Magazine et Edition

Volume 22 (2022): Edition 3 (September 2022)

Volume 22 (2022): Edition 2 (June 2022)

Volume 22 (2022): Edition 1 (March 2022)

Volume 21 (2021): Edition 4 (December 2021)

Volume 21 (2021): Edition 3 (September 2021)

Volume 21 (2021): Edition 2 (June 2021)

Volume 21 (2021): Edition 1 (March 2021)

Volume 20 (2020): Edition 6 (December 2020)
Special Edition on New Developments in Scalable Computing

Volume 20 (2020): Edition 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volume 20 (2020): Edition 4 (November 2020)

Volume 20 (2020): Edition 3 (September 2020)

Volume 20 (2020): Edition 2 (June 2020)

Volume 20 (2020): Edition 1 (March 2020)

Volume 19 (2019): Edition 4 (November 2019)

Volume 19 (2019): Edition 3 (September 2019)

Volume 19 (2019): Edition 2 (June 2019)

Volume 19 (2019): Edition 1 (March 2019)

Volume 18 (2018): Edition 5 (May 2018)
Special Thematic Edition on Optimal Codes and Related Topics

Volume 18 (2018): Edition 4 (November 2018)

Volume 18 (2018): Edition 3 (September 2018)

Volume 18 (2018): Edition 2 (June 2018)

Volume 18 (2018): Edition 1 (March 2018)

Volume 17 (2017): Edition 5 (December 2017)
Special Edition With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volume 17 (2017): Edition 4 (November 2017)

Volume 17 (2017): Edition 3 (September 2017)

Volume 17 (2017): Edition 2 (June 2017)

Volume 17 (2017): Edition 1 (March 2017)

Volume 16 (2016): Edition 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volume 16 (2016): Edition 5 (October 2016)
Edition Title: Special Edition on Application of Advanced Computing and Simulation in Information Systems

Volume 16 (2016): Edition 4 (December 2016)

Volume 16 (2016): Edition 3 (September 2016)

Volume 16 (2016): Edition 2 (June 2016)

Volume 16 (2016): Edition 1 (March 2016)

Volume 15 (2015): Edition 7 (December 2015)
Special Edition on Information Fusion

Volume 15 (2015): Edition 6 (December 2015)
Special Edition on Logistics, Informatics and Service Science

Volume 15 (2015): Edition 5 (April 2015)
Special Edition on Control in Transportation Systems

Volume 15 (2015): Edition 4 (November 2015)

Volume 15 (2015): Edition 3 (September 2015)

Volume 15 (2015): Edition 2 (June 2015)

Volume 15 (2015): Edition 1 (March 2015)

Volume 14 (2014): Edition 5 (December 2014)
Special Edition

Volume 14 (2014): Edition 4 (December 2014)

Volume 14 (2014): Edition 3 (September 2014)

Volume 14 (2014): Edition 2 (June 2014)

Volume 14 (2014): Edition 1 (March 2014)

Volume 13 (2013): Edition Special-Edition (December 2013)

Volume 13 (2013): Edition 4 (December 2013)
The publishing of the present issue (Volume 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volume 13 (2013): Edition 3 (September 2013)

Volume 13 (2013): Edition 2 (June 2013)

Volume 13 (2013): Edition 1 (March 2013)

Volume 12 (2012): Edition 4 (December 2012)

Volume 12 (2012): Edition 3 (September 2012)

Volume 12 (2012): Edition 2 (June 2012)

Volume 12 (2012): Edition 1 (March 2012)

Détails du magazine
Format
Magazine
eISSN
1314-4081
ISSN
1311-9702
Première publication
13 Mar 2012
Période de publication
4 fois par an
Langues
Anglais

Chercher

Volume 13 (2013): Edition 3 (September 2013)

Détails du magazine
Format
Magazine
eISSN
1314-4081
ISSN
1311-9702
Première publication
13 Mar 2012
Période de publication
4 fois par an
Langues
Anglais

