Menu
MULTILEVEL SENSOR NETWORKS FOR PRECISION FARMING AND ENVIRONMENTAL MONITORING
By: Romanov et al.  (2755 reads)
Rating: (1.00/10)

Abstract: Plants as all alive suffer from impacts of natural or anthropogenic stress factors. Creation of wireless smart biosensors and wireless sensor networks on their base for express-diagnostic of plant state on large territories under impact of stresses of different origin provides to apply managerial measures in time to decrease the negative impact of natural and anthropogenic load on the state of agricultural lands and green plantations of megalopolis, national preserves, woodlands and parklands. The applications of wireless technologies in agriculture and ecological monitoring are considered. The main aim of the multilevel sensor network is real-time data acquisition of state of plants on large territories, on-line data processing and timely decision making according to specified criteria. Multilevel sensor network has two levels. The low level is intended for plant state data acquisition and consists of several wireless sensor networks as primary data acquisition systems. The high level of multilevel sensor network works in "cloud" environment and the main purpose of this level is data storage, data analysis and managerial decision making. The main work purpose is development of low-cost wireless smart biosensors for express-diagnostics of common state of plants and creating the proper software and methodical support for integration of these wireless biosensors into wireless sensor network and multilevel sensor network for express-diagnostics of plant state on large territories, what make possible to spread the application of new information and communication technologies to industrial agriculture, ecological monitoring and environmental protection.

Keywords: wireless sensor network, agriculture, ecology, environmental monitoring.

ACM Classification Keywords: J.3 Life and Medical Sciences - Biology and Genetics

Link:

MULTILEVEL SENSOR NETWORKS FOR PRECISION FARMING AND ENVIRONMENTAL MONITORING

Volodymyr Romanov, Valeriya Gribova, Igor Galelyuka, Oleksandr Voronenko

http://www.foibg.com/ijitk/ijitk-vol09/ijitk09-01-p01.pdf

ИНВАРИАНТНЫЕ ЗАДАЧИ ОНТОЛОГИЧЕСКИХ СИСТЕМ
By: Александр Стрижак  (3399 reads)
Rating: (1.00/10)

Аннотация: В статье представлен подход к достижению разрешимости проблемных ситуаций на основе поддержки взаимодействия онтологических систем, обеспечивающих процессы достижения решений прикладных задач. Описывается категоризация задач, выделяется группа метазадач, как инвариантов использования онтологий в процессе достижения разрешимости проблемных ситуаций. Определяется таксономия как системный базис формирования последовательности утверждений, описывающих состояния процесса решения сложных прикладных задач.

Ключевые слова: задача, онтология, категория, коммутативная диаграмма, таксономия

ACM Classification Keywords: I.2 ARTIFICIAL INTELLIGENCE - I.2.4 Knowledge Representation Formalisms and Methods, H. Information Systems – H.2 DATABASE MANAGEMENT – H.2.4 Systems

Link:

ИНВАРИАНТНЫЕ ЗАДАЧИ ОНТОЛОГИЧЕСКИХ СИСТЕМ

Александр Стрижак

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-04-p05.pdf

A MODEL FOR PERFORMANCE ANALISYSIS OF MULTICAST ROUTING PROTOCOLS
By: Irma Aslanishvili   (2710 reads)
Rating: (1.00/10)

Abstract: We study mobile communication of the ad hoc networks. Ad hoc networks are complex distributed systems that consist of wireless mobile or static nodes that can freely and dynamically self-organize Namicheishvili et al, 2011. The main finding is the performance of Multicast Routing protocol with Dynamic Core (MRDC) multicast tree in a variety of mobility and communication scenarios. We focused on control plan of MRDC. Because of this, in this paper the performance means the efficiency and robustness of multicast tree. Mode selection of forwarding plan is disabled and multicast routers broadcast multicast packets. The aim of the simulation is to evaluate the robustness and efficiency of multicast tree. The performance analysis contains of two goals: to select MRDC key parameters (e.g. period of multicast tree refresh and threshold for average queue length) and to analyze performance in different traffic loads and mobility pattern. The performance analysis is further divided into two parts: multicast tree analysis and protocol comparison.

Keywords: Ad Hoc Networks, protocols, Routing protocols, packet, source node, Relay routing, finite memory, MRDC Multicast Tree Analysis, Simulation Metrics

ACM Keywords: C.2.2 Network Protocols; C.2.3 Network Operations

Link:

A MODEL FOR PERFORMANCE ANALISYSIS OF MULTICAST ROUTING PROTOCOLS

Irma Aslanishvili

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-04-p04.pdf

CHRONOLOGICAL DISTRIBUTION OF THE INFORMATION FROM THE OTTOMAN ARCHIVES...
By: Jordan Tabov, Gelina Panayotova  (2731 reads)
Rating: (1.00/10)

Abstract: . Together with the results from research articles of Kiiliq the considerations given in the paper give rise to the hypothesis that the "information anomaly", noticed M. Kiili is likely a consequence of the actual loss of the central sultan authority control over large parts of the Empire.

