Year:

  1.  2
    Self-Organizing Maps to Validate Anti-Pollution Policies.Ángel Arroyo, Carlos Cambra, Álvaro Herrero, Verónica Tricio & Emilio Corchado - 2020 - Logic Journal of the IGPL 28 (4):596-614.
    This study presents the application of self-organizing maps to air-quality data in order to analyze episodes of high pollution in Madrid. The goal of this work is to explore the dataset and then compare several scenarios with similar atmospheric conditions : some of them when no actions were taken and some when traffic restrictions were imposed. The levels of main pollutants, recorded at these stations for eleven days at four different times from 2015 to 2018, are analyzed in order to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  2
    On Fingerprinting of Public Malware Analysis Services.Alvaro Botas, Ricardo J. Rodríguez, Vicente Matellan, Juan F. Garcia, M. T. Trobajo & Miguel V. Carriegos - 2020 - Logic Journal of the IGPL 28 (4):473-486.
    Automatic public malware analysis services provide controlled, isolated and virtual environments to analyse malicious software samples. Unfortunately, malware is currently incorporating techniques to recognize execution onto a virtual or sandbox environment; when an analysis environment is detected, malware behaves as a benign application or even shows no activity. In this work, we present an empirical study and characterization of automatic PMAS, considering 26 different services. We also show a set of features that allow to easily fingerprint these services as analysis (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  1
    Recovering Decimation-Based Cryptographic Sequences by Means of Linear CAs.Sara D. Cardell, Diego F. Aranha & Amparo Fúster-Sabater - 2020 - Logic Journal of the IGPL 28 (4):430-448.
    The sequences produced by the cryptographic sequence generator known as the shrinking generator can be modelled as the output sequences of linear elementary cellular automata. These sequences are composed of interleaved m-sequences produced by linear structures based on feedback shifts. This profitable characteristic can be used in the cryptanalysis of this generator. In this work we propose an algorithm that takes advantage of the inherent linearity of these CA and the interleaved m-sequences. Although irregularly decimated generators have been conceived and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  4
    Non-Removal Strategy for Outliers in Predictive Models: The PAELLA Algorithm Case.Manuel Castejón-Limas, Hector Alaiz-Moreton, Laura Fernández-Robles, Javier Alfonso-Cendón, Camino Fernández-Llamas, Lidia Sánchez-González & Hilde Pérez - 2020 - Logic Journal of the IGPL 28 (4):418-429.
    This paper reports the experience of using the PAELLA algorithm as a helper tool in robust regression instead of as originally intended for outlier identification and removal. This novel usage of the algorithm takes advantage of the occurrence vector calculated by the algorithm in order to strengthen the effect of the more reliable samples and lessen the impact of those that otherwise would be considered outliers. Following that aim, a series of experiments is conducted in order to learn how to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  3
    Evolutionary Reinforcement Learning for Adaptively Detecting Database Intrusions.Seul-Gi Choi & Sung-Bae Cho - 2020 - Logic Journal of the IGPL 28 (4):449-460.
    Relational database management system is the most popular database system. It is important to maintain data security from information leakage and data corruption. RDBMS can be attacked by an outsider or an insider. It is difficult to detect an insider attack because its patterns are constantly changing and evolving. In this paper, we propose an adaptive database intrusion detection system that can be resistant to potential insider misuse using evolutionary reinforcement learning, which combines reinforcement learning and evolutionary learning. The model (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  1
    On the Application of Compression-Based Metrics to Identifying Anomalous Behaviour in Web Traffic.Gonzalo de la Torre-Abaitua, Luis F. Lago-Fernández & David Arroyo - 2020 - Logic Journal of the IGPL 28 (4):546-557.
    In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying performance shortcomings and security breaches. The increasing complexity of both Internet services and traffic determines a scenario that in many cases impedes the proper deployment of intrusion detection and prevention systems. Although it is a common practice to monitor network and applications activity, there is not a general methodology to codify and interpret the recorded events. Moreover, this lack of methodology somehow erodes the possibility of diagnosing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  2
    Using the Spanish National Identity Card in Social Networks.V. Gayoso MartÍnez, L. HernÁndez Encinas, A. MartÍn MuÑoz & R. DurÁn DÍaz - 2020 - Logic Journal of the IGPL 28 (4):519-530.
    The distinctive security features of the Spanish electronic national identity card, known as Documento Nacional de Identidad electrónico, allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of internet services where the validation of the user’s age and real identity are key elements, as it is the case for example of the so-called social networks. Using this mechanism with NFC-capable devices, the identity and age (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  2
    Patent Retrieval Architecture Based on Document Retrieval. Sketching Out the Spanish Patent Landscape.Ana B. Gil-GonzÁlez, Andrea VÁzquez-Ingelmo, Fernando de la Prieta, Ana de Luis-Reboredo & Alfonso GonzÁlez-Briones - 2020 - Logic Journal of the IGPL 28 (4):558-569.
