Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991717
N. Moroz, A. Starostenko, R. Gorbachev, N. Kuznetsov
The work is devoted to construction of mathematical model of movement of the passenger wagon and algorithm of identification of parameters of mathematical model, as well as demonstration of efficiency of this algorithm through simulation of the process of identification for selected mode of acceleration.
{"title":"Simulation of identification process of parameters of movement of the wagon on monorail transport","authors":"N. Moroz, A. Starostenko, R. Gorbachev, N. Kuznetsov","doi":"10.1109/ICAICT.2016.7991717","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991717","url":null,"abstract":"The work is devoted to construction of mathematical model of movement of the passenger wagon and algorithm of identification of parameters of mathematical model, as well as demonstration of efficiency of this algorithm through simulation of the process of identification for selected mode of acceleration.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116224981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991730
T. Manglayev, Refik Caglar Kizilirmak, Y. Kho
An optimum power allocation scheme for non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC) technique for downlink channels of next generation cellular networks is proposed in this paper. In NOMA downlinks, the signals for each user are superimposed at the transmitter side and SIC is implemented at the receiver side to separate them. Numerical results show that the overall system throughput performance can be improved significantly by the proposed power allocation algorithm with NOMA in comparison with orthogonal multiple access (OMA), which is implemented in previous wireless telephone technology generations.
{"title":"Optimum power allocation for non-orthogonal multiple access (NOMA)","authors":"T. Manglayev, Refik Caglar Kizilirmak, Y. Kho","doi":"10.1109/ICAICT.2016.7991730","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991730","url":null,"abstract":"An optimum power allocation scheme for non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC) technique for downlink channels of next generation cellular networks is proposed in this paper. In NOMA downlinks, the signals for each user are superimposed at the transmitter side and SIC is implemented at the receiver side to separate them. Numerical results show that the overall system throughput performance can be improved significantly by the proposed power allocation algorithm with NOMA in comparison with orthogonal multiple access (OMA), which is implemented in previous wireless telephone technology generations.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991700
Vali Tawosi
User authorization in software systems is and has been a serious security concern for a long time. Attribute based Access Control (ABAC), as a new model of user authorization, makes it possible to restrict user access based on rules against different attributes. In the context of service access control in enterprise systems, it seems necessary to separate business rules from service logic and user authorization mechanism. This paper is an experimental report on the implementation of an ABAC module in which business rules are used to restrict user access to the services. The ever changing nature of the business rules in an enterprise system made a necessity to the proposal of such a light weight dynamic attribute based access control module, in which end user is able to change access policies and business rules in run time. Challenges of building this module are revealed and plausible solutions which have been put in place are reported.
{"title":"A light weight dynamic attribute based access control module integrated with business rules","authors":"Vali Tawosi","doi":"10.1109/ICAICT.2016.7991700","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991700","url":null,"abstract":"User authorization in software systems is and has been a serious security concern for a long time. Attribute based Access Control (ABAC), as a new model of user authorization, makes it possible to restrict user access based on rules against different attributes. In the context of service access control in enterprise systems, it seems necessary to separate business rules from service logic and user authorization mechanism. This paper is an experimental report on the implementation of an ABAC module in which business rules are used to restrict user access to the services. The ever changing nature of the business rules in an enterprise system made a necessity to the proposal of such a light weight dynamic attribute based access control module, in which end user is able to change access policies and business rules in run time. Challenges of building this module are revealed and plausible solutions which have been put in place are reported.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991693
Kevser Ovaz Akpinar, M. Akpinar, Ibrahim Ozcelik, N. Yumusak
Dramatic rise in the user amount yields increase in the number of internet accessed devices within the last decade. Since most of the devices have internet connection, IPv4 space becomes inadequate. In order to avoid this situation, internet service providers focus on using their IP's within their IP pool, optimally. The most preferred approach to handle this problem is called Carrier Grade Network Address Translation (CGN). In this technique, a city, a neighborhood or a group of users could be configured as if they are in the same Local Area Network (LAN) and they have IPv4 Network Address Translation (NAT) connections for Wide Area Network (WAN) accesses. By applying this approach, IP costs are reduced and number of IP's in the pool is optimized. However, implementations done in recent systems could cause vulnerabilities as well. This work focuses on examining a part of CGN applied network that acts as LAN, by scanning, exploring users, devices and vulnerabilities for a specific neighborhood in Turkey. Users and devices are determined and since they are considered in the same LAN most of them are easily gained access and the insecurity of the system is proved. Also it is also observed that a user could stop or slow down the traffic by Denial of Service (DoS) or Distributed DoS attacks.
