首页 > 最新文献

2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)最新文献

英文 中文
The technique of creating distributed computing systems based on service-oriented architecture 基于面向服务的体系结构创建分布式计算系统的技术
M. Lyashov, A. Bereza, A. Babaev, J. Alekseenko, D.S. Nazvantsev
The paper provides a solution to the problem of uniting heterogeneous computing resources into a unified heterogeneous system using service-oriented architecture (SOA) and the conception of GRID-computing, where computing resources of clients are presented as a service. The use of SOA for creating GRID-systems will allow the clients to implement integration of not only local separated heterogeneous computing resources, but also geographically separated ones. The suggested platform is not intended to replace or displace other GRID-systems. Instead of this, it gives the possibility of using different platforms based on SOA in a unified computing process.
利用面向服务的体系结构(SOA)和网格计算(GRID-computing)的概念,将客户端计算资源以服务的形式呈现,提出了将异构计算资源统一为异构系统的解决方案。使用SOA创建grid系统将允许客户不仅实现本地分离的异构计算资源的集成,而且还实现地理上分离的异构计算资源的集成。建议的平台不打算取代或取代其他网格系统。相反,它提供了在统一计算过程中使用基于SOA的不同平台的可能性。
{"title":"The technique of creating distributed computing systems based on service-oriented architecture","authors":"M. Lyashov, A. Bereza, A. Babaev, J. Alekseenko, D.S. Nazvantsev","doi":"10.1109/ICAICT.2016.7991710","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991710","url":null,"abstract":"The paper provides a solution to the problem of uniting heterogeneous computing resources into a unified heterogeneous system using service-oriented architecture (SOA) and the conception of GRID-computing, where computing resources of clients are presented as a service. The use of SOA for creating GRID-systems will allow the clients to implement integration of not only local separated heterogeneous computing resources, but also geographically separated ones. The suggested platform is not intended to replace or displace other GRID-systems. Instead of this, it gives the possibility of using different platforms based on SOA in a unified computing process.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115356956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Management of higher education institution staff activity efficiency on the basis of flexible stimulation system 基于柔性激励制度的高校员工活动效率管理
D. Anufriev, O. Shikulskaya, Kanagat Dyusekeyev, M. Shikulskiy
Research object is the system of the differentiated compensation of higher education institution staff. The stimulation systems of higher education institution staff operating in Russia, Kazakhstan and other countries have been analysed by authors. The applied criteria of efficiency of higher education institutions in these countries are compared. Need of improvement of stimulation systems of higher education institution staff is proved. It is shown that the problem of staff qualification and efficiency of their work can be devided into two interconnected subtasks: definition of mechanism of the material stimulation of the higher education institution staff and formation of the flexible dynamic system of indicators adapted to the external conditions changing. For the first task solution the method of the system analysis was used, for the second task solution the methodology of the balanced system of indicators was used. As a result of the made research the strategic map, hierarchical system of criteria for evaluation of efficiency of activity of higher education institution staff are developed. Theoretical developments will be used in model of improvement of system of the differentiated compensation in higher education institution.
研究对象是高等院校工作人员差别化薪酬制度。本文对俄罗斯、哈萨克斯坦等国高校员工激励制度进行了分析。比较了各国高等教育机构效率的适用标准。论证了高校职工激励制度的完善必要性。研究表明,高校工作人员素质和工作效率问题可分为两个相互关联的子任务:确定高校工作人员物质激励机制和形成适应外部条件变化的灵活动态指标体系。对于第一个任务解决方案采用了系统分析的方法,对于第二个任务解决方案采用了指标平衡系统的方法。在对战略地图进行研究的基础上,建立了高校员工活动效率评价标准的层次体系。在此基础上,提出了完善高校差别化薪酬制度的理论模型。
{"title":"Management of higher education institution staff activity efficiency on the basis of flexible stimulation system","authors":"D. Anufriev, O. Shikulskaya, Kanagat Dyusekeyev, M. Shikulskiy","doi":"10.1109/ICAICT.2016.7991778","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991778","url":null,"abstract":"Research object is the system of the differentiated compensation of higher education institution staff. The stimulation systems of higher education institution staff operating in Russia, Kazakhstan and other countries have been analysed by authors. The applied criteria of efficiency of higher education institutions in these countries are compared. Need of improvement of stimulation systems of higher education institution staff is proved. It is shown that the problem of staff qualification and efficiency of their work can be devided into two interconnected subtasks: definition of mechanism of the material stimulation of the higher education institution staff and formation of the flexible dynamic system of indicators adapted to the external conditions changing. For the first task solution the method of the system analysis was used, for the second task solution the methodology of the balanced system of indicators was used. As a result of the made research the strategic map, hierarchical system of criteria for evaluation of efficiency of activity of higher education institution staff are developed. Theoretical developments will be used in model of improvement of system of the differentiated compensation in higher education institution.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of integrated technologies for fire monitoring and first alert 采用综合技术进行火灾监测和首次警报
A. D’Ambrogio, P. Gaudio, M. Gelfusa, M. Luglio, A. Malizia, C. Roseti, F. Zampognaro, Andrea Giglio, A. Pieroni, S. Marsella
The paper describes the project “Integrated technologies for fire monitoring and first alert” proposed by the authors to satisfy technical requirements of the Firefighter Bodies with particular attention to the monitoring of wood fires and release of chemical materials. The target system is composed of three sub-systems: sensors to detect target parameters, telecommunications to transfer sensor data in real time and for first alert management, fire evolution real time simulator to support decisions. The project aims also to integrate the three subsystems facing and solving technical/scientific issues to provide a significant applicative high value.
