Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991794
A. Afanasyev, N. N. Voit, D. Kanev
The paper has analyzed the current methods for developing automated adaptive learning systems. The authors have proposed the adaptive learning system based on the author's method of the synthesis of a learning path and the set of main models (models of subject domain, designer' profile, test) for training designers. The paper has presented the problems relating to the development of learning system architecture.
{"title":"Development of intelligent learning system based on the ontological approach","authors":"A. Afanasyev, N. N. Voit, D. Kanev","doi":"10.1109/ICAICT.2016.7991794","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991794","url":null,"abstract":"The paper has analyzed the current methods for developing automated adaptive learning systems. The authors have proposed the adaptive learning system based on the author's method of the synthesis of a learning path and the set of main models (models of subject domain, designer' profile, test) for training designers. The paper has presented the problems relating to the development of learning system architecture.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129056227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991681
D. Nazarov, S. V. Begicheva, D. A. Azarov
The article addresses the problem of identifying subtle causal relations between sets of data defining a control system. The key pros and cons of using a fuzzy method are later examined. It explains the primary aspects of the fuzzy model for revealing implicit causality within a control system based on a combination of a fuzzy set approach and data mining techniques. The tool for carrying out evaluation in natural language resulting from utilizing an automated learning algorithm is advanced afterwards. The paper lastly proves its applicability to modeling mutual effects of a number of economic objects on each other.
{"title":"Fuzzy method of revealing implicit causality within a control system","authors":"D. Nazarov, S. V. Begicheva, D. A. Azarov","doi":"10.1109/ICAICT.2016.7991681","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991681","url":null,"abstract":"The article addresses the problem of identifying subtle causal relations between sets of data defining a control system. The key pros and cons of using a fuzzy method are later examined. It explains the primary aspects of the fuzzy model for revealing implicit causality within a control system based on a combination of a fuzzy set approach and data mining techniques. The tool for carrying out evaluation in natural language resulting from utilizing an automated learning algorithm is advanced afterwards. The paper lastly proves its applicability to modeling mutual effects of a number of economic objects on each other.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115994681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991769
Hasan Ziafat, S. M. Babamir
With increasing data clouds in different geographical areas, the availability of a datacenter and the cost of using the datacenter are two concerned factors of clouds users. The present research aims to present a method using K-means clustering and NSGA-II multi-objective algorithm to maximize availability and minimizes cost in selecting a datacenter. The proposed approach was applied to some real geographically distributed datacenters. Results showed that proposed approach outperforms greedy and random common algorithms.
{"title":"Towards optimization of availability and cost in selection of geo-distributed clouds datacenter","authors":"Hasan Ziafat, S. M. Babamir","doi":"10.1109/ICAICT.2016.7991769","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991769","url":null,"abstract":"With increasing data clouds in different geographical areas, the availability of a datacenter and the cost of using the datacenter are two concerned factors of clouds users. The present research aims to present a method using K-means clustering and NSGA-II multi-objective algorithm to maximize availability and minimizes cost in selecting a datacenter. The proposed approach was applied to some real geographically distributed datacenters. Results showed that proposed approach outperforms greedy and random common algorithms.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117210336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991796
Omer Narmanlioglu, Refik Caglar Kizilirmak, M. Uysal
This paper discusses the impact of pulse shaping filter on the performance of orthogonal frequency division multiplexing (OFDM) based visible light communication (VLC) systems. Particularly, direct current biased optical OFDM (DCO-OFDM) with square-root-raised-cosine (SRRC) pulse shaping filters is investigated. The bit-error-rate (BER) performance of the system is evaluated for different excess bandwidth parameters (roll-off factors) and compared with the performance with rectangular pulse shaping filter through Monte Carlo simulations.
