Many works have been done for secure computation of functions. Most of them assume computation on computers. The protocols are difficult for the people who has no knowledge on cryptography. Therefore, secure computation using cards was considered. Since nothing other than the cards are used, the protocols are easy to understand for the people who has no knowledge on cryptography. This paper presents a card-based protocol that generates a random hidden permutation. This problem is applicable to a case when players exchange gifts. The protocol must not output a permutation with a fixed point, which means that every player does not receive the gift he/she prepared. Ishikawa et. al proposed a protocol with two-color cards using random shuffles and a proof of having no fixed points. However, the success probability of the protocol is not so high. Therefore, more efficient random permutation protocol is required. In this paper, we use cyclic shuffles in addition to the random shuffles to lower the possibility of fixed points. We show the success probability of obtaining a permutation without fixed points by our protocol is better than the one by the existing protocol.
{"title":"A More Efficient Card-Based Protocol for Generating a Random Permutation without Fixed Points","authors":"Takuya Ibaraki, Yoshifumi Manabe","doi":"10.1109/MCSI.2016.054","DOIUrl":"https://doi.org/10.1109/MCSI.2016.054","url":null,"abstract":"Many works have been done for secure computation of functions. Most of them assume computation on computers. The protocols are difficult for the people who has no knowledge on cryptography. Therefore, secure computation using cards was considered. Since nothing other than the cards are used, the protocols are easy to understand for the people who has no knowledge on cryptography. This paper presents a card-based protocol that generates a random hidden permutation. This problem is applicable to a case when players exchange gifts. The protocol must not output a permutation with a fixed point, which means that every player does not receive the gift he/she prepared. Ishikawa et. al proposed a protocol with two-color cards using random shuffles and a proof of having no fixed points. However, the success probability of the protocol is not so high. Therefore, more efficient random permutation protocol is required. In this paper, we use cyclic shuffles in addition to the random shuffles to lower the possibility of fixed points. We show the success probability of obtaining a permutation without fixed points by our protocol is better than the one by the existing protocol.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The data series from several gauging stations on the Lena River are considered. The difference of the water temperature between Kusur station and 200 kilometers downstream to the north Habarova station often becomes anomaly large during open water season (June-September). The analysis of the observational data is presented. The non-representativeness of measurements on Kusur station is supposed, reconstruction of the real temperature regime on the base of the statistical and deterministic modeling as well as the optimization tools is carried out.
{"title":"Numerical Analysis and Reconstruction of the Temperature Regime of the Lena River Segment","authors":"Segmentigor Zhilyaev, V. Fofonova","doi":"10.1109/MCSI.2016.049","DOIUrl":"https://doi.org/10.1109/MCSI.2016.049","url":null,"abstract":"The data series from several gauging stations on the Lena River are considered. The difference of the water temperature between Kusur station and 200 kilometers downstream to the north Habarova station often becomes anomaly large during open water season (June-September). The analysis of the observational data is presented. The non-representativeness of measurements on Kusur station is supposed, reconstruction of the real temperature regime on the base of the statistical and deterministic modeling as well as the optimization tools is carried out.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131151173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mingyue Ding, Jinxiao Huang, Jiazhen Li, N. Mastorakis, X. Zhuang
With the intelligent development of the power system, load identification becomes an important task. A noninvasive household load identification method is proposed in this paper, which can be used to detect the load switching moments and identify the types of loads. A calculation method of feature value is proposed based on active power. A template method is proposed to detect the jumping of the feature curve, which can determine the load switching moments robustly and accurately. The types of loads can be identified by a threshold value method. The results show that the method can accurately determine the load switching moments and identify the types of loads, and it also has good robustness.
