Abstract: The handwriting is a physical demonstration of a
complex cognitive process learnt by man since his childhood. People
with disabilities or suffering from various neurological diseases are
facing so many difficulties resulting from problems located at the
muscle stimuli (EMG) or signals from the brain (EEG) and which
arise at the stage of writing. The handwriting velocity of the same
writer or different writers varies according to different criteria: age,
attitude, mood, writing surface, etc. Therefore, it is interesting to
reconstruct an experimental basis records taking, as primary
reference, the writing speed for different writers which would allow
studying the global system during handwriting process. This paper
deals with a new approach of the handwriting system modeling based
on the velocity criterion through the concepts of artificial neural
networks, precisely the Radial Basis Functions (RBF) neural
networks. The obtained simulation results show a satisfactory
agreement between responses of the developed neural model and the
experimental data for various letters and forms then the efficiency of
the proposed approaches.
Abstract: This paper deals with the problem of automatic rule
generation for fuzzy systems design. The proposed approach is based
on hybrid artificial bee colony (ABC) optimization and weighted least
squares (LS) method and aims to find the structure and parameters of
fuzzy systems simultaneously. More precisely, two ABC based fuzzy
modeling strategies are presented and compared. The first strategy
uses global optimization to learn fuzzy models, the second one
hybridizes ABC and weighted least squares estimate method. The
performances of the proposed ABC and ABC-LS fuzzy modeling
strategies are evaluated on complex modeling problems and compared
to other advanced modeling methods.
Abstract: Due to the large amount of information in the World
Wide Web (WWW, web) and the lengthy and usually linearly
ordered result lists of web search engines that do not indicate
semantic relationships between their entries, the search for topically
similar and related documents can become a tedious task. Especially,
the process of formulating queries with proper terms representing
specific information needs requires much effort from the user. This
problem gets even bigger when the user's knowledge on a subject and
its technical terms is not sufficient enough to do so. This article
presents the new and interactive search application DocAnalyser that
addresses this problem by enabling users to find similar and related
web documents based on automatic query formulation and state-ofthe-
art search word extraction. Additionally, this tool can be used to
track topics across semantically connected web documents.
Abstract: In this paper, we have proposed a parallel IDS and
honeypot based approach to detect and analyze the unknown and
known attack taxonomy for improving the IDS performance and
protecting the network from intruders. The main theme of our
approach is to record and analyze the intruder activities by using both
the low and high interaction honeypots. Our architecture aims to
achieve the required goals by combing signature based IDS,
honeypots and generate the new signatures. The paper describes the
basic component, design and implementation of this approach and
also demonstrates the effectiveness of this approach to reduce the
probability of network attacks.
Abstract: Apps are today the most important possibility to adapt
mobile phones and computers to fulfill the special needs of their
users. Location- and context-sensitive programs are hereby the key to
support the interaction of the user with his/her environment and also
to avoid an overload with a plenty of dispensable information. The
contribution shows, how a trusted, secure and really bi-directional
communication and interaction among users and their environment
can be established and used, e.g. in the field of home automation.
Abstract: In new energy development, wind power has boomed.
It is due to the proliferation of wind parks and their operation in
supplying the national electric grid with low cost and clean resources.
Hence, there is an increased need to establish a proactive
maintenance for wind turbine machines based on remote control and
monitoring. That is necessary with a real-time wireless connection in
offshore or inaccessible locations while the wired method has many
flaws. The objective of this strategy is to prolong wind turbine
lifetime and to increase productivity. The hardware of a remote
control and monitoring system for wind turbine parks is designed. It
takes advantage of GPRS or Wi-Max wireless module to collect data
measurements from different wind machine sensors through IP based
multi-hop communication. Computer simulations with Proteus ISIS
and OPNET software tools have been conducted to evaluate the
performance of the studied system. Study findings show that the
designed device is suitable for application in a wind park.
Abstract: The world wide web network is a network with a
complex topology, the main properties of which are the distribution
of degrees in power law, A low clustering coefficient and a weak
average distance. Modeling the web as a graph allows locating the
information in little time and consequently offering a help in the
construction of the research engine. Here, we present a model based
on the already existing probabilistic graphs with all the aforesaid
characteristics. This work will consist in studying the web in order to
know its structuring thus it will enable us to modelize it more easily
and propose a possible algorithm for its exploration.