    A patent is a property granted to any new shape, configuration or arrangement of elements, of any device, tool, instrument, mechanism or other object or part thereof, that allows for a better or different operation, use or manufacture of the object that incorporates it or that provides it with some utility, advantage or technical effect that it did not have before. As a document, a patent really is a title that recognizes the right to exploit the patented invention exclusively, preventing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  6
    Wind Power with Energy Storage Arbitrage in Day-Ahead Market by a Stochastic MILP Approach.I. L. R. Gomes, R. Melicio, V. M. F. Mendes & H. M. I. PousInHo - 2020 - Logic Journal of the IGPL 28 (4):570-582.
    This paper is about a support information management system for a wind power producer having an energy storage system and participating in a day-ahead electricity market. Energy storage can play not only a leading role in mitigation of the effect of uncertainty faced by a WP producer, but also allow for conversion of wind energy into electric energy to be stored and then released at favourable hours. This storage provides capability for arbitrage, allowing an increase on profit of a WP (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  2
    Missing Data Imputation Over Academic Records of Electrical Engineering Students.Esteban Jove, Patricia Blanco-Rodríguez, José-Luis Casteleiro-Roca, Héctor Quintián, Francisco Javier Moreno Arboleda, José Antonio LóPez-Vázquez, Benigno Antonio Rodríguez-Gómez, María Del Carmen Meizoso-López, Andrés Piñón-Pazos, Francisco Javier De Cos Juez, Sung-Bae Cho & José Luis Calvo-Rolle - 2020 - Logic Journal of the IGPL 28 (4):487-501.
    Nowadays, the quality standards of higher education institutions pay special attention to the performance and evaluation of the students. Then, having a complete academic record of each student, such as number of attempts, average grade and so on, plays a key role. In this context, the existence of missing data, which can happen for different reasons, leads to affect adversely interesting future analysis. Therefore, the use of imputation techniques is presented as a helpful tool to estimate the value of missing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  1
    Anomaly Detection Based on One-Class Intelligent Techniques Over a Control Level Plant.Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Dragan Simić, Juan-Albino Méndez-Pérez & José Luis Calvo-Rolle - 2020 - Logic Journal of the IGPL 28 (4):502-518.
    A large part of technological advances, especially in the field of industry, have been focused on the optimization of productive processes. However, the detection of anomalies has turned out to be a great challenge in fields like industry, medicine or stock markets. The present work addresses anomaly detection on a control level plant. We propose the application of different intelligent techniques, which allow to obtain one-class classifiers using real data taken from the correct plant operation. The performance of each classifier (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  1
    Time Series Forecasting with Model Selection Applied to Anomaly Detection in Network Traffic.Łukasz Saganowski & Tomasz Andrysiak - 2020 - Logic Journal of the IGPL 28 (4):531-545.
    In herein article an attempt of problem solution connected with anomaly detection in network traffic with the use of statistic models with long or short memory dependence was presented. In order to select the proper type of a model, the parameter describing memory on the basis of the Geweke and Porter-Hudak test was estimated. Bearing in mind that the value of statistic model depends directly on quality of data used for its creation, at the initial stage of the suggested method, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  2
    Deep Packet Inspection for Intelligent Intrusion Detection in Software-Defined Industrial Networks: A Proof of Concept.Markel Sainz, Iñaki Garitano, Mikel Iturbe & Urko Zurutuza - 2020 - Logic Journal of the IGPL 28 (4):461-472.
    Specifically tailored industrial control systems attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not suitable, requiring expressly developed security countermeasures. Within the past decades, research has been focused in network-based intrusion detection systems. With the appearance of software-defined networks, new opportunities and challenges have shown up in the research community. This paper describes the potential benefits of using SDNs in industrial networks with security purposes and presents (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  1
    A Novel Fuzzy Metaheuristic Approach in Nurse Rerostering Problem.Svetlana Simić, Emilio Corchado, Dragan Simić, Jovanka Đorđević & Svetislav D. Simić - 2020 - Logic Journal of the IGPL 28 (4):583-595.
    In the past 50 years nurse scheduling has received considerable attention in the research community. There are two cases regarding the nurse scheduling problem : the static and dynamic. Dynamic NSP, is often called nurse rerostering problem, which presents reconstruction or modification of the predetermined roster for the current scheduling horizon. The aim of this paper is to present new hybrid strategy for nurse NRRP problem. The proposed methodology is based on efficient cooperation between fuzzy logic, ordered weighted averaging and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  8
    A Proof-Search System for the Logic of Likelihood.R. Alonderis & H. Giedra - 2020 - Logic Journal of the IGPL 28 (3):261-280.
