Menu
FUZZY MODELS AND METHODS OF RATIONAL RESOURCE ALLOCATION
By: Olexii Voloshyn, Vasyl Laver  (2027 reads)
Rating: (1.00/10)

Abstract: We consider the application of fuzzy sets theory to classical rationing problem. Fuzzy generalizations of classical methods are proposed, the theory is illustrated by a numeric example. The fuzzy methods are compared with their crisp analogs using the inequality measures.

Keywords: rationing problem, rational distribution, fuzzy models and methods, inequality measures.

ACM Classification Keywords: H.4.2 Information Systems Applications - Types of Systems - Decision Support

Link:

FUZZY MODELS AND METHODS OF RATIONAL RESOURCE ALLOCATION

Olexii Voloshyn, Vasyl Laver

http://www.foibg.com/ijima//vol05/ijima05-01-p01.pdf

Analysis of Usage of Throughput as a Parameter of Quality of Service of ...
By: Yevhen Kushnirenko, Galyna Gayvoronska  (2404 reads)
Rating: (1.00/10)

Abstract: Analyzed impact of throughput on demands satisfaction of users of different services with different types of information transmition with the purpose to include throughput in a number of quality of service parameters of user of telecommunication network.

Key words: telecommunication network, quality of service, throughput, correlation, quality index

ACM Classification Keywords: C.4 Performance of systems, С.2. Computer-communication networks, H. Information Systems - H.1 Models and Principles

Link:

Analysis of Usage of Throughput as a Parameter of Quality of Service of User of Telecommunication Network

Yevhen Kushnirenko, Galyna Gayvoronska

http://www.foibg.com/ijima/vol04/ijima04-04-p07.pdf

SCALAR CHOICE CRITERIA'S USAGE FOR DETERMINATION OF THE OPTIMUM SWITCHING ...
By: Galina Gayvoronska, Borys Rybalov   (1990 reads)
Rating: (1.00/10)

Abstract: An approach to the optimum switching scheme’s choice is proposed. It is based on the scalar choice criteria. Problem of the multistage switching system's structure's determination is solved. Such system is characterized by strict non-blocking and doesn't require rerouting at the usage of any connection establishment procedure. Obtained results can be applied at the design of spatial optical signals' switching systems, allowing improvement of the optical telecommunications networks' functioning by increasing the performance of switching operations in these networks.

Keywords: optical signals’ switching, optical signals' switching system, switching scheme, scalar choice criteria.

ACM: B.6 LOGIC DESIGN – B.6.3 Design Aids, B.4 INPUT/OUTPUT AND DATA COMMUNICATIONS - B.4.3 Interconnections (subsystems). Conference topic: Informational Modelling.

Link:

SCALAR CHOICE CRITERIA'S USAGE FOR DETERMINATION OF THE OPTIMUM SWITCHING CIRCUIT FOR OPTICAL SIGNALS' SWITCHING SYSTEM

Galina Gayvoronska, Borys Rybalov

http://www.foibg.com/ijima/vol04/ijima04-04-p06.pdf

Using Decision Theory Methods to Optimize the Access Networks Synthesis Process
By: Galina Gaivoronskaya, Maria Hilchyk   (1941 reads)
Rating: (1.00/10)

Abstract: Using the methods of the theory of decision-making to optimize the synthesis of access networks. Analyzed the synthesis of access networks and the use of decision theory for optimization. Choose the optimum method of decision theory, which may be used to facilitate the synthesis of access networks.

Keywords: access network, synthesis access networks, decision theory, decision theory methods.

ACM Classification Keywords: H. Information Systems – H.1 Models and Principles, E. Data – E.0 General.

Link:

Using Decision Theory Methods to Optimize the Access Networks Synthesis Process

Galina Gaivoronskaya, Maria Hilchyk

http://www.foibg.com/ijima/vol04/ijima04-04-p05.pdf

PRIVATE GROUPS IN PEER-TO-PEER NETWORKS
By: Oleh Hordiichuk, Oleksiy Bychkov   (1932 reads)
Rating: (1.00/10)

