Abstract ZigBee is a wireless technology, which provides low power consumption of devices in personal area network (WPAN) for low data rate applications that require long battery life and secure networking. ZigBee gives effective ways of supporting of QoS (Quality of Service), functionality and manageability, because ZigBee devices can transmit data over long distances (more than 100 meters) by passing data through a mesh network of intermediate devices to reach more distant ones. In this paper is proposed a simulation framework for ZigBee technology. It implements modified algorithm for the construction of a priority-based and energy-balanced WPAN network and visualize the method of transmission. The results of the conducted experiments are given.
{"title":"Simulation Framework for Realization of Priority-based ZigBee Network","authors":"V. Aleksieva","doi":"10.1515/itc-2017-0003","DOIUrl":"https://doi.org/10.1515/itc-2017-0003","url":null,"abstract":"Abstract ZigBee is a wireless technology, which provides low power consumption of devices in personal area network (WPAN) for low data rate applications that require long battery life and secure networking. ZigBee gives effective ways of supporting of QoS (Quality of Service), functionality and manageability, because ZigBee devices can transmit data over long distances (more than 100 meters) by passing data through a mesh network of intermediate devices to reach more distant ones. In this paper is proposed a simulation framework for ZigBee technology. It implements modified algorithm for the construction of a priority-based and energy-balanced WPAN network and visualize the method of transmission. The results of the conducted experiments are given.","PeriodicalId":336799,"journal":{"name":"Information Technologies and Control","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114999693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract It is generally observed throughout the world that in the last two decades, while the average speed of computers has almost doubled in a span of around eighteen months, the average speed of the network has doubled merely in a span of just eight months!. In order to improve the performance, more and more researchers are focusing their research in the field of computers and its related technologies. World Wide Web (WWW) acts as a medium for sharing of information. As a result, millions of applications run on the Internet and cause increased network traffic and put a great demand on the available network infrastructure. The slow retrieval of Web pages may reduce the user interest from accessing them. To deal with this problem Web caching and Web pre-fetching are used. This paper focuses on a methodology for improving the proxy-based Web caching system using Web mining. It integrates Web caching and Pre-fetching through an efficient clustering based pre-fetching technique.
{"title":"Improving the Performance of an Information Retrieval System through WEB Mining","authors":"V. Sathiyamoorthi","doi":"10.1515/itc-2017-0004","DOIUrl":"https://doi.org/10.1515/itc-2017-0004","url":null,"abstract":"Abstract It is generally observed throughout the world that in the last two decades, while the average speed of computers has almost doubled in a span of around eighteen months, the average speed of the network has doubled merely in a span of just eight months!. In order to improve the performance, more and more researchers are focusing their research in the field of computers and its related technologies. World Wide Web (WWW) acts as a medium for sharing of information. As a result, millions of applications run on the Internet and cause increased network traffic and put a great demand on the available network infrastructure. The slow retrieval of Web pages may reduce the user interest from accessing them. To deal with this problem Web caching and Web pre-fetching are used. This paper focuses on a methodology for improving the proxy-based Web caching system using Web mining. It integrates Web caching and Pre-fetching through an efficient clustering based pre-fetching technique.","PeriodicalId":336799,"journal":{"name":"Information Technologies and Control","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116997821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract This paper presents several mathematical methods for analysis of electrocardiogram digital data. The measurement of beat to beat fluctuations known as Heart Rate Variability becomes a non-invasive diagnostic technique to study the cardiac autonomic regulation. The analysis was done by software developed by the author. The article presents the results of linear methods, nonlinear methods and wavelet analysis of Heart Rate Variability data in healthy and diseased subjects. The obtained results and the performed comparative analysis demonstrate the possibility for effective application of the considered methods in new cardiovascular information systems.
{"title":"Application of Mathematical Methods for Analysis of Digital ECG Data","authors":"G. Georgieva-Tsaneva","doi":"10.1515/itc-2017-0005","DOIUrl":"https://doi.org/10.1515/itc-2017-0005","url":null,"abstract":"Abstract This paper presents several mathematical methods for analysis of electrocardiogram digital data. The measurement of beat to beat fluctuations known as Heart Rate Variability becomes a non-invasive diagnostic technique to study the cardiac autonomic regulation. The analysis was done by software developed by the author. The article presents the results of linear methods, nonlinear methods and wavelet analysis of Heart Rate Variability data in healthy and diseased subjects. The obtained results and the performed comparative analysis demonstrate the possibility for effective application of the considered methods in new cardiovascular information systems.","PeriodicalId":336799,"journal":{"name":"Information Technologies and Control","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124609762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract In this paper the developed two-wheeled robot and cascade LQR controller, Kalman filters, PI and PID controllers are presented. The cascade LQR controller stabilizes the two-wheeled robot in upright position. The PID controller ensures good tracking of wheel position reference and the PI controller steers two-wheeled robot rotation around the vertical axis. A software in MATLAB®/Simulink environment intended for design and generation of control code which is embedded in a Texas Instruments Digital Signal Controller is developed. Simulation and experimental results of system performance are given that confirm the efficiency of the control system developed.
