Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035945
Zhomartkyzy Gulnaz, Balova Tatiana
This paper presents some information support methods and models of the university's scientific knowledge management processes. Some management tools of the university's scientific knowledge are presented and the developed information model of the university's scientific knowledge is described. The paper proposes the model of the university's specialist for the specialist's profile description and the concept of the university's scientific knowledge semantic portal. The concept of the semantic portal is based on the ontological information model and the SemanticWeb technology.
{"title":"The implementation of a knowledge management system model","authors":"Zhomartkyzy Gulnaz, Balova Tatiana","doi":"10.1109/ICAICT.2014.7035945","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035945","url":null,"abstract":"This paper presents some information support methods and models of the university's scientific knowledge management processes. Some management tools of the university's scientific knowledge are presented and the developed information model of the university's scientific knowledge is described. The paper proposes the model of the university's specialist for the specialist's profile description and the concept of the university's scientific knowledge semantic portal. The concept of the semantic portal is based on the ontological information model and the SemanticWeb technology.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126413359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035916
M. Hacibeyoglu, Vahit Tongur, K. Alaykiran
The two-way number partitioning problem is to divide set of numbers into two subsets. As a result of the dividing process the sums of numbers in subsets must be as nearly equal as possible. The two-way number partitioning problem problem is NP-complete. The bi-dimensional two-way number partitioning problem is a kind of number partitioning problem. The sets have only two coordinates and the aim is minimized the differences of the sum of the numbers for both coordinates. This work presents two heuristic algorithm for solving bi-dimensional two-way number partitioning problem. Fist algorithm is best known and most used greedy algorithm. The other one is a novel genetic algorithm approach. These algorithms are analyzed, implemented and tested on randomly different 20 datasets.
{"title":"Solving the bi-dimensional two-way number partitioning problem with heuristic algorithms","authors":"M. Hacibeyoglu, Vahit Tongur, K. Alaykiran","doi":"10.1109/ICAICT.2014.7035916","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035916","url":null,"abstract":"The two-way number partitioning problem is to divide set of numbers into two subsets. As a result of the dividing process the sums of numbers in subsets must be as nearly equal as possible. The two-way number partitioning problem problem is NP-complete. The bi-dimensional two-way number partitioning problem is a kind of number partitioning problem. The sets have only two coordinates and the aim is minimized the differences of the sum of the numbers for both coordinates. This work presents two heuristic algorithm for solving bi-dimensional two-way number partitioning problem. Fist algorithm is best known and most used greedy algorithm. The other one is a novel genetic algorithm approach. These algorithms are analyzed, implemented and tested on randomly different 20 datasets.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036011
A. Lezhebokov, Y. Kravchenko, V. Bova
This work is concerned with operating and implementing state-of-the-art IT solutions into an educational, process, creating content to support the storage and access to the data required for education. Various QR code application methods to support the educational process in educational institutions are reviewed and discussed. Operation algorithms and architecture of an information system are developed.
{"title":"Support system for QR-code-based educational processes","authors":"A. Lezhebokov, Y. Kravchenko, V. Bova","doi":"10.1109/ICAICT.2014.7036011","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036011","url":null,"abstract":"This work is concerned with operating and implementing state-of-the-art IT solutions into an educational, process, creating content to support the storage and access to the data required for education. Various QR code application methods to support the educational process in educational institutions are reviewed and discussed. Operation algorithms and architecture of an information system are developed.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123671447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035960
T. Kuanov, N. S. Turganbayev, Zh N. Abilkayeva, F. Ismagulova
Technology of modeling and monitoring of the complex systems TOFI used to develop information and analytical systems to support decision-making process of almost any subject area. This article describes the key capabilities of this technology, such as the use of standard cubes and algorithms.
{"title":"Organization of standard cubes and algorithms in TOFI technology","authors":"T. Kuanov, N. S. Turganbayev, Zh N. Abilkayeva, F. Ismagulova","doi":"10.1109/ICAICT.2014.7035960","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035960","url":null,"abstract":"Technology of modeling and monitoring of the complex systems TOFI used to develop information and analytical systems to support decision-making process of almost any subject area. This article describes the key capabilities of this technology, such as the use of standard cubes and algorithms.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122039291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036002
Yashar Hajiyev, Khatira Salimova
For last ten years ICT based contemporary teaching technologies has been developed into fast evolving segment of state-of-the-art applications. Newest teaching technologies enable to move from lecture-driven classes with chalk and chalkboards to comprehensive class environment that meets learning needs of every student and provide thorough conditions for teaching. Auditorium response technology offers exceptional opportunities for cost-effective automation of computer-based testing of students' responses with low infrastructure demands, provides a variety of reports including participant score reports, roster report and scores analysis report. The paper systemized good experience and best practices accumulated in employing of response technologies.