Abstract: Peer-to-peer architectures are designed for the sharing network, storage and computing resources solving a scalability problem. At the same time they lack capabilities for creating private groups that are necessary for a limited access data exchanging – a common task for e-learning systems. In this paper proposed a new peer-to-peer system that is able to create private groups that is built on top of WebRTC stack and thus is capable to run in modern browsers without additional software installation. It solves problems of authentication, data validity, management control and secure peer discovery in distributed network systems by using private and public keys as well as data exchanging rules that provide same level of data dissemination security as in client-server applications. This system provides ability of creating closed groups of students, where teacher is able to transmit data securely and combine low operational cost of video streaming and file sharing advantages of Tailcast topology. Moreover teacher’s capabilities are not limited to only data dissemination process, this application gives additional functions like banning and kicking users as well as a secure access promoting to other participants of the network. While proposed techniques are designed and implemented for the Tailcast topology, it’s shown that it is possible to apply these recommendations in most peer-to-peer applications including other video-streaming topologies, distributed hash tables and file sharing.

Keywords: peer-to-peer, security, distributed systems, e-learning

ACM Classification Keywords: C.2.4 Distributed Systems

Link:

PRIVATE GROUPS IN PEER-TO-PEER NETWORKS

Oleh Hordiichuk, Oleksiy Bychkov

http://www.foibg.com/ijima/vol04/ijima04-04-p04.pdf

IMPROVING OF EXISTING PERMISSION SYSTEM IN ANDROID OS
By: Volodymyr Kazymyr, Igor Karpachev   (2206 reads)
Rating: (1.00/10)

Abstract: Smartphones for last five-ten years had become ubiquitous. Despite the fact, that these small devices are very widespread around the world - security are still being understood. As a result, the security is extremely vital. Basically security area is very underdeveloped and still vulnerable. On the one hand this article is an investigation of existing pros and cons of android security system. On the other hand it is an example of how to improve current mobile security state.

Keywords: security model, OS Android, functional security.

ACM Classification Keywords: D.4.6 Access controls

Link:

IMPROVING OF EXISTING PERMISSION SYSTEM IN ANDROID OS

Volodymyr Kazymyr, Igor Karpachev

http://www.foibg.com/ijima/vol04/ijima04-04-p03.pdf

PROJECT MANAGEMENT IN CYBERSECURITY RESEARCH IN UKRAINE
By: Maria Dorosh, Vitalii Lytvynov, Maxim Saveliev  (1864 reads)
Rating: (1.00/10)

Abstract: This paper presents an approach to cyber security research project management. The paper includes the Project Management Office model and conception that can be created in educational and research institution like University. The organization structure of the cyber security research project and the peculiarities of university team organization on cyber security research project are shown.

Keywords: project management, cyber security, educational and research projects.

ACM Classification Keywords: K.6.1 Management of Computing and Information Systems - Project and People Management

Link:

PROJECT MANAGEMENT IN CYBERSECURITY RESEARCH IN UKRAINE

Maria Dorosh, Vitalii Lytvynov, Maxim Saveliev

http://www.foibg.com/ijima/vol04/ijima04-04-p02.pdf

RISK BEHAVIOUR IN A SET OF INTERVAL ALTERNATIVES
By: Gennady Shepelev   (2165 reads)
Rating: (1.00/10)

Abstract: Problem comparing alternatives under interval uncertainty is studied. It is assumed that the compared alternatives have indicators of quality in the form of interval estimates. It is shown that mentioned problem cannot be unambiguously resolved by purely mathematical methods and requires using of decision maker’s preferences. From two possible situations of comparing, situation of unique choice and situation of repeated one, the first situation, which is typical for problems of forecasting, is analyzed. Quantitative measure of plausibility of implementation for tested hypothesis about preference of an alternative in comparison with others in their set and measure of risk connected with possible falsity of such hypothesis are introduced. It is shown that this risk is increased with increasing number of compared alternatives. Some methods to calculate risks as well as procedure of decision-making in the framework of a set of alternatives are proposed.

Keywords: comparing interval alternatives, dependence of the risk on number of alternatives, probability logic in comparing interval alternatives, methods and procedures of decision-making for the problem.

ACM Classification Keywords: H.1.2 Human information processing. G3 Distribution functions. I.2.3 Uncertainty, “fuzzy”, and probabilistic reasoning.

