Open Access Open Access  Restricted Access Access granted  Restricted Access Subscription Access

Vol 53, No 1 (2019)

Article

Using Codes with Summation of Weighted Bits to Organize Checking of Combinational Logical Devices

Efanov D.V., Sapozhnikov V.V., Sapozhnikov V.V.

Abstract

This article analyzes the peculiarities of applying weighted sum codes in tasks of building logical device check circuits for weighing of bits via random weighting coefficients, with check bits limited in number by the number of check bits of classical Berger codes. Important regularities typical of weighted sum codes are discovered. Weighted codes belong to codes that detect unidirectional errors (UED codes). The presented technique of synthesizing weighted sum codes allows creating the simplest structures of these devices based on the standard circuits of full adders and half adders of units. The main properties of weighted sum codes via error detection in information vectors and in outputs of combinational check circuits are confirmed via experiment.

Automatic Control and Computer Sciences. 2019;53(1):1-11
pages 1-11 views

An Improved Generalized Fuzzy Model Based on Epanechnikov Quadratic Kernel and Its Application to Nonlinear System Identification

Zhang Qinli ., Chen Yu .

Abstract

Fuzzy models have excellent capability of describing nonlinear system, so that a wide variety of models is proposed. However, these models are difficult to train and interpret with a hypothesis of data independence. Base on the above problems, an improved generalized fuzzy model is proposed by rules centralization, a new mixture model is built by substituting Epanechnikov quadratic kernel for Gaussian kernel of Gaussian mixture model, and the mutual transformation between the two models is proved. The proposed fuzzy model can not only provide good interpretability, but also easily estimate the parameters of the fuzzy model using the proposed mixture model. In addition, this proposed fuzzy model has higher segmentation efficiency for the input space with consideration of data correlation. The experimental results of a well-known nonlinear system identification show that the proposed fuzzy model has the best performance with fewer fuzzy rules and better generalization ability than some popular models.

Automatic Control and Computer Sciences. 2019;53(1):12-21
pages 12-21 views

About the Stability of Fuzzy Linear Automata

Speranskiy D.V.

Abstract

The concept of stability of fuzzy linear automaton is introduced. It is assumed that the fuzziness reveals as presence of alternative values of elements in one of matrices of trajectory equation of the automaton. Necessary and sufficient conditions for stability are obtained.

Automatic Control and Computer Sciences. 2019;53(1):22-27
pages 22-27 views

Classification Methodology for Bioinformatics Data Analysis

Gasparovica-Asīte M., Aleksejeva L.

Abstract

The paper presents a methodology for bioinformatics data analysis. First, it describes the use of data analysis in bioinformatics—data preprocessing approaches, missing data processing approaches, data dimensionality reduction and classification algorithms. Then, the next section determines the most appropriate data analysis methods, which should be used in bioinformatics data analysis methodology to solve diagnostic classification task. The methodology was practically approbated in experiments using WEKA software and real-world bioinformatics data sets. This allowed determination of specific method realizations that show the best classification result; all intermediate results are recorded. Finally, the best preprocessing method sequence for this methodology is determined.

Automatic Control and Computer Sciences. 2019;53(1):28-38
pages 28-38 views

Security Evaluation of a Brute-force Attack on a Cipher Using a Statistical Criterion for Plaintext

Babash A.V., Sizov V.A., Mikryukov A.A.

Abstract

The paper presents calculations of the amount of effort and the reliability of the method of brute-force attack on a cipher using a statistical criterion for plaintexts, which has type 1 and type 2 errors. Calculated values of parameters of the discussed cryptanalysis methods for a cipher allows better predictions of its remaining safe operational life taking into account statistical characteristics for recognizing the plaintext and changes in the communication channel parameters.

Automatic Control and Computer Sciences. 2019;53(1):39-44
pages 39-44 views

PSO-based Load Balancing Method in Cloud Computing

Alguliyev R.M., Imamverdiyev Y.N., Abdullayeva F.J.

