|
GENERAL REGRESSION NEURO–FUZZY NETWORK FOR IDENTIFICATION ...
By: Yevgeniy Bodyanskiy, Nataliya Teslenko
(3249 reads)
Rating:
(1.00/10)
|
Abstract: General Regression Neuro-Fuzzy? Network, which combines the properties of conventional General
Regression Neural Network and Adaptive Network-based Fuzzy Inference System is proposed in this work. This
network relates to so-called “memory-based networks”, which is adjusted by one-pass learning algorithm.
Keywords: memory-based networks, one-pass learning, Fuzzy Inference Systems, fuzzy-basis membership
functions, neurons at data points, nonlinear identification.
ACM Classification Keywords: F.1 Computation by abstract devices - Self-modifying machines (e.g., neural
networks), I.2.6 Learning - Connectionism and neural nets, G.1.2. Approximation – Nonlinear approximation.
Link:
GENERAL REGRESSION NEURO–FUZZY NETWORK FOR IDENTIFICATION OF NONSTATIONARY PLANTS
Yevgeniy Bodyanskiy, Nataliya Teslenko
http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-2-p05.pdf
|
FORMALIZATION OF STRUCTURAL CONSTRAINTS OF RELATIONSHIPS ...
By: Dmytro Buy, Lyudmila Silveystruk
(3382 reads)
Rating:
(1.00/10)
|
Abstract: The basic conceptions of the model „entity-relationship” as entities, relationships, structural constraints
of the relationships (index cardinality, participation degree, and structural constraints of kind (min, max)) are
considered and formalized in terms of relations theory. For the binary relations two operators (min and max) are
introduced; structural constraints are determined in terms of the operators; the main theorem about compatibility
of these operators’ values on the source relation and inversion to it is given here.
Keywords: entity, relationship, index cardinality, participation degree, structural constraints of kind (min, max).
ACM Classification Keywords: E.4 Coding and information theory – Formal models of communication
Link:
FORMALIZATION OF STRUCTURAL CONSTRAINTS OF RELATIONSHIPS IN MODEL „ENTITY-RELATIONSHIP”
Dmytro Buy, Lyudmila Silveystruk
http://www.foibg.com/ijita/vol14/ijita14-4-p07.pdf
|
BUILDING DATA WAREHOUSES USING NUMBERED INFORMATION SPACES
By: Krassimir Markov
(3541 reads)
Rating:
(1.00/10)
|
Abstract: An approach for organizing the information in the data warehouses is presented in the paper. The
possibilities of the numbered information spaces for building data warehouses are discussed. An application is
outlined in the paper.
Keywords: Data Warehouses, Operational Data Stores, Numbered Information Spaces
ACM Classification Keywords: E.1 Data structures, E.2 Data storage representations
Link:
BUILDING DATA WAREHOUSES USING NUMBERED INFORMATION SPACES
Krassimir Markov
http://www.foibg.com/ijita/vol12/ijita12-2-p12.pdf
|
ANALYSIS OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS
By: Dimitrina Polimirova-Nickolova, Eugene Nickolov
(3293 reads)
Rating:
(1.00/10)
|
Abstract: In this paper a methodology for evaluation of information security of objects under attacks, processed
by methods of compression, is represented. Two basic parameters for evaluation of information security of
objects – TIME and SIZE – are chosen and the characteristics, which reflect on their evaluation, are analyzed and
estimated. A co-efficient of information security of object is proposed as a mean of the coefficients of the
parameter TIME and SIZE. From the simulation experiments which were carried out methods with the highest
co-efficient of information security had been determined. Assessments and conclusions for future investigations
are proposed.
Keywords: Information Security, File Objects, Information Attacks, Methods of Compression, Information Flows,
Coefficient of Information Security
ACM Classification Keywords: D.4.6 Security and Protection: information flow controls
Link:
ANALYSIS OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS AND PROCESSED BY METHODS OF COMPRESSION
Dimitrina Polimirova-Nickolova?, Eugene Nickolov
http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-2-p01.pdf
|
CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES ...
By: Maria Nickolova, Eugene Nickolov
(3424 reads)
Rating:
(1.00/10)
|
Abstract: This paper deals with the security problems of DRM protected e-learning content. After a short review
of the main DRM systems and methods used in e-learning, an examination is made of participators in DRM
schemes (e-learning object author, content creator, content publisher, license creator and end user). Then a
conceptual model of security related processes of DRM implementation is proposed which is improved afterwards
to reflect some particularities in DRM protection of e-learning objects. A methodical way is used to describe the
security related motives, responsibilities and goals of the main participators involved in the DRM system. Taken
together with the process model, these security properties are used to establish a list of requirements to fulfill and
a possibility for formal verification of real DRM systems compliance with these requirements.
Keywords: Security, DRM protection, e-learning.
ACM Classification Keywords: D.4.6 Security and Protection.
Link:
CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES USED FOR E-LEARNING OBJECTS PROTECTION
Maria Nickolova, Eugene Nickolov
http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-1-p18.pdf
|
INVESTIGATING THE RELATIONS OF ATTACKS, METHODS AND OBJECTS ...
By: Polimirova et al.
(3367 reads)
Rating:
(1.00/10)
|
Abstract: Possibilities for investigations of 43 varieties of file formats (objects), joined in 10 groups; 89
information attacks, joined in 33 groups and 73 methods of compression, joined in 10 groups are described in the
paper. Experimental, expert, possible and real relations between attacks’ groups, method’ groups and objects’
groups are determined by means of matrix transformations and the respective maximum and potential sets are
defined. At the end assessments and conclusions for future investigation are proposed.
Keywords: File Formats, Information Attacks, Methods of Compression, Compressed Objects, Information
Security.
ACM Classification Keywords: D.4.6 Security and Protection: information flow controls
Link:
INVESTIGATING THE RELATIONS OF ATTACKS, METHODS AND OBJECTS IN REGARD TO INFORMATION SECURITY IN NETWORK TCP/IP ENVIRONMENT
Dimitrina Polimirova, Eugene Nickolov, Cecko Nikolov
http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-1-p17.pdf
|
RESEARCH OF THE INFLUENCE OF METHODS OF COMPRESSION ON ...
By: Polimirova et al.
(3457 reads)
Rating:
(1.00/10)
|
Abstract: In this paper a possibility for quantitative measuring of information security of objects, exposed to
information attacks and processed with methods of compression, is represented. A co-efficient of information
security, which reflects the influence of the level of compression obtained after applying methods of compression
to objects and the time, required by the attack to get access to the corresponding object, is proposed. Methods’
groups with the highest and respectively the lowest values of the co-efficient of information security for all
methods’ groups in relation to all attacks’ groups are determined. Assessments and conclusions for future
investigations are proposed.
Keywords: Information Flows, Information Security, Information Attacks, Methods of Compression, Compressed
Objects, Coefficient of Information Security, Level of Compression.
ACM Classification Keywords: D.4.6 Security and Protection: information flow controls
Link:
RESEARCH OF THE INFLUENCE OF METHODS OF COMPRESSION ON THE CO-EFFICIENT OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS
Dimitrina Polimirova, Eugene Nickolov, Cecko Nikolov
http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-3-p10.pdf
|
VERIFICATION AND APPLICATION OF CONCEPTUAL MODEL AND SECURITY ...
By: Maria Nickolova, Eugene Nickolov
(3595 reads)
Rating:
(1.00/10)
|
Abstract: The paper represents a verification of a previously developed conceptual model of security related
processes in DRM implementation. The applicability of established security requirements in practice is checked
as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's
iTunes, SunnComm? Technologies’s MediaMax? DRM and First4Internet’s? XCP DRM). The exploited weaknesses
of these systems resulting from the violation of specific security requirements are explained and the possibilities
to avoid the attacks by implementing the requirements in designing step are discussed.
Keywords: Security, DRM protection, e-learning.
ACM Classification Keywords: D.4.6 Security and Protection
Link:
VERIFICATION AND APPLICATION OF CONCEPTUAL MODEL AND SECURITY REQUIREMENTS ON PRACTICAL DRM SYSTEMS IN E-LEARNING
Maria Nickolova, Eugene Nickolov
http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-2-p10.pdf
|
APPLICATION OF METHODS OF MULTI-CRITERIA EVALUATION IN CHOOSING A METHOD ...
By: Polimirova et al.
(3477 reads)
Rating:
(1.00/10)
|
Abstract: In this paper is proposed a model for researching the capability to influence, by selected methods’
groups of compression, to the co-efficient of information security of selected objects’ groups, exposed to selected
attacks’ groups. With the help of methods for multi-criteria evaluation are chosen the methods’ groups with the
lowest risk with respect to the information security. Recommendations for future investigations are proposed.
