首页 > 最新文献

2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)最新文献

英文 中文
A More Efficient Card-Based Protocol for Generating a Random Permutation without Fixed Points 一种更有效的无固定点随机排列生成卡牌协议
Takuya Ibaraki, Yoshifumi Manabe
Many works have been done for secure computation of functions. Most of them assume computation on computers. The protocols are difficult for the people who has no knowledge on cryptography. Therefore, secure computation using cards was considered. Since nothing other than the cards are used, the protocols are easy to understand for the people who has no knowledge on cryptography. This paper presents a card-based protocol that generates a random hidden permutation. This problem is applicable to a case when players exchange gifts. The protocol must not output a permutation with a fixed point, which means that every player does not receive the gift he/she prepared. Ishikawa et. al proposed a protocol with two-color cards using random shuffles and a proof of having no fixed points. However, the success probability of the protocol is not so high. Therefore, more efficient random permutation protocol is required. In this paper, we use cyclic shuffles in addition to the random shuffles to lower the possibility of fixed points. We show the success probability of obtaining a permutation without fixed points by our protocol is better than the one by the existing protocol.
在函数的安全计算方面已经做了大量的工作。它们中的大多数都假定计算机可以进行计算。协议对于没有密码学知识的人来说是很难的。因此,考虑使用卡片进行安全计算。由于只使用卡片,所以对于没有密码学知识的人来说,协议很容易理解。本文提出了一种基于卡片的协议,可以生成随机隐藏排列。这个问题适用于玩家交换礼物的情况。协议不能输出带有固定点的排列,这意味着每个玩家都不能收到他/她所准备的礼物。Ishikawa等人提出了一种使用随机洗牌的双色牌协议和无固定点的证明。然而,该协议的成功概率并不是很高。因此,需要更高效的随机置换协议。在本文中,除了随机洗牌外,我们还使用循环洗牌来降低不动点的可能性。我们证明了用我们的协议获得不动点排列的成功概率比用现有协议获得不动点排列的成功概率高。
{"title":"A More Efficient Card-Based Protocol for Generating a Random Permutation without Fixed Points","authors":"Takuya Ibaraki, Yoshifumi Manabe","doi":"10.1109/MCSI.2016.054","DOIUrl":"https://doi.org/10.1109/MCSI.2016.054","url":null,"abstract":"Many works have been done for secure computation of functions. Most of them assume computation on computers. The protocols are difficult for the people who has no knowledge on cryptography. Therefore, secure computation using cards was considered. Since nothing other than the cards are used, the protocols are easy to understand for the people who has no knowledge on cryptography. This paper presents a card-based protocol that generates a random hidden permutation. This problem is applicable to a case when players exchange gifts. The protocol must not output a permutation with a fixed point, which means that every player does not receive the gift he/she prepared. Ishikawa et. al proposed a protocol with two-color cards using random shuffles and a proof of having no fixed points. However, the success probability of the protocol is not so high. Therefore, more efficient random permutation protocol is required. In this paper, we use cyclic shuffles in addition to the random shuffles to lower the possibility of fixed points. We show the success probability of obtaining a permutation without fixed points by our protocol is better than the one by the existing protocol.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Numerical Analysis and Reconstruction of the Temperature Regime of the Lena River Segment 勒拿河段温度变化的数值分析与重建
Segmentigor Zhilyaev, V. Fofonova
The data series from several gauging stations on the Lena River are considered. The difference of the water temperature between Kusur station and 200 kilometers downstream to the north Habarova station often becomes anomaly large during open water season (June-September). The analysis of the observational data is presented. The non-representativeness of measurements on Kusur station is supposed, reconstruction of the real temperature regime on the base of the statistical and deterministic modeling as well as the optimization tools is carried out.
