Revista y Edición

Volumen 22 (2022): Edición 3 (September 2022)

Volumen 22 (2022): Edición 2 (June 2022)

Volumen 22 (2022): Edición 1 (March 2022)

Volumen 21 (2021): Edición 4 (December 2021)

Volumen 21 (2021): Edición 3 (September 2021)

Volumen 21 (2021): Edición 2 (June 2021)

Volumen 21 (2021): Edición 1 (March 2021)

Volumen 20 (2020): Edición 6 (December 2020)
Special Edición on New Developments in Scalable Computing

Volumen 20 (2020): Edición 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volumen 20 (2020): Edición 4 (November 2020)

Volumen 20 (2020): Edición 3 (September 2020)

Volumen 20 (2020): Edición 2 (June 2020)

Volumen 20 (2020): Edición 1 (March 2020)

Volumen 19 (2019): Edición 4 (November 2019)

Volumen 19 (2019): Edición 3 (September 2019)

Volumen 19 (2019): Edición 2 (June 2019)

Volumen 19 (2019): Edición 1 (March 2019)

Volumen 18 (2018): Edición 5 (May 2018)
Special Thematic Edición on Optimal Codes and Related Topics

Volumen 18 (2018): Edición 4 (November 2018)

Volumen 18 (2018): Edición 3 (September 2018)

Volumen 18 (2018): Edición 2 (June 2018)

Volumen 18 (2018): Edición 1 (March 2018)

Volumen 17 (2017): Edición 5 (December 2017)
Special Edición With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volumen 17 (2017): Edición 4 (November 2017)

Volumen 17 (2017): Edición 3 (September 2017)

Volumen 17 (2017): Edición 2 (June 2017)

Volumen 17 (2017): Edición 1 (March 2017)

Volumen 16 (2016): Edición 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volumen 16 (2016): Edición 5 (October 2016)
Edición Title: Special Edición on Application of Advanced Computing and Simulation in Information Systems

Volumen 16 (2016): Edición 4 (December 2016)

Volumen 16 (2016): Edición 3 (September 2016)

Volumen 16 (2016): Edición 2 (June 2016)

Volumen 16 (2016): Edición 1 (March 2016)

Volumen 15 (2015): Edición 7 (December 2015)
Special Edición on Information Fusion

Volumen 15 (2015): Edición 6 (December 2015)
Special Edición on Logistics, Informatics and Service Science

Volumen 15 (2015): Edición 5 (April 2015)
Special Edición on Control in Transportation Systems

Volumen 15 (2015): Edición 4 (November 2015)

Volumen 15 (2015): Edición 3 (September 2015)

Volumen 15 (2015): Edición 2 (June 2015)

Volumen 15 (2015): Edición 1 (March 2015)

Volumen 14 (2014): Edición 5 (December 2014)
Special Edición

Volumen 14 (2014): Edición 4 (December 2014)

Volumen 14 (2014): Edición 3 (September 2014)

Volumen 14 (2014): Edición 2 (June 2014)

Volumen 14 (2014): Edición 1 (March 2014)

Volumen 13 (2013): Edición Special-Edición (December 2013)

Volumen 13 (2013): Edición 4 (December 2013)
The publishing of the present issue (Volumen 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volumen 13 (2013): Edición 3 (September 2013)

Volumen 13 (2013): Edición 2 (June 2013)

Volumen 13 (2013): Edición 1 (March 2013)

Volumen 12 (2012): Edición 4 (December 2012)

Volumen 12 (2012): Edición 3 (September 2012)

Volumen 12 (2012): Edición 2 (June 2012)

Volumen 12 (2012): Edición 1 (March 2012)

Detalles de la revista
Formato
Revista
eISSN
1314-4081
Publicado por primera vez
13 Mar 2012
Periodo de publicación
4 veces al año
Idiomas
Inglés

Buscar

Volumen 20 (2020): Edición 1 (March 2020)

Detalles de la revista
Formato
Revista
eISSN
1314-4081
Publicado por primera vez
13 Mar 2012
Periodo de publicación
4 veces al año
Idiomas
Inglés

Buscar

11 Artículos
Acceso abierto

On Some Knowledge Measures of Intuitionistic Fuzzy Sets of Type Two with Application to MCDM

