首页 > 最新文献

2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)最新文献

英文 中文
Simulation of identification process of parameters of movement of the wagon on monorail transport 单轨运输货车运动参数辨识过程仿真研究
N. Moroz, A. Starostenko, R. Gorbachev, N. Kuznetsov
The work is devoted to construction of mathematical model of movement of the passenger wagon and algorithm of identification of parameters of mathematical model, as well as demonstration of efficiency of this algorithm through simulation of the process of identification for selected mode of acceleration.
研究了客车运动数学模型的建立和数学模型参数的识别算法,并通过对选定加速度模式的识别过程进行仿真,验证了该算法的有效性。
{"title":"Simulation of identification process of parameters of movement of the wagon on monorail transport","authors":"N. Moroz, A. Starostenko, R. Gorbachev, N. Kuznetsov","doi":"10.1109/ICAICT.2016.7991717","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991717","url":null,"abstract":"The work is devoted to construction of mathematical model of movement of the passenger wagon and algorithm of identification of parameters of mathematical model, as well as demonstration of efficiency of this algorithm through simulation of the process of identification for selected mode of acceleration.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116224981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimum power allocation for non-orthogonal multiple access (NOMA) 非正交多址(NOMA)的最优功率分配
T. Manglayev, Refik Caglar Kizilirmak, Y. Kho
An optimum power allocation scheme for non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC) technique for downlink channels of next generation cellular networks is proposed in this paper. In NOMA downlinks, the signals for each user are superimposed at the transmitter side and SIC is implemented at the receiver side to separate them. Numerical results show that the overall system throughput performance can be improved significantly by the proposed power allocation algorithm with NOMA in comparison with orthogonal multiple access (OMA), which is implemented in previous wireless telephone technology generations.
提出了一种基于连续干扰消除技术的下一代蜂窝网络下行信道非正交多址(NOMA)优化功率分配方案。在NOMA下行链路中,每个用户的信号在发送端叠加,在接收端实现SIC以分离它们。数值结果表明,与前几代无线电话技术实现的正交多址(OMA)相比,基于NOMA的功率分配算法可以显著提高系统的整体吞吐量性能。
{"title":"Optimum power allocation for non-orthogonal multiple access (NOMA)","authors":"T. Manglayev, Refik Caglar Kizilirmak, Y. Kho","doi":"10.1109/ICAICT.2016.7991730","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991730","url":null,"abstract":"An optimum power allocation scheme for non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC) technique for downlink channels of next generation cellular networks is proposed in this paper. In NOMA downlinks, the signals for each user are superimposed at the transmitter side and SIC is implemented at the receiver side to separate them. Numerical results show that the overall system throughput performance can be improved significantly by the proposed power allocation algorithm with NOMA in comparison with orthogonal multiple access (OMA), which is implemented in previous wireless telephone technology generations.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
A light weight dynamic attribute based access control module integrated with business rules 一个轻量级的基于动态属性的访问控制模块,集成了业务规则
Vali Tawosi
User authorization in software systems is and has been a serious security concern for a long time. Attribute based Access Control (ABAC), as a new model of user authorization, makes it possible to restrict user access based on rules against different attributes. In the context of service access control in enterprise systems, it seems necessary to separate business rules from service logic and user authorization mechanism. This paper is an experimental report on the implementation of an ABAC module in which business rules are used to restrict user access to the services. The ever changing nature of the business rules in an enterprise system made a necessity to the proposal of such a light weight dynamic attribute based access control module, in which end user is able to change access policies and business rules in run time. Challenges of building this module are revealed and plausible solutions which have been put in place are reported.
