{"title":"Hamming Graphs and Permutation Codes","authors":"János Barta, R. Montemanni","doi":"10.1109/MCSI.2017.35","DOIUrl":"https://doi.org/10.1109/MCSI.2017.35","url":null,"abstract":"A permutation code can be represented as a graph, in which the nodes correspond to the permutation codewords and the weights on the edges are the Hamming distances between the codewords. Graphs belonging to this class are called permutation Hamming graphs. This paper explores the Maximum Permutation Code Problem (MPCP), a well-known optimization problem in coding theory, by means of a graph theoretical approach. Permutation Hamming graphs turn out to satisfy strong regularity properties, such as vertex transitivity and r-partiteness. In addition, exact formulas for the degree of the vertices and for the number of the edges are presented. Furthermore, a remarkable similarity between permutation Hamming graphs and Turán graphs is enlightened. The new link with Turán graphs might help to improve current results on the MPCP.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125122240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Goswami, Aradhana Misra, K. K. Sarma, N. Mastorakis, S. Kaminaris
{"title":"TDM-Energy Detection Based Dynamic Spectrum Sensing and Assignment","authors":"S. Goswami, Aradhana Misra, K. K. Sarma, N. Mastorakis, S. Kaminaris","doi":"10.1109/MCSI.2017.63","DOIUrl":"https://doi.org/10.1109/MCSI.2017.63","url":null,"abstract":"Dynamic spectrum access (DSA) under bursty traffic has been a major challenge for the developers of Cognitive Radio Systems over last decade. In this paper, we proposed a sensing-based dynamic spectrum assignment and switching for seamless communication over high traffic density network. A Time Division Multiplexing (TDM) based scheme of spectrum sharing is proposed in this paper with a simple non-cooperative energy detection based spectrum sensing technique. The time allotted for each TDM frame is divided into sensing time and data transmission time. Further, the data transmission time is subdivided into small Transmission Time Interval (TTI). Performance has been observed based on a Video Frame transmission scenario within a Transmission Time Interval (TTI) over a severe fading and dynamic traffic networking. Considering, a low value of signal to noise ratio (SNR) range, we have calculated the bit error rate (BER) and the detection probability for higher modulation schemes. Maximum and average throughput of the proposed model is calculated in terms of bits transmitted per iteration for three different cases based on traffic density and available slots. The simulation shows tradeoff between BER and probability of detection (Pd) under Rayleigh faded noise variant channel conditions.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132591212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Trifonov, Georgi Tsochev, G. Pavlova, R. Yoshinov, Slavcho Manolov
{"title":"Adaptive Optimization Techniques for Inteligent Network Security","authors":"R. Trifonov, Georgi Tsochev, G. Pavlova, R. Yoshinov, Slavcho Manolov","doi":"10.1109/MCSI.2017.45","DOIUrl":"https://doi.org/10.1109/MCSI.2017.45","url":null,"abstract":"Due to increasing incidents of cyber-attacks, building effective intrusion detection systems (IDS) are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. In this article, we report different adaptive optimization techniques for intelligent network security. Their structure is explained and main purpose. Collaboration between the different approaches is suggested as a result of the made analyses. This article was devoted to Reinforcement Learning and Fuzzy logic, which are the methods selected amongst several ones and a brief adaptation of multi-agent based fuzzy reinforcement learning is proposed.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Waszkowski, Maciej Kiedrowicz, T. Nowicki, K. Worwa
{"title":"Customer Service Processes Automation in Administrative Office with RFID Tagged Documents","authors":"R. Waszkowski, Maciej Kiedrowicz, T. Nowicki, K. Worwa","doi":"10.1109/MCSI.2017.47","DOIUrl":"https://doi.org/10.1109/MCSI.2017.47","url":null,"abstract":"This article outlines methods of business process automation for the purpose of the RFID-equipped restricted access administrative office. The events, which constitute part of the Business Process Model and Notation (BPMN), were extended in such a manner so as to allow performance of automated actions during their occurrence. Additionally, an analogous mechanism of automated action at the user interface level, was described. Last but not least, the article presents the manner of operations of certain elements in the office, i.e. the business processes, and methods of communication between them.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116134581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Waszkowski, Maciej Kiedrowicz, T. Nowicki, K. Worwa
{"title":"Access Control Management in Administrative Office with RFID Tagged Documents","authors":"R. Waszkowski, Maciej Kiedrowicz, T. Nowicki, K. Worwa","doi":"10.1109/MCSI.2017.48","DOIUrl":"https://doi.org/10.1109/MCSI.2017.48","url":null,"abstract":"The paper presents the system architecture for the access control subsystem for the RFID-equipped restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented models include the fact that the facilities in the secret office (cabinet, sluice, photocopier, desks) are equipped with the RFID reader, which allows to immediately read the documents that are within their reach. The logical architecture and the description of main functions of the privileges module has been presented in purpose to describe how to manage access control functionality in administrative office with RFID tagged documents.