Zeszyty czasopisma

Tom 22 (2022): Zeszyt 3 (September 2022)

Tom 22 (2022): Zeszyt 2 (June 2022)

Tom 22 (2022): Zeszyt 1 (March 2022)

Tom 21 (2021): Zeszyt 4 (December 2021)

Tom 21 (2021): Zeszyt 3 (September 2021)

Tom 21 (2021): Zeszyt 2 (June 2021)

Tom 21 (2021): Zeszyt 1 (March 2021)

Tom 20 (2020): Zeszyt 6 (December 2020)
Special Zeszyt on New Developments in Scalable Computing

Tom 20 (2020): Zeszyt 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Tom 20 (2020): Zeszyt 4 (November 2020)

Tom 20 (2020): Zeszyt 3 (September 2020)

Tom 20 (2020): Zeszyt 2 (June 2020)

Tom 20 (2020): Zeszyt 1 (March 2020)

Tom 19 (2019): Zeszyt 4 (November 2019)

Tom 19 (2019): Zeszyt 3 (September 2019)

Tom 19 (2019): Zeszyt 2 (June 2019)

Tom 19 (2019): Zeszyt 1 (March 2019)

Tom 18 (2018): Zeszyt 5 (May 2018)
Special Thematic Zeszyt on Optimal Codes and Related Topics

Tom 18 (2018): Zeszyt 4 (November 2018)

Tom 18 (2018): Zeszyt 3 (September 2018)

Tom 18 (2018): Zeszyt 2 (June 2018)

Tom 18 (2018): Zeszyt 1 (March 2018)

Tom 17 (2017): Zeszyt 5 (December 2017)
Special Zeszyt With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Tom 17 (2017): Zeszyt 4 (November 2017)

Tom 17 (2017): Zeszyt 3 (September 2017)

Tom 17 (2017): Zeszyt 2 (June 2017)

Tom 17 (2017): Zeszyt 1 (March 2017)

Tom 16 (2016): Zeszyt 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Tom 16 (2016): Zeszyt 5 (October 2016)
Zeszyt Title: Special Zeszyt on Application of Advanced Computing and Simulation in Information Systems

Tom 16 (2016): Zeszyt 4 (December 2016)

Tom 16 (2016): Zeszyt 3 (September 2016)

Tom 16 (2016): Zeszyt 2 (June 2016)

Tom 16 (2016): Zeszyt 1 (March 2016)

Tom 15 (2015): Zeszyt 7 (December 2015)
Special Zeszyt on Information Fusion

Tom 15 (2015): Zeszyt 6 (December 2015)
Special Zeszyt on Logistics, Informatics and Service Science

Tom 15 (2015): Zeszyt 5 (April 2015)
Special Zeszyt on Control in Transportation Systems

Tom 15 (2015): Zeszyt 4 (November 2015)

Tom 15 (2015): Zeszyt 3 (September 2015)

Tom 15 (2015): Zeszyt 2 (June 2015)

Tom 15 (2015): Zeszyt 1 (March 2015)

Tom 14 (2014): Zeszyt 5 (December 2014)
Special Zeszyt

Tom 14 (2014): Zeszyt 4 (December 2014)

Tom 14 (2014): Zeszyt 3 (September 2014)

Tom 14 (2014): Zeszyt 2 (June 2014)

Tom 14 (2014): Zeszyt 1 (March 2014)

Tom 13 (2013): Zeszyt Special-Zeszyt (December 2013)

Tom 13 (2013): Zeszyt 4 (December 2013)
The publishing of the present issue (Tom 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Tom 13 (2013): Zeszyt 3 (September 2013)

Tom 13 (2013): Zeszyt 2 (June 2013)

Tom 13 (2013): Zeszyt 1 (March 2013)

Tom 12 (2012): Zeszyt 4 (December 2012)

Tom 12 (2012): Zeszyt 3 (September 2012)

Tom 12 (2012): Zeszyt 2 (June 2012)

Tom 12 (2012): Zeszyt 1 (March 2012)

Informacje o czasopiśmie
Format
Czasopismo
eISSN
1314-4081
Pierwsze wydanie
13 Mar 2012
Częstotliwość wydawania
4 razy w roku
Języki
Angielski

