Magazine et Edition

Volume 22 (2022): Edition 3 (September 2022)

Volume 22 (2022): Edition 2 (June 2022)

Volume 22 (2022): Edition 1 (March 2022)

Volume 21 (2021): Edition 4 (December 2021)

Volume 21 (2021): Edition 3 (September 2021)

Volume 21 (2021): Edition 2 (June 2021)

Volume 21 (2021): Edition 1 (March 2021)

Volume 20 (2020): Edition 6 (December 2020)
Special Edition on New Developments in Scalable Computing

Volume 20 (2020): Edition 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volume 20 (2020): Edition 4 (November 2020)

Volume 20 (2020): Edition 3 (September 2020)

Volume 20 (2020): Edition 2 (June 2020)

Volume 20 (2020): Edition 1 (March 2020)

Volume 19 (2019): Edition 4 (November 2019)

Volume 19 (2019): Edition 3 (September 2019)

Volume 19 (2019): Edition 2 (June 2019)

Volume 19 (2019): Edition 1 (March 2019)

Volume 18 (2018): Edition 5 (May 2018)
Special Thematic Edition on Optimal Codes and Related Topics

Volume 18 (2018): Edition 4 (November 2018)

Volume 18 (2018): Edition 3 (September 2018)

Volume 18 (2018): Edition 2 (June 2018)

Volume 18 (2018): Edition 1 (March 2018)

Volume 17 (2017): Edition 5 (December 2017)
Special Edition With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volume 17 (2017): Edition 4 (November 2017)

Volume 17 (2017): Edition 3 (September 2017)

Volume 17 (2017): Edition 2 (June 2017)

Volume 17 (2017): Edition 1 (March 2017)

Volume 16 (2016): Edition 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volume 16 (2016): Edition 5 (October 2016)
Edition Title: Special Edition on Application of Advanced Computing and Simulation in Information Systems

Volume 16 (2016): Edition 4 (December 2016)

Volume 16 (2016): Edition 3 (September 2016)

Volume 16 (2016): Edition 2 (June 2016)

Volume 16 (2016): Edition 1 (March 2016)

Volume 15 (2015): Edition 7 (December 2015)
Special Edition on Information Fusion

Volume 15 (2015): Edition 6 (December 2015)
Special Edition on Logistics, Informatics and Service Science

Volume 15 (2015): Edition 5 (April 2015)
Special Edition on Control in Transportation Systems

Volume 15 (2015): Edition 4 (November 2015)

Volume 15 (2015): Edition 3 (September 2015)

Volume 15 (2015): Edition 2 (June 2015)

Volume 15 (2015): Edition 1 (March 2015)

Volume 14 (2014): Edition 5 (December 2014)
Special Edition

Volume 14 (2014): Edition 4 (December 2014)

Volume 14 (2014): Edition 3 (September 2014)

Volume 14 (2014): Edition 2 (June 2014)

Volume 14 (2014): Edition 1 (March 2014)

Volume 13 (2013): Edition Special-Edition (December 2013)

Volume 13 (2013): Edition 4 (December 2013)
The publishing of the present issue (Volume 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volume 13 (2013): Edition 3 (September 2013)

Volume 13 (2013): Edition 2 (June 2013)

Volume 13 (2013): Edition 1 (March 2013)

Volume 12 (2012): Edition 4 (December 2012)

Volume 12 (2012): Edition 3 (September 2012)

Volume 12 (2012): Edition 2 (June 2012)

Volume 12 (2012): Edition 1 (March 2012)

Détails du magazine
Format
Magazine
eISSN
1314-4081
Première publication
13 Mar 2012
Période de publication
4 fois par an
Langues
Anglais

Chercher

Volume 14 (2014): Edition 2 (June 2014)

Détails du magazine
Format
Magazine
eISSN
1314-4081
Première publication
13 Mar 2012
Période de publication
4 fois par an
Langues
Anglais

Chercher

13 Articles
Accès libre

Natural Language Generation and Semantic Technologies

Publié en ligne: 15 Jul 2014
Pages: 3 - 23

Résumé

Abstract

The paper presents a survey of the domain of Natural Language Generation (NLG) with its models, techniques, applications, and investigates how the semantic technologies are drawn into text generation. The idea and facilities of Semantic Web initiative are discussed in connection with the new opportunities offered to the Natural Language Generation.