{"title":"Design and Implementation of Cascade LQR Controller for Stabilization of Two-Wheeled Robot","authors":"T. Slavov, J. Kralev, P. Petkov","doi":"10.1515/itc-2016-0020","DOIUrl":"https://doi.org/10.1515/itc-2016-0020","url":null,"abstract":"Abstract In this paper the developed two-wheeled robot and cascade LQR controller, Kalman filters, PI and PID controllers are presented. The cascade LQR controller stabilizes the two-wheeled robot in upright position. The PID controller ensures good tracking of wheel position reference and the PI controller steers two-wheeled robot rotation around the vertical axis. A software in MATLAB®/Simulink environment intended for design and generation of control code which is embedded in a Texas Instruments Digital Signal Controller is developed. Simulation and experimental results of system performance are given that confirm the efficiency of the control system developed.","PeriodicalId":336799,"journal":{"name":"Information Technologies and Control","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract A new method for monitoring of bioprocess kinetics is developed where there exists a set of measured variables but the use of constant values of kinetic parameters is not acceptable. The method is based on new formalization of kinetics of biotechnological processes. It is generalized in one vector including unknown time-varying parameters only. For kinetics estimation, a general structure of software sensor is presented. A optimization procedure for tuning of the sensor’s parameters is proposed on the basis of stability and convergence analysis. The proposed method is applied for monitoring of bioprocesses for gluconic acid, alpha-amylase and ethanol production.
{"title":"Monitoring the Kinetics of Bioprocess Variables – Theory and Applications","authors":"V. Lyubenova","doi":"10.1515/itc-2016-0016","DOIUrl":"https://doi.org/10.1515/itc-2016-0016","url":null,"abstract":"Abstract A new method for monitoring of bioprocess kinetics is developed where there exists a set of measured variables but the use of constant values of kinetic parameters is not acceptable. The method is based on new formalization of kinetics of biotechnological processes. It is generalized in one vector including unknown time-varying parameters only. For kinetics estimation, a general structure of software sensor is presented. A optimization procedure for tuning of the sensor’s parameters is proposed on the basis of stability and convergence analysis. The proposed method is applied for monitoring of bioprocesses for gluconic acid, alpha-amylase and ethanol production.","PeriodicalId":336799,"journal":{"name":"Information Technologies and Control","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127752128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract This paper considers an approach to perform perturbation analysis of linear quadratic regulator (LQR) control problem for continuous-time descriptor systems. The investigated control problem is based on solving LMIs (Linear Matrix Inequalities) and applying Lyapunov functions. The paper is concerned with obtaining linear perturbation bounds for the continuous-time LQR control problem for descriptor systems. The computed perturbation bounds can be used to study the effect of perturbations in system and controller on feasibility and performance of the considered control problem. A numerical example is also presented in the paper.
{"title":"Perturbation Analysis of the LMI-Based Continuous-time Linear Quadratic Regulator Problem for Descriptor Systems","authors":"A. Yonchev","doi":"10.1515/itc-2016-0017","DOIUrl":"https://doi.org/10.1515/itc-2016-0017","url":null,"abstract":"Abstract This paper considers an approach to perform perturbation analysis of linear quadratic regulator (LQR) control problem for continuous-time descriptor systems. The investigated control problem is based on solving LMIs (Linear Matrix Inequalities) and applying Lyapunov functions. The paper is concerned with obtaining linear perturbation bounds for the continuous-time LQR control problem for descriptor systems. The computed perturbation bounds can be used to study the effect of perturbations in system and controller on feasibility and performance of the considered control problem. A numerical example is also presented in the paper.","PeriodicalId":336799,"journal":{"name":"Information Technologies and Control","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127060205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Digital signing of data in the Web-based IS is one of the most secure methods for guaranteeing the authenticity of data. Storage of user keys is particularly important for this methodology. The present development proposes a new algorithm for storage and usage of user keys for the database by the digital certificate of the client. The proposed methodology was designed for protection of data in a particular information system. One of the characteristics of this system is the great number of authorized users with rights for access and modification of various parts of data. With such systems it is extremely important to guarantee the authenticity of data stored in the system. Digital signing of data provides such guarantee of their authenticity.
