Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035918
Y. Rogozov, A. Sviridov, A. Degtyarev
The Integrated Life Cycle Model demands presence of the information environment which combines in it functions on storage of a subject domain description, a configuration of system and a user data. The given information environment is based on the Structure-Independent Database operated by Database Management System. Using of the Integrating Information Environment allows to raise information systems flexibility, to lower expenses and terms for developing, to refuse the Relational approach to databases design. In the article requirements to the Integrating Information Environment are stated. The analysis of matrix representation of entities and their sets in Relational model and Entity-Attribute-Value model is made. The Integrating Information Environment and realization of a Structure-Independent Database is described.
{"title":"The information environment for the integrated life cycle model of configurable information system","authors":"Y. Rogozov, A. Sviridov, A. Degtyarev","doi":"10.1109/ICAICT.2014.7035918","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035918","url":null,"abstract":"The Integrated Life Cycle Model demands presence of the information environment which combines in it functions on storage of a subject domain description, a configuration of system and a user data. The given information environment is based on the Structure-Independent Database operated by Database Management System. Using of the Integrating Information Environment allows to raise information systems flexibility, to lower expenses and terms for developing, to refuse the Relational approach to databases design. In the article requirements to the Integrating Information Environment are stated. The analysis of matrix representation of entities and their sets in Relational model and Entity-Attribute-Value model is made. The Integrating Information Environment and realization of a Structure-Independent Database is described.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124856323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035942
O. Luchko, V. Marenko
The paper describes the process of cognitive maps construction of various degrees of detailisation using the example of a small enterprise problem area. The generalizing hierarchical cognitive map as a 3D-model of the problem area was presented. Cognitive structuring of the problem area illustrating the existence of relations between basic factors was displayed. Cognitive parameterization and coordination of expert estimations of the basic factors interconnections using the mathematical statistics tools were carried out. The process of automation of data processing and presentation of the studied problem area were implemented. The cognitive model of relations control affecting profit growth was formed. As a result of simulated experiment and the empirical results analysis, the main controlling relation between the "Personnel" and the "Profit" factors was revealed. Experiments were conducted to determine the intellectual parameters of a small enterprise employees and labor capacity. The labor capacity as a function of intellectual indicators of the personnel using a linguistic variable was revealed.
{"title":"Cognitive analysis of relations between concepts of the problem area (the example of a small enterprise)","authors":"O. Luchko, V. Marenko","doi":"10.1109/ICAICT.2014.7035942","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035942","url":null,"abstract":"The paper describes the process of cognitive maps construction of various degrees of detailisation using the example of a small enterprise problem area. The generalizing hierarchical cognitive map as a 3D-model of the problem area was presented. Cognitive structuring of the problem area illustrating the existence of relations between basic factors was displayed. Cognitive parameterization and coordination of expert estimations of the basic factors interconnections using the mathematical statistics tools were carried out. The process of automation of data processing and presentation of the studied problem area were implemented. The cognitive model of relations control affecting profit growth was formed. As a result of simulated experiment and the empirical results analysis, the main controlling relation between the \"Personnel\" and the \"Profit\" factors was revealed. Experiments were conducted to determine the intellectual parameters of a small enterprise employees and labor capacity. The labor capacity as a function of intellectual indicators of the personnel using a linguistic variable was revealed.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126770461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036014
M. Akçay, Hasan Armutlu
Distance education systems, initially perceived as a knowledge management system and knowledge management system in the preparation of distance education applications architectures have been used. However, students in the distance education system modules, tutorials, modules, such as the adequacy of student assessment and tutorial are many human factors. This application architectures and algorithms used in distance education because they are not flexible enough to be applied to these factors, they are forced to respond. Distance education systems must be more flexible and re-configurable. Cloud computing, which is based on sharing knowledge and equipment, services to gather under a single roof instead of offering a solution for each service is an information technology. Cloud computing technologies, more flexible compared to conventional information technology, can be updated quickly and are innovative. Distance education system through the use of cloud computing in addressing the needs of distance education is emerging architectures and algorithms. In this paper, application architecture according to the distance education system will be created. This application architecture will be utilized when creating cloud services and these services will be studied harmony with each other.
