|
FUZZY MODELS AND METHODS OF RATIONAL RESOURCE ALLOCATION
By: Olexii Voloshyn, Vasyl Laver
(2849 reads)
Rating:
(1.00/10)
|
Abstract: We consider the application of fuzzy sets theory to classical rationing problem. Fuzzy
generalizations of classical methods are proposed, the theory is illustrated by a numeric example. The
fuzzy methods are compared with their crisp analogs using the inequality measures.
Keywords: rationing problem, rational distribution, fuzzy models and methods, inequality measures.
ACM Classification Keywords: H.4.2 Information Systems Applications - Types of Systems - Decision
Support
Link:
FUZZY MODELS AND METHODS OF RATIONAL RESOURCE ALLOCATION
Olexii Voloshyn, Vasyl Laver
http://www.foibg.com/ijima//vol05/ijima05-01-p01.pdf
|
Analysis of Usage of Throughput as a Parameter of Quality of Service of ...
By: Yevhen Kushnirenko, Galyna Gayvoronska
(3366 reads)
Rating:
(1.00/10)
|
Abstract: Analyzed impact of throughput on demands satisfaction of users of different services with
different types of information transmition with the purpose to include throughput in a number of quality of
service parameters of user of telecommunication network.
Key words: telecommunication network, quality of service, throughput, correlation, quality index
ACM Classification Keywords: C.4 Performance of systems, С.2. Computer-communication networks,
H. Information Systems - H.1 Models and Principles
Link:
Analysis of Usage of Throughput as a Parameter of Quality of Service of User
of Telecommunication Network
Yevhen Kushnirenko, Galyna Gayvoronska
http://www.foibg.com/ijima/vol04/ijima04-04-p07.pdf
|
SCALAR CHOICE CRITERIA'S USAGE FOR DETERMINATION OF THE OPTIMUM SWITCHING ...
By: Galina Gayvoronska, Borys Rybalov
(2718 reads)
Rating:
(1.00/10)
|
Abstract: An approach to the optimum switching scheme’s choice is proposed. It is based on the scalar
choice criteria. Problem of the multistage switching system's structure's determination is solved. Such
system is characterized by strict non-blocking and doesn't require rerouting at the usage of any
connection establishment procedure. Obtained results can be applied at the design of spatial optical
signals' switching systems, allowing improvement of the optical telecommunications networks'
functioning by increasing the performance of switching operations in these networks.
Keywords: optical signals’ switching, optical signals' switching system, switching scheme, scalar choice
criteria.
ACM: B.6 LOGIC DESIGN – B.6.3 Design Aids, B.4
INPUT/OUTPUT AND DATA COMMUNICATIONS - B.4.3 Interconnections (subsystems).
Conference topic: Informational Modelling.
Link:
SCALAR CHOICE CRITERIA'S USAGE FOR DETERMINATION OF THE OPTIMUM SWITCHING
CIRCUIT FOR OPTICAL SIGNALS' SWITCHING SYSTEM
Galina Gayvoronska, Borys Rybalov
http://www.foibg.com/ijima/vol04/ijima04-04-p06.pdf
|
Using Decision Theory Methods to Optimize the Access Networks Synthesis Process
By: Galina Gaivoronskaya, Maria Hilchyk
(2724 reads)
Rating:
(1.00/10)
|
Abstract: Using the methods of the theory of decision-making to optimize the synthesis of access
networks. Analyzed the synthesis of access networks and the use of decision theory for optimization.
Choose the optimum method of decision theory, which may be used to facilitate the synthesis of access
networks.
Keywords: access network, synthesis access networks, decision theory, decision theory methods.
ACM Classification Keywords: H. Information Systems – H.1 Models and Principles, E. Data – E.0
General.
Link:
Using Decision Theory Methods to Optimize the Access Networks Synthesis Process
Galina Gaivoronskaya, Maria Hilchyk
http://www.foibg.com/ijima/vol04/ijima04-04-p05.pdf
|
PRIVATE GROUPS IN PEER-TO-PEER NETWORKS
By: Oleh Hordiichuk, Oleksiy Bychkov
(3428 reads)
Rating:
(1.00/10)
|
Abstract: Peer-to-peer architectures are designed for the sharing network, storage and computing
resources solving a scalability problem. At the same time they lack capabilities for creating private
groups that are necessary for a limited access data exchanging – a common task for e-learning
systems. In this paper proposed a new peer-to-peer system that is able to create private groups that is
built on top of WebRTC stack and thus is capable to run in modern browsers without additional software
installation. It solves problems of authentication, data validity, management control and secure peer
discovery in distributed network systems by using private and public keys as well as data exchanging
rules that provide same level of data dissemination security as in client-server applications. This system
provides ability of creating closed groups of students, where teacher is able to transmit data securely
and combine low operational cost of video streaming and file sharing advantages of Tailcast topology.