Link:

RISK BEHAVIOUR IN A SET OF INTERVAL ALTERNATIVES

Gennady Shepelev

http://www.foibg.com/ijima/vol04/ijima04-04-p01.pdf

Peculiarities Analysis of Statistical Information in ICT
By: Galina Gayvoronska, Petro Yatsuk, Yulya Kazak  (2561 reads)
Rating: (1.00/10)

Abstract: Huge amounts of statistical information, which has become available at the information society creation, have led to the increase of number of this information analysis methods’ incorrect usage. This often entails erroneous conclusions that may lead to negative consequences. Some guidance on the conditions of data analysis methods’ usage are given in the work in order to avoid such a situation as well as electronic communications statistics’ stepwise analysis method is formed.

Keywords: statistical information, information and communication technology, information and communication services

ACM Classification Keywords: G.3 Mathematics Of Computing – Probability And Statistics – Statistical Computing, Time Series Analysis, Correlation and Regression Analysis; C.2 ComputerCommunication? Networks.

Link:

Peculiarities Analysis of Statistical Information in ICT

Galina Gayvoronska, Petro Yatsuk, Yulya Kazak

http://www.foibg.com/ijima/vol04/ijima04-03-p04.pdf

POLLEN GRAINS RECOGNITION USING STRUCTURAL APPROACH AND NEURAL NETWORKS
By: Natalia Khanzhina, Elena Zamyatina   (2295 reads)
Rating: (1.00/10)

Abstract: This paper describes the problem of automated pollen grains image recognition using images from microscope. This problem is relevant because it allows to automate a complex process of pollen grains classification and to determine the beginning of pollen dispersion which cause an the allergic responses. The main recognition methods are Hamming network Korotkiy, 1992 and structural approach Fu, 1977. The paper includes Hamming network advantages over Hopfield network Ossowski, 2000. The steps of preprocessing (noise filtering, image binarization, segmentation) use OpenCV Bradsky et al, 2008 functions and the feature point method Bay et al, 2008. The paper describes both preprocessing algorithms and main recognition methods. The experiments results showed a relative efficiency of these methods. The conclusions about methods productivity based on errors of type I and II. The paper includes alternative recognition methods which are planning to use in the follow up research.

Keywords: image recognition, OpenCV, Hamming network, feature points method, pollen-grains, structural pattern recognition.

ACM Classification Keywords: I.5.1 Pattern Recognition Model - Neural nets, Structural, I.5.4 Pattern Recognition Applications - Computer vision

Link:

POLLEN GRAINS RECOGNITION USING STRUCTURAL APPROACH AND NEURAL NETWORKS

Natalia Khanzhina, Elena Zamyatina

http://www.foibg.com/ijima/vol04/ijima04-03-p03.pdf

AN APPROACH TO MULTIFACETED BUSINESS PROCESS MODELING WITH MODEL TRANSFORMATION
By: Roman Nesterov, Lyudmila Lyadova   (2035 reads)
Rating: (1.00/10)

Abstract: The approach to models generation automation and implementation of multifaceted business process modeling on the basis of graphical model transformation is described. To create graphical models of diverse notations (diagrams in notations of visual modeling languages) one can exploit visual modeling software tools and language workbenches, DSM platforms. Domain specific modeling tools allow simplifying model design process, to involve domain experts (they are not masters of information technologies and have not programming skills) to formal model development. Newly-created models can be converted into simulation models or specific analytical models with the model transformation tools. Therefore, at new task solving process with modeling tools modelers have not to duplicate model development with new tools in new language notation. Model designers can use most suitable tools and most expressive languages for models development in their domain to solve their tasks. Obtained models after transformation can be examined with means of specific simulation modeling systems including, for instance, AnyLogic?, or with mathematical software packages such as Mathcad, Maple or Mathematica. The visual business process modeling notation choice is substantiated. Mathematical model named DFD-graph is used as mathematical basis of model generation tools. The normalization rules form the backbone to the DFD business process model normalization. This algorithm is the basis of automating model generation software implementation.

Keywords: business process modeling, visual modeling languages, business process analysis, mathematical modeling, model development automation, model transformations, model reusing.

ACM Classification Keywords: D.2 SOFTWARE ENGINEERING: D.2.2 Design Tools and Techniques – Computer-aided software engineering (CASE), Programmer workbench; D.2.13 Reusable Software – Domain engineering, Reuse models. I.6 SIMULATION AND MODELING: I.6.2 Simulation Languages; I.6.3 Applications; I.6.4 Model Validation and Analysis; I.6.5 Model Development. G.4 MATHEMATICAL SOFTWARE: Algorithm design and analysis, User interfaces.

