Issue 1, Volume 4, 2010

A Structured Differential Evolutions for Various Network Topologies
by Takashi Ishimizu, Kiyoharu Tagawa

Abstract: A structured implementation of Differential Evolution (DE), which can be executed in parallel by using various networks topologies, is presented in this paper. Even though Evolutionary Algorithms (EAs) including DE have a parallel and distributed nature intrinsically, Sequential DE (SqDE) is especially suited for the structured implementation of DE. Therefore, the proposed Structured DE (StDE) is based on SqDE. Through the numerical experiment conducted on a variety of benchmark problems, the performances of StDE realized on some different network topologies are compared with the conventional SqDE that uses no networks. As a result, it is shown that the number of generations spent by StDE to find optimal solutions is smaller than the number of them spent by the above SqDE in many benchmark problems. Therefore, the optimal solutions of almost of the benchmark problems are found more efficiently by using the proposed StDE realized on the network topologies rather than SqDE.

Keywords:

Eolutionary Algorithm, Differential Evolution, Structured Differential Evolution, Parallel Algorithm
Full Paper, pp. 1-8

 

A Near Field Communication Tool for Building Intelligent Environment using Smart Posters
by Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz, Miguel Angel Gomez-Nieto

Abstract: NFC is becoming one of the most important advances in wireless communications technologies because it allows the incorporation of the RFID technology into mobile devices. This technology is used in ubiquitous computing to obtain different kinds of information and services from different sources anytime and anywhere. In order to build smart environments, in which we are able to obtain information from the objects surrounding us using NFC, the development of a tool that provides all the basics options for defining, storing and retrieving this information and services is mandatory. In addition, the tool has to use different standards defined by the NFC-Forum in order to interact with different devices and RFID tags. This paper describes the tool and its applications to the university environment. With this aim, several types of Smart Posters have been developed, such as a Department and Faculty Smart Poster.

Keywords:

Intelligent Environments, Mobile Phones, NFC, RFID, Ubiquitous Computing
Full Paper, pp. 9-16

 

A Multi-Agent Geo-Simulation Model for Intelligent Sensor Web Spatial Coverage Management Using IVGE
by Mehdi Mekni

Abstract: A Sensor Web (SW) consists of a large collection of small nodes providing collaborative and distributed sensing abilities in unpredictable environments. Nodes composing such a SW are characterized by resource restrictions, especially energy, processing power, and communication capacities. A sensor web can be thought of as a spatially and functionally distributed complex system evolving in and interacting with a geographic environment. So far, the majority of the currently deployed SWs has been mainly used for prototyping purposes. These SWs operate without considering a management scheme and do not take into account the geographic environment characteristics in which they are deployed. Multi-Agent Geo-Simulation (MAGS) is a recent modeling and simulation paradigm which provides a flexible approach that can be used to analyze complex systems such as SW in large-scale and complex georeferenced environments. In this paper, we propose to use a MAGS approach to support SW management. Moreover, we present Sensor-MAGS, a multi-agent geo-simulation system which manages sensor nodes using Informed Virtual Geographic Environments (IVGE). This system is applied in the context of a water resource monitoring project.

Keywords:

Sensor Web, Multi-Agent Systems, Geo-Simulation, Virtual Geographic Environment, Sensor Web Management
Full Paper, pp. 17-30

 

Issue 3, Volume 4, 2010

City Branding for Cluj-Napoca. A Case of the Local Public Administration Initiative
by Liviu Ilies, Alexandra Viorica Dulau, Monica Maria Coros, Marius Emil Coros

Abstract: The main aim of our present analysis is to identify those elements that are relevant for the branding project of Cluj- Napoca, Transylvania’s most important economic center and a key destination of Romania. Therefore, starting from the city branding hexagon, the tool used by Simon Anholt for the elaboration of the City Brand Index, we attempt to identify those elements that are relevant for the branding project of the city initiated by the city hall of the municipality. Throughout our paper we are going to provide answers to several questions: How do first year students enrolled at Universitatea Babes-Bolyai perceive the city in relation with Transylvania? How is Cluj-Napoca’s tourist potential appreciated by other Romanians? How do Romanian local public authorities understand to get involved in the branding processes of their cities? Are the websites of the city halls used as communication tools in the promotion of Romanian destinations? The results of our paper rely on the finding of two different survey-based researches that we have undertaken in 2009, respectively on a thorough analysis of the websites of the city halls of Romania’s county residences.

