Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991834
M. Sukhoparov, Alexander Davydov, I. Lebedev, Nurzhan Bazhayev
Wireless network of low-power devices “Smart Home”, “Internet of things” has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure. A model is presented for the information security state analysis based on identifying, quantitative, frequency, timing characteristics. In view of the peculiarities of the devices providing network infrastructure, estimation of the information security state is focused on the analysis of the system normal functioning profile, rather than on search of signatures and features of anomalies during various kinds of attacks. An experiment has been disclosed that provides obtaining statistical information about operation of wireless network remote devices where data acquisition for decision-making purposes occurs by comparing statistical signal messages from the leaf nodes in passive and active modes. Experimental results of information onslaught on the standard system have been presented. The proposed model may be used to determine technical characteristics of WLAN ad hoc network devices and to draw recommendations for IS state analysis.
{"title":"Statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments","authors":"M. Sukhoparov, Alexander Davydov, I. Lebedev, Nurzhan Bazhayev","doi":"10.1109/ICAICT.2016.7991834","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991834","url":null,"abstract":"Wireless network of low-power devices “Smart Home”, “Internet of things” has been considered. A number of signs of security attacks on behalf of potential information interloper have been identified. We have analyzed the characteristics of a system based on wireless technologies that are obtained as a result of passive surveillance and active polling of devices comprising the network infrastructure. A model is presented for the information security state analysis based on identifying, quantitative, frequency, timing characteristics. In view of the peculiarities of the devices providing network infrastructure, estimation of the information security state is focused on the analysis of the system normal functioning profile, rather than on search of signatures and features of anomalies during various kinds of attacks. An experiment has been disclosed that provides obtaining statistical information about operation of wireless network remote devices where data acquisition for decision-making purposes occurs by comparing statistical signal messages from the leaf nodes in passive and active modes. Experimental results of information onslaught on the standard system have been presented. The proposed model may be used to determine technical characteristics of WLAN ad hoc network devices and to draw recommendations for IS state analysis.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129971711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991688
Yuliya Bidulya, Elena G. Brunova
The paper considers the analysis of the subjective information from user-generated content. The purpose of this research is to develop a rule-based classifier for the sentiment analysis within the bank service quality domain. Our sentiment lexicon includes 286 positive and 385 negative words. Besides, three more lexicon classes are added; they are required to apply the rule-based algorithm. To test the algorithm, 200 reviews in Russian are analyzed. The experiment demonstrates that the efficiency of the rule-based classifier is higher as compared to the Naïve Bayes classifier. It is determined that the system generally detects positive reviews better than negative ones.
{"title":"Sentiment analysis for bank service quality: A rule-based classifier","authors":"Yuliya Bidulya, Elena G. Brunova","doi":"10.1109/ICAICT.2016.7991688","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991688","url":null,"abstract":"The paper considers the analysis of the subjective information from user-generated content. The purpose of this research is to develop a rule-based classifier for the sentiment analysis within the bank service quality domain. Our sentiment lexicon includes 286 positive and 385 negative words. Besides, three more lexicon classes are added; they are required to apply the rule-based algorithm. To test the algorithm, 200 reviews in Russian are analyzed. The experiment demonstrates that the efficiency of the rule-based classifier is higher as compared to the Naïve Bayes classifier. It is determined that the system generally detects positive reviews better than negative ones.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1651 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129293895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991772
Y. Imamverdiyev
Information security plays an extremely important role in e-services, as the e-services are vulnerable to various kinds of security and privacy threats on the Internet. The paper presents a formal model of e-services considering four different abstraction levels: application, middleware, operating system and network. Various security threats to e-services and security services to prevent these threats are described. The security level of e-services is determined by the weighted sum of security ratings of individual security services.