长期以来,软件系统中的用户授权一直是一个严重的安全问题。基于属性的访问控制(ABAC)是一种新的用户授权模型,它可以根据不同属性的规则来限制用户的访问。在企业系统中的服务访问控制上下文中,似乎有必要将业务规则与服务逻辑和用户授权机制分离开来。本文是关于ABAC模块实现的实验报告,其中使用业务规则来限制用户对服务的访问。企业系统中业务规则不断变化的特性使得有必要提出这种轻量级的基于动态属性的访问控制模块,在该模块中,最终用户能够在运行时更改访问策略和业务规则。揭示了构建该模块的挑战,并报告了已经实施的合理解决方案。
{"title":"A light weight dynamic attribute based access control module integrated with business rules","authors":"Vali Tawosi","doi":"10.1109/ICAICT.2016.7991700","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991700","url":null,"abstract":"User authorization in software systems is and has been a serious security concern for a long time. Attribute based Access Control (ABAC), as a new model of user authorization, makes it possible to restrict user access based on rules against different attributes. In the context of service access control in enterprise systems, it seems necessary to separate business rules from service logic and user authorization mechanism. This paper is an experimental report on the implementation of an ABAC module in which business rules are used to restrict user access to the services. The ever changing nature of the business rules in an enterprise system made a necessity to the proposal of such a light weight dynamic attribute based access control module, in which end user is able to change access policies and business rules in run time. Challenges of building this module are revealed and plausible solutions which have been put in place are reported.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Carrier-grade NAT — is it really secure for customers? A test on a Turkish service provider 运营商级NAT——对客户来说真的安全吗?对土耳其服务提供商的测试
Kevser Ovaz Akpinar, M. Akpinar, Ibrahim Ozcelik, N. Yumusak
Dramatic rise in the user amount yields increase in the number of internet accessed devices within the last decade. Since most of the devices have internet connection, IPv4 space becomes inadequate. In order to avoid this situation, internet service providers focus on using their IP's within their IP pool, optimally. The most preferred approach to handle this problem is called Carrier Grade Network Address Translation (CGN). In this technique, a city, a neighborhood or a group of users could be configured as if they are in the same Local Area Network (LAN) and they have IPv4 Network Address Translation (NAT) connections for Wide Area Network (WAN) accesses. By applying this approach, IP costs are reduced and number of IP's in the pool is optimized. However, implementations done in recent systems could cause vulnerabilities as well. This work focuses on examining a part of CGN applied network that acts as LAN, by scanning, exploring users, devices and vulnerabilities for a specific neighborhood in Turkey. Users and devices are determined and since they are considered in the same LAN most of them are easily gained access and the insecurity of the system is proved. Also it is also observed that a user could stop or slow down the traffic by Denial of Service (DoS) or Distributed DoS attacks.
在过去的十年里,用户数量的急剧增长导致了互联网接入设备数量的增加。由于大多数设备都有互联网连接,IPv4空间变得不足。为了避免这种情况,互联网服务提供商专注于在他们的IP池中使用他们的IP。处理这个问题的最佳方法被称为运营商级网络地址转换(CGN)。在这种技术中,一个城市、一个社区或一组用户可以被配置为好像他们在同一个局域网(LAN)中,并且他们有用于广域网(WAN)访问的IPv4网络地址转换(NAT)连接。通过应用这种方法,降低了IP成本,并优化了池中的IP数量。然而,在最近的系统中完成的实现也可能导致漏洞。本工作重点是通过扫描、探索土耳其特定社区的用户、设备和漏洞,检查作为局域网的中广核应用网络的一部分。用户和设备是确定的,由于它们被认为在同一个局域网中,大多数用户和设备很容易被访问,并且证明了系统的不安全性。此外,还观察到用户可以通过拒绝服务(DoS)或分布式DoS攻击来阻止或减慢流量。
{"title":"Carrier-grade NAT — is it really secure for customers? A test on a Turkish service provider","authors":"Kevser Ovaz Akpinar, M. Akpinar, Ibrahim Ozcelik, N. Yumusak","doi":"10.1109/ICAICT.2016.7991693","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991693","url":null,"abstract":"Dramatic rise in the user amount yields increase in the number of internet accessed devices within the last decade. Since most of the devices have internet connection, IPv4 space becomes inadequate. In order to avoid this situation, internet service providers focus on using their IP's within their IP pool, optimally. The most preferred approach to handle this problem is called Carrier Grade Network Address Translation (CGN). In this technique, a city, a neighborhood or a group of users could be configured as if they are in the same Local Area Network (LAN) and they have IPv4 Network Address Translation (NAT) connections for Wide Area Network (WAN) accesses. By applying this approach, IP costs are reduced and number of IP's in the pool is optimized. However, implementations done in recent systems could cause vulnerabilities as well. This work focuses on examining a part of CGN applied network that acts as LAN, by scanning, exploring users, devices and vulnerabilities for a specific neighborhood in Turkey. Users and devices are determined and since they are considered in the same LAN most of them are easily gained access and the insecurity of the system is proved. Also it is also observed that a user could stop or slow down the traffic by Denial of Service (DoS) or Distributed DoS attacks.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interactive whiteboard in motivation of pupils of primary school 交互式白板在激发小学生学习动机方面的作用
G. Bánesz, D. Lukáčová, Lukáš Vaněk, Peter Hrubý
In our report we want to present the results of a survey focusing on the use of interactive whiteboard technology in the subject called technology at primary schools to increase students' motivation in teaching technical subjects. Technology is a very specific subject in primary schools, because it combines the teaching of theoretical information and practical skill practicing. The research was to find out or check whether pupils of experimental groups who were using an interactive whiteboard during teaching, will be more motivated to learn than students of the controlling groups. We used Kozéki's questionnaire to detect pupils' motivation to motivate students to learn. We found out that in the experimental group the motivation in the affective field (extrinsic motivation) is positive and predominant. This is demonstrably more powerful than the motivation of the control group, which belongs to the field of the cognitive effects, also with positive character. The research results are useful in the planning of teaching in terms of allocating the interactive whiteboard into the teaching process.
