Revista y Edición

Volumen 23 (2023): Edición 1 (March 2023)

Volumen 22 (2022): Edición 4 (November 2022)

Volumen 22 (2022): Edición 3 (September 2022)

Volumen 22 (2022): Edición 2 (June 2022)

Volumen 22 (2022): Edición 1 (March 2022)

Volumen 21 (2021): Edición 4 (December 2021)

Volumen 21 (2021): Edición 3 (September 2021)

Volumen 21 (2021): Edición 2 (June 2021)

Volumen 21 (2021): Edición 1 (March 2021)

Volumen 20 (2020): Edición 6 (December 2020)
Special Edición on New Developments in Scalable Computing

Volumen 20 (2020): Edición 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volumen 20 (2020): Edición 4 (November 2020)

Volumen 20 (2020): Edición 3 (September 2020)

Volumen 20 (2020): Edición 2 (June 2020)

Volumen 20 (2020): Edición 1 (March 2020)

Volumen 19 (2019): Edición 4 (November 2019)

Volumen 19 (2019): Edición 3 (September 2019)

Volumen 19 (2019): Edición 2 (June 2019)

Volumen 19 (2019): Edición 1 (March 2019)

Volumen 18 (2018): Edición 5 (May 2018)
Special Thematic Edición on Optimal Codes and Related Topics

Volumen 18 (2018): Edición 4 (November 2018)

Volumen 18 (2018): Edición 3 (September 2018)

Volumen 18 (2018): Edición 2 (June 2018)

Volumen 18 (2018): Edición 1 (March 2018)

Volumen 17 (2017): Edición 5 (December 2017)
Special Edición With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volumen 17 (2017): Edición 4 (November 2017)

Volumen 17 (2017): Edición 3 (September 2017)

Volumen 17 (2017): Edición 2 (June 2017)

Volumen 17 (2017): Edición 1 (March 2017)

Volumen 16 (2016): Edición 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volumen 16 (2016): Edición 5 (October 2016)
Edición Title: Special Edición on Application of Advanced Computing and Simulation in Information Systems

Volumen 16 (2016): Edición 4 (December 2016)

Volumen 16 (2016): Edición 3 (September 2016)

Volumen 16 (2016): Edición 2 (June 2016)

Volumen 16 (2016): Edición 1 (March 2016)

Volumen 15 (2015): Edición 7 (December 2015)
Special Edición on Information Fusion

Volumen 15 (2015): Edición 6 (December 2015)
Special Edición on Logistics, Informatics and Service Science

Volumen 15 (2015): Edición 5 (April 2015)
Special Edición on Control in Transportation Systems

Volumen 15 (2015): Edición 4 (November 2015)

Volumen 15 (2015): Edición 3 (September 2015)

Volumen 15 (2015): Edición 2 (June 2015)

Volumen 15 (2015): Edición 1 (March 2015)

Volumen 14 (2014): Edición 5 (December 2014)
Special Edición

Volumen 14 (2014): Edición 4 (December 2014)

Volumen 14 (2014): Edición 3 (September 2014)

Volumen 14 (2014): Edición 2 (June 2014)

Volumen 14 (2014): Edición 1 (March 2014)

Volumen 13 (2013): Edición Special-Edición (December 2013)

Volumen 13 (2013): Edición 4 (December 2013)
The publishing of the present issue (Volumen 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volumen 13 (2013): Edición 3 (September 2013)

Volumen 13 (2013): Edición 2 (June 2013)

Volumen 13 (2013): Edición 1 (March 2013)

Volumen 12 (2012): Edición 4 (December 2012)

Volumen 12 (2012): Edición 3 (September 2012)

Volumen 12 (2012): Edición 2 (June 2012)

Volumen 12 (2012): Edición 1 (March 2012)

Detalles de la revista
Formato
Revista
eISSN
1314-4081
Publicado por primera vez
13 Mar 2012
Periodo de publicación
4 veces al año
Idiomas
Inglés

Buscar

Volumen 19 (2019): Edición 1 (March 2019)

Detalles de la revista
Formato
Revista
eISSN
1314-4081
Publicado por primera vez
13 Mar 2012
Periodo de publicación
4 veces al año
Idiomas
Inglés

