Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035981
D. Kaskina, R. Bradshaw, A. P. James, Y. Kho, M. Kabiyeva
Remote sensing technology can directly contribute to water resource management and provides unique methods and solutions to meet the information requirements of water engineers responsible for water resources management. This project aims to advance the application of Remote Sensing in the context of managing water resource by integrating high resolution remote sensing technology into a Knowledge Management System for the management of water resources and the infrastructure to control them. Remote Sensing Technology is used to complement the development of a Knowledge Management System by advancing the remote sensing capability and image processing to near-real time. This capability can be used to monitor and assess a river basin to develop flood extent and predictions.
{"title":"Developing high resolution remote sensing technology into an advanced knowledge management system to monitor and assess water resources","authors":"D. Kaskina, R. Bradshaw, A. P. James, Y. Kho, M. Kabiyeva","doi":"10.1109/ICAICT.2014.7035981","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035981","url":null,"abstract":"Remote sensing technology can directly contribute to water resource management and provides unique methods and solutions to meet the information requirements of water engineers responsible for water resources management. This project aims to advance the application of Remote Sensing in the context of managing water resource by integrating high resolution remote sensing technology into a Knowledge Management System for the management of water resources and the infrastructure to control them. Remote Sensing Technology is used to complement the development of a Knowledge Management System by advancing the remote sensing capability and image processing to near-real time. This capability can be used to monitor and assess a river basin to develop flood extent and predictions.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126713514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035964
A. Mammadov, B. Abbasov
Proposition assumed by the TCP protocol that any packet loss is due to network congestion, is no longer suitable for wireless networks, because TCP poorly fulfills its role in such networks. In this article has been presented and been listed the main causes of this performance degradation. Even though there are many methods and protocols have been proposed TCP variants up until now, in this review only a few of them have been studied. Here as solutions to the reasons of TCP performance degradation in wireless and wireless LAN networks were grouped into three main groups: end-to-end approaches, split-connection approaches and proxy-based approaches. Research in this area is still producing rapid action, and considerable amount of problems are still widely open, so this article is to identify the main causes of TCP performance degradation over wireless networks and to review some proposed TCP variant to prevent such lack of TCP in wireless and WLAN networks.
{"title":"A review of protocols related to enhancement of TCP performance in wireless and WLAN networks","authors":"A. Mammadov, B. Abbasov","doi":"10.1109/ICAICT.2014.7035964","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035964","url":null,"abstract":"Proposition assumed by the TCP protocol that any packet loss is due to network congestion, is no longer suitable for wireless networks, because TCP poorly fulfills its role in such networks. In this article has been presented and been listed the main causes of this performance degradation. Even though there are many methods and protocols have been proposed TCP variants up until now, in this review only a few of them have been studied. Here as solutions to the reasons of TCP performance degradation in wireless and wireless LAN networks were grouped into three main groups: end-to-end approaches, split-connection approaches and proxy-based approaches. Research in this area is still producing rapid action, and considerable amount of problems are still widely open, so this article is to identify the main causes of TCP performance degradation over wireless networks and to review some proposed TCP variant to prevent such lack of TCP in wireless and WLAN networks.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127706095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036006
R. Muhamedyev, Y. Daineko, D. Bari, A. Mansharipova
A method for three-dimensional visualization of molecular biology processes modeled by chemical kinetic equations is presented. To implement this visualization, the software in C# and a database of three-dimensional forms that model molecular complexes are developed. The quantitative parameters in this visualization scheme are determined from kinetic equations governing the participating components, so our visualization is not only qualitative but also quantitative. As a case study, it was visualized a mathematical model for mitochondria-dependent apoptosis (programmed cell death) proposed by Bagci et all [19].