Chercher

11 Articles
Accès libre

Reliability Estimation Based on the Degradation Amount Distribution Using Composite Time Series Analysis and Grey Theory

Publié en ligne: 20 Sep 2013
Pages: 3 - 14

Résumé

Abstract

This paper puts forward a reliability estimation method by the Degradation Amount Distribution (DAD) of products, using a composite time series modeling procedure and grey theory based on a random failure threshold. Product DAD data are treated as a composite time series and described using a composite time series model to predict a long-term trend of degradation. The degradation test is processed for a certain electronic product and the degradation data is collected for reliability estimation. Comparison among the reliability evaluation by DAD composite time series analysis and grey theory, based on a constant and a random failure threshold, reliability evaluation by DAD regression analysis based on a random failure threshold, reliability evaluation by degradation path time series analysis, and real reliability of the electronic product is done. The results show that the reliability evaluation of the product using the method proposed is the most creditable of all.

Keywords

  • Reliability estimation
  • time series
  • grey theory
  • degradation amount distribution
Accès libre

Fixed Point Theorem for Converse Commuting Mapping in Symmetric Spaces

Publié en ligne: 20 Sep 2013
Pages: 15 - 25

Résumé

Abstract

Using the concept of converse commuting mappings, our target is to prove some common fixed point theorems with respect to a contractive condition under implicit function relations and an integral type contractive condition in fuzzy symmetric spaces.

Keywords

  • Commuting point
  • coincidence point
  • commuting mappings
  • conversely commuting mappings
  • occasionally converse commuting (occ) mappings
  • converse commuting multivalued mappings
  • fuzzy symmetric space
  • implicit relation
Accès libre

An Efficient Data Structure for Representing Trilateral/Quadrilateral Subdivision Surfaces

Publié en ligne: 20 Sep 2013
Pages: 26 - 40

Résumé

Abstract

With the increase of subdivision depths, some problems of common data structures for representing the subdivision surfaces appear, such as excessive computer memory consumption and low efficiency of the data query which restrict the popularization and application of subdivision surfaces in more fields. By utilizing the topological characteristics of the subdivision surface, a two-layer data structure named CELL is presented in order to better realize the piecewise representation of trilateral/quadrilateral subdivision surfaces. The inner structure of CELL represents the subdivision surface patch by using arrays, and the outer structure of CELL represents the topological relations between the subdivision surface patches. Based on Catmull-Clark subdivision scheme, the structural compositions of CELL and the realization mechanism of the subdivision algorithm are proposed. Additionally, sharp and semi-sharp features are constructed, and a primary study on amalgamation of the image/Z-map model and subdivision surface is presented. The results of the experimental and theoretical analysis show the superior performance of CELL with relation to computer memory consumption, data query, subdivision surface computation and algorithm development.

Keywords

  • Geometric modeling
  • subdivision surface
  • data structure
  • mesh compression
Accès libre

Upper Bound on Correcting Partial Random Errors

Publié en ligne: 20 Sep 2013
Pages: 41 - 49

Résumé

Abstract

Since coding has become a basic tool for practically all communication/electronic devices, it is important to carefully study the error patterns that actually occur. This allows correction of only partial errors rather than those which have been studied using Hamming distance, in non-binary cases.

The paper considers a class of distances, SK-distances, in terms of which partial errors can be defined. Examining the sufficient condition for the existence of a parity check matrix for a given number of parity-checks, the paper contains an upper bound on the number of parity check digits for linear codes with property that corrects all partial random errors of an (n, k ) code with minimum SK-distance at least d. The result generalizes the rather widely used Varshamov-Gilbert bound, which follows from it as a particular case.

Keywords

  • Hamming distance
  • SK-metric
  • error patterns
  • error control in codes
  • bounds
Accès libre

A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration

Publié en ligne: 20 Sep 2013
Pages: 50 - 63

Résumé

Abstract

In this paper we have developed a block cipher, wherein the size of the key matrix is 384 bits and the size of the plain text is as large as we choose. The permutation, the interlacing and the iteration introduced in this analysis are found to cause diffusion and confusion efficiently. Hence, the strength of the cipher proves to be remarkable.