Link:

AN APPROACH TO MULTIFACETED BUSINESS PROCESS MODELING WITH MODEL TRANSFORMATION TOOLS

Roman Nesterov, Lyudmila Lyadova

http://www.foibg.com/ijima/vol04/ijima04-03-p02.pdf

About convergence of fuzzy perceptive elements sequences, defined on ...
By: Alexei Bychkov, Eugene Ivanov, Olha Suprun  (2265 reads)
Rating: (1.00/10)

About convergence of fuzzy perceptive elements sequences, defined on different opportunities spaces Alexei Bychkov, Eugene Ivanov, Olha Suprun Abstract: Criteria for the existence of a model of convergence and divergence with the need 1 for systems of finite-element sequences of fuzzy perceptive elements are obtained in this paper. Theorems about failing of the theoretic-possibility analogue of the law of large numbers for converge with the opportunities and the converge with need 1 are proven.

Keywords: theory of possibility, fuzzy logic, convergence of fuzzy perceptive elements.

ACM Classification Keywords: G.3 – Probability and Statistics; I – Computing Methodologies, I.6 – Simulation and Modeling.

Link:

About convergence of fuzzy perceptive elements sequences, defined on different opportunities spaces

Alexei Bychkov, Eugene Ivanov, Olha Suprun

http://www.foibg.com/ijima/vol04/ijima04-03-p01.pdf

PODCASTS: A BRIDGE FROM E-LEARNING TO M-LEARNING
By: Larisa Savyuk, Oleksiy Voychenko   (3076 reads)
Rating: (1.00/10)

Abstract: For educational organizations offering e-learning, intensive flow of technological innovations may be considered as both blessing and curse at the same time. On the one hand, many challenging tasks, such as creation of multimedia content, become easier with new technologies and tools, so e-learning creation, support and delivery is currently affordable in sense of investments and human resources as a part of common educational practice. On the other, large scale technological changes, such as transfer to a new platform, require meticulous analysis of potential benefits and drawbacks due to the need for personnel training, compatibility problems or unexpected development costs. Introduction of mobile learning as an option for distance learning delivery is a typical example. Nowadays e-learning services are available globally, so high technical quality and pedagogical soundness of learning offers are the issue of survival for educational organization. Technology innovations, as m-learning, cannot be ignored, taking into account wide availability of not only mobile devices but also mobile applications and services. Smartphone’s and tablets are widely used by the youth for various forms of communication, including email, Skype and specific apps, for playing games, or for internet access to news, data and content - browsing/skimming, listening to favorite music or watching HD video. Therefore, e-learning organizations have no other choice than offer m-learning for their customers - a learning content in a mobile-accessible mode - as it enhances flexibility, extends "learning hours" by time spent on commuting, waiting, and unexpected breaks, and thus makes e-learning offer more attractive. Several approaches to introduce m-learning are known, and each of them has both benefits and drawbacks further discussed in the paper. Thus each organization has to make its own decision based on short- and long-term analysis of its resources, personnel skills and qualifications, potential audience, and many other factors. There is no universal method to evaluate all of them, and related error cost may be significant. Moreover, due to specifics of mobile devices and environment in which mobile learning takes place, as well as some implementation issues, mobile mode may be rather an option for e-learning delivery and cover some but not all learning experiences offered in a course. Therefore, introduction of m-learning should not be costly or time-consuming, and should not require changes of the established e-learning International Journal "Information Models and Analyses" Volume 4, Number 2, 2015 193 processes. Considering that m-learning is a new delivery method, we decide to offer it in a trial mode to evaluate customers' readiness and preferences and adjust related mechanisms and resources accordingly. Based on the analysis of the approaches and requirements to mobile delivery, we suggest generating of podcasts as a first step in m-learning implementation. Further, the implementation of podcasts is described and its relevance is discussed.

