The data series from several gauging stations on the Lena River are considered. The difference of the water temperature between Kusur station and 200 kilometers downstream to the north Habarova station often becomes anomaly large during open water season (June-September). The analysis of the observational data is presented. The non-representativeness of measurements on Kusur station is supposed, reconstruction of the real temperature regime on the base of the statistical and deterministic modeling as well as the optimization tools is carried out.
{"title":"Numerical Analysis and Reconstruction of the Temperature Regime of the Lena River Segment","authors":"Segmentigor Zhilyaev, V. Fofonova","doi":"10.1109/MCSI.2016.049","DOIUrl":"https://doi.org/10.1109/MCSI.2016.049","url":null,"abstract":"The data series from several gauging stations on the Lena River are considered. The difference of the water temperature between Kusur station and 200 kilometers downstream to the north Habarova station often becomes anomaly large during open water season (June-September). The analysis of the observational data is presented. The non-representativeness of measurements on Kusur station is supposed, reconstruction of the real temperature regime on the base of the statistical and deterministic modeling as well as the optimization tools is carried out.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131151173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present mathematical models of the failure probabilities of individual MOS transistors. We use the models to characterize the failures of a few common CMOS logic cells. The failure models for the cells accurately represent the probabilities by considering the transistor dimensions, the supply voltage level, the input voltage level, and the variations in threshold voltages. We also demonstrate how the models can be utilized to analyze the sensitivities of cells' failure probabilities to their transistor sizes. Using scatter-plots, we observed a strong correlation between individual transistors' probabilities and their sizes, the cells, however, exhibited mixed sets of correlations, i.e., strong and weak. The presented modeling and analysis techniques are applicable to any CMOS logic cell operating between nearthreshold and nominal voltages.
{"title":"Modeling the Probabilities of Failures of 22 nm CMOS Logic Cells","authors":"A. Beg","doi":"10.1109/MCSI.2016.028","DOIUrl":"https://doi.org/10.1109/MCSI.2016.028","url":null,"abstract":"In this paper, we present mathematical models of the failure probabilities of individual MOS transistors. We use the models to characterize the failures of a few common CMOS logic cells. The failure models for the cells accurately represent the probabilities by considering the transistor dimensions, the supply voltage level, the input voltage level, and the variations in threshold voltages. We also demonstrate how the models can be utilized to analyze the sensitivities of cells' failure probabilities to their transistor sizes. Using scatter-plots, we observed a strong correlation between individual transistors' probabilities and their sizes, the cells, however, exhibited mixed sets of correlations, i.e., strong and weak. The presented modeling and analysis techniques are applicable to any CMOS logic cell operating between nearthreshold and nominal voltages.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129474430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mingyue Ding, Jinxiao Huang, Jiazhen Li, N. Mastorakis, X. Zhuang
With the intelligent development of the power system, load identification becomes an important task. A noninvasive household load identification method is proposed in this paper, which can be used to detect the load switching moments and identify the types of loads. A calculation method of feature value is proposed based on active power. A template method is proposed to detect the jumping of the feature curve, which can determine the load switching moments robustly and accurately. The types of loads can be identified by a threshold value method. The results show that the method can accurately determine the load switching moments and identify the types of loads, and it also has good robustness.
{"title":"Real-Time Load Identification by Active Power Feature Extraction and Switching Detection","authors":"Mingyue Ding, Jinxiao Huang, Jiazhen Li, N. Mastorakis, X. Zhuang","doi":"10.1109/MCSI.2016.030","DOIUrl":"https://doi.org/10.1109/MCSI.2016.030","url":null,"abstract":"With the intelligent development of the power system, load identification becomes an important task. A noninvasive household load identification method is proposed in this paper, which can be used to detect the load switching moments and identify the types of loads. A calculation method of feature value is proposed based on active power. A template method is proposed to detect the jumping of the feature curve, which can determine the load switching moments robustly and accurately. The types of loads can be identified by a threshold value method. The results show that the method can accurately determine the load switching moments and identify the types of loads, and it also has good robustness.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123266665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Symeonaki, M. Papoutsidakis, D. Tseles, M. Sigala
The implementation of Management Information Systems (MIS) in educational management and administration is a relatively innovative field which is rapidly evolving because of its high efficiency and effectiveness. There is a relatively small number of research studies reported in the literature evaluating MIS implementations in universities. This case study focuses on the post-implementation evaluation of a Student Information System at Piraeus University of Applied Sciences. As it has been recognized that user satisfaction affects in a great extent the success of information systems, this study aims to derive student users' overall perceptions to the effectiveness of PUAS Student Information System. The methodology used to perform the research was based on D&M IS success and technology acceptance (TAM) models as well as Wixom and Todd framework. A thorough evaluation of the system was conducted by processing and analyzing the research objectives scores, the comment responses, and the respondents' demographic profiles. The research took place during the spring semester of Academic Year 2015-2016 and the sample included students of all PUAS departments. The outcomes of the research suggest that PUAS and its academic community could be greatly benefitted by the implementation of the Student Information System in terms of strategy planning, distributing resources as well as organizational success. Finally, it became clear that constant participative evaluation actions, integrated into the project management process are essential for the future success of PUAS Information System.
