Menu
GENERAL REGRESSION NEURO–FUZZY NETWORK FOR IDENTIFICATION ...
By: Yevgeniy Bodyanskiy, Nataliya Teslenko  (2941 reads)
Rating: (1.00/10)

Abstract: General Regression Neuro-Fuzzy? Network, which combines the properties of conventional General Regression Neural Network and Adaptive Network-based Fuzzy Inference System is proposed in this work. This network relates to so-called “memory-based networks”, which is adjusted by one-pass learning algorithm.

Keywords: memory-based networks, one-pass learning, Fuzzy Inference Systems, fuzzy-basis membership functions, neurons at data points, nonlinear identification.

ACM Classification Keywords: F.1 Computation by abstract devices - Self-modifying machines (e.g., neural networks), I.2.6 Learning - Connectionism and neural nets, G.1.2. Approximation – Nonlinear approximation.

Link:

GENERAL REGRESSION NEURO–FUZZY NETWORK FOR IDENTIFICATION OF NONSTATIONARY PLANTS

Yevgeniy Bodyanskiy, Nataliya Teslenko

http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-2-p05.pdf

FORMALIZATION OF STRUCTURAL CONSTRAINTS OF RELATIONSHIPS ...
By: Dmytro Buy, Lyudmila Silveystruk  (3093 reads)
Rating: (1.00/10)

Abstract: The basic conceptions of the model „entity-relationship” as entities, relationships, structural constraints of the relationships (index cardinality, participation degree, and structural constraints of kind (min, max)) are considered and formalized in terms of relations theory. For the binary relations two operators (min and max) are introduced; structural constraints are determined in terms of the operators; the main theorem about compatibility of these operators’ values on the source relation and inversion to it is given here.

Keywords: entity, relationship, index cardinality, participation degree, structural constraints of kind (min, max).

ACM Classification Keywords: E.4 Coding and information theory – Formal models of communication

Link:

FORMALIZATION OF STRUCTURAL CONSTRAINTS OF RELATIONSHIPS IN MODEL „ENTITY-RELATIONSHIP”

Dmytro Buy, Lyudmila Silveystruk

http://www.foibg.com/ijita/vol14/ijita14-4-p07.pdf

BUILDING DATA WAREHOUSES USING NUMBERED INFORMATION SPACES
By: Krassimir Markov  (3203 reads)
Rating: (1.00/10)

Abstract: An approach for organizing the information in the data warehouses is presented in the paper. The possibilities of the numbered information spaces for building data warehouses are discussed. An application is outlined in the paper.

Keywords: Data Warehouses, Operational Data Stores, Numbered Information Spaces

ACM Classification Keywords: E.1 Data structures, E.2 Data storage representations

Link:

BUILDING DATA WAREHOUSES USING NUMBERED INFORMATION SPACES

Krassimir Markov

http://www.foibg.com/ijita/vol12/ijita12-2-p12.pdf

ANALYSIS OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS
By: Dimitrina Polimirova-Nickolova, Eugene Nickolov  (2995 reads)
Rating: (1.00/10)

Abstract: In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of information security of objects – TIME and SIZE – are chosen and the characteristics, which reflect on their evaluation, are analyzed and estimated. A co-efficient of information security of object is proposed as a mean of the coefficients of the parameter TIME and SIZE. From the simulation experiments which were carried out methods with the highest co-efficient of information security had been determined. Assessments and conclusions for future investigations are proposed.

Keywords: Information Security, File Objects, Information Attacks, Methods of Compression, Information Flows, Coefficient of Information Security

ACM Classification Keywords: D.4.6 Security and Protection: information flow controls

Link:

ANALYSIS OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS AND PROCESSED BY METHODS OF COMPRESSION

Dimitrina Polimirova-Nickolova?, Eugene Nickolov

http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-2-p01.pdf

CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES ...
By: Maria Nickolova, Eugene Nickolov  (3099 reads)
Rating: (1.00/10)

Abstract: This paper deals with the security problems of DRM protected e-learning content. After a short review of the main DRM systems and methods used in e-learning, an examination is made of participators in DRM schemes (e-learning object author, content creator, content publisher, license creator and end user). Then a conceptual model of security related processes of DRM implementation is proposed which is improved afterwards to reflect some particularities in DRM protection of e-learning objects. A methodical way is used to describe the security related motives, responsibilities and goals of the main participators involved in the DRM system. Taken together with the process model, these security properties are used to establish a list of requirements to fulfill and a possibility for formal verification of real DRM systems compliance with these requirements.

