Menu
PHOTOGRAMMETRIC TECHNIQUE FOR THE DETERMINATION OF THE MOMENT IN TIME AND ...
By: Spilko Hubenov, Georgi Stoilov   (138 reads)
Rating: (1.00/10)

Abstract: An experimental study establishing a technique for the contactless optical determination of the local plastic formability limit on the loss of stability of sheet metal has been conducted. The possibilities for the recording of the time instant and the place of the localisation of the deformation based on the changes in the optical images of the surface have been examined. An optical criterion for the determination of the time instance and the place of the loss of stability derived through a correlation analysis of the images has been proposed. The experimentally obtained results have been presented and analysed.

Keywords: stable formability limit, loss of stability, photogrammetry, correlation analysis, digital image correlation

Link:

PHOTOGRAMMETRIC TECHNIQUE FOR THE DETERMINATION OF THE MOMENT IN TIME AND THE PLACE OF THE LOSS OF STABILITY DURING THE PLASTIC DEFORMATION OF SHEET METAL

Spilko Hubenov, Georgi Stoilov

http://www.foibg.com/ijima/vol03/ijima03-04-p06.pdf

ON THE TRAINING OF CONSOLIDATED INFORMATION ANALYSTS
By: Kateryna Solovyova et al.  (139 reads)
Rating: (1.00/10)

Abstract: The current development of society requires the use of modern information technologies of business administration, regardless the field of activity. For automation and informatization an enterprise requires the introduction of innovative technologies, including technologies for knowledge management. To ensure the integration of modern information technology corresponding to the noospheric stage of scientific development organizations require highly qualified analysts for consolidated information (business intelligence analysts, information analysts, knowledge managers). The Social Informatics Department of the Kharkiv National University of Radio Electronics is engaged in the training of such specialists, its workers developed a standard for the preparation of consolidated information analysts in Ukraine. This standard is largely in line with the preparation of Competitive Intelligence Professionals (Competitive Intelligence)1, 2. Special difficulties in the training of consolidated information analysts in a lack of teaching hours are related to the need of development of a special kind of systematic analytical and creative thinking, as well as the ability to perceive and implement modern world standards of information and organizational culture. The training program is formed in a manner to develop thinking and understanding of the relevance, necessity and features of work with knowledge at the graduates from various universities and bachelor systems. An important role in this process belongs to the integration of educational and scientific process at the department that allows us to prepare highly qualified specialists in a short time, but the main feature is the use of training in the preparation of a noospheric system methodology - systemology and modern systemological method – the systemological classification analysis 3. The article deals with the relevance of the training and development of the specialty through the use of modern tools of knowledge management, some aspects of the training of consolidated information analysts, methods and tools to improve the quality of their education in terms of reducing academic load and reduce the direct interaction between teachers and students.

Keywords: Knowledge management, consolidated information analyst, systemological classification analysis, information technology, classification, social network on the Internet, model, e-learning, UML diagrams, learning organization, software testing, business process analysis and modeling requirements.

Link:

ON THE TRAINING OF CONSOLIDATED INFORMATION ANALYSTS

Kateryna Solovyova, Andrey Danilov, Olga Pishchukhina, Panasovska Yuliia, Olga Lashyna, Maria Kozlova, Maryna Khoroshenko, Maksym Voroniy

http://www.foibg.com/ijima/vol03/ijima03-04-p05.pdf

НАУЧНЫЕ ПОДХОДЫ СИСТЕМЫ ФОРМИРОВАНИЯ КОНКУРЕНТОСПОСОБНОГО УЧИТЕЛЯ
By: Юрий Иванович Завалевский   (143 reads)
Rating: (1.00/10)

Аннотация: В статье обосновываются научные подходы, в соответствии с которыми происходит формирование конкурентоспособности учителя. Доказывается необходимость комплексного применения мировоззренческих идей обозначенных подходов. Анализируются авторские концепции трактовки содержания данных подходов, на основе которых выделяются характерные черты в соответствии с проблемами конкурентоспособности личности, учителя.