Moreover teacher’s capabilities are not limited to only data dissemination process, this application gives
additional functions like banning and kicking users as well as a secure access promoting to other
participants of the network. While proposed techniques are designed and implemented for the Tailcast
topology, it’s shown that it is possible to apply these recommendations in most peer-to-peer applications
including other video-streaming topologies, distributed hash tables and file sharing.
Keywords: peer-to-peer, security, distributed systems, e-learning
ACM Classification Keywords: C.2.4 Distributed Systems
Link:
PRIVATE GROUPS IN PEER-TO-PEER NETWORKS
Oleh Hordiichuk, Oleksiy Bychkov
http://www.foibg.com/ijima/vol04/ijima04-04-p04.pdf
|
IMPROVING OF EXISTING PERMISSION SYSTEM IN ANDROID OS
By: Volodymyr Kazymyr, Igor Karpachev
(3178 reads)
Rating:
(1.00/10)
|
Abstract: Smartphones for last five-ten years had become ubiquitous. Despite the fact, that these small
devices are very widespread around the world - security are still being understood. As a result, the
security is extremely vital. Basically security area is very underdeveloped and still vulnerable. On the
one hand this article is an investigation of existing pros and cons of android security system. On the
other hand it is an example of how to improve current mobile security state.
Keywords: security model, OS Android, functional security.
ACM Classification Keywords: D.4.6 Access controls
Link:
IMPROVING OF EXISTING PERMISSION SYSTEM IN ANDROID OS
Volodymyr Kazymyr, Igor Karpachev
http://www.foibg.com/ijima/vol04/ijima04-04-p03.pdf
|
PROJECT MANAGEMENT IN CYBERSECURITY RESEARCH IN UKRAINE
By: Maria Dorosh, Vitalii Lytvynov, Maxim Saveliev
(2621 reads)
Rating:
(1.00/10)
|
Abstract: This paper presents an approach to cyber security research project management. The paper
includes the Project Management Office model and conception that can be created in educational and
research institution like University. The organization structure of the cyber security research project and
the peculiarities of university team organization on cyber security research project are shown.
Keywords: project management, cyber security, educational and research projects.
ACM Classification Keywords: K.6.1 Management of Computing and Information Systems - Project
and People Management
Link:
PROJECT MANAGEMENT IN CYBERSECURITY RESEARCH IN UKRAINE
Maria Dorosh, Vitalii Lytvynov, Maxim Saveliev
http://www.foibg.com/ijima/vol04/ijima04-04-p02.pdf
|
RISK BEHAVIOUR IN A SET OF INTERVAL ALTERNATIVES
By: Gennady Shepelev
(3012 reads)
Rating:
(1.00/10)
|
Abstract: Problem comparing alternatives under interval uncertainty is studied. It is assumed that the
compared alternatives have indicators of quality in the form of interval estimates. It is shown that
mentioned problem cannot be unambiguously resolved by purely mathematical methods and requires
using of decision maker’s preferences. From two possible situations of comparing, situation of unique
choice and situation of repeated one, the first situation, which is typical for problems of forecasting, is
analyzed. Quantitative measure of plausibility of implementation for tested hypothesis about preference
of an alternative in comparison with others in their set and measure of risk connected with possible
falsity of such hypothesis are introduced. It is shown that this risk is increased with increasing number of
compared alternatives. Some methods to calculate risks as well as procedure of decision-making in the
framework of a set of alternatives are proposed.
Keywords: comparing interval alternatives, dependence of the risk on number of alternatives,
probability logic in comparing interval alternatives, methods and procedures of decision-making for the
problem.
ACM Classification Keywords: H.1.2 Human information processing. G3 Distribution functions. I.2.3
Uncertainty, “fuzzy”, and probabilistic reasoning.