{"title":"Real-Time Load Identification by Active Power Feature Extraction and Switching Detection","authors":"Mingyue Ding, Jinxiao Huang, Jiazhen Li, N. Mastorakis, X. Zhuang","doi":"10.1109/MCSI.2016.030","DOIUrl":"https://doi.org/10.1109/MCSI.2016.030","url":null,"abstract":"With the intelligent development of the power system, load identification becomes an important task. A noninvasive household load identification method is proposed in this paper, which can be used to detect the load switching moments and identify the types of loads. A calculation method of feature value is proposed based on active power. A template method is proposed to detect the jumping of the feature curve, which can determine the load switching moments robustly and accurately. The types of loads can be identified by a threshold value method. The results show that the method can accurately determine the load switching moments and identify the types of loads, and it also has good robustness.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123266665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Al-Sudani Mustafa Qahtan Abdulmunem, V. Kharchenko
The information and control system of smart building is considered as a set of subsystems including a building automation system (BAS). BAS security and availability during its life cycle are assessed using the Attack Tree Analysis (ATA) and Markov models. The ATA is applied to investigate any intrusions into the BAS by analyzing system probability of a fault/vulnerability to occur during period of time depending on failure probability of its subsystems. Markov model is used to calculate BAS availability considering the possibility of recovery and different kinds of the faults.
{"title":"Availability and Security Assessment of Smart Building Automation Systems: Combining of Attack Tree Analysis and Markov Models","authors":"Al-Sudani Mustafa Qahtan Abdulmunem, V. Kharchenko","doi":"10.1109/MCSI.2016.062","DOIUrl":"https://doi.org/10.1109/MCSI.2016.062","url":null,"abstract":"The information and control system of smart building is considered as a set of subsystems including a building automation system (BAS). BAS security and availability during its life cycle are assessed using the Attack Tree Analysis (ATA) and Markov models. The ATA is applied to investigate any intrusions into the BAS by analyzing system probability of a fault/vulnerability to occur during period of time depending on failure probability of its subsystems. Markov model is used to calculate BAS availability considering the possibility of recovery and different kinds of the faults.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a Web application that was developed at our faculty last year. This application visualizes the results of monitoring traffic in city centers. The method of visualization is performed by using of interactive graphs. Complex JavaScript components were designed in order to encapsulate the selected technology that works with charts in a Web environment. The application is designed as an independent library that can be easily implemented into other programs and used as its graphical visualization solutions in these applications. The design and complete implementation are performed with a respect to use it in the real environment and data processing in the field of traffic monitoring.
{"title":"Graphics Visualization of Specific Dashboards in Transport Technologies","authors":"P. Pokorný, Kamil Stokláska","doi":"10.1109/MCSI.2016.045","DOIUrl":"https://doi.org/10.1109/MCSI.2016.045","url":null,"abstract":"This paper describes a Web application that was developed at our faculty last year. This application visualizes the results of monitoring traffic in city centers. The method of visualization is performed by using of interactive graphs. Complex JavaScript components were designed in order to encapsulate the selected technology that works with charts in a Web environment. The application is designed as an independent library that can be easily implemented into other programs and used as its graphical visualization solutions in these applications. The design and complete implementation are performed with a respect to use it in the real environment and data processing in the field of traffic monitoring.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 1963 E.Lorenz discovered strange attractors, which correspond to the turbulence in liquids and atmosphere. In the second half of the 20-th century these attractors were described in electromechanical and electronical systems. In this time the well-known scientists created the methods of estimates of attractor dimension in the theory of dynamical systems and differential equations. Lyapunov function has been introduced in the estimates of this attractors in the last two decades. In this paper new classes of Lyapunov functions for the Lorenz-like systems are constructed and Lyapunov dimension formulas are obtained.