Mots clés

  • Natural Language Generation
  • semantic technologies
  • semantic Web
Accès libre

Secure Routing in Manet Using Synchronization and Data Authencity

Publié en ligne: 15 Jul 2014
Pages: 24 - 30

Résumé

Abstract

In recent years synchronization plays a major issue for secure transmission in mobile adhoc networks. When an attacker modifies the time synchronization algorithm, the nodes will have faulty estimates of other nodes location, leading to chaos. While transmitting under these adverse conditions, packets might be lost or might be sent to wrong locations. Data replication and data diffusion are two methods which are used to solve the problem of data availability. In this paper we propose an algorithm for secure multi hop transmission used for external attacks.

Mots clés

  • Time synchronization
  • data availability
  • data authentication
  • pair wise secure transaction
  • end-to-end delay
Accès libre

Codes on Key Errors

Publié en ligne: 15 Jul 2014
Pages: 31 - 37

Résumé

Abstract

Coding theory has started with the intention of detection and correction of errors which have occurred during communication. Different types of errors are produced by different types of communication channels and accordingly codes are developed to deal with them. In 2013 Sharma and Gaur introduced a new kind of an error which will be termed “key error”. This paper obtains the lower and upper bounds on the number of parity-check digits required for linear codes capable for detecting such errors. Illustration of such a code is provided. Codes capable of simultaneous detection and correction of such errors have also been considered.

Mots clés

  • Parity check digit
  • parity check matrix
  • syndrome
  • standard array
Accès libre

A Framework for Visual Dynamic Analysis of Ray Tracing Algorithms

Publié en ligne: 15 Jul 2014
Pages: 38 - 49

Résumé

Abstract

A novel approach is presented for recording high volume data about ray tracing rendering systems' runtime state and its subsequent dynamic analysis and interactive visualization in the algorithm computational domain. Our framework extracts light paths traced by the system and leverages on a powerful filtering subsystem, helping interactive visualization and exploration of the desired subset of recorded data. We introduce a versatile data logging format and acceleration structures for easy access and filtering. We have implemented a plugin based framework and a tool set that realize all ideas presented in this paper. The framework provides data logging API for instrumenting production-ready, multithreaded, distributed renderers. The framework visualization tool enables deeper understanding of the ray tracing algorithms for novices, as well as for experts.

Mots clés

  • Visual
  • dynamic
  • analyzer
  • ray tracing
  • debugging
Accès libre

Efficient Data Transfer by Mobility Adjustment Algorithm for Clustered Mobile Ad-Hoc Networks

Publié en ligne: 15 Jul 2014
Pages: 50 - 64

Résumé

Abstract

Mobile Ad-hoc NETwork (MANET) is a prevalent deployable network for easy plug-in and it is widely applied for many real time scenarios. Clustering is a well known solution for efficient communication among nodes with least control overheads. The communication link breaks between nodes when a node moves beyond the transmission range of another node because of mobility. Frequent link breaks happen because of nodes mobility which cannot be controlled without increasing the network control overheads. The authors propose an Mobility Adjustment Routing (MAR) routing algorithm for establishing a stable path between the source and the destination. In this approach the choice of cluster heads based on the smallest weight age, node mobility and remaining battery power are used as a metric for weight computation. The cluster head and the gate way nodes forward RREQ packets to set up a path between the source and the destination which proves efficient communication, before forwarding a RREQ packet cluster the head/gateway node compares its mobility value with RREQ and updates the least value in RREQ. The destination node advertises the least mobility value to the remaining nodes in the path with the help of RREP packet, therefore stable paths are found without increasing the network control overheads. The simulation results done with the help of network simulator 2 show that the algorithm proposed performs well even at higher traffic load compared to existing algorithms.