Keywords: Security, DRM protection, e-learning.

ACM Classification Keywords: D.4.6 Security and Protection.

Link:

CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES USED FOR E-LEARNING OBJECTS PROTECTION

Maria Nickolova, Eugene Nickolov

http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-1-p18.pdf

INVESTIGATING THE RELATIONS OF ATTACKS, METHODS AND OBJECTS ...
By: Polimirova et al.  (3079 reads)
Rating: (1.00/10)

Abstract: Possibilities for investigations of 43 varieties of file formats (objects), joined in 10 groups; 89 information attacks, joined in 33 groups and 73 methods of compression, joined in 10 groups are described in the paper. Experimental, expert, possible and real relations between attacks’ groups, method’ groups and objects’ groups are determined by means of matrix transformations and the respective maximum and potential sets are defined. At the end assessments and conclusions for future investigation are proposed.

Keywords: File Formats, Information Attacks, Methods of Compression, Compressed Objects, Information Security.

ACM Classification Keywords: D.4.6 Security and Protection: information flow controls

Link:

INVESTIGATING THE RELATIONS OF ATTACKS, METHODS AND OBJECTS IN REGARD TO INFORMATION SECURITY IN NETWORK TCP/IP ENVIRONMENT

Dimitrina Polimirova, Eugene Nickolov, Cecko Nikolov

http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-1-p17.pdf

RESEARCH OF THE INFLUENCE OF METHODS OF COMPRESSION ON ...
By: Polimirova et al.  (3171 reads)
Rating: (1.00/10)

Abstract: In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-efficient of information security, which reflects the influence of the level of compression obtained after applying methods of compression to objects and the time, required by the attack to get access to the corresponding object, is proposed. Methods’ groups with the highest and respectively the lowest values of the co-efficient of information security for all methods’ groups in relation to all attacks’ groups are determined. Assessments and conclusions for future investigations are proposed.

Keywords: Information Flows, Information Security, Information Attacks, Methods of Compression, Compressed Objects, Coefficient of Information Security, Level of Compression.

ACM Classification Keywords: D.4.6 Security and Protection: information flow controls

Link:

RESEARCH OF THE INFLUENCE OF METHODS OF COMPRESSION ON THE CO-EFFICIENT OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS

Dimitrina Polimirova, Eugene Nickolov, Cecko Nikolov

http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-3-p10.pdf

VERIFICATION AND APPLICATION OF CONCEPTUAL MODEL AND SECURITY ...
By: Maria Nickolova, Eugene Nickolov  (3312 reads)
Rating: (1.00/10)

Abstract: The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in practice is checked as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's iTunes, SunnComm? Technologies’s MediaMax? DRM and First4Internet’s? XCP DRM). The exploited weaknesses of these systems resulting from the violation of specific security requirements are explained and the possibilities to avoid the attacks by implementing the requirements in designing step are discussed.

Keywords: Security, DRM protection, e-learning.

ACM Classification Keywords: D.4.6 Security and Protection

Link:

VERIFICATION AND APPLICATION OF CONCEPTUAL MODEL AND SECURITY REQUIREMENTS ON PRACTICAL DRM SYSTEMS IN E-LEARNING

Maria Nickolova, Eugene Nickolov

http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-2-p10.pdf

APPLICATION OF METHODS OF MULTI-CRITERIA EVALUATION IN CHOOSING A METHOD ...
By: Polimirova et al.  (3079 reads)
Rating: (1.00/10)

Abstract: In this paper is proposed a model for researching the capability to influence, by selected methods’ groups of compression, to the co-efficient of information security of selected objects’ groups, exposed to selected attacks’ groups. With the help of methods for multi-criteria evaluation are chosen the methods’ groups with the lowest risk with respect to the information security. Recommendations for future investigations are proposed.

Keywords: Attacks, Methods of Compression, Objects, Information Security, Methods for Multi-criteria Evaluation, Risk Assessment.