考虑了勒拿河上多个测量站的数据序列。在开放水域季节(6 - 9月),库苏尔站与Habarova站以北下游200公里处的水温差往往异常大。对观测资料进行了分析。针对库苏尔站实测数据的不代表性,在统计和确定性建模的基础上,利用优化工具对库苏尔站的实际温度状况进行了重建。
{"title":"Numerical Analysis and Reconstruction of the Temperature Regime of the Lena River Segment","authors":"Segmentigor Zhilyaev, V. Fofonova","doi":"10.1109/MCSI.2016.049","DOIUrl":"https://doi.org/10.1109/MCSI.2016.049","url":null,"abstract":"The data series from several gauging stations on the Lena River are considered. The difference of the water temperature between Kusur station and 200 kilometers downstream to the north Habarova station often becomes anomaly large during open water season (June-September). The analysis of the observational data is presented. The non-representativeness of measurements on Kusur station is supposed, reconstruction of the real temperature regime on the base of the statistical and deterministic modeling as well as the optimization tools is carried out.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131151173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real-Time Load Identification by Active Power Feature Extraction and Switching Detection 基于有功功率特征提取和开关检测的实时负荷识别
Mingyue Ding, Jinxiao Huang, Jiazhen Li, N. Mastorakis, X. Zhuang
With the intelligent development of the power system, load identification becomes an important task. A noninvasive household load identification method is proposed in this paper, which can be used to detect the load switching moments and identify the types of loads. A calculation method of feature value is proposed based on active power. A template method is proposed to detect the jumping of the feature curve, which can determine the load switching moments robustly and accurately. The types of loads can be identified by a threshold value method. The results show that the method can accurately determine the load switching moments and identify the types of loads, and it also has good robustness.
随着电力系统智能化的发展,负荷识别成为一项重要的任务。本文提出了一种无创家庭负荷识别方法,可用于检测负荷切换力矩,识别负荷类型。提出了一种基于有功功率的特征值计算方法。提出了一种检测特征曲线跳变的模板方法,可以鲁棒准确地确定负荷切换矩。负载的类型可以通过阈值方法来识别。结果表明,该方法能够准确地确定负载切换力矩和识别负载类型,并具有较好的鲁棒性。
{"title":"Real-Time Load Identification by Active Power Feature Extraction and Switching Detection","authors":"Mingyue Ding, Jinxiao Huang, Jiazhen Li, N. Mastorakis, X. Zhuang","doi":"10.1109/MCSI.2016.030","DOIUrl":"https://doi.org/10.1109/MCSI.2016.030","url":null,"abstract":"With the intelligent development of the power system, load identification becomes an important task. A noninvasive household load identification method is proposed in this paper, which can be used to detect the load switching moments and identify the types of loads. A calculation method of feature value is proposed based on active power. A template method is proposed to detect the jumping of the feature curve, which can determine the load switching moments robustly and accurately. The types of loads can be identified by a threshold value method. The results show that the method can accurately determine the load switching moments and identify the types of loads, and it also has good robustness.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123266665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Availability and Security Assessment of Smart Building Automation Systems: Combining of Attack Tree Analysis and Markov Models 智能楼宇自动化系统的可用性与安全性评估:攻击树分析与马尔可夫模型的结合
Al-Sudani Mustafa Qahtan Abdulmunem, V. Kharchenko
The information and control system of smart building is considered as a set of subsystems including a building automation system (BAS). BAS security and availability during its life cycle are assessed using the Attack Tree Analysis (ATA) and Markov models. The ATA is applied to investigate any intrusions into the BAS by analyzing system probability of a fault/vulnerability to occur during period of time depending on failure probability of its subsystems. Markov model is used to calculate BAS availability considering the possibility of recovery and different kinds of the faults.