Buscar

11 Artículos
Acceso abierto

A Review of Feature Selection and Its Methods

Publicado en línea: 29 Mar 2019
Páginas: 3 - 26

Resumen

Abstract

Nowadays, being in digital era the data generated by various applications are increasing drastically both row-wise and column wise; this creates a bottleneck for analytics and also increases the burden of machine learning algorithms that work for pattern recognition. This cause of dimensionality can be handled through reduction techniques. The Dimensionality Reduction (DR) can be handled in two ways namely Feature Selection (FS) and Feature Extraction (FE). This paper focuses on a survey of feature selection methods, from this extensive survey we can conclude that most of the FS methods use static data. However, after the emergence of IoT and web-based applications, the data are generated dynamically and grow in a fast rate, so it is likely to have noisy data, it also hinders the performance of the algorithm. With the increase in the size of the data set, the scalability of the FS methods becomes jeopardized. So the existing DR algorithms do not address the issues with the dynamic data. Using FS methods not only reduces the burden of the data but also avoids overfitting of the model.

Palabras clave

  • Dimensionality Reduction (DR)
  • Feature Selection (FS)
  • Feature Extraction (FE)
Acceso abierto

Recent Development in Smart Grid Authentication Approaches: A Systematic Literature Review

Publicado en línea: 29 Mar 2019
Páginas: 27 - 52

Resumen

Abstract

Smart Grid (SG) is a major electricity trend expected to replace traditional electricity systems. SG has faster response to electricity malfunctions and improved utilization of consumed power, and it has two-way communication between providers and consumers. However, SG is vulnerable to attacks and requires robust authentication techniques to provide secure authenticity for its components. This paper analyses previous literature, comprising 27 papers on the status of SG authentication techniques, main components, and kinds of attacks. This paper also highlights the main requirements and challenges for developing authentication approaches for the SG system. This can serve as useful guidance for the development and deployment of authentication techniques for SG systems and helps practitioners select authentication approaches applicable to system needs.

Palabras clave

  • Smart grid
  • Authentication
  • Smart meter
  • Key management
Acceso abierto

Efficient Dynamic Bloom Filter Hashing Fragmentation for Cloud Data Storage

Publicado en línea: 29 Mar 2019
Páginas: 53 - 72

Resumen

Abstract

Security is important in cloud data storage while using the cloud services provided by the service provider in the cloud. Most of the research works have been designed for a secure cloud data storage. However, cloud users still have security issues with their outsourced data. In order to overcome such limitations, a Dynamic Bloom Filter Hashing based Cloud Data Storage (DBFH-CDS) Technique is proposed. The main goal of DBFH-CDS Technique is to improve confidentiality and security of data storage in a cloud environment. The proposed Technique is implemented using data fragmentation model and Bloom filter. The DBFH-CDS Technique uses data fragmentation model for fragmenting the large cloud datasets. After that, Bloom Filter is employed in DBFH-CDS Technique for storing the fragmented sensitive data along with higher security. The DBFH-CDS Technique ensures high data confidentiality and security for cloud data storage with the help of Bloom Filter. The performance of proposed DBFH-CDS Technique is measured in terms of Execution time and Data retrieval efficiency. The experimental results show that the DBFH-CDS Technique is able to improve the cloud data storage security with minimum space complexity as compared to state-of-the-art-works.

Palabras clave

  • Cloud data storage
  • Cloud users
  • security
  • Confidentiality
  • fragmented table
  • unfragmented table
  • Bloom filter
Acceso abierto

VoIP Steganography Methods, a Survey

Publicado en línea: 29 Mar 2019
Páginas: 73 - 87

Resumen

Abstract

Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred than cryptography to achieve undetectability. Steganography hides the secret data inside the other file such as text, audio, video, so that the existence of the secret data is completely hidden. Recent research focuses much on utilizing Voice over Internet Protocol (VoIP) calls as a carrier for data hiding. VoIP calls are much preferred among internet users for its wide availability, dynamic time limit and low cost. This paper focuses on data hiding methods that uses VoIP as a carrier. The paper also analyzes the performance of the algorithms using the three metrics undetectability, bandwidth and robustness.

