|
MULTILEVEL SENSOR NETWORKS FOR PRECISION FARMING AND ENVIRONMENTAL MONITORING
By: Romanov et al.
(3165 reads)
Rating:
(1.00/10)
|
Abstract: Plants as all alive suffer from impacts of natural or anthropogenic stress factors. Creation of
wireless smart biosensors and wireless sensor networks on their base for express-diagnostic of plant
state on large territories under impact of stresses of different origin provides to apply managerial
measures in time to decrease the negative impact of natural and anthropogenic load on the state of
agricultural lands and green plantations of megalopolis, national preserves, woodlands and parklands.
The applications of wireless technologies in agriculture and ecological monitoring are considered. The
main aim of the multilevel sensor network is real-time data acquisition of state of plants on large
territories, on-line data processing and timely decision making according to specified criteria. Multilevel
sensor network has two levels. The low level is intended for plant state data acquisition and consists of
several wireless sensor networks as primary data acquisition systems. The high level of multilevel
sensor network works in "cloud" environment and the main purpose of this level is data storage, data
analysis and managerial decision making. The main work purpose is development of low-cost wireless
smart biosensors for express-diagnostics of common state of plants and creating the proper software
and methodical support for integration of these wireless biosensors into wireless sensor network and
multilevel sensor network for express-diagnostics of plant state on large territories, what make possible
to spread the application of new information and communication technologies to industrial agriculture,
ecological monitoring and environmental protection.
Keywords: wireless sensor network, agriculture, ecology, environmental monitoring.
ACM Classification Keywords: J.3 Life and Medical Sciences - Biology and Genetics
Link:
MULTILEVEL SENSOR NETWORKS FOR PRECISION FARMING AND
ENVIRONMENTAL MONITORING
Volodymyr Romanov, Valeriya Gribova, Igor Galelyuka, Oleksandr Voronenko
http://www.foibg.com/ijitk/ijitk-vol09/ijitk09-01-p01.pdf
|
ИНВАРИАНТНЫЕ ЗАДАЧИ ОНТОЛОГИЧЕСКИХ СИСТЕМ
By: Александр Стрижак
(3805 reads)
Rating:
(1.00/10)
|
Аннотация: В статье представлен подход к достижению разрешимости проблемных ситуаций на
основе поддержки взаимодействия онтологических систем, обеспечивающих процессы достижения
решений прикладных задач. Описывается категоризация задач, выделяется группа метазадач, как
инвариантов использования онтологий в процессе достижения разрешимости проблемных ситуаций.
Определяется таксономия как системный базис формирования последовательности утверждений,
описывающих состояния процесса решения сложных прикладных задач.
Ключевые слова: задача, онтология, категория, коммутативная диаграмма, таксономия
ACM Classification Keywords: I.2 ARTIFICIAL INTELLIGENCE - I.2.4 Knowledge Representation Formalisms
and Methods, H. Information Systems – H.2 DATABASE MANAGEMENT – H.2.4 Systems
Link:
ИНВАРИАНТНЫЕ ЗАДАЧИ ОНТОЛОГИЧЕСКИХ СИСТЕМ
Александр Стрижак
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-04-p05.pdf
|
A MODEL FOR PERFORMANCE ANALISYSIS OF MULTICAST ROUTING PROTOCOLS
By: Irma Aslanishvili
(3049 reads)
Rating:
(1.00/10)
|
Abstract: We study mobile communication of the ad hoc networks. Ad hoc networks are complex distributed
systems that consist of wireless mobile or static nodes that can freely and dynamically self-organize
Namicheishvili et al, 2011.
The main finding is the performance of Multicast Routing protocol with Dynamic Core (MRDC) multicast tree in a
variety of mobility and communication scenarios. We focused on control plan of MRDC. Because of this, in this
paper the performance means the efficiency and robustness of multicast tree. Mode selection of forwarding plan
is disabled and multicast routers broadcast multicast packets. The aim of the simulation is to evaluate the
robustness and efficiency of multicast tree.
The performance analysis contains of two goals: to select MRDC key parameters (e.g. period of multicast tree
refresh and threshold for average queue length) and to analyze performance in different traffic loads and mobility
pattern. The performance analysis is further divided into two parts: multicast tree analysis and protocol
comparison.
Keywords: Ad Hoc Networks, protocols, Routing protocols, packet, source node, Relay routing, finite memory,
MRDC Multicast Tree Analysis, Simulation Metrics
ACM Keywords: C.2.2 Network Protocols; C.2.3 Network Operations
Link:
A MODEL FOR PERFORMANCE ANALISYSIS OF MULTICAST ROUTING
PROTOCOLS
Irma Aslanishvili
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-04-p04.pdf
|
CHRONOLOGICAL DISTRIBUTION OF THE INFORMATION FROM THE OTTOMAN ARCHIVES...