{"title":"The impact of pulse shaping filters on OFDM-based visible light communications","authors":"Omer Narmanlioglu, Refik Caglar Kizilirmak, M. Uysal","doi":"10.1109/ICAICT.2016.7991796","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991796","url":null,"abstract":"This paper discusses the impact of pulse shaping filter on the performance of orthogonal frequency division multiplexing (OFDM) based visible light communication (VLC) systems. Particularly, direct current biased optical OFDM (DCO-OFDM) with square-root-raised-cosine (SRRC) pulse shaping filters is investigated. The bit-error-rate (BER) performance of the system is evaluated for different excess bandwidth parameters (roll-off factors) and compared with the performance with rectangular pulse shaping filter through Monte Carlo simulations.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115483925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991704
S. Tikhonov, R. Sirazetdinov, N. R. Surkin
In this article, we research decentralized group (swarm) of unmanned vehicles two-level control, as a set of material points. We provide methods for information exchange in the group and algorithms of distributed control based on imitation of different aggregate states of matter by a group of unmanned vehicles. In the article, we review three swarm “aggregate states”: solid, liquid and gas, examine issues of sustainability of the system in different variants of the aggregation state simulating algorithms.
{"title":"Information interaction of decentralized group control of unmanned vehicles","authors":"S. Tikhonov, R. Sirazetdinov, N. R. Surkin","doi":"10.1109/ICAICT.2016.7991704","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991704","url":null,"abstract":"In this article, we research decentralized group (swarm) of unmanned vehicles two-level control, as a set of material points. We provide methods for information exchange in the group and algorithms of distributed control based on imitation of different aggregate states of matter by a group of unmanned vehicles. In the article, we review three swarm “aggregate states”: solid, liquid and gas, examine issues of sustainability of the system in different variants of the aggregation state simulating algorithms.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991657
R. Alguliyev, R. Aliguliyev, A. Bagirov, R. Karimov
Vast spread of computing technologies has led to abundance of large data sets. Today tech companies like, Google, Facebook, Twitter and Amazon handle big data sets and log terabytes, if not petabytes, of data per day. Thus, there is a need to find similarities and define groupings among the elements of these big data sets. One of the ways to find these similarities is data clustering. Currently, there exist several data clustering algorithms which differ by their application area and efficiency. Increase in computational power and algorithmic improvements have reduced the time for clustering of big data sets. But it usually happens that big data sets can't be processed whole due to hardware and computational restrictions. In this paper, the classic k-means clustering algorithm is compared to the proposed batch clustering (BC) algorithm for the required computation time and objective function. The BC algorithm is designed to cluster large data sets in batches but maintain the efficiency and quality. Several experiments confirm that batch clustering algorithm for big data sets is more efficient in using computational power, data storage and results in better clustering compared to k-means algorithm. The experiments are conducted with the data set of 2 (two) million two-dimensional data points.
{"title":"Batch clustering algorithm for big data sets","authors":"R. Alguliyev, R. Aliguliyev, A. Bagirov, R. Karimov","doi":"10.1109/ICAICT.2016.7991657","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991657","url":null,"abstract":"Vast spread of computing technologies has led to abundance of large data sets. Today tech companies like, Google, Facebook, Twitter and Amazon handle big data sets and log terabytes, if not petabytes, of data per day. Thus, there is a need to find similarities and define groupings among the elements of these big data sets. One of the ways to find these similarities is data clustering. Currently, there exist several data clustering algorithms which differ by their application area and efficiency. Increase in computational power and algorithmic improvements have reduced the time for clustering of big data sets. But it usually happens that big data sets can't be processed whole due to hardware and computational restrictions. In this paper, the classic k-means clustering algorithm is compared to the proposed batch clustering (BC) algorithm for the required computation time and objective function. The BC algorithm is designed to cluster large data sets in batches but maintain the efficiency and quality. Several experiments confirm that batch clustering algorithm for big data sets is more efficient in using computational power, data storage and results in better clustering compared to k-means algorithm. The experiments are conducted with the data set of 2 (two) million two-dimensional data points.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124296981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991728
P. Lozhnikov, A. Sulavko, D. Volkov
The paper covers the issue of protecting private keys of a digital signature in a hybrid document management system. It proposes a method of generating private keys based on a handwritten signature using a method of building a reference signature description. The method demonstrates the following indicators of reliability: FRR=0.148, FAR=0.05 when the length of the key is 304 bits.
