Magazine et Edition

Volume 22 (2022): Edition 3 (September 2022)

Volume 22 (2022): Edition 2 (June 2022)

Volume 22 (2022): Edition 1 (March 2022)

Volume 21 (2021): Edition 4 (December 2021)

Volume 21 (2021): Edition 3 (September 2021)

Volume 21 (2021): Edition 2 (June 2021)

Volume 21 (2021): Edition 1 (March 2021)

Volume 20 (2020): Edition 6 (December 2020)
Special Edition on New Developments in Scalable Computing

Volume 20 (2020): Edition 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volume 20 (2020): Edition 4 (November 2020)

Volume 20 (2020): Edition 3 (September 2020)

Volume 20 (2020): Edition 2 (June 2020)

Volume 20 (2020): Edition 1 (March 2020)

Volume 19 (2019): Edition 4 (November 2019)

Volume 19 (2019): Edition 3 (September 2019)

Volume 19 (2019): Edition 2 (June 2019)

Volume 19 (2019): Edition 1 (March 2019)

Volume 18 (2018): Edition 5 (May 2018)
Special Thematic Edition on Optimal Codes and Related Topics

Volume 18 (2018): Edition 4 (November 2018)

Volume 18 (2018): Edition 3 (September 2018)

Volume 18 (2018): Edition 2 (June 2018)

Volume 18 (2018): Edition 1 (March 2018)

Volume 17 (2017): Edition 5 (December 2017)
Special Edition With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volume 17 (2017): Edition 4 (November 2017)

Volume 17 (2017): Edition 3 (September 2017)

Volume 17 (2017): Edition 2 (June 2017)

Volume 17 (2017): Edition 1 (March 2017)

Volume 16 (2016): Edition 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volume 16 (2016): Edition 5 (October 2016)
Edition Title: Special Edition on Application of Advanced Computing and Simulation in Information Systems

Volume 16 (2016): Edition 4 (December 2016)

Volume 16 (2016): Edition 3 (September 2016)

Volume 16 (2016): Edition 2 (June 2016)

Volume 16 (2016): Edition 1 (March 2016)

Volume 15 (2015): Edition 7 (December 2015)
Special Edition on Information Fusion

Volume 15 (2015): Edition 6 (December 2015)
Special Edition on Logistics, Informatics and Service Science

Volume 15 (2015): Edition 5 (April 2015)
Special Edition on Control in Transportation Systems

Volume 15 (2015): Edition 4 (November 2015)

Volume 15 (2015): Edition 3 (September 2015)

Volume 15 (2015): Edition 2 (June 2015)

Volume 15 (2015): Edition 1 (March 2015)

Volume 14 (2014): Edition 5 (December 2014)
Special Edition

Volume 14 (2014): Edition 4 (December 2014)

Volume 14 (2014): Edition 3 (September 2014)

Volume 14 (2014): Edition 2 (June 2014)

Volume 14 (2014): Edition 1 (March 2014)

Volume 13 (2013): Edition Special-Edition (December 2013)

Volume 13 (2013): Edition 4 (December 2013)
The publishing of the present issue (Volume 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volume 13 (2013): Edition 3 (September 2013)

Volume 13 (2013): Edition 2 (June 2013)

Volume 13 (2013): Edition 1 (March 2013)

Volume 12 (2012): Edition 4 (December 2012)

Volume 12 (2012): Edition 3 (September 2012)

Volume 12 (2012): Edition 2 (June 2012)

Volume 12 (2012): Edition 1 (March 2012)

Détails du magazine
Format
Magazine
eISSN
1314-4081
Première publication
13 Mar 2012
Période de publication
4 fois par an
Langues
Anglais

Chercher

Volume 16 (2016): Edition 4 (December 2016)

Détails du magazine
Format
Magazine
eISSN
1314-4081
Première publication
13 Mar 2012
Période de publication
4 fois par an
Langues
Anglais