Keywords: model; money circulation; coin finds; chronological distribution

ACM Classification Keywords: I.6 Simulation and Modeling, I.6.3 Applications

Link:

ХРОНОЛОГИЧЕСКОЕ РАСПРЕДЕЛЕНИЕ ИНФОРМАЦИИ ИЗ ОСМАНСКИХ АРХИВОВ В СВЕТЕ ГЕОГРАФИЧЕСКИХ КАРТ 1580-1700 ГГ.: КРИЗИС ТУРЦИИ В КОНЦЕ ХVІ – ПЕРВОЙ ПОЛОВИНЫ ХVІІ В. (Chronological Distribution of the Information from the Ottoman Archives in Content of Maps from period 1580-1700 Years: Crisis of Turkey at the end of XVI - first half of XVII Century)

Йордан Табов, Галина Панайотова

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-04-p03.pdf

BANKRUPTCY RISK FORECASTING UNDER UNCERTAINTY WITH APPLICATION OF FUZZY ...
By: Ovi Nafas Aghae agh Gamish, Yuriy Zaychenko  (3234 reads)
Rating: (1.00/10)

Abstract: The problem of corporations’ bankruptcy risk forecasting under uncertainty is considered in this paper. The application of neo-fuzzy cascade neural networks is suggested. The experimental investigations of cascade neo-fuzzy networks for bankruptcy risk forecasting for Ukrainian corporations were carried out and their efficiency was estimated and compared with fuzzy neural networks with algorithms of Mamdani, Tsukamoto and classical statistical methods.

Keywords: bankruptcy risk forecasting, cascade neo-fuzzy network, fuzzy networks of Mamdani and Tsukamoto

ACM Classification Keywords: I.2 Artificial Intelligence; I.5.1 Models; Neural Nets

Link:

ПРОГНОЗИРОВАНИЕ РИСКА БАНКРОТСТВА КОРПОРАЦИЙ В УСЛОВИЯХ НЕОПРЕДЕЛЕННОСТИ С ИСПОЛЬЗОВАНИЕМ НЕЧЕТКИХ НЕЙРОННЫХ СЕТЕЙ (Bankruptcy risk forecasting under uncertainty with application of fuzzy neural networks)

Ови Нафас Агаи аг Гамиш, Юрий Зайченко

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-04-p02.pdf

ONTOARM - A SYSTEM FOR STORING ONTOLOGIES BY NATURAL LANGUAGE ADDRESSING
By: Krassimira Ivanova   (2750 reads)
Rating: (1.00/10)

Abstract: In this paper we present results from experiments for storing RDF ontologies by means of Natural Language Addressing. For experiments we have realized system OntoArM? aimed to store RDF triples in multilayer hash tables (information spaces with variable size). The main features of system OntoArM? are outlined in the paper. Analysis of the experimental results concluded the work.

Keywords: Natural Language Addressing; RDF ontologies

ACM Classification Keywords: H.2 Database Management; H.2.8 Database Applications

Link:

ONTOARM - A SYSTEM FOR STORING ONTOLOGIES BY NATURAL LANGUAGE ADDRESSING

Krassimira Ivanova

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-04-p01.pdf

GAUSSIAN DE-NOSING TECHNIQUES IN SPATIAL DOMAIN FOR GRAY SCALE MEDICAL IMAGES
By: Nora Youssef, Abeer M.Mahmoud, El-Sayed M.El-Horbaty   (2320 reads)
Rating: (1.00/10)

Abstract: Image de-noising is the elimination of noise from digital images where noise is any undesired information that contaminates an image. De-nosing is achieved through various filtering techniques that not only enhance the image but also keeps all its important details. Filters are categorized into linear (Geometric mean and Harmonic mean filters) and non-linear (midpoint, alpha-trimmed and adaptive local noise reduction filter) techniques. This paper presents applying Gaussian de-noising techniques or algorithms in spatial domain for medical images. Actually, five de-noising techniques are developed on gray scale medical images corrupted by additive Gaussian noise with mean = 0, variance = 1000. In addition, the paper analyzes the de-nosing techniques in terms of MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio) for image quality assessment and time complexity for performance assessment. The results showed that the de-nosing technique named Harmonic filter was the best from PSNR prospective and the de-nosing technique named Geometric mean filter was the best form time prospective.