Keywords: e-learning, m-learning, podcasting, LMS, content

ACM Classification Keywords: D. m Miscellaneous

Link:

PODCASTS: A BRIDGE FROM E-LEARNING TO M-LEARNING

Larisa Savyuk, Oleksiy Voychenko

http://www.foibg.com/ijima/vol04/ijima04-02-p07.pdf

THE EXPERIENCE OF THE AGENT-BASED SIMULATION SYSTEM DEVELOPING
By: Elena Zamyatina, Danil Karimov, Artiem Mitrakov,   (1875 reads)
Rating: (1.00/10)

Abstract: This paper discusses the problems of the agent-based simulation system design. It is well known that agent models extend the capabilities of simulation for solving some problems that can’t be solved by the methods of system dynamics and discrete event simulation. Particular attention in the design and the implementation of agent-based simulation authors pay to the problems of distributed simulation and the problems of intelligent agent’s implementation and the use of ontologies at all stages of the simulation experiments.

Keywords: simulation, agent-based model, distributed simulation, intelligent agent

ACM Classification Keywords: I.6 SIMULATION AND MODELING I.6.8 Types of Simulation - Distributed : I.2 ARTIFICIAL INTELLIGENCE I.2.5 Programming Languages and Software - Expert system tools and techniques

Link:

THE EXPERIENCE OF THE AGENT-BASED SIMULATION SYSTEM DEVELOPING

Elena Zamyatina, Danil Karimov, Artiem Mitrakov,

http://www.foibg.com/ijima/vol04/ijima04-02-p06.pdf

CONSTRUCTING AN OPTIMAL INVESTMENT PORTFOLIO BY USING FUZZY SETS THEORY
By: Yuri Zaychenko, Inna Sydoruk   (2389 reads)
Rating: (1.00/10)

Abstract: The problem of constructing an optimal portfolio of securities under uncertainty was considered. The global market crisis of recent years has shown that the existing theory of optimization of investment portfolios and forecasting stock indices exhausted and the revision of the basic theory of portfolio management is strongly needed. Therefore the fuzzy sets theory was used for getting an optimal portfolio. In this paper direct, dual and multicriteria problems with the use of triangular membership functions work were considered. The problem of portfolio optimization during the time period also was described in this article. In direct task we define structure of a portfolio, which will provide the maximum profitableness at the set risk level. In dual task we define structure of a portfolio, which will provide the minimum risk level at the set level of critical profitableness. In multicriteria problem we simultaneously maximize profitability and minimize risk level. The input data for the optimization system were predicted by using the Fuzzy Group Method of Data Handling (FGMDH). The optimal portfolios for assets were determined. The comparative analysis of optimal portfolios obtained by different methods and approaches was fulfilled.

Keywords: membership function, fuzzy sets theory, optimal portfolio, investments, stock securities, fuzzy number, FGMDH

ACM Classification Keywords: G.1.0 Mathematics of Computing– General – Error analysis; G.1.6 Mathematics of Computing – Numerical Analysis – Optimization - Gradient methods, Least squares methods; I.2.3 Computing Methodologies - Artificial Intelligence - Uncertainty, “fuzzy”, and probabilistic reasoning.

Link:

CONSTRUCTING AN OPTIMAL INVESTMENT PORTFOLIO BY USING FUZZY SETS THEORY

Yuri Zaychenko, Inna Sydoruk

http://www.foibg.com/ijima/vol04/ijima04-02-p05.pdf

PROPERTIES PROOF METHOD IN IPCL APPLICATION TO REAL-WORLD SYSTEM CORRECTNESS ...
By: Mykyta Kartavov, Taras Panchenko, Nataliya Polishchuk  (2549 reads)
Rating: (1.00/10)

Abstract: The correctness proof for programs with parallelism, and interleaving concurrency with shared memory in particular, is complicated problem because the state of separate execution thread can be changed even in ready-to-run (waiting) time due to possible inference of one execution path over the other via shared data or messaging mechanics. Classical methods like Floyd-Hoare? cannot be applied directly to this case and new non-trivial methods are required to cope with such a complexity. The safety property proof of real-world system using method for software correctness proof in Interleaving Parallel Composition Language (for defined custom class of programs – namely server software for Symmetric Multi-Processing? architecture like DB-server or Web-server) is the subject of this article. Operational semantics of the system is defined in terms of state transitions. Program Invariant as well as Pre- and Post- conditions are formulated in accordance with the methodology. Conclusions about adequacy of the Method usage for such a kind of tasks (thanks to flexibility of compositionnominative platform) and its practicality as well as ease of use for real-world systems have been made based on this and other authors’ works.

Keywords: software correctness, safety proof, concurrent program, interleaving, invariant, IPCL, composition approach, composition-nominative languages, formal verification.

