Journal:Informatica
Volume 26, Issue 2 (2015), pp. 221–240
Abstract
Abstract
Nowadays the web can serve as a perfect technological environment for personalized learning which is suggested by educators and based on interactive learning objects. While a range of technological solutions for the development of integrated e-learning environments already exists, the most appropriate solutions require further improvement of the implementation of novel learning objects, unification of standardization and integration of learning environments, based on semantic web services that are still in the early stages of development. The aim of the research is to create a model for the development of semantic learning objects, connect it with the architecture of the educational system for semantic learning object design and to present the experimental part of the model’s impact on the course design process. The paper presents the research with the main question on how to improve the e-learning course with semantic learning objects by exploring the application of learning object design approaches, usability, performing modern training facilities and the learning object design model based on semantic web technologies.
Journal:Informatica
Volume 26, Issue 2 (2015), pp. 199–219
Abstract
Abstract
This paper investigates an approach which is called structural legal visualization (SLV). It is about diagrammatical views which facilitate comprehension of the meaning of legal contents. Complexity reduction is a motive. An issue is the complexity of the entire legal system and the layman’s limited ability to understand legal institutions and the millions of documents. A sequence of views in SLV can be compared with a narrative. SLV differs from information visualization and knowledge visualization. SLV relates to a scenario-centered graphical narrative rather than information display or user interfaces. SLV is about the generation (synthesis) of diagrams. The sequence of images depends on the user’s goals. Different pathways through the informational space are concerned. With respect to an object’s change or non-change, two variations of SLV are identified: dynamic SLV and static SLV. The latter is divided into two: incremental SLV and alternate focuses SLV.
Journal:Informatica
Volume 26, Issue 2 (2015), pp. 181–198
Abstract
Abstract
This paper proposes an access control mechanism of verifiable cloud computing services using chameleon hashing and Diffie–Hellman key exchange protocol. By this mechanism, an entity can apply for cloud computing services and he can authorize other users to access granted data or services. When an authorized user or entity wants to access cloud computing services, he can authenticate the cloud computing service provider. Moreover, no entity secret will be revealed by data kept by cloud servers such that security and cost saving can be both ensured. Security proof under the simulation paradigm is also given.
Journal:Informatica
Volume 26, Issue 1 (2015), pp. 159–180
Abstract
Abstract
Traditional researches on scheduling of cloud workflow applications were mainly focused on time and cost. However, security and reliability have become the key factors of cloud workflow scheduling. Taking time, cost, security and reliability into account, we present a trust-based scheduling strategy. We firstly formulate the cloud workflow scheduling and then propose the corresponding algorithm, in which the trustful computation service and storage service are selected according to the set-based particle swarm optimization (S-PSO) method and set covering problem (SCP) tree search heuristic method, respectively. Finally, experimental results show that, compared with traditional methods, the proposed algorithm has better performance.
Journal:Informatica
Volume 26, Issue 1 (2015), pp. 135–157
Abstract
Abstract
P2P systems enable decentralised applications for supporting collaborating groups and communities, where the collaboration may involve both sharing of data and sharing of group processes among group members. In such applications, monitoring and awareness are critical functionalities required for an effective collaboration. However, to date there has been little research into providing generic, application-independent awareness in P2P groupware systems. We present a distributed event-based awareness approach for such systems that provides different forms of awareness through a set of interoperating, low-level awareness services. The user and technical requirements for the approach are motivated with reference to Project-Based Learning in a P2P environment. We describe the implementation of a superpeer P2P network on a Cloud platform and the provision of reliable awareness services (AaaS – Awareness as a Service) from the Cloud. We report on the outcomes of an empirical evaluation of the performance and scalability of the approach.