Ключевые слова: методологические основы исследования, научные подходы, системный подход, синергетический подход, личностно-деятельностный подход, аксиологический подход, ресурсный подход, компетентностный подход.

Link:

НАУЧНЫЕ ПОДХОДЫ СИСТЕМЫ ФОРМИРОВАНИЯ КОНКУРЕНТОСПОСОБНОГО УЧИТЕЛЯ

Юрий Иванович Завалевский

http://www.foibg.com/ijima/vol03/ijima03-04-p04.pdf

КОМПЛЕКСНЫЕ ИНСТРУМЕНТАЛЬНЫЕ СРЕДСТВА ИНЖЕНЕРИИ ОНТОЛОГИЙ
By: Виталий Величко, Кирилл Малахов, Виталий Семенков, Александр  (143 reads)
Rating: (1.00/10)

Аннотация: В статье представлен обзор актуальных специализированных инструментальных средств инженерии онтологий, а также средств аннотирования текстов на основе онтологий. Рассмотрены основные функции и возможности данных инструментальных средств, их достоинства и недостатки. Описываются основные компоненты системы формирования онтологий на основе семантического анализа текстовых массивов. Дается системный сравнительный анализ средств инженерии онтологий.

Ключевые слова: онтология, инженерия знаний, проектирование онтологии предметной области, инструментальный комплекс онтологического назначения.

ACM Classification Keywords: I.2 ARTIFICIAL INTELLIGENCE - I.2.4 Knowledge Representation Formalisms and Methods, H. Information Systems – H.2 DATABASE MANAGEMENT – H.2.4 Systems

Link:

КОМПЛЕКСНЫЕ ИНСТРУМЕНТАЛЬНЫЕ СРЕДСТВА ИНЖЕНЕРИИ ОНТОЛОГИЙ

Виталий Величко, Кирилл Малахов, Виталий Семенков, Александр Стрижак

http://www.foibg.com/ijima/vol03/ijima03-04-p03.pdf

MODEL OF THE MONEY CIRCULATION IN THE BULGARIAN LANDS DURING THE ANTIQUITY AND T
By: Jordan Tabov   (138 reads)
Rating: (1.00/10)

Abstract: This article presents a model of the money circulation in Bulgaria, based on the data about coins, excavated in Bulgaria and published in the Proceedings of the (Bulgarian) Archaeological Society (PAS) during the period 1910-1920 and in the Proceedings of the (Bulgarian) Archaeological Institute (PAI) during the period 1921-1959. We construct the Chronological Distribution of these coins and its graph using computer technology (the package MS Excel in our case). The studied material consists of over 280000 coins, which in our view is large enough to give an adequate picture in a first approximation of the chronological distribution of all coins excavated in the Bulgarian lands during the period 1910-1959. We think that it also gives a plausible picture of the monetary circulation in the eastern part of the Balkan Peninsula during the different historical periods. We discuss some considerable anomalies of the obtained chronological distribution. The results of the analysis juxtaposed with a peculiarity of the Chronological Distribution of Byzantine coins noticed by A. Kazhdan leads us to the hypothesis that there are probably certain mistakes in the accepted dating of some ancient coins.

Keywords: model; money circulation; coin finds; chronological distribution

ACM Classification Keywords: I.6 Simulation and Modeling, I.6.3 Applications

Link:

MODEL OF THE MONEY CIRCULATION IN THE BULGARIAN LANDS DURING THE ANTIQUITY AND THE MIDDLE AGES

Jordan Tabov

http://www.foibg.com/ijima/vol03/ijima03-04-p02.pdf

RDFARM - A SYSTEM FOR STORING LARGE SETS OF RDF TRIPLES AND QUADRUPLES BY ...
By: Krassimira Ivanova   (151 reads)
Rating: (1.00/10)

Abstract: In this paper we present results from experiments for storing middle-size and large sets of RDF triples and quadruples by means of Natural Language Addressing. For experiments we have realized program RDFArM aimed to store RDF triples and quadruples in multi-layer hash tables (information spaces with variable size). The main features of program RDFArM are outlined in the paper. Analysis of the experimental results and rank-based multiple comparison are discussed.