By: Jordan Tabov, Gelina Panayotova
(3077 reads)
Rating:
(1.00/10)
|
Abstract: . Together with the results from research articles of Kiiliq the considerations given in the paper give
rise to the hypothesis that the "information anomaly", noticed M. Kiili is likely a consequence of the actual loss of
the central sultan authority control over large parts of the Empire.
Keywords: model; money circulation; coin finds; chronological distribution
ACM Classification Keywords: I.6 Simulation and Modeling, I.6.3 Applications
Link:
ХРОНОЛОГИЧЕСКОЕ РАСПРЕДЕЛЕНИЕ ИНФОРМАЦИИ ИЗ ОСМАНСКИХ
АРХИВОВ В СВЕТЕ ГЕОГРАФИЧЕСКИХ КАРТ 1580-1700 ГГ.: КРИЗИС ТУРЦИИ
В КОНЦЕ ХVІ – ПЕРВОЙ ПОЛОВИНЫ ХVІІ В.
(Chronological Distribution of the Information from the Ottoman Archives in Content of Maps from period
1580-1700 Years: Crisis of Turkey at the end of XVI - first half of XVII Century)
Йордан Табов, Галина Панайотова
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-04-p03.pdf
|
BANKRUPTCY RISK FORECASTING UNDER UNCERTAINTY WITH APPLICATION OF FUZZY ...
By: Ovi Nafas Aghae agh Gamish, Yuriy Zaychenko
(3703 reads)
Rating:
(1.00/10)
|
Abstract: The problem of corporations’ bankruptcy risk forecasting under uncertainty is considered in this paper.
The application of neo-fuzzy cascade neural networks is suggested. The experimental investigations of cascade
neo-fuzzy networks for bankruptcy risk forecasting for Ukrainian corporations were carried out and their efficiency
was estimated and compared with fuzzy neural networks with algorithms of Mamdani, Tsukamoto and classical
statistical methods.
Keywords: bankruptcy risk forecasting, cascade neo-fuzzy network, fuzzy networks of Mamdani and
Tsukamoto
ACM Classification Keywords: I.2 Artificial Intelligence; I.5.1 Models; Neural Nets
Link:
ПРОГНОЗИРОВАНИЕ РИСКА БАНКРОТСТВА КОРПОРАЦИЙ В УСЛОВИЯХ
НЕОПРЕДЕЛЕННОСТИ С ИСПОЛЬЗОВАНИЕМ НЕЧЕТКИХ НЕЙРОННЫХ СЕТЕЙ
(Bankruptcy risk forecasting under uncertainty with application of fuzzy neural networks)
Ови Нафас Агаи аг Гамиш, Юрий Зайченко
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-04-p02.pdf
|
ONTOARM - A SYSTEM FOR STORING ONTOLOGIES BY NATURAL LANGUAGE ADDRESSING
By: Krassimira Ivanova
(3096 reads)
Rating:
(1.00/10)
|
Abstract: In this paper we present results from experiments for storing RDF ontologies by means of Natural
Language Addressing. For experiments we have realized system OntoArM? aimed to store RDF triples in multilayer
hash tables (information spaces with variable size). The main features of system OntoArM? are outlined in
the paper. Analysis of the experimental results concluded the work.
Keywords: Natural Language Addressing; RDF ontologies
ACM Classification Keywords: H.2 Database Management; H.2.8 Database Applications
Link:
ONTOARM - A SYSTEM FOR STORING ONTOLOGIES BY NATURAL LANGUAGE
ADDRESSING
Krassimira Ivanova
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-04-p01.pdf
|
GAUSSIAN DE-NOSING TECHNIQUES IN SPATIAL DOMAIN FOR GRAY SCALE MEDICAL IMAGES
By: Nora Youssef, Abeer M.Mahmoud, El-Sayed M.El-Horbaty
(2630 reads)
Rating:
(1.00/10)
|
Abstract: Image de-noising is the elimination of noise from digital images where noise is any undesired
information that contaminates an image. De-nosing is achieved through various filtering techniques that not only
enhance the image but also keeps all its important details. Filters are categorized into linear (Geometric mean
and Harmonic mean filters) and non-linear (midpoint, alpha-trimmed and adaptive local noise reduction filter)
techniques. This paper presents applying Gaussian de-noising techniques or algorithms in spatial domain for
medical images. Actually, five de-noising techniques are developed on gray scale medical images corrupted by
additive Gaussian noise with mean = 0, variance = 1000. In addition, the paper analyzes the de-nosing
techniques in terms of MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio) for image quality
assessment and time complexity for performance assessment. The results showed that the de-nosing technique
named Harmonic filter was the best from PSNR prospective and the de-nosing technique named Geometric
mean filter was the best form time prospective.