Mots clés

  • MANET
  • MAR
  • WCA
  • WBCA
  • GDMAC
  • LID
Accès libre

Cross Layer Based Congestion Control in Wireless Mesh Networks

Publié en ligne: 15 Jul 2014
Pages: 65 - 80

Résumé

Abstract

A major issue that attracts the researchers in wireless mesh networks is the issue of performance of the TCP. The role of the congestion control techniques is pivotal in the development of optimal solutions. In wireless mesh networks, the efficiency of bandwidth management in the process of developing optimal solutions depends largely on the congestion control methods used. This paper explores the possibility of such mechanisms which can achieve efficient congestion control in wireless mesh networks. The method proposed is known as Cross Layer Congestion Control (CLCC) and it is developed on the basis of the concept of cross layer optimization. The main purpose of the paper is to provide an efficient bandwidth management scheme for high speed video applications through a congestion control mechanism. The performance evaluation of the proposed method of CLCC for different environments of traffic models, such as single source to single destination and multiple sources to multiple destinations, are appropriate when compared to the existing models.

Mots clés

  • Bandwidth management
  • cross layer
  • WMN
  • congestion control
Accès libre

Colour Restoration of Image Obtained from CCD Sensor Directly

Publié en ligne: 15 Jul 2014
Pages: 81 - 91

Résumé

Abstract

The original image data obtained from Charge-coupled Device (CCD) can be called original data, which is lack of color information. In order to restore the color of original image, firstly, we design a Bayer color filter array, and then we use bilinear interpolation algorithm and smooth hue transition interpolation algorithm to restore the color of original image. However, the hues of adjacent pixels change abruptly by the bilinear interpolation, therefore, we use smooth hue transition interpolation to enhance the edge of original image, and finally we identify the ultimate performance of these interpolation algorithms.

Mots clés

  • Color restoration
  • CCD sensor
  • Bayer
  • Color filter array
  • Bilinear interpolation algorithm
  • Smooth hue transition interpolation algorithm
  • Edge enhancement
  • Objective quality measure
Accès libre

A Combined Method for On-Line Signature Verification

Publié en ligne: 15 Jul 2014
Pages: 92 - 97

Résumé

Abstract

A combined method for on-line signature verification is presented in this paper. Moreover, all the necessary steps in developing a signature recognition system are described: signature data pre-processing, feature extraction and selection, verification and system evaluation. NNs are used for verification. The influence of the signature forgery type (random and skilled) over the verification results is investigated as well. The experiments are carried out on SUsig database which consists of genuine and forgery signatures of 89 users. The average accuracy is 98.46%.

Mots clés

  • On-line signature verification
  • neural networks
  • feature selection
  • SUsig database
  • forgery signatures
Accès libre

Secret Image Sharing Scheme Based on a Boolean Operation

Publié en ligne: 15 Jul 2014
Pages: 98 - 113

Résumé

Abstract

Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction complexity, due to the use of a Boolean operation. But these research works lack the fault tolerance property which is the heart of secret sharing. This paper deals with a general (k, n) secret image sharing scheme for gray scale images with both low reconstruction complexity and preservation of the fault tolerance property. Moreover, the proposed sharing generation technique can also be applied on colour images.

Mots clés

  • Secret image sharing
  • Boolean operation
  • reconstruction complexity
  • fault tolerance property
Accès libre

Benchmark of Different Gradient Descents in OCR

Publié en ligne: 15 Jul 2014
Pages: 114 - 126

Résumé

Abstract

In this paper we implement six different learning algorithms in Optical Character Recognition (OCR) problem and achieve the criteria of end-time, number of iterations, train-set performance, test-set performance, validate-set performance and overall performance of these methods and compare them. Finally, we show the advantages and disadvantages of each method.

