2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
A new robust binary image embedding algorithm in discrete wavelet domain 一种新的离散小波域鲁棒二值图像嵌入算法
A. Mohammed, Hakan Hadi Maras, E. Elbasi
{"title":"A new robust binary image embedding algorithm in discrete wavelet domain","authors":"A. Mohammed, Hakan Hadi Maras, E. Elbasi","doi":"10.1109/ICAICT.2014.7035901","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035901","url":null,"abstract":"Digital watermarks have recently emerged as a possible solution for protecting the copyright of digital materials, the work presented in this paper is concerned with the Discrete Wavelet Transform (DWT) based non-blind digital watermarking, and how the DWT is an efficient transform in the field of digital watermarking. In this work we used an optimum criteria that embeds four watermarks in more than one level of DWT in the same algorithm. The aim of this work is to keep the Correlation Coefficient (CC) between the original and the extracted watermark around the value of 0.9.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114237973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A personal ontology of an individual occupational experience 个人职业经验的个人本体论
P. Sosnin
{"title":"A personal ontology of an individual occupational experience","authors":"P. Sosnin","doi":"10.1109/ICAICT.2014.7036004","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036004","url":null,"abstract":"The study is bound with an ontological systematization of an individual experience which supports an occupational activity of a person. Specificity of the offered approach is defined by using a precedent model as a basic type of experience units. Models of precedents are constructed in accordance with the normative schema during the occupational work of the person. In creating the personal ontology, the individual should use a reflection of solved tasks on a specialized memory intended for simulating the applied reasoning of the question-answer type.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116037038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data: Big Promises for Information Security 大数据:信息安全的大承诺
R. Alguliyev, Y. Imamverdiyev
{"title":"Big Data: Big Promises for Information Security","authors":"R. Alguliyev, Y. Imamverdiyev","doi":"10.1109/ICAICT.2014.7035946","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035946","url":null,"abstract":"Big Data is related to technologies for collecting, processing, analyzing and extracting useful knowledge from very large volumes of structured and unstructured data generated by different sources at high speed. Big Data creates critical information security and privacy problems, at the same time Big Data analytics promises significant opportunities for prevention and detection of advanced cyber-attacks using correlated internal and external security data. We must address several challenges to realize true potential of Big Data for information security. The paper analyzes Big Data applications for information security problems, and defines research directions on Big Data analytics for security intelligence.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131884278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Automated design and research of the thin film electroluminescent indicating devices 薄膜电致发光指示装置的自动化设计与研究
D. Evsevichev, O. Maksimova, M. Samokhvalov
{"title":"Automated design and research of the thin film electroluminescent indicating devices","authors":"D. Evsevichev, O. Maksimova, M. Samokhvalov","doi":"10.1109/ICAICT.2014.7035935","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035935","url":null,"abstract":"One of the most promising indicators is the thin film electroluminescent (TFEL) display device. Design and research processes of the TFEL devices are associated with high calculation complexity, settlement slowness, as well as with a large amount of data to be processed. With a view to solving the problems an automated system of design and scientific research of the TFEL display devices has been developed.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134021186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The control in the structure of configurable information system 可配置信息系统结构中的控制
Y. Rogozov, Julia Lipko, O. Schevchenko
{"title":"The control in the structure of configurable information system","authors":"Y. Rogozov, Julia Lipko, O. Schevchenko","doi":"10.1109/ICAICT.2014.7035919","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035919","url":null,"abstract":"In this paper we propose to consider configurable information system as a object of control, applying the basic concepts and principles of control theory, to generate a conceptual model of control system, to identify the main control elements and mechanisms to implement it. The structure of the Configurable information system with the ability to control structure described. Such a study would form the main areas of research that, in combination with modern software technologies, will provide the flexible Configurable information system that focused on domains with dynamically changing requirements.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125240901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A fuzzy logic based scheduling approach to improve fairness in opportunistic wireless networks 一种基于模糊逻辑的无线网络公平性调度方法
Hakkı Soy, O. Ozdemir