Publicado en línea: 27 Mar 2020
Páginas: 3 - 20

Resumen

Abstract

To overcome the certain limitations of Intuitionistic Fuzzy Sets (IFSs), the notion of Intuitionistic Fuzzy Sets of Second Type (IFSST) was introduced. IFSST is a modified version of IFS for handling some problems in a reasonable manner. Type two Intuitionistic Fuzzy entropy (IFSST-entropy) measures the amount of ambiguity/uncertainty present in an IFSST. In the present paper, we introduce the concept of dual measure of IFSST-entropy, i.e., IFSST-knowledge measure. We develop some IFSST-knowledge measures and prove some of their properties. We also show the superiority of the proposed IFSST-knowledge measures through comparative study. Further, we demonstrate the application of the proposed knowledge measures in Multi-Criteria Decision-Making (MCDM).

Palabras clave

  • IFSs
  • IFSST
  • IFSST-knowledge measure
  • MCDM
Acceso abierto

EnQuad: A Publicly-Available Simulator for Quantum Key Distribution Protocols

Publicado en línea: 27 Mar 2020
Páginas: 21 - 35

Resumen

Abstract

In this paper, we present EnQuad Version 1.0: a high-speed and expandable simulator for Quantum Key Distribution (QKD) protocols. Surpassing available simulators, EnQuad does not only simulate a QKD stack, but also does security testing and guides the researcher on which reconciliation protocol should be used in his experimental setup. On the top of that, it recommends changes for the researcher to satisfy security or a given target key-rate if any of them is not already fulfilled. Although EnQuad V1.0 is concerned with depolarizing channels and Individual Intercept-and-Resend attacks, EnQuad is featured with 24 parameters and 9 modular functions so that it could be expanded to a wide range of QKD protocols. In addition, we validated EnQuad outcomes against a comparable simulator and against theory. Furthermore, a set of 11 experiments showed that EnQuad runs 6.12× to 12.2× faster than a comparable simulator. EnQuad was implemented in MATLAB and the code is available online.

Palabras clave

  • QKD simulators
  • Information Security
  • Quantum Cryptography
  • Scientific Computations
  • Software Technologies
Acceso abierto

A Hybrid Technique for Server Consolidation in Cloud Computing Environment

Publicado en línea: 27 Mar 2020
Páginas: 36 - 52

Resumen

Abstract

The goal of data centers in the cloud computing environment is to provision the workloads and the computing resources as demanded by the users without the intervention of the providers. To achieve this, virtualization based server consolidation acts as a vital part in virtual machine placement process. Consolidating the Virtual Machines (VMs) on the Physical Machines (PMs) cuts down the unused physical servers, decreasing the energy consumption, while keeping the constraints for CPU and memory utilization. This technique also reduces the resource wastage and optimizes the available resources efficiently. Ant Colony Optimization (ACO) that is a well-known multi objective heuristic algorithm and Grey Wolf Algorithm (GWO) has been used to consolidate the servers used in the virtual machine placement problem. The proposed Fuzzy HAGA algorithm outperforms the other algorithms MMAS, ACS, FFD and Fuzzy ACS compared against it as the number of processors and memory utilization are lesser than these algorithms.

Palabras clave

  • Virtual Machine (VM) placement
  • VM
  • power consumption
  • resource wastage
  • Ant Colony Optimization (ACO)
  • Grey Wolf Optimisation (GWO) Algorithm
  • HAGA Algorithm
Acceso abierto

IDD – A Platform Enabling Differential Debugging

Publicado en línea: 27 Mar 2020
Páginas: 53 - 67

Resumen

Abstract

Debugging is a very time consuming task which is not well supported by existing tools. The existing methods do not provide tools enabling optimal developers’ productivity when debugging regressions in complex systems. In this paper we describe a possible solution aiding differential debugging. The differential debugging technique performs analysis of the regressed system and identifying the cause of the unexpected behavior by comparing to a previous version of the same system. The prototype, idd, inspects two versions of the executable – a baseline and a regressed version. The interactive debugging session runs side by side both executables and allows to examine and to compare various internal states. The architecture can work with multiple information sources comparing data from different tools. We also show how idd can detect performance regressions using information from third-party performance facilities. We illustrate how in practice we can quickly discover regressions in large systems such as the clang compiler.