{"title":"E-services security assessment model","authors":"Y. Imamverdiyev","doi":"10.1109/ICAICT.2016.7991772","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991772","url":null,"abstract":"Information security plays an extremely important role in e-services, as the e-services are vulnerable to various kinds of security and privacy threats on the Internet. The paper presents a formal model of e-services considering four different abstraction levels: application, middleware, operating system and network. Various security threats to e-services and security services to prevent these threats are described. The security level of e-services is determined by the weighted sum of security ratings of individual security services.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121357382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991729
C. Atilgan, E. Nasibov
The fuzzy joint points (FJP) is a method that uses a fuzzy neighborhood notion to deal with neighborhood parameter selection issue of classical density-based clustering and offers an unsupervised clustering tool. Recent works improved the method in terms of speed to enable the method for big data applications. However, space efficiency of the method is still a limiting factor. In this work, we discuss techniques to improve the space efficiency of the method, so that FJP is applicable regardless of the size of data and offer a distributed version of the algorithm.
{"title":"A memory efficient distributed fuzzy joint points clustering algorithm","authors":"C. Atilgan, E. Nasibov","doi":"10.1109/ICAICT.2016.7991729","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991729","url":null,"abstract":"The fuzzy joint points (FJP) is a method that uses a fuzzy neighborhood notion to deal with neighborhood parameter selection issue of classical density-based clustering and offers an unsupervised clustering tool. Recent works improved the method in terms of speed to enable the method for big data applications. However, space efficiency of the method is still a limiting factor. In this work, we discuss techniques to improve the space efficiency of the method, so that FJP is applicable regardless of the size of data and offer a distributed version of the algorithm.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125990855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991814
M. Vozár, Peter Kuna
The article deals with the problems of heat transfer through solids. The calculation of the thermal resistance of the system consisting of several layers of solid materials having different thermal resistances on the intensive calculations and the time. In the first part we law of calorimetry equation. On this basis, we can build a theory of one-dimensional and multi-dimensional differential equation of thermal diffusion. The derived equations are then used to simulate the heat transfer in building applications. We had to adjust the thermal diffusion equation in such a shape that it can be addressed by using PDE toolbox.
{"title":"MATLAB and heat transfer in solid state","authors":"M. Vozár, Peter Kuna","doi":"10.1109/ICAICT.2016.7991814","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991814","url":null,"abstract":"The article deals with the problems of heat transfer through solids. The calculation of the thermal resistance of the system consisting of several layers of solid materials having different thermal resistances on the intensive calculations and the time. In the first part we law of calorimetry equation. On this basis, we can build a theory of one-dimensional and multi-dimensional differential equation of thermal diffusion. The derived equations are then used to simulate the heat transfer in building applications. We had to adjust the thermal diffusion equation in such a shape that it can be addressed by using PDE toolbox.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126811646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991797
S. T. Huseynov
The paper mainly has devoted to the important fields of modern engineering education in the aerospace fields, particularly in such disciplines as structural mechanics and application of computer modeling there. The author shares his experience in teaching and scientific research on some important issues about the role of modern software, which are concern to two different fields: CAD and computer algebra. In the paper it has been showed relevant original graphical results of computer modeling in aerospace structural mechanics via Ansys CAD software and number of examples with original cods in Maple computer mathematics system for analytical researches in theory of mechanical equilibrium.
{"title":"The influence and role of CAD and computer mathematics in engineering education","authors":"S. T. Huseynov","doi":"10.1109/ICAICT.2016.7991797","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991797","url":null,"abstract":"The paper mainly has devoted to the important fields of modern engineering education in the aerospace fields, particularly in such disciplines as structural mechanics and application of computer modeling there. The author shares his experience in teaching and scientific research on some important issues about the role of modern software, which are concern to two different fields: CAD and computer algebra. In the paper it has been showed relevant original graphical results of computer modeling in aerospace structural mechanics via Ansys CAD software and number of examples with original cods in Maple computer mathematics system for analytical researches in theory of mechanical equilibrium.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130312686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991830
G. Schaefer
With the number of digital images growing at a rapid rate, effective approaches for organising large image repositories are highly sought after. In this paper, we summarise a number of such approaches that allow for intuitive browsing of image databases. Based on visual features extracted from the images, complete image libraries can be visualised in such a way that similar images are located close to each other in the visualisation. This, coupled with appropriate browsing operations, allows for interactive exploration of even large scale image collections as demonstrated by the Hue Sphere Image Browser and Honeycomb Image Browser approaches.
