|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
October 2015 | Vol. 80 No.1 |
Title: |
NEURO-FUZZY MODELLING AND CONTROL OF MULTISTAGE DYNAMIC PROCESSES THAT DEPEND ON
INPUTS WITH UNCERTAINTY ELEMENTS |
Author: |
NATALYA YURYEVNA ZHBANOVA, OLEG JAKOVLEVICH KRAVETS, MIСHAEL GEORGIEVICH
GRIGORIEV, LUDMILA NIKOLAEVNA BABICH |
Abstract: |
In practice, we meet with a frequent necessity for modelling dynamic multistage
processes that depend on several time-varying factors, which can be measured
with accuracy. This requires using a model that combines properties of the
difference, switched, and neuro-fuzzy models with a large number of inputs and a
big memory depth of each input. Such model will take into account all
uncertainties, converting input actions into fuzzy processes by means of
fuzzification, and will precisely reflect the multistage nature and dynamics of
the object being studied. However, a large number of parameters can
significantly complicate its configuration. The purpose of this work is to
improve efficiency of structural and parametric modelling of multistage dynamic
processes due to the development of a class of difference neuro-fuzzy switched
models, as well as to the research and development of approaches to
fuzzification of discrete processes on model inputs in order to simplify the
process of its configuration. The authors have introduced a new class of
difference neuro-fuzzy switched models that are characterized by a combination
of structures of difference fuzzy models, neural networks, and systems with
switchings enabling to model complex multistage processes, which are
characterized by abrupt changes in structure or parameters. The authors have
proposed a mechanism for fuzzification of input actions of a difference neuro-fuzzy
switched model, which is characterized by the ability to convert input actions
into discrete fuzzy processes using two-dimensional fuzzy sets, and allows
reducing the number of configurable parameters of the model. |
Keywords: |
Modelling, Multistage Dynamic Processes, Neural Networks, Random Input
Parameters |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
SWARM-INTELLIGENCE-BASED ALGORITHM OF CONNECTIONS PERMUTATION BETWEEN PINS |
Author: |
YURIY OLEGOVICH CHERNYSHEV, OLGA ANDREEVNA PURCHINA, ANNA YURIEVNA POLUYAN,
DMITRI DMITRIEVICH FUGAROV, ALINA VICTOROVNA BASOVA, OLGA VALENTINOVNA SMIRNOVA |
Abstract: |
From a mathematical point of view routing is the most complicated problem of
selection from a vast number of optimal solution choices. Development of methods
and algorithms for solving the routing problem is carried out for many years
though the issue is still relevant. This is due to the fact that, first of all,
this is a nondeterministic polynomial time complete problem (so called
NP-complete problem), and thus to develop a universal algorithm for finding the
exact optimal solution within a reasonable time is quite a challenging task. The
emergence of new, more sophisticated computer equipment, giving powerful
computing resources, as well as exclusive standards of the projected devices is
the driving force behind the development of new algorithms for solving the
routing problem. There are several approaches to solve NP-complete problems. The
first class of algorithms includes methods, which explicitly or implicitly
provide for the exponential running time of the algorithm. These include full
enumeration method, linear and nonlinear programming, etc. The second class
includes the so-called heuristic algorithms allowing one to get reasonably good
solutions within an acceptable time. A comparative analysis of the methods and
algorithms for the first two classes showed that these algorithms do not
guarantee the global result. The operation of such algorithms is completed or
after a local optimum, or after an implementation of a predetermined number of
steps. The third class includes algorithms of randomly directed search, based on
the concepts of modeling [1]. They allow you to obtain a set of alternative
solutions, and as a result of their analysis to obtain optimal and quasi-optimal
results. These algorithms use a simulation of evolution and natural selection
methods, observed among living organisms in nature to select the strongest.