Palabras clave

  • IDD
  • differential debugging
  • functional regressions
  • performance regressions
  • complex systems
  • side by side debugging
  • interactive visual debugging
Acceso abierto

Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform

Publicado en línea: 27 Mar 2020
Páginas: 68 - 81

Resumen

Abstract

This paper presents an efficient image cipher based on applying the chaotic Baker Map (BM) in the Discrete Cosine Transform (DCT). The encryption module of the proposed DCT-based BM image cipher employs a DCT on the original plain-image then, the DCT coefficients of the plain-image are shuffled with the BM. Finally, the inverse DCT is applied to the shuffled plain-image DCT coefficients to obtain the final cipher-image. The decryption module of the proposed DCT-based BM image cipher employs a DCT on the input cipher-image then, the DCT coefficients of the cipher-image are inversely shuffled with the BM. Finally, the inverse DCT is applied to the inversely shuffled cipher-image DCT coefficients to obtain the original plain-image. A set of experimental tests are performed to test the validity of the proposed DCT-based BM image cipher and the performed tests demonstrated the superiority of the proposed DCT-based BM image cipher in terms of statistical, differential, sensitivity and noise immunity.

Palabras clave

  • Image-encryption
  • Baker map
  • DCT
Acceso abierto

An Indonesian Hoax News Detection System Using Reader Feedback and Naïve Bayes Algorithm

Publicado en línea: 27 Mar 2020
Páginas: 82 - 94

Resumen

Abstract

Hoax news in Indonesia spread at an alarming rate. To reduce this, hoax news detection system needs to be created and put into practice. Such a system may use readers’ feedback and Naïve Bayes algorithm, which is used to verify news. Overtime, by using readers’ feedback, database corpus will continue to grow and could improve system performance. The current research aims to reach this. System performance evaluation is carried out under two conditions ‒ with and without sources (URL). The system is able to detect hoax news very well under both conditions. The highest precision, recall and f-measure values when including URL are 0.91, 1, and 0.95 respectively. Meanwhile, the highest value of precision, recall and f-measure without URL are 0.88, 1 and 0.94, respectively.

Palabras clave

  • Hoax news
  • Indonesian news
  • Naïve Bayes
  • reader feedback.s
Acceso abierto

RETRACTED: A Smart Social Insurance Big Data Analytics Framework Based on Machine Learning Algorithms

Publicado en línea: 27 Mar 2020
Páginas: 95 - 111

Resumen

Abstract

Social insurance is an individual’s protection against risks such as retirement, death or disability. Big data mining and analytics are a way that could help the insurers and the actuaries to get the optimal decision for the insured individuals. Dependently, this paper proposes a novel analytic framework for Egyptian Social insurance big data. NOSI’s data contains data, which need some pre-processing methods after extraction like replacing missing values, standardization and outlier/extreme data. The paper also presents using some mining methods, such as clustering and classification algorithms on the Egyptian social insurance dataset through an experiment. In clustering, we used K-means clustering and the result showed a silhouette score 0.138 with two clusters in the dataset features. In classification, we used the Support Vector Machine (SVM) classifier and classification results showed a high accuracy percentage of 94%.

Palabras clave

  • Social Insurance
  • Data Integration
  • Big Data Mining and Big Data Analytics
Acceso abierto

Question Analysis towards a Vietnamese Question Answering System in the Education Domain

Publicado en línea: 27 Mar 2020
Páginas: 112 - 128

Resumen

Abstract

Building a computer system, which can automatically answer questions in the human language, speech or text, is a long-standing goal of the Artificial Intelligence (AI) field. Question analysis, the task of extracting important information from the input question, is the first and crucial step towards a question answering system. In this paper, we focus on the task of Vietnamese question analysis in the education domain. Our goal is to extract important information expressed by named entities in an input question, such as university names, campus names, major names, and teacher names. We present several extraction models that utilize the advantages of both traditional statistical methods with handcrafted features and more recent advanced deep neural networks with automatically learned features. Our best model achieves 88.11% in the F1 score on a corpus consisting of 3,600 Vietnamese questions collected from the fan page of the International School, Vietnam National University, Hanoi.