Chercher

10 Articles
Accès libre

On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-Boxes

Publié en ligne: 22 Dec 2016
Pages: 3 - 12

Résumé

Abstract

We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate nonsingular linear encodings of the output of the individual S-boxes. More specifically, we examine the general situation when the output of each S-box of the DESis precoded separately intoaproperly constructed copy of the inherent even-weight code of length 4. The study is focused on finding multi-round linear characteristics for thus modified DESciphers having maximal effectiveness. Depending on the particular encodings, it turns out that the effectiveness of interest may be larger but in most cases is smaller than that one for the original DESwith the same number of rounds. The latter means that the complexity of successful linear cryptanalysis against these ciphers will mainly increase comparing to the DESitself. The present research extends inanatural way our previous work[Linear Cryptanalysis and Modified DESwith Parity Check in the S-boxes, LNCS 9540 (2016), pp. 60-78].

Mots clés

  • DES
  • S-boxes
  • parity check
  • linear cryptanalysis
  • linear characteristics
Accès libre

About a Fuzzy Distance between Two Fuzzy Partitions and Application in Attribute Reduction Problem

Publié en ligne: 22 Dec 2016
Pages: 13 - 28

Résumé

Abstract

According to traditional rough set theory approach, attribute reduction methods are performed on the decision tables with the discretized value domain, which are decision tables obtained by discretized data methods. In recent years, researches have proposed methods based on fuzzy rough set approach to solve the problem of attribute reduction in decision tables with numerical value domain. In this paper, we proposeafuzzy distance between two partitions and an attribute reduction method in numerical decision tables based on proposed fuzzy distance. Experiments on data sets show that the classification accuracy of proposed method is more efficient than the ones based fuzzy entropy.

Mots clés

  • Fuzzy rough set
  • fuzzy equivalence relation
  • fuzzy distance
  • decision table
  • attribute reduction
  • reduct
Accès libre

Ontologies for Platform as Service APIs Interoperability

Publié en ligne: 22 Dec 2016
Pages: 29 - 44

Résumé

Abstract

Ontologies can be used to describe common cloud functionalities and enable common terminology to assist in cloud interoperability. In this work, we have developed the ontology for resources and operations and the ontology of interoperability problems. The aim is to clearly describe and categorize the existing functionalities, features and specificities of commercial platform asaservice offers. The first ontology also provides data type mappings among different Paa Sstorages and cross-Paa Sdata types used in inputs and outputs of the remote APIoperations to provideacommon layer for information exchange and data migration among different Paa Sproviders. The ontologies were evaluated by tools and by human experts. Furthermore, the ontologies were used in cloud interoperability prototype to show their practical applicability.

Mots clés

  • Cloud ontology
  • interoperability
  • platform asaservice
  • remote APIs
  • interoperability problems
Accès libre

An Approach of XML Query Evaluation Based Model Checking

Publié en ligne: 22 Dec 2016
Pages: 45 - 54

Résumé

Abstract

In this paper, we show the process inspired by model checking which integrate temporal logic to the application of semi-structured data query. We investigate the potential ofatechnique based on CTL (Computation Tree Logic) model checking for evaluating queries expressed in (a subset of) XPath. Our research consists of query algebra, constraint understanding and expression mapping. The core of research is mapping the XMLquery algebra to an expression collection of temporal logic. We tryanew kind of query execution strategy to enhance the accuracy of semantic description of the XMLquery. For the purpose of supporting the generation of the formal specifications and reducing the mapping processing, the XMLquery constraint can be converted toaspecification of SPS (Specification Pattern System) through which we get the formula set to evaluate path queries directly on CTLformula.