智能建筑的信息与控制系统是包括楼宇自动化系统(BAS)在内的一系列子系统的集合。利用攻击树分析(ATA)和马尔可夫模型对BAS生命周期内的安全性和可用性进行评估。根据系统子系统的故障概率,分析系统在一段时间内发生故障/漏洞的概率,从而应用ATA来调查对BAS的任何入侵。采用马尔可夫模型计算BAS的可用性,考虑了系统恢复的可能性和不同类型的故障。
{"title":"Availability and Security Assessment of Smart Building Automation Systems: Combining of Attack Tree Analysis and Markov Models","authors":"Al-Sudani Mustafa Qahtan Abdulmunem, V. Kharchenko","doi":"10.1109/MCSI.2016.062","DOIUrl":"https://doi.org/10.1109/MCSI.2016.062","url":null,"abstract":"The information and control system of smart building is considered as a set of subsystems including a building automation system (BAS). BAS security and availability during its life cycle are assessed using the Attack Tree Analysis (ATA) and Markov models. The ATA is applied to investigate any intrusions into the BAS by analyzing system probability of a fault/vulnerability to occur during period of time depending on failure probability of its subsystems. Markov model is used to calculate BAS availability considering the possibility of recovery and different kinds of the faults.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Graphics Visualization of Specific Dashboards in Transport Technologies 运输技术中特定仪表板的图形可视化
P. Pokorný, Kamil Stokláska
This paper describes a Web application that was developed at our faculty last year. This application visualizes the results of monitoring traffic in city centers. The method of visualization is performed by using of interactive graphs. Complex JavaScript components were designed in order to encapsulate the selected technology that works with charts in a Web environment. The application is designed as an independent library that can be easily implemented into other programs and used as its graphical visualization solutions in these applications. The design and complete implementation are performed with a respect to use it in the real environment and data processing in the field of traffic monitoring.
本文描述了我们学院去年开发的一个Web应用程序。这个应用程序将城市中心的交通监控结果可视化。采用交互式图形的方法实现可视化。设计复杂的JavaScript组件是为了封装在Web环境中与图表一起工作的选定技术。该应用程序被设计为一个独立的库,可以很容易地实现到其他程序中,并在这些应用程序中用作其图形可视化解决方案。针对该系统在实际环境中的应用和交通监控领域的数据处理进行了设计和完整的实现。
{"title":"Graphics Visualization of Specific Dashboards in Transport Technologies","authors":"P. Pokorný, Kamil Stokláska","doi":"10.1109/MCSI.2016.045","DOIUrl":"https://doi.org/10.1109/MCSI.2016.045","url":null,"abstract":"This paper describes a Web application that was developed at our faculty last year. This application visualizes the results of monitoring traffic in city centers. The method of visualization is performed by using of interactive graphs. Complex JavaScript components were designed in order to encapsulate the selected technology that works with charts in a Web environment. The application is designed as an independent library that can be easily implemented into other programs and used as its graphical visualization solutions in these applications. The design and complete implementation are performed with a respect to use it in the real environment and data processing in the field of traffic monitoring.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lyapunov Dimension of Attractors of the Lorenz-Like Differential Equations 类洛伦兹微分方程吸引子的Lyapunov维
G. Leonov, S. Seledzhi
In 1963 E.Lorenz discovered strange attractors, which correspond to the turbulence in liquids and atmosphere. In the second half of the 20-th century these attractors were described in electromechanical and electronical systems. In this time the well-known scientists created the methods of estimates of attractor dimension in the theory of dynamical systems and differential equations. Lyapunov function has been introduced in the estimates of this attractors in the last two decades. In this paper new classes of Lyapunov functions for the Lorenz-like systems are constructed and Lyapunov dimension formulas are obtained.
