首页 > 最新文献

Mathematical and Computer Modelling最新文献

英文 中文
On finding safe regions for moving range queries 寻找移动范围查询的安全区域
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.11.023
Haidar AL-Khalidi, David Taniar, John Betts, Sultan Alamri

The cost of monitoring and keeping the location of a Moving Query updated is very high, as the calculation of the range query needs to be re-evaluated whenever the query moves. Many methods have been proposed to minimize the computation and communication costs for the continuous monitoring of Moving Range Queries. However, because this problem has been only partly solved, more radical efforts are needed. In response, we propose an efficient technique by adopting the concept of a safe region. The safe region is an area where the set of objects of interest does not change. If a moving query is roaming within the safe region then there is no need to update the query. This paper presents efficient techniques to create a competent safe region to reduce the communication costs. We use Monte-Carlo simulation to calculate the area of the safe region due to the irregularity of its shape. As long as the query remains inside its specified safe region, expensive re-computation is not required, which reduces the computational and communication costs in client–server architectures.

监视和保持移动查询位置更新的成本非常高,因为每当查询移动时都需要重新评估范围查询的计算。为了实现对移动距离查询的连续监测,已经提出了许多最小化计算和通信开销的方法。然而,由于这一问题只得到部分解决,因此需要作出更彻底的努力。为此,我们提出了一种采用安全区域概念的有效技术。安全区域是一个感兴趣的对象集合不会改变的区域。如果移动查询在安全区域内漫游,则不需要更新查询。本文提出了建立有效安全区域以降低通信成本的有效技术。我们使用蒙特卡罗模拟计算了由于其形状不规则而产生的安全区域的面积。只要查询保持在其指定的安全区域内,就不需要昂贵的重新计算,这减少了客户机-服务器体系结构中的计算和通信成本。
{"title":"On finding safe regions for moving range queries","authors":"Haidar AL-Khalidi,&nbsp;David Taniar,&nbsp;John Betts,&nbsp;Sultan Alamri","doi":"10.1016/j.mcm.2012.11.023","DOIUrl":"10.1016/j.mcm.2012.11.023","url":null,"abstract":"<div><p>The cost of monitoring and keeping the location of a Moving Query updated is very high, as the calculation of the range query needs to be re-evaluated whenever the query moves. Many methods have been proposed to minimize the computation and communication costs for the continuous monitoring of Moving Range Queries. However, because this problem has been only partly solved, more radical efforts are needed. In response, we propose an efficient technique by adopting the concept of a safe region. The safe region is an area where the set of objects of interest does not change. If a moving query is roaming within the safe region then there is no need to update the query. This paper presents efficient techniques to create a competent safe region to reduce the communication costs. We use <em>Monte-Carlo</em> simulation to calculate the area of the safe region due to the irregularity of its shape. As long as the query remains inside its specified safe region, expensive re-computation is not required, which reduces the computational and communication costs in client–server architectures.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1449-1458"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.11.023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84541778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature LEAS:基于身份代理签名的多运营商无线网状网络局部高效认证方案
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.11.030
Tianhan Gao , Nan Guo , Kangbin Yim

Aiming at establishing secure access and communications for a multi-operator wireless mesh network (WMN), this paper proposes a localized efficient authentication scheme (LEAS) under a broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router through a ticket which is equipped with an identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both the mesh client side and mesh router side. As a byproduct, key agreement among network entities is also implemented to protect the subsequent communications after authentication. Our performance and security analysis demonstrate that LEAS is efficient and resilient to various kinds of attacks.

