Magazine et Edition

Volume 22 (2022): Edition 3 (September 2022)

Volume 22 (2022): Edition 2 (June 2022)

Volume 22 (2022): Edition 1 (March 2022)

Volume 21 (2021): Edition 4 (December 2021)

Volume 21 (2021): Edition 3 (September 2021)

Volume 21 (2021): Edition 2 (June 2021)

Volume 21 (2021): Edition 1 (March 2021)

Volume 20 (2020): Edition 6 (December 2020)
Special Edition on New Developments in Scalable Computing

Volume 20 (2020): Edition 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volume 20 (2020): Edition 4 (November 2020)

Volume 20 (2020): Edition 3 (September 2020)

Volume 20 (2020): Edition 2 (June 2020)

Volume 20 (2020): Edition 1 (March 2020)

Volume 19 (2019): Edition 4 (November 2019)

Volume 19 (2019): Edition 3 (September 2019)

Volume 19 (2019): Edition 2 (June 2019)

Volume 19 (2019): Edition 1 (March 2019)

Volume 18 (2018): Edition 5 (May 2018)
Special Thematic Edition on Optimal Codes and Related Topics

Volume 18 (2018): Edition 4 (November 2018)

Volume 18 (2018): Edition 3 (September 2018)

Volume 18 (2018): Edition 2 (June 2018)

Volume 18 (2018): Edition 1 (March 2018)

Volume 17 (2017): Edition 5 (December 2017)
Special Edition With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volume 17 (2017): Edition 4 (November 2017)

Volume 17 (2017): Edition 3 (September 2017)

Volume 17 (2017): Edition 2 (June 2017)

Volume 17 (2017): Edition 1 (March 2017)

Volume 16 (2016): Edition 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volume 16 (2016): Edition 5 (October 2016)
Edition Title: Special Edition on Application of Advanced Computing and Simulation in Information Systems

Volume 16 (2016): Edition 4 (December 2016)

Volume 16 (2016): Edition 3 (September 2016)

Volume 16 (2016): Edition 2 (June 2016)

Volume 16 (2016): Edition 1 (March 2016)

Volume 15 (2015): Edition 7 (December 2015)
Special Edition on Information Fusion

Volume 15 (2015): Edition 6 (December 2015)
Special Edition on Logistics, Informatics and Service Science

Volume 15 (2015): Edition 5 (April 2015)
Special Edition on Control in Transportation Systems

Volume 15 (2015): Edition 4 (November 2015)

Volume 15 (2015): Edition 3 (September 2015)

Volume 15 (2015): Edition 2 (June 2015)

Volume 15 (2015): Edition 1 (March 2015)

Volume 14 (2014): Edition 5 (December 2014)
Special Edition

Volume 14 (2014): Edition 4 (December 2014)

Volume 14 (2014): Edition 3 (September 2014)

Volume 14 (2014): Edition 2 (June 2014)

Volume 14 (2014): Edition 1 (March 2014)

Volume 13 (2013): Edition Special-Edition (December 2013)

Volume 13 (2013): Edition 4 (December 2013)
The publishing of the present issue (Volume 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volume 13 (2013): Edition 3 (September 2013)

Volume 13 (2013): Edition 2 (June 2013)

Volume 13 (2013): Edition 1 (March 2013)

Volume 12 (2012): Edition 4 (December 2012)

Volume 12 (2012): Edition 3 (September 2012)

Volume 12 (2012): Edition 2 (June 2012)

Volume 12 (2012): Edition 1 (March 2012)

Détails du magazine
Format
Magazine
eISSN
1314-4081
Première publication
13 Mar 2012
Période de publication
4 fois par an
Langues
Anglais

Chercher

Volume 20 (2020): Edition 1 (March 2020)

Détails du magazine
Format
Magazine
eISSN
1314-4081
Première publication
13 Mar 2012
Période de publication
4 fois par an
Langues
Anglais

Chercher

11 Articles
Accès libre

On Some Knowledge Measures of Intuitionistic Fuzzy Sets of Type Two with Application to MCDM