Keywords: Natural Language Addressing; Rank-based Multiple Comparison

ACM Classification Keywords: H.2 Database Management; H.2.8 Database Applications

Link:

RDFARM - A SYSTEM FOR STORING LARGE SETS OF RDF TRIPLES AND QUADRUPLES BY MEANS OF NATURAL LANGUAGE ADDRESSING

Krassimira Ivanova

http://www.foibg.com/ijima/vol03/ijima03-04-p01.pdf

ORGANIZING OF KNOWLEDGE BASES FOR EMERGENCY SITUATIONS USING SOCIAL NETWORKS
By: Oleksandr Kuzomin, Bohdan Tkachenko, Mariia Lysenko  (132 reads)
Rating: (1.00/10)

Abstract: This paper describes technology of automated survey system for emergencies eyewitness that helps to collect data about emergencies.

Keywords: Social Networks, Emergencies Prevention, Automatic Survey, Language Analysis, Special Language.

Link:

ORGANIZING OF KNOWLEDGE BASES FOR EMERGENCY SITUATIONS USING SOCIAL NETWORKS

Oleksandr Kuzomin, Bohdan Tkachenko, Mariia Lysenko

http://www.foibg.com/ijima/vol03/ijima03-03-p11.pdf

COMPUTERIZED MODEL FOR APHASIA ASSESSMENT, BASED ON KERTEZS TEST
By: Iliya Pendzhurov, Polina Mihova, Atanas Dashovski  (159 reads)
Rating: (1.00/10)

Abstract: Aphasia is an acquired communication disorder caused by brain damage that impairs a person’s ability to understand, produce and use language. Furthermore, it is a multimodal disorder which includes additional neurological impairments such as apraxia of speech or dysarthria Keshree et al, 2013. Aphasia tests are used to classify and diagnose aphasia and they are needed for a standard classification of aphasia and to compare studies performed in different centers. The aim of this paper is to present an original authors solution, which performs a digital version of the Kertész test.

Keywords: aphasia, WAB, software solution

Link:

COMPUTERIZED MODEL FOR APHASIA ASSESSMENT, BASED ON KERTEZS TEST

Iliya Pendzhurov, Polina Mihova, Atanas Dashovski

http://www.foibg.com/ijima/vol03/ijima03-03-p10.pdf

THREE RD MODELS FOR TWO-HOP RELAY ROUTING WITH LIMITED PACKETS LIFETIME IN...
By: Irma Aslanishvili  (126 reads)
Rating: (1.00/10)

Abstract: The rules for preparing the manuscripts for the International Journals (IJ) and International Book Series (IBS) of the ITHEA International Scientific Society (ITHEA ISS) are outlined. We study mobile communication of networks, the ad hoc networks, Ad hoc networks are complex distributed systems that consist of wireless mobile or static nodes that can freely and dynamically self-organize. The parameter of the queuing models depends on the node mobility pattern. The main finding is that the expected relay buffer size depends on the expectation and the variance of the nodes contact time. Such analysis is done for the three dimensional random walks models over a circle; expected relay buffer size depends on the expectation and the variance of the nodes contact time. First model-The source node transmits a packet only once (either to the relay or to the destination node). Thus, the source node does not keep a copy of the packet once it has been sent. When the source node transmits a packet to the destination node (when their locations permit such a transmission), the source node transmits packets that it has not transmitted before. The source node has always data to send to the destination node. This is a standard assumption, also made in GMPS04, GT02, GK00, because we are interested in the maximum relay throughput of the relay node. This shows: the first relay node performs a Random walk and the source and destination are fixed, second the source, the destination, and the relay node move inside a square according to the RD model. Second model-The relay node is moving according to a symmetric random walk (RW) on a circle of 4R + 2w steps. Third model - Three nodes: a source a destination and a relay source, nodes are moving a cording a symmetrical Random Walk over a circle.

Keywords: Ad Hoc Networks, MANETs protocols, Routing protocols, packet, source node, Relay routing, finite memory, Relay Buffer (RB), RB occupancy, Destination.