针对多运营商无线网状网络(WMN)的安全访问和通信问题,提出了一种基于代理的分层安全体系结构和信任模型的局部高效认证方案(LEAS)。通过带有基于身份的代理签名的票证,直接在mesh客户端和接入mesh路由器之间实现相互认证。通过在mesh客户端和mesh路由器端使用HMAC操作,支持不同漫游场景的快速认证。作为副产品,网络实体之间也实现了密钥协议,以保护认证后的后续通信。我们的性能和安全性分析表明,LEAS对各种攻击都是高效且有弹性的。
{"title":"LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature","authors":"Tianhan Gao ,&nbsp;Nan Guo ,&nbsp;Kangbin Yim","doi":"10.1016/j.mcm.2012.11.030","DOIUrl":"10.1016/j.mcm.2012.11.030","url":null,"abstract":"<div><p>Aiming at establishing secure access and communications for a multi-operator wireless mesh network (WMN), this paper proposes a localized efficient authentication scheme (LEAS) under a broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router through a ticket which is equipped with an identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both the mesh client side and mesh router side. As a byproduct, key agreement among network entities is also implemented to protect the subsequent communications after authentication. Our performance and security analysis demonstrate that LEAS is efficient and resilient to various kinds of attacks.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1427-1440"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.11.030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78844276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier 移位素数:优化椭圆曲线加密的16位设备没有硬件乘法器
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2013.02.008
Leandro Marin , Antonio Jara , Antonio Skarmeta Gomez

Security for the Internet of Things (IoT) presents the challenge of offering suitable security primitives to enable IP-based security protocols such as IPSec and DTLS. This challenge is here because host-based implementations and solutions are not providing a proper performance over the devices used in the IoT. This is mainly because of the use of highly constraint devices in terms of computational capabilities. Therefore, it is necessary to implement new optimized and scalable cryptographic primitives which can use existing protocols to provide security, authentication, privacy and integrity to the communications. Our research focus on the mathematical optimization of cryptographic primitives for Public Key Cryptography (PKC) based on Elliptic Curve Cryptography (ECC). PKC has been considered, since the IoT requires high scalability, multi-domain interoperability, self-commissioning, and self-identification.

Specifically, this contribution presents a set of optimizations for ECC over constrained devices, and a brief tutorial of its implementation in the microprocessor Texas Instrument MSP430 (Briel, 2000)  [1] (commonly used in IoT devices such as 6LoWPAN, active RFID and DASH7). Our main contribution is the proof that these special pseudo-Mersenne primes, which we have denominated ‘shifting primes’ can be used for ECC primitives with 160-bit keys in a highly optimal way. This paper presents an ECC scalar multiplication with 160-bit keys within 5.4 million clock cycles over MSP430 devices without hardware multiplier. Shifting primes provide a set of features, which make them more compliant with the set of instructions available with tiny CPUs such as the MSP430 and other 8 and 16-bit CPUs.

