Journal:Informatica
Volume 21, Issue 3 (2010), pp. 307–319
Abstract
A Group-Oriented Cryptosystem (GOC) allows a sender to encrypt a message sent to a group of users so only the specified sets of users in that group can cooperatively decrypt the message. Recently, Li et al. pointed out unauthorized sets in the receiving group can recover the encrypted messages in Yang et al.'s GOC; and they further repaired this security flaw. However, the improved GOC contains inexact security analysis. Further, conversion of the scheme into a threshold cryptosystem results in inefficiency. This study enhances Li et al.'s GOC, both in that it achieves the requirements of GOC but also that it can be efficiently converted into a threshold cryptosystem. Under the decisional Diffie–Hellman problem assumption, the proposed scheme is demonstrated to be provably secure against chosen plaintext attacks.
Journal:Informatica
Volume 21, Issue 3 (2010), pp. 321–338
Abstract
Software localization is one of important tasks to insure a successful computer user experience. The paper discusses how localization of the software dialog text can be accelerated and how to raise the quality of software product localization. We also discuss the main features and common structure of localizable software resources, their formats and preparation for localization. As a result, we suggest applying a modified formalism of attribute grammars to describe localizable resources, taking the graphical user interface as a basic grammar structure, localizable strings and their parts as terminal symbols, and using the attributes to add important metainformation and context to the resources. The main principles of creation of such attribute grammars are presented.
Journal:Informatica
Volume 21, Issue 3 (2010), pp. 339–348
Abstract
In the presented paper, some issues of the fundamental classical mechanics theory in the sense of Ising physics are introduced into the applied neural network area. The expansion of the neural networks theory is based primarily on introducing Hebb postulate into the mean field theory as an instrument of analysis of complex systems. Appropriate propositions and a theorem with proofs were proposed. In addition, some computational background is presented and discussed.
Journal:Informatica
Volume 21, Issue 3 (2010), pp. 349–359
Abstract
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2005a) and Shi et al. (2006) proposed the site authentication schemes by using the generating random numbers. The site authentication can identify a personal computer using LAN card's Mac address, but the Mac address is easily detected through Address Resolution Protocol in the Open Systems Interconnection model. Therefore, we propose an improved securer and efficient nonce-based authentication scheme providing mutual authentication to resist the replay attack, man-in-the-middle attack and Mac address attack.
Journal:Informatica
Volume 21, Issue 3 (2010), pp. 361–374
Abstract
The paper deals with the use of formant features in dynamic time warping based speech recognition. These features can be simply visualized and give a new insight into understanding the reasons of speech recognition errors. The formant feature extraction method, based on the singular prediction polynomials, has been applied in recognition of isolated words. However, the speech recognition performance depends on the order of singular prediction polynomials, whether symmetric or antisymmetric singular prediction polynomials are used for recognition and as well on the fact even or odd order of these polynomials is chosen. Also, it is important to know how informative separate formants are, how the speech recognition results depend on other parameters of the recognition system such as: analysis frame length, number of the formants used in recognition, frequency scale used for representation of formant features, and the preemphasis filter parameters. Properly choosing the processing parameters, it is possible to optimize the speech recognition performance.
The aim of our current investigation is to optimize formant feature based isolated word recognition performance by varying processing parameters of the recognition system as well as to find improvements of the recognition system which could make it more robust to white noise. The optimization experiments were carried out using speech records of 111 Lithuanian words. The speech signals were recorded in the conventional room environment (SNR = 30 dB). Then the white noise was generated at a predefined level (65 dB, 60 dB and 55 dB) and added to the test utterances. The recognition performance was evaluated at various noise levels.
The optimization experiments allowed us to improve considerably the performance of the formant feature based speech recognition system and made the system more robust to white noise.
