Rivista e Edizione

Volume 22 (2022): Edizione 3 (September 2022)

Volume 22 (2022): Edizione 2 (June 2022)

Volume 22 (2022): Edizione 1 (March 2022)

Volume 21 (2021): Edizione 4 (December 2021)

Volume 21 (2021): Edizione 3 (September 2021)

Volume 21 (2021): Edizione 2 (June 2021)

Volume 21 (2021): Edizione 1 (March 2021)

Volume 20 (2020): Edizione 6 (December 2020)
Special Edizione on New Developments in Scalable Computing

Volume 20 (2020): Edizione 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volume 20 (2020): Edizione 4 (November 2020)

Volume 20 (2020): Edizione 3 (September 2020)

Volume 20 (2020): Edizione 2 (June 2020)

Volume 20 (2020): Edizione 1 (March 2020)

Volume 19 (2019): Edizione 4 (November 2019)

Volume 19 (2019): Edizione 3 (September 2019)

Volume 19 (2019): Edizione 2 (June 2019)

Volume 19 (2019): Edizione 1 (March 2019)

Volume 18 (2018): Edizione 5 (May 2018)
Special Thematic Edizione on Optimal Codes and Related Topics

Volume 18 (2018): Edizione 4 (November 2018)

Volume 18 (2018): Edizione 3 (September 2018)

Volume 18 (2018): Edizione 2 (June 2018)

Volume 18 (2018): Edizione 1 (March 2018)

Volume 17 (2017): Edizione 5 (December 2017)
Special Edizione With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volume 17 (2017): Edizione 4 (November 2017)

Volume 17 (2017): Edizione 3 (September 2017)

Volume 17 (2017): Edizione 2 (June 2017)

Volume 17 (2017): Edizione 1 (March 2017)

Volume 16 (2016): Edizione 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volume 16 (2016): Edizione 5 (October 2016)
Edizione Title: Special Edizione on Application of Advanced Computing and Simulation in Information Systems

Volume 16 (2016): Edizione 4 (December 2016)

Volume 16 (2016): Edizione 3 (September 2016)

Volume 16 (2016): Edizione 2 (June 2016)

Volume 16 (2016): Edizione 1 (March 2016)

Volume 15 (2015): Edizione 7 (December 2015)
Special Edizione on Information Fusion

Volume 15 (2015): Edizione 6 (December 2015)
Special Edizione on Logistics, Informatics and Service Science

Volume 15 (2015): Edizione 5 (April 2015)
Special Edizione on Control in Transportation Systems

Volume 15 (2015): Edizione 4 (November 2015)

Volume 15 (2015): Edizione 3 (September 2015)

Volume 15 (2015): Edizione 2 (June 2015)

Volume 15 (2015): Edizione 1 (March 2015)

Volume 14 (2014): Edizione 5 (December 2014)
Special Edizione

Volume 14 (2014): Edizione 4 (December 2014)

Volume 14 (2014): Edizione 3 (September 2014)

Volume 14 (2014): Edizione 2 (June 2014)

Volume 14 (2014): Edizione 1 (March 2014)

Volume 13 (2013): Edizione Special-Edizione (December 2013)

Volume 13 (2013): Edizione 4 (December 2013)
The publishing of the present issue (Volume 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volume 13 (2013): Edizione 3 (September 2013)

Volume 13 (2013): Edizione 2 (June 2013)

Volume 13 (2013): Edizione 1 (March 2013)

Volume 12 (2012): Edizione 4 (December 2012)

Volume 12 (2012): Edizione 3 (September 2012)

Volume 12 (2012): Edizione 2 (June 2012)

Volume 12 (2012): Edizione 1 (March 2012)

Dettagli della rivista
Formato
Rivista
eISSN
1314-4081
Pubblicato per la prima volta
13 Mar 2012
Periodo di pubblicazione
4 volte all'anno
Lingue
Inglese

Cerca

Volume 16 (2016): Edizione 4 (December 2016)

