Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991812
Suleyman Uslu, C. Ozturan, Mehmet Fatih Uslu
Every semester, university students need to decide their course programs, and as the number of course offerings increase, it becomes challenge to form a schedule for the semester courses to be taken. In addition, students might have difficulty in finding courses that can match their schedules and course preferences. In order to address these problems, we build Mecanin, an online platform for Boğaziçi University students that provides an optimum schedule and course recommendation tools. In this paper, we propose an integer programming model to optimize course programs and also a recommendation algorithm to suggest courses to students. Both algorithms are tested and compared, and the results are presented.
{"title":"Course scheduler and recommendation system for students","authors":"Suleyman Uslu, C. Ozturan, Mehmet Fatih Uslu","doi":"10.1109/ICAICT.2016.7991812","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991812","url":null,"abstract":"Every semester, university students need to decide their course programs, and as the number of course offerings increase, it becomes challenge to form a schedule for the semester courses to be taken. In addition, students might have difficulty in finding courses that can match their schedules and course preferences. In order to address these problems, we build Mecanin, an online platform for Boğaziçi University students that provides an optimum schedule and course recommendation tools. In this paper, we propose an integer programming model to optimize course programs and also a recommendation algorithm to suggest courses to students. Both algorithms are tested and compared, and the results are presented.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124225418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991829
S. Valeev, N. Kondratyeva
Processing Big Data in large scale system is a new direction of development of information technologies, including methods and algorithms of streaming data in real time mode. In the paper, application of Markov Decision Process System for large scale system management based on Big Data concept is proposed.
{"title":"Large scale system management based on Markov Decision Process and Big Data Concept","authors":"S. Valeev, N. Kondratyeva","doi":"10.1109/ICAICT.2016.7991829","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991829","url":null,"abstract":"Processing Big Data in large scale system is a new direction of development of information technologies, including methods and algorithms of streaming data in real time mode. In the paper, application of Markov Decision Process System for large scale system management based on Big Data concept is proposed.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114892418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991717
N. Moroz, A. Starostenko, R. Gorbachev, N. Kuznetsov
The work is devoted to construction of mathematical model of movement of the passenger wagon and algorithm of identification of parameters of mathematical model, as well as demonstration of efficiency of this algorithm through simulation of the process of identification for selected mode of acceleration.
{"title":"Simulation of identification process of parameters of movement of the wagon on monorail transport","authors":"N. Moroz, A. Starostenko, R. Gorbachev, N. Kuznetsov","doi":"10.1109/ICAICT.2016.7991717","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991717","url":null,"abstract":"The work is devoted to construction of mathematical model of movement of the passenger wagon and algorithm of identification of parameters of mathematical model, as well as demonstration of efficiency of this algorithm through simulation of the process of identification for selected mode of acceleration.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116224981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991702
Emin Huseynov, J. Seigneur
BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers in real outlets. Thus, humans as they walk in cities pass by different beacons and the sequence of beacons form a path. In this paper, we present how those augmented paths can authenticate a user in a secure way whereby the users can prove they have passed by a path, even with current unsecure beacons. We have built a prototype to validate this new authentication scheme with unsecure Estimote beacons. In addition, as an alternative to BLE, a similar system utilizing Wi-Fi to detect user proximity is reviewed as well.
{"title":"Beacon authpath: Augmented human path authentication","authors":"Emin Huseynov, J. Seigneur","doi":"10.1109/ICAICT.2016.7991702","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991702","url":null,"abstract":"BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers in real outlets. Thus, humans as they walk in cities pass by different beacons and the sequence of beacons form a path. In this paper, we present how those augmented paths can authenticate a user in a secure way whereby the users can prove they have passed by a path, even with current unsecure beacons. We have built a prototype to validate this new authentication scheme with unsecure Estimote beacons. In addition, as an alternative to BLE, a similar system utilizing Wi-Fi to detect user proximity is reviewed as well.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127269857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991720
N. Allakhverdiyeva
Digital Signal Processing is an advanced technology that will determine the direction of science and technology in the next centuries. One of the main direction of digital signals processing is digital filters, which in the most cases have advantages over analog filters. Currently there are various methods of filter analysis and design. In this work, for synthesis of all types of recursive filters (low pass, high pass, bandwidth, band stop) is used a neural network. The main objective of filter synthesis is to find the filter coefficients. These filter coefficients define the filter transfer function. Using an iterative procedure of the neural network such as Backpropagation algorithm, on base of Visual C++ software was developed the program, which designs recursive filters with required characteristics. This is particularly important for the designing of the new correcting filters characteristics, the purpose of which is to reduce the unwanted noises in the measurement signal.