Journal:Informatica
Volume 21, Issue 3 (2010), pp. 375–391
Abstract
In this paper new semilogarithmic quantizer for Laplacian distribution is presented. It is simpler than classic A-law semilogarithmic quantizer since it has unit gain around zero. Also, it gives for 2.97 dB higher signal-to-quantization noise-ratio (SQNR) for referent variance in relation to A-law, and therefore it is more suitable for adaptation. Forward adaptation of this quantizer is done on frame-by-frame basis. In this way G.712 standard is satisfied with 7 bits/sample, which is not possible with classic A-law. Inside each frame subframes are formed and lossless encoder is applied on subframes. In that way, double adaptation is done: adaptation on variance within frames and adaptation on amplitude within subframes. Joined design of quantizer and lossless encoder is done, which gives better performances. As a result, standard G.712 is satisfied with only 6.43 bits/sample. Experimental results, obtained by applying this model on speech signal, are presented. It is shown that experimental and theoretical results are matched very well (difference is less than 1.5%). Models presented in this paper can be applied for speech signal and any other signal with Laplacian distribution.
Journal:Informatica
Volume 21, Issue 3 (2010), pp. 393–407
Abstract
In a fuzzy identity-based encryption (IBE) scheme, a user with the secret key for an identity ID is able to decrypt a ciphertext encrypted with another identity ID' if and only if ID and ID' are within a certain distance of each other as judged by some metric. Fuzzy IBE also allows to encrypt a document to all users that have a certain set of attributes. In 2005, Sahai and Waters first proposed the notion of fuzzy IBE and proved the security of their scheme under the selective-ID model. Currently, there is no fuzzy IBE scheme available that is fully CCA2 secure in the standard model. In this paper, we propose a new fuzzy IBE scheme which achieves IND-FID-CCA2 security in the standard model with a tight reduction. Moreover, the size of public parameters is independent of the number of attributes associated with an identity.
Journal:Informatica
Volume 21, Issue 3 (2010), pp. 409–424
Abstract
The paper addresses the over-saturated protein spot detection and extraction problem in two-dimensional electrophoresis gel images. The effective technique for detection and reconstruction of over-saturated protein spots is proposed. The paper presents: an algorithm of the median filter mask adaptation for initial filtering of gel image; the models of over-saturation used for gel image analysis; several models of protein spots used for reconstruction; technique of the automatic over-saturated protein spot search and reconstruction. Experimental investigation confirms that proposed search technique lets to find up to 96% of over-saturated protein spots. Moreover the proposed flexible protein spot shape models for reconstruction are faster and more accurate in comparison to the flexible diffusion model.
Journal:Informatica
Volume 21, Issue 3 (2010), pp. 425–454
Abstract
The Turing machine is one of the simple abstract computational devices that can be used to investigate the limits of computability. In this paper, they are considered from several points of view that emphasize the importance and the relativity of mathematical languages used to describe the Turing machines. A deep investigation is performed on the interrelations between mechanical computations and their mathematical descriptions emerging when a human (the researcher) starts to describe a Turing machine (the object of the study) by different mathematical languages (the instruments of investigation). Together with traditional mathematical languages using such concepts as ‘enumerable sets’ and ‘continuum’ a new computational methodology allowing one to measure the number of elements of different infinite sets is used in this paper. It is shown how mathematical languages used to describe the machines limit our possibilities to observe them. In particular, notions of observable deterministic and non-deterministic Turing machines are introduced and conditions ensuring that the latter can be simulated by the former are established.
Journal:Informatica
Volume 21, Issue 3 (2010), pp. 455–470
Abstract
In this article, a method is proposed for analysing the thermovision-based video data that characterize the dynamics of temperature anisotropy of the heart tissue in a spatial domain. Many cardiac rhythm disturbances at present time are treated by applying destructive energy sources. One of the most common source and the related methodology is to use radio-frequency ablation procedure. However, the rate of the risk of complications including arrhythmia recurrence remains enough high. The drawback of the methodology used is that the suchlike destruction procedure cannot be monitored by visual spectra and results in the inability to control the ablation efficiency. To the end of understanding the nature of possible complications and controlling the treating process, the means of thermovision could be used. The aim of the study was to analyse possible mechanisms of these complications, measure and determine optimal radio-frequency ablation parameters, according to the analysis of video data, acquired using thermovision.