Mots clés

  • XML
  • model checking
  • Xpath
  • temporal logic
  • SPS
Accès libre

Learning a Class-Specific Dictionary for Facial Expression Recognition

Publié en ligne: 22 Dec 2016
Pages: 55 - 62

Résumé

Abstract

Sparse coding is currently an active topic in signal processing and pattern recognition. Meta Face Learning (MFL) isatypical sparse coding method and exhibits promising performance for classification. Unfortunately, due to using the l1-norm minimization, MFLis expensive to compute and is not robust enough. To address these issues, this paper proposesafaster and more robust version of MFLwith the l2-norm regularization constraint on coding coefficients. The proposed method is used to learnaclass-specific dictionary for facial expression recognition. Extensive experiments on two popular facial expression databases, i.e., the JAFFEdatabase and the Cohn-Kanade database, demonstrate that our method shows promising computational efficiency and robustness on facial expression recognition tasks.

Mots clés

  • Sparse coding
  • metaface learning
  • sparse representation
  • facial expression recognition
  • robustness
Accès libre

Iteration vs Recursion in Introduction to Programming Classes: An Empirical Study

Publié en ligne: 22 Dec 2016
Pages: 63 - 72

Résumé

Abstract

In this article we have presented the results of an empirical study which was carried out on 130 students in Introduction to programming classes. Their initial preference, success rate, comprehension and subsequent preference were studied when dealing with programming tasks which could be solved using either iteration or recursion.

Mots clés

  • Recursion
  • iteration
  • introduction to programming
  • education
  • students
Accès libre

A Multi Route Rank Based Routing Protocol for Industrial Wireless Mesh Sensor Networks

Publié en ligne: 22 Dec 2016
Pages: 73 - 86

Résumé

Abstract

Wireless Mesh Sensor nodes are deployed in harsh environments, like Industrial Wireless Mesh Sensor Networks (IWMSN). There the equipment is exposed to temperature and electrical noise, so providingareliable, interference free and efficient communication in this environment isachallenge. We proposea Multi Route Rank based Routing (MR3) protocol, which enhances the link dynamics for IWMSNand also provides interference free reliable packet delivery in harsh environments. The rank ofanode is estimated based on density, hop count, energy and Signal to Interference plus Noise Ratio (SINR). The route discovery phase finds the rank value to forward the data packet inareliable path. Once the forwarding path is established, subsequently the data packets can be propagated towards the destination without using any location information. Our simulation results show that this method improves the packet delivery ratio and the throughput tremendously, and at the same time minimizes the packet delay, in heavy traffic condition.

Mots clés

  • Industrial wireless mesh sensor networks
  • Signal-to-interference plus noise ratio
  • Multi-radio
  • Multi-channel
  • Partially overlapped channels
  • Quality of Services (QoS)
Accès libre

Spectrum Allocation of Cognitive Radio Based on Autonomy Evolutionary Algorithm

Publié en ligne: 22 Dec 2016
Pages: 87 - 97

Résumé

Abstract

Reasonable and effective allocation of cognitive radio spectrum resource according to user’s requirements is the key task of cognitive radio network. Cognitive radio spectrum allocation problem can be viewed as an optimization problem. This paper analyzes the application of bio-inspired intelligent algorithm in cognitive radio network spectrum allocation, and based on graph theory model of spectrum allocation, proposesaspectrum allocation algorithm based on autonomously evolutionary scheme. Three objective functions: Max-Min-Reward, Max-Sum- Reward and Max-Proportional-Fair are employed to evaluate the proposed algorithm capacity. The simulation result reveals that the proposed method can make the system user to obtain better network benefits and better embody the fairness between cognitive users. In the process of allocation, the proposed method was not restricted by user scale and the number of spectrums.