{"title":"Post-Implementation Evaluation of a University Management Information System (UMIS)","authors":"E. Symeonaki, M. Papoutsidakis, D. Tseles, M. Sigala","doi":"10.1109/MCSI.2016.014","DOIUrl":"https://doi.org/10.1109/MCSI.2016.014","url":null,"abstract":"The implementation of Management Information Systems (MIS) in educational management and administration is a relatively innovative field which is rapidly evolving because of its high efficiency and effectiveness. There is a relatively small number of research studies reported in the literature evaluating MIS implementations in universities. This case study focuses on the post-implementation evaluation of a Student Information System at Piraeus University of Applied Sciences. As it has been recognized that user satisfaction affects in a great extent the success of information systems, this study aims to derive student users' overall perceptions to the effectiveness of PUAS Student Information System. The methodology used to perform the research was based on D&M IS success and technology acceptance (TAM) models as well as Wixom and Todd framework. A thorough evaluation of the system was conducted by processing and analyzing the research objectives scores, the comment responses, and the respondents' demographic profiles. The research took place during the spring semester of Academic Year 2015-2016 and the sample included students of all PUAS departments. The outcomes of the research suggest that PUAS and its academic community could be greatly benefitted by the implementation of the Student Information System in terms of strategy planning, distributing resources as well as organizational success. Finally, it became clear that constant participative evaluation actions, integrated into the project management process are essential for the future success of PUAS Information System.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a Web application that was developed at our faculty last year. This application visualizes the results of monitoring traffic in city centers. The method of visualization is performed by using of interactive graphs. Complex JavaScript components were designed in order to encapsulate the selected technology that works with charts in a Web environment. The application is designed as an independent library that can be easily implemented into other programs and used as its graphical visualization solutions in these applications. The design and complete implementation are performed with a respect to use it in the real environment and data processing in the field of traffic monitoring.
{"title":"Graphics Visualization of Specific Dashboards in Transport Technologies","authors":"P. Pokorný, Kamil Stokláska","doi":"10.1109/MCSI.2016.045","DOIUrl":"https://doi.org/10.1109/MCSI.2016.045","url":null,"abstract":"This paper describes a Web application that was developed at our faculty last year. This application visualizes the results of monitoring traffic in city centers. The method of visualization is performed by using of interactive graphs. Complex JavaScript components were designed in order to encapsulate the selected technology that works with charts in a Web environment. The application is designed as an independent library that can be easily implemented into other programs and used as its graphical visualization solutions in these applications. The design and complete implementation are performed with a respect to use it in the real environment and data processing in the field of traffic monitoring.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 1963 E.Lorenz discovered strange attractors, which correspond to the turbulence in liquids and atmosphere. In the second half of the 20-th century these attractors were described in electromechanical and electronical systems. In this time the well-known scientists created the methods of estimates of attractor dimension in the theory of dynamical systems and differential equations. Lyapunov function has been introduced in the estimates of this attractors in the last two decades. In this paper new classes of Lyapunov functions for the Lorenz-like systems are constructed and Lyapunov dimension formulas are obtained.
{"title":"Lyapunov Dimension of Attractors of the Lorenz-Like Differential Equations","authors":"G. Leonov, S. Seledzhi","doi":"10.1109/MCSI.2016.032","DOIUrl":"https://doi.org/10.1109/MCSI.2016.032","url":null,"abstract":"In 1963 E.Lorenz discovered strange attractors, which correspond to the turbulence in liquids and atmosphere. In the second half of the 20-th century these attractors were described in electromechanical and electronical systems. In this time the well-known scientists created the methods of estimates of attractor dimension in the theory of dynamical systems and differential equations. Lyapunov function has been introduced in the estimates of this attractors in the last two decades. In this paper new classes of Lyapunov functions for the Lorenz-like systems are constructed and Lyapunov dimension formulas are obtained.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"825 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120879193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Al-Sudani Mustafa Qahtan Abdulmunem, V. Kharchenko
The information and control system of smart building is considered as a set of subsystems including a building automation system (BAS). BAS security and availability during its life cycle are assessed using the Attack Tree Analysis (ATA) and Markov models. The ATA is applied to investigate any intrusions into the BAS by analyzing system probability of a fault/vulnerability to occur during period of time depending on failure probability of its subsystems. Markov model is used to calculate BAS availability considering the possibility of recovery and different kinds of the faults.
