A Structured Differential Evolutions for Various Network
Topologies
by Takashi Ishimizu, Kiyoharu Tagawa
Abstract:
A structured implementation of Differential Evolution (DE), which can be
executed in parallel by using various networks topologies, is presented in this
paper. Even though Evolutionary Algorithms (EAs) including DE have a parallel
and distributed nature intrinsically, Sequential DE (SqDE) is especially suited
for the structured implementation of DE. Therefore, the proposed Structured DE
(StDE) is based on SqDE. Through the numerical experiment conducted on a variety
of benchmark problems, the performances of StDE realized on some different
network topologies are compared with the conventional SqDE that uses no
networks. As a result, it is shown that the number of generations spent by StDE
to find optimal solutions is smaller than the number of them spent by the above
SqDE in many benchmark problems. Therefore, the optimal solutions of almost of
the benchmark problems are found more efficiently by using the proposed StDE
realized on the network topologies rather than SqDE.
Keywords:
Eolutionary Algorithm, Differential Evolution, Structured Differential
Evolution, Parallel Algorithm
Full Paper, pp. 1-8
A Near Field Communication Tool for Building Intelligent
Environment using Smart Posters
by Pilar Castro Garrido, Guillermo
Matas Miraz, Irene Luque Ruiz, Miguel Angel Gomez-Nieto
Abstract:
NFC is becoming one of the most important advances in wireless communications
technologies because it allows the incorporation of the RFID technology into
mobile devices. This technology is used in ubiquitous computing to obtain
different kinds of information and services from different sources anytime and
anywhere. In order to build smart environments, in which we are able to obtain
information from the objects surrounding us using NFC, the development of a tool
that provides all the basics options for defining, storing and retrieving this
information and services is mandatory. In addition, the tool has to use
different standards defined by the NFC-Forum in order to interact with different
devices and RFID tags. This paper describes the tool and its applications to the
university environment. With this aim, several types of Smart Posters have been
developed, such as a Department and Faculty Smart Poster.
Keywords:
Intelligent Environments, Mobile Phones, NFC, RFID, Ubiquitous Computing
Full Paper, pp. 9-16
A Multi-Agent Geo-Simulation Model for Intelligent Sensor
Web Spatial Coverage Management Using IVGE
by Mehdi Mekni
Abstract:
A Sensor Web (SW) consists of a large collection of small nodes providing
collaborative and distributed sensing abilities in unpredictable environments.
Nodes composing such a SW are characterized by resource restrictions, especially
energy, processing power, and communication capacities. A sensor web can be
thought of as a spatially and functionally distributed complex system evolving
in and interacting with a geographic environment. So far, the majority of the
currently deployed SWs has been mainly used for prototyping purposes. These SWs
operate without considering a management scheme and do not take into account the
geographic environment characteristics in which they are deployed. Multi-Agent
Geo-Simulation (MAGS) is a recent modeling and simulation paradigm which
provides a flexible approach that can be used to analyze complex systems such as
SW in large-scale and complex georeferenced environments. In this paper, we
propose to use a MAGS approach to support SW management. Moreover, we present
Sensor-MAGS, a multi-agent geo-simulation system which manages sensor nodes
using Informed Virtual Geographic Environments (IVGE). This system is applied in
the context of a water resource monitoring project.
Keywords:
Sensor Web, Multi-Agent Systems, Geo-Simulation, Virtual Geographic Environment,
Sensor Web Management
Full Paper, pp. 17-30
City Branding for Cluj-Napoca. A Case of the Local Public
Administration Initiative
by Liviu Ilies, Alexandra Viorica
Dulau, Monica Maria Coros, Marius Emil Coros
Abstract:
The main aim of our present analysis is to identify those elements that are
relevant for the branding project of Cluj- Napoca, Transylvania’s most important
economic center and a key destination of Romania. Therefore, starting from the
city branding hexagon, the tool used by Simon Anholt for the elaboration of the
City Brand Index, we attempt to identify those elements that are relevant for
the branding project of the city initiated by the city hall of the municipality.