Link:

THREE RD MODELS FOR TWO-HOP RELAY ROUTING WITH LIMITED PACKETS LIFETIME IN AD HOC NETWORKS

Irma Aslanishvili

http://www.foibg.com/ijima/vol03/ijima03-03-p09.pdf

ALGORITHMS OF AUTOMATE MODEL CONSTRUCTION FOR BUSINESS GAME EXECUTION SUBSYSTEM
By: Alexandr Deryabin, Lidia Shestakova, Olga Vikentyeva  (156 reads)
Rating: (1.00/10)

Abstract: Changes of professional environment, caused by introduction of new technologies and techniques, create a necessity in continuous education and development of professional competences. In these conditions, managers and other company employees face the choice of methods and tools of personnel training. A business game is one of the most productive tools of business-education. This paper elaborates the ideas embodied previously, which considered the conceptual approach to a toolkit creation for active training techniques in a form of competence-based business game studio. Competence-based business game studio is an ergatic system for development of professional competences, which are required to ensure organization’s business processes. Business game control is performed with the help of automate module, which executes the interpretation of expressions in algorithm logical scheme language. Unified business process is the input data for automate model construction. Unified business process is acquired from the information about company’s real business processes, represented in poorly formalized ways. Unified business process transforms into unified training business process, which includes possible business game trainee actions and information about input, output, administrative data and business process operation execution mechanism. The next step to automate model is the construction of scenario graph, which represents a more formalized description of unified training business process. Next, the administrating algorithm of the business game in algorithm logical scheme language is built. The paper considers the algorithms of transition between models that allow automating the process of acquiring algorithm logical scheme in order to implement the business games scenario.

Keywords: active learning methods, business-game, business-process, automate model, algorithm logical scheme, algorithm, metamodels

ACM Classification Keywords: K.3 Computers and Education: K.3.2 Computer and Information Science Education – Information systems education. K.4 Computers and Society: K.4.3 Organizational Impacts – Employment. I. Computing Methodologies: I.2 Artificial Intelligence: I.2.1 Applications and Expert Systems – Games.

Link:

ALGORITHMS OF AUTOMATE MODEL CONSTRUCTION FOR BUSINESS GAME EXECUTION SUBSYSTEM

Alexandr Deryabin, Lidia Shestakova, Olga Vikentyeva

http://www.foibg.com/ijima/vol03/ijima03-03-p08.pdf

FEATURES OF PLANNING TECHNOLOGIES IN COMPUTER-AIDED MANAGEMENT SYSTEMS ...
By: Iryna Balchenko, Vitaliy Lytvynov, Maria Shulga  (139 reads)
Rating: (1.00/10)

Abstract: The design principles of the functional subsystem of planning for automatizing management of a crop cultivating agricultural enterprise are shown. Main directions and tasks for the effective work planning of an agricultural enterprise are described.

Keywords: information technologies, planning, automatizing of management, agriculture enterprise.

ACM Classification Keywords: H.4 Information system applications, I.2.1 Applications and Expert Systems, G.1.6 Optimization

Link:

FEATURES OF PLANNING TECHNOLOGIES IN COMPUTER-AIDED MANAGEMENT SYSTEMS OF AN AGRICULTURAL ENTERPRISE

Iryna Balchenko, Vitaliy Lytvynov, Maria Shulga

http://www.foibg.com/ijima/vol03/ijima03-03-p07.pdf

HUMAN AND TELECOMMUNICATION TECHNOLOGIES LIFE CYCLES COMPARISON
By: Galina Gayvoronska, Illia Ganytskyi, Petr Yatsuk  (150 reads)
Rating: (1.00/10)

Annotation: Main stages of human life cycle are described. The human and telecommunication technologies life cycle’s comparison is done. The general approach to the consideration of telecommunication technologies life cycle is shown. Also the paper shows that the overall picture of telecommunication technology development can be obtained only with an integrated approach to the issue. Only a combination of methodological, statistical approach and development of the standardization process will provide effective assessment, required by companies for development the industry.

Keywords: life cycle, live cycle stages, telecommunication technologies

Keywords classification of ACM: C. Computer Systems Organization D.2.9 Management (K.6.3) Life cycle.