ACM Classification Keywords: F.3.1 Theory of Computation - LOGICS AND MEANINGS OF PROGRAMS - Specifying and Verifying and Reasoning about Programs, D.2.4 Software - SOFTWARE ENGINEERING - Software/Program Verification.

Link:

PROPERTIES PROOF METHOD IN IPCL APPLICATION TO REAL-WORLD SYSTEM CORRECTNESS PROOF

Mykyta Kartavov, Taras Panchenko, Nataliya Polishchuk

http://www.foibg.com/ijima/vol04/ijima04-02-p04.pdf

AN APPROACH TO BUSINESS PROCESSES REENGINEERING BASED ON INTEGRATION OF ...
By: Renata Ayzatullova, Lyudmila Lyadova, Irina Shalyaeva   (1994 reads)
Rating: (1.00/10)

Abstract: An approach to reengineering business processes through the integration of the domain specific modeling platform and Process Mining tools is described. An analysis of the existing approaches to business processes improvement is presented and restrictions are shown. The Process Mining methods are related to business process reengineering stages and tasks. Comparative analysis of Process Mining tools is executed. The advantages of the using of domain specific modeling tools (language workbenches, DSM platforms) are substantiated. Brief comparison of various visual languages notations and model transformation examples are described. The DSM platform ensures mutual understanding between specialists. The MetaLanguage? DSM platform is the basis of integration tools. Some DSL (metamodels) are described and transformations are illustrated. The implementation of integrated tools reduces the complexity of analyst’s work.

Keywords: business processes reengineering, domain specific modeling, DSM, modeling languages, DSL, language toolkits, DSM platform, model transformations, business process analysis, Process Mining.

ACM Classification Keywords: H.4 INFORMATION SYSTEMS APPLICATIONS: H.4.1 Office Automation –Workflow management; H.4.2 Types of Systems – Decision support (e.g., MIS). I.6 SIMULATION AND MODELING: I.6.2 Simulation Languages; I.6.4 Model Validation and Analysis; I.6.5 Model Development Modeling methodologies.

Link:

AN APPROACH TO BUSINESS PROCESSES REENGINEERING BASED ON INTEGRATION OF THE PROCESS MINING METHODS AND DOMAIN SPECIFIC MODELING TOOLS

Renata Ayzatullova, Lyudmila Lyadova, Irina Shalyaeva

http://www.foibg.com/ijima/vol04/ijima04-02-p03.pdf

Index matrices with function-type of elements. Part 2
By: Krassimir T. Atanassov  (1827 reads)
Rating: (1.00/10)

Abstract. Index Matrices (IMs) are extensions of the ordinary matrices. Some of the operations and relations defined over IMs are analogous of the standard ones, while there have been defined new ones, as well. Operators that do not have analogues in matrix theory have been defined, as well. In general, the elements of an IM can be real or complex numbers, as well as propositions or predicates. In the present paper, new operation over IMs with elements being functions, is defined, and some of its properties are discussed.

Keywords: Function, Index matrix, Operation, Operator, Relation.

AMS Classification: 11C20

Link:

Index matrices with function-type of elements. Part 2

Krassimir T. Atanassov

http://www.foibg.com/ijima/vol04/ijima04-02-p02.pdf

AN UNCERTAIN CAUCHY PROBLEM OF A NEW CLASS OF FUZZY DIFFERENTIAL EQUATIONS
By: Alexei Bychkov, Eugene Ivanov, Olha Suprun  (1883 reads)
Rating: (1.00/10)

Abstract: The concept of fuzzy perception roaming process is entered. A new integral is built by the fuzzy perception roaming process. Properties of this integral are studied. The new class of differential equalizations is acquired. A theorem of existence and uniqueness of a solution for the new class of fuzzy perception differential equations are proved.

Keywords: possibility-theoretical approach, dynamic processes, soft modeling, fuzzy perception processes, Cauchy problem.

ACM Classification Keywords: G.1.7 – Ordinary Differential Equations.