{"title":"Using computational models for development of the three-dimensional visualization in molecular biology","authors":"R. Muhamedyev, Y. Daineko, D. Bari, A. Mansharipova","doi":"10.1109/ICAICT.2014.7036006","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036006","url":null,"abstract":"A method for three-dimensional visualization of molecular biology processes modeled by chemical kinetic equations is presented. To implement this visualization, the software in C# and a database of three-dimensional forms that model molecular complexes are developed. The quantitative parameters in this visualization scheme are determined from kinetic equations governing the participating components, so our visualization is not only qualitative but also quantitative. As a case study, it was visualized a mathematical model for mitochondria-dependent apoptosis (programmed cell death) proposed by Bagci et all [19].","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134317839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035970
V. Kureychik, A. Kazharov
When the problems of artificial intelligence, transport logistics, design automation, building intelligent CAD, mathematical economic, sociological and other are being solved it's necessary to solve problems of determining unrelated objects. Unrelated objects search based on different criteria can solve problems of science, technology and production effectively. The paper proposes a quantum algorithm to determine the independent subsets in a directed graph. It allows developing algorithms with polynomial complexity, and in some cases, linear and quadratic complexity.
{"title":"Independent subsets search in a directed graph","authors":"V. Kureychik, A. Kazharov","doi":"10.1109/ICAICT.2014.7035970","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035970","url":null,"abstract":"When the problems of artificial intelligence, transport logistics, design automation, building intelligent CAD, mathematical economic, sociological and other are being solved it's necessary to solve problems of determining unrelated objects. Unrelated objects search based on different criteria can solve problems of science, technology and production effectively. The paper proposes a quantum algorithm to determine the independent subsets in a directed graph. It allows developing algorithms with polynomial complexity, and in some cases, linear and quadratic complexity.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133505125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035920
M. Folgheraiter
This paper introduces a methodology and a software framework intended to optimize and speed up the design process of a haptic interface or a rehabilitation system. Starting from an initial mechanical design the procedure allows to export the kinematic and dynamic properties of the robotic system in a simulation environment. The software receives as additional input the Cartesian or joints trajectories and generates as output the required torques at the joints. From the recorded measurements the program extracts the torque ranges necessary to choose a suitable actuation system for the robot. The possibility to run the simulation in batch modality allows also to define different optimization techniques that may be used to reduce the overall system weight or increase its payload.
{"title":"Actuation design methodology for haptic interfaces and rehabilitation systems","authors":"M. Folgheraiter","doi":"10.1109/ICAICT.2014.7035920","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035920","url":null,"abstract":"This paper introduces a methodology and a software framework intended to optimize and speed up the design process of a haptic interface or a rehabilitation system. Starting from an initial mechanical design the procedure allows to export the kinematic and dynamic properties of the robotic system in a simulation environment. The software receives as additional input the Cartesian or joints trajectories and generates as output the required torques at the joints. From the recorded measurements the program extracts the torque ranges necessary to choose a suitable actuation system for the robot. The possibility to run the simulation in batch modality allows also to define different optimization techniques that may be used to reduce the overall system weight or increase its payload.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"31 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132129260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036009
Mujtaba B. Ila, Hasan Kitapci
Information and Communication Technology (ICT) has been adopted in education due to its perceived advantages. Different nations have tried adopting different strategies to choose the right ICT infrastructure with varying degree of success due to the absence of a standard procedure that can be used for the said purpose. This paper proposes an approach that will support education stakeholders in choosing the most suitable ICT infrastructure architecture that will suit their needs based on Non-Functional Requirements (NFRs) of the proposed system.
{"title":"Selecting an effective information and communication technology architecture for an education system based on non-functional requirements","authors":"Mujtaba B. Ila, Hasan Kitapci","doi":"10.1109/ICAICT.2014.7036009","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036009","url":null,"abstract":"Information and Communication Technology (ICT) has been adopted in education due to its perceived advantages. Different nations have tried adopting different strategies to choose the right ICT infrastructure with varying degree of success due to the absence of a standard procedure that can be used for the said purpose. This paper proposes an approach that will support education stakeholders in choosing the most suitable ICT infrastructure architecture that will suit their needs based on Non-Functional Requirements (NFRs) of the proposed system.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127920780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035956
Ahmet Ozdil, M. M. Ozbilen
The identification of a face from a video or image source is a study of computer vision know as face detection or recognition. Face detection and recognition becomes popular in recent years by the development of computing power. In this study we will present performance aspect of algorithms Eigenfaces, Fisherfaces, and Local Binary Pattern Histograms in different development platforms: Arm and Intel processors.