{"title":"Approaches for interactive browsing of large image datasets","authors":"G. Schaefer","doi":"10.1109/ICAICT.2016.7991830","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991830","url":null,"abstract":"With the number of digital images growing at a rapid rate, effective approaches for organising large image repositories are highly sought after. In this paper, we summarise a number of such approaches that allow for intuitive browsing of image databases. Based on visual features extracted from the images, complete image libraries can be visualised in such a way that similar images are located close to each other in the visualisation. This, coupled with appropriate browsing operations, allows for interactive exploration of even large scale image collections as demonstrated by the Hue Sphere Image Browser and Honeycomb Image Browser approaches.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131001830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991753
D. Kiesewetter, V. Malyugin
The possibility of compensation crosstalk for different types of division multiplexing in fiber optical transmission lines is discussed. The principle of operation of the crosstalk compensator is described. An example of creating of fiber optic mode division multiplexing transmission line and electronic compensation of crosstalk is analyzed.
{"title":"The crosstalk compensator for fiber-optic data transmission systems with division multiplexing","authors":"D. Kiesewetter, V. Malyugin","doi":"10.1109/ICAICT.2016.7991753","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991753","url":null,"abstract":"The possibility of compensation crosstalk for different types of division multiplexing in fiber optical transmission lines is discussed. The principle of operation of the crosstalk compensator is described. An example of creating of fiber optic mode division multiplexing transmission line and electronic compensation of crosstalk is analyzed.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131053256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991714
Y. Aliyev
The paper is the continuation of the previous paper on this topic. We first review some of the recent developments on 3x+1 problem. In the remaining part of the paper we prove the result announced at the end of the first paper. The proof uses the finite version of the method of mathematical induction.
{"title":"Existence of repetitions of digits in the construction of periodic sequences related to 3x+1 problem: Proof of the theorem on the periods in the 3-adic representation of terms of periodic sequences that appear in Collatz problem","authors":"Y. Aliyev","doi":"10.1109/ICAICT.2016.7991714","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991714","url":null,"abstract":"The paper is the continuation of the previous paper on this topic. We first review some of the recent developments on 3x+1 problem. In the remaining part of the paper we prove the result announced at the end of the first paper. The proof uses the finite version of the method of mathematical induction.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131807808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICAICT.2016.7991675
Resmiye Nasiboglu, Baris Tekin Tezel
The most important thing in using the ordered weighted averaging (OWA) operator which can easily describe the mental model of an Decision Maker (DM), is to characterize OWA weights. Determination of OWA weights cannot provide a characterization by itself. If we want to generalization and reusability of the OWA weights to aggregate various sized objects, we have to be determine more general form. In this paper, we propose a new approach for learning a stress function, which can be characterized as a DM strategy of OWA operator. For this aim the Kolmogorov-Smirnov test for similarity probability density functions is used.
{"title":"A statistical approach to mining the DM strategy for OWA operators","authors":"Resmiye Nasiboglu, Baris Tekin Tezel","doi":"10.1109/ICAICT.2016.7991675","DOIUrl":"https://doi.org/10.1109/ICAICT.2016.7991675","url":null,"abstract":"The most important thing in using the ordered weighted averaging (OWA) operator which can easily describe the mental model of an Decision Maker (DM), is to characterize OWA weights. Determination of OWA weights cannot provide a characterization by itself. If we want to generalization and reusability of the OWA weights to aggregate various sized objects, we have to be determine more general form. In this paper, we propose a new approach for learning a stress function, which can be characterized as a DM strategy of OWA operator. For this aim the Kolmogorov-Smirnov test for similarity probability density functions is used.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"456 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124327994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}