Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035901
A. Mohammed, Hakan Hadi Maras, E. Elbasi
Digital watermarks have recently emerged as a possible solution for protecting the copyright of digital materials, the work presented in this paper is concerned with the Discrete Wavelet Transform (DWT) based non-blind digital watermarking, and how the DWT is an efficient transform in the field of digital watermarking. In this work we used an optimum criteria that embeds four watermarks in more than one level of DWT in the same algorithm. The aim of this work is to keep the Correlation Coefficient (CC) between the original and the extracted watermark around the value of 0.9.
{"title":"A new robust binary image embedding algorithm in discrete wavelet domain","authors":"A. Mohammed, Hakan Hadi Maras, E. Elbasi","doi":"10.1109/ICAICT.2014.7035901","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035901","url":null,"abstract":"Digital watermarks have recently emerged as a possible solution for protecting the copyright of digital materials, the work presented in this paper is concerned with the Discrete Wavelet Transform (DWT) based non-blind digital watermarking, and how the DWT is an efficient transform in the field of digital watermarking. In this work we used an optimum criteria that embeds four watermarks in more than one level of DWT in the same algorithm. The aim of this work is to keep the Correlation Coefficient (CC) between the original and the extracted watermark around the value of 0.9.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114237973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036004
P. Sosnin
The study is bound with an ontological systematization of an individual experience which supports an occupational activity of a person. Specificity of the offered approach is defined by using a precedent model as a basic type of experience units. Models of precedents are constructed in accordance with the normative schema during the occupational work of the person. In creating the personal ontology, the individual should use a reflection of solved tasks on a specialized memory intended for simulating the applied reasoning of the question-answer type.
{"title":"A personal ontology of an individual occupational experience","authors":"P. Sosnin","doi":"10.1109/ICAICT.2014.7036004","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036004","url":null,"abstract":"The study is bound with an ontological systematization of an individual experience which supports an occupational activity of a person. Specificity of the offered approach is defined by using a precedent model as a basic type of experience units. Models of precedents are constructed in accordance with the normative schema during the occupational work of the person. In creating the personal ontology, the individual should use a reflection of solved tasks on a specialized memory intended for simulating the applied reasoning of the question-answer type.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116037038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035946
R. Alguliyev, Y. Imamverdiyev
Big Data is related to technologies for collecting, processing, analyzing and extracting useful knowledge from very large volumes of structured and unstructured data generated by different sources at high speed. Big Data creates critical information security and privacy problems, at the same time Big Data analytics promises significant opportunities for prevention and detection of advanced cyber-attacks using correlated internal and external security data. We must address several challenges to realize true potential of Big Data for information security. The paper analyzes Big Data applications for information security problems, and defines research directions on Big Data analytics for security intelligence.
{"title":"Big Data: Big Promises for Information Security","authors":"R. Alguliyev, Y. Imamverdiyev","doi":"10.1109/ICAICT.2014.7035946","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035946","url":null,"abstract":"Big Data is related to technologies for collecting, processing, analyzing and extracting useful knowledge from very large volumes of structured and unstructured data generated by different sources at high speed. Big Data creates critical information security and privacy problems, at the same time Big Data analytics promises significant opportunities for prevention and detection of advanced cyber-attacks using correlated internal and external security data. We must address several challenges to realize true potential of Big Data for information security. The paper analyzes Big Data applications for information security problems, and defines research directions on Big Data analytics for security intelligence.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131884278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035935
D. Evsevichev, O. Maksimova, M. Samokhvalov
One of the most promising indicators is the thin film electroluminescent (TFEL) display device. Design and research processes of the TFEL devices are associated with high calculation complexity, settlement slowness, as well as with a large amount of data to be processed. With a view to solving the problems an automated system of design and scientific research of the TFEL display devices has been developed.