These methods allow you to create extremely flexible, fast and efficient data
analysis tools. In this regard, in the paper we use the developments based on
these technologies. For the study we proposed to use swarm algorithm of the
redistribution of connections between terminals on the basis of integration of
models of adaptive behavior of an ant colony and collective alternative
adaptation. We propose the swarm algorithm of connection permutation between
pins based on the integration of two models: an adaptive behavior of ant colony
and collective alternative adaptation. The essence of the integration of these
models is that in the course of performing the search procedure the certain
procedures of the ant colony algorithm are alternating with collective
alternative adaptation. The conducted experimental studies have confirmed the
effectiveness of the proposed paradigm. |
Keywords: |
Swarm Intelligence, Ant Colony, Adaptive Behavior, Collective Alternative
Adaptation, Connections Permutation, The Optimization. |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
LIMIT ANALYSIS OF THE IPFH |
Author: |
VLADIMIR KRYLOV, ELEANORA SOKOLOVA, KIRILL KRAVTSOV |
Abstract: |
In this paper we introduce IP Fast Hopping, easily deployable and effective
network-layer architecture against Distributed Denial of Service attacks and
discuss its major limitations. Our approach provides an easy way for clients to
hide content and destination server of theirs communication sessions. We
describe a method of dynamic server IP address change and all modules necessary
to implement the approach. |
Keywords: |
Internet security, DDoS attacks, traffic interception, switcher |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
ANALYSIS OF USING EQUIVALENT INSTRUCTIONS AT THE HIDDEN EMBEDDING OF INFORMATION
INTO THE EXECUTABLE FILES |
Author: |
STANISLAV IGOREVICH SHTERENBERG, ANDREY VLADIMIROVICH KRASOV, IGOR
ALEKSANDROVICH USHAKOV |
Abstract: |
The article examines the problems and their possible solutions on the specifics
of using equivalent instructions for the hidden embedding of information into
the executable and library files. This article considers an example of hidden
embedding into an executable file of exe format or into a similar elf-format for
the Unix/Linux systems. In order to embed information into an executable code by
the synonyms substitution method, it is suggested to use instructions that
execute one and the same operation and have similar length, but that are
encrypted by different opcodes. Such instructions are to be called equivalent
instructions. The idea of semantic substitution must be implemented in the
executable and library files. An executable code, and not an executable file
itself, is used as a container for the information embedding. |
Keywords: |
Machine Code, Authentication Of The Executable Code, Executable File, Equivalent
Instructions, Steganography |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
ON A REGULARITY THAT DETERMINES PRIME NUMBERS |
Author: |
RUSTEM CHINGIZOVICH VALEYEV |
Abstract: |
Nowdays the order, existing in set of primes, and laws of their arrangement
among other numbers remains unknown. Found dependences and algorithms are
applicable only for finite subsets of primes or primes of a special kind. The
possible point of view is presented in article to a question of reality of
detection and use of regularities (including Riemann hypothesis) to which all
set members of a set of prime numbers are submitted. Any regularity which
determines the size of each prime number, can't be (allegedly can't be)
adequately and completely defined. And also it can't be (can't be for sure)
reliably proved and successfully used in actions which belong to any prime
numbers. |
Keywords: |
Primes, Riemann Hypothesis, Algorithm AKS, Complexity, NP-Complete Problem, P Vs
NP, Discrete Structures, The Uncertainty Principle |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
CONSTRUCTION OF AN OPTIMAL MATHEMATICAL MODEL OF FUNCTIONING OF THE
MANUFACTURING INDUSTRY OF THE REPUBLIC OF KAZAKHSTAN |
Author: |
SEILKHAN N. BORANBAYEV, ASKAR B. NURBEKOV |
Abstract: |
The article is devoted to the selection of an optimal model of the production
function to simulate the functioning of the manufacturing industry of the
Republic of Kazakhstan. An optimal model of the production function is selected
from several models constructed and defined on the first stage of the study. The
constructed optimal production function can be used to predict the value of
gross domestic product based on the known or anticipated levels of capital and
wage costs. |
Keywords: |
model, method, simulation, forecasting, production function, capital |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
UNBIASED ASSESSMENT METHOD FOR VOICE COMMUNICATION IN CLOUD VOIP-TELEPHONY |
Author: |
KONSTANTIN SERGEEVICH LUKINSKIKH |
Abstract: |
This paper covers the issues of unbiased assessment of voice communication
quality in cloud VoIP-telephony. For the solution of this task, the main quality
criteria from the point of view of a common user are as follows: unnatural voice
(robot voice); delays in voice transmission one way or other way; echo; signal
interruptions (both long and any short stirs); amplitude changes (overloaded or
too quiet voice); extraneous noise caused by environment and equipment of
connecting subscribers, transmitting medium or digital signal processing
methods. Also, basic requirements related to cloud are: the solution applied
should not create extra load in the network and it should be able to
automatically control the quality at the section between client and service.