Link:

AN UNCERTAIN CAUCHY PROBLEM OF A NEW CLASS OF FUZZY DIFFERENTIAL EQUATIONS

Alexei Bychkov, Eugene Ivanov, Olha Suprun

http://www.foibg.com/ijima/vol04/ijima04-02-p01.pdf

METHOD OF ESTIMATING RELIABILITY OF INFORMATION TRANSMISSION IN WIRELESS ...
By: Sergey Zaitsev   (1843 reads)
Rating: (1.00/10)

Abstract: This paper describes a method for estimating the reliability of information transmission in wireless networks operating in conditions of high noise and interference. The method is based on obtaining analytical relationships for calculating the reliability of information transmission based on nonlinear regression analysis and the use of log-likelihood function about transmitted bits in decisionmaking in the turbo decoder.

Keywords: information technologies, a priori uncertainty, wireless networks, turbo codes

ACM Classification Keywords: H.4 Information system applications, H.4.3 Communications Applications and Expert Systems, G.1.6 Optimization, I.6 Simulation and Modeling, K.6.4 System Management

Link:

METHOD OF ESTIMATING RELIABILITY OF INFORMATION TRANSMISSION IN WIRELESS NETWORKS CHANNELS INCREASE IN NOISE AND INTERFERENCE

Sergey Zaitsev

http://www.foibg.com/ijima/vol04/ijima04-01-p08.pdf

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP)
By: Irma Aslanishvili, Tariel Khvedelidze  (1885 reads)
Rating: (1.00/10)

Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that can freely and dynamically self-organize Namicheishvili et al, 2011. In this way they form arbitrary, and temporary “Ad hoc” networks topologies, allowing devices to seamlessly interconnect in areas with no pre-existing infrastructure. Introduction of new protocols such as Bluetooth, IEEE 802.11and Hyperlink are making possible the deployment of ad hoc networks for commercial purposes. TCP (Transmission Control Protocol) was designed to provide reliable end-to end delivery of data over unreliable networks. In theory, TCP should be independent of the technology of the underlying infrastructure. In particular, TCP should not care whether the Internet Protocol (IP) is running over wired or wireless connections. In practice, it does matter because most TCP deployments have been carefully designed based on assumptions that are specific to wired networks. Ignoring the properties of wireless transmission can lead to TCP implementations with poor performance. In practice, most TCP deployments have been carefully designed in the context of wired networks. In order to adapt TCP to the ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate between the different types of losses. Indeed, in mobile or static ad hoc networks losses are not always due to network congestion, as it is mostly the case in wired networks. In this paper, we present model: how TCP can be affected by mobility and lower layers protocols.

Keywords: Ad Hoc Networks, protocols, Routing protocols, packet, source node, Relay routing, finite memory, TCP, Simulation Metrics, layers protocols TCP Feedback, TCP-DOOR.

Link:

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP)

Irma Aslanishvili, Tariel Khvedelidze

http://www.foibg.com/ijima/vol04/ijima04-01-p07.pdf

AN APPROACH TO BEHAVIORAL SOFTWARE MODELS ANALYTICAL REPRESENTATION
By: Elena Chebanyuk   (2023 reads)
Rating: (1.00/10)

Abstract: According to standard UML 2.5 Behavioral Software Models (BSMs) are UML diagrams that represent software behavior UML 2.5, 2012. An approach of BSM analytical representation is proposed in this paper. Such BSMs as Use Case Diagrams (UCDs), Collaboration Diagrams (CDs) and Sequence Diagrams (SDs) are considered at this paper. In order to design this approach objects and operations that are both common and specific for every type of considering UML diagrams are defined. In order to prepare general analytical representation of BSM it is proposed to form two tuples containing objects and operations. Thus, BSM is represented as a Cartesian product of these two tuples. Then analytical representation of conditional operation is proposed. The peculiarity of the represented approach is that unified analytical representation of some operation for all types of considering BSMs is used. Such representation facilitates performing many operations in Model-Driven? Architecture (MDA) area. Literature review shows that researches of BSMs mostly focused on preparation of an analytical representation for parallel processes Hu, 2014, Dove, 2014 or designing transformation technics Rhazali, 2014, Romera ,2014, FUML, 2013, Wang, 2014, Bonaris, 2014 and ect.. But conditional operations are important constituents of any complex algorithms of processes. Existing technics of conditional operations description, for example Object Constraint Language (OCL) OCL 2.4, 2014, do not contain detailed notation for representation of any condition with given precision level. The notation for formal analytical representation of conditional operation is represented in this paper. It is shown that any complex conditions can be described in terms of the proposed notation. In order to prove this thesis different conditional blocks are designed from Collaboration Diagrams. Also the analytical representation of conditional block is obtained from other types of considering BSM. Also in the point further research the general idea of framework for the analytical description of BSM is proposed. In conclusion advantages of implementing of the proposed approach to perform different activities in software development lifecycle are formulated.