    The cut-free Gentzen-type sequent calculus LLK for the logic of likelihood is introduced in the paper. It is proved that the calculus is sound and complete for LL. Using the introduced calculus LLK, a decision procedure for LL is presented.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  7
    The Logic of Imaginary Scenarios.Joan Casas-Roma, Antonia Huertas & M. Elena Rodríguez - 2020 - Logic Journal of the IGPL 28 (3):363-388.
    Imagining is something we use everyday in our lives and in a wide variety of ways. In spite of the amount of works devoted to its study from both psychology and philosophy, there are only a few formal systems capable of modelling it; besides, almost all of those systems are static, in the sense that their models are initially predefined, and they fail to capture the dynamic process behind the creation of new imaginary scenarios. In this work, we review some (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  18
    Modal Logic with Non-Deterministic Semantics: Part I—Propositional Case.Marcelo E. Coniglio, Fariñas Del Cerro Luis & Marques Peron Newton - 2020 - Logic Journal of the IGPL 28 (3):281-315.
    Dugundji proved in 1940 that most parts of standard modal systems cannot be characterized by a single finite deterministic matrix. In the eighties, Ivlev proposed a semantics of four-valued non-deterministic matrices, in order to characterize a hierarchy of weak modal logics without the necessitation rule. In a previous paper, we extended some systems of Ivlev’s hierarchy, also proposing weaker six-valued systems in which the axiom was replaced by the deontic axiom. In this paper, we propose even weaker systems, by eliminating (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  4
    Dually Hemimorphic Semi-Nelson Algebras.Juan Manuel Cornejo & HernÁn Javier San MartÍn - 2020 - Logic Journal of the IGPL 28 (3):316-340.
    Extending the relation between semi-Heyting algebras and semi-Nelson algebras to dually hemimorphic semi-Heyting algebras, we introduce and study the variety of dually hemimorphic semi-Nelson algebras and some of its subvarieties. In particular, we prove that the category of dually hemimorphic semi-Heyting algebras is equivalent to the category of dually hemimorphic centered semi-Nelson algebras. We also study the lattice of congruences of a dually hemimorphic semi-Nelson algebra through some of its deductive systems.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  1
    A Restricted Second-Order Logic for Non-Deterministic Poly-Logarithmic Time.Flavio Ferrarotti, SenÉn GonzÁles, Klaus-Dieter Schewe & JosÉ MarÍa Turull-Torres - 2020 - Logic Journal of the IGPL 28 (3):389-412.
    We introduce a restricted second-order logic $\textrm{SO}^{\textit{plog}}$ for finite structures where second-order quantification ranges over relations of size at most poly-logarithmic in the size of the structure. We demonstrate the relevance of this logic and complexity class by several problems in database theory. We then prove a Fagin’s style theorem showing that the Boolean queries which can be expressed in the existential fragment of $\textrm{SO}^{\textit{plog}}$ correspond exactly to the class of decision problems that can be computed by a non-deterministic Turing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  7
    The Perfect Surprise: A New Analysis in Dynamic Epistemic Logic.Leander Vignero & Lorenz Demey - 2020 - Logic Journal of the IGPL 28 (3):341-362.
    In this article, we present a new logical framework to think about surprise. This research does not just aim to better understand, model and predict human behaviour, but also attempts to provide tools for implementing artificial agents. Moreover, these artificial agents should then also be able to reap the same epistemic benefits from surprise as humans do. We start by discussing the dominant literature regarding propositional surprise and explore its shortcomings. These shortcomings are of both an empirical and a conceptual (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  3
    Editorial: Special Issue HAIS17-IGPL.Francisco Javier Martínez De PisóN, Rubén Urraca, Héctor Quintián & Emilio Corchado - 2020 - Logic Journal of the IGPL 28 (2):151-152.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  5
    Extended Experimental Study on PSO with Partial Population Restart Based on Complex Network Analysis.Michal Pluhacek, Adam Viktorin, Roman Senkerik, Tomas Kadavy & Ivan Zelinka - 2020 - Logic Journal of the IGPL 28 (2):211-225.
    This extended study presents a hybridization of particle swarm optimization with complex network construction and analysis. A partial population restart is performed in certain moments of the run of the algorithm based on the information obtained from a complex network analysis. The complex network structure represents the communication in the population. We present experimental results of the method alongside with statistical evaluation and discuss future possibilities of this approach. The main goal of the work is not to propose a new (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  4
    Tableaux for Essence and Contingency.Giorgio Venturi & Pedro Teixeira Yago - 2020 - Logic Journal of the IGPL:Doi 10.1093/jigpal/jzaa016.
    We offer tableaux systems for logics of essence and accident and logics of non-contingency, showing their soundness and completeness for Kripke semantics. We also show an interesting parallel between these logics based on the semantic insensitivity of the two non-normal operators by which these logics are expressed.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
 Previous issues
  
Next issues