Link:
RISK BEHAVIOUR IN A SET OF INTERVAL ALTERNATIVES
Gennady Shepelev
http://www.foibg.com/ijima/vol04/ijima04-04-p01.pdf
|
Peculiarities Analysis of Statistical Information in ICT
By: Galina Gayvoronska, Petro Yatsuk, Yulya Kazak
(3452 reads)
Rating:
(1.00/10)
|
Abstract: Huge amounts of statistical information, which has become available at the information
society creation, have led to the increase of number of this information analysis methods’ incorrect
usage. This often entails erroneous conclusions that may lead to negative consequences. Some
guidance on the conditions of data analysis methods’ usage are given in the work in order to avoid such
a situation as well as electronic communications statistics’ stepwise analysis method is formed.
Keywords: statistical information, information and communication technology, information and
communication services
ACM Classification Keywords: G.3 Mathematics Of Computing – Probability And Statistics –
Statistical Computing, Time Series Analysis, Correlation and Regression Analysis; C.2 ComputerCommunication?
Networks.
Link:
Peculiarities Analysis of Statistical Information in ICT
Galina Gayvoronska, Petro Yatsuk, Yulya Kazak
http://www.foibg.com/ijima/vol04/ijima04-03-p04.pdf
|
POLLEN GRAINS RECOGNITION USING STRUCTURAL APPROACH AND NEURAL NETWORKS
By: Natalia Khanzhina, Elena Zamyatina
(3152 reads)
Rating:
(1.00/10)
|
Abstract: This paper describes the problem of automated pollen grains image recognition using images
from microscope. This problem is relevant because it allows to automate a complex process of pollen
grains classification and to determine the beginning of pollen dispersion which cause an the allergic
responses. The main recognition methods are Hamming network Korotkiy, 1992 and structural
approach Fu, 1977. The paper includes Hamming network advantages over Hopfield network
Ossowski, 2000. The steps of preprocessing (noise filtering, image binarization, segmentation) use
OpenCV Bradsky et al, 2008 functions and the feature point method Bay et al, 2008. The paper
describes both preprocessing algorithms and main recognition methods. The experiments results
showed a relative efficiency of these methods. The conclusions about methods productivity based on
errors of type I and II. The paper includes alternative recognition methods which are planning to use in
the follow up research.
Keywords: image recognition, OpenCV, Hamming network, feature points method, pollen-grains,
structural pattern recognition.
ACM Classification Keywords: I.5.1 Pattern Recognition Model - Neural nets, Structural, I.5.4 Pattern
Recognition Applications - Computer vision
Link:
POLLEN GRAINS RECOGNITION USING STRUCTURAL APPROACH AND NEURAL
NETWORKS
Natalia Khanzhina, Elena Zamyatina
http://www.foibg.com/ijima/vol04/ijima04-03-p03.pdf
|
AN APPROACH TO MULTIFACETED BUSINESS PROCESS MODELING WITH MODEL TRANSFORMATION
By: Roman Nesterov, Lyudmila Lyadova
(2789 reads)
Rating:
(1.00/10)
|
Abstract: The approach to models generation automation and implementation of multifaceted business
process modeling on the basis of graphical model transformation is described. To create graphical
models of diverse notations (diagrams in notations of visual modeling languages) one can exploit visual
modeling software tools and language workbenches, DSM platforms. Domain specific modeling tools
allow simplifying model design process, to involve domain experts (they are not masters of information
technologies and have not programming skills) to formal model development. Newly-created models
can be converted into simulation models or specific analytical models with the model transformation
tools. Therefore, at new task solving process with modeling tools modelers have not to duplicate model
development with new tools in new language notation. Model designers can use most suitable tools and
most expressive languages for models development in their domain to solve their tasks. Obtained
models after transformation can be examined with means of specific simulation modeling systems
including, for instance, AnyLogic?, or with mathematical software packages such as Mathcad, Maple or
Mathematica. The visual business process modeling notation choice is substantiated. Mathematical
model named DFD-graph is used as mathematical basis of model generation tools. The normalization
rules form the backbone to the DFD business process model normalization. This algorithm is the basis
of automating model generation software implementation.
Keywords: business process modeling, visual modeling languages, business process analysis,
mathematical modeling, model development automation, model transformations, model reusing.
ACM Classification Keywords: D.2 SOFTWARE ENGINEERING: D.2.2 Design Tools and Techniques
– Computer-aided software engineering (CASE), Programmer workbench; D.2.13 Reusable Software –
Domain engineering, Reuse models. I.6 SIMULATION AND MODELING: I.6.2 Simulation Languages;
I.6.3 Applications; I.6.4 Model Validation and Analysis; I.6.5 Model Development. G.4 MATHEMATICAL
SOFTWARE: Algorithm design and analysis, User interfaces.