Keywords: Gaussian noise elimination, Linear and non-linear filter
Link:
GAUSSIAN DE-NOSING TECHNIQUES IN SPATIAL DOMAIN FOR GRAY SCALE
MEDICAL IMAGES
Nora Youssef, Abeer M.Mahmoud, El-Sayed? M.El-Horbaty
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p09.pdf
|
STRESS DETECTION USING MULTIPLE BIO-SIGNALS
By: Khalifa et al.
(2561 reads)
Rating:
(1.00/10)
|
Abstract: Organizations are becoming more and more dependent on computers in their day to day activities.
Employees spend hours daily interacting with various software that is needed to finish their work. This human
computer interaction (HCI) may induce stress for various reasons such as bad user interface design, slow
responses from the software, and much more. Stress will affect the employee’s total performance and
productivity, which will have a negative impact on their teams and organization. Our purpose is to have an
integrated mechanism that will detect stress during HCI. The tool will be a starting point for providing a solution
that aims to reduce stress in the HCI aspects at organizations. This study investigates the usage of two bio
signals (EEG, ECG,) for the detection of stress during HCI.
Keywords: EEG Biometric, BioSignals?, Stress, Multi modal, Human-computer interaction, BrainInformatics?
ACM Classification Keywords: Experimentation
Link:
STRESS DETECTION USING MULTIPLE BIO-SIGNALS
Wael Khalifa, Kenneth Revett, Mohamed I. Roushdy, Abdel-Badeeh? M. Salem
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p08.pdf
|
KNOWLEDGE DEMONSTRATION AND ASSESSMENT SYSTEM “CYBER1”
By: Tea Munjishvili, Zurab Munjishvili
(3691 reads)
Rating:
(1.00/10)
|
Abstract: The article discusses a computer-based system for knowledge demonstration and assessment
„Cyber1“ created by Z. Munijishvili, T. Munijishvili, and A. Meladze. The system is used at Batumi State
University and Ivane Javakhishvili Tbilisi State University. The article describes the functions of the program and
shows its advantages in relation to similar programs available on Georgian market. The practice of the
educational institutions and our own experience shows:
1. The conditions relevant to the compilation of e-textbooks should be created. Our school should initiate it.
2. To this end, an initiative group should be formed at the school to coordinate the creation of the e-textbooks.
3. The textbooks approved by the school should be uploaded.
Using “Cyber1”, teachers enter tests and cases studies into the database for the respective subject. The teacher
can create audio, video and graphic files and connect them with tests (case studies), can make edits to the
database, arrange tests from simple to complex, determined the number of tests and case studies per content
area, duration of the exam and passes the product to the exam center.
If the computer stops working during the exam, the last version of the test is auto-saved and time spent on the
test is recorded, and the student continues the exam form the point of interruption and with the remaining time.
Keywords: Computer systems, Accounting, knowledge system, “Cyber1”.
Link:
KNOWLEDGE DEMONSTRATION AND ASSESSMENT SYSTEM “CYBER1”
Tea Munjishvili, Zurab Munjishvili
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p07.pdf
|
SMPR TRAINING-METHODOLOGICAL SYSTEM FOR SUPPORT THE TRAINING COURSES ON ...
By: Oleksii Voloshyn, Daniil Kovaliov
(2965 reads)
Rating:
(1.00/10)
|
Abstract: The software for support the training courses on decision-making theory in the form of an educational,
methodological and evaluating system is considered. The systems purposes, its design, structure and
functionalities are described. The article turns attention to the latest extensions of the system, such as the rules
of fuzzy inference during the process of complex user’s knowledge estimation. The perspectives of future work
are also discussed.
Keywords: protection system, e-learning, decision-making theory, evaluation, team development.
ACM Classification Keywords: D.2.13 Reusable Software - Reuse models.
Link:
SMPR TRAINING-METHODOLOGICAL SYSTEM FOR SUPPORT THE TRAINING
COURSES ON DECISION-MAKING THEORY
Oleksii Voloshyn, Daniil Kovaliov
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p06.pdf
|
DIDACTIC DESIGNING OF RESOURCE SUPPORT FOR TRAINING ENVIRONMENT
By: Elena Vakhtina, Alexander Vostrukhin
(3683 reads)
Rating:
(1.00/10)
|
Abstract: Designing of the training environment with expected qualities is considered as a multidimensional
technology of Didactic design, which represents the aggregate of methodology and designing tools, and also
methods and designing organization means. The functional model of the training environment development as a
Didactic system and the tool of its realization – the logic-semantic model of a Didactic cycle are presented in the
article. These models orient a teacher in search of new ways of solving training problems in the changing
conditions of the educational practice. Didactic designing of educational resource for the interdisciplinary training
module "Microprocessor technics" is offered as an example.