Abstract: Different services based on different switching
techniques in wireless networks leads to drastic changes in the
properties of network traffic. Because of these diversities in services,
network traffic is expected to undergo qualitative and quantitative
variations. Hence, assumption of traffic characteristics and the
prediction of network events become more complex for the wireless
networks. In this paper, the traffic characteristics have been studied
by collecting traces from the mobile switching centre (MSC). The
traces include initiation and termination time, originating node, home
station id, foreign station id. Traffic parameters namely, call interarrival
and holding times were estimated statistically. The results
show that call inter-arrival and distribution time in this wireless
network is heavy-tailed and follow gamma distributions. They are
asymptotically long-range dependent. It is also found that the call
holding times are best fitted with lognormal distribution. Based on
these observations, an analytical model for performance estimation is
also proposed.
Abstract: Cloud service brokering is a new service paradigm that
provides interoperability and portability of application across multiple
Cloud providers. In this paper, we designed Cloud service brokerage
system, anyBroker, supporting integrated service provisioning and
SLA based service lifecycle management. For the system design, we
introduce the system concept and whole architecture, details of main
components and use cases of primary operations in the system. These
features ease the Cloud service provider and customer’s concern and
support new Cloud service open market to increase Cloud service
profit and prompt Cloud service echo system in Cloud computing
related area.
Abstract: Most quality models have defined usability as a
significant factor that leads to improving product acceptability,
increasing user satisfaction, improving product reliability, and also
financially benefitting companies. Usability is also the best factor that
balances both the technical and human aspects of a software product,
which is an important aspect in defining quality during software
development process. A usability risk consist risk factors that could
impact the usability of a software product thereby contributing to
negative user experiences and causing a possible software product
failure. Hence, it is important to mitigate and reduce usability risks in
the software development process itself. By managing possible
usability risks in software development process, failure of software
product could be reduced. Therefore, this research uses the Delphi
method to identify mitigation plans for reducing potential usability
risks. The Delphi method is conducted with seven experts from the
field of risk management and software development.
Abstract: There are several methods to monitor software
projects and the objective for monitoring is to ensure that the
software projects are developed and delivered successfully. A
performance measurement is a method that is closely associated with
monitoring and it can be scrutinized by looking at two important
attributes which are efficiency and effectiveness both of which are
factors that are important for the success of a software project.
Consequently, a successful steering is achieved by monitoring and
controlling a software project via the performance measurement
criteria and metrics. Hence, this paper is aimed at identifying the
performance measurement criteria and the metrics for monitoring the
performance of a software project by using the Goal Question
Metrics (GQM) approach. The GQM approach is utilized to ensure
that the identified metrics are reliable and useful. These identified
metrics are useful guidelines for project managers to monitor the
performance of their software projects.
Abstract: In our paper we describe the security capabilities of
data collection. Data are collected with probes located in the near and
distant surroundings of the company. Considering the numerous
obstacles e.g. forests, hills, urban areas, the data collection is realized
in several ways. The collection of data uses connection via wireless
communication, LAN network, GSM network and in certain areas
data are collected by using vehicles. In order to ensure the connection
to the server most of the probes have ability to communicate in
several ways. Collected data are archived and subsequently used in
supervisory applications.
To ensure the collection of the required data, it is necessary to
propose algorithms that will allow the probes to select suitable
communication channel.
Abstract: The paper deals with communication standards for
control and production system. The authors formulate the
requirements for communication security protection. The paper is
focused on application protocols of the industrial networks and their
basic classification. The typical attacks are analysed and the safety
protection, based on requirements for specific industrial network is
suggested and defined in this paper.
Abstract: This article describes the information system for
measuring and evaluating the dose rate in the environment of nuclear
power plants Mochovce and Bohunice in Slovakia.
The article presents the results achieved in the implementation of
the EU project – Research of monitoring and evaluation of nonstandard
conditions in the area of nuclear power plants. The
objectives included improving the system of acquisition, measuring
and evaluating data with mobile and autonomous units applying new
knowledge from research.