Keywords

  • Modular arithmetic inverse
  • interlacing
  • decomposition
  • permutation
  • inverse permutation
Accès libre

P2P Traffic Identification Based on Host and Flow Behaviour Characteristics

Publié en ligne: 20 Sep 2013
Pages: 64 - 76

Résumé

Abstract

Peer-to-Peer (P2P) networks have been widely applied in file sharing, streaming media, instant messaging and other fields, which have attracted large attention. At the same time P2P networks traffic worsens the congestion of a network significantly. In order to better manage and control P2P traffic, it is important to identify P2P traffic accurately. In this paper we propose a novel P2P identification scheme, based on the host and flow behaviour characteristics of P2P traffic. First we determine if a host takes part in a P2P application by matching its behaviour with some predefined host level behaviour rules. Subsequently, we refine the identification by comparing the statistical features of each flow in the host with several flow feature profiles. The experiments on real world network data prove that this method is quite efficient to identify P2P traffic. The classification accuracy achieves 93.9 % and 96.3 % in terms of flows and bytes respectively.

Keywords:

  • P2P traffic identification
  • host behaviour
  • flow behaviour
Accès libre

An Efficient Access Control Scheme for Cloud Environment

Publié en ligne: 20 Sep 2013
Pages: 77 - 90

Résumé

Abstract

In order to keep the confidential data in the cloud against unauthorized parties, a cryptographic access control solution based on Attribute-Based Encryption (ABE) and Identity-Based Signature (IBS) is introduced in this paper. Under the premise that cloud service provider is untrustful, the proposed scheme can ensure the data security of the cloud storage system in an open environment, as well as reduce the complexity of management. Analysis and experimental results show that the scheme can be semantically secure against adaptive chosen ciphertext attacks under the random oracle model. Our concrete access control scheme can enhance the efficiency of the cloud to a certain extent.

Keywords

  • Secure storage
  • attribute-based encryption
  • identity-based signature
  • cloud computing
Accès libre

Current Practices, Trends and Challenges in K-12 Online Learning

Publié en ligne: 20 Sep 2013
Pages: 91 - 110

Résumé

Abstract

Online learning is one of the fastest growing trends in Technology- Enhanced Learning (TEL). Technology in combination with an instruction that addresses the cognitive and social processes of knowledge construction could offer more diverse and effective online learning opportunities than their face-to-face counterparts. In this review we attempt to summarize different forms and practices in K-12 online and blended learning as they appear in various regional, national and cultural contexts. The article starts with introducing some basic concepts and terminology, sums up the state of K-12 online learning around the world and ends with summarizing some trends and challenges observed in current K-12 online learning practices.

Keywords

  • Online learning
  • blended learning
  • distance learning
  • learning management systems
  • K-12 education
Accès libre

Acyclic Real-Time Traffic Signal Control Based on a Genetic Algorithm

Publié en ligne: 20 Sep 2013
Pages: 111 - 123

Résumé

Abstract

This paper presents an acyclic real-time traffic signal control model with transit priority based on a rolling horizon process for isolated intersections. The developed model consists of two components, including: an Improved Genetic Algorithm (IGA)-based signal optimization module and a microscopic traffic simulation module. The acyclic real-time traffic signal control model optimizes the phase sequence and the phase length with the aim to minimize the total delay of both transit vehicles and general vehicles for the next decision horizon. Numerical results show that the proposed IGA signal optimization module could provide a more efficient search for optimal solutions. The results also show that the acyclic real-time traffic signal control model outperforms the fixed-time control model. It prioritizes transit vehicles while minimizing the impact on the general vehicles.