Palabras clave

  • VoIP
  • LSB
  • PCM
  • QIM
Acceso abierto

Deep Learning for Plant Classification and Content-Based Image Retrieval

Publicado en línea: 29 Mar 2019
Páginas: 88 - 100

Resumen

Abstract

The main goal of the present research is to classify images of plants to species with deep learning. We used convolutional neural network architectures for feature learning and fully connected layers with logsoftmax output for classification. Pretrained models on ImageNet were used, and transfer learning was applied. In the current research image sets published in the scope of the PlantCLEF 2015 challenge were used. The proposed system surpasses the results of all top competitors of the challenge by 8% and 7% at observation and image levels, respectively. Our secondary goal was to satisfy the users’ needs in content-based image retrieval to give relevant hits during species search task. We optimized the length of the returned lists in order to maximize MAP (Mean Average Precision), which is critical to the performance of image retrieval. Thus, we achieved more than 50% improvement of MAP in the test set compared to the baseline.

Palabras clave

  • deep learning
  • convolutional neural networks
  • Inception V3
  • MAP
  • image retrieval
Acceso abierto

Hybrid Recommender System via Personalized Users’ Context

Publicado en línea: 29 Mar 2019
Páginas: 101 - 115

Resumen

Abstract

In movie domain, finding the appropriate movie to watch is a challenging task. This paper proposes a recommender system that suggests movies in cinema that fit the user’s available time, location, mood and emotions. Conducted experiments for evaluation showed that the proposed method outperforms the other baselines.

Palabras clave

  • Movie recommender
  • Emotion recommendation
  • Hybrid recommender system
  • sentiment analysis
  • spatio-temporal recommendation
Acceso abierto

Multi-Channel Target Shadow Detection in GPS FSR

Publicado en línea: 29 Mar 2019
Páginas: 116 - 132

Resumen

Abstract

The paper offers new application of a Multi-channel Forward Scatter Radar (MFSR), which uses GPS signals for detection of air targets on their GPS radio shadows. The multi-channel GPS MFSR detector consists of several channels, which process information from several satellites simultaneously. The phenomena of diffraction in the near area is used for shadow target detection. The target is considered to be detected, if it is detected at least in one of detector channels. Two experiments have been made to verify the proposed detection algorithm. The results obtained show that the proposed multi-channel detection algorithm can be successfully used for detection of low-flying air targets at very short distances or the near area of diffraction. Such targets are undetectable in GPS bistatic radar.

Palabras clave

  • FSR
  • GPS
  • signal detection and estimation
Acceso abierto

Security of Low Computing Power Devices: A Survey of Requirements, Challenges & Possible Solutions

Publicado en línea: 29 Mar 2019
Páginas: 133 - 164

Resumen

Abstract

Security has been a primary concern in almost all areas of computing and for the devices that are low on computing power it becomes more important. In this paper, a new class of computing device termed as Low Computing Power Device (LCPD) has been defined conceptually. The paper brings out common attributes, security requirements and security challenges of all kinds of low computing power devices in one place so that common security solutions for these can be designed and implemented rather than doing this for each individual device type. A survey of existing recent security solutions for different LCPDs hasve been presented here. This paper has also provided possible security solutions for LCPDs which include identification of countermeasures against different threats and attacks on these devices, and choosing appropriate cryptographic mechanism for implementing the countermeasures efficiently.

Palabras clave

  • Computing power
  • security
  • requirements
  • challenges
  • solutions
Acceso abierto

Adaptive Observer of Resistance in Sensorless Estimation of Speed and Position in Brushless DC Electric Motor

Publicado en línea: 29 Mar 2019
Páginas: 165 - 176

Resumen

Abstract

Estimating the speed and position using measurable electrical parameters would allow establishment of sensorless control systems for brushless DC motors, without the need to use expensive sensors for the rotor position and speed. When the motor is running, it heats up and the stator resistance rises. This heat-dependent change needs to be reflected in the observer, as it would produce an error in rated speed and position. An adaptive algorithm can compensate for the change of resistance as a disturbing effect of the motor heating. The adaptive algorithm for estimating the resistance is synthesized using the function of Lyapunov. This article is useful for estimation of brushless electric motor speed and position with observer. It contains simulations with an adaptive observer of resistance for sensorless estimation of speed and position in brushless DC motor through measurement of voltage and current.

