy by immunizing edges according to the product of the strengths of two nodes of the edge proved to be more efficient.

Keywords:

  • Traffic driven
  • epidemic spreading
  • weighted networks
  • SI model
  • SIR model
Uneingeschränkter Zugang

Quantitative Comparison of Deformable Models in Range Segmentation

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 66 - 79

Zusammenfassung

Abstract

In this paper we segment range images by applying three deformable models (the classical Active Contour, the adaptive active contour and the Level Set method). These three methods are used to segment images with planar and curved surface scenes. Then the numerical results obtained are compared in order to find the best technique of deformable models adapted to segmentation of range images. Despite of the good experimental results on simple objects, we have noted that the adaptive and classical snake methods have a few limitations and cannot detect discontinuities in curvatures and some items do not always converge. However, the level set method is very efficient for segmenting range images with curvature and complex forms.

Keywords:

  • Range image
  • segmentation
  • deformable model
  • active contour
  • snake
  • level set
Uneingeschränkter Zugang

From Gamification to Gameful Design and Gameful Experience in Learning

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 80 - 100

Zusammenfassung

Abstract

Learning is a goal driven social activity determined by motivational factors. To be able to efficiently gamify learning for improved student motivation and engagement, the educators have to understand the related aspects studied in games, motivational psychology and pedagogy. This will help them to identify the factors that drive and explain desired learning behaviors. This paper presents a survey of the main approaches employed in gamification and the emerging new directions in the context of the relevant motivational psychology and pedagogy. The focus is on the motivational factors that impact learning and understanding of behavior change. The purpose of the paper is two-fold: on one side, to provide analysis and guide to relevant works related to gamification along with outlining the emerging trends, and on the other, to provide foundation for evaluation and identification of the areas of possible improvements.

Keywords:

  • Learning process
  • gamification
  • motivational factors
  • gameful experience
Uneingeschränkter Zugang

Evaluation of the Software Industry Competitiveness in Jilin Province Based on Factor Analysis

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 101 - 108

Zusammenfassung

Abstract

In this paper 12 economic indices of the software industry in 30 cities/provinces in China are used to set up an evaluation system for the competitiveness of the regional software industry. By using the statistical analysis method of factor analysis, an evaluation model of the comprehensive competitiveness of the software industry for each city/province is built. Taking Beijing and Shanghai as examples, the comprehensive competitiveness and problems of the software industry in Jilin province are compared and analyzed.

Keywords:

  • Software industry
  • competitiveness
  • factor analysis
Uneingeschränkter Zugang

Best Suitable Cogeneration Power for Factories from Multi-Objective Data Analysis

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 109 - 120

Zusammenfassung

Abstract

The cogeneration systems in the industrial sector have become an essential part due to their global efficiency and reduced pollution. These systems may operate from conventional fuel sources, as well as from renewable energy sources (biomass, solar, fuel cell).

Cogeneration systems could be installed as a distributed generation and on-site generation source in order to take advantage from the produced heat. The utility can motivate factories to install such systems by permitting them to link and sell their residual production capacity to the electrical grid. This work presents a new technique to find the best solution from multi-objective optimization results, using a sensitivity and data analysis method. Genetic Algorithm (GA) optimization method is used with the data analysis method: Multiple Linear Regression (MLR).

Keywords:

  • Combined Heat and Power (CHP)
  • energy management
  • Genetic Algorithm (GA)
  • sensitivity analysis
  • multiple linear regression
Uneingeschränkter Zugang

RFID Tag Ownership Transfer Protocol with Retrospective Ability

Online veröffentlicht: 31 Jan 2015
Seitenbereich: 121 - 130

Zusammenfassung

Abstract

Tag ownership transfer is an important process for RFID system. Besides the user needs to obtain the information concerning the quality of products in some scenarios, which are attached by tags. In this paper, we proposed an ownership transfer protocol with retrospective ability and analyzed its security level by using GNY logic. The results indicate that the ownership transfer protocol provides high-quality security to RFID systems. It provides an authentication between the tag and owners and location privacy of the tag. The protocol enables to resist a replay attack, man-in-the-middle attack and desynchronization attack. It also protects forward security and backward security. Moreover, it provides the information concerning the quality of the product attached by tags. We analyzed the performance of the protocol and implemented it. The results of the empirical study show that the cost time of a tag is less than some other protocols and suitable for low-cost tags.

Keywords:

  • RFID
  • ownership transfer
  • protocol
  • retrospective ability
  • GNY logic

Planen Sie Ihre Fernkonferenz mit Scienceendo