{"title":"Carrier-grade NAT — is it really secure for customers? A test on a Turkish service provider","authors":"Kevser Ovaz Akpinar, M. Akpinar, Ibrahim Ozcelik, N. Yumusak","doi":"10.1109/ICAICT.2016.7991693","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991693","url":null,"abstract":"Dramatic rise in the user amount yields increase in the number of internet accessed devices within the last decade. Since most of the devices have internet connection, IPv4 space becomes inadequate. In order to avoid this situation, internet service providers focus on using their IP's within their IP pool, optimally. The most preferred approach to handle this problem is called Carrier Grade Network Address Translation (CGN). In this technique, a city, a neighborhood or a group of users could be configured as if they are in the same Local Area Network (LAN) and they have IPv4 Network Address Translation (NAT) connections for Wide Area Network (WAN) accesses. By applying this approach, IP costs are reduced and number of IP's in the pool is optimized. However, implementations done in recent systems could cause vulnerabilities as well. This work focuses on examining a part of CGN applied network that acts as LAN, by scanning, exploring users, devices and vulnerabilities for a specific neighborhood in Turkey. Users and devices are determined and since they are considered in the same LAN most of them are easily gained access and the insecurity of the system is proved. Also it is also observed that a user could stop or slow down the traffic by Denial of Service (DoS) or Distributed DoS attacks.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991790
G. Bánesz, D. Lukáčová, Lukáš Vaněk, Peter Hrubý
In our report we want to present the results of a survey focusing on the use of interactive whiteboard technology in the subject called technology at primary schools to increase students' motivation in teaching technical subjects. Technology is a very specific subject in primary schools, because it combines the teaching of theoretical information and practical skill practicing. The research was to find out or check whether pupils of experimental groups who were using an interactive whiteboard during teaching, will be more motivated to learn than students of the controlling groups. We used Kozéki's questionnaire to detect pupils' motivation to motivate students to learn. We found out that in the experimental group the motivation in the affective field (extrinsic motivation) is positive and predominant. This is demonstrably more powerful than the motivation of the control group, which belongs to the field of the cognitive effects, also with positive character. The research results are useful in the planning of teaching in terms of allocating the interactive whiteboard into the teaching process.
{"title":"Interactive whiteboard in motivation of pupils of primary school","authors":"G. Bánesz, D. Lukáčová, Lukáš Vaněk, Peter Hrubý","doi":"10.1109/ICAICT.2016.7991790","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991790","url":null,"abstract":"In our report we want to present the results of a survey focusing on the use of interactive whiteboard technology in the subject called technology at primary schools to increase students' motivation in teaching technical subjects. Technology is a very specific subject in primary schools, because it combines the teaching of theoretical information and practical skill practicing. The research was to find out or check whether pupils of experimental groups who were using an interactive whiteboard during teaching, will be more motivated to learn than students of the controlling groups. We used Kozéki's questionnaire to detect pupils' motivation to motivate students to learn. We found out that in the experimental group the motivation in the affective field (extrinsic motivation) is positive and predominant. This is demonstrably more powerful than the motivation of the control group, which belongs to the field of the cognitive effects, also with positive character. The research results are useful in the planning of teaching in terms of allocating the interactive whiteboard into the teaching process.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991702
Emin Huseynov, J. Seigneur
BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers in real outlets. Thus, humans as they walk in cities pass by different beacons and the sequence of beacons form a path. In this paper, we present how those augmented paths can authenticate a user in a secure way whereby the users can prove they have passed by a path, even with current unsecure beacons. We have built a prototype to validate this new authentication scheme with unsecure Estimote beacons. In addition, as an alternative to BLE, a similar system utilizing Wi-Fi to detect user proximity is reviewed as well.