Palabras clave

  • Question analysis
  • question answering
  • convolutional neural networks
  • bidirectional long-short term memory
  • conditional random fields
Acceso abierto

Algorithm and Software System for Treatment Application of Platelet-Rich Plasma on Problematic Skin Wounds

Publicado en línea: 27 Mar 2020
Páginas: 129 - 137

Resumen

Abstract

Recently a big interest arises to the automated diagnosis and digitalization of clinical data. The purpose of this article is to present treatment algorithm and software system for Problematic Skin Wounds (PSW) by using Platelet-Rich Plasma (PRP), based on the first study on platelet-rich plasma application carried out in Bulgaria. PSW-PRP-Project software system was developed for entering and processing medical data during PRP treatment, visualization of general patient information, treatment trend, as well as a module for training specialists through the created database. For a period of seven years around 100 patients have been treatment at the Department of Orthopaedics and Traumatology, UMBAL KANEV Ruse AD, by applying platelet-rich plasma. The algorithm for the use of platelet-rich plasma for treating problematic skin wounds allows for the proper and accurate treatment of patients with various problematic skin wounds with the purpose of solving the therapeutic problem and their complete recovery. The procedure’s course is determined based on assessment on three digital criteria TWS, TAS and TSWD. The algorithms are based on our results, obtained for the first in Bulgaria while treating problematic skin wounds by using platelet-rich plasma and successfully treating 92.78% of patients to full recovery.

Palabras clave

  • Problematic skin wounds
  • platelet rich plasma
  • functional scoring scales
Acceso abierto

IoT Utilized Gas-Leakage Monitoring System with Adaptive Controls Applicable to Dual Fuel Powered Naval Vessels/Ships: Development & Implementation

Publicado en línea: 27 Mar 2020
Páginas: 138 - 155

Resumen

Abstract

Leakage of Liquefied Petroleum Gas and Liquified Natural Gas (LPG/LNG) produces hazardous and toxic impact on humans and other living creatures. The authors developed a system to monitor and control the gas leakage concentration. MQ-6 gas sensor is used for sensing the level of gas concentration in a closed volume. To monitor the consequences of environmental changes an IoT platform hosted by “Thingspeak” platform has been introduced. Both robust and cloud-forwarded controls have been applied to prevent uncontrolled leakage of those gases and auto-ignition. This type of system can be directly applied to the engine chamber/ fuel chamber of the modern marine vessels using dual fuel power cycle with LPG/LNG as secondary fuel-flamer. The results from the experiments clearly indicate satisfactory actuation speed and accuracy. The trials performed by the authors showed about 99% efficiency of signal transmission and actuation.

Palabras clave

  • Internet of Things
  • Smart System
  • Gas Leakage Control
  • Embedded
Acceso abierto

Robust Gain-Scheduled PID Control: A Parameter Dependent BMI Solution

Publicado en línea: 27 Mar 2020
Páginas: 156 - 167

Resumen

Abstract

In control practices, problems of parametric or time-varying uncertainties must be dealt with. Robust control based on norm theory and convex and non-convex optimization algorithms is a powerful tool to solve these problems in theory, but it is employed rarely in applications. In most engineering cases, Proportional-Integration-Derivative (PID) control is still the most popular method for its easy-to-tune and controllable properties. The control method proposed in this paper integrates the PID control into robust control formulation as a robust Structured Static Output Feedback (SSOF) problem of Linear-Parameter-Varying (LPV) systems, which can be converted into a Parameter Dependent Bilinear-Matrix-Inequality (PDBMI) optimization problem. A convex-concave decomposition based method is given to solve the proposed PDBMI problem. The proposed solution has a simple structure in PID form and can guarantee stability and robustness of the system being controlled in the whole operation range with less conservativeness than existing solution.