Keywords:

City branding for Cluj-Napoca, Image promotion by the means of official websites, Tourism and Public Administration
Full Paper, pp. 49-58

 

Design of Artificial Neural Network for Handwritten Signature Recognition
by Debnath Bhattacharyya, Tai-Hoon Kim

Abstract: Numerous approaches have been proposed for Handwritten Signature Identification systems. Various successful domain specific applications using ANN (artificial neural networks) can be found, but not flexible enough for generalization. Besides all, one approach that has shown great promise is the use of ANN in the Handwritten Signature Identification. To avoid forgery and ensure the confidentiality of Information in the field of Information Technology Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a view on the signature recognition technique and we also discussed about a technology of Signature Authentication by Back-propagation Algorithm with application. The purpose of this technique is to ensure that the rendered services are accessed only by a legitimate user, and not anyone else. By using this method it is possible to confirm or establish an individual’s identity. In this paper we explore a new recognition technique; an ANN is trained to identify patterns among different supplied handwriting samples. Handwritten signature samples are considered input for our artificial neural network model and typically weights also supplied for recognition.

Keywords:

Recognition, neural network, signature, pattern recognition, authentication, and security
Full Paper, pp. 59-66

 

 

 

 

 

 

Issue 2, Volume 4, 2010

Information System Supporting Spatial Decisio-Mmaking and its Quality
by Jitka Komarkova, Miloslav Hub, Jana Neumannova, Ondrej Visek

Abstract: Decision-making is an important part of human’s life. Information systems should highly support efficient decision making. Only well designed information systems with a high level of a quality can provide this kind of service. Approach to spatially-oriented information systems quality evaluation is described in the article. Next, a case study – evaluation of a quality of a Web-based intranet GIS application of a municipal authority, is described. In the end, obtained results and lessons learned from the evaluation are stated and commented.

Keywords:

Spatial decision-making, Spatial decision support systems, Web-based GIS, Intranet, Quality, Usability, Geographic information systems
Full Paper, pp. 31-38

 

A Modified Location Aided Routing Protocol for UWB MANET
by Jazyah Y., Hope M. D.

Abstract: The Mobile Ad hoc Network (MANET) is a conventional ad hoc network; nodes within the network are mobile, where each node is equipped with a transmitter and receiver, antenna, and a local battery. Each node may operate as a router to relay message from sender to receiver. Nodes within MANET are organized in different manners, they can be hierarchical or flat, they can move in any direction and speed, and communicate to each other by means of wireless routing protocols. Now it is the time for Ultra-WideBand (UWB) to be given more attention due to its great capability in high data rate, large Band Width (BW), and low power consumption. Currently, hosts are equipped with UWB system in order to achieve short range communication and exploit the previous mentioned advantages, besides UWB has the ability to measure distance between hosts accurately. As a result, researchers have been encouraged to design new routing protocols for UWB networks to make it suitable for hosts to exploit features of UWB, but still needs more and more work to overcome drawbacks of network such as network overhead, power consumption, unreliable route, etc… The goal of this work is to design and implement a new routing protocol for UWB network; the new scheme aims to increase the life time of network, reduce network overhead, and achieve route reliability. The new protocol is based on LAR scheme 1 and exploits the request zone technique by defining several request zones in advance in order to find route to destination. QualNet is used as environment to develop and implement the new protocol. Results from simulator indicate that the new protocol outperforms the comparable protocols (AODV and LAR1); it enhances the life time of network, reduces the network overhead, and increases the throughput as discussed later in this research.