物联网(IoT)的安全性提出了提供合适的安全原语以启用基于ip的安全协议(如IPSec和DTLS)的挑战。这是一个挑战,因为基于主机的实现和解决方案不能为物联网中使用的设备提供适当的性能。这主要是因为在计算能力方面使用了高度约束的设备。因此,有必要实现新的优化和可扩展的加密原语,这些原语可以使用现有的协议来提供通信的安全性、身份验证、隐私性和完整性。我们的研究重点是基于椭圆曲线加密(ECC)的公钥加密(PKC)中密码原语的数学优化。由于物联网需要高可扩展性、多域互操作性、自调试和自识别,PKC已经被考虑在内。具体来说,本文提出了一组针对ECC受限设备的优化,并简要介绍了其在微处理器德州仪器MSP430 (Briel, 2000)[1](通常用于物联网设备,如6LoWPAN,有源RFID和DASH7)中的实现。我们的主要贡献是证明了这些特殊的伪梅森素数,我们称之为“移位素数”,可以以一种高度优化的方式用于具有160位密钥的ECC原语。本文提出了一种在没有硬件乘法器的MSP430器件上,在540万时钟周期内实现160位密钥的ECC标量乘法。移位质数提供了一组特性,使它们更符合微型cpu(如MSP430和其他8位和16位cpu)的指令集。
{"title":"Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier","authors":"Leandro Marin ,&nbsp;Antonio Jara ,&nbsp;Antonio Skarmeta Gomez","doi":"10.1016/j.mcm.2013.02.008","DOIUrl":"10.1016/j.mcm.2013.02.008","url":null,"abstract":"<div><p>Security for the Internet of Things (IoT) presents the challenge of offering suitable security primitives to enable IP-based security protocols such as IPSec and DTLS. This challenge is here because host-based implementations and solutions are not providing a proper performance over the devices used in the IoT. This is mainly because of the use of highly constraint devices in terms of computational capabilities. Therefore, it is necessary to implement new optimized and scalable cryptographic primitives which can use existing protocols to provide security, authentication, privacy and integrity to the communications. Our research focus on the mathematical optimization of cryptographic primitives for Public Key Cryptography (PKC) based on Elliptic Curve Cryptography (ECC). PKC has been considered, since the IoT requires high scalability, multi-domain interoperability, self-commissioning, and self-identification.</p><p>Specifically, this contribution presents a set of optimizations for ECC over constrained devices, and a brief tutorial of its implementation in the microprocessor Texas Instrument MSP430 (Briel, 2000)  <span>[1]</span> (commonly used in IoT devices such as 6LoWPAN, active RFID and DASH7). Our main contribution is the proof that these special pseudo-Mersenne primes, which we have denominated ‘shifting primes’ can be used for ECC primitives with 160-bit keys in a highly optimal way. This paper presents an ECC scalar multiplication with 160-bit keys within 5.4 million clock cycles over MSP430 devices without hardware multiplier. Shifting primes provide a set of features, which make them more compliant with the set of instructions available with tiny CPUs such as the MSP430 and other 8 and 16-bit CPUs.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1155-1174"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2013.02.008","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87737627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A stochastic DEA model considering undesirable outputs with weak disposability 考虑弱可处置性不期望产出的随机DEA模型
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.09.022
Chong Wu , Yongli Li , Qian Liu , Kunsheng Wang

This paper proposes a stochastic DEA model considering undesirable outputs with weak disposability which not only can deal with the existence of random errors in the collected data, but also depicts the production rules uncovered by weak disposability of the undesirable outputs. This model introduces the concept of risk to define the efficiency of decision making units (DMUs), and utilizes the correlationship matrix of all the variables to portray the weak disposability. On the basis of probability distribution properties, the probabilistic form of the model is transformed to the equivalent deterministic one which is able to be solved. In the application of the model, the environment efficiency evaluation problem is chosen to validate the model by designing different levels of random errors and comparing the new model with the old one. In conclusion, the model, with broad applicability has a more superior analysis capacity than the existing model.

本文提出了一种考虑弱可处置性不良输出的随机DEA模型,该模型不仅能处理收集数据中随机误差的存在,而且能描述不良输出弱可处置性所揭示的生产规律。该模型引入风险的概念来定义决策单元(dmu)的效率,并利用所有变量的相关矩阵来描述弱可处置性。根据概率分布特性,将模型的概率形式转化为可求解的等效确定性形式。在模型的应用中,通过设计不同程度的随机误差,并将新模型与旧模型进行比较,选择环境效率评价问题对模型进行验证。综上所述,该模型比现有模型具有更强的分析能力,适用性广。
{"title":"A stochastic DEA model considering undesirable outputs with weak disposability","authors":"Chong Wu ,&nbsp;Yongli Li ,&nbsp;Qian Liu ,&nbsp;Kunsheng Wang","doi":"10.1016/j.mcm.2012.09.022","DOIUrl":"10.1016/j.mcm.2012.09.022","url":null,"abstract":"<div><p>This paper proposes a stochastic DEA model considering undesirable outputs with weak disposability which not only can deal with the existence of random errors in the collected data, but also depicts the production rules uncovered by weak disposability of the undesirable outputs. This model introduces the concept of risk to define the efficiency of decision making units (DMUs), and utilizes the correlationship matrix of all the variables to portray the weak disposability. On the basis of probability distribution properties, the probabilistic form of the model is transformed to the equivalent deterministic one which is able to be solved. In the application of the model, the environment efficiency evaluation problem is chosen to validate the model by designing different levels of random errors and comparing the new model with the old one. In conclusion, the model, with broad applicability has a more superior analysis capacity than the existing model.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 980-989"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.09.022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81329459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
The measurement of undesirable output based-on DEA in E&E: Models development and empirical analysis 基于DEA的机电行业不良产出测度:模型构建与实证分析
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2013.06.007
Wendong Lv, Zhixiang Zhou, Hong Huang
{"title":"The measurement of undesirable output based-on DEA in E&E: Models development and empirical analysis","authors":"Wendong Lv,&nbsp;Zhixiang Zhou,&nbsp;Hong Huang","doi":"10.1016/j.mcm.2013.06.007","DOIUrl":"10.1016/j.mcm.2013.06.007","url":null,"abstract":"","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 907-912"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2013.06.007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86572708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Deadlock detection and recovery for component-based systems 基于组件的系统的死锁检测和恢复
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.12.035
Chen Li, Linpeng Huang, Luxi Chen, Weichao Luo