Palabras clave

  • Robust control
  • gain scheduling
  • Proportional-Integration-Derivative (PID) control
  • Bilinear-Matrix-Inequality (BMI)
  • Linear-Matrix-Inequality (LMI)
  • Linear-Parameter-Varying (LPV) system
11 Artículos
Acceso abierto

On Some Knowledge Measures of Intuitionistic Fuzzy Sets of Type Two with Application to MCDM

Publicado en línea: 27 Mar 2020
Páginas: 3 - 20

Resumen

Abstract

To overcome the certain limitations of Intuitionistic Fuzzy Sets (IFSs), the notion of Intuitionistic Fuzzy Sets of Second Type (IFSST) was introduced. IFSST is a modified version of IFS for handling some problems in a reasonable manner. Type two Intuitionistic Fuzzy entropy (IFSST-entropy) measures the amount of ambiguity/uncertainty present in an IFSST. In the present paper, we introduce the concept of dual measure of IFSST-entropy, i.e., IFSST-knowledge measure. We develop some IFSST-knowledge measures and prove some of their properties. We also show the superiority of the proposed IFSST-knowledge measures through comparative study. Further, we demonstrate the application of the proposed knowledge measures in Multi-Criteria Decision-Making (MCDM).

Palabras clave

  • IFSs
  • IFSST
  • IFSST-knowledge measure
  • MCDM
Acceso abierto

EnQuad: A Publicly-Available Simulator for Quantum Key Distribution Protocols

Publicado en línea: 27 Mar 2020
Páginas: 21 - 35

Resumen

Abstract

In this paper, we present EnQuad Version 1.0: a high-speed and expandable simulator for Quantum Key Distribution (QKD) protocols. Surpassing available simulators, EnQuad does not only simulate a QKD stack, but also does security testing and guides the researcher on which reconciliation protocol should be used in his experimental setup. On the top of that, it recommends changes for the researcher to satisfy security or a given target key-rate if any of them is not already fulfilled. Although EnQuad V1.0 is concerned with depolarizing channels and Individual Intercept-and-Resend attacks, EnQuad is featured with 24 parameters and 9 modular functions so that it could be expanded to a wide range of QKD protocols. In addition, we validated EnQuad outcomes against a comparable simulator and against theory. Furthermore, a set of 11 experiments showed that EnQuad runs 6.12× to 12.2× faster than a comparable simulator. EnQuad was implemented in MATLAB and the code is available online.

Palabras clave

  • QKD simulators
  • Information Security
  • Quantum Cryptography
  • Scientific Computations
  • Software Technologies
Acceso abierto

A Hybrid Technique for Server Consolidation in Cloud Computing Environment

Publicado en línea: 27 Mar 2020
Páginas: 36 - 52

Resumen

Abstract

The goal of data centers in the cloud computing environment is to provision the workloads and the computing resources as demanded by the users without the intervention of the providers. To achieve this, virtualization based server consolidation acts as a vital part in virtual machine placement process. Consolidating the Virtual Machines (VMs) on the Physical Machines (PMs) cuts down the unused physical servers, decreasing the energy consumption, while keeping the constraints for CPU and memory utilization. This technique also reduces the resource wastage and optimizes the available resources efficiently. Ant Colony Optimization (ACO) that is a well-known multi objective heuristic algorithm and Grey Wolf Algorithm (GWO) has been used to consolidate the servers used in the virtual machine placement problem. The proposed Fuzzy HAGA algorithm outperforms the other algorithms MMAS, ACS, FFD and Fuzzy ACS compared against it as the number of processors and memory utilization are lesser than these algorithms.

Palabras clave

  • Virtual Machine (VM) placement
  • VM
  • power consumption
  • resource wastage
  • Ant Colony Optimization (ACO)
  • Grey Wolf Optimisation (GWO) Algorithm
  • HAGA Algorithm
Acceso abierto

IDD – A Platform Enabling Differential Debugging

Publicado en línea: 27 Mar 2020
Páginas: 53 - 67

Resumen

Abstract

Debugging is a very time consuming task which is not well supported by existing tools. The existing methods do not provide tools enabling optimal developers’ productivity when debugging regressions in complex systems. In this paper we describe a possible solution aiding differential debugging. The differential debugging technique performs analysis of the regressed system and identifying the cause of the unexpected behavior by comparing to a previous version of the same system. The prototype, idd, inspects two versions of the executable – a baseline and a regressed version. The interactive debugging session runs side by side both executables and allows to examine and to compare various internal states. The architecture can work with multiple information sources comparing data from different tools. We also show how idd can detect performance regressions using information from third-party performance facilities. We illustrate how in practice we can quickly discover regressions in large systems such as the clang compiler.