Link:
AN APPROACH TO MULTIFACETED BUSINESS PROCESS MODELING
WITH MODEL TRANSFORMATION TOOLS
Roman Nesterov, Lyudmila Lyadova
http://www.foibg.com/ijima/vol04/ijima04-03-p02.pdf
|
About convergence of fuzzy perceptive elements sequences, defined on ...
By: Alexei Bychkov, Eugene Ivanov, Olha Suprun
(3082 reads)
Rating:
(1.00/10)
|
About convergence of fuzzy perceptive elements sequences, defined on
different opportunities spaces
Alexei Bychkov, Eugene Ivanov, Olha Suprun
Abstract: Criteria for the existence of a model of convergence and divergence with the need 1 for
systems of finite-element sequences of fuzzy perceptive elements are obtained in this paper. Theorems
about failing of the theoretic-possibility analogue of the law of large numbers for converge with the
opportunities and the converge with need 1 are proven.
Keywords: theory of possibility, fuzzy logic, convergence of fuzzy perceptive elements.
ACM Classification Keywords: G.3 – Probability and Statistics; I – Computing Methodologies, I.6 –
Simulation and Modeling.
Link:
About convergence of fuzzy perceptive elements sequences, defined on
different opportunities spaces
Alexei Bychkov, Eugene Ivanov, Olha Suprun
http://www.foibg.com/ijima/vol04/ijima04-03-p01.pdf
|
PODCASTS: A BRIDGE FROM E-LEARNING TO M-LEARNING
By: Larisa Savyuk, Oleksiy Voychenko
(3996 reads)
Rating:
(1.00/10)
|
Abstract: For educational organizations offering e-learning, intensive flow of technological innovations
may be considered as both blessing and curse at the same time.
On the one hand, many challenging tasks, such as creation of multimedia content, become easier with
new technologies and tools, so e-learning creation, support and delivery is currently affordable in sense
of investments and human resources as a part of common educational practice.
On the other, large scale technological changes, such as transfer to a new platform, require meticulous
analysis of potential benefits and drawbacks due to the need for personnel training, compatibility
problems or unexpected development costs. Introduction of mobile learning as an option for distance
learning delivery is a typical example. Nowadays e-learning services are available globally, so high
technical quality and pedagogical soundness of learning offers are the issue of survival for educational
organization.
Technology innovations, as m-learning, cannot be ignored, taking into account wide availability of not
only mobile devices but also mobile applications and services. Smartphone’s and tablets are widely
used by the youth for various forms of communication, including email, Skype and specific apps, for
playing games, or for internet access to news, data and content - browsing/skimming, listening to
favorite music or watching HD video. Therefore, e-learning organizations have no other choice than
offer m-learning for their customers - a learning content in a mobile-accessible mode - as it enhances
flexibility, extends "learning hours" by time spent on commuting, waiting, and unexpected breaks, and
thus makes e-learning offer more attractive.
Several approaches to introduce m-learning are known, and each of them has both benefits and
drawbacks further discussed in the paper. Thus each organization has to make its own decision based
on short- and long-term analysis of its resources, personnel skills and qualifications, potential audience,
and many other factors.
There is no universal method to evaluate all of them, and related error cost may be significant.
Moreover, due to specifics of mobile devices and environment in which mobile learning takes place, as
well as some implementation issues, mobile mode may be rather an option for e-learning delivery and
cover some but not all learning experiences offered in a course. Therefore, introduction of m-learning
should not be costly or time-consuming, and should not require changes of the established e-learning
International Journal "Information Models and Analyses" Volume 4, Number 2, 2015 193
processes. Considering that m-learning is a new delivery method, we decide to offer it in a trial mode to
evaluate customers' readiness and preferences and adjust related mechanisms and resources
accordingly. Based on the analysis of the approaches and requirements to mobile delivery, we suggest
generating of podcasts as a first step in m-learning implementation. Further, the implementation of
podcasts is described and its relevance is discussed.