1963年,洛伦兹发现了奇怪的吸引子,它与液体和大气中的湍流相对应。在20世纪下半叶,这些吸引子在机电和电子系统中被描述。在这一时期,著名的科学家在动力系统理论和微分方程中创造了估计吸引子维数的方法。李雅普诺夫函数在过去的二十年中被引入到吸引子的估计中。本文构造了一类新的类洛伦兹系统的李雅普诺夫函数,并得到了李雅普诺夫维数公式。
{"title":"Lyapunov Dimension of Attractors of the Lorenz-Like Differential Equations","authors":"G. Leonov, S. Seledzhi","doi":"10.1109/MCSI.2016.032","DOIUrl":"https://doi.org/10.1109/MCSI.2016.032","url":null,"abstract":"In 1963 E.Lorenz discovered strange attractors, which correspond to the turbulence in liquids and atmosphere. In the second half of the 20-th century these attractors were described in electromechanical and electronical systems. In this time the well-known scientists created the methods of estimates of attractor dimension in the theory of dynamical systems and differential equations. Lyapunov function has been introduced in the estimates of this attractors in the last two decades. In this paper new classes of Lyapunov functions for the Lorenz-like systems are constructed and Lyapunov dimension formulas are obtained.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"825 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120879193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Post-Implementation Evaluation of a University Management Information System (UMIS) 大学管理信息系统(UMIS)实施后评估
E. Symeonaki, M. Papoutsidakis, D. Tseles, M. Sigala
The implementation of Management Information Systems (MIS) in educational management and administration is a relatively innovative field which is rapidly evolving because of its high efficiency and effectiveness. There is a relatively small number of research studies reported in the literature evaluating MIS implementations in universities. This case study focuses on the post-implementation evaluation of a Student Information System at Piraeus University of Applied Sciences. As it has been recognized that user satisfaction affects in a great extent the success of information systems, this study aims to derive student users' overall perceptions to the effectiveness of PUAS Student Information System. The methodology used to perform the research was based on D&M IS success and technology acceptance (TAM) models as well as Wixom and Todd framework. A thorough evaluation of the system was conducted by processing and analyzing the research objectives scores, the comment responses, and the respondents' demographic profiles. The research took place during the spring semester of Academic Year 2015-2016 and the sample included students of all PUAS departments. The outcomes of the research suggest that PUAS and its academic community could be greatly benefitted by the implementation of the Student Information System in terms of strategy planning, distributing resources as well as organizational success. Finally, it became clear that constant participative evaluation actions, integrated into the project management process are essential for the future success of PUAS Information System.
管理信息系统(MIS)在教育管理和行政管理中的实施是一个相对创新的领域,由于其高效率和有效性而迅速发展。有相对较少的研究报告在文献评估管理信息系统在大学的实施。本案例研究的重点是比雷埃夫斯应用科学大学学生信息系统的实施后评估。由于人们已经认识到用户满意度在很大程度上影响了信息系统的成功,本研究旨在得出学生用户对PUAS学生信息系统有效性的总体看法。用于执行研究的方法是基于D&M IS成功和技术接受(TAM)模型以及Wixom和Todd框架。通过处理和分析研究目标得分、评论回复和受访者的人口统计资料,对该系统进行了彻底的评估。该研究在2015-2016学年春季学期进行,样本包括PUAS所有院系的学生。本研究结果显示,实施学生资讯系统,可使大学院校及其学术团体在策略规划、资源分配及组织成功等方面受惠。最后,很明显,持续的参与性评价行动,整合到项目管理过程中,对于PUAS信息系统未来的成功至关重要。
{"title":"Post-Implementation Evaluation of a University Management Information System (UMIS)","authors":"E. Symeonaki, M. Papoutsidakis, D. Tseles, M. Sigala","doi":"10.1109/MCSI.2016.014","DOIUrl":"https://doi.org/10.1109/MCSI.2016.014","url":null,"abstract":"The implementation of Management Information Systems (MIS) in educational management and administration is a relatively innovative field which is rapidly evolving because of its high efficiency and effectiveness. There is a relatively small number of research studies reported in the literature evaluating MIS implementations in universities. This case study focuses on the post-implementation evaluation of a Student Information System at Piraeus University of Applied Sciences. As it has been recognized that user satisfaction affects in a great extent the success of information systems, this study aims to derive student users' overall perceptions to the effectiveness of PUAS Student Information System. The methodology used to perform the research was based on D&M IS success and technology acceptance (TAM) models as well as Wixom and Todd framework. A thorough evaluation of the system was conducted by processing and analyzing the research objectives scores, the comment responses, and the respondents' demographic profiles. The research took place during the spring semester of Academic Year 2015-2016 and the sample included students of all PUAS departments. The outcomes of the research suggest that PUAS and its academic community could be greatly benefitted by the implementation of the Student Information System in terms of strategy planning, distributing resources as well as organizational success. Finally, it became clear that constant participative evaluation actions, integrated into the project management process are essential for the future success of PUAS Information System.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Key Theoretical Models for the Safety and Security Ensuring 安全与保障的关键理论模型
L. Lukás, M. Hromada, Lukáš Pavlík
Problems of safety and security follows the people whole civilization evolution. Nowadays, many kinds of safety or security exist. During the constitution each kind of safety or security, procedure was pragmatic and assigned. Practice overturns theory. Now, there is a time, when we are able to make generalization and also create the theory of safety and security. This theory should be applied for each field of safety or security. As the part of kind of safety or security, there are models for ensuring safety or security issues. For example, the physical security is ensured through individual protection, known as barriers. Barrier ensures functions of retentions. In the article are analyzed the common theoretical models for ensuring safety and security.