Keywords

  • Acyclic real-time control
  • traffic signal control
  • transit priority
  • genetic algorithm
Accès libre

Design of a Diabetic Diagnosis System Using Rough Sets

Publié en ligne: 20 Sep 2013
Pages: 124 - 139

Résumé

Abstract

Traditionally the diagnosis of a disease is done by medical experts with experience, clinical data of the patients and adequate knowledge in identifying the disease. Such diagnosis is found to be approximate and time-consuming since it purely depends on the availability and the experience of the medical experts dealing with imprecise and uncertain clinical data of the patients. Hence, to improve decision making with uncertain data and to reduce the time consumption in diagnosing a disease, several simulated diagnosis systems have been developed. Most of these diagnosis systems are designed to possess the clinical data and symptoms associated with a specific disease as knowledge base. The quality of the knowledge base has an impact not only on the consequences, but also on the diagnostic precision. Most of the existing systems have been developed as an expert system that contains all the diagnosis facts as rules. Notably, applying the concept of a fuzzy set has shown better knowledge representation to improve the decision making process. Therefore an attempt is made in this paper to design and develop such diagnosis system, using a rough set. The system developed is evaluated using a simple set of symptoms that is added to clinical data in determining diabetes and its severity.

Keywords

  • Disease diagnosis
  • knowledge based system
  • a rough set
  • diabetes
Accès libre

Enhancing a Traditional Health Care System of an Organization for Better Service with Agent Technology by Ensuring Confidentiality of Patients’ Medical Information

Publié en ligne: 20 Sep 2013
Pages: 140 - 156

Résumé

Abstract

Agent technology is one of the widely adapted technologies for developing applications that deliver e-Services. Ensuring confidentiality of the patients’ data in e-health care systems remains a serious challenge. Many large enterprises provide in-house health care services free of cost for their employees and their dependents as a competitive benefit to prevent employees turnover and also to maintain healthy and productive human resource. This paper proposes enhancements to the traditional health care system of an organization so that it provides better services with respect to users’ satisfaction. The requirements identification of the system proposed and the evaluation of the new system are done using a feedback model. The new system proved to be mutually beneficial to employees and employers in terms of saving time and cost and thus it enhances productivity.

Keywords

  • e-Healthcare
  • agent technology
  • confidentiality
  • JADE
  • FIPA
11 Articles
Accès libre

Reliability Estimation Based on the Degradation Amount Distribution Using Composite Time Series Analysis and Grey Theory

Publié en ligne: 20 Sep 2013
Pages: 3 - 14

Résumé

Abstract

This paper puts forward a reliability estimation method by the Degradation Amount Distribution (DAD) of products, using a composite time series modeling procedure and grey theory based on a random failure threshold. Product DAD data are treated as a composite time series and described using a composite time series model to predict a long-term trend of degradation. The degradation test is processed for a certain electronic product and the degradation data is collected for reliability estimation. Comparison among the reliability evaluation by DAD composite time series analysis and grey theory, based on a constant and a random failure threshold, reliability evaluation by DAD regression analysis based on a random failure threshold, reliability evaluation by degradation path time series analysis, and real reliability of the electronic product is done. The results show that the reliability evaluation of the product using the method proposed is the most creditable of all.

Keywords

  • Reliability estimation
  • time series
  • grey theory
  • degradation amount distribution
Accès libre

Fixed Point Theorem for Converse Commuting Mapping in Symmetric Spaces

Publié en ligne: 20 Sep 2013
Pages: 15 - 25

Résumé

Abstract

Using the concept of converse commuting mappings, our target is to prove some common fixed point theorems with respect to a contractive condition under implicit function relations and an integral type contractive condition in fuzzy symmetric spaces.

Keywords

  • Commuting point
  • coincidence point
  • commuting mappings
  • conversely commuting mappings
  • occasionally converse commuting (occ) mappings
  • converse commuting multivalued mappings
  • fuzzy symmetric space
  • implicit relation
Accès libre

An Efficient Data Structure for Representing Trilateral/Quadrilateral Subdivision Surfaces