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assurance Case for Green IT Applications: Proof of Compliance with Power Consumption Claims","authors":"Vladimir V. Sklyar, V. Kharchenko, N. Bardis","doi":"10.1109/MCSI.2017.29","DOIUrl":"https://doi.org/10.1109/MCSI.2017.29","url":null,"abstract":"In this paper we discussed Assurance Case fundamentals which are essential to apply that approach for Green IT. Notations and supporting tools for Assurance Case, as well as state-of-the-art researches survey are briefly represented. We also consider in general the main structure of safety and security requirements and goals which contain requirements to safety and security management, to safety and security life cycle and requirements to measures and techniques to avoid failures and attacks. Finally, we proposed a specific part of Assurance Case related with assessment of compliance with requirements to power consumption. We named the proposed methodology of integrated safety, security and power consumption assessment as \"Green Assurance Case\".","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131493398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flow Analysis in Various Ejectors Configurations","authors":"A. Dumitrache, F. Frunzulică, O. Preotu","doi":"10.1109/MCSI.2017.58","DOIUrl":"https://doi.org/10.1109/MCSI.2017.58","url":null,"abstract":"In this paper, a detailed behavior of classical ejectors assisted by the Coandã effect (with one or two supply pressure reservoirs) is analyzed using a formulation of RANS equations for axisymmetric flow with a shear stress transport (SST) k-omega turbulence model. Furthermore, numerical investigations of the evolution laws of the critical Reynolds number are carried out, when the jet is attached to the wall by the Coandã effect, considering three geometric configurations: sudden expansion with or without divergent at the inlet and open cavity. The variety of flow structure and the related bifurcation and flow instability are provided. All these investigations provide us with information about the conditions and limits in which the Coandã effect can improve the performance characteristics of a device.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128669733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The CICT IOU Reference Framework for Stronger AMS System Simulation in Science and Industry","authors":"R. Fiorini","doi":"10.1109/MCSI.2017.36","DOIUrl":"https://doi.org/10.1109/MCSI.2017.36","url":null,"abstract":"To develop resilient and antifragile application and simulation, we need stronger biological and physical system correlates; in other words, we need asymptotic exact global, qualitative solutions combined to deep local quantitative results (precision) with information conservation and vice-versa. To grasp a more reliable representation of reality and to get more effective physical and biological simulation techniques, researchers and scientists need two intelligently articulated hands: both stochastic and combinatorial approaches synergistically articulated by natural coupling. The first attempt to identify basic principles to get stronger simulation solution for scientific application has been developing at Politecnico di Milano University since the end of last century. Our new operative proposal is based on CICT inner-outer universe (IOU) framework. The discrete approach reveals to be highly convenient because it strongly decreases the computational cost and the complexity of the system for representation modelling. In fact, CICT shows that any natural number D in N has associated a specific, non-arbitrary EPG-IPG (External-Internal Phase Generator) relationship) by OECS (Optimized Exponential Cyclic Sequence) coherence information that we must take into account to full conserve its information content by computation in Euclidean space. This paper is a relevant contribute towards arbitrary-scale scientific and technical systems modeling and simulation, to show how CICT can offer stronger and more effective system modeling algorithms for more reliable simulation.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116349787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Cloud Storage Data Recovery with Limited Loss of Access","authors":"N. Bardis, N. Doukas, O. Markovskyi","doi":"10.1109/MCSI.2017.30","DOIUrl":"https://doi.org/10.1109/MCSI.2017.30","url":null,"abstract":"In this paper, the problem of recovering data stored in remote storage facilities is addressed, where user data are distributed in storage nodes, each possessing the same number of storage units. The problem addressed is getting uninterrupted data availability in the commonly occurring case where loss of access is temporary towards an entire data storage node, or concerns up to two data storage units located at different nodes. The backup procedure is explained and details are given about the calculations necessary for calculating the necessary checksums. The theoretical general form of the calculation of the data recovery in all instances is given. The scheme is illustrated via an arithmetic example.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131534096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Manescu, D. Rusinaru, C. Popirlan, Gabriel Stoian, M. Ciontu, G. Buzatu, M. Alba
{"title":"Complex Software System for Data Management and Analysis of Power Distribution Grids","authors":"L. Manescu, D. Rusinaru, C. Popirlan, Gabriel Stoian, M. Ciontu, G. Buzatu, M. Alba","doi":"10.1109/MCSI.2017.18","DOIUrl":"https://doi.org/10.1109/MCSI.2017.18","url":null,"abstract":"The power companies are highly interested in reducing of power quality problems and reactive power flows (some of them additional to PQ disturbances) and their related costs, finding the optimized solutions. The paper describes a complex software instrument, which was conceived to provide support in the field of monitoring and analysis of the power grids. This customized tool is allowing to use and extend the capabilities of the commercial software packages and to develop a complex analysis of the power grid based on its typical operation regimes, as well as on the real historical evolution of its electric values. The management and the solver modules enable the system configuring, as well as report generation and data visualization for a heterogeneous large volume of input data.","PeriodicalId":113351,"journal":{"name":"2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121185926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}