Keywords:

MANET, UWB, Routing protocol, LAR
Full Paper, pp. 39-48

 

Issue 4, Volume 4, 2010

Architecture of an Auto Vaccination System for Handheld Device and the Insecurity issues
by Tai-Hoon Kim

Abstract: Diseases can be prevented by proper immunization procedures, however, with most parents working in this generation and not most clinics pay much attention on the individual planning and notifications of their patients, this research will show a solution to such crucial issue. The research depicts an architectural structure using mobile computing which will plot a chart of vaccination planner synchronous with the parent’s personal planner so as to set a schedule amenable to both the parties and a notification through will be generated. This will be a tool for parents and assistance to clinics and hospitals catering vaccinations shots for children.

Keywords:

Vaccination, Planner, Handheld Device, Security Threats, Vulnerability
Full Paper, pp. 67-74

 

Integration of Wireless SCADA through the Internet
by Tai-Hoon Kim

Abstract: Supervisory Control and Data Acquisition systems collects data from various sensors at a factory, plant or in other remote locations and then sends this data to a central computer which then manages and controls the data. Traditionally, SCADA was designed to be in a private network utilizing line communication. As the scope becomes larger, and utilizing line communication becomes impractical therefore integrating wireless communication to SCADA was introduced. This work describes an Architecture of SCADA in wireless mode. The transmission of communication through the internet, its advantages and disadvantages are also discussed.

Keywords:

Control Systems, SCADA, Mobility, Wireless
Full Paper, pp. 75-82

 

Approximation Hierarchy Model approach into B-PLC based on ATM
by Garrido A. G., Medel J. J. J., Sanchez G. J. C.

Abstract: In this paper, we present applications using Broadband-Power Line Communications (B-PLC) networks in low voltage conditions; improving multi-objective paths as a function of base station (BS) and channel allocations (CA). Considering the B-PLC network hierarchy model approach based on ATM Networks, we identified the basis for Generalized Base Station Placement (GBSP), minimizing costs and maximizing coverage as well as the Signal Noise Rate (SNR) and Channel Frequency Response (CFR). The development of an Approximation Hierarchy Model considered modulations aspects to achieve B-PLC operation. This work considers Frequency Division Duplex/ over Time Division Duplex (FDD/TDD) and Time Division Multiplexing Access (TDMA), within a B-PLC electrical network, and the SNR was maintained without important variations. The behavior of different communication channels of the same B-PLC network with different technology permitted observing its complete compatibility.

Keywords:

MV-LV, networks, B-PLC, GBSP, SNR
Full Paper, pp. 83-90

 

Pareto Task Assignments by an Adaptive Quantum-based Evolutionary Algorithm AQMEA
by Jerzy M. Balicki

Abstract: Pareto distributed task assignments found by the AQMEA (Adaptive Quantum-based Multi-criterion Evolutionary Algorithm) have been considered for computer systems. A quantum chromosome representation with the registry of the smallest units of quantum information has been applied. Evolutionary computing with Q-bit chromosomes has been proofed to ensure the enhanced population diversity than other representations, since individuals represent a linear superposition of states probabilistically. Moreover, the multi-criterion task assignment problem has been considered.

Keywords:

Quantum simulation, evolutionary algorithms, distributed systems, multi-criterion optimization, artificial intelligence
Full Paper, pp. 91-100

 

Basic Authentication Procedure Modelled by Petri Nets
by J. Capek, M. Hub, R. Myskova

Abstract: This paper presents modelling of the basic authentication procedure. The Petri net technique as a tool was chosen in this study. Experiments were made with two groups of models according the quantity of used attributes. One consists of combination of the User name and Password with and/or without repeating. The second group consist of the user name, password and biometrics with and/or without repeating. The goal of this paper is to demonstrate that security increasing with attributes quantity and decreasing with possibility to repeating wrong sequence of symbols.

Keywords:

Authentication, biometrics, passwords, Petri nets, user name
Full Paper, pp. 101-108