Existing quality assessment methods are compared, namely E-model, PSQM, PSQM+,
PESQ, P.563, finally it is chosen to develop a methodology based on P.563. The
developed expansion of the methodology is oriented at problems elimination due
to a sequence of assessments: analysis of signal’s statistical parameters;
analysis of vocal track consistency; analysis of timing errors instead of a
single aggregate assessment, as well as extra assessments of echo and volume
level assessment. |
Keywords: |
Voip Cloud Service, Quality Of Voice Communication, P.563, Voip, Echo
Assessment, Volume Level Assessment. |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
PROSPECTS IN APPLICATION OF THE TECHNOLOGY FOR OF RECEPTION AND TRANSMISSION OF
STREAMING DATA IN WEB BROWSER |
Author: |
ANTON PAVLOVICH TEYKHRIB |
Abstract: |
The paper deals with issues of application of technologies for reception and
transmission of streaming data in web browser: definition of the most popular
technologies among the major participants of market of streaming data transfer,
working with a web browser, the possible scope of application of streaming
reception and transmission from a web browser, as well as the prospects for
availability of a technology for end-users. The obtained results allowed to
conclude that the most popular technology for a main participants of market for
streaming data transmission is WebRTC, at that, the main variant of application
is making of phone calls. However, in view of support of technology on users'
devices, at the current time the best option is support of Adobe Flash RTMFP
technology (supported by 99% of users' desktop systems) and WebRTC (supported by
70-80% of users' desktop systems), also, there is growth of number of mobile
devices, which supported only WebRTC technology (supported by 30-40% of users'
mobile devices). Support of both technologies allows users' access to a wide
variety of options, such as communication between users, audio and video
conferences, consultations of different kinds, decentralized communications and
content delivery system, TV and other broadcasting options. |
Keywords: |
Adobe Flash RTMFP, WebRTC, data streaming, web browser, web browser streaming
data transmission. |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
DEVELOPMENT OF AUTOMATED CLOSED-LOOP DRIVE UPON DESIGNING OF ROLLER BIT DRILLING
RIG FOR OPEN PITS |
Author: |
ANDREY OLEGOVICH SHIGIN, ANNA ALEKSANDROVNA SHIGINA, ANATOLII VLADIMIROVICH
GILEV, SERGEI ANTONOVICH VOKHMIN, GEORGII SERGEEVICH KURCHIN |
Abstract: |
The system of manual and automated drilling control systems have been studied.
An automated system has been developed which permits simultaneous tracking of
variations of structural and strength properties of rock mass during drilling.
Technological flowchart of operation of the considered system has been
developed. The structure and mathematical dependences have been determined on
the basis of which the drilling control system with subsystem of monitoring of
rock properties operates. Maximum efficiency of rock destruction during roller
drilling of boreholes has been studied as a function of drill bit rotation
frequency, time of energy transfer leading to destruction of the required rock
amount and feed thrust of working unit. The calculation procedure has been
developed of optimum process variables of drill bit drilling of rocks with
significant fracturing, lamination and varying drillability factor. Comparative
analysis of increase in productivity of drilling rig as a consequence of
application of automated system based on adaptive rotating-feeding device. The
necessity to equip drilling rigs with automated intelligent system has been
substantiated with capabilities to provide duly rapid response of the system to
variations of working object properties and maintaining of optimum ratio of the
adjusted process variables of "drilling rig--drill bit--rock ore" system.