Journal:Informatica
Volume 26, Issue 1 (2015), pp. 89–110
Abstract
Abstract
Mobile cloud computing has emerged aiming at assisting mobile devices in processing computationally or data intensive tasks using cloud resources. This paper presents an optimization approach for utilizing cloud services for mobile client in mobile cloud, which considers the benefit of both mobile device users and cloud datacenters. The mobile cloud service provisioning optimization is conducted in parallel under the deadline, budget and energy expenditure constraint. Mobile cloud provider runs multiple VMs to execute the jobs for mobile device users, the cloud providers want to maximize the revenue and minimize theelectrical cost. The mobile device user gives the suitable payment to the cloud datacenter provider for available cloud resources for optimize the benefit. The paper proposes a distributed optimization algorithm for utilizing cloud services for mobile devices. The experiment is to test convergence of the proposed algorithm and also compare it with other related work. The experiments study the impacts of job arrival rate, deadline and mobility speeds on energy consumption ratio, execution success ratio, resource allocation efficiency and cost. The experiment shows that the proposed algorithm outperforms other related work in terms of some performance metrics such as allocation efficiency.
Journal:Informatica
Volume 26, Issue 1 (2015), pp. 67–87
Abstract
Abstract
Poisson conditional autoregressive model of spatio-temporal data is proposed. Markov property and probabilistic characteristics of this model are presented. Algorithms for maximum likelihood estimation of the model parameters are constructed. Optimal forecasting statistic minimizing probability of forecast error is given. The “plug-in” principle based on ML-estimators is used for forecasting in the case of unknown parameters. The results of computer experiments on simulated and real medical data are presented.
Journal:Informatica
Volume 26, Issue 1 (2015), pp. 51–65
Abstract
Abstract
A nonlinear substitution operation of bytes is the main strength factor of the Advanced Encryption Standard (AES) and other modern cipher systems. In this paper we have presented a new simple algorithm to generate key-dependent S-boxes and inverse S-boxes for block cipher systems. The quality of this algorithm was tested by using NIST tests, and changing only one bit of the secret key to generate new key-dependent S-boxes. The fact that the S-boxes are key-dependent and unknown is the main strength of the algorithm, since the linear and differential cryptanalysis require known S-boxes. In the second section of the paper, we analyze S-boxes. In the third section we describe the key-dependent S-boxes and inverse S-boxes generation algorithm. Afterwards, we experimentally investigate the quality of the generated key-dependent S-boxes. Comparison results suggest that the key-dependent S-boxes have good performance and can be applied to AES.
Journal:Informatica
Volume 26, Issue 1 (2015), pp. 33–50
Abstract
Abstract
Classical evolutionary multi-objective optimization algorithms aim at finding an approximation of the entire set of Pareto optimal solutions. By considering the preferences of a decision maker within evolutionary multi-objective optimization algorithms, it is possible to focus the search only on those parts of the Pareto front that satisfy his/her preferences. In this paper, an extended preference-based evolutionary algorithm has been proposed for solving multi-objective optimization problems. Here, concepts from an interactive synchronous NIMBUS method are borrowed and combined with the R-NSGA-II algorithm. The proposed synchronous R-NSGA-II algorithm uses preference information provided by the decision maker to find only desirable solutions satisfying his/her preferences on the Pareto front. Several scalarizing functions are used simultaneously so the several sets of solutions are obtained from the same preference information. In this paper, the experimental-comparative investigation of the proposed synchronous R-NSGA-II and original R-NSGA-II has been carried out. The results obtained are promising.
Journal:Informatica
Volume 26, Issue 1 (2015), pp. 17–32
Abstract
Abstract
In several areas like Global Optimization using branch-and-bound methods, the unit n-simplex is refined by bisecting the longest edge such that a binary search tree appears. This process generates simplices belonging to different shape classes. Having less simplex shapes facilitates the prediction of the further workload from a node in the binary tree, because the same shape leads to the same sub-tree. Irregular sub-simplices generated in the refinement process may have more than one longest edge when . The question is how to choose the longest edge to be bisected such that the number of shape classes is as small as possible. We develop a Branch-and-Bound (B&B) algorithm to find the minimum number of classes in the refinement process. The developed B&B algorithm provides a minimum number of eight classes for a regular 3-simplex. Due to the high computational cost of solving this combinatorial problem, future research focuses on using high performance computing to derive the minimum number of shapes in higher dimensions.