ACM Classification Keywords: D.4.6 Security and Protection: information flow controls

Link:

APPLICATION OF METHODS OF MULTI-CRITERIA EVALUATION IN CHOOSING A METHOD OF COMPRESSION AS A MEANS OF HEIGHTENING THE INFORMATION SECURITY OF SYSTEM AND APPLIED OBJECTS

Dimitrina Polimirova, Eugene Nickolov, Cecko Nikolov

http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-4-p09.pdf

THREAT MODEL FOR USER SECURITY IN E-LEARNING SYSTEMS
By: Maria Nickolova, Eugene Nickolov  (3695 reads)
Rating: (1.00/10)

Abstract: This paper suggest a generic threat model for the processes in e-learning systems. After a breaf discussion of the particularities of e-learning systems from the security point of view, the role of threat models in system security is explained. Then a characterization of the attackers is made, together with the assets and entry points identification and threats identification and classification. The most probable attacks for e-learning system are described regardless of the specific implementation, to help the e-learning system developers to eliminate or mitigate these attacks if possible in the design stage not waiting for actual attacks to occur.

Keywords: Security, threat modeling, e-learning.

ACM Classification Keywords: D.4.6 Security and Protection

Link:

THREAT MODEL FOR USER SECURITY IN E-LEARNING SYSTEMS

Maria Nickolova, Eugene Nickolov

http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-4-p07.pdf

EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS ...
By: Dimitrina Polimirova-Nickolova, Eugene Nickolov  (3513 reads)
Rating: (1.00/10)

Abstract: The principal methods of compression and different types of non-encrypted objects are described. An analysis is made of the results obtained from examinations of the speed of compression for objects when using passwords with different length. The size of the new file obtained after compression is also analyzed. Some evaluations are made with regard to the methods and the objects used in the examinations. In conclusion some deductions are drawn as well as recommendations for future work.

Keywords: Password, Methods of Compression, Non-Encrypted? Applications, Archive Programs, Level of Compression, File Extensions, Information Security.

ACM Classification Keywords: D.4.6 Security and Protection: information flow controls

Link:

EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS OF NON-ENCRYPTED OBJECTS

Dimitrina Polimirova-Nickolova?, Eugene Nickolov

http://www.foibg.com/ijita/vol12/ijita12-1-p05.pdf

ADVANCE OF THE ACCESS METHODS
By: Markov et al.  (3022 reads)
Rating: (1.00/10)

Abstract: The goal of this paper is to outline the advance of the access methods in the last ten years as well as to make review of all available in the accessible bibliography methods.

Keywords: Access Methods, Overview of the Access Methods

ACM Classification Keywords: D.4.3 File Systems Management, Access methods

Link:

ADVANCE OF THE ACCESS METHODS

Krassimir Markov, Krassimira Ivanova, Ilia Mitov, Stefan Karastanev

http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-2-p04.pdf

HANDLING THE SUBCLASSING ANOMALY WITH OBJECT TEAMS
By: Jeff Furlong, Atanas Radenski  (3336 reads)
Rating: (1.00/10)

Abstract: Java software or libraries can evolve via subclassing. Unfortunately, subclassing may not properly support code adaptation when there are dependencies between classes. More precisely, subclassing in collections of related classes may require reimplementation of otherwise valid classes. This problem is defined as the subclassing anomaly, which is an issue when software evolution or code reuse is a goal of the programmer who is using existing classes. Object Teams offers an implicit fix to this problem and is largely compatible with the existing JVMs. In this paper, we evaluate how well Object Teams succeeds in providing a solution for a complex, real world project. Our results indicate that while Object Teams is a suitable solution for simple examples, it does not meet the requirements for large scale projects. The reasons why Object Teams fails in certain usages may prove useful to those who create linguistic modifications in languages or those who seek new methods for code adaptation.