{"title":"Automated design and research of the thin film electroluminescent indicating devices","authors":"D. Evsevichev, O. Maksimova, M. Samokhvalov","doi":"10.1109/ICAICT.2014.7035935","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035935","url":null,"abstract":"One of the most promising indicators is the thin film electroluminescent (TFEL) display device. Design and research processes of the TFEL devices are associated with high calculation complexity, settlement slowness, as well as with a large amount of data to be processed. With a view to solving the problems an automated system of design and scientific research of the TFEL display devices has been developed.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134021186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035919
Y. Rogozov, Julia Lipko, O. Schevchenko
In this paper we propose to consider configurable information system as a object of control, applying the basic concepts and principles of control theory, to generate a conceptual model of control system, to identify the main control elements and mechanisms to implement it. The structure of the Configurable information system with the ability to control structure described. Such a study would form the main areas of research that, in combination with modern software technologies, will provide the flexible Configurable information system that focused on domains with dynamically changing requirements.
{"title":"The control in the structure of configurable information system","authors":"Y. Rogozov, Julia Lipko, O. Schevchenko","doi":"10.1109/ICAICT.2014.7035919","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035919","url":null,"abstract":"In this paper we propose to consider configurable information system as a object of control, applying the basic concepts and principles of control theory, to generate a conceptual model of control system, to identify the main control elements and mechanisms to implement it. The structure of the Configurable information system with the ability to control structure described. Such a study would form the main areas of research that, in combination with modern software technologies, will provide the flexible Configurable information system that focused on domains with dynamically changing requirements.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125240901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035974
Hakkı Soy, O. Ozdemir
In the design of wireless scheduling policies, the fairness criterion plays an important role in upgrading the performance of network. This paper concentrates on how the channel-aware opportunistic scheduler can improve both throughput and fairness in cellular wireless networks. In order to improve the fairness, we propose an adaptive fair scheduling algorithm by using fuzzy logic model. Proposed scheduler operates on Time Division Multiple Access (TDMA) fashion and calculates the priority index of each user according to channel quality fed back and fairness of channel assignment. We evaluate its performance via statistical simulations. The obtained results show that our strategy can improve the fairness but at the expense of slight throughput loss compared to well-known opportunistic scheduling methods.
{"title":"A fuzzy logic based scheduling approach to improve fairness in opportunistic wireless networks","authors":"Hakkı Soy, O. Ozdemir","doi":"10.1109/ICAICT.2014.7035974","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035974","url":null,"abstract":"In the design of wireless scheduling policies, the fairness criterion plays an important role in upgrading the performance of network. This paper concentrates on how the channel-aware opportunistic scheduler can improve both throughput and fairness in cellular wireless networks. In order to improve the fairness, we propose an adaptive fair scheduling algorithm by using fuzzy logic model. Proposed scheduler operates on Time Division Multiple Access (TDMA) fashion and calculates the priority index of each user according to channel quality fed back and fairness of channel assignment. We evaluate its performance via statistical simulations. The obtained results show that our strategy can improve the fairness but at the expense of slight throughput loss compared to well-known opportunistic scheduling methods.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127782134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035930
S. Rodzin, L. Rodzina
The article describes the developed main elements of the general theory of bioinspired search for optimal solutions. Original biomemetic algorithms combined the following components: local search, cooperation and competition, are also presented here. Experiments with a number of NP-hard optimization problems have shown that usage of developed theory allows to solve these problems more quickly, reliably and accurately.
{"title":"Theory of bioinspired search for optimal solutions and its application for the processing of problem-oriented knowledge","authors":"S. Rodzin, L. Rodzina","doi":"10.1109/ICAICT.2014.7035930","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035930","url":null,"abstract":"The article describes the developed main elements of the general theory of bioinspired search for optimal solutions. Original biomemetic algorithms combined the following components: local search, cooperation and competition, are also presented here. Experiments with a number of NP-hard optimization problems have shown that usage of developed theory allows to solve these problems more quickly, reliably and accurately.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122820305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035905
V. Zolotarev, G. Ovechkin, Y. Seitkulov, D. Satybaldina, N. Tashatov, Vitaly Mishin
Non-binary multithreshold decoding (qMTD) for q-ary self-orthogonal codes (qSOC) is considered. The SER performance of qMTD is shown to be close to the results provided by optimum total search methods, which are not realizable for non-binary codes in general. qMTD decoders are compared with different decoders for Reed-Solomon codes. The performance provided with qMTD in some cases is unattainable with classical decoders for arbitrary long Reed-Solomon codes. The result of concatenation of qSOC with simple to decode outer codes is described. Method of improving of qMTD decoder's performance for qSOC is offered. Some simulated results obtained by using these two decoding techniques (the base and modified ways) are presented as well. Comparison of the results showed that the change in the threshold element's algorithm can significantly improve speed of qMTD work. It's shown that for a larger gain this modification qMTD should be used after conventional decoding iterations.