Link:

HUMAN AND TELECOMMUNICATION TECHNOLOGIES LIFE CYCLES COMPARISON

Galina Gayvoronska, Illia Ganytskyi, Petr Yatsuk

http://www.foibg.com/ijima/vol03/ijima03-03-p06.pdf

MARKET-REQUIRED COMPETENCE TOPIC DYNAMICS
By: Tigran Topchyan  (265 reads)
Rating: (1.00/10)

Abstract: The Job market is an ever moving and evolving entity. So are the competencies and qualifications it demands of prospective employees. In our previous work we modelled these competencies using topic models, but in order to have a more effective understanding of the market, we have to take into account the dynamics of the system as well. Here we propose using dynamic topic modelling as a means of analysing the job market for competencies and qualifications stemming from our previous research.

Keywords: dynamic topic modelling, qualification, competence, dynamics

ACM Classification Keywords: H.0 Information Systems-General?

Link:

MARKET-REQUIRED COMPETENCE TOPIC DYNAMICS

Tigran Topchyan

http://www.foibg.com/ijima/vol03/ijima03-03-p05.pdf

METHOD FOR VIDEO SHOT DETECTION AND SEPARATION
By: David Asatryan, Manuk Zakaryan  (236 reads)
Rating: (1.00/10)

Abstract: Shot boundary detection is main step in video management systems like browsing and indexing. In this paper, we shortly describe an earlier proposed shot detection algorithm based on the structural properties of video frames. Two mathematical models for decision making, i.e. for similarity threshold determination are proposed and compared. The first model allows determination of threshold in case of using mean-square deviation for frames similarity and when the image pixel is assumed to be normal distributed random variable. The second model is based on using the structural similarity measure based on Weibull model for image gradient magnitude distribution. Global and adaptive approaches are considered for frames similarity threshold determination. Results of experiments to detect real video shots are given. It is shown that adaptive threshold determination method generally gives more acceptable results than global threshold determination method. At the same time the 2 W based threshold determination approach gives more accurate results than PSNR based approach, therewith corresponds to HVS perception.

Keywords: video segmentation, shot detection, similarity measure, threshold determination

ACM Classification Keywords: Image Processing and Computer Vision

Link:

METHOD FOR VIDEO SHOT DETECTION AND SEPARATION

David Asatryan, Manuk Zakaryan

http://www.foibg.com/ijima/vol03/ijima03-03-p04.pdf

METHOD OF DOMAIN MODELS DESIGNING
By: Elena Chebanyuk  (245 reads)
Rating: (1.00/10)

Abstract: Method of domain models designing is proposed in this paper. Domain models are represented as class diagrams. Initial information for domain models designing contains both analytical representation of domain data streams and domain entities. Domain data streams are defined using collaboration diagram. Analytical representation of domain data streams as a subset of Cartesian product of the following sets: objects and messages are proposed. Also an approach of decomposition collaboration diagram into fragments for defining data streams is represented. Rules of defining relations between classes of domain model by means of analysis both analytical and graphical representation of domain data streams are formulated. Both description of domain entities and interconnections between them are represented in terms of algebra describing software static models. Proposed method involves an iterative approach for domain model designing. Firstly it is necessary to obtain information about class diagram constituents. Then information about methods of classes is complimented using analytical representation of domain data streams. Using both analytical representation of domain data streams and analytical description of entities relations between class diagram constituents are defined and clarified. An example of designing domain model for domain “designing cutting schemas for leather goods details” is represented. Also information about interconnections of domain entities and domain processes is represented.

Keywords: class diagram; collaboration diagram; model transformation; model driven architecture; set-theory tool; transformation rules; cutting schemas designing.

ACM Classification Keywords: D.2.2 Design Tools and Techniques; D.2.11 Software Architectures

Link:

METHOD OF DOMAIN MODELS DESIGNING

Elena Chebanyuk

http://www.foibg.com/ijima/vol03/ijima03-03-p03.pdf

A STUDY OF APPLICATION OF NEURAL NETWORK TECHNIQUE ON SOFTWARE REPOSITORIES
By: Ana Maria Bautista, Tomas San Feliu  (274 reads)
Rating: (1.00/10)

Abstract: Context: The use of software repositories is recent in software engineering. Different techniques have been applied to software engineering problems. We want to know the degree of application of neural networks as data mining technique. The results have allowed the preliminary state of the art of the application of neural network techniques on software repositories.