Execution of the aforementioned tasks by intelligent control system will make it
possible to reduce drilling expenses and increase in operation efficiency of the
mentioned flowchart. |
Keywords: |
Automated Control System, Closed Loop, Adaptive Element. |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
FUZZY SYSTEM OF ACCESS DISTRIBUTION WITHIN A COMPUTER NETWORK |
Author: |
AIGUL KAYRULAEVNA SHAIKHANOVA, ALEKSANDR DMITRIEVICH ZOLOTOV, OL'GA
ALEKSANDROVNA STEPANOVA, MIKOLAJ PETROVICH KARPINSKI, LESJA ORESTOVNA DUBCHAK |
Abstract: |
Continuous growth of volumes of information resources causes strict requirements
to crypto protection on the processing speed of entrance data by the computer
system. It is natural that for the solution of this task it is necessary to use
hardware realization of known algorithms of cryptographic information
protection. The method of the information protection transferred in computer
networks by the choice of information encryption algorithm on the basis of fuzzy
logic is offered in the article. The mechanism of fuzzy logic of Mamdani working
on the min-max law is used for effective and fast reconfiguration of the server
according to the current requirements of the system on the crypto strength,
productivity and expenses of memory. The base of the fuzzy controller rules
working on the classical mechanism of Mamdani consists of 63 rules. The offered
method of fuzzy data processing is based on the division of fuzzy information
processing in grade levels and operation that allowed to reduce quantity of
output areas to 14 and accordingly to reduce number of operations to 4 times.
The formed fuzzy system allows carrying out adequate data protection in real
time, considering current state of the most computer system. |
Keywords: |
Time Complexity, Fuzzy System, Information Protection, Modular Exponentiation,
RSA, Mamdani Method |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
A NEW CONSTRUCTION FOR RESIDENTIAL BUILDING (HOSTEL) BY FOCUSING ON GREEN
BUILDING STRATEGIES |
Author: |
MF BAHAROM, A.EMRAN, A. AB RAHMAN, M.F SULAIMA, ZH BOHARI, MH JALI |
Abstract: |
These building constructions are normally does not follow the green building
strategies and it increases the environmental problem and global warming in the
future. This report was written to deliver an overview of the installation of
electrical equipment based on Green Building Index (GBI) for the residential
construction of the building (hostel). Therefore, in this report the development
and designing of a new green building construction (hostel) by focusing the
green building strategies in term of energy efficiency performance is proposed
in order to better development of green building to have a great life for
environment and human in this world. The result of the project is to analyze the
lighting system and calculate the electrical load by using Dialux software. For
the conclusion, this project describes the basic study of indoor lighting
performance at the hostel for the residential building development. Besides, the
use of recycling and green plant for the projects can decrease the impact on the
environment. |
Keywords: |
Green buildings strategies, Residential construction, Energy efficiency |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
AN EFFICIENT IMAGE PROCESSING AND BROWSER TOOL FOR SOLAR IMAGES |
Author: |
Ahmad Odat, Adi Maaita, Fadi Hamad, Jamal Zraqou |
Abstract: |
Nothing is more important to us on Earth than the Sun. Without the heat and
light of the sun, life as we know it could not exist on the earth. Sun exhibits
phenomena on differnet scales, timescales and wavelength ranges. Recent solar
missions have increased the rate of solar data available for study which
presents both opportunities and challenges. Several satellites have been
launched to observe the Sun such as STEREO (Solar TErrestrial RElations
Observatory) and SDO (Solar Dynamics Observatory). STEREO and SDO provide full
disk images of the Sun at different cadence rates in different wavelengths with
maximum resolutions of 2048×2048 and 4096×4096 pixels, respectively. STEREO
mission combines two spacecrafts circulating arround the Sun to provide
simultaneous views from widely spaced locations. SDO aims to study the solar
atmosphere on small scales and times and in many wavelengths. STEREO and SDO