{"title":"Algorithm of multithreshold decoding for non-binary self-orthogonal concatenated codes","authors":"V. Zolotarev, G. Ovechkin, Y. Seitkulov, D. Satybaldina, N. Tashatov, Vitaly Mishin","doi":"10.1109/ICAICT.2014.7035905","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035905","url":null,"abstract":"Non-binary multithreshold decoding (qMTD) for q-ary self-orthogonal codes (qSOC) is considered. The SER performance of qMTD is shown to be close to the results provided by optimum total search methods, which are not realizable for non-binary codes in general. qMTD decoders are compared with different decoders for Reed-Solomon codes. The performance provided with qMTD in some cases is unattainable with classical decoders for arbitrary long Reed-Solomon codes. The result of concatenation of qSOC with simple to decode outer codes is described. Method of improving of qMTD decoder's performance for qSOC is offered. Some simulated results obtained by using these two decoding techniques (the base and modified ways) are presented as well. Comparison of the results showed that the change in the threshold element's algorithm can significantly improve speed of qMTD work. It's shown that for a larger gain this modification qMTD should be used after conventional decoding iterations.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123931198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035991
A. Khakimova, A. Bermukhambetova, Dana Sharipova, F. Muratov
Renewable energy test site installed at Nazarbayev University in Kazakhstan is considered as a controlled plant for modeling, design and simulation of proposed model predictive control (MPC) technique for the power system with nominal power up to 10 kW. The mathematical and simulation model of the control plant assumes that disturbance from consumer grid side is generated by pseudorandom numbers. The control strategy relies on switching between several controllers LCL-filter and is shortly discussed. The MISO control system is designed using the switching between two MPC controllers. The results of simulation show significant reduction of THD value which proves the effectiveness of the designed control.
{"title":"Computer modeling and simulation of MPC control for grid connected renewable power sources","authors":"A. Khakimova, A. Bermukhambetova, Dana Sharipova, F. Muratov","doi":"10.1109/ICAICT.2014.7035991","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035991","url":null,"abstract":"Renewable energy test site installed at Nazarbayev University in Kazakhstan is considered as a controlled plant for modeling, design and simulation of proposed model predictive control (MPC) technique for the power system with nominal power up to 10 kW. The mathematical and simulation model of the control plant assumes that disturbance from consumer grid side is generated by pseudorandom numbers. The control strategy relies on switching between several controllers LCL-filter and is shortly discussed. The MISO control system is designed using the switching between two MPC controllers. The results of simulation show significant reduction of THD value which proves the effectiveness of the designed control.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115372601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036013
Eldar Bekbulatov, Amandyk Kartbayev
This paper describes a morphological analysis of the Kazakh language for Kazakh-English statistical machine translation through changing the compound words of Kazakh language, and explores the effect of using the modified input on translation quality with a large number of training sentences. Word alignment problem would become more serious for translation from morphologically rich language such as Kazakh to morphologically simple one such as English, due to the problem of data sparseness on translation word forms in many different morphological variants. We present our investigations on unsupervised Kazakh morphological segmentation over newspaper corpus and compare unsupervised segmentation against rule-based language processing tools. In our experiments, the results show that our proposed method can improve word alignment and translation quality.
{"title":"A study of certain morphological structures of Kazakh and their impact on the machine translation quality","authors":"Eldar Bekbulatov, Amandyk Kartbayev","doi":"10.1109/ICAICT.2014.7036013","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036013","url":null,"abstract":"This paper describes a morphological analysis of the Kazakh language for Kazakh-English statistical machine translation through changing the compound words of Kazakh language, and explores the effect of using the modified input on translation quality with a large number of training sentences. Word alignment problem would become more serious for translation from morphologically rich language such as Kazakh to morphologically simple one such as English, due to the problem of data sparseness on translation word forms in many different morphological variants. We present our investigations on unsupervised Kazakh morphological segmentation over newspaper corpus and compare unsupervised segmentation against rule-based language processing tools. In our experiments, the results show that our proposed method can improve word alignment and translation quality.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131484699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}