Component-based development has gained a lot of attention in recent years. As a software development paradigm, it enhances reusability and reduces complexity but it also brings new challenges in reliability, especially the deadlock problem. In this paper, we present a dynamic probe (DP) strategy for the deadlock problem of component-based systems (CBS). First a formal semantic model is proposed to abstract the interaction among the components for analyzing the deadlock connections, and then the dynamic probe detection (DPD) algorithm is used to detect the deadlock loops. If deadlock connections are detected then the dynamic probe elimination (DPE) algorithm is used to evaluate the component reliability using several measurement indexes to find a component with reliability lower than the other components, and then replace it. Last, in comparison to related work, the results show that the proposed strategy can achieve both lower processing cost and higher reliability.

近年来,基于组件的开发获得了很多关注。作为一种软件开发范式,它提高了可重用性,降低了复杂性,但也给可靠性带来了新的挑战,尤其是死锁问题。针对基于组件的系统(CBS)中的死锁问题,提出了一种动态探测(DP)策略。首先提出一个形式化的语义模型来抽象组件之间的交互关系以分析死锁连接,然后使用动态探针检测(DPD)算法来检测死锁环。如果检测到死锁连接,则采用动态探针消除算法(dynamic probe elimination, DPE),利用多个测量指标对组件的可靠性进行评估,找出可靠性低于其他组件的组件,然后进行替换。最后,通过与相关工作的比较,结果表明所提出的策略既降低了处理成本,又提高了可靠性。
{"title":"Deadlock detection and recovery for component-based systems","authors":"Chen Li,&nbsp;Linpeng Huang,&nbsp;Luxi Chen,&nbsp;Weichao Luo","doi":"10.1016/j.mcm.2012.12.035","DOIUrl":"10.1016/j.mcm.2012.12.035","url":null,"abstract":"<div><p>Component-based development has gained a lot of attention in recent years. As a software development paradigm, it enhances reusability and reduces complexity but it also brings new challenges in reliability, especially the deadlock problem. In this paper, we present a dynamic probe (DP) strategy for the deadlock problem of component-based systems (CBS). First a formal semantic model is proposed to abstract the interaction among the components for analyzing the deadlock connections, and then the dynamic probe detection (DPD) algorithm is used to detect the deadlock loops. If deadlock connections are detected then the dynamic probe elimination (DPE) algorithm is used to evaluate the component reliability using several measurement indexes to find a component with reliability lower than the other components, and then replace it. Last, in comparison to related work, the results show that the proposed strategy can achieve both lower processing cost and higher reliability.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1362-1378"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.12.035","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86230723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semantic analysis and biological modelling in selected classes of cognitive information systems 认知信息系统的语义分析和生物建模
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.12.001
Lidia Ogiela