Mots clés

  • Cognitive radio
  • spectrum allocation
  • graph theory
  • bio-inspired computing
  • autonomously evolutionary algorithm
Accès libre

Development of Control Strategies and Implementation to Electrical Water Heaters for Energy Conservation

Publié en ligne: 22 Dec 2016
Pages: 98 - 112

Résumé

Abstract

Optimum design for storage type Electric Water Heaters (EWHs) was analyzed for energy conservation and maximum hot water output. Single and dual tank EWHs were compared with each other. For each comparison, data were gathered for tank volumes and power ratings ranging 100-400land 1-4 k Wrespectively. Different dual tank EWHs were designed with different control mechanisms to find which one had the optimum outcome. For these comparisons, dual tank EWHs in which the upper part of the tanks had 25%of the total volume and 75%of the total power rating were used. Afive day usage period of an EWHinatypical household was simulated on SIMULINK. To minimize this energy loss, transient analysis on FLUENTwas performed to see how long it took for the outlet water temperature. In these simulations, single and dual tank EWHs with different control mechanisms were compared with each other to find the design with minimum energy consumption and maximum hot water output. From these results the most efficient control system cost analysis was determined for minimum operating cost and minimum carbon footprint through optimized control strategies.

Mots clés

  • Control
  • energy efficiency
  • optimization
  • steady-state heat transfer
  • water heaters
Accès libre

Autonomous Path Planning Scheme Research for Mobile Robot

Publié en ligne: 22 Dec 2016
Pages: 113 - 125

Résumé

Abstract

An autonomous path-planning strategy based on Skinner operant conditioning principle and reinforcement learning principle is developed in this paper. The core strategies are the use of tendency cell and cognitive learning cell, which simulate bionic orientation and asymptotic learning ability. Cognitive learning cell is designed on the base of Boltzmann machine and improved Q-Learning algorithm, which executes operant action learning function to approximate the operative part of robot system. The tendency cell adjusts network weights by the use of information entropy to evaluate the function of operate action. The results of the simulation experiment in mobile robot showed that the designed autonomous path-planning strategy lets the robot realize autonomous navigation path planning. The robot learns to select autonomously according to the bionic orientate action and have fast convergence rate and higher adaptability.

Mots clés

  • Autonomous path planning
  • cognitive learning
  • information entropy
  • Q-Learning
  • mobile robots
10 Articles
Accès libre

On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-Boxes

Publié en ligne: 22 Dec 2016
Pages: 3 - 12

Résumé

Abstract

We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate nonsingular linear encodings of the output of the individual S-boxes. More specifically, we examine the general situation when the output of each S-box of the DESis precoded separately intoaproperly constructed copy of the inherent even-weight code of length 4. The study is focused on finding multi-round linear characteristics for thus modified DESciphers having maximal effectiveness. Depending on the particular encodings, it turns out that the effectiveness of interest may be larger but in most cases is smaller than that one for the original DESwith the same number of rounds. The latter means that the complexity of successful linear cryptanalysis against these ciphers will mainly increase comparing to the DESitself. The present research extends inanatural way our previous work[Linear Cryptanalysis and Modified DESwith Parity Check in the S-boxes, LNCS 9540 (2016), pp. 60-78].

Mots clés

  • DES
  • S-boxes
  • parity check
  • linear cryptanalysis
  • linear characteristics
Accès libre

About a Fuzzy Distance between Two Fuzzy Partitions and Application in Attribute Reduction Problem

Publié en ligne: 22 Dec 2016
Pages: 13 - 28

Résumé

Abstract

According to traditional rough set theory approach, attribute reduction methods are performed on the decision tables with the discretized value domain, which are decision tables obtained by discretized data methods. In recent years, researches have proposed methods based on fuzzy rough set approach to solve the problem of attribute reduction in decision tables with numerical value domain. In this paper, we proposeafuzzy distance between two partitions and an attribute reduction method in numerical decision tables based on proposed fuzzy distance. Experiments on data sets show that the classification accuracy of proposed method is more efficient than the ones based fuzzy entropy.