Throughout our paper we are going to provide answers to several questions: How
do first year students enrolled at Universitatea Babes-Bolyai perceive the city
in relation with Transylvania? How is Cluj-Napoca’s tourist potential
appreciated by other Romanians? How do Romanian local public authorities
understand to get involved in the branding processes of their cities? Are the
websites of the city halls used as communication tools in the promotion of
Romanian destinations? The results of our paper rely on the finding of two
different survey-based researches that we have undertaken in 2009, respectively
on a thorough analysis of the websites of the city halls of Romania’s county
residences.
Keywords:
City branding for Cluj-Napoca, Image promotion by the means of official
websites, Tourism and Public Administration
Full Paper, pp. 49-58
Design of Artificial Neural Network for Handwritten
Signature Recognition
by Debnath Bhattacharyya, Tai-Hoon Kim
Abstract:
Numerous approaches have been proposed for Handwritten Signature Identification
systems. Various successful domain specific applications using ANN (artificial
neural networks) can be found, but not flexible enough for generalization.
Besides all, one approach that has shown great promise is the use of ANN in the
Handwritten Signature Identification. To avoid forgery and ensure the
confidentiality of Information in the field of Information Technology Security
an inseparable part of it. In order to deal with security, Authentication plays
an important role. This paper presents a view on the signature recognition
technique and we also discussed about a technology of Signature Authentication
by Back-propagation Algorithm with application. The purpose of this technique is
to ensure that the rendered services are accessed only by a legitimate user, and
not anyone else. By using this method it is possible to confirm or establish an
individual’s identity. In this paper we explore a new recognition technique; an
ANN is trained to identify patterns among different supplied handwriting
samples. Handwritten signature samples are considered input for our artificial
neural network model and typically weights also supplied for recognition.
Keywords:
Recognition, neural network, signature, pattern recognition, authentication, and
security
Full Paper, pp. 59-66
Information System Supporting Spatial Decisio-Mmaking and
its Quality
by Jitka Komarkova, Miloslav Hub, Jana
Neumannova, Ondrej Visek
Abstract:
Decision-making is an important part of human’s life. Information systems should
highly support efficient decision making. Only well designed information systems
with a high level of a quality can provide this kind of service. Approach to
spatially-oriented information systems quality evaluation is described in the
article. Next, a case study – evaluation of a quality of a Web-based intranet
GIS application of a municipal authority, is described. In the end, obtained
results and lessons learned from the evaluation are stated and commented.
Keywords:
Spatial decision-making, Spatial decision support systems, Web-based GIS,
Intranet, Quality, Usability, Geographic information systems
Full Paper, pp. 31-38
A Modified Location Aided Routing Protocol for UWB MANET
by Jazyah Y., Hope M. D.
Abstract:
The Mobile Ad hoc Network (MANET) is a conventional ad hoc network; nodes within
the network are mobile, where each node is equipped with a transmitter and
receiver, antenna, and a local battery. Each node may operate as a router to
relay message from sender to receiver. Nodes within MANET are organized in
different manners, they can be hierarchical or flat, they can move in any
direction and speed, and communicate to each other by means of wireless routing
protocols. Now it is the time for Ultra-WideBand (UWB) to be given more
attention due to its great capability in high data rate, large Band Width (BW),
and low power consumption. Currently, hosts are equipped with UWB system in
order to achieve short range communication and exploit the previous mentioned
advantages, besides UWB has the ability to measure distance between hosts
accurately. As a result, researchers have been encouraged to design new routing
protocols for UWB networks to make it suitable for hosts to exploit features of
UWB, but still needs more and more work to overcome drawbacks of network such as
network overhead, power consumption, unreliable route, etc… The goal of this
work is to design and implement a new routing protocol for UWB network; the new
scheme aims to increase the life time of network, reduce network overhead, and
achieve route reliability. The new protocol is based on LAR scheme 1 and
exploits the request zone technique by defining several request zones in advance
in order to find route to destination. QualNet is used as environment to develop
and implement the new protocol. Results from simulator indicate that the new
protocol outperforms the comparable protocols (AODV and LAR1); it enhances the
life time of network, reduces the network overhead, and increases the throughput
as discussed later in this research.