The scientific novelty of the offered decision consists in allocation of the teacher activity elements in the process
of designing an educational resource: constant interaction with professional environment of activity in the form of
researches and (or) applied development, selection and systematic ordering of a material from various sources
of the information, adaptation of this material to the learning process, creation and development the means of
training.
Keywords: environment-based approach, didactic design, didactic system, didactic cycle, didactic
multidimensional instruments, educational resource, training module, microprocessor technics, microcontroller,
programming
ACM Classification Keywords: J.2 Physical Sciences and Engineering – Electronics, Engineering, 1.2.6
Learning – Concept learning
Link:
DIDACTIC DESIGNING OF RESOURCE SUPPORT FOR TRAINING ENVIRONMENT
Elena Vakhtina, Alexander Vostrukhin
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p05.pdf
|
SOME APPROACHES TO THE DEVELOPMENT OF ANALYTICAL MODEL FOR THE RESEARCH ...
By: Galina Gayvoronska, Petr Yatsuk
(2992 reads)
Rating:
(1.00/10)
|
Abstract: The paper is devoted to the problem of the telecommunication technologies’ implementation strategy’s
choice at the cost minimization. Some aspects of the model, displaying the new technologies’ implementation
process in the telecommunication networks, are researched. An approach to the realization of the value
engineering of the network development’s costs at the implementation of advanced telecommunication
technologies is developed. This approach can be used for the techno-economic evaluation of the network
development’s options at the transition to the new technologies and allows the designer to select the optimal
strategy and time stages of these technologies implementation.
Keywords: telecommunication technology, telecommunication network, development process, life cycle,
implementation, modeling, function.
ACM Classification Keywords: B.4 Input/Output and Data Communications, C.2 Computer-Communication?
Networks, I.6 Simulation and Modeling.
Link:
SOME APPROACHES TO THE DEVELOPMENT OF ANALYTICAL MODEL FOR THE
RESEARCH OF THE TELECOMMUNICATION TECHNOLOGIES’ DEVELOPMENT
PROCESS
Galina Gayvoronska, Petr Yatsuk
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p04.pdf
|
DIRECT AND DUAL PROBLEM OF INVESTMENT PORTFOLIO OPTIMIZATION UNDER UNCERTAINTY
By: Yuri Zaychenko, Inna Sydoruk
(4005 reads)
Rating:
(1.00/10)
|
Abstract: The problem of forming an optimal portfolio of securities under uncertainty was considered. The main
objective of portfolio investment is to improve the investment environment, giving securities such investment
characteristics that are only possible in their combination. Careful processing and accounting of investment risks
have become an integral and important part of the success of each company. However, the global market crisis
of recent years has shown that the existing theory of optimization of investment portfolios and forecasting stock
indices themselves exhausted and needed overhaul of the basic theory of portfolio management. Therefore the
fuzzy sets theory was used for getting an optimal portfolio.
The direct problem with the use of triangular, bell-shaped and Gaussian membership functions and dual problem
by using the fuzzy sets theory were considered in this work. In direct task we define structure of a portfolio which
will provide the maximum profitableness at the set risk level. In dual task we define structure of a portfolio which
will provide the minimum risk level at the set level of critical profitableness. The input data for the optimization
system were predicted by using the Fuzzy Group Method of Data Handling (FGMDH). The optimal portfolios for
asset were determined. The comparative analysis of optimal portfolio obtained by using of different membership
functions was fulfilled. Investment portfolio optimization system is an effective tool for the operational
management of portfolio investments. This is an opportunity to carry out scientific and reasonable management
of their investment portfolio with the ability to reject the planned loss of possession or overvalued risky assets,
which increases business efficiency and maximize gain on the stock market.
Keywords: membership function, fuzzy sets theory, optimal portfolio, investments, stock securities, fuzzy
number, FGMDH.
ACM Classification Keywords: G.1.0 Mathematics of Computing– General – Error analysis; G.1.6 Mathematics
of Computing – Numerical Analysis – Optimization - Gradient methods, Least squares methods; I.2.3 Computing
Methodologies - Artificial Intelligence - Uncertainty, “fuzzy”, and probabilistic reasoning.
Link:
DIRECT AND DUAL PROBLEM OF INVESTMENT PORTFOLIO OPTIMIZATION
UNDER UNCERTAINTY
Yuri Zaychenko, Inna Sydoruk
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p03.pdf
|
TIME MANAGEMENT BASED ON TWO-MACHINE FLOWSHOP SCHEDULING WITH UNCERTAIN JOB ...
By: Sotskov et al.
