Pub Date : 2011-11-10DOI: 10.1109/IDAACS.2011.6072796
M. Dorozhovets, Anton Prygrodsky
In this paper the two conductivity distribution reconstruction algorithms are presented. The first based on the previous resistivity reconstruction and the second one based on the usage of the inverse measured voltages. Efficiency of the presented algorithms compared with the direct conductivity distribution. Modeling results shows that these two algorithms provide better convergence of the iteration process of solving the inverse tomography problem.
{"title":"Investigation of the direct and indirect conductivity distribution image reconstruction algorithms in electrical tomography","authors":"M. Dorozhovets, Anton Prygrodsky","doi":"10.1109/IDAACS.2011.6072796","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072796","url":null,"abstract":"In this paper the two conductivity distribution reconstruction algorithms are presented. The first based on the previous resistivity reconstruction and the second one based on the usage of the inverse measured voltages. Efficiency of the presented algorithms compared with the direct conductivity distribution. Modeling results shows that these two algorithms provide better convergence of the iteration process of solving the inverse tomography problem.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123170270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-10DOI: 10.1109/IDAACS.2011.6072874
Sergiy Lysenko, O. Savenko
New technique for computer system Trojan diagnosis in monitor mode which uses fuzzy logic and allows improving reliability and efficiency is developed.
提出了一种基于模糊逻辑的监控模式下计算机系统木马诊断新技术,提高了系统的可靠性和效率。
{"title":"The technique for computer systems Trojan diagnosis in the monitor mode","authors":"Sergiy Lysenko, O. Savenko","doi":"10.1109/IDAACS.2011.6072874","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072874","url":null,"abstract":"New technique for computer system Trojan diagnosis in monitor mode which uses fuzzy logic and allows improving reliability and efficiency is developed.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124945493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-10DOI: 10.1109/IDAACS.2011.6072751
J. Caiko, N. Kunicina, A. Patlins, A. Galkina
Wireless technology, which has boomed in the IT sector over the past years, can be suitable for industrial control networks as well, providing solutions for diagnostics, control and safety. This paper aims to develop a hybrid communication network for a network control system (NCS), by integrating the control area network (CAN) and IEEE 802.11 protocol to improve the quality of service without affecting the stability.
{"title":"Analysis and simulation of hybrid network for industrial automation","authors":"J. Caiko, N. Kunicina, A. Patlins, A. Galkina","doi":"10.1109/IDAACS.2011.6072751","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072751","url":null,"abstract":"Wireless technology, which has boomed in the IT sector over the past years, can be suitable for industrial control networks as well, providing solutions for diagnostics, control and safety. This paper aims to develop a hybrid communication network for a network control system (NCS), by integrating the control area network (CAN) and IEEE 802.11 protocol to improve the quality of service without affecting the stability.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122775167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-10DOI: 10.1109/IDAACS.2011.6072717
M. Budnyk, Volodymyr Sosnytskyi, I. Voitovych, V. Maiko, Y. Minov, P. Sutkovyi, Oleksandr Zakorchenyi, T. Ryzhenko, V. Budnyk
Detail description of hardware and software of novel Ukrainian generation of magnetocardiographic apparatus — cardiomagnetic scanner CARDIOMAGSCAN have been presented. This cheaper supersensitive device includes 4 signal SQUID-channels, electrocardiograph, and automatic electromechanical system for patient scanning. Scanner is enabled to perform observation of the human heart during 15 minutes at unshielded environment. Device is intended to non-invasive medical diagnostics of cardiology diseases with help of advanced software including early stages, difficult-to-diagnose cases, and asymptomatic forms.
{"title":"Development of 4-channel cardiomagnetic scaner and technical requirements for 9-channel scaner to diagnose the heart abnormalities","authors":"M. Budnyk, Volodymyr Sosnytskyi, I. Voitovych, V. Maiko, Y. Minov, P. Sutkovyi, Oleksandr Zakorchenyi, T. Ryzhenko, V. Budnyk","doi":"10.1109/IDAACS.2011.6072717","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072717","url":null,"abstract":"Detail description of hardware and software of novel Ukrainian generation of magnetocardiographic apparatus — cardiomagnetic scanner CARDIOMAGSCAN have been presented. This cheaper supersensitive device includes 4 signal SQUID-channels, electrocardiograph, and automatic electromechanical system for patient scanning. Scanner is enabled to perform observation of the human heart during 15 minutes at unshielded environment. Device is intended to non-invasive medical diagnostics of cardiology diseases with help of advanced software including early stages, difficult-to-diagnose cases, and asymptomatic forms.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-10DOI: 10.1109/IDAACS.2011.6072916
O. Pomorova, T. Hovorushchenko
This paper represents the artificial neural network's method of design results evaluation and software quality characteristics prediction (NMEP) and the analysis of results of realized artificial neural network (ANN) training and functioning.
{"title":"Research of artificial neural network's component of software quality evaluation and prediction method","authors":"O. Pomorova, T. Hovorushchenko","doi":"10.1109/IDAACS.2011.6072916","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072916","url":null,"abstract":"This paper represents the artificial neural network's method of design results evaluation and software quality characteristics prediction (NMEP) and the analysis of results of realized artificial neural network (ANN) training and functioning.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129348025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-10DOI: 10.1109/IDAACS.2011.6072883
Eileen Kuehn, J. Reinhardt, Stephan Bergemann, J. Sieck
This paper presents two different approaches to visualise information from culture and creative industries by using RFID based tracking and identification as well as Wi-Fi for the communication between the different components. Besides the required RFID backend, the paper also introduces a multi media information system built on top of the backend. The first approach is based on passive RFID whereas the second uses active RFID. In particular, the differences in the processing of system events, delivery of needed information and the implemented infrastructure will be discussed and evaluated.