Keywords: Languages; Code reuse; Subclassing

ACM Classification Keywords: D.3.2 Programming Languages: Language Classifications – Extensible languages, object-oriented languages; D.3.3 Programming Languages: Language Constructs and Features – Classes and objects, data types and structures, inheritance, polymorphism

Link:

HANDLING THE SUBCLASSING ANOMALY WITH OBJECT TEAMS

Jeff Furlong, Atanas Radenski

http://www.foibg.com/ijita/vol13/ijita13-1-p12.pdf

USING THE BUSINESS PROCESS EXECUTION LANGUAGE FOR MANAGING ...
By: Anna Malinova, Snezhana Gocheva-Ilieva  (3171 reads)
Rating: (1.00/10)

Abstract: This paper describes the use of the Business Process Execution Language for Web Services (BPEL4WS/BPEL) for managing scientific workflows. This work is result of our attempt to adopt Service Oriented Architecture in order to perform Web services – based simulation of metal vapor lasers. Scientific workflows can be more demanding in their requirements than business processes. In the context of addressing these requirements, the features of the BPEL4WS specification are discussed, which is widely regarded as the de-facto standard for orchestrating Web services for business workflows. A typical use case of calculation the electric field potential and intensity distributions is discussed as an example of building a BPEL process to perform distributed simulation constructed by loosely-coupled services. Keywords: BPEL, scientific workflows, Web services, SOA. ACM Classification Keywords: D.2.12 Interoperability - Distributed objects Link: USING THE BUSINESS PROCESS EXECUTION LANGUAGE FOR MANAGING SCIENTIFIC PROCESSES Anna Malinova, Snezhana Gocheva-Ilieva?

http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-3-p09.pdf

A SMALL SETTINGS CASE STUDY USING TSPI ...
By: Calvo-Manzano et al.  (3168 reads)
Rating: (1.00/10)

Abstract: This article introduces a small setting case study about the benefits of using TSPi in a software project. An adapted process from the current process based on the TSPi was defined. The pilot project had schedule and budget constraints. The process began by gathering historical data from previous projects in order to get a measurement repository. The project was launched with the following goals: increase the productivity, reduce the test time and improve the product quality. Finally, the results were analysed and the goals were verified.

Keywords: TSPi, Small Settings, Process improvement.

ACM Classification Keywords: D.2.9 Software Engineering – Management, software process models

Link:

A SMALL SETTINGS CASE STUDY USING TSPI IN A SOFTWARE PROJECT

Jose Calvo-Manzano?, Gonzalo Cuevas, Tomás San Feliu, Edgar Caballero

http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-3-p07.pdf

REQUIREMENTS MANAGEMENT AND ACQUISITION MANAGEMENT ...
By: Calvo-Manzano et al.  (3315 reads)
Rating: (1.00/10)

Abstract: As a part of the activities of the first Symposium on Process Improvement Models and Software Quality of the Spanish Public Administration, working groups were formed to discuss the current state of the Requirements Management and Supplier Agreement Management processes. This article presents general results and main contributions of those working groups. The results have allowed the obtention of a preliminary appraisal of the current state of these two processes in the Spanish Public Administration.

Keywords: Requirements engineering, subcontracting management, improvement models, process.

ACM Classification Keywords: D.2.9 Management, K.6.3 Software Management

Link:

REQUIREMENTS MANAGEMENT AND ACQUISITION MANAGEMENT EXPERIENCES IN SPANISH PUBLIC ADMINISTRATIONS

Jose A. Calvo-Manzano?, Gonzalo Cuevas, Ivan Garcia,Tomas San Feliu, Ariel Serrano, Magdalena Arcilla, Fernando Arboledas, Fernando Ruiz de Ojeda

http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-2-p03.pdf

ON THE MODELS OF DEVELOPMENT AND DISTRIBUTION OF SOFTWARE
By: Neli Maneva, Krassimir Manev  (2946 reads)
Rating: (1.00/10)

Abstract: The notion model of development and distribution of software (MDDS) is introduced and its role for the efficiency of the software products is stressed. Two classical MDDS are presented and some attempts to adapt them to the contemporary trends in web-based software design are described. Advantages and shortcomings of the obtained models are outlined. In conclusion the desired features of a better MDDS for web-based solutions are given.

Keywords: models of development and distribution of software, efficiency, web-based solutions.

ACM Classification Keywords: D.2.7 Distribution, Maintenance, and Enhancement; D.2.9 Management.

