Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035964
A. Mammadov, B. Abbasov
Proposition assumed by the TCP protocol that any packet loss is due to network congestion, is no longer suitable for wireless networks, because TCP poorly fulfills its role in such networks. In this article has been presented and been listed the main causes of this performance degradation. Even though there are many methods and protocols have been proposed TCP variants up until now, in this review only a few of them have been studied. Here as solutions to the reasons of TCP performance degradation in wireless and wireless LAN networks were grouped into three main groups: end-to-end approaches, split-connection approaches and proxy-based approaches. Research in this area is still producing rapid action, and considerable amount of problems are still widely open, so this article is to identify the main causes of TCP performance degradation over wireless networks and to review some proposed TCP variant to prevent such lack of TCP in wireless and WLAN networks.
{"title":"A review of protocols related to enhancement of TCP performance in wireless and WLAN networks","authors":"A. Mammadov, B. Abbasov","doi":"10.1109/ICAICT.2014.7035964","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035964","url":null,"abstract":"Proposition assumed by the TCP protocol that any packet loss is due to network congestion, is no longer suitable for wireless networks, because TCP poorly fulfills its role in such networks. In this article has been presented and been listed the main causes of this performance degradation. Even though there are many methods and protocols have been proposed TCP variants up until now, in this review only a few of them have been studied. Here as solutions to the reasons of TCP performance degradation in wireless and wireless LAN networks were grouped into three main groups: end-to-end approaches, split-connection approaches and proxy-based approaches. Research in this area is still producing rapid action, and considerable amount of problems are still widely open, so this article is to identify the main causes of TCP performance degradation over wireless networks and to review some proposed TCP variant to prevent such lack of TCP in wireless and WLAN networks.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127706095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035981
D. Kaskina, R. Bradshaw, A. P. James, Y. Kho, M. Kabiyeva
Remote sensing technology can directly contribute to water resource management and provides unique methods and solutions to meet the information requirements of water engineers responsible for water resources management. This project aims to advance the application of Remote Sensing in the context of managing water resource by integrating high resolution remote sensing technology into a Knowledge Management System for the management of water resources and the infrastructure to control them. Remote Sensing Technology is used to complement the development of a Knowledge Management System by advancing the remote sensing capability and image processing to near-real time. This capability can be used to monitor and assess a river basin to develop flood extent and predictions.
{"title":"Developing high resolution remote sensing technology into an advanced knowledge management system to monitor and assess water resources","authors":"D. Kaskina, R. Bradshaw, A. P. James, Y. Kho, M. Kabiyeva","doi":"10.1109/ICAICT.2014.7035981","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035981","url":null,"abstract":"Remote sensing technology can directly contribute to water resource management and provides unique methods and solutions to meet the information requirements of water engineers responsible for water resources management. This project aims to advance the application of Remote Sensing in the context of managing water resource by integrating high resolution remote sensing technology into a Knowledge Management System for the management of water resources and the infrastructure to control them. Remote Sensing Technology is used to complement the development of a Knowledge Management System by advancing the remote sensing capability and image processing to near-real time. This capability can be used to monitor and assess a river basin to develop flood extent and predictions.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126713514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035963
B. Alassane, Boudal Niang
Users and enterprise needs will drive multimedia service evolution for both mobile and fixed operators. IMS (IP Multimedia Subsystem) is a recognized standard of 3GPP group. IMS is well integrated with existing voice and data networks, while adopting many of their key characteristics. The SIP servers are the key part of the IMS structure. They are the main components responsible for processing and routing messages. With communication networks getting more and more present in our daily activities, network outages or significant degradations of the quality of service (QoS) become less and less tolerable. Our research works on improvement of the QoS in IMS networks. It is base in the one hand modeling traffic and on the other hand dimensioning traffic. These performance optimizations are essentially dedicated to the traffic of input and output flows at SIP servers. We build OpenSource IMS platform under UBUNTU Linux distribution.