(11082 reads)
Rating:
(1.00/10)
|
Abstract: The purpose of this article is to initiate a research in one of the main parts of time management, which
is an extremely useful activity that implies an effective use of personal time. Namely, we propose to include optimal
scheduling algorithms into time management techniques. Specifically, we consider a time management system
including two persons, one of which is a supervisor. In scheduling theory, such a processing system may be
modeled as a two-machine flowshop with the objective of minimizing the makespan. Due to a specificity of the
scheduling process for a person, it is assumed that the job processing times may be uncertain before scheduling.
Moreover, for time management, it is necessary to consider on-line scheduling along with usual off-line scheduling
for a set of jobs to be completed by a person during a day.
Keywords: Scheduling, flowshop, time management.
ACM Classification Keywords: Management.
Link:
TIME MANAGEMENT BASED ON TWO-MACHINE FLOWSHOP SCHEDULING
WITH UNCERTAIN JOB PROCESSING TIMES
Yuri N. Sotskov, Natalja M. Matsveichuk, Andrei A. Kasiankou, Frank Werner
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p02.pdf
|
DEVELOPMENT OF THE APPROACH TO FORMALIZATION OF VECTOR’S INDICATORS OF SUSTAINAB
By: Vladimir Pankratov
(3197 reads)
Rating:
(1.00/10)
|
Abstract: A synthesis of methodologies of foresight and sustainable development is offered for problem solution
on the development of the formalization of vector’s indicators of sustainable development in different directions.
The approach to the building of indicators of the environmental component of sustainable development vector at
the stage of the data compilation to a single indicator is proposed. The procedure for the formation of the
indicator using common hierarchical structure was proposed. It allows considering, evaluating, and forecasting
each indicator, which is built. This result is achieved by the recovery of the main functional dependencies on the
basis of the characteristics of the groups defined by discrete samples. In the result the functional dependencies
of these indicators from a number of parameters that affect them are obtained. The practical implementation of
the approach based on the use of the proposed algorithm was realized. The indicators were taken on data of
state statistics and the statistics that are offered directly on the website of statistics of the Crimean region.
Keywords: synthesis, sustainable development, foresight methodology, recovery of the functional
dependencies, indicators.
ACM Classification Keywords: H.4.2. Information System Application: type of system strategy
Link:
DEVELOPMENT OF THE APPROACH TO FORMALIZATION OF VECTOR’S
INDICATORS OF SUSTAINABLE DEVELOPMENT
Vladimir Pankratov
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-03-p01.pdf
|
EFFICIENCY INTERVAL DETERMINATION OF A CALCULATION PROCEDURE FOR THROUGHPUT ...
By: Tasho Tashev, Arsenij Bakanov, Radostina Tasheva
(3173 reads)
Rating:
(1.00/10)
|
Abstract: The problem connected to computation of non-conflict schedule for crossbar switch node is NPcomplete
from mathematical point of view. It is the reason for constantly suggested new algorithms for schedule
calculations. The problem is that their efficiency has to be checked. The throughput of a “good” algorithm tends
monotonically to some boundary. We suggest a procedure for quantitative determination of the convergence
toward the boundary, utilizing data from computer simulation. In this paper are presented results of computer
simulation for PIM algorithm with a certain model of incoming traffic (Chao model), made by means of CERN grid
structure (lxplus.cern.ch). We check the hypothesis that convergence computation depends on the chosen
parameter m of the procedure. Checking is made for m=4 and m=3. The obtained data confirm validity of the
hypothesis for the chosen values m. As a result we reach a new conclusion: the derived values of the error for
the internal variable δ give (an independent) estimation of the simulation errors. Having this in mind we can plan
experiments that will give us the required accuracy for the determination of the boundary under the limited
computer power available.
Keywords: Modeling, Communication node, Crossbar switch, Algorithms.
Классификация ключевых слов ACM: B.4.4 Performance Analysis and Design Aids, C.2.1 Network
Architecture and Design, C.4 Performance of Systems
Link:
ОПРЕДЕЛЕНИЕ ИНТЕРВАЛА ЭФФЕКТИВНОСТИ ПАРАМЕТРОВ ПРОЦЕДУРЫ
ВЫЧИСЛЕНИЯ ГРАНИЦЫ ПРОПУСКНОЙ СПОСОБНОСТИ ПАКЕТНОГО
КОММУТАТОРА
(Efficiency Interval Determination of a Calculation Procedure for Throughput Boundary of Crossbar
Switch)
Ташо Ташев, Арсений Баканов, Радостина Ташева
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p11.pdf
|
DATA LOSS MINIMIZATION IN SITUATION'S CENTRUMS DATA BASES
By: Oleksandr Kuzomin, Oleksii Vasylenko
(2816 reads)
Rating:
(1.00/10)
|
Abstract: Problems of reducing risks, increasing the safety and reliability and the use of databases (DB) in
emergency situations (ES) are considered in the paper. To solve these problems a technological sequence is
proposed. To analyze data, the peculiarity presentation of quantitative and qualitative parameters in emergency
situations is calculated. The possibility of logical and functional ER modeling CASE technology with a regard to
minimize the risk of life in the emergency area is shown. Technical solution of the problem is given.