Keywords: Attacks, Methods of Compression, Objects, Information Security, Methods for Multi-criteria
Evaluation, Risk Assessment.
ACM Classification Keywords: D.4.6 Security and Protection: information flow controls
Link:
APPLICATION OF METHODS OF MULTI-CRITERIA EVALUATION IN CHOOSING A METHOD OF COMPRESSION AS A MEANS OF HEIGHTENING THE INFORMATION SECURITY OF SYSTEM AND APPLIED OBJECTS
Dimitrina Polimirova, Eugene Nickolov, Cecko Nikolov
http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-4-p09.pdf
|
THREAT MODEL FOR USER SECURITY IN E-LEARNING SYSTEMS
By: Maria Nickolova, Eugene Nickolov
(3999 reads)
Rating:
(1.00/10)
|
Abstract: This paper suggest a generic threat model for the processes in e-learning systems. After a breaf
discussion of the particularities of e-learning systems from the security point of view, the role of threat models in
system security is explained. Then a characterization of the attackers is made, together with the assets and entry
points identification and threats identification and classification. The most probable attacks for e-learning system
are described regardless of the specific implementation, to help the e-learning system developers to eliminate or
mitigate these attacks if possible in the design stage not waiting for actual attacks to occur.
Keywords: Security, threat modeling, e-learning.
ACM Classification Keywords: D.4.6 Security and Protection
Link:
THREAT MODEL FOR USER SECURITY IN E-LEARNING SYSTEMS
Maria Nickolova, Eugene Nickolov
http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-4-p07.pdf
|
EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS ...
By: Dimitrina Polimirova-Nickolova, Eugene Nickolov
(3823 reads)
Rating:
(1.00/10)
|
Abstract: The principal methods of compression and different types of non-encrypted objects are described. An
analysis is made of the results obtained from examinations of the speed of compression for objects when using
passwords with different length. The size of the new file obtained after compression is also analyzed. Some
evaluations are made with regard to the methods and the objects used in the examinations. In conclusion some
deductions are drawn as well as recommendations for future work.
Keywords: Password, Methods of Compression, Non-Encrypted? Applications, Archive Programs, Level of
Compression, File Extensions, Information Security.
ACM Classification Keywords: D.4.6 Security and Protection: information flow controls
Link:
EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS OF NON-ENCRYPTED OBJECTS
Dimitrina Polimirova-Nickolova?, Eugene Nickolov
http://www.foibg.com/ijita/vol12/ijita12-1-p05.pdf
|
ADVANCE OF THE ACCESS METHODS
By: Markov et al.
(3348 reads)
Rating:
(1.00/10)
|
Abstract: The goal of this paper is to outline the advance of the access methods in the last ten years as well as
to make review of all available in the accessible bibliography methods.
Keywords: Access Methods, Overview of the Access Methods
ACM Classification Keywords: D.4.3 File Systems Management, Access methods
Link:
ADVANCE OF THE ACCESS METHODS
Krassimir Markov, Krassimira Ivanova, Ilia Mitov, Stefan Karastanev
http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-2-p04.pdf
|
HANDLING THE SUBCLASSING ANOMALY WITH OBJECT TEAMS
By: Jeff Furlong, Atanas Radenski
(3654 reads)
Rating:
(1.00/10)
|
Abstract: Java software or libraries can evolve via subclassing. Unfortunately, subclassing may not properly
support code adaptation when there are dependencies between classes. More precisely, subclassing in
collections of related classes may require reimplementation of otherwise valid classes. This problem is defined as
the subclassing anomaly, which is an issue when software evolution or code reuse is a goal of the programmer
who is using existing classes. Object Teams offers an implicit fix to this problem and is largely compatible with the
existing JVMs. In this paper, we evaluate how well Object Teams succeeds in providing a solution for a complex,
real world project. Our results indicate that while Object Teams is a suitable solution for simple examples, it does
not meet the requirements for large scale projects. The reasons why Object Teams fails in certain usages may
prove useful to those who create linguistic modifications in languages or those who seek new methods for code
adaptation.