Wyszukiwanie

Tom 16 (2016): Zeszyt 3 (September 2016)

Informacje o czasopiśmie
Format
Czasopismo
eISSN
1314-4081
Pierwsze wydanie
13 Mar 2012
Częstotliwość wydawania
4 razy w roku
Języki
Angielski

Wyszukiwanie

14 Artykułów
Otwarty dostęp

Adaptation in Affective Video Games: A Literature Review

Data publikacji: 19 Aug 2016
Zakres stron: 3 - 34

Abstrakt

Abstract

Playing computer games is a predominantly emotional than rational process. Video games with affect-based adaptation measure player’s behavior signals and recognize player’s emotional states in order to adapt specific game features in a dynamic manner and to improve player’s engagement, immersion, excitement, and challenge. The present review deals with models for the presentation of emotions, techniques for measuring behavioral signals, emotion recognition and adaptation mechanisms applied in video games with affective feedback including methods for their assessment and validation. Studies using self-reports, observational methods and psychophysiological measurements of both autonomic and central nervous systems including processing and interpretation of signals are systematically reviewed with regard to their results concerning emotional adaptation in games. Next, the article provides a comparative analysis of affect-based adaptation methods and techniques applied in 14 adaptive video games developed in last ten years. Based on this comparison, we summarized future directions in research, design and evaluation of video games with affective adaption.

Słowa kluczowe

  • Video games
  • affective feedback
  • adaptation
  • emotion
Otwarty dostęp

A Survey on Job Scheduling in Big Data

Data publikacji: 19 Aug 2016
Zakres stron: 35 - 51

Abstrakt

Abstract

Big Data Applications with Scheduling becomes an active research area in last three years. The Hadoop framework becomes very popular and most used frameworks in a distributed data processing. Hadoop is also open source software that allows the user to effectively utilize the hardware. Various scheduling algorithms of the MapReduce model using Hadoop vary with design and behavior, and are used for handling many issues like data locality, awareness with resource, energy and time. This paper gives the outline of job scheduling, classification of the scheduler, and comparison of different existing algorithms with advantages, drawbacks, limitations. In this paper, we discussed various tools and frameworks used for monitoring and the ways to improve the performance in MapReduce. This paper helps the beginners and researchers in understanding the scheduling mechanisms used in Big Data.

Słowa kluczowe

  • Big Data
  • Hadoop
  • MapReduce
  • classification
  • HDFS (Hadoop Distributed File System)
  • scheduler
Otwarty dostęp

CCDEA: Consumer and Cloud – DEA Based Trust Assessment Model for the Adoption of Cloud Services

Data publikacji: 19 Aug 2016
Zakres stron: 52 - 69

Abstrakt

Abstract

Knowing the trust level of cloud service providers is a significant issue in the field of cloud computing for privacy and security reasons. The idea of this paper is to build up a Consumer and Cloud-Data Envelopment Analysis (CCDEA) trust assessment model for evaluating cloud services in two stages. In first stage, the believability index of each cloud Consumer (C) is calculated. The second stage incorporates Cloud-Data Envelopment Analysis (C-DEA) model for the trust assessment of cloud services from the viewpoint of cloud consumers. Several experiments were conducted and the results were analyzed to show the stability of our method in measuring the relative efficiency and effectiveness of cloud services through ranking mechanism.

Słowa kluczowe

  • Cloud computing
  • believability index
  • cloud service
  • trust assessment
  • Data envelopment analysis
  • cloud theory
Otwarty dostęp

E-CDGM: An Evolutionary Call-Dependency Graph Modularization Approach for Software Systems

Data publikacji: 19 Aug 2016
Zakres stron: 70 - 90

Abstrakt

Abstract

Lack of up-to-date software documentation hinders the software evolution and maintenance processes, as simply the outdated software structure and code could be easily misunderstood. One approach to overcoming such problems is using software modularization, in which the software architecture is extracted from the available source code; such that developers can assess the reconstructed architecture against the required changes. Unfortunately, existing software modularization approaches are not accurate, as they ignore polymorphic calls among system modules. Furthermore, they are tightly coupled to the used programming language. To overcome such problems, this paper proposes the E-CDGM approach. E-CDGM decouples the extracted call dependency graph from the programming language by using the proposed intermediate code language (known as mCode). It also takes into consideration the polymorphic calls during the call dependency graph generation. It uses a new evolutionary optimization approach to find the best modularization option; adopting reward and penalty functions. Finally, it uses statistical analysis to build a final consolidated modularization model using different generated modularization solutions. Experimental results show that the proposed E-CDGM approach provides more accurate results when compared against existing well-known modularization approaches.