Palabras clave

  • IDD
  • differential debugging
  • functional regressions
  • performance regressions
  • complex systems
  • side by side debugging
  • interactive visual debugging
Acceso abierto

Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform

Publicado en línea: 27 Mar 2020
Páginas: 68 - 81

Resumen

Abstract

This paper presents an efficient image cipher based on applying the chaotic Baker Map (BM) in the Discrete Cosine Transform (DCT). The encryption module of the proposed DCT-based BM image cipher employs a DCT on the original plain-image then, the DCT coefficients of the plain-image are shuffled with the BM. Finally, the inverse DCT is applied to the shuffled plain-image DCT coefficients to obtain the final cipher-image. The decryption module of the proposed DCT-based BM image cipher employs a DCT on the input cipher-image then, the DCT coefficients of the cipher-image are inversely shuffled with the BM. Finally, the inverse DCT is applied to the inversely shuffled cipher-image DCT coefficients to obtain the original plain-image. A set of experimental tests are performed to test the validity of the proposed DCT-based BM image cipher and the performed tests demonstrated the superiority of the proposed DCT-based BM image cipher in terms of statistical, differential, sensitivity and noise immunity.

Palabras clave

  • Image-encryption
  • Baker map
  • DCT
Acceso abierto

An Indonesian Hoax News Detection System Using Reader Feedback and Naïve Bayes Algorithm

Publicado en línea: 27 Mar 2020
Páginas: 82 - 94

Resumen

Abstract

Hoax news in Indonesia spread at an alarming rate. To reduce this, hoax news detection system needs to be created and put into practice. Such a system may use readers’ feedback and Naïve Bayes algorithm, which is used to verify news. Overtime, by using readers’ feedback, database corpus will continue to grow and could improve system performance. The current research aims to reach this. System performance evaluation is carried out under two conditions ‒ with and without sources (URL). The system is able to detect hoax news very well under both conditions. The highest precision, recall and f-measure values when including URL are 0.91, 1, and 0.95 respectively. Meanwhile, the highest value of precision, recall and f-measure without URL are 0.88, 1 and 0.94, respectively.

Palabras clave

  • Hoax news
  • Indonesian news
  • Naïve Bayes
  • reader feedback.s
Acceso abierto

RETRACTED: A Smart Social Insurance Big Data Analytics Framework Based on Machine Learning Algorithms

Publicado en línea: 27 Mar 2020
Páginas: 95 - 111

Resumen

Abstract

Social insurance is an individual’s protection against risks such as retirement, death or disability. Big data mining and analytics are a way that could help the insurers and the actuaries to get the optimal decision for the insured individuals. Dependently, this paper proposes a novel analytic framework for Egyptian Social insurance big data. NOSI’s data contains data, which need some pre-processing methods after extraction like replacing missing values, standardization and outlier/extreme data. The paper also presents using some mining methods, such as clustering and classification algorithms on the Egyptian social insurance dataset through an experiment. In clustering, we used K-means clustering and the result showed a silhouette score 0.138 with two clusters in the dataset features. In classification, we used the Support Vector Machine (SVM) classifier and classification results showed a high accuracy percentage of 94%.

Palabras clave

  • Social Insurance
  • Data Integration
  • Big Data Mining and Big Data Analytics
Acceso abierto

Question Analysis towards a Vietnamese Question Answering System in the Education Domain

Publicado en línea: 27 Mar 2020
Páginas: 112 - 128

Resumen

Abstract

Building a computer system, which can automatically answer questions in the human language, speech or text, is a long-standing goal of the Artificial Intelligence (AI) field. Question analysis, the task of extracting important information from the input question, is the first and crucial step towards a question answering system. In this paper, we focus on the task of Vietnamese question analysis in the education domain. Our goal is to extract important information expressed by named entities in an input question, such as university names, campus names, major names, and teacher names. We present several extraction models that utilize the advantages of both traditional statistical methods with handcrafted features and more recent advanced deep neural networks with automatically learned features. Our best model achieves 88.11% in the F1 score on a corpus consisting of 3,600 Vietnamese questions collected from the fan page of the International School, Vietnam National University, Hanoi.