Keywords: Gaussian noise elimination, Linear and non-linear filter

Link:

GAUSSIAN DE-NOSING TECHNIQUES IN SPATIAL DOMAIN FOR GRAY SCALE MEDICAL IMAGES

Nora Youssef, Abeer M.Mahmoud, El-Sayed? M.El-Horbaty

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p09.pdf

STRESS DETECTION USING MULTIPLE BIO-SIGNALS
By: Khalifa et al.  (2261 reads)
Rating: (1.00/10)

Abstract: Organizations are becoming more and more dependent on computers in their day to day activities. Employees spend hours daily interacting with various software that is needed to finish their work. This human computer interaction (HCI) may induce stress for various reasons such as bad user interface design, slow responses from the software, and much more. Stress will affect the employee’s total performance and productivity, which will have a negative impact on their teams and organization. Our purpose is to have an integrated mechanism that will detect stress during HCI. The tool will be a starting point for providing a solution that aims to reduce stress in the HCI aspects at organizations. This study investigates the usage of two bio signals (EEG, ECG,) for the detection of stress during HCI.

Keywords: EEG Biometric, BioSignals?, Stress, Multi modal, Human-computer interaction, BrainInformatics?

ACM Classification Keywords: Experimentation

Link:

STRESS DETECTION USING MULTIPLE BIO-SIGNALS

Wael Khalifa, Kenneth Revett, Mohamed I. Roushdy, Abdel-Badeeh? M. Salem

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p08.pdf

KNOWLEDGE DEMONSTRATION AND ASSESSMENT SYSTEM “CYBER1”
By: Tea Munjishvili, Zurab Munjishvili   (3388 reads)
Rating: (1.00/10)

Abstract: The article discusses a computer-based system for knowledge demonstration and assessment „Cyber1“ created by Z. Munijishvili, T. Munijishvili, and A. Meladze. The system is used at Batumi State University and Ivane Javakhishvili Tbilisi State University. The article describes the functions of the program and shows its advantages in relation to similar programs available on Georgian market. The practice of the educational institutions and our own experience shows: 1. The conditions relevant to the compilation of e-textbooks should be created. Our school should initiate it. 2. To this end, an initiative group should be formed at the school to coordinate the creation of the e-textbooks. 3. The textbooks approved by the school should be uploaded. Using “Cyber1”, teachers enter tests and cases studies into the database for the respective subject. The teacher can create audio, video and graphic files and connect them with tests (case studies), can make edits to the database, arrange tests from simple to complex, determined the number of tests and case studies per content area, duration of the exam and passes the product to the exam center. If the computer stops working during the exam, the last version of the test is auto-saved and time spent on the test is recorded, and the student continues the exam form the point of interruption and with the remaining time.

Keywords: Computer systems, Accounting, knowledge system, “Cyber1”.

Link:

KNOWLEDGE DEMONSTRATION AND ASSESSMENT SYSTEM “CYBER1”

Tea Munjishvili, Zurab Munjishvili

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p07.pdf

SMPR TRAINING-METHODOLOGICAL SYSTEM FOR SUPPORT THE TRAINING COURSES ON ...
By: Oleksii Voloshyn, Daniil Kovaliov  (2621 reads)
Rating: (1.00/10)

Abstract: The software for support the training courses on decision-making theory in the form of an educational, methodological and evaluating system is considered. The systems purposes, its design, structure and functionalities are described. The article turns attention to the latest extensions of the system, such as the rules of fuzzy inference during the process of complex user’s knowledge estimation. The perspectives of future work are also discussed.

Keywords: protection system, e-learning, decision-making theory, evaluation, team development.

ACM Classification Keywords: D.2.13 Reusable Software - Reuse models.

Link:

SMPR TRAINING-METHODOLOGICAL SYSTEM FOR SUPPORT THE TRAINING COURSES ON DECISION-MAKING THEORY

Oleksii Voloshyn, Daniil Kovaliov

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p06.pdf

DIDACTIC DESIGNING OF RESOURCE SUPPORT FOR TRAINING ENVIRONMENT
By: Elena Vakhtina, Alexander Vostrukhin  (3200 reads)
Rating: (1.00/10)

Abstract: Designing of the training environment with expected qualities is considered as a multidimensional technology of Didactic design, which represents the aggregate of methodology and designing tools, and also methods and designing organization means. The functional model of the training environment development as a Didactic system and the tool of its realization – the logic-semantic model of a Didactic cycle are presented in the article. These models orient a teacher in search of new ways of solving training problems in the changing conditions of the educational practice. Didactic designing of educational resource for the interdisciplinary training module "Microprocessor technics" is offered as an example. The scientific novelty of the offered decision consists in allocation of the teacher activity elements in the process of designing an educational resource: constant interaction with professional environment of activity in the form of researches and (or) applied development, selection and systematic ordering of a material from various sources of the information, adaptation of this material to the learning process, creation and development the means of training.