{"title":"Application of neural network for digital recursive filter design","authors":"N. Allakhverdiyeva","doi":"10.1109/ICAICT.2016.7991720","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991720","url":null,"abstract":"Digital Signal Processing is an advanced technology that will determine the direction of science and technology in the next centuries. One of the main direction of digital signals processing is digital filters, which in the most cases have advantages over analog filters. Currently there are various methods of filter analysis and design. In this work, for synthesis of all types of recursive filters (low pass, high pass, bandwidth, band stop) is used a neural network. The main objective of filter synthesis is to find the filter coefficients. These filter coefficients define the filter transfer function. Using an iterative procedure of the neural network such as Backpropagation algorithm, on base of Visual C++ software was developed the program, which designs recursive filters with required characteristics. This is particularly important for the designing of the new correcting filters characteristics, the purpose of which is to reduce the unwanted noises in the measurement signal.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991693
Kevser Ovaz Akpinar, M. Akpinar, Ibrahim Ozcelik, N. Yumusak
Dramatic rise in the user amount yields increase in the number of internet accessed devices within the last decade. Since most of the devices have internet connection, IPv4 space becomes inadequate. In order to avoid this situation, internet service providers focus on using their IP's within their IP pool, optimally. The most preferred approach to handle this problem is called Carrier Grade Network Address Translation (CGN). In this technique, a city, a neighborhood or a group of users could be configured as if they are in the same Local Area Network (LAN) and they have IPv4 Network Address Translation (NAT) connections for Wide Area Network (WAN) accesses. By applying this approach, IP costs are reduced and number of IP's in the pool is optimized. However, implementations done in recent systems could cause vulnerabilities as well. This work focuses on examining a part of CGN applied network that acts as LAN, by scanning, exploring users, devices and vulnerabilities for a specific neighborhood in Turkey. Users and devices are determined and since they are considered in the same LAN most of them are easily gained access and the insecurity of the system is proved. Also it is also observed that a user could stop or slow down the traffic by Denial of Service (DoS) or Distributed DoS attacks.
{"title":"Carrier-grade NAT — is it really secure for customers? A test on a Turkish service provider","authors":"Kevser Ovaz Akpinar, M. Akpinar, Ibrahim Ozcelik, N. Yumusak","doi":"10.1109/ICAICT.2016.7991693","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991693","url":null,"abstract":"Dramatic rise in the user amount yields increase in the number of internet accessed devices within the last decade. Since most of the devices have internet connection, IPv4 space becomes inadequate. In order to avoid this situation, internet service providers focus on using their IP's within their IP pool, optimally. The most preferred approach to handle this problem is called Carrier Grade Network Address Translation (CGN). In this technique, a city, a neighborhood or a group of users could be configured as if they are in the same Local Area Network (LAN) and they have IPv4 Network Address Translation (NAT) connections for Wide Area Network (WAN) accesses. By applying this approach, IP costs are reduced and number of IP's in the pool is optimized. However, implementations done in recent systems could cause vulnerabilities as well. This work focuses on examining a part of CGN applied network that acts as LAN, by scanning, exploring users, devices and vulnerabilities for a specific neighborhood in Turkey. Users and devices are determined and since they are considered in the same LAN most of them are easily gained access and the insecurity of the system is proved. Also it is also observed that a user could stop or slow down the traffic by Denial of Service (DoS) or Distributed DoS attacks.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991787
M. M. Milikhin, Y. Gritsenko, Yury P. Ekhlakov, O. I. Zhukovsky, P. Senchenko
The article is dedicated to give an assessment of possibility of the applicability of web-based geographic information systems (GIS) within the micro geo-marketing researches. Description of micro geo-marketing data domain, its key features and objectives are given. Functional model of the data collection process is presented. Authors formulate requirements for micro geo-marketing web-GIS and suggests using geodata meta model to provide all necessary functionality within data store tier of GIS architecture. The paper also contains original attributive store component data model.