{"title":"Distance education application architecture and cloud computing","authors":"M. Akçay, Hasan Armutlu","doi":"10.1109/ICAICT.2014.7036014","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036014","url":null,"abstract":"Distance education systems, initially perceived as a knowledge management system and knowledge management system in the preparation of distance education applications architectures have been used. However, students in the distance education system modules, tutorials, modules, such as the adequacy of student assessment and tutorial are many human factors. This application architectures and algorithms used in distance education because they are not flexible enough to be applied to these factors, they are forced to respond. Distance education systems must be more flexible and re-configurable. Cloud computing, which is based on sharing knowledge and equipment, services to gather under a single roof instead of offering a solution for each service is an information technology. Cloud computing technologies, more flexible compared to conventional information technology, can be updated quickly and are innovative. Distance education system through the use of cloud computing in addressing the needs of distance education is emerging architectures and algorithms. In this paper, application architecture according to the distance education system will be created. This application architecture will be utilized when creating cloud services and these services will be studied harmony with each other.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035909
V. D. Ten, Aizhan B. Dyussenbina
First, we prove a fundamental theorem which describes some properties of elements of Euclidean rings. This theorem allows us to construct an infinite family of cryptosystems, among which there are cryptosystems without repetitions. This means that the encryption algorithm can encrypt any text so that all symbols after encryption are different. Therefore, methods of statistic analysis cannot be used against our cryptosystems even theoretically.
{"title":"Polyalphabetic Euclidean ciphers","authors":"V. D. Ten, Aizhan B. Dyussenbina","doi":"10.1109/ICAICT.2014.7035909","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035909","url":null,"abstract":"First, we prove a fundamental theorem which describes some properties of elements of Euclidean rings. This theorem allows us to construct an infinite family of cryptosystems, among which there are cryptosystems without repetitions. This means that the encryption algorithm can encrypt any text so that all symbols after encryption are different. Therefore, methods of statistic analysis cannot be used against our cryptosystems even theoretically.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114273559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035993
U. Agaeva, G. Agaeva, N. Godjaev
The conformational properties of biologically active human and mouse/rat hemokinin-1 peptide molecules have been investigated by computer modeling methods. It is showed that both molecule can exist in several stable conformational states. The energy and geometrical parameters for each of low-energy conformations of molecules are obtained. The conformationally rigid and labile segments of both molecules were revealed.
{"title":"Computer simulation of conformational behaviour of human and rat/mouse hemokinin-1 molecules","authors":"U. Agaeva, G. Agaeva, N. Godjaev","doi":"10.1109/ICAICT.2014.7035993","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035993","url":null,"abstract":"The conformational properties of biologically active human and mouse/rat hemokinin-1 peptide molecules have been investigated by computer modeling methods. It is showed that both molecule can exist in several stable conformational states. The energy and geometrical parameters for each of low-energy conformations of molecules are obtained. The conformationally rigid and labile segments of both molecules were revealed.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"123 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129552798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, an automatic number plate recognition (ANPR) system is a key aspect in traffic congestion. This will help to minimize the different kind of violations on the road. Advanced systems for tracking and identifying stolen, unauthorized vehicles are based on automated number plate recognition technology. This paper's main objectives are to review other methods and propose our own algorithm. A short review is performed on the various methods of number plate recognition algorithms. Further explanations of the proposed algorithm are illustrated in graphical forms to show how the algorithm works. This paper concluded with tests and evaluation results.
{"title":"Effective algorithms and methods for automatic number plate recognition","authors":"Amirgaliyev Beibut, Kairanbay Magzhan, Kenshimov Chingiz","doi":"10.1109/ICAICT.2014.7035951","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035951","url":null,"abstract":"Nowadays, an automatic number plate recognition (ANPR) system is a key aspect in traffic congestion. This will help to minimize the different kind of violations on the road. Advanced systems for tracking and identifying stolen, unauthorized vehicles are based on automated number plate recognition technology. This paper's main objectives are to review other methods and propose our own algorithm. A short review is performed on the various methods of number plate recognition algorithms. Further explanations of the proposed algorithm are illustrated in graphical forms to show how the algorithm works. This paper concluded with tests and evaluation results.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035903
R. Savola
Carefully designed information security metrics enable informed and effective decision making. However, the current state of the art of developing security metrics is not sufficiently advanced. A major challenge is that typically the risk-driven (top-down modelling) and evidence-driven (bottom-up monitoring) metrics approaches are not aligned, and often used separately. Consequently, it is not possible to understand the impact of monitored evidence to actual security risk. A crosscut model for risk-driven and evidence-driven security metrology is needed. We analyze the concepts needed to be able to integrate these two main approaches.