Keywords: environment-based approach, didactic design, didactic system, didactic cycle, didactic multidimensional instruments, educational resource, training module, microprocessor technics, microcontroller, programming

ACM Classification Keywords: J.2 Physical Sciences and Engineering – Electronics, Engineering, 1.2.6 Learning – Concept learning

Link:

DIDACTIC DESIGNING OF RESOURCE SUPPORT FOR TRAINING ENVIRONMENT

Elena Vakhtina, Alexander Vostrukhin

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p05.pdf

SOME APPROACHES TO THE DEVELOPMENT OF ANALYTICAL MODEL FOR THE RESEARCH ...
By: Galina Gayvoronska, Petr Yatsuk   (2650 reads)
Rating: (1.00/10)

Abstract: The paper is devoted to the problem of the telecommunication technologies’ implementation strategy’s choice at the cost minimization. Some aspects of the model, displaying the new technologies’ implementation process in the telecommunication networks, are researched. An approach to the realization of the value engineering of the network development’s costs at the implementation of advanced telecommunication technologies is developed. This approach can be used for the techno-economic evaluation of the network development’s options at the transition to the new technologies and allows the designer to select the optimal strategy and time stages of these technologies implementation.

Keywords: telecommunication technology, telecommunication network, development process, life cycle, implementation, modeling, function.

ACM Classification Keywords: B.4 Input/Output and Data Communications, C.2 Computer-Communication? Networks, I.6 Simulation and Modeling.

Link:

SOME APPROACHES TO THE DEVELOPMENT OF ANALYTICAL MODEL FOR THE RESEARCH OF THE TELECOMMUNICATION TECHNOLOGIES’ DEVELOPMENT PROCESS

Galina Gayvoronska, Petr Yatsuk

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p04.pdf

DIRECT AND DUAL PROBLEM OF INVESTMENT PORTFOLIO OPTIMIZATION UNDER UNCERTAINTY
By: Yuri Zaychenko, Inna Sydoruk   (3599 reads)
Rating: (1.00/10)

Abstract: The problem of forming an optimal portfolio of securities under uncertainty was considered. The main objective of portfolio investment is to improve the investment environment, giving securities such investment characteristics that are only possible in their combination. Careful processing and accounting of investment risks have become an integral and important part of the success of each company. However, the global market crisis of recent years has shown that the existing theory of optimization of investment portfolios and forecasting stock indices themselves exhausted and needed overhaul of the basic theory of portfolio management. Therefore the fuzzy sets theory was used for getting an optimal portfolio. The direct problem with the use of triangular, bell-shaped and Gaussian membership functions and dual problem by using the fuzzy sets theory were considered in this work. In direct task we define structure of a portfolio which will provide the maximum profitableness at the set risk level. In dual task we define structure of a portfolio which will provide the minimum risk level at the set level of critical profitableness. The input data for the optimization system were predicted by using the Fuzzy Group Method of Data Handling (FGMDH). The optimal portfolios for asset were determined. The comparative analysis of optimal portfolio obtained by using of different membership functions was fulfilled. Investment portfolio optimization system is an effective tool for the operational management of portfolio investments. This is an opportunity to carry out scientific and reasonable management of their investment portfolio with the ability to reject the planned loss of possession or overvalued risky assets, which increases business efficiency and maximize gain on the stock market.

Keywords: membership function, fuzzy sets theory, optimal portfolio, investments, stock securities, fuzzy number, FGMDH.

ACM Classification Keywords: G.1.0 Mathematics of Computing– General – Error analysis; G.1.6 Mathematics of Computing – Numerical Analysis – Optimization - Gradient methods, Least squares methods; I.2.3 Computing Methodologies - Artificial Intelligence - Uncertainty, “fuzzy”, and probabilistic reasoning.

Link:

DIRECT AND DUAL PROBLEM OF INVESTMENT PORTFOLIO OPTIMIZATION UNDER UNCERTAINTY

Yuri Zaychenko, Inna Sydoruk

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p03.pdf

TIME MANAGEMENT BASED ON TWO-MACHINE FLOWSHOP SCHEDULING WITH UNCERTAIN JOB ...
By: Sotskov et al.  (9696 reads)
Rating: (1.00/10)

Abstract: The purpose of this article is to initiate a research in one of the main parts of time management, which is an extremely useful activity that implies an effective use of personal time. Namely, we propose to include optimal scheduling algorithms into time management techniques. Specifically, we consider a time management system including two persons, one of which is a supervisor. In scheduling theory, such a processing system may be modeled as a two-machine flowshop with the objective of minimizing the makespan. Due to a specificity of the scheduling process for a person, it is assumed that the job processing times may be uncertain before scheduling. Moreover, for time management, it is necessary to consider on-line scheduling along with usual off-line scheduling for a set of jobs to be completed by a person during a day.