Publié en ligne: 27 Mar 2020
Pages: 3 - 20

Résumé

Abstract

To overcome the certain limitations of Intuitionistic Fuzzy Sets (IFSs), the notion of Intuitionistic Fuzzy Sets of Second Type (IFSST) was introduced. IFSST is a modified version of IFS for handling some problems in a reasonable manner. Type two Intuitionistic Fuzzy entropy (IFSST-entropy) measures the amount of ambiguity/uncertainty present in an IFSST. In the present paper, we introduce the concept of dual measure of IFSST-entropy, i.e., IFSST-knowledge measure. We develop some IFSST-knowledge measures and prove some of their properties. We also show the superiority of the proposed IFSST-knowledge measures through comparative study. Further, we demonstrate the application of the proposed knowledge measures in Multi-Criteria Decision-Making (MCDM).

Mots clés

  • IFSs
  • IFSST
  • IFSST-knowledge measure
  • MCDM
Accès libre

EnQuad: A Publicly-Available Simulator for Quantum Key Distribution Protocols

Publié en ligne: 27 Mar 2020
Pages: 21 - 35

Résumé

Abstract

In this paper, we present EnQuad Version 1.0: a high-speed and expandable simulator for Quantum Key Distribution (QKD) protocols. Surpassing available simulators, EnQuad does not only simulate a QKD stack, but also does security testing and guides the researcher on which reconciliation protocol should be used in his experimental setup. On the top of that, it recommends changes for the researcher to satisfy security or a given target key-rate if any of them is not already fulfilled. Although EnQuad V1.0 is concerned with depolarizing channels and Individual Intercept-and-Resend attacks, EnQuad is featured with 24 parameters and 9 modular functions so that it could be expanded to a wide range of QKD protocols. In addition, we validated EnQuad outcomes against a comparable simulator and against theory. Furthermore, a set of 11 experiments showed that EnQuad runs 6.12× to 12.2× faster than a comparable simulator. EnQuad was implemented in MATLAB and the code is available online.

Mots clés

  • QKD simulators
  • Information Security
  • Quantum Cryptography
  • Scientific Computations
  • Software Technologies
Accès libre

A Hybrid Technique for Server Consolidation in Cloud Computing Environment

Publié en ligne: 27 Mar 2020
Pages: 36 - 52

Résumé

Abstract

The goal of data centers in the cloud computing environment is to provision the workloads and the computing resources as demanded by the users without the intervention of the providers. To achieve this, virtualization based server consolidation acts as a vital part in virtual machine placement process. Consolidating the Virtual Machines (VMs) on the Physical Machines (PMs) cuts down the unused physical servers, decreasing the energy consumption, while keeping the constraints for CPU and memory utilization. This technique also reduces the resource wastage and optimizes the available resources efficiently. Ant Colony Optimization (ACO) that is a well-known multi objective heuristic algorithm and Grey Wolf Algorithm (GWO) has been used to consolidate the servers used in the virtual machine placement problem. The proposed Fuzzy HAGA algorithm outperforms the other algorithms MMAS, ACS, FFD and Fuzzy ACS compared against it as the number of processors and memory utilization are lesser than these algorithms.

Mots clés

  • Virtual Machine (VM) placement
  • VM
  • power consumption
  • resource wastage
  • Ant Colony Optimization (ACO)
  • Grey Wolf Optimisation (GWO) Algorithm
  • HAGA Algorithm
Accès libre

IDD – A Platform Enabling Differential Debugging

Publié en ligne: 27 Mar 2020
Pages: 53 - 67

Résumé

Abstract

Debugging is a very time consuming task which is not well supported by existing tools. The existing methods do not provide tools enabling optimal developers’ productivity when debugging regressions in complex systems. In this paper we describe a possible solution aiding differential debugging. The differential debugging technique performs analysis of the regressed system and identifying the cause of the unexpected behavior by comparing to a previous version of the same system. The prototype, idd, inspects two versions of the executable – a baseline and a regressed version. The interactive debugging session runs side by side both executables and allows to examine and to compare various internal states. The architecture can work with multiple information sources comparing data from different tools. We also show how idd can detect performance regressions using information from third-party performance facilities. We illustrate how in practice we can quickly discover regressions in large systems such as the clang compiler.