本文介绍了为满足消防机构的技术要求,特别是对木材火灾和化学物质释放的监测,作者提出的“火灾监测与预警综合技术”项目。目标系统由三个子系统组成:用于探测目标参数的传感器、用于实时传输传感器数据的电信系统、用于首次警报管理的火情演变实时模拟器。该项目还旨在整合三个子系统,面对和解决技术/科学问题,以提供重要的高应用价值。
{"title":"Use of integrated technologies for fire monitoring and first alert","authors":"A. D’Ambrogio, P. Gaudio, M. Gelfusa, M. Luglio, A. Malizia, C. Roseti, F. Zampognaro, Andrea Giglio, A. Pieroni, S. Marsella","doi":"10.1109/ICAICT.2016.7991707","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991707","url":null,"abstract":"The paper describes the project “Integrated technologies for fire monitoring and first alert” proposed by the authors to satisfy technical requirements of the Firefighter Bodies with particular attention to the monitoring of wood fires and release of chemical materials. The target system is composed of three sub-systems: sensors to detect target parameters, telecommunications to transfer sensor data in real time and for first alert management, fire evolution real time simulator to support decisions. The project aims also to integrate the three subsystems facing and solving technical/scientific issues to provide a significant applicative high value.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":" 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120828749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Privacy protection in Nigerian E-Government systems 尼日利亚电子政务系统中的隐私保护
David Alade, S. Butakov, P. Zavarsky
The paper examines and evaluates specific features of the collection and transmission of personal information on some e-Government websites in Nigeria. It presents the adoption of a special publication on security and privacy requirement controls intended for the protection of information on e-Government web services. Among the websites assessed, only one transmitted the citizens Personal Identifiable Information (PII) data through a secured communication channel. The findings indicated that Nigerian e-Government policymakers/authorities would benefit from best practices on how they protect the collection, use, disclosure, retention, and disposal of recorded individual's personal information in their information systems. The scope of this paper was limited to only the Nigerian e-Government but could be used in other developing nations.
本文对尼日利亚一些电子政务网站收集和传输个人信息的具体特点进行了考察和评价。政府现正采用一份有关保安及私隐规定管制的特别刊物,以保障电子政府网上服务的资料。在被评估的网站中,只有一家网站通过安全的通信渠道传输了公民的个人身份信息(PII)。调查结果表明,尼日利亚电子政务决策者/当局将受益于如何保护其信息系统中已记录的个人信息的收集、使用、披露、保留和处置的最佳实践。本文的范围仅限于尼日利亚的电子政务,但可以在其他发展中国家使用。
{"title":"Privacy protection in Nigerian E-Government systems","authors":"David Alade, S. Butakov, P. Zavarsky","doi":"10.1109/ICAICT.2016.7991695","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991695","url":null,"abstract":"The paper examines and evaluates specific features of the collection and transmission of personal information on some e-Government websites in Nigeria. It presents the adoption of a special publication on security and privacy requirement controls intended for the protection of information on e-Government web services. Among the websites assessed, only one transmitted the citizens Personal Identifiable Information (PII) data through a secured communication channel. The findings indicated that Nigerian e-Government policymakers/authorities would benefit from best practices on how they protect the collection, use, disclosure, retention, and disposal of recorded individual's personal information in their information systems. The scope of this paper was limited to only the Nigerian e-Government but could be used in other developing nations.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120951240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementing E-democracy in Russia: Institutional resources and modernization risks 俄罗斯实施电子民主:制度资源与现代化风险
L. Pankratova, Sergey A. Pankratov
This article considers e-democracy as a socio-political resource and technology of the etatist model of Russian modernization. Based on the results of theoretical and empirical studies the article reveals the positive / negative factors affecting the legitimacy of public authorities and governance, Russian citizens' involvement in the political process. The analysis is focused on the risks and threats, institutional distortions that appear in the process of implementing e-democracy, as well as society and state security. The paper is based on the materials obtained during realization by the authors of the grant supported by the Russian Foundation for Humanities and Administration of the Volgograd region. The perspectives of functioning of e-democracy in the context of implementation of innovative communication technologies are defined.