{"title":"Using web-based geoinformation technologies within micro geo-marketing researches","authors":"M. M. Milikhin, Y. Gritsenko, Yury P. Ekhlakov, O. I. Zhukovsky, P. Senchenko","doi":"10.1109/ICAICT.2016.7991787","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991787","url":null,"abstract":"The article is dedicated to give an assessment of possibility of the applicability of web-based geographic information systems (GIS) within the micro geo-marketing researches. Description of micro geo-marketing data domain, its key features and objectives are given. Functional model of the data collection process is presented. Authors formulate requirements for micro geo-marketing web-GIS and suggests using geodata meta model to provide all necessary functionality within data store tier of GIS architecture. The paper also contains original attributive store component data model.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128160899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991790
G. Bánesz, D. Lukáčová, Lukáš Vaněk, Peter Hrubý
In our report we want to present the results of a survey focusing on the use of interactive whiteboard technology in the subject called technology at primary schools to increase students' motivation in teaching technical subjects. Technology is a very specific subject in primary schools, because it combines the teaching of theoretical information and practical skill practicing. The research was to find out or check whether pupils of experimental groups who were using an interactive whiteboard during teaching, will be more motivated to learn than students of the controlling groups. We used Kozéki's questionnaire to detect pupils' motivation to motivate students to learn. We found out that in the experimental group the motivation in the affective field (extrinsic motivation) is positive and predominant. This is demonstrably more powerful than the motivation of the control group, which belongs to the field of the cognitive effects, also with positive character. The research results are useful in the planning of teaching in terms of allocating the interactive whiteboard into the teaching process.
{"title":"Interactive whiteboard in motivation of pupils of primary school","authors":"G. Bánesz, D. Lukáčová, Lukáš Vaněk, Peter Hrubý","doi":"10.1109/ICAICT.2016.7991790","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991790","url":null,"abstract":"In our report we want to present the results of a survey focusing on the use of interactive whiteboard technology in the subject called technology at primary schools to increase students' motivation in teaching technical subjects. Technology is a very specific subject in primary schools, because it combines the teaching of theoretical information and practical skill practicing. The research was to find out or check whether pupils of experimental groups who were using an interactive whiteboard during teaching, will be more motivated to learn than students of the controlling groups. We used Kozéki's questionnaire to detect pupils' motivation to motivate students to learn. We found out that in the experimental group the motivation in the affective field (extrinsic motivation) is positive and predominant. This is demonstrably more powerful than the motivation of the control group, which belongs to the field of the cognitive effects, also with positive character. The research results are useful in the planning of teaching in terms of allocating the interactive whiteboard into the teaching process.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991746
A. Gursoy, M. Kurt, H. Kutucu, U. Nuriyev
In this paper we present a heuristic algorithm for the The Band Collocation Problem (BCP) which may have some applications in the field of telecommunication. First, we give the definition the BCP. Second, we explain how we create the problem instances with known optimal solutions as a library. Third, we propose the heuristic algorithm. Then, we analysis and interpret the results of the proposed algorithm on the problem instances with known optimal solutions. Finally, we suggest new ideas about the BCP and its solution approaches.
{"title":"A heuristic algorithm for the band collocation problem","authors":"A. Gursoy, M. Kurt, H. Kutucu, U. Nuriyev","doi":"10.1109/ICAICT.2016.7991746","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991746","url":null,"abstract":"In this paper we present a heuristic algorithm for the The Band Collocation Problem (BCP) which may have some applications in the field of telecommunication. First, we give the definition the BCP. Second, we explain how we create the problem instances with known optimal solutions as a library. Third, we propose the heuristic algorithm. Then, we analysis and interpret the results of the proposed algorithm on the problem instances with known optimal solutions. Finally, we suggest new ideas about the BCP and its solution approaches.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131771130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991700
Vali Tawosi
User authorization in software systems is and has been a serious security concern for a long time. Attribute based Access Control (ABAC), as a new model of user authorization, makes it possible to restrict user access based on rules against different attributes. In the context of service access control in enterprise systems, it seems necessary to separate business rules from service logic and user authorization mechanism. This paper is an experimental report on the implementation of an ABAC module in which business rules are used to restrict user access to the services. The ever changing nature of the business rules in an enterprise system made a necessity to the proposal of such a light weight dynamic attribute based access control module, in which end user is able to change access policies and business rules in run time. Challenges of building this module are revealed and plausible solutions which have been put in place are reported.
{"title":"A light weight dynamic attribute based access control module integrated with business rules","authors":"Vali Tawosi","doi":"10.1109/ICAICT.2016.7991700","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991700","url":null,"abstract":"User authorization in software systems is and has been a serious security concern for a long time. Attribute based Access Control (ABAC), as a new model of user authorization, makes it possible to restrict user access based on rules against different attributes. In the context of service access control in enterprise systems, it seems necessary to separate business rules from service logic and user authorization mechanism. This paper is an experimental report on the implementation of an ABAC module in which business rules are used to restrict user access to the services. The ever changing nature of the business rules in an enterprise system made a necessity to the proposal of such a light weight dynamic attribute based access control module, in which end user is able to change access policies and business rules in run time. Challenges of building this module are revealed and plausible solutions which have been put in place are reported.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}