Keywords: Languages; Code reuse; Subclassing
ACM Classification Keywords: D.3.2 Programming Languages: Language Classifications – Extensible
languages, object-oriented languages; D.3.3 Programming Languages: Language Constructs and Features –
Classes and objects, data types and structures, inheritance, polymorphism
Link:
HANDLING THE SUBCLASSING ANOMALY WITH OBJECT TEAMS
Jeff Furlong, Atanas Radenski
http://www.foibg.com/ijita/vol13/ijita13-1-p12.pdf
|
USING THE BUSINESS PROCESS EXECUTION LANGUAGE FOR MANAGING ...
By: Anna Malinova, Snezhana Gocheva-Ilieva
(3533 reads)
Rating:
(1.00/10)
|
Abstract: This paper describes the use of the Business Process Execution Language for Web Services
(BPEL4WS/BPEL) for managing scientific workflows. This work is result of our attempt to adopt Service Oriented
Architecture in order to perform Web services – based simulation of metal vapor lasers. Scientific workflows can
be more demanding in their requirements than business processes. In the context of addressing these
requirements, the features of the BPEL4WS specification are discussed, which is widely regarded as the de-facto
standard for orchestrating Web services for business workflows. A typical use case of calculation the electric field
potential and intensity distributions is discussed as an example of building a BPEL process to perform distributed
simulation constructed by loosely-coupled services.
Keywords: BPEL, scientific workflows, Web services, SOA.
ACM Classification Keywords: D.2.12 Interoperability - Distributed objects
Link:
USING THE BUSINESS PROCESS EXECUTION LANGUAGE FOR MANAGING SCIENTIFIC PROCESSES
Anna Malinova, Snezhana Gocheva-Ilieva?
http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-3-p09.pdf
|
A SMALL SETTINGS CASE STUDY USING TSPI ...
By: Calvo-Manzano et al.
(3596 reads)
Rating:
(1.00/10)
|
Abstract: This article introduces a small setting case study about the benefits of using TSPi in a software project.
An adapted process from the current process based on the TSPi was defined. The pilot project had schedule and
budget constraints. The process began by gathering historical data from previous projects in order to get a
measurement repository. The project was launched with the following goals: increase the productivity, reduce the
test time and improve the product quality. Finally, the results were analysed and the goals were verified.
Keywords: TSPi, Small Settings, Process improvement.
ACM Classification Keywords: D.2.9 Software Engineering – Management, software process models
Link:
A SMALL SETTINGS CASE STUDY USING TSPI IN A SOFTWARE PROJECT
Jose Calvo-Manzano?, Gonzalo Cuevas, Tomás San Feliu, Edgar Caballero
http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-3-p07.pdf
|
REQUIREMENTS MANAGEMENT AND ACQUISITION MANAGEMENT ...
By: Calvo-Manzano et al.
(3666 reads)
Rating:
(1.00/10)
|
Abstract: As a part of the activities of the first Symposium on Process Improvement Models and Software Quality
of the Spanish Public Administration, working groups were formed to discuss the current state of the
Requirements Management and Supplier Agreement Management processes. This article presents general
results and main contributions of those working groups. The results have allowed the obtention of a preliminary
appraisal of the current state of these two processes in the Spanish Public Administration.
Keywords: Requirements engineering, subcontracting management, improvement models, process.
ACM Classification Keywords: D.2.9 Management, K.6.3 Software Management
Link:
REQUIREMENTS MANAGEMENT AND ACQUISITION MANAGEMENT EXPERIENCES IN SPANISH PUBLIC ADMINISTRATIONS
Jose A. Calvo-Manzano?, Gonzalo Cuevas, Ivan Garcia,Tomas San Feliu,
Ariel Serrano, Magdalena Arcilla, Fernando Arboledas, Fernando Ruiz de Ojeda
http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-2-p03.pdf
|
ON THE MODELS OF DEVELOPMENT AND DISTRIBUTION OF SOFTWARE
By: Neli Maneva, Krassimir Manev
(3282 reads)
Rating:
(1.00/10)
|
Abstract: The notion model of development and distribution of software (MDDS) is introduced and its role for the
efficiency of the software products is stressed. Two classical MDDS are presented and some attempts to adapt
them to the contemporary trends in web-based software design are described. Advantages and shortcomings of
the obtained models are outlined. In conclusion the desired features of a better MDDS for web-based solutions
are given.
Keywords: models of development and distribution of software, efficiency, web-based solutions.
ACM Classification Keywords: D.2.7 Distribution, Maintenance, and Enhancement; D.2.9 Management.
Link:
ON THE MODELS OF DEVELOPMENT AND DISTRIBUTION OF SOFTWARE
Neli Maneva, Krassimir Manev
http://www.foibg.com/ijita/vol15/ijita15-2-p11.pdf
|
DEVELOPMENT OF THE COMBINED METHOD FOR DESIGNING DATAFLOW SYSTEMS
By: Nina Bakanova, Tatiana Atanasova
(3740 reads)
Rating:
(1.00/10)
|
Abstract: The methods of designing of information systems for large organizations are considered in the paper.
The structural and object-oriented approaches are compared. For the practical realization of the automated
dataflow systems the combined method for the system development and analysis is proposed.
Keywords: designing of information systems, document circulation, dataflow, office-work
ACM Classification Keywords: D.2.2 Design Tools and Techniques: Computer-aided software engineering
(CASE); H.4 Information Systems Applications: Workflow management
Link:
DEVELOPMENT OF THE COMBINED METHOD FOR DESIGNING DATAFLOW SYSTEMS
Nina Bakanova, Tatiana Atanasova
http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-3-p10.pdf
|
EXPERIENCES ON APPLICATION GENERATORS
By: Garcia et al.
(3947 reads)
Rating:
(1.00/10)
|
Abstract: The National Institute for Statistics is the organism responsible for acquiring economical data for
governmental statistics purposes. Lisbon agreements establish a framework in which this acquisition process
shall be available through Internet, so each survey should be considered as a little software project to be
developed and maintained. Considering the great amount of different surveys and all changes produced per year
on each make impossible this task. An application generator has been developed to automate this task, taking as
a start point the Word or PDF template of a survey, and going through a graphical form designer as all human
effort, all HTML, Java classes and Oracle database resources are generated and sent from backoffice to
frontoffice servers, reducing the team to carry out the whole set of electronic surveys to two people from non I.T.
staff.
Keywords: Software automation, application generators, CASE.
ACM Classification keywords: D2.2. Design Tools and Techniques
Link:
EXPERIENCES ON APPLICATION GENERATORS
Hector Garcia, Carlos del Cuvillo, Diego Perez, Borja Lazaro
http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-2-p05.pdf
|
IMPLICATIONS OF RECENT TRENDS IN TELECOMMUNICATIONS ON MODELING ...
By: Gerta Köster, Stoyan Poryazov
(3641 reads)
Rating:
(1.00/10)
|
Abstract: With this paper we would like to trigger a discussion on future needs of modeling and simulation
techniques and tools for the telecommunication industry. We claim that the telecommunication market has
undergone severe changes that affect the need for and type of simulations in industrial research. We suggest
some approaches how to address these new challenges. We believe that there is need for intensive research in
the area.
Keywords: Telecommunications, Market Evolution, Modeling and Simulation Challenges.
ACM Classification Keywords: D.2.2 Design Tools and Techniques; K.6.1 Project and People Management.
Link:
IMPLICATIONS OF RECENT TRENDS IN TELECOMMUNICATIONS ON MODELING
AND SIMULATION FOR THE TELECOMMUNICATION INDUSTRY
Gerta Köster, Stoyan Poryazov
http://www.foibg.com/ijitk/ijitk-vol01/ijitk01-2-p02.pdf
|
THE APPLICATION OF GRAPH MODEL FOR AUTOMATION
By: Elena Kudelko
(3983 reads)
Rating:
(1.00/10)
|
THE APPLICATION OF GRAPH MODEL FOR AUTOMATION
OF THE USER INTERFACE CONSTRUCTION
Elena Kudelko
Abstract: The ability of automatic graphic user interface construction is described. It is based on the building of
user interface as reflection of the data domain logical definition. The submitted approach to development of the
information system user interface enables dynamic adaptation of the system during their operation. This
approach is used for creation of information systems based on CASE-system METAS.
Keywords: User interface, metadata, CASE-technology, dynamically adapted information systems, graph model.
ACM Classification Keywords: D.2.2 Software Engineering: Design Tools and Techniques – Computer-aided
software engineering (CASE); G.2.2 Discrete Mathematics: Graph Theory – Graph algorithms.
Link:
THE APPLICATION OF GRAPH MODEL FOR AUTOMATION OF THE USER INTERFACE CONSTRUCTION
Elena Kudelko
http://www.foibg.com/ijita/vol14/ijita14-4-p11.pdf
|
THE TECHNOLOGY OF PROGRAMMING FOR A CLUSTER COMPUTER ...
By: Dmitry Cheremisinov, Liudmila Cheremisinova
(3668 reads)
Rating:
(1.00/10)
|
Abstract. The problem of preparation of a program to perform it on multiprocessor system of a cluster type is
considered. When developing programs for a cluster computer the technology based on use of the remote
terminal is applied. The situation when such remote terminal is the computer with operational system Windows is
considered. The set of the tool means, allowing carrying out of editing program texts, compiling and starting
programs on a cluster computer, is suggested. Advantage of an offered way of preparation of programs to
execution is that it allows as much as possible to use practical experience of programmers used to working in OS
Windows environment.
Keywords: parallel programming, cluster computer, programming technology.
ACM Classification Keywords: D.2.1 Software engineering: Requirements/Specifications – Tools;
D.1.3 Programming techniques: Concurrent Programming – Parallel programming.
Link:
THE TECHNOLOGY OF PROGRAMMING FOR A CLUSTER COMPUTER
BY THE REMOTE TERMINAL WITH OS WINDOWS
Dmitry Cheremisinov, Liudmila Cheremisinova
http://www.foibg.com/ijita/vol14/ijita14-4-p13.pdf
|
IMPLEMENTATION OF DISTANT LEARNING PORTALS BASED ON ...
By: Lyadova et al.
(3192 reads)
Rating:
(1.00/10)
|
Abstract: The paper describes an approach to the development of software aimed at the creation of distant
learning portals integrated with education support and educational institution management systems. The software
being developed is based on CASE-technology METAS which is used for the creation of adaptive distributed
information systems. This technology allows to dynamically adjust the portal’s structure and portal’s functionality
enhancements.
Keywords: portal, learning portal, distant learning, testing, information system, CASE-technology.
ACM Classification Keywords: D.2 Software Engineering: D.2.2 Design Tools and Techniques – Computeraided
software engineering (CASE); H.3 Information Storage and Retrieval: H.3.5 Online Information Services –
Web-based services; K.3 Computers and Education: K.3.1 Computer Uses in Education – Distance learning.
Link:
IMPLEMENTATION OF DISTANT LEARNING PORTALS BASED ON CASE-TECHNOLOGY METAS
Ludmila Lyadova, Alexey Urezalov, Andrey Khlyzov
http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-5-p17.pdf
|
DATA INDEPENDENCE IN THE MULTI-DIMENSIONAL NUMBERED INFORMATION SPACES
By: Krassimir Markov
(3536 reads)
Rating:
(1.00/10)
|
Abstract: The concept of data independence designates the techniques that allow data to be changed without
affecting the applications that process it. The different structures of the information bases require corresponded
tools for supporting data independence. A kind of information bases (the Multi-dimensional Numbered Information
Spaces) are pointed in the paper. The data independence in such information bases is discussed.
Keywords: Data independence; Multi-dimensional Numbered Information Spaces
ACM Classification Keywords: D.2 Software Engineering; H.2 Database Management
Link:
DATA INDEPENDENCE IN THE MULTI-DIMENSIONAL NUMBERED INFORMATION SPACES
Krassimir Markov
http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-1-p16.pdf
|
ARCHITECTURE AND IMPLEMENTATION OF REPORTING MEANS IN ADAPTIVE
By: Vyacheslav Lanin
(3298 reads)
Rating:
(1.00/10)
|
Abstract: This article describes architecture and implementation of subsystem intended for working with queries
and reports in adaptive dynamically extended information systems able to dynamically extending. The main
features of developed approach are application universality, user orientation and opportunity to integrate with
external information systems. Software implementation is based on multilevel metadata approach.
Keywords: CASE-technology, adaptive information system, electronic document, query builder, report
generation.
ACM Classification Keywords: D.2 Software Engineering: D.2.2 Design Tools and Techniques – Computeraided
software engineering (CASE); H.2: Database Management: H.2.3 Languages – Report writers;
H.3.3 Information Search and Retrieval – Query formulation.
Link:
ARCHITECTURE AND IMPLEMENTATION OF REPORTING MEANS IN ADAPTIVE
DYNAMICALLY EXTENDED INFORMATION SYSTEMS
Vyacheslav Lanin
http://www.foibg.com/ijitk/ijitk-vol02/ijitk02-3-p12.pdf
|
|
|