2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)最新文献

筛选
英文 中文
A More Efficient Card-Based Protocol for Generating a Random Permutation without Fixed Points 一种更有效的无固定点随机排列生成卡牌协议
Takuya Ibaraki, Yoshifumi Manabe
{"title":"A More Efficient Card-Based Protocol for Generating a Random Permutation without Fixed Points","authors":"Takuya Ibaraki, Yoshifumi Manabe","doi":"10.1109/MCSI.2016.054","DOIUrl":"https://doi.org/10.1109/MCSI.2016.054","url":null,"abstract":"Many works have been done for secure computation of functions. Most of them assume computation on computers. The protocols are difficult for the people who has no knowledge on cryptography. Therefore, secure computation using cards was considered. Since nothing other than the cards are used, the protocols are easy to understand for the people who has no knowledge on cryptography. This paper presents a card-based protocol that generates a random hidden permutation. This problem is applicable to a case when players exchange gifts. The protocol must not output a permutation with a fixed point, which means that every player does not receive the gift he/she prepared. Ishikawa et. al proposed a protocol with two-color cards using random shuffles and a proof of having no fixed points. However, the success probability of the protocol is not so high. Therefore, more efficient random permutation protocol is required. In this paper, we use cyclic shuffles in addition to the random shuffles to lower the possibility of fixed points. We show the success probability of obtaining a permutation without fixed points by our protocol is better than the one by the existing protocol.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Numerical Analysis and Reconstruction of the Temperature Regime of the Lena River Segment 勒拿河段温度变化的数值分析与重建
Segmentigor Zhilyaev, V. Fofonova
{"title":"Numerical Analysis and Reconstruction of the Temperature Regime of the Lena River Segment","authors":"Segmentigor Zhilyaev, V. Fofonova","doi":"10.1109/MCSI.2016.049","DOIUrl":"https://doi.org/10.1109/MCSI.2016.049","url":null,"abstract":"The data series from several gauging stations on the Lena River are considered. The difference of the water temperature between Kusur station and 200 kilometers downstream to the north Habarova station often becomes anomaly large during open water season (June-September). The analysis of the observational data is presented. The non-representativeness of measurements on Kusur station is supposed, reconstruction of the real temperature regime on the base of the statistical and deterministic modeling as well as the optimization tools is carried out.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131151173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real-Time Load Identification by Active Power Feature Extraction and Switching Detection 基于有功功率特征提取和开关检测的实时负荷识别
Mingyue Ding, Jinxiao Huang, Jiazhen Li, N. Mastorakis, X. Zhuang
{"title":"Real-Time Load Identification by Active Power Feature Extraction and Switching Detection","authors":"Mingyue Ding, Jinxiao Huang, Jiazhen Li, N. Mastorakis, X. Zhuang","doi":"10.1109/MCSI.2016.030","DOIUrl":"https://doi.org/10.1109/MCSI.2016.030","url":null,"abstract":"With the intelligent development of the power system, load identification becomes an important task. A noninvasive household load identification method is proposed in this paper, which can be used to detect the load switching moments and identify the types of loads. A calculation method of feature value is proposed based on active power. A template method is proposed to detect the jumping of the feature curve, which can determine the load switching moments robustly and accurately. The types of loads can be identified by a threshold value method. The results show that the method can accurately determine the load switching moments and identify the types of loads, and it also has good robustness.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123266665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Availability and Security Assessment of Smart Building Automation Systems: Combining of Attack Tree Analysis and Markov Models 智能楼宇自动化系统的可用性与安全性评估:攻击树分析与马尔可夫模型的结合
Al-Sudani Mustafa Qahtan Abdulmunem, V. Kharchenko
{"title":"Availability and Security Assessment of Smart Building Automation Systems: Combining of Attack Tree Analysis and Markov Models","authors":"Al-Sudani Mustafa Qahtan Abdulmunem, V. Kharchenko","doi":"10.1109/MCSI.2016.062","DOIUrl":"https://doi.org/10.1109/MCSI.2016.062","url":null,"abstract":"The information and control system of smart building is considered as a set of subsystems including a building automation system (BAS). BAS security and availability during its life cycle are assessed using the Attack Tree Analysis (ATA) and Markov models. The ATA is applied to investigate any intrusions into the BAS by analyzing system probability of a fault/vulnerability to occur during period of time depending on failure probability of its subsystems. Markov model is used to calculate BAS availability considering the possibility of recovery and different kinds of the faults.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Graphics Visualization of Specific Dashboards in Transport Technologies 运输技术中特定仪表板的图形可视化
P. Pokorný, Kamil Stokláska
{"title":"Graphics Visualization of Specific Dashboards in Transport Technologies","authors":"P. Pokorný, Kamil Stokláska","doi":"10.1109/MCSI.2016.045","DOIUrl":"https://doi.org/10.1109/MCSI.2016.045","url":null,"abstract":"This paper describes a Web application that was developed at our faculty last year. This application visualizes the results of monitoring traffic in city centers. The method of visualization is performed by using of interactive graphs. Complex JavaScript components were designed in order to encapsulate the selected technology that works with charts in a Web environment. The application is designed as an independent library that can be easily implemented into other programs and used as its graphical visualization solutions in these applications. The design and complete implementation are performed with a respect to use it in the real environment and data processing in the field of traffic monitoring.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lyapunov Dimension of Attractors of the Lorenz-Like Differential Equations 类洛伦兹微分方程吸引子的Lyapunov维
G. Leonov, S. Seledzhi
