Revista y Edición

Volumen 22 (2022): Edición 3 (September 2022)

Volumen 22 (2022): Edición 2 (June 2022)

Volumen 22 (2022): Edición 1 (March 2022)

Volumen 21 (2021): Edición 4 (December 2021)

Volumen 21 (2021): Edición 3 (September 2021)

Volumen 21 (2021): Edición 2 (June 2021)

Volumen 21 (2021): Edición 1 (March 2021)

Volumen 20 (2020): Edición 6 (December 2020)
Special Edición on New Developments in Scalable Computing

Volumen 20 (2020): Edición 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volumen 20 (2020): Edición 4 (November 2020)

Volumen 20 (2020): Edición 3 (September 2020)

Volumen 20 (2020): Edición 2 (June 2020)

Volumen 20 (2020): Edición 1 (March 2020)

Volumen 19 (2019): Edición 4 (November 2019)

Volumen 19 (2019): Edición 3 (September 2019)

Volumen 19 (2019): Edición 2 (June 2019)

Volumen 19 (2019): Edición 1 (March 2019)

Volumen 18 (2018): Edición 5 (May 2018)
Special Thematic Edición on Optimal Codes and Related Topics

Volumen 18 (2018): Edición 4 (November 2018)

Volumen 18 (2018): Edición 3 (September 2018)

Volumen 18 (2018): Edición 2 (June 2018)

Volumen 18 (2018): Edición 1 (March 2018)

Volumen 17 (2017): Edición 5 (December 2017)
Special Edición With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volumen 17 (2017): Edición 4 (November 2017)

Volumen 17 (2017): Edición 3 (September 2017)

Volumen 17 (2017): Edición 2 (June 2017)

Volumen 17 (2017): Edición 1 (March 2017)

Volumen 16 (2016): Edición 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volumen 16 (2016): Edición 5 (October 2016)
Edición Title: Special Edición on Application of Advanced Computing and Simulation in Information Systems

Volumen 16 (2016): Edición 4 (December 2016)

Volumen 16 (2016): Edición 3 (September 2016)

Volumen 16 (2016): Edición 2 (June 2016)

Volumen 16 (2016): Edición 1 (March 2016)

Volumen 15 (2015): Edición 7 (December 2015)
Special Edición on Information Fusion

Volumen 15 (2015): Edición 6 (December 2015)
Special Edición on Logistics, Informatics and Service Science

Volumen 15 (2015): Edición 5 (April 2015)
Special Edición on Control in Transportation Systems

Volumen 15 (2015): Edición 4 (November 2015)

Volumen 15 (2015): Edición 3 (September 2015)

Volumen 15 (2015): Edición 2 (June 2015)

Volumen 15 (2015): Edición 1 (March 2015)

Volumen 14 (2014): Edición 5 (December 2014)
Special Edición

Volumen 14 (2014): Edición 4 (December 2014)

Volumen 14 (2014): Edición 3 (September 2014)

Volumen 14 (2014): Edición 2 (June 2014)

Volumen 14 (2014): Edición 1 (March 2014)

Volumen 13 (2013): Edición Special-Edición (December 2013)

Volumen 13 (2013): Edición 4 (December 2013)
The publishing of the present issue (Volumen 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volumen 13 (2013): Edición 3 (September 2013)

Volumen 13 (2013): Edición 2 (June 2013)

Volumen 13 (2013): Edición 1 (March 2013)

Volumen 12 (2012): Edición 4 (December 2012)

Volumen 12 (2012): Edición 3 (September 2012)

Volumen 12 (2012): Edición 2 (June 2012)

Volumen 12 (2012): Edición 1 (March 2012)

Detalles de la revista
Formato
Revista
eISSN
1314-4081
Publicado por primera vez
13 Mar 2012
Periodo de publicación
4 veces al año
Idiomas
Inglés

Buscar

Volumen 14 (2014): Edición 2 (June 2014)

Detalles de la revista
Formato
Revista
eISSN
1314-4081
Publicado por primera vez
13 Mar 2012
Periodo de publicación
4 veces al año
Idiomas
Inglés

Buscar

13 Artículos
Acceso abierto

Natural Language Generation and Semantic Technologies

Publicado en línea: 15 Jul 2014
Páginas: 3 - 23

Resumen

Abstract

The paper presents a survey of the domain of Natural Language Generation (NLG) with its models, techniques, applications, and investigates how the semantic technologies are drawn into text generation. The idea and facilities of Semantic Web initiative are discussed in connection with the new opportunities offered to the Natural Language Generation.