Mots clés

  • Learning algorithm
  • neural network
  • Optical Character Recognition (OCR)
  • pattern recognition
Accès libre

Telephone Speech Endpoint Detection using Mean-Delta Feature

Publié en ligne: 15 Jul 2014
Pages: 127 - 139

Résumé

Abstract

In the study the efficiency of three features for trajectory-based endpoint detection is experimentally evaluated in the fixed-text Dynamic Time Warping (DTW) - a based speaker verification task with short phrases of telephone speech. The employed features are Modified Teager Energy (MTE), Energy-Entropy (EE) feature and Mean-Delta (MD) feature. The utterance boundaries in the endpoint detector are provided by means of state automaton and a set of thresholds based only on trajectory characteristics. The training and testing have been done with noisy telephone speech (short phrases in Bulgarian language with length of about 2 s) selected from BG-SRDat corpus. The results of the experiments have shown that the MD feature demonstrates the best performance in the endpoint detection tests in terms of the verification rate.

Mots clés

  • Speech detection
  • endpoint detection
  • spectral entropy
Accès libre

Adaptive Sliding Mode Control Based on a Filter for Four-Wheel Omni-Directional Mobile Robots

Publié en ligne: 15 Jul 2014
Pages: 140 - 153

Résumé

Abstract

Since there are usually parameter uncertainties and influence of the exogenous disturbances on the dynamic model of a four-wheel omni-directional mobile robot (FOMR), the traditional strategy for motion control has not good performance. A sliding mode control based on an adaptive approach and a filter (AFSMC) is presented in this paper. First, according to identifying the reaching gain by a Radial Basis Function based neural network, and combining a filter, AFSMC can reduce the inherent impact that is produced by the normal sliding mode control. Second, the adaptive approach is applied to deal with the uncertainties and the influence of exogenous disturbances. Numerical simulations are carried out to assess the performance of the controller. All the simulation results indicate that the proposed control strategy is efficient to solve the problem.

Mots clés

  • Four-wheel drive
  • omni-directional mobile robot
  • adaptive sliding mode
  • filter
Accès libre

Solution Bounds for Algebraic Equations in Control Theory

Publié en ligne: 15 Jul 2014
Pages: 154 - 154

Résumé

13 Articles
Accès libre

Natural Language Generation and Semantic Technologies

Publié en ligne: 15 Jul 2014
Pages: 3 - 23

Résumé

Abstract

The paper presents a survey of the domain of Natural Language Generation (NLG) with its models, techniques, applications, and investigates how the semantic technologies are drawn into text generation. The idea and facilities of Semantic Web initiative are discussed in connection with the new opportunities offered to the Natural Language Generation.

Mots clés

  • Natural Language Generation
  • semantic technologies
  • semantic Web
Accès libre

Secure Routing in Manet Using Synchronization and Data Authencity

Publié en ligne: 15 Jul 2014
Pages: 24 - 30

Résumé

Abstract

In recent years synchronization plays a major issue for secure transmission in mobile adhoc networks. When an attacker modifies the time synchronization algorithm, the nodes will have faulty estimates of other nodes location, leading to chaos. While transmitting under these adverse conditions, packets might be lost or might be sent to wrong locations. Data replication and data diffusion are two methods which are used to solve the problem of data availability. In this paper we propose an algorithm for secure multi hop transmission used for external attacks.

Mots clés

  • Time synchronization
  • data availability
  • data authentication
  • pair wise secure transaction
  • end-to-end delay
Accès libre

Codes on Key Errors

Publié en ligne: 15 Jul 2014
Pages: 31 - 37

Résumé

Abstract

Coding theory has started with the intention of detection and correction of errors which have occurred during communication. Different types of errors are produced by different types of communication channels and accordingly codes are developed to deal with them. In 2013 Sharma and Gaur introduced a new kind of an error which will be termed “key error”. This paper obtains the lower and upper bounds on the number of parity-check digits required for linear codes capable for detecting such errors. Illustration of such a code is provided. Codes capable of simultaneous detection and correction of such errors have also been considered.