Palabras clave

  • Brushless motor
  • observer
  • speed
  • position
  • estimate
  • Lyapunov
  • stator resistance
Acceso abierto

Optimum Design of CDM-Backstepping Control with Nonlinear Observer for Electrohydraulic Servo System Using Ant Swarm

Publicado en línea: 29 Mar 2019
Páginas: 177 - 189

Resumen

Abstract

This paper introduces an application of an Ant Colony Optimization algorithm to optimize the parameters in the design of a type of nonlinear robust control algorithm based on coefficient diagram method and backstepping strategy with nonlinear observer for the electrohydraulic servo system with supply pressure under the conditions of uncertainty and the action of external disturbance. Based on this model, a systematic analysis and design algorithm is developed to deal with stabilization and angular displacement tracking, one feature of this work is employing the nonlinear observer to achieve the asymptotic stability with state estimations. Finally, numerical simulations are given to demonstrate the usefulness and advantages of the proposed optimization method.

Palabras clave

  • Ant colony optimization
  • Coefficients diagram method
  • Backstepping control
  • Electrohydraulic servo systems
  • Observers
Acceso abierto

Application of Information Technologies and Algorithms in Ship Passage Planning

Publicado en línea: 29 Mar 2019
Páginas: 190 - 200

Resumen

Abstract

With the continuous increase of international oil prices, more and more shipping companies look for new solutions to the ever present question: How to reduce operational fuel consumption and decrease air pollution. Ship route planning is an indispensable part of the ship navigation process. In the modern world, the passage planning aspect of navigation is shifting. No longer do we see mariners drawing course lines on a paper chart. No longer do they calculate distances with compasses. Elaborate algorithms on various digital devices perform all these tasks. Algorithms plot the optimum tracks on digital charts and algorithms can decide how to avoid collision situations. Nowadays charter companies do not rely solely on the experienced navigators on board their vessels to decide the best route. Instead, this task is outsourced ashore to routing and weather-routing enterprises. The algorithms used by those enterprises are continuously evolving and getting better and better. They are coming popular because of another reason – more and more the shipping society support the newly idea for using crewless ships. However, are they up to the task to eliminate the human element in passage planning? In this article, we are going to review some of the weak points of the algorithms in use.

Palabras clave

  • Information technologies in shipping
  • cybernetic decisions
  • evolutionary algorithm
  • safety of navigation
11 Artículos
Acceso abierto

A Review of Feature Selection and Its Methods

Publicado en línea: 29 Mar 2019
Páginas: 3 - 26

Resumen

Abstract

Nowadays, being in digital era the data generated by various applications are increasing drastically both row-wise and column wise; this creates a bottleneck for analytics and also increases the burden of machine learning algorithms that work for pattern recognition. This cause of dimensionality can be handled through reduction techniques. The Dimensionality Reduction (DR) can be handled in two ways namely Feature Selection (FS) and Feature Extraction (FE). This paper focuses on a survey of feature selection methods, from this extensive survey we can conclude that most of the FS methods use static data. However, after the emergence of IoT and web-based applications, the data are generated dynamically and grow in a fast rate, so it is likely to have noisy data, it also hinders the performance of the algorithm. With the increase in the size of the data set, the scalability of the FS methods becomes jeopardized. So the existing DR algorithms do not address the issues with the dynamic data. Using FS methods not only reduces the burden of the data but also avoids overfitting of the model.

Palabras clave

  • Dimensionality Reduction (DR)
  • Feature Selection (FS)
  • Feature Extraction (FE)
Acceso abierto

Recent Development in Smart Grid Authentication Approaches: A Systematic Literature Review

Publicado en línea: 29 Mar 2019
Páginas: 27 - 52

Resumen

Abstract

Smart Grid (SG) is a major electricity trend expected to replace traditional electricity systems. SG has faster response to electricity malfunctions and improved utilization of consumed power, and it has two-way communication between providers and consumers. However, SG is vulnerable to attacks and requires robust authentication techniques to provide secure authenticity for its components. This paper analyses previous literature, comprising 27 papers on the status of SG authentication techniques, main components, and kinds of attacks. This paper also highlights the main requirements and challenges for developing authentication approaches for the SG system. This can serve as useful guidance for the development and deployment of authentication techniques for SG systems and helps practitioners select authentication approaches applicable to system needs.

