Journal:Informatica
Volume 24, Issue 2 (2013), pp. 275–290
Abstract
Based on an example, we describe how outcomes of computational experiment can be employed for study of stability of numerical algorithm, provided that related theoretical propositions are not proven yet. More precisely, we propose a systematic and generalized methodology, how to investigate the influence of the weight functions α(x) and β(x), present in the integral boundary conditions, on the stability of difference schemes, for some class of parabolic equations. The ground of the methodology is the investigation of the spectrum of a matrix, defining the transition to the upper layer of the difference scheme. Spectral structure of this matrix is analysed by both analytic method and computational experiment.
Journal:Informatica
Volume 24, Issue 2 (2013), pp. 253–274
Abstract
The paper deals with the application of the theory of locally homogeneous and isotropic Gaussian fields (LHIGF) to probabilistic modelling of multivariate data structures. An asymptotic model is also studied, when the correlation function parameter of the Gaussian field tends to infinity. The kriging procedure is developed which presents a simple extrapolator by means of a matrix of degrees of the distances between pairs of the points of measurement. The resulting model is rather simple and can be defined only by the mean and variance parameters, efficiently evaluated by maximal likelihood method. The results of application of the extrapolation method developed for two analytically computed surfaces and estimation of the position of the spacecraft re-entering the atmosphere are given.
Journal:Informatica
Volume 24, Issue 2 (2013), pp. 231–251
Abstract
This paper presents a new approach for the business and information systems (IS) alignment consisting of a framework, metamodel, process, and tools for implementing it in practice. The purpose of the approach is to fill in the gap between the existing conceptual business and IS alignment frameworks and the empirical business and IS alignment methods. The suggested approach is based on the SOA, GRAAL, and enterprise modeling techniques such as TOGAF, DoDAF, and UPDM. The proposed approach is applied on four real world projects. Both the application results and the small example are provided to validate the suitability of the approach.
Journal:Informatica
Volume 24, Issue 2 (2013), pp. 219–230
Abstract
In this paper, we present a cryptanalysis of a public key cryptosystem based on the matrix combinatorial problem proposed by Wang and Hu (2010). Using lattice-based methods finding small integer solutions of modular linear equations, we recover the secret key of this cryptosystem for a certain range of parameters. In experiments, for the suggested parameters by Wang and Hu, the secret key can be recovered in seconds.
Journal:Informatica
Volume 24, Issue 2 (2013), pp. 199–217
Abstract
Inventory management is an important part of production planning process for enterprises. Decisions for strategies to determine when and how many to buy or make can be made by classifying the inventory items based on their sorts. In this evaluation, ABC inventory classification is one of the most commonly used approaches. In this study, a fuzzy analytic network process approach was proposed to determine the weights of the criteria and the scores of the inventory items were determined with simple additive weighting by using linguistic terms. Applying fuzzy ANP to a multi-criteria inventory classification problem is the novelty of this study in the related literature. In addition, the application area of the problem which is the management of the engineering vehicles' items in a construction firm is different from the other studies.
Journal:Informatica
Volume 24, Issue 2 (2013), pp. 181–197
Abstract
A new pseudo-random number generator (PRNG) is proposed. The principle of the method consists in mixing chaotic maps produced from an input initial vector. The algorithm uses permutations whose positions are computed and indexed by a chaotic function based on linear congruences. The performance of this scheme is evaluated through statistical analysis. Such a cryptosystem lets appear significant cryptographic qualities for a good security level.
Journal:Informatica
Volume 24, Issue 2 (2013), pp. 169–180
Abstract
The Matrix Bandwidth Minimization Problem (MBMP) seeks for a simultaneous reordering of the rows and the columns of a square matrix such that the nonzero entries are collected within a band of small width close to the main diagonal. The MBMP is a NP-complete problem, with applications in many scientific domains, linear systems, artificial intelligence, and real-life situations in industry, logistics, information recovery. The complex problems are hard to solve, that is why any attempt to improve their solutions is beneficent. Genetic algorithms and ant-based systems are Soft Computing methods used in this paper in order to solve some MBMP instances. Our approach is based on a learning agent-based model involving a local search procedure. The algorithm is compared with the classical Cuthill-McKee algorithm, and with a hybrid genetic algorithm, using several instances from Matrix Market collection. Computational experiments confirm a good performance of the proposed algorithms for the considered set of MBMP instances. On Soft Computing basis, we also propose a new theoretical Reinforcement Learning model for solving the MBMP.
Journal:Informatica
Volume 24, Issue 1 (2013), pp. 153–168
Abstract
Grey numbers facilitate the representation of uncertainty not only for elements of a set, but also the set itself as a whole. This paper utilizes the notion of possibility degree from grey system theory coupled with the idea of dominance relation and partial order set (poset) from rough theory to represent uncertain information in a manner that maintains the degree of uncertainty of information for each tuple of the original data. Concept lattices of grey information system are constructed and a decision-making algorithm that combines with grey relational grade is described. A case study is used to demonstrate the supplier selection problem applying the proposed method. The research has concluded that the method is appropriate to use.
Journal:Informatica
Volume 24, Issue 1 (2013), pp. 119–152
Abstract
Due to numerous public information sources and services, many methods to combine heterogeneous data were proposed recently. However, general end-to-end solutions are still rare, especially systems taking into account different context dimensions. Therefore, the techniques often prove insufficient or are limited to a certain domain. In this paper we briefly review and rigorously evaluate a general framework for data matching and merging. The framework employs collective entity resolution and redundancy elimination using three dimensions of context types. In order to achieve domain independent results, data is enriched with semantics and trust. However, the main contribution of the paper is evaluation on five public domain-incompatible datasets. Furthermore, we introduce additional attribute, relationship, semantic and trust metrics, which allow complete framework management. Besides overall results improvement within the framework, metrics could be of independent interest.
Journal:Informatica
Volume 24, Issue 1 (2013), pp. 103–118
Abstract
This paper proposes a new multi-attribute ranking procedure based on distance from decision-maker preferences. This method has two phases. In the first phase, the decision maker is asked to define the preferred performance for each attribute. In the second phase, Weighted Sum method and new distance-based normalization procedure are used to determine the overall performance rating of alternatives.