2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)最新文献

筛选
英文 中文
Hamming Graphs and Permutation Codes 汉明图与置换码
János Barta, R. Montemanni
{"title":"Hamming Graphs and Permutation Codes","authors":"János Barta, R. Montemanni","doi":"10.1109/MCSI.2017.35","DOIUrl":"https://doi.org/10.1109/MCSI.2017.35","url":null,"abstract":"A permutation code can be represented as a graph, in which the nodes correspond to the permutation codewords and the weights on the edges are the Hamming distances between the codewords. Graphs belonging to this class are called permutation Hamming graphs. This paper explores the Maximum Permutation Code Problem (MPCP), a well-known optimization problem in coding theory, by means of a graph theoretical approach. Permutation Hamming graphs turn out to satisfy strong regularity properties, such as vertex transitivity and r-partiteness. In addition, exact formulas for the degree of the vertices and for the number of the edges are presented. Furthermore, a remarkable similarity between permutation Hamming graphs and Turán graphs is enlightened. The new link with Turán graphs might help to improve current results on the MPCP.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125122240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
TDM-Energy Detection Based Dynamic Spectrum Sensing and Assignment 基于tdm能量检测的动态频谱感知与分配
S. Goswami, Aradhana Misra, K. K. Sarma, N. Mastorakis, S. Kaminaris
{"title":"TDM-Energy Detection Based Dynamic Spectrum Sensing and Assignment","authors":"S. Goswami, Aradhana Misra, K. K. Sarma, N. Mastorakis, S. Kaminaris","doi":"10.1109/MCSI.2017.63","DOIUrl":"https://doi.org/10.1109/MCSI.2017.63","url":null,"abstract":"Dynamic spectrum access (DSA) under bursty traffic has been a major challenge for the developers of Cognitive Radio Systems over last decade. In this paper, we proposed a sensing-based dynamic spectrum assignment and switching for seamless communication over high traffic density network. A Time Division Multiplexing (TDM) based scheme of spectrum sharing is proposed in this paper with a simple non-cooperative energy detection based spectrum sensing technique. The time allotted for each TDM frame is divided into sensing time and data transmission time. Further, the data transmission time is subdivided into small Transmission Time Interval (TTI). Performance has been observed based on a Video Frame transmission scenario within a Transmission Time Interval (TTI) over a severe fading and dynamic traffic networking. Considering, a low value of signal to noise ratio (SNR) range, we have calculated the bit error rate (BER) and the detection probability for higher modulation schemes. Maximum and average throughput of the proposed model is calculated in terms of bits transmitted per iteration for three different cases based on traffic density and available slots. The simulation shows tradeoff between BER and probability of detection (Pd) under Rayleigh faded noise variant channel conditions.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132591212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Optimization Techniques for Inteligent Network Security 智能网络安全的自适应优化技术
R. Trifonov, Georgi Tsochev, G. Pavlova, R. Yoshinov, Slavcho Manolov
{"title":"Adaptive Optimization Techniques for Inteligent Network Security","authors":"R. Trifonov, Georgi Tsochev, G. Pavlova, R. Yoshinov, Slavcho Manolov","doi":"10.1109/MCSI.2017.45","DOIUrl":"https://doi.org/10.1109/MCSI.2017.45","url":null,"abstract":"Due to increasing incidents of cyber-attacks, building effective intrusion detection systems (IDS) are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. In this article, we report different adaptive optimization techniques for intelligent network security. Their structure is explained and main purpose. Collaboration between the different approaches is suggested as a result of the made analyses. This article was devoted to Reinforcement Learning and Fuzzy logic, which are the methods selected amongst several ones and a brief adaptation of multi-agent based fuzzy reinforcement learning is proposed.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Customer Service Processes Automation in Administrative Office with RFID Tagged Documents 应用RFID标签文档实现行政办公室客户服务流程自动化
R. Waszkowski, Maciej Kiedrowicz, T. Nowicki, K. Worwa
{"title":"Customer Service Processes Automation in Administrative Office with RFID Tagged Documents","authors":"R. Waszkowski, Maciej Kiedrowicz, T. Nowicki, K. Worwa","doi":"10.1109/MCSI.2017.47","DOIUrl":"https://doi.org/10.1109/MCSI.2017.47","url":null,"abstract":"This article outlines methods of business process automation for the purpose of the RFID-equipped restricted access administrative office. The events, which constitute part of the Business Process Model and Notation (BPMN), were extended in such a manner so as to allow performance of automated actions during their occurrence. Additionally, an analogous mechanism of automated action at the user interface level, was described. Last but not least, the article presents the manner of operations of certain elements in the office, i.e. the business processes, and methods of communication between them.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116134581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Access Control Management in Administrative Office with RFID Tagged Documents 基于RFID标签的行政办公门禁管理
R. Waszkowski, Maciej Kiedrowicz, T. Nowicki, K. Worwa
{"title":"Access Control Management in Administrative Office with RFID Tagged Documents","authors":"R. Waszkowski, Maciej Kiedrowicz, T. Nowicki, K. Worwa","doi":"10.1109/MCSI.2017.48","DOIUrl":"https://doi.org/10.1109/MCSI.2017.48","url":null,"abstract":"The paper presents the system architecture for the access control subsystem for the RFID-equipped restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented models include the fact that the facilities in the secret office (cabinet, sluice, photocopier, desks) are equipped with the RFID reader, which allows to immediately read the documents that are within their reach. The logical architecture and the description of main functions of the privileges module has been presented in purpose to describe how to manage access control functionality in administrative office with RFID tagged documents.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assurance Case for Green IT Applications: Proof of Compliance with Power Consumption Claims 环保资讯科技应用的保证案例:符合耗电量声明的证明
Vladimir V. Sklyar, V. Kharchenko, N. Bardis