Keywords: neural networks, repository, data mining.

ACM Classification Keywords: I.2.6 Artificial Intelligence –Connectionism and neural nets, H.2.7 Database Administration – Data warehouse and repository.

Link:

A STUDY OF APPLICATION OF NEURAL NETWORK TECHNIQUE ON SOFTWARE REPOSITORIES

Ana Maria Bautista, Tomas San Feliu

http://www.foibg.com/ijima/vol03/ijima03-03-p02.pdf

ANALYSIS FINITELY SMALL VALUES IN COMPUTER SIMULATION
By: Oleksii Voloshyn, Vladimir Kudin  (273 reads)
Rating: (1.00/10)

Abstract: We review the development of the infinity concept and continuous mathematics from ancient times to the present day. To the critical analysis of the application of the infinitesimal in the mathematical modeling in XVIIXVIII centuries is given special attention. It is noted necessity of development methods for the analysis of finite small disturbances in computer simulations. The problem of the adequacy of the linear approximation of mathematical and computer models is under discussion. We investigate the influence of finite small disturbances into elements of model to quality of localization solutions of the model which is based on the methodology of options sequential analysis. The results of numerical experiments and taken into account the level of systems conditionality and algorithms (the mantissa length in the numbers representation) are given.

Keywords: continuous and infinite, infinitesimal analysis, mathematical and computer simulation, linear approximation, localization, successive analysis variants, analysis finitely small values

ACM Classification Keywords: H.4.2 Information Systems Applications: Types of Systems: Decision Support.

Link:

ANALYSIS FINITELY SMALL VALUES IN COMPUTER SIMULATION

Oleksii Voloshyn, Vladimir Kudin

http://www.foibg.com/ijima/vol03/ijima03-03-p01.pdf

ABOUT USAGE POSSIBILITY OF PRINCIPLES OF EXCITATIONS TRANSMISSION BY NERVE FIBER
By: Galina Gayvoronska, Maxim Solomitsky  (343 reads)
Rating: (1.00/10)

Annotation: Analysis of physiological properties of the nerve fibers, associated with their specialized function – excitation transmission, is done. Possibility in principle of the same principles' usage in the communication channels is established. It is shown that characteristics of nerve fibers as communication channels are comparable to characteristics of existing wire transmission media of information in telecommunications. Prospectivity of research of excitations transmission principles as the basis for implementation of communication channels is established.

Keywords: nerve fibers, medullated (myelinic) nerve fiber, communication channel, conductor, propagation velocity.

Keywords classification of ACM: B.4.1 Data Communications Devices, B.4.2 Input/Output Devices, B.4.3 Interconnections (Subsystems), H.1.2 User/Machine Systems

Link:

ABOUT USAGE POSSIBILITY OF PRINCIPLES OF EXCITATIONS TRANSMISSION BY NERVE FIBERS FOR TELECOMMUNICATIONS

Galina Gayvoronska, Maxim Solomitsky

http://www.foibg.com/ijima/vol03/ijima03-02-p11.pdf

METHOD FOR CONTROLLING STATE CHANNEL WIRELESS NETWORKS UNDER A PRIORI ...
By: Sergey Zaitsev   (310 reads)
Rating: (1.00/10)

Abstract: A method of monitoring the state of the radio channel using statistical information of the turbo decoder, the use of which in the adaptive system will allow carrying out its restructuring under varying random actions.

Keywords: information technologies, a priori uncertainty, wireless networks, turbo codes.