Keywords: Scheduling, flowshop, time management.

ACM Classification Keywords: Management.

Link:

TIME MANAGEMENT BASED ON TWO-MACHINE FLOWSHOP SCHEDULING WITH UNCERTAIN JOB PROCESSING TIMES

Yuri N. Sotskov, Natalja M. Matsveichuk, Andrei A. Kasiankou, Frank Werner

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p02.pdf

DEVELOPMENT OF THE APPROACH TO FORMALIZATION OF VECTOR’S INDICATORS OF SUSTAINAB
By: Vladimir Pankratov  (2836 reads)
Rating: (1.00/10)

Abstract: A synthesis of methodologies of foresight and sustainable development is offered for problem solution on the development of the formalization of vector’s indicators of sustainable development in different directions. The approach to the building of indicators of the environmental component of sustainable development vector at the stage of the data compilation to a single indicator is proposed. The procedure for the formation of the indicator using common hierarchical structure was proposed. It allows considering, evaluating, and forecasting each indicator, which is built. This result is achieved by the recovery of the main functional dependencies on the basis of the characteristics of the groups defined by discrete samples. In the result the functional dependencies of these indicators from a number of parameters that affect them are obtained. The practical implementation of the approach based on the use of the proposed algorithm was realized. The indicators were taken on data of state statistics and the statistics that are offered directly on the website of statistics of the Crimean region.

Keywords: synthesis, sustainable development, foresight methodology, recovery of the functional dependencies, indicators.

ACM Classification Keywords: H.4.2. Information System Application: type of system strategy

Link:

DEVELOPMENT OF THE APPROACH TO FORMALIZATION OF VECTOR’S INDICATORS OF SUSTAINABLE DEVELOPMENT

Vladimir Pankratov

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p01.pdf

EFFICIENCY INTERVAL DETERMINATION OF A CALCULATION PROCEDURE FOR THROUGHPUT ...
By: Tasho Tashev, Arsenij Bakanov, Radostina Tasheva   (2823 reads)
Rating: (1.00/10)

Abstract: The problem connected to computation of non-conflict schedule for crossbar switch node is NPcomplete from mathematical point of view. It is the reason for constantly suggested new algorithms for schedule calculations. The problem is that their efficiency has to be checked. The throughput of a “good” algorithm tends monotonically to some boundary. We suggest a procedure for quantitative determination of the convergence toward the boundary, utilizing data from computer simulation. In this paper are presented results of computer simulation for PIM algorithm with a certain model of incoming traffic (Chao model), made by means of CERN grid structure (lxplus.cern.ch). We check the hypothesis that convergence computation depends on the chosen parameter m of the procedure. Checking is made for m=4 and m=3. The obtained data confirm validity of the hypothesis for the chosen values m. As a result we reach a new conclusion: the derived values of the error for the internal variable δ give (an independent) estimation of the simulation errors. Having this in mind we can plan experiments that will give us the required accuracy for the determination of the boundary under the limited computer power available.

Keywords: Modeling, Communication node, Crossbar switch, Algorithms.

Классификация ключевых слов ACM: B.4.4 Performance Analysis and Design Aids, C.2.1 Network Architecture and Design, C.4 Performance of Systems

Link:

ОПРЕДЕЛЕНИЕ ИНТЕРВАЛА ЭФФЕКТИВНОСТИ ПАРАМЕТРОВ ПРОЦЕДУРЫ ВЫЧИСЛЕНИЯ ГРАНИЦЫ ПРОПУСКНОЙ СПОСОБНОСТИ ПАКЕТНОГО КОММУТАТОРА (Efficiency Interval Determination of a Calculation Procedure for Throughput Boundary of Crossbar Switch)

Ташо Ташев, Арсений Баканов, Радостина Ташева

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p11.pdf

DATA LOSS MINIMIZATION IN SITUATION'S CENTRUMS DATA BASES
By: Oleksandr Kuzomin, Oleksii Vasylenko  (2531 reads)
Rating: (1.00/10)

Abstract: Problems of reducing risks, increasing the safety and reliability and the use of databases (DB) in emergency situations (ES) are considered in the paper. To solve these problems a technological sequence is proposed. To analyze data, the peculiarity presentation of quantitative and qualitative parameters in emergency situations is calculated. The possibility of logical and functional ER modeling CASE technology with a regard to minimize the risk of life in the emergency area is shown. Technical solution of the problem is given.