Dettagli della rivista
Formato
Rivista
eISSN
1314-4081
Pubblicato per la prima volta
13 Mar 2012
Periodo di pubblicazione
4 volte all'anno
Lingue
Inglese

Cerca

10 Articoli
Accesso libero

On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-Boxes

Pubblicato online: 22 Dec 2016
Pagine: 3 - 12

Astratto

Abstract

We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate nonsingular linear encodings of the output of the individual S-boxes. More specifically, we examine the general situation when the output of each S-box of the DESis precoded separately intoaproperly constructed copy of the inherent even-weight code of length 4. The study is focused on finding multi-round linear characteristics for thus modified DESciphers having maximal effectiveness. Depending on the particular encodings, it turns out that the effectiveness of interest may be larger but in most cases is smaller than that one for the original DESwith the same number of rounds. The latter means that the complexity of successful linear cryptanalysis against these ciphers will mainly increase comparing to the DESitself. The present research extends inanatural way our previous work[Linear Cryptanalysis and Modified DESwith Parity Check in the S-boxes, LNCS 9540 (2016), pp. 60-78].

Parole chiave

  • DES
  • S-boxes
  • parity check
  • linear cryptanalysis
  • linear characteristics
Accesso libero

About a Fuzzy Distance between Two Fuzzy Partitions and Application in Attribute Reduction Problem

Pubblicato online: 22 Dec 2016
Pagine: 13 - 28

Astratto

Abstract

According to traditional rough set theory approach, attribute reduction methods are performed on the decision tables with the discretized value domain, which are decision tables obtained by discretized data methods. In recent years, researches have proposed methods based on fuzzy rough set approach to solve the problem of attribute reduction in decision tables with numerical value domain. In this paper, we proposeafuzzy distance between two partitions and an attribute reduction method in numerical decision tables based on proposed fuzzy distance. Experiments on data sets show that the classification accuracy of proposed method is more efficient than the ones based fuzzy entropy.

Parole chiave

  • Fuzzy rough set
  • fuzzy equivalence relation
  • fuzzy distance
  • decision table
  • attribute reduction
  • reduct
Accesso libero

Ontologies for Platform as Service APIs Interoperability

Pubblicato online: 22 Dec 2016
Pagine: 29 - 44

Astratto

Abstract

Ontologies can be used to describe common cloud functionalities and enable common terminology to assist in cloud interoperability. In this work, we have developed the ontology for resources and operations and the ontology of interoperability problems. The aim is to clearly describe and categorize the existing functionalities, features and specificities of commercial platform asaservice offers. The first ontology also provides data type mappings among different Paa Sstorages and cross-Paa Sdata types used in inputs and outputs of the remote APIoperations to provideacommon layer for information exchange and data migration among different Paa Sproviders. The ontologies were evaluated by tools and by human experts. Furthermore, the ontologies were used in cloud interoperability prototype to show their practical applicability.

Parole chiave

  • Cloud ontology
  • interoperability
  • platform asaservice
  • remote APIs
  • interoperability problems
Accesso libero

An Approach of XML Query Evaluation Based Model Checking

Pubblicato online: 22 Dec 2016
Pagine: 45 - 54

Astratto

Abstract

In this paper, we show the process inspired by model checking which integrate temporal logic to the application of semi-structured data query. We investigate the potential ofatechnique based on CTL (Computation Tree Logic) model checking for evaluating queries expressed in (a subset of) XPath. Our research consists of query algebra, constraint understanding and expression mapping. The core of research is mapping the XMLquery algebra to an expression collection of temporal logic. We tryanew kind of query execution strategy to enhance the accuracy of semantic description of the XMLquery. For the purpose of supporting the generation of the formal specifications and reducing the mapping processing, the XMLquery constraint can be converted toaspecification of SPS (Specification Pattern System) through which we get the formula set to evaluate path queries directly on CTLformula.