Publié en ligne: 20 Sep 2013
Pages: 26 - 40

Résumé

Abstract

With the increase of subdivision depths, some problems of common data structures for representing the subdivision surfaces appear, such as excessive computer memory consumption and low efficiency of the data query which restrict the popularization and application of subdivision surfaces in more fields. By utilizing the topological characteristics of the subdivision surface, a two-layer data structure named CELL is presented in order to better realize the piecewise representation of trilateral/quadrilateral subdivision surfaces. The inner structure of CELL represents the subdivision surface patch by using arrays, and the outer structure of CELL represents the topological relations between the subdivision surface patches. Based on Catmull-Clark subdivision scheme, the structural compositions of CELL and the realization mechanism of the subdivision algorithm are proposed. Additionally, sharp and semi-sharp features are constructed, and a primary study on amalgamation of the image/Z-map model and subdivision surface is presented. The results of the experimental and theoretical analysis show the superior performance of CELL with relation to computer memory consumption, data query, subdivision surface computation and algorithm development.

Keywords

  • Geometric modeling
  • subdivision surface
  • data structure
  • mesh compression
Accès libre

Upper Bound on Correcting Partial Random Errors

Publié en ligne: 20 Sep 2013
Pages: 41 - 49

Résumé

Abstract

Since coding has become a basic tool for practically all communication/electronic devices, it is important to carefully study the error patterns that actually occur. This allows correction of only partial errors rather than those which have been studied using Hamming distance, in non-binary cases.

The paper considers a class of distances, SK-distances, in terms of which partial errors can be defined. Examining the sufficient condition for the existence of a parity check matrix for a given number of parity-checks, the paper contains an upper bound on the number of parity check digits for linear codes with property that corrects all partial random errors of an (n, k ) code with minimum SK-distance at least d. The result generalizes the rather widely used Varshamov-Gilbert bound, which follows from it as a particular case.

Keywords

  • Hamming distance
  • SK-metric
  • error patterns
  • error control in codes
  • bounds
Accès libre

A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration

Publié en ligne: 20 Sep 2013
Pages: 50 - 63

Résumé

Abstract

In this paper we have developed a block cipher, wherein the size of the key matrix is 384 bits and the size of the plain text is as large as we choose. The permutation, the interlacing and the iteration introduced in this analysis are found to cause diffusion and confusion efficiently. Hence, the strength of the cipher proves to be remarkable.

Keywords

  • Modular arithmetic inverse
  • interlacing
  • decomposition
  • permutation
  • inverse permutation
Accès libre

P2P Traffic Identification Based on Host and Flow Behaviour Characteristics

Publié en ligne: 20 Sep 2013
Pages: 64 - 76

Résumé

Abstract

Peer-to-Peer (P2P) networks have been widely applied in file sharing, streaming media, instant messaging and other fields, which have attracted large attention. At the same time P2P networks traffic worsens the congestion of a network significantly. In order to better manage and control P2P traffic, it is important to identify P2P traffic accurately. In this paper we propose a novel P2P identification scheme, based on the host and flow behaviour characteristics of P2P traffic. First we determine if a host takes part in a P2P application by matching its behaviour with some predefined host level behaviour rules. Subsequently, we refine the identification by comparing the statistical features of each flow in the host with several flow feature profiles. The experiments on real world network data prove that this method is quite efficient to identify P2P traffic. The classification accuracy achieves 93.9 % and 96.3 % in terms of flows and bytes respectively.

Keywords:

  • P2P traffic identification
  • host behaviour
  • flow behaviour
Accès libre

An Efficient Access Control Scheme for Cloud Environment

Publié en ligne: 20 Sep 2013
Pages: 77 - 90

Résumé

Abstract

In order to keep the confidential data in the cloud against unauthorized parties, a cryptographic access control solution based on Attribute-Based Encryption (ABE) and Identity-Based Signature (IBS) is introduced in this paper. Under the premise that cloud service provider is untrustful, the proposed scheme can ensure the data security of the cloud storage system in an open environment, as well as reduce the complexity of management. Analysis and experimental results show that the scheme can be semantically secure against adaptive chosen ciphertext attacks under the random oracle model. Our concrete access control scheme can enhance the efficiency of the cloud to a certain extent.