Mots clés

  • Parity check digit
  • parity check matrix
  • syndrome
  • standard array
Accès libre

A Framework for Visual Dynamic Analysis of Ray Tracing Algorithms

Publié en ligne: 15 Jul 2014
Pages: 38 - 49

Résumé

Abstract

A novel approach is presented for recording high volume data about ray tracing rendering systems' runtime state and its subsequent dynamic analysis and interactive visualization in the algorithm computational domain. Our framework extracts light paths traced by the system and leverages on a powerful filtering subsystem, helping interactive visualization and exploration of the desired subset of recorded data. We introduce a versatile data logging format and acceleration structures for easy access and filtering. We have implemented a plugin based framework and a tool set that realize all ideas presented in this paper. The framework provides data logging API for instrumenting production-ready, multithreaded, distributed renderers. The framework visualization tool enables deeper understanding of the ray tracing algorithms for novices, as well as for experts.

Mots clés

  • Visual
  • dynamic
  • analyzer
  • ray tracing
  • debugging
Accès libre

Efficient Data Transfer by Mobility Adjustment Algorithm for Clustered Mobile Ad-Hoc Networks

Publié en ligne: 15 Jul 2014
Pages: 50 - 64

Résumé

Abstract

Mobile Ad-hoc NETwork (MANET) is a prevalent deployable network for easy plug-in and it is widely applied for many real time scenarios. Clustering is a well known solution for efficient communication among nodes with least control overheads. The communication link breaks between nodes when a node moves beyond the transmission range of another node because of mobility. Frequent link breaks happen because of nodes mobility which cannot be controlled without increasing the network control overheads. The authors propose an Mobility Adjustment Routing (MAR) routing algorithm for establishing a stable path between the source and the destination. In this approach the choice of cluster heads based on the smallest weight age, node mobility and remaining battery power are used as a metric for weight computation. The cluster head and the gate way nodes forward RREQ packets to set up a path between the source and the destination which proves efficient communication, before forwarding a RREQ packet cluster the head/gateway node compares its mobility value with RREQ and updates the least value in RREQ. The destination node advertises the least mobility value to the remaining nodes in the path with the help of RREP packet, therefore stable paths are found without increasing the network control overheads. The simulation results done with the help of network simulator 2 show that the algorithm proposed performs well even at higher traffic load compared to existing algorithms.

Mots clés

  • MANET
  • MAR
  • WCA
  • WBCA
  • GDMAC
  • LID
Accès libre

Cross Layer Based Congestion Control in Wireless Mesh Networks

Publié en ligne: 15 Jul 2014
Pages: 65 - 80

Résumé

Abstract

A major issue that attracts the researchers in wireless mesh networks is the issue of performance of the TCP. The role of the congestion control techniques is pivotal in the development of optimal solutions. In wireless mesh networks, the efficiency of bandwidth management in the process of developing optimal solutions depends largely on the congestion control methods used. This paper explores the possibility of such mechanisms which can achieve efficient congestion control in wireless mesh networks. The method proposed is known as Cross Layer Congestion Control (CLCC) and it is developed on the basis of the concept of cross layer optimization. The main purpose of the paper is to provide an efficient bandwidth management scheme for high speed video applications through a congestion control mechanism. The performance evaluation of the proposed method of CLCC for different environments of traffic models, such as single source to single destination and multiple sources to multiple destinations, are appropriate when compared to the existing models.

Mots clés

  • Bandwidth management
  • cross layer
  • WMN
  • congestion control
Accès libre

Colour Restoration of Image Obtained from CCD Sensor Directly

Publié en ligne: 15 Jul 2014
Pages: 81 - 91

Résumé

Abstract

The original image data obtained from Charge-coupled Device (CCD) can be called original data, which is lack of color information. In order to restore the color of original image, firstly, we design a Bayer color filter array, and then we use bilinear interpolation algorithm and smooth hue transition interpolation algorithm to restore the color of original image. However, the hues of adjacent pixels change abruptly by the bilinear interpolation, therefore, we use smooth hue transition interpolation to enhance the edge of original image, and finally we identify the ultimate performance of these interpolation algorithms.