Keywords: e-learning, m-learning, podcasting, LMS, content
ACM Classification Keywords: D. m Miscellaneous
Link:
PODCASTS: A BRIDGE FROM E-LEARNING TO M-LEARNING
Larisa Savyuk, Oleksiy Voychenko
http://www.foibg.com/ijima/vol04/ijima04-02-p07.pdf
|
THE EXPERIENCE OF THE AGENT-BASED SIMULATION SYSTEM DEVELOPING
By: Elena Zamyatina, Danil Karimov, Artiem Mitrakov,
(2653 reads)
Rating:
(1.00/10)
|
Abstract: This paper discusses the problems of the agent-based simulation system design. It is well
known that agent models extend the capabilities of simulation for solving some problems that can’t be
solved by the methods of system dynamics and discrete event simulation. Particular attention in the
design and the implementation of agent-based simulation authors pay to the problems of distributed
simulation and the problems of intelligent agent’s implementation and the use of ontologies at all stages
of the simulation experiments.
Keywords: simulation, agent-based model, distributed simulation, intelligent agent
ACM Classification Keywords: I.6 SIMULATION AND MODELING I.6.8 Types of Simulation -
Distributed : I.2 ARTIFICIAL INTELLIGENCE I.2.5 Programming Languages and Software - Expert
system tools and techniques
Link:
THE EXPERIENCE OF THE AGENT-BASED SIMULATION SYSTEM DEVELOPING
Elena Zamyatina, Danil Karimov, Artiem Mitrakov,
http://www.foibg.com/ijima/vol04/ijima04-02-p06.pdf
|
CONSTRUCTING AN OPTIMAL INVESTMENT PORTFOLIO BY USING FUZZY SETS THEORY
By: Yuri Zaychenko, Inna Sydoruk
(3380 reads)
Rating:
(1.00/10)
|
Abstract: The problem of constructing an optimal portfolio of securities under uncertainty was
considered.
The global market crisis of recent years has shown that the existing theory of optimization of investment
portfolios and forecasting stock indices exhausted and the revision of the basic theory of portfolio
management is strongly needed. Therefore the fuzzy sets theory was used for getting an optimal
portfolio.
In this paper direct, dual and multicriteria problems with the use of triangular membership functions work
were considered. The problem of portfolio optimization during the time period also was described in this
article. In direct task we define structure of a portfolio, which will provide the maximum profitableness at
the set risk level. In dual task we define structure of a portfolio, which will provide the minimum risk level
at the set level of critical profitableness. In multicriteria problem we simultaneously maximize profitability
and minimize risk level. The input data for the optimization system were predicted by using the Fuzzy
Group Method of Data Handling (FGMDH). The optimal portfolios for assets were determined. The
comparative analysis of optimal portfolios obtained by different methods and approaches was fulfilled.
Keywords: membership function, fuzzy sets theory, optimal portfolio, investments, stock securities,
fuzzy number, FGMDH
ACM Classification Keywords: G.1.0 Mathematics of Computing– General – Error analysis; G.1.6
Mathematics of Computing – Numerical Analysis – Optimization - Gradient methods, Least squares
methods; I.2.3 Computing Methodologies - Artificial Intelligence - Uncertainty, “fuzzy”, and probabilistic
reasoning.
Link:
CONSTRUCTING AN OPTIMAL INVESTMENT PORTFOLIO BY USING FUZZY SETS
THEORY
Yuri Zaychenko, Inna Sydoruk
http://www.foibg.com/ijima/vol04/ijima04-02-p05.pdf
|
PROPERTIES PROOF METHOD IN IPCL APPLICATION TO REAL-WORLD SYSTEM CORRECTNESS ...
By: Mykyta Kartavov, Taras Panchenko, Nataliya Polishchuk
(3292 reads)
Rating:
(1.00/10)
|
Abstract: The correctness proof for programs with parallelism, and interleaving concurrency with
shared memory in particular, is complicated problem because the state of separate execution thread
can be changed even in ready-to-run (waiting) time due to possible inference of one execution path over
the other via shared data or messaging mechanics. Classical methods like Floyd-Hoare? cannot be
applied directly to this case and new non-trivial methods are required to cope with such a complexity.
The safety property proof of real-world system using method for software correctness proof in
Interleaving Parallel Composition Language (for defined custom class of programs – namely server
software for Symmetric Multi-Processing? architecture like DB-server or Web-server) is the subject of this
article. Operational semantics of the system is defined in terms of state transitions. Program Invariant as
well as Pre- and Post- conditions are formulated in accordance with the methodology. Conclusions
about adequacy of the Method usage for such a kind of tasks (thanks to flexibility of compositionnominative
platform) and its practicality as well as ease of use for real-world systems have been made
based on this and other authors’ works.