Abstract

The optimization of task scheduling process in the cloud-computing environment is the multi-criteria NP-hard problem. The paper proposes a PSO based αPSO-TBLB (Task Based Load Balancing) load balancing method. The method provides an optimal migration of tasks causing overload from loaded virtual machines to corresponding virtual machines in the cloud environment. The minimization of task execution and transfer time in the suggested optimization model are chosen as target functions. The experimental testing of the suggested approach is carried out in Cloudsim and Jswarm software tools. As a result of the simulation based on proposed method found, the optimal solution for the scheduling of tasks and equal distribution of tasks to VMs (Virtual Machines) has been provided, and less time consumption has been achieved for the assignment process of tasks to VMs.

Automatic Control and Computer Sciences. 2019;53(1):45-55
pages 45-55 views

Modular Design of Mobile APP Interface Based on the Visual Flow

Wei Yanli ., Chaoyang Q., Jun L.

Abstract

Interface modules are defined by the concept of modularity according to the characteristics of mobile App interface. A modular design model containing five steps (namely: refine, prioritize, assemble, change, and select) is constructed. The proposed model feasibility is verified by its application to streamline the design of the mobile App interface with the multi-directional user experience features.

Automatic Control and Computer Sciences. 2019;53(1):56-62
pages 56-62 views

On Bikes in Smart Cities

Dmitry Namiot ., Manfred Sneps-Sneppe .

Abstract

In this paper, we discuss data models and data mining for bicycles in Smart Cities. Mobility issues (or Smart Mobility) are one of the main components of Smart Cities. Bicycles, as a transport component in the cities, are on the rise all over the world. At least, it is true for all areas where the climate even minimally allows it. The reasons are quite obvious. This is democratic and accessible this type of transport, it is cheap and environmental friendliness. Of course, the promotion of a healthy lifestyle also plays its role. The development of this type of transport (like any other) has many different aspects. In this paper, we dwell on the issues of tracking the movement of cyclists and planning bike-sharing systems. All this information will serve as a set of metrics for any design in Smart Cities.

Automatic Control and Computer Sciences. 2019;53(1):63-71
pages 63-71 views

Detection of HMM Synthesized Speech by Wavelet Logarithmic Spectrum

Diqun Yan ., Xiang L., Wang Z., Wang R.

Abstract

Automatic speaker verification systems have achieved great performance and been widely adopted in many security applications. One of the important requirements for the verification system is its resilience to spoofing attacks, such as impersonation, replay, speech synthesis and voice conversion. Among these attacks, speech synthesis has a high risk to the verification systems. In this paper, a novel detection method for computer-generated speech, especially for HMM synthetic speech, is proposed. It is found that the wavelet coefficients in specified position show the obvious difference between the synthetic and natural speech. The logarithmic spectrum features are extracted from the wavelet coefficients and support vector machine is used as the classifier to evaluate the performance of our proposed algorithm. The experimental results over SAS corpus show that the proposed algorithm can achieve high detection accuracy and low equal error rate.

Automatic Control and Computer Sciences. 2019;53(1):72-79
pages 72-79 views

A Lower Bound on Data Rates for Observability and Stabilizability of Linear Systems

Qingquan Liu ., Bi Z., Ding R., Jin F.

Abstract

This paper studies observability and stabilizability of linear time-invariant systems in the presence of limited feedback data rates. The well-known data-rate theorem in the literature presents a lower bound on data rates, above which there exists a quantization, coding, and control scheme such that an unstable dynamical system can be stabilized. However, it is unnecessary to transmit data packet on the plant state to the controller when the state prediction error is small enough. Thus, we reduce the conservatism of the prior results by employing a time-varying coding scheme. It is shown in our results that, there exists the lower bound on the data rate for observability and stabilizability, which is tighter than the ones in the data-rate theorem in the literature. Illustrative examples are given to demonstrate the effectiveness of the proposed quantization, coding, and control scheme.

Automatic Control and Computer Sciences. 2019;53(1):80-89
pages 80-89 views

Mobile Robot Performance at Restricted Energy and Autonomy

Baums A.

Abstract

Two methods are proposed to estimate the performance of ground mobile robots. As the performance criterion, the distance the robot is able to cover to reach the event place by using its inner energy source is selected. In the first method, it is assumed that all the distance to the GPS can be overcame by the robot under operator control. In the second method, the distance is divided into operator-controlled and robot autonomous motion ones, and the energy needed in this case is analyzed.

Automatic Control and Computer Sciences. 2019;53(1):90-95
pages 90-95 views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies