|
EDUCATIONAL GAMES FOR LEARNING PROGRAMMING LANGUAGES
By: Shabalina et al.
(3999 reads)
Rating:
(1.00/10)
|
Abstract: A concept of educational game for learning programming languages is presented. The idea of learning
programming languages and improving programming skills through programming game characters’ behavior is
described. The learning course description rules for using in games are suggested. The concept is implemented
in a game for learning C# programming language. A common game architecture is modified for using in the
educational game. The game engine is built on the base of the graphical engine Ogre3D and extended with game
logic. The game has been developed as an industry level commercial product and is planned for sale to
educational institutions.
Keywords: educational games, serious games, digital game-based learning, e-learning, course notation, game
engine, learning engine.
ACM Classification Keywords: K.3.1 Computer Uses in Education; K.3.2 Computer and Information Science
Education
Link:
EDUCATIONAL GAMES FOR LEARNING PROGRAMMING LANGUAGES
Olga Shabalina, Pavel Vorobkalov, Alexander Kataev, Alexey Tarasenko
http://www.foibg.com/ibs_isc/ibs-06/IBS-06-p11.pdf
|
THE CONCEPTION OF CREATION OF INTEGRATED DEVELOPMENT ...
By: Shubin et al.
(3719 reads)
Rating:
(1.00/10)
|
Abstract: The various questions of creation of integrated development environment for computer training
systems are considered in the given paper. The information technologies that can be used for creation of the
integrated development environment are described. The different didactic aspects of realization of such systems
are analyzed. The ways to improve the efficiency and quality of learning process with computer training systems
for distance education are pointed
Keywords: Web-Based? Design, Distance Learning, Learning Course Model, Computer-Based? Training System,
Hypertext.
ACM Classification Keywords: K.3.1 Computer Uses in Education
Link:
THE CONCEPTION OF CREATION OF INTEGRATED DEVELOPMENT
ENVIRONMENT FOR COMPUTER TRAINING SYSTEMS
Igor Shubin, Dmitry Shevchuk, Tatiana Gorbach,
Aleksey Tischenko, Svitlana Krytsyna, Iryna Bilous
http://www.foibg.com/ibs_isc/ibs-06/IBS-06-p09.pdf
|
USING REENGINEERING TECHNIQUES FOR DISTANCE STUDY COURSE IMPROVEMENT
By: Lina Tankeleviciene
(3699 reads)
Rating:
(1.00/10)
|
Abstract: The paper analyses the reengineering concept as it comes from software engineering and
management fields. We combine two viewpoints and apply them to solve a problem of reengineering of a
distance study system, in general, and the unit of learning, in particular. We propose a framework for
reengineering of unit of learning, based on general model of software reengineering, and present a case study, in
which we describe, how one topic of distance study course was reengineered, considering triple consistency
principle and requirements for computer science. The proposed framework contributes to increasing quality,
effectiveness and systematization of delivering distance studies.
Keywords: distance study course, reengineering, triple consistency principle.
ACM Classification Keywords: K.3.1 Computer Uses in Education
Link:
USING REENGINEERING TECHNIQUES FOR DISTANCE STUDY COURSE IMPROVEMENT
Lina Tankeleviciene
http://www.foibg.com/ibs_isc/ibs-06/IBS-06-p02.pdf
|
QUALITY ESTIMATION OF E-LEARNING SYSTEMS
By: Pavel Vorobkalov, Valerij Kamaev
(3767 reads)
Rating:
(1.00/10)
|
Abstract: Existing approaches to quality estimation of e-learning systems are analyzed. The “layered” approach
for quality estimation of e-learning systems enhanced with learning process modeling and simulation is
presented. The method of quality estimation using learning process modeling and quality criteria are suggested.
The learning process model based on extended colored stochastic Petri net is described. The method has been
implemented in the automated system of quality estimation of e-learning systems named “QuAdS”. Results of
approbation of the developed method and quality criteria are shown. We argue that using learning process
modeling for quality estimation simplifies identifying lacks of an e-learning system for an expert.
Keywords: e-learning, adaptive learning systems, quality estimation.
ACM Classification Keywords: K.3.1 Computer Uses in Education
Link:
QUALITY ESTIMATION OF E-LEARNING SYSTEMS
Pavel Vorobkalov, Valerij Kamaev
http://www.foibg.com/ibs_isc/ibs-06/IBS-06-p03.pdf
|
E-LEARNING, E-PRACTISING AND E-TUTORING: AN INTEGRATED APPROACH
By: Zheleva et al.
(3861 reads)
Rating:
(1.00/10)
|
Abstract: In this paper is described a didactic methodology combining current e-learning methods and the
support of Intelligent Agents technologies. The aim is to favor the synthesis among theoretical approach and
based practical approach using the so-called Intelligent Agent, software that exploits the Artificial Intelligence and
that operates as tutor, facilitating the consumers in the training operations. The paper illustrates how such new
Intelligent Agent algorithm (IA) is used in the training of employees working in the transportation sector, thanks to
the experience gained with the PARMENIDE project - Promoting Advanced Resources and Methodologies for
New Teaching and Learning Solutions in Digital Education.
Keywords: Learning-by-doing, On-the-job Training, Intelligent Agents, Fuzzy Logic, Virtual Pedagogical
Character, Virtual Tutor.
ACM Classification Keywords: I. Computing Methodologies I.2 Artificial Intelligence I.2.6 Learning – Knowledge
Acquisition, J. Computer Applications J.7 Computers in Other Systems - Process control
Link:
E-LEARNING, E-PRACTISING AND E-TUTORING: AN INTEGRATED APPROACH
Mariya Monova-Zheleva?,Yanislav Zhelev, Ilaria Mascitti
http://www.foibg.com/ibs_isc/ibs-06/IBS-06-p12.pdf
|
ON A DIRECT APPROACH TO THE SOLUTION OF INVERSE OPTICAL PROBLEMS
By: Peter Sharlandjiev, Georgi Stoilov
(3415 reads)
Rating:
(1.00/10)
|
Abstract: The evaluation from experimental data, of physical quantities, which enter into the electromagnetic
Maxwell equations, is described as inverse optical problem. The functional relations between the dependent and independent variables are of transcendental character and numeric procedures for evaluation of the unknowns
are largely used. Herein, we discuss a direct approach to the solution, illustrated by a specific example of
determination of thin films optical constants from spectrophotometric data. New algorithm is proposed for the
parameters evaluation, which does not need an initial guess of the unknowns and does not use iterative
procedures. Thus we overcome the intrinsic deficiency of minimization techniques, such as gradient search
methods, Simplex methods, etc. The price of it is a need of more computing power, but our algorithm is easily
implemented in structures such as grid clusters. We show the advantages of this approach and its potential for
generalization to other inverse optical problems.
Keywords: Thin films; Materials and process characterization
ACM Classification Keywords: J.2 Physical Sciences and Engineering (Physics)
Link:
ON A DIRECT APPROACH TO THE SOLUTION OF INVERSE OPTICAL PROBLEMS
Peter Sharlandjiev, Georgi Stoilov
http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p06.pdf
|
PROJECTIVE METHODS OF IMAGE RECOGNITION
By: Putyatin et al.
(4142 reads)
Rating:
(1.00/10)
|
Abstract: We propose a method for image recognition on the base of projections. Radon transform gives an
opportunity to map image into space of its projections. Projection properties allow constructing informative
features on the base of moments that can be successfully used for invariant recognition. Offered approach gives
about 91-97% of correct recognition.
Keywords: Radon transforms, invariant features, pattern recognition, image projections.
ACM Classification Keywords: I.4.7 Feature Measurement – Invariants
Link:
PROJECTIVE METHODS OF IMAGE RECOGNITION
Yevgeniy Putyatin, Vladimir Gorohovatsky, Alexey Gorohovatsky, Elena Peredriy
http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p05.pdf
|
DISTANCE MATRIX APPROACH TO CONTENT IMAGE RETRIEVAL
By: Kinoshenko et al.
(3452 reads)
Rating:
(1.00/10)
|
Abstract: As the volume of image data and the need of using it in various applications is growing significantly in
the last days it brings a necessity of retrieval efficiency and effectiveness. Unfortunately, existing indexing
methods are not applicable to a wide range of problem-oriented fields due to their operating time limitations and
strong dependency on the traditional descriptors extracted from the image. To meet higher requirements, a novel
distance-based indexing method for region-based image retrieval has been proposed and investigated. The
method creates premises for considering embedded partitions of images to carry out the search with different
refinement or roughening level and so to seek the image meaningful content.
Keywords: content image retrieval, distance matrix, indexing.
ACM Classification Keywords: H.3.3 Information Search and Retrieval: Search process
Link:
DISTANCE MATRIX APPROACH TO CONTENT IMAGE RETRIEVAL
Dmitry Kinoshenko, Vladimir Mashtalir, Elena Yegorova
http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p04.pdf
|
APPLICATION OF FUZZY LOGIC ON IMAGE EDGE DETECTION
By: Mathur et al.
(7836 reads)
Rating:
(1.00/10)
|
Abstract: In this paper a novel method for an application of digital image processing, Edge Detection is
developed. The contemporary Fuzzy logic, a key concept of artificial intelligence helps to implement the fuzzy
relative pixel value algorithms and helps to find and highlight all the edges associated with an image by checking
the relative pixel values and thus provides an algorithm to abridge the concepts of digital image processing and
artificial intelligence. Exhaustive scanning of an image using the windowing technique takes place which is
subjected to a set of fuzzy conditions for the comparison of pixel values with adjacent pixels to check the pixel
magnitude gradient in the window. After the testing of fuzzy conditions the appropriate values are allocated to the
pixels in the window under testing to provide an image highlighted with all the associated edges.
Keywords: Fuzzy logic, digital image processing, feature extraction.
ACM Classification Keywords: I.2 Artificial Intelligence, I.4 Image processing and computer vision
Link:
APPLICATION OF FUZZY LOGIC ON IMAGE EDGE DETECTION
Shashank Mathur, Anil Ahlawat
http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p03.pdf
|
ON THE FEASIBILITY OF STEERING SWALLOWABLE MICROSYSTEM CAPSULES ...
By: Wu et al.
(3559 reads)
Rating:
(1.00/10)
|
Abstract: Swallowable capsule endoscopy is used for non-invasive diagnosis of some gastrointestinal (GI)
organs. However, control over the position of the capsule is a major unresolved issue. This study presents a
design for steering the capsule based on magnetic levitation. The levitation is stabilized with the aid of a
computer-aided feedback control system and diamagnetism. Peristaltic and gravitational forces to be overcome
were calculated. A levitation setup was built to analyze the feasibility of using Hall Effect sensors to locate the invivo
capsule. CAD software Maxwell 3D (Ansoft, Pittsburgh, PA) was used to determine the dimensions of the
resistive electromagnets required for levitation and the feasibility of building them was examined. Comparison
based on design complexity was made between positioning the patient supinely and upright.
Keywords: Computer-Aided? Magnetic Levitation, Capsule Endoscopy, Real-Time? Image Transmission
ACM Classification Keywords: J.6 Computer-Aided? Engineering
Link:
ON THE FEASIBILITY OF STEERING SWALLOWABLE MICROSYSTEM CAPSULES
USING COMPUTER-AIDED MAGNETIC LEVITATION
Billy T. Wu, Martin P. Mintchev
http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p02.pdf
|
HARDWARE IMPLEMENTATIONS OF VIDEO WATERMARKING
By: Li et al.
(3191 reads)
Rating:
(1.00/10)
|
Abstract: Various digital watermarking (WM) techniques for still imaging have been studied in the last several
years. Recently, many new WM schemes have been proposed for other types of digital multimedia data, such as
text, audio and video. This paper presents a brief overview of existing digital video WM. We classify WM
techniques and discuss the properties of video WM. Since each WM application has its own specific
requirements, WM design must take the intended application into consideration. Video WM applications are also
discussed in the paper. The features of video WM implementations in software and hardware and their
differences are presented through the description of four examples of existing work.
Keywords: Digital video, watermarking, WM, hardware implementation, security.
ACM Classification Keywords: B.0 Hardware - Conference proceedings
Link:
HARDWARE IMPLEMENTATIONS OF VIDEO WATERMARKING
Xin Li, Yonatan Shoshan, Alexander Fish, Graham Jullien, Orly Yadid-Pecht?
http://www.foibg.com/ibs_isc/ibs-05/IBS-05-p01.pdf
|
CORE DESIGN PATTERN FOR EFFICIENT MULTI-AGENT ARCHITECTURE
By: Kasper Hallenborg
(4130 reads)
Rating:
(1.00/10)
|
Abstract: Interaction engineering is fundamental for agent based systems. In this paper we will present a design
pattern for the core of a multi-agent platform - the message communication and behavior activation mechanisms -
using language features of C#. An agent platform is developed based on the pattern structure, which is legitimated
through experiences of using JADE in real applications. Results of the communication model are
compared against the popular JADE platform.
Keywords: multi-agents, design pattern, C# language features, message based architecture, behaviors.
ACM Classification Keywords: D.2.11 Software Architectures, D.2.13 Reusable Software.
Link:
CORE DESIGN PATTERN FOR EFFICIENT MULTI-AGENT ARCHITECTURE
Kasper Hallenborg
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p04.pdf
|
A LOG TOOL FOR SOFTWARE SYSTEMS ANALYSES
By: Karelin et al.
(3892 reads)
Rating:
(1.00/10)
|
Abstract: The article presents a new type of logs merging tool for multiple blade telecommunication systems
based on the development of a new approach. The introduction of the new logs merging tool (the Log Merger)
can help engineers to build a processes behavior timeline with a flexible system of information structuring used to
assess the changes in the analyzed system. This logs merging system based on the experts experience and their
analytical skills generates a knowledge base which could be advantageous in further decision-making expert
system development. This paper proposes and discusses the design and implementation of the Log Merger, its
architecture, multi-board analysis of capability and application areas. The paper also presents possible ways of
further tool improvement e.g. - to extend its functionality and cover additional system platforms. The possibility to
add an analysis module for further expert system development is also considered.
Keywords: Knowledge Base, Software Systems Analyses, Log Tool, Telecommunication System.
ACM Classification Keywords: B.8.0 Hardware – Performance and Reliability - General, D.2.5 Software –
Software Engineering - Testing and Debugging, H.3.4 Information Systems - Information Storage and retrieval -
Systems and Software.
Link:
A LOG TOOL FOR SOFTWARE SYSTEMS ANALYSES
Igor Karelin, Boris Lyubimov, Tatyana Gavrilova
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p09.pdf
|
KEY AGREEMENT PROTOCOL USING ELLIPTIC CURVE MATRIX POWER FUNCTION*
By: Artūras Katvickis, Paulius Vitkus
(4353 reads)
Rating:
(1.00/10)
|
Abstract: The key agreement protocol (KAP) using elliptic curve matrix power function is presented. This function
pretends be a one-way function since its inversion is related with bilinear equation solution over elliptic curve
group. The matrix of elliptic curve points is multiplied from left and right by two matrices with entries in Zn.
Some preliminary security considerations are presented.
Keywords: key agreement protocol, elliptic curve cryptography, NP-complete problem.
ACM Classification Keywords: E.3 Data Encryption, F.2.1 Numerical Algorithms and Problems.
Link:
KEY AGREEMENT PROTOCOL USING ELLIPTIC CURVE MATRIX POWER FUNCTION*
Artūras Katvickis, Paulius Vitkus
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p16.pdf
|
DATA PROTECTION AND PACKET MODE IN THE DISTRIBUTED INFORMATION MEASUREMENT ...
By: Kiprushkin et al.
(3840 reads)
Rating:
(1.00/10)
|
Abstract: The present paper is devoted to creation of cryptographic data security and realization of the packet
mode in the distributed information measurement and control system that implements methods of optical
spectroscopy for plasma physics research and atomic collisions. This system gives a remote access to
information and instrument resources within the Intranet/Internet networks. The system provides remote access
to information and hardware resources for the natural sciences within the Intranet/Internet networks. The access
to physical equipment is realized through the standard interface servers (PXI, CАМАC, and GPIB), the server
providing access to Ethernet devices, and the communication server, which integrates the equipment servers into
a uniform information system. The system is used to make research task in optical spectroscopy, as well as to
support the process of education at the Department of Physics and Engineering of Petrozavodsk State University.
Keywords: distributed information measurement and control system, equipment server, PXI server, CAMAC
server, GPIB server, distance learning.
ACM Classification Keywords: H.3.4 Systems and Software: Distributed systems.
Link:
DATA PROTECTION AND PACKET MODE IN THE DISTRIBUTED INFORMATION MEASUREMENT AND CONTROL SYSTEM
FOR RESEARCH IN PHYSICS
Sergey Kiprushkin, Nikolay Korolev, Sergey Kurskov, Vadim Semin
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p12.pdf
|
GRID APPROACH TO SATELLITE MONITORING SYSTEMS INTEGRATION
By: Kussul et al.
(3562 reads)
Rating:
(1.00/10)
|
Abstract: This paper highlights the challenges of satellite monitoring systems integration, in particular based on
Grid platform, and reviews possible solutions for these problems. We describe integration issues on different
levels: data integration level and task management level (job submission in terms of Grid). We show example of
described technologies for integration of monitoring systems of Ukraine (National Space Agency of Ukraine,
NASU) and Russia (Space Research Institute RAS, IKI RAN). Another example refers to the development of
InterGrid? infrastructure that integrates several regional and national Grid systems: Ukrainian Academician Grid
(with Satellite data processing Grid segment) and RSGS Grid (Chinese Academy of Sciences).
Keywords: Grid systems, satellite monitoring systems.
ACM Classification Keywords: H. Information Systems - H.1 Models and Principles
Link:
GRID APPROACH TO SATELLITE MONITORING SYSTEMS INTEGRATION
Nataliia Kussul, Andrii Shelestov, Serhiy Skakun
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p11.pdf
|
MATRIX POWER S-BOX ANALYSIS1
By: Kestutis Luksys, Petras Nefas
(4872 reads)
Rating:
(1.00/10)
|
Abstract: Construction of symmetric cipher S-box based on matrix power function and dependant on key is
analyzed. The matrix consisting of plain data bit strings is combined with three round key matrices using
arithmetical addition and exponent operations. The matrix power means the matrix powered by other matrix. This
operation is linked with two sound one-way functions: the discrete logarithm problem and decomposition problem.
The latter is used in the infinite non-commutative group based public key cryptosystems. The mathematical
description of proposed S-box in its nature possesses a good “confusion and diffusion” properties and contains
variables “of a complex type” as was formulated by Shannon. Core properties of matrix power operation are
formulated and proven. Some preliminary cryptographic characteristics of constructed S-box are calculated.
Keywords: Matrix power, symmetric encryption, S-box.
ACM Classification Keywords: E.3 Data Encryption, F.2.1 Numerical Algorithms and Problems.
Link:
MATRIX POWER S-BOX ANALYSIS1
Kestutis Luksys, Petras Nefas
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p15.pdf
|
KNOWLEDGE CONSTRUCTION TECHNOLOGY THROUGH HYPERMEDIA-BASED ...
By: S.M.F.D Syed Mustapha
(3888 reads)
Rating:
(1.00/10)
|
Abstract: There have been multifarious approaches in building expert knowledge in medical or engineering field
through expert system, case-based reasoning, model-based reasoning and also a large-scale knowledge-based
system. The intriguing factors with these approaches are mainly the choices of reasoning mechanism, ontology,
knowledge representation, elicitation and modeling. In our study, we argue that the knowledge construction
through hypermedia-based community channel is an effective approach in constructing expert’s knowledge. We
define that the knowledge can be represented as in the simplest form such as stories to the most complex ones
such as on-the-job type of experiences. The current approaches of encoding experiences require expert’s
knowledge to be acquired and represented in rules, cases or causal model. We differentiate the two types of
knowledge which are the content knowledge and socially-derivable knowledge. The latter is described as
knowledge that is earned through social interaction. Intelligent Conversational Channel is the system that
supports the building and sharing on this type of knowledge.
Keywords: Knowledge Building, Community Channel, Community Learning, Virtual Agents
ACM Classification Keywords: K.3.1 Computer Uses in Education (Collaborative Learning)
Link:
KNOWLEDGE CONSTRUCTION TECHNOLOGY THROUGH HYPERMEDIA-BASED INTELLIGENT CONVERSATIONAL CHANNEL
S.M.F.D Syed Mustapha
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p06.pdf
|
A "CROSS-TECHNOLOGY" SOFTWARE DEVELOPMENT APPROACH
By: Palanchov et al.
(3298 reads)
Rating:
(1.00/10)
|
Abstract: Contemporary web-based software solutions are usually composed of many interoperating
applications. Classical approach is the different applications of the solution to be created inside one
technology/platform, e.g. Java-technology, .NET-technology, etc. Wide spread technologies/platforms practically
discourage (and sometime consciously make impossible) the cooperation with elements of the concurrent
technologies/platforms. To make possible the usage of attractive features of one technology/platform in another
technology/platform some “cross-technology” approach is necessary. In the paper is discussed the possibility to
combine two existing instruments – interoperability protocols and “lifting” of procedures – in order to obtain such
cross-technology approach.
Keywords: web-solution, interoperability of applications, interoperability protocols, lifted procedures
ACM Classification Keywords: D.2 Software Engineering, D.2.11 Languages (interconnection), D.2.12
Interoperability (interface definition)
Link:
A "CROSS-TECHNOLOGY" SOFTWARE DEVELOPMENT APPROACH
Stefan Palanchov, Alexander Simeonov, Krassimir Manev
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p07.pdf
|
ASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM
By: Andrius Raulynaitis, Saulius Japertas
(4348 reads)
Rating:
(1.00/10)
|
Abstract: The asymmetric cipher protocol based on decomposition problem in matrix semiring M over semiring of
natural numbers N is presented. The security parameters are defined and preliminary security analysis is
presented.
Keywords: asymmetric cipher, decomposition problem.
ACM Classification Keywords: E.3 Data Encryption, F.2.1 Numerical Algorithms and Problems.
Link:
ASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM
Andrius Raulynaitis, Saulius Japertas
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p17.pdf
|
KEY AGREEMENT PROTOCOL (KAP) BASED ON MATRIX POWER FUNCTION*
By: Sakalauskas et al.
(3718 reads)
Rating:
(1.00/10)
|
Abstract: The key agreement protocol (KAP) is constructed using matrix power functions. These functions are
based on matrix ring action on some matrix set. Matrix power functions have some indications as being a oneway
function since they are linked with certain generalized satisfiability problems which are potentially NPComplete.
A working example of KAP with guaranteed brute force attack prevention is presented for certain
algebraic structures. The main advantage of proposed KAP is considerable fast computations and avoidance of
arithmetic operations with long integers.
Keywords: key agreement protocol, matrix power function, one-way function (OWF).
ACM Classification Keywords: E.3 Data encryption, F.2.1 Numerical Algorithms and Problems.
Link:
KEY AGREEMENT PROTOCOL (KAP) BASED ON MATRIX POWER FUNCTION*
Eligijus Sakalauskas, Narimantas Listopadskis, Povilas Tvarijonas
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p14.pdf
|
INTELLIGENT SYSTEM FOR COMPUTER AIDED ASSEMBLY PROCESS PLANNING
By: Galina Setlak
(3847 reads)
Rating:
(1.00/10)
|
Abstract: This paper presents the concepts of the intelligent system for aiding of the module assembly
technology. The first part of this paper presents a project of intelligent support system for computer aided
assembly process planning. The second part includes a coincidence description of the chosen aspects of
implementation of this intelligent system using technologies of artificial intelligence (artificial neural networks,
fuzzy logic, expert systems and genetic algorithms).
Keywords: Artificial intelligence, flexible assembly systems, neural networks, fuzzy logic, fuzzy neural networks,
group technology formatting rules.
ACM Classification Keywords: I. Computing Methodologies, I.2 Artificial Intelligence, J. Computer Applications,
J.6.Computer Aided Engineering
Link:
INTELLIGENT SYSTEM FOR COMPUTER AIDED ASSEMBLY PROCESS PLANNING
Galina Setlak
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p01.pdf
|
INCREASING RELIABILITY AND IMPROVING THE PROCESS OF ACCUMULATOR ...
By: Andrzej Smykla
(3230 reads)
Rating:
(1.00/10)
|
Abstract: The article presents the software written in Builder C++ that monitors the process of processor impulse
charger. Protocol, interface, components used and the future research are presented..
Keywords: PCGraph, developing software, charging process, C++ Builder
ACM Classification Keywords: C.3 Special-Purpose? and Application-based Systems
Link:
INCREASING RELIABILITY AND IMPROVING THE PROCESS OF ACCUMULATOR
CHARGING BASED ON THE DEVELOPMENT OF PCGRAPH APPLICATION
Andrzej Smykla
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p03.pdf
|
IMPROVED CRYPTOANALYSIS OF THE SELF-SHRINKING ...
By: Borislav Stoyanov
(4537 reads)
Rating:
(1.00/10)
|
Abstract: The Self-shrinking p-adic cryptographic generator (SSPCG) is a fast software stream cipher. Improved
cryptoanalysis of the SSPCG is introduced. This cryptoanalysis makes more precise the length of the period of
the generator. The linear complexity and the cryptography resistance against most recently used attacks are
invesigated. Then we discuss how such attacks can be avoided. The results show that the sequence generated
by a SSPCG has a large period, large linear complexity and is stable against the cryptographic attacks. This
gives the reason to consider the SSPSG as suitable for critical cryptographic applications in stream cipher
encryption algorithms.
Keywords: Cryptoanalys, FCSRs, Encryption Algorithm, Stream Cipher, Self-Shrinking? p-adic Cryptographic
Generator.
ACM Classification Keywords: G.3 Probability and Statistics: Random Number Generation; E.3 Data
Encryption; F.2.2 Nonnumerical Algorithms and Problems: Computations on discrete structures
Link:
IMPROVED CRYPTOANALYSIS OF THE SELF-SHRINKING
P-ADIC CRYPTOGRAPHIC GENERATOR
Borislav Stoyanov
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p18.pdf
|
ADAPTIVE SOA INFRASTRUCTURE BASED ON VARIABILITY MANAGEMENT
By: Peter Graubmann, Mikhail Roshchin
(3673 reads)
Rating:
(1.00/10)
|
Abstract: In order to exploit the adaptability of a SOA infrastructure, it becomes necessary to provide platform
mechanisms that support a mapping of the variability in the applications to the variability provided by the
infrastructure. The approach focuses on the configuration of the needed infrastructure mechanisms including
support for the derivation of the infrastructure variability model.
Keywords: Service-oriented Architecture, Adaptability, Variability Model, Distributed Systems.
ACM Classification Keywords: C.2.4 Distributed Systems
Link:
ADAPTIVE SOA INFRASTRUCTURE BASED ON VARIABILITY MANAGEMENT
Peter Graubmann, Mikhail Roshchin
http://www.foibg.com/ibs_isc/ibs-04/IBS-04-p10.pdf
|
|
|