Md. Hasan Tareque, Md. Shohrab Hossain, Mohammed Atiquzzaman
{"title":"On the routing in Flying Ad Hoc Networks","authors":"Md. Hasan Tareque, Md. Shohrab Hossain, Mohammed Atiquzzaman","doi":"10.15439/2015F002","DOIUrl":"https://doi.org/10.15439/2015F002","url":null,"abstract":"The usage of Unmanned Aerial Vehicles (UAVs) is increasing day by day. In recent years, UAVs are being used in increasing number of civil applications, such as policing, fire-fighting, etc in addition to military applications. Instead of using one large UAV, multiple UAVs are nowadays used for higher coverage area and accuracy. Therefore, networking models are required to allow two or more UAV nodes to communicate directly or via relay node(s). Flying Ad-Hoc Networks (FANETs) are formed which is basically an ad hoc network for UAVs. This is relatively a new technology in network family where requirements vary largely from traditional networking model, such as Mobile Ad-hoc Networks and Vehicular Ad-hoc Networks. In this paper, Flying Ad-Hoc Networks are surveyed along with its challenges compared to traditional ad hoc networks. The existing routing protocols for FANETs are then classified into six major categories which are critically analyzed and compared based on various performance criteria. Our comparative analysis will help network engineers in choosing appropriate routing protocols based on the specific scenario where the FANET will be deployed.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116465784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of numerical reproducibility on CPU and GPU","authors":"F. Jézéquel, J. Lamotte, Issam Said","doi":"10.15439/2015F29","DOIUrl":"https://doi.org/10.15439/2015F29","url":null,"abstract":"Differences in simulation results may be observed from one architecture to another or even inside the same architecture. Such reproducibility failures are often due to different rounding errors generated by different orders in the sequence of arithmetic operations. Reproducibility problems are particularly noticeable on new computing architectures such as multicore processors or GPUs (Graphics Processing Units). DSA (Discrete Stochastic Arithmetic) enables one to estimate rounding error propagation in simulation programs. In this paper, it is shown that DSA can be used to estimate which digits in simulation results may be different from one environment to another because of rounding errors. A particular implementation of DSA, which enables numerical validation in hybrid CPU-GPU environments, is described. The estimation of numerical reproducibility using DSA is illustrated by a wave propagation code which can be affected by reproducibility problems when executed on different architectures.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129656800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time Cyber-Physical Systems transatlantic engineering curricula framework","authors":"W. Grega, A. Kornecki","doi":"10.15439/2015F45","DOIUrl":"https://doi.org/10.15439/2015F45","url":null,"abstract":"How to educate future engineers, so that they acquired new skills and competences to become developers of Cyber Physical Systems (CPS)? The paper demonstrates a curriculum framework that was developed and successfully implemented some years ago, as an outcome of two international projects undertaken by a consortium of the European and American universities. The projects had focused on special category of CPS - Real-Time CPS. Examples of laboratory environment supporting education in the field of Real Time CPS are given in the paper.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134297626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring the performance and energy consumption of AES in wireless sensor networks","authors":"Cristina Panait, D. Dragomir","doi":"10.15439/2015F322","DOIUrl":"https://doi.org/10.15439/2015F322","url":null,"abstract":"With WSN deployments increasing in popularity, securing those deployments becomes a necessity. This can be achieved by encrypting inter-node communications and/or using message authentication codes. AES is a well studied symmetric cipher, with no known practical vulnerabilities, that can be used to solve both problems. We provide an optimized implementation of AES, with four modes of operation (ECB, CBC, CFB and CTR), that uses the hardware accelerator available on the ATmega128RFA1 microcontroller, and compare it with the best known software implementation. We show that our hardware AES implementation is both faster and more energy efficient than a software implementation. This is not the case for previous sensor nodes and implementations, which show an improved execution speed, but with a higher energy consumption.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122175148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sylvain Ductor, Jesus-Javier Gil-Quijano, Nicolas Stefanovitch, Pierrick Roger Mele
{"title":"GRENAD, a modular and generic Smart-Grid framework","authors":"Sylvain Ductor, Jesus-Javier Gil-Quijano, Nicolas Stefanovitch, Pierrick Roger Mele","doi":"10.15439/2015F310","DOIUrl":"https://doi.org/10.15439/2015F310","url":null,"abstract":"We present in this paper GRENAD, a Multi-Agent System based framework for the simulation and piloting of power-grids and particularly smart grids. Exploiting a component-based approach, it allows a flexible design of complex smart grid applications by providing a generic canvas where extensible, modular and reusable components, defined on the basis of their functionalities, can be easily combined and connected. Thanks to Multi-Agent approach, a set of such components can naturally be integrated into a coherent economical agent. GRENAD makes no assumption on the energy definition and eases the development of MAS control algorithms for smart grids. The level of details of the energy-related information is controllable. This information is computed either through internal physical models or by interfacing with external simulators. We present here our model, illustrate its features with a rich example which exhibits its genericity, and demonstrate how a coordination protocol can easily be integrated to it.