{"title":"Interactive auditorium response and student progress evaluation system","authors":"Yashar Hajiyev, Khatira Salimova","doi":"10.1109/ICAICT.2014.7036002","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036002","url":null,"abstract":"For last ten years ICT based contemporary teaching technologies has been developed into fast evolving segment of state-of-the-art applications. Newest teaching technologies enable to move from lecture-driven classes with chalk and chalkboards to comprehensive class environment that meets learning needs of every student and provide thorough conditions for teaching. Auditorium response technology offers exceptional opportunities for cost-effective automation of computer-based testing of students' responses with low infrastructure demands, provides a variety of reports including participant score reports, roster report and scores analysis report. The paper systemized good experience and best practices accumulated in employing of response technologies.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125679761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035911
Syed Rizvi, John Mitchell, N. Showan
Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR) has attempted to minimize this problem by allowing secondary users to coexist with primary users without causing interference to their communication through dynamic utilization of free spectrum. CR offers many promising benefits including dynamic spectrum sharing, robust cross-layer adaptation, and collaborative networking. It is anticipated that CR technology will be the next wave of innovation in information and communications technologies. Although operational aspects of CR are being explored vigorously, its security aspects have gained little attention. Due to the dynamic nature of CR networks and the fact that they exposed relatively more to wireless networks, entirely new classes of security threats and challenges are introduced, such as licensed user emulation, selfish misbehaviors and unauthorized use of spectrum bands. To achieve successful deployment of CR technologies in practice, there is a critical need to advance the theoretical understanding of these entirely new classes of security threats and challenges. Therefore, in this paper, our primary objective is to identify and investigate the major known security threats within a CR network (CRN). Our secondary objective is to highlight on how potential threats exploit the vulnerabilities present at different layers of a communication stack.
{"title":"Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks","authors":"Syed Rizvi, John Mitchell, N. Showan","doi":"10.1109/ICAICT.2014.7035911","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035911","url":null,"abstract":"Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR) has attempted to minimize this problem by allowing secondary users to coexist with primary users without causing interference to their communication through dynamic utilization of free spectrum. CR offers many promising benefits including dynamic spectrum sharing, robust cross-layer adaptation, and collaborative networking. It is anticipated that CR technology will be the next wave of innovation in information and communications technologies. Although operational aspects of CR are being explored vigorously, its security aspects have gained little attention. Due to the dynamic nature of CR networks and the fact that they exposed relatively more to wireless networks, entirely new classes of security threats and challenges are introduced, such as licensed user emulation, selfish misbehaviors and unauthorized use of spectrum bands. To achieve successful deployment of CR technologies in practice, there is a critical need to advance the theoretical understanding of these entirely new classes of security threats and challenges. Therefore, in this paper, our primary objective is to identify and investigate the major known security threats within a CR network (CRN). Our secondary objective is to highlight on how potential threats exploit the vulnerabilities present at different layers of a communication stack.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129541918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7036005
Y. Daineko, V. Dmitriyev
The results of the software module "Virtual Physics Laboratory" were presented in the Higher Education system of the International University of Information Technologies (IITU). The information technology design and development, the structure of the virtual laboratory and its place in the system of Higher Education of IITU were described the same way as the principal regimes of operation of the program module in the system and methods for its use in the educational process.
{"title":"Software module \"Virtual Physics Laboratory\" in Higher Education","authors":"Y. Daineko, V. Dmitriyev","doi":"10.1109/ICAICT.2014.7036005","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036005","url":null,"abstract":"The results of the software module \"Virtual Physics Laboratory\" were presented in the Higher Education system of the International University of Information Technologies (IITU). The information technology design and development, the structure of the virtual laboratory and its place in the system of Higher Education of IITU were described the same way as the principal regimes of operation of the program module in the system and methods for its use in the educational process.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131218960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035944
N. Allakhverdiyeva
In this work two methods of seismic data preprocessing for cleaning them from the noise are discussed. The first method is based on the method of decomposition of seismic signal. The second method is based on the spectral analysis with the use of low-pass filtering of data.
{"title":"Preprocessing of experimental seismic data","authors":"N. Allakhverdiyeva","doi":"10.1109/ICAICT.2014.7035944","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035944","url":null,"abstract":"In this work two methods of seismic data preprocessing for cleaning them from the noise are discussed. The first method is based on the method of decomposition of seismic signal. The second method is based on the spectral analysis with the use of low-pass filtering of data.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134061918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035927
V. Shved, Pavel Kuzmich, V. Korzhuk
The audit of digital drives content, including hard disks, is an essential part of the audit in automated systems, including an aim to ensure the integrity of the software, and also with a view to establish the facts of use of third-party software. In this article we propose a method that allows identifying executable files compiled from the same source code for different versions of operating systems and also with minor changes to the source code.
{"title":"The method of an audit of software containing in digital drives","authors":"V. Shved, Pavel Kuzmich, V. Korzhuk","doi":"10.1109/ICAICT.2014.7035927","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035927","url":null,"abstract":"The audit of digital drives content, including hard disks, is an essential part of the audit in automated systems, including an aim to ensure the integrity of the software, and also with a view to establish the facts of use of third-party software. In this article we propose a method that allows identifying executable files compiled from the same source code for different versions of operating systems and also with minor changes to the source code.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133655954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICAICT.2014.7035923
V. Bova, V. Kureichik, A. Lezhebokov
The integrated model, covered mutually complementary methods and knowledge representation tools, is discussed. On the basis on the analysis of knowledge management information component under uncertainty the integrated model is introduced as an assembly of elements of a formal representation system for heterogeneous knowledge. In conformity with the present model the knowledge representation and processing language, as well as tools covering the total volume of the existing development requirements for knowledge databases of problem-oriented intelligent systems, are constructed.
{"title":"The integrated model of representation of problem-oriented knowledge in information systems","authors":"V. Bova, V. Kureichik, A. Lezhebokov","doi":"10.1109/ICAICT.2014.7035923","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035923","url":null,"abstract":"The integrated model, covered mutually complementary methods and knowledge representation tools, is discussed. On the basis on the analysis of knowledge management information component under uncertainty the integrated model is introduced as an assembly of elements of a formal representation system for heterogeneous knowledge. In conformity with the present model the knowledge representation and processing language, as well as tools covering the total volume of the existing development requirements for knowledge databases of problem-oriented intelligent systems, are constructed.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132297430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}