Abstract: Different services based on different switching
techniques in wireless networks leads to drastic changes in the
properties of network traffic. Because of these diversities in services,
network traffic is expected to undergo qualitative and quantitative
variations. Hence, assumption of traffic characteristics and the
prediction of network events become more complex for the wireless
networks. In this paper, the traffic characteristics have been studied
by collecting traces from the mobile switching centre (MSC). The
traces include initiation and termination time, originating node, home
station id, foreign station id. Traffic parameters namely, call interarrival
and holding times were estimated statistically. The results
show that call inter-arrival and distribution time in this wireless
network is heavy-tailed and follow gamma distributions. They are
asymptotically long-range dependent. It is also found that the call
holding times are best fitted with lognormal distribution. Based on
these observations, an analytical model for performance estimation is
also proposed.
Abstract: The paper deals with communication standards for
control and production system. The authors formulate the
requirements for communication security protection. The paper is
focused on application protocols of the industrial networks and their
basic classification. The typical attacks are analysed and the safety
protection, based on requirements for specific industrial network is
suggested and defined in this paper.
Abstract: The research focus on study, analyze and design the
model of the infrastructure and computer networks for distance
education, online learning via new media, e-learning and blended
learning. The collected information from study and analyze process
that information was evaluated by the index of item objective
congruence (IOC) by 9 specialists to design model. The results of
evaluate the model with the mean and standard deviation by the
sample of 9 specialists value is 3.85. The results showed that the
infrastructure and computer networks are designed to be appropriate
to a great extent appropriate to a great extent.
Abstract: The use of IT equipment has become a part of every
day. However, each device that is part of cyberspace should be
secured against unauthorized use. It is very important to know the
basics of these security devices, but also the basics of safe conduct
their owners. This information should be part of every curriculum
computer science education in primary and secondary schools.
Therefore, the work focuses on the education of pupils in primary and
secondary schools on the Internet. Analysis of the current state
describes approaches to the education of pupils in security issues on
the Internet. The paper presents a questionnaire-based survey which
was carried out in the Czech Republic, whose task was to ascertain
the level of opinion pupils in primary and secondary schools on the
issue of communication in social networks. The research showed that
awareness of socio-pathological phenomena on the Internet
environment is very low. Based on the results it was proposed
appropriate ways of teaching to this issue and its inclusion a proposal
of curriculum for primary and secondary schools.
Abstract: This study aimed at investigating whether the
functional brain networks constructed using the initial EEG (obtained
when patients first visited hospital) can be correlated with the
progression of cognitive decline calculated as the changes of
mini-mental state examination (MMSE) scores between the latest and
initial examinations. We integrated the time–frequency cross mutual
information (TFCMI) method to estimate the EEG functional
connectivity between cortical regions, and the network analysis based
on graph theory to investigate the organization of functional networks
in aMCI. Our finding suggested that higher integrated functional
network with sufficient connection strengths, dense connection
between local regions, and high network efficiency in processing
information at the initial stage may result in a better prognosis of the
subsequent cognitive functions for aMCI. In conclusion, the functional
connectivity can be a useful biomarker to assist in prediction of
cognitive declines in aMCI.
Abstract: Brain functional networks based on resting-state EEG
data were compared between patients with mild Alzheimer’s disease
(mAD) and matched patients with amnestic subtype of mild cognitive
impairment (aMCI). We integrated the time–frequency cross mutual
information (TFCMI) method to estimate the EEG functional
connectivity between cortical regions and the network analysis based
on graph theory to further investigate the alterations of functional
networks in mAD compared with aMCI group. We aimed at
investigating the changes of network integrity, local clustering,
information processing efficiency, and fault tolerance in mAD brain
networks for different frequency bands based on several topological
properties, including degree, strength, clustering coefficient, shortest
path length, and efficiency. Results showed that the disruptions of
network integrity and reductions of network efficiency in mAD
characterized by lower degree, decreased clustering coefficient, higher
shortest path length, and reduced global and local efficiencies in the
delta, theta, beta2, and gamma bands were evident. The significant
changes in network organization can be used in assisting
discrimination of mAD from aMCI in clinical.
Abstract: Recent advances in wireless networking technologies
introduce several energy aware routing protocols in sensor networks.
Such protocols aim to extend the lifetime of network by reducing the
energy consumption of nodes. Many researchers are looking for
certain challenges that are predominant in the grounds of energy
consumption. One such protocol that addresses this energy
consumption issue is ‘Cluster based hierarchical routing protocol’. In
this paper, we intend to discuss some of the major hierarchical
routing protocols adhering towards sensor networks. Furthermore, we
examine and compare several aspects and characteristics of few
widely explored hierarchical clustering protocols, and its operations
in wireless sensor networks (WSN). This paper also presents a
discussion on the future research topics and the challenges of
hierarchical clustering in WSNs.