ACM Classification Keywords: H.4 Information system applications, H.4.3 Communications Applications, G.1.6 Optimization, I.6 Simulation and modeling, K.6.4 System management

Link:

METHOD FOR CONTROLLING STATE CHANNEL WIRELESS NETWORKS UNDER A PRIORI UNCERTAINTY

Sergey Zaitsev

http://www.foibg.com/ijima/vol03/ijima03-02-p10.pdf

APPLICATION OF FIBER-OPTICAL MODULATORS AS MEASURING DEVICES IN ...
By: Oleksandr Ryabtsov  (255 reads)
Rating: (1.00/10)

Abstract: The article is devoted to application of optical devices based on tensosensitive properties of liquid crystals for gathering physical data of biological objects in bioinformatics researches. Graphical results of prototype’s test are presented and usage recommendations done.

Keywords: biological researches, measuring devices, fiber optics, liquid crystals.

ACM Classification Keywords: J.3 Life and Medical Sciences – Bioinformatics; C.4 Performance of Systems - Measurement techniques

Link:

APPLICATION OF FIBER-OPTICAL MODULATORS AS MEASURING DEVICES IN BIOINFORMATICS RESEARCHES

Oleksandr Ryabtsov

http://www.foibg.com/ijima/vol03/ijima03-02-p09.pdf

HIERARCHICAL TWO LAYERS CONTROL COMMUTATOR FOR IMPLEMENTATION OF FULLY ...
By: Kiril Kolchakov, Vladimir Monov  (242 reads)
Rating: (1.00/10)

Abstract: In this paper, an algorithm is developed for a full non-conflict schedule obtained through the activation of diagonals of sub- matrices in switching nodes of type Crossbar. The size of sub matrices in the Crossbar is optimized. Finite automats are designed for two layers control of sub-matrices a comparison with known algorithms with diagonal activation of connection matrix is done.

Keywords: Network nodes, Crossbar switch, Conflict elimination, Packet messages, finite automat.

ACM Classification Keywords: C.2.1 Network Architecture and Design, C.4 Performance of Systems

Link:

HIERARCHICAL TWO LAYERS CONTROL COMMUTATOR FOR IMPLEMENTATION OF FULLY NON-CONFLICT SCHEDULE

Kiril Kolchakov, Vladimir Monov

http://www.foibg.com/ijima/vol03/ijima03-02-p08.pdf

IT-COMMUNICATORS FOR MEDICINE
By: Mintser et al.  (322 reads)
Rating: (1.00/10)

Abstract: Relationships and communication between doctors and patients is a very important problem in medicine. Analysis of possible interrelated directions of development and application of communicators in emergency and family medicine was performed. According to the first direction the IT communicators are intended for supporting alternative communication with the people lost temporarily or permanently possibility to speak. According to the second direction proposed communicators have databases included detailed information about types of diseases and traumas, and by results of analysis of injured person symptoms or feelings the software subsystem generates some variants of possible diseases or traumas diagnosis. It is proposed to apply special hardware-software means, particularly IT communicators to simplify the communication of doctors with patients (particularly with voice limitation) and increase treatment efficiency beginning from the first contact. Proposed IT communicators are used in family and emergency medicine for supporting first contact of doctors with patients (with voice limitation) and getting information about patient state, for example, during the preliminary examination of patients. Application of proposed modern computer devices and information technologies in medicine makes it possible to reduce a number of cognitive problems, increase the efficiency of the first contact of patients with doctors, quickly give a diagnosis and correctly select methods of treatment.

Keywords: IT communicators, problems of cognitivism in medicine, family medicine, speciality applicationdependent software.

ACM Classification Keywords: J.3 Life and Medical Sciences - Health

Link:

IT-COMMUNICATORS FOR MEDICINE

Ozar Mintser, Volodymyr Romanov, Igor Galelyuka, Oleksandr Voronenko

http://www.foibg.com/ijima/vol03/ijima03-02-p07.pdf

INFORMATIONAL MODELS OF THE ADVANCED SYSTEMS OF RADIOACCESS TO THE TELECOMMUNICA
By: Sergey Mikhailov, Sergey Shreyner   (212 reads)
Rating: (1.00/10)

Abstract: Informational models of the advanced systems of radioaccess to the telecommunications networks comparison. LTE (Long Term Evolution) technology compared with the 802.1x protocol family.

Keywords: wireless networks, WPAN, WMAN, LTE, HSDPA, OFDM.