Keywords: software correctness, safety proof, concurrent program, interleaving, invariant, IPCL,
composition approach, composition-nominative languages, formal verification.
ACM Classification Keywords: F.3.1 Theory of Computation - LOGICS AND MEANINGS OF
PROGRAMS - Specifying and Verifying and Reasoning about Programs, D.2.4 Software - SOFTWARE
ENGINEERING - Software/Program Verification.
Link:
PROPERTIES PROOF METHOD IN IPCL APPLICATION TO REAL-WORLD SYSTEM
CORRECTNESS PROOF
Mykyta Kartavov, Taras Panchenko, Nataliya Polishchuk
http://www.foibg.com/ijima/vol04/ijima04-02-p04.pdf
|
AN APPROACH TO BUSINESS PROCESSES REENGINEERING BASED ON INTEGRATION OF ...
By: Renata Ayzatullova, Lyudmila Lyadova, Irina Shalyaeva
(2852 reads)
Rating:
(1.00/10)
|
Abstract: An approach to reengineering business processes through the integration of the domain
specific modeling platform and Process Mining tools is described. An analysis of the existing
approaches to business processes improvement is presented and restrictions are shown. The Process
Mining methods are related to business process reengineering stages and tasks. Comparative analysis
of Process Mining tools is executed. The advantages of the using of domain specific modeling tools
(language workbenches, DSM platforms) are substantiated. Brief comparison of various visual
languages notations and model transformation examples are described. The DSM platform ensures
mutual understanding between specialists. The MetaLanguage? DSM platform is the basis of integration
tools. Some DSL (metamodels) are described and transformations are illustrated. The implementation of
integrated tools reduces the complexity of analyst’s work.
Keywords: business processes reengineering, domain specific modeling, DSM, modeling languages,
DSL, language toolkits, DSM platform, model transformations, business process analysis, Process
Mining.
ACM Classification Keywords: H.4 INFORMATION SYSTEMS APPLICATIONS: H.4.1 Office
Automation –Workflow management; H.4.2 Types of Systems – Decision support (e.g., MIS). I.6
SIMULATION AND MODELING: I.6.2 Simulation Languages; I.6.4 Model Validation and Analysis; I.6.5
Model Development Modeling methodologies.
Link:
AN APPROACH TO BUSINESS PROCESSES REENGINEERING BASED ON
INTEGRATION OF THE PROCESS MINING METHODS AND
DOMAIN SPECIFIC MODELING TOOLS
Renata Ayzatullova, Lyudmila Lyadova, Irina Shalyaeva
http://www.foibg.com/ijima/vol04/ijima04-02-p03.pdf
|
Index matrices with function-type of elements. Part 2
By: Krassimir T. Atanassov
(2624 reads)
Rating:
(1.00/10)
|
Abstract. Index Matrices (IMs) are extensions of the ordinary matrices. Some of the operations and relations
defined over IMs are analogous of the standard ones, while there have been defined new ones, as well. Operators
that do not have analogues in matrix theory have been defined, as well. In general, the elements of an IM can be
real or complex numbers, as well as propositions or predicates. In the present paper, new operation over IMs with
elements being functions, is defined, and some of its properties are discussed.
Keywords: Function, Index matrix, Operation, Operator, Relation.
AMS Classification: 11C20
Link:
Index matrices with function-type of elements. Part 2
Krassimir T. Atanassov
http://www.foibg.com/ijima/vol04/ijima04-02-p02.pdf
|
AN UNCERTAIN CAUCHY PROBLEM OF A NEW CLASS OF FUZZY DIFFERENTIAL EQUATIONS
By: Alexei Bychkov, Eugene Ivanov, Olha Suprun
(2617 reads)
Rating:
(1.00/10)
|
Abstract: The concept of fuzzy perception roaming process is entered. A new integral is built by the
fuzzy perception roaming process. Properties of this integral are studied. The new class of differential
equalizations is acquired. A theorem of existence and uniqueness of a solution for the new class of
fuzzy perception differential equations are proved.
Keywords: possibility-theoretical approach, dynamic processes, soft modeling, fuzzy perception
processes, Cauchy problem.
ACM Classification Keywords: G.1.7 – Ordinary Differential Equations.