{"title":"Beacon authpath: Augmented human path authentication","authors":"Emin Huseynov, J. Seigneur","doi":"10.1109/ICAICT.2016.7991702","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991702","url":null,"abstract":"BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers in real outlets. Thus, humans as they walk in cities pass by different beacons and the sequence of beacons form a path. In this paper, we present how those augmented paths can authenticate a user in a secure way whereby the users can prove they have passed by a path, even with current unsecure beacons. We have built a prototype to validate this new authentication scheme with unsecure Estimote beacons. In addition, as an alternative to BLE, a similar system utilizing Wi-Fi to detect user proximity is reviewed as well.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127269857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991829
S. Valeev, N. Kondratyeva
Processing Big Data in large scale system is a new direction of development of information technologies, including methods and algorithms of streaming data in real time mode. In the paper, application of Markov Decision Process System for large scale system management based on Big Data concept is proposed.
{"title":"Large scale system management based on Markov Decision Process and Big Data Concept","authors":"S. Valeev, N. Kondratyeva","doi":"10.1109/ICAICT.2016.7991829","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991829","url":null,"abstract":"Processing Big Data in large scale system is a new direction of development of information technologies, including methods and algorithms of streaming data in real time mode. In the paper, application of Markov Decision Process System for large scale system management based on Big Data concept is proposed.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114892418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991747
P. Sosnin
The paper deals with semantic modeling a mental imagery caused by processing a new project task in real-time designing a system with the software. In the processing of the new task, the designer applies a framework “model of precedent” and its iterative filling by content with using a feedback caused with a stepwise refinement of the task statement. For understanding the current conditions of the task statement, the designer uses a figuratively-semantic support. Combining the indicated means is implemented in the toolkit WIQA.
{"title":"Figuratively-semantic support in precedent-oriented solving the project tasks","authors":"P. Sosnin","doi":"10.1109/ICAICT.2016.7991747","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991747","url":null,"abstract":"The paper deals with semantic modeling a mental imagery caused by processing a new project task in real-time designing a system with the software. In the processing of the new task, the designer applies a framework “model of precedent” and its iterative filling by content with using a feedback caused with a stepwise refinement of the task statement. For understanding the current conditions of the task statement, the designer uses a figuratively-semantic support. Combining the indicated means is implemented in the toolkit WIQA.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991787
M. M. Milikhin, Y. Gritsenko, Yury P. Ekhlakov, O. I. Zhukovsky, P. Senchenko
The article is dedicated to give an assessment of possibility of the applicability of web-based geographic information systems (GIS) within the micro geo-marketing researches. Description of micro geo-marketing data domain, its key features and objectives are given. Functional model of the data collection process is presented. Authors formulate requirements for micro geo-marketing web-GIS and suggests using geodata meta model to provide all necessary functionality within data store tier of GIS architecture. The paper also contains original attributive store component data model.
{"title":"Using web-based geoinformation technologies within micro geo-marketing researches","authors":"M. M. Milikhin, Y. Gritsenko, Yury P. Ekhlakov, O. I. Zhukovsky, P. Senchenko","doi":"10.1109/ICAICT.2016.7991787","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991787","url":null,"abstract":"The article is dedicated to give an assessment of possibility of the applicability of web-based geographic information systems (GIS) within the micro geo-marketing researches. Description of micro geo-marketing data domain, its key features and objectives are given. Functional model of the data collection process is presented. Authors formulate requirements for micro geo-marketing web-GIS and suggests using geodata meta model to provide all necessary functionality within data store tier of GIS architecture. The paper also contains original attributive store component data model.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128160899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991746
A. Gursoy, M. Kurt, H. Kutucu, U. Nuriyev
In this paper we present a heuristic algorithm for the The Band Collocation Problem (BCP) which may have some applications in the field of telecommunication. First, we give the definition the BCP. Second, we explain how we create the problem instances with known optimal solutions as a library. Third, we propose the heuristic algorithm. Then, we analysis and interpret the results of the proposed algorithm on the problem instances with known optimal solutions. Finally, we suggest new ideas about the BCP and its solution approaches.
{"title":"A heuristic algorithm for the band collocation problem","authors":"A. Gursoy, M. Kurt, H. Kutucu, U. Nuriyev","doi":"10.1109/ICAICT.2016.7991746","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991746","url":null,"abstract":"In this paper we present a heuristic algorithm for the The Band Collocation Problem (BCP) which may have some applications in the field of telecommunication. First, we give the definition the BCP. Second, we explain how we create the problem instances with known optimal solutions as a library. Third, we propose the heuristic algorithm. Then, we analysis and interpret the results of the proposed algorithm on the problem instances with known optimal solutions. Finally, we suggest new ideas about the BCP and its solution approaches.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131771130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}