{"title":"Lyapunov Dimension of Attractors of the Lorenz-Like Differential Equations","authors":"G. Leonov, S. Seledzhi","doi":"10.1109/MCSI.2016.032","DOIUrl":"https://doi.org/10.1109/MCSI.2016.032","url":null,"abstract":"In 1963 E.Lorenz discovered strange attractors, which correspond to the turbulence in liquids and atmosphere. In the second half of the 20-th century these attractors were described in electromechanical and electronical systems. In this time the well-known scientists created the methods of estimates of attractor dimension in the theory of dynamical systems and differential equations. Lyapunov function has been introduced in the estimates of this attractors in the last two decades. In this paper new classes of Lyapunov functions for the Lorenz-like systems are constructed and Lyapunov dimension formulas are obtained.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"825 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120879193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Post-Implementation Evaluation of a University Management Information System (UMIS) 大学管理信息系统(UMIS)实施后评估
E. Symeonaki, M. Papoutsidakis, D. Tseles, M. Sigala
{"title":"Post-Implementation Evaluation of a University Management Information System (UMIS)","authors":"E. Symeonaki, M. Papoutsidakis, D. Tseles, M. Sigala","doi":"10.1109/MCSI.2016.014","DOIUrl":"https://doi.org/10.1109/MCSI.2016.014","url":null,"abstract":"The implementation of Management Information Systems (MIS) in educational management and administration is a relatively innovative field which is rapidly evolving because of its high efficiency and effectiveness. There is a relatively small number of research studies reported in the literature evaluating MIS implementations in universities. This case study focuses on the post-implementation evaluation of a Student Information System at Piraeus University of Applied Sciences. As it has been recognized that user satisfaction affects in a great extent the success of information systems, this study aims to derive student users' overall perceptions to the effectiveness of PUAS Student Information System. The methodology used to perform the research was based on D&M IS success and technology acceptance (TAM) models as well as Wixom and Todd framework. A thorough evaluation of the system was conducted by processing and analyzing the research objectives scores, the comment responses, and the respondents' demographic profiles. The research took place during the spring semester of Academic Year 2015-2016 and the sample included students of all PUAS departments. The outcomes of the research suggest that PUAS and its academic community could be greatly benefitted by the implementation of the Student Information System in terms of strategy planning, distributing resources as well as organizational success. Finally, it became clear that constant participative evaluation actions, integrated into the project management process are essential for the future success of PUAS Information System.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Key Theoretical Models for the Safety and Security Ensuring 安全与保障的关键理论模型
L. Lukás, M. Hromada, Lukáš Pavlík
{"title":"The Key Theoretical Models for the Safety and Security Ensuring","authors":"L. Lukás, M. Hromada, Lukáš Pavlík","doi":"10.1109/MCSI.2016.022","DOIUrl":"https://doi.org/10.1109/MCSI.2016.022","url":null,"abstract":"Problems of safety and security follows the people whole civilization evolution. Nowadays, many kinds of safety or security exist. During the constitution each kind of safety or security, procedure was pragmatic and assigned. Practice overturns theory. Now, there is a time, when we are able to make generalization and also create the theory of safety and security. This theory should be applied for each field of safety or security. As the part of kind of safety or security, there are models for ensuring safety or security issues. For example, the physical security is ensured through individual protection, known as barriers. Barrier ensures functions of retentions. In the article are analyzed the common theoretical models for ensuring safety and security.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123200150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Collaborative Based Algorithm for Efficient Management of Limited Resources on Social Networks
Valon Xhafa, Korab Rrmoku, Blerim Rexha
{"title":"Using Collaborative Based Algorithm for Efficient Management of Limited Resources on Social Networks","authors":"Valon Xhafa, Korab Rrmoku, Blerim Rexha","doi":"10.1109/MCSI.2016.060","DOIUrl":"https://doi.org/10.1109/MCSI.2016.060","url":null,"abstract":"With all features and resources, such as: social actors, social relations, content, communication, and ratings that todays' social networks like Facebook, LinkedIn, Twitter, Google+, etc. offer to users, it still appears that at given point we have to refine and optimize our own accounts within the limits of a certain social network. In line with this trend, in this paper we present a model for efficient management of friends list in Facebook, as one of the limited resource in this social network. In order to get users data from Facebook, a web scraping technique combined with reverse image search has been adopted to ensure users authenticity. The activity between nodes (friends) on a social network is calculated based on their interactions in terms of likes, comments, shares and posts between each other. This approach led us into designing and implementing an algorithm based in these collaborative metrics, named \"weight of relationship\". This algorithm calculates weights between friends on a network, and the results are evaluated by comparing these weights with respondent answers, conducted through personalized questionnaire. Consequently, this methodology brings feasible results, with an average accuracy of 71% on recommending which friends should be removed, thus releasing the space for incoming new friends. An app named RateMyFriends is developed based on presented approach.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quadratic Stabilization and Transit Problems for Switched Linear Systems via State Feedback 基于状态反馈的切换线性系统二次镇定与传递问题
N. Otsuka, Shota Sekiguchi
{"title":"Quadratic Stabilization and Transit Problems for Switched Linear Systems via State Feedback","authors":"N. Otsuka, Shota Sekiguchi","doi":"10.1109/MCSI.2016.033","DOIUrl":"https://doi.org/10.1109/MCSI.2016.033","url":null,"abstract":"In this paper, two transit problems which pass through the ε-neighborhood of some given objective states in turn from an arbitrary initial state will be studied for both continuous-time and discrete-time switched linear systems with constant input. At first the quadratic stabilization problem for continuous-time switched linear systems with constant input will be investigated. Next, the same problem for discrete-time switched linear systems with constant input will be studied. After that two ε-transit problems by using switched linear systems with constant input via state-dependent switching will be formulated, and then solvability conditions will be given. Further, two illustrative numerical examples will be shown.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信