Keywords:
MANET, UWB, Routing protocol, LAR
Full Paper, pp. 39-48
Architecture of an Auto Vaccination System for Handheld
Device and the Insecurity issues
by Tai-Hoon Kim
Abstract:
Diseases can be prevented by proper immunization procedures, however, with most
parents working in this generation and not most clinics pay much attention on
the individual planning and notifications of their patients, this research will
show a solution to such crucial issue. The research depicts an architectural
structure using mobile computing which will plot a chart of vaccination planner
synchronous with the parent’s personal planner so as to set a schedule amenable
to both the parties and a notification through will be generated. This will be a
tool for parents and assistance to clinics and hospitals catering vaccinations
shots for children.
Keywords:
Vaccination, Planner, Handheld Device, Security Threats, Vulnerability
Full Paper, pp. 67-74
Integration of Wireless SCADA through the Internet
by Tai-Hoon Kim
Abstract:
Supervisory Control and Data Acquisition systems collects data from various
sensors at a factory, plant or in other remote locations and then sends this
data to a central computer which then manages and controls the data.
Traditionally, SCADA was designed to be in a private network utilizing line
communication. As the scope becomes larger, and utilizing line communication
becomes impractical therefore integrating wireless communication to SCADA was
introduced. This work describes an Architecture of SCADA in wireless mode. The
transmission of communication through the internet, its advantages and
disadvantages are also discussed.
Keywords:
Control Systems, SCADA, Mobility, Wireless
Full Paper, pp. 75-82
Approximation Hierarchy Model approach into B-PLC based on
ATM
by Garrido A. G., Medel J. J. J.,
Sanchez G. J. C.
Abstract:
In this paper, we present applications using Broadband-Power Line Communications
(B-PLC) networks in low voltage conditions; improving multi-objective paths as a
function of base station (BS) and channel allocations (CA). Considering the
B-PLC network hierarchy model approach based on ATM Networks, we identified the
basis for Generalized Base Station Placement (GBSP), minimizing costs and
maximizing coverage as well as the Signal Noise Rate (SNR) and Channel Frequency
Response (CFR). The development of an Approximation Hierarchy Model considered
modulations aspects to achieve B-PLC operation. This work considers Frequency
Division Duplex/ over Time Division Duplex (FDD/TDD) and Time Division
Multiplexing Access (TDMA), within a B-PLC electrical network, and the SNR was
maintained without important variations. The behavior of different communication
channels of the same B-PLC network with different technology permitted observing
its complete compatibility.
Keywords:
MV-LV, networks, B-PLC, GBSP, SNR
Full Paper, pp. 83-90
Pareto Task Assignments by an Adaptive Quantum-based
Evolutionary Algorithm AQMEA
by Jerzy M. Balicki
Abstract:
Pareto distributed task assignments found by the AQMEA (Adaptive Quantum-based
Multi-criterion Evolutionary Algorithm) have been considered for computer
systems. A quantum chromosome representation with the registry of the smallest
units of quantum information has been applied. Evolutionary computing with Q-bit
chromosomes has been proofed to ensure the enhanced population diversity than
other representations, since individuals represent a linear superposition of
states probabilistically. Moreover, the multi-criterion task assignment problem
has been considered.
Keywords:
Quantum simulation, evolutionary algorithms, distributed systems,
multi-criterion optimization, artificial intelligence
Full Paper, pp. 91-100
Basic Authentication Procedure Modelled by Petri Nets
by J. Capek, M. Hub, R. Myskova
Abstract:
This paper presents modelling of the basic authentication procedure. The Petri
net technique as a tool was chosen in this study. Experiments were made with two
groups of models according the quantity of used attributes. One consists of
combination of the User name and Password with and/or without repeating. The
second group consist of the user name, password and biometrics with and/or
without repeating. The goal of this paper is to demonstrate that security
increasing with attributes quantity and decreasing with possibility to repeating
wrong sequence of symbols.
Keywords:
Authentication, biometrics, passwords, Petri nets, user name
Full Paper, pp. 101-108