{"title":"Dimensioning traffic performance in IMS network","authors":"B. Alassane, Boudal Niang","doi":"10.1109/ICAICT.2014.7035963","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035963","url":null,"abstract":"Users and enterprise needs will drive multimedia service evolution for both mobile and fixed operators. IMS (IP Multimedia Subsystem) is a recognized standard of 3GPP group. IMS is well integrated with existing voice and data networks, while adopting many of their key characteristics. The SIP servers are the key part of the IMS structure. They are the main components responsible for processing and routing messages. With communication networks getting more and more present in our daily activities, network outages or significant degradations of the quality of service (QoS) become less and less tolerable. Our research works on improvement of the QoS in IMS networks. It is base in the one hand modeling traffic and on the other hand dimensioning traffic. These performance optimizations are essentially dedicated to the traffic of input and output flows at SIP servers. We build OpenSource IMS platform under UBUNTU Linux distribution.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126211363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035988
Y. Kudinov, A. Kelina, A. Pashchenko, F. Pashchenko
Classical linear controllers often do not provide required quality of control of real, mostly nonlinear industrial facilities. Under these conditions, high efficiency show fuzzy PID controllers and their modifications, which, by appropriate choice of parameters, can become nonlinear and better suited for the control of nonlinear industrial facilities. In this paper we propose a simplified method for determining the optimal parameters of fuzzy PD controller with the use of MATLAB and the method of fuzzy linearization discussed in [1, 2, 3].
{"title":"Optimization of intelligent fuzzy controllers for industrial facilities","authors":"Y. Kudinov, A. Kelina, A. Pashchenko, F. Pashchenko","doi":"10.1109/ICAICT.2014.7035988","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035988","url":null,"abstract":"Classical linear controllers often do not provide required quality of control of real, mostly nonlinear industrial facilities. Under these conditions, high efficiency show fuzzy PID controllers and their modifications, which, by appropriate choice of parameters, can become nonlinear and better suited for the control of nonlinear industrial facilities. In this paper we propose a simplified method for determining the optimal parameters of fuzzy PD controller with the use of MATLAB and the method of fuzzy linearization discussed in [1, 2, 3].","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126897304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035970
V. Kureychik, A. Kazharov
When the problems of artificial intelligence, transport logistics, design automation, building intelligent CAD, mathematical economic, sociological and other are being solved it's necessary to solve problems of determining unrelated objects. Unrelated objects search based on different criteria can solve problems of science, technology and production effectively. The paper proposes a quantum algorithm to determine the independent subsets in a directed graph. It allows developing algorithms with polynomial complexity, and in some cases, linear and quadratic complexity.
{"title":"Independent subsets search in a directed graph","authors":"V. Kureychik, A. Kazharov","doi":"10.1109/ICAICT.2014.7035970","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035970","url":null,"abstract":"When the problems of artificial intelligence, transport logistics, design automation, building intelligent CAD, mathematical economic, sociological and other are being solved it's necessary to solve problems of determining unrelated objects. Unrelated objects search based on different criteria can solve problems of science, technology and production effectively. The paper proposes a quantum algorithm to determine the independent subsets in a directed graph. It allows developing algorithms with polynomial complexity, and in some cases, linear and quadratic complexity.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133505125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036009
Mujtaba B. Ila, Hasan Kitapci
Information and Communication Technology (ICT) has been adopted in education due to its perceived advantages. Different nations have tried adopting different strategies to choose the right ICT infrastructure with varying degree of success due to the absence of a standard procedure that can be used for the said purpose. This paper proposes an approach that will support education stakeholders in choosing the most suitable ICT infrastructure architecture that will suit their needs based on Non-Functional Requirements (NFRs) of the proposed system.
{"title":"Selecting an effective information and communication technology architecture for an education system based on non-functional requirements","authors":"Mujtaba B. Ila, Hasan Kitapci","doi":"10.1109/ICAICT.2014.7036009","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036009","url":null,"abstract":"Information and Communication Technology (ICT) has been adopted in education due to its perceived advantages. Different nations have tried adopting different strategies to choose the right ICT infrastructure with varying degree of success due to the absence of a standard procedure that can be used for the said purpose. This paper proposes an approach that will support education stakeholders in choosing the most suitable ICT infrastructure architecture that will suit their needs based on Non-Functional Requirements (NFRs) of the proposed system.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127920780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035956
Ahmet Ozdil, M. M. Ozbilen
The identification of a face from a video or image source is a study of computer vision know as face detection or recognition. Face detection and recognition becomes popular in recent years by the development of computing power. In this study we will present performance aspect of algorithms Eigenfaces, Fisherfaces, and Local Binary Pattern Histograms in different development platforms: Arm and Intel processors.