Link:
AN UNCERTAIN CAUCHY PROBLEM OF A NEW CLASS OF FUZZY DIFFERENTIAL
EQUATIONS
Alexei Bychkov, Eugene Ivanov, Olha Suprun
http://www.foibg.com/ijima/vol04/ijima04-02-p01.pdf
|
METHOD OF ESTIMATING RELIABILITY OF INFORMATION TRANSMISSION IN WIRELESS ...
By: Sergey Zaitsev
(2573 reads)
Rating:
(1.00/10)
|
Abstract: This paper describes a method for estimating the reliability of information transmission in
wireless networks operating in conditions of high noise and interference. The method is based on
obtaining analytical relationships for calculating the reliability of information transmission based on
nonlinear regression analysis and the use of log-likelihood function about transmitted bits in decisionmaking
in the turbo decoder.
Keywords: information technologies, a priori uncertainty, wireless networks, turbo codes
ACM Classification Keywords: H.4 Information system applications, H.4.3 Communications
Applications and Expert Systems, G.1.6 Optimization, I.6 Simulation and Modeling, K.6.4 System
Management
Link:
METHOD OF ESTIMATING RELIABILITY OF INFORMATION TRANSMISSION IN
WIRELESS NETWORKS CHANNELS INCREASE IN NOISE AND INTERFERENCE
Sergey Zaitsev
http://www.foibg.com/ijima/vol04/ijima04-01-p08.pdf
|
SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP)
By: Irma Aslanishvili, Tariel Khvedelidze
(2549 reads)
Rating:
(1.00/10)
|
Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static
nodes that can freely and dynamically self-organize Namicheishvili et al, 2011. In this way they form
arbitrary, and temporary “Ad hoc” networks topologies, allowing devices to seamlessly interconnect in
areas with no pre-existing infrastructure. Introduction of new protocols such as Bluetooth, IEEE
802.11and Hyperlink are making possible the deployment of ad hoc networks for commercial purposes.
TCP (Transmission Control Protocol) was designed to provide reliable end-to end delivery of data over
unreliable networks. In theory, TCP should be independent of the technology of the underlying
infrastructure. In particular, TCP should not care whether the Internet Protocol (IP) is running over wired
or wireless connections. In practice, it does matter because most TCP deployments have been carefully
designed based on assumptions that are specific to wired networks. Ignoring the properties of wireless
transmission can lead to TCP implementations with poor performance. In practice, most TCP
deployments have been carefully designed in the context of wired networks. In order to adapt TCP to
the ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate
between the different types of losses. Indeed, in mobile or static ad hoc networks losses are not always
due to network congestion, as it is mostly the case in wired networks. In this paper, we present model:
how TCP can be affected by mobility and lower layers protocols.
Keywords: Ad Hoc Networks, protocols, Routing protocols, packet, source node, Relay routing, finite
memory, TCP, Simulation Metrics, layers protocols TCP Feedback, TCP-DOOR.
Link:
SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP)
Irma Aslanishvili, Tariel Khvedelidze
http://www.foibg.com/ijima/vol04/ijima04-01-p07.pdf
|
AN APPROACH TO BEHAVIORAL SOFTWARE MODELS ANALYTICAL REPRESENTATION
By: Elena Chebanyuk
(2776 reads)
Rating:
(1.00/10)
|
Abstract: According to standard UML 2.5 Behavioral Software Models (BSMs) are UML diagrams that
represent software behavior UML 2.5, 2012. An approach of BSM analytical representation is
proposed in this paper. Such BSMs as Use Case Diagrams (UCDs), Collaboration Diagrams (CDs) and
Sequence Diagrams (SDs) are considered at this paper. In order to design this approach objects and
operations that are both common and specific for every type of considering UML diagrams are defined.
In order to prepare general analytical representation of BSM it is proposed to form two tuples containing
objects and operations. Thus, BSM is represented as a Cartesian product of these two tuples. Then
analytical representation of conditional operation is proposed.
The peculiarity of the represented approach is that unified analytical representation of some operation
for all types of considering BSMs is used. Such representation facilitates performing many operations in
Model-Driven? Architecture (MDA) area.
Literature review shows that researches of BSMs mostly focused on preparation of an analytical
representation for parallel processes Hu, 2014, Dove, 2014 or designing transformation technics
Rhazali, 2014, Romera ,2014, FUML, 2013, Wang, 2014, Bonaris, 2014 and ect.. But conditional
operations are important constituents of any complex algorithms of processes. Existing technics of
conditional operations description, for example Object Constraint Language (OCL) OCL 2.4, 2014, do
not contain detailed notation for representation of any condition with given precision level. The notation
for formal analytical representation of conditional operation is represented in this paper. It is shown that
any complex conditions can be described in terms of the proposed notation. In order to prove this thesis
different conditional blocks are designed from Collaboration Diagrams. Also the analytical
representation of conditional block is obtained from other types of considering BSM.