Parole chiave

  • XML
  • model checking
  • Xpath
  • temporal logic
  • SPS
Accesso libero

Learning a Class-Specific Dictionary for Facial Expression Recognition

Pubblicato online: 22 Dec 2016
Pagine: 55 - 62

Astratto

Abstract

Sparse coding is currently an active topic in signal processing and pattern recognition. Meta Face Learning (MFL) isatypical sparse coding method and exhibits promising performance for classification. Unfortunately, due to using the l1-norm minimization, MFLis expensive to compute and is not robust enough. To address these issues, this paper proposesafaster and more robust version of MFLwith the l2-norm regularization constraint on coding coefficients. The proposed method is used to learnaclass-specific dictionary for facial expression recognition. Extensive experiments on two popular facial expression databases, i.e., the JAFFEdatabase and the Cohn-Kanade database, demonstrate that our method shows promising computational efficiency and robustness on facial expression recognition tasks.

Parole chiave

  • Sparse coding
  • metaface learning
  • sparse representation
  • facial expression recognition
  • robustness
Accesso libero

Iteration vs Recursion in Introduction to Programming Classes: An Empirical Study

Pubblicato online: 22 Dec 2016
Pagine: 63 - 72

Astratto

Abstract

In this article we have presented the results of an empirical study which was carried out on 130 students in Introduction to programming classes. Their initial preference, success rate, comprehension and subsequent preference were studied when dealing with programming tasks which could be solved using either iteration or recursion.

Parole chiave

  • Recursion
  • iteration
  • introduction to programming
  • education
  • students
Accesso libero

A Multi Route Rank Based Routing Protocol for Industrial Wireless Mesh Sensor Networks

Pubblicato online: 22 Dec 2016
Pagine: 73 - 86

Astratto

Abstract

Wireless Mesh Sensor nodes are deployed in harsh environments, like Industrial Wireless Mesh Sensor Networks (IWMSN). There the equipment is exposed to temperature and electrical noise, so providingareliable, interference free and efficient communication in this environment isachallenge. We proposea Multi Route Rank based Routing (MR3) protocol, which enhances the link dynamics for IWMSNand also provides interference free reliable packet delivery in harsh environments. The rank ofanode is estimated based on density, hop count, energy and Signal to Interference plus Noise Ratio (SINR). The route discovery phase finds the rank value to forward the data packet inareliable path. Once the forwarding path is established, subsequently the data packets can be propagated towards the destination without using any location information. Our simulation results show that this method improves the packet delivery ratio and the throughput tremendously, and at the same time minimizes the packet delay, in heavy traffic condition.

Parole chiave

  • Industrial wireless mesh sensor networks
  • Signal-to-interference plus noise ratio
  • Multi-radio
  • Multi-channel
  • Partially overlapped channels
  • Quality of Services (QoS)
Accesso libero

Spectrum Allocation of Cognitive Radio Based on Autonomy Evolutionary Algorithm

Pubblicato online: 22 Dec 2016
Pagine: 87 - 97

Astratto

Abstract

Reasonable and effective allocation of cognitive radio spectrum resource according to user’s requirements is the key task of cognitive radio network. Cognitive radio spectrum allocation problem can be viewed as an optimization problem. This paper analyzes the application of bio-inspired intelligent algorithm in cognitive radio network spectrum allocation, and based on graph theory model of spectrum allocation, proposesaspectrum allocation algorithm based on autonomously evolutionary scheme. Three objective functions: Max-Min-Reward, Max-Sum- Reward and Max-Proportional-Fair are employed to evaluate the proposed algorithm capacity. The simulation result reveals that the proposed method can make the system user to obtain better network benefits and better embody the fairness between cognitive users. In the process of allocation, the proposed method was not restricted by user scale and the number of spectrums.