Mots clés

  • IDD
  • differential debugging
  • functional regressions
  • performance regressions
  • complex systems
  • side by side debugging
  • interactive visual debugging
Accès libre

Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform

Publié en ligne: 27 Mar 2020
Pages: 68 - 81

Résumé

Abstract

This paper presents an efficient image cipher based on applying the chaotic Baker Map (BM) in the Discrete Cosine Transform (DCT). The encryption module of the proposed DCT-based BM image cipher employs a DCT on the original plain-image then, the DCT coefficients of the plain-image are shuffled with the BM. Finally, the inverse DCT is applied to the shuffled plain-image DCT coefficients to obtain the final cipher-image. The decryption module of the proposed DCT-based BM image cipher employs a DCT on the input cipher-image then, the DCT coefficients of the cipher-image are inversely shuffled with the BM. Finally, the inverse DCT is applied to the inversely shuffled cipher-image DCT coefficients to obtain the original plain-image. A set of experimental tests are performed to test the validity of the proposed DCT-based BM image cipher and the performed tests demonstrated the superiority of the proposed DCT-based BM image cipher in terms of statistical, differential, sensitivity and noise immunity.

Mots clés

  • Image-encryption
  • Baker map
  • DCT
Accès libre

An Indonesian Hoax News Detection System Using Reader Feedback and Naïve Bayes Algorithm

Publié en ligne: 27 Mar 2020
Pages: 82 - 94

Résumé

Abstract

Hoax news in Indonesia spread at an alarming rate. To reduce this, hoax news detection system needs to be created and put into practice. Such a system may use readers’ feedback and Naïve Bayes algorithm, which is used to verify news. Overtime, by using readers’ feedback, database corpus will continue to grow and could improve system performance. The current research aims to reach this. System performance evaluation is carried out under two conditions ‒ with and without sources (URL). The system is able to detect hoax news very well under both conditions. The highest precision, recall and f-measure values when including URL are 0.91, 1, and 0.95 respectively. Meanwhile, the highest value of precision, recall and f-measure without URL are 0.88, 1 and 0.94, respectively.

Mots clés

  • Hoax news
  • Indonesian news
  • Naïve Bayes
  • reader feedback.s
Accès libre

RETRACTED: A Smart Social Insurance Big Data Analytics Framework Based on Machine Learning Algorithms

Publié en ligne: 27 Mar 2020
Pages: 95 - 111

Résumé

Abstract

Social insurance is an individual’s protection against risks such as retirement, death or disability. Big data mining and analytics are a way that could help the insurers and the actuaries to get the optimal decision for the insured individuals. Dependently, this paper proposes a novel analytic framework for Egyptian Social insurance big data. NOSI’s data contains data, which need some pre-processing methods after extraction like replacing missing values, standardization and outlier/extreme data. The paper also presents using some mining methods, such as clustering and classification algorithms on the Egyptian social insurance dataset through an experiment. In clustering, we used K-means clustering and the result showed a silhouette score 0.138 with two clusters in the dataset features. In classification, we used the Support Vector Machine (SVM) classifier and classification results showed a high accuracy percentage of 94%.

Mots clés

  • Social Insurance
  • Data Integration
  • Big Data Mining and Big Data Analytics
Accès libre

Question Analysis towards a Vietnamese Question Answering System in the Education Domain

Publié en ligne: 27 Mar 2020
Pages: 112 - 128

Résumé

Abstract

Building a computer system, which can automatically answer questions in the human language, speech or text, is a long-standing goal of the Artificial Intelligence (AI) field. Question analysis, the task of extracting important information from the input question, is the first and crucial step towards a question answering system. In this paper, we focus on the task of Vietnamese question analysis in the education domain. Our goal is to extract important information expressed by named entities in an input question, such as university names, campus names, major names, and teacher names. We present several extraction models that utilize the advantages of both traditional statistical methods with handcrafted features and more recent advanced deep neural networks with automatically learned features. Our best model achieves 88.11% in the F1 score on a corpus consisting of 3,600 Vietnamese questions collected from the fan page of the International School, Vietnam National University, Hanoi.