Palabras clave

  • Natural Language Generation
  • semantic technologies
  • semantic Web
Acceso abierto

Secure Routing in Manet Using Synchronization and Data Authencity

Publicado en línea: 15 Jul 2014
Páginas: 24 - 30

Resumen

Abstract

In recent years synchronization plays a major issue for secure transmission in mobile adhoc networks. When an attacker modifies the time synchronization algorithm, the nodes will have faulty estimates of other nodes location, leading to chaos. While transmitting under these adverse conditions, packets might be lost or might be sent to wrong locations. Data replication and data diffusion are two methods which are used to solve the problem of data availability. In this paper we propose an algorithm for secure multi hop transmission used for external attacks.

Palabras clave

  • Time synchronization
  • data availability
  • data authentication
  • pair wise secure transaction
  • end-to-end delay
Acceso abierto

Codes on Key Errors

Publicado en línea: 15 Jul 2014
Páginas: 31 - 37

Resumen

Abstract

Coding theory has started with the intention of detection and correction of errors which have occurred during communication. Different types of errors are produced by different types of communication channels and accordingly codes are developed to deal with them. In 2013 Sharma and Gaur introduced a new kind of an error which will be termed “key error”. This paper obtains the lower and upper bounds on the number of parity-check digits required for linear codes capable for detecting such errors. Illustration of such a code is provided. Codes capable of simultaneous detection and correction of such errors have also been considered.

Palabras clave

  • Parity check digit
  • parity check matrix
  • syndrome
  • standard array
Acceso abierto

A Framework for Visual Dynamic Analysis of Ray Tracing Algorithms

Publicado en línea: 15 Jul 2014
Páginas: 38 - 49

Resumen

Abstract

A novel approach is presented for recording high volume data about ray tracing rendering systems' runtime state and its subsequent dynamic analysis and interactive visualization in the algorithm computational domain. Our framework extracts light paths traced by the system and leverages on a powerful filtering subsystem, helping interactive visualization and exploration of the desired subset of recorded data. We introduce a versatile data logging format and acceleration structures for easy access and filtering. We have implemented a plugin based framework and a tool set that realize all ideas presented in this paper. The framework provides data logging API for instrumenting production-ready, multithreaded, distributed renderers. The framework visualization tool enables deeper understanding of the ray tracing algorithms for novices, as well as for experts.

Palabras clave

  • Visual
  • dynamic
  • analyzer
  • ray tracing
  • debugging
Acceso abierto

Efficient Data Transfer by Mobility Adjustment Algorithm for Clustered Mobile Ad-Hoc Networks

Publicado en línea: 15 Jul 2014
Páginas: 50 - 64

Resumen

Abstract

Mobile Ad-hoc NETwork (MANET) is a prevalent deployable network for easy plug-in and it is widely applied for many real time scenarios. Clustering is a well known solution for efficient communication among nodes with least control overheads. The communication link breaks between nodes when a node moves beyond the transmission range of another node because of mobility. Frequent link breaks happen because of nodes mobility which cannot be controlled without increasing the network control overheads. The authors propose an Mobility Adjustment Routing (MAR) routing algorithm for establishing a stable path between the source and the destination. In this approach the choice of cluster heads based on the smallest weight age, node mobility and remaining battery power are used as a metric for weight computation. The cluster head and the gate way nodes forward RREQ packets to set up a path between the source and the destination which proves efficient communication, before forwarding a RREQ packet cluster the head/gateway node compares its mobility value with RREQ and updates the least value in RREQ. The destination node advertises the least mobility value to the remaining nodes in the path with the help of RREP packet, therefore stable paths are found without increasing the network control overheads. The simulation results done with the help of network simulator 2 show that the algorithm proposed performs well even at higher traffic load compared to existing algorithms.