Keywords: Emergency situations, Database (DB), archive, backup, database management system (DBMS),
server.
Link:
ОБЕСПЕЧЕНИЕ БЕЗОПАСНОСТИ ИСПОЛЬЗОВАНИЯ БАЗ ДАННЫХ В
УСЛОВИЯХ ЧРЕЗВЫЧАЙНЫХ СИТУАЦИЙ
(Data Loss Minimization in Situation's Centrums Data Bases)
Александр Кузёмин, Алексей Василенко
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p10.pdf
|
PATTERN RECOGNITION USING A CRITERION BASED ON VECTOR CRITERION OF PATTERNS ...
By: Petro Chetyrbok
(2619 reads)
Rating:
(1.00/10)
|
Abstract: In the given work displaying is built of great number of appearances on the great number of vectors of
errors of pattern recognition by the neuron network, which allows to link classification of appearances with the
analysis of vectors in space of errors. A criterion allows grouping appearances, recognizing and comparing them.
A vector criterion is formulated of closeness of signal images in space of errors. An algorithm is offered for
transition from space of parameters of signal images in space of errors of pattern recognition. An optimum
decided rule is built for classification of signal images of signals with the use of weighed criterion of closeness of
recognizable signal images in space of errors of recognition. Authenticity of the received scientific results,
conclusions and recommendations of this thesis work has been confirmed by the results of experimental
researches of the developed universal system of intellectual data analysis, which solve the task of recognition of
objects of the electro-optical images NEFFClass BGCGG (Basic Gradient Conjugate Gradient Genetic),
conducted on the base of „Institute of the Applied Systems Analysis” NTUU „KPI”. The results received in work
evidently demonstrate efficiency of the use of the developed models, methods and algorithms for the solution of
tasks of recognition of signals.
Keywords: neural networks, basic method, method of accreditation, vector criterion
Link:
РАСПОЗНАВАНИЕ ОБЪЕКТОВ С ИСПОЛЬЗОВАНИЕМ КРИТЕРИЯ НА ОСНОВЕ
ВЕКТОРНОЙ МЕРЫ БЛИЗОСТИ ОБРАЗОВ В ПРОСТРАНСТВЕ ОШИБОК
(Pattern recognition using a criterion based on vector criterion of patterns proximity in the space of
errors)
Петр Четырбок
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p09.pdf
|
THE METHOD OF THE ENSURANCE OF STRUCTURAL SURVIVABILITY OF TELECOMMUNICATION ...
By: Nina Kniazieva
(3389 reads)
Rating:
(1.00/10)
|
Summary: One of the most important properties of telecommunication networks to ensure their effective
functioning is survivability. To ensure the survivability of telecommunication networks it’s required to solve a
number of scientific and engineering problems at all stages of their life cycle – design, modernization or
improvement, operation. Questions of ensurance of survivability of telecommunication networks are becoming
more actual due to the intensive development of telecommunications in the past decade. The synthesis problems
of survivability systems, evaluation, ensurance and improvement of structural survivability of the systems, as
determined by the needs of practice acquired particular actuality today. The aim of this work is to develop a
method of ensurance of structural survivability of telecommunication network (TCN), which implements the
streaming approach using the proposed index of structural survivability TCN defined lower boundary of structural
survivability, providing a guaranteed stable functioning TCN, the achievement of the desired value which is
performed by the introduction of structural redundancy (as the property of survivability possess only redundant
systems) using the optimization procedure of the sections branches reservation, the choice of which is
determined on the basis of maximizing the effectiveness of each stage of the reservation. The optimization of
value of the structural survivability of TCN is to achieve its maximum value at the existing restrictions. The
method to ensure structural survivability TCN, based on the formation of sets of admissible routes for each
service requirements, for which are formed the sets of admissible sections is developed. Are determined the
probable values of unaffecting each section, and for each set of sections, which are formed on the basis of the
lower boundary of the structural survivability TCN obtained as an average value of probable unaffecting sections.