Mots clés

  • Color restoration
  • CCD sensor
  • Bayer
  • Color filter array
  • Bilinear interpolation algorithm
  • Smooth hue transition interpolation algorithm
  • Edge enhancement
  • Objective quality measure
Accès libre

A Combined Method for On-Line Signature Verification

Publié en ligne: 15 Jul 2014
Pages: 92 - 97

Résumé

Abstract

A combined method for on-line signature verification is presented in this paper. Moreover, all the necessary steps in developing a signature recognition system are described: signature data pre-processing, feature extraction and selection, verification and system evaluation. NNs are used for verification. The influence of the signature forgery type (random and skilled) over the verification results is investigated as well. The experiments are carried out on SUsig database which consists of genuine and forgery signatures of 89 users. The average accuracy is 98.46%.

Mots clés

  • On-line signature verification
  • neural networks
  • feature selection
  • SUsig database
  • forgery signatures
Accès libre

Secret Image Sharing Scheme Based on a Boolean Operation

Publié en ligne: 15 Jul 2014
Pages: 98 - 113

Résumé

Abstract

Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is high. Some research papers on secret image sharing are also available with smaller reconstruction complexity, due to the use of a Boolean operation. But these research works lack the fault tolerance property which is the heart of secret sharing. This paper deals with a general (k, n) secret image sharing scheme for gray scale images with both low reconstruction complexity and preservation of the fault tolerance property. Moreover, the proposed sharing generation technique can also be applied on colour images.

Mots clés

  • Secret image sharing
  • Boolean operation
  • reconstruction complexity
  • fault tolerance property
Accès libre

Benchmark of Different Gradient Descents in OCR

Publié en ligne: 15 Jul 2014
Pages: 114 - 126

Résumé

Abstract

In this paper we implement six different learning algorithms in Optical Character Recognition (OCR) problem and achieve the criteria of end-time, number of iterations, train-set performance, test-set performance, validate-set performance and overall performance of these methods and compare them. Finally, we show the advantages and disadvantages of each method.

Mots clés

  • Learning algorithm
  • neural network
  • Optical Character Recognition (OCR)
  • pattern recognition
Accès libre

Telephone Speech Endpoint Detection using Mean-Delta Feature

Publié en ligne: 15 Jul 2014
Pages: 127 - 139

Résumé

Abstract

In the study the efficiency of three features for trajectory-based endpoint detection is experimentally evaluated in the fixed-text Dynamic Time Warping (DTW) - a based speaker verification task with short phrases of telephone speech. The employed features are Modified Teager Energy (MTE), Energy-Entropy (EE) feature and Mean-Delta (MD) feature. The utterance boundaries in the endpoint detector are provided by means of state automaton and a set of thresholds based only on trajectory characteristics. The training and testing have been done with noisy telephone speech (short phrases in Bulgarian language with length of about 2 s) selected from BG-SRDat corpus. The results of the experiments have shown that the MD feature demonstrates the best performance in the endpoint detection tests in terms of the verification rate.

Mots clés

  • Speech detection
  • endpoint detection
  • spectral entropy
Accès libre

Adaptive Sliding Mode Control Based on a Filter for Four-Wheel Omni-Directional Mobile Robots

Publié en ligne: 15 Jul 2014
Pages: 140 - 153

Résumé

Abstract

Since there are usually parameter uncertainties and influence of the exogenous disturbances on the dynamic model of a four-wheel omni-directional mobile robot (FOMR), the traditional strategy for motion control has not good performance. A sliding mode control based on an adaptive approach and a filter (AFSMC) is presented in this paper. First, according to identifying the reaching gain by a Radial Basis Function based neural network, and combining a filter, AFSMC can reduce the inherent impact that is produced by the normal sliding mode control. Second, the adaptive approach is applied to deal with the uncertainties and the influence of exogenous disturbances. Numerical simulations are carried out to assess the performance of the controller. All the simulation results indicate that the proposed control strategy is efficient to solve the problem.

Mots clés

  • Four-wheel drive
  • omni-directional mobile robot
  • adaptive sliding mode
  • filter
Accès libre

Solution Bounds for Algebraic Equations in Control Theory

Publié en ligne: 15 Jul 2014
Pages: 154 - 154

Résumé

Planifiez votre conférence à distance avec Sciendo