Journal:Informatica
Volume 24, Issue 1 (2013), pp. 87–102
Abstract
Frequent sequence mining is one of the main challenges in data mining and especially in large databases, which consist of millions of records. There is a number of different applications where frequent sequence mining is very important: medicine, finance, internet behavioural data, marketing data, etc. Exact frequent sequence mining methods make multiple passes over the database and if the database is large, then it is a time consuming and expensive task. Approximate methods for frequent sequence mining are faster than exact methods because instead of doing multiple passes over the original database, they analyze a much shorter sample of the original database formed in a specific way. This paper presents Markov Property Based Method (MPBM) – an approximate method for mining frequent sequences based on kth order Markov models, which makes only several passes over the original database. The method has been implemented and evaluated using real-world foreign exchange database and compared to exact and approximate frequent sequent mining algorithms.
Journal:Informatica
Volume 24, Issue 1 (2013), pp. 71–86
Abstract
The problem we address in this paper is the design of a quantizer that in comparison to the classical fixed-rate scalar quantizers provides more sophisticated bit rate reduction while restricting the class of quantizers to be scalar. We propose a switched variable-length code (VLC) optimal companding quantizer composed of two optimal companding scalar quantizers, the inner and the outer one, both designed for the memoryless Gaussian source of unit variance. Quantizers composing the proposed quantizer have a different codebook sizes and a different compressor functions. Particularly, we assume a smaller size of the inner quantizer's codebook in order to provide assignment of the shorter codewords to the high probability low amplitude speech samples belonging to the support region of the inner quantizer. We study the influence of codebook size of the inner and the outer quantizer on the Signal to Quantization Noise Ratio (SQNR). In such a manner the conclusion of the proposed quantizer significance in speech compression is distinctly shown in the paper. For the proposed quantizer model and its forward adaptive version the SQNR robustness analysis in a wide variance range is also presented in the paper. It is shown that our multi-resolution quantizer can satisfy G.712 Recommendation for high-quality quantization at the bit rate of 6.3 bit/sample achieving the compression of 1.7 bit/sample over the G.711 quantizer.
Journal:Informatica
Volume 24, Issue 1 (2013), pp. 59–70
Abstract
Technological advances have allowed all conferees to hold a mobile conference via wireless communication. When designing a conference scheme for mobile communications it should be taken into account that the mobile users are typically using portable devices with limited computing capability. Moreover, wireless communications are more susceptible to eavesdropping and unauthorized access than conversations via wires. Based on elliptic curve cryptography, this article proposes a secure mobile conference scheme which allows a participant to join or quit a teleconference dynamically. Without any interactive protocol among participants are required to construct the common key. This can save on communication overhead.
Journal:Informatica
Volume 24, Issue 1 (2013), pp. 35–58
Abstract
The aim of the given paper is development of an approach based on reordering of observations to be processed for the extraction of an unmeasurable internal intermediate signal, that acts between linear dynamical and static nonlinear blocks of the Wiener system with hard-nonlinearity of the known structure. The technique based on the ordinary least squares (LS) and on data partition is used for the internal signal extraction. The results of numerical simulation and identification of a discrete-time Wiener system with five types of hard-nonlinearities, such as saturation, dead-zone, preload, backlash, and, discontinuous nonlinearity are given by computer.
Journal:Informatica
Volume 24, Issue 1 (2013), pp. 13–34
Abstract
The number of digital resources to be used and reused for learning (learning objects) is constantly increasing, therefore describing learning objects with metadata is important to enhance learning object search, retrieval, and usage. Learning objects can be considered not only as resources, providing learning content, but as methodological resources, including teachers' experiences, reflections, examples or instructions of usage of content objects, and descriptions of learning methods. However, existing standards and specifications for learning objects metadata are not intended for including methodological resources and learning method descriptions together with content objects. In this paper, we present the results of a study, carried among general school teachers, which present a view of teachers on methodological resources and their importance, and propose a new model of learning object metadata for the learning object repository to include methodological resources, descriptions of learning methods and their links with content objects.