{"title":"Digital Signing of Data in the Web-based Information Systems","authors":"D. Pilev","doi":"10.1515/itc-2016-0018","DOIUrl":"https://doi.org/10.1515/itc-2016-0018","url":null,"abstract":"Abstract Digital signing of data in the Web-based IS is one of the most secure methods for guaranteeing the authenticity of data. Storage of user keys is particularly important for this methodology. The present development proposes a new algorithm for storage and usage of user keys for the database by the digital certificate of the client. The proposed methodology was designed for protection of data in a particular information system. One of the characteristics of this system is the great number of authorized users with rights for access and modification of various parts of data. With such systems it is extremely important to guarantee the authenticity of data stored in the system. Digital signing of data provides such guarantee of their authenticity.","PeriodicalId":336799,"journal":{"name":"Information Technologies and Control","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123311640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract This paper considers the problem of model order reduction by transforming the system into input and output normal forms. The reachability gramian in the input normal form is the identity matrix and the observability gramian is a diagonal matrix. Conversely, the observability gramian in the output normal form is the identity matrix and the reachability gramian is a diagonal matrix. The elements of the non-identity diagonal gramians in both normal forms are the squares of the system Hankel singular values. This fact determines the equivalent role which both normal forms play in model order reduction. The implemented projection is nearly orthogonal up to a scaling with the elements of a diagonal matrix. In the paper are shown the relations between the transformed system descriptions and the reachability and observability operators. Major influence for the output energy distribution in the input normal form has the observability operator, while the input energy is uniformly distributed. Alternatively, the input energy distribution in the output normal form is due to the reachability operator action, while the output energy is uniformly distributed. Several experiments are performed confirming the equivalent role of the input and output normal forms in the procedures of system approximation.
{"title":"Input and Output Normal Forms for Model Order Reduction of Linear Systems","authors":"K. Perev","doi":"10.1515/itc-2016-0013","DOIUrl":"https://doi.org/10.1515/itc-2016-0013","url":null,"abstract":"Abstract This paper considers the problem of model order reduction by transforming the system into input and output normal forms. The reachability gramian in the input normal form is the identity matrix and the observability gramian is a diagonal matrix. Conversely, the observability gramian in the output normal form is the identity matrix and the reachability gramian is a diagonal matrix. The elements of the non-identity diagonal gramians in both normal forms are the squares of the system Hankel singular values. This fact determines the equivalent role which both normal forms play in model order reduction. The implemented projection is nearly orthogonal up to a scaling with the elements of a diagonal matrix. In the paper are shown the relations between the transformed system descriptions and the reachability and observability operators. Major influence for the output energy distribution in the input normal form has the observability operator, while the input energy is uniformly distributed. Alternatively, the input energy distribution in the output normal form is due to the reachability operator action, while the output energy is uniformly distributed. Several experiments are performed confirming the equivalent role of the input and output normal forms in the procedures of system approximation.","PeriodicalId":336799,"journal":{"name":"Information Technologies and Control","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126106200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract This paper presents three methods for multiscale indexing of the content of projection data of computed tomography images in the CBIR-systems for medical database search. The feature spaces in the developed algorithms have been created by means of, respectively: Discrete Stationary Wavelet Transform (DSWT), Shearlet Transform (ST) and Repagulum Wavelet Transform (RWT). A comparative analysis and assessment of the proposed algorithms have been carried out based on experimental studies with computed tomography images.
{"title":"Multiscale Spectral Methods for Data Indexing in a Radon Space","authors":"M. Petrov","doi":"10.1515/itc-2016-0011","DOIUrl":"https://doi.org/10.1515/itc-2016-0011","url":null,"abstract":"Abstract This paper presents three methods for multiscale indexing of the content of projection data of computed tomography images in the CBIR-systems for medical database search. The feature spaces in the developed algorithms have been created by means of, respectively: Discrete Stationary Wavelet Transform (DSWT), Shearlet Transform (ST) and Repagulum Wavelet Transform (RWT). A comparative analysis and assessment of the proposed algorithms have been carried out based on experimental studies with computed tomography images.","PeriodicalId":336799,"journal":{"name":"Information Technologies and Control","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130422912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract A new network flow method is proposed in this work for optimal distribution of risk between the different sections (arcs) of the network. It is supposed at that that the maximum admissible risks on the arcs are known in advance. This provides a possibility these values to be considered as arc capacities and the risk itself as a network flow. Such an approach lets the maximal admissible risk to be determined on the network on the base of the well-known mincut-maxflow theorem as well as the minimal cut. Three different numerical examples are given through which the possibility of the method being proposed is confirmed in the real practices.
{"title":"Optimal Control of the Flow of Risk on Networks","authors":"V. Sgurev, S. Drangajov","doi":"10.1515/itc-2016-0014","DOIUrl":"https://doi.org/10.1515/itc-2016-0014","url":null,"abstract":"Abstract A new network flow method is proposed in this work for optimal distribution of risk between the different sections (arcs) of the network. It is supposed at that that the maximum admissible risks on the arcs are known in advance. This provides a possibility these values to be considered as arc capacities and the risk itself as a network flow. Such an approach lets the maximal admissible risk to be determined on the network on the base of the well-known mincut-maxflow theorem as well as the minimal cut. Three different numerical examples are given through which the possibility of the method being proposed is confirmed in the real practices.","PeriodicalId":336799,"journal":{"name":"Information Technologies and Control","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134578795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}