Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991710
M. Lyashov, A. Bereza, A. Babaev, J. Alekseenko, D.S. Nazvantsev
The paper provides a solution to the problem of uniting heterogeneous computing resources into a unified heterogeneous system using service-oriented architecture (SOA) and the conception of GRID-computing, where computing resources of clients are presented as a service. The use of SOA for creating GRID-systems will allow the clients to implement integration of not only local separated heterogeneous computing resources, but also geographically separated ones. The suggested platform is not intended to replace or displace other GRID-systems. Instead of this, it gives the possibility of using different platforms based on SOA in a unified computing process.
{"title":"The technique of creating distributed computing systems based on service-oriented architecture","authors":"M. Lyashov, A. Bereza, A. Babaev, J. Alekseenko, D.S. Nazvantsev","doi":"10.1109/ICAICT.2016.7991710","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991710","url":null,"abstract":"The paper provides a solution to the problem of uniting heterogeneous computing resources into a unified heterogeneous system using service-oriented architecture (SOA) and the conception of GRID-computing, where computing resources of clients are presented as a service. The use of SOA for creating GRID-systems will allow the clients to implement integration of not only local separated heterogeneous computing resources, but also geographically separated ones. The suggested platform is not intended to replace or displace other GRID-systems. Instead of this, it gives the possibility of using different platforms based on SOA in a unified computing process.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115356956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991778
D. Anufriev, O. Shikulskaya, Kanagat Dyusekeyev, M. Shikulskiy
Research object is the system of the differentiated compensation of higher education institution staff. The stimulation systems of higher education institution staff operating in Russia, Kazakhstan and other countries have been analysed by authors. The applied criteria of efficiency of higher education institutions in these countries are compared. Need of improvement of stimulation systems of higher education institution staff is proved. It is shown that the problem of staff qualification and efficiency of their work can be devided into two interconnected subtasks: definition of mechanism of the material stimulation of the higher education institution staff and formation of the flexible dynamic system of indicators adapted to the external conditions changing. For the first task solution the method of the system analysis was used, for the second task solution the methodology of the balanced system of indicators was used. As a result of the made research the strategic map, hierarchical system of criteria for evaluation of efficiency of activity of higher education institution staff are developed. Theoretical developments will be used in model of improvement of system of the differentiated compensation in higher education institution.
{"title":"Management of higher education institution staff activity efficiency on the basis of flexible stimulation system","authors":"D. Anufriev, O. Shikulskaya, Kanagat Dyusekeyev, M. Shikulskiy","doi":"10.1109/ICAICT.2016.7991778","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991778","url":null,"abstract":"Research object is the system of the differentiated compensation of higher education institution staff. The stimulation systems of higher education institution staff operating in Russia, Kazakhstan and other countries have been analysed by authors. The applied criteria of efficiency of higher education institutions in these countries are compared. Need of improvement of stimulation systems of higher education institution staff is proved. It is shown that the problem of staff qualification and efficiency of their work can be devided into two interconnected subtasks: definition of mechanism of the material stimulation of the higher education institution staff and formation of the flexible dynamic system of indicators adapted to the external conditions changing. For the first task solution the method of the system analysis was used, for the second task solution the methodology of the balanced system of indicators was used. As a result of the made research the strategic map, hierarchical system of criteria for evaluation of efficiency of activity of higher education institution staff are developed. Theoretical developments will be used in model of improvement of system of the differentiated compensation in higher education institution.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991707
A. D’Ambrogio, P. Gaudio, M. Gelfusa, M. Luglio, A. Malizia, C. Roseti, F. Zampognaro, Andrea Giglio, A. Pieroni, S. Marsella
The paper describes the project “Integrated technologies for fire monitoring and first alert” proposed by the authors to satisfy technical requirements of the Firefighter Bodies with particular attention to the monitoring of wood fires and release of chemical materials. The target system is composed of three sub-systems: sensors to detect target parameters, telecommunications to transfer sensor data in real time and for first alert management, fire evolution real time simulator to support decisions. The project aims also to integrate the three subsystems facing and solving technical/scientific issues to provide a significant applicative high value.
{"title":"Use of integrated technologies for fire monitoring and first alert","authors":"A. D’Ambrogio, P. Gaudio, M. Gelfusa, M. Luglio, A. Malizia, C. Roseti, F. Zampognaro, Andrea Giglio, A. Pieroni, S. Marsella","doi":"10.1109/ICAICT.2016.7991707","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991707","url":null,"abstract":"The paper describes the project “Integrated technologies for fire monitoring and first alert” proposed by the authors to satisfy technical requirements of the Firefighter Bodies with particular attention to the monitoring of wood fires and release of chemical materials. The target system is composed of three sub-systems: sensors to detect target parameters, telecommunications to transfer sensor data in real time and for first alert management, fire evolution real time simulator to support decisions. The project aims also to integrate the three subsystems facing and solving technical/scientific issues to provide a significant applicative high value.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":" 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120828749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991695
David Alade, S. Butakov, P. Zavarsky
The paper examines and evaluates specific features of the collection and transmission of personal information on some e-Government websites in Nigeria. It presents the adoption of a special publication on security and privacy requirement controls intended for the protection of information on e-Government web services. Among the websites assessed, only one transmitted the citizens Personal Identifiable Information (PII) data through a secured communication channel. The findings indicated that Nigerian e-Government policymakers/authorities would benefit from best practices on how they protect the collection, use, disclosure, retention, and disposal of recorded individual's personal information in their information systems. The scope of this paper was limited to only the Nigerian e-Government but could be used in other developing nations.