本文认为电子民主是俄罗斯现代化的国家主义模式的社会政治资源和技术。基于理论和实证研究的结果,本文揭示了影响公共权力和治理合法性、俄罗斯公民参与政治进程的积极/消极因素。分析的重点是风险和威胁,在实施电子民主的过程中出现的制度扭曲,以及社会和国家安全。本文基于作者在伏尔加格勒地区人文与行政基金会资助的项目中获得的资料。定义了在实施创新通信技术的背景下电子民主的功能视角。
{"title":"Implementing E-democracy in Russia: Institutional resources and modernization risks","authors":"L. Pankratova, Sergey A. Pankratov","doi":"10.1109/ICAICT.2016.7991776","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991776","url":null,"abstract":"This article considers e-democracy as a socio-political resource and technology of the etatist model of Russian modernization. Based on the results of theoretical and empirical studies the article reveals the positive / negative factors affecting the legitimacy of public authorities and governance, Russian citizens' involvement in the political process. The analysis is focused on the risks and threats, institutional distortions that appear in the process of implementing e-democracy, as well as society and state security. The paper is based on the materials obtained during realization by the authors of the grant supported by the Russian Foundation for Humanities and Administration of the Volgograd region. The perspectives of functioning of e-democracy in the context of implementation of innovative communication technologies are defined.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126727722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New approach to software code diversification in interpreted languages based on the moving target technology 基于移动目标技术的解释语言软件代码多样化新方法
M. Styugin, V. Zolotarev, A. Prokhorov, Roman Gorbil
The paper presents a method based on moving target technology for protecting software components of distributed systems. Practical implementation of this method is a code diversifier, which adds intermediary functions and inserts transformation of key variables into the program code. Theoretical analysis of the method presented here demonstrated its effectiveness even when an adversary had access to a application's program code. The diversifier presented below can also function in a mode of program code obfuscation, which was tested and demonstrated by the example of interpreted programming language functions. Metrics obtained from the program code after obfuscation, showed sufficient level of code modification for independent use in obfuscation mode.
提出了一种基于移动目标技术的分布式系统软件组件保护方法。该方法的实际实现是一个代码分配器,它在程序代码中增加了中间函数并插入了关键变量的转换。对本文提出的方法的理论分析表明,即使攻击者能够访问应用程序的程序代码,该方法也是有效的。下面介绍的多样化器也可以在程序代码混淆模式下运行,这是通过解释的编程语言函数的示例进行测试和演示的。从混淆后的程序代码中获得的度量,显示了在混淆模式下独立使用的足够级别的代码修改。
{"title":"New approach to software code diversification in interpreted languages based on the moving target technology","authors":"M. Styugin, V. Zolotarev, A. Prokhorov, Roman Gorbil","doi":"10.1109/ICAICT.2016.7991694","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991694","url":null,"abstract":"The paper presents a method based on moving target technology for protecting software components of distributed systems. Practical implementation of this method is a code diversifier, which adds intermediary functions and inserts transformation of key variables into the program code. Theoretical analysis of the method presented here demonstrated its effectiveness even when an adversary had access to a application's program code. The diversifier presented below can also function in a mode of program code obfuscation, which was tested and demonstrated by the example of interpreted programming language functions. Metrics obtained from the program code after obfuscation, showed sufficient level of code modification for independent use in obfuscation mode.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An object-oriented model of case-based reasoning system using situations tree 基于情境树的面向对象推理系统模型
R. K. Akhmadulin, I. Gluhih, I. Y. Karyakin
The article is dedicated to development of an object-oriented model of an intelligence system based on case-based reasoning (CBR). An upgrade of the decision tree has been introduced to represent the situations hierarchy and related decisions in the knowledge base. The construction of the situations tree has been described. The problem of representing the situations tree in terms of classes and objects has been solved and the method of storage of the situations tree in the database has been defined. As a result, on the basis of the object-oriented paradigm the proposed approach allows creating domain-independent CBR systems that are shells for filling with case-oriented knowledge to solve specific problems.