Link:

ON THE MODELS OF DEVELOPMENT AND DISTRIBUTION OF SOFTWARE

Neli Maneva, Krassimir Manev

http://www.foibg.com/ijita/vol15/ijita15-2-p11.pdf

DEVELOPMENT OF THE COMBINED METHOD FOR DESIGNING DATAFLOW SYSTEMS
By: Nina Bakanova, Tatiana Atanasova  (3450 reads)
Rating: (1.00/10)

Abstract: The methods of designing of information systems for large organizations are considered in the paper. The structural and object-oriented approaches are compared. For the practical realization of the automated dataflow systems the combined method for the system development and analysis is proposed.

Keywords: designing of information systems, document circulation, dataflow, office-work

ACM Classification Keywords: D.2.2 Design Tools and Techniques: Computer-aided software engineering (CASE); H.4 Information Systems Applications: Workflow management

Link:

DEVELOPMENT OF THE COMBINED METHOD FOR DESIGNING DATAFLOW SYSTEMS

Nina Bakanova, Tatiana Atanasova

http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-3-p10.pdf

EXPERIENCES ON APPLICATION GENERATORS
By: Garcia et al.  (3573 reads)
Rating: (1.00/10)

Abstract: The National Institute for Statistics is the organism responsible for acquiring economical data for governmental statistics purposes. Lisbon agreements establish a framework in which this acquisition process shall be available through Internet, so each survey should be considered as a little software project to be developed and maintained. Considering the great amount of different surveys and all changes produced per year on each make impossible this task. An application generator has been developed to automate this task, taking as a start point the Word or PDF template of a survey, and going through a graphical form designer as all human effort, all HTML, Java classes and Oracle database resources are generated and sent from backoffice to frontoffice servers, reducing the team to carry out the whole set of electronic surveys to two people from non I.T. staff.

Keywords: Software automation, application generators, CASE.

ACM Classification keywords: D2.2. Design Tools and Techniques

Link:

EXPERIENCES ON APPLICATION GENERATORS

Hector Garcia, Carlos del Cuvillo, Diego Perez, Borja Lazaro

http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-2-p05.pdf

IMPLICATIONS OF RECENT TRENDS IN TELECOMMUNICATIONS ON MODELING ...
By: Gerta Köster, Stoyan Poryazov  (3314 reads)
Rating: (1.00/10)

Abstract: With this paper we would like to trigger a discussion on future needs of modeling and simulation techniques and tools for the telecommunication industry. We claim that the telecommunication market has undergone severe changes that affect the need for and type of simulations in industrial research. We suggest some approaches how to address these new challenges. We believe that there is need for intensive research in the area.

Keywords: Telecommunications, Market Evolution, Modeling and Simulation Challenges.

ACM Classification Keywords: D.2.2 Design Tools and Techniques; K.6.1 Project and People Management.

Link:

IMPLICATIONS OF RECENT TRENDS IN TELECOMMUNICATIONS ON MODELING AND SIMULATION FOR THE TELECOMMUNICATION INDUSTRY

Gerta Köster, Stoyan Poryazov

http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-2-p02.pdf

THE APPLICATION OF GRAPH MODEL FOR AUTOMATION
By: Elena Kudelko  (3663 reads)
Rating: (1.00/10)

THE APPLICATION OF GRAPH MODEL FOR AUTOMATION OF THE USER INTERFACE CONSTRUCTION Elena Kudelko

Abstract: The ability of automatic graphic user interface construction is described. It is based on the building of user interface as reflection of the data domain logical definition. The submitted approach to development of the information system user interface enables dynamic adaptation of the system during their operation. This approach is used for creation of information systems based on CASE-system METAS.

Keywords: User interface, metadata, CASE-technology, dynamically adapted information systems, graph model.

ACM Classification Keywords: D.2.2 Software Engineering: Design Tools and Techniques – Computer-aided software engineering (CASE); G.2.2 Discrete Mathematics: Graph Theory – Graph algorithms.