ACM Classification Keywords: C.2 Computer-Communication? Networks; C.2.1 Network Architecture and Design – Wireless communication.

Link:

INFORMATIONAL MODELS OF THE ADVANCED SYSTEMS OF RADIOACCESS TO THE TELECOMMUNICATIONS NETWORKS COMPARISON

Sergey Mikhailov, Sergey Shreyner

http://www.foibg.com/ijima/vol03/ijima03-02-p06.pdf

METHOD OF BEHAVIORAL SOFTWARE MODELS SYNCHRONIZATION
By: Elena Chebanyuk   (209 reads)
Rating: (1.00/10)

Abstract: A method of behavioral software models synchronization is represented in this paper. Implementing this method behavioral software models, which are changed after communication with customer, are synchronized with other software models that are represented as UML diagrams. Method of behavioral software artifacts synchronization makes the Model-Driven? Development (MDD) approach more effective. For synchronization of different behavioral software models, transformation approach in the area of Model-Driven? Architecture (MDA) is proposed. Synchronization operation is executed using analytical representation of initial and resulting models. Initial behavioral software model is represented by UML Use Case Diagram. Resulting behavioral software model is represented as UML Collaboration Diagram. Analytical representation of UML Use Case diagram allows considering data flows. For this representation set-theory tool operations are used. As a Collaboration Diagram usually contains more information in comparison with Use Case one, method defines two types of Use Case diagram fragments. From the beginning Use Case diagram fragments that can be transformed directly to resulting diagram constituents are considered. Then the rest of Use Case diagram fragments are processed to represents rules of placement Collaboration Diagram messages. These rules help to designate data flows, represented in Collaboration Diagram, more accuracy. Method, proposed in this article, can be used both separately and be a part of more complex transformation technics, methods and frameworks solving different tasks in MDA sphere. Also the example of proposed method realization for solving task “designing of Vector hodograph of density lying function” (VHDLF) is represented. A process of designing Collaboration Diagram, considering Use Case diagram and ontology knowledge analysis is represented. The constituents of Collaboration Diagram, which are designed using different sources, namely Use Case diagram, ontology knowledge and requirements specification are defined.

Keywords: Software model transformation, Use Case diagram, Set-theory tool, behavioral software model synchronization, Vector hodograph of density laying function.

ACM Classification Keywords: D.2.2. Design Tools and Techniques, D.2.11. Software Architectures

Link:

METHOD OF BEHAVIORAL SOFTWARE MODELS SYNCHRONIZATION

Elena Chebanyuk

http://www.foibg.com/ijima/vol03/ijima03-02-p05.pdf

COMPARATIVE ANALYSIS OF THE LANGUAGES FOR BUSINESS RULES SPECIFICATION
By: Krassimir Manev, Neli Maneva  (205 reads)
Rating: (1.00/10)

Abstract: One of the goals of authors of the Business Rules Approach, besides making the process of specification of software more precise and adequate, was to provide a rigorous basis for reverse engineering of business rules from existing software systems. By different reasons this goal was no more a subject of interest of the involved researchers. One of the general problems of using business rules (BRs) in the reverse engineering of software is the selection of language to present the rules, extracted from the source code. In principle, it is not impossible to use for this purpose the languages dedicated for the straightforward task – using BRs for specification of software systems. The current paper presents an overview of different such languages in order to decide whether they are appropriate for rules extraction and to outline those features which will be helpful in language comparison and selection of a specific language for BR.

Keywords: software development, software modernization, software reengineering, business rules, languages for specification of business rules, automated business rules extraction, comparative analysis.

ACM Classification Keywords: D.2.1 Requirements/Specifications, D.2.7 Distribution, Maintenance, and Enhancement.

Link:

COMPARATIVE ANALYSIS OF THE LANGUAGES FOR BUSINESS RULES SPECIFICATION

Krassimir Manev, Neli Maneva

http://www.foibg.com/ijima/vol03/ijima03-02-p04.pdf

Page: 1/63  [next]
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63 
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.33 secs ]   [ Memory usage: 7.55MB ]   [ GZIP Disabled ]   [ Server load: 0.23 ]