Cognitive categorisation systems are used for in-depth analyses of data which contains significant layers of information. These layers consist of the semantic information found in the data sets, whose information allows the system executing data analysis processes to understand the data to a certain extent and to reason based on this analysed information. Such processes are executed by semantic data analysis systems which are called cognitive categorisation systems in the introduced classification of cognitive systems dedicated to analyses in various fields of application. Cognitive data analysis systems are also expanded by adding processes of learning new solutions hitherto unknown to the system because it had no appropriate pattern defined or because it had no data allowing the analysed data to be unambiguously assigned to its corresponding pattern. The ability to train the system so that it would correctly interpret the analysed data marks the beginning of the development of a new class of systems analysing data/individual features in the course of biological modelling, personalisation and personal identification processes. Identification systems are enhanced by adding elements of cognitive categorisation systems in order to execute an in-depth, more detailed personal analysis using the information collected in the system, whose information concerns not only the anatomical and physical features, but also, or maybe primarily, lesions found in various human organs. Such systems could be used in personal identification cases in which there are doubts and a risk arises due to reasoning from incomplete data sets. Adding semantic analysis modules to personal identification systems represents a novel scientific proposition which marks the beginning of the use of semantic analysis processes for biological modelling and personalisation tasks. The solutions proposed are illustrated with the example of selected E-UBIAS systems which analyse medical image data in combination with the identity analysis. The use of DNA cryptography and DNA code to analyse personal data makes it possible to unanimously assign analysed data to an individual at the personal identification stage. This publication presents also the system with semantic analysis processes conducted based on semantic interpretation and cognitive processes allows the possible lesions that the person suffers from to be identified and authorised.

认知分类系统用于对包含重要信息层的数据进行深入分析。这些层由数据集中发现的语义信息组成,这些信息允许系统执行数据分析过程在一定程度上理解数据,并根据这些分析信息进行推理。这些过程由语义数据分析系统执行,在介绍的用于各种应用领域分析的认知系统分类中,这些系统被称为认知分类系统。认知数据分析系统还可以通过添加学习新解决方案的过程来扩展,因为系统没有适当的模式定义,或者因为它没有数据允许分析的数据明确地分配到相应的模式。训练系统使其正确解释分析数据的能力标志着在生物建模、个性化和个人识别过程中分析数据/个人特征的新一类系统发展的开始。通过添加认知分类系统的元素来增强识别系统,以便使用系统中收集的信息执行深入,更详细的个人分析,这些信息不仅涉及解剖和物理特征,而且可能主要涉及在各种人体器官中发现的病变。这种系统可用于由于不完整数据集的推理而产生怀疑和风险的个人身份识别案件。将语义分析模块添加到个人识别系统中代表了一个新的科学命题,它标志着在生物建模和个性化任务中使用语义分析过程的开始。本文以所选的E-UBIAS系统为例说明了所提出的解决方案,该系统结合身份分析对医学图像数据进行分析。使用DNA密码学和DNA代码来分析个人数据,可以在个人身份识别阶段一致地将分析的数据分配给个人。本出版物还介绍了基于语义解释和认知过程进行的语义分析过程的系统,允许识别和授权患者可能遭受的病变。
{"title":"Semantic analysis and biological modelling in selected classes of cognitive information systems","authors":"Lidia Ogiela","doi":"10.1016/j.mcm.2012.12.001","DOIUrl":"10.1016/j.mcm.2012.12.001","url":null,"abstract":"<div><p>Cognitive categorisation systems are used for in-depth analyses of data which contains significant layers of information. These layers consist of the semantic information found in the data sets, whose information allows the system executing data analysis processes to understand the data to a certain extent and to reason based on this analysed information. Such processes are executed by semantic data analysis systems which are called cognitive categorisation systems in the introduced classification of cognitive systems dedicated to analyses in various fields of application. Cognitive data analysis systems are also expanded by adding processes of learning new solutions hitherto unknown to the system because it had no appropriate pattern defined or because it had no data allowing the analysed data to be unambiguously assigned to its corresponding pattern. The ability to train the system so that it would correctly interpret the analysed data marks the beginning of the development of a new class of systems analysing data/individual features in the course of biological modelling, personalisation and personal identification processes. Identification systems are enhanced by adding elements of cognitive categorisation systems in order to execute an in-depth, more detailed personal analysis using the information collected in the system, whose information concerns not only the anatomical and physical features, but also, or maybe primarily, lesions found in various human organs. Such systems could be used in personal identification cases in which there are doubts and a risk arises due to reasoning from incomplete data sets. Adding semantic analysis modules to personal identification systems represents a novel scientific proposition which marks the beginning of the use of semantic analysis processes for biological modelling and personalisation tasks. The solutions proposed are illustrated with the example of selected E-UBIAS systems which analyse medical image data in combination with the identity analysis. The use of DNA cryptography and DNA code to analyse personal data makes it possible to unanimously assign analysed data to an individual at the personal identification stage. This publication presents also the system with semantic analysis processes conducted based on semantic interpretation and cognitive processes allows the possible lesions that the person suffers from to be identified and authorised.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1405-1414"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.12.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77869480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Evaluation of single and additive interference models for RFID collisions 射频识别碰撞的单一和附加干扰模型的评估
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2013.01.011
Linchao Zhang, Renato Ferrero, Filippo Gandino, Maurizio Rebaudengo