Mots clés

  • Question analysis
  • question answering
  • convolutional neural networks
  • bidirectional long-short term memory
  • conditional random fields
Accès libre

Algorithm and Software System for Treatment Application of Platelet-Rich Plasma on Problematic Skin Wounds

Publié en ligne: 27 Mar 2020
Pages: 129 - 137

Résumé

Abstract

Recently a big interest arises to the automated diagnosis and digitalization of clinical data. The purpose of this article is to present treatment algorithm and software system for Problematic Skin Wounds (PSW) by using Platelet-Rich Plasma (PRP), based on the first study on platelet-rich plasma application carried out in Bulgaria. PSW-PRP-Project software system was developed for entering and processing medical data during PRP treatment, visualization of general patient information, treatment trend, as well as a module for training specialists through the created database. For a period of seven years around 100 patients have been treatment at the Department of Orthopaedics and Traumatology, UMBAL KANEV Ruse AD, by applying platelet-rich plasma. The algorithm for the use of platelet-rich plasma for treating problematic skin wounds allows for the proper and accurate treatment of patients with various problematic skin wounds with the purpose of solving the therapeutic problem and their complete recovery. The procedure’s course is determined based on assessment on three digital criteria TWS, TAS and TSWD. The algorithms are based on our results, obtained for the first in Bulgaria while treating problematic skin wounds by using platelet-rich plasma and successfully treating 92.78% of patients to full recovery.

Mots clés

  • Problematic skin wounds
  • platelet rich plasma
  • functional scoring scales
Accès libre

IoT Utilized Gas-Leakage Monitoring System with Adaptive Controls Applicable to Dual Fuel Powered Naval Vessels/Ships: Development & Implementation

Publié en ligne: 27 Mar 2020
Pages: 138 - 155

Résumé

Abstract

Leakage of Liquefied Petroleum Gas and Liquified Natural Gas (LPG/LNG) produces hazardous and toxic impact on humans and other living creatures. The authors developed a system to monitor and control the gas leakage concentration. MQ-6 gas sensor is used for sensing the level of gas concentration in a closed volume. To monitor the consequences of environmental changes an IoT platform hosted by “Thingspeak” platform has been introduced. Both robust and cloud-forwarded controls have been applied to prevent uncontrolled leakage of those gases and auto-ignition. This type of system can be directly applied to the engine chamber/ fuel chamber of the modern marine vessels using dual fuel power cycle with LPG/LNG as secondary fuel-flamer. The results from the experiments clearly indicate satisfactory actuation speed and accuracy. The trials performed by the authors showed about 99% efficiency of signal transmission and actuation.

Mots clés

  • Internet of Things
  • Smart System
  • Gas Leakage Control
  • Embedded
Accès libre

Robust Gain-Scheduled PID Control: A Parameter Dependent BMI Solution

Publié en ligne: 27 Mar 2020
Pages: 156 - 167

Résumé

Abstract

In control practices, problems of parametric or time-varying uncertainties must be dealt with. Robust control based on norm theory and convex and non-convex optimization algorithms is a powerful tool to solve these problems in theory, but it is employed rarely in applications. In most engineering cases, Proportional-Integration-Derivative (PID) control is still the most popular method for its easy-to-tune and controllable properties. The control method proposed in this paper integrates the PID control into robust control formulation as a robust Structured Static Output Feedback (SSOF) problem of Linear-Parameter-Varying (LPV) systems, which can be converted into a Parameter Dependent Bilinear-Matrix-Inequality (PDBMI) optimization problem. A convex-concave decomposition based method is given to solve the proposed PDBMI problem. The proposed solution has a simple structure in PID form and can guarantee stability and robustness of the system being controlled in the whole operation range with less conservativeness than existing solution.