在我们的报告中,我们想介绍一项调查结果,重点是在小学技术学科中使用交互式白板技术来提高学生对技术学科教学的积极性。在小学,技术是一门非常特殊的学科,因为它集理论信息教学和实践技能练习于一体。这项研究旨在了解或检验在教学过程中使用交互式白板的实验组学生是否会比对照组学生更有学习动力。我们使用 Kozéki 的问卷调查学生的学习动机,以激发学生的学习动力。我们发现,在实验组中,情感领域的动机(外在动机)是积极的,而且占主导地位。这明显比对照组的动机更强,后者属于认知效应领域,也具有积极的特点。研究结果有助于在教学计划中将交互式电子白板分配到教学过程中。
{"title":"Interactive whiteboard in motivation of pupils of primary school","authors":"G. Bánesz, D. Lukáčová, Lukáš Vaněk, Peter Hrubý","doi":"10.1109/ICAICT.2016.7991790","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991790","url":null,"abstract":"In our report we want to present the results of a survey focusing on the use of interactive whiteboard technology in the subject called technology at primary schools to increase students' motivation in teaching technical subjects. Technology is a very specific subject in primary schools, because it combines the teaching of theoretical information and practical skill practicing. The research was to find out or check whether pupils of experimental groups who were using an interactive whiteboard during teaching, will be more motivated to learn than students of the controlling groups. We used Kozéki's questionnaire to detect pupils' motivation to motivate students to learn. We found out that in the experimental group the motivation in the affective field (extrinsic motivation) is positive and predominant. This is demonstrably more powerful than the motivation of the control group, which belongs to the field of the cognitive effects, also with positive character. The research results are useful in the planning of teaching in terms of allocating the interactive whiteboard into the teaching process.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beacon authpath: Augmented human path authentication 信标authpath:增强的人类路径认证
Emin Huseynov, J. Seigneur
BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers in real outlets. Thus, humans as they walk in cities pass by different beacons and the sequence of beacons form a path. In this paper, we present how those augmented paths can authenticate a user in a secure way whereby the users can prove they have passed by a path, even with current unsecure beacons. We have built a prototype to validate this new authentication scheme with unsecure Estimote beacons. In addition, as an alternative to BLE, a similar system utilizing Wi-Fi to detect user proximity is reviewed as well.
BLE(低功耗蓝牙)信标正在智能城市中部署,特别是为了增强客户在实体商店的购物体验。因此,当人们在城市中行走时,会经过不同的信标,信标的序列形成了一条路径。在本文中,我们展示了这些增强路径如何以一种安全的方式对用户进行身份验证,通过这种方式,用户可以证明他们已经通过了路径,即使使用当前不安全的信标。我们已经构建了一个原型来使用不安全的Estimote信标验证这个新的身份验证方案。此外,作为BLE的替代方案,我们还将介绍一种利用Wi-Fi检测用户距离的类似系统。
{"title":"Beacon authpath: Augmented human path authentication","authors":"Emin Huseynov, J. Seigneur","doi":"10.1109/ICAICT.2016.7991702","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991702","url":null,"abstract":"BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers in real outlets. Thus, humans as they walk in cities pass by different beacons and the sequence of beacons form a path. In this paper, we present how those augmented paths can authenticate a user in a secure way whereby the users can prove they have passed by a path, even with current unsecure beacons. We have built a prototype to validate this new authentication scheme with unsecure Estimote beacons. In addition, as an alternative to BLE, a similar system utilizing Wi-Fi to detect user proximity is reviewed as well.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127269857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Large scale system management based on Markov Decision Process and Big Data Concept 基于马尔可夫决策过程和大数据概念的大规模系统管理
S. Valeev, N. Kondratyeva
Processing Big Data in large scale system is a new direction of development of information technologies, including methods and algorithms of streaming data in real time mode. In the paper, application of Markov Decision Process System for large scale system management based on Big Data concept is proposed.
在大系统中处理大数据是信息技术发展的一个新方向,包括实时处理流数据的方法和算法。本文提出了基于大数据概念的马尔可夫决策过程系统在大规模系统管理中的应用。
{"title":"Large scale system management based on Markov Decision Process and Big Data Concept","authors":"S. Valeev, N. Kondratyeva","doi":"10.1109/ICAICT.2016.7991829","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991829","url":null,"abstract":"Processing Big Data in large scale system is a new direction of development of information technologies, including methods and algorithms of streaming data in real time mode. In the paper, application of Markov Decision Process System for large scale system management based on Big Data concept is proposed.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114892418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Figuratively-semantic support in precedent-oriented solving the project tasks 面向先例解决项目任务的形象化语义支持
P. Sosnin
The paper deals with semantic modeling a mental imagery caused by processing a new project task in real-time designing a system with the software. In the processing of the new task, the designer applies a framework “model of precedent” and its iterative filling by content with using a feedback caused with a stepwise refinement of the task statement. For understanding the current conditions of the task statement, the designer uses a figuratively-semantic support. Combining the indicated means is implemented in the toolkit WIQA.