本文致力于开发基于案例推理(CBR)的智能系统的面向对象模型。引入了一种改进的决策树来表示知识库中的情况层次和相关决策。描述了情景树的构造。解决了用类和对象表示情景树的问题,定义了情景树在数据库中的存储方法。因此,在面向对象范例的基础上,建议的方法允许创建独立于领域的CBR系统,这些系统是填充面向案例的知识以解决特定问题的外壳。
{"title":"An object-oriented model of case-based reasoning system using situations tree","authors":"R. K. Akhmadulin, I. Gluhih, I. Y. Karyakin","doi":"10.1109/ICAICT.2016.7991668","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991668","url":null,"abstract":"The article is dedicated to development of an object-oriented model of an intelligence system based on case-based reasoning (CBR). An upgrade of the decision tree has been introduced to represent the situations hierarchy and related decisions in the knowledge base. The construction of the situations tree has been described. The problem of representing the situations tree in terms of classes and objects has been solved and the method of storage of the situations tree in the database has been defined. As a result, on the basis of the object-oriented paradigm the proposed approach allows creating domain-independent CBR systems that are shells for filling with case-oriented knowledge to solve specific problems.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Approach to defining the maximum amount of flow in dynamic fuzzy network with the given vitality degree 给定活力度的动态模糊网络最大流量定义方法
Bozhenyuk Alexander, G. Evgeniya, I. Rozenberg
Present paper is devoted to defining the maximum amount of flow in dynamic graph with bounds of flow not equal to zero with the given vitality degree. The approach takes into account fuzziness of the network's parameters, values and measurements. The considered approach allows taking into account profitability of transportation via setting the bounds of flow not equal to zero. Peculiarity of present task is in considering the reliability of transportation, expressed by the vitality parameter and considering arcs with the required vitality. Considered graph is described as fuzzy lower and upper-capacitated network with vitality degrees and crisp values of the time-parameters. All parameters of the considered network can vary over time. These methods can be applied in the real railways, roads and air roads solving the task of the optimal cargo transportation.
在给定活力度的情况下,研究了流动边界不等于零的动态图中最大流量的定义问题。该方法考虑了网络参数、值和测量值的模糊性。所考虑的方法允许通过设置流量边界不等于零来考虑运输的盈利能力。本课题的特点是考虑了运输的可靠性,用活力参数表示,考虑了具有所需活力的弧线。考虑图被描述为具有活力度和清晰时间参数值的模糊上下容网络。所考虑的网络的所有参数都可以随时间变化。这些方法可以应用于实际的铁路、公路和航空道路,解决货物运输的最优问题。
{"title":"Approach to defining the maximum amount of flow in dynamic fuzzy network with the given vitality degree","authors":"Bozhenyuk Alexander, G. Evgeniya, I. Rozenberg","doi":"10.1109/ICAICT.2016.7991679","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991679","url":null,"abstract":"Present paper is devoted to defining the maximum amount of flow in dynamic graph with bounds of flow not equal to zero with the given vitality degree. The approach takes into account fuzziness of the network's parameters, values and measurements. The considered approach allows taking into account profitability of transportation via setting the bounds of flow not equal to zero. Peculiarity of present task is in considering the reliability of transportation, expressed by the vitality parameter and considering arcs with the required vitality. Considered graph is described as fuzzy lower and upper-capacitated network with vitality degrees and crisp values of the time-parameters. All parameters of the considered network can vary over time. These methods can be applied in the real railways, roads and air roads solving the task of the optimal cargo transportation.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122794324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive network-based fuzzy inference system for estimating the duration of medical services: A case study 基于自适应网络的医疗服务持续时间模糊推理系统:一个案例研究
İhsan Hakan Köksal, Mete Eminağaoğlu, Buse Türkoğlu
The aim of this study is twofold. First one is to derive a feasible numerical prediction model for the duration of medical services in a medical institution that could be used by the hospital management within their quality assurance and improvement processes. The second aim is to develop a freeware software tool, which implements an adaptive artificial neural network-based fuzzy inference system with a user-friendly interface that can be effectively used by both technical and non-technical people. Some promising results have been obtained which show that both of these objectives have been successfully achieved to some extent.