{"title":"Towards integration of risk-driven and evidence-driven information security measurement","authors":"R. Savola","doi":"10.1109/ICAICT.2014.7035903","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035903","url":null,"abstract":"Carefully designed information security metrics enable informed and effective decision making. However, the current state of the art of developing security metrics is not sufficiently advanced. A major challenge is that typically the risk-driven (top-down modelling) and evidence-driven (bottom-up monitoring) metrics approaches are not aligned, and often used separately. Consequently, it is not possible to understand the impact of monitored evidence to actual security risk. A crosscut model for risk-driven and evidence-driven security metrology is needed. We analyze the concepts needed to be able to integrate these two main approaches.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126791418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035980
N. Nada, N. Gaylani, Abusflan Elgelany
In this paper we investigate the barriers that affect the ICT deployment and innovation in SUDAN. This is done in this step by consulting and interviewing the major focus group which is affecting and affected by the ICT deployment in SUDAN, several brain storming was done and found that there are many interrelated barriers in different fields but all together have a negative impact on the diffusion innovation in ICT sector. These barriers are identified and our contribution is formed in steps that would be followed to overcome the barriers.
{"title":"Barriers facing the diffusion of innovation in ICT sector in Sudan","authors":"N. Nada, N. Gaylani, Abusflan Elgelany","doi":"10.1109/ICAICT.2014.7035980","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035980","url":null,"abstract":"In this paper we investigate the barriers that affect the ICT deployment and innovation in SUDAN. This is done in this step by consulting and interviewing the major focus group which is affecting and affected by the ICT deployment in SUDAN, several brain storming was done and found that there are many interrelated barriers in different fields but all together have a negative impact on the diffusion innovation in ICT sector. These barriers are identified and our contribution is formed in steps that would be followed to overcome the barriers.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126814135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035922
K. A. Peker, Gokhan Ozsan
Cotton is a very important material used in producing many fabric types. Contaminants from various sources need to be removed from cotton before fibers can be spun into yarn. Contaminants critically affect the quality of the yarn produced; any foreign material may result in unacceptable yarn or fabric, or even cause damage to the production machines. Automatic detection and removal of foreign fibers and contaminants in cotton is an essential technology for the modern textile industry. Various image processing and computer vision techniques have been proposed for the detection of foreign materials in cotton fibers. We describe a detection method using Gaussian mixture models and thresholding based on pixel probabilities. The proposed method gives promising results.
{"title":"Contaminant and foreign fiber detection in cotton using Gaussian mixture model","authors":"K. A. Peker, Gokhan Ozsan","doi":"10.1109/ICAICT.2014.7035922","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035922","url":null,"abstract":"Cotton is a very important material used in producing many fabric types. Contaminants from various sources need to be removed from cotton before fibers can be spun into yarn. Contaminants critically affect the quality of the yarn produced; any foreign material may result in unacceptable yarn or fabric, or even cause damage to the production machines. Automatic detection and removal of foreign fibers and contaminants in cotton is an essential technology for the modern textile industry. Various image processing and computer vision techniques have been proposed for the detection of foreign materials in cotton fibers. We describe a detection method using Gaussian mixture models and thresholding based on pixel probabilities. The proposed method gives promising results.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121519127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035902
A. Levina, Mikhail Korovkin, D. Sleptsova
Authentication in GSM networks uses COMP128, which is vulnerable to side-channel attack called partitioning attack. On the device constrained in resources, such as SIM-card, table lookups are quite unreliable, so the attack can be carried out using up to 1000 queries. Proposed method - combined side-channel attack - can speed up key retrieving. Partitioning attack measures only power consumption, while it can be combined with timing attack, fault injection or probing attack. Study of combination with timing attack shows that it will be the least effective variant, because used in COMP128 operations are not vulnerable to timing attack. Probing attack gives way more opportunities as it is invasive attack. Increased number of rounds that can be monitored give 8-time speed gain. However, best combination of non-invasive execution and efficiency is fault injection attack. This combination gives the opportunity of power measurement on each round and reduces quantity of needed queries by 8 times as well. Despite the increased speed of the attack, defence against combined attacks comes down to defence against the weakest component.
{"title":"Combined side-channel attacks on COMP128","authors":"A. Levina, Mikhail Korovkin, D. Sleptsova","doi":"10.1109/ICAICT.2014.7035902","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035902","url":null,"abstract":"Authentication in GSM networks uses COMP128, which is vulnerable to side-channel attack called partitioning attack. On the device constrained in resources, such as SIM-card, table lookups are quite unreliable, so the attack can be carried out using up to 1000 queries. Proposed method - combined side-channel attack - can speed up key retrieving. Partitioning attack measures only power consumption, while it can be combined with timing attack, fault injection or probing attack. Study of combination with timing attack shows that it will be the least effective variant, because used in COMP128 operations are not vulnerable to timing attack. Probing attack gives way more opportunities as it is invasive attack. Increased number of rounds that can be monitored give 8-time speed gain. However, best combination of non-invasive execution and efficiency is fault injection attack. This combination gives the opportunity of power measurement on each round and reduces quantity of needed queries by 8 times as well. Despite the increased speed of the attack, defence against combined attacks comes down to defence against the weakest component.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121695891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}