The paper proposes a developed the method of the ensurance of structural survivability of TCN, which is
designed for procedural model, which includes the execution of the sequence of steps: 1) formation of the source
data, 2) the evaluation of the structural survivability of TCN, 3) the ensurance structural survivability of TCN, 4)
the development of solutions for the structural survivability of TCN. For each stage, are formulated the objectives
and are determined ways to decide them. For stage 1) the list and the method to present the initial data are
determined; for stage 2) are determined ways of forming sets of admissible routes and obtaining for them sets of
166 International Journal "Information Technologies & Knowledge" Volume 8, Number 2, 2014
admissible sections, for which are given methods for calculating the probabilities of unaffecting of each sections
and the probabilities of unaffecting of all admissible sections which separate points s and t ( s,t n = 1, , s ≠ t, n –
number of network points), is formulated a condition for the lower bound of the required structural survivability of
TCN. In stage 3) optimization problem is formulated to ensure the required value of the lower limit of the
structural survivability of TCN as a mathematical programming problem, is shown the feasibility of using the
gradient method to solve it, a method of calculating the efficiency of each step of the optimization process. Stage
4) is final. At this stage is drawn the conclusion that the obtained solution of the optimization problem to introduce
structural redundancy with in sets of limits or provides the required value of the index of structural survivability
TCN or provides the procedure of recommendations on: changing the value of the matrix elements of the
probability of unaffecting branches of the network which is computed value by solving the problem; the change of
classes (priorities) and the "weights" of certain requirements; limiting values of network requirements, the change
of defined limit values, the lower boundary of the structural survivability TCN. The proposed method can be used
in the case where the sets of admissible routes and admissible sections are the sets of all possible routes and all
possible sections in the TCN.
An example of implementation of the proposed method to ensure structural survivability of the
telecommunications network is made.
Ключевые слова: структурная живучесть, сеть, резервирование, путь, сечение, показатель
живучести.
Ключевые слова классификации ACM: С.2. Computer-communication networks, H. Information Systems -
H.1 Models and Principles, K. Computing Milieux - K.6 Management of computing and information system.
Link:
МЕТОД ОБЕСПЕЧЕНИЯ СТРУКТУРНОЙ ЖИВУЧЕСТИ
ТЕЛЕКОММУНИКАЦИОННОЙ СЕТИ
(The Method of the Ensurance of Structural Survivability of Telecommunication Network)
Нина Князева
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p08.pdf
|
DEPENDENCE OF INFORMATION AND TELECOMMUNICATION TECHNOLOGY DEVELOPMENT ...
By: Galina Gayvoronska, Illia Ganytskyi, Petr Yatsuk
(2977 reads)
Rating:
(1.00/10)
|
Abstract: The article describes an analysis of the relationships between different ICT services indicators and
economic indicators. Article also gives view for determining the impact of the economic state of the country on
developing information and communication technologies, as well as the influence of the development one
information technology on other.
Keywords: telecommunication technologies, ICT indicators, technology development.
Keywords classification of ACM: D.2.9 Management, K.6.3 Life cycle.
Link:
DEPENDENCE OF INFORMATION AND TELECOMMUNICATION TECHNOLOGY
DEVELOPMENT ON ECONOMIC INDICATORS
Galina Gayvoronska, Illia Ganytskyi, Petr Yatsuk
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p07.pdf
|
BUILDING PECULIARITIES OF THE MODERN WIRELESS CORPORATE NETWORK
By: Iurii Lysetskyi, Natalia Karevina
(3640 reads)
Rating:
(1.00/10)
|
Abstract: Under consideration is the building of the modern wireless corporate network that implements the
concept of using their own devices. Represented the requirements for the modern wireless networks of the
enterprise-level, set out the principles of their building and architectural peculiarities. The questions of the
organization of the information security in the wireless corporate networks are considered in the article.
Keywords: wireless network, infrastructure, user services, profiling devices, access point, commutation, fail-safe
feature, triangulation survey, authentication, access audit, information security.
ACM Classification Keywords: H. Information Systems. H.1 Models and Principles. H.1.1 Systems and
Information Theory. F.1.2 Models of Computation. 1.6.1 Simulation Theory
Link:
ОСОБЕННОСТИ ПОСТРОЕНИЯ СОВРЕМЕННОЙ БЕСПРОВОДНОЙ
КОРПОРАТИВНОЙ СЕТИ
(Building Peculiarities of the Modern Wireless Corporate Network)
Юрий Лисецкий, Наталья Каревина
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p06.pdf
|
TWO-LEVEL GENETIC ALGORITHM FOR PROGRAMMABLE LOGIC DEVICES RECONFIGURATION
By: Aleksey Gorodilov
(3097 reads)
Rating:
(1.00/10)
|
Abstract: The article considers the problem of programmable logic device reconfiguration after a failure of logic
elements. The task is relevant to areas such as space exploration and important industrial facilities management
that use highly reliable fault-tolerant systems. The article considers the failures of logic elements in the
configurable logic blocks. For optimal reconfiguration logic modules must be placed on a programmable logic
device without using faulty logic elements, while minimizing occupied area, the bond lengths and delays. The first
step in solving the problem is to choose compactly located logic elements that will be involved in the
implementation of the circuit. Compactness is understood as the minimum amount of information necessary to
describe the set of logic elements. This task can not be solved exactly and effectively, but can be approximately
solved by using various heuristics, including genetic algorithms. This article describes several well-known
approaches to the problem and offers an original two-level coding method for constructing a genetic algorithm
that takes into account features of the problem and uses standard genetic operators. The proposed algorithm is
implemented in practice in the form of a computer program to compare its performance with some other
algorithms. Comparison of different heuristic algorithms in terms of accuracy of the solution and estimated speed
of the proposed algorithm are given. One can say that the proposed genetic algorithm works on average longer
than other heuristic algorithms, but finds a more accurate solution. This leads to a reduction of reconfiguration
time and, thereby, increase availability ratio of the programmable logic device.