Palabras clave

  • MANET
  • MAR
  • WCA
  • WBCA
  • GDMAC
  • LID
Acceso abierto

Cross Layer Based Congestion Control in Wireless Mesh Networks

Publicado en línea: 15 Jul 2014
Páginas: 65 - 80

Resumen

Abstract

A major issue that attracts the researchers in wireless mesh networks is the issue of performance of the TCP. The role of the congestion control techniques is pivotal in the development of optimal solutions. In wireless mesh networks, the efficiency of bandwidth management in the process of developing optimal solutions depends largely on the congestion control methods used. This paper explores the possibility of such mechanisms which can achieve efficient congestion control in wireless mesh networks. The method proposed is known as Cross Layer Congestion Control (CLCC) and it is developed on the basis of the concept of cross layer optimization. The main purpose of the paper is to provide an efficient bandwidth management scheme for high speed video applications through a congestion control mechanism. The performance evaluation of the proposed method of CLCC for different environments of traffic models, such as single source to single destination and multiple sources to multiple destinations, are appropriate when compared to the existing models.

Palabras clave

  • Bandwidth management
  • cross layer
  • WMN
  • congestion control
Acceso abierto

Colour Restoration of Image Obtained from CCD Sensor Directly

Publicado en línea: 15 Jul 2014
Páginas: 81 - 91

Resumen

Abstract

The original image data obtained from Charge-coupled Device (CCD) can be called original data, which is lack of color information. In order to restore the color of original image, firstly, we design a Bayer color filter array, and then we use bilinear interpolation algorithm and smooth hue transition interpolation algorithm to restore the color of original image. However, the hues of adjacent pixels change abruptly by the bilinear interpolation, therefore, we use smooth hue transition interpolation to enhance the edge of original image, and finally we identify the ultimate performance of these interpolation algorithms.

Palabras clave

  • Color restoration
  • CCD sensor
  • Bayer
  • Color filter array
  • Bilinear interpolation algorithm
  • Smooth hue transition interpolation algorithm
  • Edge enhancement
  • Objective quality measure
Acceso abierto

A Combined Method for On-Line Signature Verification

Publicado en línea: 15 Jul 2014
Páginas: 92 - 97

Resumen

Abstract

A combined method for on-line signature verification is presented in this paper. Moreover, all the necessary steps in developing a signature recognition system are described: signature data pre-processing, feature extraction and selection, verification and system evaluation. NNs are used for verification. The influence of the signature forgery type (random and skilled) over the verification results is investigated as well. The experiments are carried out on SUsig database which consists of genuine and forgery signatures of 89 users. The average accuracy is 98.46%.

Palabras clave

  • On-line signature verification
  • neural networks
  • feature selection
  • SUsig database
  • forgery signatures
Acceso abierto

Secret Image Sharing Scheme Based on a Boolean Operation

Publicado en línea: 15 Jul 2014
Páginas: 98 - 113

Resumen

Abstract

Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction complexity, due to the use of a Boolean operation. But these research works lack the fault tolerance property which is the heart of secret sharing. This paper deals with a general (k, n) secret image sharing scheme for gray scale images with both low reconstruction complexity and preservation of the fault tolerance property. Moreover, the proposed sharing generation technique can also be applied on colour images.

Palabras clave

  • Secret image sharing
  • Boolean operation
  • reconstruction complexity
  • fault tolerance property
Acceso abierto

Benchmark of Different Gradient Descents in OCR

Publicado en línea: 15 Jul 2014
Páginas: 114 - 126

Resumen

Abstract

In this paper we implement six different learning algorithms in Optical Character Recognition (OCR) problem and achieve the criteria of end-time, number of iterations, train-set performance, test-set performance, validate-set performance and overall performance of these methods and compare them. Finally, we show the advantages and disadvantages of each method.