Journal:Informatica
Volume 24, Issue 1 (2013), pp. 1–12
Abstract
Wireless communication techniques provide convenience for users to get desired information. Construction and management costs of information provision systems with low computational-ability devices, such as RFID devices, are low so lightweight authentication protocols are required for information security. In this paper, two lightweight authentication protocols are proposed for reliable information provision systems with low computational-ability devices. The first protocol is for public information, and the other ensures that only authorized users can get information.
Journal:Informatica
Volume 23, Issue 4 (2012), pp. 665–681
Abstract
In this paper we develop a new method for 2-tuple linguistic multiple attribute decision making, namely the 2-tuple linguistic generalized ordered weighted averaging distance (2LGOWAD) operator. This operator is an extension of the OWA operator that utilizes generalized means, distance measures and uncertain information represented as 2-tuple linguistic variables. By using 2LGOWAD, it is possible to obtain a wide range of 2-tuple linguistic aggregation distance operators such as the 2-tuple linguistic maximum distance, the 2-tuple linguistic minimum distance, the 2-tuple linguistic normalized Hamming distance (2LNHD), the 2-tuple linguistic weighted Hamming distance (2LWHD), the 2-tuple linguistic normalized Euclidean distance (2LNED), the 2-tuple linguistic weighted Euclidean distance (2LWED), the 2-tuple linguistic ordered weighted averaging distance (2LOWAD) operator and the 2-tuple linguistic Euclidean ordered weighted averaging distance (2LEOWAD) operator. We study some of its main properties, and we further generalize the 2LGOWAD operator using quasi-arithmetic means. The result is the Quasi-2LOWAD operator. Finally we present an application of the developed operators to decision-making regarding the selection of investment strategies.
Journal:Informatica
Volume 23, Issue 4 (2012), pp. 645–663
Abstract
This paper builds on a novel, fast algorithm for generating the convex layers on grid points with linear time complexity. Convex layers are extracted from the binary image. The obtained convex hulls are characterized by the number of their vertices and used as representative image features. A computational geometric approach to near-duplicate image detection stems from these features. Similarity of feature vectors of given images is assessed by correlation coefficient. This way, all images with closely related structure and contents can be retrieved from large databases of images quickly and efficiently. The algorithm can be used in various applications such as video surveillance, image and video duplication search, or image alignment. Our approach is rather robust up to moderate signal-to-noise ratios, tolerates lossy image compression, and copes with translated, rotated and scaled image contents.
Journal:Informatica
Volume 23, Issue 4 (2012), pp. 621–643
Abstract
Nowadays most required products and services of companies are provided through other organisations. Outsourcing as a new approach has a significant role in management literature. Supplier should be selected by executives, when the organization decides to acquire a product or service from other organizations. Concerning supplier selection, the managers should consider more than one factor or criterion, which may be inconsistent and contradictory. Therefore, supplier selection is a multi-criteria decision-making issue. Analytic network process (ANP) is a technique to solve multi-criteria decision-making problems in which the criteria affect each other and have nonlinear correlation. In this study, the goal is to use ANP to select the supplier in a group decision-making.
Journal:Informatica
Volume 23, Issue 4 (2012), pp. 601–620
Abstract
Multidimensional scaling with city-block distances is considered in this paper. The technique requires optimization of an objective function which has many local minima and can be non-differentiable at minimum points. This study is aimed at developing a fast and effective global optimization algorithm spanning the whole search domain and providing good solutions. A multimodal evolutionary algorithm is used for global optimization to prevent stagnation at bad local optima. Piecewise quadratic structure of the least squares objective function with city-block distances has been exploited for local improvement. The proposed algorithm has been compared with other algorithms described in literature. Through a comprehensive computational study, it is shown that the proposed algorithm provides the best results. The algorithm with fine-tuned parameters finds the global minimum with a high probability.