Link:

THE APPLICATION OF GRAPH MODEL FOR AUTOMATION OF THE USER INTERFACE CONSTRUCTION

Elena Kudelko

http://www.foibg.com/ijita/vol14/ijita14-4-p11.pdf

THE TECHNOLOGY OF PROGRAMMING FOR A CLUSTER COMPUTER ...
By: Dmitry Cheremisinov, Liudmila Cheremisinova  (3304 reads)
Rating: (1.00/10)

Abstract. The problem of preparation of a program to perform it on multiprocessor system of a cluster type is considered. When developing programs for a cluster computer the technology based on use of the remote terminal is applied. The situation when such remote terminal is the computer with operational system Windows is considered. The set of the tool means, allowing carrying out of editing program texts, compiling and starting programs on a cluster computer, is suggested. Advantage of an offered way of preparation of programs to execution is that it allows as much as possible to use practical experience of programmers used to working in OS Windows environment.

Keywords: parallel programming, cluster computer, programming technology.

ACM Classification Keywords: D.2.1 Software engineering: Requirements/Specifications – Tools; D.1.3 Programming techniques: Concurrent Programming – Parallel programming.

Link:

THE TECHNOLOGY OF PROGRAMMING FOR A CLUSTER COMPUTER BY THE REMOTE TERMINAL WITH OS WINDOWS

Dmitry Cheremisinov, Liudmila Cheremisinova

http://www.foibg.com/ijita/vol14/ijita14-4-p13.pdf

IMPLEMENTATION OF DISTANT LEARNING PORTALS BASED ON ...
By: Lyadova et al.  (2876 reads)
Rating: (1.00/10)

Abstract: The paper describes an approach to the development of software aimed at the creation of distant learning portals integrated with education support and educational institution management systems. The software being developed is based on CASE-technology METAS which is used for the creation of adaptive distributed information systems. This technology allows to dynamically adjust the portal’s structure and portal’s functionality enhancements.

Keywords: portal, learning portal, distant learning, testing, information system, CASE-technology.

ACM Classification Keywords: D.2 Software Engineering: D.2.2 Design Tools and Techniques – Computeraided software engineering (CASE); H.3 Information Storage and Retrieval: H.3.5 Online Information Services – Web-based services; K.3 Computers and Education: K.3.1 Computer Uses in Education – Distance learning.

Link:

IMPLEMENTATION OF DISTANT LEARNING PORTALS BASED ON CASE-TECHNOLOGY METAS

Ludmila Lyadova, Alexey Urezalov, Andrey Khlyzov

http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-5-p17.pdf

DATA INDEPENDENCE IN THE MULTI-DIMENSIONAL NUMBERED INFORMATION SPACES
By: Krassimir Markov  (3188 reads)
Rating: (1.00/10)

Abstract: The concept of data independence designates the techniques that allow data to be changed without affecting the applications that process it. The different structures of the information bases require corresponded tools for supporting data independence. A kind of information bases (the Multi-dimensional Numbered Information Spaces) are pointed in the paper. The data independence in such information bases is discussed.

Keywords: Data independence; Multi-dimensional Numbered Information Spaces

ACM Classification Keywords: D.2 Software Engineering; H.2 Database Management

Link:

DATA INDEPENDENCE IN THE MULTI-DIMENSIONAL NUMBERED INFORMATION SPACES

Krassimir Markov

http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-1-p16.pdf

ARCHITECTURE AND IMPLEMENTATION OF REPORTING MEANS IN ADAPTIVE
By: Vyacheslav Lanin  (2971 reads)
Rating: (1.00/10)

Abstract: This article describes architecture and implementation of subsystem intended for working with queries and reports in adaptive dynamically extended information systems able to dynamically extending. The main features of developed approach are application universality, user orientation and opportunity to integrate with external information systems. Software implementation is based on multilevel metadata approach.

Keywords: CASE-technology, adaptive information system, electronic document, query builder, report generation.

ACM Classification Keywords: D.2 Software Engineering: D.2.2 Design Tools and Techniques – Computeraided software engineering (CASE); H.2: Database Management: H.2.3 Languages – Report writers; H.3.3 Information Search and Retrieval – Query formulation.

Link:

ARCHITECTURE AND IMPLEMENTATION OF REPORTING MEANS IN ADAPTIVE DYNAMICALLY EXTENDED INFORMATION SYSTEMS

Vyacheslav Lanin

http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-3-p12.pdf

[prev]  Page: 64/66  [next]
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66 
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.16 secs ]   [ Memory usage: 7.54MB ]   [ GZIP Disabled ]   [ Server load: 0.46 ]