Palabras clave

  • Learning algorithm
  • neural network
  • Optical Character Recognition (OCR)
  • pattern recognition
Acceso abierto

Telephone Speech Endpoint Detection using Mean-Delta Feature

Publicado en línea: 15 Jul 2014
Páginas: 127 - 139

Resumen

Abstract

In the study the efficiency of three features for trajectory-based endpoint detection is experimentally evaluated in the fixed-text Dynamic Time Warping (DTW) - a based speaker verification task with short phrases of telephone speech. The employed features are Modified Teager Energy (MTE), Energy-Entropy (EE) feature and Mean-Delta (MD) feature. The utterance boundaries in the endpoint detector are provided by means of state automaton and a set of thresholds based only on trajectory characteristics. The training and testing have been done with noisy telephone speech (short phrases in Bulgarian language with length of about 2 s) selected from BG-SRDat corpus. The results of the experiments have shown that the MD feature demonstrates the best performance in the endpoint detection tests in terms of the verification rate.

Palabras clave

  • Speech detection
  • endpoint detection
  • spectral entropy
Acceso abierto

Adaptive Sliding Mode Control Based on a Filter for Four-Wheel Omni-Directional Mobile Robots

Publicado en línea: 15 Jul 2014
Páginas: 140 - 153

Resumen

Abstract

Since there are usually parameter uncertainties and influence of the exogenous disturbances on the dynamic model of a four-wheel omni-directional mobile robot (FOMR), the traditional strategy for motion control has not good performance. A sliding mode control based on an adaptive approach and a filter (AFSMC) is presented in this paper. First, according to identifying the reaching gain by a Radial Basis Function based neural network, and combining a filter, AFSMC can reduce the inherent impact that is produced by the normal sliding mode control. Second, the adaptive approach is applied to deal with the uncertainties and the influence of exogenous disturbances. Numerical simulations are carried out to assess the performance of the controller. All the simulation results indicate that the proposed control strategy is efficient to solve the problem.

Palabras clave

  • Four-wheel drive
  • omni-directional mobile robot
  • adaptive sliding mode
  • filter
Acceso abierto

Solution Bounds for Algebraic Equations in Control Theory

Publicado en línea: 15 Jul 2014
Páginas: 154 - 154

Resumen

13 Artículos
Acceso abierto

Natural Language Generation and Semantic Technologies

Publicado en línea: 15 Jul 2014
Páginas: 3 - 23

Resumen

Abstract

The paper presents a survey of the domain of Natural Language Generation (NLG) with its models, techniques, applications, and investigates how the semantic technologies are drawn into text generation. The idea and facilities of Semantic Web initiative are discussed in connection with the new opportunities offered to the Natural Language Generation.

Palabras clave

  • Natural Language Generation
  • semantic technologies
  • semantic Web
Acceso abierto

Secure Routing in Manet Using Synchronization and Data Authencity

Publicado en línea: 15 Jul 2014
Páginas: 24 - 30

Resumen

Abstract

In recent years synchronization plays a major issue for secure transmission in mobile adhoc networks. When an attacker modifies the time synchronization algorithm, the nodes will have faulty estimates of other nodes location, leading to chaos. While transmitting under these adverse conditions, packets might be lost or might be sent to wrong locations. Data replication and data diffusion are two methods which are used to solve the problem of data availability. In this paper we propose an algorithm for secure multi hop transmission used for external attacks.

Palabras clave

  • Time synchronization
  • data availability
  • data authentication
  • pair wise secure transaction
  • end-to-end delay
Acceso abierto

Codes on Key Errors

Publicado en línea: 15 Jul 2014
Páginas: 31 - 37

Resumen

Abstract

Coding theory has started with the intention of detection and correction of errors which have occurred during communication. Different types of errors are produced by different types of communication channels and accordingly codes are developed to deal with them. In 2013 Sharma and Gaur introduced a new kind of an error which will be termed “key error”. This paper obtains the lower and upper bounds on the number of parity-check digits required for linear codes capable for detecting such errors. Illustration of such a code is provided. Codes capable of simultaneous detection and correction of such errors have also been considered.