Also in the point further research the general idea of framework for the analytical description of BSM is
proposed.
In conclusion advantages of implementing of the proposed approach to perform different activities in
software development lifecycle are formulated.
Keywords: Analytical representation, UML diagrams, Set-theory, Object Constraint Languages (OCL),
Model-Driven? Architecture (MDA).
ACM Classification Keywords: D.2.2 - Design Tools and Techniques, D.2.11 Software Architecture
Link:
AN APPROACH TO BEHAVIORAL SOFTWARE MODELS ANALYTICAL
REPRESENTATION
Elena Chebanyuk
http://www.foibg.com/ijima/vol04/ijima04-01-p06.pdf
|
ADAPTIVE ALGORITHM FOR MANAGEMENT BY WEIGHT COEFFICIENTS OF THE TRAFFIC ...
By: Kiril Kolchakov, Vladimir Monov
(2801 reads)
Rating:
(1.00/10)
|
bstract: An adaptive algorithm for management by weight coefficients of the traffic in Crossbar
commutator is synthesisеd. The algorithm is adaptive because the matrix of weights corresponds to the
matrix of the requests, each request receives a weight. The algorithm is modified in order to reduce the
number of the weights by the diagonal location.
Keywords: Network nodes, Crossbar switch, Conflict elimination, Packet messages.
ACM Classification Keywords: C.2.1 Network Architecture and Design, C.4 Performance of Systems.
Link:
ADAPTIVE ALGORITHM FOR MANAGEMENT BY WEIGHT COEFFICIENTS OF THE
TRAFFIC IN CROSSBAR COMMUTATOR
Kiril Kolchakov, Vladimir Monov
http://www.foibg.com/ijima/vol04/ijima04-01-p05.pdf
|
ОNTOLOGICAL APPROACH TO A CONSTRUCTION OF THE SIMULATION SYSTEM FOR ...
By: Elena Zamyatina, Alexander Mikov, Roman Mikheev
(2548 reads)
Rating:
(1.00/10)
|
Abstract: This paper discusses the problem of simulation system constructing for the specific domain.
Authors suggest using the ontological approach. The simulation system TriadNS is considered. This
simulation system is dedicated for computer networks design and analysis. Authors represent base
ontology and some other ontologies describing the concepts of a specific domain.
Keywords: simulation, ontology, computer network, multi model approach
ACM Classification Keywords: I.6 Simulation and Modeling, I.6.8 Types of Simulation - Distributed: I.2
Artificial Intelligence, I.2.5 Programming Languages and Software - Expert system tools and techniques
Link:
ОNTOLOGICAL APPROACH TO A CONSTRUCTION OF THE SIMULATION SYSTEM
FOR THE SPECIFIC DOMAIN
Elena Zamyatina, Alexander Mikov, Roman Mikheev
http://www.foibg.com/ijima/vol04/ijima04-01-p04.pdf
|
SIMULATION MODELING IN THE CONSTRUCTION OF DYNAMIC INTEGRATED EXPERT SYSTEMS
By: Galina Rybina, Victor Rybin
(2586 reads)
Rating:
(1.00/10)
|
Abstract: Problems of integrating methods and simulation modeling tools with the technology of
dynamic integrated expert systems (IES) developed on the basis of task-oriented methodology and ATTECHNOLOGY
workbench are investigated in the context of the modern stage of simulation modeling
development. The current version of the simulation modeling subsystem, functioning as a part of the
dynamic version of the AT-TECHNOLOGY workbench, is described. Basic subsystem components and
the construction technology of simulation models of complex technical systems are considered, as well
as examples of application of this subsystem in prototyping dynamic IES are provided.
Keywords: dynamic intelligent systems, dynamic integrated expert systems, task-oriented
methodology, simulation, complex engineering systems, simulation modeling subsystem, simulation
model, AT-TECHNOLOGY workbench.
Link:
SIMULATION MODELING IN THE CONSTRUCTION OF DYNAMIC INTEGRATED
EXPERT SYSTEMS
Galina Rybina, Victor Rybin
http://www.foibg.com/ijima/vol04/ijima04-01-p03.pdf
|
|
|