{"title":"Multimedia and wireless communication in culture and creative industries","authors":"Eileen Kuehn, J. Reinhardt, Stephan Bergemann, J. Sieck","doi":"10.1109/IDAACS.2011.6072883","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072883","url":null,"abstract":"This paper presents two different approaches to visualise information from culture and creative industries by using RFID based tracking and identification as well as Wi-Fi for the communication between the different components. Besides the required RFID backend, the paper also introduces a multi media information system built on top of the backend. The first approach is based on passive RFID whereas the second uses active RFID. In particular, the differences in the processing of system events, delivery of needed information and the implemented infrastructure will be discussed and evaluated.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129373026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-10DOI: 10.1109/IDAACS.2011.6072865
V. Golovko, Sergei V. Bezobrazov, Vasilii Melianchuk, M. Komar
In this paper we present the basic principles of the evolution of detectors in intelligent malware detection system. This system based on integration of both AI methods: artificial neural networks and artificial immune systems. The goal of the evolution is adaptation of detectors to new, unknown malicious code for increasing of quality of detection.
{"title":"Evolution of immune detectors in intelligent security system for malware detection","authors":"V. Golovko, Sergei V. Bezobrazov, Vasilii Melianchuk, M. Komar","doi":"10.1109/IDAACS.2011.6072865","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072865","url":null,"abstract":"In this paper we present the basic principles of the evolution of detectors in intelligent malware detection system. This system based on integration of both AI methods: artificial neural networks and artificial immune systems. The goal of the evolution is adaptation of detectors to new, unknown malicious code for increasing of quality of detection.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124663754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-10DOI: 10.1109/IDAACS.2011.6072805
F. Lamonaca, D. Grimaldi, A. Nastro
The Image Flow-Cytometer permits to acquire the cell images of the lymphocytes. These images are used to count the Micro Nucleuses (MNs) induced in the cells by carcinogenic agents. The result of the count is widely used for analysis of cytogenetic damage. The acquisition is performed under the hypothesis of laminar flow of the lymphocyte. Nevertheless, many are the causes that make invalid this hypothesis and cause alterations during the image acquisition. The final effect is the presence of different alterations superimposed to the images, that misstate the algorithms used to detect the MNs. In order to reduce the number of images affected by not admissible alteration range, and to increase the reliability of the medical response, a new hardware system is pointed out to synchronize with high accuracy the image acquisition to the lymphocyte flow.
{"title":"Synchronization in the image Flow Cytometer","authors":"F. Lamonaca, D. Grimaldi, A. Nastro","doi":"10.1109/IDAACS.2011.6072805","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072805","url":null,"abstract":"The Image Flow-Cytometer permits to acquire the cell images of the lymphocytes. These images are used to count the Micro Nucleuses (MNs) induced in the cells by carcinogenic agents. The result of the count is widely used for analysis of cytogenetic damage. The acquisition is performed under the hypothesis of laminar flow of the lymphocyte. Nevertheless, many are the causes that make invalid this hypothesis and cause alterations during the image acquisition. The final effect is the presence of different alterations superimposed to the images, that misstate the algorithms used to detect the MNs. In order to reduce the number of images affected by not admissible alteration range, and to increase the reliability of the medical response, a new hardware system is pointed out to synchronize with high accuracy the image acquisition to the lymphocyte flow.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130168571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-10DOI: 10.1109/IDAACS.2011.6072866
V. Jotsov
A set of conflict resolution methods is investigated with the purpose to construct knowledge refinement and self-learning tools applicable in a wide range of security systems (SS). The introduction of ontologies simplifies the detection process and lowers the complexity of the machine learning procedures. Different conflict resolution ways lead to particular autonomous/intelligent applications in different types of SS. The proposed self-learning methods are combinable with other web/data mining, anomaly detection, statistical methods, and show new ways in the development of collective evolutionary systems.
{"title":"Machine self-learning applications in security systems","authors":"V. Jotsov","doi":"10.1109/IDAACS.2011.6072866","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072866","url":null,"abstract":"A set of conflict resolution methods is investigated with the purpose to construct knowledge refinement and self-learning tools applicable in a wide range of security systems (SS). The introduction of ontologies simplifies the detection process and lowers the complexity of the machine learning procedures. Different conflict resolution ways lead to particular autonomous/intelligent applications in different types of SS. The proposed self-learning methods are combinable with other web/data mining, anomaly detection, statistical methods, and show new ways in the development of collective evolutionary systems.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121090880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-10DOI: 10.1109/IDAACS.2011.6072903
Katrin Loehr, Rao Aamir Khan
The PMI standards on project management are extended and processes for project finance management are defined. Finance management for projects is compared with finance management for programs with focus on the first process of the PMI standard on Program Management “Establish Program Financial Framework”.
{"title":"Project finance — On new standards for processes in project and Program Management","authors":"Katrin Loehr, Rao Aamir Khan","doi":"10.1109/IDAACS.2011.6072903","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072903","url":null,"abstract":"The PMI standards on project management are extended and processes for project finance management are defined. Finance management for projects is compared with finance management for programs with focus on the first process of the PMI standard on Program Management “Establish Program Financial Framework”.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126122553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}