{"title":"A survey on comparison of face recognition algorithms","authors":"Ahmet Ozdil, M. M. Ozbilen","doi":"10.1109/ICAICT.2014.7035956","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035956","url":null,"abstract":"The identification of a face from a video or image source is a study of computer vision know as face detection or recognition. Face detection and recognition becomes popular in recent years by the development of computing power. In this study we will present performance aspect of algorithms Eigenfaces, Fisherfaces, and Local Binary Pattern Histograms in different development platforms: Arm and Intel processors.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121033580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036001
G. Bánesz, A. Hašková
Nowadays electronic form of teaching is proclaimed to be an imperative mainly for tertiary level of education. On the other hand many research results show that higher efficiency of education is achieved by the use of blended learning. The paper presents experiences and research results of the authors related to the use of e-learning as supporting tool to traditional forms of education at higher education institutions to eliminate study problems of students coming to universities from different types of secondary schools. To help the students of the bachelor study programme Occupational Health and Safety to cope with their study problems in relation to the compulsory subject Machines and machine elements they created an electronic course offering the students a possibility to acquire eventual missing knowledge necessary to pass the practical exercises included in the subject. As the teacher experiences and research data of the designed e-course verification show, students given at disposal this e-course as a learning assistance tool have no serious problems to do the practical assignments they are expected to fulfil during the lessons.
{"title":"E-learning assisted teaching of technical subjects","authors":"G. Bánesz, A. Hašková","doi":"10.1109/ICAICT.2014.7036001","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036001","url":null,"abstract":"Nowadays electronic form of teaching is proclaimed to be an imperative mainly for tertiary level of education. On the other hand many research results show that higher efficiency of education is achieved by the use of blended learning. The paper presents experiences and research results of the authors related to the use of e-learning as supporting tool to traditional forms of education at higher education institutions to eliminate study problems of students coming to universities from different types of secondary schools. To help the students of the bachelor study programme Occupational Health and Safety to cope with their study problems in relation to the compulsory subject Machines and machine elements they created an electronic course offering the students a possibility to acquire eventual missing knowledge necessary to pass the practical exercises included in the subject. As the teacher experiences and research data of the designed e-course verification show, students given at disposal this e-course as a learning assistance tool have no serious problems to do the practical assignments they are expected to fulfil during the lessons.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129327045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036015
Beknazarova Saida Safibullaevna
This paper addresses the problem of improving the effectiveness of management information and educational resources in particular media courses designed by media education system and to improve their quality.
{"title":"The problem of quality assessment of the mediacourse","authors":"Beknazarova Saida Safibullaevna","doi":"10.1109/ICAICT.2014.7036015","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036015","url":null,"abstract":"This paper addresses the problem of improving the effectiveness of management information and educational resources in particular media courses designed by media education system and to improve their quality.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035906
I. Zikratov, I. Lebedev, A. Gurtov, E. V. Kuzmich
This paper focuses on aspects of information security (IS) in group of mobile robotic systems with swarm intellect. It was justified requirements for IS mechanisms of swarm robotic systems. It was offered approaches to provide IS in swarm robotic systems, based on the implementation of the principles of centralized and decentralized security management of mobile agents. It was developed method of forming a self-organizing IS management system of robotic agents in swarm groups implementing POM (PoliceOfficeModel). It is presented a comparative analysis of the implementation of protected swarm systems depending on the logic of functioning police offices, integrated in swarm system.
{"title":"Securing swarm intellect robots with a police office model","authors":"I. Zikratov, I. Lebedev, A. Gurtov, E. V. Kuzmich","doi":"10.1109/ICAICT.2014.7035906","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035906","url":null,"abstract":"This paper focuses on aspects of information security (IS) in group of mobile robotic systems with swarm intellect. It was justified requirements for IS mechanisms of swarm robotic systems. It was offered approaches to provide IS in swarm robotic systems, based on the implementation of the principles of centralized and decentralized security management of mobile agents. It was developed method of forming a self-organizing IS management system of robotic agents in swarm groups implementing POM (PoliceOfficeModel). It is presented a comparative analysis of the implementation of protected swarm systems depending on the logic of functioning police offices, integrated in swarm system.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125770109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}