Słowa kluczowe

  • E-CDGM
  • call-dependency graph
  • software architecture
  • modularization
  • evolutionary approach
Otwarty dostęp

Isolated Storage of Multi-Tenant Data Based on Shared Schema

Data publikacji: 19 Aug 2016
Zakres stron: 91 - 103

Abstrakt

Abstract

Multi-tenant data management is an important part of supporting efficient operation of software as a service application. Multi-tenant data use shared schema to reduce resource usage cost. However, massive data of different tenants are stored in the same schema, which causes useless data of other tenants to be read when a tenant just need access its own disk data. In this paper we focus on disk storage method of multi-tenant data based on shared schema to address the above low efficiency of data access. According to isolation requirement of multitenant data, we store a tenant’s data in some contiguous disk blocks. The experimental results illustrate that query efficiency in range query and join query is 1.5–2 times the existing storage method, and no indexing query efficiency improves 10–70 times.

Słowa kluczowe

  • Multi-tenant database
  • disk storage
  • shared schema
  • SaaS
Otwarty dostęp

A Generalized Erlang-C Model for the Enhanced Living Environment as a Service (ELEaaS)

Data publikacji: 19 Aug 2016
Zakres stron: 104 - 121

Abstrakt

Abstract

In this article, a full-access waiting multi-server queue with a statedependent arrival and departure processes is investigated and suggested for use as a generic traffic model of the novel concept of the Enhanced Living Environment as a Service (ELEaaS). The generalized arrival and service flows with nonlinear state dependence intensities are used. The idea is based on the analytical continuation of the Poisson arrival process and Bernoulli service process, and the classic M/M/n queuing system. Birth and death processes and state-dependent rates are applied. The suggested new queuing system is of a M(g)/M(g)/n/k type (in Kendal notation) with a generalized arrival and departure processes M(g). The input and output intensities depend nonlinearly on the system state with defined parameters - the socalled “peaked factors”. The state probabilities of the system are obtained using the general solution of the birth and death processes. The influence of the peaked factors on the queuing behavior is evaluated showing that state-dependent arrival and service rates may change significantly the characteristics of the queuing system. The simplicity and uniformity in representing both peaked and smooth behavior make this queuing model also attractive for future networks’ analysis and synthesis.

Słowa kluczowe

  • Enhanced Living Environment (ELE)
  • Enhanced Living Environment as a Service (ELEaaS)
  • multi-server queue
  • M(g)/M(g)/n/k queuing system
  • generalized state-dependent arrival and departure processes
Otwarty dostęp

Petri Net Based Modeling and Correctness Verification of Collaborative Emergency Response Processes

Data publikacji: 19 Aug 2016
Zakres stron: 122 - 136

Abstrakt

Abstract

Petri net extended with resource and message factors, RMWF-Net for short, is proposed to model collaborative emergency response processes with various collaboration patterns. Correctness of a RMWF-Net is formally defined and verified using reachability analysis. A running case of collaborative fire emergency response processes is given to validate the approach.

Słowa kluczowe

  • Collaborative emergency management
  • emergency process modeling
  • collaboration patterns
  • correctness verification
  • Petri net
Otwarty dostęp

Discrete Path Selection and Entropy Based Sensor Node Failure Detection in Wireless Sensor Networks

Data publikacji: 19 Aug 2016
Zakres stron: 137 - 153

Abstrakt

Abstract

Exertion of wireless sensor networks has been increasing in recent years, and it imprints in almost all the technologies such as machine industry, medical, military and civil applications. Due to rapid growth in electronic fabrication technology, low cost, efficient, multifunctional and accurate sensors can be produced and thus engineers tend to incorporate many sensors in the area of deployment. As the number of sensors in the field increases, the probability of failure committed by these sensors also increases. Hence, efficient algorithms to detect and recover the failure of sensors are paramount. The current work concentrates mainly on mechanisms to detect sensor node failures on the basis of the delay incurred in propagation and also the energy associated with sensors in the field of deployment. The simulation shows that the algorithm plays in the best possible way to detect the failure in sensors. Finally, the Boolean sensing model is considered to calculate the network coverage of the wireless sensor network for various numbers of nodes in the network.