Keywords: Emergency situations, Database (DB), archive, backup, database management system (DBMS), server.

Link:

ОБЕСПЕЧЕНИЕ БЕЗОПАСНОСТИ ИСПОЛЬЗОВАНИЯ БАЗ ДАННЫХ В УСЛОВИЯХ ЧРЕЗВЫЧАЙНЫХ СИТУАЦИЙ (Data Loss Minimization in Situation's Centrums Data Bases)

Александр Кузёмин, Алексей Василенко

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p10.pdf

PATTERN RECOGNITION USING A CRITERION BASED ON VECTOR CRITERION OF PATTERNS ...
By: Petro Chetyrbok  (2293 reads)
Rating: (1.00/10)

Abstract: In the given work displaying is built of great number of appearances on the great number of vectors of errors of pattern recognition by the neuron network, which allows to link classification of appearances with the analysis of vectors in space of errors. A criterion allows grouping appearances, recognizing and comparing them. A vector criterion is formulated of closeness of signal images in space of errors. An algorithm is offered for transition from space of parameters of signal images in space of errors of pattern recognition. An optimum decided rule is built for classification of signal images of signals with the use of weighed criterion of closeness of recognizable signal images in space of errors of recognition. Authenticity of the received scientific results, conclusions and recommendations of this thesis work has been confirmed by the results of experimental researches of the developed universal system of intellectual data analysis, which solve the task of recognition of objects of the electro-optical images NEFFClass BGCGG (Basic Gradient Conjugate Gradient Genetic), conducted on the base of „Institute of the Applied Systems Analysis” NTUU „KPI”. The results received in work evidently demonstrate efficiency of the use of the developed models, methods and algorithms for the solution of tasks of recognition of signals.

Keywords: neural networks, basic method, method of accreditation, vector criterion

Link:

РАСПОЗНАВАНИЕ ОБЪЕКТОВ С ИСПОЛЬЗОВАНИЕМ КРИТЕРИЯ НА ОСНОВЕ ВЕКТОРНОЙ МЕРЫ БЛИЗОСТИ ОБРАЗОВ В ПРОСТРАНСТВЕ ОШИБОК (Pattern recognition using a criterion based on vector criterion of patterns proximity in the space of errors)

Петр Четырбок

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p09.pdf

THE METHOD OF THE ENSURANCE OF STRUCTURAL SURVIVABILITY OF TELECOMMUNICATION ...
By: Nina Kniazieva  (3044 reads)
Rating: (1.00/10)

Summary: One of the most important properties of telecommunication networks to ensure their effective functioning is survivability. To ensure the survivability of telecommunication networks it’s required to solve a number of scientific and engineering problems at all stages of their life cycle – design, modernization or improvement, operation. Questions of ensurance of survivability of telecommunication networks are becoming more actual due to the intensive development of telecommunications in the past decade. The synthesis problems of survivability systems, evaluation, ensurance and improvement of structural survivability of the systems, as determined by the needs of practice acquired particular actuality today. The aim of this work is to develop a method of ensurance of structural survivability of telecommunication network (TCN), which implements the streaming approach using the proposed index of structural survivability TCN defined lower boundary of structural survivability, providing a guaranteed stable functioning TCN, the achievement of the desired value which is performed by the introduction of structural redundancy (as the property of survivability possess only redundant systems) using the optimization procedure of the sections branches reservation, the choice of which is determined on the basis of maximizing the effectiveness of each stage of the reservation. The optimization of value of the structural survivability of TCN is to achieve its maximum value at the existing restrictions. The method to ensure structural survivability TCN, based on the formation of sets of admissible routes for each service requirements, for which are formed the sets of admissible sections is developed. Are determined the probable values of unaffecting each section, and for each set of sections, which are formed on the basis of the lower boundary of the structural survivability TCN obtained as an average value of probable unaffecting sections. The paper proposes a developed the method of the ensurance of structural survivability of TCN, which is designed for procedural model, which includes the execution of the sequence of steps: 1) formation of the source data, 2) the evaluation of the structural survivability of TCN, 3) the ensurance structural survivability of TCN, 4) the development of solutions for the structural survivability of TCN. For each stage, are formulated the objectives and are determined ways to decide them. For stage 1) the list and the method to present the initial data are determined; for stage 2) are determined ways of forming sets of admissible routes and obtaining for them sets of 166 International Journal "Information Technologies & Knowledge" Volume 8, Number 2, 2014 admissible sections, for which are given methods for calculating the probabilities of unaffecting of each sections and the probabilities of unaffecting of all admissible sections which separate points s and t ( s,t n = 1, , s ≠ t, n – number of network points), is formulated a condition for the lower bound of the required structural survivability of TCN. In stage 3) optimization problem is formulated to ensure the required value of the lower limit of the structural survivability of TCN as a mathematical programming problem, is shown the feasibility of using the gradient method to solve it, a method of calculating the efficiency of each step of the optimization process. Stage 4) is final. At this stage is drawn the conclusion that the obtained solution of the optimization problem to introduce structural redundancy with in sets of limits or provides the required value of the index of structural survivability TCN or provides the procedure of recommendations on: changing the value of the matrix elements of the probability of unaffecting branches of the network which is computed value by solving the problem; the change of classes (priorities) and the "weights" of certain requirements; limiting values of network requirements, the change of defined limit values, the lower boundary of the structural survivability TCN. The proposed method can be used in the case where the sets of admissible routes and admissible sections are the sets of all possible routes and all possible sections in the TCN. An example of implementation of the proposed method to ensure structural survivability of the telecommunications network is made.