Mots clés

  • Robust control
  • gain scheduling
  • Proportional-Integration-Derivative (PID) control
  • Bilinear-Matrix-Inequality (BMI)
  • Linear-Matrix-Inequality (LMI)
  • Linear-Parameter-Varying (LPV) system
11 Articles
Accès libre

On Some Knowledge Measures of Intuitionistic Fuzzy Sets of Type Two with Application to MCDM

Publié en ligne: 27 Mar 2020
Pages: 3 - 20

Résumé

Abstract

To overcome the certain limitations of Intuitionistic Fuzzy Sets (IFSs), the notion of Intuitionistic Fuzzy Sets of Second Type (IFSST) was introduced. IFSST is a modified version of IFS for handling some problems in a reasonable manner. Type two Intuitionistic Fuzzy entropy (IFSST-entropy) measures the amount of ambiguity/uncertainty present in an IFSST. In the present paper, we introduce the concept of dual measure of IFSST-entropy, i.e., IFSST-knowledge measure. We develop some IFSST-knowledge measures and prove some of their properties. We also show the superiority of the proposed IFSST-knowledge measures through comparative study. Further, we demonstrate the application of the proposed knowledge measures in Multi-Criteria Decision-Making (MCDM).

Mots clés

  • IFSs
  • IFSST
  • IFSST-knowledge measure
  • MCDM
Accès libre

EnQuad: A Publicly-Available Simulator for Quantum Key Distribution Protocols

Publié en ligne: 27 Mar 2020
Pages: 21 - 35

Résumé

Abstract

In this paper, we present EnQuad Version 1.0: a high-speed and expandable simulator for Quantum Key Distribution (QKD) protocols. Surpassing available simulators, EnQuad does not only simulate a QKD stack, but also does security testing and guides the researcher on which reconciliation protocol should be used in his experimental setup. On the top of that, it recommends changes for the researcher to satisfy security or a given target key-rate if any of them is not already fulfilled. Although EnQuad V1.0 is concerned with depolarizing channels and Individual Intercept-and-Resend attacks, EnQuad is featured with 24 parameters and 9 modular functions so that it could be expanded to a wide range of QKD protocols. In addition, we validated EnQuad outcomes against a comparable simulator and against theory. Furthermore, a set of 11 experiments showed that EnQuad runs 6.12× to 12.2× faster than a comparable simulator. EnQuad was implemented in MATLAB and the code is available online.

Mots clés

  • QKD simulators
  • Information Security
  • Quantum Cryptography
  • Scientific Computations
  • Software Technologies
Accès libre

A Hybrid Technique for Server Consolidation in Cloud Computing Environment

Publié en ligne: 27 Mar 2020
Pages: 36 - 52

Résumé

Abstract

The goal of data centers in the cloud computing environment is to provision the workloads and the computing resources as demanded by the users without the intervention of the providers. To achieve this, virtualization based server consolidation acts as a vital part in virtual machine placement process. Consolidating the Virtual Machines (VMs) on the Physical Machines (PMs) cuts down the unused physical servers, decreasing the energy consumption, while keeping the constraints for CPU and memory utilization. This technique also reduces the resource wastage and optimizes the available resources efficiently. Ant Colony Optimization (ACO) that is a well-known multi objective heuristic algorithm and Grey Wolf Algorithm (GWO) has been used to consolidate the servers used in the virtual machine placement problem. The proposed Fuzzy HAGA algorithm outperforms the other algorithms MMAS, ACS, FFD and Fuzzy ACS compared against it as the number of processors and memory utilization are lesser than these algorithms.

Mots clés

  • Virtual Machine (VM) placement
  • VM
  • power consumption
  • resource wastage
  • Ant Colony Optimization (ACO)
  • Grey Wolf Optimisation (GWO) Algorithm
  • HAGA Algorithm
Accès libre

IDD – A Platform Enabling Differential Debugging

Publié en ligne: 27 Mar 2020
Pages: 53 - 67

Résumé

Abstract

Debugging is a very time consuming task which is not well supported by existing tools. The existing methods do not provide tools enabling optimal developers’ productivity when debugging regressions in complex systems. In this paper we describe a possible solution aiding differential debugging. The differential debugging technique performs analysis of the regressed system and identifying the cause of the unexpected behavior by comparing to a previous version of the same system. The prototype, idd, inspects two versions of the executable – a baseline and a regressed version. The interactive debugging session runs side by side both executables and allows to examine and to compare various internal states. The architecture can work with multiple information sources comparing data from different tools. We also show how idd can detect performance regressions using information from third-party performance facilities. We illustrate how in practice we can quickly discover regressions in large systems such as the clang compiler.