Palabras clave

  • Parity check digit
  • parity check matrix
  • syndrome
  • standard array
Acceso abierto

A Framework for Visual Dynamic Analysis of Ray Tracing Algorithms

Publicado en línea: 15 Jul 2014
Páginas: 38 - 49

Resumen

Abstract

A novel approach is presented for recording high volume data about ray tracing rendering systems' runtime state and its subsequent dynamic analysis and interactive visualization in the algorithm computational domain. Our framework extracts light paths traced by the system and leverages on a powerful filtering subsystem, helping interactive visualization and exploration of the desired subset of recorded data. We introduce a versatile data logging format and acceleration structures for easy access and filtering. We have implemented a plugin based framework and a tool set that realize all ideas presented in this paper. The framework provides data logging API for instrumenting production-ready, multithreaded, distributed renderers. The framework visualization tool enables deeper understanding of the ray tracing algorithms for novices, as well as for experts.

Palabras clave

  • Visual
  • dynamic
  • analyzer
  • ray tracing
  • debugging
Acceso abierto

Efficient Data Transfer by Mobility Adjustment Algorithm for Clustered Mobile Ad-Hoc Networks

Publicado en línea: 15 Jul 2014
Páginas: 50 - 64

Resumen

Abstract

Mobile Ad-hoc NETwork (MANET) is a prevalent deployable network for easy plug-in and it is widely applied for many real time scenarios. Clustering is a well known solution for efficient communication among nodes with least control overheads. The communication link breaks between nodes when a node moves beyond the transmission range of another node because of mobility. Frequent link breaks happen because of nodes mobility which cannot be controlled without increasing the network control overheads. The authors propose an Mobility Adjustment Routing (MAR) routing algorithm for establishing a stable path between the source and the destination. In this approach the choice of cluster heads based on the smallest weight age, node mobility and remaining battery power are used as a metric for weight computation. The cluster head and the gate way nodes forward RREQ packets to set up a path between the source and the destination which proves efficient communication, before forwarding a RREQ packet cluster the head/gateway node compares its mobility value with RREQ and updates the least value in RREQ. The destination node advertises the least mobility value to the remaining nodes in the path with the help of RREP packet, therefore stable paths are found without increasing the network control overheads. The simulation results done with the help of network simulator 2 show that the algorithm proposed performs well even at higher traffic load compared to existing algorithms.

Palabras clave

  • MANET
  • MAR
  • WCA
  • WBCA
  • GDMAC
  • LID
Acceso abierto

Cross Layer Based Congestion Control in Wireless Mesh Networks

Publicado en línea: 15 Jul 2014
Páginas: 65 - 80

Resumen

Abstract

A major issue that attracts the researchers in wireless mesh networks is the issue of performance of the TCP. The role of the congestion control techniques is pivotal in the development of optimal solutions. In wireless mesh networks, the efficiency of bandwidth management in the process of developing optimal solutions depends largely on the congestion control methods used. This paper explores the possibility of such mechanisms which can achieve efficient congestion control in wireless mesh networks. The method proposed is known as Cross Layer Congestion Control (CLCC) and it is developed on the basis of the concept of cross layer optimization. The main purpose of the paper is to provide an efficient bandwidth management scheme for high speed video applications through a congestion control mechanism. The performance evaluation of the proposed method of CLCC for different environments of traffic models, such as single source to single destination and multiple sources to multiple destinations, are appropriate when compared to the existing models.

Palabras clave

  • Bandwidth management
  • cross layer
  • WMN
  • congestion control
Acceso abierto

Colour Restoration of Image Obtained from CCD Sensor Directly

Publicado en línea: 15 Jul 2014
Páginas: 81 - 91

Resumen

Abstract

The original image data obtained from Charge-coupled Device (CCD) can be called original data, which is lack of color information. In order to restore the color of original image, firstly, we design a Bayer color filter array, and then we use bilinear interpolation algorithm and smooth hue transition interpolation algorithm to restore the color of original image. However, the hues of adjacent pixels change abruptly by the bilinear interpolation, therefore, we use smooth hue transition interpolation to enhance the edge of original image, and finally we identify the ultimate performance of these interpolation algorithms.