Parole chiave

  • Cognitive radio
  • spectrum allocation
  • graph theory
  • bio-inspired computing
  • autonomously evolutionary algorithm
Accesso libero

Development of Control Strategies and Implementation to Electrical Water Heaters for Energy Conservation

Pubblicato online: 22 Dec 2016
Pagine: 98 - 112

Astratto

Abstract

Optimum design for storage type Electric Water Heaters (EWHs) was analyzed for energy conservation and maximum hot water output. Single and dual tank EWHs were compared with each other. For each comparison, data were gathered for tank volumes and power ratings ranging 100-400land 1-4 k Wrespectively. Different dual tank EWHs were designed with different control mechanisms to find which one had the optimum outcome. For these comparisons, dual tank EWHs in which the upper part of the tanks had 25%of the total volume and 75%of the total power rating were used. Afive day usage period of an EWHinatypical household was simulated on SIMULINK. To minimize this energy loss, transient analysis on FLUENTwas performed to see how long it took for the outlet water temperature. In these simulations, single and dual tank EWHs with different control mechanisms were compared with each other to find the design with minimum energy consumption and maximum hot water output. From these results the most efficient control system cost analysis was determined for minimum operating cost and minimum carbon footprint through optimized control strategies.

Parole chiave

  • Control
  • energy efficiency
  • optimization
  • steady-state heat transfer
  • water heaters
Accesso libero

Autonomous Path Planning Scheme Research for Mobile Robot

Pubblicato online: 22 Dec 2016
Pagine: 113 - 125

Astratto

Abstract

An autonomous path-planning strategy based on Skinner operant conditioning principle and reinforcement learning principle is developed in this paper. The core strategies are the use of tendency cell and cognitive learning cell, which simulate bionic orientation and asymptotic learning ability. Cognitive learning cell is designed on the base of Boltzmann machine and improved Q-Learning algorithm, which executes operant action learning function to approximate the operative part of robot system. The tendency cell adjusts network weights by the use of information entropy to evaluate the function of operate action. The results of the simulation experiment in mobile robot showed that the designed autonomous path-planning strategy lets the robot realize autonomous navigation path planning. The robot learns to select autonomously according to the bionic orientate action and have fast convergence rate and higher adaptability.

Parole chiave

  • Autonomous path planning
  • cognitive learning
  • information entropy
  • Q-Learning
  • mobile robots
10 Articoli
Accesso libero

On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-Boxes

Pubblicato online: 22 Dec 2016
Pagine: 3 - 12

Astratto

Abstract

We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate nonsingular linear encodings of the output of the individual S-boxes. More specifically, we examine the general situation when the output of each S-box of the DESis precoded separately intoaproperly constructed copy of the inherent even-weight code of length 4. The study is focused on finding multi-round linear characteristics for thus modified DESciphers having maximal effectiveness. Depending on the particular encodings, it turns out that the effectiveness of interest may be larger but in most cases is smaller than that one for the original DESwith the same number of rounds. The latter means that the complexity of successful linear cryptanalysis against these ciphers will mainly increase comparing to the DESitself. The present research extends inanatural way our previous work[Linear Cryptanalysis and Modified DESwith Parity Check in the S-boxes, LNCS 9540 (2016), pp. 60-78].

Parole chiave

  • DES
  • S-boxes
  • parity check
  • linear cryptanalysis
  • linear characteristics
Accesso libero

About a Fuzzy Distance between Two Fuzzy Partitions and Application in Attribute Reduction Problem

Pubblicato online: 22 Dec 2016
Pagine: 13 - 28

Astratto

Abstract

According to traditional rough set theory approach, attribute reduction methods are performed on the decision tables with the discretized value domain, which are decision tables obtained by discretized data methods. In recent years, researches have proposed methods based on fuzzy rough set approach to solve the problem of attribute reduction in decision tables with numerical value domain. In this paper, we proposeafuzzy distance between two partitions and an attribute reduction method in numerical decision tables based on proposed fuzzy distance. Experiments on data sets show that the classification accuracy of proposed method is more efficient than the ones based fuzzy entropy.