这项研究的目的是双重的。一是推导出一个可行的医疗机构医疗服务持续时间的数值预测模型,供医院管理部门在质量保证和改进过程中使用。第二个目标是开发一个免费软件工具,它实现了一个基于人工神经网络的自适应模糊推理系统,具有用户友好的界面,可以被技术人员和非技术人员有效地使用。一些有希望的结果表明,这两个目标都在一定程度上成功地实现了。
{"title":"An adaptive network-based fuzzy inference system for estimating the duration of medical services: A case study","authors":"İhsan Hakan Köksal, Mete Eminağaoğlu, Buse Türkoğlu","doi":"10.1109/ICAICT.2016.7991818","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991818","url":null,"abstract":"The aim of this study is twofold. First one is to derive a feasible numerical prediction model for the duration of medical services in a medical institution that could be used by the hospital management within their quality assurance and improvement processes. The second aim is to develop a freeware software tool, which implements an adaptive artificial neural network-based fuzzy inference system with a user-friendly interface that can be effectively used by both technical and non-technical people. Some promising results have been obtained which show that both of these objectives have been successfully achieved to some extent.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128664093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the structural characteristic of global terrorist organization cooperation network 全球恐怖组织合作网络结构特征研究
Zi-Han Lin, Duoyong Sun, Min Tang
Terrorist organizations are not completely independent, however, they frequently interact with each other. Emerging researches have studied the consequence and influential factors of these relationships. But there have rarely been given precise empirical analysis on its interactive strength and effectiveness. Social Network Analysis (SNA) is considered as an effective method to quantify and analyze relationship between different social actors. In this paper, our focus is the cooperation relations between terrorist organizations. Based on the terrorist incident dataset from 1970 to 2014, this paper establishes the cooperation network of terrorist organizations and studies its structural characteristic. The results have shown that both the states of cohesion and separated can be found in the cooperation network. The relationship between organizations is more closely in the central part of the network, and the organizations within the same subgroups have obvious similarities in political goals and activity regions. Additionally, some important organizations in the operational cooperation have been identified. The removing of these organizations will have a significant impact on the cooperation network structure.
恐怖组织并不是完全独立的,但他们之间经常有互动。新兴研究对这些关系的后果和影响因素进行了研究。但对其互动强度和有效性的实证分析却很少。社会网络分析(Social Network Analysis, SNA)被认为是量化和分析不同社会行为者之间关系的有效方法。本文的研究重点是恐怖组织之间的合作关系。本文基于1970 - 2014年的恐怖事件数据集,建立了恐怖组织的合作网络,并研究了其结构特征。结果表明,在合作网络中存在着内聚和分离两种状态。网络中心部分的组织间关系更为密切,同一子群内的组织在政治目标和活动区域上有明显的相似性。此外,还确定了业务合作中的一些重要组织。这些组织的移除将对合作网络结构产生重大影响。
{"title":"Research on the structural characteristic of global terrorist organization cooperation network","authors":"Zi-Han Lin, Duoyong Sun, Min Tang","doi":"10.1109/ICAICT.2016.7991705","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991705","url":null,"abstract":"Terrorist organizations are not completely independent, however, they frequently interact with each other. Emerging researches have studied the consequence and influential factors of these relationships. But there have rarely been given precise empirical analysis on its interactive strength and effectiveness. Social Network Analysis (SNA) is considered as an effective method to quantify and analyze relationship between different social actors. In this paper, our focus is the cooperation relations between terrorist organizations. Based on the terrorist incident dataset from 1970 to 2014, this paper establishes the cooperation network of terrorist organizations and studies its structural characteristic. The results have shown that both the states of cohesion and separated can be found in the cooperation network. The relationship between organizations is more closely in the central part of the network, and the organizations within the same subgroups have obvious similarities in political goals and activity regions. Additionally, some important organizations in the operational cooperation have been identified. The removing of these organizations will have a significant impact on the cooperation network structure.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121920503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1