Abstract: The organizations of European and Czech critical
infrastructure have specific position, mission, characteristics and
behaviour in European Union and Czech state/business environments,
regarding specific requirements for regional and global security
environments. They must respect policy of national security and
global rules, requirements and standards in all their inherent and
outer processes of supply - customer chains and networks. A
controlling is generalized capability to have control over situational
policy. This paper aims and purposes are to introduce the controlling
as quite new necessary process attribute providing for critical
infrastructure is environment the capability and profit to achieve its
commitment regarding to the effectiveness of the quality
management system in meeting customer/ user requirements and also
the continual improvement of critical infrastructure organization’s
processes overall performance and efficiency, as well as its societal
security via continual planning improvement via DYVELOP
modelling.
Abstract: Load Forecasting plays a key role in making today's
and future's Smart Energy Grids sustainable and reliable. Accurate
power consumption prediction allows utilities to organize in advance
their resources or to execute Demand Response strategies more
effectively, which enables several features such as higher
sustainability, better quality of service, and affordable electricity
tariffs. It is easy yet effective to apply Load Forecasting at larger
geographic scale, i.e. Smart Micro Grids, wherein the lower available
grid flexibility makes accurate prediction more critical in Demand
Response applications. This paper analyses the application of
short-term load forecasting in a concrete scenario, proposed within the
EU-funded GreenCom project, which collect load data from single
loads and households belonging to a Smart Micro Grid. Three
short-term load forecasting techniques, i.e. linear regression, artificial
neural networks, and radial basis function network, are considered,
compared, and evaluated through absolute forecast errors and training
time. The influence of weather conditions in Load Forecasting is also
evaluated. A new definition of Gain is introduced in this paper, which
innovatively serves as an indicator of short-term prediction
capabilities of time spam consistency. Two models, 24- and
1-hour-ahead forecasting, are built to comprehensively compare these
three techniques.
Abstract: The aim of this paper is to analyze the ability to
identify and acquire knowledge from external sources at the regional
level in the Czech Republic. The results show that the most important
sources of knowledge for innovative activities are sources within the
businesses themselves, followed by customers and suppliers.
Furthermore, the analysis of relationships between the objective of
the innovative activity and the ability to identify and acquire
knowledge implies that knowledge obtained from (1) customers aims
at replacing outdated products and increasing product quality; (2)
suppliers aims at increasing capacity and flexibility of production;
and (3) competing businesses aims at growing market share and
increasing the flexibility of production and services. Regions should
therefore direct their support especially into development and
strengthening of networks within the value chain.
Abstract: Kinematic data wisely correlate vector quantities in
space to scalar parameters in time to assess the degree of symmetry
between the intact limb and the amputated limb with respect to a
normal model derived from the gait of control group participants.
Furthermore, these particular data allow a doctor to preliminarily
evaluate the usefulness of a certain rehabilitation therapy.
Kinetic curves allow the analysis of ground reaction forces (GRFs)
to assess the appropriateness of human motion.
Electromyography (EMG) allows the analysis of the fundamental
lower limb force contributions to quantify the level of gait
asymmetry. However, the use of this technological tool is expensive
and requires patient’s hospitalization. This research work suggests
overcoming the above limitations by applying artificial neural
networks.
Abstract: In this research work, neural networks were applied to
classify two types of hip joint implants based on the relative hip joint
implant side speed and three components of each ground reaction
force. The condition of walking gait at normal velocity was used and
carried out with each of the two hip joint implants assessed. Ground
reaction forces’ kinetic temporal changes were considered in the first
approach followed but discarded in the second one. Ground reaction
force components were obtained from eighteen patients under such
gait condition, half of which had a hip implant type I-II, whilst the
other half had the hip implant, defined as type III by Orthoload®.
After pre-processing raw gait kinetic data and selecting the time
frames needed for the analysis, the ground reaction force components
were used to train a MLP neural network, which learnt to distinguish
the two hip joint implants in the abovementioned condition. Further
to training, unknown hip implant side and ground reaction force
components were presented to the neural networks, which assigned
those features into the right class with a reasonably high accuracy for
the hip implant type I-II and the type III. The results suggest that
neural networks could be successfully applied in the performance
assessment of hip joint implants.
Abstract: Opportunistic routing is used, where the network has
the features like dynamic topology changes and intermittent network
connectivity. In Delay tolerant network or Disruption tolerant
network opportunistic forwarding technique is widely used. The key
idea of opportunistic routing is selecting forwarding nodes to forward
data packets and coordination among these nodes to avoid duplicate
transmissions. This paper gives the analysis of pros and cons of
various opportunistic routing techniques used in MANET.