RFID readers for passive tags suffer from reader-to-reader interference. Mathematical models of reader-to-reader interference can be categorized into single interference and additive interference models. Although it considers only the direct collisions between two readers, the single interference model is commonly adopted since it allows faster simulations. However, the additive interference model is more realistic since it captures the total interference from several readers. In this paper, an analysis of the two models is presented and a comparison between them is conducted according to several evaluation scenarios. Besides, the impact of the different parameters, including path loss exponent, SIR/SINR threshold and noise power, is evaluated for the two models.

无源标签的RFID读写器受到读写器之间的干扰。阅读器间干扰的数学模型可分为单干扰模型和加性干扰模型。虽然它只考虑两个读取器之间的直接碰撞,但单干扰模型通常被采用,因为它允许更快的模拟。然而,加性干扰模型更真实,因为它捕获了来自多个阅读器的总干扰。本文对两种模型进行了分析,并根据不同的评价场景对两种模型进行了比较。此外,还评估了路径损耗指数、SIR/SINR阈值和噪声功率等参数对两种模型的影响。
{"title":"Evaluation of single and additive interference models for RFID collisions","authors":"Linchao Zhang,&nbsp;Renato Ferrero,&nbsp;Filippo Gandino,&nbsp;Maurizio Rebaudengo","doi":"10.1016/j.mcm.2013.01.011","DOIUrl":"10.1016/j.mcm.2013.01.011","url":null,"abstract":"<div><p>RFID readers for passive tags suffer from reader-to-reader interference. Mathematical models of reader-to-reader interference can be categorized into single interference and additive interference models. Although it considers only the direct collisions between two readers, the single interference model is commonly adopted since it allows faster simulations. However, the additive interference model is more realistic since it captures the total interference from several readers. In this paper, an analysis of the two models is presented and a comparison between them is conducted according to several evaluation scenarios. Besides, the impact of the different parameters, including path loss exponent, SIR/SINR threshold and noise power, is evaluated for the two models.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1236-1248"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2013.01.011","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81256887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Environmental efficiency evaluation considering the maximization of desirable outputs and its application 考虑理想产出最大化及其应用的环境效率评价
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2011.12.043
Malin Song , Shuhong Wang , Qingling Liu

Production processes often produce by-products which have harmful effects on the environment. However, traditional Data Envelopment Analysis (DEA) models cannot measure the efficiency evaluation of these undesirable outputs. This article aims to solve this problem. It gives an improved DEA-SBM model, named ISBM-DEA, and constructs an illustration to compare it with the Slacks-based measured DEA model. The results show that the new model’s computing conclusions are highly related to the efficiency assessment of the DEA-SBM model, and it has a greater focus on the affects of undesirable outputs on production efficiency than the latter, which means that this new model has a greater extensive value for application and provides a better quantitative theoretical basis for environmental policy analysis.