本文讨论了在系统实时设计过程中,利用软件处理新项目任务所产生的心理意象的语义建模问题。在处理新任务的过程中,设计者应用了一个框架“先例模型”,并通过使用由任务陈述的逐步细化引起的反馈来迭代地填充内容。为了理解任务语句的当前条件,设计人员使用形象化的语义支持。组合指示的方法在工具包WIQA中实现。
{"title":"Figuratively-semantic support in precedent-oriented solving the project tasks","authors":"P. Sosnin","doi":"10.1109/ICAICT.2016.7991747","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991747","url":null,"abstract":"The paper deals with semantic modeling a mental imagery caused by processing a new project task in real-time designing a system with the software. In the processing of the new task, the designer applies a framework “model of precedent” and its iterative filling by content with using a feedback caused with a stepwise refinement of the task statement. For understanding the current conditions of the task statement, the designer uses a figuratively-semantic support. Combining the indicated means is implemented in the toolkit WIQA.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using web-based geoinformation technologies within micro geo-marketing researches 在微地理营销研究中使用基于网络的地理信息技术
M. M. Milikhin, Y. Gritsenko, Yury P. Ekhlakov, O. I. Zhukovsky, P. Senchenko
The article is dedicated to give an assessment of possibility of the applicability of web-based geographic information systems (GIS) within the micro geo-marketing researches. Description of micro geo-marketing data domain, its key features and objectives are given. Functional model of the data collection process is presented. Authors formulate requirements for micro geo-marketing web-GIS and suggests using geodata meta model to provide all necessary functionality within data store tier of GIS architecture. The paper also contains original attributive store component data model.
本文致力于对基于网络的地理信息系统(GIS)在微观地理营销研究中的适用性进行评估。对微地理营销数据域进行了描述,给出了微地理营销数据域的主要特征和目标。给出了数据采集过程的功能模型。作者提出了微型地理营销web-GIS的需求,并建议使用地理数据元模型在GIS架构的数据存储层中提供所有必要的功能。本文还包含了原始的属性存储组件数据模型。
{"title":"Using web-based geoinformation technologies within micro geo-marketing researches","authors":"M. M. Milikhin, Y. Gritsenko, Yury P. Ekhlakov, O. I. Zhukovsky, P. Senchenko","doi":"10.1109/ICAICT.2016.7991787","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991787","url":null,"abstract":"The article is dedicated to give an assessment of possibility of the applicability of web-based geographic information systems (GIS) within the micro geo-marketing researches. Description of micro geo-marketing data domain, its key features and objectives are given. Functional model of the data collection process is presented. Authors formulate requirements for micro geo-marketing web-GIS and suggests using geodata meta model to provide all necessary functionality within data store tier of GIS architecture. The paper also contains original attributive store component data model.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128160899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A heuristic algorithm for the band collocation problem 带配置问题的一种启发式算法
A. Gursoy, M. Kurt, H. Kutucu, U. Nuriyev
In this paper we present a heuristic algorithm for the The Band Collocation Problem (BCP) which may have some applications in the field of telecommunication. First, we give the definition the BCP. Second, we explain how we create the problem instances with known optimal solutions as a library. Third, we propose the heuristic algorithm. Then, we analysis and interpret the results of the proposed algorithm on the problem instances with known optimal solutions. Finally, we suggest new ideas about the BCP and its solution approaches.
本文提出了一种求解频带配置问题的启发式算法,该算法在通信领域具有一定的应用前景。首先,给出了BCP的定义。其次,我们解释如何创建具有已知最优解的问题实例作为库。第三,提出了启发式算法。然后,我们对已知最优解的问题实例进行了分析和解释。最后,我们对BCP及其解决方法提出了新的思路。
{"title":"A heuristic algorithm for the band collocation problem","authors":"A. Gursoy, M. Kurt, H. Kutucu, U. Nuriyev","doi":"10.1109/ICAICT.2016.7991746","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991746","url":null,"abstract":"In this paper we present a heuristic algorithm for the The Band Collocation Problem (BCP) which may have some applications in the field of telecommunication. First, we give the definition the BCP. Second, we explain how we create the problem instances with known optimal solutions as a library. Third, we propose the heuristic algorithm. Then, we analysis and interpret the results of the proposed algorithm on the problem instances with known optimal solutions. Finally, we suggest new ideas about the BCP and its solution approaches.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131771130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1