Ключевые слова: структурная живучесть, сеть, резервирование, путь, сечение, показатель живучести.

Ключевые слова классификации ACM: С.2. Computer-communication networks, H. Information Systems - H.1 Models and Principles, K. Computing Milieux - K.6 Management of computing and information system.

Link:

МЕТОД ОБЕСПЕЧЕНИЯ СТРУКТУРНОЙ ЖИВУЧЕСТИ ТЕЛЕКОММУНИКАЦИОННОЙ СЕТИ (The Method of the Ensurance of Structural Survivability of Telecommunication Network)

Нина Князева

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p08.pdf

DEPENDENCE OF INFORMATION AND TELECOMMUNICATION TECHNOLOGY DEVELOPMENT ...
By: Galina Gayvoronska, Illia Ganytskyi, Petr Yatsuk  (2616 reads)
Rating: (1.00/10)

Abstract: The article describes an analysis of the relationships between different ICT services indicators and economic indicators. Article also gives view for determining the impact of the economic state of the country on developing information and communication technologies, as well as the influence of the development one information technology on other.

Keywords: telecommunication technologies, ICT indicators, technology development.

Keywords classification of ACM: D.2.9 Management, K.6.3 Life cycle.

Link:

DEPENDENCE OF INFORMATION AND TELECOMMUNICATION TECHNOLOGY DEVELOPMENT ON ECONOMIC INDICATORS

Galina Gayvoronska, Illia Ganytskyi, Petr Yatsuk

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p07.pdf

BUILDING PECULIARITIES OF THE MODERN WIRELESS CORPORATE NETWORK
By: Iurii Lysetskyi, Natalia Karevina  (3094 reads)
Rating: (1.00/10)

Abstract: Under consideration is the building of the modern wireless corporate network that implements the concept of using their own devices. Represented the requirements for the modern wireless networks of the enterprise-level, set out the principles of their building and architectural peculiarities. The questions of the organization of the information security in the wireless corporate networks are considered in the article.

Keywords: wireless network, infrastructure, user services, profiling devices, access point, commutation, fail-safe feature, triangulation survey, authentication, access audit, information security.

ACM Classification Keywords: H. Information Systems. H.1 Models and Principles. H.1.1 Systems and Information Theory. F.1.2 Models of Computation. 1.6.1 Simulation Theory

Link:

ОСОБЕННОСТИ ПОСТРОЕНИЯ СОВРЕМЕННОЙ БЕСПРОВОДНОЙ КОРПОРАТИВНОЙ СЕТИ (Building Peculiarities of the Modern Wireless Corporate Network)

Юрий Лисецкий, Наталья Каревина

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p06.pdf

TWO-LEVEL GENETIC ALGORITHM FOR PROGRAMMABLE LOGIC DEVICES RECONFIGURATION
By: Aleksey Gorodilov   (2731 reads)
Rating: (1.00/10)

Abstract: The article considers the problem of programmable logic device reconfiguration after a failure of logic elements. The task is relevant to areas such as space exploration and important industrial facilities management that use highly reliable fault-tolerant systems. The article considers the failures of logic elements in the configurable logic blocks. For optimal reconfiguration logic modules must be placed on a programmable logic device without using faulty logic elements, while minimizing occupied area, the bond lengths and delays. The first step in solving the problem is to choose compactly located logic elements that will be involved in the implementation of the circuit. Compactness is understood as the minimum amount of information necessary to describe the set of logic elements. This task can not be solved exactly and effectively, but can be approximately solved by using various heuristics, including genetic algorithms. This article describes several well-known approaches to the problem and offers an original two-level coding method for constructing a genetic algorithm that takes into account features of the problem and uses standard genetic operators. The proposed algorithm is implemented in practice in the form of a computer program to compare its performance with some other algorithms. Comparison of different heuristic algorithms in terms of accuracy of the solution and estimated speed of the proposed algorithm are given. One can say that the proposed genetic algorithm works on average longer than other heuristic algorithms, but finds a more accurate solution. This leads to a reduction of reconfiguration time and, thereby, increase availability ratio of the programmable logic device.