Palabras clave

  • Question analysis
  • question answering
  • convolutional neural networks
  • bidirectional long-short term memory
  • conditional random fields
Acceso abierto

Algorithm and Software System for Treatment Application of Platelet-Rich Plasma on Problematic Skin Wounds

Publicado en línea: 27 Mar 2020
Páginas: 129 - 137

Resumen

Abstract

Recently a big interest arises to the automated diagnosis and digitalization of clinical data. The purpose of this article is to present treatment algorithm and software system for Problematic Skin Wounds (PSW) by using Platelet-Rich Plasma (PRP), based on the first study on platelet-rich plasma application carried out in Bulgaria. PSW-PRP-Project software system was developed for entering and processing medical data during PRP treatment, visualization of general patient information, treatment trend, as well as a module for training specialists through the created database. For a period of seven years around 100 patients have been treatment at the Department of Orthopaedics and Traumatology, UMBAL KANEV Ruse AD, by applying platelet-rich plasma. The algorithm for the use of platelet-rich plasma for treating problematic skin wounds allows for the proper and accurate treatment of patients with various problematic skin wounds with the purpose of solving the therapeutic problem and their complete recovery. The procedure’s course is determined based on assessment on three digital criteria TWS, TAS and TSWD. The algorithms are based on our results, obtained for the first in Bulgaria while treating problematic skin wounds by using platelet-rich plasma and successfully treating 92.78% of patients to full recovery.

Palabras clave

  • Problematic skin wounds
  • platelet rich plasma
  • functional scoring scales
Acceso abierto

IoT Utilized Gas-Leakage Monitoring System with Adaptive Controls Applicable to Dual Fuel Powered Naval Vessels/Ships: Development & Implementation

Publicado en línea: 27 Mar 2020
Páginas: 138 - 155

Resumen

Abstract

Leakage of Liquefied Petroleum Gas and Liquified Natural Gas (LPG/LNG) produces hazardous and toxic impact on humans and other living creatures. The authors developed a system to monitor and control the gas leakage concentration. MQ-6 gas sensor is used for sensing the level of gas concentration in a closed volume. To monitor the consequences of environmental changes an IoT platform hosted by “Thingspeak” platform has been introduced. Both robust and cloud-forwarded controls have been applied to prevent uncontrolled leakage of those gases and auto-ignition. This type of system can be directly applied to the engine chamber/ fuel chamber of the modern marine vessels using dual fuel power cycle with LPG/LNG as secondary fuel-flamer. The results from the experiments clearly indicate satisfactory actuation speed and accuracy. The trials performed by the authors showed about 99% efficiency of signal transmission and actuation.

Palabras clave

  • Internet of Things
  • Smart System
  • Gas Leakage Control
  • Embedded
Acceso abierto

Robust Gain-Scheduled PID Control: A Parameter Dependent BMI Solution

Publicado en línea: 27 Mar 2020
Páginas: 156 - 167

Resumen

Abstract

In control practices, problems of parametric or time-varying uncertainties must be dealt with. Robust control based on norm theory and convex and non-convex optimization algorithms is a powerful tool to solve these problems in theory, but it is employed rarely in applications. In most engineering cases, Proportional-Integration-Derivative (PID) control is still the most popular method for its easy-to-tune and controllable properties. The control method proposed in this paper integrates the PID control into robust control formulation as a robust Structured Static Output Feedback (SSOF) problem of Linear-Parameter-Varying (LPV) systems, which can be converted into a Parameter Dependent Bilinear-Matrix-Inequality (PDBMI) optimization problem. A convex-concave decomposition based method is given to solve the proposed PDBMI problem. The proposed solution has a simple structure in PID form and can guarantee stability and robustness of the system being controlled in the whole operation range with less conservativeness than existing solution.

Palabras clave

  • Robust control
  • gain scheduling
  • Proportional-Integration-Derivative (PID) control
  • Bilinear-Matrix-Inequality (BMI)
  • Linear-Matrix-Inequality (LMI)
  • Linear-Parameter-Varying (LPV) system

Planifique su conferencia remota con Sciendo