{"title":"Assurance Case for Green IT Applications: Proof of Compliance with Power Consumption Claims","authors":"Vladimir V. Sklyar, V. Kharchenko, N. Bardis","doi":"10.1109/MCSI.2017.29","DOIUrl":"https://doi.org/10.1109/MCSI.2017.29","url":null,"abstract":"In this paper we discussed Assurance Case fundamentals which are essential to apply that approach for Green IT. Notations and supporting tools for Assurance Case, as well as state-of-the-art researches survey are briefly represented. We also consider in general the main structure of safety and security requirements and goals which contain requirements to safety and security management, to safety and security life cycle and requirements to measures and techniques to avoid failures and attacks. Finally, we proposed a specific part of Assurance Case related with assessment of compliance with requirements to power consumption. We named the proposed methodology of integrated safety, security and power consumption assessment as \"Green Assurance Case\".","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131493398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flow Analysis in Various Ejectors Configurations 各种喷射器结构的流动分析
A. Dumitrache, F. Frunzulică, O. Preotu
{"title":"Flow Analysis in Various Ejectors Configurations","authors":"A. Dumitrache, F. Frunzulică, O. Preotu","doi":"10.1109/MCSI.2017.58","DOIUrl":"https://doi.org/10.1109/MCSI.2017.58","url":null,"abstract":"In this paper, a detailed behavior of classical ejectors assisted by the Coandã effect (with one or two supply pressure reservoirs) is analyzed using a formulation of RANS equations for axisymmetric flow with a shear stress transport (SST) k-omega turbulence model. Furthermore, numerical investigations of the evolution laws of the critical Reynolds number are carried out, when the jet is attached to the wall by the Coandã effect, considering three geometric configurations: sudden expansion with or without divergent at the inlet and open cavity. The variety of flow structure and the related bifurcation and flow instability are provided. All these investigations provide us with information about the conditions and limits in which the Coandã effect can improve the performance characteristics of a device.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128669733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The CICT IOU Reference Framework for Stronger AMS System Simulation in Science and Industry 在科学和工业中加强AMS系统仿真的CICT IOU参考框架
R. Fiorini
{"title":"The CICT IOU Reference Framework for Stronger AMS System Simulation in Science and Industry","authors":"R. Fiorini","doi":"10.1109/MCSI.2017.36","DOIUrl":"https://doi.org/10.1109/MCSI.2017.36","url":null,"abstract":"To develop resilient and antifragile application and simulation, we need stronger biological and physical system correlates; in other words, we need asymptotic exact global, qualitative solutions combined to deep local quantitative results (precision) with information conservation and vice-versa. To grasp a more reliable representation of reality and to get more effective physical and biological simulation techniques, researchers and scientists need two intelligently articulated hands: both stochastic and combinatorial approaches synergistically articulated by natural coupling. The first attempt to identify basic principles to get stronger simulation solution for scientific application has been developing at Politecnico di Milano University since the end of last century. Our new operative proposal is based on CICT inner-outer universe (IOU) framework. The discrete approach reveals to be highly convenient because it strongly decreases the computational cost and the complexity of the system for representation modelling. In fact, CICT shows that any natural number D in N has associated a specific, non-arbitrary EPG-IPG (External-Internal Phase Generator) relationship) by OECS (Optimized Exponential Cyclic Sequence) coherence information that we must take into account to full conserve its information content by computation in Euclidean space. This paper is a relevant contribute towards arbitrary-scale scientific and technical systems modeling and simulation, to show how CICT can offer stronger and more effective system modeling algorithms for more reliable simulation.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116349787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Method for Cloud Storage Data Recovery with Limited Loss of Access 一种具有有限访问丢失的云存储数据恢复方法
N. Bardis, N. Doukas, O. Markovskyi
{"title":"A Method for Cloud Storage Data Recovery with Limited Loss of Access","authors":"N. Bardis, N. Doukas, O. Markovskyi","doi":"10.1109/MCSI.2017.30","DOIUrl":"https://doi.org/10.1109/MCSI.2017.30","url":null,"abstract":"In this paper, the problem of recovering data stored in remote storage facilities is addressed, where user data are distributed in storage nodes, each possessing the same number of storage units. The problem addressed is getting uninterrupted data availability in the commonly occurring case where loss of access is temporary towards an entire data storage node, or concerns up to two data storage units located at different nodes. The backup procedure is explained and details are given about the calculations necessary for calculating the necessary checksums. The theoretical general form of the calculation of the data recovery in all instances is given. The scheme is illustrated via an arithmetic example.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131534096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Complex Software System for Data Management and Analysis of Power Distribution Grids 配电网数据管理与分析的复杂软件系统
L. Manescu, D. Rusinaru, C. Popirlan, Gabriel Stoian, M. Ciontu, G. Buzatu, M. Alba
{"title":"Complex Software System for Data Management and Analysis of Power Distribution Grids","authors":"L. Manescu, D. Rusinaru, C. Popirlan, Gabriel Stoian, M. Ciontu, G. Buzatu, M. Alba","doi":"10.1109/MCSI.2017.18","DOIUrl":"https://doi.org/10.1109/MCSI.2017.18","url":null,"abstract":"The power companies are highly interested in reducing of power quality problems and reactive power flows (some of them additional to PQ disturbances) and their related costs, finding the optimized solutions. The paper describes a complex software instrument, which was conceived to provide support in the field of monitoring and analysis of the power grids. This customized tool is allowing to use and extend the capabilities of the commercial software packages and to develop a complex analysis of the power grid based on its typical operation regimes, as well as on the real historical evolution of its electric values. The management and the solver modules enable the system configuring, as well as report generation and data visualization for a heterogeneous large volume of input data.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121185926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信