生产过程中经常会产生对环境有害的副产品。然而,传统的数据包络分析(DEA)模型无法衡量这些不良产出的效率评价。本文旨在解决这一问题。提出了一种改进的DEA- sbm模型,命名为ISBM-DEA,并通过实例与基于slack的实测DEA模型进行了比较。结果表明,新模型的计算结论与DEA-SBM模型的效率评价高度相关,并且比DEA-SBM模型更关注不良产出对生产效率的影响,这意味着新模型具有更广泛的应用价值,为环境政策分析提供了更好的定量理论依据。
{"title":"Environmental efficiency evaluation considering the maximization of desirable outputs and its application","authors":"Malin Song ,&nbsp;Shuhong Wang ,&nbsp;Qingling Liu","doi":"10.1016/j.mcm.2011.12.043","DOIUrl":"10.1016/j.mcm.2011.12.043","url":null,"abstract":"<div><p>Production processes often produce by-products which have harmful effects on the environment. However, traditional Data Envelopment Analysis (DEA) models cannot measure the efficiency evaluation of these undesirable outputs. This article aims to solve this problem. It gives an improved DEA-SBM model, named ISBM-DEA, and constructs an illustration to compare it with the Slacks-based measured DEA model. The results show that the new model’s computing conclusions are highly related to the efficiency assessment of the DEA-SBM model, and it has a greater focus on the affects of undesirable outputs on production efficiency than the latter, which means that this new model has a greater extensive value for application and provides a better quantitative theoretical basis for environmental policy analysis.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1110-1116"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2011.12.043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84210510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Calculation of China’s environmental efficiency and relevant hierarchical cluster analysis from the perspective of regional differences 区域差异视角下的中国环境效率测算及层次聚类分析
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.04.003
Malin Song, Yaqin Song, Huayin Yu, Zeya Wang

With the measuring results of environmental efficiency as a basis, redundancy rates of labor, capital stock, energy consumption and three kinds of industrial wastes in each province are calculated respectively by using hierarchical cluster analysis, which suggests that China can be divided into three kinds of economic-environmental zone, namely, intensively-developed zone, optimally-developed zone and slowly-developed zone. Analysis of redundancy rates indicates that the key to improvement of environmental efficiency is to reduce resource waste and emission of three kinds of industrial wastes. Environmental efficiency of the four main regions in China is measured with inter- and inner-differences among them. A downtrend in efficiency is found for all four regions with efficiency value the biggest for the East, bigger for the Northeast, less for the West and the least for the Central. The above quantitative analysis is helpful when new policies are established to improve environmental efficiency of each province in the future.

以环境效率测度结果为基础,运用层次聚类分析方法,分别计算了各省劳动力、资本存量、能源消耗和三种工业废弃物的冗余率,将中国经济环境划分为集约型、最优型和欠发达型三种类型。对冗余率的分析表明,提高环境效率的关键是减少资源浪费和三种工业废弃物的排放。用区域间差异和区域内差异来衡量中国四个主要区域的环境效率。四个地区的效率均呈下降趋势,东部效率值最大,东北效率值较大,西部效率值较小,中部效率值最小。上述定量分析对未来各省制定提高环境效率的新政策有所帮助。
{"title":"Calculation of China’s environmental efficiency and relevant hierarchical cluster analysis from the perspective of regional differences","authors":"Malin Song,&nbsp;Yaqin Song,&nbsp;Huayin Yu,&nbsp;Zeya Wang","doi":"10.1016/j.mcm.2012.04.003","DOIUrl":"10.1016/j.mcm.2012.04.003","url":null,"abstract":"<div><p>With the measuring results of environmental efficiency as a basis, redundancy rates of labor, capital stock, energy consumption and three kinds of industrial wastes in each province are calculated respectively by using hierarchical cluster analysis, which suggests that China can be divided into three kinds of economic-environmental zone, namely, intensively-developed zone, optimally-developed zone and slowly-developed zone. Analysis of redundancy rates indicates that the key to improvement of environmental efficiency is to reduce resource waste and emission of three kinds of industrial wastes. Environmental efficiency of the four main regions in China is measured with inter- and inner-differences among them. A downtrend in efficiency is found for all four regions with efficiency value the biggest for the East, bigger for the Northeast, less for the West and the least for the Central. The above quantitative analysis is helpful when new policies are established to improve environmental efficiency of each province in the future.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1084-1094"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.04.003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85374331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
Mathematical and Computer Modelling
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1