The article provides basic and specific features of the system and
compared to the previous version of the system, also new functions.
Abstract: The aim of this paper is to propose a novel technique
to guarantee Quality of Service (QoS) in a highly dynamic
environment. The MANET changes its topology dynamically as the
nodes are moved frequently. This will cause link failure between
mobile nodes. MANET cannot ensure reliability without delay. The
relay node is selected based on achieving QoS in previous
transmission. It considers one more factor Connection Existence
Period (CEP) to ensure reliability. CEP is to find out the period
during that connection exists between the nodes. The node with
highest CEP becomes a next relay node. The relay node is selected
dynamically to avoid frequent failure. The bandwidth of each link
changed dynamically based on service rate and request rate. This
paper proposes Active bandwidth setting up algorithm to guarantee
the QoS. The series of results obtained by using the Network
Simulator (NS-2) demonstrate the viability of our proposed
techniques.
Abstract: Multispectral screening systems are becoming more
popular because of their very interesting properties and applications.
One of the most significant applications of multispectral screening
systems is prevention of terrorist attacks. There are many kinds of
threats and many methods of detection. Visual detection of objects
hidden under clothing of a person is one of the most challenging
problems of threats detection. There are various solutions of the
problem; however, the most effective utilize multispectral
surveillance imagers. The development of imaging devices and
exploration of new spectral bands is a chance to introduce new
equipment for assuring public safety. We investigate the possibility
of long lasting detection of potentially dangerous objects covered
with various types of clothing. In the article we present the results of
comparative studies of passive imaging in three spectrums – visible,
infrared and terahertz.
Abstract: This paper presents a real-time visualization technique
and filtering of classified LiDAR point clouds. The visualization is
capable of displaying filtered information organized in layers by the
classification attribute saved within LiDAR datasets. We explain the
used data structure and data management, which enables real-time
presentation of layered LiDAR data. Real-time visualization is
achieved with LOD optimization based on the distance from the
observer without loss of quality. The filtering process is done in two
steps and is entirely executed on the GPU and implemented using
programmable shaders.
Abstract: Human movement in the real world provides
important information for developing human behaviour models and
simulations. However, it is difficult to assess ‘real’ human behaviour
since there is no established method available. As part of the AUNTSUE
(Accessibility and User Needs in Transport – Sustainable Urban
Environments) project, this research aimed to propose a method to
assess human movement and behaviour in crowded areas. The
method is based on the three major steps of video recording,
conceptual behavior modelling and video analysis. The focus is on
individual human movement and behaviour in normal situations
(panic situations are not considered) and the interactions between
individuals in localized areas. Emphasis is placed on gaining
knowledge of characteristics of human movement and behaviour in
the real world that can be modelled in the virtual environment.
Abstract: This study proposes the transformation of nonlinear
Magnetic Levitation System into linear one, via state and feedback
transformations using explicit algorithm. This algorithm allows
computing explicitly the linearizing state coordinates and feedback
for any nonlinear control system, which is feedback linearizable,
without solving the Partial Differential Equations. The algorithm is
performed using a maximum of N-1 steps where N being the
dimension of the system.
Abstract: In MANET, mobile nodes communicate with each
other using the wireless channel where transmission takes place with
significant interference. The wireless medium used in MANET is a
shared resource used by all the nodes available in MANET. Packet
reserving is one important resource management scheme which
controls the allocation of bandwidth among multiple flows through
node cooperation in MANET. This paper proposes packet reserving
and clogging control via Routing Aware Packet Reserving (RAPR)
framework in MANET. It mainly focuses the end-to-end routing
condition with maximal throughput. RAPR is complimentary system
where the packet reserving utilizes local routing information
available in each node. Path setup in RAPR estimates the security
level of the system, and symbolizes the end-to-end routing by
controlling the clogging. RAPR reaches the packet to the destination
with high probability ratio and minimal delay count. The standard
performance measures such as network security level,
communication overhead, end-to-end throughput, resource utilization
efficiency and delay measure are considered in this work. The results
reveals that the proposed packet reservation and clogging control via
Routing Aware Packet Reserving (RAPR) framework performs well
for the above said performance measures compare to the existing
methods.