Mots clés

  • IDD
  • differential debugging
  • functional regressions
  • performance regressions
  • complex systems
  • side by side debugging
  • interactive visual debugging
Accès libre

Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform

Publié en ligne: 27 Mar 2020
Pages: 68 - 81

Résumé

Abstract

This paper presents an efficient image cipher based on applying the chaotic Baker Map (BM) in the Discrete Cosine Transform (DCT). The encryption module of the proposed DCT-based BM image cipher employs a DCT on the original plain-image then, the DCT coefficients of the plain-image are shuffled with the BM. Finally, the inverse DCT is applied to the shuffled plain-image DCT coefficients to obtain the final cipher-image. The decryption module of the proposed DCT-based BM image cipher employs a DCT on the input cipher-image then, the DCT coefficients of the cipher-image are inversely shuffled with the BM. Finally, the inverse DCT is applied to the inversely shuffled cipher-image DCT coefficients to obtain the original plain-image. A set of experimental tests are performed to test the validity of the proposed DCT-based BM image cipher and the performed tests demonstrated the superiority of the proposed DCT-based BM image cipher in terms of statistical, differential, sensitivity and noise immunity.

Mots clés

  • Image-encryption
  • Baker map
  • DCT
Accès libre

An Indonesian Hoax News Detection System Using Reader Feedback and Naïve Bayes Algorithm

Publié en ligne: 27 Mar 2020
Pages: 82 - 94

Résumé

Abstract

Hoax news in Indonesia spread at an alarming rate. To reduce this, hoax news detection system needs to be created and put into practice. Such a system may use readers’ feedback and Naïve Bayes algorithm, which is used to verify news. Overtime, by using readers’ feedback, database corpus will continue to grow and could improve system performance. The current research aims to reach this. System performance evaluation is carried out under two conditions ‒ with and without sources (URL). The system is able to detect hoax news very well under both conditions. The highest precision, recall and f-measure values when including URL are 0.91, 1, and 0.95 respectively. Meanwhile, the highest value of precision, recall and f-measure without URL are 0.88, 1 and 0.94, respectively.

Mots clés

  • Hoax news
  • Indonesian news
  • Naïve Bayes
  • reader feedback.s
Accès libre

RETRACTED: A Smart Social Insurance Big Data Analytics Framework Based on Machine Learning Algorithms

Publié en ligne: 27 Mar 2020
Pages: 95 - 111

Résumé

Abstract

Social insurance is an individual’s protection against risks such as retirement, death or disability. Big data mining and analytics are a way that could help the insurers and the actuaries to get the optimal decision for the insured individuals. Dependently, this paper proposes a novel analytic framework for Egyptian Social insurance big data. NOSI’s data contains data, which need some pre-processing methods after extraction like replacing missing values, standardization and outlier/extreme data. The paper also presents using some mining methods, such as clustering and classification algorithms on the Egyptian social insurance dataset through an experiment. In clustering, we used K-means clustering and the result showed a silhouette score 0.138 with two clusters in the dataset features. In classification, we used the Support Vector Machine (SVM) classifier and classification results showed a high accuracy percentage of 94%.

Mots clés

  • Social Insurance
  • Data Integration
  • Big Data Mining and Big Data Analytics
Accès libre

Question Analysis towards a Vietnamese Question Answering System in the Education Domain

Publié en ligne: 27 Mar 2020
Pages: 112 - 128

Résumé

Abstract

Building a computer system, which can automatically answer questions in the human language, speech or text, is a long-standing goal of the Artificial Intelligence (AI) field. Question analysis, the task of extracting important information from the input question, is the first and crucial step towards a question answering system. In this paper, we focus on the task of Vietnamese question analysis in the education domain. Our goal is to extract important information expressed by named entities in an input question, such as university names, campus names, major names, and teacher names. We present several extraction models that utilize the advantages of both traditional statistical methods with handcrafted features and more recent advanced deep neural networks with automatically learned features. Our best model achieves 88.11% in the F1 score on a corpus consisting of 3,600 Vietnamese questions collected from the fan page of the International School, Vietnam National University, Hanoi.