{"title":"Lyapunov Dimension of Attractors of the Lorenz-Like Differential Equations","authors":"G. Leonov, S. Seledzhi","doi":"10.1109/MCSI.2016.032","DOIUrl":"https://doi.org/10.1109/MCSI.2016.032","url":null,"abstract":"In 1963 E.Lorenz discovered strange attractors, which correspond to the turbulence in liquids and atmosphere. In the second half of the 20-th century these attractors were described in electromechanical and electronical systems. In this time the well-known scientists created the methods of estimates of attractor dimension in the theory of dynamical systems and differential equations. Lyapunov function has been introduced in the estimates of this attractors in the last two decades. In this paper new classes of Lyapunov functions for the Lorenz-like systems are constructed and Lyapunov dimension formulas are obtained.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"825 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120879193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Symeonaki, M. Papoutsidakis, D. Tseles, M. Sigala
The implementation of Management Information Systems (MIS) in educational management and administration is a relatively innovative field which is rapidly evolving because of its high efficiency and effectiveness. There is a relatively small number of research studies reported in the literature evaluating MIS implementations in universities. This case study focuses on the post-implementation evaluation of a Student Information System at Piraeus University of Applied Sciences. As it has been recognized that user satisfaction affects in a great extent the success of information systems, this study aims to derive student users' overall perceptions to the effectiveness of PUAS Student Information System. The methodology used to perform the research was based on D&M IS success and technology acceptance (TAM) models as well as Wixom and Todd framework. A thorough evaluation of the system was conducted by processing and analyzing the research objectives scores, the comment responses, and the respondents' demographic profiles. The research took place during the spring semester of Academic Year 2015-2016 and the sample included students of all PUAS departments. The outcomes of the research suggest that PUAS and its academic community could be greatly benefitted by the implementation of the Student Information System in terms of strategy planning, distributing resources as well as organizational success. Finally, it became clear that constant participative evaluation actions, integrated into the project management process are essential for the future success of PUAS Information System.
{"title":"Post-Implementation Evaluation of a University Management Information System (UMIS)","authors":"E. Symeonaki, M. Papoutsidakis, D. Tseles, M. Sigala","doi":"10.1109/MCSI.2016.014","DOIUrl":"https://doi.org/10.1109/MCSI.2016.014","url":null,"abstract":"The implementation of Management Information Systems (MIS) in educational management and administration is a relatively innovative field which is rapidly evolving because of its high efficiency and effectiveness. There is a relatively small number of research studies reported in the literature evaluating MIS implementations in universities. This case study focuses on the post-implementation evaluation of a Student Information System at Piraeus University of Applied Sciences. As it has been recognized that user satisfaction affects in a great extent the success of information systems, this study aims to derive student users' overall perceptions to the effectiveness of PUAS Student Information System. The methodology used to perform the research was based on D&M IS success and technology acceptance (TAM) models as well as Wixom and Todd framework. A thorough evaluation of the system was conducted by processing and analyzing the research objectives scores, the comment responses, and the respondents' demographic profiles. The research took place during the spring semester of Academic Year 2015-2016 and the sample included students of all PUAS departments. The outcomes of the research suggest that PUAS and its academic community could be greatly benefitted by the implementation of the Student Information System in terms of strategy planning, distributing resources as well as organizational success. Finally, it became clear that constant participative evaluation actions, integrated into the project management process are essential for the future success of PUAS Information System.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Problems of safety and security follows the people whole civilization evolution. Nowadays, many kinds of safety or security exist. During the constitution each kind of safety or security, procedure was pragmatic and assigned. Practice overturns theory. Now, there is a time, when we are able to make generalization and also create the theory of safety and security. This theory should be applied for each field of safety or security. As the part of kind of safety or security, there are models for ensuring safety or security issues. For example, the physical security is ensured through individual protection, known as barriers. Barrier ensures functions of retentions. In the article are analyzed the common theoretical models for ensuring safety and security.