Palabras clave

  • Smart grid
  • Authentication
  • Smart meter
  • Key management
Acceso abierto

Efficient Dynamic Bloom Filter Hashing Fragmentation for Cloud Data Storage

Publicado en línea: 29 Mar 2019
Páginas: 53 - 72

Resumen

Abstract

Security is important in cloud data storage while using the cloud services provided by the service provider in the cloud. Most of the research works have been designed for a secure cloud data storage. However, cloud users still have security issues with their outsourced data. In order to overcome such limitations, a Dynamic Bloom Filter Hashing based Cloud Data Storage (DBFH-CDS) Technique is proposed. The main goal of DBFH-CDS Technique is to improve confidentiality and security of data storage in a cloud environment. The proposed Technique is implemented using data fragmentation model and Bloom filter. The DBFH-CDS Technique uses data fragmentation model for fragmenting the large cloud datasets. After that, Bloom Filter is employed in DBFH-CDS Technique for storing the fragmented sensitive data along with higher security. The DBFH-CDS Technique ensures high data confidentiality and security for cloud data storage with the help of Bloom Filter. The performance of proposed DBFH-CDS Technique is measured in terms of Execution time and Data retrieval efficiency. The experimental results show that the DBFH-CDS Technique is able to improve the cloud data storage security with minimum space complexity as compared to state-of-the-art-works.

Palabras clave

  • Cloud data storage
  • Cloud users
  • security
  • Confidentiality
  • fragmented table
  • unfragmented table
  • Bloom filter
Acceso abierto

VoIP Steganography Methods, a Survey

Publicado en línea: 29 Mar 2019
Páginas: 73 - 87

Resumen

Abstract

Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred than cryptography to achieve undetectability. Steganography hides the secret data inside the other file such as text, audio, video, so that the existence of the secret data is completely hidden. Recent research focuses much on utilizing Voice over Internet Protocol (VoIP) calls as a carrier for data hiding. VoIP calls are much preferred among internet users for its wide availability, dynamic time limit and low cost. This paper focuses on data hiding methods that uses VoIP as a carrier. The paper also analyzes the performance of the algorithms using the three metrics undetectability, bandwidth and robustness.

Palabras clave

  • VoIP
  • LSB
  • PCM
  • QIM
Acceso abierto

Deep Learning for Plant Classification and Content-Based Image Retrieval

Publicado en línea: 29 Mar 2019
Páginas: 88 - 100

Resumen

Abstract

The main goal of the present research is to classify images of plants to species with deep learning. We used convolutional neural network architectures for feature learning and fully connected layers with logsoftmax output for classification. Pretrained models on ImageNet were used, and transfer learning was applied. In the current research image sets published in the scope of the PlantCLEF 2015 challenge were used. The proposed system surpasses the results of all top competitors of the challenge by 8% and 7% at observation and image levels, respectively. Our secondary goal was to satisfy the users’ needs in content-based image retrieval to give relevant hits during species search task. We optimized the length of the returned lists in order to maximize MAP (Mean Average Precision), which is critical to the performance of image retrieval. Thus, we achieved more than 50% improvement of MAP in the test set compared to the baseline.

Palabras clave

  • deep learning
  • convolutional neural networks
  • Inception V3
  • MAP
  • image retrieval
Acceso abierto

Hybrid Recommender System via Personalized Users’ Context

Publicado en línea: 29 Mar 2019
Páginas: 101 - 115

Resumen

Abstract

In movie domain, finding the appropriate movie to watch is a challenging task. This paper proposes a recommender system that suggests movies in cinema that fit the user’s available time, location, mood and emotions. Conducted experiments for evaluation showed that the proposed method outperforms the other baselines.

Palabras clave

  • Movie recommender
  • Emotion recommendation
  • Hybrid recommender system
  • sentiment analysis
  • spatio-temporal recommendation
Acceso abierto

Multi-Channel Target Shadow Detection in GPS FSR

Publicado en línea: 29 Mar 2019
Páginas: 116 - 132

Resumen

Abstract

The paper offers new application of a Multi-channel Forward Scatter Radar (MFSR), which uses GPS signals for detection of air targets on their GPS radio shadows. The multi-channel GPS MFSR detector consists of several channels, which process information from several satellites simultaneously. The phenomena of diffraction in the near area is used for shadow target detection. The target is considered to be detected, if it is detected at least in one of detector channels. Two experiments have been made to verify the proposed detection algorithm. The results obtained show that the proposed multi-channel detection algorithm can be successfully used for detection of low-flying air targets at very short distances or the near area of diffraction. Such targets are undetectable in GPS bistatic radar.