Keywords: programmable logic devices, reconfiguration, reliability, genetic algorithm.

ACM Classification Keywords: I.2 Artificial Intelligence: I.2.8 Problem Solving, Control Methods, and Search - Heuristic methods, B.8 Performance and Reliability: B.8.1 Reliability, Testing, and Fault-Tolerance?

Link:

ДВУХУРОВНЕВЫЙ ГЕНЕТИЧЕСКИЙ АЛГОРИТМ РЕКОНФИГУРАЦИИ ПРОГРАММИРУЕМЫХ ЛОГИЧЕСКИХ ИНТЕГРАЛЬНЫХ СХЕМ (Two-level genetic algorithm for programmable logic devices reconfiguration)

Алексей Городилов

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p05.pdf

PSYCHOLOGICAL APPROACH TO EXTRACTING KNOWLEDGE IN HUMAN-COMPUTER INTERACTION ...
By: Arseniy Bakanov   (3164 reads)
Rating: (1.00/10)

Abstract: This article describes the method of extraction and visualization of knowledge in the process of human-computer interaction with electronic docflow system. The paper describes the experiments, the results of experiments are given. The described approach to extracting knowledge, focused on the use of docflow systems, and involves the use of algorithms and rules to identify heuristics in decision-making in solving management problems.

Keywords: Docflow system, Extracting knowledge, Visualization knowledge.

Классификация ключевых слов ACM: H.4.2 Types of Systems - Decision support

Link:

ПСИХОЛОГИЧЕСКИЙ ПОДХОД К ИЗВЛЕЧЕНИЮ ЗНАНИЙ В ПРОЦЕССЕ ЧЕЛОВЕКО-КОМПЬЮТЕРНОГО ВЗАИМОДЕЙСТВИЯ С СИСТЕМОЙ ЭЛЕКТРОННОГО ДОКУМЕНТООБОРОТА (Psychological Approach to Extracting Knowledge in Human-Computer? Interaction with Electronic Docflow System)

Арсений Баканов

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p04.pdf

INFORMATION SUPPORT OF PREPARATION PROJECT MANAGEMENT DECISIONS ON ...
By: Nina Bakanova  (2917 reads)
Rating: (1.00/10)

Abstract: This article describes the design features of informational support project preparation of management decisions on the execution of documents input. Development of functions based on the method of content analysis of the document into coincidence with the terms of office directory distribution organization.

Keywords: Docflow system, content analyses

ACM Classification Keywords: H.4.2 Types of Systems - Decision support

Link:

ИНФОРМАЦИОННАЯ ПОДДЕРЖКА ПОДГОТОВКИ ПРОЕКТОВ УПРАВЛЕНЧЕСКИХ РЕШЕНИЙ ПО ОРГАНИЗАЦИОННОЙ ДЕЯТЕЛЬНОСТИ (Information Support of Preparation Project Management Decisions on Organizational Performance)

Нина Баканова

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p03.pdf

SOFTWARE SYSTEM FOR SOLVING SYNTHESIS PROBLEM "SYNTHESIS 1.0"
By: Alexander Dokukin   (2264 reads)
Rating: (1.00/10)

Abstract: The software system for solving previously introduced synthesis task in pattern recognition theory is described. The algorithms used in the system are based on theoretical results described earlier. Estimates of its speed and quality in real-world tasks of large scale are presented.

Keywords: algebraic recognition theory, synthesis task, software system

ACM Classification Keywords: I.5 Pattern Recognition — I.5.0 General.

Link:

ПРОГРАММНАЯ СИСТЕМА ДЛЯ РЕШЕНИЯ ЗАДАЧИ СИНТЕЗА SYNTHESIS 1.0 (Software System for Solving Synthesis Problem "Synthesis 1.0")

Александр Докукин

http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p02.pdf

[prev]  Page: 7/66  [next]
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66 
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.16 secs ]   [ Memory usage: 7.57MB ]   [ GZIP Disabled ]   [ Server load: 0.17 ]