Mots clés

  • Fuzzy rough set
  • fuzzy equivalence relation
  • fuzzy distance
  • decision table
  • attribute reduction
  • reduct
Accès libre

Ontologies for Platform as Service APIs Interoperability

Publié en ligne: 22 Dec 2016
Pages: 29 - 44

Résumé

Abstract

Ontologies can be used to describe common cloud functionalities and enable common terminology to assist in cloud interoperability. In this work, we have developed the ontology for resources and operations and the ontology of interoperability problems. The aim is to clearly describe and categorize the existing functionalities, features and specificities of commercial platform asaservice offers. The first ontology also provides data type mappings among different Paa Sstorages and cross-Paa Sdata types used in inputs and outputs of the remote APIoperations to provideacommon layer for information exchange and data migration among different Paa Sproviders. The ontologies were evaluated by tools and by human experts. Furthermore, the ontologies were used in cloud interoperability prototype to show their practical applicability.

Mots clés

  • Cloud ontology
  • interoperability
  • platform asaservice
  • remote APIs
  • interoperability problems
Accès libre

An Approach of XML Query Evaluation Based Model Checking

Publié en ligne: 22 Dec 2016
Pages: 45 - 54

Résumé

Abstract

In this paper, we show the process inspired by model checking which integrate temporal logic to the application of semi-structured data query. We investigate the potential ofatechnique based on CTL (Computation Tree Logic) model checking for evaluating queries expressed in (a subset of) XPath. Our research consists of query algebra, constraint understanding and expression mapping. The core of research is mapping the XMLquery algebra to an expression collection of temporal logic. We tryanew kind of query execution strategy to enhance the accuracy of semantic description of the XMLquery. For the purpose of supporting the generation of the formal specifications and reducing the mapping processing, the XMLquery constraint can be converted toaspecification of SPS (Specification Pattern System) through which we get the formula set to evaluate path queries directly on CTLformula.

Mots clés

  • XML
  • model checking
  • Xpath
  • temporal logic
  • SPS
Accès libre

Learning a Class-Specific Dictionary for Facial Expression Recognition

Publié en ligne: 22 Dec 2016
Pages: 55 - 62

Résumé

Abstract

Sparse coding is currently an active topic in signal processing and pattern recognition. Meta Face Learning (MFL) isatypical sparse coding method and exhibits promising performance for classification. Unfortunately, due to using the l1-norm minimization, MFLis expensive to compute and is not robust enough. To address these issues, this paper proposesafaster and more robust version of MFLwith the l2-norm regularization constraint on coding coefficients. The proposed method is used to learnaclass-specific dictionary for facial expression recognition. Extensive experiments on two popular facial expression databases, i.e., the JAFFEdatabase and the Cohn-Kanade database, demonstrate that our method shows promising computational efficiency and robustness on facial expression recognition tasks.

Mots clés

  • Sparse coding
  • metaface learning
  • sparse representation
  • facial expression recognition
  • robustness
Accès libre

Iteration vs Recursion in Introduction to Programming Classes: An Empirical Study

Publié en ligne: 22 Dec 2016
Pages: 63 - 72

Résumé

Abstract

In this article we have presented the results of an empirical study which was carried out on 130 students in Introduction to programming classes. Their initial preference, success rate, comprehension and subsequent preference were studied when dealing with programming tasks which could be solved using either iteration or recursion.

Mots clés

  • Recursion
  • iteration
  • introduction to programming
  • education
  • students
Accès libre

A Multi Route Rank Based Routing Protocol for Industrial Wireless Mesh Sensor Networks

Publié en ligne: 22 Dec 2016
Pages: 73 - 86

Résumé

Abstract

Wireless Mesh Sensor nodes are deployed in harsh environments, like Industrial Wireless Mesh Sensor Networks (IWMSN). There the equipment is exposed to temperature and electrical noise, so providingareliable, interference free and efficient communication in this environment isachallenge. We proposea Multi Route Rank based Routing (MR3) protocol, which enhances the link dynamics for IWMSNand also provides interference free reliable packet delivery in harsh environments. The rank ofanode is estimated based on density, hop count, energy and Signal to Interference plus Noise Ratio (SINR). The route discovery phase finds the rank value to forward the data packet inareliable path. Once the forwarding path is established, subsequently the data packets can be propagated towards the destination without using any location information. Our simulation results show that this method improves the packet delivery ratio and the throughput tremendously, and at the same time minimizes the packet delay, in heavy traffic condition.