{"title":"A fuzzy logic based scheduling approach to improve fairness in opportunistic wireless networks","authors":"Hakkı Soy, O. Ozdemir","doi":"10.1109/ICAICT.2014.7035974","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035974","url":null,"abstract":"In the design of wireless scheduling policies, the fairness criterion plays an important role in upgrading the performance of network. This paper concentrates on how the channel-aware opportunistic scheduler can improve both throughput and fairness in cellular wireless networks. In order to improve the fairness, we propose an adaptive fair scheduling algorithm by using fuzzy logic model. Proposed scheduler operates on Time Division Multiple Access (TDMA) fashion and calculates the priority index of each user according to channel quality fed back and fairness of channel assignment. We evaluate its performance via statistical simulations. The obtained results show that our strategy can improve the fairness but at the expense of slight throughput loss compared to well-known opportunistic scheduling methods.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127782134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theory of bioinspired search for optimal solutions and its application for the processing of problem-oriented knowledge 最优解的生物启发搜索理论及其在问题导向知识处理中的应用
S. Rodzin, L. Rodzina
{"title":"Theory of bioinspired search for optimal solutions and its application for the processing of problem-oriented knowledge","authors":"S. Rodzin, L. Rodzina","doi":"10.1109/ICAICT.2014.7035930","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035930","url":null,"abstract":"The article describes the developed main elements of the general theory of bioinspired search for optimal solutions. Original biomemetic algorithms combined the following components: local search, cooperation and competition, are also presented here. Experiments with a number of NP-hard optimization problems have shown that usage of developed theory allows to solve these problems more quickly, reliably and accurately.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122820305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Algorithm of multithreshold decoding for non-binary self-orthogonal concatenated codes 非二进制自正交拼接码的多阈值译码算法
V. Zolotarev, G. Ovechkin, Y. Seitkulov, D. Satybaldina, N. Tashatov, Vitaly Mishin
{"title":"Algorithm of multithreshold decoding for non-binary self-orthogonal concatenated codes","authors":"V. Zolotarev, G. Ovechkin, Y. Seitkulov, D. Satybaldina, N. Tashatov, Vitaly Mishin","doi":"10.1109/ICAICT.2014.7035905","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035905","url":null,"abstract":"Non-binary multithreshold decoding (qMTD) for q-ary self-orthogonal codes (qSOC) is considered. The SER performance of qMTD is shown to be close to the results provided by optimum total search methods, which are not realizable for non-binary codes in general. qMTD decoders are compared with different decoders for Reed-Solomon codes. The performance provided with qMTD in some cases is unattainable with classical decoders for arbitrary long Reed-Solomon codes. The result of concatenation of qSOC with simple to decode outer codes is described. Method of improving of qMTD decoder's performance for qSOC is offered. Some simulated results obtained by using these two decoding techniques (the base and modified ways) are presented as well. Comparison of the results showed that the change in the threshold element's algorithm can significantly improve speed of qMTD work. It's shown that for a larger gain this modification qMTD should be used after conventional decoding iterations.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123931198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer modeling and simulation of MPC control for grid connected renewable power sources 并网可再生能源MPC控制的计算机建模与仿真
A. Khakimova, A. Bermukhambetova, Dana Sharipova, F. Muratov
{"title":"Computer modeling and simulation of MPC control for grid connected renewable power sources","authors":"A. Khakimova, A. Bermukhambetova, Dana Sharipova, F. Muratov","doi":"10.1109/ICAICT.2014.7035991","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035991","url":null,"abstract":"Renewable energy test site installed at Nazarbayev University in Kazakhstan is considered as a controlled plant for modeling, design and simulation of proposed model predictive control (MPC) technique for the power system with nominal power up to 10 kW. The mathematical and simulation model of the control plant assumes that disturbance from consumer grid side is generated by pseudorandom numbers. The control strategy relies on switching between several controllers LCL-filter and is shortly discussed. The MISO control system is designed using the switching between two MPC controllers. The results of simulation show significant reduction of THD value which proves the effectiveness of the designed control.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115372601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of certain morphological structures of Kazakh and their impact on the machine translation quality 哈萨克语某些形态结构及其对机器翻译质量影响的研究
Eldar Bekbulatov, Amandyk Kartbayev
{"title":"A study of certain morphological structures of Kazakh and their impact on the machine translation quality","authors":"Eldar Bekbulatov, Amandyk Kartbayev","doi":"10.1109/ICAICT.2014.7036013","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036013","url":null,"abstract":"This paper describes a morphological analysis of the Kazakh language for Kazakh-English statistical machine translation through changing the compound words of Kazakh language, and explores the effect of using the modified input on translation quality with a large number of training sentences. Word alignment problem would become more serious for translation from morphologically rich language such as Kazakh to morphologically simple one such as English, due to the problem of data sparseness on translation word forms in many different morphological variants. We present our investigations on unsupervised Kazakh morphological segmentation over newspaper corpus and compare unsupervised segmentation against rule-based language processing tools. In our experiments, the results show that our proposed method can improve word alignment and translation quality.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131484699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信