{"title":"Privacy protection in Nigerian E-Government systems","authors":"David Alade, S. Butakov, P. Zavarsky","doi":"10.1109/ICAICT.2016.7991695","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991695","url":null,"abstract":"The paper examines and evaluates specific features of the collection and transmission of personal information on some e-Government websites in Nigeria. It presents the adoption of a special publication on security and privacy requirement controls intended for the protection of information on e-Government web services. Among the websites assessed, only one transmitted the citizens Personal Identifiable Information (PII) data through a secured communication channel. The findings indicated that Nigerian e-Government policymakers/authorities would benefit from best practices on how they protect the collection, use, disclosure, retention, and disposal of recorded individual's personal information in their information systems. The scope of this paper was limited to only the Nigerian e-Government but could be used in other developing nations.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120951240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991776
L. Pankratova, Sergey A. Pankratov
This article considers e-democracy as a socio-political resource and technology of the etatist model of Russian modernization. Based on the results of theoretical and empirical studies the article reveals the positive / negative factors affecting the legitimacy of public authorities and governance, Russian citizens' involvement in the political process. The analysis is focused on the risks and threats, institutional distortions that appear in the process of implementing e-democracy, as well as society and state security. The paper is based on the materials obtained during realization by the authors of the grant supported by the Russian Foundation for Humanities and Administration of the Volgograd region. The perspectives of functioning of e-democracy in the context of implementation of innovative communication technologies are defined.
{"title":"Implementing E-democracy in Russia: Institutional resources and modernization risks","authors":"L. Pankratova, Sergey A. Pankratov","doi":"10.1109/ICAICT.2016.7991776","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991776","url":null,"abstract":"This article considers e-democracy as a socio-political resource and technology of the etatist model of Russian modernization. Based on the results of theoretical and empirical studies the article reveals the positive / negative factors affecting the legitimacy of public authorities and governance, Russian citizens' involvement in the political process. The analysis is focused on the risks and threats, institutional distortions that appear in the process of implementing e-democracy, as well as society and state security. The paper is based on the materials obtained during realization by the authors of the grant supported by the Russian Foundation for Humanities and Administration of the Volgograd region. The perspectives of functioning of e-democracy in the context of implementation of innovative communication technologies are defined.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126727722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991694
M. Styugin, V. Zolotarev, A. Prokhorov, Roman Gorbil
The paper presents a method based on moving target technology for protecting software components of distributed systems. Practical implementation of this method is a code diversifier, which adds intermediary functions and inserts transformation of key variables into the program code. Theoretical analysis of the method presented here demonstrated its effectiveness even when an adversary had access to a application's program code. The diversifier presented below can also function in a mode of program code obfuscation, which was tested and demonstrated by the example of interpreted programming language functions. Metrics obtained from the program code after obfuscation, showed sufficient level of code modification for independent use in obfuscation mode.
{"title":"New approach to software code diversification in interpreted languages based on the moving target technology","authors":"M. Styugin, V. Zolotarev, A. Prokhorov, Roman Gorbil","doi":"10.1109/ICAICT.2016.7991694","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991694","url":null,"abstract":"The paper presents a method based on moving target technology for protecting software components of distributed systems. Practical implementation of this method is a code diversifier, which adds intermediary functions and inserts transformation of key variables into the program code. Theoretical analysis of the method presented here demonstrated its effectiveness even when an adversary had access to a application's program code. The diversifier presented below can also function in a mode of program code obfuscation, which was tested and demonstrated by the example of interpreted programming language functions. Metrics obtained from the program code after obfuscation, showed sufficient level of code modification for independent use in obfuscation mode.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991668
R. K. Akhmadulin, I. Gluhih, I. Y. Karyakin
The article is dedicated to development of an object-oriented model of an intelligence system based on case-based reasoning (CBR). An upgrade of the decision tree has been introduced to represent the situations hierarchy and related decisions in the knowledge base. The construction of the situations tree has been described. The problem of representing the situations tree in terms of classes and objects has been solved and the method of storage of the situations tree in the database has been defined. As a result, on the basis of the object-oriented paradigm the proposed approach allows creating domain-independent CBR systems that are shells for filling with case-oriented knowledge to solve specific problems.