missions provide huge volumes of data per day, hence it is not an easy process
to download, browse and analyze significant areas of interest for these data
volumes on a remote server, simply because these processes overload the existing
internet and network infrastructures. In this paper, a tool for visualizing and
analysing STEREO and SDO data is introduced. The aim of this tool is to help
scientists to discover new phenomena and link related data sets from various
instruments that are often analyzed in isolation. The proposed tool offers a
number of useful image processing tools associated with activities highly
focused on solar images such as: segment of active region(s), creating
anaglyphs, extracting solar limb, tracking solar events etc. |
Keywords: |
Solar Imaging Tool; Image Processing Tool; Super-Resolution Tool; 3D Viewing
Tool; Solar Images Browser Tool. |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
EFFECTIVENESS OF EMPIRICAL MODE DECOMPOSITION TECHNIQUE ON SEMG SIGNALS IN
FATIGUE ASSESSMENT DURING A WALK |
Author: |
RUBANA H. CHOWDHURY, HADAATE ULLAH, M.B.I Reaz |
Abstract: |
Muscle fatigue is often caused by unhealthy and irregular work practice. It is
defined as a long lasting reduction of the ability to contract and it is the
condition when produced force is reduced. Faster walking can cause muscle
fatigue, which is unhealthy when the level of fatigue is high. There are many
mathematical parameters that are suitable to assess the muscle fatigue during
gait. Out of these parameters, the amplitude and frequency of the surface EMG
signal (sEMG) reflects the more accurate physiological activity in the motor
unit during contraction and at rest. In this research, Empirical mode
decomposition (EMD) - based filtering process is applied on sEMG signal for
realizing the fatiguing contraction during subject walking exercise. The purpose
of this research is to evaluate the surface electromyographic parameters (RMS,
IAV and AIF) for addressing the effectiveness of the EMD method. In this study,
RMS, IAV and AIF values were used as spectral variable, which extensively
categorizes the difference between fatigue and normal muscle when using EMD
method compared with other different wavelet functions (WFs). Furthermore, the
outcome also demonstrates that, amplitude and frequency of EMG signal
significantly changes from rest position to maximum contraction position. In
this study, we will try to show that by using the EMD method an identification
of reliable discrimination between fatigue and non-fatigue muscle is possible. |
Keywords: |
Electromyography; Wavelet Transform; EMD; RMS; IAV; AIF |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
MINIMIZE THE MAKESPAN FOR JOB SHOP SCHEDULING PROBLEM USING ARTIFICIAL IMMUNE
SYSTEM APPROACH |
Author: |
AHMAD SHAHRIZAL MUHAMAD, SAFAAI DERIS, ZALMIYAH ZAKARIA |
Abstract: |
In the manufacturing industry, scheduling is a process of arranging, controlling
and optimizing work and workloads in a production process. This research
discussed about job-shop scheduling problem. The main problem in job-shop
scheduling is to optimize the usage of machines in order to obtain the shortest
time in completing the activities. Several methods have been used to solve
job-shop scheduling problems and the method proposed here is artificial
intelligence by using the artificial immune system algorithm (AIS). The
advantage of this algorithm is fabricated by imitating the natural immune
system. The results produced by this method are compared with the best results
of the previous research. |
Keywords: |
Scheduling, Artificial Intelligence, Job-shop Scheduling, Artificial Immune
System, Evolutionary Computation |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
FUZZY KERNEL K-MEDOIDS ALGORITHM FOR MULTICLASS MULTIDIMENSIONAL DATA
CLASSIFICATION |
Author: |
ZUHERMAN RUSTAM, AINI SURI TALITA |
Abstract: |
The success of the classification method is highly dependent on how to specify
initial data as the initial prototype, dissimilarity functions that we used and
the presence of outliers among the data. To overcome these obstacles, in this
paper we present Fuzzy Kernel k-Medoids (FKkM) algorithm that we claim to be
robust against outliers, invariant under translation and data transformation, as
the combined development of Fuzzy LVQ, Fuzzy k-Medoids and Kernel Function.