Abstract: This paper deals with the problem of passivity
analysis for stochastic neural networks with leakage, discrete and
distributed delays. By using delay partitioning technique, free
weighting matrix method and stochastic analysis technique, several
sufficient conditions for the passivity of the addressed neural
networks are established in terms of linear matrix inequalities
(LMIs), in which both the time-delay and its time derivative can be
fully considered. A numerical example is given to show the
usefulness and effectiveness of the obtained results.
Abstract: In this study, a comparative analysis of the approaches
associated with the use of neural network algorithms for effective
solution of a complex inverse problem – the problem of identifying
and determining the individual concentrations of inorganic salts in
multicomponent aqueous solutions by the spectra of Raman
scattering of light – is performed. It is shown that application of
artificial neural networks provides the average accuracy of
determination of concentration of each salt no worse than 0.025 M.
The results of comparative analysis of input data compression
methods are presented. It is demonstrated that use of uniform
aggregation of input features allows decreasing the error of
determination of individual concentrations of components by 16-18%
on the average.
Abstract: The article presents the results of the application of
artificial neural networks to separate the fluorescent contribution of
nanodiamonds used as biomarkers, adsorbents and carriers of drugs
in biomedicine, from a fluorescent background of own biological
fluorophores. The principal possibility of solving this problem is
shown. Use of neural network architecture let to detect fluorescence
of nanodiamonds against the background autofluorescence of egg
white with high accuracy - better than 3 ug/ml.
Abstract: Researches and concerns in power quality gained
significant momentum in the field of power electronics systems over
the last two decades globally. This sudden increase in the number of
concerns over power quality problems is a result of the huge increase
in the use of non-linear loads. In this paper, power quality evaluation
of some distribution networks at Misurata - Libya has been done
using a power quality and energy analyzer (Fluke 437 Series II). The
results of this evaluation are used to minimize the problems of power
quality. The analysis shows the main power quality problems that
exist and the level of awareness of power quality issues with the aim
of generating a start point which can be used as guidelines for
researchers and end users in the field of power systems.
Abstract: This paper is concerned with the stability problem
with two additive time-varying delay components. By choosing one
augmented Lyapunov-Krasovskii functional, using some new zero
equalities, and combining linear matrix inequalities (LMI)
techniques, two new sufficient criteria ensuring the global stability
asymptotic stability of DNNs is obtained. These stability criteria are
present in terms of linear matrix inequalities and can be easily
checked. Finally, some examples are showed to demonstrate the
effectiveness and less conservatism of the proposed method.
Abstract: The growth of wireless devices affects the availability
of limited frequencies or spectrum bands as it has been known that
spectrum bands are a natural resource that cannot be added.
Meanwhile, the licensed frequencies are idle most of the time.
Cognitive radio is one of the solutions to solve those problems.
Cognitive radio is a promising technology that allows the unlicensed
users known as secondary users (SUs) to access licensed bands
without making interference to licensed users or primary users (PUs).
As cloud computing has become popular in recent years, cognitive
radio networks (CRNs) can be integrated with cloud platform. One of
the important issues in CRNs is security. It becomes a problem since
CRNs use radio frequencies as a medium for transmitting and CRNs
share the same issues with wireless communication systems. Another
critical issue in CRNs is performance. Security has adverse effect to
performance and there are trade-offs between them. The goal of this
paper is to investigate the performance related to security trade-off in
CRNs with supporting cloud platforms. Furthermore, Queuing
Network Models with preemptive resume and preemptive repeat
identical priority are applied in this project to measure the impact of
security to performance in CRNs with or without cloud platform. The
generalized exponential (GE) type distribution is used to reflect the
bursty inter-arrival and service times at the servers. The results show
that the best performance is obtained when security is disabled and
cloud platform is enabled.
Abstract: ‘Steganalysis’ is one of the challenging and attractive interests for the researchers with the development of information hiding techniques. It is the procedure to detect the hidden information from the stego created by known steganographic algorithm. In this paper, a novel feature based image steganalysis technique is proposed. Various statistical moments have been used along with some similarity metric. The proposed steganalysis technique has been designed based on transformation in four wavelet domains, which include Haar, Daubechies, Symlets and Biorthogonal. Each domain is being subjected to various classifiers, namely K-nearest-neighbor, K* Classifier, Locally weighted learning, Naive Bayes classifier, Neural networks, Decision trees and Support vector machines. The experiments are performed on a large set of pictures which are available freely in image database. The system also predicts the different message length definitions.