Journal:Informatica
Volume 17, Issue 3 (2006), pp. 309–324
Abstract
Three parallel algorithms for solving the 3D problem with nonlocal boundary condition are considered. The forward and backward Euler finite-difference schemes, and LOD scheme are typical representatives of three general classes of parallel algorithms used to solve multidimensional parabolic initial-boundary value problems. All algorithms are modified to take into account additional nonlocal boundary condition. The algorithms are implemented using the parallel array object tool ParSol, then a parallel algorithm follows semi-automatically from the serial one. Results of computational experiments are presented and the accuracy and efficiency of the presented parallel algorithms are tested.
Journal:Informatica
Volume 17, Issue 3 (2006), pp. 325–346
Abstract
The paper proposes a methodology for evaluation of specification language functionality characteristics. It describes background of the proposed methodology, discusses the methodology in detail, and shortly describes experimental results obtained using the proposed methodology to evaluate the functionality of Z and UML languages.
Journal:Informatica
Volume 17, Issue 3 (2006), pp. 347–362
Abstract
This paper introduces a new concept of convertible user designating confirmer partially blind signature, in which only the designated confirmer (designated by the user) and the user can verify and confirm the validity of given signatures and convert given signatures into publicly verifiable ones. We give a formal definition for it and propose a concrete provably secure scheme with a proof of security and a brief analysis of efficiency. Assuming the intractabilities of the Discrete Logarithm Problem and the ROS-Problem, the proposed scheme is unforgeable under adaptive chosen-message attack.
Journal:Informatica
Volume 17, Issue 3 (2006), pp. 363–380
Abstract
The Augmented Representation of Cultural Objects (ARCO) system provides software and interface tools to museum curators to develop virtual museum exhibitions, as well as a virtual environment for museum visitors over the World Wide Web or in informative kiosks. The main purpose of the system is to offer an enhanced educative and entertaining experience to virtual museum visitors. In order to assess the usability of the system, two approaches have been employed: a questionnaire based survey and a Cognitive Walkthrough session. Both approaches employed expert evaluators, such as domain experts and usability experts. The result of this study shows a fair performance of the followed approach, as regards the consumed time, financial and other resources, as a great deal of usability problems has been uncovered and many aspects of the system have been investigated. The knowledge gathered aims at creating a conceptual framework for diagnose usability problems in systems in the area of Virtual Cultural Heritage.
Journal:Informatica
Volume 17, Issue 3 (2006), pp. 381–392
Abstract
This paper discusses the determination of the spare inventory level for a multiechelon repairable item inventory system, which has several bases and a central depot with emergency lateral transshipment capability. Previous research is extended by removing a restrictive assumption on the repair time distribution. A mathematical model that allows a general repair time distribution, as well as an algorithm to find a solution of the model, is developed. Thus, the main focus of this study is to improve the accuracy of previous models and to estimate the gain in accuracy from use of the current methodology. Computational experiments are performed to estimate the accuracy improvement and to determine the managerial implications of the results.
Journal:Informatica
Volume 17, Issue 3 (2006), pp. 393–406
Abstract
In this work labeling of planar graphs is taken up which involves labeling the p vertices, the q edges and the f internal faces such that the weights of the faces form an arithmetic progression with common difference d. If d=0, then the planar graph is said to have an Inner Magic labeling; and if d≠0, then it is Inner Antimagic labeling. Some new kinds of graphs have been developed which have been derived from Wheels by adding vertices in a certain way and it is proposed to give new names to these graphs namely Flower-1 and Flower-2. This paper presents the algorithms to obtain the Inner Magic and Inner Antimagic labeling for Wheels and the Inner Antimagic labeling for Flower-1 and Flower-2. The results thus found show much regularity in the labelings obtained.
Journal:Informatica
Volume 17, Issue 3 (2006), pp. 407–426
Abstract
Several best effort schemes (next-hop routing) are used to transport the data in the Internet. Some of them do not perform flexible route computations to cope up with the network dynamics. With the recent trends in programmable networks, mobile agent technology seems to support more flexible, adaptable and distributed mechanism for routing. In this paper, we propose a Mobile Agent based Routing (MAR) scheme with the objectives similar to Routing Information Protocol (RIP). A comparative study of both the schemes (MAR and RIP) in terms of communication overheads, convergence time, network bandwidth utilization and average session delays is presented. The results demonstrate that the MAR scheme performs better than RIP. MAR has comparatively less communication overheads and convergence time and also offers more flexibility and adaptability as compared to RIP. In addition, this paper also presents a MAR based network load balancing.
Journal:Informatica
Volume 17, Issue 3 (2006), pp. 427–444
Abstract
Most of the Takagi–Sugeno Fuzzy (TSF) systems found in the literature have only used linear functions of input variables as rule consequent and can be called as TSF Models with Fixed Coefficient (TSFMFC). This paper presents TSF model with variable coefficient (TSFMVC) which can more closely approximate a class of nonlinear systems, nonlinear dynamic systems, and nonlinear control systems. It is also shown that TSFMFC is a special case of TSFMVC. Moreover Variable Gain TSF Controller (VGTSFC) is defined and it performs better, as shown by the simulation results, when compared with Fixed Gain TSF Controller (FGTSFC).
Journal:Informatica
Volume 17, Issue 3 (2006), pp. 445–462
Abstract
We know the necessity for information security becomes more widespread in these days, especially for hardware-based implementations such as smart cards chips for wireless applications and cryptographic accelerators. Fast modular exponentiation algorithms are often considered of practical significance in public-key cryptosystems. The RSA cryptosystem is one of the most widely used technologies for achieving information security. The main task of the encryption and decryption engine of RSA cryptosystem is to compute ME mod N. Because the bit-length of the numbers M, E, and N would be about 512 to 1024 bits now, the computations for RSA cryptosystem are time-consuming. In this paper, an efficient technique for parallel computation of the modular exponentiation is proposed and our algorithm can reduce time complexity. We can have the speedup ratio as 1.06 or even 2.75 if the proposed technique is used. In Savas–Tenca–Koc algorithm, they design a multiplier with an insignificant increase in chip area (about 2.8%) and no increase in time delay. Our proposed technique is faster than Savas–Tenca–Koc algorithm in time complexity and improves efficiency for RSA cryptosystem.