Palabras clave

  • Color restoration
  • CCD sensor
  • Bayer
  • Color filter array
  • Bilinear interpolation algorithm
  • Smooth hue transition interpolation algorithm
  • Edge enhancement
  • Objective quality measure
Acceso abierto

A Combined Method for On-Line Signature Verification

Publicado en línea: 15 Jul 2014
Páginas: 92 - 97

Resumen

Abstract

A combined method for on-line signature verification is presented in this paper. Moreover, all the necessary steps in developing a signature recognition system are described: signature data pre-processing, feature extraction and selection, verification and system evaluation. NNs are used for verification. The influence of the signature forgery type (random and skilled) over the verification results is investigated as well. The experiments are carried out on SUsig database which consists of genuine and forgery signatures of 89 users. The average accuracy is 98.46%.

Palabras clave

  • On-line signature verification
  • neural networks
  • feature selection
  • SUsig database
  • forgery signatures
Acceso abierto

Secret Image Sharing Scheme Based on a Boolean Operation

Publicado en línea: 15 Jul 2014
Páginas: 98 - 113

Resumen

Abstract

Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction complexity, due to the use of a Boolean operation. But these research works lack the fault tolerance property which is the heart of secret sharing. This paper deals with a general (k, n) secret image sharing scheme for gray scale images with both low reconstruction complexity and preservation of the fault tolerance property. Moreover, the proposed sharing generation technique can also be applied on colour images.

Palabras clave

  • Secret image sharing
  • Boolean operation
  • reconstruction complexity
  • fault tolerance property
Acceso abierto

Benchmark of Different Gradient Descents in OCR

Publicado en línea: 15 Jul 2014
Páginas: 114 - 126

Resumen

Abstract

In this paper we implement six different learning algorithms in Optical Character Recognition (OCR) problem and achieve the criteria of end-time, number of iterations, train-set performance, test-set performance, validate-set performance and overall performance of these methods and compare them. Finally, we show the advantages and disadvantages of each method.

Palabras clave

  • Learning algorithm
  • neural network
  • Optical Character Recognition (OCR)
  • pattern recognition
Acceso abierto

Telephone Speech Endpoint Detection using Mean-Delta Feature

Publicado en línea: 15 Jul 2014
Páginas: 127 - 139

Resumen

Abstract

In the study the efficiency of three features for trajectory-based endpoint detection is experimentally evaluated in the fixed-text Dynamic Time Warping (DTW) - a based speaker verification task with short phrases of telephone speech. The employed features are Modified Teager Energy (MTE), Energy-Entropy (EE) feature and Mean-Delta (MD) feature. The utterance boundaries in the endpoint detector are provided by means of state automaton and a set of thresholds based only on trajectory characteristics. The training and testing have been done with noisy telephone speech (short phrases in Bulgarian language with length of about 2 s) selected from BG-SRDat corpus. The results of the experiments have shown that the MD feature demonstrates the best performance in the endpoint detection tests in terms of the verification rate.

Palabras clave

  • Speech detection
  • endpoint detection
  • spectral entropy
Acceso abierto

Adaptive Sliding Mode Control Based on a Filter for Four-Wheel Omni-Directional Mobile Robots

Publicado en línea: 15 Jul 2014
Páginas: 140 - 153

Resumen

Abstract

Since there are usually parameter uncertainties and influence of the exogenous disturbances on the dynamic model of a four-wheel omni-directional mobile robot (FOMR), the traditional strategy for motion control has not good performance. A sliding mode control based on an adaptive approach and a filter (AFSMC) is presented in this paper. First, according to identifying the reaching gain by a Radial Basis Function based neural network, and combining a filter, AFSMC can reduce the inherent impact that is produced by the normal sliding mode control. Second, the adaptive approach is applied to deal with the uncertainties and the influence of exogenous disturbances. Numerical simulations are carried out to assess the performance of the controller. All the simulation results indicate that the proposed control strategy is efficient to solve the problem.

Palabras clave

  • Four-wheel drive
  • omni-directional mobile robot
  • adaptive sliding mode
  • filter
Acceso abierto

Solution Bounds for Algebraic Equations in Control Theory

Publicado en línea: 15 Jul 2014
Páginas: 154 - 154

Resumen

Planifique su conferencia remota con Sciendo