Keywords: Analytical representation, UML diagrams, Set-theory, Object Constraint Languages (OCL), Model-Driven? Architecture (MDA).

ACM Classification Keywords: D.2.2 - Design Tools and Techniques, D.2.11 Software Architecture

Link:

AN APPROACH TO BEHAVIORAL SOFTWARE MODELS ANALYTICAL REPRESENTATION

Elena Chebanyuk

http://www.foibg.com/ijima/vol04/ijima04-01-p06.pdf

ADAPTIVE ALGORITHM FOR MANAGEMENT BY WEIGHT COEFFICIENTS OF THE TRAFFIC ...
By: Kiril Kolchakov, Vladimir Monov  (1935 reads)
Rating: (1.00/10)

bstract: An adaptive algorithm for management by weight coefficients of the traffic in Crossbar commutator is synthesisеd. The algorithm is adaptive because the matrix of weights corresponds to the matrix of the requests, each request receives a weight. The algorithm is modified in order to reduce the number of the weights by the diagonal location.

Keywords: Network nodes, Crossbar switch, Conflict elimination, Packet messages.

ACM Classification Keywords: C.2.1 Network Architecture and Design, C.4 Performance of Systems.

Link:

ADAPTIVE ALGORITHM FOR MANAGEMENT BY WEIGHT COEFFICIENTS OF THE TRAFFIC IN CROSSBAR COMMUTATOR

Kiril Kolchakov, Vladimir Monov

http://www.foibg.com/ijima/vol04/ijima04-01-p05.pdf

ОNTOLOGICAL APPROACH TO A CONSTRUCTION OF THE SIMULATION SYSTEM FOR ...
By: Elena Zamyatina, Alexander Mikov, Roman Mikheev   (1810 reads)
Rating: (1.00/10)

Abstract: This paper discusses the problem of simulation system constructing for the specific domain. Authors suggest using the ontological approach. The simulation system TriadNS is considered. This simulation system is dedicated for computer networks design and analysis. Authors represent base ontology and some other ontologies describing the concepts of a specific domain.

Keywords: simulation, ontology, computer network, multi model approach

ACM Classification Keywords: I.6 Simulation and Modeling, I.6.8 Types of Simulation - Distributed: I.2 Artificial Intelligence, I.2.5 Programming Languages and Software - Expert system tools and techniques

Link:

ОNTOLOGICAL APPROACH TO A CONSTRUCTION OF THE SIMULATION SYSTEM FOR THE SPECIFIC DOMAIN

Elena Zamyatina, Alexander Mikov, Roman Mikheev

http://www.foibg.com/ijima/vol04/ijima04-01-p04.pdf

SIMULATION MODELING IN THE CONSTRUCTION OF DYNAMIC INTEGRATED EXPERT SYSTEMS
By: Galina Rybina, Victor Rybin  (1903 reads)
Rating: (1.00/10)

Abstract: Problems of integrating methods and simulation modeling tools with the technology of dynamic integrated expert systems (IES) developed on the basis of task-oriented methodology and ATTECHNOLOGY workbench are investigated in the context of the modern stage of simulation modeling development. The current version of the simulation modeling subsystem, functioning as a part of the dynamic version of the AT-TECHNOLOGY workbench, is described. Basic subsystem components and the construction technology of simulation models of complex technical systems are considered, as well as examples of application of this subsystem in prototyping dynamic IES are provided.

Keywords: dynamic intelligent systems, dynamic integrated expert systems, task-oriented methodology, simulation, complex engineering systems, simulation modeling subsystem, simulation model, AT-TECHNOLOGY workbench.

Link:

SIMULATION MODELING IN THE CONSTRUCTION OF DYNAMIC INTEGRATED EXPERT SYSTEMS

Galina Rybina, Victor Rybin

http://www.foibg.com/ijima/vol04/ijima04-01-p03.pdf

[prev]  Page: 3/66  [next]
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66 
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.17 secs ]   [ Memory usage: 7.57MB ]   [ GZIP Disabled ]   [ Server load: 2.02 ]