安全保障问题伴随着人类整个文明的演变。如今,各种各样的安全或保障存在。在宪法期间,各种安全或保障,程序是务实的和指定的。实践推翻理论。现在,有一段时间,当我们能够泛化并创造安全和保障的理论。这一理论应适用于安全或保安的各个领域。作为一种安全或保安的一部分,有保证安全或保安问题的模型。例如,物理安全是通过个体保护来保证的,称为屏障。屏障确保保留功能。本文分析了保障安全的常用理论模型。
{"title":"The Key Theoretical Models for the Safety and Security Ensuring","authors":"L. Lukás, M. Hromada, Lukáš Pavlík","doi":"10.1109/MCSI.2016.022","DOIUrl":"https://doi.org/10.1109/MCSI.2016.022","url":null,"abstract":"Problems of safety and security follows the people whole civilization evolution. Nowadays, many kinds of safety or security exist. During the constitution each kind of safety or security, procedure was pragmatic and assigned. Practice overturns theory. Now, there is a time, when we are able to make generalization and also create the theory of safety and security. This theory should be applied for each field of safety or security. As the part of kind of safety or security, there are models for ensuring safety or security issues. For example, the physical security is ensured through individual protection, known as barriers. Barrier ensures functions of retentions. In the article are analyzed the common theoretical models for ensuring safety and security.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123200150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Collaborative Based Algorithm for Efficient Management of Limited Resources on Social Networks
Valon Xhafa, Korab Rrmoku, Blerim Rexha
With all features and resources, such as: social actors, social relations, content, communication, and ratings that todays' social networks like Facebook, LinkedIn, Twitter, Google+, etc. offer to users, it still appears that at given point we have to refine and optimize our own accounts within the limits of a certain social network. In line with this trend, in this paper we present a model for efficient management of friends list in Facebook, as one of the limited resource in this social network. In order to get users data from Facebook, a web scraping technique combined with reverse image search has been adopted to ensure users authenticity. The activity between nodes (friends) on a social network is calculated based on their interactions in terms of likes, comments, shares and posts between each other. This approach led us into designing and implementing an algorithm based in these collaborative metrics, named "weight of relationship". This algorithm calculates weights between friends on a network, and the results are evaluated by comparing these weights with respondent answers, conducted through personalized questionnaire. Consequently, this methodology brings feasible results, with an average accuracy of 71% on recommending which friends should be removed, thus releasing the space for incoming new friends. An app named RateMyFriends is developed based on presented approach.