Based on the experiments, it provides a better accuracy than Support Vector
Machines, Kernel Fisher Discriminant and RBF Neural Network for multiclass
multidimensional data classification. |
Keywords: |
Classification, Fuzzy LVQ, Fuzzy K-Medoids, Kernel Function, Multiclass
Multidimensional Data |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
EFFICIENT TASK SCHEDULING STRATEGY TOWARDS QOS AWARE OPTIMAL RESOURCE
UTILIZATION IN CLOUD COMPUTING |
Author: |
V. MURALI MOHAN, K. V. V. SATYANARAYANA |
Abstract: |
QoS (Quality of Service) aware task scheduling in cloud computing is a
continuous practice due to the divergent scope of user needs. Henceforth the
current research is moving in a direction to find optimal solutions for
efficient task scheduling towards QoS aware resource utilization in cloud
workflow management. Much of the existing solutions are specific to one or two
QoS factors mainly task completion and bandwidth. According to the real-time
practices, the QoS assessment by one or two factors is impractical. Moreover
much of the existing approaches are delivering the computational complexity as
O(n2), which is due to the magnification of the increment in number of tasks due
to overwhelmed users and their requirements. In this context here we devised an
explorative statistical approach, which is based on metrics called resource
optimal value ( ) and coupling between tasks ( ), which enables to assess the
optimal order of tasks to utilize desired cloud resource. The other key factor
of the proposal is to stabilize the computational complexity to O(n*log(n)). The
experiment results are indicating the significance of the proposed model towards
scalable and robust QoS- aware task scheduling towards optimal utilization of
the cloud resource. |
Keywords: |
Cloud Computing, Qos, Resource Scheduling, Multi Criteria Decision, Priority
Scheduling, Task Management, ROPT, CBT |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
A COMPREHENSIVE ARCHITECTURE FOR DYNAMIC EVOLUTION OF ONLINE TESTING OF AN
EMBEDDED SYSTEM |
Author: |
SMT. J. SASI BHANU, A. VINAYA BABU , P. TRIMURTHY |
Abstract: |
Embedded systems which are used for monitoring and controlling safety critical
systems are to be evolved dynamically, meaning changes required either for
command language interface, or to the Embedded systems software must be
undertaken while the system is up and running. When the changes are made, the
same are to be tested thoroughly before the changed code is made paramount.
Different types of testing must be carried with the test cases initiated from
the HOST. The testing must be carried while the embedded system is up and
running. The kind of testing that must be undertaken sometimes cannot be
foreseen. There is a necessity of dynamically evolving the very testing itself
and then carry with testing with the help of test cases initiated from the HOST.