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125157888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process approach to management knowledge objects managerial expertise for distance learning","authors":"K. Hauke","doi":"10.15439/2015F328","DOIUrl":"https://doi.org/10.15439/2015F328","url":null,"abstract":"One of the basic features of the information society is a constant acquisition of information. This information can be obtained from various sources. One source is the Internet environment. In this environment, you can use the standard communication of information on the web. The disadvantage of this approach is the lack of assessment of knowledge by the recipient. If you want to professionally lead the learning process then we have to use distance learning technologies. The use of distance learning systems, forcing the recipient to the following activities: acquire new knowledge and its evaluation. Note, however, that the knowledge in the course offered must be current. Then it makes sense to use distance learning systems. The paper will be presented process approach to management knowledge objects managerial expertise for distance learning systems. Process management is carried out in the following steps. knowledge acquisition, knowledge Locating, developing knowledge, preservation of knowledge, knowledge sharing, knowledge utilization. The use of learning objects taking into account the process approach to improving the quality of the courses offered in the form of e-learning.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125480697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selected methods of artificial intelligence for Internet of Things conception","authors":"A. Poniszewska-Marańda, Daniel Kaczmarek","doi":"10.15439/2015F161","DOIUrl":"https://doi.org/10.15439/2015F161","url":null,"abstract":"The concept of Internet of Things appeared several years ago and in that time has evolved into one of pillars of the new technologies sector. The next step is to add the artificial intelligence to Internet of Things systems. Artificial intelligence is increasingly used in everyday life. It is a concept of a wide range and applies in practice in many fields of science. The aim of presented paper was to investigate the usefulness of selected artificial intelligence methods in the concept of Internet of Things. To investigate this purpose, exemplary system was built and it uses the artificial neural networks.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128793987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Hetmaniok, M. Pleszczyński, Ireneusz Sobstyl, R. Witula
{"title":"Kaprekar's transformations. Part I - theoretical discussion","authors":"E. Hetmaniok, M. Pleszczyński, Ireneusz Sobstyl, R. Witula","doi":"10.15439/2015F16","DOIUrl":"https://doi.org/10.15439/2015F16","url":null,"abstract":"The paper is devoted to discussion of the minimal cycles of the so called Kaprekar's transformations and some of its generalizations. The considered transformations are the self-maps of the sets of natural numbers possessing n digits in their decimal expansions. In the paper there are introduced several new characteristics of such maps, among others, the ones connected with the Sharkovsky's theorem and with the Erdös-Szekeres theorem concerning the monotonic subsequences. Because of the size the study is divided into two parts. Part I includes the considerations of strictly theoretical nature resulting from the definition of Kaprekar's transformations. We find here all the minimal orbits of Kaprekar's transformations Tn, for n = 3,..., 7. Moreover, we define many different generalizations of the Kaprekar's transformations and we discuss their minimal orbits for the selected cases. In Part II (ibidem), which is a continuation of the current paper, the theoretical discussion will be supported by the numerical observations. For example, we notice there that each fixed point, familiar to us, of any Kaprekar's transformation generates an infinite sequence of fixed points of the other Kaprekar's transformations. The observed facts concern also several generalizations of the Kaprekar's transformations defined in Part I.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122464334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emotion monitor - concept, construction and lessons learned","authors":"A. Landowska","doi":"10.15439/2015F264","DOIUrl":"https://doi.org/10.15439/2015F264","url":null,"abstract":"This paper concerns the design and physical construction of an emotion monitor stand for tracking human emotions in Human-Computer Interaction using multi-modal approach. The concept of the stand using cameras, behavioral analysis tools and a set of physiological sensors such as galvanic skin response, blood-volume pulse, temperature, breath and electromyography is presented and followed by details of Emotion Monitor construction at Gdansk University of Technology. Some experiments are reported that were already held at the stand, providing observations on reliability, accuracy and value the stand might provide in human-systems interaction evaluation. The lessons learned at this particular stand might be interesting for the other researchers aiming at emotion monitoring in human-systems interaction.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Open Data collection using mobile phones based on CKAN platform","authors":"Katarzyna Oswiecinska, J. Legierski","doi":"10.15439/2015F128","DOIUrl":"https://doi.org/10.15439/2015F128","url":null,"abstract":"This paper presents concept and prototype of universal easy-to-use and self-configurable mobile application dedicated for open data sets collection and sending them to the central database storage based on CKAN platform. This article describes the concept of open data collection in crowdsourcing model using mobile phones and also an architecture of end user application (CKAN client) dedicated for Android operating system.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128624959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}