Słowa kluczowe

  • Wireless Sensor Network (WSN)
  • sensor node failure detection
  • entropy
  • network coverage
  • energy model
Otwarty dostęp

A Modified LEACH Protocol for Increasing Lifetime of the Wireless Sensor Network

Data publikacji: 19 Aug 2016
Zakres stron: 154 - 164

Abstrakt

Abstract

Many studies have been proposed on clustering protocols for various applications in Wireless Sensor Network (WSN). The main objective of the clustering algorithm is to minimize the energy consumption, deployment of nodes, latency, and fault tolerance in network. In short high reliability, robustness and scalability can be achieved. Clustering techniques are mainly used to extend the lifetime of wireless sensor network. The first and foremost clustering algorithm for wireless sensor network was Low Energy Adaptive Clustering Hierarchy (LEACH). As per LEACH, some Cluster Head (CH) may have more nodes, some other may have less nodes, which affects the network performance. The proposed method MaximuM-LEACH provides a solution by load balancing the number of nodes equally by fixing the average value N, so the life time of the network is increased.

Słowa kluczowe

  • LEACH
  • modified LEACH
  • hierarchical cluster based routing
  • Wireless Sensor Networks (WSN)
Otwarty dostęp

Linear-Quadratic-Gaussian Optimization of Urban Transportation Network with Application to Sofia Traffic Optimization

Data publikacji: 19 Aug 2016
Zakres stron: 165 - 184

Abstrakt

Abstract

The paper defines and solves a Linear-Quadratic-Gaussian (LQG) optimization problem addressing real time control policy of Urban Transportation Network (UTN). The paper presents UTN model definition, analysis and LQG optimization problem definition, resulting in special problem structure. A real application for UTN situated in Sofia, Bulgaria along Yosif Gurko street was provided for testing this control policy.

Słowa kluczowe

  • Control of transportation systems
  • urban transportation network
  • linearquadratic- Gaussian optimization
  • special case of discrete algebraic Riccati equation solution
Otwarty dostęp

Transportation Service Quality Improvement through Closed Sequential Pattern Mining Approach

Data publikacji: 19 Aug 2016
Zakres stron: 185 - 194

Abstrakt

Abstract

With the improvement of people’s living quality, more attention has been paid in food safety and quality. This is especially true for perishable agricultural and dairy products. It is quite often that customers receive poor or broken products due to mistakes or wrong ways in transportation. This leads customers the unsatisfied for companies’ products are relatively low. To solve the above problem, this paper proposes a new approach of using frequent closed sequential mining technology to analysis logistics data for helping companies to track the possible transportation problems. The approach consists of several important steps: RFID-enabled raw data collection, frequent sequential patterns mining, and patterns analysis. The experiment shows the proposed analysis method can discover many inside transportation service causes.

Słowa kluczowe

  • Customer satisfaction
  • Transportation service
  • Data mining
  • Sequential patterns
Otwarty dostęp

The Distribution of Semantic Fields in Author’s Texts

Data publikacji: 19 Aug 2016
Zakres stron: 195 - 204

Abstrakt

Abstract

The paper describes the analysis of frequency distribution of semantic fields of nouns and verbs in the texts of English fiction. To such distributions, we applied Shapiro-Wilk test. The null hypothesis of normal distribution of semantic fields frequencies in the array of texts under analysis is rejected for some semantic fields. This makes it possible to consider the frequency distribution of semantic fields as a categorized mixture of normal distributions. As a factor of categorization, we chose text authorship. We divided the author’s categories with rejected hypothesis of normal distribution into subcategories with normal distribution. Paired Student’s t-test for the distributions of semantic fields in the texts of different authors revealed a measure of authorship representation in the structure of semantic fields. The analysis of the results showed that the author’s idiolect is represented in the vector space of semantic fields. Such a space can be used in the analysis of the authorship and author’s idiolect of texts.