Mots clés

  • Industrial wireless mesh sensor networks
  • Signal-to-interference plus noise ratio
  • Multi-radio
  • Multi-channel
  • Partially overlapped channels
  • Quality of Services (QoS)
Accès libre

Spectrum Allocation of Cognitive Radio Based on Autonomy Evolutionary Algorithm

Publié en ligne: 22 Dec 2016
Pages: 87 - 97

Résumé

Abstract

Reasonable and effective allocation of cognitive radio spectrum resource according to user’s requirements is the key task of cognitive radio network. Cognitive radio spectrum allocation problem can be viewed as an optimization problem. This paper analyzes the application of bio-inspired intelligent algorithm in cognitive radio network spectrum allocation, and based on graph theory model of spectrum allocation, proposesaspectrum allocation algorithm based on autonomously evolutionary scheme. Three objective functions: Max-Min-Reward, Max-Sum- Reward and Max-Proportional-Fair are employed to evaluate the proposed algorithm capacity. The simulation result reveals that the proposed method can make the system user to obtain better network benefits and better embody the fairness between cognitive users. In the process of allocation, the proposed method was not restricted by user scale and the number of spectrums.

Mots clés

  • Cognitive radio
  • spectrum allocation
  • graph theory
  • bio-inspired computing
  • autonomously evolutionary algorithm
Accès libre

Development of Control Strategies and Implementation to Electrical Water Heaters for Energy Conservation

Publié en ligne: 22 Dec 2016
Pages: 98 - 112

Résumé

Abstract

Optimum design for storage type Electric Water Heaters (EWHs) was analyzed for energy conservation and maximum hot water output. Single and dual tank EWHs were compared with each other. For each comparison, data were gathered for tank volumes and power ratings ranging 100-400land 1-4 k Wrespectively. Different dual tank EWHs were designed with different control mechanisms to find which one had the optimum outcome. For these comparisons, dual tank EWHs in which the upper part of the tanks had 25%of the total volume and 75%of the total power rating were used. Afive day usage period of an EWHinatypical household was simulated on SIMULINK. To minimize this energy loss, transient analysis on FLUENTwas performed to see how long it took for the outlet water temperature. In these simulations, single and dual tank EWHs with different control mechanisms were compared with each other to find the design with minimum energy consumption and maximum hot water output. From these results the most efficient control system cost analysis was determined for minimum operating cost and minimum carbon footprint through optimized control strategies.

Mots clés

  • Control
  • energy efficiency
  • optimization
  • steady-state heat transfer
  • water heaters
Accès libre

Autonomous Path Planning Scheme Research for Mobile Robot

Publié en ligne: 22 Dec 2016
Pages: 113 - 125

Résumé

Abstract

An autonomous path-planning strategy based on Skinner operant conditioning principle and reinforcement learning principle is developed in this paper. The core strategies are the use of tendency cell and cognitive learning cell, which simulate bionic orientation and asymptotic learning ability. Cognitive learning cell is designed on the base of Boltzmann machine and improved Q-Learning algorithm, which executes operant action learning function to approximate the operative part of robot system. The tendency cell adjusts network weights by the use of information entropy to evaluate the function of operate action. The results of the simulation experiment in mobile robot showed that the designed autonomous path-planning strategy lets the robot realize autonomous navigation path planning. The robot learns to select autonomously according to the bionic orientate action and have fast convergence rate and higher adaptability.

Mots clés

  • Autonomous path planning
  • cognitive learning
  • information entropy
  • Q-Learning
  • mobile robots

Planifiez votre conférence à distance avec Sciendo