Mots clés

  • Question analysis
  • question answering
  • convolutional neural networks
  • bidirectional long-short term memory
  • conditional random fields
Accès libre

Algorithm and Software System for Treatment Application of Platelet-Rich Plasma on Problematic Skin Wounds

Publié en ligne: 27 Mar 2020
Pages: 129 - 137

Résumé

Abstract

Recently a big interest arises to the automated diagnosis and digitalization of clinical data. The purpose of this article is to present treatment algorithm and software system for Problematic Skin Wounds (PSW) by using Platelet-Rich Plasma (PRP), based on the first study on platelet-rich plasma application carried out in Bulgaria. PSW-PRP-Project software system was developed for entering and processing medical data during PRP treatment, visualization of general patient information, treatment trend, as well as a module for training specialists through the created database. For a period of seven years around 100 patients have been treatment at the Department of Orthopaedics and Traumatology, UMBAL KANEV Ruse AD, by applying platelet-rich plasma. The algorithm for the use of platelet-rich plasma for treating problematic skin wounds allows for the proper and accurate treatment of patients with various problematic skin wounds with the purpose of solving the therapeutic problem and their complete recovery. The procedure’s course is determined based on assessment on three digital criteria TWS, TAS and TSWD. The algorithms are based on our results, obtained for the first in Bulgaria while treating problematic skin wounds by using platelet-rich plasma and successfully treating 92.78% of patients to full recovery.

Mots clés

  • Problematic skin wounds
  • platelet rich plasma
  • functional scoring scales
Accès libre

IoT Utilized Gas-Leakage Monitoring System with Adaptive Controls Applicable to Dual Fuel Powered Naval Vessels/Ships: Development & Implementation

Publié en ligne: 27 Mar 2020
Pages: 138 - 155

Résumé

Abstract

Leakage of Liquefied Petroleum Gas and Liquified Natural Gas (LPG/LNG) produces hazardous and toxic impact on humans and other living creatures. The authors developed a system to monitor and control the gas leakage concentration. MQ-6 gas sensor is used for sensing the level of gas concentration in a closed volume. To monitor the consequences of environmental changes an IoT platform hosted by “Thingspeak” platform has been introduced. Both robust and cloud-forwarded controls have been applied to prevent uncontrolled leakage of those gases and auto-ignition. This type of system can be directly applied to the engine chamber/ fuel chamber of the modern marine vessels using dual fuel power cycle with LPG/LNG as secondary fuel-flamer. The results from the experiments clearly indicate satisfactory actuation speed and accuracy. The trials performed by the authors showed about 99% efficiency of signal transmission and actuation.

Mots clés

  • Internet of Things
  • Smart System
  • Gas Leakage Control
  • Embedded
Accès libre

Robust Gain-Scheduled PID Control: A Parameter Dependent BMI Solution

Publié en ligne: 27 Mar 2020
Pages: 156 - 167

Résumé

Abstract

In control practices, problems of parametric or time-varying uncertainties must be dealt with. Robust control based on norm theory and convex and non-convex optimization algorithms is a powerful tool to solve these problems in theory, but it is employed rarely in applications. In most engineering cases, Proportional-Integration-Derivative (PID) control is still the most popular method for its easy-to-tune and controllable properties. The control method proposed in this paper integrates the PID control into robust control formulation as a robust Structured Static Output Feedback (SSOF) problem of Linear-Parameter-Varying (LPV) systems, which can be converted into a Parameter Dependent Bilinear-Matrix-Inequality (PDBMI) optimization problem. A convex-concave decomposition based method is given to solve the proposed PDBMI problem. The proposed solution has a simple structure in PID form and can guarantee stability and robustness of the system being controlled in the whole operation range with less conservativeness than existing solution.

Mots clés

  • Robust control
  • gain scheduling
  • Proportional-Integration-Derivative (PID) control
  • Bilinear-Matrix-Inequality (BMI)
  • Linear-Matrix-Inequality (LMI)
  • Linear-Parameter-Varying (LPV) system

Planifiez votre conférence à distance avec Sciendo