Słowa kluczowe

  • Frequency distribution
  • semantic fields
  • Shapiro-Wilk test
Otwarty dostęp

Edge Detection Method for Latent Fingerprint Images Using Intuitionistic Type-2 Fuzzy Entropy

Data publikacji: 19 Aug 2016
Zakres stron: 205 - 218

Abstrakt

Abstract

A latent fingerprint is an interesting issue because of it has attained from crime places and moreover contained a low quality image, less number of features and unwanted noises. It is necessity to extract the original image with exact boundary from the surface for further processing such as authentication, identification and matching. In this work, a new distance measure has been proposed for latent fingerprint edge detection using Intuitionistic Type-2 Fuzzy Entropy (IT2FE) and a comprehensible definition is made for Intuitionistic Type-2 Fuzzy Sets (IT2FS). IT2FS takes into account of uncertainty in the form of membership function which is also termed as Intuitionistic Type-2 Fuzzy Divergence (IT2FD). The experiment is conducted with public domain fingerprint databases such as FVC-2004 and IIIT-latent fingerprint. The edge detection is carried out with the proposed method and the results are discovered better regarding existing method.

Słowa kluczowe

  • Intuitionistic type-2 fuzzy set
  • intuitionistic type-2 fuzzy divergence
  • fuzzy entropy
  • latent fingerprint image
  • edge detection
Otwarty dostęp

Business Intelligence System via Group Decision Making

Data publikacji: 19 Aug 2016
Zakres stron: 219 - 229

Abstrakt

Abstract

In the paper a business intelligence tool based on group decision making is proposed. The group decision making uses a combinatorial optimization modeling technique. It takes into account weighted coefficients for evaluation criteria assigned by decision makers together with their scores for the alternatives in respect of these criteria. The proposed optimization model for group decision making considers also the knowledge level of the group members involved as decision makers. This optimization model is implemented in three-layer architecture of Web application for business intelligence by group decision making. Developed Web application is numerically tested for a representative problem for software choice considering six decision makers, three alternatives and 19 evaluation criteria. The obtained results show the practical applicability and effectiveness of the proposed approach.

Słowa kluczowe

  • Business intelligence
  • decision support system
  • multi-attribute problem
  • group decision making
  • Web-based application
14 Artykułów
Otwarty dostęp

Adaptation in Affective Video Games: A Literature Review

Data publikacji: 19 Aug 2016
Zakres stron: 3 - 34

Abstrakt

Abstract

Playing computer games is a predominantly emotional than rational process. Video games with affect-based adaptation measure player’s behavior signals and recognize player’s emotional states in order to adapt specific game features in a dynamic manner and to improve player’s engagement, immersion, excitement, and challenge. The present review deals with models for the presentation of emotions, techniques for measuring behavioral signals, emotion recognition and adaptation mechanisms applied in video games with affective feedback including methods for their assessment and validation. Studies using self-reports, observational methods and psychophysiological measurements of both autonomic and central nervous systems including processing and interpretation of signals are systematically reviewed with regard to their results concerning emotional adaptation in games. Next, the article provides a comparative analysis of affect-based adaptation methods and techniques applied in 14 adaptive video games developed in last ten years. Based on this comparison, we summarized future directions in research, design and evaluation of video games with affective adaption.

Słowa kluczowe

  • Video games
  • affective feedback
  • adaptation
  • emotion
Otwarty dostęp

A Survey on Job Scheduling in Big Data

Data publikacji: 19 Aug 2016
Zakres stron: 35 - 51

Abstrakt

Abstract

Big Data Applications with Scheduling becomes an active research area in last three years. The Hadoop framework becomes very popular and most used frameworks in a distributed data processing. Hadoop is also open source software that allows the user to effectively utilize the hardware. Various scheduling algorithms of the MapReduce model using Hadoop vary with design and behavior, and are used for handling many issues like data locality, awareness with resource, energy and time. This paper gives the outline of job scheduling, classification of the scheduler, and comparison of different existing algorithms with advantages, drawbacks, limitations. In this paper, we discussed various tools and frameworks used for monitoring and the ways to improve the performance in MapReduce. This paper helps the beginners and researchers in understanding the scheduling mechanisms used in Big Data.