虽然Facebook、LinkedIn、Twitter、Google+等社交网络为用户提供了社交角色、社交关系、内容、交流和评级等功能和资源,但我们似乎仍然需要在某个社交网络的限制下完善和优化自己的账户。针对这一趋势,本文提出了一个有效管理Facebook好友列表的模型,好友列表是该社交网络中有限的资源之一。为了从Facebook获取用户数据,采用了网页抓取技术结合反向图像搜索来保证用户的真实性。社交网络上的节点(朋友)之间的活动是根据他们彼此之间的喜欢、评论、分享和帖子等互动来计算的。这种方法引导我们设计和实现基于这些协作度量的算法,称为“关系权重”。该算法计算网络上朋友之间的权重,并通过将这些权重与受访者的回答进行比较来评估结果,并通过个性化问卷进行评估。因此,这种方法带来了可行的结果,在推荐哪些朋友应该删除上平均准确率为71%,从而为新朋友的到来释放了空间。基于所提出的方法,开发了一个名为RateMyFriends的应用程序。
{"title":"Using Collaborative Based Algorithm for Efficient Management of Limited Resources on Social Networks","authors":"Valon Xhafa, Korab Rrmoku, Blerim Rexha","doi":"10.1109/MCSI.2016.060","DOIUrl":"https://doi.org/10.1109/MCSI.2016.060","url":null,"abstract":"With all features and resources, such as: social actors, social relations, content, communication, and ratings that todays' social networks like Facebook, LinkedIn, Twitter, Google+, etc. offer to users, it still appears that at given point we have to refine and optimize our own accounts within the limits of a certain social network. In line with this trend, in this paper we present a model for efficient management of friends list in Facebook, as one of the limited resource in this social network. In order to get users data from Facebook, a web scraping technique combined with reverse image search has been adopted to ensure users authenticity. The activity between nodes (friends) on a social network is calculated based on their interactions in terms of likes, comments, shares and posts between each other. This approach led us into designing and implementing an algorithm based in these collaborative metrics, named \"weight of relationship\". This algorithm calculates weights between friends on a network, and the results are evaluated by comparing these weights with respondent answers, conducted through personalized questionnaire. Consequently, this methodology brings feasible results, with an average accuracy of 71% on recommending which friends should be removed, thus releasing the space for incoming new friends. An app named RateMyFriends is developed based on presented approach.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quadratic Stabilization and Transit Problems for Switched Linear Systems via State Feedback 基于状态反馈的切换线性系统二次镇定与传递问题
N. Otsuka, Shota Sekiguchi
In this paper, two transit problems which pass through the ε-neighborhood of some given objective states in turn from an arbitrary initial state will be studied for both continuous-time and discrete-time switched linear systems with constant input. At first the quadratic stabilization problem for continuous-time switched linear systems with constant input will be investigated. Next, the same problem for discrete-time switched linear systems with constant input will be studied. After that two ε-transit problems by using switched linear systems with constant input via state-dependent switching will be formulated, and then solvability conditions will be given. Further, two illustrative numerical examples will be shown.
本文研究了具有恒定输入的连续和离散切换线性系统从任意初始状态依次经过给定目标状态ε-邻域的两个传递问题。首先研究具有恒定输入的连续时间切换线性系统的二次镇定问题。接下来,将研究具有恒定输入的离散时间切换线性系统的相同问题。在此基础上,提出了两个基于状态相关切换的恒定输入切换线性系统的ε-传输问题,并给出了可解性条件。此外,还将给出两个说明性的数值例子。
{"title":"Quadratic Stabilization and Transit Problems for Switched Linear Systems via State Feedback","authors":"N. Otsuka, Shota Sekiguchi","doi":"10.1109/MCSI.2016.033","DOIUrl":"https://doi.org/10.1109/MCSI.2016.033","url":null,"abstract":"In this paper, two transit problems which pass through the ε-neighborhood of some given objective states in turn from an arbitrary initial state will be studied for both continuous-time and discrete-time switched linear systems with constant input. At first the quadratic stabilization problem for continuous-time switched linear systems with constant input will be investigated. Next, the same problem for discrete-time switched linear systems with constant input will be studied. After that two ε-transit problems by using switched linear systems with constant input via state-dependent switching will be formulated, and then solvability conditions will be given. Further, two illustrative numerical examples will be shown.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1