Parole chiave

  • Fuzzy rough set
  • fuzzy equivalence relation
  • fuzzy distance
  • decision table
  • attribute reduction
  • reduct
Accesso libero

Ontologies for Platform as Service APIs Interoperability

Pubblicato online: 22 Dec 2016
Pagine: 29 - 44

Astratto

Abstract

Ontologies can be used to describe common cloud functionalities and enable common terminology to assist in cloud interoperability. In this work, we have developed the ontology for resources and operations and the ontology of interoperability problems. The aim is to clearly describe and categorize the existing functionalities, features and specificities of commercial platform asaservice offers. The first ontology also provides data type mappings among different Paa Sstorages and cross-Paa Sdata types used in inputs and outputs of the remote APIoperations to provideacommon layer for information exchange and data migration among different Paa Sproviders. The ontologies were evaluated by tools and by human experts. Furthermore, the ontologies were used in cloud interoperability prototype to show their practical applicability.

Parole chiave

  • Cloud ontology
  • interoperability
  • platform asaservice
  • remote APIs
  • interoperability problems
Accesso libero

An Approach of XML Query Evaluation Based Model Checking

Pubblicato online: 22 Dec 2016
Pagine: 45 - 54

Astratto

Abstract

In this paper, we show the process inspired by model checking which integrate temporal logic to the application of semi-structured data query. We investigate the potential ofatechnique based on CTL (Computation Tree Logic) model checking for evaluating queries expressed in (a subset of) XPath. Our research consists of query algebra, constraint understanding and expression mapping. The core of research is mapping the XMLquery algebra to an expression collection of temporal logic. We tryanew kind of query execution strategy to enhance the accuracy of semantic description of the XMLquery. For the purpose of supporting the generation of the formal specifications and reducing the mapping processing, the XMLquery constraint can be converted toaspecification of SPS (Specification Pattern System) through which we get the formula set to evaluate path queries directly on CTLformula.

Parole chiave

  • XML
  • model checking
  • Xpath
  • temporal logic
  • SPS
Accesso libero

Learning a Class-Specific Dictionary for Facial Expression Recognition

Pubblicato online: 22 Dec 2016
Pagine: 55 - 62

Astratto

Abstract

Sparse coding is currently an active topic in signal processing and pattern recognition. Meta Face Learning (MFL) isatypical sparse coding method and exhibits promising performance for classification. Unfortunately, due to using the l1-norm minimization, MFLis expensive to compute and is not robust enough. To address these issues, this paper proposesafaster and more robust version of MFLwith the l2-norm regularization constraint on coding coefficients. The proposed method is used to learnaclass-specific dictionary for facial expression recognition. Extensive experiments on two popular facial expression databases, i.e., the JAFFEdatabase and the Cohn-Kanade database, demonstrate that our method shows promising computational efficiency and robustness on facial expression recognition tasks.

Parole chiave

  • Sparse coding
  • metaface learning
  • sparse representation
  • facial expression recognition
  • robustness
Accesso libero

Iteration vs Recursion in Introduction to Programming Classes: An Empirical Study

Pubblicato online: 22 Dec 2016
Pagine: 63 - 72

Astratto

Abstract

In this article we have presented the results of an empirical study which was carried out on 130 students in Introduction to programming classes. Their initial preference, success rate, comprehension and subsequent preference were studied when dealing with programming tasks which could be solved using either iteration or recursion.

Parole chiave

  • Recursion
  • iteration
  • introduction to programming
  • education
  • students
Accesso libero

A Multi Route Rank Based Routing Protocol for Industrial Wireless Mesh Sensor Networks

Pubblicato online: 22 Dec 2016
Pagine: 73 - 86

Astratto

Abstract

Wireless Mesh Sensor nodes are deployed in harsh environments, like Industrial Wireless Mesh Sensor Networks (IWMSN). There the equipment is exposed to temperature and electrical noise, so providingareliable, interference free and efficient communication in this environment isachallenge. We proposea Multi Route Rank based Routing (MR3) protocol, which enhances the link dynamics for IWMSNand also provides interference free reliable packet delivery in harsh environments. The rank ofanode is estimated based on density, hop count, energy and Signal to Interference plus Noise Ratio (SINR). The route discovery phase finds the rank value to forward the data packet inareliable path. Once the forwarding path is established, subsequently the data packets can be propagated towards the destination without using any location information. Our simulation results show that this method improves the packet delivery ratio and the throughput tremendously, and at the same time minimizes the packet delay, in heavy traffic condition.