Słowa kluczowe

  • Big Data
  • Hadoop
  • MapReduce
  • classification
  • HDFS (Hadoop Distributed File System)
  • scheduler
Otwarty dostęp

CCDEA: Consumer and Cloud – DEA Based Trust Assessment Model for the Adoption of Cloud Services

Data publikacji: 19 Aug 2016
Zakres stron: 52 - 69

Abstrakt

Abstract

Knowing the trust level of cloud service providers is a significant issue in the field of cloud computing for privacy and security reasons. The idea of this paper is to build up a Consumer and Cloud-Data Envelopment Analysis (CCDEA) trust assessment model for evaluating cloud services in two stages. In first stage, the believability index of each cloud Consumer (C) is calculated. The second stage incorporates Cloud-Data Envelopment Analysis (C-DEA) model for the trust assessment of cloud services from the viewpoint of cloud consumers. Several experiments were conducted and the results were analyzed to show the stability of our method in measuring the relative efficiency and effectiveness of cloud services through ranking mechanism.

Słowa kluczowe

  • Cloud computing
  • believability index
  • cloud service
  • trust assessment
  • Data envelopment analysis
  • cloud theory
Otwarty dostęp

E-CDGM: An Evolutionary Call-Dependency Graph Modularization Approach for Software Systems

Data publikacji: 19 Aug 2016
Zakres stron: 70 - 90

Abstrakt

Abstract

Lack of up-to-date software documentation hinders the software evolution and maintenance processes, as simply the outdated software structure and code could be easily misunderstood. One approach to overcoming such problems is using software modularization, in which the software architecture is extracted from the available source code; such that developers can assess the reconstructed architecture against the required changes. Unfortunately, existing software modularization approaches are not accurate, as they ignore polymorphic calls among system modules. Furthermore, they are tightly coupled to the used programming language. To overcome such problems, this paper proposes the E-CDGM approach. E-CDGM decouples the extracted call dependency graph from the programming language by using the proposed intermediate code language (known as mCode). It also takes into consideration the polymorphic calls during the call dependency graph generation. It uses a new evolutionary optimization approach to find the best modularization option; adopting reward and penalty functions. Finally, it uses statistical analysis to build a final consolidated modularization model using different generated modularization solutions. Experimental results show that the proposed E-CDGM approach provides more accurate results when compared against existing well-known modularization approaches.

Słowa kluczowe

  • E-CDGM
  • call-dependency graph
  • software architecture
  • modularization
  • evolutionary approach
Otwarty dostęp

Isolated Storage of Multi-Tenant Data Based on Shared Schema

Data publikacji: 19 Aug 2016
Zakres stron: 91 - 103

Abstrakt

Abstract

Multi-tenant data management is an important part of supporting efficient operation of software as a service application. Multi-tenant data use shared schema to reduce resource usage cost. However, massive data of different tenants are stored in the same schema, which causes useless data of other tenants to be read when a tenant just need access its own disk data. In this paper we focus on disk storage method of multi-tenant data based on shared schema to address the above low efficiency of data access. According to isolation requirement of multitenant data, we store a tenant’s data in some contiguous disk blocks. The experimental results illustrate that query efficiency in range query and join query is 1.5–2 times the existing storage method, and no indexing query efficiency improves 10–70 times.

Słowa kluczowe

  • Multi-tenant database
  • disk storage
  • shared schema
  • SaaS
Otwarty dostęp

A Generalized Erlang-C Model for the Enhanced Living Environment as a Service (ELEaaS)

Data publikacji: 19 Aug 2016
Zakres stron: 104 - 121

Abstrakt

Abstract

In this article, a full-access waiting multi-server queue with a statedependent arrival and departure processes is investigated and suggested for use as a generic traffic model of the novel concept of the Enhanced Living Environment as a Service (ELEaaS). The generalized arrival and service flows with nonlinear state dependence intensities are used. The idea is based on the analytical continuation of the Poisson arrival process and Bernoulli service process, and the classic M/M/n queuing system. Birth and death processes and state-dependent rates are applied. The suggested new queuing system is of a M(g)/M(g)/n/k type (in Kendal notation) with a generalized arrival and departure processes M(g). The input and output intensities depend nonlinearly on the system state with defined parameters - the socalled “peaked factors”. The state probabilities of the system are obtained using the general solution of the birth and death processes. The influence of the peaked factors on the queuing behavior is evaluated showing that state-dependent arrival and service rates may change significantly the characteristics of the queuing system. The simplicity and uniformity in representing both peaked and smooth behavior make this queuing model also attractive for future networks’ analysis and synthesis.