{"title":"A survey on comparison of face recognition algorithms","authors":"Ahmet Ozdil, M. M. Ozbilen","doi":"10.1109/ICAICT.2014.7035956","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035956","url":null,"abstract":"The identification of a face from a video or image source is a study of computer vision know as face detection or recognition. Face detection and recognition becomes popular in recent years by the development of computing power. In this study we will present performance aspect of algorithms Eigenfaces, Fisherfaces, and Local Binary Pattern Histograms in different development platforms: Arm and Intel processors.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121033580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036001
G. Bánesz, A. Hašková
Nowadays electronic form of teaching is proclaimed to be an imperative mainly for tertiary level of education. On the other hand many research results show that higher efficiency of education is achieved by the use of blended learning. The paper presents experiences and research results of the authors related to the use of e-learning as supporting tool to traditional forms of education at higher education institutions to eliminate study problems of students coming to universities from different types of secondary schools. To help the students of the bachelor study programme Occupational Health and Safety to cope with their study problems in relation to the compulsory subject Machines and machine elements they created an electronic course offering the students a possibility to acquire eventual missing knowledge necessary to pass the practical exercises included in the subject. As the teacher experiences and research data of the designed e-course verification show, students given at disposal this e-course as a learning assistance tool have no serious problems to do the practical assignments they are expected to fulfil during the lessons.
{"title":"E-learning assisted teaching of technical subjects","authors":"G. Bánesz, A. Hašková","doi":"10.1109/ICAICT.2014.7036001","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036001","url":null,"abstract":"Nowadays electronic form of teaching is proclaimed to be an imperative mainly for tertiary level of education. On the other hand many research results show that higher efficiency of education is achieved by the use of blended learning. The paper presents experiences and research results of the authors related to the use of e-learning as supporting tool to traditional forms of education at higher education institutions to eliminate study problems of students coming to universities from different types of secondary schools. To help the students of the bachelor study programme Occupational Health and Safety to cope with their study problems in relation to the compulsory subject Machines and machine elements they created an electronic course offering the students a possibility to acquire eventual missing knowledge necessary to pass the practical exercises included in the subject. As the teacher experiences and research data of the designed e-course verification show, students given at disposal this e-course as a learning assistance tool have no serious problems to do the practical assignments they are expected to fulfil during the lessons.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129327045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036015
Beknazarova Saida Safibullaevna
This paper addresses the problem of improving the effectiveness of management information and educational resources in particular media courses designed by media education system and to improve their quality.
{"title":"The problem of quality assessment of the mediacourse","authors":"Beknazarova Saida Safibullaevna","doi":"10.1109/ICAICT.2014.7036015","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036015","url":null,"abstract":"This paper addresses the problem of improving the effectiveness of management information and educational resources in particular media courses designed by media education system and to improve their quality.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035906
I. Zikratov, I. Lebedev, A. Gurtov, E. V. Kuzmich
This paper focuses on aspects of information security (IS) in group of mobile robotic systems with swarm intellect. It was justified requirements for IS mechanisms of swarm robotic systems. It was offered approaches to provide IS in swarm robotic systems, based on the implementation of the principles of centralized and decentralized security management of mobile agents. It was developed method of forming a self-organizing IS management system of robotic agents in swarm groups implementing POM (PoliceOfficeModel). It is presented a comparative analysis of the implementation of protected swarm systems depending on the logic of functioning police offices, integrated in swarm system.
{"title":"Securing swarm intellect robots with a police office model","authors":"I. Zikratov, I. Lebedev, A. Gurtov, E. V. Kuzmich","doi":"10.1109/ICAICT.2014.7035906","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035906","url":null,"abstract":"This paper focuses on aspects of information security (IS) in group of mobile robotic systems with swarm intellect. It was justified requirements for IS mechanisms of swarm robotic systems. It was offered approaches to provide IS in swarm robotic systems, based on the implementation of the principles of centralized and decentralized security management of mobile agents. It was developed method of forming a self-organizing IS management system of robotic agents in swarm groups implementing POM (PoliceOfficeModel). It is presented a comparative analysis of the implementation of protected swarm systems depending on the logic of functioning police offices, integrated in swarm system.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125770109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}