Keywords

  • Secure storage
  • attribute-based encryption
  • identity-based signature
  • cloud computing
Accès libre

Current Practices, Trends and Challenges in K-12 Online Learning

Publié en ligne: 20 Sep 2013
Pages: 91 - 110

Résumé

Abstract

Online learning is one of the fastest growing trends in Technology- Enhanced Learning (TEL). Technology in combination with an instruction that addresses the cognitive and social processes of knowledge construction could offer more diverse and effective online learning opportunities than their face-to-face counterparts. In this review we attempt to summarize different forms and practices in K-12 online and blended learning as they appear in various regional, national and cultural contexts. The article starts with introducing some basic concepts and terminology, sums up the state of K-12 online learning around the world and ends with summarizing some trends and challenges observed in current K-12 online learning practices.

Keywords

  • Online learning
  • blended learning
  • distance learning
  • learning management systems
  • K-12 education
Accès libre

Acyclic Real-Time Traffic Signal Control Based on a Genetic Algorithm

Publié en ligne: 20 Sep 2013
Pages: 111 - 123

Résumé

Abstract

This paper presents an acyclic real-time traffic signal control model with transit priority based on a rolling horizon process for isolated intersections. The developed model consists of two components, including: an Improved Genetic Algorithm (IGA)-based signal optimization module and a microscopic traffic simulation module. The acyclic real-time traffic signal control model optimizes the phase sequence and the phase length with the aim to minimize the total delay of both transit vehicles and general vehicles for the next decision horizon. Numerical results show that the proposed IGA signal optimization module could provide a more efficient search for optimal solutions. The results also show that the acyclic real-time traffic signal control model outperforms the fixed-time control model. It prioritizes transit vehicles while minimizing the impact on the general vehicles.

Keywords

  • Acyclic real-time control
  • traffic signal control
  • transit priority
  • genetic algorithm
Accès libre

Design of a Diabetic Diagnosis System Using Rough Sets

Publié en ligne: 20 Sep 2013
Pages: 124 - 139

Résumé

Abstract

Traditionally the diagnosis of a disease is done by medical experts with experience, clinical data of the patients and adequate knowledge in identifying the disease. Such diagnosis is found to be approximate and time-consuming since it purely depends on the availability and the experience of the medical experts dealing with imprecise and uncertain clinical data of the patients. Hence, to improve decision making with uncertain data and to reduce the time consumption in diagnosing a disease, several simulated diagnosis systems have been developed. Most of these diagnosis systems are designed to possess the clinical data and symptoms associated with a specific disease as knowledge base. The quality of the knowledge base has an impact not only on the consequences, but also on the diagnostic precision. Most of the existing systems have been developed as an expert system that contains all the diagnosis facts as rules. Notably, applying the concept of a fuzzy set has shown better knowledge representation to improve the decision making process. Therefore an attempt is made in this paper to design and develop such diagnosis system, using a rough set. The system developed is evaluated using a simple set of symptoms that is added to clinical data in determining diabetes and its severity.

Keywords

  • Disease diagnosis
  • knowledge based system
  • a rough set
  • diabetes
Accès libre

Enhancing a Traditional Health Care System of an Organization for Better Service with Agent Technology by Ensuring Confidentiality of Patients’ Medical Information

Publié en ligne: 20 Sep 2013
Pages: 140 - 156

Résumé

Abstract

Agent technology is one of the widely adapted technologies for developing applications that deliver e-Services. Ensuring confidentiality of the patients’ data in e-health care systems remains a serious challenge. Many large enterprises provide in-house health care services free of cost for their employees and their dependents as a competitive benefit to prevent employees turnover and also to maintain healthy and productive human resource. This paper proposes enhancements to the traditional health care system of an organization so that it provides better services with respect to users’ satisfaction. The requirements identification of the system proposed and the evaluation of the new system are done using a feedback model. The new system proved to be mutually beneficial to employees and employers in terms of saving time and cost and thus it enhances productivity.

Keywords

  • e-Healthcare
  • agent technology
  • confidentiality
  • JADE
  • FIPA

Planifiez votre conférence à distance avec Sciendo