Słowa kluczowe

  • Enhanced Living Environment (ELE)
  • Enhanced Living Environment as a Service (ELEaaS)
  • multi-server queue
  • M(g)/M(g)/n/k queuing system
  • generalized state-dependent arrival and departure processes
Otwarty dostęp

Petri Net Based Modeling and Correctness Verification of Collaborative Emergency Response Processes

Data publikacji: 19 Aug 2016
Zakres stron: 122 - 136

Abstrakt

Abstract

Petri net extended with resource and message factors, RMWF-Net for short, is proposed to model collaborative emergency response processes with various collaboration patterns. Correctness of a RMWF-Net is formally defined and verified using reachability analysis. A running case of collaborative fire emergency response processes is given to validate the approach.

Słowa kluczowe

  • Collaborative emergency management
  • emergency process modeling
  • collaboration patterns
  • correctness verification
  • Petri net
Otwarty dostęp

Discrete Path Selection and Entropy Based Sensor Node Failure Detection in Wireless Sensor Networks

Data publikacji: 19 Aug 2016
Zakres stron: 137 - 153

Abstrakt

Abstract

Exertion of wireless sensor networks has been increasing in recent years, and it imprints in almost all the technologies such as machine industry, medical, military and civil applications. Due to rapid growth in electronic fabrication technology, low cost, efficient, multifunctional and accurate sensors can be produced and thus engineers tend to incorporate many sensors in the area of deployment. As the number of sensors in the field increases, the probability of failure committed by these sensors also increases. Hence, efficient algorithms to detect and recover the failure of sensors are paramount. The current work concentrates mainly on mechanisms to detect sensor node failures on the basis of the delay incurred in propagation and also the energy associated with sensors in the field of deployment. The simulation shows that the algorithm plays in the best possible way to detect the failure in sensors. Finally, the Boolean sensing model is considered to calculate the network coverage of the wireless sensor network for various numbers of nodes in the network.

Słowa kluczowe

  • Wireless Sensor Network (WSN)
  • sensor node failure detection
  • entropy
  • network coverage
  • energy model
Otwarty dostęp

A Modified LEACH Protocol for Increasing Lifetime of the Wireless Sensor Network

Data publikacji: 19 Aug 2016
Zakres stron: 154 - 164

Abstrakt

Abstract

Many studies have been proposed on clustering protocols for various applications in Wireless Sensor Network (WSN). The main objective of the clustering algorithm is to minimize the energy consumption, deployment of nodes, latency, and fault tolerance in network. In short high reliability, robustness and scalability can be achieved. Clustering techniques are mainly used to extend the lifetime of wireless sensor network. The first and foremost clustering algorithm for wireless sensor network was Low Energy Adaptive Clustering Hierarchy (LEACH). As per LEACH, some Cluster Head (CH) may have more nodes, some other may have less nodes, which affects the network performance. The proposed method MaximuM-LEACH provides a solution by load balancing the number of nodes equally by fixing the average value N, so the life time of the network is increased.

Słowa kluczowe

  • LEACH
  • modified LEACH
  • hierarchical cluster based routing
  • Wireless Sensor Networks (WSN)
Otwarty dostęp

Linear-Quadratic-Gaussian Optimization of Urban Transportation Network with Application to Sofia Traffic Optimization

Data publikacji: 19 Aug 2016
Zakres stron: 165 - 184

Abstrakt

Abstract

The paper defines and solves a Linear-Quadratic-Gaussian (LQG) optimization problem addressing real time control policy of Urban Transportation Network (UTN). The paper presents UTN model definition, analysis and LQG optimization problem definition, resulting in special problem structure. A real application for UTN situated in Sofia, Bulgaria along Yosif Gurko street was provided for testing this control policy.