Keywords: programmable logic devices, reconfiguration, reliability, genetic algorithm.
ACM Classification Keywords: I.2 Artificial Intelligence: I.2.8 Problem Solving, Control Methods, and Search -
Heuristic methods, B.8 Performance and Reliability: B.8.1 Reliability, Testing, and Fault-Tolerance?
Link:
ДВУХУРОВНЕВЫЙ ГЕНЕТИЧЕСКИЙ АЛГОРИТМ РЕКОНФИГУРАЦИИ
ПРОГРАММИРУЕМЫХ ЛОГИЧЕСКИХ ИНТЕГРАЛЬНЫХ СХЕМ
(Two-level genetic algorithm for programmable logic devices reconfiguration)
Алексей Городилов
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p05.pdf
|
PSYCHOLOGICAL APPROACH TO EXTRACTING KNOWLEDGE IN HUMAN-COMPUTER INTERACTION ...
By: Arseniy Bakanov
(3512 reads)
Rating:
(1.00/10)
|
Abstract: This article describes the method of extraction and visualization of knowledge in the process of
human-computer interaction with electronic docflow system. The paper describes the experiments, the results of
experiments are given. The described approach to extracting knowledge, focused on the use of docflow systems,
and involves the use of algorithms and rules to identify heuristics in decision-making in solving management
problems.
Keywords: Docflow system, Extracting knowledge, Visualization knowledge.
Классификация ключевых слов ACM: H.4.2 Types of Systems - Decision support
Link:
ПСИХОЛОГИЧЕСКИЙ ПОДХОД К ИЗВЛЕЧЕНИЮ ЗНАНИЙ В ПРОЦЕССЕ
ЧЕЛОВЕКО-КОМПЬЮТЕРНОГО ВЗАИМОДЕЙСТВИЯ С СИСТЕМОЙ
ЭЛЕКТРОННОГО ДОКУМЕНТООБОРОТА
(Psychological Approach to Extracting Knowledge in Human-Computer? Interaction with Electronic
Docflow System)
Арсений Баканов
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p04.pdf
|
INFORMATION SUPPORT OF PREPARATION PROJECT MANAGEMENT DECISIONS ON ...
By: Nina Bakanova
(3334 reads)
Rating:
(1.00/10)
|
Abstract: This article describes the design features of informational support project preparation of management
decisions on the execution of documents input. Development of functions based on the method of content
analysis of the document into coincidence with the terms of office directory distribution organization.
Keywords: Docflow system, content analyses
ACM Classification Keywords: H.4.2 Types of Systems - Decision support
Link:
ИНФОРМАЦИОННАЯ ПОДДЕРЖКА ПОДГОТОВКИ ПРОЕКТОВ
УПРАВЛЕНЧЕСКИХ РЕШЕНИЙ ПО ОРГАНИЗАЦИОННОЙ ДЕЯТЕЛЬНОСТИ
(Information Support of Preparation Project Management Decisions on Organizational Performance)
Нина Баканова
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p03.pdf
|
SOFTWARE SYSTEM FOR SOLVING SYNTHESIS PROBLEM "SYNTHESIS 1.0"
By: Alexander Dokukin
(2599 reads)
Rating:
(1.00/10)
|
Abstract: The software system for solving previously introduced synthesis task in pattern recognition theory is
described. The algorithms used in the system are based on theoretical results described earlier. Estimates of its
speed and quality in real-world tasks of large scale are presented.
Keywords: algebraic recognition theory, synthesis task, software system
ACM Classification Keywords: I.5 Pattern Recognition — I.5.0 General.
Link:
ПРОГРАММНАЯ СИСТЕМА ДЛЯ РЕШЕНИЯ ЗАДАЧИ СИНТЕЗА SYNTHESIS 1.0
(Software System for Solving Synthesis Problem "Synthesis 1.0")
Александр Докукин
http://www.foibg.com/ijitk/ijitk-vol08/ijitk08-02-p02.pdf
|
|
|