Palabras clave

  • FSR
  • GPS
  • signal detection and estimation
Acceso abierto

Security of Low Computing Power Devices: A Survey of Requirements, Challenges & Possible Solutions

Publicado en línea: 29 Mar 2019
Páginas: 133 - 164

Resumen

Abstract

Security has been a primary concern in almost all areas of computing and for the devices that are low on computing power it becomes more important. In this paper, a new class of computing device termed as Low Computing Power Device (LCPD) has been defined conceptually. The paper brings out common attributes, security requirements and security challenges of all kinds of low computing power devices in one place so that common security solutions for these can be designed and implemented rather than doing this for each individual device type. A survey of existing recent security solutions for different LCPDs hasve been presented here. This paper has also provided possible security solutions for LCPDs which include identification of countermeasures against different threats and attacks on these devices, and choosing appropriate cryptographic mechanism for implementing the countermeasures efficiently.

Palabras clave

  • Computing power
  • security
  • requirements
  • challenges
  • solutions
Acceso abierto

Adaptive Observer of Resistance in Sensorless Estimation of Speed and Position in Brushless DC Electric Motor

Publicado en línea: 29 Mar 2019
Páginas: 165 - 176

Resumen

Abstract

Estimating the speed and position using measurable electrical parameters would allow establishment of sensorless control systems for brushless DC motors, without the need to use expensive sensors for the rotor position and speed. When the motor is running, it heats up and the stator resistance rises. This heat-dependent change needs to be reflected in the observer, as it would produce an error in rated speed and position. An adaptive algorithm can compensate for the change of resistance as a disturbing effect of the motor heating. The adaptive algorithm for estimating the resistance is synthesized using the function of Lyapunov. This article is useful for estimation of brushless electric motor speed and position with observer. It contains simulations with an adaptive observer of resistance for sensorless estimation of speed and position in brushless DC motor through measurement of voltage and current.

Palabras clave

  • Brushless motor
  • observer
  • speed
  • position
  • estimate
  • Lyapunov
  • stator resistance
Acceso abierto

Optimum Design of CDM-Backstepping Control with Nonlinear Observer for Electrohydraulic Servo System Using Ant Swarm

Publicado en línea: 29 Mar 2019
Páginas: 177 - 189

Resumen

Abstract

This paper introduces an application of an Ant Colony Optimization algorithm to optimize the parameters in the design of a type of nonlinear robust control algorithm based on coefficient diagram method and backstepping strategy with nonlinear observer for the electrohydraulic servo system with supply pressure under the conditions of uncertainty and the action of external disturbance. Based on this model, a systematic analysis and design algorithm is developed to deal with stabilization and angular displacement tracking, one feature of this work is employing the nonlinear observer to achieve the asymptotic stability with state estimations. Finally, numerical simulations are given to demonstrate the usefulness and advantages of the proposed optimization method.

Palabras clave

  • Ant colony optimization
  • Coefficients diagram method
  • Backstepping control
  • Electrohydraulic servo systems
  • Observers
Acceso abierto

Application of Information Technologies and Algorithms in Ship Passage Planning

Publicado en línea: 29 Mar 2019
Páginas: 190 - 200

Resumen

Abstract

With the continuous increase of international oil prices, more and more shipping companies look for new solutions to the ever present question: How to reduce operational fuel consumption and decrease air pollution. Ship route planning is an indispensable part of the ship navigation process. In the modern world, the passage planning aspect of navigation is shifting. No longer do we see mariners drawing course lines on a paper chart. No longer do they calculate distances with compasses. Elaborate algorithms on various digital devices perform all these tasks. Algorithms plot the optimum tracks on digital charts and algorithms can decide how to avoid collision situations. Nowadays charter companies do not rely solely on the experienced navigators on board their vessels to decide the best route. Instead, this task is outsourced ashore to routing and weather-routing enterprises. The algorithms used by those enterprises are continuously evolving and getting better and better. They are coming popular because of another reason – more and more the shipping society support the newly idea for using crewless ships. However, are they up to the task to eliminate the human element in passage planning? In this article, we are going to review some of the weak points of the algorithms in use.

Palabras clave

  • Information technologies in shipping
  • cybernetic decisions
  • evolutionary algorithm
  • safety of navigation