2017, volume 21, №3

Mathematical and Computer Modelling

Factors and data for RES evaluation PDF

R Muhamedyev1, 2, E Muhamedyeva2, R Mustakayev2, F Abdoldina1
COMPUTER MODELLING & NEW TECHNOLOGIES 2017 21(3) 7-11

1Kazakh National Research Technical University, Satpaev Street 22a, 050013, Almaty, Republic of Kazakhstan
2Institute of Information and Computational Technologies, 050010, Almaty, Kazakhstan

Usage of renewable energy sources (RES) – is a modern powerful trend in energy development. “Green energy” technologies (technologies of gathering energy from renewable sources) are actively developed and will allow in the future significantly to reduce use of non-renewable resources (oil, gas, coal, peat), reduce the ecological impact of energy plants, improve the ecology around populated areas, reduce the cost of obtaining energy in some cases, increase the autonomy of life support systems and energy security of the country. RES are spatially distributed resources that depend on various factors. Thus, heterogeneous data and correctly defined factors are needed to evaluation of renewable resources. Paper considers the processes of RES potential evaluation, factors and data sources available for researchers. We discuss stages of RES potential evaluation, factors that can contribute to or hinder using RES and some data sources which can be used during the process. The Kazakhstan problems are briefly discussed.

Proposition of web services composition approach basing of model-driven approach and multi-agent systems PDF

N Adadi1, M Berrada1, D Chenouni1, B Bounabat2
COMPUTER MODELLING & NEW TECHNOLOGIES 2017 21(3) 12-19

1IPI Laboratory, Sidi Mohamed ben Abdellah University, Fez, Morocco
2Al-Qualsadi Research & Development Team, ENSIAS, Mohammed V – Souissi University, Rabat, Morocco

Web services composition is an emerging paradigm for application integration within and across organizations and enterprises. For this reason, various approaches and formalism have been proposed and used for web services composition. Among these approaches we have the Models Driven Approach (MDA), which concentrates on the realization of abstract models. Thus, the phase of specification represents an important part of the cycle of development of composite web service. To proceed to this cycle of development, a developer has to elaborate a specification which allows the modelling of the global behaviour of the system, to verify formally this model for assuring his quality, then pass to the implementation of the composed service. In the paper we present a summary of our proposed approach of web services composition based on MDA, thus it is separated into three tasks: specification using BPMN notation and Multi-agent reactive decisional (MARDS) model, formal verification using LOTOS language and implementation using BPEL language. Then we present a case study to prove the feasibility and reliability of our proposed approach.

Security challenges of vehicular cloud computing applications: from software architecture viewpoint PDF

Hanieh Kashfi, Fereidoon Shams Aliee
COMPUTER MODELLING & NEW TECHNOLOGIES 2017 21(3) 20-24

Faculty of Computer Science and Engineering, Shahid Beheshti University, Tehran, Iran

The use of vehicular ad-hoc network is considered by researchers in recent years. Although these networks have been deployed in real world offering appropriate services to their users, researches show that their current architecture have different development and management problems. It seems that cloud computing due to its scalability and other features is an appropriate technology to compensate the shortcomings. By moving the vehicular ad-hoc network to the cloud, we have the new technology of vehicular cloud network. Considering quality attribute is the best approach to improve the vehicular cloud network applications’ software architecture. Among the quality attributes, security is so important and the lack of security in the system causes the rejection of these technologies by users. This paper studies vehicular cloud networking security. In order to achieve the security in vehicular cloud network applications, first of all a list of applications is prepared. Then applications are categorized to identify various security threats. To confront the existing threats, various security tactics are provided. Finally an approach to increase the security in vehicular cloud applications is proposed.

Fuzzy logic based job scheduling algorithm in cloud environment PDF

Pratibha Pandey, Sarvpal Singh
COMPUTER MODELLING & NEW TECHNOLOGIES 2017 21(3) 25-30

Department of Computer Science and Engineering, Madan Mohan Malaviya University of Technology, Gorakhpur -273010, India

Cloud computing is a technology which is growing faster day by day and applied in various fields such as in industry, commerce, and research. Handling resources and the task according to the need of user is the current major issue. In cloud environment when users submit their task, it selects the best virtual machine on which the task can execute. Considering the commercialization and virtualization aspect of the Cloud Environment, this paper proposes an algorithm for Job scheduling which ensures fairness of the resource allocation according to the Quality of service. It mainly focuses on two problems. One is the selection of virtual machine(s) which are eligible to execute the task. Another problem is justification of the task according to the quality of service. Our approach simplifies the complexity of the algorithm and reduces the overhead associated with selecting appropriate and justified virtual machine for a given task. It ensures the fairness of the resource allocation for each classified task and also justifies the overall system allocation. Further, it uses fuzzy logic to adjust the general expectation vector of the task based on the fairness of the allocation of resource.

Cognitive evolution in software development life cycle through design thinking PDF

Archana Magare, Madonna Lamin
COMPUTER MODELLING & NEW TECHNOLOGIES 2017 21(3) 31-34

Dept. of Computer Science and Engineering, ITM Universe, Vadodara, Gujarat, India

Software engineering is methodical, well-organized and proven approach to the advancement, operation and maintenance of the software. Agility moves toward compact set of process activity. Design thinking is an organized, intellectual process in which designers ideate and validate notion for solving the given problem whose outcome and function fulfills clients’ objectives or users’ needs under specified set of constraints. This paper describes cognitive impact of design engineering process on software development life cycle (SDLC) in agile development community. The paper also depicts correlation between various design engineering canvases and phases within software development lifecycle in agile models.

Optimal implementation of critical peak pricing in cloud computing PDF

Aishwarya Soni, Muzammil Hasan
COMPUTER MODELLING & NEW TECHNOLOGIES 2017 21(3) 35-44

Computer Science & Engineering Department, M.M.M. University of Technology, Gorakhpuir-273010, UP, India

Cloud computing offers a variety of services and hence the opportunity to make profit by using a suitable pricing strategy by selling these services. Yet, the instability of the dynamic price, create a risk for cloud tenants so as to effectively implement a pricing strategy which is beneficial for both tenants and end user. To overcome the dynamic price risk for tenant, method of dynamic pricing scheme between tenants and end user is employed. This paper proposes a model of dynamic pricing scheme, i.e. Critical Peak Pricing based on demand response program for profit of cloud tenants as well as end user satisfaction. The proposed model used the price responsiveness model of end user and the parameters of Critical Peak Pricing that simultaneously affects the benefit of cloud tenants and end user.