{"title":"An object-oriented model of case-based reasoning system using situations tree","authors":"R. K. Akhmadulin, I. Gluhih, I. Y. Karyakin","doi":"10.1109/ICAICT.2016.7991668","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991668","url":null,"abstract":"The article is dedicated to development of an object-oriented model of an intelligence system based on case-based reasoning (CBR). An upgrade of the decision tree has been introduced to represent the situations hierarchy and related decisions in the knowledge base. The construction of the situations tree has been described. The problem of representing the situations tree in terms of classes and objects has been solved and the method of storage of the situations tree in the database has been defined. As a result, on the basis of the object-oriented paradigm the proposed approach allows creating domain-independent CBR systems that are shells for filling with case-oriented knowledge to solve specific problems.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991679
Bozhenyuk Alexander, G. Evgeniya, I. Rozenberg
Present paper is devoted to defining the maximum amount of flow in dynamic graph with bounds of flow not equal to zero with the given vitality degree. The approach takes into account fuzziness of the network's parameters, values and measurements. The considered approach allows taking into account profitability of transportation via setting the bounds of flow not equal to zero. Peculiarity of present task is in considering the reliability of transportation, expressed by the vitality parameter and considering arcs with the required vitality. Considered graph is described as fuzzy lower and upper-capacitated network with vitality degrees and crisp values of the time-parameters. All parameters of the considered network can vary over time. These methods can be applied in the real railways, roads and air roads solving the task of the optimal cargo transportation.
{"title":"Approach to defining the maximum amount of flow in dynamic fuzzy network with the given vitality degree","authors":"Bozhenyuk Alexander, G. Evgeniya, I. Rozenberg","doi":"10.1109/ICAICT.2016.7991679","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991679","url":null,"abstract":"Present paper is devoted to defining the maximum amount of flow in dynamic graph with bounds of flow not equal to zero with the given vitality degree. The approach takes into account fuzziness of the network's parameters, values and measurements. The considered approach allows taking into account profitability of transportation via setting the bounds of flow not equal to zero. Peculiarity of present task is in considering the reliability of transportation, expressed by the vitality parameter and considering arcs with the required vitality. Considered graph is described as fuzzy lower and upper-capacitated network with vitality degrees and crisp values of the time-parameters. All parameters of the considered network can vary over time. These methods can be applied in the real railways, roads and air roads solving the task of the optimal cargo transportation.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122794324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991818
İhsan Hakan Köksal, Mete Eminağaoğlu, Buse Türkoğlu
The aim of this study is twofold. First one is to derive a feasible numerical prediction model for the duration of medical services in a medical institution that could be used by the hospital management within their quality assurance and improvement processes. The second aim is to develop a freeware software tool, which implements an adaptive artificial neural network-based fuzzy inference system with a user-friendly interface that can be effectively used by both technical and non-technical people. Some promising results have been obtained which show that both of these objectives have been successfully achieved to some extent.
{"title":"An adaptive network-based fuzzy inference system for estimating the duration of medical services: A case study","authors":"İhsan Hakan Köksal, Mete Eminağaoğlu, Buse Türkoğlu","doi":"10.1109/ICAICT.2016.7991818","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991818","url":null,"abstract":"The aim of this study is twofold. First one is to derive a feasible numerical prediction model for the duration of medical services in a medical institution that could be used by the hospital management within their quality assurance and improvement processes. The second aim is to develop a freeware software tool, which implements an adaptive artificial neural network-based fuzzy inference system with a user-friendly interface that can be effectively used by both technical and non-technical people. Some promising results have been obtained which show that both of these objectives have been successfully achieved to some extent.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128664093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991705
Zi-Han Lin, Duoyong Sun, Min Tang
Terrorist organizations are not completely independent, however, they frequently interact with each other. Emerging researches have studied the consequence and influential factors of these relationships. But there have rarely been given precise empirical analysis on its interactive strength and effectiveness. Social Network Analysis (SNA) is considered as an effective method to quantify and analyze relationship between different social actors. In this paper, our focus is the cooperation relations between terrorist organizations. Based on the terrorist incident dataset from 1970 to 2014, this paper establishes the cooperation network of terrorist organizations and studies its structural characteristic. The results have shown that both the states of cohesion and separated can be found in the cooperation network. The relationship between organizations is more closely in the central part of the network, and the organizations within the same subgroups have obvious similarities in political goals and activity regions. Additionally, some important organizations in the operational cooperation have been identified. The removing of these organizations will have a significant impact on the cooperation network structure.
{"title":"Research on the structural characteristic of global terrorist organization cooperation network","authors":"Zi-Han Lin, Duoyong Sun, Min Tang","doi":"10.1109/ICAICT.2016.7991705","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991705","url":null,"abstract":"Terrorist organizations are not completely independent, however, they frequently interact with each other. Emerging researches have studied the consequence and influential factors of these relationships. But there have rarely been given precise empirical analysis on its interactive strength and effectiveness. Social Network Analysis (SNA) is considered as an effective method to quantify and analyze relationship between different social actors. In this paper, our focus is the cooperation relations between terrorist organizations. Based on the terrorist incident dataset from 1970 to 2014, this paper establishes the cooperation network of terrorist organizations and studies its structural characteristic. The results have shown that both the states of cohesion and separated can be found in the cooperation network. The relationship between organizations is more closely in the central part of the network, and the organizations within the same subgroups have obvious similarities in political goals and activity regions. Additionally, some important organizations in the operational cooperation have been identified. The removing of these organizations will have a significant impact on the cooperation network structure.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121920503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}