Słowa kluczowe

  • Control of transportation systems
  • urban transportation network
  • linearquadratic- Gaussian optimization
  • special case of discrete algebraic Riccati equation solution
Otwarty dostęp

Transportation Service Quality Improvement through Closed Sequential Pattern Mining Approach

Data publikacji: 19 Aug 2016
Zakres stron: 185 - 194

Abstrakt

Abstract

With the improvement of people’s living quality, more attention has been paid in food safety and quality. This is especially true for perishable agricultural and dairy products. It is quite often that customers receive poor or broken products due to mistakes or wrong ways in transportation. This leads customers the unsatisfied for companies’ products are relatively low. To solve the above problem, this paper proposes a new approach of using frequent closed sequential mining technology to analysis logistics data for helping companies to track the possible transportation problems. The approach consists of several important steps: RFID-enabled raw data collection, frequent sequential patterns mining, and patterns analysis. The experiment shows the proposed analysis method can discover many inside transportation service causes.

Słowa kluczowe

  • Customer satisfaction
  • Transportation service
  • Data mining
  • Sequential patterns
Otwarty dostęp

The Distribution of Semantic Fields in Author’s Texts

Data publikacji: 19 Aug 2016
Zakres stron: 195 - 204

Abstrakt

Abstract

The paper describes the analysis of frequency distribution of semantic fields of nouns and verbs in the texts of English fiction. To such distributions, we applied Shapiro-Wilk test. The null hypothesis of normal distribution of semantic fields frequencies in the array of texts under analysis is rejected for some semantic fields. This makes it possible to consider the frequency distribution of semantic fields as a categorized mixture of normal distributions. As a factor of categorization, we chose text authorship. We divided the author’s categories with rejected hypothesis of normal distribution into subcategories with normal distribution. Paired Student’s t-test for the distributions of semantic fields in the texts of different authors revealed a measure of authorship representation in the structure of semantic fields. The analysis of the results showed that the author’s idiolect is represented in the vector space of semantic fields. Such a space can be used in the analysis of the authorship and author’s idiolect of texts.

Słowa kluczowe

  • Frequency distribution
  • semantic fields
  • Shapiro-Wilk test
Otwarty dostęp

Edge Detection Method for Latent Fingerprint Images Using Intuitionistic Type-2 Fuzzy Entropy

Data publikacji: 19 Aug 2016
Zakres stron: 205 - 218

Abstrakt

Abstract

A latent fingerprint is an interesting issue because of it has attained from crime places and moreover contained a low quality image, less number of features and unwanted noises. It is necessity to extract the original image with exact boundary from the surface for further processing such as authentication, identification and matching. In this work, a new distance measure has been proposed for latent fingerprint edge detection using Intuitionistic Type-2 Fuzzy Entropy (IT2FE) and a comprehensible definition is made for Intuitionistic Type-2 Fuzzy Sets (IT2FS). IT2FS takes into account of uncertainty in the form of membership function which is also termed as Intuitionistic Type-2 Fuzzy Divergence (IT2FD). The experiment is conducted with public domain fingerprint databases such as FVC-2004 and IIIT-latent fingerprint. The edge detection is carried out with the proposed method and the results are discovered better regarding existing method.

Słowa kluczowe

  • Intuitionistic type-2 fuzzy set
  • intuitionistic type-2 fuzzy divergence
  • fuzzy entropy
  • latent fingerprint image
  • edge detection
Otwarty dostęp

Business Intelligence System via Group Decision Making

Data publikacji: 19 Aug 2016
Zakres stron: 219 - 229

Abstrakt

Abstract

In the paper a business intelligence tool based on group decision making is proposed. The group decision making uses a combinatorial optimization modeling technique. It takes into account weighted coefficients for evaluation criteria assigned by decision makers together with their scores for the alternatives in respect of these criteria. The proposed optimization model for group decision making considers also the knowledge level of the group members involved as decision makers. This optimization model is implemented in three-layer architecture of Web application for business intelligence by group decision making. Developed Web application is numerically tested for a representative problem for software choice considering six decision makers, three alternatives and 19 evaluation criteria. The obtained results show the practical applicability and effectiveness of the proposed approach.

Słowa kluczowe

  • Business intelligence
  • decision support system
  • multi-attribute problem
  • group decision making
  • Web-based application

Zaplanuj zdalną konferencję ze Sciendo