{"title":"The Key Theoretical Models for the Safety and Security Ensuring","authors":"L. Lukás, M. Hromada, Lukáš Pavlík","doi":"10.1109/MCSI.2016.022","DOIUrl":"https://doi.org/10.1109/MCSI.2016.022","url":null,"abstract":"Problems of safety and security follows the people whole civilization evolution. Nowadays, many kinds of safety or security exist. During the constitution each kind of safety or security, procedure was pragmatic and assigned. Practice overturns theory. Now, there is a time, when we are able to make generalization and also create the theory of safety and security. This theory should be applied for each field of safety or security. As the part of kind of safety or security, there are models for ensuring safety or security issues. For example, the physical security is ensured through individual protection, known as barriers. Barrier ensures functions of retentions. In the article are analyzed the common theoretical models for ensuring safety and security.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123200150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With all features and resources, such as: social actors, social relations, content, communication, and ratings that todays' social networks like Facebook, LinkedIn, Twitter, Google+, etc. offer to users, it still appears that at given point we have to refine and optimize our own accounts within the limits of a certain social network. In line with this trend, in this paper we present a model for efficient management of friends list in Facebook, as one of the limited resource in this social network. In order to get users data from Facebook, a web scraping technique combined with reverse image search has been adopted to ensure users authenticity. The activity between nodes (friends) on a social network is calculated based on their interactions in terms of likes, comments, shares and posts between each other. This approach led us into designing and implementing an algorithm based in these collaborative metrics, named "weight of relationship". This algorithm calculates weights between friends on a network, and the results are evaluated by comparing these weights with respondent answers, conducted through personalized questionnaire. Consequently, this methodology brings feasible results, with an average accuracy of 71% on recommending which friends should be removed, thus releasing the space for incoming new friends. An app named RateMyFriends is developed based on presented approach.
{"title":"Using Collaborative Based Algorithm for Efficient Management of Limited Resources on Social Networks","authors":"Valon Xhafa, Korab Rrmoku, Blerim Rexha","doi":"10.1109/MCSI.2016.060","DOIUrl":"https://doi.org/10.1109/MCSI.2016.060","url":null,"abstract":"With all features and resources, such as: social actors, social relations, content, communication, and ratings that todays' social networks like Facebook, LinkedIn, Twitter, Google+, etc. offer to users, it still appears that at given point we have to refine and optimize our own accounts within the limits of a certain social network. In line with this trend, in this paper we present a model for efficient management of friends list in Facebook, as one of the limited resource in this social network. In order to get users data from Facebook, a web scraping technique combined with reverse image search has been adopted to ensure users authenticity. The activity between nodes (friends) on a social network is calculated based on their interactions in terms of likes, comments, shares and posts between each other. This approach led us into designing and implementing an algorithm based in these collaborative metrics, named \"weight of relationship\". This algorithm calculates weights between friends on a network, and the results are evaluated by comparing these weights with respondent answers, conducted through personalized questionnaire. Consequently, this methodology brings feasible results, with an average accuracy of 71% on recommending which friends should be removed, thus releasing the space for incoming new friends. An app named RateMyFriends is developed based on presented approach.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, two transit problems which pass through the ε-neighborhood of some given objective states in turn from an arbitrary initial state will be studied for both continuous-time and discrete-time switched linear systems with constant input. At first the quadratic stabilization problem for continuous-time switched linear systems with constant input will be investigated. Next, the same problem for discrete-time switched linear systems with constant input will be studied. After that two ε-transit problems by using switched linear systems with constant input via state-dependent switching will be formulated, and then solvability conditions will be given. Further, two illustrative numerical examples will be shown.
{"title":"Quadratic Stabilization and Transit Problems for Switched Linear Systems via State Feedback","authors":"N. Otsuka, Shota Sekiguchi","doi":"10.1109/MCSI.2016.033","DOIUrl":"https://doi.org/10.1109/MCSI.2016.033","url":null,"abstract":"In this paper, two transit problems which pass through the ε-neighborhood of some given objective states in turn from an arbitrary initial state will be studied for both continuous-time and discrete-time switched linear systems with constant input. At first the quadratic stabilization problem for continuous-time switched linear systems with constant input will be investigated. Next, the same problem for discrete-time switched linear systems with constant input will be studied. After that two ε-transit problems by using switched linear systems with constant input via state-dependent switching will be formulated, and then solvability conditions will be given. Further, two illustrative numerical examples will be shown.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}