Parole chiave

  • Industrial wireless mesh sensor networks
  • Signal-to-interference plus noise ratio
  • Multi-radio
  • Multi-channel
  • Partially overlapped channels
  • Quality of Services (QoS)
Accesso libero

Spectrum Allocation of Cognitive Radio Based on Autonomy Evolutionary Algorithm

Pubblicato online: 22 Dec 2016
Pagine: 87 - 97

Astratto

Abstract

Reasonable and effective allocation of cognitive radio spectrum resource according to user’s requirements is the key task of cognitive radio network. Cognitive radio spectrum allocation problem can be viewed as an optimization problem. This paper analyzes the application of bio-inspired intelligent algorithm in cognitive radio network spectrum allocation, and based on graph theory model of spectrum allocation, proposesaspectrum allocation algorithm based on autonomously evolutionary scheme. Three objective functions: Max-Min-Reward, Max-Sum- Reward and Max-Proportional-Fair are employed to evaluate the proposed algorithm capacity. The simulation result reveals that the proposed method can make the system user to obtain better network benefits and better embody the fairness between cognitive users. In the process of allocation, the proposed method was not restricted by user scale and the number of spectrums.

Parole chiave

  • Cognitive radio
  • spectrum allocation
  • graph theory
  • bio-inspired computing
  • autonomously evolutionary algorithm
Accesso libero

Development of Control Strategies and Implementation to Electrical Water Heaters for Energy Conservation

Pubblicato online: 22 Dec 2016
Pagine: 98 - 112

Astratto

Abstract

Optimum design for storage type Electric Water Heaters (EWHs) was analyzed for energy conservation and maximum hot water output. Single and dual tank EWHs were compared with each other. For each comparison, data were gathered for tank volumes and power ratings ranging 100-400land 1-4 k Wrespectively. Different dual tank EWHs were designed with different control mechanisms to find which one had the optimum outcome. For these comparisons, dual tank EWHs in which the upper part of the tanks had 25%of the total volume and 75%of the total power rating were used. Afive day usage period of an EWHinatypical household was simulated on SIMULINK. To minimize this energy loss, transient analysis on FLUENTwas performed to see how long it took for the outlet water temperature. In these simulations, single and dual tank EWHs with different control mechanisms were compared with each other to find the design with minimum energy consumption and maximum hot water output. From these results the most efficient control system cost analysis was determined for minimum operating cost and minimum carbon footprint through optimized control strategies.

Parole chiave

  • Control
  • energy efficiency
  • optimization
  • steady-state heat transfer
  • water heaters
Accesso libero

Autonomous Path Planning Scheme Research for Mobile Robot

Pubblicato online: 22 Dec 2016
Pagine: 113 - 125

Astratto

Abstract

An autonomous path-planning strategy based on Skinner operant conditioning principle and reinforcement learning principle is developed in this paper. The core strategies are the use of tendency cell and cognitive learning cell, which simulate bionic orientation and asymptotic learning ability. Cognitive learning cell is designed on the base of Boltzmann machine and improved Q-Learning algorithm, which executes operant action learning function to approximate the operative part of robot system. The tendency cell adjusts network weights by the use of information entropy to evaluate the function of operate action. The results of the simulation experiment in mobile robot showed that the designed autonomous path-planning strategy lets the robot realize autonomous navigation path planning. The robot learns to select autonomously according to the bionic orientate action and have fast convergence rate and higher adaptability.

Parole chiave

  • Autonomous path planning
  • cognitive learning
  • information entropy
  • Q-Learning
  • mobile robots

Pianifica la tua conferenza remota con Sciendo