In this paper a comprehensive dynamically evolvable online testing architecture
has been presented and also a comparison of the same with other possible
architectures has also been presented. |
Keywords: |
ES architectures, Dynamic Online Testing, monitoring and controlling safety
critical systems, Software evolution |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
DATA MINING APPROACH TO ASSESS CONDITION OF ROTATING MACHINE USING SOUND SIGNAL |
Author: |
MOHAMMED AREF ABDUL RASHEED, MANSOUR NASER ALRAJA |
Abstract: |
Retrieval of beneficial information, knowledge and development of new methods
can be carried out using data mining for visualizing and analyzing the data. In
the environment several kinds of data are present and can be converted into
distinct patterns. In automobile, every rotating machine components emit some
kind of sound signals. These signals are due to vibration or friction of the
rotating machine components. The emitted sound signal contains noise as well as
useful data. The useful data provides the significance information about the
machine operational status and can be employed for condition assessment of a
rotating machine. This paper aims to describe the condition of automobile
rotating machine using data mining approach through sound signals. |
Keywords: |
Information System, Signal Processing, Data mining, MCI |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
EFFECT OF AVERAGE-THROUGHPUT WINDOW SIZE ON PROPORTIONAL FAIR SCHEDULING FOR
RADIO RESOURCES IN LTE-A NETWORKS |
Author: |
SAMEH MUSLEH , MAHAMOD ISMAIL , AND ROSDIADEE NORDIN |
Abstract: |
The Proportional Fair (PF) scheduling technique is well known technique that is
used to schedule radio resources at the mobile base station to the end-users. An
efficient scheduling for radio resources in the physical layer of LTE-A base
stations is challenging due to the high demand for various types of 4G wireless
services such as VOIP calls, online gaming, HDTV, etc. In this paper, we derive
the average-throughput window size (TPF) formulas for LTE-A PF Scheduler, and
then we investigate the effect of TPF size on the performance and fairness of PF
Scheduler for LTE-A network. Both of downlink system-level (SL) simulator and
link-level (LL) simulator are used to evaluate the scheduler performance for
different TPF configurations. The simulation results showed that the long TPF
improves both of UE (User Equipment) throughput and cell (eNodeB) throughput,
however the achieved scheduler fairness in this case is low. On the other hand,
the short TPF showed degradation in both of UE and cell throughput, but offers
higher fairness values for the PF scheduler. |
Keywords: |
4G cellular networks, wireless communications, LTE-A, scheduling algorithms |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
Title: |
FAIR JOINT USER SCHEDULING BASED ON BEST CQI FOR CARRIER AGGREGATION IN LTE-ADVANCED |
Author: |
AHMED A ALI, ROSDIADEE NORDIN, MAHAMOD ISMAIL |
Abstract: |
Carrier Aggregation (CA) is one of the main features in Long Term Evolution–
Advanced (LTE-A). CA allows the target peak data rates in excess of 1 Gbps in
the downlink and 500 Mbps in the uplink to be achieved by aggregating multiple
component carriers (CCs) of 20 MHz for each CC. When CA is being put to use, it
is vital to complement LTE-A systems with a robust and suitable resource
scheduling scheme. There are two basic resource scheduling schemes; (i) Best CQI
Scheduling and (ii) Joint User Scheduling (JUS). Since within LTE-A networks
users with high data rates have increased exponentially, each scheme probably
cannot accommodate the user’s requirement, thus a much simpler, robust, and
efficient scheme that caters to real-time traffic patterns and applications
needs to be established. This paper focuses on the development of a new and fair
joint user scheduling algorithm with carrier aggregation in the downlink of LTE-A.
To enhance the system fairness and higher resource utilization, a novel
Proportional Fair (PF) scheduling algorithm has been introduced in this study.
It is known as JUS-CQI. The proposed scheme has been implemented and validated
using a system level simulator built in MATLAB. The impact of the scheduling
scheme towards fairness, block error rate and throughput have been examined.
Simulation results have shown that the proposed algorithm has improved the users
throughput by 15% compared to JUS, and enhanced the system fairness by 8.33%.
Furthermore, the results have shown that the required average received
Signal-to-Noise power Ratio (SNR) satisfying the average Block Error Rate (BLER)
of 〖10〗^(-2) using JUS-CQI is decreased by approximately 4.8 dB compared to JUS. |
Keywords: |
LTE-advanced, JUS, best CQI scheduling, fairness, block error rate, carrier
aggregation. |
Source: |
Journal of Theoretical and Applied Information Technology
10th October 2015 -- Vol. 80. No. 1 -- 2015 |
Full
Text |
|
|
|