{"title":"Availability and Security Assessment of Smart Building Automation Systems: Combining of Attack Tree Analysis and Markov Models","authors":"Al-Sudani Mustafa Qahtan Abdulmunem, V. Kharchenko","doi":"10.1109/MCSI.2016.062","DOIUrl":"https://doi.org/10.1109/MCSI.2016.062","url":null,"abstract":"The information and control system of smart building is considered as a set of subsystems including a building automation system (BAS). BAS security and availability during its life cycle are assessed using the Attack Tree Analysis (ATA) and Markov models. The ATA is applied to investigate any intrusions into the BAS by analyzing system probability of a fault/vulnerability to occur during period of time depending on failure probability of its subsystems. Markov model is used to calculate BAS availability considering the possibility of recovery and different kinds of the faults.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Kharchenko, M. Kolisnyk, Iryna Piskachova, N. Bardis
One of the key subsystems from point of view of security of the complex IoT system is the smart business center (SB?) system. Some problems the design and operation of the SBC system are analyzed. When analysis of safety of the IoT system must take into account the reliability and security of the system at several levels: the level of sensors, the level of communication (communication lines, router, switch), the server level as the control device of components of the network, the level of the entire SBC subsystem. General architecture of network of the SB? is described. Reliability and security of key SB? hardwareand software manufacturers are analysed. In particular, security issue for SB? routers is considered. Shown the Markov model, which takes into account the technical conditions of typical network components of the SBC with the presence of software vulnerabilities when exposed to hacker attacks. On this model's basis it is possible to conduct further researches directed for improving the reliability operation and safety of IoT.
{"title":"Reliability and Security Issues for IoT-based Smart Business Center: Architecture and Markov Model","authors":"V. Kharchenko, M. Kolisnyk, Iryna Piskachova, N. Bardis","doi":"10.1109/MCSI.2016.064","DOIUrl":"https://doi.org/10.1109/MCSI.2016.064","url":null,"abstract":"One of the key subsystems from point of view of security of the complex IoT system is the smart business center (SB?) system. Some problems the design and operation of the SBC system are analyzed. When analysis of safety of the IoT system must take into account the reliability and security of the system at several levels: the level of sensors, the level of communication (communication lines, router, switch), the server level as the control device of components of the network, the level of the entire SBC subsystem. General architecture of network of the SB? is described. Reliability and security of key SB? hardwareand software manufacturers are analysed. In particular, security issue for SB? routers is considered. Shown the Markov model, which takes into account the technical conditions of typical network components of the SBC with the presence of software vulnerabilities when exposed to hacker attacks. On this model's basis it is possible to conduct further researches directed for improving the reliability operation and safety of IoT.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114950701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Problems of safety and security follows the people whole civilization evolution. Nowadays, many kinds of safety or security exist. During the constitution each kind of safety or security, procedure was pragmatic and assigned. Practice overturns theory. Now, there is a time, when we are able to make generalization and also create the theory of safety and security. This theory should be applied for each field of safety or security. As the part of kind of safety or security, there are models for ensuring safety or security issues. For example, the physical security is ensured through individual protection, known as barriers. Barrier ensures functions of retentions. In the article are analyzed the common theoretical models for ensuring safety and security.
{"title":"The Key Theoretical Models for the Safety and Security Ensuring","authors":"L. Lukás, M. Hromada, Lukáš Pavlík","doi":"10.1109/MCSI.2016.022","DOIUrl":"https://doi.org/10.1109/MCSI.2016.022","url":null,"abstract":"Problems of safety and security follows the people whole civilization evolution. Nowadays, many kinds of safety or security exist. During the constitution each kind of safety or security, procedure was pragmatic and assigned. Practice overturns theory. Now, there is a time, when we are able to make generalization and also create the theory of safety and security. This theory should be applied for each field of safety or security. As the part of kind of safety or security, there are models for ensuring safety or security issues. For example, the physical security is ensured through individual protection, known as barriers. Barrier ensures functions of retentions. In the article are analyzed the common theoretical models for ensuring safety and security.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123200150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper are presented some analytical and numerical results regarding airfoil characteristics, lift coefficient improvement solutions and possible applications for airplane wing and helicopter blade. Starting from the general theory of aerodynamics and based on the CFD methods, the paper deals with the mathematical model of flow around an airfoil with a filed cavity, where a free rotational cylinder is placed in order to delay the flow separation. The numerical solutions were made in Maplesoft environment.
{"title":"New Solutions for Aircraft Wing and Helicopter Blade Airfoils","authors":"C. Rotaru, Mihai Mihăilă-Andres","doi":"10.1109/MCSI.2016.019","DOIUrl":"https://doi.org/10.1109/MCSI.2016.019","url":null,"abstract":"In this paper are presented some analytical and numerical results regarding airfoil characteristics, lift coefficient improvement solutions and possible applications for airplane wing and helicopter blade. Starting from the general theory of aerodynamics and based on the CFD methods, the paper deals with the mathematical model of flow around an airfoil with a filed cavity, where a free rotational cylinder is placed in order to delay the flow separation. The numerical solutions were made in Maplesoft environment.","PeriodicalId":421998,"journal":{"name":"2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127809853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}