{"title":"Usage of fuzzy extractors in a handwritten-signature based technology of protecting a hybrid document management system","authors":"P. Lozhnikov, A. Sulavko, D. Volkov","doi":"10.1109/ICAICT.2016.7991728","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991728","url":null,"abstract":"The paper covers the issue of protecting private keys of a digital signature in a hybrid document management system. It proposes a method of generating private keys based on a handwritten signature using a method of building a reference signature description. The method demonstrates the following indicators of reliability: FRR=0.148, FAR=0.05 when the length of the key is 304 bits.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123497257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991799
Rinat R. Ibatullin, E. Anisimova
The most important task of the modern education system is implementation of individual educational trajectory of each student. In this regard, adaptation of the educational process to personality development of each student becomes extremely necessary. One of the ways of tackling the ensuing problem is e-learning as a model of organization of interaction between the teacher, student and information technologies. Currently, there are developed plenty of distance learning courses personifying learning process. This article describes the use of e-learning courses on the example of such disciplines as “Economic Informatics” and “Numerical Methods”, their influence on the construction of individual educational trajectory of students; as well the paper analyses the impact of e-learning courses on the quality of students' academic achievement.
{"title":"Construction of individual educational trajectory of students based on e-learning","authors":"Rinat R. Ibatullin, E. Anisimova","doi":"10.1109/ICAICT.2016.7991799","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991799","url":null,"abstract":"The most important task of the modern education system is implementation of individual educational trajectory of each student. In this regard, adaptation of the educational process to personality development of each student becomes extremely necessary. One of the ways of tackling the ensuing problem is e-learning as a model of organization of interaction between the teacher, student and information technologies. Currently, there are developed plenty of distance learning courses personifying learning process. This article describes the use of e-learning courses on the example of such disciplines as “Economic Informatics” and “Numerical Methods”, their influence on the construction of individual educational trajectory of students; as well the paper analyses the impact of e-learning courses on the quality of students' academic achievement.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991732
Y. Imamverdiyev, L. Sukhostat
Intrusion detection systems are one of the most relevant security features against network attacks. Machine learning methods are used to analyze network traffic parameters for the presence of an attack signs. In this paper, extreme learning machine method is considered for intrusion detection in network traffic. The experimental results lead to the conclusion of practical significance of the proposed approach for attacks detection in network traffic.
{"title":"Anomaly detection in network traffic using extreme learning machine","authors":"Y. Imamverdiyev, L. Sukhostat","doi":"10.1109/ICAICT.2016.7991732","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991732","url":null,"abstract":"Intrusion detection systems are one of the most relevant security features against network attacks. Machine learning methods are used to analyze network traffic parameters for the presence of an attack signs. In this paper, extreme learning machine method is considered for intrusion detection in network traffic. The experimental results lead to the conclusion of practical significance of the proposed approach for attacks detection in network traffic.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121751456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991759
Omer Narmanlioglu, Refik Caglar Kizilirmak, M. Uysal
In this paper, we investigate the performance of a direct current biased optical orthogonal frequency division multiplexing (DCO-OFDM) based adaptive transmission in the context of visible light communication (VLC). We consider the reference channel model (Scenario I) of IEEE 802.15.7r1 where an indoor office room is considered and channel impulse responses are presented for 24 different points. Our results reveal that high data rates such as 100 Mbps can be achieved with the choice of optimal modulation order according to channel conditions, while non-adaptive transmission based on the worst-case design provides only 14 Mbps under the consideration of target bit-error-rate (BER) of 10−3.
{"title":"Performance of OFDM-based adaptive visible light communications","authors":"Omer Narmanlioglu, Refik Caglar Kizilirmak, M. Uysal","doi":"10.1109/ICAICT.2016.7991759","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991759","url":null,"abstract":"In this paper, we investigate the performance of a direct current biased optical orthogonal frequency division multiplexing (DCO-OFDM) based adaptive transmission in the context of visible light communication (VLC). We consider the reference channel model (Scenario I) of IEEE 802.15.7r1 where an indoor office room is considered and channel impulse responses are presented for 24 different points. Our results reveal that high data rates such as 100 Mbps can be achieved with the choice of optimal modulation order according to channel conditions, while non-adaptive transmission based on the worst-case design provides only 14 Mbps under the consideration of target bit-error-rate (BER) of 10−3.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123139386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}